Best Vera Alternatives in 2024
Find the top alternatives to Vera currently available. Compare ratings, reviews, pricing, and features of Vera alternatives in 2024. Slashdot lists the best Vera alternatives on the market that offer competing products that are similar to Vera. Sort through Vera alternatives below to make the best choice for your needs
-
1
End-to-end encrypted file sharing & sync Tresorit is the secure cloud storage and sync place to store, sync, and share files from anywhere, anytime. Tresorit uses end-to-end encryption to protect your files from hackers and internal data breaches. All data is stored in accordance with the GDPR in Europe in Microsoft Azure Datacenters. You can manage who can edit, add, or view the data you share. Securely access the updated files from your browser, desktop or mobile device. Files can also be shared securely outside of your company. Securely share files instead of unsecured attachments to email. End-to-end encryption ensures that nothing leaves your device unencrypted. This means that only you and the recipient can access the files. To ensure collaboration with external parties, use the Content Shield features to protect your Business. Read more here: https://tresorit.com/tresorit-content-shield
-
2
Imatag
IMATAG
IMATAG protects your online visual content such as brand images, product images, licensed content, and sensitive files. Based on a patented technology of Invisible Watermark (or Forensic Watermark), it comes in two flavors: - IMATAG Leaks is the first online tool to identify photo or video leaks. - and IMATAG MONITOR - the most reliable visual search tool to track the usage of your content online. How it works The software places an invisible identifier at each pixel of images and videos. This invisible watermark allows you to identify your content online, regardless of whether it has been resized or cropped, trimmed, posted on social networks, or copied via screenshots. It can also be used as a tracker to trace the source of a leak. Supports images (photos and renders, design), videos and PDF. Available as SaaS via API or Web UI, or as on-premise software. -
3
Box
Box
$5 per month 72 RatingsSecure collaboration with anyone, anyplace, on any device. It is our top priority to protect your cloud files. We have developed advanced security controls, intelligent threats detection, and complete information governance. We also know that your needs are not limited to these security controls. Strict data privacy? Check. Check. Check. Check. You should check. Collaboration is key to your business. This includes customers, partners, vendors, and teammates. Everyone can work together on your most important content easily if they are in the same place. You should not be sharing files but frustration. You should be able to rest assured that your data is safe. It is a waste of time to work on cumbersome, manual processes every day. We let anyone automate repeatable workflows that are important to your business, such as HR onboarding and contract management. Your workflows will move faster. You have more time for what is most important. -
4
ShareFile
Progress Software
$50 per month 12 RatingsShareFile allows you to securely share content with clients and internal team members from any device. Small businesses and departments need simple and secure solutions to collaborate between themselves and with clients. ShareFile allows you to access files securely, share data and create workflows that save time. Simple, quick set-up - no IT required. Cloud storage allows you to send and share any size file from any device. You can be sure that your files will always be safe. Bank-level encryption will protect your files, emails, and attachments while in transit and when they are at rest. Collaborate safely: Audit trails and configurable access permissions allow you to control and know who has access to your data. Optimize client and employee onboarding: Reduce manual paperwork with time-saving workflows. Secure FTP alternative: No software installation required - either for you or your client. -
5
Locklizard Safeguard PDF Security
LockLizard
$500.00/month Locklizard protects PDF files from piracy, leakage, and misuse. Unauthorized access to documents is prevented and only authorized users are allowed to use them. Stop the theft of confidential and sensitive information, intellectual properties, training courses, reports, ebooks, and other trade secrets. Securely share and sell documents, prevent data leakage, and enforce compliance. You can lock documents to devices and locations, dynamically add watermarks, control expiry, stop printing and copying, and revoke access at anytime. You can track how your documents are used. Locklizard employs strong encryption, DRM, and licensing controls that are US Gov strength to ensure that your documents remain fully secure regardless of where they are located. -
6
Vaultize DRM
Vaultize Technologies
$5,000 one-time paymentYou can ensure security and governance throughout the file's lifecycle, both within and outside your network. Vaultize allows your team to securely store, access, and share files easily. You can also protect and manage them with digital rights management (DRM), file sharing security, and continuous data protection. Vaultize is designed to protect enterprise data from all types of threats, including accidental or intentional data loss and exposure. Vaultize is a secure and user-friendly solution that allows teams to share files on any device. IT and auditors have complete control and visibility over the files. DRM protection - View, edit, print and share files. Copy/paste is possible. Administrator and user-level sharing controls. You have full control over who, what, where, when and how you share your data. -
7
Fasoo Enterprise DRM
Fasoo
- File-centric Protection and Granular Permission Control : Fasoo EDRM supports file encryption and applies granular permission controls. This feature allows organizations to limit editing, printing, and sharing of sensitive content by unauthorized users, ensuring that sensitive documents are protected and controlled throughout their lifecycle, regardless of their location or the device being used. - Centralized Policy Management : The solution simplifies security management by allowing centralized deployment and management of security policies. This ensures that documents are protected immediately upon creation or download, without disrupting user workflows. It also supports dynamic access control, exception policies, and offline policies to minimize change management risks. - Enhanced Monitoring and Compliance : Fasoo EDRM includes features for continuous monitoring and auditing, such as usage tracking, audit trails, and file tracking. These capabilities support zero-trust security and regulatory compliance (such as GDPR, CCPA, HIPAA, and PDPA, etc.) by providing data visibility and insights into user interactions and data movements. -
8
SkyDRM
NextLabs
Protect your documents from unauthorized access and limit their use. You can be more efficient, faster, more automated, and more agile. Protect customer data from wrongful disclosure and ensure secure access to business applications. Trade secrets and intellectual property can be protected. Reduce the security gap between perimeter security and user collaboration. You can monitor and protect your business-critical documents such as intellectual property or product design from anywhere it travels. This includes apps, cloud services, on-premises, and devices. SkyDRM uses dynamic authorization technology and digital rights management to protect files and allow secure sharing. The document's protection remains with it, no matter where it is stored or with whom it is shared: within or outside your network, on file server or in the cloud. You can determine whether your file is accessible, viewed, edited or printed. -
9
Fasoo Smart Print
Fasoo
Fasoo Smart Print (FSP) is a print security solution. The solution applies dynamic watermarks containing user name, IP address, printed time, user ID, and company information to make documents traceable to their source. With context-aware print control, it prevents unauthorized printing and applies data masking to detected sensitive information. A comprehensive audit trail monitors all printing activities, capturing both text and images of what users printed, ensuring a secure chain of custody for privacy and a robust defense against data breaches. Key Features of Fasoo Smart Print (FSP) - Dynamic Print Watermark: FSP adds detailed information about the user, date, and location of printing to sensitive documents so you can trace printouts to the source and prevent misuse and loss of important information. - Context Aware Print Control: FSP blocks printing of documents containing sensitive information and applies data masking of sensitive data when you need to print. - Smart Pull-printing: FSP allows users to release a print job at a specific time, place, or on a specific device through a web browser or simple app on their phone. - Comprehensive Logging: FSP helps you monitor all printing activities in details. -
10
Vitrium Security
Vitrium Systems
$300.00/month An easy-to-use, robust content security and enterprise digital rights management system. Get started today with our cloud-hosted subscription or contact our team to find out how you can implement it in your business as part your overall content strategy and workflow process. Vitrium Enterprise Content Security Software protects all your video, image, and document content files for secure and controlled distribution. You can enjoy the highest level of encryption while still providing seamless access to your customers. Get amazing insight with detailed analytics reports. Clients, students, and employees don't need any plug-ins or apps to view the secured content. They can access it from any device at any time. -
11
Verimatrix
Verimatrix
Verimatrix is a security platform that empowers the modern connected world. We provide digital content protection, as well as applications and devices security that is intuitive, user-friendly, and frictionless. Verimatrix is trusted by leading brands to protect everything, from premium movies and live streaming sports to sensitive financial and medical data to mission-critical mobile apps. We provide the trusted connections that our customers need to deliver engaging content and experiences to millions around the globe. Verimatrix assists partners in getting to market faster, scaling easily, protecting valuable revenue streams, and winning new business. Scale quickly, get to market faster, win new business, and protect valuable revenue streams. We do that. We protect your digital content, applications, and devices with intuitive, human-centered, and frictionless security. Verimatrix is the leader in protecting video content via IPTV, OTT and DVB. -
12
Fasoo Smart Screen
Fasoo
Fasoo Smart Screen (FSS) is an advanced security solution designed to protect sensitive information displayed on computer screens. The solution displays visible dynamic watermarks, containing detailed user-specific information, discouraging users to take a photo with their smart devices. FSS also blocks unauthorized screen capture attempts from specific website URLs and applications, to secure confidential data from malicious users. In addition, FSS tracks all screen capture attempts, including an image of what was captured, providing detailed insights and audit trails for organizations. - Dynamic Watermarking: FSS displays screen watermarks on a specific applications or URLs to discourage users to take a photo of sensitive information on screen. - Screen Capture Blocking; FSS blocks all screen capture activities such as the Print Screen key, snipping tools, remote control, or any other screen capture applications. - Audit Trail: FSS keeps a record of all screen capture attempts, including images of the content captured and whether those attempts were successful or failed. -
13
DRM-X
Haihaisoft
DRM-X 4.0 content security platform with new security architecture. Securely distribute protected audio/video, PDF, web pages, images, and Javascript to Windows and Mac, iPhone/iPad, Android, and Android. DRM-X 4.0 protection can eliminate the problem of piracy preventing you from selling or delivering these contents. DRM-X is Haihaisoft's digital rights management system platform. Haihaisoft offers DRM as a service. The copy protection platform includes File Encryption and Audio/Video Encryption as well as PDF Encryption and Web Page (HTML DRM Encryption). All of these features are available with DRMX 4.0 advanced DRM features. You can also manage rights, users, and license profiles online through your DRMX account. DRM-X 4.0, a new DRM software platform, is based on Xvast browser. It features a new security architecture, online and offline playback, and improved user experience. DRM-X allows dynamic watermarking of digital content. -
14
MediaRights Revolution
Rightscreen
MediaRights Revolution (MR2) is designed for broadcasting, production, and distribution firms in the film, music, publishing, and merchandising industries. Managing diverse intellectual properties - music, audiovisual content, texts, images, and brands - provides detailed metadata, including rightsholder shares, and securely stores digital content copies with shared access functionality. MR2 enhances licensing processes with real-time control, simplifying deal creation through contract templates. Manage financial reports, including licensee royalties, using intricate fund distribution calculations based on contracts and rights holders' shares. Ensure effective sales management through reports for counterparts and internal analytics. Automation in royalty and licensing payments accelerates workflows, reducing manual efforts and ensuring financial precision, enhancing efficiency, and lowering operational costs. Internal task management automates and guides deal preparation processes. MediaRights Revolution boosts your business with integration. Use API (500+ methods) with your corporate software—from bookkeeping to advanced broadcasting tools. Create an unified environment, providing an optimized operational experience. -
15
Wrapsody eCo
Fasoo
Wrapsody eCo provides a secure platform for collaboration. The solution is designed for external collaboration to increase productivity and security. It allows for seamless content sharing and synchronization, with features such as real-time updates and advanced encryption. Wrapsody eCo offers a variety of collaboration tools from enterprise messaging to video conferencing, as well as comprehensive monitoring and auditing functions to track document usage. Its robust security framework, which includes advanced file encryption and controls for access, ensures that sensitive information is protected at all times, whether it's in transit, on the desktop, or in use. Wrapsody eCo allows organizations to share documents both internally and externally, while maintaining security. This is true whether the files are viewed online, downloaded or edited locally. The protection is applied on data and follows them throughout their lifecycle. -
16
NextLabs
NextLabs
NextLabs CloudAz enforces security policies across the enterprise, and beyond. It is powered by a dynamic authorization policy engine that is patented and forms the backbone of NextLabs Data Centric Security Suite, which includes Entitlement Management and Data Access Security products, as well as Digital Rights Management. CloudAz combines automated data classification, attribute based access control (ABAC), masking & separation, digital rights management (DRM) protection and audit capabilities into a powerful platform. This allows you to better align your policies with rapidly changing business needs while keeping up with cybersecurity challenges. The platform can either be delivered on-premises, or in the cloud. -
17
ArtistScope Site Protection System (ASPS)
ArtistScope
$495.00ArtistScope Site Protection Software provides the most robust, secure, and copy-protection for all media on web pages. This includes screen capture, downloading, scraping, and more. ASPS is the most secure data security solution ever imagined. The ASPS server is installed on your web server (Apache/Windows) to deliver encrypted pages from your website that only ArtisBrowser will be able to interpret and display. This creates a secure tunnel from the website and the web browser of the user, in which no data, media, or other information can be copied, extracted, or copied by any means. ASPS is unique and secure because it doesn't depend on popular browsers, which are useless to copy protect. You can use any video format or embedded player you want and copy protect all media displayed on your website. -
18
Smart Eye Technology
Smart Eye Technology
Smart Eye Technology protects businesses who share sensitive files, such as financials and legal contracts, wiring instructions, employee information, and new ideas. Smart Eye Technology offers unprecedented data and information security, whether sharing internal files with employees, working remotely or on-site, or with customers or vendors. Fraudsters pretending to be vendors are asking for wiring changes via email, which can cost businesses upwards 500 billion dollars per year. Our enterprise-level private communication platform allows only approved companies to send or receive files from you organization. This prevents fraudulent wire transfers by unapproved companies or individuals, which can save your company thousands of dollars. Intellectual property is your most valuable asset, regardless of how big or small your company is. -
19
DRMtoday
castLabs
Digital rights management (DRM), let's face it can be quite complicated. Protecting your valuable video assets across OTT platforms can be complicated with so many technologies available. Our DRMtoday licensing solution allows OTT businesses to quickly launch monetized services, without worrying about meeting the content owner security requirements. You can quickly adopt all the major DRM systems so you can concentrate on your market. Since 2007, we have worked with DRM protection and have a deep understanding about studio compliance. Our DRM systems comply with strict content owner security requirements, allowing you to deliver premium video online. HD, UHD, HDR, and HDR require hardware protection. DRMtoday can enforce studio standards by only allowing stream quality that meets a device's security levels. Our expert assistance will help you complete security checks to speed up the turnaround time for studio media. -
20
Rightsline
Rightsline
This secure cloud technology is portable and can be used wherever you go. It provides real-time visual avails, pipeline administration, contract visibility, and contract visibility in an enterprise system. Rightsline is powerful enough to serve the giants of entertainment, but affordable enough to be accessible to small and medium-sized players. Rightsline is the only cloud-based, comprehensive solution that allows you to work as you like and scales your business to its full potential. Any type of metadata can be tracked, including those of your underlying digital and physical assets. Multi-dimensional rights sets allow you to track inbound and outbound licenses. You can calculate many types of royalties, even complex combinations. Either issue accounting documents directly or sync with ERP. Calculate many types of royalties, even complex combinations. Either issue accounting documents directly or sync with ERP. -
21
EZDRM
EZDRM
$99.99 per monthEZDRM offers a straightforward, one-stop solution for protecting and monetizing your video content. EZDRM is a pioneer, leader and innovator of a managed hosted Digital Rights Management as a Service (DRMaaS) solution of Google Widevine, Microsoft PlayReady and Apple FairPlay. . T The EZDRM solution is ideal for offering global support for security of live, on-demand, downloadable, and offline video services—eliminating proprietary integration and format concerns. EZDRM is Digital Rights Management—simplified. -
22
Allure Security
Allure Security
Allure Security protects brands by finding and stopping online brand impersonation attacks before customers fall victim. Our patented, artificial intelligence-powered engine finds more spoofed websites, social media accounts, and mobile apps more quickly and with greater accuracy than legacy approaches. Our unique, multi-pronged approach to managed response – blocklisting, decoy data, and end-to-end takedown – significantly reduces the lifespan of a scam and the damage it can do. -
23
AMS File Transfer
Automated Messaging Systems
1 RatingSecure 2-way communication made easy with AMS File Transfer AMS File Transfer allows your users to securely transfer files with an encrypted solution. This gives them the ability to send audit trails to external recipients or colleagues, and maintains control over who has access to the information. The solution provides security and peace of mind by providing 3 authentication options as well as unique sender controls. Secure files with 256bit AES encryption, full virus scan, and 3 authentication options for recipients (including 2-factor) that allow you to initiate DRM. There are no file size restrictions when you send or receive files via the secure branded portal or Outlook. Your portal can be branded however you wish, increasing brand recognition and providing additional security for external parties. You can eliminate the worry about sensitive information being sent by email. -
24
Sealit
Sealit Technologies
You shouldn't be concerned about whether your accounts and devices will be compromised when you implement a Zero Trust security system. Sealit will ensure that your sensitive data, including files and emails, remains fully protected in any scenario. To encrypt sensitive emails, you only need to click one time from your existing inbox. You only need one click to encrypt any file on your desktop. As we add strong protection to sensitive data, we ensure that your workflow doesn't get disrupted. Cyberattacks on businesses are almost always caused by human error. You need to put in place a system to reduce the risk. Our patent-pending end to end encryption ensures that every aspect of your business is protected. Our app uses biometrics to provide seamless protection. Biometrics are not like passwords. They can't be taken from you and you always have them with you. -
25
SS&C Intralinks VIA Elite
SS&C Intralinks
SS&C Intralinks VIA Elite is our secure file-sharing platform that allows you to maintain full control of sensitive documents. Collaboration with internal and external stakeholders is seamless. Reduce the time spent on manual uploads or synchronizations while ensuring data accuracy. Maintain control over sensitive contents with granular permission management for users, customizable workflows and information rights management. Other advanced features include watermarking, downloading prevention, and download prevention. Access Intralinks on your mobile device from anywhere and at any time. Our secure app allows you to manage files, user access and alerts. Advanced reporting modules provide a deeper insight into user engagement and activity, document usage and project progress. Intralinks offers secure collaboration software as well as secure online document-sharing tools that enable enterprise collaboration beyond organizational, corporate and geographical boundaries. -
26
AlephTransfer
AlephTransfer
Reduce the risk of ransomware attacks, data breaches, and insider threats. Maximize compliance with regulatory requirements and cyber-security best practice standards. It can be difficult to share large files or large folders. AlephTransfer makes sharing files and folders easy and seamless. AlephTransfer is the fastest and most reliable method to transfer files that are time-critical. AlephTransfer reduces infrastructure maintenance costs, increases employee productivity, and boosts project efficiency. Cybercrime losses account for more than 50% today due to Business Email Compromise (BEC). Organizations in virtually every industry continue sharing highly sensitive information via email attachments and easily breached cloud-sharing services. AlephTransfer's managed file transfer (MFT) platform is designed to facilitate a smooth workflow and keep files safe. -
27
BlueFiles
Forecomm
What can you do today if you need to quickly send confidential files or emails to customers, partners, employees, or other people outside your company's secure network? CNIL strongly recommends that businesses and organizations "use data encryption during transfers" and "train people in the risks." Data encryption is an integral part of modern data protection strategies. BlueFiles is a specialized encryption that allows companies to encode data so that it is indecipherable to anyone except the intended recipient. BlueFiles offers a guarantee on all digital data transfers: 100% confidentiality, integrity of the BlueFiles file and remote control of files sent. You can also track your files. We need to communicate securely over the internet without exposing our sensitive data. This will save us time, money, and effort. Companies must encrypt personal data flows in accordance with the GDPR law or risk high fines. -
28
Air
Air.inc
$250 per monthYour team's content can be centralized in a workspace that is organized, versioned and easy to share. Sure, Air stores your content. Air has smart search, guest permissions and custom layouts. It also tracks version tracking and makes sharing hassle-free. This makes the creative process much more enjoyable. Stop hiding assets in zip files and folders. Create lightweight presentations and social media posts. Organize your content in a way that reflects your brand. Your workspace can be used as a search engine. Smart tags and image recognition are built-in features that allow anyone on your team, including the manager, to locate assets and jump in. The feedback is the most difficult part of the feedback process. Allow guests to upload directly to your workspace by creating public boards. You can leave comments, have discussions, or make selections with context. Track changes and clearly identify the most recent asset version. -
29
Intellock LMS
Intellock
Intellock is a Digital Rights Management Solution that targets a variety of content owners, specifically to address the issues they face in sales management and distribution management. It's easy to duplicate and redistribute any content, digital or analog. Digital media files can be copied unlimited times without affecting the quality of any subsequent copies. Analog media loses its quality with each copy generation and sometimes even during normal usage. The abundance of digital devices, such as laptops, smartphones, and tabs, combined with the Internet, popular file sharing tools, has made it easy and profitable to share digital files without authorization (a/k/a "digital piracy"). Different techniques have been developed over the years to manage digital content access control. -
30
OneGlimpse
OneGlimpse
$20 per monthDon't let unpaid work and unauthorized use stop you from achieving your creative goals. Get OneGlimpse now and take control over your creative career. OneGlimpse acts as a magic tool. It allows you to show people your art and designs, and ensures that no one else takes them without your permission. Upload your designs, choose your sharing options, then share them with clients or other stakeholders. This will allow you to show off your work and protect it against unauthorized sharing. OneGlimpse makes your creative career easy. You will need to create an account in order to get started with OneGlimpse. It's quick and easy and you will be up and running in no matter how long it takes. Start uploading your designs. You can decide whether or not you want users to download your files. You can also set time limits and access restrictions if necessary. OneGlimpse's advanced security features ensure that your work will be protected and that you get paid for your talents. -
31
Acviss
Acviss Technologies
Acviss, a global leader in brand protection and counterfeiting, protects over 400 million products under 80+ brands. Acviss protects your supply chain from fake and fraudulent products online and offline! The end-toend system uses a unique approach for label production to ensure that products are non-replicable, and tamperproof. Our mobile-based tracking system allows customers to verify the authenticity and track the products throughout the supply chain. Our AI and Machine Learning algorithms scan the digital environment to detect and eliminate false listings, ads and offer that violate brand IPR. Our loyalty program allows brands to reward and engage their customers for remaining loyal. By providing real-time insight into customer interactions, brands can build a healthy relationship. Our Products • Certify Security codes that are unique and non-clonable can help you to help your customers -
32
Intertrust ExpresssPlay
Intertrust
Anti-piracy and content protection services for premium and high-value OTT streaming. Multi-DRM cloud-based content protection and media monetization for video streamers. Cloud-based broadcast TV security solution that allows direct-to-TV broadcasting to smart televisions without STBs/CAMs. This reduces CAPEX/OPEX. Comprehensive anti-piracy services that include digital fingerprinting, forensic and web watermarking, monitoring, and piracy elimination. Unprecedented online piracy has resulted from streaming becoming a key component of pay-TV business models. This worrying trend must be reversed. It requires a new, innovative approach beyond legacy security platforms that are optimized for streaming and traditional broadcasting. Intertrust offers the ExpressPlay Media Security Suite which includes cloud-based multiDRM, anti-piracy, forensic watermarking, and many other services to ensure content protection in this new era. -
33
ShareVault
ShareVault
2 RatingsA virtual data room, or VDR, is an essential tool to facilitate due diligence and other business transactions in which it is important to share documents in a controlled way. You can easily keep control of sensitive documents even if they are not under your IT department's control. ShareVault gives you visibility and control over everything, from remote shredding to user analysis. This allows you to focus on the deal, and not the data room. ShareVault Enterprise and ShareVault Pro have powerful Information Rights Management (IRM), which allows you to keep control over documents that are shared with third parties. Protected documents are AES256 bit encrypted and can only open by current rights holders. Documents can also be remotely "shredded". This means that a user can revoke their permission to open a document retroactively, even if they have already downloaded it. -
34
TikBox
TikBox
$5.84 per monthTransforms how digital content can be shared, monetized, and secured. All creators can use it. Our auto-invoicing, template agreements and custom-built tools allow you to easily establish copyrights, add authenticity and monetize assets. Legal teams can create customized agreements or integrate existing agreements into the contract builder. This allows colleagues from different functions to have access to appropriate contracts. Our multi-layered encryption ensures that your metadata & labels pertaining to copyright and provenance are secure. This protects your data from manipulation and secures your licensing revenue streams. TikBox has created an online ecosystem that allows digital content creators assert their copyrights, embed provenance information, and unlock new revenue sources from their online assets. Our platform integrates provenance and copyright metadata into digital creations to protect them on the internet. -
35
BooleBox
Boole Server
BooleBox, a content security platform, protects clients' data integrity and confidentiality from unauthorized access. It also ensures the highest level encryption to protect sensitive information from hackers. Users can now create, edit, share, and classify files and folders without compromising their usability thanks to an advanced encryption system. We protect your data wherever it is: at work, in transit via email, in shared projects, in the cloud, in the cloud, in transit via E-mail, in shared projects and on the most popular platforms such as Windows, Outlook and Gmail, OneDrive, SharePoint, and OneDrive. Because we understand the potential digital vulnerabilities of your data, we can protect them like no other. It doesn't abandon it, and it follows it everywhere! We protect large amounts data in many business sectors. Since 2011, we have been doing this every single day. -
36
Wizuda
Wizuda
$9.99/month/ user Innovative Solutions that will revolutionize the way your organization shares data externally and internally. Wizuda MFT is designed with efficiency, security, compliance, and efficiency at its core. It enables IT to manage critical data movement within your organization as well as with external parties from one central solution. Wizuda MFT scales to your business and gives you full accountability for all file transfer operations. Share sensitive data with clients and employees of your company in a compliant, secure and compliant manner. File size limits are removed and encryption is enabled by default. This makes it possible to eliminate insecure alternatives like USBs. Wizuda users have the additional flexibility to send emails directly from their Outlook email or via the secure web portal. Wizuda Virtual Data Rooms offer a secure online repository that allows document storage, collaboration, and distribution for your business. Wizuda Virtual Data Rooms are easy to set up and maintain. -
37
My MX Data
My MX Data
$8.83 per month 1 RatingMX Data Exchange provides businesses with a secure, fast, and easy way to transfer sensitive or technical information internally and throughout the supply chain. MX offers a fast upload speed, an intuitive interface and records all transactions. The history can be searched and exported for accountability. My MX Data gives you superior data protection capabilities. It shreds your data, converts it into an unrecognizable format and sends it around the world, adding a layer of security. Once downloaded, data returns to its original, understandable state. Our patented technology ensures that all transferred data remains completely confidential, preventing any unauthorized extraction. Our adaptable system also adheres to the data sovereignty rules and lets users choose where their data fragments will be located. Our premium services are tailored for business-tobusiness file sharing. -
38
XM SendSecure
OpenText
XM SendSecure™, a secure file exchange platform, is easy to use and highly secure. It allows safe file exchange and temporary storage of sensitive files in virtual SafeBoxes. All files exchanged are virus-scanned and encrypted at rest and in transit. 2-Factor authentication (2FA) ensures that the correct recipient receives them. The data is automatically deleted after a specified time. XM SendSecure automatically creates an audit trail for all file interactions and communications to aid regulatory compliance. The SafeBox file container is central to the XM SendSecure system. It is created upon upload and kept separate from any other storage in a locked virtual area. Each SafeBox can be used to transfer unlimited files in any format, up to 5TB each. Every file is automatically scanned with antivirus software when it enters the SafeBox. Once an exchange has been initiated, additional files can either be sent or received by the sender. -
39
Objective Connect
Objective Corporation
FreeWhen you share your information with anyone outside of your organization, you will have the ultimate protection. Designed for government and regulated sectors, Objective Connect is a secure file-sharing external application that gives you complete control over information shared outside your organization. Extend the internal information governance to external stakeholders. Maintain control over documents shared. Collaborate with others across devices, teams, or the globe. Maintain a single version of the truth. All the information you need to know about who did what when is in one place. Share containers of documents from your existing file plan to choose which documents can be sent outside. Before sharing any document, all access controls and security levels are checked. The two-way synchronization of your existing file plan keeps everyone up to date. All files you receive are automatically filed and flagged in the correct location to ensure that your metadata is always accurate. -
40
Accellion
Accellion
$15.00/month/ user The Accellion secure communication platform prevents data breaches from third-party cyber risk. CIOs and CISOs rely upon the Accellion platform to ensure complete visibility, compliance, and control over communication of IP, PII and PHI across all third-party communication channels. This includes email, file sharing and mobile, enterprise apps, web portals and SFTP as well as automated inter-business workflows. Users click the Accellion button to know that it is the safest and most secure way to share sensitive information outside of the company. The Accellion platform offers a variety of deployment options including FedRAMP, FedRAMP, hybrid, and on-premise. It provides the security and governance CISOs require to protect their organizations, reduce risk, and comply with strict compliance regulations like NIST 800-171, HIPAA and SOX, GDPR and GLBA. More than 25 million users have been protected by Accellion solutions at over 3,000 companies. -
41
DropSecure
DropSecure
$10 per monthDropSecure ensures that your keys to unlocking your data are never shared to anyone you don't want to share them with, even us. This means that you can enjoy complete privacy with our military-grade encryption technology and file transfer technology. Find the best way to share documents. DropSecure's mission is to empower you with technology that protects digital assets in a simple and hassle-free way. DropSecure protects you privacy and protects your data using military grade algorithms before they leave your device. We offer the best technology to protect your data from data centers. You are always aware of who has access your sensitive documents, regardless of whether you are a business, individual, or an enterprise. Most importantly, you are the only one who has access to your documents. Not even us. -
42
DRACOON
DRACOON
Project managers can create data areas and assign authorizations independently, which allows IT departments to work more efficiently and effectively. DRACOON data rooms prevent file duplicates because all employees have access to the most recent documents at all times. They can also work on files with both internal and external employees. For project coordination, user rights and file request deadlines can be used. GDPR-compliant email attachments and complete emails sent via DRACOON Outlook. Rely on end to end encryption that also includes client-side encryption. It offers the highest level of protection for your data. This encryption is so secure that no one, not even DRACOON or admin, can decrypt your data. The key remains with the owner and can be used at any time. This is how many other providers handle it differently. -
43
Switch Secure Workspace
Egress Software Technologies
Secure Workspace allows users to securely upload, control, share, and collaborate with colleagues and other partners. Secure Workspace offers enterprise-grade access permissions with the click of one button. Our mobile app and productivity toolkit allow teams to collaborate seamlessly from any location. You can demonstrate compliance and avoid losing your reputation and paying regulatory fines. Secure Workspace allows you to securely and easily share your most sensitive data with your supply chain and internal staff. Zones are secure containers that allow you to organize your content in folders and protect sensitive information from unauthorized access. Your team can keep their confidential documents safe and secure while sharing them with external partners and internal staff. -
44
RMail
RPost
$7/month/ user RMail®, the e-security platform from RPost®, is a global leader in 2000. RMail is a specialist in elegantly simple email encryption for privacy, compliance, legal e–delivery proof secure file sharing, email rights management, email impostor protection and email encryption. RMail's transmission security services are often used by businesspeople and business systems that need to send sensitive or consumer-regulated information. These RMail services can be used for messages that require additional functionality beyond standard email. They include (a) an easier-to-use and more automated email encryption to ensure privacy compliance; (b) a verifiable proof record of who sent what email to whom; (c) assurance and peaceof mind in relation to delivery and open status email of important and time-deadline emails, (d) need to have a timestamped proof that content was delivered; (f) the need to securely share large files. -
45
FileAgo
FileAgo Software Services
$4 per user per monthFileAgo is the only software that combines Waterfall and Granular Permission models. This allows users to control access and restrict data like never before. FileAgo offers both control and ease-of-use for users and organizations. FileAgo allows you to securely manage the data of your teams in a centralised cloud storage. You can also restrict access and allow file sharing. Collaborate with your coworkers to edit office documents in real-time via our built-in Collabora Online editor and Microsoft Office for the Web. FileAgo's flexible and flexible permission model for folders and files is built to protect sensitive files. This is our top priority. The data is protected with AES256 encryption and stored at datacenters that have passed security certifications and industry compliances. -
46
Serv-U FTP
SolarWinds
$528 one-time paymentSolarWinds' Serv-U FTP software is designed to provide fast, reliable, and easy file transfer for your company. Secure FTPS (FTP Over SSL/TLS) allows you to exchange sensitive files with trading partners over IPv4 or IPv6 networks. Users can view, upload and download files via intuitive web and mobile interfaces. Serv-U FTP Server, a file transfer software for small businesses, is designed to meet all your internal and externe file transfer requirements. -
47
Uncontrolled file sharing could put your business at risk Uncontrolled file sharing could put your business at risk Are you looking for a reliable and secure way to send and receive files? Our file sharing solution is fully customizable and includes 24/7 support, enterprise-grade security, and compliance with standards to protect sensitive and private data. Find out why Maytech is preferred by over 60 industries in more than 35 countries.
-
48
BeSafe
BeSafe
Protect control monitor all files on all platforms, all drives, and all boxes. With state-of-the-art encryption, you can protect any type of file (PDF, Office and videos, among others). BeSafe preserves native collaboration features such as Dropbox, Google Drive, or Slack. You can enable one-time viewing and set an expiration date for shared access to keep your documents in control. If you have sent the file to an ineligible recipient, you can instantly revoke access. 360deg visibility of data access: See who, what, where, and how your content was accessed. Instant "read" notifications, page-by-page analytics, and instant notifications help you identify what is most important. Proxy Re-Encryption cryptography is revolutionizing cloud collaboration. Besafe uses patent-pending technology to encrypt your data and allow secure sharing over any email service or cloud file sharing app. BeSafe can be integrated with Dropbox via the user’s BeSafe web portal. -
49
DekkoSecure
DekkoSecure
DekkoSecure is a fast-growing SaaS company providing leading-edge, military-grade security that allows Government and Enterprises of all sizes to easily share and collaborate on highly sensitive and confidential information with internal and external parties. DekkoGov™- Ultra-secure file sharing, collaboration & eSignatures for Government workflows. DekkoGov™ is trusted by Government departments and external stakeholders globally. Governments choose Dekko for its military-grade security and guaranteed protection of their highly sensitive and confidential data. DekkoPro™ - Share sensitive data easily using military-grade security with no file-size limits. DekkoPro™ allows businesses of all sizes to keep their data ultra-secure, simplify workflows, ensure compliance and increase productivity. Ensure peace of mind with ultra-secure file sharing, collaboration, eSignatures and more. Dekko security starts where the popular and generic solutions stop. -
50
eSecureSend
Dmorph
$17 per montheSecureSend™, an online file transfer service, offers virus-free processing, full encryption, and the fastest transfer speeds. This breakthrough technology allows businesses to deal with sensitive data on their own or for clients. It also helps to limit their liability in the event of data loss or hacking. eSecureSend™, a secure file transfer service, allows you to securely send files to people whom you have preauthorized online. eSecureSend™, with its outstanding user interface and full audit trail, is the best choice for file transfer security. eSecureSend™ ensures that you comply with HIPAA, FINRA, and Gramm-Leach–Bliley act guidelines to give you peace of mind. eSecureSend™, a data exchange service that is user-friendly, allows you to transfer documents, photos, and files between your clients and employees. It also provides full accountability and security availability so you can be sure your data is secure.