Learn More

Average Ratings 6 Ratings

Total
ease
features
design
support
Read all reviews

Average Ratings 86 Ratings

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

OneLogin
Salesforce
Slack
AppWise
Boxcryptor
DocSend
Google Cloud BigQuery
Intercom
Jotform
Microsoft OneNote
Movebot
MySQL Workbench
Podio
QuickBooks Online Advanced
RAKEN
Rippling
Snowflake
StructionSite

Integrations

OneLogin
Salesforce
Slack
AppWise
Boxcryptor
DocSend
Google Cloud BigQuery
Intercom
Jotform
Microsoft OneNote
Movebot
MySQL Workbench
Podio
QuickBooks Online Advanced
RAKEN
Rippling
Snowflake
StructionSite

Pricing Details

$10 per user per month
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

SaaS
iPhone
iPad
Android
Windows
Mac
Linux

Deployment

SaaS
iPhone
iPad
Android
Windows
Mac
Linux

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Vendor Details

Company Name

Egnyte

Founded

2007

Country

United States

Website

www.egnyte.com

Vendor Details

Company Name

Satori

Founded

2019

Country

California, USA

Website

satoricyber.com

Product Features

Collaboration

Brainstorming
Calendar Management
Chat / Messaging
Contact Management
Content Management
Document Management
Project Management
Real Time Editing
Task Management
Version Control
Video Conferencing

Content Collaboration

Client Portal
Cloud Storage
Digital Asset Management
Document Creation / Editing
Document Management
Electronic Signature
Feedback Management
File Sharing
Messaging / Discussion
Real-Time / Interactive Editing
Roles / Permissions
Search
Version Control
Video / Image Editing
Workflow / Approval Process

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

File Sharing

Audit Trail
Chat / Messaging
Collaboration
Document Management
Drag & Drop
Electronic Signature
Encryption
File Synchronization
Search
User Management
Version Control
Workflow Management

File Sync

Audit Trail
Backup and Recovery
Conflict Detection
Real Time Synchronization
Remote Synchronization
Synchronization Scheduling
Two-Way Synchronization

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Product Features

Big Data

Collaboration
Data Blends
Data Cleansing
Data Mining
Data Visualization
Data Warehousing
High Volume Processing
No-Code Sandbox
Predictive Analytics
Templates

Cloud Management

Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cloud Workload Protection

Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity

Compliance

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

Data Discovery

Contextual Search
Data Classification
Data Matching
False Positives Reduction
Self Service Data Preparation
Sensitive Data Identification
Visual Analytics

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Management

Customer Data
Data Analysis
Data Capture
Data Integration
Data Migration
Data Quality Control
Data Security
Information Governance
Master Data Management
Match & Merge

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Data Quality

Address Validation
Data Deduplication
Data Discovery
Data Profililng
Master Data Management
Match & Merge
Metadata Management

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

HIPAA Compliance

Access Control / Permissions
Audit Management
Compliance Reporting
Data Security
Documentation Management
For Healthcare
Incident Management
Policy Training
Remediation Management
Risk Management
Vendor Management

Policy Management

Approval Process Control
Attestation
Audit Trails
Policy Creation
Policy Library
Policy Metadata Management
Policy Training
Reporting / Analytics
Version Control
Workflow Management

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Alternatives

PrivIQ Reviews

PrivIQ

Compliance Technology Solutions

Alternatives

FileCloud Reviews

FileCloud

CodeLathe
CLEAR Reviews

CLEAR

Quantum Knight