Data center security software helps companies ensure their networks and physical computing infrastructure remain secure and functional. It provides a server firewall and malware prevention to detect and stop threats or unauthorized access. Companies with their own data centers or third party infrastructure providers use these tools to make sure their services are delivered firmly. Organizations utilize data center security tools to maintain websites, host databases, deploy applications and for optimizing many other computing services. It’s a key tool which facilitates enforcement of security standards and assists in security risk analysis.
Unomaly pricing: Unomaly Offers Free-forever and Custom plan.
What is Unomaly and how does it work?
Unomaly is a smart next-generation tool that leverages algorithmic system monitoring to sift through user data. With the resulting analysis, the tool learns and detects the generally associated data trends. A great tool for data centers, it constantly delivers automatic log analysis that evolves to the ever-changing needs of data centers. Unomaly can analyze log data from the complete software stack, including containers, servers, and applications. The tool then leverages this analysis to set up the foundation of recognizing anomalies as they happen, including problems, abnormal incidents, and hacks. As a result, users can actively determine the root causes of outages and take action due to relevant insights to prevent system failures or breaches. With a profile of the entire data center, Unomaly keeps track of every past and probable event, isolating the data from the associated problem. By digging through the detail logs, users can understand how an incident escalated throughout its life cycle. show more
VMware AppDefense pricing: VMware AppDefense Offers Custom plan.
What is VMware AppDefense and how does it work?
VMware AppDefense is a new approach to workload protection that models intended application behavior and identifies anomalous activity. Enable application control and allow listing and patch risky software sooner by continuously scanning workloads to highlight vulnerabilities in the OS, hypervisor, or application software. Ensure OS integrity, and provide reputation scores for every process. Provide additional workload context to NSX to assist in the definition of micro-segments, and enable faster and more granular responses to risky workload behavior, by pushing into NSX policies for actions such as quarantining, activity logging, etc. show more
HashiCorp Vault pricing: Starts at $0.03. Offers Custom plan.
What is HashiCorp Vault and how does it work?
HashiCorp Vault securely controls, protects, and secures access to passwords, certificates, tokens, encryption keys for secrets and other user-sensitive data using a UI, CLI or HTTP API. It uses a dynamic infrastructure, which has multiple clouds and private data centers without a clear network perimeter. Vault is API driven, it enables automation and CI/CD use cases while allowing the policy to protect, codify, and govern access to secrets. Value-added features of this infrastructure are low trust networks in public clouds, unknown network perimeter across clouds, and security enforced by identity. It tightly controls access to encryption keys and secrets by authenticating against trusted sources of identity such as Active Directory, CloudFoundry, LDAP, Kubernetes, and cloud platforms. Users can leverage any trusted identity provider such as cloud IAM platforms, Active Directory, Kubernetes or authenticate Vault. HashiCorp Vault enables fine-grained authorization to secrets and encryption keys that users and applications are permitted access to keys and secrets. show more
Symantec Data Center Security pricing: Symantec Data Center Security Offers Custom plan.
What is Symantec Data Center Security and how does it work?
Symantec Data Center Security is an online-based Data Center Security Software. Optimize security performance in VMware environments with agentless antimalware protection, network intrusion prevention, and file reputation services. ICDx simplifies product integrations and accelerates customer time to value across the Symantec enterprise portfolio and the industry’s largest partner ecosystem. Prepare higher quality cyber data to forward to SIEM and other SOC tools enhancing analytics and alert speed responses to critical incidents with orchestrated actions targeting multiple Symantec products. show more
AppViewX ADC+ pricing: AppViewX ADC+ Offers Custom plan.
What is AppViewX ADC+ and how does it work?
AppViewX ADC+ provides GUI-based, API-driven, out-of-the-box solutions that simplify and speed up ADC lifecycle automation. Enable users to create custom automation workflows using a simple, drag and drop interface and task library. Allow app teams to provision and automate ADC services, enable/disable objects for blue-green deployments, etc. with a single click from RBAC-powered dashboards and persona-based service catalogs. Automate ADC lifecycle end-to-end with AppViewX’s native workflow automation, or bring your own automation. show more
Cisco ACI pricing: Cisco ACI Offers Custom plan.
What is Cisco ACI and how does it work?
Cisco ACI is an online-based Data Center Security Software. The Cisco ACI application-driven policy framework automates provisioning and managing of resources, thereby delivering a network that is deployed, monitored, and managed in a fashion that supports DevOps and rapid application change. Take a holistic, systems-based approach to data center security with Cisco Application Centric Infrastructure Security Solutions. These solutions provide a common policy-based operational model across ACI-ready networks. As a result, you can reduce cost and complexity without compromising data center functionality. show more
ServerProtect for Linux pricing: ServerProtect for Linux Offers Custom plan.
What is ServerProtect for Linux and how does it work?
Trend Micro ServerProtect™ for Linux 3.0 offers comprehensive real-time protection for enterprise web servers and file servers, preventing them from spreading viruses, spyware, and other Web threats to internal or external endpoints. Real-time, on-demand and scheduled scanning use the latest multi-threaded scanning engine for the highest performance while kernel-level scanning minimizes performance degradation. Enables central management of attack information, policy deployment, pattern file and scan engine deployment, and reports on policy implementation. show more
Kodex pricing: Kodex Offers Custom plan.
What is Kodex and how does it work?
Kodex manages relationships, workflows, and secure file transfers with government agencies that are seeking confidential and restricted information on your company's users. The founders at Kodex bring a unique blend of expertise from both the FBI and private sector technology leadership. We have seen firsthand how difficult it is for the Public and Private Sectors to effectively work together to prevent online abuse. It is a complex process that perpetuates bad faith between both parties. Kodex was created to rectify this relationship. show more
Kogni pricing: Kogni Offers Custom plan.
What is Kogni and how does it work?
Kogni is an intuitive data storage manager that helps in finding, securing and monitoring sensitive data from a system. It makes the process simple by identifying the personal data without any manual interference. Further, it stores the information in a secure way. Business personnel can use this software to conduct data audits, and then maintain its confidentiality. Moreover, Kogni provides the best data governance with utmost security. Businesses can also migrate their sensitive data to the cloud hassle-free. It is a three-step process that the software follows. Firstly, the software discovers sensitive data. It does this by maintaining the norms of CCPA and GDPR besides other regulatory formalities. Secondly, the solution secures data where it is present by providing advanced protection from underlying threats. It is the best prevention strategy to avoid losses of sensitive data. And the final step includes monitoring the collected information. Monitoring tools included providing real-time alerts to help with data management without policy violations. show more
ManageEngine OpManager Plus pricing: Starts at $1233.0.
What is ManageEngine OpManager Plus and how does it work?
OpManager Plus is a powerful, integrated solution that streamlines the process of IT operations management, eliminating the need for multiple monitoring tools. This holistic tool provides greater visibility across your IT infrastructure, helping you to remove operational bottlenecks, optimize performance and gain the maximum output from your IT infrastructure. With advanced IT operations monitoring and management capabilities, OpManager Plus offers four layers of visibility into an organization's IT operations - IT infrastructure security, IT infrastructure application performance, server and storage IT operations, and network performance. This multi-level visibility into IT operations helps IT admins identify and troubleshoot faults at various levels easily, thereby ensuring greater SLA compliance, proactive IT fault management, greater customer service and consistent IT infrastructure performance. show more
CipherCloud pricing: CipherCloud Offers Custom plan.
What is CipherCloud and how does it work?
CipherCloud is endpoint-to-cloud security software that simply helps in protecting digital data with the best stringent layers. CipherCloud provides a secure access service edge (SASE), transforming legacy parameter security into an array of cloud-delivered security capabilities that can be accessed whenever necessary. It works efficiently thanks to the SD-WAN core network component that is also referred to as the software-defined wide area network. Further, CipherCloud and its cloud security components support multiple integrations that eliminate the mundanity of working from a specifically designated location. The lookout security service edge of the same addresses identity and credentials protection, detects and mitigates threats, connects and secures the modern workforce with protected layering and ultimately safeguards web and cloud usage. It further eliminates the foggy possibilities of risks by providing a clear view of what is happening on both managed and neglected endpoints within the cloud and everywhere in between. The SSE analyses behavioural changes to identify file threats and unsolicited cyberattacks. The risk endpoints are also monitored continuously and the user access is modified within regular intervals to enhance data protection. show more
Monoid pricing: Starts at $399.0. Offers Custom plan.
What is Monoid and how does it work?
Monoid is a powerful open-source solution designed to automate Data Subject Requests (DSR) across data silos. It helps organizations quickly and easily access, find, and map user data that is stored in different places. The Monoid Cloud can be used to detect Personally Identifiable Information (PII) and keep data maps updated. Monoid comes with connectors that make it possible to automate the entire process of obtaining user data across silos. All you need to do is pass in the relevant user identifiers and Monoid will take care of the rest. It can delete or export user data from accessible sources in just minutes, and then pass on the requests to vendors that manage their own systems. Using Monoid to automate DSRs will help organizations save time, resources, and maximize data protection. It's a comprehensive platform that can be used to securely store and manage user data, making it easier for organizations to comply with data privacy regulations. show more
Aaronis Cyberprotect Cloud pricing: Aaronis Cyberprotect Cloud Offers Custom plan.
What is Aaronis Cyberprotect Cloud and how does it work?
Acronis Cyber Protect Cloud is the ultimate solution for service providers, offering unified backup and next-generation AI-based anti-malware and antivirus protection management. By integrating and automating these processes, service providers can significantly reduce complexity and increase productivity while also cutting operating costs. The advanced AI-based behavioral detection engine provides the best protection against malware, ransomware, and zero-day attacks on client workloads. Additionally, full-image and file-level backup and recovery capabilities ensure that workloads on more than 20 platforms are safeguarded with near-zero Recovery Point Objectives and Recovery Time Objectives. show more
Datto SaaS Defense pricing: Datto SaaS Defense Offers Custom plan.
What is Datto SaaS Defense and how does it work?
Datto SaaS Defense is the perfect solution for MSPs to protect their clients from the latest malware, business email compromise (BEC), and phishing attacks targeting Microsoft Exchange, OneDrive, SharePoint, and Teams. Armed with the latest AI-driven threat detection capabilities, Datto SaaS Defense can detect zero-day threats as soon as they appear, so clients don’t have to suffer the consequences of waiting days or even weeks to discover an attack. The security solution is designed to be data-independent, so it can easily be integrated into existing Microsoft 365 environments and keep data safe without disrupting the user experience. Its advanced proactive protection capabilities are tailored to detect and prevent ransomware, malware, phishing attempts and BEC attacks, while also providing reliable security for OneDrive, SharePoint, and Teams data. show more
Kanary pricing: Kanary Offers Custom plan.
What is Kanary and how does it work?
Stop the creeps from easily looking up your data on hundreds of websites. Kanary is here to help! This cutting-edge technology and outstanding support team will help keep personal data safe and secure. They specialize in locating and deleting any data that could potentially put in harm's way. They focus on the data that could be used for account takeovers, impersonation attempts, and spam. With Kanary, user can relax and feel secure knowing that data is in good hands and won't be used for nefarious purposes. Don't wait any longer, let's put a stop to creeps with Kanary. show more
AppOmni pricing: AppOmni Offers Custom plan.
What is AppOmni and how does it work?
Organizations today rely heavily on SaaS applications and the data they contain. The security of this data is paramount, and AppOmni provides the necessary processes and tools to ensure it remains secure and compliant. We offer security expertise and insights, as well as continuous monitoring, for a broad range of SaaS applications. Our Developer Platform also allows us to extend our in-depth coverage to any SaaS app, whether it's from a vendor or custom-built in-house. With AppOmni, organizations can rest assured that their SaaS environment is secure and compliant at all times. show more
Hitachi Content Intelligence pricing: Hitachi Content Intelligence Offers Custom plan.
What is Hitachi Content Intelligence and how does it work?
Hitachi Content Intelligence maximizes data value to deliver the information you need to make the smartest business decisions. Mitigate your industry’s data growth and sprawl and easily find the data you need. Enrich your data to deliver the most relevant information that your business needs to stay informed. Aggregate data from any sources, surface new insights and boost productivity with robust searches. show more
Privata.ai pricing: Privata.ai Offers Custom plan.
What is Privata.ai and how does it work?
Privata.ai software is a platform used to monitor data inside your Application. Track connections to sensitive data and remove false positives that are inherent in network activity with breach detection using Machine Learning. Collect data to start training your algorithm with data access information per individual user and user group over time. Create custom-made alerts to collect the better algorithms become at detecting an attacker. Small, Medium and Large companies make use of the software. show more
JupiterOne pricing: Starts at $500.0. Offers Free-forever and Custom plan.
What is JupiterOne and how does it work?
Secure attack surface with continuous asset discovery and attack path analysis. Reduce risk, triage incidents, and prioritize vulnerability findings with greater clarity and 85% fewer SecOps resources. As cloud expands, so does threat landscape. To stay secure, need to understand all of cyber assets. Context into cyber assets becomes the foundation for cloud security posture, asset management, incident response, SecOps, compliance, vulnerability management, and more. show more
PRODUCT NAME | AGGREGATED RATINGS (OUT OF 5) |
---|---|
![]() |
4.8 |
![]() |
4.3 |
![]() |
4.3 |
![]() |
4.3 |
![]() |
4.3 |
![]() |
4 |
![]() |
2.5 |
![]() |
NA |
![]() |
NA |
![]() |
NA |