Home / Data Security and Privacy / Data Discovery and Classification

Data Discovery and Classification

Find and categorize sensitive data for robust data security and privacy protection.

Try these 40 AI Data Discovery and Classification Tools

JumpWire
Free

JumpWire View JumpWire

JumpWire is a sophisticated data protection platform that embeds advanced, granular security controls directly into your data infrastructure, securing sensitive information across APIs, applications, and databases. By automatically identifying and labeling sensitive data properties, JumpWire empowers developers to precisely govern access and modification rights, ensuring compliance and mitigating breach risks.

Automated sensitive data discovery and labeling
Granular access control by property and context
Policy-driven security aligned with InfoSec programs
Laminar
Free

Laminar View Laminar

Laminar is the premier cloud-native data protection platform offering unparalleled visibility and enforcement across your entire public cloud infrastructure. By continuously discovering, classifying, and monitoring sensitive data across datastores, compute, and egress channels, Laminar empowers organizations to proactively secure their data, minimize risk, and prevent real-time data leaks without disrupting operations. This agentless and asynchronous solution provides comprehensive data observability, enabling security teams to regain control and reduce their attack surface.

End-to-end Public Cloud Data Protection
Cloud-Native Data Protection Platform
Continuous Data Discovery and Classification
Mage Data
Free

Mage Data View Mage Data

Mage Data provides a comprehensive data security and privacy platform designed to empower global enterprises. Our solution intelligently identifies and locates sensitive data across your entire landscape, enabling robust protection and seamless regulatory compliance. Mage helps organizations manage complex use cases like test data management, secure cross-border data transfer, and overall enterprise security, ensuring your critical information remains protected while in use and at rest.

Sensitive Data Discovery and Classification
Data Access Control and Monitoring
Automated Compliance Reporting
Normalyze
Free

Normalyze View Normalyze

Normalyze empowers enterprise IT security teams to proactively address critical cloud and data security challenges. Our agentless platform provides deep visibility into your cloud data landscape, identifying sensitive information, correlating risks across applications, infrastructure, and identities, and delivering actionable remediation guidance to effectively protect your most valuable assets.

Agentless Cloud Data Security Assessments
Comprehensive Data Discovery and Classification
AI-Driven Risk Prioritization
Nuix
Free

Nuix View Nuix

Nuix provides a powerful data processing and analytics platform designed to illuminate unstructured data, enabling organizations to make definitive, fact-based decisions. Trusted by leading government agencies and enterprises worldwide, Nuix excels in tackling complex challenges across investigation, cybersecurity, intelligence, and risk management by uncovering hidden connections and critical evidence within vast datasets.

Unified data analysis across all sources
Advanced digital forensics capabilities
Real-time threat detection and response
NVISIONx
Free

NVISIONx View NVISIONx

NVISIONx is an intelligent data risk governance platform designed to empower organizations to regain control of their enterprise data. By automatically classifying data, NVISIONx provides critical insights needed to identify sensitive information for protection and obsolete data for defensible deletion, significantly reducing compliance scope and storage expenses. Make data-driven decisions to optimize your security posture, minimize risk exposure, and achieve substantial cost savings on data storage.

Automated Data Classification
Data Risk Intelligence
Compliance Scope Reduction
Open Raven
Free

Open Raven View Open Raven

Open Raven is a cloud-native data security platform designed to proactively prevent data breaches attributed to rapid cloud adoption and sprawling infrastructure. It delivers immediate data visibility and control without requiring agents, expertly detecting and mitigating data leaks at their origin, from shadow accounts to misconfigurations and unknown data stores. Empower your organization with real-time monitoring for data at risk, centralizing data governance and significantly improving your overall risk posture and compliance.

Agentless, cloud-native data security
Real-time data discovery and monitoring
Detection of data leaks and misconfigurations
Qohash
Free

Qohash View Qohash

Qohash transforms data protection and asset valuation by enabling organizations to discover, understand, and continuously assure the integrity of their data across hybrid and multi-cloud environments. Our Qostodian platform provides unparalleled visibility and control, enhancing risk management, compliance, and data security postures while reducing operational burdens and associated costs. Empower your organization with intelligent, automated data integrity management.

Automated Data Discovery and Classification
Continuous Data Integrity Monitoring and Assurance
Comprehensive Risk and Compliance Reporting
RecordPoint
Free

RecordPoint View RecordPoint

RecordPoint is a unified data and AI governance platform designed to bring order to complex data environments. It empowers organizations to discover, govern, and control their data across all locations, ensuring robust compliance, enhanced efficiency, and reduced risk. By providing transparency and trust, RecordPoint enables businesses to protect sensitive information, safeguard customer privacy, and leverage data securely for strategic advantage.

Unified Data and AI Governance
Automated Data Discovery and Classification
Data Privacy and Protection Controls
Redstor
Free

Redstor View Redstor

Redstor offers a unified data management platform designed to simplify and secure your organization's data lifecycle. By consolidating backup and recovery, disaster recovery, archiving, and data insight capabilities into a single control center, Redstor provides unparalleled visibility and on-demand access to your data, regardless of its location. This pioneering technology empowers businesses to discover, manage, and control their data comprehensively, ensuring enhanced security and operational efficiency.

Unified Data Management
Backup and Recovery
Disaster Recovery
Sentra
Free

Sentra View Sentra

Sentra empowers cloud-native organizations to regain mastery over their data security. Amidst the increasing complexity of cloud environments and a data-driven strategy, traditional security models falter, leading to a loss of crucial business context. Sentra addresses this gap by providing unparalleled visibility into critical data assets, enabling robust data security practices that proactively mitigate the risk of damaging data breaches and ensure compliance.

Continuous data discovery and classification across cloud environments
Automated data access governance and policy enforcement
Real-time threat detection for data exfiltration and misuse
Tukan IT
Free

Tukan IT View Tukan IT

Tukan IT, now part of Nomios Poland, delivers essential data classification and protection capabilities, seamlessly integrating with Microsoft Office applications. By mandating user-verified classification of documents before saving and emails before sending, Tukan GREENmod ensures sensitive information is always appropriately secured, even beyond the scope of automated DLP policies. This empowers users to actively contribute their knowledge of content sensitivity, significantly reducing the risk of data breaches and accidental data exposure outside the organization.

Mandatory document classification before saving
Enforced email classification before sending
Seamless Microsoft Office integration
Varonis
Free

Varonis View Varonis

Varonis is a comprehensive security platform designed to protect sensitive enterprise data from insider threats and cyberattacks. By automating tedious tasks and extracting valuable insights from unstructured data, Varonis empowers organizations to track, visualize, analyze, and secure their information. Leveraging User Behavior Analytics and metadata extraction, it maps complex relationships within IT infrastructure, providing unparalleled visibility and robust defense for critical assets.

Insider Threat Protection
Automated Data Security Tasks
Unstructured Data Visibility and Analytics
vdiscovery
Free

vdiscovery View vdiscovery

vdiscovery provides specialized, proprietary solutions for computer forensics, document review, and electronic discovery. We custom-develop and adapt software to meet unique client case and data requirements, optimizing data processing and streamlining review and production workflows. Our commitment to customization, innovative technology, and exceptional service ensures timely access to critical evidence and facts.

Proprietary eDiscovery software development
Customized data processing solutions
Streamlined document review workflows
Velotix
Free

Velotix View Velotix

Velotix unlocks your organization's data potential by providing an AI-driven platform for robust data security and compliance. Seamlessly integrate across multi-cloud environments to automate policy management, enforce dynamic access controls, and achieve comprehensive data discovery, thereby enabling secure, self-service data access for optimized utilization without sacrificing governance. Trusted by industry leaders, Velotix empowers you to confidently navigate the complex regulatory landscape and thrive in the 'need to share' era.

AI-Powered Automated Policy Management
Dynamic Access Controls for Secure Data Sharing
Comprehensive Data Discovery and Classification
WiebeTech
Free

WiebeTech View WiebeTech

WiebeTech delivers robust and innovative digital forensics solutions designed for efficient evidence acquisition and disk imaging. Trusted by professionals worldwide, our specialized tools capture critical data from diverse sources, ensuring integrity and security for demanding investigations. Explore WiebeTech for reliable hardware engineered for peak performance in digital forensics and IT workflows.

Physical and Logical Disk Imaging
Secure Data Acquisition
Support for Local and Networked Data