Kiteworks Features
File Management (5)
Device Syncing
Provides functionality that manages file syncing between both PC and Mobile devices to ensure files are up to date no matter who or what device they are updated on This feature was mentioned in 18 Kiteworks reviews.
Web Interface
Ability to access documents via a web interface without a client being installed on a device 18 reviewers of Kiteworks have provided feedback on this feature.
File Type Support
Supports all required file types including but not limited to: Google Docs, MS Office, images, videos, etc. 18 reviewers of Kiteworks have provided feedback on this feature.
Search
Based on 18 Kiteworks reviews. Can easily find files via a simple and/or advanced search
Mobile Apps
iOS, Android and Windows phone apps provide functionality that enable user to perform same functions as they would on a PC This feature was mentioned in 17 Kiteworks reviews.
Collaboration (4)
File following
Allows users to receive updates when files have been updated, added, deleted or moved. This feature was mentioned in 18 Kiteworks reviews.
File Sharing
Allows users to share individual files/folders to persons outside or inside organization. Ability to assign edit or view only privileges. This feature was mentioned in 21 Kiteworks reviews.
Simultaneously Editing
Based on 16 Kiteworks reviews. Users can work simultaneously on files.
Change Tracking / Audit Logs
Based on 16 Kiteworks reviews. Provides an audit log of changes and enables users to revert to a specific version
Administration (10)
User and Role Management
As reported in 19 Kiteworks reviews. Enables administrator to provide segmented access to tool based on role. Easy to create new users and remove users.
Policies and Controls
As reported in 21 Kiteworks reviews. Ability to control by user/group file/folder access, external sharing permissions, editing policies, device location restrictions, sharing by device, etc.
Device Management
As reported in 17 Kiteworks reviews. Admins can restrict access to files by device in the event of lost/stolen devices as well as users that no long work for organization. Also may provide ability to wipe files from devices remotely.
Storage Limits
As reported in 18 Kiteworks reviews. Administer storage limits by user or group
Storage Zones
Choose data center your files should be stored at 16 reviewers of Kiteworks have provided feedback on this feature.
Security
Stores and transfers files in secure environment 21 reviewers of Kiteworks have provided feedback on this feature.
User, Role, and Access Management
Grant access to select data, features, objects, etc. based on the users, user role, groups, etc.
Policies and Controls
Ability to control file/folder access by user or group, external sharing permissions, editing policies, device location restrictions, sharing by device, etc.
Security
Abilities to set standards for asset and risk management.
Reporting
Provides ability to create the reports that meet your business requirements
Platform (4)
Performance and Reliability
Software is consistently available (up-time) and allows users to complete tasks quickly because they are not waiting for the software to respond to an action they took.
Reporting and Auditing
Access pre-built and custom reports to monitor user activity and storage
System of Record Integration
Integrates to systems other systems of record such as CRM, ERP, Outlook, Sharepoint
APIs
Enables custom integration to external systems
Monitoring (3)
Digital Media Monitoring
Helps manage ad messaging and ensure standards within digital advertising campaigns.
Compliance Monitoring
Contains compliance monitoring for content and/or site layout.
Social Media Monitoring
Logs social media activity, ensuring subject matter is relevant to company goals.
Standards (4)
Brand Design Consistency
Monitors brand assets to ensure content is consistent with the design of the site.
SEO Standards
Pagination, page headers and titles, meta tags and URL structure all contribute well to site SEO.
Internationalization
Allows organizations multi-national organizations to use tool effectively across multiple languages and currencies.
Web Accessibility
Ensures availability of accessibility tools and provides information on how individuals are using accommodation tools to interact with the site
Data Delivery (4)
Load Balancing
Monitors traffic and distribute resources and scales infrastructure workloads to match traffic.
Application Integration
Allows files and data to integrate directly into applications using APIs.
File Transfer Acceleration
Provides scalable administrative controls over file transfer speeds.
Content Routing
Routing of static and dynamic content for faster delivery of desired files.
Functionality (18)
Mobile Support
Supports accessability through differing operating systems and mobile devices
Encryption
Protects data with within and as it leaves your secure or local network. 10 reviewers of Kiteworks have provided feedback on this feature.
Extensibility
Provides the ability to extend the platform to include additional features and functionalities
Reporting and Analytics
Tools to visualize and analyze data.
File Transfer
Allows file transfer between remote computers over a network.
Language Support
Supports Unicode i.e. Is available in multiple languages.
File Backup
Allows backup of huge files.
Mobile Support
Supports accessability through differing operating systems and mobile devices.
Anti-Spam
Prevents unwanted emails including bulk, mass, or other junk emails from reaching recipients mailboxes.
Anti-Malware
Prevents emails with malicious links or attachments embedded with malware, such as ransomware, spyware, and other viruses, from reaching email recipients.
Anti-Phishing
prevent social-engineering attacks such as phishing, spear-phishing, and c-level executive impersonation attacks.
Filtering Functionality
Provides filters such as: approved senders, whitelists, greylists such as bulk emails that may not be malicious, blocked senders, blacklists, IP reputation, content (such as profanity, credit card numbers, password protected files, and other sensitive information), virus detection, re-directs and malicious URLs, newsletter detection, attachment size, and invalid recipients.
Quarantine
Includes a quarantine area for users to manually inspect suspicious emails.
Outbound Email Monitoring
Monitors outgoing mail to prevent data loss by encrypting messages or preventing the messages from being sent.
Advanced Threat Intelligence/Protection
Includes advanced threat protections such as machine learning to conduct abnormal behavioral analysis, display name spoof detection especially regarding c-level impersonation attacks, detecting lookalike email domains that are visually confusing.
Archiving
Offers archival email retention for compliance purposes.
Reporting
Offers standard reporting functionality.
On-prem deployment
Supports on-premises deployments of secure email gateways, which requires a company to maintain their own hardware. This is different than Cloud Email Security software which protects cloud-based email environments and do not require on-premises hardware installations.
Governance (3)
Access Control
Supports LDAP Protocol to enable access control and governance. This feature was mentioned in 10 Kiteworks reviews.
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Provisioning and Governance
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
Data Protection (7)
Sensitive Data Discovery
Includes funcationality to automatically discover and classify sensitive and other defined data.
Structured and Unstructured Data
Can protect both structured and unstructured data using automated discovery tools.
Encryption
Includes encryption methods to protect data.
Persistent Protection
Protects data at rest, in transit, and in use.
Data Masking
Provides data masking functionality that hides specific data within a dataset based on the data's specific use policies.
Data Governance and Access Management
Provides policies and access controls to ensure the data is only handled by permisssioned users and processes.
Audit and Reporting
Includes audit and reporting functions to know exactly what actions have been taken on data, such as who has accessed it and when.
Compliance (2)
At-Risk Analysis
Uses machine learning to identify at-risk data.
DLP Configuration
Offers data loss prevention tools to protect data from leaving the environments it is allowed to.
Usability (3)
Visualization
Offers tools to help administrators visualize the flow of data, whether that be processes or data flows.
AI Algorithyms
Offers machine learning to locate data security risks and make recommendations on how to mitigate those risks.
Cross-Platforms
Allows data to move across multiple platform types and remain protected.
Platform Basics (3)
Document Permissions
Provides granular user permission options related to document viewing and editing
Mobile
Offers user access across mobile platforms
Document Security
Provides robust security options, such as two-factor authentication, single sign-on controls, or fingerprint scanning
Platform Content (1)
File Sharing
Has secure file sharing capabilities for internal or external sharing
Platform Additional Functionality (2)
Remote Shred
Allows users to quickly revoke document access even after download
Watermarks
Automatically generates watermarks on documents when it is downloaded, viewed or printed
Platform Data (1)
Reporting
Provides metrics around user history, such as document views and edits
Platform Performance (2)
Bulk Upload
Allows users to upload several files at once
Full Text Search
Find content or files using keywords, metadata, tags, etc.
Management (4)
File Management
Drag-and-drop feature to transfer files and directories.
Synchronization
Supports synchronization of remote and local directories.
Scheduling
Initiates transfers at specified times.
Performance
Protocol offers high performance data transfer.
Security (3)
Encryption
Transform or encode the files before the transfer to ensure security.
Authentication
Ensures a client's identity and rights to access a server.
Access Control
Allows limited user access over the file transfers and servers.
Encryption Techniques - Email Encryption (3)
Encryption Algorithms
Supports various encryption algorithms including AES (Advanced Encryption Standard), RSA (Rivest-Shamir-Adleman), Twofish, and Pretty Good Privacy (PGP).
Transport Encryption
Encrypts the email during transit between email servers, preventing interception by third parties.
End-to-End Encryption
Encrypts the message on the sender's device and decrypts it only on the recipient's device, ensuring that only the sender and recipient can read it.
Authentication, Verification, and Access Controls - Email Encryption (4)
Revocation Mechanisms
Allows users to revoke access to encrypted emails or keys in case of compromise.
Access Controls
Enables users to set permissions on who can access, read, or modify their encrypted emails.
Digital Signatures
Allows senders to sign their emails cryptographically, providing proof of authenticity and integrity.
Certificate Authorities
Verifies the identities of individuals or organizations through trusted third-party certificate authorities.
Security Enhancements and Auditing - Email Encryption (4)
Malware Scanning
Integrates with antivirus solutions to scan email attachments for malicious content.
Reporting
Generates reports on encryption usage, compliance status, and security incidents.
Audit Trails
Logs and tracks encryption-related activities for compliance, troubleshooting, and security analysis.
Data Loss Prevention (DLP)
Offers DLP features to prevent accidental or unauthorized transmission of sensitive information.
Integration, Compatibility, and Usability - Email Encryption (4)
User-Friendly Interfaces
Offers intuitive interfaces for sending, receiving, and managing encrypted emails.
APIs and SDKs
Offers application programming interface (APIs) and software development kits (SDKs) for integrating encryption features into custom applications or workflows.
Email Client Integration
Integrates seamlessly with popular email clients, including Gmail, Microsoft Outlook, and Thunderbird.
Automation
Automatically performs encryption and decryption processes to minimize user effort and errors.
Agentic AI - Secure Email Gateway (1)
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Agentic AI - Cloud Content Collaboration (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Cross-system Integration
Works across multiple software systems or databases
Natural Language Interaction
Engages in human-like conversation for task delegation
Agentic AI - Digital Governance (6)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Decision Making
Makes informed choices based on available data and objectives
Core Transfer Infrastructure - Managed File Transfer (MFT) (4)
Load Balancing
Monitors traffic and distribute resources and scales infrastructure workloads to match traffic.
File Transfer Acceleration
Enhances file transfer speeds with scalable administrative controls and bandwidth optimization
Application Integration
Allows files and data to integrate directly into enterprise applications via APIs or connectors
Content Routing
Routes static and dynamic content to optimize delivery speed and ensure relevant file distribution
Platform Capabilities - Managed File Transfer (MFT) (4)
Encryption
Based on 10 Kiteworks reviews. Protects data with within and as it leaves your secure or local network.
Mobile Support
Provides accessibility across various operating systems and mobile platforms
Reporting and Analytics
Offers tools to visualize transfer data, audit logs, and performance metrics
Extensibility
Allows the platform to be extended with additional features, integrations, or custom workflows
Security & Compliance Controls - Managed File Transfer (MFT) (3)
Access Control
Supports LDAP Protocol to enable access control and governance. 10 reviewers of Kiteworks have provided feedback on this feature.
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Provisioning and Governance
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
Intelligent Automation & AI - Managed File Transfer (MFT) (4)
Anomaly Detection
Identifies unusual file transfer activity or potential threats using machine learning
Automated Policy Enforcement
Recommends or enforces governance policies based on usage patterns and risk models
Predictive Resource Allocation
Anticipates network load and optimizes resource distribution based on historical patterns
Intelligent Routing
Uses real-time network data to dynamically route transfers for optimal performance
You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.




