Best SimpleumSafe Alternatives in 2024
Find the top alternatives to SimpleumSafe currently available. Compare ratings, reviews, pricing, and features of SimpleumSafe alternatives in 2024. Slashdot lists the best SimpleumSafe alternatives on the market that offer competing products that are similar to SimpleumSafe. Sort through SimpleumSafe alternatives below to make the best choice for your needs
-
1
Safetica
342 RatingsSafetica Intelligent Data Security protects sensitive enterprise data wherever your team uses it. Safetica is a global software company that provides Data Loss Prevention and Insider Risk Management solutions to organizations. ✔️ Know what to protect: Accurately pinpoint personally identifiable information, intellectual property, financial data, and more, wherever it is utilized across the enterprise, cloud, and endpoint devices. ✔️ Prevent threats: Identify and address risky activities through automatic detection of unusual file access, email interactions, and web activity. Receive the alerts necessary to proactively identify risks and prevent data breaches. ✔️ Secure your data: Block unauthorized exposure of sensitive personal data, trade secrets, and intellectual property. ✔️ Work smarter: Assist teams with real-time data handling cues as they access and share sensitive information. -
2
ShareFile
Progress Software
$50 per month 12 RatingsShareFile allows you to securely share content with clients and internal team members from any device. Small businesses and departments need simple and secure solutions to collaborate between themselves and with clients. ShareFile allows you to access files securely, share data and create workflows that save time. Simple, quick set-up - no IT required. Cloud storage allows you to send and share any size file from any device. You can be sure that your files will always be safe. Bank-level encryption will protect your files, emails, and attachments while in transit and when they are at rest. Collaborate safely: Audit trails and configurable access permissions allow you to control and know who has access to your data. Optimize client and employee onboarding: Reduce manual paperwork with time-saving workflows. Secure FTP alternative: No software installation required - either for you or your client. -
3
End-to-end encrypted file sharing & sync Tresorit is the secure cloud storage and sync place to store, sync, and share files from anywhere, anytime. Tresorit uses end-to-end encryption to protect your files from hackers and internal data breaches. All data is stored in accordance with the GDPR in Europe in Microsoft Azure Datacenters. You can manage who can edit, add, or view the data you share. Securely access the updated files from your browser, desktop or mobile device. Files can also be shared securely outside of your company. Securely share files instead of unsecured attachments to email. End-to-end encryption ensures that nothing leaves your device unencrypted. This means that only you and the recipient can access the files. To ensure collaboration with external parties, use the Content Shield features to protect your Business. Read more here: https://tresorit.com/tresorit-content-shield
-
4
Sealit
Sealit Technologies
You shouldn't be concerned about whether your accounts and devices will be compromised when you implement a Zero Trust security system. Sealit will ensure that your sensitive data, including files and emails, remains fully protected in any scenario. To encrypt sensitive emails, you only need to click one time from your existing inbox. You only need one click to encrypt any file on your desktop. As we add strong protection to sensitive data, we ensure that your workflow doesn't get disrupted. Cyberattacks on businesses are almost always caused by human error. You need to put in place a system to reduce the risk. Our patent-pending end to end encryption ensures that every aspect of your business is protected. Our app uses biometrics to provide seamless protection. Biometrics are not like passwords. They can't be taken from you and you always have them with you. -
5
Box
Box
$5 per month 72 RatingsSecure collaboration with anyone, anyplace, on any device. It is our top priority to protect your cloud files. We have developed advanced security controls, intelligent threats detection, and complete information governance. We also know that your needs are not limited to these security controls. Strict data privacy? Check. Check. Check. Check. You should check. Collaboration is key to your business. This includes customers, partners, vendors, and teammates. Everyone can work together on your most important content easily if they are in the same place. You should not be sharing files but frustration. You should be able to rest assured that your data is safe. It is a waste of time to work on cumbersome, manual processes every day. We let anyone automate repeatable workflows that are important to your business, such as HR onboarding and contract management. Your workflows will move faster. You have more time for what is most important. -
6
ShareSecret
ShareSecret
Auto-redaction of sensitive information, encryption data sharing, and self-destructing private conversations are all possible. You can share passwords, private keys and API tokens with complete peace of mind. All data stored in our short-term vault are encrypted at rest using AES256 encryption. Our system does not store keys. Once secrets expire, they are completely deleted from our system. There are no traceable items in our vault, logs or chat. ShareSecret will erase all data within 24 hours or up to 7 days. All data is encrypted at rest using industry-standard 256 bit AES encryption in our short term vault. API tokens, passwords, private keys and credit cards are all protected by our short-term vault. All data encrypted at rest. Securely share sensitive documents such as PDFs, zip files and powerpoint / keynote presentations. Slack's bot makes it easy for you to share sensitive data without compromising security. -
7
ICFiles
Service2Client
$1.00/month Secure File Share, Secure File Transfer, CPA Secure File Share, CPA File Transfer. 1 Million Dollar Data Breach Warranty -
8
Peergos
Peergos
$6.77 pr montjOnline security is more important than ever. Peergos allows you to store, share, and view your documents, photos, videos, music, and videos in a private and secure environment. Peergos protects your files using quantum-resistant end to end encryption. This ensures that all data about your files, and even who you share them with remains private. Our cryptographic capability architecture ensures that you only share with people you wish to. Peergos allows only friends to share. Peergos can create secret links to your files that you can send to family members and friends who are not yet Peergos users. Peergos gives you control over your identity and is independent from any server, domain or company. Your identity is not tied to any other data, such as your email address or phone number. You can log in to your account using any device and any Peergos server. All you need to log in is your username, and your password. -
9
BooleBox
Boole Server
BooleBox, a content security platform, protects clients' data integrity and confidentiality from unauthorized access. It also ensures the highest level encryption to protect sensitive information from hackers. Users can now create, edit, share, and classify files and folders without compromising their usability thanks to an advanced encryption system. We protect your data wherever it is: at work, in transit via email, in shared projects, in the cloud, in the cloud, in transit via E-mail, in shared projects and on the most popular platforms such as Windows, Outlook and Gmail, OneDrive, SharePoint, and OneDrive. Because we understand the potential digital vulnerabilities of your data, we can protect them like no other. It doesn't abandon it, and it follows it everywhere! We protect large amounts data in many business sectors. Since 2011, we have been doing this every single day. -
10
Wrapsody eCo
Fasoo
Wrapsody eCo provides a secure platform for collaboration. The solution is designed for external collaboration to increase productivity and security. It allows for seamless content sharing and synchronization, with features such as real-time updates and advanced encryption. Wrapsody eCo offers a variety of collaboration tools from enterprise messaging to video conferencing, as well as comprehensive monitoring and auditing functions to track document usage. Its robust security framework, which includes advanced file encryption and controls for access, ensures that sensitive information is protected at all times, whether it's in transit, on the desktop, or in use. Wrapsody eCo allows organizations to share documents both internally and externally, while maintaining security. This is true whether the files are viewed online, downloaded or edited locally. The protection is applied on data and follows them throughout their lifecycle. -
11
Kamzan
Kamzan
Cloud suite for business digitization and collaboration. A private cloud that is exclusively for you. To minimize data-breach risk, we create an ad-hoc technology infrastructure for each customer. The data is only stored in the European Union in a Data Center in Germany that is part of CISPE. Every private cloud is protected with a unique key. Each customer is issued a unique TLS1.3 certificate that encrypts the encrypted communication protocol. We have created a unique European supply chain and a contract that makes it clear that no profiling will be done, that no data will be sold or transferred to any third parties, and that the client company owns all intellectual and physical rights to the data. -
12
Data Rover
Data Rover
Data Rover is an Advanced User Data and Security Management for any Data-Driven Organisation. A single solution for Infrastructure and Security managers that allows data users to explore, manage, process, and protect their data effectively and efficiently, by simultaneously addressing the two primary needs related to the use of data: Cyber Security and Data Management. Data Rover plays a key role in business asset protection and corporate data management policy definition. The software is designed for companies that need to ensure compliance with personal data protection regulations and provides detailed analysis of data access permissions. User Access Rights & Auditing Provides invaluable information about access privileges to files and folders. It allows you to analyse the effective permissions of the users, i.e. the real ones. It identifies not only who can access data, but also who did exactly what, when, and from where. Data Housekeeping Helps you identify and distinguish valuable assets from junk information that becomes unnecessary ballast and an unjustified cost to the company. Data Exchange Provides the company with an advanced data exchange and tracking system exclusively designed for the business. -
13
WinZip SafeMedia
WinZip
Employees must be able to carry digital data wherever they go. Businesses must always ensure that this data is secure. WinZip SafeMedia allows users to store, manage and transport files safely on removable media, such as removable storage devices like CDs, DVDs and USB sticks. This empowers IT admins to enforce protocols and standards to defend your business from online and offline threats. Customize security policies according to the needs of your organization. You can customize settings for specific individuals or groups and monitor activity if needed. Drag and drop combined with automatic security features will provide users with an easy, simple solution that won't hinder their productivity. Use encryption and compression that is FIPS 140-2 certified and compliant. Best-in class encryption methods protect classified information, while enabling storage flexibility. -
14
Synology Drive
Synology
You can be sure that you have secure online access all your personal data and shared data from any Synology NAS, whether it is via the Synology Drive mobile client, desktop client, web browser or another Synology NAS. Securely share documents and protect them with SSL encryption and granular permission settings. The desktop app allows you to work across computers seamlessly. The desktop app is still your native Windows, macOS or Ubuntu interface. However, any changes to files are automatically synced to all other devices as soon you connect them. To save disk space and bandwidth, stream files only when requested1 or pin them to your computer for a permanent copy. You can protect your data from ransomware attacks and accidental deletion by having a scheduled or real-time backup of important folders. -
15
MYDOCSONLINE
MYDOCSONLINE
$9.95 per monthUpload. Share. Edit. Receive Files. Professionals and businesses can easily and securely exchange files. You can easily share and track files such as Word documents, spreadsheets and QuickBook data with clients, colleagues, and suppliers. You can share files directly from your email account or via a secure link through your email app. It's easy to use. It requires no training to use it. High-grade data encryption ensures that your data and account access are protected. With powerful administrative controls and a secure network, you can protect your files and confidential information with confidence. You can trust your data and business to comply with industry regulations. We've got you protected. Your files are protected with industry-leading security and offsite storage. You can always retrieve your data regardless of what happens - whether it is a flood, fire, or crash. You have all the tools and support you need to get back to work quickly. -
16
PowerFolder
PowerFolder
€2.40 per monthAccess your files and folders securely securely from any device. Collaborate on content, and share it with your colleagues and partners. Your data is automatically secured in your private cloud or public cloud. PowerFolder offers it all: Improved collaboration within your organization, easy but secure access and sharing on every device with an integrated automatic sync backup. PowerFolder's collaborative document editing, outlook integration, sharing, and synchronization of any folder and file allow your team to work more efficiently in the European PowerFolder public cloud or your private file sync and shared cloud. It's easier than ever to protect important data. PowerFolder file synchronization and share features access controls, remote wipe, secure encryption, built-in backups, and many other features to protect your IT. PowerFolder has been tested in high availability environments for up to 500.000 users and is reliable, easy to use, and proven reliable. -
17
RMail
RPost
$7/month/ user RMail®, the e-security platform from RPost®, is a global leader in 2000. RMail is a specialist in elegantly simple email encryption for privacy, compliance, legal e–delivery proof secure file sharing, email rights management, email impostor protection and email encryption. RMail's transmission security services are often used by businesspeople and business systems that need to send sensitive or consumer-regulated information. These RMail services can be used for messages that require additional functionality beyond standard email. They include (a) an easier-to-use and more automated email encryption to ensure privacy compliance; (b) a verifiable proof record of who sent what email to whom; (c) assurance and peaceof mind in relation to delivery and open status email of important and time-deadline emails, (d) need to have a timestamped proof that content was delivered; (f) the need to securely share large files. -
18
DocRAID
AvailabilityPlus
$24 per monthMulti-award-winning, CloudRAID driven security. Reliable, yet simple file sharing. You can use it on your metal, or in our data centers. Zero-knowledge-Storage. Email protection. No software installation is required by the receiver. CloudRAID based, highly resilient, yet easy-to-use email encryption gateway. No software to install, no PKI needed. No software installation. No hassles. All email clients are supported. All devices. All devices are ready to be protected in minutes. Software to detect vulnerabilities and harden critical infrastructures. In-built cooperation with the German Federal Office for Information Security. Your attack surface is reduced by fragmentation, encryption, and redundant distribution. DocRAID®, the leader in CloudRAID technology, is DocRAID®. Your files are protected during transport and at rest with fragmentation, encryption and redundant distribution. Redundant distribution to multiple jurisdictions of encrypted data fragments adds an additional layer of protection. -
19
DRACOON
DRACOON
Project managers can create data areas and assign authorizations independently, which allows IT departments to work more efficiently and effectively. DRACOON data rooms prevent file duplicates because all employees have access to the most recent documents at all times. They can also work on files with both internal and external employees. For project coordination, user rights and file request deadlines can be used. GDPR-compliant email attachments and complete emails sent via DRACOON Outlook. Rely on end to end encryption that also includes client-side encryption. It offers the highest level of protection for your data. This encryption is so secure that no one, not even DRACOON or admin, can decrypt your data. The key remains with the owner and can be used at any time. This is how many other providers handle it differently. -
20
BeSafe
BeSafe
Protect control monitor all files on all platforms, all drives, and all boxes. With state-of-the-art encryption, you can protect any type of file (PDF, Office and videos, among others). BeSafe preserves native collaboration features such as Dropbox, Google Drive, or Slack. You can enable one-time viewing and set an expiration date for shared access to keep your documents in control. If you have sent the file to an ineligible recipient, you can instantly revoke access. 360deg visibility of data access: See who, what, where, and how your content was accessed. Instant "read" notifications, page-by-page analytics, and instant notifications help you identify what is most important. Proxy Re-Encryption cryptography is revolutionizing cloud collaboration. Besafe uses patent-pending technology to encrypt your data and allow secure sharing over any email service or cloud file sharing app. BeSafe can be integrated with Dropbox via the user’s BeSafe web portal. -
21
SendSafely
SendSafely
Modern business needs an end-to-end encryption platform. SendSafely allows you to easily share encrypted files and information with anyone, anywhere. Let us take the hassle out of secure file sharing. Trusted by top brands who understand the importance to protect customer information. SendSafely works with all major browsers. There is no software to install or encryption keys to manage. SendSafely is compliant with regulations such as HIPAA (BAA accessible), GDPR and CCPA. You can use one of our pre-built connectors or create your own integration using our developer API. Features for businesses include user administration, single sign-on and custom branding. SendSafely integrates seamlessly with many third-party systems, adding encryption to the platforms that your users already love and know. You can extend the capabilities of your existing infrastructure and apps by adding encryption seamlessly to your existing workflows. -
22
Seafile
Seafile
$16.00/year/ user Seafile is an open-source file sync and share solution that aims to improve productivity, reliability, and performance. Sync, share, and collaborate across devices and groups. Seafile's Wiki feature allows you to build your team's knowledge base. You can organize files into libraries. A library can be selectively synced to any device. You can increase your productivity with reliable and efficient file syncing. You can access files stored in the cloud from your local S: drive, without having to sync them. The server has a huge storage capacity that extends local disk space. Files can also be used offline. You can choose a password to encrypt your library. Before files are synced to the server, they are encrypted. The files are not accessible to anyone except the system administrator. Edit Wiki documents in Markdown format with built-in WYSIWYG Markdown editors. Our full-text search, file tagging and review features make knowledge management easy. -
23
Cryptobox
Ercom
$5 per user per monthSecure solution for file sharing and collaboration. Cryptobox is an ANSSI Restricted Delivery collaboration and file transfer solution. It encrypts all your data from beginning to end, in any environment, Cloud or Premise. Your documents can then be accessed securely from any device, including your smartphone or tablet. There is no risk of hackers stealing your data as it is encrypted from your terminal storage to storage. Your password is also not stored on any server. Your teams often exchange large files or confidential information. There are many external and internal partners you work with. Your employees are mobile and need to access their data via their smartphones, tablets, and PCs. You are looking for a professional-level sharing solution to combat Shadow IT. -
24
PreVeil uses end-to-end encryption in an entirely new way. Protect your email and files from phishing, spoofing and BEC. It's easy for users. Administrators will find it easy. PreVeil provides enterprise users with an easy-to use encrypted email and encrypted cloud storage to protect their important emails and files. PreVeil employs the highest standard of encryption to protect data. PreVeil also offers a "Trusted community" that allows employees to communicate with contractors, vendors, and other third parties. Employees can communicate and share information with each other without worrying about being phished or spoofed, falling prey to BEC, or having their admins compromised.
-
25
SendBig
SendBig
Large files up to 30GB can be shared for free. Dedicated German data centers & ISO Certified. Securely transfer large files online. We use SSL/TLS protocol (Secure Sockets Layer/Transport Layer Security) to protect your data. Files are stored in ISO 27001-certified data centers, which is an internationally recognized standard for information security. SendBig Pro is free to sign up to enjoy an incredible experience. End-to-end encryption protects your files with a password only you know. End-to-end encryption protects your files with password that only you know. Upload files to be resent, forwarded or deleted. We offer fast upload and download speeds. You can delay the sending of your upload files up to 3 days. Notification by email when the first download occurs. -
26
FileAgo
FileAgo Software Services
$4 per user per monthFileAgo is the only software that combines Waterfall and Granular Permission models. This allows users to control access and restrict data like never before. FileAgo offers both control and ease-of-use for users and organizations. FileAgo allows you to securely manage the data of your teams in a centralised cloud storage. You can also restrict access and allow file sharing. Collaborate with your coworkers to edit office documents in real-time via our built-in Collabora Online editor and Microsoft Office for the Web. FileAgo's flexible and flexible permission model for folders and files is built to protect sensitive files. This is our top priority. The data is protected with AES256 encryption and stored at datacenters that have passed security certifications and industry compliances. -
27
BlueFiles
Forecomm
What can you do today if you need to quickly send confidential files or emails to customers, partners, employees, or other people outside your company's secure network? CNIL strongly recommends that businesses and organizations "use data encryption during transfers" and "train people in the risks." Data encryption is an integral part of modern data protection strategies. BlueFiles is a specialized encryption that allows companies to encode data so that it is indecipherable to anyone except the intended recipient. BlueFiles offers a guarantee on all digital data transfers: 100% confidentiality, integrity of the BlueFiles file and remote control of files sent. You can also track your files. We need to communicate securely over the internet without exposing our sensitive data. This will save us time, money, and effort. Companies must encrypt personal data flows in accordance with the GDPR law or risk high fines. -
28
XM SendSecure
OpenText
XM SendSecure™, a secure file exchange platform, is easy to use and highly secure. It allows safe file exchange and temporary storage of sensitive files in virtual SafeBoxes. All files exchanged are virus-scanned and encrypted at rest and in transit. 2-Factor authentication (2FA) ensures that the correct recipient receives them. The data is automatically deleted after a specified time. XM SendSecure automatically creates an audit trail for all file interactions and communications to aid regulatory compliance. The SafeBox file container is central to the XM SendSecure system. It is created upon upload and kept separate from any other storage in a locked virtual area. Each SafeBox can be used to transfer unlimited files in any format, up to 5TB each. Every file is automatically scanned with antivirus software when it enters the SafeBox. Once an exchange has been initiated, additional files can either be sent or received by the sender. -
29
CCM19
Papoo Software & Media GmbH
7,90€ per monthThis is the place to be if you're looking for an easy-to-integrate and GDPR-compliant tool. CCM19 includes an automated integration service that scans your website continuously after integration. This allows you to be certain that your website is prepared. CCM19 is easy to integrate. You can also customize the appearance and text of the page. You can customize the appearance 100% with your own CSS. Do you want maximum data security? We have an option for that: the on-premise version can be installed on your web server so that all data remains under your control. Agents can purchase a special version of CCM19 that allows them to integrate it into their infrastructure and sell it under their name to customers. -
30
DropSecure
DropSecure
$10 per monthDropSecure ensures that your keys to unlocking your data are never shared to anyone you don't want to share them with, even us. This means that you can enjoy complete privacy with our military-grade encryption technology and file transfer technology. Find the best way to share documents. DropSecure's mission is to empower you with technology that protects digital assets in a simple and hassle-free way. DropSecure protects you privacy and protects your data using military grade algorithms before they leave your device. We offer the best technology to protect your data from data centers. You are always aware of who has access your sensitive documents, regardless of whether you are a business, individual, or an enterprise. Most importantly, you are the only one who has access to your documents. Not even us. -
31
Mountain Duck
Iterate
2 RatingsMountain Duck allows you to mount server and cloud storage in Finder on macOS or File Explorer on Windows. View all files on remote storage, regardless of whether they are synced to your computer. When files are opened, they are automatically synchronized to your local drive to allow offline use. You can choose files and folders that you want to keep offline on your computer. Other files can be downloaded and stored on demand. They do not take up space on your local disk. Cyberduck is a free server and cloud storage browser that works on Mac and Windows. It supports FTP, SFTP and WebDAV, Amazon S3, OpenStack Swift and Backblaze B2, Microsoft Azure & OneDrive as well as FTP, SFTP and WebDAV. Connect to every server. Connect to servers, cloud storage, and enterprise file sharing with an intuitive interface. Find connection profiles for the most popular hosting service providers. Cryptomator interoperable vaults for client side encryption to protect your data on any server and cloud storage. -
32
HoundDog.ai
HoundDog.ai
$200 per monthAI-powered code scanner designed to implement a proactive shift-left strategy in order to protect sensitive data and ensure privacy compliance. Privacy teams are unable to keep up with product development, which leads to constant updates of outdated data maps. This is a major burden on their team. HoundDog.ai’s AI-powered scanner can continuously detect vulnerabilities where sensitive data has been exposed in plaintext via mediums such a logs, files or tokens. Cookies and third-party systems are also included. Get context and remediation techniques, such as omitting PII, masking or obscuring sensitive data, or using UUIDs in place of PII. Receive alerts based on the sensitivity of new data elements and prevent changes to products that are not within scope from going live. Eliminate manual, error-prone security tasks. -
33
illow
illow
$40 per monthThe illow cookie banner is available in 25 different languages. You can choose a language or use the feature of multilanguage. The multilanguage feature allows all content to be displayed in the language of the user's web browser. This ensures that visitors from different countries can easily understand your banner's content and improve compliance. Cookies are small text files that sites store on your device when you explore the internet. Cookies are essential for website functionality. They are stored and processed by your web browser. It's important to be aware that cookies can store data that could identify a user without their consent. In response, many regulations are in place around the world to protect our data and privacy. Websites that aim to comply with the CPRA cookie regulations must offer users an opt-out option, allowing them to refuse consent to cookies that collect and sell their personal data. -
34
Uploading files makes file sharing and storage simple and easy. Our cloud storage is encrypted using the most recent security techniques to ensure your data is safe and secure at all times. You can create a link to share files or sync with our desktop application to seamlessly upload files. There are no restrictions on what file types you can upload to our file sharing platform. We have a limit of 5GB file size for free users, and 100GB for business users. Upload files is one of the most popular file sharing sites worldwide. Uploadfiles has a variety of data centers located around the globe. This allows us to provide lightning fast file sharing to our customers at all times. You can count on us 24/7/365, whether you have files to download or upload and share.
-
35
ITsMine Beyond DLP
ITsMine
ITsMine Beyond DLP™, which goes beyond traditional Data Loss Prevention, (DLP), protects organizations from all data threats. Endpoint agents and policies have no effect on employee productivity. Protection is available even after data exfiltration. Data loss incidents are becoming more frequent and more damaging than ever before, be they intentional or accidental, or from external or internal factors. Beyond DLP™, a new security approach, allows organizations to track and secure their data anywhere it is. This includes their internal network as well as external networks. No matter where your data is stored, maintain your high security standards. You can empower employees to be productive while controlling the use and whereabouts your sensitive data. Compliance with data protection regulations is easy, including GDPR, CCPA and PCI to HIPPA. Access control options for sensitive data, data breach detection, and reporting options are all available. -
36
Syncthing is a file synchronization program that works continuously. It syncs files between two or three computers in real-time, and is protected from prying eyes. Your data is yours alone. You have the right to decide where, when, and how it is transmitted over the internet. Your data is never stored on any other servers than your own computers. There is no central server that could be compromised legally or illegally. TLS is used to secure all communication. TLS encryption uses perfect forward secrecy to protect your data from any eavesdropper. Strong cryptographic certificates identify each device. Only devices that you have allowed to connect to your other devices can do so. This protocol is a well-documented specification. There is no magic. Any bugs discovered are immediately visible to anyone who wants to look -- there are no hidden flaws.
-
37
BlackBerry Workspaces
BlackBerry
BlackBerry® Workspaces can be used to enhance productivity, encourage team collaboration, and curb bad employee workarounds. Your files are protected wherever they go by security, which allows you to control access even after they leave your firewall. AES-certified, 256-bit encryption protects files at all times. Ransomware is malware that targets a user's personal computer. It usually occurs when a user opens corrupted emails or clicks on a link. Ransomware attacks can be made worse by ransomware-related file synchronization systems (EFSS). These systems automatically sync and share affected files with other users. Workspaces, unlike other EFSS solutions puts effective recovery tools in control of the system administrator. It helps to limit and contain ransomware attacks. -
38
InShare
InShot
FreeInShare is a safe file-sharing app. We will protect your privacy when you share files. It's possible to share it on Android and iOS iPhone. InShare - Share All Apps & File Transfer meets all your transfer requirements perfectly. It will share videos, photos, music and apps to your friends in lightning fast time, even without the use of a network. You can share all videos and files. No worries about data being lost when you get a new phone. You can easily transfer files and mobile data such as contacts, SMS, songs, videos and apps from your old phone to your new one using the super apk transfer tool. -
39
NetLib Encryptionizer
NetLib Security
Transparent Data Encryption for all Editions (Express to Enterprise) of SQL Server. No programming required. Developer friendly: can be easily bundled with SQL Server-based applications. An economical alternative to upgrading from SQL Server Enterprise. Assists in compliance with various regulations. Protects intellectual property and data. -
40
NMTY Enterprise
NMTY
NMTY Enterprise protects all privacy-sensitive data in your organization, whether it is stored on databases or files. NMTY Enterprise can be integrated into your IT environment to anonymize data sources. NMTY Enterprise allows you to anonymize data, regardless of the format it is stored in. This includes databases and individual files. Anonymize data in a database, or in files such as CSV or XML. Data is anonymized at the source. This prevents duplicates of non-anonymized information. The connections to your data sources are encrypted and support integrated authentication. It is possible to directly anonymize images and documents. Our solutions are based on the most recent innovations and can be integrated directly into your processes. We can always expect the best results. -
41
Z1 SecureHub
Zertificon
25% of the top 100 German companies with the highest turnover use Zertificon's solutions. We simplify encrypted large file transfer with our web-based MFT solution Z1 SecureHub. You can easily - and securely - send and receive large files over the Internet with anyone, anywhere. Thanks to a highly intuitive platform, no end-user installations are required for secure data exchanges between your employees, teams, customers, and business partners. Every upload or download triggers an email to all parties involved, ensuring that everyone is up to date on projects. Users have access to extensive file management, while administrators maintain enterprise-level control over transfer activity. Audits are made easy with comprehensive monitoring and logging options. It's also simple to integrate, thanks to virtual appliance delivery. With Z1 SecureHub, you get German-engineered security with no backdoors for data compliance and cyberthreat protection. You also get complete data sovereignty on-premises or in the cloud. It is customizable, easy to deploy, and easy to manage. APIs are also available. -
42
Protegrity
Protegrity
Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods. -
43
Hush App
Syneidis
It is simple to encrypt your files. Secure file transfers for Android and iOS. Even if the user doesn't have the app, you can send encrypted files to anyone. Create a business account, invite people to join the team, and manage permissions. HushApp is very easy to use, regardless of whether you send or download files. We don't have any information on you, including your keys, files that you store or send, and we don't have any information about your keystrokes. HushApp allows you to send encrypted files to anyone who doesn't have the app. To protect your files, we use military-grade AES256 and RSA-2048 encryption standards. Our servers are also located in the European Union. Are you looking for ways to protect business communications or are you concerned about GDPR? Our app allows you to keep all work-related documents safe and private. HushApp makes it easy to send and protect files from any platform. HushApp allows you to enjoy peace of mind with end-to-end encryption. -
44
WS_FTP
Progress
$29.95/one-time WS_FTP Professional allows you to upload and download files in a safe and secure way. It allows SFTP transfers with the highest encryption levels, is easy-to-use and customizeable, and reduces administrative burden. Protect files before, while, and after transfer using 256-bit AES and FIPS 140-2 valid cryptography. OpenPGP file encryption is also available. SFTP is used to authenticate and connect with servers that require SSH clients to respond to prompts from the server. You can easily locate and transfer files with integrated Google™, Copernic™ or Windowsr desktop search engines. You can search by file type, date, and size. This SFTP client allows you to connect instantly to multiple servers. Drag-and-drop allows you to move any type of file between your computer, a remote server, and from one server to the next. Our FTP client is extremely easy to use thanks to its customizable display, drag and drop functionality, and many time-saving features. -
45
Tricent
Tricent
€18/year/ user Tricent is the #1 file-sharing governance SaaS platform that enables more secure and compliant file sharing within Microsoft 365 (Teams, OneDrives & Sharepoint drives) and Google Workspace (MyDrives & Shared Drives) so you can keep collaborating responsibly. Tricent puts the responsibility of proper file-sharing management in the hands of administrators as well as every member of the organization who shares files: 🚀 Onboard in less than 30 Minutes. ricent gets you up and running swiftly so you can focus on what matters most. 🔍 Get Insights: From day one, gain a comprehensive overview of all files shared and permissions granted—across both personal drives and shared drives. ⭕️ Do Bulk Remediation: Our admin-friendly cleanup tools allow you to tackle file sprawl efficiently. 😇 Empowering End-Users Responsibly: We use automation to involve your employees in the cleanup process. They can continue collaborating while maintaining compliance. 💪🏼 Customizable Governance Policies: Set different cycles for different user groups. Tricent adapts to your unique needs, ensuring flexibility without compromising control. 🔮 Stay Ahead with Abnormality Detection. -
46
Hexamail Flow
Hexamail
Free 3 RatingsHexamail flow is an email client that includes calendaring, tasks, and contacts. It works with Office 365, Gmail and Exchange on premises, as well as all IMAP/POP3 servers. The GDPR data protection module provides email and office document redaction capabilities, including full PST file import, EML and MSG file import, Office document import, printing output, or PDF generation of redacted material. -
47
Secure and manage all your content across distributed teams, devices and apps. Uncover new business insights, scale compliance and governance, reduce costs, and increase productivity. Right out of the box. Flexible deployment models, robust integration ecosystem, and open APIs to address the business needs of companies in diverse industries and regions, and at different levels of cloud adoption. Egnyte helps thousands of customers take their cloud office strategy into hyper-drive. Transform your approach to content governance, privacy, compliance, and workflow automation with a single, turnkey platform.
-
48
C2 Transfer
Synology C2
$99.99 per yearSecure file transfers can be made using end-to-end encryption or user identity authentication. Optional protections can be used to prevent unauthorized manipulation of the content. Two-step process that uses sharable transfer hyperlinks and one-time passwords via email or SMS ensures that only the right people have access to your files. You can protect uploaded content by using links that expire, limit downloads, and watermarks. C2 Transfer is useful for anyone who has many files to share. You can have up to 100 simultaneous transfers and each transfer can include 20GB of files. Send a secure link to anyone you wish to request files. All files are encrypted. Before uploading files, recipients must verify their identity. C2 Transfer licenses can be managed by businesses quickly via a simple interface. This simplifies user access. Secure file sharing does not need to be complicated. Simple steps will ensure that every file you send via C2 Transfer is delivered to its intended recipient. -
49
GAT Labs
GAT Labs
Google Cloud: Intelligent Security and Data Analysis You can easily understand and manage what's going on inside and outside of your Google Domain. Get a free trial for 15 days. No credit card is required. It's easy to set up. -
50
DSRAZOR for Windows
Visual Click Software
$500/year Quickly list file and folder NTFS permissions and share permissions. Find out who owns the files on your shared disk space. Manage NTFS security permissions. Find and remove unwanted file security permissions. Modify existing permissions directly from a trustee report. Add Trustee(s) Copy Trustee(s) Modify Trustee permissions for selected AD object Remove Trustee assignments for selected AD object Remove 'Read' permissions from the SHARE Remove 'List Folder Contents' from the SHARE's NTFS permissions Find files/folders with no owner (Orphaned SID) and remove Report on users, groups and computers. Check that your Active Directory object attributes are consistent with your enterprise standard. You can find accounts that have been locked, disabled, expired, or unused for more than x days. Automate common Active Directory management tasks. Automatically synchronize Student Information System (SIS), to Active Directory. Create/Import/Update users and groups, as well as computers, including bulk management. No scripting required to effectively manage Active Directory Move/Delete inactive users, groups, and computers. Reset passwords in bulk Mass object imports can be done from a CSV file.