Help developers discover the tools you use. Get visibility for your team's tech choices and contribute to the community's knowledge.
It is a comprehensive data protection platform that enables security teams to automatically analyze what is happening in sensitive-data environments (databases, data warehouses, big data platforms, cloud environments, files systems, and so on) to help minimize risk and protect sensitive data. | It is a leading software provider for partition manager, data backup, and recovery. |
Automatically discover and classify sensitive data;
Identify data at risk and get remediation recommendations;
Monitor access and protect data;
Simplify security and compliance reporting;
Encrypt data across environments;
Use contextual insights and analytics;
Get a business perspective on data risk | PC Data Recovery;
Mac Data Recovery;
Manage Partitions;
Backup Utility;
PC Transfer;
Video Editing;
Screen Recorder |
Statistics | |
Stacks 9 | Stacks 0 |
Followers 15 | Followers 1 |
Votes 0 | Votes 0 |
Integrations | |
| No integrations available | |

AWS Key Management Service (KMS) is a managed service that makes it easy for you to create and control the encryption keys used to encrypt your data, and uses Hardware Security Modules (HSMs) to protect the security of your keys. AWS Key Management Service is integrated with other AWS services including Amazon EBS, Amazon S3, and Amazon Redshift. AWS Key Management Service is also integrated with AWS CloudTrail to provide you with logs of all key usage to help meet your regulatory and compliance needs.

In order to keep costs low, Amazon Glacier is optimized for data that is infrequently accessed and for which retrieval times of several hours are suitable. With Amazon Glacier, customers can reliably store large or small amounts of data for as little as $0.01 per gigabyte per month, a significant savings compared to on-premises solutions.

Ellipticc — End-to-end encrypted, post-quantum secure cloud storage for privacy-first users and teams.

Secure key management is essential to protect data in the cloud. Use Azure Key Vault to encrypt keys and small secrets like passwords that use keys stored in hardware security modules (HSMs). For more assurance, import or generate keys in HSMs, and Microsoft processes your keys in FIPS 140-2 Level 2 validated HSMs (hardware and firmware). With Key Vault, Microsoft doesn’t see or extract your keys. Monitor and audit your key use with Azure logging—pipe logs into Azure HDInsight or your security information and event management (SIEM) solution for more analysis and threat detection.

It powers apps from development through their entire life cycle, so our customers can deliver differentiated, high-performing, and secure digital experiences.

It is a backup program that is fast, efficient and secure. It uses cryptography to guarantee the confidentiality and integrity of your data.

It is industry-leading Backup & Replication software. It delivers availability for all your cloud, virtual and physical workloads. Through a simple-by-design management console, you can easily achieve fast, flexible and reliable backup, recovery and replication for all your applications and data.

It is a deduplicating backup program. It provides an efficient and secure way to backup data. The data deduplication technique used makes it suitable for daily backups since only changes are stored. The authenticated encryption technique makes it suitable for backups to not fully trusted targets.

A platform to help organizations be more trusted, and operationalize privacy, security, data governance, and compliance programs.

It is an enterprise security information and event management (SIEM) product. It includes out-of-the-box analytics, correlation rules and dashboards to help customers address their most pressing security use cases — without requiring significant customization effort.