Browse Software
List Your Product
Loading...
Refine Results Clear All
Artificial Intelligence
  • (3)
Starting Price
  • (2)
  • (1)
  • (5)
Deployment
  • (5)
  • (4)
  • (32)
  • (1)
Customer Types
  • (3)
  • (3)
  • (31)
  • (32)
  • (30)
Pricing Model
  • (12)
  • (5)
  • (2)
  • (10)
  • (30)
Integrated With
  • (4)
  • (3)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
Apply Filters
Showing 1 - 20 of 33 Products

Top 5 Kogni Alternatives

HashiCorp Vault logo
Store and Secure Your Valuable Data in A Vault 4.6 Based on 120 Ratings
Visit Website + Add to Compare

What is HashiCorp Vault and how does it work?

HashiCorp Vault securely controls, protects, and secures access to passwords, certificates, tokens, encryption keys for secrets and other user-sensitive data using a UI, CLI or HTTP API. It uses a dynamic infrastructure, which has multiple clouds and private data centers without a clear network perimeter. Vault is API driven, it enables automation and CI/CD use cases while allowing the policy to protect, codify, and govern access to secrets. Value-added features of this infrastructure are low trust networks in public clouds, unknown network perimeter across clouds, and security enforced by identity. It tightly controls access to encryption keys and secrets by authenticating against trusted sources of identity such as Active Directory, CloudFoundry, LDAP, Kubernetes, and cloud platforms. Users can leverage any trusted identity provider such as cloud IAM platforms, Active Directory, Kubernetes or authenticate Vault. HashiCorp Vault enables fine-grained authorization to secrets and encryption keys that users and applications are permitted access to keys and secrets.

Read more

HashiCorp Vault Pricing

  • Free Trial Not Available
  • Starts at $0.03. Offers Custom plan.
Visit Website
ManageEngine DataSecurity Plus logo
Secure Data, protect Business—with ManageEngine DataSecurity Plus 4.4 Based on 9 Ratings
Visit Website + Add to Compare

What is ManageEngine DataSecurity Plus and how does it work?

ManageEngine DataSecurity Plus is an all-in-one platform for managing the organization's data security posture. It offers a range of powerful features, including file server auditing, file integrity monitoring, ransomware detection and response, incident response management, file and permission analysis, data discovery and classification, file copy protection, and prevention of data leaks across endpoints and cloud. It also provides robust protection for cloud applications.

Read more
Visit Website
LepideAuditor Suite logo
The ideal data security platform 4 Based on 1 Ratings
Visit Website + Add to Compare

What is LepideAuditor Suite and how does it work?

Lepide Auditor Suite is an advanced data security platform that provides unrivalled risk reduction and behavioral analysis. The Lepide Data Security Platform helps you protect your data, comply with regulations, and respond to attacks. Whether on-premises or in the cloud, Lepide uses Data-Centric Audit & Protection to provide advanced-level insights into your surrounding and data systems. With Lepide, you can discover, analyze, and safeguard sensitive information. Even the changes to sensitive data and your hybrid environment can be audited, reported on, and alerted to with Lepide. You can additionally keep track of all changes and alterations that users make to important files and directories. Users can identify which people are most likely to pose insider threats by running specific reports for individuals with excessive rights. They can additionally scan, find, and classify data automatically at the moment of generation to keep track of where their sensitive data is stored. To keep on top of your most sensitive data, you can also categorize and evaluate it based on monetary worth, compliance, incidence, risk and much more.

Read more

LepideAuditor Suite Pricing

  • Free Trial Available
  • Offers Custom plan.
Visit Website
VMware AppDefense logo
Workload Protection Software 4.4 Based on 32 Ratings
Visit Website + Add to Compare

What is VMware AppDefense and how does it work?

VMware AppDefense is a new approach to workload protection that models intended application behavior and identifies anomalous activity. Enable application control and allow listing and patch risky software sooner by continuously scanning workloads to highlight vulnerabilities in the OS, hypervisor, or application software. Ensure OS integrity, and provide reputation scores for every process. Provide additional workload context to NSX to assist in the definition of micro-segments, and enable faster and more granular responses to risky workload behavior, by pushing into NSX policies for actions such as quarantining, activity logging, etc.

Read more

VMware AppDefense Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website
VoltShare logo
Secure Data Sharing Write a Review
Visit Website + Add to Compare

What is VoltShare and how does it work?

VoltShare helps you securely share your critical data while ensuring compliance. Send and store confidential information with end-to-end encryption that eliminates the age-old problem of shared secrets and public-key mgmt. Maximize the privacy of your information. Then confidently share information with an individual or group of people. Share your confidential information like you do today Slack, email, Dropbox, SharePoint, etc. Simplify compliance through automated logs and auditability for all shared data including successful and failed decryption attempts.

Read more

VoltShare Pricing

  • Free Trial Not Available
  • Offers Free-forever and Custom plan.
Visit Website

Products Similar to Kogni

Cisco ACI logo
Facilitates application agility and data center automation 4.2 Based on 60 Ratings
Visit Website + Add to Compare

What is Cisco ACI and how does it work?

Cisco ACI is an online-based Data Center Security Software. The Cisco ACI application-driven policy framework automates provisioning and managing of resources, thereby delivering a network that is deployed, monitored, and managed in a fashion that supports DevOps and rapid application change. Take a holistic, systems-based approach to data center security with Cisco Application Centric Infrastructure Security Solutions. These solutions provide a common policy-based operational model across ACI-ready networks. As a result, you can reduce cost and complexity without compromising data center functionality.

Read more

Cisco ACI Pricing

  • Free Trial Available
  • Offers Custom plan.
Visit Website

89% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Securiti logo
Data Controls Cloud 4.9 Based on 35 Ratings
Visit Website + Add to Compare

What is Securiti and how does it work?

Securiti provides a unified platform for organizations to ensure compliance, security, and privacy across all clouds. This platform provides integrated silos for each cloud, as well as silos for security, privacy, governance, and compliance. These silos ensure that the data is securely managed and compliant with industry regulations. This platform provides enterprises with the insight, intelligence, and control needed to safely leverage data and the cloud. They provide the tools and capabilities to ensure enterprise security, privacy, and compliance and enable organizations to take advantage of the cloud while maintaining their data integrity.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 86%
  • Reviews 78%
  • Momentum 64%
  • Popularity 79%

Securiti Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website

91% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Spirion Data Platform logo
Data protection and monitoring made seamless 4.5 Based on 20 Ratings
Visit Website + Add to Compare

What is Spirion Data Platform and how does it work?

Spirion Data Platform as robust data security and privacy management software helps companies combat all possible chances of privacy breaches. With a high data discovery accuracy rate of 98.5%, the software helps companies with the finding and protection part of sensitive data stored at different locations. They can also find both structured and unstructured data across networks, remote file servers, cloud file storage, and endpoints, protecting sensitive data from all possible breaches. Moreover, an active sensitive data classification technology embedded within the same ensures role-specific data access. Spirion Data Platform enables companies to proceed with a comprehensive control and command system related to their structured and unstructured data, facilitating effective data protection and management. Brands are also allowed access to critical insights about the data discovered and classified across their entire organization. Ultimately, with Spirion, users can automatically discover, classify, manage and protect their sensitive data, while ensuring compliance and promoting business agility.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 92%
  • Reviews 86%
  • Momentum 66%
  • Popularity 81%

Spirion Data Platform Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website

98% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Secure Privacy logo
Simplification of GDPA, CCPA, and EU Cookie Laws 5 Based on 192 Ratings
Visit Website + Add to Compare

What is Secure Privacy and how does it work?

Secure Privacy offers an end-to-end solution for California Consumers Protection Act (CCPA), EU General Data Protection Regulation (GDPR), and the General Data Protection Law (LGPD) that can be seamlessly integrated into any website. It is free to try, easy to use, and can work smoothly for any website. This tool helps you operationalize security and privacy programs. Using Secure Privacy, users can automatically log consent for data collection and advertising cookies on a website, sync consent across systems to ensure compliance across websites, and also generate a privacy policy on their website to make it compliant with all the Protection Acts. Additionally, users can export logs from advertising and data collection cookies on a website and keep their solutions up-to-date using the in-built automated website scanning feature. The value-added feature of Secure Privacy is that it gives end-consumers an intuitive preference center to manage their preferences. The user is also given the right to opt-out from data collection and advertising cookies on a website.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 97%
  • Reviews 99%
  • Momentum 63%
  • Popularity 79%

Secure Privacy Pricing

  • Free Trial Available
  • Starts at $8.33. Offers Custom plan.
Visit Website

97% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Safetica logo
Data Protection Software 4.8 Based on 92 Ratings
Visit Website + Add to Compare

What is Safetica and how does it work?

Safetica develops data loss prevention (DLP) software that assists small and medium-sized companies with the same quality data protection that their larger counterparts have and at an affordable cost, with no additional administration or disruption in operations. They provide elegant, creative, and practical solutions to logical problems. This software performs a security audit, enables users to be informed about the situation within their organization, and prevents sensitive data from falling into the wrong hands. One of this software’s critical features is that it can be deployed in a few hours by securing users’ information easily and quickly. Safetica enables users to identify problems in internal processes and implement their solutions. A company can ascertain how its employees work and use expensive software using behavior analysis, thus controlling if needed. Users can define which devices can be used by their organizations, enabling them to eliminate the risks of BYOD. Safetica simplifies the process of Information Protection Security Acts compliance by allowing users to comply with regulatory compliance requirements efficiently. Users receive real-time notifications in the event of any data leakage incident.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 100%
  • Reviews 83%
  • Momentum 70%
  • Popularity 89%

Safetica Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website
Onerep logo
Ultimate shield for digital privacy and peace of mind Write a Review
Visit Website + Add to Compare

What is Onerep and how does it work?

Onerep is a fully automated, AI-powered privacy platform designed to safeguard personal information from unauthorized exposure on the internet. This cutting-edge data extraction software scans the web to identify and remove listings that reveal sensitive details like their street address, phone number, email, and date of birth. With privacy being a fundamental right, it's natural to feel violated when their private information is publicly displayed. Onerep not only protects their personal and professional reputation but also shields they from potential threats posed by individuals armed with their data. Identity theft and inaccurate information can ruin years of hard work and take months to recover from. Onerep's efficient and user-friendly approach ensures their safety and peace of mind, making it an essential tool for maintaining their digital privacy.

Read more

Onerep Pricing

  • Free Trial Available
  • Starts at $9.58. Offers Custom plan.
Visit Website
Omnifact logo
Privacy-First AI for Enhanced Productivity and Innovation Write a Review
Visit Website + Add to Compare

What is Omnifact and how does it work?

Omnifact is revolutionizing workplace productivity with its privacy-first generative AI platform. Designed specifically for businesses, it ensures seamless access to generative AI while keeping the data secure and under control. With Omnifact, businesses boost productivity, streamline knowledge management, and ignite innovation all without compromising on data security. The platform's commitment to privacy and security is exemplified by its GDPR compliance and flexible deployment options, offering both cloud-hosted and on-premise solutions. This vendor-independent platform allows companies the freedom to choose from a variety of language models, providing flexibility and total data control. Omnifact stands as a supportive partner, simplifying complex tasks to let users focus on business growth and content creation. It’s an enthusiastic ally in the digital landscape, making enterprise-grade AI accessible with ease, and ensuring that users can engage the full potential of AI without sacrificing privacy.

Read more

Omnifact Pricing

  • Free Trial Not Available
  • Offers Free-forever and Custom plan.
Visit Website
Monoid logo
Automate data privacy the open-source way Write a Review
Visit Website + Add to Compare

What is Monoid and how does it work?

Monoid is a powerful open-source solution designed to automate Data Subject Requests (DSR) across data silos. It helps organizations quickly and easily access, find, and map user data that is stored in different places. The Monoid Cloud can be used to detect Personally Identifiable Information (PII) and keep data maps updated. Monoid comes with connectors that make it possible to automate the entire process of obtaining user data across silos. All you need to do is pass in the relevant user identifiers and Monoid will take care of the rest. It can delete or export user data from accessible sources in just minutes, and then pass on the requests to vendors that manage their own systems. Using Monoid to automate DSRs will help organizations save time, resources, and maximize data protection. It's a comprehensive platform that can be used to securely store and manage user data, making it easier for organizations to comply with data privacy regulations.

Read more

Monoid Pricing

  • Free Trial Not Available
  • Starts at $399.00. Offers Custom plan.
Visit Website
GetSecured logo
Comprehensive Enterprise Data Protection Program Write a Review
Visit Website + Add to Compare

What is GetSecured and how does it work?

GetSecured is a security scanning tool that can be used to find breached data, web app vulnerabilities, data leakage, whether the employees' emails are breached somewhere or not and many more. Our tool can be easily understood by a non-technical person also. We have a super cool dashboard in which you can view all your previous scan details like from which country the asset is located and many more.

Read more

GetSecured Pricing

  • Free Trial Not Available
  • Starts at $199.00. Offers Custom plan.
Visit Website
Unomaly logo
Algorithmic Data Monitoring and Prioritization Tool 4.8 Based on 6 Ratings
Visit Website + Add to Compare

What is Unomaly and how does it work?

Unomaly is a smart next-generation tool that leverages algorithmic system monitoring to sift through user data. With the resulting analysis, the tool learns and detects the generally associated data trends. A great tool for data centers, it constantly delivers automatic log analysis that evolves to the ever-changing needs of data centers. Unomaly can analyze log data from the complete software stack, including containers, servers, and applications. The tool then leverages this analysis to set up the foundation of recognizing anomalies as they happen, including problems, abnormal incidents, and hacks. As a result, users can actively determine the root causes of outages and take action due to relevant insights to prevent system failures or breaches. With a profile of the entire data center, Unomaly keeps track of every past and probable event, isolating the data from the associated problem. By digging through the detail logs, users can understand how an incident escalated throughout its life cycle.

Read more

Unomaly Pricing

  • Free Trial Available
  • Offers Free-forever and Custom plan.
Visit Website
Aaronis Cyberprotect Cloud logo
Prevent client downtime and data loss Write a Review
Visit Website + Add to Compare

What is Aaronis Cyberprotect Cloud and how does it work?

Acronis Cyber Protect Cloud is the ultimate solution for service providers, offering unified backup and next-generation AI-based anti-malware and antivirus protection management. By integrating and automating these processes, service providers can significantly reduce complexity and increase productivity while also cutting operating costs. The advanced AI-based behavioral detection engine provides the best protection against malware, ransomware, and zero-day attacks on client workloads. Additionally, full-image and file-level backup and recovery capabilities ensure that workloads on more than 20 platforms are safeguarded with near-zero Recovery Point Objectives and Recovery Time Objectives.

Read more
Visit Website
CipherCloud logo
Turn your business relevant data into undecipherable cyphers to protect them 4.7 Based on 3 Ratings
Visit Website + Add to Compare

What is CipherCloud and how does it work?

CipherCloud is endpoint-to-cloud security software that simply helps in protecting digital data with the best stringent layers. CipherCloud provides a secure access service edge (SASE), transforming legacy parameter security into an array of cloud-delivered security capabilities that can be accessed whenever necessary. It works efficiently thanks to the SD-WAN core network component that is also referred to as the software-defined wide area network. Further, CipherCloud and its cloud security components support multiple integrations that eliminate the mundanity of working from a specifically designated location. The lookout security service edge of the same addresses identity and credentials protection, detects and mitigates threats, connects and secures the modern workforce with protected layering and ultimately safeguards web and cloud usage. It further eliminates the foggy possibilities of risks by providing a clear view of what is happening on both managed and neglected endpoints within the cloud and everywhere in between. The SSE analyses behavioural changes to identify file threats and unsolicited cyberattacks. The risk endpoints are also monitored continuously and the user access is modified within regular intervals to enhance data protection.

Read more

CipherCloud Pricing

  • Free Trial Available
  • Offers Custom plan.
Visit Website
Kanary logo
Stop spam, hacks Write a Review
Visit Website + Add to Compare

What is Kanary and how does it work?

Stop the creeps from easily looking up your data on hundreds of websites. Kanary is here to help! This cutting-edge technology and outstanding support team will help keep personal data safe and secure. They specialize in locating and deleting any data that could potentially put in harm's way. They focus on the data that could be used for account takeovers, impersonation attempts, and spam. With Kanary, user can relax and feel secure knowing that data is in good hands and won't be used for nefarious purposes. Don't wait any longer, let's put a stop to creeps with Kanary.

Read more

Kanary Pricing

  • Free Trial Available
  • Starts at $14.99.
Visit Website
XFA logo

XFA

Effortless device security, complete peace of mind Write a Review
Visit Website + Add to Compare

What is XFA and how does it work?

Effortlessly secure every device accessing their company's data with XFA's seamless device security. XFA ensures comprehensive protection by identifying all devices, including those often overlooked, that connect to their business platforms. Its privacy-focused design offers unparalleled transparency into the device landscape without compromising user trust. Businesses can become compliant with no extra effort, thanks to features like automated reminders and verification requests that keep employees vigilant about security. Weekly reports provide valuable insights into their security posture, creating a proactive approach to protecting their systems. With ease of deployment, XFA can be quickly integrated into their workflow, making it ideal for a secure BYOD (Bring Your Device) environment or supporting remote work. XFA verifies critical security settings such as auto-updates and encryption, allowing you to enforce conditional access seamlessly with tools like Microsoft, Google, and Okta. It’s a practical, user-friendly solution for safeguarding their company and empowering their team.

Read more

XFA Pricing

  • Free Trial Available
  • Starts at $245.83. Offers Custom plan.
Visit Website
Datto SaaS Defense logo
Advanced Threat Protection for Microsoft 365 4.4 Based on 10 Ratings
Visit Website + Add to Compare

What is Datto SaaS Defense and how does it work?

Datto SaaS Defense is the perfect solution for MSPs to protect their clients from the latest malware, business email compromise (BEC), and phishing attacks targeting Microsoft Exchange, OneDrive, SharePoint, and Teams. Armed with the latest AI-driven threat detection capabilities, Datto SaaS Defense can detect zero-day threats as soon as they appear, so clients don’t have to suffer the consequences of waiting days or even weeks to discover an attack. The security solution is designed to be data-independent, so it can easily be integrated into existing Microsoft 365 environments and keep data safe without disrupting the user experience. Its advanced proactive protection capabilities are tailored to detect and prevent ransomware, malware, phishing attempts and BEC attacks, while also providing reliable security for OneDrive, SharePoint, and Teams data.

Read more

Datto SaaS Defense Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed