Introducing G2.ai, the future of software buying.Try now

Best Cloud File Security Software - Page 2

Lauren Worth
LW
Researched and written by Lauren Worth

Cloud file security software is used to secure information stored within cloud-based (SaaS) applications. These tools integrate with cloud-based tools used to store and share files. Many companies will use cloud file security solutions to identify files containing sensitive or privileged information. Once these files are properly labeled, companies can control access to the files, document their sharing history, and prevent unauthorized parties from access.

These tools can facilitate data security by enforcing policies related to cloud access control and storage. Companies leverage the tools to implement security protocols, monitor access, and protect both information stored within cloud applications and information transferred through cloud applications. Administrators can manage governance, set permissions, and monitor the usage of those accessing the applications. Many cloud security products provide encryption and data loss prevention features to further secure documents and data stored within cloud applications.

To qualify for inclusion in the Cloud File Security category, a product must:

Integrate with SaaS applications and identity directories
Allow administrators to set permissions and control file access
Document interactions with files stored within cloud-based applications or changes to their privileges
Show More
Show Less

Featured Cloud File Security Software At A Glance

Free Plan Available:
Tresorit
Sponsored
Highest Performer:
Easiest to Use:
Show LessShow More
Highest Performer:
Easiest to Use:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Cloud File Security Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
59 Listings in Cloud File Security Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microsoft Defender for Cloud Apps is an enterprise-grade security for cloud apps.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 53% Enterprise
    • 26% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Defender for Cloud Apps Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security Protection
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Defender for Cloud Apps features and usability ratings that predict user satisfaction
    8.2
    Has the product been a good partner in doing business?
    Average: 9.0
    8.5
    Encrypted Storage
    Average: 8.7
    7.6
    Breadth of Partner Applications
    Average: 8.3
    8.7
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    13,086,922 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    220,934 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Microsoft Defender for Cloud Apps is an enterprise-grade security for cloud apps.

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 53% Enterprise
  • 26% Mid-Market
Microsoft Defender for Cloud Apps Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security Protection
1
Cons
Expensive
1
Microsoft Defender for Cloud Apps features and usability ratings that predict user satisfaction
8.2
Has the product been a good partner in doing business?
Average: 9.0
8.5
Encrypted Storage
Average: 8.7
7.6
Breadth of Partner Applications
Average: 8.3
8.7
User, Role, and Access Management
Average: 9.0
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
13,086,922 Twitter followers
LinkedIn® Page
www.linkedin.com
220,934 employees on LinkedIn®
Ownership
MSFT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trend Micro Cloud App Security delivers advanced threat and data protection for Office 365 and cloud file-sharing services.

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 42% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trend Micro Cloud App Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Email Security
    1
    Security
    1
    Security Protection
    1
    Threat Protection
    1
    Cons
    Access Limitations
    1
    Limited Features
    1
    Storage Limitations
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Micro Cloud App Security features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.0
    9.0
    Encrypted Storage
    Average: 8.7
    8.8
    Breadth of Partner Applications
    Average: 8.3
    8.1
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    111,977 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,862 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Trend Micro Cloud App Security delivers advanced threat and data protection for Office 365 and cloud file-sharing services.

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 42% Enterprise
  • 40% Mid-Market
Trend Micro Cloud App Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Email Security
1
Security
1
Security Protection
1
Threat Protection
1
Cons
Access Limitations
1
Limited Features
1
Storage Limitations
1
Trend Micro Cloud App Security features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.0
9.0
Encrypted Storage
Average: 8.7
8.8
Breadth of Partner Applications
Average: 8.3
8.1
User, Role, and Access Management
Average: 9.0
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
111,977 Twitter followers
LinkedIn® Page
www.linkedin.com
7,862 employees on LinkedIn®
Ownership
OTCMKTS:TMICY

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(380)4.6 out of 5
Optimized for quick response
12th Easiest To Use in Cloud File Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberSentriq is an integrated cybersecurity and data protection platform, leveraging solutions from two best-of breed vendors in the MSP space. Partnering with over 3,000 MSPs and protecting over 150,

    Users
    • IT Manager
    • Director
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 48% Mid-Market
    • 41% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Redstor is a backup solution that allows users to fulfill all their backup requirements from one RedApp Dashboard, including Backup, Archive, M365 backup and Entra ID backup.
    • Reviewers like the flexibility to scale quickly as data grows, the ability to access data instantly, the refined interface, the automated protection for Azure VMs, the restore capability, the daily reports, and the simplicity and reliability of the product.
    • Users mentioned that scheduled backups are not an option on user endpoints, error reports are not detailed, there is no Instant VM ability, dashboards are not customizable, there are no log backups for SQL or exchange, support response time is slow, some errors are vague, and emergency recoveries are difficult and costly.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberSentriq Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Backup Ease
    7
    Backup Features
    7
    Backup Solutions
    7
    Ease of Use
    6
    Backup Frequency
    4
    Cons
    Inadequate Reporting
    4
    Backup Issues
    3
    Insufficient Information
    3
    Poor Reporting
    3
    Backup Failures
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberSentriq features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.0
    9.5
    Encrypted Storage
    Average: 8.7
    8.8
    Breadth of Partner Applications
    Average: 8.3
    9.1
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2025
    HQ Location
    Galway ,Galway
    Twitter
    @Redstor
    1,988 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    161 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CyberSentriq is an integrated cybersecurity and data protection platform, leveraging solutions from two best-of breed vendors in the MSP space. Partnering with over 3,000 MSPs and protecting over 150,

Users
  • IT Manager
  • Director
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 48% Mid-Market
  • 41% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Redstor is a backup solution that allows users to fulfill all their backup requirements from one RedApp Dashboard, including Backup, Archive, M365 backup and Entra ID backup.
  • Reviewers like the flexibility to scale quickly as data grows, the ability to access data instantly, the refined interface, the automated protection for Azure VMs, the restore capability, the daily reports, and the simplicity and reliability of the product.
  • Users mentioned that scheduled backups are not an option on user endpoints, error reports are not detailed, there is no Instant VM ability, dashboards are not customizable, there are no log backups for SQL or exchange, support response time is slow, some errors are vague, and emergency recoveries are difficult and costly.
CyberSentriq Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Backup Ease
7
Backup Features
7
Backup Solutions
7
Ease of Use
6
Backup Frequency
4
Cons
Inadequate Reporting
4
Backup Issues
3
Insufficient Information
3
Poor Reporting
3
Backup Failures
2
CyberSentriq features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.0
9.5
Encrypted Storage
Average: 8.7
8.8
Breadth of Partner Applications
Average: 8.3
9.1
User, Role, and Access Management
Average: 9.0
Seller Details
Company Website
Year Founded
2025
HQ Location
Galway ,Galway
Twitter
@Redstor
1,988 Twitter followers
LinkedIn® Page
www.linkedin.com
161 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trend Micro IM Security provides threat and data protection for Microsoft Skype for Business servers. Top-rated malware and URL filtering block phishing messages and malicious file transfers. Built-in

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 54% Enterprise
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IM Security for Microsoft Skype for Business features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    111,977 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,862 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Trend Micro IM Security provides threat and data protection for Microsoft Skype for Business servers. Top-rated malware and URL filtering block phishing messages and malicious file transfers. Built-in

Users
No information available
Industries
No information available
Market Segment
  • 54% Enterprise
  • 31% Mid-Market
IM Security for Microsoft Skype for Business features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
111,977 Twitter followers
LinkedIn® Page
www.linkedin.com
7,862 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FileWall is a must-have native security solution for Microsoft 365 and provides the ultimate protection against file-based cyber-attacks for Microsoft 365 business applications. Leveraging odix’s pate

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 90% Small-Business
    • 10% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FileWall for Microsoft 365 features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    odix
    Year Founded
    2012
    HQ Location
    Rosh Haain, Israel
    Twitter
    @odix
    7 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FileWall is a must-have native security solution for Microsoft 365 and provides the ultimate protection against file-based cyber-attacks for Microsoft 365 business applications. Leveraging odix’s pate

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 90% Small-Business
  • 10% Mid-Market
FileWall for Microsoft 365 features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
odix
Year Founded
2012
HQ Location
Rosh Haain, Israel
Twitter
@odix
7 Twitter followers
LinkedIn® Page
www.linkedin.com
19 employees on LinkedIn®
(16)4.8 out of 5
10th Easiest To Use in Cloud File Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ManagedMethods is a leading cloud application security platform for K-12 school districts, mid-market companies, and local governments. The platform provides award-winning cloud security that empowers

    Users
    No information available
    Industries
    • Education Management
    Market Segment
    • 69% Mid-Market
    • 25% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManagedMethods features and usability ratings that predict user satisfaction
    9.9
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Boulder, CO
    Twitter
    @managedmethods
    601 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    36 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ManagedMethods is a leading cloud application security platform for K-12 school districts, mid-market companies, and local governments. The platform provides award-winning cloud security that empowers

Users
No information available
Industries
  • Education Management
Market Segment
  • 69% Mid-Market
  • 25% Enterprise
ManagedMethods features and usability ratings that predict user satisfaction
9.9
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
Boulder, CO
Twitter
@managedmethods
601 Twitter followers
LinkedIn® Page
www.linkedin.com
36 employees on LinkedIn®
(110)4.6 out of 5
15th Easiest To Use in Cloud File Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Redstor’s Microsoft 365 backup service includes market-leading 365 coverage, including complete protection for SharePoint, OneDrive, Email, Teams, OneNote and even Class and Staff Notebooks. AI infus

    Users
    • Director
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 44% Mid-Market
    • 44% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Redstor Backup for Microsoft 365 features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.0
    9.7
    Encrypted Storage
    Average: 8.7
    8.7
    Breadth of Partner Applications
    Average: 8.3
    9.2
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2025
    HQ Location
    Galway ,Galway
    Twitter
    @Redstor
    1,988 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    161 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Redstor’s Microsoft 365 backup service includes market-leading 365 coverage, including complete protection for SharePoint, OneDrive, Email, Teams, OneNote and even Class and Staff Notebooks. AI infus

Users
  • Director
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 44% Mid-Market
  • 44% Small-Business
Redstor Backup for Microsoft 365 features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.0
9.7
Encrypted Storage
Average: 8.7
8.7
Breadth of Partner Applications
Average: 8.3
9.2
User, Role, and Access Management
Average: 9.0
Seller Details
Year Founded
2025
HQ Location
Galway ,Galway
Twitter
@Redstor
1,988 Twitter followers
LinkedIn® Page
www.linkedin.com
161 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Securely adopt cloud apps and meet your regulatory compliance requirements with an industry-leading Cloud Access Security Broker (CASB) that integrates with the rest of your enterprise security. Cloud

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 58% Enterprise
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CloudSOC Cloud Access Security Broker (CASB) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Integration
    1
    Cloud Management
    1
    Cloud Security
    1
    Cybersecurity
    1
    Data Protection
    1
    Cons
    Complex Configuration
    1
    Complexity
    1
    Inefficiency
    1
    Licensing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudSOC Cloud Access Security Broker (CASB) features and usability ratings that predict user satisfaction
    8.0
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Encrypted Storage
    Average: 8.7
    7.5
    Breadth of Partner Applications
    Average: 8.3
    7.9
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    61,808 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    56,584 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Securely adopt cloud apps and meet your regulatory compliance requirements with an industry-leading Cloud Access Security Broker (CASB) that integrates with the rest of your enterprise security. Cloud

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 58% Enterprise
  • 27% Mid-Market
CloudSOC Cloud Access Security Broker (CASB) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Integration
1
Cloud Management
1
Cloud Security
1
Cybersecurity
1
Data Protection
1
Cons
Complex Configuration
1
Complexity
1
Inefficiency
1
Licensing Issues
1
CloudSOC Cloud Access Security Broker (CASB) features and usability ratings that predict user satisfaction
8.0
Has the product been a good partner in doing business?
Average: 9.0
8.8
Encrypted Storage
Average: 8.7
7.5
Breadth of Partner Applications
Average: 8.3
7.9
User, Role, and Access Management
Average: 9.0
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
61,808 Twitter followers
LinkedIn® Page
www.linkedin.com
56,584 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GAT Labs build tools that help complement the power of Google Workspace and Chrome for Enterprise and Education domains with auditing, management, security, automation and insights. Today, GAT is t

    Users
    No information available
    Industries
    • Education Management
    • Primary/Secondary Education
    Market Segment
    • 59% Mid-Market
    • 26% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • GAT Labs Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    3
    Customer Support
    3
    Features
    3
    Google Workspace Integration
    3
    Reporting
    3
    Cons
    Slow Performance
    2
    Complex Configuration
    1
    Complexity
    1
    Complex Setup
    1
    Difficult Navigation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GAT Labs features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.0
    7.6
    Encrypted Storage
    Average: 8.7
    6.4
    Breadth of Partner Applications
    Average: 8.3
    7.8
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Dublin, Ireland
    Twitter
    @GATlabs_
    4,450 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GAT Labs build tools that help complement the power of Google Workspace and Chrome for Enterprise and Education domains with auditing, management, security, automation and insights. Today, GAT is t

Users
No information available
Industries
  • Education Management
  • Primary/Secondary Education
Market Segment
  • 59% Mid-Market
  • 26% Enterprise
GAT Labs Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
3
Customer Support
3
Features
3
Google Workspace Integration
3
Reporting
3
Cons
Slow Performance
2
Complex Configuration
1
Complexity
1
Complex Setup
1
Difficult Navigation
1
GAT Labs features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.0
7.6
Encrypted Storage
Average: 8.7
6.4
Breadth of Partner Applications
Average: 8.3
7.8
User, Role, and Access Management
Average: 9.0
Seller Details
Year Founded
2014
HQ Location
Dublin, Ireland
Twitter
@GATlabs_
4,450 Twitter followers
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FileAudit makes it easy to audit the access and usage of sensitive data across both Windows File Servers and Cloud Storage. - Monitor in real-time all access, and access attempts. - Alert on suspici

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 43% Small-Business
    • 36% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FileAudit features and usability ratings that predict user satisfaction
    8.1
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    BIDART, Aquitaine
    LinkedIn® Page
    www.linkedin.com
    31 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FileAudit makes it easy to audit the access and usage of sensitive data across both Windows File Servers and Cloud Storage. - Monitor in real-time all access, and access attempts. - Alert on suspici

Users
No information available
Industries
No information available
Market Segment
  • 43% Small-Business
  • 36% Mid-Market
FileAudit features and usability ratings that predict user satisfaction
8.1
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2000
HQ Location
BIDART, Aquitaine
LinkedIn® Page
www.linkedin.com
31 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Digital Guardian Secure Collaboration (formerly Vera) encrypts and controls access to sensitive files wherever they go. Taking a Zero Trust approach to file sharing, collaboration with anyone – extern

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Small-Business
    • 27% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fortra Secure Collaboration features and usability ratings that predict user satisfaction
    7.3
    Has the product been a good partner in doing business?
    Average: 9.0
    7.4
    Encrypted Storage
    Average: 8.7
    6.9
    Breadth of Partner Applications
    Average: 8.3
    7.9
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,565 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,694 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Digital Guardian Secure Collaboration (formerly Vera) encrypts and controls access to sensitive files wherever they go. Taking a Zero Trust approach to file sharing, collaboration with anyone – extern

Users
No information available
Industries
No information available
Market Segment
  • 53% Small-Business
  • 27% Enterprise
Fortra Secure Collaboration features and usability ratings that predict user satisfaction
7.3
Has the product been a good partner in doing business?
Average: 9.0
7.4
Encrypted Storage
Average: 8.7
6.9
Breadth of Partner Applications
Average: 8.3
7.9
User, Role, and Access Management
Average: 9.0
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,565 Twitter followers
LinkedIn® Page
www.linkedin.com
1,694 employees on LinkedIn®
Entry Level Price:$9.50
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LeaksID is designed to protect sensitive files from insider threats, offering a comprehensive steganographic technique to embed distinctive undetectable marks into confidential documents and email att

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Small-Business
    • 7% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LeaksID features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    6.7
    Encrypted Storage
    Average: 8.7
    9.2
    Breadth of Partner Applications
    Average: 8.3
    10.0
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    G-71
    Year Founded
    2019
    HQ Location
    Mountain View, California
    Twitter
    @LeaksId
    40 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LeaksID is designed to protect sensitive files from insider threats, offering a comprehensive steganographic technique to embed distinctive undetectable marks into confidential documents and email att

Users
No information available
Industries
No information available
Market Segment
  • 80% Small-Business
  • 7% Mid-Market
LeaksID features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
6.7
Encrypted Storage
Average: 8.7
9.2
Breadth of Partner Applications
Average: 8.3
10.0
User, Role, and Access Management
Average: 9.0
Seller Details
Seller
G-71
Year Founded
2019
HQ Location
Mountain View, California
Twitter
@LeaksId
40 Twitter followers
LinkedIn® Page
www.linkedin.com
8 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At CloudFuze, we specialize in providing one-stop cloud office migration solutions to enable large enterprises, SMBs, and managed service providers to migrate securely and successfully. Our comprehens

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Enterprise
    • 30% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CloudFuze Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Migration Ease
    9
    Cloud Services
    8
    Ease of Use
    6
    Simple
    5
    Cloud Hosting
    4
    Cons
    Poor Customer Support
    4
    Slow Migration
    4
    Storage Limitations
    4
    Access Limitations
    3
    Information Deficiency
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudFuze features and usability ratings that predict user satisfaction
    8.1
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Encrypted Storage
    Average: 8.7
    8.3
    Breadth of Partner Applications
    Average: 8.3
    8.3
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CloudFuze
    Year Founded
    2013
    HQ Location
    Cary, US
    Twitter
    @CloudFuze
    764 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    56 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At CloudFuze, we specialize in providing one-stop cloud office migration solutions to enable large enterprises, SMBs, and managed service providers to migrate securely and successfully. Our comprehens

Users
No information available
Industries
No information available
Market Segment
  • 40% Enterprise
  • 30% Small-Business
CloudFuze Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Migration Ease
9
Cloud Services
8
Ease of Use
6
Simple
5
Cloud Hosting
4
Cons
Poor Customer Support
4
Slow Migration
4
Storage Limitations
4
Access Limitations
3
Information Deficiency
3
CloudFuze features and usability ratings that predict user satisfaction
8.1
Has the product been a good partner in doing business?
Average: 9.0
8.3
Encrypted Storage
Average: 8.7
8.3
Breadth of Partner Applications
Average: 8.3
8.3
User, Role, and Access Management
Average: 9.0
Seller Details
Seller
CloudFuze
Year Founded
2013
HQ Location
Cary, US
Twitter
@CloudFuze
764 Twitter followers
LinkedIn® Page
www.linkedin.com
56 employees on LinkedIn®
(14)4.5 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    MetaDefender provides comprehensive file upload security to protect against malware and data breaches.​ OPSWAT designed MetaDefender to secure the world’s critical infrastructure from the most sophist

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Small-Business
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • MetaDefender Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Protection
    6
    Ease of Use
    5
    Security
    5
    Customer Support
    4
    Integrations
    4
    Cons
    Lack of Features
    2
    Limited Features
    2
    Compatibility Issues
    1
    Inadequate Protection
    1
    Limited OS Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MetaDefender features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.0
    7.8
    Encrypted Storage
    Average: 8.7
    7.5
    Breadth of Partner Applications
    Average: 8.3
    8.9
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OPSWAT
    Company Website
    Year Founded
    2002
    HQ Location
    Tampa, Florida
    Twitter
    @OPSWAT
    7,222 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,045 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

MetaDefender provides comprehensive file upload security to protect against malware and data breaches.​ OPSWAT designed MetaDefender to secure the world’s critical infrastructure from the most sophist

Users
No information available
Industries
No information available
Market Segment
  • 36% Small-Business
  • 36% Mid-Market
MetaDefender Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Protection
6
Ease of Use
5
Security
5
Customer Support
4
Integrations
4
Cons
Lack of Features
2
Limited Features
2
Compatibility Issues
1
Inadequate Protection
1
Limited OS Support
1
MetaDefender features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.0
7.8
Encrypted Storage
Average: 8.7
7.5
Breadth of Partner Applications
Average: 8.3
8.9
User, Role, and Access Management
Average: 9.0
Seller Details
Seller
OPSWAT
Company Website
Year Founded
2002
HQ Location
Tampa, Florida
Twitter
@OPSWAT
7,222 Twitter followers
LinkedIn® Page
www.linkedin.com
1,045 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    From the endpoint, Threat Defense for AD effectively controls the attacker’s perception of the organization’s internal resources—all endpoints, servers, users, applications, and locally stored credent

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 50% Enterprise
    • 38% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Endpoint Threat Defense for Active Directory features and usability ratings that predict user satisfaction
    8.1
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Encrypted Storage
    Average: 8.7
    9.2
    Breadth of Partner Applications
    Average: 8.3
    9.2
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    61,808 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    56,584 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

From the endpoint, Threat Defense for AD effectively controls the attacker’s perception of the organization’s internal resources—all endpoints, servers, users, applications, and locally stored credent

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 50% Enterprise
  • 38% Mid-Market
Symantec Endpoint Threat Defense for Active Directory features and usability ratings that predict user satisfaction
8.1
Has the product been a good partner in doing business?
Average: 9.0
8.8
Encrypted Storage
Average: 8.7
9.2
Breadth of Partner Applications
Average: 8.3
9.2
User, Role, and Access Management
Average: 9.0
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
61,808 Twitter followers
LinkedIn® Page
www.linkedin.com
56,584 employees on LinkedIn®
Ownership
NASDAQ: CA

Frequently asked questions about Cloud File Security Software

Generated using AI