Data & Collaboration Security

Get Started. It's Free
or sign up with your email address
Rocket clouds
Data & Collaboration Security by Mind Map: Data & Collaboration Security

1. Data Classification and Tracking

1.1. Banyan Solutions

1.2. BoldonJames

1.3. Digital Guardian

1.4. HP

1.5. IBM

1.6. Identity Finder

1.7. Mach1 Development

1.8. Microsoft (Formerly Secure Islands)

1.9. MinerEye

1.10. Nuix

1.11. Smartlogic

1.12. Titus

1.13. Varonis

1.14. CoSoSys

2. Data Governance and Classification

2.1. Boldonjames

2.2. Expert Source

2.2.1. http://www.expertsource.in/index.php

2.3. HP

2.4. IBM

2.5. Informatica

2.6. Nuix

2.7. Somansa

2.8. Titus

2.9. ThinAir

3. Data Loss Prevention (DLP)

3.1. Endpoint

3.1.1. Mobile

3.1.1.1. Symantec

3.1.1.2. Websense

3.1.1.3. Microsoft (Secure Islands)

3.1.2. Windows

3.1.2.1. Absolute Software

3.1.2.2. CA Technologies

3.1.2.3. Digital Guardian

3.1.2.4. GTB Technologies

3.1.2.5. Infowatch

3.1.2.6. McAfee

3.1.2.7. RSA

3.1.2.8. Microsoft (Secure Islands)

3.1.2.9. Somansa

3.1.2.10. Symantec

3.1.2.11. Trustwave

3.1.2.12. Watchful Software

3.1.2.13. Raytheon-Websense

3.1.2.14. Zecurion

3.2. Network

3.2.1. Digital Guardian

3.2.2. Fidelis Security Systems (Subsidiary of General Dynamics)

3.2.3. Symantec

3.2.4. InfoWatch

3.3. Secure Email Gateway

3.3.1. Cisco

3.3.2. Symantec

3.3.3. McAfee

3.3.4. Somansa

3.4. Secure Web Gateway

3.4.1. McAfee

3.4.2. Symantec

3.4.3. Somansa

3.5. Breached Data Detection

3.5.1. Consumer

3.5.1.1. haveibeenpwned.com

3.5.1.1.1. https://haveibeenpwned.com/

3.5.2. Enterprise

3.5.2.1. Hold Security

3.5.2.1.1. http://holdsecurity.com/

3.5.2.2. Infoarmor

3.5.2.2.1. https://www.infoarmor.com/

3.5.2.3. Ionic

3.5.2.3.1. https://www.ionic.com/

3.5.2.4. SpyCloud

3.5.2.4.1. https://spycloud.com/

4. Database Security

4.1. Database Audit and Protection (DAP)

4.1.1. Application Security, Inc

4.1.2. BeyondTrust

4.1.3. Big Data Platform DAP

4.1.3.1. BlueTalon

4.1.3.2. Cloudera

4.1.3.2.1. Sentry

4.1.3.3. Hortonworks

4.1.3.3.1. Ranger

4.1.3.4. IBM

4.1.3.5. Imperva

4.1.4. DataSunrise

4.1.5. Datiphy

4.1.6. Fortinet

4.1.7. Hexatier

4.1.8. IBM

4.1.9. IRI

4.1.9.1. Oracle

4.1.9.2. SQL Server

4.1.10. Imperva

4.1.11. McAfee

4.1.12. Mentis Software

4.1.13. Oracle Corp

4.1.14. PentaSecurity

4.1.15. Warevalley

4.2. Database Activity Monitoring

4.2.1. DB Networks

4.2.2. Datiphy

4.2.3. Imperva

4.2.4. McAfee

4.2.5. Somansa

5. Encryption/Tokenization

5.1. Big Data

5.1.1. Gazzang

5.1.2. Vormetric

5.2. Cloud/SAAS Encryption

5.2.1. Appliances

5.2.1.1. Office365

5.2.1.1.1. Vaultive

5.2.1.1.2. FiLink

5.2.1.2. Ciphercloud

5.2.1.3. Afore Solutions

5.2.1.3.1. CloudLink VSA

5.2.1.4. Perspecsys

5.2.2. Software

5.2.2.1. BoxCryptor

5.2.2.2. CloudMask

5.2.2.3. PrivateCore

5.2.2.4. Trend Micro

5.2.2.4.1. SecureCloud

5.2.2.5. Viivo

5.2.2.6. Voltage Security

5.2.3. Software as a Service

5.2.3.1. Trend Micro

5.2.3.1.1. SecureCloud

5.2.3.2. SooKasa

5.2.3.3. Thales

5.2.3.3.1. SafeMonk

5.3. Cryptographic Providers

5.3.1. RSA

5.3.2. Quintessence

5.3.3. Microsoft

5.4. Data masking

5.4.1. Oracle

5.4.2. Dataguise

5.4.3. Informatica

5.4.4. IBM

5.4.5. Voltage Security

5.4.6. Green SQL

5.4.7. Mentis

5.4.8. Compuware

5.4.9. Axis

5.4.10. Privacy Analytics

5.4.11. Camouflage Software

5.4.12. Solix Technologies

5.4.13. Net 2000

5.5. Database

5.5.1. Thales

5.5.2. Dark Matter Labs

5.5.3. Vormetric

5.6. Email

5.6.1. ZixCorp

5.6.2. Encryptics

5.6.2.1. https://www.encryptics.com/default.aspx

5.7. Encrypted USB Storage

5.7.1. Apricorn

5.7.2. Datalocker

5.7.3. EgoSecure

5.7.4. Integral Memory

5.7.5. IronKey

5.7.6. Kingston

5.7.7. Virbatim

5.8. File/Folder

5.8.1. Covertix

5.8.1.1. http://www.covertix.com/

5.8.2. EgoSecure

5.8.3. IBM

5.8.3.1. Mainframe

5.8.3.1.1. z10

5.8.4. SecureIslands

5.8.5. Sophos

5.8.5.1. SafeGuard Enterprise (Utimaco)

5.8.6. Symantec (PGP)

5.8.7. Vormetric

5.8.8. WinMagic

5.8.8.1. SecureDoc

5.9. Quantum Encryption

5.9.1. IDQ

5.9.2. Quintessence Labs

5.9.3. Whitewood Encryption

5.10. Tokenization

5.10.1. Protegrity

5.11. Whole Disk

5.11.1. CheckPoint Software

5.11.2. EgoSecure

5.11.3. Encryption Management

5.11.3.1. Wave Systems

5.11.4. McAfee

5.11.5. Microsoft

5.11.5.1. Bitlocker

5.11.6. Sophos

5.11.6.1. SafeGuard Enterprise (Utimaco)

5.11.7. Symantec (PGP)

5.11.8. Trustwave

5.11.8.1. DataControl

5.11.9. Vormetric

5.11.10. WinMagic

5.11.10.1. SecureDoc

6. Enterprise File Syncronization and Share

6.1. Accellion

6.2. Blackberry

6.3. Box

6.4. Citrix

6.5. Covata

6.6. Dropbox

6.7. Egnyte

6.8. Google

6.9. Huddle

6.10. Intralinks

6.11. Microsoft

6.12. Syncplicity

6.13. Thru

6.14. Varonis

7. File Analysis Software

7.1. Acaveo

7.2. Active Navigation

7.3. AvePoint

7.4. Beyond Recognition

7.5. Bloomberg

7.6. CommVault

7.7. Condrey

7.8. Covertix

7.9. DataGlobal

7.10. DataGravity

7.11. Equivio

7.12. HP

7.12.1. Control Point

7.13. HiSoftware

7.14. IBM

7.14.1. StoreIQ

7.15. Identifty Finder

7.16. Imperva

7.17. Index Engines

7.18. Kazoup

7.19. MailGuard

7.20. NTP Software

7.21. Novell

7.22. Nuix

7.23. Proofpoint

7.24. Stealthbits

7.25. ThinAir

7.26. Varonis

7.27. WatchDox

7.28. Whitebox Security

7.29. ZyLab

8. Hardware Security Modules (HSM)

8.1. Cloud HSM

8.1.1. Amazon

8.1.2. IBM

8.2. Hardware

8.2.1. FutureX

8.2.2. Thales

8.2.3. HPE

8.2.4. Safenet

8.2.5. Thales

9. Software Defined Storage Security

9.1. Dispersive Networks

9.1.1. https://dispersivetechnologies.com/

9.2. OceansBlue

9.2.1. http://www.oceansblue.net/index.html

10. eSignatures

10.1. Adobe eSign Services

10.2. Alphatrust

10.3. Docusign

10.4. Hellosign

10.5. Rightsignature

10.6. Sertifi