Best Data-Centric Security Software

Data-centric security software is used to optimize the security of data itself, rather than the infrastructure or applications used to store or retrieve it. Data-centric security software places an emphasis on proper governance and access management to protect sensitive information. The core capabilities for data-centric security software include data discovery, policy management, access control, and monitoring. These tools help businesses by facilitating labeling, tagging, and tracking sensitive data points as well as auditing for security and compliance assurance.

Certain functionalities of data-centric security tools overlap with the capabilities of data governance software, mainly in terms of compliance and policy enforcement. While that is an important capability of data-centric security software, those tools are intended more for data lifecycle management than data security.

To qualify for inclusion in the Data-Centric Security category, a product must:

  • Provide sensitive data discovery functionality
  • Support the tagging and auditing of sensitive information
  • Enforce access control policies for sensitive information
  • Monitor for abnormalities related to information access and user behavior
G2 Grid® for Data-Centric Security
Leaders
High Performers
Contenders
Niche
Market Presence
Satisfaction
content
Star Rating

Data-Centric Security reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Compare Data-Centric Security Software

Results: 33
G2 takes pride in showing unbiased ratings on user satisfaction. G2 does not allow for paid placement in any of our ratings.
Results: 33
Filter Results
Filter by:
Sort by
Star Rating
Sort By:

    The IBM Security Guardium portfolio empowers organizations to meet critical data protection needs by delivering complete visibility, actionable insights, real-time controls, and automated compliance throughout the data protection journey. With IBM Guardium your organization can achieve smarter data protection by leveraging discovery & classification, vulnerability & risk assessments, real-time monitoring & alerting, encryption, and advanced analytics.

    Aptible is building trust on the internet by empowering organizations to make information security a core competency. Our products provide companies with straightforward, plain English guidance on how to write relevant policies and automate the procedures required to implement those policies as well as pass information-security audits. The Aptible platform also offers companies a hosting platform that provides the security controls companies need so they can stay focused on their development goals. With Aptible, companies can ensure they are always audit-ready and continuously communicate trust to customers, auditors, and regulators. Gridiron For companies who need to ensure information security, Aptible Gridiron is the only Security Management platform enabling them to earn and keep customer trust by helping them design, operate and audit their ISMS, making them audit-ready and secure in a fraction of the time. Enclave For companies that need to protect customer data without sacrificing speed of software development, Aptible Enclave is the most developer-friendly deployment platform for software teams to deploy secure, audit-ready apps.

    Get visibility and control over shadow IT with CloudSOC Audit Cloud Access Security Broker (CASB)

    Sophos SafeGuard Encryption provides data protection across multiple platforms and devices allowing you to have secure data without slowing down your workflow.

    Netwrix Auditor is a visibility platform for user behavior analysis and risk mitigation that enables control over changes, configurations and access in hybrid IT environments to protect data regardless of its location. The platform provides security intelligence to identify security holes, detect anomalies in user behavior and investigate threat patterns in time to prevent real damage. Netwrix Auditor includes applications for Active Directory, Azure AD, Exchange, Office 365, Windows file servers, EMC storage devices, NetApp filer appliances, SharePoint, Oracle Database, SQL Server, VMware, Windows Server and network devices. Empowered with a RESTful API and user activity video recording, the platform delivers visibility and control across all of your on-premises and cloud-based IT systems in a unified way.

    STEALTHbits’ StealthAUDIT Management Platform helps organizations collect and analyze the data they need to answer their most difficult questions in the management and security of their critical IT infrastructure, data, and applications. Unlike point-products designed to address only a single need, StealthAUDIT is a true framework. With preconfigured solutions to address your most common requirements, as well as an extensive toolset for you to create solutions of your own, StealthAUDIT remains relevant even when your requirements change. Strict audit regulations like PCI DSS, HIPAA, SOX, and others, require organizations to know who has access to certain types of data, what they’re doing with it, and how users were granted that access. Couple that with the threat of insider theft and data loss, and risky conditions like Open Access in the File System and SharePoint, and today’s IT administrators need help! KEY FEATURES & BENEFITS - Preconfigured Solution Sets – StealthAUDIT contains out-of-the-box, ready to run Solution Sets aligning to Data Access Governance for Unstructured and Structured Data, Active Directory Management and Security, OS-level Auditing and Governance, and more. - Process Automation – StealthAUDIT seamlessly ties together disparate processes, creating fully automated solutions that save time, avoid unnecessary costs, and alleviate burden on IT. - Governance – Not all the data you need can be obtained from a system or application. StealthAUDIT provides both simple and sophisticated methods of retrieving and incorporating end-user feedback into the data analysis and decision-making process, including Entitlement Reviews, Self-Service Access Requests, and more. - Technology Integration – StealthAUDIT can push and pull data to and from dozens of technologies (including home-grown systems) to enhance the value of existing and future technology investments. - Consolidated Reporting – StealthAUDIT can report on any available dataset, enabling organizations to automate a multitude of reporting tasks, as well as view all of their reports in a single pane of glass.

    Control and help secure email, documents, and sensitive data that you share outside your company. From easy classification to embedded labels and permissions, enhance data protection at all times with Azure Information Protection—no matter where it’s stored or who it's shared with.

    DatAdvantage uses machine learning and bi-directional cluster analysis to pinpoint users that have access to files they don’t need to do their job. It’s your single interface for managing permissions and security groups.

    IBM Data Risk Manager provides executives and their teams a business-consumable data risk control center that helps to uncover, analyze, and visualize data-related business risks so they can take action to protect their business.

    Efficiently find GDPR-relevant data, understand data and database exposures, and act to address issues and minimize risk.

    ManageEngine DataSecurity Plus continuously monitors Windows file servers and reports on every change or access attempt made to a file or folder stored on those servers.

    Active Directory is secure when it’s clean, understood, configured properly, monitored closely, and controlled tightly. StealthINTERCEPT is a real-time change and access monitoring solution that safeguards your organization against malicious and unintended changes made in Active Directory, File Systems, and Exchange, by providing organizations the operational and security intelligence necessary to achieve these goals—without relying on ineffective native logs.

    AristotleInsight was built to collect, analyze and store the enormous amounts of UDAPE data necessary to document exactly what occurs at any given moment now or in the past

    CA ACF2 provides comprehensive security for your valuable information assets, enabling your business to fully realize the reliability, scalability and cost-effectiveness of the mainframe.

    CA Auditor is a comprehensive software package that can perform an automated technical review of the system, hardware and software environment and identify integrity exposures

    CA Cleanup is designed to help you comply with many regulations and laws requiring due diligence for information security, protection and privacy

    CA Data Content Discovery helps you build data-centric security strategies by identifying data exposure risks through the mainframe data infrastructure

    Mainframe security and audt reporting.

    ControlCase provides data security and compliance as a service.

    Data Recon is a sensitive data discovery tool designed to help you find Personally Identifiable Information (PII) on systems, simplifying all your compliance efforts for PCI DSS, SOX, HIPAA, GLBA, and more.

    Dtex is a cyber security solution provider.

    Fasoo provides strategic intelligence for digital business in the areas of data security, application security, digital document management and productivity.

    Agentless, remote and non-intrusive; FileAudit offers an easy yet robust tool for monitoring, auditing and alerting on all access, and access attempts, to files, folders and file shares that reside on Windows System.

    Hidden risks expose your data. Imperva Discovery and Assessment discovers unknown databases, classifies sensitive data and detects database vulnerabilities.

    Leakwatch develops a technology detecting your sensitive data leaks in real-time on the Internet to alert you as soon as possible and empower you to take actions quickly.

    ArcSight User Behavior Analytics offers enterprises the ability to monitor and detect from internal and external security threats and fraud.

    Proofpoint Data Discover simplifies and automates PCI, PII and PHI discovery

    SailPoint SailPoint SecurityIQ open identity platform gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis.

    Smartcrypt redefines enterprise data protection, providing complete administrative control while finding and protecting sensitive data on user devices, file servers, mainframes, and more, on every enterprise operating system.

    StealthRECOVER™ enables organizations to effortlessly rollback undesired attribute changes, recover deleted objects, and restore the health of Active Directory—without downtime.

    The Privacy Compliance Hub is a data protection compliance solution.

    ThisData quickly detects Account Takeover (ATO) attacks by using anomaly detection and machine learning, combined with contextual information like device, location and behavior, to verify the identity of a user logging in.