Best SURF Security Alternatives in 2024
Find the top alternatives to SURF Security currently available. Compare ratings, reviews, pricing, and features of SURF Security alternatives in 2024. Slashdot lists the best SURF Security alternatives on the market that offer competing products that are similar to SURF Security. Sort through SURF Security alternatives below to make the best choice for your needs
-
1
Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines the most advanced threat-hunting technologies in existence: Heimdal Next-Gen Antivirus, Heimdal Privileged Access Management, Heimdal Application Control, Heimdal Ransomware Encryption Protection, Heimdal Patch & Asset Management, and Heimdal Threat Prevention. With 6 modules working together seamlessly under one convenient roof, all within one agent and one platform, Heimdal Endpoint Detection and Response grants you access to all the essential cybersecurity layers your business needs to protect itself against both known and unknown online and insider threats. Our state-of-the-art product empowers you to quickly and effortlessly respond to sophisticated malware with stunning accuracy, protecting your digital assets and your reputation in the process as well.
-
2
Safetica
342 RatingsSafetica Intelligent Data Security protects sensitive enterprise data wherever your team uses it. Safetica is a global software company that provides Data Loss Prevention and Insider Risk Management solutions to organizations. ✔️ Know what to protect: Accurately pinpoint personally identifiable information, intellectual property, financial data, and more, wherever it is utilized across the enterprise, cloud, and endpoint devices. ✔️ Prevent threats: Identify and address risky activities through automatic detection of unusual file access, email interactions, and web activity. Receive the alerts necessary to proactively identify risks and prevent data breaches. ✔️ Secure your data: Block unauthorized exposure of sensitive personal data, trade secrets, and intellectual property. ✔️ Work smarter: Assist teams with real-time data handling cues as they access and share sensitive information. -
3
VersaONE
Versa Networks
89 RatingsThe AI-powered platform enables unified security and network. AI-powered data and threat protection minimizes human error and increases the speed of detection. AI-powered networks improve user and app experiences, as well as performance and reliability. Reduce your TCO with a converged infrastructure that simplifies your infrastructure and reduces point products sprawl, fragmented operation, and complex management. VersaONE offers seamless connectivity and unified protection for all users, devices and locations, including offices, branches and edge locations. It provides secure access to all of your workloads, cloud applications, and wireless networks from a single platform. This ensures that data and resources can be accessed and secured across any network, whether it is WAN, WLAN, cellular, or satellite. This unified platform approach simplifies network management and reduces complexity while enhancing security. It meets the demands of modern IT environments. -
4
For enterprises that need to protect SaaS data in mission critical apps, SpinOne is an all-in-one SaaS security platform that helps IT security teams consolidate point solutions, save time by automating data protection, reduce downtime, and mitigate the risk of shadow IT, data leak and loss and ransomware. The all-in-one SaaS security platform from Spin is the only one that provides a layered defense to protect SaaS data, including SaaS security posture management (SSPM), SaaS data leak and loss prevention (DLP), and SaaS ransomware detection and response. Enterprises use these solutions to mitigate risk, save time, reduce downtime, and improve compliance.
-
5
ThreatLocker
ThreatLocker
12 RatingsFor IT professionals to stop ransomware, you need to do more than look for threats. ThreatLocker helps you reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from only blocking known threats, to blocking everything that is not explicitly allowed. Combined with Ringfencing and additional controls, you enhance your Zero Trust protection and block attacks that live off the land. Discover today the ThreatLocker suite of Zero Trust endpoint security solutions: Allowlisting, Ringfencing, Elevation Control, Storage Control, Network Access Control, Unified Audit, ThreatLocker Ops, Community, Configuration Manager and Health Center. -
6
Endpoint Protector
CoSoSys
1 RatingEndpoint Protector, a comprehensive, all-in-one Data Loss Prevention Solution for Windows, macOS, and Linux, prevents data theft and data leakage and provides seamless control over portable storage devices. Endpoint Protector can filter data in motion and at rest using regular expressions, dictionaries or data protection regulations like GDPR, PCI DSS and HIPAA. Endpoint Protector has several modules that can be combined and matched to meet client needs. These modules include Content Aware Protection and Device Control. Enforced Encryption is also available. eDiscovery is available. It makes work easier, safer, and more enjoyable, with a great ROI. -
7
Kasm Technologies
$0 Free Community Edition 46 RatingsKasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm is revolutionizing the way businesses deliver digital workspaces. We use our open-source web native container streaming technology to create a modern devops delivery of Desktop as a Service, application streaming, and browser isolation. Kasm is more than a service. It is a platform that is highly configurable and has a robust API that can be customized to your needs at any scale. Workspaces can be deployed wherever the work is. It can be deployed on-premise (including Air-Gapped Networks), in the cloud (Public and Private), or in a hybrid. -
8
Talon Enterprise Browser
Talon Cyber Security
The first secure enterprise browser for the future of work. Protect your business users from malware and prevent data loss when using SaaS and web-based apps. Available anywhere, any device. TalonWork is a Chromium-based browser that blocks web traffic locally on the endpoint and provides a native, responsive user experience. TalonWork integrates seamlessly with popular Identity Providers, allowing for faster user onboarding and policy enforcement. TalonWork offers comprehensive DLP to reduce cyber risks. This includes file encryption to protect sensitive files from being stored on endpoints or shared externally. TalonWork also offers granular clipboard, printing and screenshot restrictions. TalonWork blocks access from malicious domains and phishing sites with URL filtering, enhanced safe browsing functions, and prevents them from being accessed. TalonWork also blocks malicious files being uploaded/downloaded by CrowdStrike Falcon X or Talon's file scanner engine. -
9
Fortinet, a global leader of cybersecurity solutions, is known for its integrated and comprehensive approach to safeguarding digital devices, networks, and applications. Fortinet was founded in 2000 and offers a variety of products and solutions, including firewalls and endpoint protection systems, intrusion prevention and secure access. Fortinet Security Fabric is at the core of the company's offerings. It is a unified platform which seamlessly integrates security tools in order to deliver visibility, automate, and real-time intelligence about threats across the network. Fortinet is trusted by businesses, governments and service providers around the world. It emphasizes innovation, performance and scalability to ensure robust defense against evolving cyber-threats while supporting digital transformation.
-
10
CM Browser
Cheetah Mobile
FreeCM Browser protects against phishing attacks, and warns you if you visit malicious websites. To prevent infection by trojans, adware, and other types of viruses, downloaded apps are also scanned. The user interface features gesture controls, a customizable speed dial to your favorite sites, bookmarks to track your favorites sites, and Card Tabs animation to allow you to manage multiple web pages easily. Tiny size ensures your device keeps running smoothly. Preload mechanism and web browsing acceleration make surfing easy. KS Mobile developed CM Browser, an Internet browser that is powerful and easy to use. This browser is part of a range of security applications such as Clean Master or CM Security. Security is a major strength of CM Browser. CM Browser offers many advantages over other browsers. The application takes up less than two megabytes of RAM in our terminal than Google Chrome, which uses more than twenty-eight. -
11
Acronis DeviceLock DLP
Acronis
$615 one-time paymentAcronis DeviceLock DLP offers comprehensive endpoint DLP (endpoint loss prevention) that identifies and protects sensitive data and monitors the operations involving it. By blocking unauthorized attempts to access or transfer data, employees can prevent data leakage and protect sensitive data-at rest. A single DLP solution can simplify data protection and reduce reporting times. It provides comprehensive visibility over data flows, user behavior, and allows for detailed visibility. By enforcing data handling policies that users cannot ignore and reducing information security risks, you can reduce information security risks. Reduce the time and hassle involved in managing a DLP solution. Acronis DeviceLock DLP can be easily deployed through Active Directory (AD). It also offers various central management consoles that can be customized to your organization's needs. -
12
ITsMine Beyond DLP
ITsMine
ITsMine Beyond DLP™, which goes beyond traditional Data Loss Prevention, (DLP), protects organizations from all data threats. Endpoint agents and policies have no effect on employee productivity. Protection is available even after data exfiltration. Data loss incidents are becoming more frequent and more damaging than ever before, be they intentional or accidental, or from external or internal factors. Beyond DLP™, a new security approach, allows organizations to track and secure their data anywhere it is. This includes their internal network as well as external networks. No matter where your data is stored, maintain your high security standards. You can empower employees to be productive while controlling the use and whereabouts your sensitive data. Compliance with data protection regulations is easy, including GDPR, CCPA and PCI to HIPPA. Access control options for sensitive data, data breach detection, and reporting options are all available. -
13
Citrix Enterprise Browser
Cloud Software Group
$2 per user per monthKeep your data secure from browser-based attacks. Internet is one of your biggest enemies when it comes to security. This is a problem because employees need to be able to access the internet in order to be productive. Citrix Enterprise Browser can help. This cloud-hosted web browser allows you to protect your network thoroughly without complicating the user experience. Go ahead--let employees browse away. We'll isolate this traffic and keep your network safe. Your devices and data are protected even if someone visits a compromised website. Teams have more freedom. You get greater control. Employees want unlimited browsing. IT must keep web-based threats at bay. Citrix Enterprise Browser allows you to do both. Citrix Enterprise Browser is completely independent of your network. Each session is destroyed once used, so browsing is completely isolated. Even as you give employees more options to work on the go, your corporate resources are still safe. -
14
Next DLP
Next DLP
Reveal helps you to identify risks, educate employees and enforce policies. It also prevents data loss. Your people, users, and data are dynamic. They change and move constantly. People create, manipulate, and share data dynamically in the hybrid world of work. This is possible through a variety of channels. There are many data leakage opportunities. Your people are the main target. Securing your organization begins with securing you people. Reveal Cloud is cloud-native so it is easy to install, buy, and use. Automatic protection is available from day one with out-of the-box policies and machine-learning, as well as smart remediation that works even when computers are not connected to the network. The lightweight agent ensures that your data and employees are always protected without slowing down. Continuous monitoring gives you visibility into user behavior, data access, system use, and other system activities. Security personnel can search for file, USB device and connection. They can also search for browser events and other information. -
15
Clearswift Endpoint Data Protection (DLP), a key component of your IT security strategy, allows organizations to detect, inspect, and secure critical data on endpoints. It provides context-aware Data in Use policies that allow you to control which devices are allowed to connect to your corporate network and what information may be transferred. It also performs scheduled Data at Rest scans on file system files to audit and manage important data residing on the network. Clearswift Endpoint DLP is a lightweight agent that works behind-the scenes to enforce compliance policies and continuity even when users don't have access to the network. Organizations can apply flexible and context-aware DIU rules to prevent documents containing sensitive data being copied to removable media, shared on network or uploaded to cloud or encrypt them before they're transferred.
-
16
R&S®Browser in the Box
Rohde & Schwarz Cybersecurity
Rohde & Schwarz Cybersecurity's R&S(r.Browser-in-the-Box) prevents malware from getting into your computer and your infrastructure. This innovative solution completely separates the browser and the computer's operating systems. It runs on a virtual machine, or VM, to isolate the computer at all levels. This prevents malware from reaching the user's computer and the corporate network. Browser in the Box provides proactive protection against cyberattacks. The browser is protected from ransomware, ransomware and other zero-day threats by being isolated from the rest. Java, JavaScript and Flash, as well as the opening of dangerous hyperlinks, are no longer a threat. -
17
Island
Island
Island gives the enterprise complete control over the browser. It delivers a level governance, visibility and productivity that was simply not possible before. Controlling where and when users copy/paste into or out of applications. Checking device posture before granting access to an application. Preventing unauthorized screen captures. Understand the full story of user activity and experience. Trace incidents to the user, device and time. All browser data can be fed into your analytics platform so that you have everything you need in one place. Island can be customized to match your company's brand, messaging and workflows. You can even insert browser-based RPAs to protect sensitive data, based on the unique governance requirements. Island is built using Chromium, which is the same open-source software that powers Chrome, Edge and other mainstream browsers. -
18
Puffin
CloudMosa
While popular browsers offer a wide range of features, they often fail to fully protect users. Puffin's cloud technology provides all the benefits of modern browsers without compromising security. Our devices are highly vulnerable to cyber attacks. Your computer, tablet, phone and laptop are protected from hijacking by using the cloud for browsing. Designed with users in mind. This reduces the internal workload, which results in a higher processing efficiency. -
19
Material
Material
Email is a vital repository for sensitive content, the key of many accounts and the most widely used business application. Blocking messages is not enough when attackers have multiple routes in. Protect critical messages without compromising productivity. Material automatically categorizes and redacts sensitive information in email. This ensures that it is safe even if someone tries to access it. Quick verification brings the original message back to the mailbox. By preventing attackers using email accounts to hijack other services, you can limit the potential for a breach. This material adds a simple verification before granting access password resets or other critical messages. Phishing training is a partial best practice. While one user may report an attack, others might fall for it. Material allows employees to report a single incident and instantly protect the entire company. You have unprecedented control and visibility over all your email footprint. -
20
AccessPatrol
CurrentWare Inc.
$3.99 PUPM 1 RatingAccessPatrol is a data loss prevention and device control software for preventing data leakage to portable storage hardware. With AccessPatrol you can restrict a variety of peripherals including USB portable storage devices, optical media, Bluetooth, WiFi, FireWire, and cell phones. Access permissions for USB devices can be set to Allow, Read Only, or Blocked. Peripheral devices can be identified based on Vendor ID, Serial Number, and PNP Device ID. Specific USBs, External Hard drives, Imaging devices, and portable devices can be added to an Allowed List to enforce the exclusive use of company-approved devices. -
21
ManageEngine Endpoint DLP Plus
ManageEngine
$795/100 Workstations ManageEngine's Endpoint DLP Plus enterprise solution uses advanced data loss prevention strategies in order to protect sensitive information stored on endpoint devices. It automates the process for locating, tagging, and controlling data movement across the network. This is useful in quickly mitigating insider risk and potential threats to sensitive information. It also provides many reports that assist in improving data visibility and overall cybersecurity. -
22
Microsoft Purview Data Loss Prevention
Microsoft
$12 per monthMicrosoft Teams, Office 365, OneDrive and SharePoint are all part of the solution. Data loss prevention (DLP), as well as our data landscape, has evolved. Learn about common deployment states, migration issues, and best practices, including the benefits of adopting cloud-native DLP solutions. Microsoft Purview Data Loss Prevention helps prevent the unauthorized sharing, usage, or transfer sensitive information across apps and services. Microsoft Purview's compliance portal allows you to create, manage, enforce, and monitor data loss prevention policies. DLP is integrated into information protection classification and labels, including out-of the-box, advanced SITs, and trainable classifiers. Data Loss Prevention (DLP), alerts page allows you to configure, triage and track alerts. DLP alerts can be extended to the Microsoft Defender XDR Portal and Microsoft Sentinel. -
23
BlackBerry Cyber Suite
BlackBerry
Protect your users and devices, including BYOD laptops, smartphones, and tablets, with a solution that focuses on building trust across all endpoints and validating that trust at each transaction. Are you able to empower your employees no matter where they are working? It's important that employees have secure access to data and apps even if they are unable to report to work. The BlackBerry®, Cyber Suite provides total security, effectively protecting against breaches and protecting against sophisticated threats with advanced AI. It offers a complete Zero Trust solution that covers all devices, ownership models and networks. It authenticates users continuously and dynamically adjusts security policies to provide a Zero Touch experience that improves security without user interruption. -
24
ManageEngine Device Control Plus
Zoho
$5.95 per user per yearDevice Control Plus Enterprise Software is designed to manage file access and device control. It features an intuitive interface that allows admins to classify USB and other peripheral devices in a way that is easy to use. It also has many data security capabilities, including the ability to restrict file copying and block unauthorized file transfers, as well as read-only file access. File shadowing and file tracing reports will also be generated to provide extensive visibility into device actions and forensic analysis on policy efficacy, network performance, and policy effectiveness. -
25
Baffle
Baffle
Baffle provides data protection that is universal from any source to any destination. You can control who has access to what data. Enterprises continue to fight cybersecurity threats like ransomware and breaches and losses of data assets in private and public clouds. New data management restrictions and considerations about how it must be protected have altered the way data is stored, retrieved and analyzed. Baffle believes data breaches and data loss will not occur. Our last line of defense is to ensure that attackers cannot access unprotected data. Our data protection solutions protect data from the moment it is created and keep it safe while it is being processed. Baffle's transparent security mesh for cloud and on-premise data offers multiple data protection modes. You can protect data as it moves between a source data store and a cloud database or object storage. This ensures safe consumption of sensitive information. -
26
Somansa Privacy-i
Somansa
Companies are becoming more dependent on corporate information stored on company desktops, laptops and mobile devices. This can also lead to increased liabilities and exhaustion of resources. Organizations of all sizes, industries, financial, healthcare, and government can suffer financial and resource losses due to sensitive and confidential data leakage. Somansa Privacyi is an endpoint data loss prevention solution (DLP). It protects personal and confidential data stored on company desktops, laptops and mobile devices. Based on policies rules, it monitors, discovers and secures confidential information. -
27
InteliSecure Aperture
InteliSecure
Aperture centralizes and standardizes alert management for Microsoft data products such as Office 365 DLP (AIP), Azure Information Protection (AIP) and Cloud App Security. You can get more value out of your Microsoft E3 and E5 security tools by reducing duplicate tools, duplicate costs, or duplicate efforts. The Aperture platform was designed for enterprise use and is enabled by InteliSecure managed security data protection services to simplify and streamline incident and triage handling. An expert Solutions Architect will demonstrate how you can gain real visibility into security events no matter where they originate within your Microsoft ecosystem. Aperture allows you to create customized configurations that allow your security administrators to create a powerful security strategy. This includes custom classifications and policies as well as role-based access control and standard governance across both on-premises applications and cloud-based ones. -
28
CurrentWare
CurrentWare
$5 per monthOur simple employee monitoring and security solutions will protect your business. CurrentWare's robust data loss prevention features and user activity monitoring tools will protect your sensitive data. Block unauthorized USB devices in order to prevent data theft. Proactively block high-risk sites, monitor computer activity, and more. CurrentWare's internet monitoring and filtering software for the workplace prevents misuse of the internet. You can easily restrict internet access, track employee web surfing and enforce your internet policies. Use CurrentWare remote workforce management software, regardless of where your employees work, to improve their productivity and security. CurrentWare allows you to monitor remote employee internet use, block websites and restrict USBs, even when the PC is disconnected from your network. CurrentWare's web filtering and computer monitoring for schools can ensure student safety, whether on-campus or at home. -
29
GTB Technologies DLP
GTB Technologies
Data Loss Prevention can be described as a system that automatically enforces data security policies and real-time data classification of data in motion and at rest. Data in motion refers to data that is sent to the internet, cloud, devices, or printer. Our technology leader is our solution. Our Data Loss Prevention security engine detects both structured and unstructured data at the binary level. It protects on-premises, offsites, as well as the cloud. GTB is the only Data Loss Prevention tool that protects data even when it's not connected to the network. Find, classify, classify, index, redact and re-mediate your data. This includes PII, PHI, structured data, FERC/NERC, SOX & more. Our patent-pending proprietary technology can prevent sensitive data from being synced to private or unapproved clouds. It also allows users to identify "sync files". -
30
Citrio
Citrio
FreeCitrio is a polished, fast browser that delivers excellent performance. Citrio's quick startup, smooth browsing, responsive addons, and smooth navigation will make your web surfing experience the best. Citrio respects privacy and does not collect any personal information. The browser is designed to keep your computer safe and secure online with built-in malware protection and phishing protection. Automatic updates also ensure that you are up-to-date with security fixes. All addons and extensions are supported by Citrio. Any feature you may need can be added to Citrio to expand its functionality. Citrio is a flexible tool that can be customized for every user. The integrated Download Manager in Citrio gives you complete control over your downloads. All downloaded files can be accessed through the browser. The built-in download accelerator will speed up your downloads up to five times and ensure you get them faster! -
31
BlackBerry Access
BlackBerry
Access your corporate network from personal devices or not-corporate managed devices. Enterprise data is protected with full containerization to reduce data leakage. BlackBerry® Access offers a secure and intuitive user experience for intranet browsing. Employees have access to corporate intranets on their personal devices or those of the company. BlackBerry desktop offerings allow you to simplify your bring your computer program. They offer modern alternatives to traditional VPNs and VDI solutions. BlackBerry® Desktop allows users to securely access corporate content and resources from their own Windows 10 or macOS devices. It also includes BlackBerry Access and BlackBerry® work. BlackBerry Access is a secure browser that allows you to enable mobile access for your company network. It supports iOS, Android and Windows. -
32
360 Secure Browser
360 Safe Browser
Smooth and natural native built-in, reduce blue light damage, makes surfing the Internet easier and more enjoyable. 360 Secure Browser adheres to the respectful design concept. New homepage with new upgrades of minimalist functions and refreshing experience. You can protect your privacy while browsing the internet by making it difficult to be tracked between different websites. The webpage's video supports floating window playback and background playback. It also only listens to the sound. Incognito mode does not save browsing history, cache, cookies, or browsing history. -
33
Mi Browser
Zhigu Corporation Limited
$0.99 per item 1 RatingMi Browser is a mobile browser that offers full-featured web browsing. It's fast, secure, and easy to use. You can surf the web, search, shop online, play games, and watch videos with amazing performance. You will also find trendy features like downloading images and videos from social networks, file management tools, private folder, and more! Mi Browser Pro has many security features to ensure safe browsing. We aim to provide world-class secure products and services to all users. Incognito mode is now available to all users. This allows them to turn on/off aggregated data collection. This is an effort to strengthen control over how users share their data with Xiaomi. You can download images and videos from Facebook, Instagram, or Twitter. Mi Browser allows you to save WhatsApp statuses from your friends. You can save all your important items and worry less about them getting lost. -
34
Panda Fusion 360
WatchGuard Technologies
1 RatingFusion 360 combines our Systems Management solutions with Adaptive Defense 360 solutions. This enables us to unify RMM, EPP and EDR capabilities. This holistic solution combines the best from both worlds to provide endpoint security, centralized IT administration, monitoring, and remote support capabilities. Fusion 360 provides Zero-Trust and Threat Hunting services that ensure 100% classification of all running processes on your endpoints. - Advanced detection, prevention and response technologies against breaches - Automated processes to reduce response time and investigation times - Cloud-based central management for devices and system, with real-time inventory monitoring and remote support. -
35
Menlo Security
Menlo Security
Our platform invisible protects users from any online threat. The alert storm is over and threats are gone. Discover the key ingredients that make Menlo Security platform so secure and seamless. The Elastic Isolation Core is the engine behind our unique approach to security. It protects against known and undiscovered threats and isolates them before they reach users. Zero Trust isolation offers 100% protection without the need for any special software or plug ins. Users experience no interruption in their workflow or performance. The Elastic Edge is cloud-native and highly performant, and can scale globally on demand. It scales dynamically to meet enterprise-level growth, from 1000 users to more than 3M -- with no performance impact and easily extensible with a rich array of APIs and integrations. -
36
Avast Secure Browser
Avast
$0 2 RatingsAvast Secure Browser automatically blocks all online ads to dramatically improve website load times. You can browse the web uninterrupted by hiding all ads or only the most intrusive. Our private browser is equipped with advanced security so you can safely browse, shop, and bank on any website. To protect your sensitive data, hide everything you type online. Anti-phishing technology can protect your device from potential threats. Secure your data by ensuring that supported websites use encryption. We have several layers of privacy protection to protect your online identity and prevent online tracking. You can keep your online privacy private by preventing third-party tracking. Websites can't identify you based upon your unique browser profile. To ensure that your passwords aren't stolen online, monitor your email address. -
37
Lightning Browser
ACR Development
Free 1 RatingLightning is a fast, simple web browser that focuses on design and security. It uses material design, doesn’t track you, and gives you many options to protect your privacy. It doesn't get in the way of the user. This browser was built because I wanted to create something better. Lightning Browser's core feature, blocking ads, is designed to increase the speed and security of your browsing experience. Lightning's interface is designed to make browsing as easy as possible. Bookmarks and tabs are neatly stored in side drawers. They can be accessed with a single swipe. This allows maximum screen viewing without any interference from the browser's Chrome. You can choose from dark, light, color, or night modes. Whatever you prefer, there is a mode that suits you. Lightning can provide a lightweight, fast experience by using the WebKit rendering engine built into your Android device. -
38
ESET Endpoint Security
ESET
$38 per user per year 5 RatingsThis EDR solution will help you uncover the hidden potential in your network. This tool uses ESET's multilayered Endpoint Protection Platform to detect and respond to endpoints. All layers send relevant information to ESET Enterprise Inspector which analyzes large amounts of real-time data from endpoints. It can quickly identify and fix any security problem in the network. ESET Enterprise Inspector offers a unique reputation-based detection system that is transparent to security teams. To allow fine-tuning, all rules can be easily edited via XML. You can create new rules to meet the specific needs of your enterprise environment, including SIEM integrations. ESET's endpoint response and detection tool makes it easy to suppress false alarms. You can adjust the sensitivity of detection rules according to different computer groups or users. Combine criteria such as file name/path/hash/command line/signer to fine-tune the trigger conditions. -
39
Aloha Browser
Aloha Mobile LTD
FreeAn optimized rendering engine designed specifically for mobile devices makes browsing faster. Hardware acceleration allows you to browse pages up to 2x faster than other mobile browsers. Tracker protection protects your data from being sent to third parties. No more annoying ads or wasted mobile data. Pages without ads load faster and look cleaner. Enjoy your movies and music with a full-featured media player. Aloha can also play VR content offline and online. The integrated file manager supports downloads and can store your files securely. You can easily lock folders using a passcode or fingerprint. Aloha Browser is packed with features, but it's so simple to use that anyone can use it. You can access an unlimited VPN with military-grade encryption, data compression, and no logs in just one tap. -
40
Humming Heads
Humming Heads
Lock down all authorized actions to prevent attacks and prevent stolen or leaked data from being read. Invisibly, continuously, and without fail. SDS allows you to focus your endpoint security efforts instead of trying to find the latest malware variants or training your users to become security experts. Shinobi Defense System is an innovative portfolio of proven technologies that has been made available in the USA for the first time. SDS protects businesses from the 3 most common and difficult endpoint security issues that cause business losses. DeepWhite, the most powerful whitelist-based protection technology, is combined with Evolution DLP, a seamless, automatic data loss protection solution. This integrated system is powered by our Active Intercept engine and ShinobiForensics reporting platform. Invisibly blocks any stolen or leaked files from being read. No interaction or rules from the end user. -
41
Fidelis Network
Fidelis Security
Advanced threats require deep inspection, extraction and analysis of all content moving across the wire in real time. Fidelis network detection & response bi-directionally scans all protocols and ports to collect rich metadata that can be used for machine-learning and other powerful machine-learning analyses. You can have full visibility and network coverage with direct, internal, web, and email sensors. To help security teams stay ahead of the curve, identified attacker TTPs are mapped against MITRE ATT&CK™. Threats can hide, but they can't run. To map your cyber terrain, automatically profile and classify IT assets. This includes legacy systems, enterprise IoT, and shadow IT. Integrating with Fidelis' endpoint response and detection solution, you can create a software asset inventory that is correlated with known vulnerabilities, including CVE and KB Links, as well security hygiene for patches, and endpoint status. -
42
GBS iQ.Suite
GBS
With the increasing use of collaboration tools and meeting platforms such as CISCO and Microsoft, security measures must be taken. New attack vectors and gateways are becoming more common as more channels and complex IT infrastructures become available. Although most organizations are increasing their email security, they often overlook protection against malicious files that may be accessed via messenger or SharePoint. Security capabilities are often inadequate and ineffective. With a centralized cloud solution, both small and large companies can quickly respond to the ever-changing threat landscape. -
43
BigID
BigID
Data visibility and control for security, compliance, privacy, and governance. BigID's platform includes a foundational data discovery platform combining data classification and cataloging for finding personal, sensitive and high value data - plus a modular array of add on apps for solving discrete problems in privacy, security and governance. Automate scans, discovery, classification, workflows, and more on the data you need - and find all PI, PII, sensitive, and critical data across unstructured and structured data, on-prem and in the cloud. BigID uses advanced machine learning and data intelligence to help enterprises better manage and protect their customer & sensitive data, meet data privacy and protection regulations, and leverage unmatched coverage for all data across all data stores. -
44
Forcepoint DLP
Forcepoint
3 RatingsData protection doesn't have to be a hindrance to business productivity. Forcepoint's focus is on unified policies and user risk. This makes data security intuitive and frictionless. The industry's most comprehensive pre-defined policy library allows you to view and control all your data. Ensure regulatory compliance in 80+ countries, including GDPR, CCPA, and more. Boldon James and Azure Information Protection allow data classification. You can replace broad, general rules with personalized, adaptive data security that doesn’t slow down your employees. You can only block actions where you are required, which will increase productivity. Protect PII, PHI, company financials and credit card data. Protect intellectual property (IP), in both structured and unstructured forms. Stop low and slow data theft even when users are not connected to the internet. -
45
Box Shield
Box
$130 per monthShield allows you to classify content in your own way, manually or automatically. We are excited to announce Shield's native capability that automatically classifies files based on your policies and identifies PII. By placing controls near your content, you can prevent leaks immediately and provide an easy-to-use end-user experience. You can quickly set up access policies to protect your data and allow people to do their mission-critical work. Shield uses machine learning to provide timely, accurate alerts about insider threats, account compromises, and malware attacks. You can quickly evaluate alerts in Shield and send them to existing tools for further analysis. Shield can be used with the best-of breed security tools that you already have. For a unified view, alerts that contain more information than ever can be integrated with your SIEM or CASB. -
46
MyDLP
Comodo Group
Monitor, detect and prevent data leakage from your company's network or endpoints. MyDLP from Comodo provides data loss protection for companies. Sign up today! MyDLP (Data Loss Prevention) from Comodo is a solid, all-in-one solution that prevents data loss. To monitor, discover and prevent data leakage from your company network or endpoints, you don't have to purchase multiple products. MyDLP allows you to block data flows containing credit card numbers, social insurance numbers, or any other sensitive information. Customers will feel more comfortable sharing financial and personal information with you. MyDLP offers data security for web and mail, printers, removable devices, and other devices. Your sensitive data will not be exposed through network connections or endpoint device. MyDLP can be trained with your private data files once. MyDLP will keep them safe forever. They will not be accessible to anyone outside your network. -
47
The most powerful way to monitor and protect sensitive data at large scale. The all-in-one data security solution that doesn't slow down will help you reduce risk and detect abnormal behavior. You get a platform, a team, an approach, and a plan that gives you every advantage. Classification, access governance, and behavioral analytics all work together to secure data, prevent threats, and ease the burden of compliance. Our proven method to monitor, protect and manage your data is backed by thousands of successful rollouts. Hundreds of security professionals are able to create advanced threat models, update policies, and assist in incidents, allowing you to concentrate on other priorities.
-
48
Google Cloud Data Loss Prevention (a fully managed service) is designed to help you find, classify, protect, and manage your most sensitive data. Get visibility into the data that you store and process Create dashboards and audit records. Automate remediation, tagging, and policy-making based on findings. Connect DLP results to Security Command Center, Data Catalog or export to your SIEM or governance tool. Easy configuration data inspection and monitoring You can schedule inspection jobs in the console UI, or stream data into our API, to inspect or protect workloads on Google Cloud or on-premises mobile applications or other cloud service providers. Reduce risk and unlock more data for you business: Protecting sensitive data such as personally identifiable information (PII) is crucial for your business. Implement de-identification during data migrations, data workloads, real-time data collection, and processing.
-
49
Data Rover
Data Rover
Data Rover is an Advanced User Data and Security Management for any Data-Driven Organisation. A single solution for Infrastructure and Security managers that allows data users to explore, manage, process, and protect their data effectively and efficiently, by simultaneously addressing the two primary needs related to the use of data: Cyber Security and Data Management. Data Rover plays a key role in business asset protection and corporate data management policy definition. The software is designed for companies that need to ensure compliance with personal data protection regulations and provides detailed analysis of data access permissions. User Access Rights & Auditing Provides invaluable information about access privileges to files and folders. It allows you to analyse the effective permissions of the users, i.e. the real ones. It identifies not only who can access data, but also who did exactly what, when, and from where. Data Housekeeping Helps you identify and distinguish valuable assets from junk information that becomes unnecessary ballast and an unjustified cost to the company. Data Exchange Provides the company with an advanced data exchange and tracking system exclusively designed for the business. -
50
Digital Guardian
Fortra
No-compromise data protection gives you the freedom to adapt to your requirements. Digital Guardian is the only DLP solution that can support both a case-based approach (known user groups or data types) and a data risk discovery approach. This allows for the identification of unknown use cases. Our risk discovery approach allows you to gain visibility by showing where sensitive data is located, how it flows within the organization, and where it may be at risk. This is without policies. Digital Guardian is powered by AWS and offers simplified deployment, low overhead, elastic scalability, and increased return on security investment. All your browser-based and native applications are covered, including Windows, macOS, and Linux operating systems. The "unknown risk" approach allows you to see sensitive data, its flow, and where it is at risk. This is all without the need for policies. Only Digital Guardian can provide content, user, context-based data classification and discovery.