• Categories

    • Loading categories...

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Data Security Platforms

Data Security Platforms Reviews and Ratings

What are Data Security Platforms?

Data security platforms (DSPs) combine data discovery, policy definition and policy enforcement across data silos. Policy enforcement capabilities include format-preserving encryption, tokenization and dynamic data masking. These capabilities can be delivered through connectors, agents, proxies and APIs.

Business requirements to leverage data and share data, for example for AI/ML use cases, require data security controls and highly-granular data access which is provisioned fast and humanly understandable. Tight-fitting data access and security controls allow you to reveal and share (leverage) more of your data. However, organizations face sufficient complexity when it comes to provisioning and rightsizing entitlements and data security controls. This extends to data privacy as well as analytics governance and ethics.

The DSP delivers most of the required components critical to enabling good data governance and optimized data security controls while preventing the exponential increase of data access and policy rules.

Learn More About This Category
How Categories and Markets Are Defined

Product Listings

Filter by

Products 1 - 20 of 23
Sort by
Logo of CipherTrust Data Security Platform

CipherTrust Data Security Platform

By Thales

4.6
(63 Ratings)

Thales is a worldwide entity focusing on digital security. The company's main objective is to provide trust in an ever-increasing digitally interconnected society. To achieve this, Thales has developed a variety of products, software, and services that hinge on two foundational technologies: digital identification and data security. These technologies play a crucial role in various aspects of contemporary life such as payment methods, enterprise security, and the internet of things. The purpose of the technology is to assist in delivering digital services securely for a multitude of individuals and things.

Show More Details
Logo of IBM Guardium

IBM Guardium

By IBM

4.3
(62 Ratings)

IBM is a well-established entity focused on technology and development. The primary mission revolves around fostering technological growth and enhancing infrastructure, achieved through focused developments and consulting services. By encouraging inventiveness and innovation, it is geared towards facilitating the transition of theoretical ideas into practical realities, thus improving global functionalities. IBM brings about transformation by creating advanced solutions that reshape and redefine the world.

Show More Details
Logo of Cyera Platform

Cyera Platform

By Cyera

4.5
(6 Ratings)

Cyera is the data security company that gives businesses deep context on their data, applying correct, continuous controls to assure cyber-resilience and compliance. Cyera takes a data-centric approach to security across your data landscape, empowering security teams to know where their data is, what exposes it to risk, and take immediate action to remediate exposures.

Cyera overcomes the key challenges security teams face when securing their data. Security teams struggle to understand where they manage their data, what their data represents, and how to remediate exposures to security, privacy, and regulatory requirements. Cyera is the data security platform purpose-built to improve your cyber-resilience, assure compliance, and optimize costs for the cloud era.

Show More Details
Logo of Fasoo Enterprise DRM

Fasoo Enterprise DRM

By Fasoo

4.8
(5 Ratings)

Fasoo offers unstructured data security, data governance, and AI-enhanced enterprise content platforms that assist organizations in discovering, classifying, protecting, controlling, tracing, and analyzing critical information assets while boosting productivity. Fasoo is helping its customers enable secure information sharing, simplify secure collaboration, and curate AI-ready data. Fasoo's Enterprise DRM (EDRM), Data Security Posture Management (DSPM), and Zero Trust Data Pillar solutions provide security for millions of users across 2,000 organizations worldwide, including industries such as automotive, semiconductor, energy, telecommunications, and other high-tech sectors. The solutions provide advanced data security for its customers’ intellectual property in the form of Office documents, PDFs, CAD files, and images.

Show More Details
Logo of Satori Data Security Platform

Satori Data Security Platform

By Satori

4.8
(5 Ratings)

Satori functions as a Data Security Platform (DSP) that streamlines data and analytics services. It offers a unique alternative to conventional data access procedures, instituting a personal data portal for users which holds all accessible datasets for immediate utilization. Security and access measures are dynamically applied by Satori's DSP, dramatically speeding up the data access time-frame.

The platform's encompassing design allows the management of various facets such as accessibility, permissions, security, and compliance policies via a unified console. It conducts continuous exploration of sensitive data across multiple data sources, dynamically monitors data application, and instigates the requisite security protocols. Moreover, Satori empowers data teams to extend efficient data usage across the organization, in accordance with all data security and compliance prerequisites.

Show More Details
Logo of Microsoft Purview Data Governance

Microsoft Purview Data Governance

By Microsoft

4.5
(4 Ratings)

Microsoft enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more. Microsoft is dedicated to advancing human and organizational achievement.

Microsoft Security helps protect people and data against cyberthreats to give peace of mind.

Show More Details
Logo of ALTR Data Access Control and Security

ALTR Data Access Control and Security

By ALTR

5
(3 Ratings)

ALTR's Data Security Platform allows companies to govern and protect sensitive and regulated data in the cloud and on-premises. Financial services, healthcare and retail customers leverage ALTR’s platform to gain visibility into data usage, automate data access controls including dynamic data masking and policy enforcement, and secure data with rate-limiting, alerting and tokenization. ALTR’s open-source partner ecosystem integrations with ETLs and data catalogs enable scalable on-premises-to-cloud data governance and security.

Show More Details
Logo of Enterprise Data Insight Dynamic Data Masking

Enterprise Data Insight Dynamic Data Masking

By Enterprise Data Insight

5
(2 Ratings)

EDI is an exemplary organisation that provides high standard of knowledge, products, solutions and services that assists businesses to achieve optimisation. We pride ourselves on the foundation that our services are not restricted to company size or particular commerce. Our operations are based within the Americas, Africa / Middle East, Europe and APAC

Show More Details
Logo of Sentra

Sentra

By Sentra

5
(2 Ratings)

Sentra is a company focused on providing data security for the cloud. It addresses the serious issue of sensitve data breaches in the public cloud stack. Sentra offers an automated data discovery, classification, monitoring, and protection service for organizations that prioritize the cloud. The main function of the system is to identify all sensitive data, determine who has access to it, how it is used, and the security level of the data. As data often changes and moves within the public cloud, it may not consistently retain its original security level. Sentra addresses this by detecting such transformations and instigating remediation processes. This reduces the risk associated with critical data, enabling businesses to utilize the scalability and acceleration of the cloud to promote business expansion, but ensuring their sensitive data remains secure.

Show More Details
Logo of TAMUNIO

TAMUNIO

By comforte

5
(2 Ratings)

With more than 20 years of experience in data protection on truly mission-critical systems, comforte is the perfect partner for organizations who want to protect their most valuable asset: data. Comforte’s Data Protection Suite, SecurDPS, has been built from the ground up to best address data security in a world that is driven by digital business innovations, empowered customers, and continuous technology disruptions. Comforte is here to help secure the growth by providing expertise, an innovative technology suite, and local support.

Show More Details
Logo of Imperva Data Security Fabric

Imperva Data Security Fabric

By Thales Group (Imperva)

4
(1 Rating)

Imperva is a cybersecurity firm that assists organizations in safeguarding critical applications, APIs, and data across various scales and locations. It adopts a comprehensive approach that amalgamates edge, application security, and data security to offer protection to businesses at all levels of their digital journey. Imperva Threat Research and the worldwide intelligence community contribute to Imperva's knowledge of the evolving threat landscape. This understanding allows incorporation of the most recent security, privacy, and compliance expertise into the offered solutions.

Show More Details
Logo of PK Protect

PK Protect

By PKWARE

4
(1 Rating)

PKWARE provides an end-to-end sensitive data solution that detects and protects sensitive data across the enterprise, whether in structured, unstructured, semi-structured, or free-form data formats, regardless of device or environment.

Show More Details
Logo of Tuvis

Tuvis

By Tuvis

5
(1 Rating)
Show More Details
Logo of Wrapsody

Wrapsody

By Fasoo

5
(1 Rating)

Fasoo offers unstructured data security, data governance, and AI-enhanced enterprise content platforms that assist organizations in discovering, classifying, protecting, controlling, tracing, and analyzing critical information assets while boosting productivity. Fasoo is helping its customers enable secure information sharing, simplify secure collaboration, and curate AI-ready data. Fasoo's Enterprise DRM (EDRM), Data Security Posture Management (DSPM), and Zero Trust Data Pillar solutions provide security for millions of users across 2,000 organizations worldwide, including industries such as automotive, semiconductor, energy, telecommunications, and other high-tech sectors. The solutions provide advanced data security for its customers’ intellectual property in the form of Office documents, PDFs, CAD files, and images.

Show More Details
Logo of Aurva Data Security Platform

Aurva Data Security Platform

By Aurva

Aurva focuses on providing real-time data security with a comprehensive multi-cloud Database Activity Monitoring (DAM) system, alongside runtime monitoring, DSPM, Egress Monitoring, and AI-led compliance automation. The company's AI agents are developed to condense essential compliance processes, such as DPIA and ROPA automation, vigorously applying zero-trust access policies and generating actionable data protection insights. Aurva expertly outlines the specifications, locations, and usage of data. The company provides sensitive data discovery and classification, extensive lineage and flow tracking for different types of data, as well as real-time access monitoring to curtail illicit activity. Moreover, Aurva also monitors the entire data lifecycle for AI models, identifying the data usedfor training, elucidating the services utilizing these models, and overseeing if sensitive data is accessed or processed. Aurva ensures quick visibility across databases, AI assets, and data flows. This helps in detecting threats early and makes compliance more manageable.

Be the first to .
Logo of Borneo

Borneo

By Borneo

Be the first to .
Logo of Confidencial Data Security Platform

Confidencial Data Security Platform

By Confidencial.io

Confidencial, a technology company, focuses on data-centric security solutions. Initially developed under the U.S. Department of Defense entity, DARPA, and incubated at SRI, a technological breakthroughs institution, Confidencial was created to protect sensitive and proprietary information. It facilitates safe data sharing while curtailing large scale compromise. Launched in 2021, Confidencial now provides encryption and AI-powered technologies for the broader market, specifically for identifying, classifying and protecting sensitive data. Their storage options cater to both cloud and on-premise requirements. The team comprising of innovators, experts and PhD holders, work on unstructured data protection. The company ensures compliance with industry standards such as HIPAA, SOC, and ISO 27001.

Be the first to .
Logo of EncryptRIGHT

EncryptRIGHT

By Prime Factors

Prime Factors is focused on application-layer data protection through software products. These solutions aim to enhance data security where potential breaches are most likely. By integrating a Data Security Governance approach with its distinct Data Protection Engine, Prime Factors' software automatically implements and supervises the execution of Data Protection Policies. It also manages cryptographic key controls at the application level. This combination helps safeguard data regardless of its status - whether in use, transit, or storage. The solutions apply encryption, tokenization, and data masking techniques to determine how data is protected. It also monitors the level of accessibility to the data. In addition, the system features adjustable audit logging and alerts for managing compliance. For over three decades, Prime Factors has been offering these services to a large global customer base.

Be the first to .
Logo of Fasoo Data Radar

Fasoo Data Radar

By Fasoo

Fasoo offers unstructured data security, data governance, and AI-enhanced enterprise content platforms that assist organizations in discovering, classifying, protecting, controlling, tracing, and analyzing critical information assets while boosting productivity. Fasoo is helping its customers enable secure information sharing, simplify secure collaboration, and curate AI-ready data. Fasoo's Enterprise DRM (EDRM), Data Security Posture Management (DSPM), and Zero Trust Data Pillar solutions provide security for millions of users across 2,000 organizations worldwide, including industries such as automotive, semiconductor, energy, telecommunications, and other high-tech sectors. The solutions provide advanced data security for its customers’ intellectual property in the form of Office documents, PDFs, CAD files, and images.

Be the first to .
Logo of Immuta Data Security Platform

Immuta Data Security Platform

By Immuta

Immuta unifies data security and governance across complex data ecosystems, continuously monitoring and de-risking sensitive data – all at enterprise scale. Since 2015, Immuta has provided Fortune 500 companies and government agencies around the world with a single platform to govern, control, and audit enterprise data for use in BI and analytics, data marketplaces, AI, and whatever comes next.

Be the first to .

Features of Data Security Platforms

Updated April 2025

Mandatory Features:

  • Field-level or data-object-level granularity authorization policies enforced through, for example, dynamic data masking (DDM), format preserving encryption (FPE) or tokenization, data store APIs or access control policy formats native to a particular database

  • Support for multiple popular cloud-based data lake offerings

  • Integration with data catalogs or a product-native data cataloging capability

Optional Features:

  • Self-service and automated workflows for (accelerating) provisioning of data access

  • Data activity monitoring (DAM) and auditing

  • Support for traditional relational database management systems (RDBMS)

  • Data discovery for sensitive data in structured data stores

  • Integration with popular identity directories

Gartner Research

Market Guide for Data Security Platforms

Top Trending Products

IBM Guardium

Popular Product Comparisons

IBM Guardium vs Imperva Data Security FabricCipherTrust Data Security Platform vs IBM GuardiumIBM Guardium vs Satori Data Security PlatformALTR Data Access Control and Security vs IBM GuardiumIBM Guardium vs Sentra

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.