2026 Best Software Awards are here!See the list

Best Cloud File Security Software - Page 3

Lauren Worth
LW
Researched and written by Lauren Worth

Cloud file security software is used to secure information stored within cloud-based (SaaS) applications. These tools integrate with cloud-based tools used to store and share files. Many companies will use cloud file security solutions to identify files containing sensitive or privileged information. Once these files are properly labeled, companies can control access to the files, document their sharing history, and prevent unauthorized parties from access.

These tools can facilitate data security by enforcing policies related to cloud access control and storage. Companies leverage the tools to implement security protocols, monitor access, and protect both information stored within cloud applications and information transferred through cloud applications. Administrators can manage governance, set permissions, and monitor the usage of those accessing the applications. Many cloud security products provide encryption and data loss prevention features to further secure documents and data stored within cloud applications.

To qualify for inclusion in the Cloud File Security category, a product must:

Integrate with SaaS applications and identity directories
Allow administrators to set permissions and control file access
Document interactions with files stored within cloud-based applications or changes to their privileges
Show More
Show Less

Featured Cloud File Security Software At A Glance

Free Plan Available:
Tresorit
Sponsored
Highest Performer:
Easiest to Use:
Show LessShow More
Highest Performer:
Easiest to Use:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
58 Listings in Cloud File Security Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    From the endpoint, Threat Defense for AD effectively controls the attacker’s perception of the organization’s internal resources—all endpoints, servers, users, applications, and locally stored credent

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 50% Enterprise
    • 38% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Endpoint Threat Defense for Active Directory features and usability ratings that predict user satisfaction
    8.1
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Encrypted Storage
    Average: 8.7
    9.2
    Breadth of Partner Applications
    Average: 8.3
    9.2
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    62,316 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    55,707 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

From the endpoint, Threat Defense for AD effectively controls the attacker’s perception of the organization’s internal resources—all endpoints, servers, users, applications, and locally stored credent

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 50% Enterprise
  • 38% Mid-Market
Symantec Endpoint Threat Defense for Active Directory features and usability ratings that predict user satisfaction
8.1
Has the product been a good partner in doing business?
Average: 9.0
8.8
Encrypted Storage
Average: 8.7
9.2
Breadth of Partner Applications
Average: 8.3
9.2
User, Role, and Access Management
Average: 9.0
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
62,316 Twitter followers
LinkedIn® Page
www.linkedin.com
55,707 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Datto NAS is a smart, scalable network attached storage platform, centrally managed and protected by the secure Datto Cloud. Easily share files and folders on the local network and replicate NAS snaps

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Datto NAS features and usability ratings that predict user satisfaction
    7.9
    Has the product been a good partner in doing business?
    Average: 9.0
    9.4
    Encrypted Storage
    Average: 8.7
    5.6
    Breadth of Partner Applications
    Average: 8.3
    9.4
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,444 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,512 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Datto NAS is a smart, scalable network attached storage platform, centrally managed and protected by the secure Datto Cloud. Easily share files and folders on the local network and replicate NAS snaps

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Datto NAS features and usability ratings that predict user satisfaction
7.9
Has the product been a good partner in doing business?
Average: 9.0
9.4
Encrypted Storage
Average: 8.7
5.6
Breadth of Partner Applications
Average: 8.3
9.4
User, Role, and Access Management
Average: 9.0
Seller Details
Seller
Kaseya
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,444 Twitter followers
LinkedIn® Page
www.linkedin.com
5,512 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Akku is an Identity and Access Management (IAM) solution that is packed with features including single sign-on, password policy enforcement, IP- and device-based restrictions, multi-factor authenticat

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Akku features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Encrypted Storage
    Average: 8.7
    8.3
    Breadth of Partner Applications
    Average: 8.3
    10.0
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Rock Hill, South Carolina
    Twitter
    @CloudNowTech
    299 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    94 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Akku is an Identity and Access Management (IAM) solution that is packed with features including single sign-on, password policy enforcement, IP- and device-based restrictions, multi-factor authenticat

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 40% Small-Business
Akku features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
8.3
Encrypted Storage
Average: 8.7
8.3
Breadth of Partner Applications
Average: 8.3
10.0
User, Role, and Access Management
Average: 9.0
Seller Details
Year Founded
2014
HQ Location
Rock Hill, South Carolina
Twitter
@CloudNowTech
299 Twitter followers
LinkedIn® Page
www.linkedin.com
94 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloud solution for detecting and identifying critical changes, incidents, and risks resulting from normal and malicious events

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Enterprise
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Qualys FIM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Dashboard Usability
    1
    Deployment Ease
    1
    Ease of Use
    1
    Monitoring
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Qualys FIM features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    9.4
    Encrypted Storage
    Average: 8.7
    9.2
    Breadth of Partner Applications
    Average: 8.3
    8.3
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Qualys
    Year Founded
    1999
    HQ Location
    Foster City, CA
    Twitter
    @qualys
    34,157 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,393 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cloud solution for detecting and identifying critical changes, incidents, and risks resulting from normal and malicious events

Users
No information available
Industries
No information available
Market Segment
  • 80% Enterprise
  • 20% Mid-Market
Qualys FIM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Dashboard Usability
1
Deployment Ease
1
Ease of Use
1
Monitoring
1
Cons
This product has not yet received any negative sentiments.
Qualys FIM features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
9.4
Encrypted Storage
Average: 8.7
9.2
Breadth of Partner Applications
Average: 8.3
8.3
User, Role, and Access Management
Average: 9.0
Seller Details
Seller
Qualys
Year Founded
1999
HQ Location
Foster City, CA
Twitter
@qualys
34,157 Twitter followers
LinkedIn® Page
www.linkedin.com
3,393 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Seclore helps enterprises secure their most valuable asset — data — by protecting the file itself rather than relying solely on network or device security. With a data-centric approach, Seclore ensure

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Enterprise
    • 47% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Seclore Data-Centric Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Protection
    3
    Security
    3
    Data Protection
    2
    Data Security
    2
    Ease of Use
    2
    Cons
    Access Issues
    1
    Access Limitations
    1
    Access Management
    1
    Access Restrictions
    1
    Authentication Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Seclore Data-Centric Security Platform features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Encrypted Storage
    Average: 8.7
    10.0
    Breadth of Partner Applications
    Average: 8.3
    10.0
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Seclore
    Year Founded
    2011
    HQ Location
    Santa Clara, US
    Twitter
    @secloretech
    1,287 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    478 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Seclore helps enterprises secure their most valuable asset — data — by protecting the file itself rather than relying solely on network or device security. With a data-centric approach, Seclore ensure

Users
No information available
Industries
No information available
Market Segment
  • 53% Enterprise
  • 47% Mid-Market
Seclore Data-Centric Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Protection
3
Security
3
Data Protection
2
Data Security
2
Ease of Use
2
Cons
Access Issues
1
Access Limitations
1
Access Management
1
Access Restrictions
1
Authentication Issues
1
Seclore Data-Centric Security Platform features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.0
10.0
Encrypted Storage
Average: 8.7
10.0
Breadth of Partner Applications
Average: 8.3
10.0
User, Role, and Access Management
Average: 9.0
Seller Details
Seller
Seclore
Year Founded
2011
HQ Location
Santa Clara, US
Twitter
@secloretech
1,287 Twitter followers
LinkedIn® Page
www.linkedin.com
478 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudRunner makes it easy to have enterprise level security, the convenience of single sign-on, user identity management, and account provisioning for all your cloud-based apps all in one place.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Enterprise
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudRunner features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Encrypted Storage
    Average: 8.7
    8.3
    Breadth of Partner Applications
    Average: 8.3
    6.7
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    InsynQ
    Year Founded
    1997
    HQ Location
    Gig Harbor, US
    Twitter
    @summit_hosting
    214 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudRunner makes it easy to have enterprise level security, the convenience of single sign-on, user identity management, and account provisioning for all your cloud-based apps all in one place.

Users
No information available
Industries
No information available
Market Segment
  • 40% Enterprise
  • 40% Small-Business
CloudRunner features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
10.0
Encrypted Storage
Average: 8.7
8.3
Breadth of Partner Applications
Average: 8.3
6.7
User, Role, and Access Management
Average: 9.0
Seller Details
Seller
InsynQ
Year Founded
1997
HQ Location
Gig Harbor, US
Twitter
@summit_hosting
214 Twitter followers
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At DropSecure, it is our mission to empower you with technology that protects your digital valuables in a hassle-free manner. DropSecure protects your privacy and safeguards your data using military-g

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DropSecure features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Encrypted Storage
    Average: 8.7
    0.0
    No information available
    8.3
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    San Jose, US
    Twitter
    @drop_secure
    15 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At DropSecure, it is our mission to empower you with technology that protects your digital valuables in a hassle-free manner. DropSecure protects your privacy and safeguards your data using military-g

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
DropSecure features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
8.3
Encrypted Storage
Average: 8.7
0.0
No information available
8.3
User, Role, and Access Management
Average: 9.0
Seller Details
Year Founded
2016
HQ Location
San Jose, US
Twitter
@drop_secure
15 Twitter followers
LinkedIn® Page
www.linkedin.com
8 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Netwrix Threat Manager (formerly StealthDEFEND) detects and responds in real-time to advanced cyberattacks, providing an additional layer of security around your identities and data. Leveraging unsupe

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Netwrix Threat Manager features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Netwrix
    HQ Location
    Irvine, CA
    Twitter
    @Netwrix
    2,921 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    755 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Netwrix Threat Manager (formerly StealthDEFEND) detects and responds in real-time to advanced cyberattacks, providing an additional layer of security around your identities and data. Leveraging unsupe

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 25% Small-Business
Netwrix Threat Manager features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Netwrix
HQ Location
Irvine, CA
Twitter
@Netwrix
2,921 Twitter followers
LinkedIn® Page
www.linkedin.com
755 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trend Micro PortalProtect secures collaborations with a dedicated layer of protection that guards against malware, malicious links, and other threats that SharePoint administrators are often unaware o

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PortalProtect for Microsoft SharePoint features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.0
    6.7
    Encrypted Storage
    Average: 8.7
    6.7
    Breadth of Partner Applications
    Average: 8.3
    6.7
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    LinkedIn® Page
    www.linkedin.com
    7,862 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
    Total Revenue (USD mm)
    $1,515
Product Description
How are these determined?Information
This description is provided by the seller.

Trend Micro PortalProtect secures collaborations with a dedicated layer of protection that guards against malware, malicious links, and other threats that SharePoint administrators are often unaware o

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
PortalProtect for Microsoft SharePoint features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.0
6.7
Encrypted Storage
Average: 8.7
6.7
Breadth of Partner Applications
Average: 8.3
6.7
User, Role, and Access Management
Average: 9.0
Seller Details
Year Founded
1988
HQ Location
Tokyo
LinkedIn® Page
www.linkedin.com
7,862 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
Total Revenue (USD mm)
$1,515
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Scanii is a simple REST API you can use to identify malware, phishing, NSFW images/language and other dangerous content.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • scanii features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Phoenix, AZ
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Scanii is a simple REST API you can use to identify malware, phishing, NSFW images/language and other dangerous content.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
scanii features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2011
HQ Location
Phoenix, AZ
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ShareOptic is a cloud-based cyber security tool that enables user to overcome compliance and data security challenges, it protect users of Google Apps & Microsoft O365 customers by ensuring unauth

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • shareOptic – Cyber Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Encrypted Storage
    Average: 8.7
    8.3
    Breadth of Partner Applications
    Average: 8.3
    10.0
    User, Role, and Access Management
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    Twitter
    @shareOptic
    21 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ShareOptic is a cloud-based cyber security tool that enables user to overcome compliance and data security challenges, it protect users of Google Apps & Microsoft O365 customers by ensuring unauth

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
shareOptic – Cyber Security features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Encrypted Storage
Average: 8.7
8.3
Breadth of Partner Applications
Average: 8.3
10.0
User, Role, and Access Management
Average: 9.0
Seller Details
HQ Location
N/A
Twitter
@shareOptic
21 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Complete B2B cloud security, compliance and phishing prevention across all popular B2B chat, email, collaboration and file sharing software. This SaaS offering solves the growing and costly enterprise

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Clearedin features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Clearedin
    Year Founded
    2022
    HQ Location
    Montreal, CA
    Twitter
    @Clearedin
    165 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Complete B2B cloud security, compliance and phishing prevention across all popular B2B chat, email, collaboration and file sharing software. This SaaS offering solves the growing and costly enterprise

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Clearedin features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Clearedin
Year Founded
2022
HQ Location
Montreal, CA
Twitter
@Clearedin
165 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloud-Fish software is optimized for Box, Microsoft OneDrive, Google Drive, and Dropbox for a seamless transfer of data between your systems and the Cloud, as well as, for clients with multiple cloud

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudFish FileSecure features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CloudFish
    Twitter
    @cloudfishent
    77 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cloud-Fish software is optimized for Box, Microsoft OneDrive, Google Drive, and Dropbox for a seamless transfer of data between your systems and the Cloud, as well as, for clients with multiple cloud

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
CloudFish FileSecure features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
CloudFish
Twitter
@cloudfishent
77 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Your Ultimate Solution for Secure File Sharing! In today's digital landscape, data security is non-negotiable. LOCKTERA SHARE is a cutting-edge platform designed to transform the way you share and st

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • LOCKTERA SHARE Secure File Sharing Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Ease of Use
    1
    Easy Access
    1
    Easy Integration
    1
    Easy Sharing
    1
    Cons
    Search Difficulties
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LOCKTERA SHARE Secure File Sharing features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Locktera
    Year Founded
    2023
    HQ Location
    Irving, Texas
    Twitter
    @LockteraSecure
    1 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Your Ultimate Solution for Secure File Sharing! In today's digital landscape, data security is non-negotiable. LOCKTERA SHARE is a cutting-edge platform designed to transform the way you share and st

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
LOCKTERA SHARE Secure File Sharing Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Ease of Use
1
Easy Access
1
Easy Integration
1
Easy Sharing
1
Cons
Search Difficulties
1
LOCKTERA SHARE Secure File Sharing features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Locktera
Year Founded
2023
HQ Location
Irving, Texas
Twitter
@LockteraSecure
1 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With Proofpoint Cloud Account Defense (PCAD), you can protect your people and your organization from Microsoft Office 365 account compromise.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Cloud Account Defense features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    31,080 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,020 employees on LinkedIn®
    Ownership
    NASDAQ: PFPT
Product Description
How are these determined?Information
This description is provided by the seller.

With Proofpoint Cloud Account Defense (PCAD), you can protect your people and your organization from Microsoft Office 365 account compromise.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Proofpoint Cloud Account Defense features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
31,080 Twitter followers
LinkedIn® Page
www.linkedin.com
5,020 employees on LinkedIn®
Ownership
NASDAQ: PFPT