Introducing G2.ai, the future of software buying.Try now
Vendor Payments by MineralTree
Sponsored
Vendor Payments by MineralTree
Visit Website
Product Avatar Image
Appsian360

By Pathlock

4.0 out of 5 stars
5 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Appsian360?

Vendor Payments by MineralTree
Sponsored
Vendor Payments by MineralTree
Visit Website
It's been two months since this profile received a new review
Leave a Review

Appsian360 Reviews & Product Details

Profile Status

This profile is currently managed by Appsian360 but has limited features.

Are you part of the Appsian360 team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Appsian360 Media

Appsian360 Demo - Appsian 360 screenshot
Real-time ERP data access and usage monitoring. Enable ERP data security and compliance with actionable insights. Featuring a visually rich, easily configurable dashboard, Appsian360 provides detailed insights into who is accessing your data, where they are coming from, why they are accessing ...
Product Avatar Image

Have you used Appsian360 before?

Answer a few questions to help the Appsian360 community

Appsian360 Reviews (1)

Reviews

Appsian360 Reviews (1)

4.0
1 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Sneha J.
SJ
Associate Consultant
Mid-Market (51-1000 emp.)
"Appsian360 - Enhanced ERP data security"
What do you like best about Appsian360?

Appsian369 is a great tool for enhancing the ERP data security. Following are the some of the points that I like,

* helps in monitoring user access and uasages thus providing great data visibilty.

* Customisations are available that helps in creating dashboards that we require.

* It helps in reducing threats as it flags suspicious behaviours.

* Integration with the existing ERP system was an easy task. Review collected by and hosted on G2.com.

What do you dislike about Appsian360?

Some of the things that I thought could have been better are as follows:

* Integration was a bit difficult to use.

* Some features are hard to learn and requires time.

* The cost of the product is a bit high. Review collected by and hosted on G2.com.

There are not enough reviews of Appsian360 for G2 to provide buying insight. Below are some alternatives with more reviews:

1
BetterCloud Logo
BetterCloud
4.4
(477)
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
2
Coro Cybersecurity Logo
Coro Cybersecurity
4.7
(217)
Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.
3
Safetica Logo
Safetica
4.5
(188)
Safetica is an integrated Data Loss Prevention (DLP) and Insider Risk Management (IRM) solution, which helps companies to identify, classify, and protect sensitive data as well as detect, analyze, and mitigate risks posed by insiders within an organization. Safetica covers the following data security solutions: Data Classification - Safetica offers complete data visibility across endpoints, networks, and cloud environments. It classifies sensitive data using its Safetica Unified Classification, which combines analysis of file content, file origin and file properties. Data Loss Prevention - With Safetica, you can protect sensitive business- or customer-related data, source codes, or blueprints from accidental or intentional exposure through instant notifications and policy enforcement. Insider Risk Management - With Safetica, you can analyze insider risks, detect threats, and mitigate them swiftly. Notifications about how to treat sensitive data can help raise awareness around data security and educate your users. - Workspace and behavior analysis provides an extra level of detail to detect internal risks. It also helps understand how employees work, print, and use hardware and software assets, thus enabling organizations to optimize costs and increase operational efficiency. Cloud Data Protection - Safetica can monitor and classify files directly during user operations, such as exports, uploads and downloads, opening files, copying files to a different path, uploading files via web browsers, sending files via email or IM apps, and others. Regulatory compliance - Safetica helps organizations detect violations and comply with key regulations and data protection standards including GDPR, HIPAA, SOX, PCI-DSS, GLBA, ISO/IEC 27001, SOC2 or CCPA.
4
Teramind Logo
Teramind
4.6
(149)
Teramind provides a security approach to monitor behavior and give organizations the opportunity to automate actions to prevent unwanted behavior.
5
Varonis Data Security Platform Logo
Varonis Data Security Platform
4.5
(66)
Data Security platform detects insider threats and cyberattacks by analyzing data, account activity, and user behavior; prevents and limits disaster by locking down sensitive and stale data; and efficiently sustains a secure state with automation.
6
DataPatrol Logo
DataPatrol
4.9
(55)
DataPatrol is a software company, specialized in providing Security and Privacy of company’s data and information in an evolved way. Data security is our topmost concern, therefore DataPatrol provides innovative and user-friendly solutions to secure sensitive and confidential internal data from unauthorized disclosure. Investing with reliable state-of-the-art security measures and tools to prevent sensitive data breach is essential. However, these measures cannot prevent the breach of sensitive data if insiders can take pictures of the computer screens! Taking pictures leaves no log trail that identifies the perpetrator. Our solutions can minimize the risk of internal threats and solve the continuous struggle of protecting all company’s owned data and information.
7
Proofpoint Insider Threat Management Logo
Proofpoint Insider Threat Management
4.3
(48)
Proofpoint Insider Threat Management is a comprehensive security solution designed to detect, investigate, and prevent data loss caused by insiders—whether through negligence, compromise, or malicious intent. By providing real-time visibility into user behavior and data interactions across endpoints, ITM empowers security teams to swiftly identify and mitigate potential threats, thereby safeguarding sensitive information and maintaining organizational integrity. Key Features and Functionality: - User Behavior and Data Activity Monitoring: ITM offers a clear timeline of user actions, including file modifications, unauthorized software usage, and data transfers to unapproved destinations. - Real-Time Detection and Alerts: The system identifies risky behaviors such as uploading sensitive data to unauthorized websites or copying files to cloud sync folders, providing immediate alerts to security teams. - Data Loss Prevention : ITM prevents data exfiltration through common channels like USB devices, cloud sync folders, and web uploads, ensuring sensitive information remains within the organization. - Accelerated Incident Response: With collaborative workflows, user risk reports, and a centralized dashboard, ITM streamlines the investigation process, enabling rapid response to potential threats. - Lightweight Endpoint Agent: The Zen™ endpoint agent deploys silently without impacting system performance, providing continuous monitoring without disrupting user productivity. - Privacy Controls: ITM includes features like identity masking and data anonymization to protect user privacy while maintaining effective security monitoring. Primary Value and Problem Solved: Proofpoint ITM addresses the critical challenge of insider threats by delivering comprehensive visibility into user activities and data movements. By correlating user behavior with data interactions, it enables organizations to detect and respond to potential risks promptly. This proactive approach not only prevents data breaches and intellectual property theft but also ensures compliance with regulatory requirements. Furthermore, ITM's privacy-centric design balances robust security measures with the protection of individual privacy, fostering a secure and trustworthy organizational environment.
8
GAT Labs Logo
GAT Labs
4.8
(39)
GAT labs for Google Workspace and Chrome provide you with thorough all-encompassing auditing and security solutions that enable you to work smarter, safer, and better. Enjoy Real protection and no compromise with granular data you can actually trust and strategically build on. GAT is the most comprehensive audit and security tool out there for Google Workspace Admins and Google Chrome environments. All the answers you need are often buried in there, GAT dives in and brings them up to the surface for you to see the full picture. We created a whole New space, New technology, New Thinking, and New Insights.
9
Incydr Logo
Incydr
4.2
(38)
Code42 Incydr is a data protection solution that prevents data from leak and theft caused by employees – whether malicious, negligent, or accidental. Fast-growing, innovative organizations utilize Incydr to detect and respond to data exposure and exfiltration from corporate computers, cloud, and email systems. Incydr cuts out the noise, identifying the highest-priority risk events so that teams can quickly identify what needs remediation. It deploys in hours and requires few resources to run, empowering security teams to rapidly address material risk to the business and drive secure work habits throughout the employee base.
10
Veriato User Activity Monitoring (UAM) Logo
Veriato User Activity Monitoring (UAM)
4.3
(38)
A solution for temporary focused workplace investigations that records detailed information on employee activity, and enables fast, accurate, and efficient exploration and playback of the recorded data.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Appsian360
View Alternatives