Skip to Navigation
Skip to Navigation
G2 - Business Software Reviews
Search software
Software
Expand/Collapse Software
AI Agents
Services
Expand/Collapse Services
G2 for Business
Expand/Collapse vendor
For Marketers
Enhance your G2 profile and reach in-market buyers
For Sales
Find, engage, and convert in-market buyers
For Services
Reach companies that need you, when they’re ready to buy
For Investments
Gain access to real-time software trends
For Developers
Use our Developer Portal to test API data
Deals
Leave a Review
Join or Log In
Search
Search Software and Services
Expand/Collapse
Home
...
Data Loss Prevention (DLP) Software
Cyberhaven
Sensitive Data Protection
Cyberhaven-vs-Sensitive Data Protection
Compare Cyberhaven and Sensitive Data Protection
Social Share Options
All Categories
Data-Centric Security
Data Loss Prevention (DLP)
All Reviewers
Small-Business Reviewers
Mid-Market Reviewers
Large Enterprise Reviewers
Save to Research Board
Featured Products
Sponsored
ManageEngine DataSecurity Plus
3.9/5
(10)
Visit Website
Sponsored
Tresorit
4.5/5
(251)
Visit Website
Sponsored
Safetica
4.5/5
(196)
Visit Website
At a Glance
Pricing
Ratings
Features
Reviews
Alternatives
Discussions
Add Product
Cyberhaven
(18)
4.5
out of
5
Cyberhaven
By
Cyberhaven
Sensitive Data Protection
(12)
4.2
out of
5
Sensitive Data Protection
By
Google
At a Glance
Star Rating
(18)
4.5
out of
5
(12)
4.2
out of
5
Market Segments
Enterprise (61.1% of reviews)
Information
Mid-Market (50.0% of reviews)
Information
Pros & Cons
Data Protection
(2)
Compliance
(1)
Compatibility Issues
(1)
Complex Configuration
(1)
Cost Efficiency
(1)
Flexibility
(1)
Complexity
(1)
Learning Difficulty
(1)
Entry-Level Pricing
No pricing available
No pricing available
Cyberhaven
Star Rating
(18)
4.5
out of
5
Market Segments
Enterprise (61.1% of reviews)
Information
Pros & Cons
Data Protection
(2)
Compliance
(1)
Compatibility Issues
(1)
Complex Configuration
(1)
Entry-Level Pricing
No pricing available
Learn more about Cyberhaven
Sensitive Data Protection
Star Rating
(12)
4.2
out of
5
Market Segments
Mid-Market (50.0% of reviews)
Information
Pros & Cons
Cost Efficiency
(1)
Flexibility
(1)
Complexity
(1)
Learning Difficulty
(1)
Entry-Level Pricing
No pricing available
Learn more about Sensitive Data Protection
Cyberhaven vs Sensitive Data Protection
Cyberhaven and Sensitive Data Protection both meet the requirements of our reviewers at a comparable rate.
When comparing quality of ongoing product support, reviewers felt that Cyberhaven is the preferred option.
For feature updates and roadmaps, our reviewers preferred the direction of Cyberhaven over Sensitive Data Protection.
Pricing
Entry-Level Pricing
Cyberhaven
No pricing available
Sensitive Data Protection
No pricing available
Free Trial
Cyberhaven
No trial information available
Sensitive Data Protection
No trial information available
Ratings
Meets Requirements
8.9
17
8.9
9
Ease of Use
8.6
18
8.0
9
Ease of Setup
8.7
18
Not enough data
Ease of Admin
9.0
16
Not enough data
Quality of Support
8.8
17
8.1
8
Has the product been a good partner in doing business?
9.5
16
Not enough data
Product Direction (% positive)
9.3
16
7.4
9
Features by Category
Data Loss Prevention (DLP)
Hide 10 Features
Show 10 Features
9.2
16
Not enough data
Administration
Data Management
9.3
(won by default)
12
Not enough data
Incident Logs
9.8
(won by default)
11
Not enough data
Reporting
8.8
(won by default)
13
Not enough data
Governance
Access Control
8.5
(won by default)
13
Not enough data
Compliance
9.2
(won by default)
14
Not enough data
Data Visibility
9.8
(won by default)
14
Not enough data
Security
Encryption
9.1
(won by default)
11
Not enough data
Endpoint Intelligence
8.6
(won by default)
12
Not enough data
Activity Monitoring
9.6
(won by default)
15
Not enough data
Breach Detection
9.0
(won by default)
14
Not enough data
Cloud Data Security
Hide 11 Features
Show 11 Features
Not enough data
Not enough data
Data Protection
Data Masking
Not enough data
Not enough data
Data Encryption/Security
Not enough data
Not enough data
Data loss Prevention
Not enough data
Not enough data
Anomoly Detection
Not enough data
Not enough data
Sensitive Data Compliance
Not enough data
Not enough data
Analysis
Cloud Gap Analytics
Not enough data
Not enough data
Compliance Monitoring
Not enough data
Not enough data
User Analytics
Not enough data
Not enough data
Administration
Auditing
Not enough data
Not enough data
Data Discovery
Not enough data
Not enough data
Access Control
Not enough data
Not enough data
Data-Centric Security
Hide 12 Features
Show 12 Features
Not enough data
Not enough data
Data Protection
Sensitive Data Discovery
Not enough data
Not enough data
Structured and Unstructured Data
Not enough data
Not enough data
Encryption
Not enough data
Not enough data
Persistent Protection
Not enough data
Not enough data
Data Masking
Not enough data
Not enough data
Data Governance and Access Management
Not enough data
Not enough data
Audit and Reporting
Not enough data
Not enough data
Compliance
At-Risk Analysis
Not enough data
Not enough data
DLP Configuration
Not enough data
Not enough data
Usability
Visualization
Not enough data
Not enough data
AI Algorithyms
Not enough data
Not enough data
Cross-Platforms
Not enough data
Not enough data
Data De-Identification
Hide 7 Features
Show 7 Features
Not enough data
Not enough data
Compliance
GDPR compliant
Not enough data
Not enough data
CCPA compliant
Not enough data
Not enough data
Functionality
Static pseudonymization
Not enough data
Not enough data
Dynamic pseudonymization
Not enough data
Not enough data
Batch de-identification
Not enough data
Not enough data
Connectivity
Mobile SDK
Not enough data
Not enough data
Web services APIs
Not enough data
Not enough data
Sensitive Data Discovery
Hide 14 Features
Show 14 Features
9.0
6
Not enough data
Functionality
Structure type
Not enough data
Not enough data
Contextual search
9.7
(won by default)
5
Not enough data
Template algorithms
Not enough data
Not enough data
Custom algorithms
Not enough data
Not enough data
False-positive management
8.3
(won by default)
5
Not enough data
Multiple file and location types
8.9
(won by default)
6
Not enough data
Real-time monitoring
9.7
(won by default)
6
Not enough data
Dashboard
8.6
(won by default)
6
Not enough data
Compliance
9.3
(won by default)
5
Not enough data
Reporting
8.7
(won by default)
5
Not enough data
Agentic AI - Sensitive Data Discovery
Autonomous Task Execution
Not enough data
Not enough data
Multi-step Planning
Not enough data
Not enough data
Cross-system Integration
Not enough data
Not enough data
Proactive Assistance
Not enough data
Not enough data
Insider Threat Management (ITM)
Hide 9 Features
Show 9 Features
8.2
11
Not enough data
Functionality
Silent Deploy
9.3
(won by default)
10
Not enough data
Detect Data Movement
9.6
(won by default)
9
Not enough data
File and Application Activity
9.2
(won by default)
11
Not enough data
Trigger Alerts
9.0
(won by default)
10
Not enough data
Searchable Evidence
9.8
(won by default)
10
Not enough data
Risk Scoring
9.2
(won by default)
10
Not enough data
Monitoring
Screen Recording
7.0
(won by default)
9
Not enough data
Keystroke Logging
5.0
(won by default)
9
Not enough data
Sentiment Analysis
5.6
(won by default)
9
Not enough data
Data Security Posture Management (DSPM)
Hide 9 Features
Show 9 Features
Not enough data
Not enough data
Discovery & Classification - Data Security Posture Management (DSPM)
Continuous real‑time monitoring
Not enough data
Not enough data
Discover & classify sensitive data
Not enough data
Not enough data
Custom classification support
Not enough data
Not enough data
Risk Prioritization - Data Security Posture Management (DSPM)
Detect excessive entitlements & toxic combinations
Not enough data
Not enough data
Compliance posture assessment
Not enough data
Not enough data
Risk‑based exposure scoring
Not enough data
Not enough data
Remediation & Governance - Data Security Posture Management (DSPM)
Guided remediation actions
Not enough data
Not enough data
Integration with enforcement tools
Not enough data
Not enough data
Track remediation progress & trends
Not enough data
Not enough data
Cloud Security
Hide 9 Features
Show 9 Features
Not enough data
Not enough data
Cloud Visibility
Data Discovery
Not enough data
Not enough data
Cloud Registry
Not enough data
Not enough data
Cloud Gap Analytics
Not enough data
Not enough data
Security
Data Security
Not enough data
Not enough data
Data loss Prevention
Not enough data
Not enough data
Security Auditing
Not enough data
Not enough data
Identity
SSO
Not enough data
Not enough data
Governance
Not enough data
Not enough data
User Analytics
Not enough data
Not enough data
Data Security
Hide 12 Features
Show 12 Features
Not enough data
Not enough data
Compliance
Access Management
Not enough data
Not enough data
At-Risk Analysis
Not enough data
Not enough data
DLP Configuration
Not enough data
Not enough data
Sensitive Data Compliance
Not enough data
Not enough data
Administration
Database Management
Not enough data
Not enough data
Deduplication
Not enough data
Not enough data
Backup
Not enough data
Not enough data
API / integrations
Not enough data
Not enough data
Security
Multi-Factor Authentication
Not enough data
Not enough data
Data Transport
Not enough data
Not enough data
Data Types
Not enough data
Not enough data
Security Tools
Not enough data
Not enough data
Categories
Categories
Shared Categories
Cyberhaven
Sensitive Data Protection
Cyberhaven and Sensitive Data Protection are categorized as
Data-Centric Security
and
Data Loss Prevention (DLP)
Unique Categories
Cyberhaven is categorized as
Insider Threat Management (ITM)
,
Sensitive Data Discovery
,
Cloud Data Security
, and
Data Security Posture Management (DSPM)
Sensitive Data Protection is categorized as
Data De-Identification
Reviews
Reviewers' Company Size
Cyberhaven
Small-Business
(50 or fewer emp.)
11.1%
Mid-Market
(51-1000 emp.)
27.8%
Enterprise
(> 1000 emp.)
61.1%
Sensitive Data Protection
Small-Business
(50 or fewer emp.)
41.7%
Mid-Market
(51-1000 emp.)
50.0%
Enterprise
(> 1000 emp.)
8.3%
Small-Business
(50 or fewer emp.)
11.1%
41.7%
Mid-Market
(51-1000 emp.)
27.8%
50.0%
Enterprise
(> 1000 emp.)
61.1%
8.3%
Reviewers' Industry
Cyberhaven
Financial Services
33.3%
Manufacturing
22.2%
Law Practice
11.1%
Venture Capital & Private Equity
5.6%
Marketing and Advertising
5.6%
Other
22.2%
Sensitive Data Protection
Information Technology and Services
25.0%
Primary/Secondary Education
16.7%
Computer Software
16.7%
Telecommunications
8.3%
Oil & Energy
8.3%
Other
25.0%
Alternatives
Cyberhaven Alternatives
BetterCloud
Add BetterCloud
Egnyte
Add Egnyte
Acronis Cyber Protect Cloud
Add Acronis Cyber Protect Cloud
Druva Data Security Cloud
Add Druva Data Security Cloud
See all alternatives
Sensitive Data Protection Alternatives
BetterCloud
Add BetterCloud
Veeam Data Platform
Add Veeam Data Platform
Egnyte
Add Egnyte
Check Point Next Generation...
Add Check Point Next Generation Firewalls (NGFWs)
See all alternatives
Discussions
Cyberhaven Discussions
Cyberhaven has no discussions with answers
See all discussions
Sensitive Data Protection Discussions
Sensitive Data Protection has no discussions with answers
See all discussions
Ask Cyberhaven a Question
Contact Cyberhaven
Ask Sensitive Data Protection a Question
Contact Sensitive Data Protection
Spotlight Categories
Social Media Management Tools
Expense Management Software
Quality Management Systems (QMS)
Corporate Performance Management (CPM) Software
At a Glance
Pricing
Ratings
Features
Reviews
Alternatives
Discussions
Add Product
Cyberhaven
Sensitive Data Protection
Hunting for software
insights
?
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.
G2 - Business Software Reviews
Create an account
Already have an account?
Log in
G2 - Business Software Reviews
Create an account
Already have an account?
Log in
or continue with
LinkedIn
Google
Google
By proceeding, you agree to our
Terms of Use
and
Privacy Policy
Add more products
Search for Software and Services
Suggested Products
Symantec Data Loss Prevention
(149)
4.4
out of
5
Add
Forcepoint Data Loss Prevention (DLP)
(27)
4.4
out of
5
Add
Proofpoint Insider Threat Management
(48)
4.3
out of
5
Add
Microsoft Purview Data Loss Prevention
(22)
4.6
out of
5
Add
Dell Avamar
(47)
4.0
out of
5
Add