Data Leak Detection Related Products

HoundDog.ai Static Code Scanner
HoundDog.ai Static Code Scanner logo

HoundDog.ai Static Code Scanner

Proactively Prevent PII Leaks & Data Breaches

PII Data Leakage Detection
G-71 Security
G-71 Security logo

G-71 Security

Investigate leaks of text data

Text Data Leak Detection
Securelog
Securelog logo

Securelog

Prevent data breaches by automatically finding and removing leaked secrets.

Secret Scanning
Metaplane
Metaplane logo

Metaplane

Data observability for modern data teams

Data Quality Monitoring
Elementary
Elementary logo

Elementary

Open-source data observability for data teams

Data Quality Monitoring
Vuxep
Vuxep logo

Vuxep

Know where your data is leaked and which passwords to change

Dark Web Crawling
Do hackers know me?
Do hackers know me? logo

Do hackers know me?

See yourself through the eyes of a hacker

Data Breach Analysis
LotusEye
LotusEye logo

LotusEye

Detect anomalies in time series data with AI-powered analysis.

Anomaly Detection
Strac
Strac logo

Strac

Remove PCI, PHI, PII Leaks from SaaS, Cloud, Endpoints & Generative AI

SaaS Data Security
My Hacker News
My Hacker News logo

My Hacker News

Your daily dose of personalized Hacker News Newsletter.

Personalized News Digest
Lariat Data
Lariat Data logo

Lariat Data

Observability for Data Engineering Teams

Data Observability
HackGATE
HackGATE logo

HackGATE

Empowering ethical hacking with visibility and control

Penetration Testing
Malloc
Malloc logo

Malloc

A mobile app that protects your phone from spyware.

Spyware Protection
Asterisk
Asterisk logo

Asterisk

AI-augmented security audits for modern development teams.

AI-Powered Security Audits
Sensu
Sensu logo

Sensu

Modern monitoring for dynamic infrastructures.

Open-Source Monitoring
keyval
keyval logo

keyval

Open-source codeless monitoring pipeline

Codeless Monitoring
Exploit Alarm
Exploit Alarm logo

Exploit Alarm

Vulnerability intelligence for real-time threat analysis

Threat Intelligence
Stealth Worker
Stealth Worker logo

Stealth Worker

Information Security (Cyber Security), Compliance and Privacy (GDPR &…

Cyber Security
Benchify
Benchify logo

Benchify

Bug-free code without tests

Automated Code Analysis
Appcanary
Appcanary logo

Appcanary

Appcanary tracks the dependencies you use in your apps and servers…

Dependency Management
Nimbus
Nimbus logo

Nimbus

Nimbus reduces Datadog costs by more than 60% without Manual Effort

Datadog Cost Optimization
Code Spoonfeeder
Code Spoonfeeder logo

Code Spoonfeeder

Securely analyze your code without storing your files.

Code Generation
JumpWire
JumpWire logo

JumpWire

Dynamic access controls for all data and databases

Data Access Control
LunaSec
LunaSec logo

LunaSec

An Open Source dependency security tool that is smarter than the rest

Dependency Scanning
Telmai
Telmai logo

Telmai

Data quality profiling and monitoring

Data Profiling
Quantstamp
Quantstamp logo

Quantstamp

Security auditing for Web3

Smart Contract Auditing
Templarbit
Templarbit logo

Templarbit

Protecting applications from malicious activity

Application Security
Remy
Remy logo

Remy

Resolve product security risks early with AI

AI-Powered Security
DepsAudit
DepsAudit logo

DepsAudit

Package monitoring you didn't know you needed

Dependency Vulnerability Scanning
Small Hours
Small Hours logo

Small Hours

AI-powered software observability and root cause analysis.

Root Cause Analysis