Home / Data Security and Privacy

Data Security and Privacy

Protecting your information. Learn about data security and privacy best practices.

Data Discovery and Classification

1Touch.io
Free

1Touch.io View 1Touch.io

1Touch.io Inventa is an AI-powered, sustainable platform designed for comprehensive data discovery and classification at enterprise scale. It autonomously maps and catalogs all sensitive data in near real-time, operating under a zero-trust model that bypasses the need for organizational input. Inventa's Supervised AI creates and maintains a centralized Customer Master Catalog, essential for robust Privacy, Security, and Data Governance initiatives.

AI-Powered Sensitive Data Discovery and Classification
Automated Data Mapping and Cataloging
Near Real-Time Data Visibility
ActiveNav
Free

ActiveNav View ActiveNav

ActiveNav offers a robust cloud platform for comprehensive dark data discovery, enabling organizations to achieve compliance and enhance information governance. Our solution rapidly deploys to build a detailed data inventory, immediately highlighting critical governance issues like data spillage, over-retention, and ROT data through intuitive dashboards. Recognized as a leader in unstructured data governance, ActiveNav empowers compliance teams, data owners, information professionals, and IT departments with a sustainable platform designed for ongoing program success, not just a one-time fix.

Rapid cloud platform deployment
Comprehensive dark data inventory
Automated governance issue detection (spillage, over-retention, ROT)
Bedrock Security
Free

Bedrock Security View Bedrock Security

Bedrock Security empowers organizations to proactively safeguard their most critical asset in the cloud and GenAI landscape: data. We provide an intelligent, integrated platform designed to deliver unparalleled data visibility and robust detection and response capabilities. By leveraging AI reasoning and out-of-the-box compliance frameworks, Bedrock Security ensures your data remains protected while seamlessly integrating security with your core business operations, mitigating evolving threats.

AI-driven Data Visibility and Understanding
Automated Cloud and GenAI Compliance Enforcement
Behavior-Based Anomaly Detection
689cloud
Free

689cloud View 689cloud

689Cloud is a robust cloud content collaboration platform designed to provide comprehensive post-share data protection. It empowers organizations to maintain control over sensitive documents and confidential information, preventing unauthorized re-sharing or data leakage, even after initial distribution. Seamlessly integrated into your workflow, 689Cloud offers granular control over file accessibility, including blocking screen captures, restricting printing and editing, and remotely revoking access to downloaded files, ensuring data security across various industries.

Post-share file protection and control
Prevention of unauthorized re-sharing and leakage
Remote access revocation for shared files
Absolute IT Asset Disposals
Free

Absolute IT Asset Disposals View Absolute IT Asset Disposals

Absolute IT Asset Disposals offers a comprehensive IT Asset Disposal (ITAD) service focused on secure and compliant recycling of your end-of-life IT hardware. We mitigate the risk of data breaches and associated fraud by rigorously ensuring all sensitive information is securely erased from computers, laptops, servers, and storage devices, safeguarding your business and customer data in adherence to stringent data protection legislation. Partner with us for an end-to-end solution that streamlines your IT inventory refresh and upgrade processes, saving you valuable time and resources.

Secure data erasure and destruction
Environmentally responsible IT recycling
Compliance with data protection legislation
Actfore
Free

Actfore View Actfore

Actfore provides advanced AI/ML-powered data mining solutions for legal counsel, insurance carriers, and corporations to rapidly detect and quantify compromised sensitive information following cyber breaches. Our technology-first, onshore, on-premises approach processes over 1 million files per hour per instance, ensuring the fastest and most accurate assessment of data exfiltration to enable precise risk evaluation and notification list generation. Clients retain complete data control through secure deployment behind their firewall or within Actfore's secure lab, augmented by our directory of over 8,000 global cybersecurity service providers.

AI/ML-powered data mining and detection
High-speed processing (1M+ files/hour/instance)
On-premises and onshore deployment options
01 Communique Laboratory
Free

01 Communique Laboratory View 01 Communique Laboratory

01 Communique Laboratory is a pioneer in Post-Quantum Cyber Security, offering a patent-pending Quantum-Safe Cryptographic system designed to provide robust protection for a wide range of digital assets. Our innovative solutions, including IronCAP, ensure security against future quantum computing threats while maintaining compatibility with current infrastructure. Businesses can leverage our advanced technology to secure blockchains, digital signatures, cloud storage, and more, enabling enhanced data integrity and confidentiality.

Patent-pending Quantum-Safe Cryptographic system
Protection against future quantum computer attacks
Versatile application across blockchains, digital signatures, and more
AUREA Technology
Free

AUREA Technology View AUREA Technology

AUREA Technology specializes in cutting-edge Single Photon Counting Modules (SPCMs) and integrated Time Correlated Single Photon Counting (TCSPC) solutions for demanding scientific and industrial applications. Their high-performance photon counters, like the SPD_OEM_NIR, are engineered for critical security tasks such as Quantum Key Distribution (QKD) at telecom wavelengths, enabling secure, long-distance data encryption for government, finance, and enterprise networks.

Industry-leading Single Photon Counting Modules (SPCMs)
First integrated Time Correlated Single Photon Counting (TCSPC) module
High-performance photon counters for QKD at telecom wavelengths
Absio
Free

Absio View Absio

Absio empowers developers to embed robust data security directly into software applications by default. Leveraging its revolutionary Software-Defined Distributed Key Cryptography (SDKC) technology, Absio enables platform and device-agnostic data protection without reliance on central servers or complex infrastructure, allowing seamless integration of application-level key management, authentication, and encryption through a simple API.

Software-Defined Distributed Key Cryptography (SDKC)
Central server-independent security
Cross-platform and device compatibility
ALTR
Free

ALTR View ALTR

ALTR delivers embedded data security and privacy solutions by integrating programmable controls directly into application code. This approach establishes a zero-trust security and governance framework within the critical data access path, effectively mitigating privacy and breach risks. By leveraging smart database drivers or API calls, ALTR offers a more portable, simpler, and significantly more effective data security model that neutralizes threats even from privileged users.

Software-embedded data security solutions
Programmable data privacy controls
Zero-trust security architecture
AllClear ID
Free

AllClear ID View AllClear ID

AllClear ID offers comprehensive solutions to safeguard individuals and their personal information against identity theft. Leveraging advanced technology and expert customer service, the company excels in guiding organizations through data breach responses and providing critical support to consumers affected by identity theft. Their services are designed to empower individuals and businesses with robust protection and efficient recovery strategies.

Identity Theft Protection Services
Data Breach Response Guidance
Consumer Support for Victims
Anonomatic
Free

Anonomatic View Anonomatic

Anonomatic empowers organizations to achieve robust data privacy and PII compliance with its innovative PII Vault solution. Leveraging proprietary Poly-Anonimization™ technology, Anonomatic securely separates Personally Identifiable Information (PII) from fact data, enabling researchers and data scientists to share and process sensitive information with zero risk of exposure. This ensures complete data anonymization while maintaining the integrity and accuracy required for advanced analytics and multi-dataset integration.

Robust PII Separation: Isolates sensitive PII from analytical datasets.
Poly-Anonimization™ Technology: Advanced anonymization for enhanced privacy.
Secure Data Sharing: Facilitates safe data exchange among stakeholders.