It's been two months since this profile received a new review
Leave a Review
Compare this with other toolsSave it to your board and evaluate your options side by side.
Save to board

Thales Data Protection on Demand Reviews & Product Details

Profile Status

This profile is currently managed by Thales Data Protection on Demand but has limited features.

Are you part of the Thales Data Protection on Demand team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Thales Data Protection on Demand Media

Thales Data Protection on Demand Demo - Data Protection On Demand HSM On Demand for MicroSoft ADCS
Data Protection On Demand HSM On Demand for MicroSoft ADCS
Thales Data Protection on Demand Demo - Data Protection On Demand Admin Console
Data Protection On Demand Admin Console
Thales Data Protection on Demand Demo - Data Protection On Demand Tenants View
Data Protection On Demand Tenants View
Product Avatar Image

Have you used Thales Data Protection on Demand before?

Answer a few questions to help the Thales Data Protection on Demand community

Thales Data Protection on Demand Reviews (4)

Reviews

Thales Data Protection on Demand Reviews (4)

4.6
4 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Manzar A.
MA
Software Engineer
Enterprise (> 1000 emp.)
"Review for Thales Data Protection on Demand"
What do you like best about Thales Data Protection on Demand?

Easy and quick deployment and onboarding.

Beautiful UI and extensive documentation make training new employees easy and seamless. Review collected by and hosted on G2.com.

What do you dislike about Thales Data Protection on Demand?

There is nothing to be disliked about the capabilities of DPoD but Rapidly changes make it a little difficult to make ourselves updated about administering DPoD. Review collected by and hosted on G2.com.

Verified User in Information Technology and Services
UI
Small-Business (50 or fewer emp.)
"One of the best cloud hsm"
What do you like best about Thales Data Protection on Demand?

It has cloud based hsm, and very simpler security system Review collected by and hosted on G2.com.

What do you dislike about Thales Data Protection on Demand?

Thales data protection on demand has no much disadvantages. Review collected by and hosted on G2.com.

Nishant A.
NA
Cloud Architect
Civil Engineering
Enterprise (> 1000 emp.)
"Deploy the service in no time to protect to get on demand encryption for data security"
What do you like best about Thales Data Protection on Demand?

It is not just data protection, it is data protection on demand!

The Hardware Security Module has proven to be a great innovation for us to set up a key vault for our applications. Review collected by and hosted on G2.com.

What do you dislike about Thales Data Protection on Demand?

There is nothing going bad at the moment however with regards to the pricing model, it needs more refinement from the vendor's end Review collected by and hosted on G2.com.

NA
ICT Administrator
Enterprise (> 1000 emp.)
"User friendly authentication tools offers a lot of customization"
What do you like best about Thales Data Protection on Demand?

The authentication integration with the mobile device (Mobilepass +) is very good and connects to seamlessly.

The web portal offers a lot of customization like including the company's logo on the web page and easy to navigate options in order to perform MACD operations from the options available. Review collected by and hosted on G2.com.

What do you dislike about Thales Data Protection on Demand?

There is nothing wrong with the product and it solves the said purpose maintaining the security and confidentiality of the end user. Review collected by and hosted on G2.com.

There are not enough reviews of Thales Data Protection on Demand for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Egnyte Logo
Egnyte
4.4
(1,141)
Egnyte delivers the only modern content platform that is purpose-built for businesses. Egnyte gives IT centralized control and protection over their files, and users fast access to their content, no matter how or where work happens.
2
Virtru Email Encryption Logo
Virtru Email Encryption
4.4
(406)
Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.
3
Akeyless Identity Security Platform Logo
Akeyless Identity Security Platform
4.6
(89)
Unified secrets management vault platform is built to secure DevOps secrets and access to production resources, made for hybrid cloud as well as legacy environments
4
Keyfactor Command Logo
Keyfactor Command
4.5
(82)
Keyfactor Command, formerly Certified Security Solutions (CSS), is a leading provider of secure digital identity management solutions that enables organizations to confirm authenticity, and ensure the right things are interacting in the right ways in our connected world.
5
Azure Key Vault Logo
Azure Key Vault
4.5
(55)
Azure Key Vault is a cloud service designed to securely store and manage cryptographic keys, secrets, and certificates used by applications and services. It enables organizations to safeguard sensitive information such as API keys, passwords, and connection strings, ensuring that these secrets are protected and accessible only to authorized users and applications. By centralizing the management of keys and secrets, Azure Key Vault helps maintain compliance with security standards and simplifies the administration of cryptographic materials. Key Features and Functionality: - Secrets Management: Securely store and tightly control access to tokens, passwords, certificates, API keys, and other secrets. - Key Management: Easily create and control the encryption keys used to encrypt your data. - Certificate Management: Provision, manage, and deploy public and private Transport Layer Security/Secure Sockets Layer (TLS/SSL) certificates for use with Azure and your internal connected resources. - Access Control: Integrates with Azure Active Directory (Azure AD) to provide fine-grained access control through role-based access control (RBAC) and access policies. - Monitoring and Logging: Monitor and audit key usage with Azure logging—pipe logs into Azure HDInsight or your security information and event management (SIEM) solution for more analysis and threat detection. - Integration with Azure Services: Seamlessly integrates with other Azure services, such as Azure Storage, Azure SQL Database, and Azure App Service, allowing applications to retrieve and use secrets, certificates, and keys securely without needing to store sensitive information in application code or configuration files. Primary Value and Problem Solved: Azure Key Vault addresses the critical need for secure and efficient management of cryptographic keys and secrets in cloud environments. By centralizing the storage and access control of sensitive information, it reduces the risk of accidental leaks and unauthorized access. The service simplifies the process of key and secret management, allowing developers to focus on application development without the burden of implementing custom security solutions. Additionally, Azure Key Vault enhances compliance with security standards and regulations by providing robust access controls, monitoring capabilities, and integration with Azure's security ecosystem.
6
Doppler secrets management platform Logo
Doppler secrets management platform
4.8
(62)
Doppler’s developer-first secrets management platform empowers teams to seamlessly orchestrate, govern, and control secrets across any environment at scale.
7
IBM Vault (formerly HashiCorp Vault) Logo
IBM Vault (formerly HashiCorp Vault)
4.3
(46)
HashiCorp Vault is a tool that secure user applications and infrastructure to limit the surface area and attack time in the event of a breach
8
SecureKey Logo
SecureKey
4.2
(49)
SecureKey is a leading identity and authentication provider that simplifies consumer access to online services and applications.
9
AWS Key Management Service (KMS) Logo
AWS Key Management Service (KMS)
4.4
(32)
AWS Key Management Service (KMS) is a service that help to create and control the encryption keys used to encrypt data, and uses Hardware Security Modules (HSMs) to protect the security of keys.
10
OpenSSH Logo
OpenSSH
4.7
(40)
OpenSSH provides tools that allows you to encrypt all traffic to help manage eavesdropping, connection hijacking, and other attacks to your Internet while providing secure tunneling capabilities and more.
Show More

Questions about Thales Data Protection on Demand? Ask real users or explore answers from the community

Get practical answers, real workflows, and honest pros and cons from the G2 community or share your insights.

GU
Guest User

What is Thales Data Protection on Demand used for?

Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
SafeNet Data Protection On Demand