Alternatives to MetaDefender Vault

Compare MetaDefender Vault alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to MetaDefender Vault in 2026. Compare features, ratings, user reviews, pricing, and more from MetaDefender Vault competitors and alternatives in order to make an informed decision for your business.

  • 1
    ManageEngine Endpoint Central
    ManageEngine Endpoint Central is built to secure the digital workplace while also giving IT teams complete control over their enterprise endpoints. It delivers a security-first approach by combining advanced endpoint protection with comprehensive management, allowing IT teams to manage the entire endpoint lifecycle, all from a single console. With automated patching across Windows, Mac, Linux and 1,000+ third-party applications, it ensures vulnerabilities are mitigated before attackers can exploit them. Its next-gen antivirus (NGAV) feature, powered by AI-driven behavioural detection, provides 24/7 protection against ransomware, malware, and zero-day threats. Endpoint Central further strengthens enterprise defenses with a broad set of security capabilities, including vulnerability assessment and mitigation, peripheral device control, data loss prevention, application control, endpoint privilege management, encryption with FileVault and BitLocker, and browser security.
    Leader badge
    Compare vs. MetaDefender Vault View Software
    Visit Website
  • 2
    SureSync

    SureSync

    Software Pursuits

    SureSync Pro is a file replication and synchronization application that provides one-way and multi-way processing in both scheduled and real-time modes. The Communications Agent provides real-time monitors, delta copies via Remote Differential Compression, TCP communications, compression, and encryption. SureSync Managed File Transfer (MFT) adds file locking, archiving, enhanced logging/status, blob storage support in Azure and Amazon clouds, and a next-generation intelligent transfer engine. File locking enables real-time multi-way collaborative environments with protection against users changing the same file in multiple offices at the same time. SQL Protection simplifies backups of critical SQL databases. SureSync comprehensive enterprise-grade feature set can help solve any file synchronization, replication, and archiving challenge.
    Leader badge
    Partner badge
    Compare vs. MetaDefender Vault View Software
    Visit Website
  • 3
    Securden Password Vault for Enterprises
    Securden Password Vault for Enterprises is a scalable, enterprise-grade credential management solution available in both cloud (SaaS) and on-premise deployments. It centralizes the storage of passwords, SSH keys, DevOps secrets, files, and other sensitive data in an AES-256 encrypted vault, helping organizations enforce strong security controls and defend against insider and external threats. The solution enables secure credential storage, granular access controls, automated password rotation, and just-in-time access while providing full visibility through audit logs, session recordings, and real-time alerts. IT teams can launch secure remote connections such as RDP, SSH, and SQL directly from the vault without exposing credentials. Trusted by enterprises worldwide, Securden helps organizations strengthen security posture, streamline credential governance, improve operational efficiency, and meet compliance requirements across industries.
    Compare vs. MetaDefender Vault View Software
    Visit Website
  • 4
    Kenesto

    Kenesto

    Kenesto Corporation

    Kenesto is a cloud-based storage solution for managing engineering, design, and construction documents. Kenesto is much less expensive than enterprise PDM solutions but provides automatic file locking, versioning, vaulting, 2D/3D viewing, and web-based design review tools not found in consumer-grade cloud storage solutions such as Dropbox and Google Drive. The solution behaves like a mounted disk in the customer's office but the with a single source of truth in the cloud. File locking prevents users from overwriting each other's data. All versions of all files are stored in perpetuity. Using the familiar user interface of Windows Explorer, files and folders are arranged in the same way as one would expect for a C Drive. Kenesto includes tasks and workflows. A plugin for SolidWorks is available for no charge. All file transfers from the user’s local computer to the cloud are encrypted. All files are stored in secure AWS S3 and are encrypted.
    Starting Price: $27/user/month (single user)
  • 5
    OPSWAT MetaDefender
    MetaDefender layers an array of market-leading technologies to protect critical IT and OT environments and shrinks the overall attack surface by detecting and preventing sophisticated known and unknown file-borne threats like advanced evasive malware, zero-day attacks, APTs (advanced persistent threats), and more. MetaDefender easily integrates with existing cybersecurity solutions at every layer of your organization’s infrastructure. With flexible deployment options purpose-built for your specific use case, MetaDefender ensures files entering, being stored on, and exiting your environment are safe—from the plant floor to the cloud. This solution uses a range of technologies to help your organization develop a comprehensive threat prevention strategy. MetaDefender protects organizations from advanced cybersecurity threats in data that originates from a variety of sources, such as web, email, portable media devices, and endpoints.
  • 6
    MetaDefender Kiosk
    The OPSWAT MetaDefender Kiosk Tower is our largest Kiosk capable of scanning the broadest range of media types. The MetaDefender Kiosk Tower is built with an industrial touchscreen and strong metal enclosure. OPSWAT’s proven, globally trusted, and award-winning technology prevents removable and peripheral media-borne threats from entering critical IT and OT environments. MetaDefender Kiosk scans incoming removable media before it enters your network. It identifies malicious content and sanitizes it prior to use. MetaDefender provides access to real-time OT data and enables secure data transfer to OT environments while defending the OT environment from network-borne threats. Enables users to transfer large files automatically, implement data-at-rest encryption, provide role-based access, and ensure regulatory compliance and audit trails. Provides a second layer of defense against threats by blocking access to USB drives and other media devices until security conditions are met.
  • 7
    MetaDefender Managed File Transfer
    MetaDefender Managed File Transfer™ (MFT) is OPSWAT’s security-first managed file transfer solution that unifies automation, usability, and compliance into a single, trusted platform. Secure file analysis is embedded directly into the solution, leveraging AI-based malware detection to deliver a premium MFT experience for both IT and OT environments. This approach provides adaptive zero-day protection by combining real-time file analysis with predictive AI that evaluates file structure and anticipates malicious behavior prior to execution, without detonation. Whether evaluating secure file transfer solutions, exploring MFT automation for workflow efficiency, or seeking MFT compliance to meet stringent standards, OPSWAT's secure MFT solution delivers comprehensive protection with industry-standard protocols and industry-leading file security technologies.
  • 8
    MetaDefender OT Security
    Designed for enterprise-level deployments, MetaDefender OT Security provides full visibility into your OT assets and networks, continuously discovering assets, and monitoring for threats, vulnerabilities, supply chain violations, and non-compliance issues. Critical networks are home to devices of varying ages, makes, models, operating systems, and countries of origin, and without a clear understanding of where they are and how they’re communicating, protecting them and your distributed networks from potential cyberattacks further complicates an already complex problem. OPSWAT MetaDefender OT Security is an AI-powered industrial asset and OT network visibility solution that enables OT personnel to protect their critical environments and supply chain through asset discovery, inventory management, network visibility, and vulnerability and risk management. With its intuitive OT interface, MetaDefender OT Security goes from easy out-of-the-box installation to providing visibility.
  • 9
    Worldr

    Worldr

    Worldr

    Worldr defends the data you share in Microsoft Teams from external breaches while prohibiting outside organizations from exploiting your most sensitive digital assets. It can be utilized in any environment, whether that be cloud based or on-premise; our lightweight architecture can be deployed in minutes for any size organization. Ensure full ownership of data so no one, not even Microsoft, can access it. Messages, user details, and metadata are stored in a database protected by a transparent data encryption layer while encryption keys are stored in Hashicorp Vault. Store your data anywhere in the world based on compliance, legal or regulatory requirements. Adhere to sector specific data transfer and processing regulations and meet mandates enforced by various countries to ensure data sovereignty.
  • 10
    AT&T Cybersecurity

    AT&T Cybersecurity

    AT&T Cybersecurity

    As one of the world’s largest Managed Security Services Providers (MSSP), AT&T Cybersecurity delivers the ability to help safeguard digital assets, act with confidence to detect cyber threats to mitigate business impact, and drive efficiency into cybersecurity operations. Defend your endpoints from sophisticated and ever-present cyber threats, detect and respond autonomously at machine speed, and proactively hunt threats down before they start to act. Instant threat prevention, detection, and response to help protect your devices, users, and business. Automatically terminate malicious processes, disconnect and quarantine infected devices, and rollback events to keep endpoints in a constant clean state. Logic and analysis performed on the endpoint agent, not in the cloud, helping protect endpoints in real time, even when offline. Automatically group alerts into patented storylines that provide analysts with instant actionable context and fewer headaches.
  • 11
    Folder Lock

    Folder Lock

    NewSoftwares.net

    Encrypt your files with AES 256-bit military-grade encryption or lock your files from view and access. Keep prying eyes at bay! Folder Lock can Lock and Hide files and folders within seconds. It enables you to Password Protect and restricts unwanted eyes from viewing files, folders, and drives. Once you’ve locked a folder, it will be hidden from its previous location and can only be accessed through the software interface. Folder Lock creates Lockers. Just as you would put your money in a safe, would you like to keep your files in a digital ‘Locker’ that’s safer than a bank’s vault? You can create ‘Locker(s)’ which are protected by AES 256-bit encryption. You need not encrypt or decrypt files when accessing; simply copy them to Locker and voila! They are encrypted on the fly. Folder Lock offers a 2-way encryption and backup method, letting you backup your encrypted ‘Lockers’ online.
    Starting Price: $39.95/one-time/user
  • 12
    USB Block

    USB Block

    NewSoftwares

    Prevent data leaks by restricting USB drives, external devices, network computers, and ports on your PC. Whitelist your own portable drives and block all others. USB Block prevents data leaks through devices like USB drives, phones, tablets, and other devices that are attached to your PC. It even prevents certain ports and partitions from accessing. You can whitelist trusted devices. This way you can copy data to your own USB, External drives, your iPhone or Android phone but block other such devices from accessing your PC. This feature helps you check whether someone has tried to hack into USB Block by using incorrect passwords All incorrect passwords will be logged to monitor any suspicious activity. Lock and password protect your data from unwanted access and visibility by blocking access to the files, folders, drives, and programs. Windows kernel-level locking and filter driver makes it possible to lock files and folders in Windows.
  • 13
    Ransomware Defender

    Ransomware Defender

    ShieldApps Software Development

    ShieldApps’ Ransomware Defender deals with known ransomware in a way no other solution can. Specially designed for detecting and blocking ransomware prior to any damage, Ransomware Defender blacklists and stops both common and unique ransomware. Once installed, Ransomware Defender stands guard 24/7 utilizing active protection algorithms enhanced with user-friendly alerts and notifications systems. Ransomware Defender is fully automated, taking care of all threats via an advanced Scan > Detect > Lock Down mechanism that proactively stands guard to detected threats, and works alongside all main antiviruses and anti-malware products! Ransomware Defender also features a scheduled automatic scan, secured file eraser, lifetime updates and support! Detects and removes any known ransomware before it can take action and harm your PC. The program will deep-scan your device and find hidden ransomware in both high and low-level folders.
    Starting Price: $49.99 one-time payment
  • 14
    MetaDefender OT Access
    MetaDefender OT Access enables secure, just-in-time remote access to Operational Technology (OT) and Cyber-Physical Systems (CPS), allowing both internal employees and external vendors to connect safely over mutually authenticated, outbound-only TLS tunnels without exposing OT networks to inbound traffic risks. It supports various industrial and IT protocols (e.g., Ethernet/IP, MODBUS, OPC UA, S7Comm, Telnet, SSH, RDP, HTTPS), enabling compatibility across a wide range of legacy and modern OT infrastructure. Depending on deployment mode, the solution can be cloud-managed (with remote configuration via AWS-hosted services) or on-premises (with a local Management Console), making it suitable for both internet-connected and air-gapped environments. It leverages components such as an Admin UI, Windows client (or service-level client), and a Management Console (in on-site deployments) to manage connections and enforce security policies.
  • 15
    Forcepoint Trusted Gateway System
    Forcepoint Trusted Gateway System Secure data transfers for your mission-critical files, every time. Reliably transfer unstructured files transfer. PDF and Microsoft Office files between and within different classification levels for international, federal, state, and local entities. Comply with Raise the Bar initiatives Achieve breach-resilient, mission-safe architectural design that meets the U.S. Government’s Raise the Bar requirements. Streamline file transfer processes and eliminate air gap risks inherent to portable media. System and security administrators with the appropriate permissions perform administration, monitoring, and auditing from the server. Further reduce operational infrastructure cost by adding Forcepoint Trusted Print Delivery and Trusted Mail System. Forcepoint is widely deployed and listed on the NCDSMO baseline list, and supports transfer environments with 38+ networks.
  • 16
    Foretrace

    Foretrace

    Foretrace

    Find exposed data before your adversaries do. Foretrace’s patent-pending Total Recon™ engine detects data exposure and alerts you before it results in costly breaches. Credentials can be exposed in data breaches, from leaks or publicly shared sources such as code repositories. Exposed account names and passwords are used by hackers to identify and target accounts. Exposed internal documents and collaboration suites can leak sensitive data. Adversaries can use this data to blackmail organizations or damage their reputations. Metadata is exposed in almost any document or file that is created and is rarely removed before sharing files. This metadata is used by attackers for targeted phishing and malware attacks. Discovered or stolen corporate data and credentials are sold and exchanged on criminal and dark web forums, resulting in easy access for attackers and potential damage to an organization’s reputation.
  • 17
    Hush App

    Hush App

    Syneidis

    Encryption is easy. Secure file transfers for Android, iOS and Web. Send encrypted files to anyone, even if they don’t have the app. Set up a business account, invite users to the team and manage permissions. HushApp is extremely easy to use whether you send or receive files. We don't have any information about you, your keys, files you store or send. With HushApp you can send encrypted files even to users who don't have the app. We use military-grade AES-256 and RSA-2048 encryption standards to protect your files. We are based in European Union and so are our servers. Do you want to secure business communication or preoccupied about GDPR? Our app helps you to keep all the work-related documents private and safe. HushApp allows to protect and send files safely without complications, in any platform. Sign up for HushApp and enjoy the peace of mind of end-to-end encryption.
  • 18
    SearchInform FileAuditor
    SearchInform FileAuditor is a DCAP solution (data-centric audit and protection) for automated audit of information storages, search for access violations and tracking changes made to critical data. The system protects confidential documents from careless and deliberate malicious actions of employees and puts things in order in file storages. The system performs: •Classification of vulnerable data Finds files in a document flow that contain critical information, and adds a special mark to each file, indicating the type of info it contains: personal data, trade secret, credit card numbers, etc. •Access rights audit Controls access rights to information (full access, editing, reading, writing, reading and changing, etc.). Finds confidential files stored in violation of established security rules . •Monitoring and blocking user actions Audits user operations with the file system. •Critical documents archiving Makes shadow copies of critical files.
  • 19
    PT MultiScanner

    PT MultiScanner

    Positive Technologies

    PT MultiScanner provides multiple levels of anti-malware protection to detect and block infections on corporate infrastructure, uncover hidden threats, and facilitate investigation of malware-related security incidents. Counting on the same antivirus vendor to be right every time? Draw on the best anti-malware vendors and Positive Technologies expertise instead. Extensive integration support and scalability make PT MultiScanner the right choice for both startups and the largest corporations. Suspicious objects are scanned with multiple anti-malware engines, static analysis, and Positive Technologies reputation lists. The solution supports scanning of files and archives, including recursively compressed ones. As a result, PT MultiScanner can spot and block malware far more effectively than any one method used in isolation.
  • 20
    HTTPCS Cyber Vigilance
    HTTPCS solutions comparison vs the other automated tools on the cybersecurity market. The features of each HTTPCS solution have been compared to the features of alternative solutions available on the cybersecurity market. Click on a tab and discover HTTPCS, a complete alternative to other cybersecurity solutions. 4 tools have been compared to HTTPCS Cyber Vigilance, a darknet monitoring tool that warns you in real-time if your organization becomes the target of a cyberattack. 6 tools to scan and detect security breaches on websites have been compared to HTTPCS Security, the vulnerability scanner with a 0 false-positive guarantee. 4 web integrity monitoring products and viewing of changes have been compared to HTTPCS Integrity, a cybersecurity solution which detects malicious files, malware and internal errors. Request a demo or try a free 14-day trial for HTTPCS Integrity and see for yourself its features!
  • 21
    Microsoft AccountGuard
    Microsoft AccountGuard is a free cybersecurity service designed to bolster the defenses of high-risk organizations that play a critical role in democratic processes. Launched in 2018, it offers enhanced threat monitoring and protection for eligible Microsoft 365 customers, including political campaigns, election officials, journalists, human rights organizations, nonprofits, and certain government entities. Key features include real-time notifications of nation-state cyber threats, security best practices guidance, access to exclusive workshops and webinars, and a direct support line to Microsoft's Democracy Forward team. Additionally, AccountGuard provides enhanced identity protection through Azure Active Directory P2 trial licenses and discounted Yubico security keys. Organizations can enroll at no additional cost, benefiting from Microsoft's world-class security expertise to detect and defend against advanced adversaries targeting the foundation of democracy.
  • 22
    Ivanti Neurons for RBVM
    Ivanti Neurons for RBVM is a risk-based vulnerability management platform designed to help organizations prioritize and remediate cybersecurity risks efficiently. It continuously correlates vulnerability data, threat intelligence, and business asset criticality to provide a contextualized view of risk. The platform automates remediation workflows, including SLA management and real-time alerts, to accelerate vulnerability closure. Role-based access controls and customizable dashboards foster collaboration across security teams from SOC to C-suite. Ivanti’s proprietary Vulnerability Risk Rating (VRR) prioritizes vulnerabilities based on real-world threat context rather than severity alone. This enables security teams to focus on the most critical risks and reduce exposure to ransomware and other cyber threats.
  • 23
    HUB Vault HSM

    HUB Vault HSM

    HUB Security

    Hub Security’s Vault HSM goes well beyond the average run-of-the-mill key management solution. HUB as a platform not only protects, isolates and insures your company’s data, but also provides the infrastructure you need to access and use it securely. With the ability to set custom internal policies and permissions, organisations big or small can now use the HUB platform to defend against ongoing threats to their security’s IT infrastructure. The HUB Vault HSM is an ultra-secure hardware and software confidential computing platform, made to protect your most valuable applications, data and sensitive organizational processes. The programmable and customizable MultiCore HSM platform enables companies a simple, flexible and scalable digital transformation to the cloud. The HUB Security Mini HSM device is compliant to FIPS level 3, enabling an ultra secure remote access to the HUB Vault HSM.
  • 24
    ijura

    ijura

    ijura

    Ijura Enterprise is a cloud-deployed next-generation mobile threat defense solution that protects end-user devices and IoT in the data network. Our cloud-based solution protects smartphones, laptops (with SIM), tablets, and IoT devices from malicious content and cybercriminal threats. With three patents already filed, our innovation addresses mobile security in a holistic fashion. This means we solve the vulnerabilities where sophisticated attacks bypass security layers while ensuring the end-user has a seamless experience when accessing their corporate data and personal apps. Our zero-trust philosophy ensures personal data protection is not bypassed while protecting the enterprise. Ijura Enterprise has 3 patents pending pertaining to securing any connected device through the telecom operator's endpoints by directly integrating with an operator through its data servers. Ijura Enterprise inspects every data packet for various vulnerabilities such as phishing, malware, botnets, etc.
  • 25
    Trinity Cyber

    Trinity Cyber

    Trinity Cyber

    Cyber risk is increasing and today's attacks, whether ransomware or malware, are more sophisticated and succeed with alarming success. These attacks often go undetected with traditional Intrusion Prevention Systems (IPS), Secure Web Gateways (SWG) and other security products. For the threats these products do detect, false positives and significant incident response workloads strain Security Operations Center (SOC) resources. In addition, many cyber attacks begin with a compromised or corrupted file. Considering the tremendous number of files with which an organization interacts in a given day, it is an enormous challenge to protect the organization from these kinds of threats. Tremendous speed and accuracy are mandatory for any potential solution so as not to disrupt or hinder organizational operations and performance. Running suspicious files through sandboxing is too expensive and too slow to address these types of threats at speed and scale.
  • 26
    VFind Security ToolKit
    The VFind Security ToolKit (VSTK) is a suite of four powerful network, and computer, anti-malware utilities that provide flexible and uncompromising computer anti-malware protection. The VFind™ Security ToolKit (VSTK) is a suite of four powerful network and computer anti-malware utilities, that provide flexible and uncompromising computer anti-malware protection. CIT: Is a fantastic anti-malware security tool that has multiple uses. It reports on all files that have been removed, added, modified or duplicated. It can tighten baseline configuration control down to a single bit. It can also be used with surgical precision on an entire system or single file. The CIT tool produces a database of cryptographic hash values for every file it is directed to manage. Besides its use in anti-virus protection, the UAD tool is built for making identification based upon direct inspection of the data. It makes no assumptions about the file’s contents based upon the file’s name.
    Starting Price: $1035 one-time payment
  • 27
    BitSafe Anti-Malware
    BitSafe Anti-Malware is a robust security solution designed to protect your PC from the latest malicious threats. Utilizing advanced security algorithms, it offers multi-scan capabilities, including quick and deep scans, to detect and eliminate malware effectively. The software provides live updates, ensuring real-time defense against emerging threats, and features a quarantine function to isolate and manage suspicious files safely. Its multi-dimensional shield offers comprehensive protection across your Windows system, internet activities, and startup processes. Developed by Bit Guardian GmbH, BitSafe Anti-Malware emphasizes user-friendly operation and includes 24/7 technical support to assist with any security concerns. By integrating malware removal, system protection, and continuous updates, it aims to deliver a secure and seamless computing experience.
    Starting Price: $49.95 per 6 months
  • 28
    Enigma Vault

    Enigma Vault

    Enigma Vault

    Enigma Vault is your PCI level 1 compliant and ISO 27001 certified payment card, data, and file easy button for tokenization and encryption. Encrypting and tokenizing data at the field level is a daunting task. Enigma Vault takes care of all of the heavy liftings for you. Turn your lengthy and costly PCI audit into a simple SAQ. By storing tokens instead of sensitive card data, you greatly mitigate your security risk and PCI scope. Using modern methods and technologies, searching millions of encrypted values takes just milliseconds. Fully managed by us, we built a solution to scale with you and your needs. Enigma Vault encrypts and tokenizes data of all shapes and sizes. Enigma Vault offers true field-level protection; instead of storing sensitive data, you store a token. Enigma Vault provides the following services. Enigma Vault takes the mess out of crypto and PCI compliance. You no longer have to manage and rotate private keys nor deal with complex cryptography.
  • 29
    Vali Cyber

    Vali Cyber

    Vali Cyber

    We understand that you are being asked to defend against a relentlessly growing threat landscape while being constrained by staff and budget, Vali Cyber is here to help. Harden your environment using lockdown rules to reduce attack surface to prevent attacks, secure Linux endpoints, and take control with multi-factor authentication (MFA) for SSH, even in disconnected environments, to support a zero-trust environment. Detect and stop malware at machine speed with AI/ML-based behavioral threat detection effective against ransomware, cryptojacking, and Wiperware, including unknown and fileless variants with the same efficacy everywhere—cloud-enhanced, not cloud-dependent. Ensure uptime using fully automated remediation that runs in milliseconds to undo damage to the file system and remove attempts to persist files for future attacks.
  • 30
    ChapsVision CrossinG
    CrossinG® by ChapsVision allows you to control flows, guarantee confidentiality and integrity of exchanges between two information systems, while maintaining a strict separation between networks of different sensitivities. The strong partitioning and content analysis prevent the risk of propagation of an attack from one network to another, the injection of malicious content and data leakage. Delivered as an integrated, multi-functional appliance, CrossinG® by ChapsVision provides transfer performance, ease of operation, and compliance assurance. CrossinG® by ChapsVision provides effective protection for critical networks that cannot be satisfied with a firewall. Verify the integrity of incoming files and protect the network from malicious content. Check the integrity of incoming files and protect the network from malicious content.
  • 31
    R&S Trusted Gate

    R&S Trusted Gate

    Rohde & Schwarz Cybersecurity

    R&S®Trusted Gate – Secure Data Exchange provides secure exchanging of sensitive data between authorized partners. Data is automatically encrypted and can be securely synchronized from an internal network to all major online file sharing service. Customers can define deployment, encryption and authentication without relying on a third-party service provider. No confidential data will be exposed to a cloud storage provider or sharing service. Secure sharing of data with the R&S®Trusted Gate, Secure Data Exchange is simple and efficient. Customers can define the internal network folders that need to be shared with external partners. As soon as files will be stored in these folders, R&S®Trusted Gate is immediately syncing the confidential data to the defined external target. Data will be automatically encrypted. This solution is not only limited to office file types but it is applicable to almost all scenarios, e.g. server migration and backups.
  • 32
    Calyx PointCentral
    Pair the administrative control you want with the security you need. Offering a single, centralized database, PointCentral lets your staff work on individual components of a single file while maintaining data integrity. Pre-built and customizable compliance rules help you meet federal regulations. Give employees access to centralized files and templates, regardless of location. Maintain file integrity, even when multiple users have access to the same files. We offer two great options to host PointCentral. Craft flexible, granular rules that complement your business practices and processes. You can configure access rights for multiple locations, users, and user roles. Decrease the potential for errors with customized trigger warnings and compliance rules. Increase loan quality while preventing unauthorized changes across multiple locations. Automatic file synchronization ensures that files are locked on the server when downloaded and removed from users’ local workstations when uploaded.
  • 33
    Intermedia SecuriSync

    Intermedia SecuriSync

    Intermedia Cloud Communications

    Three functions in one product: file sync & share, real-time backup, and antivirus (including ransomware). Easily save, synchronize, and access the most current versions of files from any device, with unlimited versioning. Restore in real time files stored in the cloud, on desktops, mobile devices, and more. Reduce downtime from ransomware with built-in anti-malware and antivirus protection from Bitdefender. Guard against compromised passwords with two-factor authentication, administered from the HostPilot control panel. Your files will be protected with Bitdefender’s anti-malware and antivirus software—available for new and existing SecuriSync customers at no extra cost. Two-factor authentication lets administrators add a second layer of protection. Real-time backup of all PC files and mobile photos and videos. Restore files to any point in time with one click. Protects files & enables quick recovery from ransomware attacks.
    Starting Price: $14.99 per user per month
  • 34
    TEMASOFT Ranstop
    There is no secret the malware landscape is very dynamic, and thousands of samples emerge every day. Ranstop is designed to handle any known or unknown ransomware. For this purpose, it uses a very efficient detection engine based on behavior analysis and is continuously tested against new threats. In the event of an attack, without good anti-ransomware protection, data recovery can be very painful. Even with the help of backup solutions, getting files back and making sure the ransomware is not active anymore on the network can take a lot of time. Ranstop can mitigate this aspect. Besides blocking the threat, it also quarantines its related files to prevent further infections. Moreover, it can automatically isolate the affected machines.
  • 35
    Cavirin

    Cavirin

    Cavirin Systems

    In today’s world, where a data breach seems like a daily event, employing effective cybersecurity is critical. While cloud-based systems offer rapid development and instant scalability, the risk of unintentionally growing the attack surface on those systems increases significantly. The key to managing your cloud security starts with identifying vulnerabilities and continues with rapid remediation. A critical first step to securing your cloud is to ensure proper configurations and standards compliance of your critical infrastructure and access management services. Terraform is an open-source infrastructure as a code software tool that provides a consistent CLI workflow to manage hundreds of cloud services. Terraform codifies cloud APIs into declarative configuration files.
  • 36
    IBM Sterling Control Center Monitor
    Get out of reactive fire-fighting mode. Proactively address issues and achieve your SLA commitments with confidence. IBM® Sterling Control Center Monitor tracks the critical events across your B2B and managed file transfer (MFT) infrastructure for improved operations, customer service and B2B governance. It applies rules to alert key audiences when there is a problem with a server, process or transfer. Actionable dashboards are customized for various types of users. Monitor file transfers and B2B processes. Align server views with operational logic. Identify schedules, processes, file names, user roles and security capabilities. Monitor file transfers and B2B processes. Align server views with operational logic. Identify schedules, processes, file names, user roles and security capabilities. Continuous controls monitoring and audit reporting. Consolidate file transfer and B2B process event data from all B2B and MFT systems for a single, consolidated view.
  • 37
    XM Cyber

    XM Cyber

    XM Cyber

    Networks change constantly and that creates problems for IT and security operations. Gaps open exposing pathways that attackers can exploit. While enterprise security controls like firewalls, intrusion prevention, vulnerability management and endpoint tools attempt to secure your network, breaches are still possible. The last line of defense must include constant analysis of daily exposures caused by exploitable vulnerabilities, common configuration mistakes, mismanaged credentials and legitimate user activity that exposes systems to risk of attack. Why are hackers still successful despite significant investments in security controls? Several factors make securing your network difficult, mostly because of overwhelming alerts, never-ending software updates and patches, and numerous vulnerability notifications. Those responsible for security must research and evaluate piles of data without context. Risk reduction is almost impossible.
  • 38
    LanguageVault

    LanguageVault

    BIG Language Solutions

    LanguageVault® combines proprietary technology and innovative processes to ensure complete security throughout the translation workflow. As the only platform with a SOC 2 type II report, LanguageVault® addresses a long-standing industry challenge of securing content through the translation life cycle. LanguageVault® works seamlessly with our strict internal processes while introducing new levels of control and transparency for clients, from guaranteeing data encryption in transit and at rest, to real-time file recovery, protected data availability, controlled and restricted role-based access, customized data retention periods, and continuous vulnerability assessments. By isolating your data into a single secure environment, the platform also provides a secure online hub for all your translation activity, offering a single access point for all your translation tasks and enabling you to track their progress, expedite projects, set notifications, and customize user settings.
  • 39
    Clean Master for PC

    Clean Master for PC

    Cheetah Mobile

    Clean Master for PC has a clear and flexible interface with a modern design that enhances the content. It is easy to use and understand, even for beginners. When the analysis is complete, you are presented with two options for deleting unnecessary files: you can press Clean Now to remove all unnecessary files that are displayed, or you can manually remove specific files if you are only interested in certain categories. Once the cleaning is finished, Clean Master displays a bar graph indicating the amount of space recovered from each category. Securely destroy the contents of sensitive or undeleted files and folders beyond recovery. Lock out unwanted access and remove browsing records with the anti-tracking feature. Intelligently optimize system and network settings to prevent lagging. Real-time notifications and clean junk files automatically.
    Starting Price: $15.90 per month
  • 40
    odix

    odix

    odix

    odix’s patented technology disarms malicious code from files. Our concept is simple, instead of trying to detect the malware, odix generates a malware free copy of the file to the user. Total protection from known and unknown threats delivered to corporate network by incoming files. odix’s malware prevention solutions are based on its Deep File Inspection and TrueCDR™ patented technology. The algorithms provide new detection-less approach against File-Based attacks. The core CDR (Content Disarm and Reconstructions) process focuses on verifying the validity of the file structure on the binary level and disarms both known and unknown threats. This is very different from anti-virus and sandbox methods that scan for threats, detect a subset of malware and block files. With CDR, all malware, including zero-days, are prevented and the user gets a safe copy of the originally infected file.
  • 41
    IObit Malware Fighter
    Our powerful malware fighter protects you against any PC threats like virus, ransomware, spyware, Trojans, adware, worms etc. New advanced heuristics added to intelligently detect virus variants and more threats. Also, the brand-new anti-malware engine enlarged by 100% helps you to get a fast and comprehensive scan of your computer system, and collaborate with the Bitdefender engine and IObit Anti-ransomware engine to offer multi-core protection. Your private files can be locked securely in the safe box of IObit Malware Fighter 8 too. Just set a password and put your important data into it, nobody is permitted to get access except yourself. Besides, the anti-ransomware engine in data protection of this malware fighter gives second protection for your privacy. It intelligently prevents all your files from any ransomware. Browser security guarantees your daily surfing for both work and entertainment.
    Starting Price: $19.95 per year
  • 42
    SandBlast Threat Emulation

    SandBlast Threat Emulation

    Check Point Software Technologies

    Attacks from unknown threats pose critical risks to businesses and are the hardest to prevent. This is why many businesses rely on SOC teams to detect them after breaching their systems. This is an ineffective strategy. Check Point’s evasion-resistant technology maximizes zero-day protection without compromising business productivity. For the first time, businesses can reduce the risk of unknown attacks by implementing a prevent-first approach. ThreatCloud is Check Point’s rich cyber defense database. Its threat intelligence powers Check Point’s zero-day protection solutions. Check Point Infinity is a unified security architecture that delivers real-time threat prevention of both known and unknown threats, simultaneously protecting the network, cloud, endpoints and mobile and IoT devices.
  • 43
    Morro Data CloudNAS
    Morro Data CloudNAS Global File Services enable companies with two or more offices to share their files in real-time and no VPN or sync software required. Cloud NAS combines the local network performance of a NAS with the reliability, scalability, and accessibility of the cloud for a cloud-first solution. It allows businesses to quickly and efficiently have unlimited file storage, collaborate with multiple office file sync & lock, and get instant disaster recovery. Morro Data CloudNAS enables remote users to work on the same project as if on the same local network. The remote users can collaborate on the projects across multiple global sites with file syncing and locking in the background. Cloud NAS supports file locking for AutoCAD, Civil3D, Bluebeam, Microstation, Adobe, and Microsoft Office. The project files are safely stored in the cloud and cached to the local CacheDrive gateway for performance.
  • 44
    NeuShield Data Sentinel
    The War on Ransomware is Over. NeuShield Data Sentinel does more than just detecting and blocking ransomware attacks. We’re the only anti-ransomware technology that can recover your damaged data from malicious software attacks without a backup. Data Sentinel uses Mirror Shielding™ to protect files ensuring that you can instantly recover your important data from any ransomware attack. Patented technology that adds a barrier to protected files preventing them from being modified. Mirror Shielding™ makes an attacker believe they have access to a computer’s original data files, but they are in fact only seeing a mirror image of them. Restores operating system files and settings back to a known good state allowing you to quickly regain access to your computer after a ransomware attack. One-Click Restore also removes both known and unknown malware. Protects the boot portion of a drive to prevent aggressive types of ransomware from taking over the boot process.
  • 45
    Symantec Data Center Security
    Complete server protection, monitoring, and workload micro-segmentation for private cloud and physical on-premises data center environments. Security hardening and monitoring for private cloud and physical data centers with support for Docker containers. Agentless Docker container protection with full application control and integrated management. Block zero-day exploits with application whitelisting, granular intrusion prevention, and real-time file integrity monitoring (RT-FIM). Secure OpenStack deployments with full hardening of Keystone identity service module. Data center security: monitoring. Continuous security monitoring of private cloud and physical on-premises data center environments. Optimize security performance in VMware environments with agentless antimalware protection, network intrusion prevention, and file reputation services.
  • 46
    Pulsar Music Player

    Pulsar Music Player

    Rhythm Software

    Gorgeous user interface and animation following material design. Automatically download missing album cover and artist image. User-friendly interface for managing and playing your music, easy and effective. Application size is only 2.6M, but still a full featured music player. Pulsar helps you to manage and play music from every perspective, it contains almost everything you need for a music player. Pulsar support standard music file types including mp3, aac, flac, ogg, wav and etc. If you cannot find your music in Pulsar, please click “rescan library” menu item from action bar to rescan device.
    Starting Price: $2.99 one-time payment
  • 47
    AlephTransfer

    AlephTransfer

    AlephTransfer

    Reduce the likelihood of insider threats, data breaches and ransomware attacks. Maximize organizational adherence to regulatory compliance requirements and cyber-security best practices and standards. Sharing large files or massive folders can be a huge pain. AlephTransfer makes it easier and makes external sharing seamless. Aleph Transfer is the fastest and most reliable way to transfer time-critical files. AlephTransfer helps in reducing infrastructure maintenance cost, increasing employee productivity gain, and boosting project efficiency. Today, Business Email Compromise (BEC) is responsible for over 50% of cybercrime losses. At the same time, organizations throughout virtually every industry continue to share highly sensitive information via low-security email attachments or easily breached cloud sharing services. At AlephTransfer, our streamlined Managed File Transfer (MFT) platform was designed to promote a smooth workflow while keeping files safe.
  • 48
    transfer4all

    transfer4all

    transfer4all

    Share & Send Big Files Fluidly. Transfer-exchange and deliver big files up to 50GB. A fast and free app to make it easy to send big files. Simplify file transfer tasks, save time, and improve communications. Secure transfer platform with zero trust network security. Encrypted cloud storage with high level data encryption. Hybrid cloud at maxi speed. Cloud file sync to keep files up to date across all devices. Performance and availability with Load Balancing System and ultra-fast static and dynamic CDN over global network. Transfer file size limit: 50.00 GB Space limit: 1,000.00 GB No. of download: 1000 Unlimited Users User Security Roles User Management 1 TB of Storage HTTPS secured transfers/uploads Manage transfer history Files never expire Unlimited downloads Up to 50 GB per file 5 Receive File Plugins for Website Unlimited Bandwidth Customizable Branding Premium Support Up to 100 Emails at once.
    Starting Price: $9 per month
  • 49
    Lockbox

    Lockbox

    Global Archives

    Our LockBox online document storage software is unique in the industry for its end-user simplicity, and security. LockBox allow clients to access their records from anywhere. Services provided range from Scan-on-Demand when you need one file from our storage facility to having all records scanned and available through our desktop portal. Our simple and secure software makes it possible for staff to access what they need without a dusty trip to the basement or storage closet. LockBox is an entire suite of solutions; a group of web-based software applications that function together to archive documents in a private, secure, offsite, online library vault. With minimal training, authorized users can quickly locate, view and share individual documents within the library. A designated administrator oversees all user operations to maintain an added level of control and security.
    Starting Price: $250 per month
  • 50
    Code42

    Code42

    Code42

    Welcome to data security for the collaborative and remote enterprise. Validate proper use of sanctioned collaboration tools, such as Slack and OneDrive. Uncover Shadow IT applications that may indicate gaps in corporate tools or training. Gain visibility into off-network file activity, such as web uploads and cloud sync apps. Quickly detect, investigate and respond to data exfiltration by remote employees. Receive activity alerts based on file type, size or count. Access detailed user activity profiles to speed investigation and response.