Software Alternatives & Reviews
Register   |   login

Cavirin

Cavirin provides security management across physical, public, and hybrid clouds, supporting AWS, Microsoft Azure, Google Cloud Platform, VMware, KVM, and Docker.

· Add video · Edit

Cavirin Alternatives [Page 2]

The best Cavirin alternatives based on verified products, votes, reviews and other factors.
Latest update:

  1. Concerned about data security & encryption to protect your business? WinMagic's SecureDoc software will ensure that you feel secure & protected. Learn More.

  2. Fully protect your data with the comprehensive detection technologies and unified policies of Symantec's industry leading Data Loss Prevention (DLP).

  3. Proteus GDPReady provides the DPO with a ready-made suite of tools to model business processes, define what sensitive data exists and perform multi-phase Data Privacy Impact Assessments.

  4. Spirion is an enterprise data management software that helps businesses reduce their sensitive data footprint.

  5. Conceal provides a set of easy to use APIs for performing fast encryption and authentication of data.

  6. WhiteHat Security is a provider of website risk management solutions, protecting data, ensuring compliance, and narrowing the risks.

  7. Vera enables businesses to easily secure and track any digital information across all platforms and devices.

  8. Dataguise provides solution that secures sensitive data assets across all repositories, on premises and in the cloud.

  9. Hitachi Data Protection is an orchestrate backup, business continuity and disaster recovery with business-defined workflows.

  10. The Tor Project's free software protects your privacy online. Site blocked? Email [mailto:[email protected]] for help downloading Tor Browser.

  11. Experience enterprise-level identity and access management with SecureAuth's powerful, innovative, multi-factor adaptive authentication solutions. Stop bad actors, attackers and criminals from stealing your data!

  12. Duo Security provides cloud-based two-factor authentication. Duo’s technology can be deployed to protect users, data, and applications from breaches, credential theft, and account takeover.