Star Rating
Languages Supported
Pricing Options

Data-Centric Security reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Best Data-Centric Security Software

    Data-centric security software secures data itself, rather than the infrastructure or application used to store or access that data. This approach differs from a traditional network (or perimeter-centric) security approach, which focuses instead on protecting where data is accessed or stored such as on servers, networks, applications, and devices. The software can be used to achieve a zero trust security model and secure data in complex IT environments, including cloud environments. Businesses use data-centric security solutions to protect data that moves between locations such as on-premises to cloud storage, between multiple applications, or to third parties.

    Core capabilities for data-centric security software include sensitive data discovery, policy management, access control, encryption, data masking, and monitoring. Additionally, these tools facilitate labeling, tagging, and tracking sensitive data points as well as auditing for security and compliance assurance.

    Certain functionalities of data-centric security tools overlap with those of data governance software, mainly in terms of compliance and policy enforcement. While that is an important capability of data-centric security software, those tools are intended more for data lifecycle management than data security. Sensitive data discovery software offers discovery functionality, which is a subset of the more robust functionality that data-centric security software provides.

    To qualify for inclusion in the Data-Centric Security category, a product must:

    Provide sensitive data discovery functionality
    Support data classification with the tagging and auditing of sensitive information
    Enforce access control policies for sensitive information
    Offer encryption for data at rest and in transit
    Monitor for abnormalities related to information access and user behavior

    Top 5 Data-Centric Security Software

    • Egnyte
    • Netwrix Auditor
    • Sophos SafeGuard Encryption
    • Azure Information Protection
    • StealthAUDIT Management Platform

    Compare Data-Centric Security Software

    G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
    Sort By:
    Results: 45
    View Grid®
    Adv. Filters
    (610)4.3 out of 5
    Optimized for quick response
    Entry Level Price:$10 per employee/month

    Egnyte is one unified SaaS platform to manage, secure, and gain insight into business content in all repositories, devices, and apps. More than 16,000 businesses trust Egnyte to protect business-critical data, make distributed teams more productive, and reduce file-sharing cost and complexity. AI-supported security, data governance and administration capabilities monitor files not just in Egnyte, but wherever they may live—whether that’s SharePoint, OneDrive, Azure, Google Cloud, Amazon S3, or

    (22)4.4 out of 5

    Netwrix Auditor is a visibility platform for user behavior analysis and risk mitigation that enables control over changes, configurations and access in hybrid IT environments to protect data regardless of its location. The platform provides security intelligence to identify security holes, detect anomalies in user behavior and investigate threat patterns in time to prevent real damage. Netwrix Auditor includes applications for Active Directory, Azure AD, Exchange, Office 365, Windows file serve

    (26)3.8 out of 5

    Sophos SafeGuard Encryption provides data protection across multiple platforms and devices allowing you to have secure data without slowing down your workflow.

    Control and help secure email, documents, and sensitive data that you share outside your company. From easy classification to embedded labels and permissions, enhance data protection at all times with Azure Information Protection—no matter where it’s stored or who it's shared with.

    Stealthbits’ StealthAUDIT Management Platform helps organizations collect and analyze the data they need to answer their most difficult questions in the management and security of their critical IT infrastructure, data, and applications. Unlike point-products designed to address only a single need, StealthAUDIT is a true framework. With preconfigured solutions to address your most common requirements, as well as an extensive toolset for you to create solutions of your own, StealthAUDIT remains r

    (5)4.4 out of 5

    FileAudit makes it easy to audit the access and usage of sensitive data across both Windows File Servers and Cloud Storage. - Monitor in real-time all access, and access attempts. - Alert on suspicious file activity, alteration events, and irregular access time. - Execute automated responses to react immediately to potential threats. - Report on file access activity across on-premise storage and the cloud. Agentless, Remote and Non-Intrusive: FileAudit is installed in less than 3 minutes to p

    (2)4.5 out of 5

    DatAdvantage uses machine learning and bi-directional cluster analysis to pinpoint users that have access to files they don’t need to do their job. It’s your single interface for managing permissions and security groups.

    (1)5.0 out of 5

    AristotleInsight was built to collect, analyze and store the enormous amounts of UDAPE data necessary to document exactly what occurs at any given moment now or in the past

    The solution blends enterprise software solutions, hosted solutions, and managed services to streamline the creation, mapping and updating of internal and external controls, thus empowering IT, Security, and Compliance Managers to collect evidence and risk controls once and map across multiple regulations!

    (1)5.0 out of 5

    Data Security platform detects insider threats and cyberattacks by analyzing data, account activity, and user behavior; prevents and limits disaster by locking down sensitive and stale data; and efficiently sustains a secure state with automation.

    (1)5.0 out of 5

    Fasoo Enterprise DRM (Digital Rights Management) is the most advanced and robust file-based security solution, that allows organizations to protect, control and trace sensitive documents which contain intellectual property, trade secrets and personally identifiable information. With the solution, organizations can safely share confidential documents internally and externally, providing their business with a secure environment without any concern about unintended information loss.

    (2)5.0 out of 5

    VPC Service Controls allow users to define a security perimeter around Google Cloud Platform resources such as Cloud Storage buckets, Bigtable instances, and BigQuery datasets to constrain data within a VPC and help mitigate data exfiltration risks. With VPC Service Controls, enterprises can keep their sensitive data private as they take advantage of the fully managed storage and data processing capabilities of Google Cloud Platform.

    ManageEngine DataSecurity Plus continuously monitors Windows file servers and reports on every change or access attempt made to a file or folder stored on those servers.

    0 ratings

    Enabling your organization to comply with cybersecurity regulations and strengthen IBM i security by controlling access to systems and data, enforcing data privacy, monitoring for compliance, and assessing risks.

    Axiomatics Policy Server is a software for enterprise-wide externalized dynamic authorization, delivered with Attribute Based Access Control (ABAC).

    0 ratings

    BigID is a modern data intelligence platform that redefines data privacy and protection: helping organizations know their data for privacy, protection and perspective. Founded in 2016, BigID has reached almost 150 million in funding with the latest round from earlier this year - they're one of the 2019 world economic forum's tech pioneers, Business Insider's top 14 AI Startups to know, and were awarded Best Privacy Solution by Info Security Global Excellence Awards 2020. BigID's leading disc

    0 ratings

    CA Auditor is a comprehensive software package that can perform an automated technical review of the system, hardware and software environment and identify integrity exposures

    0 ratings

    Cyberhaven’s ability to analyze data’s behavior — an approach it calls Data Behavior Analytics — provides complete visibility into the behavior and movement of trade secrets (including Intellectual Property and client data), as it travels across cloud and on-premise environments.

    0 ratings

    Data Classification Engine gives context around sensitive data, so that you can easily identify and lock down overexposed data, stale data, and remediate security vulnerabilities.

    0 ratings

    Dataguise is designed to detect and protect sensitive data in real time across all repositories so enterprises can safely maximize the value of all their information assets.

    0 ratings

    DATA ROVER EP can easily tell you the Exact and Real Effective Permissions applied to a file or a folder.

    0 ratings

    Control storage resources and secure corporate file assets. Think of us as the camera in the office supply room.

    0 ratings

    Dtex is a cyber security solution provider.

    0 ratings

    Enterprise Recon is the complete solution for the identification, remediation and monitoring of sensitive personal data across your entire network.

    0 ratings

    Enforce granular, least-privilege policies, expose risks & stop threats at cloud speed. AWS, Azure and Google Cloud. Detect. Analyze. Enforce. Accelerate. Services: Prevent threats, Flag suspicious access, DevOps velocity, Comply with standards.

    Fasoo Enterprise DRM (Digital Rights Management) is the most advanced and robust file-based security solution, that allows organizations to protect, control and trace sensitive documents which contain intellectual property, trade secrets and personally identifiable information. With the solution, organizations can safely share confidential documents internally and externally, providing their business with a secure environment without concern about unintended information loss.

    0 ratings

    SearchInform FileAuditor is a DCAP solution (data-centric audit and protection) for an automated audit of information storage, search for access violations and tracking changes made to critical data. FileAuditor solves the following tasks: Classification of vulnerable data Finds files in a document flow that contain critical information, and assigns a certain type to each file: personal data, trade secret, credit card numbers, etc. Critical documents archiving Makes shadow copies of critical

    0 ratings

    HOPZERO's revolutionary approach precludes risk by limiting the movement of packets.

    0 ratings

    Hidden risks expose your data. Imperva Discovery and Assessment discovers unknown databases, classifies sensitive data and detects database vulnerabilities.

    0 ratings

    Kogni is a global leader in the data and privacy security market. Kogni continuously discovers, classifies and protects sensitive data across organizations, regardless of source or location of data. Kogni's use of advanced AI & machine learning capabilities mitigates the possibility of data breaches with near-perfect detection capabilities for even the most uncommon data sources and data formats. Kogni is cloud-agnostic and can identify sensitive in your already existing cloud workload deplo

    Select Grid® View
    Select Company Size
    G2 Grid® for Data-Centric Security
    Filter Grid®
    Filter Grid®
    Select Grid® View
    Select Company Size
    Check out the G2 Grid® for the top Data-Centric Security Software products. G2 scores products and sellers based on reviews gathered from our user community, as well as data aggregated from online sources and social networks. Together, these scores are mapped on our proprietary G2 Grid®, which you can use to compare products, streamline the buying process, and quickly identify the best products based on the experiences of your peers.
    High Performers
    Sophos SafeGuard Encryption
    Netwrix Auditor
    StealthAUDIT Management Platform
    Azure Information Protection
    Market Presence