Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
End-to-end encryption combined with user identity verification enables secure file transfers. Additional protective measures are available to safeguard content against unauthorized modifications. A dual-step procedure that employs shareable transfer links and one-time passwords dispatched via email or SMS ensures that only intended recipients gain access to the files. To further enhance security, uploaded content can be protected with features such as expiration dates for links, download limits, and watermarks. C2 Transfer is designed for those who frequently share large volumes of files, allowing up to 100 simultaneous transfers, with each capable of holding 20 GB of data. Users can effortlessly request and receive files from anyone by providing a straightforward and secure link. All transmitted files are encrypted, and recipients must confirm their identity before they can upload any documents. For businesses, C2 Transfer offers a user-friendly interface to efficiently manage licenses, streamlining access for users. Effective secure file sharing can be straightforward, as simple procedures guarantee that each file dispatched through C2 Transfer reaches the designated recipient without complications. This comprehensive approach to file sharing ensures that security and ease of use coexist harmoniously.
Description
ISEEK operates entirely within memory and represents a patented method, functioning as an automated tool that can run simultaneously on countless computer systems while remaining discreet in its operation based on a secured set of commands. The outcomes generated by ISEEK are encrypted and transmitted to a predetermined location defined in the instructions, which may include a local storage device, a network share, or cloud-based storage. Additionally, stand-alone utilities are available for crafting the encrypted command set and reviewing the processed contents of the encrypted results. After ISEEK effectively identifies the necessary data and minimizes the volume for subsequent examination, it allows for the extraction of multiple encrypted results containers into various formats, including the option for XML metadata, facilitating integration with a review tool. The available formats encompass generic load files, as well as those tailored specifically for Relativity, thus providing flexibility for users during the data review process. This ensures that ISEEK not only enhances efficiency but also simplifies the workflow for data analysis.
API Access
Has API
API Access
Has API
Integrations
No details available.
Integrations
No details available.
Pricing Details
$99.99 per year
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Synology C2
Website
c2.synology.com/en-us/transfer/overview
Vendor Details
Company Name
XtremeForensics
Founded
2013
Country
United States
Website
www.xtremeforensics.com/iseekdiscovery-1
Product Features
File Sharing
Audit Trail
Chat / Messaging
Collaboration
Document Management
Drag & Drop
Electronic Signature
Encryption
File Synchronization
Search
User Management
Version Control
Workflow Management
Product Features
eDiscovery
Case Analytics
Compliance Management
Discussion Threads
Document Indexing
Document Tracking
Full Text Extraction
Keyword Search
Metadata Extraction
Topic Clustering