The B2B platform for the best purchasing descision. Identify and compare relevant B2B manufacturers, suppliers and retailers
Filter
Locations
Result types
Type of company
Select company type
Industries
Select industry
Company status
Select company status preset
Number of employees
Min.
Max.
Founding year
Lock keywords
Exclude keywords
Optional keywords
Reno, United States
11-50 Employees
1998
At Erlach, we are unique in our approach: first learning your business needs, THEN crafting a solution to further them. At Erlach, we make it our business to help you overcome these challenges – allowing you to enjoy a smoother technology experience, greater peace of mind, and improved bottom line performance. Erlach Computer Consulting is modeled to provide the blend of professional and technical skills available in large business IT departments to the small to mid-size business. Erlach Computer Consulting has the broad spectrum of skills needed to provide you with the integrated solution you need in your IT support. Rather than leading with a solution or product, we lead by LISTENING.
+
Featured
Home - Erlach Computer Consulting
... Reno based IT Support firm serving Northern Nevada with managed IT services, network and data security, business continuity, and server solutions. ...
Tel Aviv-Yafo, Israel
51-100 Employees
2021
Cyera's cloud-native solution is purpose-built to ensure cyber resilience and assure compliance everywhere enterprises manage data. Cyera is the data security company that gives businesses deep context on their data, applying correct, continuous controls to assure cyber-resilience and compliance. Cyera takes a data-centric approach to security across your data landscape, empowering security teams to know where their data is, what exposes it to risk, and take immediate action to remediate exposures. Backed by leading investors including Accel, Sequoia, Cyberstarts and Redpoint, Cyera is redefining the way companies do cloud data security. For every business to realize the full potential of data — collaboration, connection with customers, insight that fuels innovation — to power a new era of development, growth, and productivity.
+
Featured
The Next Generation Data Security Platform is Here
... Cyera's data security platform offers continuous agentless scanning, automatic data store discovery, sensistive data inventory and classification, and data security posture ...
Brussels, Belgium
11-50 Employees
2021
Raito can be deployed within minutes, letting you observe data access and process data access requests within the first day. Raito reduces the time to access by integrating with your pipelines, automatically managing entitlements and streamlining data access request workflows. In this way, Raito removes the red tape so you can continue to innovate. Raito doesn’t need to store credentials and limits compute cost by only extracting metadata, query logs, and aggregated statistics. Raito makes automated recommendations to resolve missing, conflicting, or obsolete access controls, helping you optimise data access coverage. Easily connect Raito with your data sources and BI Tools, get your first Data Access Analytics, and process data access requests within minutes. Raito doesn’t move any data over the web, gives you full control over the sync frequency, and is as easy to uninstall as it is to install. Raito’s productivity-first approach allows you to mature your access controls at your own pace.
+
Featured
Data Security Platform
... Protect your sensitive data with Raito's comprehensive Data Security Platform. Gain peace of mind with advanced security solutions. Learn more about our data security offerings. ...
Devizes, United Kingdom
11-50 Employees
2004
The SecureDrive products have won several awards for product design, innovation, and security. Organizations across the globe have seen fit to award our products with these distinctions because the SecureDrive product line is a security leader in a competitive market. SecureData provides its customers with FIPS 140-2 Level 3 validated encrypted devices. SeucreData SecureDrive Product Line has won multiples prestigious awards including: The Red Dot Award and CES 2019 Honoree Award. SecureData, Inc. is a privately held company headquartered in Los Angeles, California.
+
Featured
Data Security Solutions for Healthcare
... Data Security Solutions for Healthcare - ...
Shenzhen, China
11-50 Employees
2018
DataCloak, established in 2018, is a company dedicated to the innovation of data security technologies. DataCloak boasts extensive research and development experience in areas such as large-scale distributed systems, data security and privacy computing, and AI. DataCloak® provides enterprises with an advanced, innovative and secure office that avoids unauthorized access and disclosure of enterprise sensitive data. DataCloak provides enterprises with an advanced, innovative and secure office that avoids unauthorized access and disclosure of enterprise sensitive data. The company integrates infrastructure, cryptography, and AI technologies to provide enterprises with an integrated data security platform that spans endpoints, clouds, and edges. Its products have been widely adopted by hundreds of enterprises, including the People's Bank of China, China Construction Bank, Nanyang Commercial Bank, CITIC Securities, Taikang Insurance, Inspur, Great Wall Motors, Avatar, Duxiaoman, Yunda, China Mobile, and many others. The security governance of unstructured data has become the main direction of development in the field of data security. With leading technology, excellent user experience, and good reputation, DataCloak was selected as a supplier in Gartner Vendor Ratings in 2020.
+
Featured
Zero Trust Data Security Solution
... DataCloak | Zero Trust|Data Security|DACS|Secure Workspace|HyperCloak|Data Hierarchical Classification|Rapid Deployment|Kernel Security|Adaptive Security|Software Defined ...
Berlin, Germany
1-10 Employees
2018
Founded in 2018, Intelliant offers innovative consulting services in the areas of Cyber Resilience and Security Compliance. Intelliant’s functional approach aims to mediate between innovative startups and established companies in the (financial) industry. We are the leading enabler of efficiency-driven and data-appreciative GRC compliance, connecting disruptive protagonists and established market leaders to create a joint future. Intelliant provides innovative consulting services in various subject areas connected to the security of your business data and information worth protecting. Mit Intelliant haben wir einen starken Partner an unserer Seite, der uns mit weitreichender Expertise bei Fragestellungen jederzeit unterstützt. Intelliant konnte immer überzeugend mit Kompetenz und Expertise einen wertvollen Beitrag dazu leisten, innovative Geschäftsmodelle insb. Intelliant betreut uns seit der Gründung in allen datenschutzrechtlichen Belangen und ist zum externen Datenschutzbeauftragten unserer Gesellschaft bestellt. Understanding the culture of a startup as well as highly regulated companies, Intelliant’s mission is to bring these worlds together and enable the digitalization of the financial industry in a pragmatic and compliant way.
+
Featured
data-protection-security-compliance-company-building-q3
... data-protection-security-compliance-company-building-q3 – Intelliant ...
Chandler, United States
11-50 Employees
2017
Explore Kogni’s 24/7/365 expert sensitive data discovery, security, and monitoring capabilities for free for 90 days. Kogni makes regulatory compliance the least of your worries by instantly identifying personal information and securing it. Kogni offers everything you need to conduct data audits, secure your confidential data and simplify data governance. Kogni enables you to effortlessly migrate your data on to the cloud. Kogni’s Secure solution is a must for your data loss prevention strategy. Kogni provides an industry leading security compliance monitoring tool equipped with sensitive data alerts so you can manage policy violations with ease. Kogni’s monitoring solution is next generation data security. Make compliance with CCPA, GDPR and other regulations easy with Kogni’s discover solution features like out-of-the-box and custom data classifications.
+
Featured
Kogni.io - The Next Generation Enterprise Data Security Solution
... Protect critical business information with Kogni, the best in class data security tool. It monitors and secures your sensitive data from ...
Ladbergen, Germany
1-10 Employees
Über 15000 Produkte - Auch Deins ist dabei. Der Pionier für erneuerbare Energien , Energiesparprodukte, Photovoltaik & Kleinwindkraftanlagen Manufaktur und Klimaschutz. Energiesparprodukte und Sets für namhafte Kunden wie Kaufland , Lidl , OBI etc.
+
Featured
G DATA Mobile Security - 3 Year (9 Lizenzen) - Renewal - ESD-Download
... G DATA Mobile Security - 3 Year (9 Lizenzen) - Renewal - ESD- ...
Richardson, United States
Data Security Technologies is a pioneer in developing data security and privacy technologies for big data. Currently, we offer two products: 1) SecureDL allows organizations to create and manage access control policies, proactively review code for threats, and enforce data governance throughout the entire organization. SecureDL product is based on the NSF funded (SBIR Phase I and II) pioneering research work on NoSQL database security. 2) SecureCompute allows organizations to create a secure collaborative environment to link records, build a better machine learning model, and increase their existing machine learning model's accuracy, efficiency, and ROI. The latest DataSecTech news, articles, and resources, sent straight to your inbox.
+
Featured
Comprehensive Data Security
... DataSecTech - Comprehensive Data Security - Secure Compute, Secure ...
London, United Kingdom
11-50 Employees
2014
We are a team of experienced cryptographers and security software engineers. Following our mission to solve problems, we adapt solution designs to meet customer-specific requirements. At the core, we are an open-source company. Luckly, we are :) Our core competence is designing and implementing cryptography-based components, protocols, and systems. We provide risk assessment, strategic and tactical advice in line with pragmatic security and compliance demands. We provide constant oversight over features, match them to risks, and assist your engineers with implementing security-related features. We offer free assessment and mitigation services to improve Ukrainian companies security resilience. At Cossack Labs, we build security solutions to protect sensitive data in customers' products and infrastructures.
+
Featured
Cloud data security solutions
... Data security tools, solutions and custom engineering. We help companies to protect data, prevent data leakage and comply with ...
Technologies which have been searched by others and may be interesting for you:
Some interesting numbers and facts about the results you have just received for Data Security
Country with most fitting companies | United States |
Amount of fitting manufacturers | 6360 |
Amount of suitable service providers | 6104 |
Average amount of employees | 11-50 |
Oldest suiting company | 1998 |
Youngest suiting company | 2021 |
Data security refers to the protective digital privacy measures that are applied to prevent unauthorized access to computers, databases, and websites. It also protects data from corruption. This concept encompasses a range of techniques and practices used to secure electronic data, such as encryption, tokenization, and key management practices that protect data across all applications and platforms. Data security is vital for safeguarding sensitive information from cyberattacks and data breaches, ensuring that personal and corporate data remains confidential and intact. In its role within the broader field of cybersecurity, data security is critical for maintaining the integrity and confidentiality of information, which is increasingly important in today's digital age where data breaches can not only lead to financial losses but also damage reputations and consumer trust. Moreover, with the implementation of stringent regulations like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), data security has also become a legal necessity. Businesses and organizations are now mandated to adhere to these and other regulations to protect sensitive data, making data security practices an essential aspect of compliance. This emphasis on data security helps in fostering a safer digital environment, where individuals and businesses can operate with confidence, knowing their information is protected against unauthorized access and cyber threats.
1. Enhanced Protection Against Breaches
Data security measures provide robust protection against unauthorized access, ensuring that sensitive information remains confidential. By utilizing encryption, firewalls, and secure passwords, data security significantly reduces the risk of data breaches compared to less stringent alternatives.
2. Regulatory Compliance
Adhering to data security standards ensures compliance with legal and regulatory requirements. Many industries are governed by strict data protection laws, such as GDPR in Europe or HIPAA in the United States. Implementing comprehensive data security measures helps organizations avoid costly penalties associated with non-compliance.
3. Improved Customer Trust
By prioritizing data security, businesses can enhance their reputation and build trust with their customers. Consumers are more likely to engage with companies that demonstrate a commitment to protecting their personal information. This trust is a competitive advantage that can lead to increased customer loyalty and retention.
4. Minimization of Data Loss Risks
Effective data security strategies include regular backups and disaster recovery plans, minimizing the risks of data loss due to system failures, cyberattacks, or natural disasters. This proactive approach ensures business continuity and reduces potential downtime, which can be costly and damaging to an organization's operations.
While evaluating the different suppliers make sure to check the following criteria:
1. Compliance and Certifications
Ensure the supplier adheres to international data security standards and holds relevant certifications such as ISO/IEC 27001, which demonstrates they maintain high levels of information security management.
2. Encryption Methods
Review the encryption techniques used by the supplier to protect data both at rest and in transit. Advanced encryption standards (AES) and secure socket layer (SSL) protocols are vital for safeguarding sensitive information.
3. Data Center Security
Investigate the physical and network security measures in place at the supplier's data centers, including access controls, surveillance systems, and firewalls to protect against unauthorized access and data breaches.
4. Incident Response Plan
The supplier should have a robust incident response plan that outlines procedures for addressing data breaches or security incidents, ensuring quick action and minimal impact on your data.
5. Transparency and Reporting
Select a supplier who provides clear reporting on security incidents and regular updates on their security practices, allowing for transparency and trust in their data security measures.
Data security is paramount in the financial sector, where companies handle sensitive financial data daily. Here, it's employed to protect against unauthorized access and financial fraud. Implementing robust encryption and access control mechanisms ensures that only authorized personnel can view and process financial transactions, safeguarding against data breaches that could result in significant financial losses and damage to reputation. In the healthcare industry, data security plays a critical role in protecting patient information. With regulations such as HIPAA in the United States, healthcare providers are obligated to implement stringent data protection measures. This includes encrypting patient records and ensuring secure data transmission between devices and networks, thereby maintaining patient confidentiality and trust. For the e-commerce sector, data security is essential in securing online transactions. It involves encrypting customer data, such as credit card numbers and personal information, to prevent theft and unauthorized use. This not only helps in building customer trust but also complies with payment card industry data security standards, which are crucial for any business processing online payments. Manufacturing companies utilize data security to protect intellectual property and sensitive business information. By deploying firewalls, intrusion detection systems, and access controls, manufacturers can safeguard their designs, patents, and proprietary processes from industrial espionage and cyber threats, ensuring competitive advantage and business continuity.
Data security, as a critical aspect of technological advancement, currently operates at a high Technology Readiness Level (TRL), particularly between levels 8 and 9. This positioning is attributed to the extensive development and deployment of various data protection methods, including advanced encryption algorithms, secure sockets layer (SSL) protocols, and comprehensive cybersecurity frameworks that have been extensively validated in real-world environments. The rationale behind this high TRL stems from the technological intricacies involved in safeguarding data against an ever-evolving landscape of threats. Innovations such as quantum cryptography and blockchain technology further underscore the advanced stage of data security measures. These technologies have not only been rigorously tested but are also being implemented across numerous sectors, demonstrating their effectiveness and reliability in protecting sensitive information. The continuous refinement of these technologies, driven by the relentless pace of cyber threats, ensures that data security remains at the forefront of technological readiness, adapting and evolving to meet the demands of an increasingly digital world. This adaptability and proven performance in operational environments are quintessential markers of its high TRL, reflecting the technical prowess and maturity of data security measures in the current technological epoch.
In the Short-Term, advancements in data security will likely focus on enhancing encryption technologies and the adoption of zero-trust architectures. As businesses increasingly move towards cloud-based solutions, the need for robust, scalable encryption methods that can protect data in transit and at rest becomes paramount. Zero-trust architectures, which operate on the principle that no entity inside or outside the network is trusted by default, will become more common, offering a more dynamic approach to securing sensitive information. Looking into the Mid-Term, the focus will shift towards the integration of artificial intelligence (AI) and machine learning (ML) in detecting and responding to security threats. These technologies will enable more proactive and predictive security measures, identifying potential breaches and vulnerabilities before they can be exploited. Additionally, blockchain technology will become more prevalent in securing transactional data, providing a decentralized and tamper-proof ledger system that enhances data integrity and trust. In the Long-Term, quantum computing is set to revolutionize data security. With its potential to break traditional encryption methods, the development of quantum-resistant encryption becomes crucial. This period will witness the emergence of new cryptographic standards designed to withstand the computational power of quantum computers, ensuring that data remains secure in a post-quantum world. Furthermore, advancements in biometric authentication methods will offer more personalized and secure ways to protect data, moving beyond passwords to a future where access control is seamlessly integrated into our biological makeup.