Detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use, in motion, and at rest.
Encryption key management is the administration of policies and procedures for protecting, storing, organizing, and distributing encryption keys.
A hardware security module is a physical computing device that safeguards and manages digital keys, performs encryption and decryption functions for digital signatures, strong authentication and other cryptographic functions.
Database activity monitoring is a database security technology for monitoring and analyzing database activity.
Digital rights management (DRM) is a way to protect copyrights for digital media. This approach includes the use of technologies that limit the copying and use of copyrighted works and proprietary software.
It is an integrated suite of data-centric security products and solutions that unify data discovery, protection and control in one platform.