Best BooleBox Alternatives in 2024

Find the top alternatives to BooleBox currently available. Compare ratings, reviews, pricing, and features of BooleBox alternatives in 2024. Slashdot lists the best BooleBox alternatives on the market that offer competing products that are similar to BooleBox. Sort through BooleBox alternatives below to make the best choice for your needs

  • 1
    SpamTitan Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    SpamTitan email security protects businesses, schools, smbs and MSPs from spam. SpamTitan email security protects against spam, phishing, day-zero attacks and viruses, malware, ransomware and other threats to email. It helps to control mail flow, clean it, protect against spam, and protect against unwanted email. We offer easy-to-use, yet powerful email security for businesses, smbs, and MSPs that is Office365-friendly. SpamTitan Email Security is available for a free, fully supported trial. SpamTitan – Premium functionality included * CEO Impersonation protection * Spearphishing Protection/ Phishing * Link analysis * Full Sanding * Zero Day Attacks protection * Mail Spooling * Spoofing protection * Ransomware and Malware Protection * SPF/DKIM/DMARC checking * Encryption * Fully multi-tenant environment * Ability to rebrand entire UI * Full REST API * Set up documents and support SpamTitan Email Security is the best solution in the G2 Crowd Email Security. Start your free trial today!
  • 2
    Cloudflare Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    Cloudflare is the foundation of your infrastructure, applications, teams, and software. Cloudflare protects and ensures the reliability and security of your external-facing resources like websites, APIs, applications, and other web services. It protects your internal resources, such as behind-the firewall applications, teams, devices, and devices. It is also your platform to develop globally scalable applications. Your website, APIs, applications, and other channels are key to doing business with customers and suppliers. It is essential that these resources are reliable, secure, and performant as the world shifts online. Cloudflare for Infrastructure provides a complete solution that enables this for everything connected to the Internet. Your internal teams can rely on behind-the-firewall apps and devices to support their work. Remote work is increasing rapidly and is putting a strain on many organizations' VPNs and other hardware solutions.
  • 3
    Guardz Reviews
    See Software
    Learn More
    Compare Both
    Guardz was created to enable MSPs to pro-actively protect their customers with a comprehensive security solution against an array of cyber threats, including phishing, ransomware attacks, and data loss. Celebrating a multilayered approach and harnessing AI, Guardz is positioned to protect small businesses against inevitable cyber threats. In today's digitally-driven world, no business is immune to potential risks. Small to mid-sized enterprises are particularly vulnerable to cybersecurity threats as limited budgets, resources, and insufficient cybersecurity training become hackers' playgrounds. Given that many cybersecurity solutions currently in the market are not only befuddling but also exorbitantly expensive, there exists a significant market gap. By integrating astute cybersecurity technology and profound insurance knowledge, Guardz ensures perpetually streamlined security measures. With Guardz, SMEs can now rest easy, knowing their businesses are safeguarded from cyber threats without the need for substantial effort or expertise on their part.
  • 4
    Zivver Reviews

    Zivver

    ZIVVER

    0.99€/month/user
    1 Rating
    Zivver is the digital communications platform that powers the next generation of secure digital communication. It is simple, smart, and secure. Zivver is trusted by more than 5,000 organizations worldwide. It prevents data leaks from human error and ensures compliance. Zivver seamlessly integrates to all major email clients, including Outlook, Gmail, and Microsoft 365. It features unrivalled zero-keys encryption and smart features like contextual machine learning powered business rule generation. Zivver allows you to securely share large files upto 5TB via your existing email client. Zivver is fully in compliance with all major data security standards including ISO 27001 and NTA 7516, GDPR and HIPPA.
  • 5
    Acronis Cyber Protect Reviews
    Acronis Cyber Protect gives you the peace of mind to know your business is covered, with zero-day malware and ransomware protection, backup and forensic investigations. Cyberthreats are evolving at an incredible rate — and simple data backup and cybersecurity tools are no longer enough to contain them. Acronis’ all-in-one cyber protection solutions combine cybersecurity, data backup, disaster recovery, and more to ensure the integrity of the data and systems you rely on. If you’re like other businesses, you probably use a complex patchwork of solutions to defend against data loss and other cyberthreats — but this approach is tough to manage and leads to security gaps. Acronis’ integrated cyber protection solutions safeguard entire workloads with greater efficiency and a fraction of the complexity, freeing up resources and enabling you to focus on protection and enablement rather than juggling tools. Protect entire workloads without the friction. Getting started with Acronis' cyber protection solutions is simple and painless. Provision multiple systems with just a click, and manage everything — from backup policies to vulnerability assessments and patching — through a single pane of glass.
  • 6
    Immuta Reviews
    Immuta's Data Access Platform is built to give data teams secure yet streamlined access to data. Every organization is grappling with complex data policies as rules and regulations around that data are ever-changing and increasing in number. Immuta empowers data teams by automating the discovery and classification of new and existing data to speed time to value; orchestrating the enforcement of data policies through Policy-as-code (PaC), data masking, and Privacy Enhancing Technologies (PETs) so that any technical or business owner can manage and keep it secure; and monitoring/auditing user and policy activity/history and how data is accessed through automation to ensure provable compliance. Immuta integrates with all of the leading cloud data platforms, including Snowflake, Databricks, Starburst, Trino, Amazon Redshift, Google BigQuery, and Azure Synapse. Our platform is able to transparently secure data access without impacting performance. With Immuta, data teams are able to speed up data access by 100x, decrease the number of policies required by 75x, and achieve provable compliance goals.
  • 7
    SharePass Reviews
    Top Pick
    Secrets and confidential information should be shared with care. SharePass is the perfect solution for businesses who want to automate secret management and keep it all in one place securely online or on your phone - no matter where you're at. SharePass enables you to send encrypted links from sender to receiver with various settings. The settings include expiration restrictions, availability and IP restrictions which can be set through our patent-pending platform-independent sharing system. With its cutting-edge encryption and security measures, SharePass is committed to keeping your personal information safe. We cannot see what your secrets are, the only people who know are the ones sharing them. In this era of identity theft, SharePass will protect you and prevent your data from leaking to the dark web by eliminating all evidence that it was ever there. SharePass supports single sign-on with Office365, Google Workspace, MFA & integration for Yubikeys so maximum security is guaranteed.
  • 8
    Ermetic Reviews

    Ermetic

    Ermetic (a Tenable Company)

    Ermetic’s holistic cloud infrastructure security platform reveals and prioritizes security gaps in AWS, Azure and GCP, and enables you to remediate immediately. From full asset discovery and deep risk analysis to runtime threat detection and compliance, Ermetic automates complex cloud security operations through meaningful visualization and step-by-step guidance. Using an identity-first approach, Ermetic dramatically reduces your cloud attack surface and enforces least privilege at scale. Ermetic empowers stakeholders across the organization with pinpoint accuracy that drives accurate risk prioritization and remediation across multicloud environments. Ramp up your security from development to production with an agentless solution that deploys in minutes and delivers actionable insights within hours.
  • 9
    Sonrai Security Reviews
    Identity and Data Protection for AWS and Azure, Google Cloud, and Kubernetes. Sonrai's cloud security platform offers a complete risk model that includes activity and movement across cloud accounts and cloud providers. Discover all data and identity relationships between administrators, roles and compute instances. Our critical resource monitor monitors your critical data stored in object stores (e.g. AWS S3, Azure Blob), and database services (e.g. CosmosDB, Dynamo DB, RDS). Privacy and compliance controls are maintained across multiple cloud providers and third-party data stores. All resolutions are coordinated with the relevant DevSecOps groups.
  • 10
    SecureAge Security Suite Reviews
    SecureData encryption technology ensures that all enterprise data is 100% protected with real-world usability. We are pleased to offer a seamless, non-intrusive solution that will transform the way we do business. Protection is only effective if it's applied at the granularest level, everywhere, and every time. This includes your Data, whether it's on your endpoints or in your cloud service. SecureAge Security Suite is a comprehensive and proven solution to all your enterprise security needs. SecureAge Security Suite is based on time-tested technology and design. It achieves Data security with a careful balance between 100% Data security, application integrity and real-world useability.
  • 11
    Ping Identity Reviews

    Ping Identity

    Ping Identity

    $5 per user per month
    Ping Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow.
  • 12
    Sealit Reviews

    Sealit

    Sealit Technologies

    You shouldn't be concerned about whether your accounts and devices will be compromised when you implement a Zero Trust security system. Sealit will ensure that your sensitive data, including files and emails, remains fully protected in any scenario. To encrypt sensitive emails, you only need to click one time from your existing inbox. You only need one click to encrypt any file on your desktop. As we add strong protection to sensitive data, we ensure that your workflow doesn't get disrupted. Cyberattacks on businesses are almost always caused by human error. You need to put in place a system to reduce the risk. Our patent-pending end to end encryption ensures that every aspect of your business is protected. Our app uses biometrics to provide seamless protection. Biometrics are not like passwords. They can't be taken from you and you always have them with you.
  • 13
    PreVeil Reviews

    PreVeil

    PreVeil

    $20 per user per month
    4 Ratings
    PreVeil uses end-to-end encryption in an entirely new way. Protect your email and files from phishing, spoofing and BEC. It's easy for users. Administrators will find it easy. PreVeil provides enterprise users with an easy-to use encrypted email and encrypted cloud storage to protect their important emails and files. PreVeil employs the highest standard of encryption to protect data. PreVeil also offers a "Trusted community" that allows employees to communicate with contractors, vendors, and other third parties. Employees can communicate and share information with each other without worrying about being phished or spoofed, falling prey to BEC, or having their admins compromised.
  • 14
    Datto SaaS Protection Reviews
    Securely and reliably backup Microsoft 365 and Google Workspace (formerly G Suite). This will ensure that critical business programs, email, and docs are protected against cyber threats and downtime. Datto SaaS Protection, a cloud-to–cloud backup solution, is designed exclusively for MSPs and protects thousands of businesses. Datto SaaS Protection provides comprehensive backup, recovery, and overall cyber resilience for critical cloud data that lives within Microsoft 365 and Google Workspace apps. One-click restore allows you to quickly recover from ransomware and user-error, and protect your data against permanent loss. Easy onboarding makes it easy to get new clients up and running quickly. Client backups can be managed from one pane of glass. Discounts are applied to all licenses sold by your clients. This means that the more you sell the more you will make. You can meet compliance, security, and business continuity requirements beyond Microsoft 365 or Google Workspace.
  • 15
    Theom Reviews
    Theom is a cloud security product that protects all data stored in cloud stores, APIs and message queues. Theom acts like a bodyguard, protecting high-value assets by closely following and protecting them. Theom identifies PII and PHI using agentless scanning and NLP classifications that support custom taxonomies. Theom can identify dark data, which are data that are not accessible, and shadow data which is data whose security position is different from the primary copy. Theom identifies confidential data in APIs and message queues, such as developer keys. Theom calculates the financial value of data in order to help prioritize risks. To identify data risks, Theom maps the relationships among data, access identities, security attributes, and data. Theom shows how high-value information is accessed by identities (users or roles). Security attributes include user location, unusual access patterns, and others.
  • 16
    Tricent Reviews

    Tricent

    Tricent

    €18/year/user
    Modern workplaces allow employees to share files and collaborate across companies more than ever before. This is great for productivity but can also pose a risk to your compliance, regulatory requirements, and overall cybersecurity stance. Tricent allows you to share files with your users and allow them to collaborate with each other. You can also feel secure that any files shared will be deleted if they are no more relevant. Collaboration and sharing are essential to ensure efficiency and maximize your time and resources. Data leaks can occur if files and teams are not shared after collaboration is complete. This could lead to the accidental release of critical information. There are risks of information being misused in phishing attacks or even regulatory fines. Let's ensure that your organization only shares the information it needs and does not share it for too long.
  • 17
    ESET Cloud Office Security Reviews
    Protective protection for cloud-based apps such as email, collaboration, storage, and storage. Combination of spam filtering and anti-malware scanning. It also includes anti-phishing and advanced threat defense capabilities. You can add an additional layer of protection to your Microsoft 365 Exchange Online and OneDrive, Teams, or SharePoint Online. This helps eliminate unsolicited email, targeted attacks, ransomware, and other threats. Employees can focus on their jobs and ensure business continuity. You can receive immediate notifications via alerts or your dedicated console. Protect new users automatically Protects Microsoft 365 applications from malware, spam, and phishing attacks. It also provides an easy-to use cloud management console and ultimate zero-day threat defense. This essential component filters spam emails using an improved engine with better performance. It also keeps users' mailboxes clear of unwanted or unsolicited messages.
  • 18
    Encyro Reviews

    Encyro

    Encryo Inc

    $9.99/month/user
    Encyro offers secure file storage, encrypted email and electronic signatures. Encyro's award-winning design makes it easy for you and your clients. Clients don't have to sign up for portal accounts. File sharing and encrypted messaging Encyro allows you to send directly to any email address. Encyro protects your data both during transmission as well as storage to ensure that you are in compliance with HIPAA and other compliance standards such as the GDPR, FINRA and SOX. Securely receive via your custom-branded upload page. Clients do not need to log in or go through additional steps. Electronic Signatures Encyro esignatures are designed for remote signing to protect your transaction. You can control the login options as well as the type of signature to ensure that only the right person is signing. Encyro offers custom branding, automated reminders, re-usable templates for e-sign, and re-usable Encyro e-sign templates. Access codes that comply with NIST-8006363 can be sent by SMS or text for additional security.
  • 19
    RMail Reviews

    RMail

    RPost

    $7/month/user
    RMail®, the e-security platform from RPost®, is a global leader in 2000. RMail is a specialist in elegantly simple email encryption for privacy, compliance, legal e–delivery proof secure file sharing, email rights management, email impostor protection and email encryption. RMail's transmission security services are often used by businesspeople and business systems that need to send sensitive or consumer-regulated information. These RMail services can be used for messages that require additional functionality beyond standard email. They include (a) an easier-to-use and more automated email encryption to ensure privacy compliance; (b) a verifiable proof record of who sent what email to whom; (c) assurance and peaceof mind in relation to delivery and open status email of important and time-deadline emails, (d) need to have a timestamped proof that content was delivered; (f) the need to securely share large files.
  • 20
    Cubbit for Teams Reviews

    Cubbit for Teams

    Cubbit

    €6 per user, per month
    Cubbit for Teams, a SaaS distributed cloud storage service, provides complete security for businesses. Cubbit is able to provide complete security because no one can access uploaded files except the service provider. Cubbit for Teams reinvents security by offering an easy-to use platform. Zero-knowledge and end to end encryption protects users as they save, sync and share their data. The web-app allows you to access information from any location at any time. Employee permissions can be managed with the click a button. Files can be shared without a limit on size and unsecured emails are replaced by Cubbit Private Links, a 100% secure sharing option that matches the encryption key to the folder. Cubbit can be more cost-effective than traditional data-centers by using a distributed architecture. This allows Cubbit to offer a much lower service price than its competitors. You will also save CO2 per file.
  • 21
    SearchInform FileAuditor Reviews
    DCAP solution (datacentric audit and protection), for automated file system audit, search and detection of access violations, as well as monitoring for changes in critical data.
  • 22
    Imunify360 Reviews
    Imunify360 provides security solutions for web-hosting servers. Imunify360 is more than antivirus and WAF. It combines an Intrusion Prevention & Detection system with an Application Specific Web Application Firewall, Real time Antivirus protection, and Patch Management components into one security suite. Imunify360 is fully automated and displays all statistics in an intuitive dashboard.
  • 23
    Trellix Reviews
    The Trellix Platform is a composable XDR platform that adapts to your business's challenges. The Trellix Platform learns to adapt for living protection. It provides native and open connections, expert support, and embedded support for your employees. Adaptive prevention is a method of protecting your organization from threats. It responds in machine-time to them. Trellix is trusted by 75M customers. Zero trust principles allow for maximum business agility and protect against back-door, side-door and front-door attacks. This allows for simplified policy management. Secure agile DevOps, visible deployment environments, and comprehensive protection for cloud-native apps. Our email and collaboration tool security protects you against high-volume attackers and exposure points. This automates for optimal productivity and allows for secure and agile teamwork.
  • 24
    SecurityHQ Reviews
    SecurityHQ is a Global Managed Security Service Provider (MSSP) that detects & responds to threats 24/7. Gain access to an army of analysts, 24/7, 365 days a year. Receive tailored advice and full visibility to ensure peace of mind, with our Global Security Operation Centres. Utilize our award-winning security solutions, knowledge, people, and process capabilities, to accelerate business and reduce risk and overall security costs.
  • 25
    RevBits Email Security Reviews
    RevBits Email Security, a next-generation email security product, aims to address major gaps in the market. Revbits Email Security uses unique algorithms, such as a page impersonation detection method, to achieve the highest level of email analysis. RevBits Email Security provides a composite probabilistic score for each email. It also includes full details for continued user education. RevBits Email Security Enhances Email Security Architecture RevBits Email Security improves email security by blocking and detecting sophisticated malicious emails that penetrate the organization's email security layer. RevBits Email Security protects the employee endpoint, the last point of email interaction.
  • 26
    Virtru Reviews
    You can easily control who has access to sensitive data within your organization via email, file-sharing, and other applications. All powered by the Trusted Data Format, Virtru's industry-leading platform to Zero Trust Data Control. Virtru integrates seamlessly with the apps your teams use, securing workflows in Google and Microsoft 365, Salesforce, Zendesk and other applications. We make military-grade encryption available to everyone. Virtru can be deployed across your organization in under a day. This will help you meet your compliance goals. Granular access controls protect your most valuable asset, your data, throughout its entire lifecycle and wherever it travels. Securely collaborate in Docs, Sheets, and Slides. Drive allows you to store and share files. You can message via Gmail or Google Meet. Secure messages through enterprise and custom applications. Outlook allows you to seamlessly protect email and file sharing.
  • 27
    Laminar Reviews
    Cloud environments give developers and data scientists the ability to copy, manipulate and store data whenever they want. Because of the rapid pace of change, cloud data is often invisible to security and governance teams. Because cloud data is not visible to security, it is often unprotected, vulnerable and exposed to both internal and external threats. Manual methods of enforcing data security policies are no longer sufficient. They are no longer relevant once they are completed, as the pace of technology changes is too fast to keep up with. Data movement within the cloud, such as across borders, can easily bypass compliance and controls. Security and governance teams are unable to identify which instances should be logged on, and they lack information about application dependencies that can help distinguish authorized from unauthorized accesses.
  • 28
    Cryptshare Reviews

    Cryptshare

    Cryptshare

    €5 per user per month
    Cryptshare is an innovation that protects your information when it is most at risk. Everybody needs to communicate data and messages in their daily work. We face many limitations once data is in transit. 1. Data protection 2. Limitations on file size These problems can be solved with our solution in an efficient and user-friendly manner. It also offers many other benefits, including: *Detailed audit trail *Compliance to central data protection regulations *Excellent potential to automate business communication It is also affordable, simple to implement, and accessible from any device with a web browser. Cryptshare is compliant with ISO 27001, GDPR. Cryptshare protects your information throughout the process.
  • 29
    activeDEFENCE Reviews
    Threats to your organization's infrastructure range from malware to advanced persistent threats (APT), to extortion and internal breaches. Businesses must now consider smartphones, tablets, and consumerization. This is in addition to telecommuters, contractors and partners and business-critical services hosted on the cloud. Security is more important than ever, and far more complex. You need a multi-layered, flexible defensive strategy to protect your information and systems. This strategy must cover all components of your IT environment. It should include the network, perimeter, data, applications, endpoints, and endpoints. This will minimize and manage the vulnerabilities and weak points that could expose your organization to risk. Activereach's comprehensive portfolio of network security solutions will protect your business against advancing threats, improve network performance, and optimize operational efficiencies.
  • 30
    Smartlockr Reviews

    Smartlockr

    Smartlockr

    €0.42 / month / user
    Smartlockr is a people-centric data security platform to easily enable secure email and file sharing for an entire organization. By putting the people in an organization first, Smartlockr offers a user-friendy platform that actively helps people prevent data breaches. The reason for that is that the human error is the main cause of data breaches worldwide. Smartlockr works on and with every operating system and device. It's even available as a plug-in for Microsoft 365 (Outlook). Of course, it can be integrated into any existing systems, and it's even available as an SMTP relay service or a combination of all these options. Smartlockr can also be used to securely send and receive large files of up to 5 TB. Smartlockr is compliant with all privacy regulations and security standards like GDPR, ISO, NTA 7516.
  • 31
    Accellion Reviews

    Accellion

    Accellion

    $15.00/month/user
    The Accellion secure communication platform prevents data breaches from third-party cyber risk. CIOs and CISOs rely upon the Accellion platform to ensure complete visibility, compliance, and control over communication of IP, PII and PHI across all third-party communication channels. This includes email, file sharing and mobile, enterprise apps, web portals and SFTP as well as automated inter-business workflows. Users click the Accellion button to know that it is the safest and most secure way to share sensitive information outside of the company. The Accellion platform offers a variety of deployment options including FedRAMP, FedRAMP, hybrid, and on-premise. It provides the security and governance CISOs require to protect their organizations, reduce risk, and comply with strict compliance regulations like NIST 800-171, HIPAA and SOX, GDPR and GLBA. More than 25 million users have been protected by Accellion solutions at over 3,000 companies.
  • 32
    Dropvault Reviews

    Dropvault

    Apptimi

    $10 per month
    DropVault is a great tool for team collaboration and document sharing that overcomes the limitations and risks of email. It also doesn't compromise your privacy. DropVault allows you, your team, and your customers to share sensitive documents, collaborate and comment, add tasks, and remind each other in complete privacy. DropVault protects your data by encrypting everything you, your customers or your team share. It can be difficult to use encryption and you may lose or share the key. DropVault solves these problems by providing an easy-to-use app that requires customers or team members to enter their password. The key is then retrieved and decrypts your messages and documents. You also have the option to increase security by adding trusted (or blocked), locations, enabling two-factor authentication on any account, requiring strong passwords, and many other options. Sharing with security makes sense.
  • 33
    DekkoSecure Reviews
    DekkoSecure is a fast-growing SaaS company providing leading-edge, military-grade security that allows Government and Enterprises of all sizes to easily share and collaborate on highly sensitive and confidential information with internal and external parties. DekkoGov™- Ultra-secure file sharing, collaboration & eSignatures for Government workflows. DekkoGov™ is trusted by Government departments and external stakeholders globally. Governments choose Dekko for its military-grade security and guaranteed protection of their highly sensitive and confidential data. DekkoPro™ - Share sensitive data easily using military-grade security with no file-size limits. DekkoPro™ allows businesses of all sizes to keep their data ultra-secure, simplify workflows, ensure compliance and increase productivity. Ensure peace of mind with ultra-secure file sharing, collaboration, eSignatures and more. Dekko security starts where the popular and generic solutions stop.
  • 34
    Proofpoint Essentials Reviews
    Proofpoint Essentials is a cost-effective, easy-to-manage cybersecurity product designed specifically for small and mid-sized businesses. Essentials protects you from a wide range of advanced threats. It also includes additional benefits such as security awareness, data loss prevention and email continuity. Our intuitive and simple interface reduces administrative workload, and integrates seamlessly into your existing Microsoft 365 environment. Proofpoint Essentials uses AI-powered detection technologies that protect more than 75% Fortune 100 companies to protect your greatest risk: your employees. Essentials Enterprise-class protection blocks threats that target SMBs. These include spam, malware, phishing emails, BEC (business email compromise) and imposter messages, as well as phishing and business email compromise.
  • 35
    IBM Security Guardium Reviews
    Ensure compliance, protection and wide visibility throughout the entire data security lifecycle. IBM Security®, Guardium®, is a data security software family in the IBM Security portfolio. It protects sensitive data on-premises or in the cloud. Guardium is an advanced, scalable data-security platform that can meet the needs of today's evolving environments. It protects sensitive data and regulated data in multiple cloud environments, while managing compliance obligations. It also discovers where sensitive data resides, encrypts and monitors what's important, and reduces your risk by responding to threats.
  • 36
    Boxcryptor Reviews
    Boxcryptor secures your company's data in the cloud, including OneDrive, SharePoint and Dropbox. Boxcryptor encrypts files directly on your device. This ensures that the data is encrypted before it is transferred to the storage service of your choice. Boxcryptor runs on Windows, macOS and iOS. Work cross-platform with no limitations. Boxcryptor provides security for over 30 cloud providers. Protect your NAS and file servers as well as local data. Boxcryptor protects information confidentiality while the cloud offers availability and backup options. Boxcryptor was audited by Kudelski Security's security experts. The software's quality and security are verified. You can confirm sign-ins using 2FA on a second computer. SSO, SCIM or Active Directory support makes it easier to manage users. Boxcryptor allows you to collaborate securely in your team or with partners.
  • 37
    Defendify Reviews
    Defendify is an award-winning, All-In-One Cybersecurity® SaaS platform developed specifically for organizations with growing security needs. Defendify is designed to streamline multiple layers of cybersecurity through a single platform, supported by expert guidance: ● Detection & Response: Contain cyberattacks with 24/7 active monitoring and containment by cybersecurity experts. ● Policies & Training: Promote cybersecurity awareness through ongoing phishing simulations, training and education, and reinforced security policies. ● Assessments & Testing: Uncover vulnerabilities proactively through ongoing assessments, testing, and scanning across networks, endpoints, mobile devices, email and other cloud apps. Defendify: 3 layers, 13 modules, 1 solution; one All-In-One Cybersecurity® subscription.
  • 38
    Imperva Sonar Reviews
    Imperva Sonar protects the most important things. Security analytics continuously learns from thousands of environments to automatically protect the most critical workloads for your customers' success. With a unified security platform, you can achieve more at a lower cost by using the best-of-breed data, edge, and application security solutions. Analyze activity starting at websites and APIs, through your applications, to its end at structured, semistructured, or unstructured data storage. Automation allows you to respond quickly enough to prevent new attacks and zero-day exploits. Application security and data alone are not sufficient to stop multi-stage attacks. Imperva Sonar uses analytics for protection of the most critical. All-in-one protection for databases and applications against automated and insider attacks.
  • 39
    CloudMounter Reviews
    CloudMounter is an essential tool for those who have SSD-drives with low capacity. Mount most cloud services as disks, without the need to download any online files. Secure cloud files can be encrypted with data encryption. You can manage your OneDrive, Google Drive, and Dropbox accounts in Finder for free.
  • 40
    Privacera Reviews
    Multi-cloud data security with a single pane of glass Industry's first SaaS access governance solution. Cloud is fragmented and data is scattered across different systems. Sensitive data is difficult to access and control due to limited visibility. Complex data onboarding hinders data scientist productivity. Data governance across services can be manual and fragmented. It can be time-consuming to securely move data to the cloud. Maximize visibility and assess the risk of sensitive data distributed across multiple cloud service providers. One system that enables you to manage multiple cloud services' data policies in a single place. Support RTBF, GDPR and other compliance requests across multiple cloud service providers. Securely move data to the cloud and enable Apache Ranger compliance policies. It is easier and quicker to transform sensitive data across multiple cloud databases and analytical platforms using one integrated system.
  • 41
    Enigma Vault Reviews
    Enigma Vault is your PCI Level 1 compliant and ISO 27001 certificated payment card, data and file easy button to tokenization and encryption. It is difficult to tokenize and encrypt data at field level. Enigma Vault does all the heavy lifting for you. Your lengthy and expensive PCI audit can be simplified into a simple SAQ. You can greatly reduce your security risk and PCI scope by storing tokens rather than sensitive card data. Modern technologies allow you to search millions of encrypted values in just milliseconds using modern methods. We fully manage the solution and can adapt it to your needs. Enigma Vault tokenizes and encrypts data of any size. Enigma Vault provides true field-level security. Instead of storing sensitive data you store a token. Enigma Vault offers the following services. Enigma Vault makes crypto and PCI compliance easy. You don't have to manage or rotate private keys, nor deal with complicated cryptography.
  • 42
    VaultCore Reviews

    VaultCore

    Fornetix

    $1,118 per year
    VaultCore™ is a next-generation, highly scalable enterprise key management solution from Fornetix®. It integrates seamlessly with existing platforms, automates policy, and empowers administrators with a centralized, organized control that can be easily applied across all environments. Request a demo to experience VaultCore's products: - Quick, seamless integration with existing technology - Separation Of Duties (a best practice). - Powerful automation allows for centralized control of policy - Increased security of data in motion, at rest, and in use - Significant reduction in the costs associated with data breaches -- lost businesses, recovery time, reputational damage - Simplified compliance, regulatory enforcement - Scalable to more than 100 million keys (more that enough to meet any industry or government's requirements) - Reporting capabilities to meet compliance requirements - Ease in Use
  • 43
    Cisco Secure Network Analytics Reviews
    You can scale visibility and security analytics across the business. Secure Network Analytics (formerly Stealthwatch) offers industry-leading machine learning, behavioral modeling, and predictive analytics that will help you outsmart emerging threats to your digital business. Telemetry from your network infrastructure allows you to see who is on the network, and what they are doing. Detect advanced threats quickly and respond to them. Smarter network segmentation can protect critical data. You can do all this with an agentless solution that grows along with your business. High-fidelity alerts that are rich in context, such as user, device location, timestamp, application, and timetamp, can be used to detect attacks across the dynamic network. Analyze encrypted traffic without encryption to determine compliance and threats. Using advanced analytics, quickly detect unknown malware and insider threats such as data exfiltration, policy violations, or other sophisticated attacks. Telemetry data can be stored for long periods of time for forensic analysis.
  • 44
    Coro Reviews

    Coro

    Coro Cybersecurity

    $8.99 per user per month
    Coro eliminates the need to constantly worry about security tools being overlooked and the security tool overload. There's no need to go through everything 10 times per day. Coro will monitor your security and alert you when you need to act. Coro will analyze the threats to your business and take action to eliminate them. Then, Coro will guide you on the next steps to improve your security. Coro is your central control point for sensitive data and practice data. It allows you to enforce a wide variety of security, compliance, and governance policies. Every email is scanned for malware, phishing, and ransomware, and we automatically eliminate any threats. We automatically detect and block insider threats, account hacking, and other malicious activities. We scan every file, email, and data share for PII/PCI/PHI and prevent confidential information from being leaked.
  • 45
    Uptycs Reviews
    Uptycs presents the first unified CNAPP and XDR platform that enables businesses to take control of their cybersecurity. Uptycs empowers security teams with real-time decision-making driven by structured telemetry and powerful analytics. The platform is designed to provide a unified view of cloud and endpoint telemetry from a common solution, and ultimately arm modern defenders with the insights they need across their cloud-native attack surfaces. Uptycs prioritizes responses to threats, vulnerabilities, misconfigurations, sensitive data exposure, and compliance mandates across modern attack surfaces—all from a single UI and data model. This includes the ability to tie together threat activity as it traverses on-prem and cloud boundaries, delivering a more cohesive enterprise-wide security posture. With Uptycs you get a wide range of functionality, including CNAPP, CWPP, CSPM, KSPM, CIEM, CDR, and XDR. Shift up with Uptycs.
  • 46
    Dark Web ID Reviews

    Dark Web ID

    IDAgent

    $300 per month
    Increase your sales. Streamline Your Costs. Differentiate your MSP. Your MSP can differentiate themselves by using ID Agent. ID Agent provides real-time dark-web search results that create urgency. It also provides sales and marketing-ready resources and coaching so you can make a profit in 30 days or less. Your customers are often only concerned with their network passwords being exposed. They don't think about the possibility of their usernames and passwords being stolen from third-party websites or applications. Three former CEOs of MSPs are on ID Agent's staff. This software provides actionable cybersecurity threat intelligence to Managed Service Providers around the world. We've been there, literally, and we know the challenges and obstacles you face and how to overcome them.
  • 47
    Trellix Complete Data Protection Reviews
    Comprehensive endpoint encryption. Trellix Complete Data Protection is available in two packages. It provides enterprise-grade drive encryption, access control and monitoring of user behavior. Trellix ePolicy Orchestrator allows you to manage Apple FileVault for macOS and Microsoft BitLocker for Windows PCs. Secure network file sharing and protect removable media like USB flash drives and data stored in cloud storage services. Trellix Complete data protection--Advancesd features data loss prevention and full-disk encryption. Device control is also available. Data is rendered unreadable in the case of device theft or loss. Our enterprise-grade endpoint encryption solution has been certified by Common Criteria EAL2+ and FIPS 140-2. You can control which file types and folders you want to encrypt/block. You can encrypt files to cloud storage services like Box, Dropbox, Google Drive, Microsoft OneDrive, and Google Drive.
  • 48
    Titus Illuminate Reviews
    Data is growing. It's estimated that 25 petabytes of data will be created each day in 2019, and almost all of it ends up being saved somewhere. This data is stored on file shares, network drives, cloud services, and other places - "just in case." Up to 70% of this data has no business value. Data that is redundant, obsolete or trivial (ROT), can pose legal risks and lead to compliance violations. Data can be a company's greatest asset but also its greatest risk. A data at rest strategy is required to separate the liabilities from the assets. It helps organizations identify what, where, who has access to it and how to protect them. Illuminate scans the locations where data is stored, including Box, Dropbox, OneDrive and Microsoft SharePoint Online.
  • 49
    MetaPhish Reviews
    MetaPhish, a phishing simulator software, allows administrators to create ransomware and phishing attacks to target their staff and managers. This will protect staff from phishing scams by automating training that increases staff vigilance and identifies any need for additional cyber awareness training.
  • 50
    Citadel Team Reviews
    Citadel Team is as easy to use and compatible with all your terminals. It also offers all the standard features for instant communication. Citadel Team is hosted in France and operated by Thales. It offers high levels of security and guarantees that there will be no data resell. Only your devices can access your conversations, and they can only be activated when necessary. You can deploy, manage, and control your corporate fleet using the Citadel Team administration console. Your users can also be identified via their professional email. Increased team reactivity, central conversations and file sharing in private or publicly personalized spaces for your projects. Inviting thousands of people to chat in dedicated chat rooms can boost communication. Citadel Team allows you to communicate privately with your colleagues and invite other partners.