Listing Thumbnail

    Securiti

     Info
    Sold by: Securiti 
    Vendor Insights
    Securiti Data Command Center is a centralized platform for enabling the safe use of data and AI. The platform provides contextual data+AI insights and automated controls across hybrid multicloud and SaaS environments.

    Overview

    Securiti Data Command Center is a centralized platform for enabling the safe use of data and AI. The platform provides contextual insights about the company data and AI models in hybrid multicloud and SaaS environments. Building on this foundation, multiple teams in an organization can leverage integrated modules to automate security, privacy, governance, and compliance controls.

    Contextual Data+AI Intelligence: Answer any question about your data and AI models from a variety of perspectives using a multi-dimensional knowledge graph.

    AI Security and Governance: Establish controls for the safe adoption of AI technologies, including GenAI.

    Data Security: Secure sensitive data in hybrid multicloud and SaaS environments with built-in Data Security Posture Management (DSPM) and Data Security Platforms (DSP).

    Data Privacy: Leverage the marketing leading privacy management technology to automate nearly all privacy operations using data intelligence and built-in regulatory context.

    Data Governance: Democratize data utilization across the organization by delivering comprehensive intelligence and controls.

    Security helps organizations to consolidate multiple data and AI tools with a platform that includes built-in functionality for AI Governance, Data Discovery and Classification, Data Security Posture Management (DSPM), Data Security Platform (DSP / Access Governance), Data Privacy Management, Data Governance, and Compliance Management.

    Highlights

    • Broad Data Systems Coverage: Support for hundreds of built-in connectors for public and private clouds, data lakes and warehouses, SaaS applications, and data streaming systems.
    • Highly Accurate Data Classification: Find hundreds of sensitive data elements across petabytes of data with out-of-the-box classifiers for structured and unstructured systems.
    • Unified Data+AI Controls: Automate security, privacy, governance, and compliance based on a shared foundation for contextual data+AI intelligence.

    Details

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Vendor Insights

     Info
    Skip the manual risk assessment. Get verified and regularly updated security info on this product with Vendor Insights.
    Security credentials achieved
    (2)

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    Platform Fee
    Securiti Platform Fee
    $100,000.00

    Vendor refund policy

    We do not currently support refunds, but you can cancel at any time.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    Vendor support

    https://app.securiti.ai/#/customer-support  In-product help center and customer support via email and online, during US business hours. support@securiti.ai 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    25
    In Data Security and Governance, Data Governance
    Top
    10
    In Data Governance
    Top
    10
    In Data Catalogs, Data Governance

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    20 reviews
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Data Discovery and Classification
    Supports hundreds of built-in connectors for public and private clouds, data lakes, warehouses, SaaS applications, and data streaming systems with out-of-the-box classifiers for structured and unstructured data systems
    Multi-Dimensional Knowledge Graph
    Provides contextual insights about data and AI models using a multi-dimensional knowledge graph for comprehensive data intelligence
    AI Governance Framework
    Establishes controls for safe adoption of AI technologies, including generative AI security and governance mechanisms
    Data Security Posture Management
    Implements built-in Data Security Posture Management (DSPM) and Data Security Platform (DSP) for securing sensitive data across hybrid multicloud and SaaS environments
    Privacy Automation
    Automates privacy operations using data intelligence with built-in regulatory context and comprehensive privacy management technology
    Data Discovery
    Automated discovery and classification of structured and unstructured data across cloud and on-premises environments
    Data Security Posture Management
    Advanced risk identification, dark data uncovering, and critical risk surfacing with comprehensive remediation capabilities
    Zero Trust Access Control
    Insider risk reduction through granular access governance controls and implementation of least privileged access model
    AI Security Management
    Comprehensive data security, privacy, and compliance framework for accelerating secure AI adoption and minimizing potential risks
    Data Governance Automation
    Intelligent metadata tagging, classification, data quality improvement, automated data retention, and metadata context enrichment
    AI Governance
    Provides active metadata-driven governance framework for AI strategies with rules, processes, and responsibilities to mitigate risks and ensure ethical AI practices
    Data Catalog Management
    Enables comprehensive discovery and understanding of data assets across hybrid and multi-cloud environments with full business context and metadata insights
    Automated Data Lineage
    Offers end-to-end lineage tracking with complete transparency into data transformation and flow across systems, including summary-level and technical lineage details
    Privacy Workflow Automation
    Centralizes and automates privacy workflows to address global regulatory requirements and encourage collaborative data protection
    Data Quality Management
    Replaces manual processes with automated data monitoring and rule management to scale data quality across enterprise environments

    Security credentials

     Info
    Validated by AWS Marketplace
    FedRAMP
    GDPR
    HIPAA
    ISO/IEC 27001
    PCI DSS
    SOC 2 Type 2
    -
    -
    -
    -
    -
    -
    -
    -
    No security profile

    Contract

     Info
    Standard contract
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4
    1 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    100%
    0%
    0%
    0%
    1 AWS reviews
    |
    73 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    Lucas B.

    Positive and innovative experience in Privacy Management - Dock

    Reviewed on Oct 24, 2025
    Review provided by G2
    What do you like best about the product?
    Securiti provided operational support for our Privacy Governance Program in practically all processes. I highlight its use for managing RoPA and Privacy Reports, Vendors Assessments and Data Subject Requests. In the Discovery module, we could map all the data that we have in our most important applications, which gives us a visualization of Dock's landscape.
    The Customer Support are always ready to undestand and help our needs. The implementation of the product Securiti in our company was smooth and easy to integrate.
    We use it everyday in our work routine.
    What do you dislike about the product?
    I believe there is much more room for cutomization, including reports, submissions and pages. The more customizable it is, the more it will adapt to the company's needs.
    What problems is the product solving and how is that benefiting you?
    Secuuriti solved a problem of integrating Privacy processes, using the moduule for Vendor processes, DSAR, Privacy Assessments and Data Breach.
    There were signifcant operational benefits and we noticed the ease of using the Securiti tools in all our internal areas.
    reviewer2765175

    Have built a zero trust foundation that protects customer data and reduces business risk

    Reviewed on Oct 15, 2025
    Review provided by PeerSpot

    What is our primary use case?

    The main use case for Securiti  in my organization is to safeguard the physical assets as well as the digital assets. The prime motive behind deploying the SOC or the security, cyber security solutions, or for that matter, the information security solutions within the bank is to safeguard the physical assets as well as the digital assets. Coming back to the digital assets, the focus is primarily on safeguarding the customer data, which is paramount to the day-to-day operations within the banking sector.

    A specific example of how I use Securiti  to safeguard customer data involves our crown jewel applications or the applications which are customer facing such as core banking, INB, internet banking, mobile banking, loan lifecycle management system, or tab banking. For all these customer facing applications, we have implemented ZTNA  1.0 and ZTNA  2.0 implementation is in progress. That means the zero trust network architecture is implemented for all the mission critical customer facing applications, wherein we have adequate safeguards in place for protecting people, processes, and related technologies.

    What is most valuable?

    The best features Securiti offers in my experience primarily safeguard the digital assets. I would say the prime purpose of security is to safeguard the digital assets. That means the data, underlying platform, and be it the storage, compute, network, data, and applications. These major five pillars are what security solutions aim to protect. Security is in today's context, whether it is IS security or a subset of it, cyber security, it is very much required to reduce the business risk, business continuity risk which may arise because of the disruptions of compromised IT apps.

    Of those features, I find the zero trust network, zero trust architecture, ZTA, most valuable and unique in Securiti. If you look at the zero trust architecture, it's the three main principles under this, which include principle of least privileges and microsegmentation of the network and role-based access control, fine-grained access control. With these three tenets of zero trust architecture, we are quite confident that the mission critical customer facing applications which are hosted in their respective production region, remain up, alive, and uncompromised.

    What needs improvement?

    To improve Securiti, I would say that ultimately the IT team as well as the business team, there has to be an amalgamation of their thought process, convergence of their thoughts, objectives, aspirations for achieving the business objective of a particular organization. The way forward is to form the fusion team wherein there is a judicious mix of business and IT and both the teams understand each other's limitations and the aspirations and the common objectives.

    As far as needed improvements in Securiti, I would say that automation is key. If you look at the kind of huge amount of data which SOC integrated devices are generating in terms of alerts, automation or the appropriate use of AI is the way forward. That will lead to the overall improvement in the efficiency as well as the threat intelligence will be much more accurate. To my mind, automation with the augmented use of GenAI or the agentic AI solution is the way forward.

    I choose eight for Securiti because for it to be a nine or 10, ultimately the uptime has to be improved, it should be nearing 100%. Apart from that, there has to be more unified communication happening between various customer facing applications. These siloed applications having their own kind of security solutions implemented also have to be brought on a uniform platform. Until that happens, there is always a gap which has to be filled. The processes within the SOC, whether it is SIEM , NBAD, or your DAM , alert analysis, logs analysis, these have to be predictive analysis, and the thwarting of the cyber attacks still requires more effort.

    For how long have I used the solution?

    I have been using Securiti since 2012, where I was responsible from the department's perspective for setting up the security operation center within the bank, security SOC 1.0. Thereafter, I was also SPOC from the department side for SOC 2.0. While performing my role as SPOC for the SOC, SPOC for the internal audit for the SOC initiative within the SBI, I was responsible for the asset integration into SOC. Thereafter the configuration of SIEM  agent, DAM  agents, NBAD, and cyber security incident closure. Those were the initial SOC 1.0 days wherein I have handled these challenges. Additionally, VA closure is one of my areas of expertise and passions.

    What do I think about the stability of the solution?

    Securiti has positively impacted my organization in a way that addresses the prime concern of the board of the bank or the business that the evolving cyber security, ever-evolving cyber security threat should not lead to the disruption in the applications, key customer facing applications availability. The top executive or the C-level executives want to understand the impact of implementing the various cyber security solutions in terms of the reduction, tangible reduction in the business risk. There we have proved that the return on investment is quite acceptable to the board's aspiration.

    A specific metric that demonstrates this ROI with Securiti involves our customer facing applications. If you look at core banking, INB, or ATM, treasury, or mobile banking, the uptime is upwards of 99%. With that kind of high availability and the continuous threat exposure management, CTEM, we are quite sure and we have proved our worth to the business in implementing the cyber security solutions. Apart from the uptime, the kind of rating which our application gets from independent agencies such as scorecard also proved the efficacy of the IT security solutions implemented within the bank.

    What do I think about the scalability of the solution?

    Securiti's scalability is impressive; it is capable of handling a large workload for a bank having 25,000 plus branches and a customer base of around 400 million customers. It can be scaled with the required hardware, either horizontally or vertically, without much disruption.

    How are customer service and support?

    Customer support for Securiti is quite reasonable, and if I have to rate them, I would say nine out of 10. They are prompt and they take care of most of the use cases or they provide prompt solutions.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We have been using Splunk for SIEM, and Imperva which is now acquired by Thales for DAM, as well as Qubro solutions for network security from inception. We have relied upon these solutions for almost a decade and do not foresee a need for an immediate shift as long as the assets are well protected and the uptime is maintained.

    How was the initial setup?

    Before choosing Securiti, we evaluated other options, but now we are using Securiti for data privacy. It is one of the important components of the SOC, apart from other components I have mentioned, whether it is SIEM or DAM. Securiti solutions are now largely responsible for safeguarding the data privacy within the bank.

    In my experience, Securiti is quite robust, reliable, and scalable as far as data privacy is concerned, and it caters to most of the use cases across different business verticals.

    What was our ROI?

    I have seen a return on investment with Securiti. With more automation in the SOC and the implementation of the next generation SOC, the headcount required for around-the-clock monitoring of ever increasing IT assets has gone down drastically. There is also a tangible benefit in terms of the money with the reduced year-on-year application downtime, even though the cyber security threats are ever evolving.

    What's my experience with pricing, setup cost, and licensing?

    Regarding my experience with pricing, setup cost, and licensing for security solutions, we usually enter into an enterprise license agreement for a bank of our size. Whether it is Splunk or whether it is RSA Archer  or it is Qubro solutions or any other IT security solution provider, we find them to be flexible. With the kinds of hundreds of thousands of IT assets we have for integration, we usually find the IT security solutions providers' pricing as well as their licensing structure to be quite flexible. They also offer price protection.

    What other advice do I have?

    More and more automation, whether reduction of the exposure or automated remediation of the vulnerabilities, and the prompt reporting in the GRC  tool, those are the key initiatives we have taken for last few years in safeguarding the bank's digital assets.

    My advice for others looking into using Securiti is to first compile your use cases for a particular sector where you are operating. Thereafter, perform the POC of those use cases followed by pilot implementation before a full-blown rollout. It makes sense to examine or assess the efficacy of security solutions prior to a full-blown rollout.

    I rate Securiti eight out of ten.

    Which deployment model are you using for this solution?

    On-premises

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Cristiano G.

    Assessment

    Reviewed on Oct 14, 2025
    Review provided by G2
    What do you like best about the product?
    Easy to manage and easy for the user to use as well.
    What do you dislike about the product?
    There's nothing I don't like these days.
    What problems is the product solving and how is that benefiting you?
    Securiti solves problems related to the security and privacy of our company's data.
    Gilberto B.

    Securiti: Complete and Reliable Solution for Privacy, Data Governance, and Security Posture

    Reviewed on Oct 14, 2025
    Review provided by G2
    What do you like best about the product?
    I like how Securiti covers various functionalities, not only in the privacy aspect but also in the security and information usage posture. The trust in the results and the effective support, both from partners and the Securiti team, impress me. The robust implementations and efficient integrations with other tools, such as Jira and Microsoft, are fundamental. The frequent evolution of the tool shows a commitment to continuous improvement.
    What do you dislike about the product?
    Currently, I would say that perhaps the Supplier Evaluation module could be improved in Securiti. I feel that it could provide more reports and a better way to manage the various questionnaires we conduct with suppliers.
    What problems is the product solving and how is that benefiting you?
    We use Securiti to address data control and privacy issues, improving asset and risk mapping, and facilitating data governance and security.
    Ney L.

    Comprehensive Data Intelligence with Stellar Integration

    Reviewed on Oct 13, 2025
    Review provided by G2
    What do you like best about the product?
    What I like best about Securiti is its truly unified approach — bringing privacy, security, and governance together into a single, intelligent ecosystem. This integration was a revelation compared to the fragmented tools I’d used before. The platform’s data intelligence capabilities are exceptional. Its AI-driven discovery and classification provide a real-time, accurate view of where sensitive data resides, what risks exist, and how compliant the organization is across environments. I also value how easily Securiti integrates with enterprise tools and cloud platforms, enabling seamless connectivity with AWS, Azure, Snowflake, ServiceNow, and more. The guided onboarding process was smoother than expected, and its modular architecture allows us to scale gradually — adding new capabilities as our privacy and security maturity evolve. On top of the technology, Securiti’s vendor risk management and automated workflows have made our operations far more efficient. And the support team deserves special mention — their proactive, collaborative approach has strengthened my confidence and trust in the platform. In short, Securiti stands out for its depth of automation, breadth of integration, and quality of partnership.
    What do you dislike about the product?
    If I had to point out an area for improvement, I’d say dashboard customization and advanced analytics. I’d love to see more flexibility to tailor dashboards for different stakeholders — for example, executives, compliance officers, or data stewards — each with their own metrics and priorities. Additionally, while Securiti performs impressively even in large and complex environments, there’s still room for performance optimization during massive data discovery operations across multi-cloud ecosystems. Introducing smart scheduling or adaptive scanning options could make these processes even more efficient at enterprise scale. That said, these are more refinements than limitations. They don’t take away from the platform’s overall value, but rather point to areas where Securiti could evolve even further as it continues to lead in data intelligence and automation.
    What problems is the product solving and how is that benefiting you?
    Securiti addresses one of the most complex challenges in modern organizations — the lack of visibility and control over sensitive data. It automates data discovery, classification, and data subject request (DSR) workflows, which not only simplifies compliance but also strengthens our overall data security posture. By providing real-time insights into data risks and compliance status, Securiti helps us move from reactive management to proactive governance. It also streamlines vendor risk management, reduces manual and repetitive tasks, and accelerates regulatory compliance across frameworks like GDPR and LGPD. The result is a significant boost in efficiency, accuracy, and trust — both internally and with external stakeholders — allowing us to manage data responsibly while maintaining operational agility.
    View all reviews