Alternatives to Intapp Walls

Compare Intapp Walls alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Intapp Walls in 2026. Compare features, ratings, user reviews, pricing, and more from Intapp Walls competitors and alternatives in order to make an informed decision for your business.

  • 1
    Walls.io

    Walls.io

    Walls.io

    Walls.io is a social wall tool that helps you collect brand and user-generated content from different channels. With Walls.io you can aggregate hashtag, username and page content from Twitter, LinkedIn, Instagram, Facebook, YouTube, Flickr, Tumblr, Pinterest, Vimeo, Reddit, and RSS. You can also upload your own posts, photos or videos. You can also go beyond social media and allow your audience to upload content directly to the wall without posting on social media. Use a Walls.io social wall to boost engagement at events, in shops, hotels, restaurants, and offices. You can also use it to collect posts for your hashtag campaign, and even embed it on your website. International brands like Google, Cisco, ISO and the UN are using it to boost engagement and collect amazing user-generated content. Try it for free! You'll love it!
  • 2
    SonicWall Cloud Edge Secure Access
    SonicWall Cloud Edge Secure Access is built to respond to the anytime, anywhere business world, whether on-prem or in the cloud. It delivers simple network-as-a-service for site-to-site and hybrid cloud connectivity with Zero-Trust and Least Privilege security as one integrated offering. With more remote workers than ever needing secure access to resources in the hybrid cloud, many organizations need to look beyond traditional perimeter-based network security. Companies can respond to the widening attack surface and stop the lateral movement of internal or external threats by using SonicWall’s fast, simple and cost-effective Zero-Trust and Least Privilege security approach. Cloud Edge Secure Access, in partnership with Perimeter 81, prevents unauthorized users from accessing and moving through the network and gives trusted users only access to what they need. Authenticate any one, any device and any location quickly and easily.
  • 3
    Prosperoware Confidentiality Manager
    Confidentiality Manager enables firms to implement ‘need-to-know’ security and ethical walls without impacting workflow. Robust self-service, industry-leading notifications and acknowledgements, and multi-system design make it the best choice for firms concerned about meeting client security, regulatory, and ethical obligations across all systems where sensitive information is stored. Clients are demanding it and industry regulators are requiring it, but the process of switching from an ‘open access’ model may not be easy for firms. Without the right software, proper security places a heavy burden on IT, Risk, and lawyers; matter teams fear they won’t be able to access the information they need, when they need it. Prosperoware solves the challenge. Offload the burden from IT and Risk teams, empower end-users through unique self-service features, mitigate risk, reduce support costs, drive adoption, and work more productively.
  • 4
    Intapp Employee Compliance
    Intapp Employee Compliance makes it easier for your firm to monitor employees’ financial interests and outside activities, adhere to internal code of ethics policies, and track required documentation. Help your professionals follow firm and regulatory requirements and make it simpler for your compliance team to review and manage everyone’s activities. Give employees the tools they need to easily comply with firm policies. Verify information with normalized data and flagged discrepancies. Automatically notify employees when actions are required and track progress. Support timely action and approvals with workflows and notifications. Provide comprehensive histories for firm management and regulators. Create a hub for staff to track and receive approval for regulated activity. Combine employee compliance with your existing HR and trading systems. Provide role-based, centralized data views and dynamic reporting tools.
  • 5
    Barndoor.ai

    Barndoor.ai

    Barndoor.ai

    Barndoor is a data and access management layer designed to secure how artificial intelligence systems interact with enterprise data and infrastructure. It acts as a centralized control plane that governs AI agents and applications, allowing organizations to define policies, enforce access rules automatically, and maintain full visibility over how AI tools operate across business systems. Instead of relying only on traditional identity-based permissions, Barndoor introduces context-aware governance, enabling administrators to control what actions an AI agent can perform based on factors such as the user operating the agent, the system being accessed, the type of data involved, and the specific task being attempted. It evaluates every AI request in real time and enforces policies before an action is executed, preventing unsafe or unauthorized operations from reaching internal systems or modifying sensitive information.
    Starting Price: $500 per month
  • 6
    Intapp Intake
    Quickly capture critical risk-related information about your new and recurring business with Intapp Intake. Conduct thorough due diligence with speed and accuracy, using modern business processes, including dynamic risk-based questionnaires, workflows, and scoring models that integrate with your other systems and trusted third-party data sources. Collect information and assess risk with greater speed and accuracy. Align your onboarding decisions with your firm’s strategy. Centralize the critical information and processes that protect your firm. Design better processes with dynamic workflows, forms, and approval routing. Enforce firm policies through the automated creation and collection of engagement letters. Streamline the collection of external information for internal risk assessment processes, such as lateral hires or AML. Align onboarding decisions with your firm’s risk appetite using defined risk-scoring metrics.
  • 7
    SonicWall Mobile Connect
    SonicWall Mobile Connect is a secure remote access solution that enables employees to safely connect to corporate resources from various devices, including those running iOS, macOS, Android, Chrome OS, and Kindle Fire. By establishing an encrypted SSL VPN tunnel, Mobile Connect ensures that all data transmitted between the device and the corporate network remains protected from interception. This application integrates seamlessly with SonicWall's Secure Mobile Access (SMA) and next-generation firewall appliances, allowing IT administrators to enforce granular access policies based on user identity, device type, and application. Additionally, Mobile Connect supports features such as per-application VPN, context-aware authentication, and centralized policy management, providing a comprehensive solution for secure mobile access.
  • 8
    SonicWall Connect Tunnel
    SonicWall Connect Tunnel provides an “in-office” experience for a remote working world with full access away from the office. For IT-managed Mac, Windows, and Linux users, this thin client delivers fast and secure remote access to sensitive corporate data and assets. For Windows 10 users, Connect Tunnel supports Device Guard, a Windows server component that enables secure authorized access. With Connect Tunnel, you always maintain centralized control because it integrates directly with SMA 1000 Unified Policy and End Point Control (EPC) to ensure a safe environment and a compliant device before allowing network access. Unleash the benefits of a remote workforce without sacrificing the security of your corporate network. We provide a variety of VPN clients to fit the needs of every SonicWall appliance or virtual appliance.
  • 9
    Fasoo Enterprise DRM
    Fasoo Enterprise DRM (FED) is an advanced data-centric security solution designed to protect sensitive information at rest, in transit, and in use. With granular permission control, organizations can define and enforce user-specific access rights to ensure only authorized personnel can view or edit sensitive files. Centralized policy management simplifies the enforcement of consistent security policies across the organization, reducing administrative overhead. FED’s enhanced monitoring capabilities provide real-time visibility into file usage, allowing businesses to identify risks, prevent unauthorized access, and maintain control over their data. By supporting compliance with regulations such as GDPR, HIPAA< and CCPA, Fasoo Enterprise DRM helps organizations enhance data governance. Trusted by global enterprises, FED empowers organizations to secure intellectual properties, mitigate insider threats, and maintain productivity while ensuring the highest levels of data security.
  • 10
    Fasoo AI-R DLP
    Fasoo AI-R DLP is an advanced data protection solution that safeguards sensitive information from being exposed through generative AI platforms. Built to meet the growing challenges of AI adoption in the workplace, it monitors user interactions in real time and blocks attempts to share confidential data through AI prompts. This solution uses intelligent pattern recognition and policy-based controls to enforce security across departments, user roles, and devices. It gives organizations the flexibility to customize policies and restrict risky AI use while still enabling productivity. With support for Remote Browser Isolation (RBI), Fasoo AI-R DLP creates a secure environment for AI interactions, ensuring sensitive content stays protected within corporate boundaries. Ideal for companies adopting generative AI tools at scale, Fasoo AI-R DLP provides deep visibility into user activity with detailed logs and alerting mechanisms.
  • 11
    CTemplar

    CTemplar

    CTemplar

    We support anonymous usage and do not stockpile your personal data. Therefore, nothing can be made to reveal it. We use strong encryption and state-of-the-art technologies. This ensures the confidentiality of your messages. Iceland has among the strongest privacy laws that allow anonymous usage and instantly deleting your data. CTemplar’s exclusive 4-Wall Protection guarantees complete wall-to-wall protection of your data. Set a phrase that will be shown in your account. This will alert you to any phishing attempt. We allow anonymous payments using Monero. We are still building the monero payment processor so XMR payments are completed by contacting support. Automatic payments can be made with Bitcoin and card. Our server location in Iceland provides nearly unlimited natural energy resources and it's proudly run 100% by green energy, specifically geothermal and hydropower.
    Starting Price: $8 per month
  • 12
    Core Privileged Access Manager (BoKS)
    Centralize your multi-vendor infrastructure into a single security domain. Core Privileged Access Manager (BoKS) transforms your multi-vendor Linux and UNIX server environment into one centrally managed security domain. BoKS simplifies your organization’s ability to enforce security policies, and control access to critical systems and information. With full control over accounts, access and privilege, IT and security teams can proactively prevent internal and external attacks on critical systems before they start. Centralize management of user profiles and accounts for simplified administration and scalability. Secure your systems by managing user privileges and access to sensitive data—without slowing down productivity. Give users only the access they need and ensure that least privileged access is enforced across your hybrid environment.
  • 13
    Intapp Time
    Give your partners and professionals a better way to record and submit complete accounts of the time they spend on each engagement. With Intapp Time, they can easily recreate their days, adhere to client requirements, and minimize missed and under-recorded efforts. By increasing accuracy and transparency, your firm can offer a better experience for your clients and fee earners alike, while gaining new opportunities to improve revenue. Minimize the need for data entry by your partners and fee earners. Generate more revenue, improve realization, and understand true costs. Improve client satisfaction with detailed, client-ready time entries in billing. Choose automated capture, timer, or direct entry, and access via desktop or mobile. Review and resolve unreleased or missing time entries. Reduce duplicative time entries and pre-billing corrections with consistent team narratives. Prevent downstream issues by enforcing firm and client requirements using Intapp Terms.
  • 14
    Armet AI

    Armet AI

    Fortanix

    Armet AI is a secure, turnkey GenAI platform built on Confidential Computing that encloses every stage, from data ingestion and vectorization to LLM inference and response handling, within hardware-enforced secure enclaves. It delivers Confidential AI with Intel SGX, TDX, TiberTrust Services and NVIDIA GPUs to keep data encrypted at rest, in motion and in use; AI Guardrails that automatically sanitize sensitive inputs, enforce prompt security, detect hallucinations and uphold organizational policies; and Data & AI Governance with consistent RBAC, project-based collaboration frameworks, custom roles and centrally managed access controls. Its End-to-End Data Security ensures zero-trust encryption across storage, transit, and processing layers, while Holistic Compliance aligns with GDPR, the EU AI Act, SOC 2, and other industry standards to protect PII, PCI, and PHI.
  • 15
    Acronis DeviceLock DLP
    Acronis DeviceLock DLP provides comprehensive endpoint DLP (endpoint data loss prevention) – discovering and protecting sensitive data while monitoring the operations involving that information. Prevent data leakage due to employee negligence or malicious insiders by blocking any unauthorized attempt to access or transfer data, discovering and protecting sensitive data-at-rest. Reduce the complexity of data protection and cut reporting times with a single DLP solution for thorough visibility over data flows and user behavior. Reduce information security risks and comply with IT security standards and regulations by enforcing data use and handling policies that users can’t avoid following. Save the time and hassle associated with managing a DLP solution. Acronis DeviceLock DLP is easily deployable through Active Directory (AD) and offers various central management consoles, based on your organization’s requirements.
    Starting Price: $615 one-time payment
  • 16
    Fasoo Data Radar
    Fasoo Data Radar (FDR) is a data discovery and classification solution that helps organizations locate, analyze, and manage sensitive unstructured data across on-premise servers, cloud storage, and endpoints. It scans and classifies files based on keywords, regex patterns, file formats, and other predefined policies, ensuring organizations maintain control over critical information. With real-time monitoring and centralized policy enforcement, FDR enhances data security by identifying risks, preventing unauthorized access, and assisting with compliance requirements such as GDPR, HIPAA, and CCPA. Its integration with enterprise security frameworks allows organizations to apply consistent data protection policies while improving operation workflows. By automating data classification and governance, FDR increases efficiency and enhances data visibility for security and compliance management.
  • 17
    Oracle Advanced Security
    Encrypt application tablespaces to prevent out-of-band access to sensitive data using Oracle Advanced Security. Redaction policies prevent the proliferation of sensitive data and aid in compliance with data protection regulations. Transparent Data Encryption (TDE) stops would-be attackers from bypassing the database and reading sensitive information directly from storage by enforcing data-at-rest encryption in the database layer. Encrypt individual data columns, entire tablespaces, database exports, and backups to control access to sensitive data. Data Redaction complements TDE by reducing the risk of unauthorized data exposure in applications, redacting sensitive data before it leaves the database. Partial or full redaction prevents large-scale extraction of sensitive data into reports and spreadsheets. Encryption is implemented at the database kernel level, eliminating the need for any changes to applications.
  • 18
    Tyler Ethics Management

    Tyler Ethics Management

    Tyler Technologies

    Tyler's Ethics Management solution automates ethics management programs through the preparation, review, and filing of annual financial disclosure and ethics training reports. Tyler’s Ethics Management software adheres to the complex rules and regulations that drive ethics management programs and includes numerous summary reports that can be run by users based on defined roles and access permissions. Additional reports can be easily configured to match an organization’s needs. The audit finding management solution is an efficient tool to manage and administer an audit compliance program. A background investigation software solution plays a critical role in the larger personnel security and suitability process, which also includes adjudication, evaluation, analytics, and even invoicing. Tyler’s Criminal Justice Information System application tracks and manages data and workflows to help federal law enforcement with any kind of case.
  • 19
    AllyMatter

    AllyMatter

    AllyMatter

    AllyMatter is a centralized enterprise knowledge management platform designed to help organizations turn scattered documentation and tribal knowledge into a searchable, governed, and scalable system that supports workflows, compliance, and collaboration across departments. It provides a central knowledge hub where teams can store policies, procedures, SOPs, training materials, playbooks, and other critical documents with advanced search so information is always findable; workflow automation including custom approval flows and notifications so changes move through review and sign-off efficiently; audit trails, version control, and acknowledgment tracking that capture who changed what and when and help with compliance; and role-based access controls and SSO integration so sensitive data stays protected and accessible to the right people only.
  • 20
    IBM watsonx.governance
    While not all models are created equal, every model needs governance to drive responsible and ethical decision-making throughout the business. IBM® watsonx.governance™ toolkit for AI governance allows you to direct, manage and monitor your organization’s AI activities. It employs software automation to strengthen your ability to mitigate risks, manage regulatory requirements and address ethical concerns for both generative AI and machine learning (ML) models. Access automated and scalable governance, risk and compliance tools that cover operational risk, policy management, compliance, financial management, IT governance and internal or external audits. Proactively detect and mitigate model risks while translating AI regulations into enforceable policies for automatic enforcement.
    Starting Price: $1,050 per month
  • 21
    MAKVES DCAP
    MAKVES DCAP is a comprehensive data-centric audit and protection solution designed to safeguard corporate information by controlling access to critical data, and ensuring compliance with regulations like GDPR, FZ-152, and PCI DSS. This system helps businesses by monitoring user access to files, tracking sensitive information, and identifying risks such as excessive access rights and unauthorized activity. MAKVES DCAP offers a centralized platform for auditing IT assets across various environments, including Active Directory, cloud storage, email servers, and more. It also automates data classification, behavioral analysis, and policy enforcement to prevent data breaches. With a focus on protecting unstructured data, the solution provides real-time recommendations and remediation tools directly in the system interface. Forms a transparent matrix of access to company information resources.
  • 22
    GoWall

    GoWall

    GoWall

    GoWall’s easy-to-use Notes Wall gets people talking, whether they’re in the same room, remote, or both. Ideas fill the wall from the moment participants join, adding transparency and neutrality to meetings. Participants build on ideas, “Like” them, and before you know it, you have everyone’s attention. Get more out of every meeting minute. Our Notes Wall allows you to hear from everyone simultaneously, saving hours and cutting meeting times by 50%. More focused dialogue and more diverse ideas help you align more quickly. And, our easy export feature means no more time spent transcribing meeting notes. Facilitators tell us that GoWall helps them design better meetings. Participants tell us that GoWall makes them better contributors, and meetings are fun, productive, and inclusive. It’s unanimous: Everyone likes meetings that are focused, engaging and produce real-time results! Our clients can trust that information shared stays confidential.
    Starting Price: $14.99 per month
  • 23
    FastRedaction

    FastRedaction

    FastRedaction

    FastRedaction is an AI-driven, web-based video redaction software designed to streamline the process of securely editing and blurring sensitive video content for law enforcement, legal professionals, and other industries that require confidentiality. This platform automatically blurs faces and tracks objects as videos upload, cutting redaction time by up to 90%. It supports the redaction of various media, including body-worn and dashcam videos, 911 calls, and photographs, without the need for special hardware or software. FastRedaction is highly secure, featuring multi-factor authentication, session timeout settings, and robust access control in compliance with the FBI’s CJIS security policy. Data is encrypted both in transit and at rest using FIPS 140-2 compliant standards, and all access attempts are logged for at least one year. FastRedaction operates on AWS for reliable cloud storage and does not retain credit card information.
    Starting Price: $19 per minute of video
  • 24
    LogMeOnce

    LogMeOnce

    LogMeOnce

    A formidable cyber security defense should be mindful to thwart internal and external threats. External and internal threats have one common denominator. The end user’s adherence to security, policy, and best practices. External elements exploit an unsuspecting internal user’s adherence to sound security policies to find their way in. Granted, external threats can be addressed with various mechanisms such as firewalls, but, inherently it has its roots and seeds in weak internal shortcomings. However, you can easily curb internal threats by simply establishing “automatic & enforceable” security policies, advising end-users to adhere to secure access protocols with trusted credentials. Thankfully, LogMeOnce Patented Technology offers plenty of ways to protect your team members, credentials, and agency with advanced automated authentication. LogmeOnce dashboard creates powerful and unified access to a user’s entire disparate/numerous set of applications.
    Starting Price: $3 per user per month
  • 25
    Staff.Wiki

    Staff.Wiki

    WorkflowFirst Software

    Staff.Wiki lets you centralize and "wikify" your organization's Policies & Procedures. Provide one up-to-date source for all of your staff's guidance so nobody is ever left guessing or searching around for the latest policy or procedures document. Request staff to acknowledge policies, re-enforce learning with quizzes, connect staff to subject matter experts with in-page webchat, bring procedures to life with interactive checklists, and manage changes to any policy with approval workflow. Sign up for a free trial today.
  • 26
    Activu

    Activu

    Activu

    Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations and incidents. Our customers automatically see, share, and respond to events in real-time, with context, to improve incident response, decision-making, and management. Activu software, systems, and services benefit the daily lives of billions of people around the world. Founded in 1983 as the first U.S.-based company to develop video wall technology, more than 1,000 control rooms and command centers depend on Activu. The most Intuitive, Flexible, Feature rich wall control on the market. Organize information easily based on specific user needs. Easily create Layouts and Templates based on user needs. Organize, place and even move information across multiple video walls. Organize information assets in easily accessible, searchable Spaces. Support for virtually any information source type.
  • 27
    SurePath AI

    SurePath AI

    SurePath AI

    Ensure AI use adheres to corporate policy with our simple-to-implement AI governance control plane. Remove complexity, gain visibility, and securely increase AI adoption, with SurePath AI. Native integrations to your existing security solutions, private models, and enterprise data sources. SSO, SCIM, and SIEM are natively supported. Detect AI use at a network level. Control access and inspect requests for sensitive data leaks. Redact sensitive data found in requests to public models. In-line modification of requests enables productivity while mitigating risk. Redirect traffic to your private AI models. Leverage SurePath AI's private model access controls as your own internally branded enterprise AI portal. Policy-based controls enrich requests with only the enterprise data users are granted access to, giving meaningful responses based on relevant business context. Users' prompts are automatically enhanced to align output to enterprise objectives.
  • 28
    Netwrix Endpoint Protector
    Netwrix Endpoint Protector is an advanced enterprise-grade Data Loss Prevention (DLP) solution designed to protect sensitive data from unauthorized sharing and malicious extraction from employee endpoints. It offers cross-platform capabilities, supporting Windows, macOS, and Linux operating systems, ensuring comprehensive security across diverse IT environments. The solution provides customizable device control to manage USB and peripheral ports, preventing unauthorized data transfers and mitigating risks associated with data leaks. Additionally, it includes content inspection features that enforce sophisticated policies based on sensitive data categories, keywords, and file types, effectively preventing unauthorized data transfers. Netwrix Endpoint Protector also assists organizations in achieving regulatory compliance with standards such as GDPR, HIPAA, and PCI DSS by securing personally identifiable information, protected health information, and payment card information.
  • 29
    Quest ControlPoint

    Quest ControlPoint

    Quest Software

    Confidently secure and protect your SharePoint environment from internal and external threats by with comprehensive permissions management, auditing, reporting and governance policy enforcement. With Quest ControlPoint, you can manage, secure, automate and govern your entire SharePoint environment—whether it’s an on-premises, Microsoft 365 or hybrid SharePoint deployment. Ensure permission policy compliance and prevent security breaches and unauthorized access to sensitive content. Audit, clean up and manage SharePoint permissions and users from a single console across all sites, site collections or farms. Analyze and manage all aspects of permissions whether they are directly assigned, inherited or granted through Active Directory or SharePoint groups.
  • 30
    Coro

    Coro

    Coro Cybersecurity

    Coro puts an end to the security tool sprawl and to the constant worry that things have been overlooked. No need to check everything 10 times a day. Coro will take care of the ongoing security, and will alert you only when you need to take action. Coro analyses the threats to your entire business, takes action to eliminate the risk, and guides you on what to do next to improve your security posture. Coro is the central control point for sensitive data, practice data, and user activity, enabling you to enforce a wide range of security, compliance and governance policies. We scan every email for phishing, malware, ransomware and automatically eliminate threats. We automatically identify and block insider threats, accounts hacking, and malicious activities. We scan every file and email, or any data share for PII/PCI/PHI, and prevent confidential information leakage.
    Starting Price: $8.99 per user per month
  • 31
    Intellectia.AI

    Intellectia.AI

    Intellectia.AI

    Intellectia.AI specializes in investment analysis across stocks, ETFs, and cryptocurrencies, providing Wall Street-level insights tailored for next-generation investors. Utilizing advanced language models, Intellectia.AI employs specialized agents to translate Wall Street expertise into accessible information for Main Street investors. The platform simplifies investment decision-making with features such as one-click technical analysis, enabling users with no prior experience to interpret complex trading charts effortlessly. Our daily stock pick feature offers curated recommendations, helping investors identify optimal buying or selling opportunities. Additionally, our financial copilot provides instant answers to user inquiries, delivering insights refined by financial expertise. Our mission is to democratize access to financial intelligence through AI, ensuring that valuable information is available to all investors, bridging the gap between Wall Street and Main Street.
    Starting Price: $11.96 per month
  • 32
    Locklizard Safeguard PDF Security
    Locklizard protects PDF files and other digital documents from piracy, leakage and misuse. We stop unuauthorized access to documents and control how authorized users can use them. Stop theft of confidential and sensitive information, intellectual property, trade secrets, training courses, reports, ebooks, etc. Share and sell documents securely, stop data leakage and enforce compliance. Lock documents to devices and locations, dynamically watermark content, control expiry, stop printing, editing, copying and screen grabbing, and revoke access at any time. Track how your documents are being used. Locklizard uses strong US Gov strength encryption, DRM and licensing controls to ensure your documents remain fully protected at all times regardless of their location.
    Starting Price: $500.00/month
  • 33
    Forcepoint Email Security
    Organizations need a simple, fast, and cost-effective email encryption solution to help them comply with regulations and protect the confidentiality of their sensitive information. Forcepoint email encryption is a policy-driven technology that enables secure delivery of email communications. It eliminates the traditional barriers of cost and complexity by offering easy administration, without complex key management or additional hardware. And full integration with Forcepoint Email Security and the Forcepoint DLP for Web and Email means you won’t sacrifice the ability to inspect encrypted email for malware and content violations. Visualize risk across multiple events to more rapidly identify potential external or internal threats. Automatically educate employees about phishing attempts and help them understand email best practices.
  • 34
    Ionic Machina
    Data security is managed in silos, but sensitive data traverses multiple applications, environments, data stores, and devices. This makes it challenging to scale data security and implement consistent access controls. Machina is your agile and dynamic authorization solution that easily handles modern challenges. Manage your shared responsibility to secure data at rest and in transit in the cloud and on-prem. Track how data is handled and accessed; audit how policies are enforced across your organization. Deliver context-aware dynamic authorization for each access request to maintain least privilege. Abstract access logic from app code to orchestrate policy enforcement across multiple environments. Implement and enforce consistent access policies in real-time across applications, repositories, workloads, and services. Monitor and analyze data handling and policy enforcement across your enterprise, and generate audit-ready proof of compliance.
  • 35
    Devolutions Server
    Devolutions Server (DVLS) is a self-hosted solution designed to streamline account and credential management across your organization. Without centralized control, teams often struggle with unsecured credentials, unauthorized access, and inconsistent security practices. DVLS addresses these issues by offering a secure, shared account and credential management platform with the ability to enforce access policies, manage user roles, and provide detailed auditing. DVLS also includes optional privileged access components for organizations that require more granular control over sensitive accounts. Fully integrated with Remote Desktop Manager, it offers a seamless way to manage credentials and remote sessions, ensuring that all access is secure and well-governed. Whether you’re a small team or a large enterprise, Devolutions Server simplifies credential management and improves security.
    Starting Price: $3/month/user
  • 36
    Okera

    Okera

    Okera

    Okera, the Universal Data Authorization company, helps modern, data-driven enterprises accelerate innovation, minimize data security risks, and demonstrate regulatory compliance. The Okera Dynamic Access Platform automatically enforces universal fine-grained access control policies. This allows employees, customers, and partners to use data responsibly, while protecting them from inappropriately accessing data that is confidential, personally identifiable, or regulated. Okera’s robust audit capabilities and data usage intelligence deliver the real-time and historical information that data security, compliance, and data delivery teams need to respond quickly to incidents, optimize processes, and analyze the performance of enterprise data initiatives. Okera began development in 2016 and now dynamically authorizes access to hundreds of petabytes of sensitive data for the world’s most demanding F100 companies and regulatory agencies. The company is headquartered in San Francisco.
  • 37
    Telivy

    Telivy

    Telivy

    Experience the industry's most comprehensive and versatile audit tool, deployable seamlessly with a single script. Keep your networks, devices and data safe and secure by discovering any potential entry points for cyber attacks - from both inside and outside your organization. Protect your data from attacks that can encrypt, modify, corrupt or destroy data, such as ransomware. Ensure data is available to anyone in the organization who has access to it. Audit and configure proper access to all corporate assets on-premises and cloud. Enforce policies around user authentication, validation & privileges, and address issues regarding privilege creep. Test resilience to email phishing and application password detection attempts to gain access to restricted areas and exfiltrate confidential data.
  • 38
    Pyth

    Pyth

    Pyth Network

    Leading DeFi applications and protocols rely on Pyth data for their most important projects. Meet the contributors building crypto’s most powerful oracle. Pyth Network is a specialized oracle solution for latency-sensitive financial data that is typically kept behind the “walled gardens” of centralized institutions. Pyth Network is focused on finding a new and inexpensive way to bring this unique data on-chain and aggregate it securely.
  • 39
    Fasoo Smart Screen
    Fasoo Smart Screen (FSS) is an advanced security solution designed to protect sensitive information displayed on computer screens. The solution displays visible dynamic watermarks, containing detailed user-specific information, discouraging users to take a photo with their smart devices. FSS also blocks unauthorized screen capture attempts from specific website URLs and applications, to secure confidential data from malicious users. In addition, FSS tracks all screen capture attempts, including an image of what was captured, providing detailed insights and audit trails for organizations. Key Features: - Dynamic Watermark - Screen Capture Blocking - Audit Trail
  • 40
    firmChannel

    firmChannel

    Corum Digital

    firmCHANNEL provides reliable digital signage software in Canada, the United States, and around the world. Our platform makes it easy to manage digital displays, from interior signage to video walls and digital kiosks, all accessible remotely. Our scalable, user-friendly software is developed and supported in-house. Join our reseller program and grow your business with solid revenue dedicated support and the easiest to use signage software.
  • 41
    eTHIC

    eTHIC

    NCS SoftSolutions

    eTHIC, an industry-defining solution that reshapes the way risk-based auditing and compliance management is executed in the industry and is the best risk assessment software. Capable of centralizing the entire audit management life cycle, eTHIC introduces efficiency and reliability into overall audit Risk Assessment and Risk Mitigation. eTHIC serves as a significant first step in the realm of automation for Governance, Risk and Compliance. eTHIC helps organizations to evaluate the audit policies, its overall effectiveness and adherence. Simply put, eTHIC assists organizations achieve their Goals in the spectrum of Audit and Compliance. With eTHIC, it is step forward to understand the organizational trends in terms of risk and compliance and unlock the hidden treasures in data for business insights. Centralized Compliance for organization wide audit compliance tracking.
  • 42
    Klassify

    Klassify

    Klassify

    Klassify enforces users to clearly identify the sensitivity of information by applying classification labels and protective markings to documents and emails. As users work with the information, visual classification labels encourage them for proper handling as per their organization's information security guidelines. Klassify is a dynamic data classification platform that enables organizations to discover, classify and protect their business-critical data and ensure consistent and proper handling of the data by involving end users. Klassify helps organizations to discover and identify sensitive information in their legacy data across endpoint systems, servers, storage, databases, and cloud platforms for proper data handling in the future. Klassify simplifies the task of complying with regulatory compliances like PCI, GDPR, HIPAA, DPA, etc. View detailed metadata and contextual information to enable improved information governance and organizational efficiency for unstructured data.
  • 43
    Titan

    Titan

    Titan

    Titan is a premier investment firm that manages $500M for 25,000 clients. Wall Street ignores everyday investors, catering to only the ultra wealthy. This divide didn’t sit well with us, so we built Titan: a world-class investment manager for the rest of us. We aim to grow your capital over the long term by following our time-tested investment philosophy: identifying the rare species of stocks known as “compounders” and holding on tight. We don’t just expertly invest your capital — we explain everything. By giving our clients courtside seats, they become the smartest investors they’ve ever been. From instant investing to portfolio manager access, we provide access to many cutting-edge features that other firms do not, free of charge. We are a diverse team of veteran Wall Street investors, engineers, operations, investor relations, and product folks. Our employees and advisors have worked at some of the leading institutions in the world.
  • 44
    Expero

    Expero

    Safelink

    Expero Virtual Data Rooms is a secure, user-friendly platform for storing, sharing and managing sensitive documents online. Designed for dealmakers, legal teams, and due diligence workflows, Expero helps organisations centralise information, enforce granular access controls, and collaborate with internal and external stakeholders with confidence.
    Starting Price: $90 per month
  • 45
    Netwrix Password Policy Enforcer
    Frustrate hackers, satisfy auditors and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware. Unfortunately, native Windows tools often cannot deliver the detailed configurations and rules required for modern password policies, leaving IT teams struggling to keep up with the changing threat landscape and evolving compliance requirements. Meanwhile, user productivity suffers and IT helpdesks are swamped as users grapple with unclear requirements for new passwords. Learn how Netwrix Password Policy Enforcer can help you achieve truly effective password enforcement without all the hassles.
  • 46
    Intapp Documents
    Intapp Documents transforms Microsoft SharePoint into a content management system designed to support how your firm collaborates on engagement documents. With direct integration with Microsoft 365, your teams can easily access engagement-centric SharePoint sites, curate metadata for AI technologies like Microsoft Copilot, and improve collaboration workflows on documents. Intapp Documents delivers a user experience built for the needs of your professionals. Simplify document management and boost collaboration to support your engagement growth, directly from Microsoft Outlook and SharePoint. Improve engagement delivery with content management workflows built for the way your firm works, all from Microsoft SharePoint and Outlook. Access a comprehensive view of client work with synchronized content across Microsoft 365. Increase ROI for your firm’s Microsoft 365 investment and maximize interoperability with other Intapp products.
  • 47
    totemomail
    Email communications are particularly vulnerable to data breaches. It does not take a great deal of effort for anyone who wants to intercept an email message to do so. This places extra security requirements on the email communication of companies and institutions of all sizes and industries. The use of a reliable secure email solution for exchanging sensitive information is therefore essential. So, how can you send emails securely? The FIPS 140-2 validated totemomail® product family meets all of today's security and compliance demands, helping firms to strictly observe security policies, as well as monitor them comprehensively for audits. It is also optimized for mobile devices. Maximum security and confidentiality for all emails and attachments. Automated and centralized certificate and key management. Clear graphical user interface provides easy administration. No need to install dedicated email clients or plug-ins.
  • 48
    Lygos

    Lygos

    KVNC R&D Software Solutions Limited

    Lygos is a software solution for video walls that specializes in visual data analytics. It is tailored for Control Rooms, Operation Centers, and Office Dashboards. This software allows users to load collages of interactive, real-time data visualizations and maps that can scale to seamless screen areas of over 100 million pixels on distributed screen clients. Users can collaboratively control the software through clients on both computers and tablets. Any number of displays can be connected to any number of commercial computers equipped with Lygos software, enabling the creation of large seamless screen areas without the need for specialized equipment. Lygos video wall software emphasizes data visualization and geographic information systems (GIS) for video walls. Lygos serves as a comprehensive software solution for video walls.
    Starting Price: $250/year/screen
  • 49
    Microsoft Purview Data Loss Prevention
    Get intelligent detection and control of sensitive information across Office 365, OneDrive, SharePoint, Microsoft Teams, and on the endpoint. Our data landscape has evolved and data loss prevention (DLP) solutions need to evolve too. Learn about the common deployment states, migration challenges, and best practices including the benefits of adopting a cloud-native DLP solution. Help prevent unauthorized sharing, use, or transfer of sensitive information across apps, services, and devices with Microsoft Purview Data Loss Prevention. Create, manage, and enforce data loss prevention policies from the Microsoft Purview compliance portal. DLP is integrated with information protection classification and labeling capabilities, including out-of-the-box, customer, or advanced SITs and trainable classifiers. Configure, triage, and track alerts through the Data Loss Prevention (DLP) alerts page. Extend DLP alerts to the Microsoft Defender XDR portal and Microsoft Sentinel.
    Starting Price: $12 per month
  • 50
    FileWall
    odix - a market leader in Enterprise CDR (Content Disarm and Reconstruction), is now offering FileWall, a native cybersecurity application for Microsoft Office 365 mailboxes for SMEs. FileWall™ is designed to run in conjunction with existing Microsoft security solutions such as EOP and ATP, ensuring complete prevention against unknown attacks delivered via email attachments. FileWall™ doesn’t harm/change any of Microsoft sender related security capabilities.
    Leader badge
    Starting Price: $1 per user, per month