# Best Cloud File Security Software - Page 2

  *By [Lauren Worth](https://research.g2.com/insights/author/lauren-worth)*

   Cloud file security software is used to secure information stored within cloud-based (SaaS) applications. These tools integrate with cloud-based tools used to store and share files. Many companies will use cloud file security solutions to identify files containing sensitive or privileged information. Once these files are properly labeled, companies can control access to the files, document their sharing history, and prevent unauthorized parties from access.

These tools can facilitate data security by enforcing policies related to cloud access control and storage. Companies leverage the tools to implement security protocols, monitor access, and protect both information stored within cloud applications and information transferred through cloud applications. Administrators can manage governance, set permissions, and monitor the usage of those accessing the applications. Many cloud security products provide [encryption](https://www.g2.com/categories/encryption) and [data loss prevention](https://www.g2.com/categories/data-loss-prevention-dlp) features to further secure documents and data stored within cloud applications.

To qualify for inclusion in the Cloud File Security category, a product must:

- Integrate with SaaS applications and identity directories
- Allow administrators to set permissions and control file access
- Document interactions with files stored within cloud-based applications or changes to their privileges





## Category Overview

**Total Products under this Category:** 58


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 4,100+ Authentic Reviews
- 58+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.


## Best Cloud File Security Software At A Glance

- **Leader:** [Virtru Secure Share](https://www.g2.com/products/virtru-secure-share/reviews)
- **Highest Performer:** [Nira](https://www.g2.com/products/nira-nira/reviews)
- **Easiest to Use:** [SendSafely](https://www.g2.com/products/sendsafely/reviews)
- **Top Trending:** [Check Point Harmony Email &amp; Collaboration](https://www.g2.com/products/check-point-harmony-email-collaboration/reviews)
- **Best Free Software:** [Tresorit](https://www.g2.com/products/tresorit/reviews)

## Top-Rated Products (Ranked by G2 Score)
  ### 1. [FileAudit](https://www.g2.com/products/fileaudit/reviews)
  FileAudit makes it easy to audit the access and usage of sensitive data across both Windows File Servers and Cloud Storage. - Monitor in real-time all access, and access attempts. - Alert on suspicious file activity, alteration events, and irregular access time. - Execute automated responses to react immediately to potential threats. - Report on file access activity across on-premise storage and the cloud. Agentless, Remote and Non-Intrusive: FileAudit is installed in less than 3 minutes to protect all file servers without intrusion.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 14

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.1/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [IS Decisions](https://www.g2.com/sellers/is-decisions)
- **Year Founded:** 2000
- **HQ Location:** BIDART, Aquitaine
- **LinkedIn® Page:** https://www.linkedin.com/company/219860/ (42 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 43% Small-Business, 36% Mid-Market


  ### 2. [Fortra Secure Collaboration](https://www.g2.com/products/fortra-secure-collaboration/reviews)
  Digital Guardian Secure Collaboration (formerly Vera) encrypts and controls access to sensitive files wherever they go. Taking a Zero Trust approach to file sharing, collaboration with anyone – external or internal – is always quick and secure, with the option to revoke access instantly at any time.​ A Key Part of Fortra (the new face of HelpSystems) Secure Collaboration is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringing complementary products together to solve problems in innovative ways. These integrated, scalable solutions address the fast-changing challenges you face in safeguarding your organization. With the help of the powerful protection from Secure Collaboration and others, Fortra is your relentless ally, here for you every step of the way throughout your cybersecurity journey.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 15

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 7.3/10 (Category avg: 9.0/10)
- **Encrypted Storage:** 7.4/10 (Category avg: 8.7/10)
- **Breadth of Partner Applications:** 6.9/10 (Category avg: 8.3/10)
- **User, Role, and Access Management:** 7.9/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Fortra](https://www.g2.com/sellers/fortra)
- **Year Founded:** 1982
- **HQ Location:** Eden Prairie, Minnesota
- **Twitter:** @fortraofficial (2,758 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/fortra (1,738 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 53% Small-Business, 27% Enterprise


  ### 3. [Syskit Point](https://www.g2.com/products/syskit-syskit-point/reviews)
  Syskit Point is an all-in-one platform for Microsoft 365 governance, management, and reporting designed to help organizations streamline IT management. It addresses critical challenges such as oversharing, data leakage, workspace sprawl, and rising storage costs. This comprehensive solution provides a centralized view of all workspaces and users, enabling IT teams and workspace owners to effectively control access, ensure compliance, and enhance data security. The platform covers SharePoint, OneDrive, Microsoft Teams, and Power Platform. Syskit Point caters to diverse industries, from those with minimal regulation to highly regulated, such as finance, healthcare, manufacturing, aviation, and others. Its functionalities are particularly beneficial for teams responsible for managing multiple workspaces, as it offers tools that simplify user access and data management overview. The platform supports various use cases, including preparing a tenant for Microsoft Copilot, optimizing storage, automating lifecycle management, and mitigating different security risks. The key features of Syskit Point include complete visibility into workspace activities and risks, bulk management capabilities, and automation tools. These features allow users to conduct tailored access reviews, delegate tasks efficiently, and generate reports highlighting potential risks and compliance issues. By providing these capabilities, Syskit Point enhances operational efficiency and strengthens security posture, ensuring that organizations can maintain control over their data and user access. Moreover, Syskit Point offers valuable insights into SharePoint storage management, helping organizations reduce unnecessary costs and predict future storage consumption based on analytics. This feature is particularly useful for organizations with significant content generation demands looking to optimize their resources while maintaining compliance with data management policies. Additionally, the platform supports Microsoft Copilot adopters by evaluating their tenants&#39; AI readiness, ensuring that appropriate access levels are maintained, and preventing oversharing. With its scalability and user-friendly interface, Syskit Point is accessible to teams of all sizes and integrates seamlessly into any organization&#39;s cybersecurity strategy. By empowering teams to focus on reducing risks, ensuring compliance, and enabling secure collaboration at scale, Syskit Point stands out as a 3rd party platform for organizations navigating the complexities of Microsoft 365 management.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 36

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 9.0/10)
- **Encrypted Storage:** 10.0/10 (Category avg: 8.7/10)
- **Breadth of Partner Applications:** 10.0/10 (Category avg: 8.3/10)
- **User, Role, and Access Management:** 10.0/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Syskit](https://www.g2.com/sellers/syskit)
- **Year Founded:** 2009
- **HQ Location:** Elsworth, Cambridge, GB
- **Twitter:** @syskitteam (622 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/18212605 (93 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 53% Mid-Market, 17% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (20 reviews)
- Access Control (8 reviews)
- Easy Setup (8 reviews)
- Features (8 reviews)
- Reporting (7 reviews)

**Cons:**

- Expensive (5 reviews)
- Poor Reporting (5 reviews)
- Access Limitations (4 reviews)
- Insufficient Information (4 reviews)
- Cost (3 reviews)

  ### 4. [LeaksID](https://www.g2.com/products/leaksid/reviews)
  LeaksID is designed to protect sensitive files from insider threats, offering a comprehensive steganographic technique to embed distinctive undetectable marks into confidential documents and email attachments. LeaksID is a powerful tool that can be used to deter potential document leaks, detect insider threats, protect against IP theft, safeguard business and M&amp;A deals, secure document sharing and VDRs, and facilitate due diligence processes.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 15

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.0/10)
- **Encrypted Storage:** 6.7/10 (Category avg: 8.7/10)
- **Breadth of Partner Applications:** 9.2/10 (Category avg: 8.3/10)
- **User, Role, and Access Management:** 10.0/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [G-71](https://www.g2.com/sellers/g-71)
- **Year Founded:** 2019
- **HQ Location:** Mountain View, California
- **Twitter:** @LeaksId (40 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/g71 (8 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 80% Small-Business, 7% Mid-Market


  ### 5. [Cocoon Data](https://www.g2.com/products/cocoon-data/reviews)
  We work with Governments, Enterprises, and SMBs around the globe, to keep regulated and commercially sensitive data safe. Our patented, Secure Data Sharing Platform (SDSP) allows users to collaborate, share and control sensitive data outside firewalls, securely, and compliantly. Clients use our platform to strengthen their organization’s cyber and data security and meet strict compliance standards within a flexible and data-centric organization.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 17

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Cocoon Data](https://www.g2.com/sellers/cocoon-data)
- **HQ Location:** Arlington, US
- **LinkedIn® Page:** https://www.linkedin.com/company/34714031 (17 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 35% Small-Business, 24% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (8 reviews)
- Security (7 reviews)
- Easy Collaboration (4 reviews)
- Intuitive (4 reviews)
- Simple (4 reviews)

**Cons:**

- Complexity (3 reviews)
- Lacking Features (3 reviews)
- Lack of Features (3 reviews)
- Training Required (3 reviews)
- Limited Customization (2 reviews)

  ### 6. [Symantec Endpoint Threat Defense for Active Directory](https://www.g2.com/products/symantec-endpoint-threat-defense-for-active-directory/reviews)
  From the endpoint, Threat Defense for AD effectively controls the attacker’s perception of the organization’s internal resources—all endpoints, servers, users, applications, and locally stored credentials. This solution autonomously learns the organization’s Active Directory structure in its entirety and uses this data to create an authentic and unlimited obfuscation.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 16

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.1/10 (Category avg: 9.0/10)
- **Encrypted Storage:** 8.8/10 (Category avg: 8.7/10)
- **Breadth of Partner Applications:** 9.2/10 (Category avg: 8.3/10)
- **User, Role, and Access Management:** 9.2/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (63,117 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 50% Enterprise, 38% Mid-Market


  ### 7. [Datto NAS](https://www.g2.com/products/datto-nas/reviews)
  Datto NAS is a smart, scalable network attached storage platform, centrally managed and protected by the secure Datto Cloud. Easily share files and folders on the local network and replicate NAS snapshots to the Datto Cloud without any additional infrastructure investment. Store more locally, secure it, and back it up to the Cloud forever with our Infinite Cloud Protection option


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 6

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 7.9/10 (Category avg: 9.0/10)
- **Encrypted Storage:** 9.4/10 (Category avg: 8.7/10)
- **Breadth of Partner Applications:** 5.6/10 (Category avg: 8.3/10)
- **User, Role, and Access Management:** 9.4/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Kaseya](https://www.g2.com/sellers/kaseya)
- **Year Founded:** 2000
- **HQ Location:** Miami, FL
- **Twitter:** @KaseyaCorp (17,431 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/kaseya/ (5,512 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 50% Mid-Market, 50% Small-Business


  ### 8. [Akku](https://www.g2.com/products/akku/reviews)
  Akku is an Identity and Access Management (IAM) solution that is packed with features including single sign-on, password policy enforcement, IP- and device-based restrictions, multi-factor authentication and YouTube filtering. It provides enterprises with complete control over data access and privacy on the cloud while ensuring that they stay compliant to statutory industry standards. Akku also offers a dedicated deployment support service, without the need for a third-party system integrator, along with round-the-clock support for operations, maintenance, and troubleshooting. With this, Akku enables the seamless integration of on-premise legacy applications with that of a company’s cloud environment.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 10

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 9.0/10)
- **Encrypted Storage:** 8.3/10 (Category avg: 8.7/10)
- **Breadth of Partner Applications:** 8.3/10 (Category avg: 8.3/10)
- **User, Role, and Access Management:** 10.0/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [CloudNow Technologies](https://www.g2.com/sellers/cloudnow-technologies)
- **Year Founded:** 2014
- **HQ Location:** Rock Hill, South Carolina
- **Twitter:** @CloudNowTech (293 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cloudnow-technologies/ (94 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 50% Mid-Market, 40% Small-Business


  ### 9. [Qualys FIM](https://www.g2.com/products/qualys-fim/reviews)
  Cloud solution for detecting and identifying critical changes, incidents, and risks resulting from normal and malicious events


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 5

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 9.0/10)
- **Encrypted Storage:** 9.4/10 (Category avg: 8.7/10)
- **Breadth of Partner Applications:** 9.2/10 (Category avg: 8.3/10)
- **User, Role, and Access Management:** 8.3/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Qualys](https://www.g2.com/sellers/qualys)
- **Year Founded:** 1999
- **HQ Location:** Foster City, CA
- **Twitter:** @qualys (34,180 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/8561/ (3,564 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 80% Enterprise, 20% Mid-Market


  ### 10. [Seclore Data-Centric Security Platform](https://www.g2.com/products/seclore-data-centric-security-platform/reviews)
  Seclore helps enterprises secure their most valuable asset — data — by protecting the file itself rather than relying solely on network or device security. With a data-centric approach, Seclore ensures that sensitive information remains protected, controlled, and visible, regardless of where it travels or who it’s shared with. Persistent File Protection Security follows the file everywhere, whether it’s stored internally, emailed, or shared with external partners, ensuring sensitive information never goes unprotected. Smart Classification &amp; Rights Management Files and emails are automatically classified, with usage rights applied based on content. Access permissions stay with the file, ensuring policy compliance without slowing down productivity. Complete Control at All Times Grant, adjust, or instantly revoke access, even after files are shared outside your organization — so you always remain in control. Built-In Compliance and Auditability Every action on protected files is logged in an unalterable audit trail, which simplifies compliance reporting and reduces risk exposure. Seamless Integration Works with the tools your teams already use, including Microsoft 365, Google Workspace, Salesforce, and Box, and integrates easily with existing security systems such as DLP, CASB, and identity solutions. The Business Impact With Seclore, organizations can protect sensitive data end-to-end, simplify compliance, and reduce the risk of data breaches — all without disrupting collaboration. By making data-centric security scalable and straightforward, Seclore empowers enterprises to safeguard information while enabling employees and partners to work freely and securely.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 15

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.0/10)
- **Encrypted Storage:** 10.0/10 (Category avg: 8.7/10)
- **Breadth of Partner Applications:** 10.0/10 (Category avg: 8.3/10)
- **User, Role, and Access Management:** 10.0/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Seclore](https://www.g2.com/sellers/seclore)
- **Year Founded:** 2011
- **HQ Location:** Santa Clara, US
- **Twitter:** @secloretech (1,272 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/seclore/?originalSubdomain=in (478 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 56% Enterprise, 44% Mid-Market


#### Pros & Cons

**Pros:**

- Access Control (1 reviews)
- Customization (1 reviews)
- Data Protection (1 reviews)
- Data Security (1 reviews)
- Features (1 reviews)

**Cons:**

- Access Issues (1 reviews)
- Access Limitations (1 reviews)
- Access Management (1 reviews)
- Access Restrictions (1 reviews)
- Authentication Issues (1 reviews)

  ### 11. [CloudRunner](https://www.g2.com/products/cloudrunner/reviews)
  CloudRunner makes it easy to have enterprise level security, the convenience of single sign-on, user identity management, and account provisioning for all your cloud-based apps all in one place.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 5

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.0/10)
- **Encrypted Storage:** 10.0/10 (Category avg: 8.7/10)
- **Breadth of Partner Applications:** 8.3/10 (Category avg: 8.3/10)
- **User, Role, and Access Management:** 6.7/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [InsynQ](https://www.g2.com/sellers/insynq)
- **Year Founded:** 1997
- **HQ Location:** Gig Harbor, US
- **Twitter:** @summit_hosting (213 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/insynq-inc. (11 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 40% Small-Business, 40% Enterprise


  ### 12. [DropSecure](https://www.g2.com/products/dropsecure/reviews)
  At DropSecure, it is our mission to empower you with technology that protects your digital valuables in a hassle-free manner. DropSecure protects your privacy and safeguards your data using military-grade algorithms before they leave your device. With end-to-end encryption, encrypted uploads, decrypted downloads, two-factor authentication, cryptographic keys, and zero knowledge transfers, we offer the ultimate technology to keep your data safe from the data centers. So whether you are an individual, business or an enterprise, you are always aware of who has access to your sensitive documents. Most importantly, no one owns the keys to your documents apart from you, not even us.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 3

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.0/10)
- **Encrypted Storage:** 8.3/10 (Category avg: 8.7/10)
- **User, Role, and Access Management:** 8.3/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [DropSecure](https://www.g2.com/sellers/dropsecure)
- **Year Founded:** 2016
- **HQ Location:** San Jose, US
- **Twitter:** @drop_secure (15 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/dropsecure (8 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business


  ### 13. [MetaDefender Storage Security](https://www.g2.com/products/metadefender-storage-security/reviews)
  MetaDefender Storage Security is OPSWAT’s all-in-one, multi-layered enterprise data protection platform for securing file storage across cloud, hybrid, and on-premises environments. It integrates seamlessly with Amazon S3, Azure, NetApp, Dell, Wasabi, SharePoint, OneDrive, Box, and any SMB/NFS/SFTP/FTP or S3-compatible storage. Powered by MetaDefender Core, MetaDefender Storage Security uses Metascan™ Multiscanning with 30+ anti-malware engines, Deep CDR™ (Content Disarm and Reconstruction), Proactive DLP, File-Based Vulnerability Assessment, and integration with our Adaptive Sandbox for behavioral analysis to detect and prevent known and zero-day threats, sanitize active content, and identify sensitive data before files are trusted or shared. MetaDefender Storage Security protects data at rest by orchestrating real-time, scheduled, and on-demand scanning and remediation workflows. The result is reduced risk of breaches, ransomware, and data exposure, with automated reporting and audit trails to help organizations meet regulatory and internal compliance requirements without disrupting users or applications.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 2


**Seller Details:**

- **Seller:** [OPSWAT](https://www.g2.com/sellers/opswat)
- **Year Founded:** 2002
- **HQ Location:** Tampa, Florida
- **Twitter:** @OPSWAT (7,234 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/opswat/ (1,124 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 50% Enterprise, 50% Mid-Market


  ### 14. [Netwrix Threat Manager](https://www.g2.com/products/netwrix-threat-manager/reviews)
  Netwrix Threat Manager (formerly StealthDEFEND) detects and responds in real-time to advanced cyberattacks, providing an additional layer of security around your identities and data. Leveraging unsupervised Machine Learning, Netwrix Threat Manager eliminates excessive and undifferentiated warnings to surface truly meaningful trends and alerts on attempts to compromise your sensitive data. TOP FEATURES: - Unsupervised Machine Learning – Analyze a rich set of data with Machine Learning models that evaluate, correlate, and baseline the activity and behavior of users. - Seamless Sensitive Data Integration – Threat and Data Access Governance information is seamlessly integrated, further reducing noise by honing in specifically on the files that matter most. - Preconfigured Threat Models – Netwrix Threat Manager has been purpose-built to detect file system threats associated with Ransomware, Abnormal Behavior, First Time Host Access, First Time Client Use, Unusual Processes, and more. - Response Playbooks – Netwrix Threat Manager&#39;s actions engine automates security responses and connects various security applications and processes together with multi-stage actions. Out-of-the-Box or custom &quot;Playbooks&quot; can be leveraged to respond to threats automatically or programatically. - User Behavioral Profiles – Concrete understanding of each individual user’s behavior is incorporated into Netwrix Threat Manager’s threat analytics and Machine Learning models, complemented by visuals that make understanding any user’s normal behavior a trivial task. - Comprehensive Investigations – Create, configure, and save detailed reports, alerts, and threats on User and Group activity. - SIEM Integration – Out-of-the-box SIEM integration and preconfigured dashboards extend ready-to-use functions. - Real-Time Alerting – Real-time security alerts powered by Machine Learning allow you to master your threat data in a continuous way that leads to faster investigations and threat neutralizations. - Interactive, Real-Time Visualizations – Through a unified web presentation layer, threat data is streamed, processed, and visualized as it happens, including modern visualization elements like heat maps that update themselves in real-time to bring data to life. - Incident Detection Response Workflow – Quickly coordinate your team’s efforts so they’re prepared to share information and track who is working on an issue at any given time.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 4

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Netwrix](https://www.g2.com/sellers/netwrix)
- **HQ Location:** Irvine, CA
- **Twitter:** @Netwrix (2,911 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/455932/ (758 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 50% Mid-Market, 25% Small-Business


  ### 15. [PortalProtect for Microsoft SharePoint](https://www.g2.com/products/portalprotect-for-microsoft-sharepoint/reviews)
  Trend Micro PortalProtect secures collaborations with a dedicated layer of protection that guards against malware, malicious links, and other threats that SharePoint administrators are often unaware of. Its web reputation technology blocks malicious links from entering web portals, while its powerful content filtering scans both files and web components of SharePoint.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 2

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 6.7/10 (Category avg: 9.0/10)
- **Encrypted Storage:** 6.7/10 (Category avg: 8.7/10)
- **Breadth of Partner Applications:** 6.7/10 (Category avg: 8.3/10)
- **User, Role, and Access Management:** 6.7/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Trend Micro](https://www.g2.com/sellers/trend-micro)
- **Year Founded:** 1988
- **HQ Location:** Tokyo
- **LinkedIn® Page:** https://www.linkedin.com/company/4312/ (8,090 employees on LinkedIn®)
- **Ownership:** OTCMKTS:TMICY
- **Total Revenue (USD mm):** $1,515

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business


  ### 16. [scanii](https://www.g2.com/products/scanii/reviews)
  Scanii is a simple REST API you can use to identify malware, phishing, NSFW images/language and other dangerous content.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 2

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Uva Software](https://www.g2.com/sellers/uva-software)
- **Year Founded:** 2011
- **HQ Location:** Phoenix, AZ
- **LinkedIn® Page:** https://www.linkedin.com/company/No-Linkedin-Presence-Added-Intentionally-By-DataOps (1 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business


  ### 17. [shareOptic – Cyber Security](https://www.g2.com/products/shareoptic-cyber-security/reviews)
  ShareOptic is a cloud-based cyber security tool that enables user to overcome compliance and data security challenges, it protect users of Google Apps &amp; Microsoft O365 customers by ensuring unauthorised 3rd parties never gain access to data.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 2

**User Satisfaction Scores:**

- **Encrypted Storage:** 10.0/10 (Category avg: 8.7/10)
- **Breadth of Partner Applications:** 8.3/10 (Category avg: 8.3/10)
- **User, Role, and Access Management:** 10.0/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [shareOptic – Cyber Security](https://www.g2.com/sellers/shareoptic-cyber-security)
- **HQ Location:** N/A
- **Twitter:** @shareOptic (20 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/No-Linkedin-Presence-Added-Intentionally-By-DataOps (1 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 50% Enterprise, 50% Small-Business


  ### 18. [Clearedin](https://www.g2.com/products/clearedin/reviews)
  Complete B2B cloud security, compliance and phishing prevention across all popular B2B chat, email, collaboration and file sharing software. This SaaS offering solves the growing and costly enterprise problem of both collaboration and email security. The 2-year-old company based in San Jose, California uniquely addresses application and email security threat vectors by integrating machine learning and AI with a Zero-Trust Inbox and Zero-Trust Collaboration security product. Clearedin delivers the platform’s powerful multi-vector phishing capabilities through the patented Identity Trust Graph. This dynamic and always-learning digital map embodies an organization’s trust relationships with customers, vendors, and partners. The Identity Trust Graph ensures the Clearedin platform delivers the powerful benefits of Zero-Trust Security. A unique innovation, this graph automatically curates organization-specific security trusted and untrusted lists aided by machine-learning insight with zero manual administration or maintenance. The solution integrates directly into the communication and collaboration channels of Microsoft 365 -Outlook/OneDrive/Teams, G-Suite/Gmail/G Drive, Box, Dropbox, and Slack.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 2

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Clearedin](https://www.g2.com/sellers/clearedin)
- **Year Founded:** 2022
- **HQ Location:** Montreal, CA
- **Twitter:** @Clearedin (163 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/81913829 (1 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business


  ### 19. [CloudFish FileSecure](https://www.g2.com/products/cloudfish-filesecure/reviews)
  Cloud-Fish software is optimized for Box, Microsoft OneDrive, Google Drive, and Dropbox for a seamless transfer of data between your systems and the Cloud, as well as, for clients with multiple cloud storage providers.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 1


**Seller Details:**

- **Seller:** [CloudFish](https://www.g2.com/sellers/cloudfish)
- **HQ Location:** N/A
- **Twitter:** @cloudfishent (74 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/No-Linkedin-Presence-Added-Intentionally-By-DataOps (1 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Mid-Market


  ### 20. [LOCKTERA SHARE Secure File Sharing](https://www.g2.com/products/locktera-share-secure-file-sharing/reviews)
  Your Ultimate Solution for Secure File Sharing! In today&#39;s digital landscape, data security is non-negotiable. LOCKTERA SHARE is a cutting-edge platform designed to transform the way you share and store files, ensuring your sensitive information remains confidential and secure. Unparalleled Security for Your Data LOCKTERA SHARE employs quantum-safe encryption and multi-layered security, providing an advanced defense against potential threats. Our platform is designed to protect your data at every step, from creation to collaboration, and ensure it remains secure in the face of emerging technologies. Execution is simple and available for use with any email or message platform. Easy to use steps: Load content files into a proprietary .TERA container file. Assign the level of security. Assign privacy access controls. Designate users for access. Authenticate users prior to access. Quantum-Safe Encryption: Future-proof your data against quantum threats with state-of-the-art encryption technology. Locktera’s proprietary encryption technology is built on a layer utilizing AES 256 encryption and a second layer utilizing post quantum cryptography. Locktera’s encryption technology meets NIST Standards. User-Friendly Interface: Enable advanced security tools without compromising usability. LOCKTERA SHARE seamlessly integrates with your Workflow. Granular Access Controls: Users have precise control over multiple layers of access permissions and can assign them accordingly. Users can efficiently configure security measures appropriate for the application or configure them according to the organization’s compliance Procedures. Viewer Authentication: Viewers must authenticate prior to accessing secure .TERA files. In order to view content, viewers must meet the security requirements configured at each level.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 1


**Seller Details:**

- **Seller:** [Locktera](https://www.g2.com/sellers/locktera)
- **Year Founded:** 2023
- **HQ Location:** Irving, Texas
- **Twitter:** @LockteraSecure (1 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/locktera/ (1 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business


#### Pros & Cons

**Pros:**

- Customer Support (1 reviews)
- Ease of Use (1 reviews)
- Easy Access (1 reviews)
- Easy Integration (1 reviews)
- Easy Sharing (1 reviews)

**Cons:**

- Search Difficulties (1 reviews)

  ### 21. [Proofpoint Cloud Account Defense](https://www.g2.com/products/proofpoint-cloud-account-defense/reviews)
  With Proofpoint Cloud Account Defense (PCAD), you can protect your people and your organization from Microsoft Office 365 account compromise.


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 1

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Proofpoint](https://www.g2.com/sellers/proofpoint)
- **Year Founded:** 2002
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @proofpoint (31,141 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/proofpoint (5,020 employees on LinkedIn®)
- **Ownership:** NASDAQ: PFPT

**Reviewer Demographics:**
  - **Company Size:** 100% Enterprise


  ### 22. [Votiro](https://www.g2.com/products/votiro/reviews)
  Can you trust the files entering your organization? Votiro Cloud&#39;s Zero Trust open-API proactively disarms files of known, unknown, &amp; zero-day malware threats at scale without adding friction, interrupting user or application workflows, or impacting file fidelity. Votiro reduces work, alerts, &amp; risk for IT and security teams while enabling the seamless flow of safe files. Votiro is the market leader in CDR, sanitizing billions of files for global users and applications each year. Votiro has virtually limitless auto-scale capabilities to handle any file throughput with cloud-native technology that connects with existing security. Our open APIs integrate &amp; prevent malicious files uploaded to web apps, portals, data management platforms, or any cloud services used to receive customer files.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 1

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Votiro](https://www.g2.com/sellers/votiro)
- **Year Founded:** 2012
- **HQ Location:** Austin, Texas, United States
- **Twitter:** @Votiro (742 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/votiro (53 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Mid-Market


  ### 23. [EzProtect Virus Protection for Salesforce](https://www.g2.com/products/ezprotect-virus-protection-for-salesforce/reviews)
  EZProtect® is the industry’s leading cloud-based virus scanner for Salesforce. Designed by a Salesforce-certified technical architect, EZProtect scans content in Salesforce Sales Cloud, Service Cloud, and Community Cloud. With EZProtect, users have the ability to scan and monitor multiple Salesforce environments from within our EZProtect User Interface as well as Salesforce. This enables IT professionals to easily view virus scanning activity across all connected Salesforce environments from a single place. One license scans multiple environments, provides centralized reporting, and is accessible inside and outside of Salesforce on both commercial and FedRAMP approved hosting (both commercial and government). EZProtect also provides a solution for Salesforce security audits and SOX Compliance certifications. The company, Adaptus, is based in Austin, TX and focused on customer-driven cybersecurity and business solutions for government and large enterprises. For more information, please visit www.adaptus.com/ezprotect




**Seller Details:**

- **Seller:** [Adaptus](https://www.g2.com/sellers/adaptus)
- **Year Founded:** 2015
- **HQ Location:** Austin, US
- **LinkedIn® Page:** https://www.linkedin.com/company/ezprotect (13 employees on LinkedIn®)



  ### 24. [FinalCode for Box](https://www.g2.com/products/finalcode-for-box/reviews)
  Box provides an intuitive cloud file sharing and collaboration platform with comprehensive file management and governance capabilities. But once sensitive data is obtained by an authorized recipient outside the secure Box container, file protection and accountability are diminished, as are data privacy breach safe harbors.




**Seller Details:**

- **Seller:** [FinalCode](https://www.g2.com/sellers/finalcode)
- **Year Founded:** 2014
- **HQ Location:** San Jose, US
- **Twitter:** @FinalCodeInc (109 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6642932 (1 employees on LinkedIn®)



  ### 25. [Kazoup](https://www.g2.com/products/kazoup/reviews)
  Kazoup ranks your search results so you can find the right information instantly. The data youre working on are always at the top, helping you spend less time searching and more time getting things done. Kazoup works seamlessly with the permissions of your connected accounts, so your search index automatically reflects what you can access.




**Seller Details:**

- **Seller:** [Kazoup](https://www.g2.com/sellers/kazoup)
- **Year Founded:** 2012
- **HQ Location:** London, GB
- **Twitter:** @kazoup (8,527 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2826942 (2 employees on LinkedIn®)





## Parent Category

[Cloud Security Software](https://www.g2.com/categories/cloud-security)



## Related Categories

- [Data Loss Prevention (DLP) Software](https://www.g2.com/categories/data-loss-prevention-dlp)
- [Email Encryption Software](https://www.g2.com/categories/email-encryption)
- [Cloud Data Security Software](https://www.g2.com/categories/cloud-data-security)




---
## Frequently Asked Questions

### How can I assess the scalability of a Cloud File Security solution?

To assess the scalability of a Cloud File Security solution, evaluate user feedback on performance under increased loads, integration capabilities with existing systems, and the ability to manage growing data volumes. Products like Box, Citrix ShareFile, and Egnyte are noted for their robust scalability features, with users highlighting seamless expansion options and effective management of large file transfers. Additionally, consider the vendor&#39;s support for multi-cloud environments and their track record in handling enterprise-level deployments, as indicated by user reviews.



### How can I evaluate the effectiveness of a Cloud File Security solution?

To evaluate the effectiveness of a Cloud File Security solution, consider user ratings and reviews focusing on key features such as data encryption, compliance support, and threat detection capabilities. For instance, products like NetApp Cloud Volumes ONTAP and McAfee MVISION Cloud are noted for their strong encryption features, while products like Microsoft Azure Information Protection excel in compliance support. Additionally, user feedback often highlights the importance of ease of integration and customer support, which can significantly impact overall satisfaction and effectiveness.



### How do Cloud File Security solutions handle compliance with data protection regulations?

Cloud File Security solutions typically address compliance with data protection regulations through features such as encryption, access controls, and audit trails. For instance, products like Box, Citrix ShareFile, and Egnyte emphasize robust security measures that align with GDPR and HIPAA requirements, as noted in user reviews highlighting their compliance capabilities. Additionally, many solutions offer customizable security settings to meet specific regulatory needs, ensuring that organizations can maintain compliance while managing sensitive data effectively.



### How do I measure ROI after implementing a Cloud File Security solution?

To measure ROI after implementing a Cloud File Security solution, track metrics such as reduced data breaches, improved compliance rates, and decreased incident response times. Users report an average reduction in security incidents by 30% and a 25% increase in compliance efficiency. Additionally, consider the cost savings from avoiding potential fines and the value of enhanced data protection, which can lead to increased customer trust and retention. Regularly assess these metrics against the initial investment to quantify the financial benefits.



### How do pricing models vary among Cloud File Security providers?

Pricing models among Cloud File Security providers vary significantly, with options including subscription-based, pay-as-you-go, and tiered pricing structures. For instance, providers like Box and Dropbox Business typically offer subscription plans based on user count and storage needs, while others like Citrix ShareFile may provide tiered pricing based on features and usage levels. Additionally, some vendors, such as Microsoft OneDrive, incorporate their cloud file security features into broader service packages, affecting overall pricing strategies. This diversity allows organizations to choose models that best fit their budget and security requirements.



### How do user experiences differ across popular Cloud File Security platforms?

User experiences across popular Cloud File Security platforms vary significantly. For instance, users rate Microsoft OneDrive highly for its integration with Office 365, achieving an average satisfaction score of 8.5/10, while Box is praised for its robust security features, with a score of 8.2/10. Dropbox, on the other hand, is favored for its user-friendly interface, receiving a score of 8.0/10. Users of Citrix ShareFile appreciate its customization options, reflected in a score of 7.9/10. Overall, satisfaction levels indicate that while all platforms offer solid security, their strengths lie in different areas such as integration, usability, and customization.



### What are common use cases for Cloud File Security in businesses?

Common use cases for Cloud File Security in businesses include protecting sensitive data from unauthorized access, ensuring compliance with data protection regulations, facilitating secure file sharing among remote teams, and preventing data breaches through advanced threat detection. Users frequently highlight the importance of features like encryption, access controls, and audit trails in their reviews, indicating that these functionalities are critical for maintaining data integrity and security in cloud environments.



### What are the key features to look for in Cloud File Security solutions?

Key features to look for in Cloud File Security solutions include robust encryption capabilities, user access controls, data loss prevention (DLP), secure file sharing options, and comprehensive audit trails. Additionally, integration with existing security tools and compliance with industry standards are crucial. Solutions like Box, Dropbox Business, and Microsoft OneDrive for Business are noted for their strong security features, with users highlighting the importance of ease of use and effective threat detection in their reviews.



### What are the most important security protocols in Cloud File Security?

The most important security protocols in Cloud File Security include encryption, which is crucial for protecting data at rest and in transit, and multi-factor authentication (MFA), which enhances access security. Additionally, data loss prevention (DLP) measures are vital for monitoring and controlling data transfers. User reviews highlight the effectiveness of these protocols in products like Box, Citrix ShareFile, and Microsoft OneDrive, where users emphasize the importance of robust encryption standards and MFA in safeguarding sensitive information.



### What are the typical implementation timelines for Cloud File Security software?

Implementation timelines for Cloud File Security software typically range from a few weeks to several months, depending on the complexity of the deployment and the specific product. For instance, products like Box, Citrix ShareFile, and Microsoft OneDrive often report average implementation times of 1-3 months, while solutions such as Egnyte and Dropbox Business may take 2-4 weeks for simpler setups. Factors influencing these timelines include organizational size, existing infrastructure, and user training requirements.



### What integrations should I consider for my existing software stack?

When considering integrations for cloud file security, prioritize compatibility with Microsoft 365, Google Workspace, and Dropbox, as these are frequently mentioned by users for seamless collaboration. Additionally, look for integrations with security tools like Okta for identity management and Splunk for security information and event management, which enhance overall security posture. Other notable integrations include Slack for communication and Salesforce for CRM, ensuring that your security measures align with existing workflows.



### What level of customer support is typically offered by Cloud File Security vendors?

Cloud File Security vendors typically offer a range of customer support options, including 24/7 support, live chat, and dedicated account management. For instance, products like Box, Citrix ShareFile, and Tresorit are noted for their responsive customer service, with users frequently highlighting the availability of knowledgeable support staff. Additionally, many vendors provide extensive online resources such as knowledge bases and community forums, enhancing user experience and satisfaction. Overall, the level of support varies, but many users report positive experiences with timely and effective assistance.




