Security Compare 44 Companies

Tools for securing data warehouses and corporate IT resources

CoSign Digital Signatures: CoSign® standard digital signatures enable organizations to securely and compliantly automate their signature-dependent processes. CoSign can be used to easily add a digital signature to any major document type including Word, Excel®, PDF, PDF/A, InfoPath®, and others. CoSign signatures provide...
Learn more about CoSign Digital Signatures

IRI DarkShield (Semi & Unstructured Data Masking): Discover, Deliver & Delete PII: Find sensitive data in structured, semi-structured, unstructured sources using multiple search techniques. Use the search results to simultaneously or separately provide, remove, or fix the PII to comply with GDPR data portability, erasure, or rectification...
Learn more about IRI DarkShield (Semi & Unstructured Data Masking)

VectorRock empowers businesses with ironclad cybersecurity solutions that safeguard their digital landscape. Its expert-driven approach ensures proactive risk management, rapid incident response, and compliance with industry standards. With tailored services including penetration testing,...

Applicure Technologies Ltd. (TASE: APCR) develops the leading multi-platform Web application security software solution to protect Web sites and Web applications from external and internal attacks. Built upon years of research into hacker behavior, dotDefender features a comprehensive knowledge...

DataSunrise, Inc

Rating: 5/5 - 3 reviews

DataSunrise Database Security Software (www.datasunrise.com) secures the databases and data in real-time with high performance in the clouds and on prem. It is a last line of defense against unauthorized data and database access from outside or inside. DataSunrise includes: - intelligent...

BMC offers modern IT with software, solutions, and services to help you run your business as you reinvent it.

Founded in 2002, InterGuard develops award winning monitoring software that records and controls all end user activity on all PC, Mac, Chromebook, iPhone / iPad, Android phones and tablets so organizations can measure and score employee productivity. As the pioneer for Unified Insider Threat...