Introducing G2.ai, the future of software buying.Try now
Product Avatar Image
Thales CipherTrust Data Security Posture Management

By Thales Group

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at Thales CipherTrust Data Security Posture Management and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
0 out of 5 stars

How would you rate your experience with Thales CipherTrust Data Security Posture Management?

This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review
Product Avatar Image

Have you used Thales CipherTrust Data Security Posture Management before?

Answer a few questions to help the Thales CipherTrust Data Security Posture Management community

Thales CipherTrust Data Security Posture Management Reviews (0)

G2 reviews are authentic and verified.

There are not enough reviews of Thales CipherTrust Data Security Posture Management for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Wiz Logo
Wiz
4.7
(753)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
2
SpinOne Logo
SpinOne
4.8
(120)
All-in-One SaaS Security for Mission-Critical SaaS Apps
3
Cortex Cloud Logo
Cortex Cloud
4.1
(111)
Cloud to SOC security to protect cloud applications, data, and AI models across multicloud and hybrid environments by leveraging unified data and full-lifecycle context for real-time detection and response.
4
Rubrik Logo
Rubrik
4.6
(97)
Rubrik offers live data access for recovery and application development by fusing enterprise data management with web-scale IT.
5
AvePoint Confidence Platform Logo
AvePoint Confidence Platform
4.5
(96)
The AvePoint Confidence Platform is the most advanced platform for data security, governance, and resilience of Microsoft 365, Google, Salesforce, and more, trusted by leading organizations worldwide.
6
Securiti Logo
Securiti
4.7
(80)
Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and GenAI. It provides unified data intelligence, controls and orchestration across hybrid multicloud environments. Large global enterprises rely on Securiti's Data Command Center for data security, privacy, governance, and compliance. Securiti has been recognized as Gartner "Cool Vendor in Data Security", Forrester "Privacy Management Wave Leader", and RSA "Most Innovative Startup
7
Varonis Data Security Platform Logo
Varonis Data Security Platform
4.5
(66)
Data Security platform detects insider threats and cyberattacks by analyzing data, account activity, and user behavior; prevents and limits disaster by locking down sensitive and stale data; and efficiently sustains a secure state with automation.
8
Zscaler Data Security Posture Management (DSPM) Logo
Zscaler Data Security Posture Management (DSPM)
4.6
(56)
Zscaler Data Security Posture Management (DSPM) provides organizations with a comprehensive way to manage, monitor, and remediate security risks related to sensitive data in cloud environments. Designed to empower security and compliance teams, Zscaler DSPM automatically discovers sensitive data, evaluates its posture, and enforces robust protection policies to ensure compliance and reduce the risk of data breaches. Key Use Cases: • Automatically discover and classify sensitive data across cloud environments. • Identify misconfigurations and security gaps related to data storage or usage. • Enforce compliance with regulations such as GDPR, HIPAA, PCI DSS, and others. • Prevent unintentional data exposure and insider risk. Key Features: • Real-Time Data Discovery: Continuously scans cloud environments to locate and classify sensitive data. • Posture Evaluations: Detects misconfigurations and risky behaviors in handling data. • Remediation Workflows: Automates resolution workflows for security vulnerabilities affecting data protection. • Compliance Reporting: Simplifies audits and regulatory reporting by providing detailed visibility into data security posture. • Cloud Integration: Seamlessly integrates with multi-cloud environments, including AWS, Azure, and Google Cloud Platform (GCP). Key Benefits: • Reduced Risk of Data Breaches: Continuously evaluates data security to minimize exposure risks while blocking unauthorized access. • Enhanced Compliance Confidence: Supports adherence to industry regulations by identifying and resolving compliance gaps. • Streamlined Management: Eliminates complexity and operational overhead associated with managing cloud data security.
9
Netwrix Auditor Logo
Netwrix Auditor
4.4
(27)
Netwrix Auditor enables auditing of the broadest variety of IT systems, including Active Directory, Exchange, file servers, SharePoint, SQL Server, VMware and Windows Server. It also supports monitoring of privileged user activity.
10
Strac Logo
Strac
4.9
(27)
Strac is a 1-stop shop for all things PII (Personally Identifiable Information). Strac is a Data Loss Prevention software that protects businesses from security and compliance risks by a) automatically detecting and redacting sensitive data across all communication channels like email, slack, zendesk, google drive, one drive, intercom, etc. and b) protecting sensitive data on front end apps and backend servers such that sensitive data never touches servers. Integrate with your SaaS apps in minutes, eliminate data leaks and be compliant with PCI, SOC 2, HIPAA, GDPR, CCPA. Strac's accurate machine learning models, real time notifications, unique redaction experience saves employees time and very productive.
Show More

No Discussions for This Product Yet

Be the first to ask a question and get answers from real users and experts.

Start a discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Thales CipherTrust Data Security Posture Management
View Alternatives