Data Access Governance

Companies related to Data Access Governance

Discover B2B companies, suppliers, and manufacturers related to this keyword category

+15 companies found
Cyera
Cyera
Computer-and-Network-Security

The first true data security platform is here.

Immuta
Immuta
Software-Development

The Data Security Platform built to unlock value from your data.

Stealthbits now part of Netwrix
Stealthbits now part of Netwrix
Software-Development

Take control over sensitive, regulated and business-critical data, regardless of where it resides.

Normalyze
Normalyze
Computer-and-Network-Security

Solving high-impact problems in cloud and data security

Privacera
Privacera
Software-Development

GenAI and data security governance without bottlenecks. Automated privacy, protection, and compliance.

Le
Lepide
Computer-and-Network-Security

Protect Sensitive Data from Rogue Users and Compromised User Accounts with the Lepide Data Security Platform

Hub Technologies
Hub Technologies
Computer-and-Network-Security

End-to-end banking platform that combines core banking with integrated compliance tools.

Knostic
Knostic
Technology-and-Information-and-Internet

IAM for the LLM Age - Enabling enterprises to control and harness institutional knowledge through the power of LLMs

Netwrix Corporation
Netwrix Corporation
Software-Development

Data security starts with identity, #1 attack vector. Fast, cost-effective solutions trusted by 13,500 organizations

SailPoint
SailPoint
Software-Development
theom
theom
Computer-and-Network-Security

Data Access Governance and Security

Stack Identity
Stack Identity
Computer-and-Network-Security

Eliminate exploitable access to cloud infrastructure and data. We reveal and prioritize your cloud IAM blindspots.

Adya (acquired by Qualys)
Adya (acquired by Qualys)
Software-Development

Management and Security of Cloud Applications

Matters.AI
Matters.AI
Software-Development

We Protect What Matters

HUB Security
HUB Security
Computer-and-Network-Security

Advancing data fabric, confidential computing, and cybersecurity solutions and services.