Best Software for 2025 is now live!
Save to My Lists
Unclaimed
Unclaimed

Top Rated HyTrust Data Control Alternatives

HyTrust Data Control Reviews & Product Details

HyTrust Data Control Overview

What is HyTrust Data Control?

Whether you are running VMs in a private cloud powered by vSphere or a public clouds like IBM Softlayer, Microsoft Azure, vCloud Air or AWS, HyTrust DataControl provides strong encryption for virtual machines in any cloud, along with easy to deploy key management YOU control.

HyTrust Data Control Details
Show LessShow More
Product Description

Whether you are running VMs in a private cloud powered by vSphere or a public clouds like IBM Softlayer, Microsoft Azure, vCloud Air or AWS, HyTrust DataControl provides strong encryption for virtual machines in any cloud, along with easy to deploy key management YOU control.


Seller Details
Seller
HyTrust
HQ Location
Mountain View, CA
Twitter
@HyTrust
1,627 Twitter followers
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

HyTrust Data Control Media

Answer a few questions to help the HyTrust Data Control community
Have you used HyTrust Data Control before?
Yes
G2 reviews are authentic and verified.

There are not enough reviews of HyTrust Data Control for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Sprinto Logo
Sprinto
4.8
(1,247)
Sprinto productizes and automates all compliance requirements that would otherwise require manual effort, documentation, and paperwork, end to end. It integrates with your business systems like GSuite, AWS, Github, Google Cloud, etc., and ensures that these systems are in the state required by SOC2/ISO27001. Sprinto also comes builtin with features like policies, security training, org charts, device monitoring, etc., to help you meet SOC 2/ISO27001 requirements without having to purchase new software for these. All in all, Sprinto takes care of all the compliance roadblocks and speaks the audit language on your behalf, while you focus on increasing revenue.
2
Acronis Cyber Protect Cloud Logo
Acronis Cyber Protect Cloud
4.7
(1,040)
Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation provide unmatched ease for service providers — reducing complexity while increasing productivity and decreasing operating costs. Acronis Cyber Protect Cloud is the single service provider solution that combines backup, anti-malware (including anti-virus, anti-ransomware, and anti-cryptojacking) and security and management capabilities such as vulnerability assessments, patch management, URL filtering and more. Now, service providers can eliminate complexity and make security a centerpiece of their offerings while increasing SLAs, decreasing churn, and generating more recurring revenue. Get upgraded security with integrated AI-based defenses that protect clients from modern threats, make smarter use of resources so your team can focus on clients, and earn new recurring revenue and higher margins that strengthen your business. Enriched with next-gen, full-stack anti-malware protection and comprehensive yet simple management tools, built on top of our industry-leading backup and data recovery solution, Acronis Cyber Protect Cloud simplifies onboarding, daily operations, and reporting, and combats advanced attacks with new use cases enabled by integration. Acronis Cyber Protect Cloud makes it easy to deliver the modern cyber protection your clients seek.
3
Wiz Logo
Wiz
4.7
(698)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
4
Druva Data Security Cloud Logo
Druva Data Security Cloud
4.7
(621)
Druva Data Security Cloud provides Enterprise Endpoint Backup and Protection
5
Cisco Duo Logo
Cisco Duo
4.5
(394)
Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.
6
Lacework Logo
Lacework
4.3
(381)
Lacework offers the data-driven security platform for the cloud, and is the leading cloud-native application protection platform (CNAPP) solution. The Polygraph Data Platform is purpose-built with a single detection engine, user interface, and API framework. With the Platform, your team only needs to learn one system for all of your cloud and workload protections, leading to tool consolidation, greater organizational efficiencies, and cost savings. Only Lacework can collect, analyze, and accurately correlate data — without requiring manually written rules — across your organizations' AWS, Azure, Google Cloud, and Kubernetes environments, and narrow it down to the handful of security events that matter. By taking a data-driven approach to security, the more data you put in, the smarter the Platform gets. This automated intelligence drives better efficacy and a higher return on your investment. Security and DevOps teams around the world trust Lacework to secure cloud-native applications across the full lifecycle from code to cloud.
7
Redstor Backup and Archiving Logo
Redstor Backup and Archiving
4.6
(376)
Designed for service provision as well as Enterprise environments, Redstor’s disruptive, smart, cloud-native suite of services deliver the new standard in data management and protection. Redstor protects data residing in the broadest range of environments, spanning infrastructure and an ever-widening array of SaaS platforms, through a single multi-tenanted app. Redstor’s data management for infrastructure service protects data on modern and legacy infrastructure, including physical or virtualized servers, desktops and laptops. AI infused throughout Redstor’s app highlights data risks, protects against malware, including preventing the recovery of ransomware, and continuously improves based on community shared insights.
8
Virtru Email Encryption Logo
Virtru Email Encryption
4.4
(327)
Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.
9
Microsoft Defender for Cloud Logo
Microsoft Defender for Cloud
4.4
(302)
Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.
10
Orca Security Logo
Orca Security
4.6
(209)
Get workload-level visibility into AWS, Azure, and GCP without the operational costs of agents. You could buy three tools instead… but why? Orca replaces legacy vulnerability assessment tools, CSPM, and CWPP. Deploys in minutes, not months.
Show More