Skip to Navigation
Skip to Navigation
Home
...
All Categories
Data Centric Security Software Discussions
Data Centric Security Software Discussions
Share
All Data Centric Security Software Discussions
Search
Most Commented
Most Helpful
Pinned by G2
Newest
All Discussions
Discussions with Comments
Pinned by G2
Discussions without Comments
Filter
Filter
Filter by
Expand/Collapse
Sort by
Most Commented
Most Helpful
Pinned by G2
Newest
Filter by
All Discussions
Discussions with Comments
Pinned by G2
Discussions without Comments
Posted within
Egnyte
0
0
What is Egnyte used for?
What is Egnyte used for?
Sensitive Data Discovery Software
Autodesk Construction Cloud Integration Partners
Other Privacy Software
Encryption Key Management Software
Data-Centric Security Software
Data Governance Software
Cloud Content Collaboration Software
Electronic Trial Master File (eTMF) Software
Show More
1
person commented
SC
Sindhu C.
Pinned by G2 as a
common question.
Posted within
Virtru Email Encryption
0
0
What is Virtru used for?
What is Virtru used for?
Intelligent Email Protection Software
Cloud File Security Software
Encryption Key Management Software
Data-Centric Security Software
Cloud Data Security Software
Email Encryption Software
HIPAA Compliant Messaging Software
Secure Email Gateway Software
Encryption Software
Cloud Content Collaboration Software
Show More
Pinned by G2 as a
common question.
Posted within
Sophos Intercept X
0
0
What is Sophos SafeGuard Encryption used for?
What is Sophos SafeGuard Encryption used for?
Data-Centric Security Software
Encryption Software
Pinned by G2 as a
common question.
Posted within
Netwrix Auditor
0
0
What is Netwrix Auditor used for?
What is Netwrix Auditor used for?
Insider Threat Management (ITM) Software
Data-Centric Security Software
Data Governance Software
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
Tenable Cloud Security
0
0
What is Ermetic used for?
What is Ermetic used for?
Cloud Security Posture Management (CSPM) Software
Cloud Security Monitoring and Analytics Software
Data-Centric Security Software
Cloud Compliance Software
Cloud Data Security Software
Cloud Workload Protection Platforms
Vulnerability Scanner Software
Privileged Access Management (PAM) Software
Identity and Access Management (IAM) Software
Cloud-Native Application Protection Platform (CNAPP)
Show More
1
person commented
VP
Veeresh P.
Pinned by G2 as a
common question.
Posted within
iManage Records Manager
0
0
What is iManage Records Manager used for?
What is iManage Records Manager used for?
Data-Centric Security Software
Pinned by G2 as a
common question.
Posted within
ManageEngine DataSecurity Plus
0
0
What is ManageEngine DataSecurity Plus used for?
What is ManageEngine DataSecurity Plus used for?
Sensitive Data Discovery Software
Data-Centric Security Software
Data Loss Prevention (DLP) Software
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
Fortra Secure Collaboration
0
0
What is Vera Security used for?
What is Vera Security used for?
Cloud File Security Software
Email Encryption Software
Data Center Security Solutions
Secure Email Gateway Software
Mobile Data Security Software
Data-Centric Security Software
Digital Rights Management (DRM) Software
Show More
Pinned by G2 as a
common question.
Posted within
PHEMI Health DataLab
0
0
What is PHEMI Health DataLab used for?
What is PHEMI Health DataLab used for?
Sensitive Data Discovery Software
Data De-Identification Tools
Data Privacy Management Software
Data-Centric Security Software
Database Security Software
Data Masking Software
Hybrid Cloud Storage Solutions
Big Data Integration Platforms
Big Data Processing And Distribution Systems
Data Warehouse Solutions
Data Governance Software
Machine Learning Data Catalog Software
Show More
Pinned by G2 as a
common question.
Posted within
Seclore Data-Centric Security Platform
0
0
What is Seclore Rights Management used for?
What is Seclore Rights Management used for?
Cloud File Security Software
Data-Centric Security Software
Cloud Data Security Software
Cloud Email Security Solutions
Mobile Data Security Software
Digital Rights Management (DRM) Software
Sensitive Data Discovery Software
Endpoint Protection Software
Email Encryption Software
Show More
Pinned by G2 as a
common question.
Posted within
EncryptRIGHT
0
0
What is EncryptRIGHT used for?
What is EncryptRIGHT used for?
Encryption Software
Encryption Key Management Software
Data Masking Software
Data-Centric Security Software
Pinned by G2 as a
common question.
Posted within
Fasoo Enterprise Digital Rights Management
0
0
What is Fasoo Enterprise Digital Rights Management used for?
What is Fasoo Enterprise Digital Rights Management used for?
Digital Rights Management (DRM) Software
Data-Centric Security Software
1
person commented
Fasoo Enterprise Digital Rights Management
Pinned by G2 as a
common question.
Posted within
AristotleInsight
0
0
What is AristotleInsight used for?
What is AristotleInsight used for?
Data-Centric Security Software
Pinned by G2 as a
common question.
Posted within
ControlCase One Audit Service
0
0
What is ControlCase One Audit Service used for?
What is ControlCase One Audit Service used for?
Data-Centric Security Software
Pinned by G2 as a
common question.
Posted within
Tripwire Enterprise
0
0
What is Security Auditor used for?
What is Security Auditor used for?
Data-Centric Security Software
Security Compliance Software
Cloud Compliance Software
Pinned by G2 as a
common question.
Posted within
ShardSecure Engine
0
0
What is ShardSecure Engine used for?
What is ShardSecure Engine used for?
Data-Centric Security Software
AWS Marketplace Software
Pinned by G2 as a
common question.
Posted within
Lepide Data Security Platform
0
0
What is LepideAuditor Suite used for?
What is LepideAuditor Suite used for?
IT Alerting Software
Data Security Posture Management (DSPM)
Sensitive Data Discovery Software
User and Entity Behavior Analytics (UEBA) Software
Data-Centric Security Software
Data Loss Prevention (DLP) Software
Data Governance Tools
Identity and Access Management (IAM) Software
IT Risk Management Software
Show More
Pinned by G2 as a
common question.
Posted within
Imperva Data Security Fabric
0
0
What is Imperva Database Risk & Compliance used for?
What is Imperva Database Risk & Compliance used for?
Data-Centric Security Software
Database Security Software
Sensitive Data Discovery Software
Pinned by G2 as a
common question.
Posted within
Ground Labs Enterprise Recon
0
0
What is Enterprise Recon used for?
What is Enterprise Recon used for?
Sensitive Data Discovery Software
Data-Centric Security Software
Other Privacy Software
Pinned by G2 as a
common question.
Posted within
Fasoo Data Radar
0
0
What is Fasoo Data Radar used for?
What is Fasoo Data Radar used for?
Data-Centric Security Software
Encryption Software
Sensitive Data Discovery Software
Pinned by G2 as a
common question.
Posted within
NetApp Data Availability Services
0
0
What is NetApp Data Availability Services used for?
What is NetApp Data Availability Services used for?
Data-Centric Security Software
Pinned by G2 as a
common question.
Posted within
Virtru Email Encryption
0
0
What is Virtru?
What is Virtru?
Intelligent Email Protection Software
Cloud File Security Software
Encryption Key Management Software
Data-Centric Security Software
Cloud Data Security Software
Email Encryption Software
HIPAA Compliant Messaging Software
Secure Email Gateway Software
Encryption Software
Cloud Content Collaboration Software
Show More
6
people commented
MU
Michael U.
XV
GC
CC
MW
LP
Pinned by G2 as a
common question.
Posted within
Kiteworks
0
0
What is Kiteworks SFTP?
What is Kiteworks SFTP?
File Transfer Protocol (FTP) Software
Email Encryption Software
Managed File Transfer (MFT) Software
Digital Governance Software
Virtual Data Room Software
Secure Email Gateway Software
Cloud Content Collaboration Software
Data-Centric Security Software
Digital Governance Software Questions
Show More
3
people commented
RI
Rusty Loyld I.
MK
RA
Pinned by G2 as a
common question.
Posted within
Azure Information Protection
0
0
What is included in Microsoft information protection?
What is included in Microsoft information protection?
Data-Centric Security Software
Cloud Data Security Software
Sensitive Data Discovery Software
Pinned by G2 as a
common question.
Posted within
Google VPC Service Controls
0
0
Which of the following services lets you access VPC resources residing in Compute Engine from app...
Which of the following services lets you access VPC resources residing in Compute Engine from applications running on App Engine or cloud functions?
Data-Centric Security Software
Pinned by G2 as a
common question.
Posted within
Google VPC Service Controls
0
0
Which of the following services lets you access VPC resources residing in Compute Engine from app...
Which of the following services lets you access VPC resources residing in Compute Engine from applications running on App Engine or cloud functions?
Data-Centric Security Software
Pinned by G2 as a
common question.
Posted within
Netwrix Auditor
0
0
Is Netwrix a SIEM?
Is Netwrix a SIEM?
Insider Threat Management (ITM) Software
Data-Centric Security Software
Data Governance Software
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
Sophos Intercept X
0
0
How do I turn off Sophos encryption?
How do I turn off Sophos encryption?
Data-Centric Security Software
Encryption Software
Pinned by G2 as a
common question.
Posted within
Egnyte
0
0
Is egnyte secure?
Is egnyte secure?
Autodesk Construction Cloud Integration Partners
Other Privacy Software
Encryption Key Management Software
Data-Centric Security Software
Data Governance Software
Cloud Content Collaboration Software
Sensitive Data Discovery Software
Show More
1
person commented
DS
Dave S.
Pinned by G2 as a
common question.
Posted within
Virtru Email Encryption
0
0
What is Virtru email?
What is Virtru email?
Data-Centric Security Software
Email Encryption Software
Encryption Software
Cloud Content Collaboration Software
Cloud Data Security Software
Cloud File Security Software
Encryption Key Management Software
Show More
1
person commented
HH
Haythem H.
Pinned by G2 as a
common question.
Posted within
Microsoft Purview Information Protection
0
0
How does a azure AIP work?
How does a azure AIP work?
Data-Centric Security Software
Cloud Data Security Software
Sensitive Data Discovery Software
Pinned by G2 as a
common question.
Posted within
Varonis Data Security Platform
0
0
Is Varonis a reliable source?
Is Varonis a reliable source?
Data-Centric Security Software
Insider Threat Management (ITM) Software
Sensitive Data Discovery Software
User and Entity Behavior Analytics (UEBA) Software
Security Risk Analysis Software
Privileged Access Management (PAM) Software
Show More
Pinned by G2 as a
common question.
Posted within
Google VPC Service Controls
0
0
How does Google VPC work?
How does Google VPC work?
Data-Centric Security Software
Pinned by G2 as a
common question.
Posted within
Netwrix Auditor
0
0
How much does Netwrix auditor cost?
How much does Netwrix auditor cost?
Insider Threat Management (ITM) Software
Data-Centric Security Software
Data Governance Software
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
Sophos Intercept X
0
0
How do I decrypt SafeGuard encryption?
How do I decrypt SafeGuard encryption?
Data-Centric Security Software
Encryption Software
Pinned by G2 as a
common question.
Posted within
Egnyte
0
0
What is egnyte used for?
What is egnyte used for?
Autodesk Construction Cloud Integration Partners
Other Privacy Software
Encryption Key Management Software
Data-Centric Security Software
Data Governance Software
Cloud Content Collaboration Software
Sensitive Data Discovery Software
Show More
2
people commented
JJ
Jeff (Jeter) J.
VV
Pinned by G2 as a
common question.
Posted within
Virtru Email Encryption
0
0
How much does Virtru cost?
How much does Virtru cost?
Data-Centric Security Software
Email Encryption Software
Encryption Software
Cloud Content Collaboration Software
Cloud Data Security Software
Cloud File Security Software
Encryption Key Management Software
Show More
1
person commented
IJ
Ian J.
Pinned by G2 as a
common question.
Posted within
Microsoft Purview Information Protection
0
0
What is the difference between Microsoft information Protection and azure information protection?
What is the difference between Microsoft information Protection and azure information protection?
Data-Centric Security Software
Cloud Data Security Software
Sensitive Data Discovery Software
Pinned by G2 as a
common question.
Posted within
Varonis Data Security Platform
0
0
Does Varonis use agents?
Does Varonis use agents?
Data-Centric Security Software
Insider Threat Management (ITM) Software
Sensitive Data Discovery Software
User and Entity Behavior Analytics (UEBA) Software
Security Risk Analysis Software
Privileged Access Management (PAM) Software
Show More
Pinned by G2 as a
common question.
Posted within
Google VPC Service Controls
0
0
What is VPC service perimeter?
What is VPC service perimeter?
Data-Centric Security Software
Pinned by G2 as a
common question.
Posted within
Netwrix Auditor
0
0
What does Netwrix do?
What does Netwrix do?
Insider Threat Management (ITM) Software
Data-Centric Security Software
Data Governance Software
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
Sophos Intercept X
0
0
What is Sophos device encryption?
What is Sophos device encryption?
Data-Centric Security Software
Encryption Software
Pinned by G2 as a
common question.
Posted within
Egnyte
0
0
What is egnyte software?
What is egnyte software?
Autodesk Construction Cloud Integration Partners
Other Privacy Software
Encryption Key Management Software
Data-Centric Security Software
Data Governance Software
Cloud Content Collaboration Software
Sensitive Data Discovery Software
Show More
1
person commented
MF
Mindy F.
Pinned by G2 as a
common question.
Posted within
Virtru Email Encryption
0
0
Is Virtru secure?
Is Virtru secure?
Data-Centric Security Software
Email Encryption Software
Encryption Software
Cloud Content Collaboration Software
Cloud Data Security Software
Cloud File Security Software
Encryption Key Management Software
Show More
1
person commented
AD
Amy D.
Pinned by G2 as a
common question.
Posted within
Microsoft Purview Information Protection
0
0
What can azure information protection achieve?
What can azure information protection achieve?
Sensitive Data Discovery Software
Cloud Data Security Software
Data-Centric Security Software
Pinned by G2 as a
common question.
Posted within
Varonis Data Security Platform
0
0
What does Varonis DatAdvantage do?
What does Varonis DatAdvantage do?
Data-Centric Security Software
Insider Threat Management (ITM) Software
Sensitive Data Discovery Software
User and Entity Behavior Analytics (UEBA) Software
Security Risk Analysis Software
Privileged Access Management (PAM) Software
Show More
Pinned by G2 as a
common question.
Posted within
Google VPC Service Controls
0
0
What are VPC service controls?
What are VPC service controls?
Data-Centric Security Software
Pinned by G2 as a
common question.
Posted within
Netwrix Auditor
0
0
What is Netwrix auditor?
What is Netwrix auditor?
Security Risk Analysis Software
Data Governance Software
Data-Centric Security Software
Insider Threat Management (ITM) Software
1
person commented
D
Domenico .
Pinned by G2 as a
common question.
Posted within
Sophos Intercept X
0
0
What does Sophos SafeGuard do?
What does Sophos SafeGuard do?
Data-Centric Security Software
Encryption Software
Pinned by G2 as a
common question.
Posted within
ManageEngine DataSecurity Plus
0
2
DataSecurity Plus forgotten password
Hello I have changed the default password of my DataSecurity Plus and forgot it. How can i reset it? Thanks in advance. Vito
password
datasecurity
Data-Centric Security Software
Sensitive Data Discovery Software
AMA: How Small Business Employees are Adjusting to Remote Work
Show More
Posted by:
G2
Verified User
Pinned by G2 as a
common question.
‹ Prev
‹ Prev
1
2
Next ›
Next ›
Top Contributors in Data-Centric Security Software
Popular Discussions without Comments
0
0
What is virtru used for?
0
0
What is sophos safeguard encryption used for?
0
0
What is netwrix auditor used for?
0
0
What is imanage records manager used for?
0
0
What is manageengine datasecurity plus used for?