Best Smart Eye Technology Alternatives in 2024
Find the top alternatives to Smart Eye Technology currently available. Compare ratings, reviews, pricing, and features of Smart Eye Technology alternatives in 2024. Slashdot lists the best Smart Eye Technology alternatives on the market that offer competing products that are similar to Smart Eye Technology. Sort through Smart Eye Technology alternatives below to make the best choice for your needs
-
1
MASV
63 RatingsMASV Inc. is a secure cloud software company designed to quickly transfer heavy media files worldwide to meet fast-paced production schedules. Global media organizations rely on MASV Inc. to automatically deliver their large files without any restrictions, allowing them to concentrate on their next big deliverable. MASV Inc. has gained the trust of media enterprises worldwide for its reliable and secure file transfer capabilities. It is specifically designed to handle the unique requirements of media organizations, ensuring the safe and efficient delivery of large files. -
2
Filecamp
163 RatingsFilecamp is a cloud-based Digital Asset Management (DAM) software solution that helps marketing & creative teams organize and share their digital media such as images, videos, and brand guidelines. Filecamp comes with unlimited users, each user configured with their own set of user-, admin-, and folder permissions. Filecamp's unique custom branding options will make sure your DAM system matches your brand guidelines. The built-in online proofing and commenting tools allow you to review and approve creative work. Prices start at only USD 29/month and their free 30-day trial allows you to test the solution with your files, teammates, and customers. -
3
Oz Liveness is a world-leading facial recognition and authentication software that is used by private and public organizations around the world to reduce the risk of biometric fraud. It prevents deepfake attacks and spoofing attacks. Oz Liveness uses advanced algorithms to detect many forms of biometric spoofing. This includes 3D and 2D masks, photos and videos displayed on iPads or laptops, and photos and videos. Our technology has been approved by the industry's most stringent testing standard, ISO30107 certification. This certification helps organizations verify that they are dealing with a real person within seconds. It also lowers compliance risk and fraud risk.
-
4
InfinCE
Fingent
$5 per user per monthInfinCE, a digital workplace platform to manage your end-to-end business operations and enhance the employee experience. It is a smart collaboration and remote working platform hosted on a secure private cloud that can easily integrate with third party apps/software's to empower employees to collaborate and work from anywhere. InfinCE is equipped with all the essential collaboration, communication, and productivity tools for businesses to manage employees, customers, business communications, and project management. It's fast to set up, easy to use, and a budget-friendly platform with exclusive features like: Virtual phone system to streamline your business communication. Customizable dashboards with smart tiles for complete data visualization. Curated marketplace with many open-source and commercial business software. Guest users can view dashboards, share files/documents, and collaborate with the team, customers or partners, without being part of InfinCE. Smart video calling experience with multiple screen share and simultaneous document editing. Centrally control your IT assets with stringent access controls. -
5
Secret Double Octopus
Secret Double Octopus
$3/month/ user SDO offers end-to-end workforce passwordless authentication and desktop MFA solutions for enterprise workforces. The Octopus Authentication Platform plugs into VPNs for more secure remote access, VDI and SSO portals such as Okta SSO, Ping Identity, Microsoft ADFS and ForgeRock. The solution can integrate into Okta Verify or ForgeRock MFA, as well as integrate with Cisco Duo or RSA SecureID. It is the most flexible and complete way to go passwordless in the market today. Password management tools become obsolete in a world where SDO eliminates the password, lowering help desk costs. As a FIDO2-certified server, Secret Double Octopus supports any FIDO2-certified key such as Yubico, Feitian and Google's Titan key. Secret Double Octopus is the perfect next generation authentication solution for Zero Trust network access and re-architecture initiatives. -
6
Zivver is the digital communications platform that powers the next generation of secure digital communication. It is simple, smart, and secure. Zivver is trusted by more than 5,000 organizations worldwide. It prevents data leaks from human error and ensures compliance. Zivver seamlessly integrates to all major email clients, including Outlook, Gmail, and Microsoft 365. It features unrivalled zero-keys encryption and smart features like contextual machine learning powered business rule generation. Zivver allows you to securely share large files upto 5TB via your existing email client. Zivver is fully in compliance with all major data security standards including ISO 27001 and NTA 7516, GDPR and HIPPA.
-
7
iCoordinator
Designtech Solutions
$4.00/month/ user iCoordinator™, a cloud-based solution that secures and allows for easy sharing of documents between companies, organizations, and projects, is available to meet the needs of different users for collaboration and mobile access. It also offers powerful access control, document viewing, and subscription to changes. -
8
Ondato offers identity verification, business onboarding, customer data platform, due diligence, and authentication solutions tailored to fit in your everyday workflow. Our tools fit the entire customer lifecycle management, starting from onboarding and ending with continuous user monitoring. It's a one-stop solution whether you're worried about compliance or are looking for a more user-friendly data management platform.
-
9
Nuance Gatekeeper
Nuance
These unprecedented times present new challenges to fraud and contact center leaders. Nuance voice, behavioral, and other biometric solutions offer the convenience, security, speed, and security that brands and customers demand. They also prevent increased fraud attacks. Opus Research's Intelligent Authentication and Fraud Prevention Intelliview Report named Nuance the top biometrics vendor for the second consecutive year. This is significant news for anyone considering biometrics solutions. The 2020 report places Nuance at the top in the Leader quadrant, ahead of 19 other competitors, because its customers report higher ROIs, greater fraud loss savings, higher authentication success rates, and better ROIs than those who use competing solutions. Nuance Gatekeeper provides seamless, secure biometric authentication and proactive fraud prevention. Gatekeeper helps companies improve customer experience and reduce operational costs. - 10
-
11
Secfense
Secfense
Secure your company, employees, and customers with stronger authentication. 2FA can be deployed in minutes and not weeks. 2FA (and other user access policies) are built into the infrastructure and not fixed to applications. Allowing the use of all 2FA methods on the market, now and in the future, without changing the core. Protection is available to all employees, including those who work in the public, private, and on-premise sectors. Secfense is installed between your users and the applications they access. It tracks traffic patterns that are related to authentication. It can then enforce multifactor authentication logon and other sensitive actions, without interfering in applications existing code or databases. The platform always has the most current 2FA methods. Secfense and applied methods are not affected by application changes. You can control session expiration rules across all applications. Do not rely on VPNs. Instead, trust users and their devices. -
12
LumenVox Voice Biometrics
LumenVox
Companies can provide a pleasant customer experience using voice biometrics authentication without compromising security. LumenVox Voice Biometrics technology screens customers through comparing input voice audio with a collection voice samples ("voiceprints") that have been verified authentic or fraudulent. Each voice is unique, just like a fingerprint. Voice Biometric Authentication is an effective way to verify identity. LumenVox's flexible Voice Biometrics technology is available in any method that you choose. This gives organizations the ability create a seamless and secure process for verifying customers. LumenVox Voice Biometrics creates a better user experience and reduces operational costs. It also strengthens security. Liveness detection is an additional layer of security. -
13
SmartFile
SmartFile
Secure File Sharing & Transfer Solutions For Business and Enterprise You can easily manage and share large files within and outside your company. It's the perfect combination of ease for users and IT control. SmartFile is designed to improve usability, reduce unauthorized file sharing, and eliminate IT file-related headaches. Secure file sharing is made easy for your users with SmartFile. Users can send, receive, and manage files from their desktop, browsers, FTP clients, and API. For compliance purposes, file and user activity are tracked and recorded. Email notifications are sent to give you instant alerts. Granular permissions and access rights make sure that only authorized users have access to certain files. Users can securely access files both onsite and offsite using a simple interface, while still adhering to company security procedures. -
14
TECH5
TECH5
In a world in which identity is increasingly digital, online and mobile and away from the physical documents that we have carried since decades, a solution that can ensure the citizens' trust in organizations that collect, access and store their data is needed. TECH5 introduces the T5-Digital ID, a technology solution that is inclusive for identity issuance. It allows for the biometric binding of the digital credential and the authorized holder. T5-DigitalID allows the holder to decide what data they want to share and under what conditions. Our solution was built from the ground-up by using the analogy of a physical ID document, and asking five fundamentals questions about where identity comes and what direction it is heading in. We then applied all the above questions in order to build an ecosystem that does not require a physical smartcard with its (expensive reader infrastructure). -
15
Tranxfer
IRIS Group
$9 per monthTranxfer is an easy-to-use platform that allows companies of any size to send and receive files via a secure channel. You can also set preferences for downloading and sending files, such as the expiration of the file or the display the file with a watermark. This allows you to receive all acknowledgements of receipt and receipt in real-time. To prevent sensitive files or large files being sent via unreliable channels that don't offer traceability or leakage, you can offer Tranxfer to employees. Hassle-free security. The Tranxfer tool is easy to use, increasing its adoption in organizations. The recipient does not need to install anything. Just follow these simple steps. We are a GDPR compliance platform. -
16
Diplomat Managed File Transfer
Coviant Software
Diplomat MFT is the best value for file transfer automation from anywhere to anywhere with visibility and alerting across any OS in the cloud or on your premises. Use FTP and FTPS, SFTP, HTTP and HTTPS and Local Network (including Network Shares and AS2), as well as Cloud Storage providers: AWS S3 and compatible, Azure Files, Azure Blob, Oracle Cloud Storage Google Cloud Storage Citrix Sharefile and Dropbox. More coming soon. -
17
BluSync
Parablu Inc.
Cloud solutions are becoming more popular as organizations look to improve collaboration between their team members. Future-ready technology is the key to fostering innovation and speed in collaboration. BluSync™, a secure Enterprise File Sync & Share solution (EFSS), is available. It provides a secure platform that allows teams to quickly access, edit, and share files. BluSync allows team members to securely connect to content stored in the enterprise's mini-clouds or share cloud. BluSync™, which keeps an auditable record of all activities in the cloud environment, allows organizations to keep complete and accurate control over how content collaboration and file sharing takes place. -
18
Air
Air.inc
$250 per monthYour team's content can be centralized in a workspace that is organized, versioned and easy to share. Sure, Air stores your content. Air has smart search, guest permissions and custom layouts. It also tracks version tracking and makes sharing hassle-free. This makes the creative process much more enjoyable. Stop hiding assets in zip files and folders. Create lightweight presentations and social media posts. Organize your content in a way that reflects your brand. Your workspace can be used as a search engine. Smart tags and image recognition are built-in features that allow anyone on your team, including the manager, to locate assets and jump in. The feedback is the most difficult part of the feedback process. Allow guests to upload directly to your workspace by creating public boards. You can leave comments, have discussions, or make selections with context. Track changes and clearly identify the most recent asset version. -
19
Everleagues
Everleagues
$5.00 per user per monthRemote collaboration is possible with your clients and team. In minutes, you can create your own private workspace for your company. You can bring all your tools to one place and increase productivity while working remotely. EverLeagues connects all your company's users, internal and externe, to collaborate on day-today tasks in a secure platform. This results in better service, reduced time and lower costs. Collaboration is possible through multiple channels, groups, or teams between employees, clients, and others. Secure messaging, video conference and file sharing allow you to communicate. Everleagues offers security for all your files and messages, without compromising productivity. You can organize and manage your business with a role- and tier-based organizational system. Everleagues makes it easy to assign team members to specific organizations, even if there are different locations or departments. You can also assign clients to specific professionals or team members. -
20
BlueFiles
Forecomm
What can you do today if you need to quickly send confidential files or emails to customers, partners, employees, or other people outside your company's secure network? CNIL strongly recommends that businesses and organizations "use data encryption during transfers" and "train people in the risks." Data encryption is an integral part of modern data protection strategies. BlueFiles is a specialized encryption that allows companies to encode data so that it is indecipherable to anyone except the intended recipient. BlueFiles offers a guarantee on all digital data transfers: 100% confidentiality, integrity of the BlueFiles file and remote control of files sent. You can also track your files. We need to communicate securely over the internet without exposing our sensitive data. This will save us time, money, and effort. Companies must encrypt personal data flows in accordance with the GDPR law or risk high fines. -
21
For a seamless, hassle-free and contactless user experience, a cloud-based, wireless door access control system is available. Modern access management system that uses the power of the cloud and mobile technology. Spintly's fully wireless, cloud-based access management system is revolutionizing the security industry. It eliminates the complexity involved in installing an access control system in a building. Installers can save over 60% on their time and costs by not having to wire. This allows them to be more productive and reduce their cost. Our vision is to make building smarter and easier by offering a frictionless access experience to users. We also aim to make buildings smarter using our fully wireless mesh platform for intelligent building devices. Spintly provides solutions for various industries with its fully wireless access control hardware and cloud-based software.
-
22
Sharetru
Sharetru
$120It is designed for business-to-business workflows. It can share sensitive and private information with the highest commercial-grade security. It meets most compliance requirements, including HIPAA, GDPR and PCI-DSS. It is designed for government agencies and contractors to share sensitive data with the strictest U.S. Government security requirements and compliance requirements, such as FedRAMP Moderate, ITAR, DFARS and FedRAMP Moderate workloads and DoD IL2. Sharetru's cloud service and data center partners are subject to an annual audit according to SSAE-18 standards. Their GDPR Data Processing Agreement includes GDPR-ready subscription plans. Sharetru's cloud service and data center partners have been certified and tested according to the international ISO 27001 standard. All Sharetru cloud service and data center partners are subject to an annual audit under PCI-DSS standards. 325 controls are in effect on the GOVFTP Cloud infrastructure, platform, and IaaS (PaaS). -
23
Hive.id
Hive.id
You can separate fake signups and real users. This will help you protect your good users against account takeover. While free trials are great, don't let bad actors waste time or money. Align your risk with your business objectives to prevent fraudsters and bots signing up and causing damage to your brand and bottom line. Detect suspicious user access in real time without any manual overhead. Automate alerts, step up authentication, and account recovery processes, depending on the level of risk. Detect email addresses that appear undeliverable or fake. You can now identify low quality signups by adding different signals. Your user experience is still excellent, but it now aligns with your business objectives. All companies face the dilemma of whether to buy or build a security solution. Hive is a cost-effective option that can be brought to market in a shorter time. -
24
Incognia
Incognia
Location Behavioral Biometrics We create a dynamic location fingerprint by using the unique location behavior pattern of each user. This makes it very difficult for fraudsters or forgers to copy or forge. Incognia's location-based fraud solutions are designed to help financial institutions and retailers prevent account fraud and account takeover. Our precise location technology uses network signals and on-device sensors data to create unique behavioral patterns that allow users to be identified and authenticated. Our solution does not require PII and works in background to provide a secure and frictionless experience. -
25
BioCatch
BioCatch
BioCatch provides advanced behavioral insights that provide actionable intelligence to global organizations so they can create a secure customer experience. BioCatch analyzes the user's cognitive and physical digital behaviors to identify legitimate applicants from cybercriminals. BioCatch detects behavioral anomalies that could indicate human and non-human cyberthreats like bots, remote access tools attacks, malware, and manual account takeover. BioCatch can detect subtle behavioral indicators that indicate that a victim is being unwittingly manipulated through fraudulent money transfers. BioCatch's Al driven behavioral biometrics technology reduces online fraud and allows online identity verification without compromising the user interface. BioCatch's unique solution is designed to protect identities online and provide a frictionless user experience for mobile and web users. -
26
EMDYN BioTrace
EMDYN
EMDYN understands that it is difficult for many organizations to verify identity, especially in today's interconnected world where individuals can easily conceal, fraudulently mask, or change their identity in many ways. These actions can be used to maliciously target other organizations. The tools currently available are often outdated or restricted by privacy laws. They cannot provide the correct information on identity, nor can they provide situational awareness to an organization. The current facial recognition systems can be used to identify a person using a passport or ID document. However, they are not able to quickly search large databases or video repositories for the same face or link that face with other information sources. We now have a solution. It is an essential component of a real investigative tool that is ultra-fast and user-friendly. Welcome to EMDYN BioTrace. -
27
Onfido
Onfido
How can you verify that real people are online? Onfido helps companies identify real identities using the help of AI and identity experts. With just an ID and a picture, your customers can prove their identity wherever they are. You'll be able to secure your business and have all the information you need. Your user's digital account can be linked to their real identity using only their ID and their face. You can then re-verify your user's digital account or authenticate them with a selfie. Onfido's identity authentication has helped businesses like yours to onboard more users and reduce fraud while freeing up resources for their internal teams. Identity verification and authentication can help you drive business results. Our AI-based technology determines if a user's government-issued ID has been authenticated or fake, and then compares it with their facial biometrics. This is how we provide companies with the security and assurance they need to securely and remotely onboard customers. -
28
VU Security
VU Security
We are a cybersecurity firm that specializes in identity protection and fraud prevention. Our mission is to provide safe digital experiences that are frictionless for both citizens and businesses during the digital transformation. Different technologies are used to recognize people based on their behavioral or physiological characteristics. Once the data is collected, the system extracts a unique pattern from each individual. This will allow for future comparisons. Transactional analysis of user behavior and channels to detect and prevent fraud. Secure, fast-response data exchange through references to a vault containing encrypted data. Multi-channel fraud prevention using machine learning. We use machine learning to create intelligent profiles that detect fraudulent activities based on user behavior. -
29
LaborTrack
M2SYS Technology
LaborTrack™, a cloud-based, customizable biometric workforce management system for organizations to accurately identify and manage employees, is fully customizable. Organizations often have difficulty managing cross-departmental employees in industries with high turnover rates. Employers who hire new employees must ensure that they are accountable, maximize productivity, can be identified quickly, and are able to be identified accurately. Accurate employee identification can reduce payroll inflation, error rates, and ensure compliance to labor tracking laws. M2SYS Technology offers LaborTrack™ as a flexible, accurate and customizable employee profile management and reporting system that can be customized to meet any business's labor tracking requirements. LaborTrack™, addresses workforce management inefficiencies. -
30
ICFiles
Service2Client
$1.00/month Secure File Share, Secure File Transfer, CPA Secure File Share, CPA File Transfer. 1 Million Dollar Data Breach Warranty -
31
NordPass Business is a password manager for SMBs and Enterprises to help optimize the company’s workflow and boost productivity. With NordPass Business you can: - Quickly onboard and offboard your employees - Easily exchange passwords within the team - Ensure that your customers’ data are safe and sound - Get detailed security insights and see breached domains and many more! Start a 30-day free trial (no card required) to boost your company’s productivity and safety.
-
32
FileShadow
FileShadow
$7 per monthNo more need to organize your files into folders. FileShadow organizes your documents and photos by incorporating metadata scanning with custom, geolocation and automatic tagging. This allows for seamless organization and search. FileShadow can link one or more of your Slack Workspaces to allow files from all channels to be archived in the FileShadow Vault. FileShadow can archive, cataloged and secure attachments that are sent to you or your Slack conversation partners. FileShadow employs machine learning (ML), artificial intelligence (AI), and a combination of both to provide superior indexing and search results. Advanced search features allow you to quickly find files, such as file content, OCR, PDFs, geolocation and image searches. FileShadow accounts are all you need to share files in your vault. You can easily restrict or grant access to your files, determine which files can be altered or seen, and much more. -
33
Scelloo Dome
Scelloo
Are you unable or unwilling to keep track of any changes to files in your business? Are you concerned about the integrity and security of your business files. Are you looking for a file storage and sharing solution that is tailored for businesses? Are you looking to restrict the access to files in your company? Do you want your team members to be able to share files and collaborate? -
34
Kiteworks
Kiteworks
FedRAMP is the only security platform that supports file sharing, managed files transfers, and email data communication to meet compliance requirements for standards such as CMMC2.0, ITAR, IRAP NIS 2, HIPAA and others. The "tool soup" of content communication increases inefficiency and costs. It is almost impossible to manage zero-trust security policies at a central level. Organizations also lack visibility into security and compliance over communications of sensitive content. This increases security and regulatory risks. Lack of governance increases security and compliance risks. Organizations need to control and track who has access to content, who edits it, who it can be shared with, and where. Cybercriminals and malicious employees target sensitive content such as PII, IP documents, financial documents and PHI, because they can monetize or weaponize it. -
35
Alice Biometrics
Alice Biometrics
FreeALICE offers a frictionless, automatic, immediate and accurate online identity verification solution with the highest level of security at an efficient cost, which is purchased without commercial assistance and integrates in minutes. Anti-fraud technology authority with more than 10 years of research and 64 technical papers published. Our algorithm has been evaluated by NIST. Alice Biometrics is the perfect solutions for companies with a need to verify users either for business operations (shared mobility) or due to legal requirements (fintech) -
36
Kamzan
Kamzan
Cloud suite for business digitization and collaboration. A private cloud that is exclusively for you. To minimize data-breach risk, we create an ad-hoc technology infrastructure for each customer. The data is only stored in the European Union in a Data Center in Germany that is part of CISPE. Every private cloud is protected with a unique key. Each customer is issued a unique TLS1.3 certificate that encrypts the encrypted communication protocol. We have created a unique European supply chain and a contract that makes it clear that no profiling will be done, that no data will be sold or transferred to any third parties, and that the client company owns all intellectual and physical rights to the data. -
37
Keyless Authenticator
Keyless Technologies
2 RatingsNothing to forget. Nothing to steal. You are the key. To protect your remote workforce, adopt zero-trust authentication. This will allow you to enable strong customer authentication with just one glance. Anywhere. Anytime. Any device. To eliminate fraud, phishing, and credential reuse, embrace passwordless, multifactor authentication. This will enhance customer and employee experience and protect their privacy. Unique technology enables you to achieve unique capabilities. Hardware Agnostic. Keyless does not rely on any device hardware or sensors. Keyless can be deployed on many devices and appliances. Eliminating passwords can help you achieve better results for your company. Top-Notch Security No central honeypot, no data on user devices. Data cannot be stolen or lost, as no private information is available to anyone except the user. Passwordless passwords can reduce password-related costs. Password Reset Costs. The average helpdesk labor price is $70 -
38
SpeechPro
SpeechPro
SpeechPro is a reseller for intelligent speech technologies, voice, and facial biometrics as well as solutions to audio and video recording and processing, analysis, and analysis. SpeechPro is the only company that offers both voice and face biometrics. SpeechPro's goal in building and maintaining long-lasting trust-based customer relationships is to create and maintain long-lasting trust. SpeechPro's solutions and technologies are used in more than 70 countries by both the public and private sectors. We share our knowledge and help our clients become experts in our products through training services, professional consulting and customization. SpeechPro provides innovative products and technologies that empower people and make the interaction between human and digital environments safe, confidential, comfortable, and secure. SpeechPro also helps clients' businesses succeed. An industry leader in audio forensics. -
39
Objective Connect
Objective Corporation
FreeWhen you share your information with anyone outside of your organization, you will have the ultimate protection. Designed for government and regulated sectors, Objective Connect is a secure file-sharing external application that gives you complete control over information shared outside your organization. Extend the internal information governance to external stakeholders. Maintain control over documents shared. Collaborate with others across devices, teams, or the globe. Maintain a single version of the truth. All the information you need to know about who did what when is in one place. Share containers of documents from your existing file plan to choose which documents can be sent outside. Before sharing any document, all access controls and security levels are checked. The two-way synchronization of your existing file plan keeps everyone up to date. All files you receive are automatically filed and flagged in the correct location to ensure that your metadata is always accurate. -
40
PreVeil uses end-to-end encryption in an entirely new way. Protect your email and files from phishing, spoofing and BEC. It's easy for users. Administrators will find it easy. PreVeil provides enterprise users with an easy-to use encrypted email and encrypted cloud storage to protect their important emails and files. PreVeil employs the highest standard of encryption to protect data. PreVeil also offers a "Trusted community" that allows employees to communicate with contractors, vendors, and other third parties. Employees can communicate and share information with each other without worrying about being phished or spoofed, falling prey to BEC, or having their admins compromised.
-
41
EFSS
Defense IT Solutions Inc
Thru is a business-specific file sharing and collaboration system that enables end-to-end file sharing. It offers enterprise-grade security and reliability, as well as an easy-to-use interface that can be integrated into many business applications. Thru provides 360-degree access to your organization and the ability to sync, share and transfer files from any device, from any location, from any device, from any time, from any device. Your employees will be able to collaborate in real-time by connecting all departments. You can collaborate in real-time and manage your content and data on a platform government and financial institutions trust. Online file management and organization by department or project. With policy-based access, you can share folders with other members of your team. -
42
LastPass
LastPass
$4 per user per month 32 RatingsLastPass is the leader in password and identity management solutions, trusted by individuals and organizations of all sizes worldwide. Millions rely on LastPass daily to create, store, manage, and protect their most important credentials, keeping them secure, private and always within reach. With LastPass, anyone can effortlessly log in to life or work anytime, anywhere. -
43
SendThisFile
SendThisFile
$4.95 per monthOur technology removes the size restrictions that are common with free or corporate email accounts. Sending large files shouldn’t be difficult with a SendThisFile account. Your privacy is protected with our professional-level encryption. You can send any file to anyone with our large file sharing tools. The best thing about this is that your recipient's location won't matter and they won't need to create an account. It's the only resource that you will need to deliver digital data. To receive large files, you can use a Filebox. Each Filebox is located at a unique URL. It provides easy step-by-step instructions to upload and share files. Simply give your personalized link and ask for the person to use it to send you files. It's simple for you and them. They don't even require a SendThisFile account. -
44
Callsign
Callsign
We are an identification fraud, authorization and authentication company that solves the problems that organizations face in getting users onto their digital platforms. Innovative solutions often focus on technology's capabilities and don't give the applicability to all users the same weighting. Our engineering team has over 300 years of combined experience in making software work for everyone. They come from both a banking and ecommerce background. We are proud to be able to assist some of the largest banks in the world and offer the same "bank-grade" identification solutions to clients of all sizes, public and private. Callsign allows your users to move on with their digital lives in the easiest way possible. We make it easy for them to do so. Our Intelligence Driven Authentication recognizes users using deep learning insights - derived from device, location, and behavioral data. -
45
Your mobile, intelligent intranet. You can share and manage knowledge, content, and applications to support teamwork, find information quickly, and collaborate seamlessly across the organization. SharePoint facilitates teamwork by providing dynamic and productive team sites that can be used by every project team, division, and department. Files, data, news and other resources can be shared. To streamline the work of your team, customize your site. You can collaborate securely and effortlessly with your team members, both within and outside of your organization, on PCs, Macs, or mobile devices. Your intranet can help you build cohesion and inform employees. You can increase organizational efficiency by sharing resources and applications on your home sites and portals. Beautiful communication sites can tell your story. Stay in the loop with personalized, targeted news via the web and the SharePoint mobile app. With powerful search and intelligent ways of finding information, you're only a click away.
-
46
AlephTransfer
AlephTransfer
Reduce the risk of ransomware attacks, data breaches, and insider threats. Maximize compliance with regulatory requirements and cyber-security best practice standards. It can be difficult to share large files or large folders. AlephTransfer makes sharing files and folders easy and seamless. AlephTransfer is the fastest and most reliable method to transfer files that are time-critical. AlephTransfer reduces infrastructure maintenance costs, increases employee productivity, and boosts project efficiency. Cybercrime losses account for more than 50% today due to Business Email Compromise (BEC). Organizations in virtually every industry continue sharing highly sensitive information via email attachments and easily breached cloud-sharing services. AlephTransfer's managed file transfer (MFT) platform is designed to facilitate a smooth workflow and keep files safe. -
47
BeSafe
BeSafe
Protect control monitor all files on all platforms, all drives, and all boxes. With state-of-the-art encryption, you can protect any type of file (PDF, Office and videos, among others). BeSafe preserves native collaboration features such as Dropbox, Google Drive, or Slack. You can enable one-time viewing and set an expiration date for shared access to keep your documents in control. If you have sent the file to an ineligible recipient, you can instantly revoke access. 360deg visibility of data access: See who, what, where, and how your content was accessed. Instant "read" notifications, page-by-page analytics, and instant notifications help you identify what is most important. Proxy Re-Encryption cryptography is revolutionizing cloud collaboration. Besafe uses patent-pending technology to encrypt your data and allow secure sharing over any email service or cloud file sharing app. BeSafe can be integrated with Dropbox via the user’s BeSafe web portal. -
48
GigaTribe
Gigatribe
$2.50 per monthYou can keep all your files on your hard drive, so you don't need to move them to an external server. You can share files and search for them in just a few clicks. You can view files in the same way they were stored on your hard drive. Files that you share with others are not stored on their servers. You keep your data under your control. Once you have selected which folders you wish to share, your friends can instantly access the contents of those folders. It's not necessary to upload files for your contacts. Your contacts can browse your shared folders to find the files they need. Each contact can share and download. The more people you invite, the more content you will get. As your community grows, more files become available. -
49
Resilio Sync
Resilio
$6 per monthResilio Sync, powered by P2P technology, is a simple, reliable and fast file sync and sharing solution. Sync any folder to all of your devices. Sync photos, videos and music to all your devices, including laptops, NAS, and mobile phones. This is the fastest and most private way of sending files to family and friends. You can send one or more files to multiple recipients, without having to share the entire folder or create a permanent sync link. You can send large files, such as movies, photos, and videos, to your friends. Cloud-free. The Pro feature allows you to send files. Any user can also receive files. All folders can be automatically synced to all devices. You can add a folder from one to another and it will automatically be available on all of your linked devices. You can change access permissions anytime using 'Advanced Folders. You can assign ownership to another user, revoke access, and change read or write permissions on-the-fly. -
50
Tricent
Tricent
€18/year/ user Tricent is the #1 file-sharing governance SaaS platform that enables more secure and compliant file sharing within Microsoft 365 (Teams, OneDrives & Sharepoint drives) and Google Workspace (MyDrives & Shared Drives) so you can keep collaborating responsibly. Tricent puts the responsibility of proper file-sharing management in the hands of administrators as well as every member of the organization who shares files: 🚀 Onboard in less than 30 Minutes. ricent gets you up and running swiftly so you can focus on what matters most. 🔍 Get Insights: From day one, gain a comprehensive overview of all files shared and permissions granted—across both personal drives and shared drives. ⭕️ Do Bulk Remediation: Our admin-friendly cleanup tools allow you to tackle file sprawl efficiently. 😇 Empowering End-Users Responsibly: We use automation to involve your employees in the cleanup process. They can continue collaborating while maintaining compliance. 💪🏼 Customizable Governance Policies: Set different cycles for different user groups. Tricent adapts to your unique needs, ensuring flexibility without compromising control. 🔮 Stay Ahead with Abnormality Detection.