Take control over your cloud data - and protect it

Discover, classify and govern your cloud data within minutes after deploying Polar

Start Free
Free
Data Mapping & Vulnerabilities
$0
Quick Start for Free

Discover and classify your known and shadow data

Includes:

Green check
Automatic Data discovery & Classification
Green check
Data labeling & vulnerabilities

5 Users

1 SaaS Application

1 Cloud account

*up to 150 data stores

View full feature comparison
Premium
Data Policies Enforcement
Talk to us
Buy Now

Control your data compliance and asses sensitive data risks

Everything in Free, plus:

Green check
Compliance Policies
Green check
Data Subject Access Requests (DSAR) Search
Green check
3rd-Party risk assessment

20 Users
3 SaaS Applications
Unlimited cloud accounts


*up to 300 data stores

View full feature comparison
Enterprise
Automate Data Security and Compliance
Talk to us
Let’s Chat

Auto-remediation, Integrations and APIs

Everything in Premium, plus:

Green check
Data attack path analysis
Green check
API
Green check
Reports
Green check
Enterprise systems integrations

Unlimited SaaS Applications
All Cloud Providers (AWS/GCP/Azure)

View full feature comparison

Full breakdown

Data Mapping
Data discovery
Green check
up to 150 data stores
Green check
up to 300 data stores
Green check
Unlimited data stores
Data classification
Green check
Green check
Green check
Dara resources
Green check
up to 1,000 resources per data store
Green check
up to 10,000 resources per data store
Green check
Unlimited resources
Compliance auto-labeling
Green check
Green check
Green check
Custom data labeling
Green check
Green check
Green check
Actionable data verification
Green check
Green check
Green check
Automatic Deduced Data store Owner
Automatic understanding of a Data store Owner
X
Green check
Green check
Prioritized Data stores
Data stores that should be closely monitored and prioritized
Green check
 up to 5 data stores
Green check
up to 30 data stores
Green check
Unlimited
Data Compliance
3rd Party risk assessment
Basic access
Full access
Full access
Quarantine bucket data view
X
Green check
Green check
Compliance Policies
Basic policies
Full policies
Full policies
DSAR search
X
Green check
Green check
Reports
X
Green check
(Click to generate)
Green check
(Scheduled reports)
Data Vulnerabilities
Data Vulnerabilities page
Green check
Green check
Green check
Policy based vulnerabilities
Basic
Full
Full
Data Attack path analysis
X
X
Green check
Management
Connect Cloud Provider Accounts
1 Cloud Provider account (AWS/Azure/GCP)
Unlimited
Unlimited
Connect SaaS Applications
1 SaaS application
3 SaaS applications
Unlimited
Users Invite
Up to 5 users
Green check
Green check
User Management
X
Up to 20 users
Green check
SSO
X
X
Unlimited
Enterprise integrations
Ticketing system integration
X
X
Green check
SIEM integrations
X
X
Green check
API
X
X
Green check
Support
SLA
Email support, up to 7 days fix
Email and Slack support, up to 3 days fix
Email and Slack support, up to 1 days fix
Shared Slack
X
Green check
Green check
Dedicated CSM
X
X
Green check

Got questions?

How do you handle my data?

We take security very seriously and never store your sensitive data. In Cloud Provider accounts connection, we install a Polar Analyzer to scan and classify your data. For SaaS applications we use the SaaS API for classification. Metadata is the only layer we store, and is fully encrypted. We are happy to sign a mutual NDA if needed.

What would be the cloud cost for the solution?

The cloud costs depend on the number of regions and amount of scanned data. We have a detailed Cost estimation document that you can download for your use.

What Cloud Provider accounts are supported?

We support the main 3 Cloud Service providers: AWS, Azure, and GCP.

What types of data stores are supported?

We support Managed and Unmanaged data stores. This means that we can discover and classify your databases (Managed or locally installed - unmanaged), your Files (in various storage buckets), and your hidden logs (for accidental stack trace exceptions that might have sensitive data). In addition we support structured, unstructured, and semi-structured data resources.

What types of Sensitivities are supported out-of-the-box?

We support various Dev Secrets, PII, PHI, and PCI sensitivities that include (among others): Personal Emails, Business Emails, Credit Cards, Crypto Wallets, and Development Secrets. 

Can you support Custom Sensitivities?

Yes we can! Send us an email, and we will guide you on how to create a customer recognizer.

What can I do if I need assistance?

Don't worry about it, we are happy to help! You can schedule a call with our support engineers via Calendly or send us an email to support@polar.security