Best NTFS Permissions Reporter Alternatives in 2026
Find the top alternatives to NTFS Permissions Reporter currently available. Compare ratings, reviews, pricing, and features of NTFS Permissions Reporter alternatives in 2026. Slashdot lists the best NTFS Permissions Reporter alternatives on the market that offer competing products that are similar to NTFS Permissions Reporter. Sort through NTFS Permissions Reporter alternatives below to make the best choice for your needs
-
1
Netwrix Auditor
Netwrix
Netwrix Auditor is a comprehensive IT audit software platform that helps organizations monitor and analyze activity across their IT infrastructure. It provides detailed visibility into who is accessing systems, what changes are being made, and how data is being used. The platform supports a wide range of systems, including Active Directory, Microsoft 365, file servers, databases, and network devices. It delivers near real-time alerts to help security teams detect suspicious behavior and respond quickly to potential threats. Netwrix Auditor also identifies risks such as excessive permissions and unusual access patterns that could lead to security incidents. The solution includes prebuilt compliance reports for standards like HIPAA, PCI DSS, and SOX, making it easier to meet regulatory requirements. It automates routine auditing tasks, reducing the time and effort required for reporting and analysis. The platform offers powerful search capabilities that allow teams to investigate incidents efficiently. It centralizes audit data from multiple sources into a single interface for better visibility. Netwrix Auditor integrates with existing IT systems and security tools to enhance overall monitoring capabilities. By combining auditing, reporting, and threat detection, it helps organizations strengthen their security posture and maintain compliance. -
2
CPTRAX for Windows
Visual Click Software
1 RatingServer File Activity Tracking – Audit who is creating, accessing and moving your files and folders. Track file permission changes. Alerts in real-time about critical file activity Malicious activity containment (Ransomware and mass file deletions, etc. Automatically stop threats to your Windows servers by calling PowerShell scripts so you can determine exactly what you want to have happen for each type of alert/threat. Examples of containment: Disable the user causing the threat Block the remote IP causing the threat Workstation File Activity Tracking: Audit who copies files to USB or other removable media. Track who uploads files via FTP or a browser. Block files being created on USB/removable devices. Notifications by email when a removable device connects. Active Directory Auditing – Keep audit logs and receive real-time alerts about important Active Directory changes, without having to deal with SACLs or Windows Event Logs. Server Authentication Auditing: Track authentications into Citrix sessions and Windows Servers. All failed logon attempts are reviewed. Workstation Logon/Logoff Tracking: Get visibility on logons/logoffs at workstations, including locks, unlocks and password changes. -
3
DSRAZOR for Windows
Visual Click Software
$500/year Quickly list file and folder NTFS permissions and share permissions. Find out who owns the files on your shared disk space. Manage NTFS security permissions. Find and remove unwanted file security permissions. Modify existing permissions directly from a trustee report. Add Trustee(s) Copy Trustee(s) Modify Trustee permissions for selected AD object Remove Trustee assignments for selected AD object Remove 'Read' permissions from the SHARE Remove 'List Folder Contents' from the SHARE's NTFS permissions Find files/folders with no owner (Orphaned SID) and remove Report on users, groups and computers. Check that your Active Directory object attributes are consistent with your enterprise standard. You can find accounts that have been locked, disabled, expired, or unused for more than x days. Automate common Active Directory management tasks. Automatically synchronize Student Information System (SIS), to Active Directory. Create/Import/Update users and groups, as well as computers, including bulk management. No scripting required to effectively manage Active Directory Move/Delete inactive users, groups, and computers. Reset passwords in bulk Mass object imports can be done from a CSV file. -
4
NTFS Permissions Auditor
Albus Bit
$199 one-time paymentNTFS permissions serve as a means to regulate access to files and folders within NTFS file systems. The NTFS Permissions Auditor facilitates the quick analysis, validation, and review of any NTFS folder permissions. With our complimentary version, users receive comprehensive audit results, while the Pro version enhances the experience with features like advanced, customizable filtering and the capability to export results in multiple formats. You can choose or import the directories you wish to audit, or even search for additional shares to include in your audit criteria. If desired, you can adjust further audit settings, or simply proceed with the default configurations. Once you hit ‘Audit,’ the tool will scan all folders along with their NTFS permissions. After the audit is completed, the results can be easily viewed or exported to a file. Installation is straightforward and requires no additional configuration, allowing users to get started immediately. The filtering system is robust, allowing for various conditions—utilize ‘And’ and ‘Or’ operators to refine your queries and obtain the precise information required. This makes the auditing process not only efficient but also highly customizable, catering to diverse user needs. -
5
UQube
Upper Quadrant
Using a user-friendly spreadsheet platform, field representatives, payer marketers, partners, brand marketers, pricing and reimbursement specialists, and managed market professionals can input data into a permission-based system that aggregates information for headquarters. This data can be shared through UQ subscription reports or various third-party reporting tools, allowing you to effortlessly generate necessary reports with just a few clicks. You can set priorities for key performance indicators, identify essential metrics, and channel information into diverse reporting frameworks. Additionally, safeguard sensitive information with user-specific access controls during both the data collection and distribution phases. Address any workflow inconsistencies that arise between standard spreadsheets and comprehensive enterprise solutions. Moreover, facilitate the interconnection, harmonization, and synchronization of data across different systems to enhance overall efficiency and accuracy. This streamlined approach not only improves collaboration but also ensures that all stakeholders have access to the most relevant and up-to-date information. -
6
Quest ControlPoint
Quest Software
Safeguard your SharePoint environment against both internal and external threats with robust permissions management, comprehensive auditing, reporting, and the enforcement of governance policies. With Quest ControlPoint, you have the capability to secure, automate, and effectively govern your entire SharePoint ecosystem, whether it operates on-premises, through Microsoft 365, or in a hybrid setup. This solution ensures adherence to permission policies, thereby mitigating the risk of security breaches and unauthorized access to sensitive information. You can efficiently audit, clean up, and manage permissions and user access from a unified console that spans all sites, site collections, or farms. Additionally, it allows for meticulous analysis and management of all permission types, whether they are directly assigned, inherited, or associated with Active Directory or SharePoint groups, providing a holistic approach to SharePoint security and governance. By leveraging this comprehensive system, organizations can foster a secure and compliant SharePoint environment. -
7
CB D365 SharePoint Permission Replicator
Connecting Software
$4 User /Month CB Dynamics 365 SharePoint Permissions Replicator closes the security gap and protects your documents by an automatic synchronization between Dynamics 365 privileges and SharePoint permissions. This is the only solution available on the market that does this. Fully automated, ensure safety and security for all Dynamics 365 / CRM documents. There are no more risks of data loss, reputational risk or GDPR violations. Our solution replicates D365 permission schema, and ensures that SharePoint folders conform to your CRM security model. CB Replicator monitors privileges for D365 data items and synchronizes these modifications to respective SharePoint items - instantly and automatically. It works well with SharePoint Structure Creator and the CB D365 Seamless Attachment Extractor. -
8
Sendwithus
Dyspatch
Sendwithus empowers smaller teams to handle their transactional email needs without the complexities of source code integration. Enhance collaboration among team members through a structured folder system that facilitates simultaneous work on various campaigns. Gain greater control over your workflows with customizable user access settings, ranging from read-only permissions to full administrative rights. The in-app dashboard simplifies the management of both templates and users, streamlining the overall process. Users can easily share templates and reusable code snippets—covering elements such as headers, footers, and navigation—to maintain brand consistency across all communications. Each email can be previewed on numerous devices within the application to ensure it appears flawless before reaching your audience. Additionally, leverage localization and translation features to effectively engage with global markets, broadening your outreach and impact. With these tools, teams can work more efficiently and creatively, fostering innovation in their email campaigns. -
9
Collabor8online
Collabor8online
$525.30 per monthCollabor8online offers a UK-based platform for organizations to share documents effortlessly. The setup process is straightforward, allowing you to determine visibility and access permissions for your files. This service provides an unparalleled method for online file sharing, enabling users to share documents in view-only mode or grant editing and deletion rights. Administrators retain comprehensive oversight of what each user can access, ensuring security and privacy. When introducing new users, their permissions can be conveniently duplicated from existing profiles. With Collabor8online, document sharing becomes both simple and secure, empowering you with complete control over folder and subfolder permissions. This means that users and clients are only exposed to the information you wish to share, tailored specifically to their needs. Additionally, an extensive audit trail tracks all actions taken within the system, documenting who accessed or modified files and when these actions occurred. As a result, organizations can maintain a seamless and efficient file-sharing experience while safeguarding sensitive information. -
10
Cloudsfer offers a seamless solution for copying, transferring, and backing up your files across various storage locations with ease. This versatile migration tool supports both cloud-to-cloud and on-premise-to-cloud transfers, providing integration with over 20 popular cloud storage services including Dropbox, Google Drive, Box, OneDrive, SharePoint Online, and Egnyte, among others. Before initiating your cloud data migration, take advantage of our complimentary analysis tool. With a user-friendly interface, cost-effective pricing, robust security measures, and round-the-clock customer support, Cloudsfer makes the process efficient and reliable. You can transfer files for multiple users while preserving permissions, security settings, and metadata in just a few simple steps. Additionally, you have the flexibility to maintain existing permissions or set up custom ones as required. Our cloud sync service allows you to oversee current files and folders within your destination and execute delta migrations to cloud platforms. Enjoy the benefits of a fast, user-friendly, and secure cloud-to-cloud file transfer experience that meets your storage needs.
-
11
DSRAZOR for Microsoft Cloud
Visual Click Software
$500 per yearReporting and Management for Microsoft 365. Azure Active Directory, SharePoint Online and Exchange Online. Multi-Tenant Reporting and Management in single pane of glass! Single view vs multiple portal windows.Single view vs multiple portal windows. Azure Account Provisioning and Deprovisioning - Easily create and delete users with time saving options. Import new Azure Users from CSV with the ability to include most common attributes with specific rules to define password complexity requirements. Plus set multiple Group Memberships. Restore Soft-Deleted Users - includes 'AutoReconcileProxyConflicts' Create Azure User with Required Attributes. Terminate (Disable) or Delete selected User Account(s). Azure User and Group Reporting - Customizable User reporting to show exactly what you need! Azure User Management - Customizable User Management! Azure Group Membership Management - Easily add and remove members in a Group Azure Secure Permissions Delegation - Remove native change permissions for your helpdesk! Exchange Online Reporting - Easily document your Online Exchange Mailboxes. SharePoint Online Reporting - Easily document your Online SharePoint Sites. Multiple security options available. -
12
Switch Secure Workspace
Egress Software Technologies
Secure Workspace provides a user-friendly platform for securely uploading, managing, and sharing documents with both colleagues and outside partners. With just a click, users can leverage our encrypted environment that features enterprise-level access permissions. The accompanying mobile application and productivity toolkit facilitate effortless collaboration for teams, no matter their location. Comprehensive reporting tools allow you to ensure compliance and avoid damage to your reputation and hefty regulatory penalties. Secure Workspace also simplifies the secure sharing of your most sensitive data, both internally and throughout your supply chain. By utilizing zones as secure containers, you can effectively organize your content into folders and protect sensitive information from unauthorized access. Additionally, with robust access controls, accredited security standards, and adaptable authentication options, your team can confidently manage the sharing of sensitive documents with both internal members and external partners. Ultimately, Secure Workspace empowers organizations to enhance their collaborative efforts while safeguarding their vital data. -
13
FileAgo
FileAgo Software Services
$4 per user per monthFileAgo stands out as the only software that integrates both Waterfall and Granular Permission models, offering users an unprecedented level of precision in managing access control and data restrictions. This innovative approach allows organizations and individuals to enjoy the advantages of comprehensive control while maintaining user-friendliness. Users can efficiently handle their team's data within a centralized cloud storage system, facilitating secure access management and file sharing. Collaborate seamlessly on office documents in real-time using our built-in Collabora Online editor or through Microsoft Office on the web. The protection of sensitive information remains our top priority, and FileAgo’s distinct and adaptable granular permission model is tailor-made to ensure this safeguard. Additionally, all data is fortified with AES-256 encryption and is housed in data centers that have met numerous industry compliance standards and security certifications. Furthermore, FileAgo continuously updates its features to enhance user experience and fortify security measures, ensuring that our clients are always at the forefront of data protection technology. -
14
CentreStack
CentreStack
CentreStack enhances workforce mobility by providing cloud file sharing and mobile access, while ensuring that security permissions and the user experience remain consistent with traditional file servers. By leveraging Active Directory and inheriting permissions, it seamlessly integrates the existing on-premise security of IT infrastructure with the flexibility of cloud mobility, making it an unparalleled solution. This platform not only transforms file servers to support productivity and collaboration for mobile workers using various devices like smartphones and tablets, but it also allows for the option to either upgrade an existing file server for mobile access or migrate data and security permissions to a chosen cloud environment. In both scenarios, CentreStack prioritizes a user-friendly file server experience, bolstered by improved usability, security measures, compliance standards, and data control. Furthermore, enterprises have the choice to uphold their security and compliance by retaining their data within on-premise file servers, without needing to engage in cloud replication, ensuring that they can maintain their established protocols and practices. This flexibility makes CentreStack a strategic asset in adapting to the evolving landscape of mobile workforce demands. -
15
Active Directory Explorer (AD Explorer)
Microsoft
Active Directory Explorer (AD Explorer) serves as a powerful tool for viewing and editing Active Directory (AD) databases. With AD Explorer, users can seamlessly traverse an AD database, mark favorite locations for quick access, inspect object properties and attributes without the need for dialog boxes, modify permissions, review an object's schema, and perform complex searches that can be saved for later use. Additionally, the software allows for the storage of snapshots of an AD database, enabling offline examination and comparison of the data. When a snapshot is loaded, it can be navigated and explored just like an active database. Furthermore, if two snapshots of an AD database are available, AD Explorer provides a comparison feature that highlights any alterations in objects, attributes, and security permissions between the two. This functionality is particularly useful for tracking changes over time and ensuring consistency within the directory. Overall, AD Explorer offers a comprehensive suite of tools designed to enhance the management of Active Directory environments. -
16
TicNote Cloud
Mobvoi
$9.92 /month TicNote Cloud serves as an AI-driven workspace focused on meetings, allowing users to effortlessly record discussions without the need for bots through a Chrome extension compatible with platforms like Google Meet, Zoom, and Teams, or by uploading audio, video, and documents directly into a shared Project. Its transcription capabilities boast an impressive accuracy of 98% across over 120 languages, featuring speaker recognition, automatic summaries, and navigation by topic. With Shadow AI, you can access your entire Project history, enabling it to respond to inquiries with references, rewrite existing content, and create reports in PDF format, web presentations in HTML, podcasts, and mind maps whenever needed. It operates exclusively within your Project environment, ensuring complete permission controls and transparency in its actions. Teams can collaboratively edit transcripts in real-time, incorporating inline comments while assigning roles such as Owner, Editor, and Viewer. As more content is integrated, the intelligence of Shadow AI increases, streamlining the process from recording to final deliverable — all conveniently housed in a single location. This comprehensive approach not only enhances productivity but also fosters better collaboration among team members. -
17
SPDocKit
SysKit
$3,249 one-time paymentStreamline your workflow by automating the repetitive tasks handled by administrators. Enhance data protection while keeping a close audit trail of modifications made within your farm. Thoroughly document your configuration settings and delve into the intricacies of SharePoint's architecture. Instantly generate polished documentation that encompasses all the configuration settings of your SharePoint farm. Assess your farm's configuration to ensure it aligns with the most current SharePoint best practices and achieve peak performance. Gain insights into the changes occurring across your farms while safeguarding your data. Keep a detailed record of who undertook each action within all site collections, and analyze how site collections are utilized by monitoring visitor traffic, storage use, and subsite metrics. Evaluate the site structure and feature utilization, as well as track all changes made to the farm over time. Identify discrepancies in farms, site collections, servers, or permissions. Choose between historical and real-time data to investigate permissions, and generate comprehensive reports for users and groups. Effectively manage and restore permissions as necessary to maintain an organized and secure environment. Furthermore, by automating these processes, you can focus on strategic initiatives rather than getting bogged down in administrative tasks. -
18
Content Suite Security and Productivity Pack
Cassia Content Management
Cassia’s Security & Productivity Pack extends OpenText Content Suite with an extensive arsenal of administrative enhancements aimed at improving governance and day-to-day management. The toolkit simplifies control over permissions, roles, and content creation, ensuring the right people have the right level of access in the right locations. By restricting visibility of users and groups, it reduces privacy risks and supports cleaner, more secure workspace design. Its advanced auditing options let organizations track user actions at a more granular level, helping enforce accountability and compliance. The pack also includes performance-oriented features like quota management and temporary overrides for large operations, reducing strain on system resources. Administrators benefit from more predictable storage planning and faster response times during heavy workloads. These configuration tools are especially useful for environments with complex structures or strict governance mandates. Ultimately, SPP empowers teams to sustain a healthier, more secure, and more efficient Content Suite deployment. -
19
Entitle
BeyondTrust
Entitle integrates a security-centric strategy for provisioning and governance while also prioritizing business facilitation across all departments, including R&D, sales, HR, and finance. Accelerate the provisioning process to enable security policies that adapt automatically to the evolving infrastructure and the varying needs of employees. Assign permissions to designated resources such as Google Drive directories, database tables, Git repositories, and more to maintain control. Protect sensitive resources and roles by allowing access only when necessary and revoking it when it is no longer needed. Empower colleagues, managers, and resource owners to authorize access requests, ensuring that the permissions granted are reliable. With automated access requests and a zero-touch provisioning approach, DevOps, IT, and other teams can significantly enhance efficiency and resource management. Users have the convenience of requesting access through platforms like Slack, Teams, Jira, or email, facilitating a smooth approval experience. Additionally, quickly grant bulk permissions to streamline the onboarding and offboarding processes, effectively adapting to the dynamics of the organization. This comprehensive approach not only safeguards data but also fosters a collaborative environment where teams can thrive. -
20
Book Collector Pro
Collectorz.com
Book Collector represents our traditional desktop application, designed for installation on personal computers with data kept locally. This software is best suited for seasoned Windows users who possess the skills to install and update applications, handle folder and file permissions, set up firewall and security settings, and create their own backups, among other technical tasks. Therefore, if you're not comfortable with these processes, it may be wise to consider alternative options. -
21
With JustClip, you can effortlessly capture any kind of information and organize it to suit your preferences. Retrieve this information instantly whenever you need it, and save a variety of content such as bookmarks, personal insights, notes from books, files, to-do lists, informative articles, audio recordings, online videos, metadata, locations, project documentation, software code, emails, and much more. You have the freedom to arrange your data as you wish through an unlimited folder hierarchy, clip categories, groups, and tags, helping you maintain order and minimize clutter. Quickly locate everything you require, even within the details of larger files. JustClip allows you to create private spaces for reflection or shared workspaces for teamwork, giving you complete control over visibility and access. You can invite collaborators to contribute content, annotate, express their approval, and make modifications, all while managing access through role-based permissions. Once you feel ready, you can easily share your curated content clips with friends, classmates, and colleagues, ensuring seamless communication and collaboration. This platform not only enhances personal organization but also fosters teamwork and productivity.
-
22
Resilio Sync
Resilio
$6 per monthResilio Sync, powered by P2P technology, is a simple, reliable and fast file sync and sharing solution. Sync any folder to all of your devices. Sync photos, videos and music to all your devices, including laptops, NAS, and mobile phones. This is the fastest and most private way of sending files to family and friends. You can send one or more files to multiple recipients, without having to share the entire folder or create a permanent sync link. You can send large files, such as movies, photos, and videos, to your friends. Cloud-free. The Pro feature allows you to send files. Any user can also receive files. All folders can be automatically synced to all devices. You can add a folder from one to another and it will automatically be available on all of your linked devices. You can change access permissions anytime using 'Advanced Folders. You can assign ownership to another user, revoke access, and change read or write permissions on-the-fly. -
23
Sonix's inbrowser editor lets you search, play and edit your transcripts from any device. This is ideal for interviews, meetings, films, interviews, and any other type of audio or video. Sonix's automated translation engine can translate your transcripts in just minutes. Get more global reach with more than 30 languages Your videos will be more searchable and engaging. It's easy to customize and fine-tune, but it's automated enough that it can be used in a variety of ways. Use the Sonix media player to share video clips or publish transcripts with subtitles. This is great for internal use and web publishing to increase traffic to your site. Multi-user permissions give you the ability to grant permissions to collaborators to upload, comment, modify, and restrict access to files or folders. All transcripts can be searched for words, phrases, or themes. Multi-folder nesting helps you stay organized.
-
24
Cloudwork
Cloudwork
Distribute documents that specify varying levels of access such as read-only, review, comment, or full access, and enable the assignment of individual permissions or team access with just a single click. It is also possible to generate secure links for external users. Utilize integrated online editors to create and modify text documents, spreadsheets, and presentations, ensuring complete compatibility with Microsoft formats. Efficiently organize and accurately place emails into your LEGALX document management system, while easily establishing rules to automate email filing and folder mapping. This system ensures that all files within designated folders remain organized, current, and accessible across cloud storage, mobile devices, and local computers. You can define and uphold directory structures to maintain consistent file organization across all platforms. Additionally, facilitate secure communication with your team through personal messages or group chats, and create a dedicated virtual workspace for each project that includes access control and a comprehensive audit trail. Enhance collaboration with secure video meetings that accommodate multiple participants and offer features such as screen sharing, recording capabilities, and waiting rooms, ensuring a productive environment for all participants. Furthermore, this comprehensive system allows for seamless integration of various communication tools, enhancing overall project management efficiency. -
25
ConductorOne
ConductorOne
ConductorOne is an intuitive identity security platform designed for the cloud that streamlines the processes of access requests, access reviews, and deprovisioning, ensuring they are efficient, secure, and compliant. While the surge in cloud applications and infrastructure enhances productivity and teamwork, it poses significant challenges for security and governance, risk, and compliance (GRC) teams due to the cumbersome and error-prone nature of managing SaaS identities and permissions. This often leads to difficult audits, excessive user permissions, and heightened vulnerability to security breaches. With ConductorOne’s advanced identity security platform, users benefit from smooth automation, a wide array of integrations, and a user experience that is among the best in the industry, empowering them to oversee the entire lifecycle of cloud access and permissions effectively. You can say goodbye to cumbersome spreadsheets and the tedious task of manually gathering data from various applications. Additionally, there's no need to rely on managers and resource owners for access reviews anymore, as this solution allows you to quickly and effortlessly automate those processes. Ultimately, ConductorOne transforms identity management into a streamlined and efficient operation. -
26
Dataprius
Dataprius
Dataprius is a new way to work with files in Cloud. It is specifically designed for companies. It is more than a virtual drive. It does not require synchronisation. Maximum file protection against local threats. It allows you to work with company documents without synchronizing, without conflicts and with multiple Users connected simultaneously. Works just like Windows desktop. You use Windows all your life? You will be able to manage files and folders in the Cloud within 5 minutes with Dataprius. The Dataprius folder permissions model makes it easy to manage Users' permissions. All companies require central document storage. All files can be stored in a cloud and shared within the company as well as with customers. You can forget about local servers. Cloud computing allows you to pay for your use and adjust resources to your needs. Reduce and rationalise your costs. -
27
SharePoint Farm Reporter
Vyapin Software Systems
The latest version of Vyapin SharePoint Reporting (SharePoint Farm Reporter), has many new features and significant enhancements to its SharePoint Audit reports. This SharePoint report shows information about custom events that occurred in list items, including changes in workflow settings for the most recent 'N' day or the given date range. This SharePoint report shows the audit events that were deleted in the SharePoint Database during the most recent 'N’ days or the given time period. This report shows the SharePoint audit settings that have been changed in the site collection within the last 'N' or the given date range. This report contains information about all SharePoint site templates in the site collection. This modified report can be used to audit the permission level changes in SharePoint sites. -
28
Unosecur
Unosecur
Close the permissions gap in cloud security while ensuring ongoing protection across various multi-cloud platforms. Implement centralized logging for all IAM credentials, allowing for detailed insights and enhanced policy management through just-in-time permission enforcement. Utilize comprehensive analytics to identify and address privilege misconfigurations, adhering to least privilege principles, access controls, and appropriate sizing. Conduct audits on identity and access privileges as well as compliance whenever necessary. Always accessible and regularly updated, insightful reports facilitate risk assessment, investigations, and forensic analysis. Seamlessly link your cloud environment to Unosecur in just a few minutes and simple steps. Once onboarded, Unosecur’s sophisticated dashboard will provide you with an extensive view of your cloud identity status within hours. You will then be equipped to address and report on any identity and access permissions discrepancies while also performing access right-sizing whenever needed. The importance of identity and access governance cannot be overstated in today’s security landscape. Ultimately, the integration of such solutions ensures a robust security posture across your cloud environments. -
29
Visual Guard
Novalys
1.55/month/ user Visual Guard is an advanced identity and access management (IAM) tool. It offers a complete solution to secure sensitive applications and data. Visual Guard facilitates the implementation of robust, standards-compliant security policies, with centralized management of users and permissions, User management : Create, modify & delete user accounts Integrate with LDAP or Active Directory directories Automatic synchronization of user information Access control : Fine-grained access rights to features and resources Permission and Role Management Multi-factor authentication (MFA) Single Sign-On (SSO) Security Audit and Monitoring : Permission Matrix Detailed logs Historical & Real-time Graphs Integration: Compatibility with major development platforms, frameworks, and protocols. APIs for integration of authentication and authorization features into custom applications Benefits : Simplified access management Enhanced data security Improved regulatory compliance Reduce identity management cost Visual Guard is the ideal tool for organizations seeking to optimize their IT security strategy, while ensuring efficient and effective identity management. -
30
VIP Task Manager
VIP Quality Software
$99.95 one-time paymentVIP Task Manager, available in both Standard and Professional editions, is a client/server software designed for effective group collaboration in task management. This enterprise application enables multiple users to access a shared database simultaneously via Local Area Network (LAN), Low Speed Network, or the Internet. It empowers employees to plan, schedule, share, monitor, and report on their tasks, appointments, projects, and various company activities efficiently. As a result, it proves to be an ideal tool for businesses aiming to enhance teamwork, foster collaboration, and disseminate business information seamlessly. The Professional edition offers a comprehensive solution tailored for group collaboration and task management, allowing users to schedule tasks, create task hierarchies, design custom workflows and fields, and set user permissions. In contrast, the Standard edition delivers a more straightforward solution, enabling multiple users to work together on their tasks and projects with ease. Thus, organizations can select the edition that best fits their collaboration needs and operational complexity. -
31
SoilFLO
SoilFLO
SoilFLO is a cloud-driven platform for soil management that aims to enhance the efficiency of earthmoving and soil tracking for both construction and environmental teams by transitioning from traditional paper methods to a centralized digital system, ultimately leading to time savings, cost reductions, improved compliance reporting, and heightened operational transparency. This platform serves as a comprehensive solution for all earthmoving tasks, featuring capabilities such as real-time data access, automated reporting, and collaborative user access, which allows teams to initiate projects swiftly with minimal training requirements, manage data access through varying permission levels, and function without the need for specialized hardware or driver applications. In addition, SoilFLO aids heavy civil contractors in effectively tracking and managing earthworks without relying on paper load sheets, supports environmental teams in gathering precise and thorough data, provides project owners with insightful dashboards for better financial planning and timelines, and equips fill site managers with tools for managing inbound materials and eTicketing, ultimately minimizing the risk of contamination. Furthermore, the software's user-friendly interface fosters seamless collaboration among team members, ensuring that everyone is on the same page throughout the project lifecycle. -
32
Engin Systems
Engin Systems
$5.50 per monthThe Form Builder tool enables the creation of intelligent forms for digital data collection, accessible both online and offline, and allows for the integration of one form within another for enhanced functionality. Complementing this is the Workflow Builder tool, which facilitates collaboration by establishing a systematic framework that guides the data captured within a form through various pathways and decision points after submission. Each form is linked to a specific workflow, creating a structured approach to data management. Additionally, the reporting system offers straightforward and visual insights into all form submissions, with options to filter and sort data to present only the most relevant information, thereby enhancing clarity and understanding. Furthermore, the Scheduling system guarantees that reports are automatically dispatched to designated users, ensuring that no submission is missed or neglected. This system operates under role-based access control, where permissions are pre-assigned to users, forms, workflows, and reports, thereby defining who can access what. The permissions associated with each form, as well as its fields and web widgets, play a crucial role in regulating access to the information contained within the forms. Ultimately, this comprehensive suite of tools streamlines the process of data collection, management, and reporting, making it easier for organizations to maintain oversight and accessibility. -
33
bSource
Ai2
This sales enablement solution empowers your home office to maintain constant control over all files and folders, ensuring seamless access management at all times. With just a simple click, you can swiftly replace or update any file or folder, streamlining the workflow from the back office directly to the field without requiring any additional effort from sales representatives. This means that the appropriate files are always available in the designated folders whenever they are needed. The bSource Enterprise Content Management application offers the capability to password-protect sensitive folders and files, preventing your representatives from inadvertently sharing confidential information with customers. Additionally, you can establish various levels of permission hierarchies, enabling you to distribute the right materials to the appropriate individuals. Furthermore, the Enterprise Content Management app for iPad allows your representatives to import, create, and manage their own content directly within the application, providing them with the tools to effectively handle all non-confidential folders and files, which helps them prepare and organize for their daily sales calls and presentations more efficiently. This comprehensive approach not only enhances productivity but also ensures that your sales team is equipped with the necessary resources at their fingertips. -
34
Assuria ALM-FIM
Assuria
Keep a close watch on vital files, directories, and registry entries—particularly those that are not expected to change during standard operations—for any modifications that may pose a risk. Identify all installed software packages and set up automatic monitoring to report and alert any changes. The package monitoring feature utilizes policy templates for tailored reporting and notification of critical alterations. ALM FIM is capable of saving both the previous and updated contents of modified text files and registry keys, enabling users to pinpoint and evaluate the precise changes that have taken place, with the option to revert them if necessary. Additionally, ALM-FIM gathers and retains metadata regarding files, folders, and registry keys to facilitate its monitoring functions. This collected metadata encompasses various details, including checksums of the content, dimensions, permissions, timestamps of changes, links, and other pertinent information. By implementing such comprehensive monitoring, organizations can better safeguard their critical assets. -
35
Indxr
Encodian Solutions
$2,999 per yearHarness the power of Optical Character Recognition (OCR) to enhance your PDF documents within SharePoint Online, rendering them both indexable and searchable. Traditional vendor-hosted OCR solutions can be costly due to the computational demands of the process, but Indxr offers an economical fixed-rate solution. Indxr provides a free audit feature, allowing you to assess your SharePoint Online environment and receive reports highlighting non-searchable content on a per-page basis. Gain valuable insights into the extent of non-searchable content within your SharePoint tenant. Easily perform OCR operations at the site, document library, or individual folder level, with customizable options such as image cleanup (deskew, despeckle, auto-rotate), source file overwriting, metadata and permissions replication, new file prefixes, and more. Simplify your OCR workflow by saving configuration settings and automating their execution through Windows Task Scheduler. Enjoy the benefits of unlimited OCR capabilities, unrestricted CPU core usage, unlimited user access, and limitless instances with Indxr. -
36
Shared Contacts for Gmail®
Gapps Experts
$0.99/user/ month Google Workspace (G Suite) and Gmail users can create, manage, and share team address books (labels), from anywhere (Gmail or Google Contacts, etc.). . You can define access permissions just like you would with a Google Doc. - View Only Edit Delete permission - Re-share - Transfer of ownership Access contact information shared with you anywhere in your workspace (Gmail/Google Contacts, Calendar/Mobile phones, etc. . When you compose or receive email (such as with a CRM), you can see the senders and recipients information. Email, Phone, Company, Job Title - Notes added on to the contact - Previous interactions with this contact Shared Contacts for Gmail increases productivity for all Gmail users and Google Workspace users. It solves a major problem that Gmail, Google Workspace and G Suite do not address: i.e. The ability to share contacts with other people. -
37
Iperius Console
Enter
€39 per yearThis is a simple, cost-effective and efficient solution to central security management for resellers and MSPs. Iperius Console allows you to monitor the installation of Iperius Backup as well as the health of your data protection. Iperius Console can be integrated with other products in the Iperius suite. It reduces time and costs by assisting with customer backups and monitoring IT infrastructure. Management of groups and users with customized access permissions. To be immediately informed about backups and any problems on the monitored computers, mobile devices will receive push notifications. You can create custom users and administrators with different viewing and action rights. You can create a user that has only access to specific workgroups. They can only view, but cannot backup or delete items. -
38
MemoCares
MemoCares
$15,000Pathology Lab Reporting Software is specifically developed to optimize and oversee the various operations within pathology labs, focusing particularly on the creation and administration of lab reports. These software systems are crafted to address the distinct requirements of pathology laboratories, incorporating functionalities such as: - Streamlined patient registration and billing processes - In-depth creation of lab reports that include thorough diagnostic details - Advanced editing capabilities for personalizing and refining reports - Simplified distribution of reports to both patients and medical professionals - Strong financial management tools to support accounting needs - Detailed user permission settings to protect confidential information Utilizing this type of software allows pathology laboratories to boost their operational productivity, guarantee precision in their reporting, foster better collaboration with healthcare teams, and ultimately enhance the quality of care provided to patients. Not only does this lead to improved workflow, but it also cultivates trust between patients and healthcare providers by ensuring timely and accurate information dissemination. -
39
Student Dynamics
LitGrey Technologies
This software is for schools that require a student management system. This software allows multiple users to access the same data. Each user has their own username and password. -
40
TestFLO
Deviniti
Jira Test management tool. Professional and advanced testing methods even in the most restricted environments To establish a test management process, you can configure the modules, workflows, custom field, and other settings. You can either create projects individually or use a global setup. To control your processes better, take advantage of Jira permissions, TestFLO permissions module and workflow features. Launch a Jenkins or Bamboo build directly in Jira. You can retrieve the results of the tests that were run during the build and then review them in Test Cases. Each case will have the corresponding status. To categorize and manage your tests, build your test repository in a multi-level structure with folders. Use Jira dashboards, dedicated reports, Jira dashboards, TestFLO issues based on Jira, the Issue Navigator with new JQL functionality or various panels, and progress bars directly to issues. For increased transparency in your testing process, track all relationships between bugs and testing issues. -
41
Stratomat
Stratomat
$899 AnnuallyStratomat is a powerful property management platform for strata and condo councils; home owner associations and property management companies. With Stratomat, you can easily streamline administrative tasks, simplify communication between council members and residents, and ensure that your community is running smoothly. -
42
iCoordinator
Designtech Solutions
$4.00/month/ user iCoordinator™ is a cloud-based platform designed for the secure storage and seamless sharing of documents, catering to organizations, companies, and projects that require diverse collaboration options and mobile access, while also offering robust access control, document viewing features, and notifications for updates. This innovative solution has been developed in response to the growing demand from enterprises for enhanced permission management, the ability to use metadata for file organization with labels and smart folders, as well as the convenience of sending attachments directly into designated folders within the EFSS (Enterprise File Sync and Share) environment. By utilizing iCoordinator™, organizations can effectively manage sensitive business information while ensuring that users have secure access, easy collaboration, and straightforward sharing capabilities. Additionally, the iCoordinator™ Customer portal empowers companies to share vital documents with their customers and suppliers at an affordable and predictable rate, further streamlining business communication and document management processes. Ultimately, this solution not only meets but exceeds the needs of modern organizations in a rapidly evolving digital landscape. -
43
ParentSquare
ParentSquare
$3000 per yearAll communication tools can be unified. Your district's mobile app, mass notifications, online conferences, permission slips, as well as the web conference, can all be unified. UNIFY all communication tools in your district, classrooms, and sites. You can also monitor them. UPGRADE your basic communications by adding bundled-in features such as Conference Sign Ups, Forms & Permission Slips, and more. SOLVE QUERIES ABOUT Sending Urgent Alerts, Report Card and Attendance Notices. -
44
Immuware
Immuware
Monitor the current compliance status through real-time tracking of immunizations, screenings, workplace medical surveillance testing, exposures, training, injuries, illnesses, and certifications. Immuware's user-friendly and innovative dashboards provide a comprehensive overview of your organization, enabling quick identification of compliance gaps and expediting the compliance process. Tracking vaccinations online has never been easier. By allowing employees to take responsibility for compliance, supervisors can significantly reduce administrative tasks and minimize the risk of errors associated with manual tracking. The online employee portal features varying levels of permissioned access, allowing employees to self-report and upload documentation, while supervisors can oversee employee compliance. Additionally, administrators can automate approval workflows, set up follow-up reminders, and access multi-level reporting, ensuring a streamlined compliance process across the board. This collaborative approach fosters a culture of accountability and ensures that all team members are actively engaged in maintaining compliance. -
45
Sentinel
Sentinel Software
$600 per monthStreamlined PeopleSoft Security Management. Everything required for effortless security management and auditing is at your fingertips. Quickly pinpoint absent objects and discrepancies in security across different PeopleSoft environments. Conduct side-by-side evaluations of PeopleSoft objects and their security authorizations. Gain insights into the objects that are missing, newly added, or removed when transferring Roles and Permission Lists to another environment. Sentinel has empowered its clients to enhance their security measures while cutting down on both support time and expenses. Effectively oversee security for Users, Roles, and Permission Lists with precision. Navigate through any menu to uncover the Roles that grant user access. Construct precise Roles and Permission Lists in a significantly reduced timeframe, utilizing a menu without the hassle of searching for components. Additionally, manage data masking for PII/PCI fields directly within the user's profile, ensuring compliance and security are maintained effortlessly. This comprehensive approach allows for improved oversight and control in managing security aspects.