2026 Best Software Awards are here!See the list

Best Cloud File Security Software - Page 2

Lauren Worth
LW
Researched and written by Lauren Worth

Cloud file security software is used to secure information stored within cloud-based (SaaS) applications. These tools integrate with cloud-based tools used to store and share files. Many companies will use cloud file security solutions to identify files containing sensitive or privileged information. Once these files are properly labeled, companies can control access to the files, document their sharing history, and prevent unauthorized parties from access.

These tools can facilitate data security by enforcing policies related to cloud access control and storage. Companies leverage the tools to implement security protocols, monitor access, and protect both information stored within cloud applications and information transferred through cloud applications. Administrators can manage governance, set permissions, and monitor the usage of those accessing the applications. Many cloud security products provide encryption and data loss prevention features to further secure documents and data stored within cloud applications.

To qualify for inclusion in the Cloud File Security category, a product must:

Integrate with SaaS applications and identity directories
Allow administrators to set permissions and control file access
Document interactions with files stored within cloud-based applications or changes to their privileges
Show More
Show Less

Featured Cloud File Security Software At A Glance

Free Plan Available:
Safetica
Sponsored
Highest Performer:
Easiest to Use:
Show LessShow More
Highest Performer:
Easiest to Use:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
58 Listings in Cloud File Security Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kaspersky Security for Microsoft Office 365 is an advanced, all-in-one threat protection solution designed to safeguard Microsoft Office 365's communication and collaboration services. It enhances the

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kaspersky Security for Microsoft Office 365 features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    9.3
    Encrypted Storage
    Average: 8.7
    9.6
    Breadth of Partner Applications
    Average: 8.3
    9.3
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaspersky
    Year Founded
    1997
    HQ Location
    Moscow
    Twitter
    @kasperskylabind
    1,297 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,494 employees on LinkedIn®
    Phone
    1-866-328-5700
Product Description
How are these determined?Information
This description is provided by the seller.

Kaspersky Security for Microsoft Office 365 is an advanced, all-in-one threat protection solution designed to safeguard Microsoft Office 365's communication and collaboration services. It enhances the

Users
No information available
Industries
No information available
Market Segment
  • 47% Small-Business
  • 33% Mid-Market
Kaspersky Security for Microsoft Office 365 features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
9.3
Encrypted Storage
Average: 8.7
9.6
Breadth of Partner Applications
Average: 8.3
9.3
User, Role, and Access Management
Average: 9.0
Seller Details
Seller
Kaspersky
Year Founded
1997
HQ Location
Moscow
Twitter
@kasperskylabind
1,297 Twitter followers
LinkedIn® Page
www.linkedin.com
4,494 employees on LinkedIn®
Phone
1-866-328-5700
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trend Micro Cloud App Security delivers advanced threat and data protection for Office 365 and cloud file-sharing services.

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 42% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trend Micro Cloud App Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Email Security
    1
    Security
    1
    Security Protection
    1
    Threat Protection
    1
    Cons
    Access Limitations
    1
    Limited Features
    1
    Storage Limitations
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Micro Cloud App Security features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.0
    9.0
    Encrypted Storage
    Average: 8.7
    8.8
    Breadth of Partner Applications
    Average: 8.3
    8.1
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    LinkedIn® Page
    www.linkedin.com
    7,862 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
    Total Revenue (USD mm)
    $1,515
Product Description
How are these determined?Information
This description is provided by the seller.

Trend Micro Cloud App Security delivers advanced threat and data protection for Office 365 and cloud file-sharing services.

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 42% Enterprise
  • 40% Mid-Market
Trend Micro Cloud App Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Email Security
1
Security
1
Security Protection
1
Threat Protection
1
Cons
Access Limitations
1
Limited Features
1
Storage Limitations
1
Trend Micro Cloud App Security features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.0
9.0
Encrypted Storage
Average: 8.7
8.8
Breadth of Partner Applications
Average: 8.3
8.1
User, Role, and Access Management
Average: 9.0
Seller Details
Year Founded
1988
HQ Location
Tokyo
LinkedIn® Page
www.linkedin.com
7,862 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
Total Revenue (USD mm)
$1,515
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
(37)4.7 out of 5
14th Easiest To Use in Cloud File Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Nira is a Data Access Governance platform that helps companies protect their Google Workspace and Microsoft 365 documents from unauthorized access. The platform provides complete visibility into who

    Users
    No information available
    Industries
    • Financial Services
    • Marketing and Advertising
    Market Segment
    • 86% Mid-Market
    • 8% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Nira features and usability ratings that predict user satisfaction
    9.9
    Has the product been a good partner in doing business?
    Average: 9.0
    5.0
    Encrypted Storage
    Average: 8.7
    5.0
    Breadth of Partner Applications
    Average: 8.3
    10.0
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Nira
    Year Founded
    2021
    HQ Location
    Redwood City, CA
    Twitter
    @niradotcom
    1,094 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Nira is a Data Access Governance platform that helps companies protect their Google Workspace and Microsoft 365 documents from unauthorized access. The platform provides complete visibility into who

Users
No information available
Industries
  • Financial Services
  • Marketing and Advertising
Market Segment
  • 86% Mid-Market
  • 8% Enterprise
Nira features and usability ratings that predict user satisfaction
9.9
Has the product been a good partner in doing business?
Average: 9.0
5.0
Encrypted Storage
Average: 8.7
5.0
Breadth of Partner Applications
Average: 8.3
10.0
User, Role, and Access Management
Average: 9.0
Seller Details
Seller
Nira
Year Founded
2021
HQ Location
Redwood City, CA
Twitter
@niradotcom
1,094 Twitter followers
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
(388)4.6 out of 5
Optimized for quick response
12th Easiest To Use in Cloud File Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberSentriq is an integrated cybersecurity and data protection platform, leveraging solutions from two best-of breed vendors in the MSP space. Partnering with over 3,000 MSPs and protecting over 150,

    Users
    • IT Manager
    • Director
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 48% Mid-Market
    • 41% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Redstor is a cloud-based backup and disaster recovery solution that offers features such as data encryption, remote login, and email security.
    • Reviewers like the simplicity and ease of use of Redstor, its ability to provide reliable daily backups, and the quick and professional customer support.
    • Reviewers noted some issues with Redstor, such as the time-consuming process of obtaining pricing, the need for improvement in handling impersonation emails, and the lack of detailed information on the dashboard.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberSentriq Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    48
    Backup Solutions
    38
    Backup Ease
    31
    Backup Features
    31
    Cloud Backup
    24
    Cons
    Backup Issues
    16
    Backup Failures
    12
    Inadequate Reporting
    11
    Poor Reporting
    10
    Slow Restoration
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberSentriq features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.0
    9.5
    Encrypted Storage
    Average: 8.7
    8.8
    Breadth of Partner Applications
    Average: 8.3
    9.0
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2025
    HQ Location
    Galway ,Galway
    Twitter
    @Redstor
    1,983 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    194 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CyberSentriq is an integrated cybersecurity and data protection platform, leveraging solutions from two best-of breed vendors in the MSP space. Partnering with over 3,000 MSPs and protecting over 150,

Users
  • IT Manager
  • Director
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 48% Mid-Market
  • 41% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Redstor is a cloud-based backup and disaster recovery solution that offers features such as data encryption, remote login, and email security.
  • Reviewers like the simplicity and ease of use of Redstor, its ability to provide reliable daily backups, and the quick and professional customer support.
  • Reviewers noted some issues with Redstor, such as the time-consuming process of obtaining pricing, the need for improvement in handling impersonation emails, and the lack of detailed information on the dashboard.
CyberSentriq Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
48
Backup Solutions
38
Backup Ease
31
Backup Features
31
Cloud Backup
24
Cons
Backup Issues
16
Backup Failures
12
Inadequate Reporting
11
Poor Reporting
10
Slow Restoration
10
CyberSentriq features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.0
9.5
Encrypted Storage
Average: 8.7
8.8
Breadth of Partner Applications
Average: 8.3
9.0
User, Role, and Access Management
Average: 9.0
Seller Details
Company Website
Year Founded
2025
HQ Location
Galway ,Galway
Twitter
@Redstor
1,983 Twitter followers
LinkedIn® Page
www.linkedin.com
194 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trend Micro IM Security provides threat and data protection for Microsoft Skype for Business servers. Top-rated malware and URL filtering block phishing messages and malicious file transfers. Built-in

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 54% Enterprise
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IM Security for Microsoft Skype for Business features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    LinkedIn® Page
    www.linkedin.com
    7,862 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
    Total Revenue (USD mm)
    $1,515
Product Description
How are these determined?Information
This description is provided by the seller.

Trend Micro IM Security provides threat and data protection for Microsoft Skype for Business servers. Top-rated malware and URL filtering block phishing messages and malicious file transfers. Built-in

Users
No information available
Industries
No information available
Market Segment
  • 54% Enterprise
  • 31% Mid-Market
IM Security for Microsoft Skype for Business features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1988
HQ Location
Tokyo
LinkedIn® Page
www.linkedin.com
7,862 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
Total Revenue (USD mm)
$1,515
(16)4.8 out of 5
8th Easiest To Use in Cloud File Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ManagedMethods is a leading cloud application security platform for K-12 school districts, mid-market companies, and local governments. The platform provides award-winning cloud security that empowers

    Users
    No information available
    Industries
    • Education Management
    Market Segment
    • 69% Mid-Market
    • 25% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManagedMethods features and usability ratings that predict user satisfaction
    9.9
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Boulder, CO
    Twitter
    @managedmethods
    601 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    38 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ManagedMethods is a leading cloud application security platform for K-12 school districts, mid-market companies, and local governments. The platform provides award-winning cloud security that empowers

Users
No information available
Industries
  • Education Management
Market Segment
  • 69% Mid-Market
  • 25% Enterprise
ManagedMethods features and usability ratings that predict user satisfaction
9.9
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
Boulder, CO
Twitter
@managedmethods
601 Twitter followers
LinkedIn® Page
www.linkedin.com
38 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FileWall is a must-have native security solution for Microsoft 365 and provides the ultimate protection against file-based cyber-attacks for Microsoft 365 business applications. Leveraging odix’s pate

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 90% Small-Business
    • 10% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FileWall for Microsoft 365 features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    odix
    Year Founded
    2012
    HQ Location
    Rosh Haain, Israel
    Twitter
    @odix
    6 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FileWall is a must-have native security solution for Microsoft 365 and provides the ultimate protection against file-based cyber-attacks for Microsoft 365 business applications. Leveraging odix’s pate

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 90% Small-Business
  • 10% Mid-Market
FileWall for Microsoft 365 features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
odix
Year Founded
2012
HQ Location
Rosh Haain, Israel
Twitter
@odix
6 Twitter followers
LinkedIn® Page
www.linkedin.com
18 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Securely adopt cloud apps and meet your regulatory compliance requirements with an industry-leading Cloud Access Security Broker (CASB) that integrates with the rest of your enterprise security. Cloud

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 58% Enterprise
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CloudSOC Cloud Access Security Broker (CASB) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Integration
    1
    Cloud Management
    1
    Cloud Security
    1
    Cybersecurity
    1
    Data Protection
    1
    Cons
    Complex Configuration
    1
    Complexity
    1
    Inefficiency
    1
    Licensing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudSOC Cloud Access Security Broker (CASB) features and usability ratings that predict user satisfaction
    8.0
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Encrypted Storage
    Average: 8.7
    7.5
    Breadth of Partner Applications
    Average: 8.3
    7.9
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    62,316 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    55,707 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Securely adopt cloud apps and meet your regulatory compliance requirements with an industry-leading Cloud Access Security Broker (CASB) that integrates with the rest of your enterprise security. Cloud

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 58% Enterprise
  • 27% Mid-Market
CloudSOC Cloud Access Security Broker (CASB) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Integration
1
Cloud Management
1
Cloud Security
1
Cybersecurity
1
Data Protection
1
Cons
Complex Configuration
1
Complexity
1
Inefficiency
1
Licensing Issues
1
CloudSOC Cloud Access Security Broker (CASB) features and usability ratings that predict user satisfaction
8.0
Has the product been a good partner in doing business?
Average: 9.0
8.8
Encrypted Storage
Average: 8.7
7.5
Breadth of Partner Applications
Average: 8.3
7.9
User, Role, and Access Management
Average: 9.0
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
62,316 Twitter followers
LinkedIn® Page
www.linkedin.com
55,707 employees on LinkedIn®
Ownership
NASDAQ: CA
(110)4.6 out of 5
15th Easiest To Use in Cloud File Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Redstor’s Microsoft 365 backup service includes market-leading 365 coverage, including complete protection for SharePoint, OneDrive, Email, Teams, OneNote and even Class and Staff Notebooks. AI infus

    Users
    • Director
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 44% Small-Business
    • 44% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Redstor Backup for Microsoft 365 features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.0
    9.7
    Encrypted Storage
    Average: 8.7
    8.7
    Breadth of Partner Applications
    Average: 8.3
    9.2
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2025
    HQ Location
    Galway ,Galway
    Twitter
    @Redstor
    1,983 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    194 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Redstor’s Microsoft 365 backup service includes market-leading 365 coverage, including complete protection for SharePoint, OneDrive, Email, Teams, OneNote and even Class and Staff Notebooks. AI infus

Users
  • Director
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 44% Small-Business
  • 44% Mid-Market
Redstor Backup for Microsoft 365 features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.0
9.7
Encrypted Storage
Average: 8.7
8.7
Breadth of Partner Applications
Average: 8.3
9.2
User, Role, and Access Management
Average: 9.0
Seller Details
Year Founded
2025
HQ Location
Galway ,Galway
Twitter
@Redstor
1,983 Twitter followers
LinkedIn® Page
www.linkedin.com
194 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GAT Labs build tools that help complement the power of Google Workspace and Chrome for Enterprise and Education domains with auditing, management, security, automation and insights. Today, GAT is t

    Users
    No information available
    Industries
    • Education Management
    • Primary/Secondary Education
    Market Segment
    • 59% Mid-Market
    • 26% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • GAT Labs Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    3
    Customer Support
    3
    Features
    3
    Google Workspace Integration
    3
    Reporting
    3
    Cons
    Slow Performance
    2
    Complex Configuration
    1
    Complexity
    1
    Complex Setup
    1
    Difficult Navigation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GAT Labs features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.0
    7.6
    Encrypted Storage
    Average: 8.7
    6.4
    Breadth of Partner Applications
    Average: 8.3
    7.8
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Dublin, Ireland
    Twitter
    @GATlabs_
    4,434 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GAT Labs build tools that help complement the power of Google Workspace and Chrome for Enterprise and Education domains with auditing, management, security, automation and insights. Today, GAT is t

Users
No information available
Industries
  • Education Management
  • Primary/Secondary Education
Market Segment
  • 59% Mid-Market
  • 26% Enterprise
GAT Labs Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
3
Customer Support
3
Features
3
Google Workspace Integration
3
Reporting
3
Cons
Slow Performance
2
Complex Configuration
1
Complexity
1
Complex Setup
1
Difficult Navigation
1
GAT Labs features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.0
7.6
Encrypted Storage
Average: 8.7
6.4
Breadth of Partner Applications
Average: 8.3
7.8
User, Role, and Access Management
Average: 9.0
Seller Details
Year Founded
2014
HQ Location
Dublin, Ireland
Twitter
@GATlabs_
4,434 Twitter followers
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FileAudit makes it easy to audit the access and usage of sensitive data across both Windows File Servers and Cloud Storage. - Monitor in real-time all access, and access attempts. - Alert on suspici

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 43% Small-Business
    • 36% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FileAudit features and usability ratings that predict user satisfaction
    8.1
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    BIDART, Aquitaine
    LinkedIn® Page
    www.linkedin.com
    42 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FileAudit makes it easy to audit the access and usage of sensitive data across both Windows File Servers and Cloud Storage. - Monitor in real-time all access, and access attempts. - Alert on suspici

Users
No information available
Industries
No information available
Market Segment
  • 43% Small-Business
  • 36% Mid-Market
FileAudit features and usability ratings that predict user satisfaction
8.1
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2000
HQ Location
BIDART, Aquitaine
LinkedIn® Page
www.linkedin.com
42 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Digital Guardian Secure Collaboration (formerly Vera) encrypts and controls access to sensitive files wherever they go. Taking a Zero Trust approach to file sharing, collaboration with anyone – extern

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Small-Business
    • 27% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fortra Secure Collaboration features and usability ratings that predict user satisfaction
    7.3
    Has the product been a good partner in doing business?
    Average: 9.0
    7.4
    Encrypted Storage
    Average: 8.7
    6.9
    Breadth of Partner Applications
    Average: 8.3
    7.9
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,576 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,694 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Digital Guardian Secure Collaboration (formerly Vera) encrypts and controls access to sensitive files wherever they go. Taking a Zero Trust approach to file sharing, collaboration with anyone – extern

Users
No information available
Industries
No information available
Market Segment
  • 53% Small-Business
  • 27% Enterprise
Fortra Secure Collaboration features and usability ratings that predict user satisfaction
7.3
Has the product been a good partner in doing business?
Average: 9.0
7.4
Encrypted Storage
Average: 8.7
6.9
Breadth of Partner Applications
Average: 8.3
7.9
User, Role, and Access Management
Average: 9.0
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,576 Twitter followers
LinkedIn® Page
www.linkedin.com
1,694 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Syskit Point is an all-in-one platform for Microsoft 365 governance, management, and reporting designed to help organizations streamline IT management. It addresses critical challenges such as oversha

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 51% Mid-Market
    • 14% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Syskit Point Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Features
    7
    Time-saving
    5
    Access Control
    4
    Automation
    4
    Cons
    Expensive
    4
    Pricing Issues
    3
    Access Limitations
    2
    Cost
    2
    Access Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Syskit Point features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Encrypted Storage
    Average: 8.7
    10.0
    Breadth of Partner Applications
    Average: 8.3
    10.0
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Syskit
    Company Website
    Year Founded
    2009
    HQ Location
    Elsworth, Cambridge, GB
    Twitter
    @syskitteam
    627 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    92 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Syskit Point is an all-in-one platform for Microsoft 365 governance, management, and reporting designed to help organizations streamline IT management. It addresses critical challenges such as oversha

Users
No information available
Industries
No information available
Market Segment
  • 51% Mid-Market
  • 14% Enterprise
Syskit Point Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Features
7
Time-saving
5
Access Control
4
Automation
4
Cons
Expensive
4
Pricing Issues
3
Access Limitations
2
Cost
2
Access Issues
1
Syskit Point features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
10.0
Encrypted Storage
Average: 8.7
10.0
Breadth of Partner Applications
Average: 8.3
10.0
User, Role, and Access Management
Average: 9.0
Seller Details
Seller
Syskit
Company Website
Year Founded
2009
HQ Location
Elsworth, Cambridge, GB
Twitter
@syskitteam
627 Twitter followers
LinkedIn® Page
www.linkedin.com
92 employees on LinkedIn®
Entry Level Price:$9.50
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LeaksID is designed to protect sensitive files from insider threats, offering a comprehensive steganographic technique to embed distinctive undetectable marks into confidential documents and email att

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Small-Business
    • 7% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LeaksID features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    6.7
    Encrypted Storage
    Average: 8.7
    9.2
    Breadth of Partner Applications
    Average: 8.3
    10.0
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    G-71
    Year Founded
    2019
    HQ Location
    Mountain View, California
    Twitter
    @LeaksId
    40 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LeaksID is designed to protect sensitive files from insider threats, offering a comprehensive steganographic technique to embed distinctive undetectable marks into confidential documents and email att

Users
No information available
Industries
No information available
Market Segment
  • 80% Small-Business
  • 7% Mid-Market
LeaksID features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
6.7
Encrypted Storage
Average: 8.7
9.2
Breadth of Partner Applications
Average: 8.3
10.0
User, Role, and Access Management
Average: 9.0
Seller Details
Seller
G-71
Year Founded
2019
HQ Location
Mountain View, California
Twitter
@LeaksId
40 Twitter followers
LinkedIn® Page
www.linkedin.com
8 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    We work with Governments, Enterprises, and SMBs around the globe, to keep regulated and commercially sensitive data safe. Our patented, Secure Data Sharing Platform (SDSP) allows users to collaborate,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Small-Business
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cocoon Data Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Security
    3
    Collaboration Focus
    2
    Features
    2
    Intuitive
    2
    Cons
    Complexity
    1
    File Size
    1
    Lacking Features
    1
    Lack of Features
    1
    Learning Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cocoon Data features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Arlington, US
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

We work with Governments, Enterprises, and SMBs around the globe, to keep regulated and commercially sensitive data safe. Our patented, Secure Data Sharing Platform (SDSP) allows users to collaborate,

Users
No information available
Industries
No information available
Market Segment
  • 36% Small-Business
  • 29% Enterprise
Cocoon Data Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Security
3
Collaboration Focus
2
Features
2
Intuitive
2
Cons
Complexity
1
File Size
1
Lacking Features
1
Lack of Features
1
Learning Difficulty
1
Cocoon Data features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Arlington, US
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®