Choose a language
You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.
By Nord Security
How would you rate your experience with NordLocker?
File Transfer Encryption
Based on 10 NordLocker reviews.
Protects data with within or as it leaves your secure or local network.
Data Encryption
Provide a level of encryption of data in transit, protecting sensitive data while it lives in the backup application.
Document Encryption
Provides a level of encryption for text documents.
Authentication
Allows administrators to set multi-factor authentication requirements including tokens, keys, or sms messaging
Policy Enforcement
Abilities to set standards for database security and risk management.
Access Management
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
Backup
As reported in 10 NordLocker reviews.
Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster.
Recovery
Decrypts datasets or files or allows users access to a backup database for reintegration.
File Management
Allows administrators to set levels of encryption for file types. Allows administrators to decide which files to encrypt.
Auditing
Documents access and alterations of the database for analytics and reporting.
Data Discovery
Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems.
Access Control
Supports LDAP Protocol to enable access control and governance.
Data Masking
Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties.
Data Encryption/Security
Manages policies for user data access and data encryption.
Data loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Sensitive Data Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Compliance Monitoring
Monitors data quality and send alerts based on violations or misuse.
User Analytics
Allows for reporting and documentation of individual user behavior and privileges.