Best IT Security Software for Microsoft SharePoint

Find and compare the best IT Security software for Microsoft SharePoint in 2024

Use the comparison tool below to compare the top IT Security software for Microsoft SharePoint on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    GoAnywhere MFT Reviews
    Top Pick
    See Software
    Learn More
    GoAnywhere MFT offers secure file transfer for businesses. GoAnywhere MFT software can be deployed on-premise, in cloud or hybrid environments. It allows organizations to securely exchange data between employees, customers, trading partners, and systems. GoAnywhere MFT won the Cybersecurity Excellence Award in Secure File Transfer.
  • 2
    Netwrix Auditor Reviews
    See Software
    Learn More
    Netwrix Auditor, a visibility platform, allows you to control changes, configurations, and access in hybrid IT environments. It also eliminates the stress associated with your next compliance audit. All changes in your cloud and on-prem systems can be monitored, including AD, Windows Servers, file storage, Exchange, VMware, and other databases. Reduce the complexity of your inventory and reporting. You can easily verify that your access and identity configurations match the known good state by reviewing them regularly.
  • 3
    Predict360 Reviews

    Predict360

    360factors

    $1,500 / month
    17 Ratings
    Top Pick See Software
    Learn More
    Predict360, by 360factors, is a risk and compliance management and intelligence platform that automates workflows and enhances reporting for banks, credit unions, financial services organizations, and insurance companies. The SaaS platform integrates regulations and obligations, compliance management, risks, controls, KRIs, audits and assessments, policies and procedures, and training in a single cloud-based SaaS platform and delivers robust analytics and insights that empower customers to predict risks and streamline compliance. Happy with your current GRC but lacking a true analytics and BI tool for intuitive executive and Board reports? Ask about Lumify360 from 360factors - a predictive analytics platform that can work alongside any GRC. Keep your process management workflows intact while providing stakeholders with the timely reports and dashboards they need.
  • 4
    Hyperproof Reviews
    Hyperproof automates repetitive compliance operations so your team can concentrate on the bigger issues. Hyperproof also has powerful collaboration features that make it simple for your team to coordinate their efforts, gather evidence, and work directly alongside auditors from one interface. There is no more uncertainty in audit preparation or compliance management. Hyperproof gives you a complete view of your compliance programs, including progress tracking, program monitoring, and risk management.
  • 5
    Files.com Reviews
    Top Pick
    6,000+ companies trust Files.com to automate and secure business critical transfers. We obsess about security, compliance, reliability, and performance so your critical business processes just work every time. Easily manage any transfer flow without writing scripts or code, and onboard workloads and partners effortlessly. We support standard file transfer protocols (FTP, SFTP, AS2) for working with external partners and also provide native apps for high performance internal transfers. As a fully Cloud-Native SaaS, there are no servers for you to buy or maintain, there is no installation required, and high availability and redundancy are built in and free. Our InfoSec Program is audited annually by Kirkpatrick Price, a leading information security CPA firm. Our audit covers the scope of the entire Files.com business (not just datacenter operations) and names Files.com specifically. Beware of smaller competitors who try to pass off someone else’s audit as their own. Technical capabilities include encryption at-rest and in-transit, four types of two-factor authentication, nine enterprise identity (SSO) integrations, configurable password and session policies, and a perfect “A+” score from Qualys SSL Labs.
  • 6
    Appenate Reviews

    Appenate

    Appenate

    $11.90/month/user
    27 Ratings
    Reduce the time spent on paperwork and improve the way you record, track and store data. Create online forms and apps in under 5 minutes with our affordable, drag-and-drop, no-code platform. The software will have you streamlining processes, pinpointing and removing unnecessary, time wasting tasks and increase your ROI. Run your numbers through our ROI calculator if you're unsure ;). Try a 30-day free trial and then let us help migrate 5 of your paper-based forms once you subscribe. Enjoy Enterprise-level features, scaling across screen design types, data connectors and form submissions. Each Appenate package promises the rapid creation and publishing of branded business apps across Windows, Android and iOS devices. Harnessing cloud-based visual tools, users can construct intuitive screens for every use case along with sophisticated dynamic forms for capturing every piece of required data. Supported by out of the box data connectors for a variety of cloud services, extendable with API-based integrations, Appenate uses templates to simplify output. Mobile app users can conveniently format raw data into Word or Excel templates while on the move, before exporting to PDF for email sharing or storage.
  • 7
    Checkpoint Anti-Spam and Email Security Reviews
    Check Point Anti-Spam & Email Security provides comprehensive protection to messaging infrastructure. Multidimensional protection for email infrastructure. Provides high-quality anti-spam coverage. Protects organizations against a wide range of malware and virus threats via email. Complete email security with 97% spam detection. Advanced anti-spam protection that includes content-based and via IP reputation. Antivirus protection that can be used with signature-based or zero-hour detection. Email IPS protection against buffer overflow and Denial of Service (DoS) attacks. Simple configuration and management of mail security. Simple configuration with low overhead. No user installation required. Full user control. Instant protection against outbreaks with real-time detection and updates Integrated into the Check Point Infinity Architecture. Activate Antispam and Email Security on any Check Point security gateway.
  • 8
    miniOrange Reviews

    miniOrange

    miniOrange

    $1 per user per month
    1 Rating
    miniOrange offers a range of IAM products and solutions to secure both Identity anywhere and everywhere! Here are some of the major solutions from miniOrange: Single Sign-On (SSO): Enable SSO for web, mobile, and legacy apps with this robust solution which supports all IDPs and Authentication protocols. Multi-Factor Authentication (MFA): The only MFA solution in the market offering 15+ MFA methods including Push Notification, OTP verification, Hardware Token, Authenticator Apps, and many more. Customer Identity & Access Management (CIAM): Secure your customer identity and provide a seamless customer experience. CIAM enables you to safeguard customer privacy while providing them convenient access to your digital resources. User Provisioning: Sync all users automatically from your local directory to miniOrange. Effectively manage User Lifecycle for employees & customers. Adaptive Authentication: Tackle high-risk scenarios with ease with a solution that analyzes risk based on contextual factors and applies appropriate security measures. Universal Directory: A secure directory service that safeguards your sensitive information. It also allows you to integrate your existing directory into miniOrange.
  • 9
    SolarWinds Server & Application Monitor Reviews
    SolarWinds®, Server & Application Monitor, (SAM), is designed to monitor and manage your applications and supporting infrastructure, no matter if they are running on-premises or in the cloud. Slow applications and downtime shouldn't impact your business services and end users. Find the root cause of any application problems across all layers of the IT stack. Automatedly discover the environment of your application and begin monitoring it, usually in less than an hour. No consultation or professional services required.
  • 10
    OneLogin Reviews
    OneLogin, a trusted identity management (IAM), solution for modern enterprises, helps you secure company information and empower your employees. OneLogin is a great solution for companies that want to simplify business logins and strengthen enterprise security. OneLogin features include single sign-on (SS), user provisioning, unified directory, user provisioning and adaptive authentication. Compliance reporting is also available.
  • 11
    PureAUTH Reviews
    PureAUTH eliminates passwords and other risks from your enterprise. PureAUTH has unmatched benefits over other enterprise multi-factor authentication solutions. It is easy to set up, integrate and use. Secure and resilient technology. Reduce cost & overheads of compliance/governance. Enterprises are becoming more aware about the risk and inconvenience associated with passwords, as there is a new breach almost every day. Many companies are looking into going passwordless. PureAUTH provides a uniform and frictionless authentication experience across all enterprise resources. Corporate networks, AWS, Azure, Google Cloud platform. Enterprise applications, with or without SSO on premise or in the cloud. Web Applications, Executive dashboards and IoT. Every enterprise is unique, and so are their authentication requirements. PureAUTH integrates seamlessly with enterprise resources in multiple clouds, both on-premise and in a hybrid environment.
  • 12
    Microsoft Entra ID Reviews
    Microsoft Entra ID, formerly known as Azure Active Directory, is a comprehensive cloud-based identity and access management solution that combines core directory service, application access management and advanced identity protection. Cloud identity and access management solutions connect employees, customers and partners with their apps, devices and data. Protect data and resources with adaptive access policies and strong authentication without compromising the user experience. Provide a quick, easy sign-in across your multicloud environment in order to keep your users productive and reduce time spent managing passwords. Manage all your identities, and access to your applications, in one central location, whether in the cloud, or on-premises. This will improve visibility and control.
  • 13
    Avast Business Hub Reviews
    Top Pick
    The Business Hub is an integrated platform for complete security – delivered entirely through the cloud. The Business Hub encompasses every essential layer of security needed to defend a business from cyberthreats – covering users and devices anywhere, anytime. Formerly known as CloudCare, the Business Hub is an easy-to-use cloud security platform with a refreshing new UI.
  • 14
    LoginRadius Reviews
    LoginRadius allows businesses to provide a pleasant customer experience without compromising security. Companies can use our customer identity platform to offer a simplified login process, protect digital accounts, and comply with data privacy regulations. LoginRadius has over 3,000 users and 700 million monthly visitors worldwide. Registration services, adaptive security, integrations with third-party apps, and customer insights are some of the key platform features. Gartner, KuppingerCole and Computer Weekly have named the company an industry leader in customer identification and access management (CIAM). Microsoft is a major technology investor and partner. LoginRadius has its headquarters in Vancouver, Canada. There are additional offices in Toronto, USA and Australia. LoginRadius Services: API Authentication OAuth Data Management Secure Login One Sign On SAML SSO Sign up for social media Two Factor Authentication
  • 15
    Veeam Data Platform Reviews
    We help organizations complete their cyber resilience strategy with best-in class data security, data recovery, and data freedom. Your backups are the best defense if your data is compromised, or if it is destroyed. Cybercriminals are now focusing on your backups, posing a serious threat to your business. Data disruptions are inevitable. We help you move forward, not just bounce back. Recover faster and become radically more resilient. Own, control, backup and recover all of your data, anywhere. Detect malicious backup activities that could affect your ability to recover after an attack or achieve regulatory compliance. Veeam Data Platform is available in three comprehensive enterprise editions. Our most powerful premium option provides the complete and secure protection that only Veeam Data Platform can provide.
  • 16
    Carbonite Reviews

    Carbonite

    Carbonite

    $6 per month
    5 Ratings
    Protect your business's most important data. Automatic cloud backup provides reliable and easy data protection and recovery. Carbonite Safe™, a data backup solution, is designed for companies like yours. It's easy to use and install, so you don’t need to have any IT skills to ensure that your data is secure and accessible. You can protect files on servers, external storage devices, as well as up to 25 computers. File recovery is easy for ransomware infected computers. You can monitor online backups and access files from any device through a secure web-based dashboard. Meet data retention requirements. Cloud backup for businesses that meets your requirements. It doesn't matter if you need to restore a single file or an entire folder system. Just a few clicks and you will be on your way. Advanced encryption ensures that your data is protected in transit and storage. Support is charged by other companies at an additional cost. Carbonite Safe supports our award-winning team.
  • 17
    Avast Ultimate Business Security Reviews
    Top Pick
    Comprehensive cybersecurity and patch automation for growing businesses  Avast Ultimate Business Security includes our award-winning next-gen antivirus with online privacy tools and patch management automation software to help keep your devices, data, and applications updated and secure. Key Benefits: * Remote Management with online management console * Device Protection with next-gen antivirus * Data Protection with Firewall, Ransomware Shield, USB Protection, Password Protection * Online Security and Privacy with VPN, Web Shield, end Web Control * Patch Management
  • 18
    SolarWinds Access Rights Manager Reviews
    SolarWinds®, Access Rights Manager is designed for IT and security administrators to quickly and easily provision, deprovision, manage, audit, audit, and audit user access rights to files, systems, and data. This allows them to help protect their organizations against the potential risks of data theft or breaches. Analyzing user authorizations and access permissions will give you a visual representation of who has access to what and when. To demonstrate compliance with many regulatory requirements, customized reports can be created. Provision and deprovision users can be done using role-specific templates. This will ensure compliance with security policies and access privilege delegation.
  • 19
    SailPoint Reviews

    SailPoint

    SailPoint Technologies

    1 Rating
    Technology is essential for business. Without it, technology can't be trusted. Today's "work from anywhere" era means that managing and controlling access to every digital identity is crucial for the protection of your business as well as the data it runs on. Only SailPoint Identity security can help you empower your business and manage cyber risk from the explosion in technology access in the cloud enterprise. This will ensure that every worker has the right access to their job, no more, no lesser. Unmatched visibility and intelligence is achieved while automating and speeding the management of all user identities and entitlements. With AI-enhanced visibility, you can automate, manage, and govern access in real time. Allow business to operate in a cloud-critical and threat-intensive environment with speed, security, and scale.
  • 20
    BitLocker Reviews
    BitLocker Drive Encryption integrates with the operating systems and addresses data theft or exposure from computers that have been lost, stolen or improperly decommissioned. BitLocker offers the best protection when used in conjunction with a Trusted Platform Modul (TPM) version 1.2.2 or later. The TPM is a hardware component that is installed in many computers made by computer manufacturers. It works in conjunction with BitLocker to protect user data and ensure that the computer is not tampered with when it was offline. BitLocker can be used to encrypt the Windows operating-system drive on computers without a TPM version 1.2. To start the computer or resume hibernation, the user will need to insert a USB Startup Key. To protect the operating system volume on a computer that is not connected to a TPM, you can use an operating-system volume password starting with Windows 8.
  • 21
    CloudAlly Reviews

    CloudAlly

    CloudAlly

    $3.00/month
    Protect your Microsoft 365 with our Secure Cloud Backup. End-to-end automated backup or on-demand backup for all your Office 365 data (Mail and Calendar, Contacts, Tasks, Teams, Groups), SharePoint Online and OneDrive. Automated non-destructive restoration from any point in time, granular or across users to any storage (CloudAlly’s Amazon S3, Azure and Google Cloud Platform). Unlimited data retention! Exceptional customer service, 24 hours a day, 365x24x7 A dedicated Customer Support Hub that includes video tutorials and a comprehensive knowledge base. Secure & Certified with Microsoft-mandated MFA/2FA support and OAuth. ISO 27001, HIPAA and GDPR Global data centers & Secure Amazon AWS S3 encryption.
  • 22
    Loadbalancer.org Reviews

    Loadbalancer.org

    Loadbalancer.org

    $95 per month
    Our engineers are specialists at working in sectors where zero downtime is critical. Since 2003, we’ve been building a reputation for delivering ultra-reliable, easy to deploy and effortlessly scalable applications that are trusted by solution partners, system integrators and end-users alike. Our focus on forming long-lasting partnerships with industry-leading solution providers in healthcare, storage and print, requires an in-depth understanding of both our partners and their clients’ technical and business practices. The result: unprecedented levels of uptime.
  • 23
    IRI DarkShield Reviews

    IRI DarkShield

    IRI, The CoSort Company

    5000
    IRI DarkShield uses several search techniques to find, and multiple data masking functions to de-identify, sensitive data in semi- and unstructured data sources enterprise-wide. You can use the search results to provide, remove, or fix PII simultaneously or separately to comply with GDPR data portability and erasure provisions. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it discovers in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF using pattern or dictionary matches, fuzzy search, named entity recognition, path filters, or image area bounding boxes. DarkShield search data can display in its own interactive dashboard, or in SIEM software analytic and visualization platforms like Datadog or Splunk ES. A Splunk Adaptive Response Framework or Phantom Playbook can also act on it. IRI DarkShield is a breakthrough in unstructured data hiding technology, speed, usability and affordability. DarkShield consolidates, multi-threads, the search, extraction and remediation of PII in multiple formats and folders on your network and in the cloud, on Windows, Linux, and macOS.
  • 24
    Tricent Reviews

    Tricent

    Tricent

    €18/year/user
    Tricent is the #1 file-sharing governance SaaS platform that enables more secure and compliant file sharing within Microsoft 365 (Teams, OneDrives & Sharepoint drives) and Google Workspace (MyDrives & Shared Drives) so you can keep collaborating responsibly. Tricent puts the responsibility of proper file-sharing management in the hands of administrators as well as every member of the organization who shares files: 🚀 Onboard in less than 30 Minutes. ricent gets you up and running swiftly so you can focus on what matters most. 🔍 Get Insights: From day one, gain a comprehensive overview of all files shared and permissions granted—across both personal drives and shared drives. ⭕️ Do Bulk Remediation: Our admin-friendly cleanup tools allow you to tackle file sprawl efficiently. 😇 Empowering End-Users Responsibly: We use automation to involve your employees in the cleanup process. They can continue collaborating while maintaining compliance. 💪🏼 Customizable Governance Policies: Set different cycles for different user groups. Tricent adapts to your unique needs, ensuring flexibility without compromising control. 🔮 Stay Ahead with Abnormality Detection.
  • 25
    DocsCorp Reviews

    DocsCorp

    DocsCorp

    $49.50/user
    DocsCorp is the choice of document management professionals looking for software that makes their jobs easier and more efficient. Our global brand has more than 500,000 users in 65 countries. Our product portfolio includes document creation, email recipient check, metadata cleaning and document comparison. You can also access our PDF creation and PDF conversion software on your desktop, server, or cloud. Our products are compatible with the most popular enterprise content management systems. This allows for business efficiency and streamlines processes. We offer organizations both on-premises integrations and cloud integrations. We work with industries that are document-centric in order to help them manage their most important asset - documents. This includes Government Departments and Legal Services, Financial Services, as well as Technology companies.
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next