Best Tausight Alternatives in 2024
Find the top alternatives to Tausight currently available. Compare ratings, reviews, pricing, and features of Tausight alternatives in 2024. Slashdot lists the best Tausight alternatives on the market that offer competing products that are similar to Tausight. Sort through Tausight alternatives below to make the best choice for your needs
-
1
Satori
Satori
86 RatingsSatori is a Data Security Platform (DSP) that enables self-service data and analytics for data-driven companies. With Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. That means your data consumers get data access in seconds instead of weeks. Satori’s DSP dynamically applies the appropriate security and access policies, reducing manual data engineering work. Satori’s DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously classifies sensitive data in all your data stores (databases, data lakes, and data warehouses), and dynamically tracks data usage while applying relevant security policies. Satori enables your data use to scale across the company while meeting all data security and compliance requirements. -
2
MANTA
Manta
Manta is a unified data lineage platform that serves as the central hub of all enterprise data flows. Manta can construct lineage from report definitions, custom SQL code, and ETL workflows. Lineage is analyzed based on actual code, and both direct and indirect flows can be visualized on the map. Data paths between files, report fields, database tables, and individual columns are displayed to users in an intuitive user interface, enabling teams to understand data flows in context. -
3
Technology is essential for business. Without it, technology can't be trusted. Today's "work from anywhere" era means that managing and controlling access to every digital identity is crucial for the protection of your business as well as the data it runs on. Only SailPoint Identity security can help you empower your business and manage cyber risk from the explosion in technology access in the cloud enterprise. This will ensure that every worker has the right access to their job, no more, no lesser. Unmatched visibility and intelligence is achieved while automating and speeding the management of all user identities and entitlements. With AI-enhanced visibility, you can automate, manage, and govern access in real time. Allow business to operate in a cloud-critical and threat-intensive environment with speed, security, and scale.
-
4
SecurEnds
SecurEnds
SecurEnds cloud software allows the world's most innovative companies to automate: User access reviews, Access certifications, entitlement audits, access requests, and identity analytics. Use the SecurEnds connectors and files to load employee data from a Human Resources Management System (e.g. ADP, Workday. Ultipro. Paycom). To pull identities across enterprise applications (e.g. Active Directory, Salesforce. Oracle, and databases (e.g. SQL Server, MySQL and PostreSQL) and cloud applications (e.g. AWS, Azure and Jira), you can use flex connectors and built-in connectors. As often as necessary, you can perform user access reviews by role and attribute. To track any changes since last campaign, application owners can use delta campaigns. To perform access updates, application owners can send remediation tickets directly. Auditors have the ability to access dashboards and remediations. -
5
Immuta
Immuta
Immuta's Data Access Platform is built to give data teams secure yet streamlined access to data. Every organization is grappling with complex data policies as rules and regulations around that data are ever-changing and increasing in number. Immuta empowers data teams by automating the discovery and classification of new and existing data to speed time to value; orchestrating the enforcement of data policies through Policy-as-code (PaC), data masking, and Privacy Enhancing Technologies (PETs) so that any technical or business owner can manage and keep it secure; and monitoring/auditing user and policy activity/history and how data is accessed through automation to ensure provable compliance. Immuta integrates with all of the leading cloud data platforms, including Snowflake, Databricks, Starburst, Trino, Amazon Redshift, Google BigQuery, and Azure Synapse. Our platform is able to transparently secure data access without impacting performance. With Immuta, data teams are able to speed up data access by 100x, decrease the number of policies required by 75x, and achieve provable compliance goals. -
6
Systnaps
Systnaps
Data security regulations are constantly changing. It is important to have an agile and responsive IS to meet complex requirements. Classify and categorize regulatory information. Identify your data and manage retention periods. Respond quickly to data subjects' requests. All of your master processes can be managed through one application. Management of retention periods. Compliance with regulations for an Information System (retention periods). Calculate the data vulnerability level by classifying and modeling your service-oriented objects. To inventory your IS assets, model your service-oriented objects. -
7
Ohalo
Ohalo
-Ohalo's Data X-Ray platform automates data governance tasks like discovering, mapping, and redacting files containing sensitive, and personal information. Our customers rely on it for file activity monitoring, security enhancement, and privacy compliance. Data X-Ray connects seamlessly to all data sources, on-premises or in the cloud, enabling a comprehensive understanding of files across all storage locations. Moreover, Ohalo possesses the flexibility to develop custom connectors for individual data sources, whether they are bespoke or legacy, upon request. End-To-End Document Management Software. Data X-Ray uses machine learning and natural language processing to uncover unknown or forgotten data, ensuring compliance with privacy and security regulations. It helps eliminate unnecessary records, reducing storage costs. Get Data X-Ray: One Platform, Universal Insight. -
8
Symantec Data Loss Prevention
Broadcom
DLP gives you full visibility and control over all your information, wherever it travels. It also prevents insiders and hackers from stealing sensitive data like customer records or product designs. Monitors policy violations and risky user behavior at all times. Real-time blocking, quarantining, and alerts deter end users from leaking data. Automated incident remediation workflows allow you to quickly and efficiently respond to critical data loss with one-click SmartResponses. You can adjust policies to ensure security and productivity. It allows you to see and control data at rest and in use in cloud applications, which can help you uncover Shadow Data. Use your existing DLP policies to extend fine-tuned business logic to cloud control points like Office 365, G Suite Box, Box, Dropbox, Box, and many more. -
9
Zaloni Arena
Zaloni
End-to-end DataOps built upon an agile platform that protects and improves your data assets. Arena is the leading augmented data management platform. Our active data catalog allows for self-service data enrichment to control complex data environments. You can create custom workflows to increase the reliability and accuracy of each data set. Machine-learning can be used to identify and align master assets for better data decisions. Superior security is assured with complete lineage, including detailed visualizations and masking. Data management is easy with Arena. Arena can catalog your data from any location. Our extensible connections allow for analytics across all your preferred tools. Overcome data sprawl challenges with our software. Our software is designed to drive business and analytics success, while also providing the controls and extensibility required in today's multicloud data complexity. -
10
Privacera
Privacera
Multi-cloud data security with a single pane of glass Industry's first SaaS access governance solution. Cloud is fragmented and data is scattered across different systems. Sensitive data is difficult to access and control due to limited visibility. Complex data onboarding hinders data scientist productivity. Data governance across services can be manual and fragmented. It can be time-consuming to securely move data to the cloud. Maximize visibility and assess the risk of sensitive data distributed across multiple cloud service providers. One system that enables you to manage multiple cloud services' data policies in a single place. Support RTBF, GDPR and other compliance requests across multiple cloud service providers. Securely move data to the cloud and enable Apache Ranger compliance policies. It is easier and quicker to transform sensitive data across multiple cloud databases and analytical platforms using one integrated system. -
11
PHEMI Health DataLab
PHEMI Systems
Unlike most data management systems, PHEMI Health DataLab is built with Privacy-by-Design principles, not as an add-on. This means privacy and data governance are built-in from the ground up, providing you with distinct advantages: Lets analysts work with data without breaching privacy guidelines Includes a comprehensive, extensible library of de-identification algorithms to hide, mask, truncate, group, and anonymize data. Creates dataset-specific or system-wide pseudonyms enabling linking and sharing of data without risking data leakage. Collects audit logs concerning not only what changes were made to the PHEMI system, but also data access patterns. Automatically generates human and machine-readable de- identification reports to meet your enterprise governance risk and compliance guidelines. Rather than a policy per data access point, PHEMI gives you the advantage of one central policy for all access patterns, whether Spark, ODBC, REST, export, and more -
12
LightBeam.ai
LightBeam.ai
Find out in minutes if you have sensitive data hidden in places that you didn't expect (Screenshots and logs, messages, tickets, tables, messages). LightBeam's executive or delta reports can be generated with just one click to gain valuable insight into your sensitive data. Automate DSRs by leveraging LightBeam’s unique PII/PHI charts, which are comprehensively created based on your data infrastructure. By giving your users control over the data they collect, you can build trust with them. Monitor how sensitive data are collected, shared and maintained within your organization. -
13
Ecosteer
Ecosteer
Individuals and companies have the option to use decentralized digital technologies to manage data flows and usage. This is based on individual freedom and self-determination. These technologies will allow individuals and companies to have dynamic data portability in real time, as well as various compensation models. Modern capitalism was born in the XIVth century when private property rights over production means were established. Today, data ownership rights will be the foundations for a distributed and decentralized new data economy. Ecosteer Patented data ownership platform technically implements the EU GDPR legal principle of Data Ownership. This gives data owners the ability control third-party access to their data and to receive compensation for data sharing. Ecosteer Data Ownership Platform, which uses end-to-end encryption with blockchain smart contracts, decentralizes data access control and gives it back to the rightful owners. -
14
K2View believes that every enterprise should be able to leverage its data to become as disruptive and agile as possible. We enable this through our Data Product Platform, which creates and manages a trusted dataset for every business entity – on demand, in real time. The dataset is always in sync with its sources, adapts to changes on the fly, and is instantly accessible to any authorized data consumer. We fuel operational use cases, including customer 360, data masking, test data management, data migration, and legacy application modernization – to deliver business outcomes at half the time and cost of other alternatives.
-
15
InCountry
InCountry
Transform your applications to ensure local compliance and security. While still using the cloud, map your controls and improve compliance programs. Your custom apps can be made to comply with data residency requirements without any additional development. You can enter new markets and increase revenue without affecting your customers' experience. InCountry ensures that your financial services applications are compliant with data regulations in more nations, so you can get the most out of them. A modern data compliance platform will help you protect your path to precision medicine. InCountry offers healthcare-focused solutions that can accelerate research and time to discovery. You can enter new markets and increase revenue without affecting your customer experience. InCountry ensures that your sales process is compliant with local data regulations. -
16
Protegrity
Protegrity
Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods. -
17
Oasis Parcel
Oasis Labs
With the latest data security and governance technology, you can build a more trusted product. The privacy-first SDK for data governance is designed to allow you to use your most sensitive data while keeping it private and secure. Parcel SDK includes a built-in dispatcher that makes it easy to create an isolated environment for privacy-preserving computation. Data can be kept confidential and protected throughout its lifecycle thanks to the use of cutting-edge secure-enclave technology. The Parcel SDK is compatible with a wide range of technologies and services, including web apps and infrastructure stacks. The Parcel SDK supports Typescript so it can be easily integrated into your development flow. There are no complicated languages or complicated systems to learn. Parcel is powered by a decentralized ledger and provides an immutable record for all actions, so you can be sure your data is being used responsibly. -
18
Skyflow
Skyflow
Skyflow allows you to run workflows, logic, and analytics on encrypted data. Skyflow uses multiple encryption and tokenization methods to ensure maximum security. With auditable logs, provenance, and data residency, you can manage access to your data and policy enforcement. Compliance is possible in minutes, not weeks. It's easy with our trusted infrastructure and simple REST or SQL APIs. Tokenization is required for compliance. An encrypted data store allows you to search, analyze, and make use of secure data. Skyflow can be run in any virtual private cloud you prefer. It can be used as a secure gateway, zero trust storage, and many other purposes. Replace a difficult-to-maintain patchwork of point solutions with a single cost-effective data vault. You can use your sensitive data in any application or workflow without ever having to decrypt it. -
19
ALTR
ALTR
$10 per user per monthSnowflake makes it easy to manage sensitive data quickly and easily. This will allow you to get more value in less time than waiting months. ALTR allows you to automatically classify sensitive data by checking a box on import. You can add controls such as data masking using a drop-down menu. From a single screen, you can set alerts and limits for data access by user, amount and IP address. There are no extra costs or hassles on the prem, no proxies that can be broken with platform changes, and no managed services disguised under SaaS. ALTR was created in the cloud and integrates seamlessly with platforms such as Snowflake. ALTR's complete control over data allows you to visualize data usage, detect anomalies, alert on them, block threats, and tokenize important data. All your data is protected. ALTR is cloud-based so there's no upfront cost. You can start ALTR for free and then upgrade as necessary. -
20
Truedat
Bluetab Solutions
Bluetab Solutions developed Truedat, an open-source data governance business solution tool. It was created to help our clients become data-driven businesses. We assist in defining business processes, roles and responsibilities. We can also help you put these processes into action. Integration and customization of truedat’s open-source components to support data governance processes. We guarantee the maintenance and support of the solution modules we have installed. Based on our extensive experience, we have created a solution that addresses the need for Data Governance. This allows you to manage complex and changing data architectures. Truedat is becoming more important due to the increasing migration of enterprise IT platforms into cloud, multi-cloud, hybrid architectures. This increases the complexity, sources, and types of data. Our Data Governance consulting and development experience spans more than 8 years. -
21
Enterprise File Fabric
Storage Made Easy
$5 per user per monthEnterprise File Fabric™, a private, secure, policy driven multi-cloud content and collaboration platform, provides an efficient, secure, and private solution for storing, sharing, and collaborating with other users. It doesn't ship with storage. It works with any company's existing storage portfolio, on-cloud or off-premises. Enterprise File Fabric™, unifies, secures, and makes all types of storage (including object storage), easily accessible for end-users. The Enterprise File Fabric for Compliance is available in three product variations: 1. It enforces GDPR/CCPA/ HIPAA by providing intelligent policy-based enforcement across all corporate data. 2. The Enterprise File Fabric for Media and Entertainment provides a unified view to media assets that can both be distributed on-cloud and on premises. -
22
erwin Data Governance
erwin
When you have the right tools, data can be transformative. erwin by Quest, a leader in enterprise modelling and data intelligence software, empowers IT, data governance groups and business users with the capability to deliver meaningful insights, drive innovation and manage risks, and drive business transformation. erwin by Quest is a leading company that helps to improve enterprise data governance. IT is constantly changing. The next challenge, the next threat, and the next technology are all around the corner. Your challenges never end. We don't either. We can help you build true IT resilience for your data and infrastructure, from platform migrations to cloud deployments to governance to security and governance. We have been providing software solutions for the ever-changing world of enterprise IT since 1987. Quest solutions safeguard and empower users and data, simplify IT operations, and strengthen cybersecurity from the inside. -
23
Tricent
Tricent
€18/year/ user Tricent is the #1 file-sharing governance SaaS platform that enables more secure and compliant file sharing within Microsoft 365 (Teams, OneDrives & Sharepoint drives) and Google Workspace (MyDrives & Shared Drives) so you can keep collaborating responsibly. Tricent puts the responsibility of proper file-sharing management in the hands of administrators as well as every member of the organization who shares files: 🚀 Onboard in less than 30 Minutes. ricent gets you up and running swiftly so you can focus on what matters most. 🔍 Get Insights: From day one, gain a comprehensive overview of all files shared and permissions granted—across both personal drives and shared drives. ⭕️ Do Bulk Remediation: Our admin-friendly cleanup tools allow you to tackle file sprawl efficiently. 😇 Empowering End-Users Responsibly: We use automation to involve your employees in the cleanup process. They can continue collaborating while maintaining compliance. 💪🏼 Customizable Governance Policies: Set different cycles for different user groups. Tricent adapts to your unique needs, ensuring flexibility without compromising control. 🔮 Stay Ahead with Abnormality Detection. -
24
Splashback
Splashback
Spreadsheets, spreadsheets, internal databases and PDFs are the last ten years of technology. Splashback, a cloud-first data solution, gives you an edge in a rapidly changing environment. Splashback is trusted by the industry and helps you avoid data disasters. Splashback is a data democratization platform that helps bridge the gap between data-driven people. This opens up the possibility for informed, positive change by allowing people to both access and understand data. Splashback, a cloud-based data platform that is managed and highly secure, integrates a suite easy-to-use management, storage, and analysis tools. Splashback offers businesses the tech-friendly and user-friendly data solution they have been searching for. It has functional data sharing capabilities as well as integrations using open APIs. It allows managers to share data between internal and external teams via a single interface. -
25
Kyrah
Kyrah
Kyrah allows enterprise data management across your cloud estate, data exploration and storage assets grouping. It also enforces security policies and permits management. With its fully automated and configurable change request mechanism, all changes are transparent, secure, and GDPR-compliant. It also provides full suitability of all events via activity log. It combines seamless self-service data provisioning and shopping cart style checkout. It is a single pane for all your enterprise data estate. It allows for faster time to market by unifying people and processes, and data provisioning in one platform and user interface. It provides a single window for organizations to view their data landscape, including data use heatmaps and data sensitivity. It allows organizations to enforce data compliance and avoid potential fines. -
26
DEMS
Global Data Excellence
75000/per domain/ per year An end-to-end system govern-by-value Data Excellence Management System(c), (DEMS), is a web-based multilingual solution (on-premises or cloud) that uses context intelligence based on semantics and artificial intelligence techniques to allow organisations to automate data governance and business excellence. It also helps to reduce operational costs by reducing operational costs. DEMS facilitates a factual, value-driven collaboration that engages all levels of end-users in the ultimate value creation. It helps organisations manage their data policies and comply with evolving regulations such as FINMA or GDPR. DEMS is a measure of the maturity of your organization's functions and resources. It establishes accountability throughout the organisational structure. It also links data assets to value flows to predicatively guide business strategies. -
27
SOLIXCloud
Solix Technologies
While data volume is increasing, not all data is equal in value. Cloud data management allows forward-thinking companies to reduce the cost of managing their enterprise data while still ensuring compliance, security, and easy access. While content loses value over time, organizations can still monetize less current data using modern SaaS-based solutions. SOLIXCloud offers all the capabilities necessary to strike the perfect balance between historical data management and current data management. SOLIXCloud provides a fully managed service that manages all enterprise data. It offers compliance features for structured, unstructured and semi-structured data. Solix metadata management provides an end-to-end solution to search all enterprise metadata and lineage using a centralized repository. -
28
Rational Governance
Rational Enterprise
Rational Governance is an enterprise platform that powers industry-based solutions for the management, identification, classification, and management data. Its core technologies include: Lightweight software that is deployed against critical unstructured data sources within an organization (e.g., files, mail systems, file share systems, document management systems, etc.). This creates a single index of all content in these stores. A central server that allows for central search and in-place administration. It also controls all indexed content. Advanced analytical tools, such as advanced machine-learning algorithms, that allow automated content classification and big-data analytics. Our analytical tools allow data management on a project- or policy-basis. Management is the ability to create, delete, copy, move or alert to any piece of content in an enterprise. It can also be done from a central location. -
29
StealthAUDIT
Netwrix
$10.00/one-time/ user StealthAUDIT automates the collection, analysis, and reporting of data that you need to answer the most difficult questions in the management and security dozens of critical IT assets. This includes directories and systems. No matter how large or small the organization, they all need tools to manage and protect the technology resources that support their business. But no organization can afford to operate, maintain, or efficiently manage separate products for each technology they use. They need solutions that can be customized to meet their specific requirements and provide the flexibility to offer a common set capabilities across multiple platforms in their IT ecosystem. -
30
DvSum, an AI-powered Data Intelligence platform, makes it remarkably easy for data and analytics teams discover, monitor, and govern data. DvSum uses powerful AI-enabled algorithms to automatically catalog, classify, and curate your data and make it available as a Data Catalog. DvSum Data Intelligence will help you propel your enterprise towards its digital- and analytics-enabled transformation goals.
-
31
Index Engines
Index Engines
It is costly to pay for legacy backup catalog maintenance. It is a complex and time-consuming process to get data off legacy tape. It can be a governance nightmare to ignore backup data archives. Index Engines empowers organizations with patented direct indexing technology that doesn't require the original backup software. This allows them to make better decisions about legacy backup data. This non-invasive scan of backup files on tape or disc allows for intelligence to be gathered about the contents, such as file types, dates, users, etc. The extraction allows for the collection of specific content, as well as ad-hoc requests and a complete compliance-driven migrating. -
32
Datastreams
Datastreams.io
The Datastreams Platform, our state-of the-art solution to simplify data sharing within and between organizations, is the Datastreams Platform. Our Platform facilitates the journey from the initial step of collecting data to obtaining a trusted personalized view. Data collaboration is now possible with our optimized streaming technology. It's fast and simple, secured by our privacy-by-design principles, and easy to use because of its data capturing capabilities. The Platform is built on a core Data Operations Unit (Datastreams Operator), which can be extended with modules to meet specific data and business needs, such as data quality checks on your mobile platforms or segmenting specific target groups in a compliant manner. It takes only a few days to get data collaborating and connections to data sources. -
33
Commvault Data Governance
Commvault
Identify sensitive data risks, facilitate collaborative decision-making remediations and support regulatory compliance (including GDPR and CCPA), all tailored for your business and managed through a single pane. Protect sensitive data from leakage by quickly identifying, finding, managing, protecting, and securing files that contain sensitive data, both live and backup. Prioritize the most critical vulnerabilities and classify sensitive data according to your organization's priorities. Automate the identification of sensitive data by customizing and automating it using machine learning. This is done based on a collection of similar documents. Shared decision-making among IT, security personnel and data owners within the business will help to efficiently address sensitive data risk. Personal data footprints from backup and live data sources can be minimized. By deleting from backups, you can prevent sensitive data previously remedied from being accidentally restored. -
34
Data Sandbox
Data Republic
No matter how well-designed your internal systems may be, there are many benefits to utilizing outside expertise. The Data Sandbox allows outside experts to work with your data without compromising security. You can crowdsource innovation and benefit from cognitive diversity by partnering with the best data analysts and AI developers around the world. Collaboration with startups, scaleups, and big tech innovators can be accelerated. The Data Sandbox allows you to securely assess the potential value of these technology vendors’ apps, AI, and ML algorithms using real data. Before deploying to production environments, test and evaluate multiple vendors simultaneously. When working with real data, university researchers can be of immense benefit. Research partnerships can be formed with prestigious institutions that are fueled by your data. Data Sandbox removes all concerns about data security so that research and development can be done quickly and seamlessly. -
35
Expanso
Expanso
Expanso executes jobs right where your data is located, minimizing data transmission and utilizing local computing. We reduce your reliance on latency by using a peer-topeer network of nodes. This also enhances your data governance capabilities. You can adjust your data flows at a very fine level. Expanso’s container orchestration uses a peer to peer network, enabling the deployment of distributed applications. This network ensures redundancy and fault-tolerance in your deployments. The distributed approach reduces the risk of a single point of failure, resulting in a more reliable deployment. Expanso allows on-device computing which leads to significant cost savings. Data transfer and cloud infrastructure costs can be significantly reduced by running computations directly on edge device. This reduces the number of instances when data leaves your premises and minimizes regulatory events. -
36
OvalEdge, a cost-effective data catalogue, is designed to provide end-to-end data governance and privacy compliance. It also provides fast, reliable analytics. OvalEdge crawls the databases, BI platforms and data lakes of your organization to create an easy-to use, smart inventory. Analysts can quickly discover data and provide powerful insights using OvalEdge. OvalEdge's extensive functionality allows users to improve data access, data literacy and data quality.
-
37
DryvIQ
DryvIQ
To gauge risk, mitigate threats, and enable better business decisions, gain deep and robust insight into unstructured enterprise data. Unstructured data can be classified, labeled and organized at an enterprise level. You can quickly identify sensitive and high-risk files quickly and accurately. A.I. provides deep insight. Continuous visibility across all unstructured and new data. Without relying on manual input from users, enforce policy, compliance and governance decisions. Easily expose dark data and automatically classify and organize sensitive and other content groups at large. This allows you to make intelligent decisions about where and how to move that data. The platform allows file transfers of simple and complex files across any cloud service, network file system, or legacy ECM platform. -
38
Polymer
Polymer Solutions
$4/month/ user Polymer DLP secures your SaaS apps by preventing sensitive information like business-critical data or PII from being sent to the wrong people. We used machine learning and natural language processing to automatically detect and remediate files and messages in real time. In addition we provide training at the time of infraction, which is proven to help prevent future incidents before they happen. Try for free and set up your custom policy in minutes. Polymer is constantly expanding, currently we integrate with Slack, Google Drive, Microsoft Teams, One Drive, Bitbucket, Github and Box. -
39
ActiveNav
ActiveNav
Identify sensitive data, optimize storage, comply with privacy regulations. A hybrid-cloud platform allows you to quickly find and map data across multiple data repositories. ActiveNav's Inventory gives you the insight you need to support all of your data initiatives. You can visualize and isolate data at scale to make informed content decisions and manage risky, stale data. Our platform solves the most difficult problems in mapping and discovering unstructured data. This will allow you to extract value from your data like never again. Your organization may have sensitive, personal data stored everywhere: on-premises and in the cloud, as well as on file shares, servers and other repositories. The platform is unique in its ability to map unstructured data repositories, enabling risk mitigation as well as compliance with evolving privacy laws. -
40
Zeenea Data Catalog
Zeenea
Our cloud-based Data Catalog provides a new-generation workspace for data teams to discover, understand, and collaborate on data assets and their usages. Create a reliable and understandable enterprise-level data asset landscape to empower your data teams. It is easy to set up. It is easy to use. Perfect for scaling. You can easily organize and share data knowledge and usages among your team members and beyond. Connect Zeenea with your sources to get all the data insights you need in real-time. Your data teams will be more productive if they are able to simplify and reduce the time spent searching for enterprise resources. In just a few clicks, you can create a library of all your enterprise-level data assets and usages. Improve any data discovery path. So that your data teams can concentrate on what's most important: delivering their data projects on schedule. -
41
EnGlobe
Corporatek
EnGlobe provides a comprehensive, unified, and truly global solution for Corporate Entity Management (Corporate Governance) and Corporate Governance. It is a pure web RIA (Rich Internet Application), which formally parametrizes all legal entities, sets-out logically all known securities, and includes and self-fills any applicable regulatory forms and efilings. It also governs all management bodies and meetings, tracks all intellectual property and tracking tools, automates all document automation and management systems, and addresses all security, audits, and reports to the most stringent corporate governance and compliance requirements. The world's most comprehensive corporate entity management system, it is a highly-structured and executed software environment. It provides a unique business asset and intellectual property management system as well as a contract and agreements management system with superlative power and granularity. -
42
ThinkData Works
ThinkData Works
ThinkData Works provides a robust catalog platform for discovering, managing, and sharing data from both internal and external sources. Enrichment solutions combine partner data with your existing datasets to produce uniquely valuable assets that can be shared across your entire organization. The ThinkData Works platform and enrichment solutions make data teams more efficient, improve project outcomes, replace multiple existing tech solutions, and provide you with a competitive advantage. -
43
Castor
Castor
$699 per monthCastor is a data catalogue that can be adopted by all employees. Get a complete overview of your data environment. Our powerful search engine makes it easy to find data quickly. Access data quickly and easily by joining a new data infrastructure. Expand beyond the traditional data catalog. Modern data teams have multiple data sources. Instead of building one truth, they build it. Castor's delightful and automated documentation makes it easy to trust data. In minutes, you can get a column-level view of your cross-system data lineage. To build trust in your data, get a bird's-eye view of your data pipelines. All you need to troubleshoot data issues, conduct impact analyses, and comply with GDPR is one tool. Optimize performance, cost compliance, security, and security for data. Our automated infrastructure monitoring system will keep your data stack healthy. -
44
Select Star
Select Star
$270 per monthIn just 15 minutes, you can set up your automated data catalogue and receive column-level lines, Entity Relationship diagrams, and auto-populated documentation in 24 hours. You can easily tag, find, and add documentation to data so everyone can find the right one for them. Select Star automatically detects your column-level data lineage and displays it. Now you can trust the data by knowing where it came. Select Star automatically displays how your company uses data. This allows you to identify relevant data fields without having to ask anyone else. Select Star ensures that your data is protected with AICPA SOC2 Security, Confidentiality and Availability standards. -
45
Sealit
Sealit Technologies
You shouldn't be concerned about whether your accounts and devices will be compromised when you implement a Zero Trust security system. Sealit will ensure that your sensitive data, including files and emails, remains fully protected in any scenario. To encrypt sensitive emails, you only need to click one time from your existing inbox. You only need one click to encrypt any file on your desktop. As we add strong protection to sensitive data, we ensure that your workflow doesn't get disrupted. Cyberattacks on businesses are almost always caused by human error. You need to put in place a system to reduce the risk. Our patent-pending end to end encryption ensures that every aspect of your business is protected. Our app uses biometrics to provide seamless protection. Biometrics are not like passwords. They can't be taken from you and you always have them with you. -
46
QueryPie
QueryPie
QueryPie allows you to centrally manage multiple data sources and security policies from one place. Your company can be on the fast track for success without having to change the data environment. Data governance is essential in today's data-driven world. You must ensure that you adhere to data governance standards and allow many users accessing growing amounts of important information. You can establish data access policies by adding key attributes like IP address and access time. To secure data analysis and editing, privilege types can be created using SQL commands such as DML, DCL and DDL. You can view logs based upon permissions to see details of SQL events and uncover user behavior and security concerns. All history can be exported to a file for reporting purposes. -
47
Secure and manage all your content across distributed teams, devices and apps. Uncover new business insights, scale compliance and governance, reduce costs, and increase productivity. Right out of the box. Flexible deployment models, robust integration ecosystem, and open APIs to address the business needs of companies in diverse industries and regions, and at different levels of cloud adoption. Egnyte helps thousands of customers take their cloud office strategy into hyper-drive. Transform your approach to content governance, privacy, compliance, and workflow automation with a single, turnkey platform.
-
48
Polar Security
Polar Security
Automate data protection, governance and discovery in your cloud workloads and SaaS apps. You can automatically pinpoint all of your exposed sensitive data within cloud workloads and SaaS apps, allowing you shrink the data attack area. Identify and classify sensitive information such as PII and PHI to prevent sensitive data from being exposed. Real-time insights on how to protect and comply with your cloud data. Enforce data-access policies to achieve least-privileged access, maintain a secure posture, and remain resilient against cyber-threats. -
49
Atlan
Atlan
The modern data workspace. All your data assets, from data tables to reports, will be instantly discoverable. The combination of powerful search algorithms and easy browsing makes it easy to find the right asset. Atlan automatically generates data quality profiles that make it easy to detect bad data. We have you covered, from automatic variable type detection and frequency distribution to missing values or outlier detection. Atlan takes the hassle out of managing and governing your data ecosystem. Atlan's bots analyze SQL query history to automatically construct data lineage. They also auto-detect PII information. This allows you to create dynamic access policies and best-in-class governance. Our Excel-like query builder allows anyone to query multiple data lakes, warehouses, and DBs. Native integrations with tools such as Tableau and Jupyter make data collaboration possible. -
50
Asigra
Asigra
Asigra's unsurpassed reliability, security and manageability in data protection software helps IT teams increase their data recovery trust. Asigra's Enterprise Backup and Disaster Recovery software platform was created for Managed Service Providers, (MSPs), to host and manage their own Backup as Service solution. It is easy to use and can be white-labeled to match your brand. The innovative Hybrid Cloud Backup architecture allows IT teams to seamlessly manage, scale, and deliver data protection services.