Cloud File Security reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.
Cloud file security software is used to secure information stored within cloud-based (SaaS) applications. These tools integrate with cloud-based tools used to store and share files. Many companies will use cloud file security solutions to identify files containing sensitive or privileged information. Once these files are properly labeled, companies can control access to the files, document their sharing history, and prevent unauthorized parties from access.
These tools can facilitate data security by enforcing policies related to cloud access control and storage. Companies leverage the tools to implement security protocols, monitor access, and protect both information stored within cloud applications and information transferred through cloud applications. Administrators can manage governance, set permissions, and monitor the usage of those accessing the applications. Many cloud security products provide encryption and data loss prevention features to further secure documents and data stored within cloud applications.
To qualify for inclusion in the Cloud File Security category, a product must:
Duo Security's frictionless Trusted Access platform protects users, data and applications from malicious hackers and data breaches. Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based Trusted Access platform addresses security threats before they become a problem. We do this by verifying the identity of your users and the health of their devices before they connect to the apps you want them to access.
Avanan catches the advanced attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration solutions such as Office 365™, G-Suite™, and Slack™. The platform deploys in one click via API to prevent Business Email Compromise and block phishing, malware, data leakage, account takeover, and shadow IT across the enterprise. Avanan replaces the need for multiple tools to secure the entire cloud collaboration suite.
Tresorit is the end-to-end encrypted file sync and sharing solution which safeguards confidential information by design. Unlike other public cloud vendors, Tresorit has no access to users’ files, which ensures maximum confidentiality. - Uncompromised security: Your files are protected from the moment you upload them to the cloud, until they reach the intended recipient. It is technically impossible for anyone else to gain unauthorized access to your files. - Seamless and secure teamwork: Whether
Email is the leading threat vector for ransomware, phishing, data theft, and other advanced threats. The Barracuda Essentials cloud-based service makes email safe for business with advanced threat protection, tamper-proof archiving, and data protection.
ManagedMethods is a leading cloud application security platform for K-12 school districts, mid-market companies, and local governments. The platform provides award-winning cloud security that empowers organizations with full visibility and control of data stored in cloud applications, including Google G Suite, Microsoft Office 365, OneDrive, SharePoint, Box, Dropbox, Slack, and more. ManagedMethods makes cloud security easy — no proxy, no agent and no special training needed. It helps IT &
Securely adopt cloud apps and meet your regulatory compliance requirements with an industry-leading Cloud Access Security Broker (CASB) that integrates with the rest of your enterprise security. CloudSOC CASB provides visibility, data security and threat protection for today’s generation of cloud users across a wide range of sanctioned and unsanctioned apps.
Datto NAS is a smart, scalable network attached storage platform, centrally managed and protected by the secure Datto Cloud. Easily share files and folders on the local network and replicate NAS snapshots to the Datto Cloud without any additional infrastructure investment. Store more locally, secure it, and back it up to the Cloud forever with our Infinite Cloud Protection option
Spinbackup for Business: Cloud Cybersecurity & Cloud-to-Cloud Backup for Google Apps. Spinbackup safeguards Google Apps data against leak and loss disasters by identifying business risks and security threats. https://spinbackup.com/ Visit our page at Google Apps Marketplace - https://apps.google.com/marketplace/u/0/app/pchenigkkhbkcnfokijdnbeeinmejnip
Akku is an Identity and Access Management (IAM) solution that is packed with features including single sign-on, password policy enforcement, IP- and device-based restrictions, multi-factor authentication and YouTube filtering. It provides enterprises with complete control over data access and privacy on the cloud while ensuring that they stay compliant to statutory industry standards. Akku also offers a dedicated deployment support service, without the need for a third-party system integrator,
ENDPOINT PROTECTION AGAINST RANSOMWARE AND ZERO-DAY THREATS For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure and consumers worldwide from increasingly sophisticated digital threats. From endpoint and mobile security to endpoint detection and response, as well as encryption and multifactor authentication, ESET’s high-performing, easy-to-use solutions unobtrusively protect and monitor 24/7, updating
Maximize information quality and organization across SharePoint & Office 365. Content Governance for SharePoint makes SharePoint and Office 365 easier to use and provides a more connected, more consistent, and better supported digital workplace.
ShareOptic is a cloud-based cyber security tool that enables user to overcome compliance and data security challenges, it protect users of Google Apps & Microsoft O365 customers by ensuring unauthorised 3rd parties never gain access to data.
StealthDEFEND is the real-time threat analytics component of STEALTHbits’ Data Access Governance Suite. Leveraging unsupervised Machine Learning, StealthDEFEND eliminates excessive and undifferentiated warnings to surface truly meaningful trends and alerts on attempts to compromise your sensitive data. TOP FEATURES: - Unsupervised Machine Learning – Analyze a rich set of data with Machine Learning models that evaluate, correlate, and baseline the activity and behavior of users. - Seamless Sens
Complete B2B cloud security, compliance and phishing prevention across all popular B2B chat, email, collaboration and file sharing software. This SaaS offering solves the growing and costly enterprise problem of both collaboration and email security. The 2-year-old company based in San Jose, California uniquely addresses application and email security threat vectors by integrating machine learning and AI with a Zero-Trust Inbox and Zero-Trust Collaboration security product. Clearedin delivers
Trend Micro PortalProtect secures collaborations with a dedicated layer of protection that guards against malware, malicious links, and other threats that SharePoint administrators are often unaware of. Its web reputation technology blocks malicious links from entering web portals, while its powerful content filtering scans both files and web components of SharePoint.
Vera is a next-generation data security company enabling businesses of all sizes to secure, track and share any kind of data, no matter where it's stored or located. With robust policy enforcement, strong encryption and strict access controls, Vera's data-centric security solution enables employees to collaborate freely while ensuring the highest levels of security, visibility and control. For more information, visit: https://www.vera.com/?utm_source=G2C&utm_medium=Org
Secure Storage Container in the Cloud BluKrypt™ is a proprietary privacy enhancement technology that powers all Parablu data protection solutions. With BluKrypt™ container deployed, data can travel back and forth from the cloud fully encrypted, and with clear segregation of duties enforced. BluKrypt™ also protects data at rest within the secure storage container it creates within the cloud storage target. As opposed to a cloud access security broker (CASB), which relies on DLP-like policies to
Credential screening for online accounts can help prevent account takeover. Credential screening is the process of seamlessly screening usernames and passwords to identify if they have been compromised. These systems compare users’ credentials to large databases of leaked credentials in order to find a match and alert the user to their exposed credentials. This adds a strong layer of security to users’ accounts and also highlights the risk in password reuse. The check is performed at login, pas
Box provides an intuitive cloud file sharing and collaboration platform with comprehensive file management and governance capabilities. But once sensitive data is obtained by an authorized recipient outside the secure Box container, file protection and accountability are diminished, as are data privacy breach safe harbors.
FireEye File Protect (FX Series) products help prevent, detect and respond to cyber attacks by scanning file content for signs of malicious threats. These threats might be brought into an organization from outside sources, such as online file sharing services and portable file storage devices.
Kazoup ranks your search results so you can find the right information instantly. The data youre working on are always at the top, helping you spend less time searching and more time getting things done. Kazoup works seamlessly with the permissions of your connected accounts, so your search index automatically reflects what you can access.