SecureCircle Description
SecureCircle's Zero Trust data security protects all data, even those that are not hosted on SaaS. This eliminates data breaches and insider threat. SecureCircle's Data Access Security Broker protects and monitors data. This includes data egressing via enterprise cloud services and managed repositories. SecureCircle enforces access controls on all data locations, including cloud and endpoint devices. SecureCircle provides the only Zero Trust data protection in the world, ensuring data is protected transparently and consistently at scale.
SecureCircle Alternatives
N‑able Passportal
N-able™, Passportal™, provides simple, yet secure password management and documentation management that is tailored to the needs of MSPs and ITSPs. The platform is cloud-based, offering channel partners automated password protection. It makes it easy to store, manage, and retrieve passwords and client information from any connected device. N-able™, Passportal™, also offers value-added services products such as Documentation Manager™, Site™, and Blink™. These products promote compliance with industry regulations, protect businesses against data breaches, cybersecurity threats and network vulnerabilities.
Learn more
Data Rover
Data Rover is an Advanced User Data and Security Management for any Data-Driven Organisation.
A single solution for Infrastructure and Security managers that allows data users to explore, manage, process, and protect their data effectively and efficiently, by simultaneously addressing the two primary needs related to the use of data: Cyber Security and Data Management.
Data Rover plays a key role in business asset protection and corporate data management policy definition.
The software is designed for companies that need to ensure compliance with personal data protection regulations and provides detailed analysis of data access permissions.
User Access Rights & Auditing
Provides invaluable information about access privileges to files and folders. It allows you to analyse the effective permissions of the users, i.e. the real ones. It identifies not only who can access data, but also who did exactly what, when, and from where.
Data Housekeeping
Helps you identify and distinguish valuable assets from junk information that becomes unnecessary ballast and an unjustified cost to the company.
Data Exchange
Provides the company with an advanced data exchange and tracking system exclusively designed for the business.
Learn more
Prisma SaaS
The future enterprise is dependent on data and applications. Unapproved SaaS apps could expose sensitive data and spread malware. Even sanctioned SaaS adoption may increase the risk of data breaches, data exposure, and noncompliance. Prisma SaaS provides advanced data protection and consistency across all applications to reduce the risk. It provides cloud access security broker services and has advanced capabilities in data loss prevention, compliance assurance and data governance. Prisma SaaS offers unparalleled visibility and precise control over SaaS applications through a large library of application signatures. Shadow IT risk is reduced with easy-to-use dashboards and detailed reporting.
Learn more
USB-LOCK-RP
USB Control & Lockdown Software to Block USB devices Access and Lock USB Ports within Windows Systems. Centralized USB Device Management, Monitoring, and Whitelisting to Protect Computers within a Network. Endpoint Security Management's USB Device Control program is an important component of Endpoint Security Management. It focuses on protecting computer systems and data assets against threats from unauthorized USB device use. To protect networks that store sensitive information or control machinery, it is necessary to control USB device access to endpoints.
Latest version v12.968 (released: September 26, 2021
- Centralized USB Device Management
- Secures Computers in Groups or Specific Computers.
- Whitelists specific devices by Hardware ID and blocks the rest
-Automatically apply Group 1 protection settings to unassigned clients. NEW!
-Automatic Authorizations Mode, Whitelist USB devices across the network automatically. NEW
-Receives alerts & logs USB device connections in the network.
-Exports Status and Alerts Reports to csv format (Comma-separated value)
- Presents Full Screen Locking on Blocking Devices (includes company logo).
- Monitors and Encrypts File Transfers From Endpoints to USB.
Learn more
Pricing
Pricing Information:
per user per year
Free Trial:
Yes
Integrations
API:
Yes, SecureCircle has an API
No Integrations at this time
Company Details
Company:
SecureCircle
Year Founded:
2015
Headquarters:
United States
Website:
www.securecircle.com
Recommended Products
Our Free Plans just got better! | Auth0 by Okta
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
Product Details
Platforms
SaaS
Windows
Mac
Linux
iPhone
iPad
Android
Type of Training
Documentation
Live Online
Webinars
In Person
Customer Support
Phone Support
24/7 Live Support
Online
SecureCircle Features and Options
Computer Security Software
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
SecureCircle User Reviews
Write a Review- Previous
- Next