Best Wizuda Alternatives in 2024
Find the top alternatives to Wizuda currently available. Compare ratings, reviews, pricing, and features of Wizuda alternatives in 2024. Slashdot lists the best Wizuda alternatives on the market that offer competing products that are similar to Wizuda. Sort through Wizuda alternatives below to make the best choice for your needs
-
1
IBM Aspera® provides high-speed data transfer solution that moves large datasets quickly and securely, regardless of network conditions. It maximizes transfer speeds (up to 100x faster) using proprietary FASP® technology and scales effortlessly with no limits on data size or volume. IBM Aspera offers flexible deployment options, including self-managed software, SaaS, or hybrid models, to support modern infrastructure needs. It enables global transfer, distribution, and synchronization of massive files and datasets, accelerating collaboration for teams working with big data and large files. With automation, monitoring, and control features, it streamlines data transfers and workflows while building highly scalable solutions that can run on-premises, in the cloud, or both. Additionally, IBM Aspera enhances digital asset security by integrating blockchain technology.
-
2
Ansarada
Ansarada
276 RatingsAnsarada brings order to organizational chaos to increase business value. Ansarada is a total deal lifecycle management platform that provides world-leading AI-powered Virtual Data Rooms and dealmaking tools. These tools include advanced AI insights and automation, next level Q&A and collaboration, plus purpose-built, digitized and customizable workflows and checklists for M&A, capital raising, business audits, tenders and other high stakes outcomes. Unlike some competitor Virtual Data Rooms, Ansarada offers free trials, 24/7 localized expert support, integrated Q&A via email, AI-assisted deal prediction, plus easy drag and drop upload and superior document security controls. Manage and maximize your Deals with Ansarada Always & Secure File Share. Ansarada is designed to drive stronger business outcomes based on best practices from over 35,000 transactions. -
3
Files.com
Files.com
231 Ratings6,000+ companies trust Files.com to automate and secure business critical transfers. We obsess about security, compliance, reliability, and performance so your critical business processes just work every time. Easily manage any transfer flow without writing scripts or code, and onboard workloads and partners effortlessly. We support standard file transfer protocols (FTP, SFTP, AS2) for working with external partners and also provide native apps for high performance internal transfers. As a fully Cloud-Native SaaS, there are no servers for you to buy or maintain, there is no installation required, and high availability and redundancy are built in and free. Our InfoSec Program is audited annually by Kirkpatrick Price, a leading information security CPA firm. Our audit covers the scope of the entire Files.com business (not just datacenter operations) and names Files.com specifically. Beware of smaller competitors who try to pass off someone else’s audit as their own. Technical capabilities include encryption at-rest and in-transit, four types of two-factor authentication, nine enterprise identity (SSO) integrations, configurable password and session policies, and a perfect “A+” score from Qualys SSL Labs. -
4
GoAnywhere MFT
Fortra
441 RatingsGoAnywhere MFT offers secure file transfer for businesses. GoAnywhere MFT software can be deployed on-premise, in cloud or hybrid environments. It allows organizations to securely exchange data between employees, customers, trading partners, and systems. GoAnywhere MFT won the Cybersecurity Excellence Award in Secure File Transfer. -
5
Globalscape's Enhanced File Transfer platform (EFT) is a user-friendly managed file transfer software (MFT). Globalscape EFT is trusted by thousands of Windows-Centric Organizations for mission-critical file transfers. EFT offers security and compliance, as well as powerful tools for collaboration, automation, and analysis. It is available in cloud/SaaS EFT Arcus and on-premises EFT deployments. EFT, unlike traditional file transfer software, provides enterprise-level data security and data transfer automation through integration to back-end systems. EFT administration is simple, yet provides complete control over your file transfer system. EFT replaces insecure legacy systems and expensive leased lines with a high-performing, scalable alternative.
-
6
MASV
63 RatingsMASV Inc. is a secure cloud software company designed to quickly transfer heavy media files worldwide to meet fast-paced production schedules. Global media organizations rely on MASV Inc. to automatically deliver their large files without any restrictions, allowing them to concentrate on their next big deliverable. MASV Inc. has gained the trust of media enterprises worldwide for its reliable and secure file transfer capabilities. It is specifically designed to handle the unique requirements of media organizations, ensuring the safe and efficient delivery of large files. -
7
Titaniam
Titaniam
Titaniam provides enterprises and SaaS vendors with a full suite of data security controls in one solution. This includes highly advanced options such as encrypted search and analytics, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. When attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of at 3+ solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner across multiple categories in four markets (Data Security, Data Privacy, Enterprise Key Management, and as a Cool Vendor for 2022). Titaniam is also a TAG Cyber Distinguished Vendor, and an Intellyx Digital Innovator for 2022. In 2022 Titaniam won the coveted SINET16 Security Innovator Award and was also a winner in four categories for the Global Infosec Awards at RSAC2022. -
8
Onehub is a secure file storage and sharing platform that can be used by businesses of all sizes. You can secure your data with bank-level encryption and our granular, role-based permissions structure. This allows you to control who has access to your content as well as share sensitive business files with confidence. Onehub provides a range of powerful business tools, including virtual data rooms, client portals and Google Docs integration. It also offers automatic watermarking, branded workspaces and custom agreements to increase and expand file sharing. You can customize your Onehub Workspace to give content sharing a professional, polished look. You can also create your own Client Portal. Onehub's virtual data room allows your business to send confidential information to clients and keep collaborators anonymous.
-
9
Immuta
Immuta
Immuta's Data Access Platform is built to give data teams secure yet streamlined access to data. Every organization is grappling with complex data policies as rules and regulations around that data are ever-changing and increasing in number. Immuta empowers data teams by automating the discovery and classification of new and existing data to speed time to value; orchestrating the enforcement of data policies through Policy-as-code (PaC), data masking, and Privacy Enhancing Technologies (PETs) so that any technical or business owner can manage and keep it secure; and monitoring/auditing user and policy activity/history and how data is accessed through automation to ensure provable compliance. Immuta integrates with all of the leading cloud data platforms, including Snowflake, Databricks, Starburst, Trino, Amazon Redshift, Google BigQuery, and Azure Synapse. Our platform is able to transparently secure data access without impacting performance. With Immuta, data teams are able to speed up data access by 100x, decrease the number of policies required by 75x, and achieve provable compliance goals. -
10
Kahootz
INOVEM Ltd (trading as Kahootz)
£5.50/month/ user Our cloud collaboration software is accessible anywhere and anytime. It makes it easy for internal and external stakeholders to collaborate in a secure online environment. Kahootz offers online workspaces that can be customized for your business needs. Your teams can quickly create new workspaces and collaborate across organizations with minimal IT training or consulting. Collaboration doesn't have to be done with multiple tools. Kahootz features include document management, surveys, and online databases. This allows you to keep all your data and insights in one location. Kahootz has independent audited its security credentials to ensure that your information is secure. This includes government departments like the UK Ministry of Defence. -
11
AvePoint
AvePoint
AvePoint is the only provider of complete data management solutions for digital collaboration platforms. Our AOS platform boasts the largest software-as-a-service userbase in the Microsoft 365 ecosystem. AvePoint is trusted by more than 7 million people worldwide to manage and protect their cloud investments. Our SaaS platform offers enterprise-grade support and hyperscale security. We are available in 12 Azure data centers. Our products are available in 4 languages. We offer 24/7 support and have market-leading security credentials like FedRAMP and ISO 27001 in-process. Organizations that leverage Microsoft's comprehensive and integrated product portfolio can get additional value without having to manage multiple vendors. These SaaS products are part of the AOS platform: o Cloud Backup o Cloud Management o Cloud Governance o Cloud Insights o Cloud Records Policies and Insights o MyHub -
12
FileCloud
CodeLathe
$50.00/year/ user #1 Enterprise File Sharing, Sync, Backup & Remote Access. You have complete control over your data and can manage it. You can either self-host it on-premises, or on the cloud. Your own Dropbox-like file sharing, sync and storage solution. FileCloud is hosted by us on a top-notch infrastructure in the region you choose. No installation. We handle all technical details. FileCloud can be run on your infrastructure. You have full control over your data. You can self-host FileCloud on AWS and AWS GovCloud. AWS and Azure marketplaces offer pre-built FileCloud images. Supports local storage (Disk and Network Shares, CIFS/NFS, and cloud storage. Multiple storage endpoints can be connected. Supports AWS S3, Azure Blob and Wasabi as well as other S3 compatible storage systems. Both file gateway (Network share), and primary (managed storage) modes are supported. -
13
Accellion
Accellion
$15.00/month/ user The Accellion secure communication platform prevents data breaches from third-party cyber risk. CIOs and CISOs rely upon the Accellion platform to ensure complete visibility, compliance, and control over communication of IP, PII and PHI across all third-party communication channels. This includes email, file sharing and mobile, enterprise apps, web portals and SFTP as well as automated inter-business workflows. Users click the Accellion button to know that it is the safest and most secure way to share sensitive information outside of the company. The Accellion platform offers a variety of deployment options including FedRAMP, FedRAMP, hybrid, and on-premise. It provides the security and governance CISOs require to protect their organizations, reduce risk, and comply with strict compliance regulations like NIST 800-171, HIPAA and SOX, GDPR and GLBA. More than 25 million users have been protected by Accellion solutions at over 3,000 companies. -
14
Box
Box
$5 per month 72 RatingsSecure collaboration with anyone, anyplace, on any device. It is our top priority to protect your cloud files. We have developed advanced security controls, intelligent threats detection, and complete information governance. We also know that your needs are not limited to these security controls. Strict data privacy? Check. Check. Check. Check. You should check. Collaboration is key to your business. This includes customers, partners, vendors, and teammates. Everyone can work together on your most important content easily if they are in the same place. You should not be sharing files but frustration. You should be able to rest assured that your data is safe. It is a waste of time to work on cumbersome, manual processes every day. We let anyone automate repeatable workflows that are important to your business, such as HR onboarding and contract management. Your workflows will move faster. You have more time for what is most important. -
15
Cloud Compliance
Cloud Compliance
With the most comprehensive range of products, you can implement privacy compliance and data security in Salesforce. A thorough data inventory and risk assessment are essential for privacy programs to be successful. Most organizations overlook data or struggle with spreadsheets and manual processes. Our Personal Data Inventory product automates and streamlines DPIA and enterprise data inventories flows. Your organization will be able to easily have a clear risk assessment and a data inventory. Many organizations are experiencing an increase in privacy rights requests. It is difficult, inconsistent, and error-prone to respond to these requests manually, increasing the risk of non-compliance. Our Privacy Rights Automation product allows self-service and automates all privacy related activities. A standardised and error-free solution to reduce the risk of non-compliance -
16
Privacy1
Privacy1
$159 per monthPrivacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level -
17
Randtronics DPM easyCipher
Randtronics
Randronics DPM EasyCipher provides Transparent Data Encryption lock-box protection for files, folders and databases. The contents are automatically decrypted by authorized users. TDE-protected items are locked or unlocked like a lockbox. DPM easyCipher, a centrally-managed, policy-based encryption solution, allows an organization standardize its encryption by defining and implementing encryption policies on any server or laptop that has a DPM easyCipher Agent installed. DPM easyCipher secures all files and directories on servers and laptops. DPM easyCipher protects database servers, web/app server, and file servers. DPM easyCipher is a database-native TDE solution that can be extended or replaced by database vendors in order to secure their DB products. Use easyCipher for information outside the database. -
18
Anonomatic
Anonomatic
Store, anonymize mask, mine, redact and share sensitive data securely with 100% accuracy and complete international data privacy compliance. You can save time and money by separating PII from other data. Embed PII Vault into your innovative solutions to reduce time to market and deliver the most PII-secure solutions available. Unlock data for more accurate and targeted messages. All data can be anonymized in one simple step before it reaches the platform. Once anonymized, Poly- Anonymization™ allows you to combine disparate anonymous data sets on an individual basis without receiving any PII. Replace PII by a compliant, multi-valued, non-identifying key that is used to link anonymous data from multiple organizations. -
19
Diplomat Managed File Transfer
Coviant Software
Diplomat MFT is the best value for file transfer automation from anywhere to anywhere with visibility and alerting across any OS in the cloud or on your premises. Use FTP and FTPS, SFTP, HTTP and HTTPS and Local Network (including Network Shares and AS2), as well as Cloud Storage providers: AWS S3 and compatible, Azure Files, Azure Blob, Oracle Cloud Storage Google Cloud Storage Citrix Sharefile and Dropbox. More coming soon. -
20
Kiteworks
Kiteworks
FedRAMP is the only security platform that supports file sharing, managed files transfers, and email data communication to meet compliance requirements for standards such as CMMC2.0, ITAR, IRAP NIS 2, HIPAA and others. The "tool soup" of content communication increases inefficiency and costs. It is almost impossible to manage zero-trust security policies at a central level. Organizations also lack visibility into security and compliance over communications of sensitive content. This increases security and regulatory risks. Lack of governance increases security and compliance risks. Organizations need to control and track who has access to content, who edits it, who it can be shared with, and where. Cybercriminals and malicious employees target sensitive content such as PII, IP documents, financial documents and PHI, because they can monetize or weaponize it. -
21
Informatica Dynamic Data Masking
Informatica
Your IT organization can use flexible masking rules to limit sensitive data with flexible masking rules based upon the authentication level of a user. It ensures compliance by blocking, auditing and alerting users, IT personnel and outsourced teams that access sensitive information. Data masking solutions can be easily customized to meet different regulatory or business needs. Protect sensitive and personal information while supporting cloud-based, offshoring and outsourcing initiatives. Secure big data using dynamic masking of sensitive data in Hadoop. -
22
Dataguise
Dataguise
Data privacy and security should not be a hindrance to your analytics-driven innovation efforts. Dataguise offers flexible encryption and masking options to protect sensitive data. This will ensure that your business is protected. Fast-track delivery of data sets can be achieved for analysis in real time, allowing for better insights and better decisions. Customers of Dataguise have many and changing needs. We know that our customers need more than just the solutions and services we offer. This is why we have built a strong network with carefully selected partners. This executive guide will show you how to maximize data value while protecting data privacy. Dataguise is more reliable than other data discovery tools, has a longer history, supports a wider range of data types, repositories, delivers lower false positive results, and scans data at a larger scale more reliably. Dataguise gives businesses the confidence to act in the best interest of their data. -
23
DOT Anonymizer
DOT Anonymizer
€488 per monthMask your personal information to ensure it looks and behaves like real data. Software development needs realistic test data. DOT Anonymizer masks test data and ensures its consistency across all data sources and databases. The use of personal data or identifying information outside of production is prohibited (development, testing and training, BI, external services providers, etc.). Data leakage is a major concern. Increasing regulations across the world require companies to anonymize/pseudonymize personal or identifying data. You can retain the original format of data by anonymizing it. Your teams can work with fictional, but realistic data. Manage your data sources to maintain their usability. Use DOT Anonymizer from your own applications. Consistency in anonymizations across DBMS and platforms. To ensure realistic data, maintain relations between tables. Anonymize any database type and file, such as CSV, XML or JSON. -
24
PHEMI Health DataLab
PHEMI Systems
Unlike most data management systems, PHEMI Health DataLab is built with Privacy-by-Design principles, not as an add-on. This means privacy and data governance are built-in from the ground up, providing you with distinct advantages: Lets analysts work with data without breaching privacy guidelines Includes a comprehensive, extensible library of de-identification algorithms to hide, mask, truncate, group, and anonymize data. Creates dataset-specific or system-wide pseudonyms enabling linking and sharing of data without risking data leakage. Collects audit logs concerning not only what changes were made to the PHEMI system, but also data access patterns. Automatically generates human and machine-readable de- identification reports to meet your enterprise governance risk and compliance guidelines. Rather than a policy per data access point, PHEMI gives you the advantage of one central policy for all access patterns, whether Spark, ODBC, REST, export, and more -
25
Viacryp
Viacryp
Enjoy the convenience of using a Trusted Third Party to carefully pseudonymize personal data so that you can perform analysis within the GDPR framework. Our basic service is to pseudonymize personal data. We use the principles of irreversible pseudonyms, thickening behavior and thickening of words. The pseudonymized information is used by our clients to further process the data. Our filter service allows you to share your personal data in a proportionate manner and respecting privacy. We filter information using a pseudonymized expert whitelist, and only send information about individuals that appear on this list. Viacryp offers privacy advice in relation to the protection and security personal data. Together with our partners we provide advice on the steps that an organization can take to comply with the GDPR frameworks. This includes both technical and organizational and processes measures. -
26
Ideagen Huddle is a cloud-based platform that provides a safe and unique workspace environment for your team, partners and external stakeholders. Companies in highly regulated industries can review work, securely share sensitive information and collaborate efficiently which allows you to maintain complete control of the document - meeting your project goals on time and to budget, every time. With Ideagen Huddle, you get an easier way to collaborate and co-edit documents, control file versions, collaborate with clients, and organize team tasks. Built-in approval workflow means you'll never miss a deadline again, and our free mobile app keeps you connected even when you're on the road. Benefits include: • Government grade security – confidently protect your sensitive data and reduce the risk of loss or theft • Custom branded Client portals – Make all your documents and associated communications accessible in one central location • Regulated collaboration – Keep control of versions, co-edit, make comments and revisions, all in real-time. • Controlled external collaboration – Make external collaboration frictionless for all stakeholders Because Ideagen Huddle is cloud-based, it sits above your existing IT infrastructure.
-
27
Uncontrolled file sharing could put your business at risk Uncontrolled file sharing could put your business at risk Are you looking for a reliable and secure way to send and receive files? Our file sharing solution is fully customizable and includes 24/7 support, enterprise-grade security, and compliance with standards to protect sensitive and private data. Find out why Maytech is preferred by over 60 industries in more than 35 countries.
-
28
Leapfile
Leapfile
$10 per monthFile delivery is simple and secure. Businesses around the globe trust this service to send any file, regardless of its size. Professional file exchange. You can easily exchange files with clients via your own file exchange site. Clients don't even have to have their own accounts in order to send files back. You can see exactly what is happening with your files. You have complete access to all files delivered. Instant confirmation that your files have been downloaded You can work right from your Outlook inbox. It integrates with Microsoft Outlook so it works exactly like email. No training is required. End to end encryption. All file transfers are encrypted. File downloads require authentication from the recipient. Manage the workflow of your team. File repositories can help you speed up your team's workflow. You can easily manage and organize files in separate repositories. You can easily add users, send files, and save them directly to your repositories. -
29
Lightserve
Lightserve
$49 per monthAll major file formats are supported. We can convert and securely stream them to allow you to control access, set permissions, and protect information. Watermarks can help to prevent document leaks and mitigate them. You can track data room activity using audit event pages, email notifications, and helpful alerts. You can conduct transactions on separate datasites with ease. We offer a complete storage solution that allows you to upload, share, distribute, and archive your documents. You can collaborate with your team in a secure document workspace. Our pricing plans are affordable and include fixed rates for unlimited storage, usage, and users. Our pricing models will save you significant money on setup and management fees. Our pricing models allow you to convert your office documents to secure streaming formats so that you can manage access and file exchanges, while avoiding document leaks. -
30
Couchdrop
Couchdrop
$49.99/month Simplify your file transfers with Couchdrop, the cloud-based SFTP and Managed File Transfer solution that connects to your existing storage. Start moving and automating files between cloud storage, file servers, and NAS devices in minutes. Couchdrop acts as your cloud and file server gateway, secure web portal, and secure pipe between systems or clients to your cloud storage backend. Couchdrop is secure compliant with SOC2 and HIPAA. Supporting the likes of SharePoint, Dropbox, S3, Azure blob, and many other storage platforms, deploy Couchdrop directly on your platform. Couchdrop provides you full control and visibility of your data at rest and doesn't store or sync data at any stage of the process. Save time by automating file workflows and remove headaches for your engineering team with Couchdrop's zero infrastructure architecture. There's no configuring or managing virtue machines; Couchdrop handles it all for you. Need to track file transfers for compliance? Couchdrop's detailed enterprise-grade auditing and logging provides more granularity and traceability on your file transfers and file operations. Transferring files has never been easier with Couchdrop. Real-time file transfer like it should be. -
31
HushHush Data Masking
HushHush
Businesses today face severe punishment if they fail to meet the ever-increasing privacy standards of regulators and the general public. Vendors must keep up with the latest algorithms to protect sensitive data like PII or PHI. HushHush is at the forefront in privacy protection (Patents US9886593, US20150324607A1, US10339341) thanks to its PII data discovery tool workbench (also known data de-identification software, data masking software, and obfuscation program). It allows you to find sensitive data about your customers and classify it. You can also anonymize it and comply with GDPR and GLBA requirements. To create comprehensive and secure data anonymization solutions, you can use a variety of rule-based atomic addition anonymization components. HushHush components can be used to anonymize both direct identifiers (SSNs, credit cards names, addresses, telephone numbers, etc.). Both fixed and variable algorithms are available for indirect identifiers. -
32
Informatica Persistent Data Masking
Informatica
While protecting privacy, context, form, as well as integrity, must be retained. Data protection can be enhanced by de-sensitizing sensitive data and de-identifying it. Pseudonymize data for privacy compliance, analytics, and analytics. Obscured data preserves context and referential integrity, so that the masked data is usable in testing, analytics, and support environments. Informatica Persistent data masking is a high-performance, scalable data masking solution that protects confidential data such as credit card numbers and addresses. It creates realistic, de-identified data that can then be shared internally or externally. It can also be used to reduce the risk of data breaches occurring in nonproduction environments, create higher-quality test data, streamline development projects, and comply with data privacy regulations. -
33
S-Filer Portal
OKIOK Data
S-Filer Portal™, a complete, on-premise solution, allows large and small businesses to meet a wide variety of file transfer, storage, and sharing business needs. It provides the same functionality as Enterprise File Sharing and Synchronization and Managed Secure File Transfer (MFT), but at a much lower price. S-Filer Portal is not a file sharing solution for personal use. It was designed from the beginning for enterprise use. This allows for better management and security. All files are encrypted using AES256 encryption in secure virtual vaults. Files can be securely transferred using SSL/TLS or optional end-to-end encryption. Active Directory and LDAP integration provides internal users with Single-Sign-On capabilities, while external users can be managed and authenticated in their own authentication domains. -
34
Assure Security
Precisely
Assure Compliance Monitoring is a bundle that includes Assure Security features. They can be used together to quickly identify security and compliance problems by producing alerts, reports, and reports on IBM system activity, database changes, and views of Db2 information. Two features are also included in the bundle, which can be purchased separately. Assure Monitoring & Reporting seamlessly extracts insights directly from IBM i journal data, and generates alerts and reports about security incidents and compliance deviations. You can use the system and database monitoring capabilities separately or together. You can also send data directly to your enterprise SIEM software, allowing IBM security to be monitored on all enterprise platforms. Assure Db2 Security Monitor is an innovative solution that monitors Db2 data views and blocks records. Assure Security offers market-leading IBM i security capabilities that will help you and your organization comply with cybersecurity regulations. -
35
Blaze Transfer
Blaze Transfer
€ 5/user/ month Blaze Transfer is a great solution for those who need to send large files quickly and safely. Blaze's Quantum Safe End-to End encryption ensures that your data is completely secure, whether you are sharing it with coworkers or working with people outside of your organization. Blaze Transfer is intuitive and user-friendly, so you don't have to be a techie to use it. Upload your files, choose who you'd like to share them with and then relax while they are delivered safely and securely. -
36
FileCatalyst
Fortra
FTP can slow down and make it difficult to move files. FileCatalyst offers fast file transfer solutions that can be used in place of FTP. Our solutions allow you to send files of any format or size at full speed, hundreds of time faster than FTP while ensuring safe and reliable delivery. -
37
FileControl
FileControl Partners
Our solutions make it easier for law firms and businesses to save money and be more efficient. These three interrelated, yet distinct solutions allow business and legal professionals to manage data requirements, from legal discovery to merger and acquisition support. Securely store and share sensitive information, including mergers and acquisitions, from sensitive legal transactions to legal discovery. Secure repository allows you to have complete control over your organizational documents. It can be used to store, manage, and disseminate data according to business needs. A full-featured eDiscovery repository provides complete legal review capabilities and supports the collection, analysis, review, and review of electronically stored data (ESI) for specific matters or groups. -
38
TransferNow
TransferNow
$8 per month 1 RatingTransferNow is the easiest, fastest, and most secure way to share files. TransferNow allows you to send large files, such as photos, videos, and other media without the need for a subscription. Our file transfer service is fast and secure, allowing you to share large files and other documents. You can send large files via email, or create a shared link from any device (smartphones, tablets, computers) using any internet browser. Transfer large files and other large documents to TransferNow by creating a TransferNow account The files can be accessed for up to 365 days before they are permanently and automatically deleted from our servers. You can track and follow your file downloads using our complete dashboard. You can modify the data and parameters of your transfers, re-transfer files without having to systematically upload the same documents again, and erase a transfer that has expired before its expiration date. -
39
Safelink
Safelink
FreeSafelink offers secure virtual data rooms and collaboration services to organizations such as law firms and accountancy practices, M&A specialists and financial service businesses. The cloud-based solution allows for secure sharing of highly confidential documents through encrypted data storage and transmission. Safelink is a fully-featured solution that offers granular permissions and full content search. It also includes secure messaging, collaboration tools and page-level document tracking. You can drag and drop files and folders to the system. You can also set permissions to who can view, copy, download and print them. Collaboration and coordination features allow users to create tasks, checklists, comment on documents, and publish notices to other users. -
40
DocRAID
AvailabilityPlus
$24 per monthMulti-award-winning, CloudRAID driven security. Reliable, yet simple file sharing. You can use it on your metal, or in our data centers. Zero-knowledge-Storage. Email protection. No software installation is required by the receiver. CloudRAID based, highly resilient, yet easy-to-use email encryption gateway. No software to install, no PKI needed. No software installation. No hassles. All email clients are supported. All devices. All devices are ready to be protected in minutes. Software to detect vulnerabilities and harden critical infrastructures. In-built cooperation with the German Federal Office for Information Security. Your attack surface is reduced by fragmentation, encryption, and redundant distribution. DocRAID®, the leader in CloudRAID technology, is DocRAID®. Your files are protected during transport and at rest with fragmentation, encryption and redundant distribution. Redundant distribution to multiple jurisdictions of encrypted data fragments adds an additional layer of protection. -
41
XM SendSecure
OpenText
XM SendSecure™, a secure file exchange platform, is easy to use and highly secure. It allows safe file exchange and temporary storage of sensitive files in virtual SafeBoxes. All files exchanged are virus-scanned and encrypted at rest and in transit. 2-Factor authentication (2FA) ensures that the correct recipient receives them. The data is automatically deleted after a specified time. XM SendSecure automatically creates an audit trail for all file interactions and communications to aid regulatory compliance. The SafeBox file container is central to the XM SendSecure system. It is created upon upload and kept separate from any other storage in a locked virtual area. Each SafeBox can be used to transfer unlimited files in any format, up to 5TB each. Every file is automatically scanned with antivirus software when it enters the SafeBox. Once an exchange has been initiated, additional files can either be sent or received by the sender. -
42
SmartFile
SmartFile
Secure File Sharing & Transfer Solutions For Business and Enterprise You can easily manage and share large files within and outside your company. It's the perfect combination of ease for users and IT control. SmartFile is designed to improve usability, reduce unauthorized file sharing, and eliminate IT file-related headaches. Secure file sharing is made easy for your users with SmartFile. Users can send, receive, and manage files from their desktop, browsers, FTP clients, and API. For compliance purposes, file and user activity are tracked and recorded. Email notifications are sent to give you instant alerts. Granular permissions and access rights make sure that only authorized users have access to certain files. Users can securely access files both onsite and offsite using a simple interface, while still adhering to company security procedures. -
43
Hightail
OpenText
$12 per user per monthAnyone can join the collaboration, whether they are in-house or external. Collect feedback from multiple reviewers at once, always on the most current file version. Securely share large files using instant email notification to recipients. You can also track when your content was accessed by file delivery and send tracking. Use tools designed for visual content to manage creative projects. To manage creative assets, feedback and decisions, as well as approvals, in one place, start a project. You can sync files from Microsoft OneDrive or Dropbox, respond to feedback without leaving Adobe Creative Cloud, and address feedback wherever you are with our mobile apps. -
44
Serv-U MFT
SolarWinds
$3,192 one-time paymentSolarWinds' Serv-U FTP Server software is safe and reliable. It is designed to provide central control and automated file transfer management in your organization. Serv-U FTP Server can be deployed in your data center and allows you to securely exchange files within your company using SFTP, FTPS and HTTPS over IPv4 or IPv6 networks. It is designed to prevent file transfer data being exposed in the cloud and compromise your data security. -
45
BizDataX
Ekobit
BizDataX provides production-level data masking. It allows compliance with GDPR, and other regulations by masking customers' identities while preparing data to be used by testers and developers. The risk of using production data is greatly reduced by using anonymized/masked data. You should be focusing on business requirements, policy management, sensitive data governance, and other regulations. You will need to track the inventory of databases, data sources, tables, and where sensitive data is located. Manage large customer databases and exchange information with online partners shops and parcel delivery businesses. Data anonymization is a way to ensure regulatory compliance in the management of medical records. -
46
Z1 SecureHub
Zertificon
25% of the top 100 German companies with the highest turnover use Zertificon's solutions. We simplify encrypted large file transfer with our web-based MFT solution Z1 SecureHub. You can easily - and securely - send and receive large files over the Internet with anyone, anywhere. Thanks to a highly intuitive platform, no end-user installations are required for secure data exchanges between your employees, teams, customers, and business partners. Every upload or download triggers an email to all parties involved, ensuring that everyone is up to date on projects. Users have access to extensive file management, while administrators maintain enterprise-level control over transfer activity. Audits are made easy with comprehensive monitoring and logging options. It's also simple to integrate, thanks to virtual appliance delivery. With Z1 SecureHub, you get German-engineered security with no backdoors for data compliance and cyberthreat protection. You also get complete data sovereignty on-premises or in the cloud. It is customizable, easy to deploy, and easy to manage. APIs are also available. -
47
Admincontrol Data Room
Admincontrol
$250 per monthArtificial Intelligence (AI), has evolved from science fiction to business reality. It will be paired with virtual data rooms to revolutionize deal-making and due diligence. Admincontrol has partnered with Luminance, a leader in artificial intelligence platforms for lawyers, to bring you a solution that delivers a significant improvement in efficiency and productivity. Our folder wizard is a dynamic, user-friendly tool that allows you to create your first folder structure in the data area. You can use one of our templates or start from scratch. Typically, a transaction involves many discussions and clarifications. Communication between advisors and team members is often done via email or other insecure channels. Secure Messaging offers a secure, encrypted alternative. Due diligence and other processes can often take a lot of time and require a lot of preparation. -
48
ShareVault
ShareVault
2 RatingsA virtual data room, or VDR, is an essential tool to facilitate due diligence and other business transactions in which it is important to share documents in a controlled way. You can easily keep control of sensitive documents even if they are not under your IT department's control. ShareVault gives you visibility and control over everything, from remote shredding to user analysis. This allows you to focus on the deal, and not the data room. ShareVault Enterprise and ShareVault Pro have powerful Information Rights Management (IRM), which allows you to keep control over documents that are shared with third parties. Protected documents are AES256 bit encrypted and can only open by current rights holders. Documents can also be remotely "shredded". This means that a user can revoke their permission to open a document retroactively, even if they have already downloaded it. -
49
MyWorkDrive
Wanpath
MyWorkDrive is a software-only service that allows secure remote access to your in-house file servers from any device. Users can access their files in minutes, without the need for Sync, VPN or RDP, and without migrating data. IT professionals looking for a cloud-like file-sharing solution can rely upon ransomware protection and DLP (data leak protection), data governance compliance FIPS, HIPAA, GDPR), enhanced Office 365 real time online collaboration, with a lower total price of ownership, in comparison to other options. -
50
Piiano
Piiano
Start with developers to create a culture and infrastructure that respects privacy and security. This will ensure that PII is prioritized and protected throughout your organization. The Piiano Vault can be deployed to create a secure, centralized PII zone that is only accessible to you in your cloud environment. This will prevent data breaches and ensure privacy best practices are being applied. For unparalleled access visibility, you can control all PII interactions using advanced policy controls, encryption, tokenization, and a privacy-centric scanner. To comply with GDPR, CCPA, and other privacy regulations, centralize data to implement privacy-by design, pseudonymization (RTBF), and data subject access requests.