Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

FileAgo stands out as the only software that integrates both Waterfall and Granular Permission models, offering users an unprecedented level of precision in managing access control and data restrictions. This innovative approach allows organizations and individuals to enjoy the advantages of comprehensive control while maintaining user-friendliness. Users can efficiently handle their team's data within a centralized cloud storage system, facilitating secure access management and file sharing. Collaborate seamlessly on office documents in real-time using our built-in Collabora Online editor or through Microsoft Office on the web. The protection of sensitive information remains our top priority, and FileAgo’s distinct and adaptable granular permission model is tailor-made to ensure this safeguard. Additionally, all data is fortified with AES-256 encryption and is housed in data centers that have met numerous industry compliance standards and security certifications. Furthermore, FileAgo continuously updates its features to enhance user experience and fortify security measures, ensuring that our clients are always at the forefront of data protection technology.

Description

Obtain your user-friendly NTFS permissions analysis tool to evaluate and document NTFS security effortlessly! Generate reports detailing NTFS permissions in a well-organized Excel spreadsheet or an HTML format. Deliver effective NTFS permissions information directly to the data owner. Access user-specific effective NTFS permissions for any share or folder along with its entire hierarchy. With the Company Edition or Enterprise Edition, you can store any Permissions Report either in a built-in local database or an external Microsoft SQL Server, allowing you to revisit the data at any time to track changes. Maintain the clarity of your NTFS Permissions Report by omitting any Active Directory security groups from the analysis process. There’s no requirement to list the names of recognized accounts, such as backup operator or share operator. Additionally, if there are unique Access Control Entries (ACEs) applied to folders, you can convert these security configurations into understandable labels for easier interpretation. This ensures that your reports are not only accurate but also comprehensible.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

No details available.

Integrations

No details available.

Pricing Details

$4 per user per month
Free Trial
Free Version

Pricing Details

€997 per year
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

FileAgo Software Services

Country

India

Website

www.fileago.com

Vendor Details

Company Name

G-TAC Software

Country

India

Website

www.foldersecurityviewer.com

Product Features

Content Collaboration

Client Portal
Cloud Storage
Digital Asset Management
Document Creation / Editing
Document Management
Electronic Signature
Feedback Management
File Sharing
Messaging / Discussion
Real-Time / Interactive Editing
Roles / Permissions
Search
Version Control
Video / Image Editing
Workflow / Approval Process

File Sharing

Audit Trail
Chat / Messaging
Collaboration
Document Management
Drag & Drop
Electronic Signature
Encryption
File Synchronization
Search
User Management
Version Control
Workflow Management

Product Features

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Alternatives

OpenText Filr Reviews

OpenText Filr

OpenText

Alternatives

DSRAZOR for Windows Reviews

DSRAZOR for Windows

Visual Click Software
UQube Reviews

UQube

Upper Quadrant
Quest ControlPoint Reviews

Quest ControlPoint

Quest Software