Data Security Posture Management Reviews and Ratings

What is Data Security Posture Management?

Data security posture management (DSPM) provides visibility as to where sensitive data is, who has access to that data, how it has been used, and what the security posture of the data stored or application is. It does that by assessing the current state of data security, identifying and classifying potential risks and vulnerabilities, implementing security controls to mitigate these risks, and regularly monitoring and updating the security posture to ensure it remains effective. As a result, it enables businesses in maintaining the confidentiality, integrity, and availability of sensitive data. The typical users of DSPM include Information Technology (IT) departments, security teams, compliance teams, and executive leadership.

Products In Data Security Posture Management Category

"My go to Data Security and Data Classification Tool"

The one thing that caught my attention when using this product is how it classifies data. Varonis Data Classification Engine assisted us in finding all our data and classifying it accordingly thereby reducing the manual work that would be involved. Its threat detection and response rates are top notch. It uses machine learning to detect both external and internal attacks, which then alerts security team of potential incidences. This a major features that saw our organization benefit from this product. Lastly, all our data stored on cloud more so relating to our technology is well secured.

Read reviews

"Outstanding support model for an excellent product."

We have partnered with Securiti for over two years and the support model is outstanding, proving to be highly responsive to our needs consistently over the life of our engagement. The tool has proven invaluable in enabling us to meet our obligations, while the frequent enhancements make the tool ever more useful to our business.

Read reviews

"My experience with OneTrust Privacy and Data Governance Cloud Solution. "

Implementing OneTrust Privacy and Data Governance cloud solution in our organization was an enriching experience both in terms of learning and establishing the data privacy practice and ensuring compliance with local and global regulations. It comes with comprehensive tools and features that empowers us to manage our data privacy and data governance initiatives to safeguard our data assets.

Read reviews

"Data is the last line of defence, and most of us have no clue how at risk it is."

Working with the Cyera team has been exceptional from the our first meeting with them. The level of customer care, technical support and product development feedback integration is some of the best I have experienced in my career. The team is passionate about their mission to secure data, and help customers understand their risk around data security. It's refreshing to work so closely with a vendor and be able to affect product decisions and design to suit our admittedly very complex needs. The team has also been very responsive to engineering / technical requests, and the regular cadence of meetings with our technical account manager (who is also a privacy expert!) keep us using the product in an effective manner that provides good ROI and meaningful security gains. Overall a great experience.

Read reviews

"Symmerty Data Guard -AI Driven DSPM that protects sensitive data and optimizes cloud costs"

Symmetry DataGuard provides our organization a truly unique view of our data security posture. We worked with Symmetry to build a AI classifier to identify genomic data in our environment, and meet our US Federal Customers FedRAMP requirements.

Read reviews

"A Data Guardian Hero!"

A Data Guardian Hero! For the past year my team and I have been relying on Data Guardian Platform to safeguard our sensitive data across our cloudified enviroment. And, it has been a game changer for us!

Read reviews

"Laminar is an integral partner in cyber resiliency and data governance"

Laminar's Data Security Posture Management product has been integral in bolstering our cloud-native security posture. Their Autonomous Discovery and Data Context Awareness product offerings have also been critical for our agile cloud data security capabilities.

Read reviews

"Data Security Posture Management with BigID, Great Outcome"

BigID helped us to discover where all our data was located and then classified it accordingly. Data classification used to be a tedious task for our organization due to the large data sets but this product made our work easy. It also helped to unmask the high-risk data in our cloud and on premise. It was a good experience working with this product as it contributed to our organization growth and and enhanced productivity.

Read reviews

"Breaking Down TrustLogix: Offering for Data Entitlements Space"

Data Entitlements is a nascent space and there are not many vendors, and those present are relatively early in their maturity journey. It is also a space that is growing at a fast pace with vendors popping each quarter and existing ones adding this capability. Unfortunately, with big data converging into single large platforms, companies cannot wait. It is therefore important to invest in a platform that has a strong foundational architecture which scales well, along with a company that is committed to its roadmap, cost efficient and finally one that is easy to exit from should you need to. After reviewing many vendors - TrustLogix stood out. Their USP is that it's not a proxy or a tightly coupled system on the critical path between user and data. Its architecture has a 100% policy push down, which allows connections to a variety of databases and platforms without a tight coupling, operating primarily as a policy authoring tool (which is good).

Read reviews

"Why I chose Sentra, it has great capabilities and delivers beyond your expectations "

By using Sentra, it was easy to discover and classify sensitive data. Initially, it took us much time to find our data from public cloud at any given time but Sentra changed all that. It has also helped to know what security measures to use for different data types. This has eliminated the issue of bending on a single type of measure for all attacks. It has been a great and smooth journey working with this product.

Read reviews

"Good Product to assist in proving our regulatory compliance regarding PII"

This product was selected prior to my hiring with this organization, but I am glad they got it.

Read reviews

"Automated data-drift control for large application environments, on-premise and cloud"

As Director Of Security Operation And Response the implementation of Soveren has been transformational. It enables me to realise my vision of proactive monitor and immediate alerting for any data-drift in our vast application environment. Soverens real-time oversight, aligns perfectly with our security protocols, ensuring that our sensitive data handling remains strictly within the predefined boundaries.

Read reviews

"Flow Platform Overview"

The overall experience is very good, and the ability of the Flow platform to provide significant alerts in all of resources types that unmonitored

Read reviews

"Concentric SI is Mandatory For Organizations Who Deal With and Share Sensitive Data."

My organization has been using Concentric AI to bolster our data security toolkit for several years now. The platform's ability to analyze and manage data has continued to surprise me, with new insights delivered routinely that I didn't know I needed until I had them. With our all-in SaaS and IaaS adoption, having a tool that can help track user habits w/r/t sensitive data has become core to our security strategy.

Read reviews

"One of a Kind Endpoint Manager "

With PK Protect Endpoint Manager, am assured of controlled data protection on all endpoints across the organization. It also helps with auditing security and IT personnel with visibility on sensitive file, their users and those that accessed them, from where they were accessed and the devices and location they were. It has a great endpoint management for our organization.

Read reviews

"Precision in Data Search and Classification: The High Value Proposition"

Very competent supplier, strong alignment with governance standards during the procurement process, excellent contract/MSA for a regulated entity, and they kept all their commitments.

Read reviews

"Eureka Security simplified cloud data security for us and provides amazing support"

Eureka came in and displaced what it proved to be a subpar product in the cloud data security arena. Deployment was extremely simple. We were connected within 10 mins, though initial data discovery and the magic of the platform took about 24hrs or so to show up, which was expected. The usability and intuitiveness of the product was far superior, the fidelity of findings and the generation of alerts is very high. I can get data about events and alerts out of the platform and into my remediation workflow. Lastly, the team has been fantastic. I felt supported and heard from our first interaction. I have regular updates with the account and product team and support on questions/issues has been extremely fast. I wish every one of the tools I used to support my business operated like Eureka!

Read reviews
Competitors and Alternatives

Competitor or alternative data is currently unavailable

See All Alternatives

"One underrated DSPM tool"

Before landing to Plerion, we had really suffered while trying to secure our cloud data. Plerion Data Security Posture Management came through as it helped us understand where our sensitive was located, its state and those who could access it. It gave us complete visibility of our data while continuously monitoring security posture and security logs.

Read reviews

"Good product that does the job for detection. "

Vendor has provided good support on issues and challenges with the product.

Read reviews

"Discover, Classify, Protect and Trace your Data with Ease"

The use of Fasoo Data Radar has the organization enhance its traditional data loss prevention tech through the discovery, classification and control of sensitive data. This happens without the need for complex business policies, and this enables us to scale our privacy infrastructure and unstructured data security. Besides, it has enabled the firm to identify sensitive data and enforce protective measures without user intervention.

Read reviews
Products 1 - 20