A List Of Data Security Solutions Providers
Aujas Networks Pvt Ltd | Bengaluru
The company provides comprehensive data protection services that work across the data's lifecycle. This framework provides a complete offering that includes designing of data-centric policies, data classification, data flow analysis, fine-tuning, consequence management and tools like data loss prevention (DLP), information rights management (IRM/ERM), etc, to ensure effective data protection. Aujas also offers a few accelerators including automated data flow analysis and a repository, a health check assessment tool and a data classification tool to help its clients with comprehensive data protection.
CA Technologies | Hyderabad
CA DataMinder, the company's data protection suite, delivers data security solutions at the endpoint, network, email server and data repositories. Whether it's on-premise, on mobiles or the cloud, its data protection solutions can meet its customers' data security and regulatory requirements while enabling business to continue. These solutions not only prevent information leakage caused by accident or due to malicious intent, but enable business process continuity through precise identity-centric policies. Data protection allows businesses to discover, classify and control sensitive information across all phases of the data's lifecycle—whether the data is in use, in transit, at rest or being accessed.
Globalscape
Continuous Data Protection (CDP) from Globalscape automatically saves a copy of every change to the data. CDP captures all data changes at the byte level, as they occur, and can restore data from any point in time. It provides back-up for multiple locations while minimising bandwidth requirements. Its key features and benefits include real-time updates to backup servers, which allows for easy switchover if the primary file server malfunctions; capabilities for restoring changes to the primary server during switchover periods; the ability to create ‘snapshots' or copies of data at any point in time without impacting real-time file use; and being able to restore data through a browser, from disk, or directly over the network, and more.
IBM | Bengaluru
IBM Data Security Services is designed to cost-effectively reduce the risks involved in protecting an organisation's critical data. The firm helps its customers integrate their existing assets and capabilities with new security management technologies. IBM's approach supports collaboration across the enterprise while protecting data both while in transit or when residing on a desktop or in storage. Potential benefits include simplified protection of valuable, business-critical and/or confidential data, controlled data access for collaboration and sharing, protection against corruption, interception with advanced encryption, and reduced risk of regulatory non-compliance.
SafeNet | Noida
SafeNet is one of the market leaders in financial data security for the world's largest financial institutions,
protecting over 80 per cent of the world's fund transfers, providing transaction security for five of the world's largest central banks, and securing the majority of ATM transactions in Europe, the Middle East and Asia. SafeNet provides complete, data-centric protection for the most critical aspects of financial services, enabling customers to securely implement new business services while effectively managing risk and achieving regulatory compliance. SafeNet's financial data security solutions include secure e-banking services, secure paper to digital process initiatives, secure credit card/PIN issuance and processing, secure online and mobile payments and meeting regulatory compliance demands.
Trend Micro | New Delhi
Enterprise Data Protection secures the data from the gateway to mobile devices by integrating a full set of data security products within the existing Trend Micro enterprise security suite. By combining threat and data protection in a flexible, centrally-managed solution, it lowers the cost and effort to deploy and manage data, while closing critical security and compliance gaps—for complete end user protection. Enterprise Data Protection is available as an add-on to Trend Micro's endpoint security suites or as part of the firm's most comprehensive enterprise security suite: Trend Micro Enterprise Security and Data Protection.
Vaultize | Pune
Vaultize ensures that business data on hundreds and thousands of endpoint devices is securely protected through automated backup, and at the same time, a customer's employees can access, share and sync the data on their smartphones, tablets and laptops. The company's patent-pending technology encrypts data at the source itself (i.e., on the device), ensuring 100 per cent security. The data never leaves a device in readable format. The encryption and data transfer uses AES 256-bit military-grade technology. Customers' data is then stored on Vaultize servers in a scrambled form, without any further processing. So, only authorised personnel can access the data. Further, customers' passwords are neither stored on Vaultize servers nor on their devices. Customer data is thus completely secure from unauthorised access, even if the device is lost.
Websense | Bengaluru
The Websense Data Security Suite contains three modules—Data Security Gateway, Data Discover and Data Endpoint—that can help manage the risk of losing your data to malicious users or due to accidental misuse. Each module can be licensed separately if customers plan to start with one capability and later expand to others. Websense TRITON Unified Security Center provides a single, intuitive, Web-based interface for the management and reporting of Websense Web, email and data security solutions. It includes more than 55 built-in reports, policy wizards, configuration templates and more.
DICE (Data Identification and Classification Engine): The combination of rich classifiers with real-time contextual awareness of the user, the data and destination provides high accuracy and consistent data loss prevention throughout the TRITON architecture. DICE is ubiquitous for gateways and endpoints with policy management from a single console.
Winmagic | Mumbai
With SecureDoc's PBConnex, data is never exposed until the users validate their credentials via the network. All devices that access organisational data can be managed via one console with SecureDoc. Whether it's a laptop, desktop, server, tablet or smartphone, every device's status is tracked to ensure its data is in a secure state if the device gets lost or stolen. SecureDoc supports more hardware and software platforms than any other solution available in the market—Windows, Mac, mobile devices, portable media, all self-encrypting drives and even Linux. Removable Media Encryption gives organisations the power to fully encrypt USB drives, CDs and DVDs with the same robust encryption used by SecureDoc to encrypt hard drives.