Suggested Categories:

Metadata Management Software
Metadata management software enables users and organizations to manage, identify, fetch, and analyze metadata. Metadata management software streamlines the processes involved with managing metadata.
Data Catalog Software
Data catalog software is a tool used to organize, manage, and provide easy access to an organization's data assets. It helps businesses create a centralized inventory of all available data, such as databases, datasets, reports, and documents, allowing users to search, classify, and understand their data assets more efficiently. Features often include metadata management, data lineage tracking, data governance, collaboration tools, and integration with data management systems. By providing a clear overview of data sources and their relationships, data catalog software facilitates data discovery, improves data quality, ensures compliance, and enhances collaboration across teams.
Data Governance Software
Data governance software helps organizations ensure the quality, consistency, security, and accessibility of their data across the enterprise. These platforms provide tools for defining data policies, standards, and processes, ensuring that data is properly classified, managed, and protected throughout its lifecycle. Data governance software often includes features like data cataloging, lineage tracking, metadata management, and role-based access controls. It supports compliance with data protection regulations such as GDPR and HIPAA, helping businesses maintain regulatory compliance and avoid potential legal risks. By using data governance software, organizations can improve data integrity, enhance decision-making, and foster better collaboration across teams.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.

54 Products for "metadata" with 1 filter applied:

  • 1
    Gearset

    Gearset

    Gearset

    Gearset is the complete, enterprise-ready Salesforce DevOps platform, enabling teams to implement best practices across the entire DevOps lifecycle. With powerful solutions for metadata and CPQ deployments, CI/CD, testing, code scanning, sandbox seeding, backups, archiving, observability, and Org Intelligence — including the Gearset Agent — Gearset gives teams complete visibility, control, and confidence in every release. More than 3,000 enterprises, including McKesson, IBM and Zurich, trust Gearset to deliver securely at scale. ...
    Starting Price: $200 per user, per month
    View Software
    Visit Website
  • 2
    Apache Atlas

    Apache Atlas

    Apache Software Foundation

    Atlas is a scalable and extensible set of core foundational governance services – enabling enterprises to effectively and efficiently meet their compliance requirements within Hadoop and allows integration with the whole enterprise data ecosystem. Apache Atlas provides open metadata management and governance capabilities for organizations to build a catalog of their data assets, classify and govern these assets and provide collaboration capabilities around these data assets for data scientists, analysts and the data governance team. Pre-defined types for various Hadoop and non-Hadoop metadata. Ability to define new types for the metadata to be managed. ...
  • 3
    Informatica Intelligent Data Management Cloud
    Our AI-powered Intelligent Data Platform is the industry's most comprehensive and modular platform. It helps you unleash the value of data across your enterprise—and empowers you to solve your most complex problems. Our platform defines a new standard for enterprise-class data management. We deliver best-in-class products and an integrated platform that unifies them, so you can power your business with intelligent data. Connect to any data from any source—and scale with confidence. You’re...
  • 4
    Metadact

    Metadact

    Litera

    Metadact is a metadata cleaning and data loss prevention tool designed to protect organizations from accidental information leaks by removing hidden metadata from documents. It integrates seamlessly with existing email systems, ensuring that all outgoing attachments are automatically cleansed of sensitive metadata without disrupting user workflows. Metadact supports various file types, including Microsoft Office documents and PDFs, providing comprehensive protection across different formats. ...
  • 5
    Lumu

    Lumu

    Lumu Technologies

    The devil is in the data. Your metadata, that is. Lumu’s Continuous Compromise Assessment model is made possible by its ability to collect, normalize and analyze a wide range of network metadata, including DNS, netflows, proxy and firewall access logs and spambox. The level of visibility that only these data sources provide, allows us to understand the behavior of your enterprise network, which leads to conclusive evidence on your unique compromise levels.
  • 6
    Assuria ALM-FIM
    ...ALM FIM can store the old and new contents of changed text files and registry keys to identify and assess the exact changes that have occurred and reverse them if required. ALM-FIM collects and stores metadata about files, folders, and registry keys to provide monitoring services. Metadata collected includes details such as check-sum of the contents, size, permissions, change time, links, and other details.
  • 7
    Apache Sentry

    Apache Sentry

    Apache Software Foundation

    Apache Sentry™ is a system for enforcing fine grained role based authorization to data and metadata stored on a Hadoop cluster. Apache Sentry has successfully graduated from the Incubator in March of 2016 and is now a Top-Level Apache project. Apache Sentry is a granular, role-based authorization module for Hadoop. Sentry provides the ability to control and enforce precise levels of privileges on data for authenticated users and applications on a Hadoop cluster.
  • 8
    Foretrace

    Foretrace

    Foretrace

    ...Exposed internal documents and collaboration suites can leak sensitive data. Adversaries can use this data to blackmail organizations or damage their reputations. Metadata is exposed in almost any document or file that is created and is rarely removed before sharing files. This metadata is used by attackers for targeted phishing and malware attacks. Discovered or stolen corporate data and credentials are sold and exchanged on criminal and dark web forums, resulting in easy access for attackers and potential damage to an organization’s reputation.
  • 9
    TikBox

    TikBox

    TikBox

    ...In-house legal teams can create custom agreements or integrate existing ones into the contract builder, ensuring colleagues in various functions have access to appropriate contractual arrangements. Our multi-layered encryption ensures the integrity of your copyright & provenance metadata & labels. This safeguards your data against manipulation & secures your licensing revenue streams. TikBox is pioneering an online ecosystem tailored for digital content creators to assert copyrights, embed provenance details, and unlock new revenue streams from their online assets. Our platform is designed to seamlessly integrate copyright and provenance-related metadata into your digital creations, safeguarding them across the internet.
    Starting Price: $5.84 per month
  • 10
    LiveWire

    LiveWire

    BlueCat

    ...LiveWire delivers real-time packet capture that can be selectively stored and analyzed with advanced workflows, visualizations, and correlation tools; it can automatically detect encrypted traffic and store only what’s needed (headers or metadata), saving disk space while preserving forensics data. It supports “intelligent packet capture,” converting packet-level data into enriched flow-based metadata (called LiveFlow), which can feed into the companion monitoring platform BlueCat LiveNX.
  • 11
    Cyclops

    Cyclops

    Cyclops Security

    Prioritizing risk is one of the biggest challenges in cyber security, our innovative solution creates a business context for your security operations, allowing you to validate the effectiveness of your security controls in the context of your unique business requirements. Cyclops integrates with your existing security tools using the CSMA approach to gather metadata on threats, vulnerabilities, cloud instances, SaaS apps, and more. It then enriches this data with context and insights by looking at the same entities in different products that are integrated. By providing this contextualized approach to risk validation, our cybersecurity mesh product helps you make intelligent decisions and focus on what really matters.
  • 12
    PatrOwl

    PatrOwl

    PatrOwl.io

    ...Automation of static code analysis, external resources assessment and web application vulnerability scans. Access a comprehensive and continuously updated vulnerability database scored and enriched with exploit and threat news information. Metadata are collected and qualified by security experts from public OSINT and private feeds.
    Starting Price: €49 per month
  • 13
    IDSync

    IDSync

    IDSync

    ...The Identity Syncronizer Active Directory to Active Directory platform enables an MSP to connect its on-premise Active Directory to its customers’ Active Directories for purposes of provisioning and synchronizing user metadata and passwords for its technicians, those who will be accessing the customers’ Active Directory and networks. IDSync provides an interface through which the MSP can identify those technicians for provisioning, identify target Active Directories into which the technicians will be provisioned or de-provisioned. Provisioning and synchronization can be maintained at the individual user level or can be accomplished in bulk via security groups.
  • 14
    Cryptomage

    Cryptomage

    Cryptomage

    ...Forensics to better measure the ratio of security events against source of traffic. Extraction of high-risk network traffic – easy to analyze and focus on specific threat levels. Storage of processed traffic metadata in extended format – faster trend analysis.
  • 15
    ISEEK

    ISEEK

    XtremeForensics

    ...Once ISEEK has been used to pinpoint the required data and reduce the volume for further review it enables multiple encrypted results containers to have their contents extracted in a number of different formats (with optional XML metadata) for ingesting by a review tool. These formats include generic load files and a Relativity-specific load file.
  • 16
    xSecuritas

    xSecuritas

    xSecuritas, Inc

    ...With features like invisible watermarks, screen capture prevention, and webcam watermarks, it ensures secure handling of digital content. The platform supports both visible and invisible watermarks that can include metadata such as user ID, IP address, and Microsoft sensitivity labels. xSecuritas is designed to work with virtual desktop infrastructure (VDI), video conferencing platforms, and remote work environments, ensuring comprehensive protection across all devices and channels. Additionally, it offers flexible policy management through a cloud or on-premises policy server, providing businesses with the tools they need to enforce data security policies effectively.
    Starting Price: $39
  • 17
    LANGuardian

    LANGuardian

    NetFort Technologies

    ...Be it sluggish networks, intrusion attempts, or file-encrypting ransomware, a single instance of LANGuardian provides all the visibility and detail you need to immediately detect and resolve any issues. Easy to deploy, no major changes to the network, no agents, clients, or logs required. Netfort’s unique metadata provides readable, interpretable detail that can be retained for long periods without expensive storage. Search by username, IP address or subnet, file name, or web address. Drill down to get readable detail; ideal for multiple network security and operational use cases. See detail like usernames, file and folder names, domains, URIs, SQL queries.
  • 18
    Barac

    Barac

    Venari Security

    ...Read our advisory paper, get insight into the encrypted traffic problem and understand why the use of TLS protocols and your existing infrastructure are raising the security risks for your critical data. Then read how our unique solution utilises the latest technology to ensure your business is cyber secure, crypto compliant and delivering ROI. Metadata is extracted from all incoming/outgoing encrypted data packets in real time, and forwarded to the Barac platform for analysis. Unique AI utilising machine learning and behavioural analytics (involving 200+ metrics) detects known threat vectors and abnormal traffic to discover potential threats. Alerts are sent to your specified security team SOC, SIEM or alternative, for immediate response.
  • 19
    Bricata

    Bricata

    Bricata

    ...Bricata unifies and simplifies securing hybrid, multi-cloud and IoT environments in real-time so security teams can effectively defend and secure their networks without limiting or slowing down the rest of the enterprise. See everything that happens on your network in an instant, with all the high-fidelity metadata at your fingertips so you can know in real-time how users, devices, systems and applications are behaving on the network.
  • 20
    NETSCOUT Omnis Security
    ...Threat detection with selected intelligence, behavioral analytics, open source data, and advanced statistics. Contextual threat detection and investigation using a robust source of metadata and packages. Automated edge blocking with the best stateless packet processing technology, or third-party blocking devices.
  • 21
    Falcon Cloud Workload Protection
    Falcon Cloud Workload Protection provides complete visibility into workload and container events and instance metadata enabling faster and more accurate detection, response, threat hunting and investigation, to ensure that nothing goes unseen in your cloud environment. Falcon Cloud Workload Protection secures your entire cloud-native stack, on any cloud, across all workloads, containers and Kubernetes applications. Automate security and detect and stop suspicious activity, zero-day attacks, risky behavior to stay ahead of threats and reduce the attack surface. ...
  • 22
    Worldr

    Worldr

    Worldr

    ...It can be utilized in any environment, whether that be cloud based or on-premise; our lightweight architecture can be deployed in minutes for any size organization. Ensure full ownership of data so no one, not even Microsoft, can access it. Messages, user details, and metadata are stored in a database protected by a transparent data encryption layer while encryption keys are stored in Hashicorp Vault. Store your data anywhere in the world based on compliance, legal or regulatory requirements. Adhere to sector specific data transfer and processing regulations and meet mandates enforced by various countries to ensure data sovereignty.
  • 23
    Grafana Loki
    ...Unlike traditional logging systems, Loki is optimized for cloud-native applications, making it a great fit for modern, containerized environments like Kubernetes. It works seamlessly with Grafana for visualizing log data alongside metrics and traces, providing a unified observability platform. Loki indexes only metadata, such as labels and timestamps, which reduces the amount of data stored and improves query performance compared to more traditional log management systems. This lightweight approach allows for easier scalability and cost-effective storage. Loki also supports log aggregation from various sources, including Syslog, application logs, and container logs, and integrates with other observability tools to provide a complete view of system performance.
    Starting Price: Free
  • 24
    DoControl

    DoControl

    DoControl

    ...DoControl’s Data Access Controls redefine how threat prevention is done at scale. Protecting against unknown or unusual activity requires security teams to ingest logs from multiple apps, organize the metadata, detect anomalies, and take actions. DoControl automates all of it right out of the box.
  • 25
    Proofpoint Emerging Threat (ET) Intelligence
    ...Emerging Threat (ET) intelligence helps prevent attacks and reduce risk by helping you understand the historical context of where these threats originated, who is behind them, when have they attacked, what methods they used, and what they're after. Get on-demand access to current and historical metadata on IPs, domains, and other related threat intelligence to help research threats and investigate incidents. In addition to reputation intel, you get condemnation evidence, deep context, history, and detection information. It's all searchable in an easy-to-use threat intelligence portal that includes: Trends and timestamps of when a threat was seen and the associated category.
  • 26
    Prosperoware CAM

    Prosperoware CAM

    Prosperoware

    ...CAM minimizes the chaos of data spread across systems, making it easier for users to place documents in the right place and for risk management teams to understand context. Quickly provision Teams, Channels, workspaces, folders, & documents automatically or through a human workflow across systems. Apply rich metadata to help end users locate data & risk management teams to understand document context. Gain naming templates to create standardized naming for different groups and teams. Transform the way you protect your data. Manage internal & external users and groups across systems, assign relevant roles and permissions, & grant permissions or restrictions.
  • 27
    GigaSECURE

    GigaSECURE

    Gigamon

    ...GigaSECURE enables security teams to obtain broad access to and control of network data, no matter where it resides. It can be customized to extract specific application sessions, metadata and decrypted traffic. In this architecture, security tools can operate inline or out-of-band at peak performance without compromising network resiliency or speed.
  • 28
    Corelight

    Corelight

    Corelight

    ...After all, your top people should be threat hunting, not troubleshooting. The most capable platform for understanding and protecting your network is built on open source. You'll have open access to your metadata and the ability to customize and extend your capabilities — together with a vibrant community. We’ve built the leading team of Zeek experts and contributors, and have assembled a world-class support team that continually delights customers with their unparalleled knowledge and fast response times. Proactive, secure, and automatic—when you enable Corelight Dynamic Health Check your Corelight Sensor sends performance telemetry back to Corelight to proactively monitor for things like disk failures or abnormal performance metrics that could indicate a problem.
  • 29
    Rightsline

    Rightsline

    Rightsline

    ...Rightsline is the only comprehensive, cloud-based solution with both the flexibility to work the way you do and the sheer muscle to scale your business to its highest potential. Track any kind of metadata for any kind of library, including your underlying physical and digital assets. Track inbound or outbound licenses, with multi-dimensional rights sets that put real-time avails at your fingertips. Calculate many kinds of royalties, even complex combinations. Issue accounting documents directly, or sync with your ERP. Calculate many kinds of royalties, even complex combinations. ...
  • 30
    Skopenow

    Skopenow

    Skopenow

    Skopenow instantly builds comprehensive, court-ready, digital reports on businesses and people, collecting and analyzing publicly available information from data sources including social media, the dark web, associated vehicles, court records, and contact data. Establish the digital footprint of your subject by collecting and collating relevant information and metadata into an automated report, enabling you to start your investigation as soon as your report is loaded. Automation of the search, collection, sorting, and analysis of open-source data. Use red flags, such as behaviors and keywords, to create a real-time digital footprint of publicly available data to make informed decisions. Establish connections between a subject’s associates and business affiliations through advanced scanning of social profiles, posts, and digital interactions.
  • Previous
  • You're on page 1
  • 2
  • Next