Introducing G2.ai, the future of software buying.Try now

Best Cloud File Security Software - Page 3

Lauren Worth
LW
Researched and written by Lauren Worth

Cloud file security software is used to secure information stored within cloud-based (SaaS) applications. These tools integrate with cloud-based tools used to store and share files. Many companies will use cloud file security solutions to identify files containing sensitive or privileged information. Once these files are properly labeled, companies can control access to the files, document their sharing history, and prevent unauthorized parties from access.

These tools can facilitate data security by enforcing policies related to cloud access control and storage. Companies leverage the tools to implement security protocols, monitor access, and protect both information stored within cloud applications and information transferred through cloud applications. Administrators can manage governance, set permissions, and monitor the usage of those accessing the applications. Many cloud security products provide encryption and data loss prevention features to further secure documents and data stored within cloud applications.

To qualify for inclusion in the Cloud File Security category, a product must:

Integrate with SaaS applications and identity directories
Allow administrators to set permissions and control file access
Document interactions with files stored within cloud-based applications or changes to their privileges
Show More
Show Less

Featured Cloud File Security Software At A Glance

Free Plan Available:
Safetica
Sponsored
Highest Performer:
Easiest to Use:
Show LessShow More
Highest Performer:
Easiest to Use:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Cloud File Security Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
59 Listings in Cloud File Security Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Datto NAS is a smart, scalable network attached storage platform, centrally managed and protected by the secure Datto Cloud. Easily share files and folders on the local network and replicate NAS snaps

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Datto NAS features and usability ratings that predict user satisfaction
    7.9
    Has the product been a good partner in doing business?
    Average: 9.0
    9.4
    Encrypted Storage
    Average: 8.7
    5.6
    Breadth of Partner Applications
    Average: 8.3
    9.4
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,487 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,388 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Datto NAS is a smart, scalable network attached storage platform, centrally managed and protected by the secure Datto Cloud. Easily share files and folders on the local network and replicate NAS snaps

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Datto NAS features and usability ratings that predict user satisfaction
7.9
Has the product been a good partner in doing business?
Average: 9.0
9.4
Encrypted Storage
Average: 8.7
5.6
Breadth of Partner Applications
Average: 8.3
9.4
User, Role, and Access Management
Average: 9.0
Seller Details
Seller
Kaseya
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,487 Twitter followers
LinkedIn® Page
www.linkedin.com
5,388 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Akku is an Identity and Access Management (IAM) solution that is packed with features including single sign-on, password policy enforcement, IP- and device-based restrictions, multi-factor authenticat

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Akku features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Encrypted Storage
    Average: 8.7
    8.3
    Breadth of Partner Applications
    Average: 8.3
    10.0
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Rock Hill, South Carolina
    Twitter
    @CloudNowTech
    300 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    93 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Akku is an Identity and Access Management (IAM) solution that is packed with features including single sign-on, password policy enforcement, IP- and device-based restrictions, multi-factor authenticat

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 40% Small-Business
Akku features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
8.3
Encrypted Storage
Average: 8.7
8.3
Breadth of Partner Applications
Average: 8.3
10.0
User, Role, and Access Management
Average: 9.0
Seller Details
Year Founded
2014
HQ Location
Rock Hill, South Carolina
Twitter
@CloudNowTech
300 Twitter followers
LinkedIn® Page
www.linkedin.com
93 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloud solution for detecting and identifying critical changes, incidents, and risks resulting from normal and malicious events

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Enterprise
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Qualys FIM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Dashboard Usability
    1
    Deployment Ease
    1
    Ease of Use
    1
    Monitoring
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Qualys FIM features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    9.4
    Encrypted Storage
    Average: 8.7
    9.2
    Breadth of Partner Applications
    Average: 8.3
    8.3
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Qualys
    Year Founded
    1999
    HQ Location
    Foster City, CA
    Twitter
    @qualys
    34,180 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,393 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cloud solution for detecting and identifying critical changes, incidents, and risks resulting from normal and malicious events

Users
No information available
Industries
No information available
Market Segment
  • 80% Enterprise
  • 20% Mid-Market
Qualys FIM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Dashboard Usability
1
Deployment Ease
1
Ease of Use
1
Monitoring
1
Cons
This product has not yet received any negative sentiments.
Qualys FIM features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
9.4
Encrypted Storage
Average: 8.7
9.2
Breadth of Partner Applications
Average: 8.3
8.3
User, Role, and Access Management
Average: 9.0
Seller Details
Seller
Qualys
Year Founded
1999
HQ Location
Foster City, CA
Twitter
@qualys
34,180 Twitter followers
LinkedIn® Page
www.linkedin.com
3,393 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    We work with Governments, Enterprises, and SMBs around the globe, to keep regulated and commercially sensitive data safe. Our patented, Secure Data Sharing Platform (SDSP) allows users to collaborate,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Small-Business
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cocoon Data Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Security
    3
    Access Management
    1
    Adaptability
    1
    Collaboration Focus
    1
    Cons
    Learning Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cocoon Data features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Arlington, US
    LinkedIn® Page
    www.linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

We work with Governments, Enterprises, and SMBs around the globe, to keep regulated and commercially sensitive data safe. Our patented, Secure Data Sharing Platform (SDSP) allows users to collaborate,

Users
No information available
Industries
No information available
Market Segment
  • 45% Small-Business
  • 36% Enterprise
Cocoon Data Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Security
3
Access Management
1
Adaptability
1
Collaboration Focus
1
Cons
Learning Difficulty
1
Cocoon Data features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Arlington, US
LinkedIn® Page
www.linkedin.com
19 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Syskit Point is an all-in-one platform for Microsoft 365 governance, management, and reporting designed to help organizations streamline IT management. It addresses critical challenges such as oversha

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 52% Mid-Market
    • 24% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Syskit Point Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Features
    6
    Access Control
    4
    Customer Support
    4
    Team Collaboration
    4
    Cons
    Expensive
    4
    Pricing Issues
    3
    Cost
    2
    Access Issues
    1
    Access Limitations
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Syskit Point features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Encrypted Storage
    Average: 8.7
    10.0
    Breadth of Partner Applications
    Average: 8.3
    10.0
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Syskit
    Company Website
    Year Founded
    2009
    HQ Location
    Elsworth, Cambridge, GB
    Twitter
    @syskitteam
    630 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    74 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Syskit Point is an all-in-one platform for Microsoft 365 governance, management, and reporting designed to help organizations streamline IT management. It addresses critical challenges such as oversha

Users
No information available
Industries
No information available
Market Segment
  • 52% Mid-Market
  • 24% Enterprise
Syskit Point Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Features
6
Access Control
4
Customer Support
4
Team Collaboration
4
Cons
Expensive
4
Pricing Issues
3
Cost
2
Access Issues
1
Access Limitations
1
Syskit Point features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
10.0
Encrypted Storage
Average: 8.7
10.0
Breadth of Partner Applications
Average: 8.3
10.0
User, Role, and Access Management
Average: 9.0
Seller Details
Seller
Syskit
Company Website
Year Founded
2009
HQ Location
Elsworth, Cambridge, GB
Twitter
@syskitteam
630 Twitter followers
LinkedIn® Page
www.linkedin.com
74 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Seclore helps enterprises secure their most valuable asset — data — by protecting the file itself rather than relying solely on network or device security. With a data-centric approach, Seclore ensure

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Enterprise
    • 47% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Seclore Data-Centric Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Protection
    3
    Security
    3
    Data Protection
    2
    Data Security
    2
    Ease of Use
    2
    Cons
    Access Issues
    1
    Access Limitations
    1
    Access Management
    1
    Access Restrictions
    1
    Authentication Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Seclore Data-Centric Security Platform features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Encrypted Storage
    Average: 8.7
    10.0
    Breadth of Partner Applications
    Average: 8.3
    10.0
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Seclore
    Year Founded
    2011
    HQ Location
    Santa Clara, US
    Twitter
    @secloretech
    1,293 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    467 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Seclore helps enterprises secure their most valuable asset — data — by protecting the file itself rather than relying solely on network or device security. With a data-centric approach, Seclore ensure

Users
No information available
Industries
No information available
Market Segment
  • 53% Enterprise
  • 47% Mid-Market
Seclore Data-Centric Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Protection
3
Security
3
Data Protection
2
Data Security
2
Ease of Use
2
Cons
Access Issues
1
Access Limitations
1
Access Management
1
Access Restrictions
1
Authentication Issues
1
Seclore Data-Centric Security Platform features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.0
10.0
Encrypted Storage
Average: 8.7
10.0
Breadth of Partner Applications
Average: 8.3
10.0
User, Role, and Access Management
Average: 9.0
Seller Details
Seller
Seclore
Year Founded
2011
HQ Location
Santa Clara, US
Twitter
@secloretech
1,293 Twitter followers
LinkedIn® Page
www.linkedin.com
467 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudRunner makes it easy to have enterprise level security, the convenience of single sign-on, user identity management, and account provisioning for all your cloud-based apps all in one place.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Enterprise
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudRunner features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Encrypted Storage
    Average: 8.7
    8.3
    Breadth of Partner Applications
    Average: 8.3
    6.7
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    InsynQ
    Year Founded
    1997
    HQ Location
    Gig Harbor, US
    Twitter
    @summit_hosting
    214 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudRunner makes it easy to have enterprise level security, the convenience of single sign-on, user identity management, and account provisioning for all your cloud-based apps all in one place.

Users
No information available
Industries
No information available
Market Segment
  • 40% Enterprise
  • 40% Small-Business
CloudRunner features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
10.0
Encrypted Storage
Average: 8.7
8.3
Breadth of Partner Applications
Average: 8.3
6.7
User, Role, and Access Management
Average: 9.0
Seller Details
Seller
InsynQ
Year Founded
1997
HQ Location
Gig Harbor, US
Twitter
@summit_hosting
214 Twitter followers
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At DropSecure, it is our mission to empower you with technology that protects your digital valuables in a hassle-free manner. DropSecure protects your privacy and safeguards your data using military-g

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DropSecure features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Encrypted Storage
    Average: 8.7
    0.0
    No information available
    8.3
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    San Jose, US
    Twitter
    @drop_secure
    15 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At DropSecure, it is our mission to empower you with technology that protects your digital valuables in a hassle-free manner. DropSecure protects your privacy and safeguards your data using military-g

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
DropSecure features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
8.3
Encrypted Storage
Average: 8.7
0.0
No information available
8.3
User, Role, and Access Management
Average: 9.0
Seller Details
Year Founded
2016
HQ Location
San Jose, US
Twitter
@drop_secure
15 Twitter followers
LinkedIn® Page
www.linkedin.com
8 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Netwrix Threat Manager (formerly StealthDEFEND) detects and responds in real-time to advanced cyberattacks, providing an additional layer of security around your identities and data. Leveraging unsupe

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 25% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Netwrix Threat Manager features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Netwrix
    HQ Location
    Irvine, CA
    Twitter
    @Netwrix
    2,925 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    708 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Netwrix Threat Manager (formerly StealthDEFEND) detects and responds in real-time to advanced cyberattacks, providing an additional layer of security around your identities and data. Leveraging unsupe

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 25% Enterprise
Netwrix Threat Manager features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Netwrix
HQ Location
Irvine, CA
Twitter
@Netwrix
2,925 Twitter followers
LinkedIn® Page
www.linkedin.com
708 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trend Micro PortalProtect secures collaborations with a dedicated layer of protection that guards against malware, malicious links, and other threats that SharePoint administrators are often unaware o

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PortalProtect for Microsoft SharePoint features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.0
    6.7
    Encrypted Storage
    Average: 8.7
    6.7
    Breadth of Partner Applications
    Average: 8.3
    6.7
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    111,977 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,862 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Trend Micro PortalProtect secures collaborations with a dedicated layer of protection that guards against malware, malicious links, and other threats that SharePoint administrators are often unaware o

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
PortalProtect for Microsoft SharePoint features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.0
6.7
Encrypted Storage
Average: 8.7
6.7
Breadth of Partner Applications
Average: 8.3
6.7
User, Role, and Access Management
Average: 9.0
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
111,977 Twitter followers
LinkedIn® Page
www.linkedin.com
7,862 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Scanii is a simple REST API you can use to identify malware, phishing, NSFW images/language and other dangerous content.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • scanii features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Phoenix, AZ
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Scanii is a simple REST API you can use to identify malware, phishing, NSFW images/language and other dangerous content.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
scanii features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2011
HQ Location
Phoenix, AZ
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ShareOptic is a cloud-based cyber security tool that enables user to overcome compliance and data security challenges, it protect users of Google Apps & Microsoft O365 customers by ensuring unauth

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • shareOptic – Cyber Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Encrypted Storage
    Average: 8.7
    8.3
    Breadth of Partner Applications
    Average: 8.3
    10.0
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    Twitter
    @shareOptic
    21 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ShareOptic is a cloud-based cyber security tool that enables user to overcome compliance and data security challenges, it protect users of Google Apps & Microsoft O365 customers by ensuring unauth

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
shareOptic – Cyber Security features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Encrypted Storage
Average: 8.7
8.3
Breadth of Partner Applications
Average: 8.3
10.0
User, Role, and Access Management
Average: 9.0
Seller Details
HQ Location
N/A
Twitter
@shareOptic
21 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Complete B2B cloud security, compliance and phishing prevention across all popular B2B chat, email, collaboration and file sharing software. This SaaS offering solves the growing and costly enterprise

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Clearedin features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Clearedin
    Year Founded
    2022
    HQ Location
    Montreal, CA
    Twitter
    @Clearedin
    165 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Complete B2B cloud security, compliance and phishing prevention across all popular B2B chat, email, collaboration and file sharing software. This SaaS offering solves the growing and costly enterprise

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Clearedin features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Clearedin
Year Founded
2022
HQ Location
Montreal, CA
Twitter
@Clearedin
165 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloud-Fish software is optimized for Box, Microsoft OneDrive, Google Drive, and Dropbox for a seamless transfer of data between your systems and the Cloud, as well as, for clients with multiple cloud

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudFish FileSecure features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CloudFish
    Twitter
    @cloudfishent
    77 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cloud-Fish software is optimized for Box, Microsoft OneDrive, Google Drive, and Dropbox for a seamless transfer of data between your systems and the Cloud, as well as, for clients with multiple cloud

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
CloudFish FileSecure features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
CloudFish
Twitter
@cloudfishent
77 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Your Ultimate Solution for Secure File Sharing! In today's digital landscape, data security is non-negotiable. LOCKTERA SHARE is a cutting-edge platform designed to transform the way you share and st

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • LOCKTERA SHARE Secure File Sharing Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Ease of Use
    1
    Easy Access
    1
    Easy Integration
    1
    Easy Sharing
    1
    Cons
    Search Difficulties
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LOCKTERA SHARE Secure File Sharing features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Locktera
    Year Founded
    2023
    HQ Location
    Irving, Texas
    Twitter
    @LockteraSecure
    1 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Your Ultimate Solution for Secure File Sharing! In today's digital landscape, data security is non-negotiable. LOCKTERA SHARE is a cutting-edge platform designed to transform the way you share and st

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
LOCKTERA SHARE Secure File Sharing Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Ease of Use
1
Easy Access
1
Easy Integration
1
Easy Sharing
1
Cons
Search Difficulties
1
LOCKTERA SHARE Secure File Sharing features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Locktera
Year Founded
2023
HQ Location
Irving, Texas
Twitter
@LockteraSecure
1 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®

Frequently asked questions about Cloud File Security Software

Generated using AI