Tricent Description

Modern workplaces allow employees to share files and collaborate across companies more than ever before. This is great for productivity but can also pose a risk to your compliance, regulatory requirements, and overall cybersecurity stance. Tricent allows you to share files with your users and allow them to collaborate with each other. You can also feel secure that any files shared will be deleted if they are no more relevant. Collaboration and sharing are essential to ensure efficiency and maximize your time and resources. Data leaks can occur if files and teams are not shared after collaboration is complete. This could lead to the accidental release of critical information. There are risks of information being misused in phishing attacks or even regulatory fines. Let's ensure that your organization only shares the information it needs and does not share it for too long.

Pricing

Pricing Starts At:
€18/year/user
Pricing Information:
€18/year/user
Free Trial:
Yes

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Tricent
Year Founded:
2018
Headquarters:
Denmark
Website:
www.tricent.com
Update This Listing

Media

Recommended Products
Open source. Easy to use. Proven. Complete. Icon
Open source. Easy to use. Proven. Complete.

End to end big data that enables you to spend less time formatting data and more time analyzing it.

Discover HPCC Systems - the truly open source big data solution that allows you to quickly process, analyze and understand large data sets, even data stored in massive, mixed-schema data lakes. Designed by data scientists, HPCC systems is a complete integrated solution from data ingestion and data processing to data delivery. The free online introductory courses and a robust developer community allow you to get started quickly.

Product Details

Platforms
SaaS
Type of Training
Documentation
Live Online
Webinars
Videos
Customer Support
Phone Support
Online

Tricent Features and Options

Cloud Security Software

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Compliance Software

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

File Sharing Software

Audit Trail
Chat / Messaging
Collaboration
Document Management
Drag & Drop
Electronic Signature
Encryption
File Synchronization
Search
User Management
Version Control
Workflow Management

Data Governance Software

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

GDPR Compliance Software

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Document Control Software

Archiving & Retention
Automated Routing
Change Management
Compliance Management
Electronic Signature
Escalation Management
Periodic Review
Version Control

GRC Software

Auditing
Disaster Recovery
Environmental Compliance
IT Risk Management
Incident Management
Internal Controls Management
Operational Risk Management
Policy Management

Cybersecurity Software

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting