Alternatives to FileAudit

Compare FileAudit alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to FileAudit in 2026. Compare features, ratings, user reviews, pricing, and more from FileAudit competitors and alternatives in order to make an informed decision for your business.

  • 1
    HERE Enterprise Browser

    HERE Enterprise Browser

    Here Enterprise Inc.

    Built through collaboration with global banks, HERE Enterprise Browser provides enterprise security, workforce productivity and seamless integration of enterprise AI. HERE’s Chromium-based, zero-trust security model includes integration with Microsoft Entra and other IDPs, app access controls, data loss prevention controls, executable protection and auditability for compliance. HERE supercharges productivity through app interoperability and Supertabs that combine multiple tabs into persona or task-based dashboards. It provides federated enterprise search to Microsoft 365, Google Workspace, Salesforce and other platforms. HERE also has its own Notification Center and an AI Center that enables integration of enterprise AI models into end user workflows. The company is backed by major banks and IQT, the not-for-profit strategic investor that accelerates the introduction of groundbreaking technologies to enhance the national security of America and its allies.
    Compare vs. FileAudit View Software
    Visit Website
  • 2
    Diplomat Managed File Transfer
    Diplomat MFT by Coviant Software is a secure, reliable managed file transfer solution designed to simplify and automate SFTP, FTPS, and HTTPS file transfers. Built for seamless integration, Diplomat MFT works across major cloud storage platforms, including AWS S3, Azure Blob, Google Cloud, Oracle Cloud, SharePoint, Dropbox, Box, and more. With over two decades of proven, breach-free performance, Diplomat MFT supports compliance with HIPAA, HITECH, GLBA, PCI/DSS, GDPR, and DORA. It features robust capabilities such as PGP encryption, multi-factor authentication, IP-based access rules, and built-in threat intelligence. If you're still relying on manual scripts or outdated FTP tools and you're concerned about audit failures, security gaps, or compliance risks, Diplomat MFT offers a scalable, secure solution you can trust. Start your free trial today.
    Partner badge
    Compare vs. FileAudit View Software
    Visit Website
  • 3
    ManageEngine ADAudit Plus
    ADAudit Plus helps keep your Windows Server ecosystem secure and compliant by providing full visibility into all activities. ADAudit Plus provides a clear picture of all changes made to your AD resources including AD objects and their attributes, group policy, and more. AD auditing helps detect and respond to insider threat, privilege misuse, and other indicators of compromise, and in short, strengthens your organization's security posture. Gain granular visibility into everything that resides in AD, including objects such as users, computers, groups, OUs, GPOs, schema, and sites, along with their attributes. Audit user management actions including creation, deletion, password resets, and permission changes, along with details on who did what, when, and from where. Keep track of when users are added or removed from security and distribution groups to ensure that users have the bare minimum privileges.
    Compare vs. FileAudit View Software
    Visit Website
  • 4
    Curtain LogTrace File Activity Monitoring
    Curtain LogTrace File Activity Monitoring is an enterprise file activity monitoring solution. It tracks user actions: create, copy, move, delete, rename, print, open, close, save. Includes source/destination paths and disk type. Perfect for monitoring user file activities. Key features: - File log (create & delete file) - File log (copy & move file) - File log (print & rename file) - App log (save, open & close file) - Support MySQL & MS SQL - Watermark for printout - Central administration - Integration with Active Directory - Uninstall password for client - Password management - Admin delegation - Self protection for the software Licensing: Curtain LogTrace is shareware. You can download and use the software for free on a trial basis or commercial use. If you want to log more file events (e.g. print, rename, save, open and close) and some advanced features, you need to activate the software to paid version.
    Compare vs. FileAudit View Software
    Visit Website
  • 5
    Teramind

    Teramind

    Teramind

    Teramind provides a user-centric security approach to monitoring your employees’ digital behavior. Our software streamlines employee data collection in order to identify suspicious activity, improve employee productivity, detect possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce security incidents using highly customizable Smart Rules that can alert, block or lockout users when rule violations are detected, to keep your business running securely and efficiently. Our live & recorded screen monitoring lets you see user actions as they’re happening or after they’ve occurred with video-quality session recordings that can be used to review a security or compliance event, or to analyze productivity behaviors. Teramind can be installed in minutes and can be deployed either without employees knowing or with full transparency and employee control to maintain trust.
    Starting Price: $12/month/user
  • 6
    Immuta

    Immuta

    Immuta

    Immuta is the market leader in secure Data Access, providing data teams one universal platform to control access to analytical data sets in the cloud. Only Immuta can automate access to data by discovering, securing, and monitoring data. Data-driven organizations around the world trust Immuta to speed time to data, safely share more data with more users, and mitigate the risk of data leaks and breaches. Founded in 2015, Immuta is headquartered in Boston, MA. Immuta is the fastest way for algorithm-driven enterprises to accelerate the development and control of machine learning and advanced analytics. The company's hyperscale data management platform provides data scientists with rapid, personalized data access to dramatically improve the creation, deployment and auditability of machine learning and AI.
  • 7
    CPTRAX for Windows

    CPTRAX for Windows

    Visual Click Software

    Server File Activity Tracking - Audit who is creating, accessing, moving, and deleting your files and folders. Track file permission changes. Real-time alerts about critical file activities. Malicious activity containment (Ransomware, mass file deletes, etc.) Workstation File Activity Tracking - Audit who is copying files to USB or other removable drives. Track who is uploading files from a browser or via FTP. Block files from being created on USB/removable device. Email alerts when a removable device is connected. Active Directory Auditing - Keep audit logs and get real-time alerts of important Active Directory changes without dealing with SACLs or Windows Event Logs. Server Authentication Auditing - Track authentications into Windows Servers and Citrix sessions. Review all failed logon attempts. Workstation Logon/Logoff Tracking - Get visibility on workstation logons/logoffs, including locks, unlocks and password changes. Review all failed logon attempts.
  • 8
    Netwrix Auditor
    Netwrix Auditor is a visibility platform that enables control over changes, configurations and access in hybrid IT environments and eliminates the stress of your next compliance audit. Monitor all changes across your on-prem and cloud systems, including AD, Windows Server, file storage, databases, Exchange, VMware and more. Simplify your reporting and inventory routines. Regularly review your identity and access configurations, and easily verify that they match a known good state.
  • 9
    Fastpath

    Fastpath

    Fastpath

    Fastpath’s cloud-based access orchestration platform allows organizations to manage and automate identity, access governance, and data and configuration changes – efficiently and cost effectively. Our intuitive cloud-based platform seamlessly integrates identity governance and GRC into one sophisticated yet easy-to-use solution. Effortlessly automate, control, and monitor access - from applications down to individual data records to dramatically reduce risk and compliance costs. Fastpath’s platform was designed by auditors who understand the complexity of securing business application access. That’s why we created a solution that reduces the time, cost and complexity associated with audit processes and reporting to prove compliance.
  • 10
    Data Rover

    Data Rover

    Data Rover

    Data Rover is an Advanced User Data and Security Management for any Data-Driven Organisation. A single solution for Infrastructure and Security managers that allows data users to explore, manage, process, and protect their data effectively and efficiently, by simultaneously addressing the two primary needs related to the use of data: Cyber Security and Data Management. Data Rover plays a key role in business asset protection and corporate data management policy definition. Data Analytics Check for security flaws and eliminate issues. Simplify the management of permissions. File Auditor It gives you the proof that something was done. Right or Wrong it's not important - JUST the FACTS. Dark Data Makes work faster and safer by optimising the storage resources usage and reducing costs. Involve the users in data management so they can contribute in keeping the storage systems clean and efficient. Advanced Data Exchange Share business data in/out of the company SAFELY.
  • 11
    Cygna Auditor

    Cygna Auditor

    Cygna Labs

    Audit and roll back AD changes, enforce entitlements, and improve compliance reporting. Request a demo. Pinpoint changes and instantly roll back unwanted changes to Active Directory to recover from errors with minimal effort. Audit, alert and report on Windows file system and NetApp access faster and with greater detail than native auditing. Get real-time auditing, analysis, and alerts for Microsoft Exchange, and report on changes made to SQL Server. Cygna Auditor provides centralized real-time change auditing for Active Directory, file systems, Exchange, SQL and NetApp; offers the ability to restore Active Directory objects or attributes; and helps to establish and enforce entitlements across the Windows infrastructure. Through simpler administration, IT organizations can mitigate the risks of unwanted changes and better understand user activity to meet compliance requirements.
  • 12
    PA File Sight

    PA File Sight

    Power Admin

    Detects ransomware attacks coming from the network and stops them. Supports honeypots and heuristics. Compromised computers are blocked from reaching files on other protected servers on the network. Detects users copying files, and optionally blocks access. Real-time alerts allow appropriate staff to investigate immediately. Requires Ultra features. Audits who is deleting files, moving files or reading files. Often used for compliance purposes. The Ultra version will record this to a database for rich reports. Allow only trusted applications to run which can protect against many forms of malware. Also know as Application Whitelisting.
    Starting Price: $199 one-time payment
  • 13
    ManageEngine DataSecurity Plus
    ManageEngine DataSecurity Plus enables organizations to gain deep visibility and control into how sensitive data is stored and shared across the enterprise. It monitors file integrity, detects insider threats, tracks and controls file movement across USBs, email, and cloud apps, etc. The solution also supports automated incident response, file permission analysis, ransomware detection, and regulatory compliance, helping businesses maintain a resilient and secure data environment.
    Starting Price: $745/year
  • 14
    Veriato Workforce Behavior Analytics
    Monitor productivity, run investigations, and protect against insider risk with one platform. Our powerful workforce behavior analytics allow you to regain visibility into your remote or hybrid employee activity. Veriato workforce behavior analytics go beyond passive monitoring to proactively analyze productivity, monitor for insider risk and much more. Powerful, easy-to-use tools to keep your remote, hybrid and office teams productive. Veriato’s AI-powered algorithm analyzes user behavior patterns and automatically alerts you to any abnormal or suspicious activity. Assign productivity scores to websites, programs, and applications. Select between three types of screenshots: Continuous, Keyword Triggered and Activity Triggered. Track activities on local, removable, and cloud storage, as well as print operations. See when files are created, edited, deleted, or renamed.
    Starting Price: $25 per user per month
  • 15
    EaseFilter

    EaseFilter

    EaseFilter Technologies

    Track file change, control file access in real time, prevent your sensitive data from being accessed by unauthorized users or processes. Secure file sharing with digital rights management(DRM), share files with fully control, grant or revoke the file access at any time. Implement file audit, file access control, file protection and encryption Windows applications with C#,C++ demo source code.
    Starting Price: $1500
  • 16
    ShareWatcher
    ShareWatcher will monitor your local and remote computer Windows File Shares showing who and when they were accessed, notify you of new files added or deleted by whom via email, sounds, custom commands or Windows events and optionally move your new files by adding a QuickMove Action to any monitored folder. ShareWatcher also supports FTP folder monitoring for new files. Know who is Accessing your Windows File Shares Know when Files get Deleted or Added Alert Options: Email, Sounds, Custom Commands and Windows Event Logs Automatically Move New Files with a QuickMove Action Supports Windows and FTP Servers (New Files)
    Starting Price: $29.99
  • 17
    Alertica

    Alertica

    Alertica

    Alertica is a cloud-based server monitoring platform that delivers real-time alerts when files on monitored servers are accessed, modified, uploaded, or deleted, helping teams detect suspicious behavior before it escalates into security incidents. It enables organizations to define custom monitoring rules for specific files, folders, or entire servers and route alerts to the appropriate teams through channels such as email, Slack, or SMS. It supports a wide range of environments across cloud, on-premises, or hybrid infrastructure, and is designed to work without installing agents or consuming server resources. It focuses on early threat detection and operational visibility by flagging events such as executable uploads, configuration changes, mass deletions, log overflows, or unusual file size violations. Alertica monitors only file metadata such as names, sizes, and timestamps rather than file contents, preserving data privacy.
    Starting Price: $20 per month
  • 18
    SearchInform FileAuditor
    SearchInform FileAuditor is a DCAP solution (data-centric audit and protection) for automated audit of information storages, search for access violations and tracking changes made to critical data. The system protects confidential documents from careless and deliberate malicious actions of employees and puts things in order in file storages. The system performs: •Classification of vulnerable data Finds files in a document flow that contain critical information, and adds a special mark to each file, indicating the type of info it contains: personal data, trade secret, credit card numbers, etc. •Access rights audit Controls access rights to information (full access, editing, reading, writing, reading and changing, etc.). Finds confidential files stored in violation of established security rules . •Monitoring and blocking user actions Audits user operations with the file system. •Critical documents archiving Makes shadow copies of critical files.
  • 19
    Google Advanced Protection Program
    The Advanced Protection Program safeguards users with high visibility and sensitive information from targeted online attacks. New protections are automatically added to defend against today’s wide range of threats. Gmail blocks over 100 million phishing attempts every day. But sophisticated phishing tactics can trick the most savvy users into giving their sign-in credentials to hackers. Advanced Protection requires you to use a security key to verify your identity and sign in to your Google account. Unauthorized users won’t be able to sign in without your username and password. Safe browsing on Chrome protects 4 billion devices against risky sites, and Advanced Protection performs even more stringent checks before each download. It flags or even blocks you from downloading, files that may be harmful. Only app installations from verified stores, like Google Play Store and your device manufacturer’s app store, are allowed.
  • 20
    SecureCircle

    SecureCircle

    SecureCircle

    SecureCircle's Zero Trust data protection eliminates data breaches and insider threats by protecting all data outside of SaaS applications. SecureCircle's Data Access Security Broker (DASB) protects and monitors data, including data egressing from enterprise cloud services and managed repositories to enforce access controls on data regardless of location, including cloud and endpoint devices. SecureCircle protects data transparently and persistently at scale delivering the world's only Zero Trust data protection. Most modern SaaS applications allow end users to pull data out of the browser onto the device. More often than not, end users leverage these features for productive reasons. The challenge most businesses face with modern SaaS applications is identifying the difference between productive activity and a security threat. With SecureCircle, all data is kept secure as it comes out of SaaS applications, which allows users to leverage data that comes out of these applications.
  • 21
    SoftActivity Monitor

    SoftActivity Monitor

    Deep Software Inc.

    User monitoring software that helps protect organizations from insider threat. This employee monitoring software lets you view your users' web browsing history, applications usage log, screen, accessed files, email and more. View remote screens in real time and get historical logs and reports.
    Starting Price: $189.95/one-time
  • 22
    AnySecura

    AnySecura

    AnySecura

    AnySecura is an enterprise-grade information security solution that helps organizations protect sensitive data, manage digital assets, and monitor user activity from a unified platform. By integrating Data Loss Prevention (DLP), Endpoint Protection, and comprehensive Activity Auditing, it secures—and makes traceable—both internal and external data interactions without compromising operational efficiency. One standout capability is Transparent Encryption. Based on predefined policies (e.g., by file type or user group), files are encrypted and decrypted automatically, allowing authorized users to access and edit documents seamlessly. Unauthorized users or external parties, however, see only unreadable content—preventing potential leakage at its source across the file’s entire lifecycle. Beyond encryption, AnySecura provides a full suite of Endpoint Management features, including Removable Media Control, Print Control, Document Control, Web Access Control, and real-time alerts.
    Starting Price: $216/month
  • 23
    SQL Compliance Manager

    SQL Compliance Manager

    IDERA, an Idera, Inc. company

    SQL Compliance Manager helps database administrators to monitor, audit, and alert on SQL Server user activity and data changes. Unlike its competition, it provides quick configuration of audit settings, a broad list of regulatory guideline templates for audit settings and reports, before and after data values for both regulatory compliance and forensic data investigations, differentiation of data access and between regular and privileged users and applications, easy specification of and reporting on sensitive data columns access and changes, and extensive customization of audit settings for databases and servers.
    Starting Price: $3,036.00 per instance
  • 24
    AVG AntiVirus Business Edition
    When an unrecognized file is downloaded onto one of your PCs, a copy will be sent to our experts at our Threat Labs to identify if it’s safe or not. Checks webpages before they open in your browser and displays a safety rating in the search engine results to help you surf the web with more confidence. Better protection against even the newest malware thanks to cloud-based Real-Time Outbreak Detection and proactive AI Detection. Protects against online security threats like spam, viruses, hackers and malware. Anti-Spyware protects your identity from spyware and adware that tracks personal information. Our Windows file server security helps keep it safe, private and out of the hackers’ hands. Advanced File Shredder securely deletes files to help prevent unintended recovery. Scans your PC when you’re not working so it doesn't get in the way. It does the hard work so you and your employees can focus on your business without costly distractions and delays.
    Leader badge
    Starting Price: $44.99 per year
  • 25
    Login AlertX

    Login AlertX

    Login AlertX

    Login AlertX is a Windows security application that sends real-time email alerts whenever someone logs into or unlocks your computer. It runs quietly in the system tray and starts automatically with Windows to ensure continuous monitoring. Users can customize email notifications, including SMTP settings and message content, for personalized alerts. The software intelligently tracks login sessions to avoid redundant notifications and securely stores sensitive data locally. Upgrading to premium unlocks features like automatic webcam photo capture and audio recording at login events. Login AlertX helps users stay informed and protect their systems from unauthorized access effectively.
  • 26
    Privileged Access Management
    Secure your most sensitive accounts in minutes with Imprivata Privileged Access Management. Privileged accounts, those with the highest level of access, pose a greater security risk than the average end user because of the degree of sensitive information that could be exposed. This risk isn’t lost on hackers, which is why 80% of security breaches involve compromised privileged credentials. Legacy PAM solutions are complex and resource-intensive, often requiring costly engagements with outside consultants. Imprivata Privileged Access Management combines all the features of a traditional enterprise-grade solution but with zero clients and server footprint. Incorporate the principle of least privilege by providing just enough access to complete a task through granular policy control at the system level. Get going in just minutes with a completely agentless architecture that helps you meet wide-ranging compliance requirements quickly.
    Starting Price: $25 per month
  • 27
    Exigence

    Exigence

    Exigence

    Exigence is providing a command and control center software to manage major incidents. Exigence automates the collaboration among stakeholders within and outside of the organization and structures it around a timeline that records the steps taken to resolve an incident and drives workflows across stakeholders and tools, thus ensuring all stakeholders are working off the same page. The product ties together stakeholders, processes and tools already in use, driving down time to resolution. Customers who have purchased and are using Exigence , have seen a more transparent process, faster onboarding of relevant stakeholders, and a reduced time for the resolution of critical incidents in general. They are using Exigence to address critical incidents, but also for cyber events as well as planned incidents like business continuity testing and software release.
  • 28
    ARCON | Privileged Access Management
    The ARCON | Privileged Access Management (PAM) solution provides over every aspect of your IT infrastructure so that you can build contextual security around your most important asset: data. Its granular access control allows you to structure your security infrastructure the way you want, giving and revoking access for whomever you wish, whenever you wish, all on your own terms. Get rule- and role-based access control to all target systems with the principle of ‘least-privilege’ only allowing access to data on a ‘need-to-know’ basis. This helps your admins manage, monitor, and control privileged accounts down to the individual end user. Build a unified access control and governance framework to monitor privileged identities, whether on-prem, on-cloud, in a distributed data center or a hybrid environment. Randomize and change passwords automatically to overcome the threats arising from shared credentials.
  • 29
    Lepide Data Security Platform
    Intelligent Threat Detection. Faster Response. 98% of all threats start with Active Directory and nearly always involve the compromise of data stored on enterprise data stores. Our unique combination of detailed auditing, anomaly detection, real time alerting, and real time data discovery and classification allows you to identify, prioritize and investigate threats - fast. Protect Sensitive Data from Rogue Users and Compromised User Accounts. We enable you to detect and investigate threats to your most sensitive data in ways no other vendor can. Bringing together data discovery and classification with threat detection enables you to investigate all events, changes, actions and anomalies with context. End to end visibility of Active Directory, Group Policy, File Servers, Office 365, NetApp, SharePoint, Box, Dropbox and more. Detect and Respond to Security Threats 10x Faster. Investigate threats as they emerge in Active Directory and track movement
  • 30
    SFTPPlus

    SFTPPlus

    Pro:Atria

    Secure, Managed File Transfer software for Enterprise with multi-protocol support. Our simple to use on-premise, cloud, or container deployed solution will help you secure and automate file transfers across multiple platforms. SFTPPlus server transfer supports SFTP, FTPS, HTTPS, AS2 and many other protocols. Features include browser-based file management, user account management, and external database authentication and detailed audit. SFTPPlus works on Windows, Linux, or macOS Server and is perfect for lightweight containers or virtual environment. SFTPPlus client transfers provides complete automation and management for monitoring local and remote locations. It triggers actions and transfers without scripting. Client transfers work as a fully automated, non-interactive service. Its API support for pre/post-processing makes it a flexible tool for file transfer management.
  • 31
    Modex

    Modex

    M3 Holdings

    Blockchain powered data immutability. Real data integrity becomes possible now with our patented hybrid blockchain-database middleware. Enterprise use cases Hybrid Database System . With our broad expertise in delivering enterprise blockchain services, tools, and frameworks that address a variety of industry-specific needs, we help organizations gain a competitive advantage on the market. Incident Response. Eliminating the single point of failure found in traditional databases, making it virtually impossible for an incident to affect the entire network. Regulatory Compliance. A complete audit trail for the entire lifecycle of every record, helping companies prove compliance with data protection regulations. Log Management. Not allowing any data changes or deletion, providing businesses with a tamper-resistant archive of events. Modex BCDB is a middleware that fuses a blockchain with a database to create a structure that is easy to use and understand by developers
  • 32
    NEXAVAULT

    NEXAVAULT

    Office Infosystems

    NEXAVAULT store and manage all your documents digitally in secure location. Efficient Document Retrieval , Save time with quick access to files using advanced search functions. AI-powered document classification and summary. Preserve version histories and restore previous versions with ease. Prevent data loss and maintain a full audit trail of changes. Granular Access Control. Set permissions at the document and folder level. Control who can view, edit, delete, or share files. Manage your documents from anywhere with an intuitive mobile app. Scan and upload documents on the go. Instantly review and approve files from your mobile device. Ensure data availability and redundancy across environments. NEXAVAULT providing both cloud and on-perm solutions.
    Starting Price: $12/month/user
  • 33
    VShell Server

    VShell Server

    VanDyke Software

    Multi-protocol secure file transfer. Remote access and administration. Available for Windows, Linux, and Mac. Secure file transfer server to protect data in transit. Multi-protocol support: SSH2, SFTP, FTPS, and HTTPS. Fine-grained access control for users and groups. Secure remote access and administration with SSH2. Set up and configure easily; runs right out of the box. Integrates with Windows AD and LDAP. Enterprise-level reliability and robustness, "set it and forget it". Compatible with clients using open standards for SSH2, SFTP, FTPS, or HTTPS. Multi-platform support for Windows, Linux, and Mac. Runs on physical servers, virtual machines, and cloud-based servers. Cost effective, connection based licensing. Dedicated and customer-oriented, high level of expertise, and quick response time. Technical support begins during evaluation. Grant access to VShell services by authorized users or groups. On an individual or group basis, allow or deny access to VShell services.
  • 34
    ControlCase

    ControlCase

    ControlCase

    Almost every business has to comply with multiple information security related standards and regulations. IT compliance audits are complicated, expensive, and full of challenges. These can include but are not limited to PCI DSS, ISO 27001, GDPR, HIPAA, HITRUST, FISMA, NIST 800-53, MARS-E, BITS FISAP. Managing these audits individually poses a number of challenges for a business; including repetition of efforts, managing multiple audit firms, increased costs, complexity and time. While standards such as PCI DSS, ISO and SOC provide a benchmark for protecting data, criminals are always on the hunt for security vulnerabilities and malware to exploit organizations. The ControlCase Data Security Rating is focused exclusively on understanding your environment and providing solutions that seamlessly integrate security and go beyond just compliance.
  • 35
    Syteca

    Syteca

    Syteca

    Syteca — Transforming human risk into human assets! The Syteca platform is a comprehensive cybersecurity solution designed to meet the diverse needs of modern organizations. The platform features a customizable security toolkit enabling customers to employ granular privileged access management (PAM), advanced user activity monitoring (UAM), or a powerful combination of both. Syteca is specifically designed to secure organizations against threats caused by insiders. It provides full visibility and control over internal risks. We help leading companies to protect their sensitive data from numerous industries like Financial, Healthcare, Energy, Manufacturing, Telecommunication and IT, Education, Government, etc. Over 2,500 organizations across the world rely on Syteca! Key solutions and capabilities: - Insider threats management - Privileged Access Management - User activity monitoring - User and entity behavior
  • 36
    SecuPi

    SecuPi

    SecuPi

    SecuPi provides an overarching data-centric security platform, delivering fine-grained access control (ABAC), Database Activity Monitoring (DAM) and de-identification using FPE encryption, physical and dynamic masking and deletion (RTBF). SecuPi offers wide coverage across packaged and home-grown applications, direct access tools, big data, and cloud environments. One data security platform for monitoring, controlling, encrypting, and classifying data across all cloud & on-prem platforms seamlessly with no code changes. Agile and efficient configurable platform to meet current & future regulatory and audit requirements. No source-code changes with fast & cost-efficient implementation. SecuPi’s fine-grain data access controls protect sensitive data so users get access only to data they are entitled to view, and no more. Seamlessly integrate with Starburst/Trino for automated enforcement of data access policies and data protection operations.
  • 37
    EmpMonitor

    EmpMonitor

    EmpMonitor

    Manage all the computers in your organization remotely from a centralized location. Your EmpMonitor account is accessible from any internet-enabled device giving you access from anywhere at any time. With our real-time computer monitoring software, you can view activities as they happen and manage instantly. Gain complete visibility & full control over your employees’ computer activities. Get detailed insights in the form of intuitive graphic reports and charts. EmpMonitor, being simple & easy to understand, helps you ditch paperwork and is 100% automatic. It provides real-time monitoring, automatic screenshots at regular intervals and save data in the cloud. Track employee activities on PC remotely from any location in 100% invisible mode.
    Leader badge
    Starting Price: $4.59 per user per month
  • 38
    VIPRE Privacy Shield

    VIPRE Privacy Shield

    VIPRE Security Group

    VIPRE Privacy Shield is a privacy-focused tool designed to help users protect their personal data and online identity from prying eyes. It offers powerful features like data file shredding, which permanently deletes sensitive files to prevent recovery, and a history cleaner that removes browsing history, cookies, and other digital footprints. VIPRE Privacy Shield also includes webcam and microphone blockers, ensuring that unauthorized apps or malware can’t access these devices without permission. With easy-to-use controls and customizable settings, VIPRE Privacy Shield empowers users to take charge of their digital privacy, protecting against identity theft and data exposure risks across all online activities.
  • 39
    HashiCorp Vault
    Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. Safeguarding and ensuring that a credentials isn’t leaked, or in the likelihood it is, that the organization can quickly revoke access and remediate, is a complex problem to solve.
  • 40
    Cloudian

    Cloudian

    Cloudian

    Solve your capacity and cost challenges with Cloudian® S3-compatible object and file storage. Exabyte-scalable and cloud-compatible, Cloudian software-defined storage and appliances make it easy for enterprises and service providers to deliver storage at one site, or across multiple sites with a modular architecture that’s easy to manage and grow. Gain actionable insight. Cloudian HyperIQ™ provides real-time infrastructure monitoring and user behavior analytics. Track user data access to verify compliance and monitor service levels. Spot infrastructure issues before they become problems with configurable, real-time alerts. Customize HyperIQ to your environment over 100 available data panels. Protect your data from ransomware with Cloudian Object Lock, a hardened solution for data immutability. HyperStore® is hardened by the use of HyperStore Shell (HSH) and RootDisable, securing the solution at the system level, even disabling root access to make the solution impregnable.
    Starting Price: Pricing as low as 1/2 ¢ per gi
  • 41
    AccessPatrol

    AccessPatrol

    CurrentWare Inc.

    AccessPatrol is a data loss prevention and USB device control software that provides a proactive solution for preventing data breaches caused by illicit data transfers. AccessPatrol controls a variety of peripherals, including… - Storage devices such as USB flash drives and external hard drives - Wireless Devices such as Bluetooth, Infrared, and WiFi - Communication Ports such as Serial and Parallel ports - Imaging Devices such as Scanners or Cameras, and… - Other Devices such as network share drives, printers, and mobile phones File operations alerts and permissions can be configured to alert IT administrators to suspicious file operations and proactively prevent data transfers to unauthorized users. The security policies are enforced by a software agent that is installed on your user’s computers. This keeps devices restricted and monitored even when the computers are taken off of the network.
    Starting Price: $6 PUPM
  • 42
    TrustLogix

    TrustLogix

    TrustLogix

    The TrustLogix Cloud Data Security Platform breaks down silos between data owners, security owners, and data consumers with simplified data access management and compliance. Discover cloud data access issues and risks in 30 minutes or less, without requiring visibility to the data itself. Deploy fine-grained attribute-based access control (ABAC) and role-based access control (RBAC) policies and centrally manage your data security posture across all clouds and data platforms. TrustLogix continuously monitors and alerts for new risks and non-compliance such as suspicious activity, over-privileged accounts, ghost accounts, and new dark data or data sprawl, thus empowering you to respond quickly and decisively to address them. Additionally, alerts can be reported to SIEM and other GRC systems.
  • 43
    TEMASOFT FileMonitor
    Track file access and monitor file copy operations on local and shared files, in real-time, with unrivaled accuracy! Our unique file monitoring technology goes beyond basic audit operations, like read, write, and attribute changed. It can record and deliver the entire context around complex activities like file copy (locally, over the network or on USB devices), file archived, file uploaded through browsers or attached to emails. Monitoring shares is now easier, and you can get a much better picture of what happens with your critical files. TEMASOFT FileMonitor is a versatile product that you can customize to suit your needs in the best manner (more information is available on the support page). Each item can show data independently, or you can combine items to display data using a drill-down approach.
  • 44
    Telivy

    Telivy

    Telivy

    Experience the industry's most comprehensive and versatile audit tool, deployable seamlessly with a single script. Keep your networks, devices and data safe and secure by discovering any potential entry points for cyber attacks - from both inside and outside your organization. Protect your data from attacks that can encrypt, modify, corrupt or destroy data, such as ransomware. Ensure data is available to anyone in the organization who has access to it. Audit and configure proper access to all corporate assets on-premises and cloud. Enforce policies around user authentication, validation & privileges, and address issues regarding privilege creep. Test resilience to email phishing and application password detection attempts to gain access to restricted areas and exfiltrate confidential data.
  • 45
    FolderManifest

    FolderManifest

    ARCED International LLC

    FolderManifest is an offline Windows desktop tool for analyzing, documenting, and verifying folder contents. It scans any directory and generates a static, searchable HTML manifest that captures file structure, file types, sizes, timestamps, and checksums. Users rely on FolderManifest to detect duplicate files, validate backups, verify file integrity over time, and document folder states for audits or handovers. Because manifests are saved as static HTML, they remain searchable even if files are later moved, modified, or deleted. FolderManifest runs entirely offline—no cloud services, no accounts, and no data leaving the machine—making it suitable for sensitive, large, or regulated data environments. It is commonly used by researchers, developers, IT teams, and organizations managing large file collections who need transparency, traceability, and confidence in their file systems. FolderManifest is licensed as a one-time lifetime purchase and includes unlimited scans.
    Starting Price: $179 Lifetime License
  • 46
    IRI Data Protector Suite

    IRI Data Protector Suite

    IRI, The CoSort Company

    The IRI Data Protector suite contains multiple data masking products which can be licensed standalone or in a discounted bundle to profile, classify, search, mask, and audit PII and other sensitive information in structured, semi-structured, and unstructured data sources. Apply their many masking functions consistently for referential integrity: ​IRI FieldShield® Structured Data Masking FieldShield classifies, finds, de-identifies, risk-scores, and audits PII in databases, flat files, JSON, etc. IRI DarkShield® Semi & Unstructured Data Masking DarkShield classifies, finds, and deletes PII in text, pdf, Parquet, C/BLOBs, MS documents, logs, NoSQL DBs, images, and faces. IRI CellShield® Excel® Data Masking CellShield finds, reports on, masks, and audits changes to PII in Excel columns and values LAN-wide or in the cloud. IRI Data Masking as a Service IRI DMaaS engineers in the US and abroad do the work of classifying, finding, masking, and risk-scoring PII for you.
  • 47
    Confidencial

    Confidencial

    Confidencial

    Built-in protection that follows your unstructured data everywhere, always. Confidencial is a data-centric security solution that automatically finds and secures sensitive content within documents to maximize data utility and collaboration. We invented and patented selective protection, a groundbreaking technology that embodies our core mantra, protect sensitive content without compromising usability. Our comprehensive and intelligent solution gives you unparalleled flexibility through granular controls, allowing you to protect sensitive information in files and documents. Our patented technology lets you choose exactly what you need to protect and who can access it, down to the word, paragraph, or image inside of a file. Your data never leaves your infrastructure. We do not store your files or data, nor can we access it. Confidencial secures unstructured data across on-prem and multi-cloud environments.
  • 48
    Ostendio

    Ostendio

    Ostendio

    Ostendio is the only integrated security and risk management platform that leverages the strength of your greatest asset. Your people. Ostendio delivers an easy-to-use, cost-effective platform that allows you to assess risk, create and manage critical policies and procedures, educate and empower your people to be secure with security awareness training, and monitor continuous compliance across 250+ security frameworks. With deep customization, advanced intelligence, and flexible controls, you’re always audit-ready, always secure, and always able to take on what’s next. For more information about Ostendio, visit ostendio.com.
  • 49
    Pico Audit

    Pico Audit

    Kendrick Sales

    Comprehensive NIST 800-53 and JSIG RMF auditing built for standalone Windows and Linux systems. Turn cryptic logs into clear human stories with our advanced Storyline engine. - Cross-Platform: Unified installers for both RHEL/CentOS and Windows Server. - Human Context: Storyline converts technical events into plain-English timelines. - Easy Licensing: Activate offline using our secure operator portal. - US-Based Code: Developed entirely in the USA with a strict supply chain policy. We are TAA Compliant.
    Starting Price: $79.99/year/PC
  • 50
    Digital Guardian
    No-compromise data protection means the flexibility to adapt to your needs. Digital Guardian is unique among DLP solutions in its ability to support both a use case-based approach (known data types or user groups) or a data risk discovery approach (identifying unknown use cases). Our risk discovery approach enables you to gain visibility by showing you where sensitive data is located, how it flows in the organization, and where it is put at risk, all without policies. Powered by AWS, Digital Guardian delivers simplified deployment, low overhead, and elastic scalability for increased return on your security spend. Coverage for your Windows, macOS, or Linux operating systems and all your applications, both browser based and native. Our “unknown risk” approach enables you to see where sensitive data is located, how it flows, and where it is put at risk - all without policies. Only Digital Guardian provides content, user, and context-based data discovery and classification.