Home / Data Security and Privacy

Data Security and Privacy

Protecting your information. Learn about data security and privacy best practices.

Data Discovery and Classification

WiebeTech
Free

WiebeTech View WiebeTech

WiebeTech delivers robust and innovative digital forensics solutions designed for efficient evidence acquisition and disk imaging. Trusted by professionals worldwide, our specialized tools capture critical data from diverse sources, ensuring integrity and security for demanding investigations. Explore WiebeTech for reliable hardware engineered for peak performance in digital forensics and IT workflows.

Physical and Logical Disk Imaging
Secure Data Acquisition
Support for Local and Networked Data
Velotix
Free

Velotix View Velotix

Velotix unlocks your organization's data potential by providing an AI-driven platform for robust data security and compliance. Seamlessly integrate across multi-cloud environments to automate policy management, enforce dynamic access controls, and achieve comprehensive data discovery, thereby enabling secure, self-service data access for optimized utilization without sacrificing governance. Trusted by industry leaders, Velotix empowers you to confidently navigate the complex regulatory landscape and thrive in the 'need to share' era.

AI-Powered Automated Policy Management
Dynamic Access Controls for Secure Data Sharing
Comprehensive Data Discovery and Classification
vdiscovery
Free

vdiscovery View vdiscovery

vdiscovery provides specialized, proprietary solutions for computer forensics, document review, and electronic discovery. We custom-develop and adapt software to meet unique client case and data requirements, optimizing data processing and streamlining review and production workflows. Our commitment to customization, innovative technology, and exceptional service ensures timely access to critical evidence and facts.

Proprietary eDiscovery software development
Customized data processing solutions
Streamlined document review workflows
Satori Cyber
Free

Satori Cyber View Satori Cyber

Satori Cyber empowers organizations to leverage data as a competitive advantage by establishing a Secure Data Access Cloud. This innovative platform removes obstacles to widespread data utilization while rigorously upholding security, privacy, and compliance standards. By offering continuous visibility and granular control over data flows across all cloud and hybrid environments, Satori Cyber ensures data is accessible when needed and protected at all times.

Continuous visibility and mapping of data flows and stores
Real-time, activity-based data discovery and classification
Field-level data access controls and anomaly detection
Zybert Computing
Free

Zybert Computing View Zybert Computing

Zybert Computing offers robust server solutions specifically designed for the SME market, integrating comprehensive security and data protection directly into the hardware. Our all-in-one devices ensure your business information is secure from unauthorized access and loss without requiring additional software or hardware investments. By seamlessly connecting with your existing infrastructure, Zybert Computing empowers businesses with complete control, ownership, and secure access to their valuable data.

Integrated business information security and control
Secure data access via SSH tunneling with SPOK authorization
Triple A system for document management, archiving, and versioning
ZoobeTek
Free

ZoobeTek View ZoobeTek

ZoobeTek delivers advanced data security solutions designed to prevent sensitive information leaks for businesses, government agencies, and military organizations. Leveraging extensive R&D experience from the Industrial Technology Research Institute, ZoobeTek empowers secure data access from any device, anywhere, while safeguarding against unauthorized access, corruption, and theft. Our innovative approach prioritizes user privacy and eliminates the need for complex agent installations or VPN/MDM configurations on employee devices, fostering efficient and secure business operations.

Secure access to sensitive data from any device, anywhere.
Prevention of unauthorized data access, corruption, or theft.
Empowers employees to securely use personal mobile devices.
ZyberSafe
Free

ZyberSafe View ZyberSafe

ZyberSafe is a leading Danish innovator in hardware encryption, delivering unparalleled security for data in motion. Our high-speed Layer 2 network encryption solutions are designed for effortless implementation, safeguarding sensitive information from wiretapping and unauthorized access without compromising network performance. We empower organizations to protect their most valuable and private data with robust, efficient, and reliable encryption technology.

Dedicated hardware encryption for data in transit
High-speed Layer 2 network encryption
Easy and rapid implementation
Zyber 365 Group
Free

Zyber 365 Group View Zyber 365 Group

Zyber 365 delivers a sustainable, decentralized operating system engineered for robust cyber security and seamless interchain operability. Leveraging advanced technologies such as cryptography, quantum-safe computing, and distributed ledger technology, we provide unparalleled data protection and a flexible, integrated user experience. Our comprehensive suite of Web3 products, including L0/L1/L2 blockchains, decentralized identity solutions, and a complete SDK, forms an adaptable ecosystem for diverse application needs.

Decentralized & Cyber-Secured Operating System
Environmentally Sustainable Design
Seamless Interchain Operability
Zivver
Free

Zivver View Zivver

Zivver provides a next-generation, secure email platform designed for modern communication needs. It seamlessly integrates robust encryption and intuitive usability to empower secure work for individuals and enterprises, ensuring maximum effectiveness with minimal disruption amidst digital transformation and hybrid work models.

Seamless Secure Email Communication
Advanced Encryption Standards
User-Friendly Interface
XPO IT Services
Free

XPO IT Services View XPO IT Services

XPO IT Services are committed to delivering secure, high-quality IT recycling and asset disposal solutions. We prioritize both robust data security for our clients and environmental stewardship through sustainable practices. Our services ensure compliance with regulations like GDPR, offering on-site and mobile hard drive shredding for complete data destruction where erasure isn't feasible, safeguarding your sensitive information and the planet.

Secure Data Destruction
GDPR Compliance
On-site Hard Drive Shredding
Xperien
Free

Xperien View Xperien

Xperien (Pty) Limited, a premier Johannesburg-based South African IT Asset Disposition (ITAD) specialist, offers unparalleled secure ITAD services. As the sole African company holding ISO9001:2015 ITAD accreditation, we provide a comprehensive, secure, and compliant solution for IT asset disposal. Our expertly designed process includes advanced mobile Hard Drive Destruction, ensuring data is irrecoverably destroyed in line with CEGS & NIST SP 800-88 standards and strictly adhering to the POPI Act and GDPR.

ISO9001:2015 Accredited IT Asset Disposition (ITAD)
Mobile Hard Drive Destruction Services
NIST SP 800-88 & CEGS Compliant Data Destruction
XCure Solutions
Free

XCure Solutions View XCure Solutions

XCure Solutions is a Finnish leader in comprehensive data security, protection, and recovery. We empower organizations of all sizes to navigate the evolving landscape of data privacy regulations, including GDPR, with our advanced Privacy Tool and expert guidance. Beyond compliance, XCure Solutions provides robust protection against digital threats like ransomware and hacking, ensuring data integrity through encryption, mobile device management, and secure access controls, while also offering certified data erasure and expert data recovery services.

GDPR Compliance & Privacy Tool
Advanced Malware & Ransomware Protection
Data Encryption Services