Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Fortanix Alternatives

Fortanix Reviews & Product Details

MM
Systems Administrator
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Fortanix?

Fortanix has separated encryption keys from hardware, it has provided me with something that the traditional key management solutions do not have – flexibility and portability. This has been very useful in facilitating Cloud Migration strategy for our organization. Review collected by and hosted on G2.com.

What do you dislike about Fortanix?

Managing many encryption devices, configuring them and monitoring can be strenuous, and especially in large organizational networks. Review collected by and hosted on G2.com.

What problems is Fortanix solving and how is that benefiting you?

Fortanix is protecting information in a complicated hybrid IT world. The data-centric approach also frees us from the constraints of having to rely on hardware and being locked into a specific vendor for encryption. Review collected by and hosted on G2.com.

Fortanix Overview

What is Fortanix?

With Fortanix, organizations gain the freedom to accelerate their digital transformation, combine and analyze private data, and deliver secure applications that protect the privacy of the people they serve. Fortanix decouples security from infrastructure – security becomes a property of the data itself.

Fortanix Details
Languages Supported
English
Show LessShow More
Product Description

Fortanix Data Security Manager (DSM) SaaS provides integrated data security with encryption, multicloud key management, tokenization, and other capabilities from one platform, delivered-as-a-service.


Seller Details
Seller
Fortanix
Year Founded
2016
HQ Location
Santa Clara CA
Twitter
@fortanix
1,029 Twitter followers
LinkedIn® Page
www.linkedin.com
34 employees on LinkedIn®
Description

With Fortanix, organizations gain the freedom to accelerate their digital transformation, combine and analyze private data, and deliver secure applications that protect the privacy of the people they serve. Fortanix decouples security from infrastructure – security becomes a property of the data itself.


AG
Overview Provided by:

Recent Fortanix Reviews

MM
Mariya M.Mid-Market (51-1000 emp.)
4.0 out of 5
"Greater ability for developing new technologies"
Fortanix has separated encryption keys from hardware, it has provided me with something that the traditional key management solutions do not have –...
HR
Henrijs R.Mid-Market (51-1000 emp.)
4.5 out of 5
"Information driven security approach"
By decoupling encryption keys from equipment, it awards me adaptability in sending safety efforts across various cloud conditions. This has been in...
RR
Rafael R.Small-Business (50 or fewer emp.)
5.0 out of 5
"Management solution for data centric security"
I found it interesting that Fortanix has a data-centric approach. This flexibility helps to rationalise the management of security operations and s...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Fortanix Media

Fortanix Demo - Fortanix Team
Fortanix Team
Fortanix Demo - Intel Events
Intel Events
Answer a few questions to help the Fortanix community
Have you used Fortanix before?
Yes

2 out of 3 Total Reviews for Fortanix

4.5 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
2 out of 3 Total Reviews for Fortanix
4.5 out of 5
2 out of 3 Total Reviews for Fortanix
4.5 out of 5

Fortanix Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
RR
Head of PR
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Fortanix?

I found it interesting that Fortanix has a data-centric approach. This flexibility helps to rationalise the management of security operations and some of the principal lifecycle aspects in multi-Cloud and hybrid environments. Review collected by and hosted on G2.com.

What do you dislike about Fortanix?

I require more information on how those keys are being utilized in other applications and in various settings. They do not offer much in terms of granular visibility into the service, which is vital for troubleshooting and identifying possible security threats. Review collected by and hosted on G2.com.

What problems is Fortanix solving and how is that benefiting you?

Fortanix has boosted my organization’s encryption capabilities. It also makes sure that we have a similar level of security when our data is stored in different locations. The single key management also helps to avoid some problems in work because administrative functions are carried out quickly. Review collected by and hosted on G2.com.

HR
Tax Associate
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Fortanix?

By decoupling encryption keys from equipment, it awards me adaptability in sending safety efforts across various cloud conditions. This has been instrumental in guaranteeing steady information assurance while moving responsibilities to the cloud. Review collected by and hosted on G2.com.

What do you dislike about Fortanix?

The restricted help for specific inheritance gadgets has demonstrated to be a test. A portion of our more established machines are not viable with the Fortanix programming, making security holes in our general foundation. Review collected by and hosted on G2.com.

What problems is Fortanix solving and how is that benefiting you?

Fortanix has worked on my capacity to oversee encryption keys across a mixture IT climate. The concentrated key administration framework kills the gamble of key spread and improves on key lifecycle the executives. Review collected by and hosted on G2.com.

There are not enough reviews of Fortanix for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Egnyte Logo
Egnyte
4.4
(1,012)
Egnyte delivers the only modern content platform that is purpose-built for businesses. Egnyte gives IT centralized control and protection over their files, and users fast access to their content, no matter how or where work happens.
2
Sprinto Logo
Sprinto
4.8
(1,246)
Sprinto productizes and automates all compliance requirements that would otherwise require manual effort, documentation, and paperwork, end to end. It integrates with your business systems like GSuite, AWS, Github, Google Cloud, etc., and ensures that these systems are in the state required by SOC2/ISO27001. Sprinto also comes builtin with features like policies, security training, org charts, device monitoring, etc., to help you meet SOC 2/ISO27001 requirements without having to purchase new software for these. All in all, Sprinto takes care of all the compliance roadblocks and speaks the audit language on your behalf, while you focus on increasing revenue.
3
Acronis Cyber Protect Cloud Logo
Acronis Cyber Protect Cloud
4.7
(1,040)
Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation provide unmatched ease for service providers — reducing complexity while increasing productivity and decreasing operating costs. Acronis Cyber Protect Cloud is the single service provider solution that combines backup, anti-malware (including anti-virus, anti-ransomware, and anti-cryptojacking) and security and management capabilities such as vulnerability assessments, patch management, URL filtering and more. Now, service providers can eliminate complexity and make security a centerpiece of their offerings while increasing SLAs, decreasing churn, and generating more recurring revenue. Get upgraded security with integrated AI-based defenses that protect clients from modern threats, make smarter use of resources so your team can focus on clients, and earn new recurring revenue and higher margins that strengthen your business. Enriched with next-gen, full-stack anti-malware protection and comprehensive yet simple management tools, built on top of our industry-leading backup and data recovery solution, Acronis Cyber Protect Cloud simplifies onboarding, daily operations, and reporting, and combats advanced attacks with new use cases enabled by integration. Acronis Cyber Protect Cloud makes it easy to deliver the modern cyber protection your clients seek.
4
Druva Data Security Cloud Logo
Druva Data Security Cloud
4.7
(621)
Druva Data Security Cloud provides Enterprise Endpoint Backup and Protection
5
Cisco Duo Logo
Cisco Duo
4.5
(394)
Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.
6
Redstor Backup and Archiving Logo
Redstor Backup and Archiving
4.6
(376)
Designed for service provision as well as Enterprise environments, Redstor’s disruptive, smart, cloud-native suite of services deliver the new standard in data management and protection. Redstor protects data residing in the broadest range of environments, spanning infrastructure and an ever-widening array of SaaS platforms, through a single multi-tenanted app. Redstor’s data management for infrastructure service protects data on modern and legacy infrastructure, including physical or virtualized servers, desktops and laptops. AI infused throughout Redstor’s app highlights data risks, protects against malware, including preventing the recovery of ransomware, and continuously improves based on community shared insights.
7
Virtru Email Encryption Logo
Virtru Email Encryption
4.4
(327)
Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.
8
Coro Cybersecurity Logo
Coro Cybersecurity
4.7
(205)
Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.
9
Hybrid Cloud Security Logo
Hybrid Cloud Security
4.5
(175)
Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.
10
Check Point CloudGuard CNAPP Logo
Check Point CloudGuard CNAPP
4.5
(155)
Check Point CloudGuard CNAPP provides you with more context to drive actionable security and smarter prevention, from code-to-cloud, across the application lifecycle. CloudGuard’s prevention-first approach protects applications and workloads throughout the software development lifecycle, and includes an effective risk management engine, with automated remediation prioritization, to allow users to focus on the security risks that matter.
Show More