Suggested Categories:

Diagram Software
Diagram software allows users to visually represent data, processes, and ideas through various types of diagrams. These tools offer an intuitive interface that helps users drag and drop elements, easily connecting shapes, text, and images to create meaningful visual representations. Many diagramming applications come with templates and pre-designed components to speed up the creation process, allowing users to focus on customization. Collaboration features are often included, enabling teams to work together in real-time or asynchronously. Popular diagram software options are used across a wide range of industries, from project management to software design, helping streamline communication and decision-making.
Data Mapping Software
Data mapping software enables users to accurately map data points so that source fields and destination fields are mapped correctly. Data mapping tools are useful for data migrations, data integrations, or data transformations.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.

17 Products for "schema" with 1 filter applied:

  • 1
    CREDEBL

    CREDEBL

    CREDEBL

    Effortlessly define and tailor credentials with our user-friendly schema template. Customize credentials for employees, customers, students, citizens, or any user, incorporating detailed schema information and intuitive controls for seamless management. Seamlessly issue digital credentials and explore a comprehensive overview on the platform for efficient credential verification and management. Securely connect with and receive credentials from diverse organizations & ecosystems with a simple tap on your screen. ...
  • 2
    ManageEngine ADAudit Plus
    ...AD auditing helps detect and respond to insider threat, privilege misuse, and other indicators of compromise, and in short, strengthens your organization's security posture. Gain granular visibility into everything that resides in AD, including objects such as users, computers, groups, OUs, GPOs, schema, and sites, along with their attributes. Audit user management actions including creation, deletion, password resets, and permission changes, along with details on who did what, when, and from where. Keep track of when users are added or removed from security and distribution groups to ensure that users have the bare minimum privileges.
    Starting Price: $595.00/year
    View Software
    Visit Website
  • 3
    EraSearch

    EraSearch

    Era Software

    Purpose-built for cloud-native deployments, EraSearch brings you a dynamic data fabric that leverages decoupled storage & compute, a true zero-schema design, and adaptive indexing to deliver an infinitely-scalable log management experience with an unparalleled reduction in cost and complexity. Lots of log management products are built on top of Elasticsearch. We built EraSearch from scratch to solve its key problems. By embracing a stateless design for all of the core components, managing EraSearch with k8s is a dream. ...
    Starting Price: ¢65 per GB
  • 4
    XyLoc Security Server

    XyLoc Security Server

    Ensure Technologies

    ...Provides compliance reporting (e.g., HIPAA) with encrypted user audit logs. Scales easily to support tens of thousands of users. Supports Active Directory® (AD) with a Schema Extension, and SQL Server® environments.
  • 5
    Valimail

    Valimail

    Valimail

    ...And you also get the benefits of brand protection, compliance, increased email deliverability, and the ability to leverage cutting-edge email standards like BIMI, AMP, and Schema.org. Automatic detection of outbound sending services. Access to the largest database of named sending services. Detailed views into the authentication status (SPF, DKIM, and DMARC) of all sending domains and services. Automated DKIM key detection and configuration.
  • 6
    AuthZed

    AuthZed

    AuthZed

    ...The most mature open source Zanzibar implementation designed for both consistency and performance at scale. Define fine-grained access for any object in your application or across your product suite and manage permissions using a centralized schema. Specify consistency requirements per authorization check; tunable consistency features balance performance and correctness according to your use case. SpiceDB returns lists of authorized subjects and accessible resources, helpful when pre-filtering permission-based results. Instrumented with observability tooling, a powerful Kubernetes operator, and load-testing capabilities, SpiceDB prioritizes both developer and platform engineering experiences.
  • 7
    DataSet

    DataSet

    DataSet

    ...Ingest structured, semi-structured, and unstructured data faster than ever before. A limitless enterprise infrastructure for live data queries, analytics, insights, and retention, with no data schema requirements. The technology of choice for engineering, DevOps, IT, and security teams to unlock the power of data. Sub-second query performance powered by a patented parallel processing architecture. Work quicker and smarter to make better business decisions. Ingest hundreds of terabytes effortlessly. No rebalancing nodes, storage management, or resource reallocation. ...
    Starting Price: $0.99 per GB per day
  • 8
    Golf

    Golf

    Golf

    ...The platform supports enterprise authentication (JWT, OAuth Server, API key), automatic telemetry, and a file-based structure that eliminates decorators or manual schema wiring. With built-in utilities for LLM interactions, error logging, OpenTelemetry integration, and deployment tools (such as a CLI with golf init, golf build dev, golf run), Golf provides a full stack for agent-native services. Included also is the Golf Firewall, an enterprise-grade security layer for MCP servers that enforces token validation.
    Starting Price: Free
  • 9
    Scanner

    Scanner

    Scanner

    Scanner.dev is a cloud-native security data lake and lightweight security information and event management (SIEM) platform that indexes logs directly in your own Amazon S3 buckets, letting you retain unlimited logs and run full-text searches across petabytes of data in seconds without additional ETL or schema requirements. It builds lightweight indexes that make any log format instantly searchable and supports hyper-fast search and investigation, continuous threat detection with customizable detection rules managed as code via GitHub, and integrated alerting with APIs for automation and integration into existing security workflows. Scanner’s streaming detection engine continuously evaluates rule queries in near real time and can backtest detection logic against historical data, while its API and Model Context Protocol (MCP) enable programmatic access and AI-assisted analysis of security data.
    Starting Price: $30,000 per year
  • 10
    DBArtisan
    Proactively manage all major DBMSs (SQL Server, Azure SQL Database, Oracle Database, Sybase ASE and IQ, Db2 LUW and z/OS, Redshift, MySQL, PostgreSQL, and Greenplum) from a single common interface. Reduce training requirements and streamline collaboration among different teams across the organization. Manage multiple Oracle-specific schema object types and SQL Server advanced object properties such as temporal tables, in-memory tables, and natively compiled triggers, procedures and functions. Comprehensive tools help you manage space, data and performance to keep your databases optimized and available. Manage the performance of your databases with a built-in process monitor that helps you understand who is connected to your database along with each user's current activity and session-related data. ...
  • 11
    GemOS

    GemOS

    GemOS

    ...Safeguard user access with industry-leading security based on PKI and hierarchical-deterministic (HD) identity trees. Integrate your organization's identity and permission schemas for mirrored functionality.
  • 12
    Amazon Security Lake
    ...With Security Lake, you can get a more complete understanding of your security data across your entire organization. You can also improve the protection of your workloads, applications, and data. Security Lake has adopted the Open Cybersecurity Schema Framework (OCSF), an open standard. With OCSF support, the service normalizes and combines security data from AWS and a broad range of enterprise security data sources. Use your preferred analytics tools to analyze your security data while retaining complete control and ownership over that data. Centralize data visibility from cloud and on-premises sources across your accounts and AWS Regions. ...
    Starting Price: $0.75 per GB per month
  • 13
    Tenzir

    Tenzir

    Tenzir

    ...It enables users to seamlessly gather data from various sources, parse unstructured data into structured formats, and transform it as needed. It optimizes data volume, reduces costs, and supports mapping to standardized schemas like OCSF, ASIM, and ECS. Tenzir ensures compliance through data anonymization features and enriches data by adding context from threats, assets, and vulnerabilities. It supports real-time detection and stores data efficiently in Parquet format within object storage systems. Users can rapidly search and materialize necessary data and reactivate at-rest data back into motion. ...
  • 14
    ThreatMate

    ThreatMate

    ThreatMate

    ...ThreatMate’s compliance agent queries your assets and 3rd party SaaS services to collect evidence to enrich vulnerability scans, check for compliance with IT policy, SOC-2, NIST, ISO, and other compliance schema, and detect suspicious behaviors on the network. Discover all assets on your external, cloud, and internal networks.
  • 15
    ChaosSearch

    ChaosSearch

    ChaosSearch

    ...Watch this short video to learn how our unique approach and architecture allow ChaosSearch to address the challenges of today’s data & analytic requirements. ChaosSearch indexes your data as-is, for log, SQL and ML analytics, without transformation, while auto-detecting native schemas. ChaosSearch is an ideal replacement for the commonly deployed Elasticsearch solutions.
    Starting Price: $750 per month
  • 16
    JackDB

    JackDB

    JackDB

    ...Roles are a very convenient and secure way to restrict database access to authorized users and provision new users with access to data sources. Explore everything in your database, not just tables and views. View your indexes, schemas, and other important system details such as tablespaces and user sessions.
    Starting Price: $49 per user per month
  • 17
    Cribl Stream
    ...Get the right data, where you want, in the formats you need. Route data to the best tool for the job - or all the tools for the job - by translating and formatting data into any tooling schema you require. Let different departments choose different analytics environments without having to deploy new agents or forwarders. As much as 50% of log and metric data goes unused – null fields, duplicate data, and fields that offer zero analytical value. With Cribl Stream, you can trim wasted data streams and analyze only what you need. ...
    Starting Price: Free (1TB / Day)
  • Previous
  • You're on page 1
  • Next