Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Formal Alternatives

Formal Reviews & Product Details

Verified User in Financial Services
AF
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Formal?

Formal gives me something others tools dont - actual control of my data. Instead of just telling me where my data is and classifying it (it does that too), Formal gives me the ability to enforce data controls (dynamic data masking, row-level filtering, and field-level encryption). Review collected by and hosted on G2.com.

What do you dislike about Formal?

You always have to keep up because of how fast Formal builds! Review collected by and hosted on G2.com.

What problems is Formal solving and how is that benefiting you?

Data Security

Data Loss Prevention

Audit Logs

Data Policy Enforcement Review collected by and hosted on G2.com.

Formal Overview

What is Formal?

Over the past decade, the data stack has evolved, bringing new technologies and vulnerabilities. Nowadays, company data is scattered across every type of data store imaginable. This scattered data is also being accessed by numerous employees across the company. With the modern data stack growing more decentralized every year, it's hard to collect and control these sprawling data stores, so that consistent and commonsense rules can be applied to them all. Formal products enable real-time understanding of an organization's data schema, sensitive data storage, consumption across teams, and the ability to secure everything from one place. It allows for the design of access and encryption policies. Our aim is to be the operating system for secure data management. Formal provides a protocol-aware access proxy, supports discovery, categorization, and policy enforcement in data stores.

Formal Details
Discussions
Formal Community
Show LessShow More
Product Description

Formal is building a unified, developer-friendly data and infrastructure security access platform. We have built a protocol-aware reverse proxy supporting various datastores like Postgres, AWS S3, Snowflake to help enterprises solve a range of problems from data security and compliance, to data quality management and infrastructure access.


Seller Details
Seller
Formal

Loris W.
LW
Overview Provided by:

Recent Formal Reviews

Verified User
A
Verified UserMid-Market (51-1000 emp.)
5.0 out of 5
"Formal solves problems not just tells me about them"
Formal gives me something others tools dont - actual control of my data. Instead of just telling me where my data is and classifying it (it does th...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Formal Media

Answer a few questions to help the Formal community
Have you used Formal before?
Yes
G2 reviews are authentic and verified.

There are not enough reviews of Formal for G2 to provide buying insight. Below are some alternatives with more reviews:

1
JumpCloud Logo
JumpCloud
4.5
(3,050)
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
2
Microsoft Entra ID Logo
Microsoft Entra ID
4.5
(788)
Entra ID is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups and help secure access to applications including Microsoft online services like Office 365 and a world of non-Microsoft SaaS applications.
3
BeyondTrust Remote Support Logo
BeyondTrust Remote Support
4.7
(346)
The #1 solution for leading enterprises to accelerate and secure your service desk with centralized, efficient, and secure access for servicing and monitoring any endpoint, anywhere, attended or not.
4
Devolutions Remote Desktop Manager Logo
Devolutions Remote Desktop Manager
4.7
(193)
Remote Desktop Manager lets you centralize all your remote connections and passwords into a unique platform.
5
Ping Identity Logo
Ping Identity
4.4
(106)
Ping Identity (NYSE: PING) offers intelligent identity capabilities such as single sign-on and multi-factor authentication for workforce, customer and partner use cases.'
6
Teleport Logo
Teleport
4.5
(104)
The Teleport Access Platform delivers on-demand, least privileged access to infrastructure on a foundation of cryptographic identity and zero trust. It eliminates credentials and standing privileges, hardens infrastructure with identity governance and security, and unifies the management of access policies across your infrastructure.
7
StrongDM Logo
StrongDM
4.7
(84)
strongDM’s People-First Access platform gives businesses confidence in their access and audit controls at scale. It combines authentication, authorization, networking, and observability to simplify workflows and make it easier for technical staff to access the tools they need without compromising security and compliance requirements.
8
Salesforce Shield Logo
Salesforce Shield
4.5
(82)
Salesforce Security and Privacy offers a powerful set of tools for any customer who needs an extra level of control to meet internal or regulatory compliance requirements.
9
CloudEagle Logo
CloudEagle
4.7
(71)
CloudEagle is an all-in-one SaaS research, management and procurement platform
10
Akeyless Platform Logo
Akeyless Platform
4.6
(67)
Unified secrets management vault platform is built to secure DevOps secrets and access to production resources, made for hybrid cloud as well as legacy environments
Show More