Skip to main content
TrustRadius
Qostodian

Qostodian

Overview

What is Qostodian?

Qohash supports data security with its DSPM (Data Security Posture Management) technology. This technology provides an overview of sensitive information stored in a variety of unstructured data sources. Qohash's Qostodian platform continuously finds, inventories and monitors individual data elements on…

Read more
Recent Reviews
TrustRadius

Leaving a review helps other professionals like you evaluate Sensitive Data Discovery Tools

Be the first one in your network to review Qostodian, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Qostodian?

Qohash supports data security with its DSPM (Data Security Posture Management) technology. This technology provides an overview of sensitive information stored in a variety of unstructured data sources. Qohash's Qostodian platform continuously finds, inventories and monitors individual data…

Entry-level set up fee?

  • Setup fee optional
For the latest information on pricing, visithttps://qohash.com/pricing/

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

Alternatives Pricing

What is GitGuardian Internal Monitoring?

GitGuardian Internal Monitoring helps organizations detect and fix vulnerabilities in source code at every step of the software development lifecycle. With GitGuardian’s policy engine, security teams can monitor and enforce rules across their VCS, DevOps tools, and infrastructure-as-code…

What is Solix EDMS?

Solix Enterprise Data Management Suite (Solix EDMS) is an information lifecycle management solution, from Solix Technologies in Santa Clara. Solix helps infrastructure and operations leaders implement the right policies, processes, and technology for application decommissioning and data retention,…

Return to navigation

Product Details

What is Qostodian?

Qohash supports data security with its DSPM (Data Security Posture Management) technology. This technology provides an overview of sensitive information stored in a variety of unstructured data sources. Qohash's Qostodian platform continuously finds, inventories and monitors individual data elements on workstations, attached and shared drives, and Microsoft 365 cloud applications. Qostodian provides granular information, enabling companies to continuously monitor their security posture, identify and resolve security issues as they arise, address the most significant risks and implement the necessary controls to continuously improve the organization's overall security posture.



QOSTODIAN brings two essential elements of data privacy—inventorying of sensitive data and monitoring insider risk—into a single platform. Banks can use QOSTODIAN to monitor employee interactions with sensitive data and identify threats before a breach occurs.

The vendor offers 4 main reasons companies drive sensitive data risk mitigation and compliance with QOHASH:

1-- 24/7 sensitive data monitoring for insider risk and lineage tracing for breach notifications

CISOs and auditors view quantified risk levels by employee, department, info type and more, so that they’re never caught by surprise. They receive alerts the instant risky accumulation, deletion or exfiltration occurs. Keyword search is utilized to look up specific data elements and track data lineage. See the exact location where the data got out of an environment, where it ended up, and every touch point in between.

2-- Sensitive data inventory and business critical answers faster

Produces a complete inventory of sensitive, unstructured data at-rest, across every data source. Discovery, labeling, classification, custom RegEx and keyword searches, plus quantified, ranked and contextualized risk are included for one, predictable fee.

3-- Fulfillment of data deletion requests for compliance

Keyword searches can be by name, date, and credit card number, to find all copies of sensitive data across business systems. This displays which categories of sensitive data are stored on business systems. Data can be deleted directly within the platform to show compliance with data deletion requests in any location, including endpoints.

4-- Access control lists for quick identification and correction of exposure points

Generates access control lists, a foundational step for conducting risk assessments and passing audits. Users can evaluate whether those with access have a legitimate business need for it, and see how much sensitive data is on business systems and who has access to it. Then policies can be put in place, with risk levels configured to the business, and notifications can be sent when policy violations occur.

Qostodian Features

  • Supported: Sensitive Data Discovery and Classification
  • Supported: Data Propagation
  • Supported: Behavior Tracking
  • Supported: Risk Assessment
  • Supported: Real Time Analytics
  • Supported: Compliance Management
  • Supported: Data Visualization
  • Supported: Activity Tracking
  • Supported: Activity Dashboard
  • Supported: Audit Management
  • Supported: Incident Management
  • Supported: Policy Management
  • Supported: AI/Machine Learning
  • Supported: Single Sign On
  • Supported: Contextual Search
  • Supported: Insider Risk Tracking
  • Supported: Data Security Posture Management
  • Supported: Data Governance

Qostodian Screenshots

Screenshot of SSOScreenshot of DashboardScreenshot of User ViewScreenshot of Full Info View (X-Ray Mode)Screenshot of Data PropagationScreenshot of Search by Sensitive Data TypeScreenshot of Search for Specific Sensitive DataScreenshot of Cross-Reference Search for User and Sensitive Data

Qostodian Video

Explainer Video

Qostodian Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows
Mobile ApplicationNo
Supported CountriesCanada, United States
Supported LanguagesEnglish, French

Qostodian Customer Size Distribution

Consumers0%
Small Businesses (1-50 employees)0%
Mid-Size Companies (51-500 employees)30%
Enterprises (more than 500 employees)70%
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation