Alternatives to NTFS Permissions Auditor

Compare NTFS Permissions Auditor alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to NTFS Permissions Auditor in 2026. Compare features, ratings, user reviews, pricing, and more from NTFS Permissions Auditor competitors and alternatives in order to make an informed decision for your business.

  • 1
    CPTRAX for Windows

    CPTRAX for Windows

    Visual Click Software

    Server File Activity Tracking - Audit who is creating, accessing, moving, and deleting your files and folders. Track file permission changes. Real-time alerts about critical file activities. Malicious activity containment (Ransomware, mass file deletes, etc.) Workstation File Activity Tracking - Audit who is copying files to USB or other removable drives. Track who is uploading files from a browser or via FTP. Block files from being created on USB/removable device. Email alerts when a removable device is connected. Active Directory Auditing - Keep audit logs and get real-time alerts of important Active Directory changes without dealing with SACLs or Windows Event Logs. Server Authentication Auditing - Track authentications into Windows Servers and Citrix sessions. Review all failed logon attempts. Workstation Logon/Logoff Tracking - Get visibility on workstation logons/logoffs, including locks, unlocks and password changes. Review all failed logon attempts.
  • 2
    Netwrix Auditor
    Netwrix Auditor is a visibility platform that enables control over changes, configurations and access in hybrid IT environments and eliminates the stress of your next compliance audit. Monitor all changes across your on-prem and cloud systems, including AD, Windows Server, file storage, databases, Exchange, VMware and more. Simplify your reporting and inventory routines. Regularly review your identity and access configurations, and easily verify that they match a known good state.
  • 3
    KingShiper NTFS for Mac
    KingShiper NTFS for Mac offers a lightweight and reliable solution for Mac users seeking quick read-and-write capabilities on their NTFS storage devices. This software ensures the integrity of your stored data while enabling efficient bidirectional access. Designed as a file system driver, KingShiper NTFS for Mac empowers macOS to interact harmoniously with hard drives, solid-state storage devices, and USB thumb drives formatted with the Windows NTFS file system. While macOS inherently reads Windows-formatted NTFS drives, it lacks the capacity to write to them directly. With the integration of KingShiper NTFS for Mac, users gain the ability to fluidly engage with NTFS file systems, encompassing external hard drives, USB drives, and more. Enabling rapid mounting and unmounting of Windows NTFS storage devices via Mac's menu bar application, this software grants you complete command over your NTFS drives.
  • 4
    NTFS Permissions Reporter
    Get your easy-to-use NTFS permissions tool to analyze and report NTFS security! Report NTFS permissions in a nicely formatted Excel sheet or HTML report. Report effective NTFS permissions owner to the owner of the data. Get User-specific effective NTFS permissions of a share or folder and its hierarchy. You can save any Permissions Report using Company Edition or Enterprise Edition to either a local built-in database or an external Microsoft SQL Server, to load it at any time to see the differences. Keep your NTFS Permissions Report clean and exclude any Active Directory security groups from the scan. There is no need to report the names of known accounts, e.g. backup operator or share operator. In case there are some special ACEs set to folders you can translate these security settings to meaningful labels.
    Starting Price: €997 per year
  • 5
    Leapdocs

    Leapdocs

    Leapdocs

    Leapdocs is an affordable, secure, easy document management application for enterprises, small businesses, and start-ups. Import scans, Word documents, Excel spreadsheets, photos, Emails, and files of any type and from any source. Files are automatically indexed for searching. Files are stored in folders just like on your computer, and custom metadata allows each file to have values such as, SSN, Invoice Number, or Birth Date. Users are organized into Groups and detailed file and folder permissions can be specified explicitly or inherited. User actions are also audit logged. Full Text Search is available for nearly every file you import thanks to Automatic OCR. Plus, custom metadata can be searched and filtered. Leapdocs organizes files into folders just like the computer or online storage you already know. Leapdocs Cloud runs on Microsoft Azure. Files are encrypted at-rest and multiple geographically distributed data centers keep us up and running 24/7.
  • 6
    NEXAVAULT

    NEXAVAULT

    Office Infosystems

    NEXAVAULT store and manage all your documents digitally in secure location. Efficient Document Retrieval , Save time with quick access to files using advanced search functions. AI-powered document classification and summary. Preserve version histories and restore previous versions with ease. Prevent data loss and maintain a full audit trail of changes. Granular Access Control. Set permissions at the document and folder level. Control who can view, edit, delete, or share files. Manage your documents from anywhere with an intuitive mobile app. Scan and upload documents on the go. Instantly review and approve files from your mobile device. Ensure data availability and redundancy across environments. NEXAVAULT providing both cloud and on-perm solutions.
  • 7
    FolderManifest

    FolderManifest

    ARCED International LLC

    FolderManifest is an offline Windows desktop tool for analyzing, documenting, and verifying folder contents. It scans any directory and generates a static, searchable HTML manifest that captures file structure, file types, sizes, timestamps, and checksums. Users rely on FolderManifest to detect duplicate files, validate backups, verify file integrity over time, and document folder states for audits or handovers. Because manifests are saved as static HTML, they remain searchable even if files are later moved, modified, or deleted. FolderManifest runs entirely offline—no cloud services, no accounts, and no data leaving the machine—making it suitable for sensitive, large, or regulated data environments. It is commonly used by researchers, developers, IT teams, and organizations managing large file collections who need transparency, traceability, and confidence in their file systems. FolderManifest is licensed as a one-time lifetime purchase and includes unlimited scans.
    Starting Price: $179 Lifetime License
  • 8
    Cloudwork

    Cloudwork

    Cloudwork

    Share documents defining read-only, review, comment, or full access. Set individual permissions or provide access to a team with one click. Secured links to external users also possible. Create and edit text documents, spreadsheets and presentations using integrated online editors. 100% compatible with Microsoft formats. Quickly and accurately file emails into your LEGALX document management system. Easily set rules to automatically file emails and map folders. Automatically keep all the files within specific folders organized, up-to-date, and available on the cloud, your mobile devices and local computer. Define and maintain directory structures to keep file organization uniform across all devices. Securely communicate with your team via personal messages or group conversations. Create a virtual workspace for every project with access control and audit trail. Secured video meetings for multiple participants with features including share screen, recording, waiting room, etc.
  • 9
    Collabor8online

    Collabor8online

    Collabor8online

    UK based online document sharing for all organisations. Easy to set up, you control who can see what, There is no better way to share files and Collabor8. File Sharing Online quickly and easily with Collabor8online, documents can be shared in view only, or with edit and delete permissions. System administrators have full control over who can see what, giving system administrators complete control. Existing users permissions can be copied when setting up new users. Collabor8online is online document sharing, the easy and secure way. System administrators have full control over who can see what. View, edit and delete permissions can be given for each folder or subfolder putting you in complete control. Users and Clients only get to see information that is relevant to them and that you want them to see. Full audit trail tells you who did what and when.
    Starting Price: $525.30 per month
  • 10
    Nsauditor Network Security Auditor
    Nsauditor Network Security Auditor is a powerful network security tool designed to scan networks and hosts for vulnerabilities, and to provide security alerts. Network Security Auditing Software and Vulnerability Scanner Network Security Auditing Software and Vulnerability Scanner Nsauditor network auditor checks enterprise network for all potential methods that a hacker might use to attack it and create a report of potential problems that were found. Network Security Auditing Software and Vulnerability Scanner Network Security Auditing Software and Vulnerability Scanner Nsauditor network auditing software significantly reduces the total cost of network management in enterprise environments by enabling IT personnel and systems administrators gather a wide range of information from all the computers in the network without installing server-side applications on these computers and create a report of potential problems that were found.
    Starting Price: $69 one-time payment
  • 11
    Indxr

    Indxr

    Encodian Solutions

    Perform limitless OCR of PDF files in SharePoint Online at a fixed, affordable price. While OCR can be resource-intensive, Indxr offers cost-effective solutions. Get started with our free plan, which includes an audit feature that scans your SharePoint Online environment, providing detailed reports on non-searchable content on a per-page basis. Gain valuable insights into the extent of non-searchable content across your organization. Customize OCR operations at the site, document library, or individual folder level with options such as image cleanup (deskew, despeckle, auto-rotate), source file overwriting, metadata and permissions copying, new file prefixes, and more. Save your OCR configurations and automate their execution using Windows Task Scheduler. Enjoy unlimited OCR capabilities, CPU cores, users, and instances.
    Starting Price: $2,999 per year
  • 12
    Specops Password Auditor
    Authentication and password security is more important than ever. Our password audit tool scans your Active Directory and identifies password-related vulnerabilities. The collected information generates multiple interactive reports containing user and password policy information. Specops Password Auditor is a read-only program, and available for free download. Analyze your domain password policies, and fine-grained password policies, to see if they enable users to create secure passwords. Generate reports to identify accounts with password vulnerabilities, including expired passwords, identical passwords, blank passwords, and more. In addition to these insights, Specops Password Auditor allows you to measure the effectiveness of your policies against a brute-force attack. For a complete list of the password reports, see the product overview.
  • 13
    Change Auditor

    Change Auditor

    Quest Software

    Change reporting and access logging for Active Directory (AD) and enterprise applications is cumbersome, time-consuming and, in some cases, impossible using native IT auditing tools. This often results in data breaches and insider threats that can go undetected without protections in place. Fortunately, there's Change Auditor. With Change Auditor, you get complete, real-time IT auditing, in-depth forensics and security threat monitoring on all key configuration, user and administrator changes for Microsoft Active Directory, Azure AD, Exchange, Office 365, file servers and more. Change Auditor also tracks detailed user activity for logons, authentications and other key services across enterprises to enhance threat detection and security monitoring. A central console eliminates the need and complexity for multiple IT audit solutions.
  • 14
    SharePoint Farm Reporter

    SharePoint Farm Reporter

    Vyapin Software Systems

    Vyapin SharePoint Reporting solution’s latest version (SharePoint Farm Reporter) has several new improvements and significant additions to its SharePoint Audit reports. This SharePoint report displays information about the custom events that occurred in the list items including changes in workflow settings during the recent ‘N’ days or for the given date range. Shows the SharePoint report of audit events that were deleted from the SharePoint Database in the recent ‘N’ days or the given date range. View the SharePoint audit settings that were changed in the site collection in the recent ‘N’ days or for the given date range with this report. This report displays information about all the SharePoint site templates available in the site collection. Audit Permission Level Changes: The inherited permission levels that were broken in the SharePoint site in each site during the recent ‘N’ days or for the given date range can be audited using this modified report.
  • 15
    Content Suite Security and Productivity Pack
    Cassia’s Content Suite Security & Productivity Pack (SPP) is a powerful solution extension designed to enhance and streamline administration within OpenText Content Server. It offers a suite of configuration tools that help administrators manage permissions, control item creation, and enforce information governance more effectively. The pack strengthens existing security features by restricting user and group visibility, locking permissions, and managing role-based access. It also expands auditing capabilities, allowing extended tracking for specific users and folders. The solution improves system performance and resource usage with features like quota management, storage planning, and operational safeguards. Overall, SPP boosts adoption and usability by giving administrators more precise control and greater flexibility over their Content Suite environment.
  • 16
    Quest ControlPoint

    Quest ControlPoint

    Quest Software

    Confidently secure and protect your SharePoint environment from internal and external threats by with comprehensive permissions management, auditing, reporting and governance policy enforcement. With Quest ControlPoint, you can manage, secure, automate and govern your entire SharePoint environment—whether it’s an on-premises, Microsoft 365 or hybrid SharePoint deployment. Ensure permission policy compliance and prevent security breaches and unauthorized access to sensitive content. Audit, clean up and manage SharePoint permissions and users from a single console across all sites, site collections or farms. Analyze and manage all aspects of permissions whether they are directly assigned, inherited or granted through Active Directory or SharePoint groups.
  • 17
    RushFiles

    RushFiles

    RushFiles

    RushFiles is an enterprise file sync and share platform that enables organizations to store, access, synchronize, and share files across desktop, web, and mobile clients. Administrators can manage users, permissions, and file sharing policies, and monitor activity through audit logs and administrative controls. File versioning allows previous versions of files to be restored when changes are made. RushFiles can be deployed in cloud environments or on-premise infrastructure. The platform is distributed exclusively through service providers and resellers, who deliver RushFiles to their customers as part of managed infrastructure or collaboration services. RushFiles integrates with existing IT environments, including Active Directory, and supports interface customization and optional white-label deployments.
  • 18
    SPListX for SharePoint

    SPListX for SharePoint

    Vyapin Software Systems

    SPListX for SharePoint is a powerful rule-based query engine application to export document / picture library contents and associated metadata and list items, including associated file attachments to Windows File System. Export SharePoint site, libraries, folders, documents, list items, version histories, metadata and permissions to the desired destination location in Windows File System. SPListX supports SharePoint 2019 / SharePoint 2016 / SharePoint 2013 / SharePoint 2010 / SharePoint 2007 / SharePoint 2003 & Office 365.
  • 19
    Policy Confirm

    Policy Confirm

    Policy Confirm

    Policy Confirm is a governance-focused system for distributing policies and collecting explicit employee acknowledgements with audit-ready proof. The platform allows organizations to manage policy documents with full version control, define confirmation cycles, and track acknowledgement status across teams. Each confirmation is linked to a specific policy version, timestamped, and logged to provide clear traceability over time. Policy Confirm replaces manual workflows based on email, spreadsheets, and shared folders with a structured process designed to hold up during audits, certifications, customer reviews, and internal governance checks. Administrators can see which policies are active, who has confirmed them, who has not, and export verifiable documentation when required. The system is designed for organizations that need reliable proof of policy awareness, not just policy distribution.
    Starting Price: $79/mo for up to 250 receivers
  • 20
    Crooze Digital Asset Management
    Crooze offers a simple way to align and manage your entire enterprise branding efforts through its digital asset management system, built on the Box platform. It allows users to search, find, and organize digital assets effortlessly, with advanced filtering, cascading metadata searches, and multiple view options. Designed for ease of use, Crooze requires no training for casual users and supports up to four customizable user roles. The system offers rapid bulk uploads with metadata, auto-scan for file details, and consistent taxonomy management. Crooze integrates seamlessly with Box, ensuring asset security and providing features like audit control, governance, and enterprise permissions. Users can preview over 150 file types without needing additional software and streamline collaboration through Box lightboxes and inline comments. With rich, configurable dashboards and mobile-ready functionality, Crooze enhances productivity and simplifies brand management.
  • 21
    Resilio Sync
    Resilio Sync is a fast, reliable, and simple file sync and share solution, powered by P2P technology. Sync any folder to all your devices. Sync photos, videos, music, PDFs, docs or any other file types to/from your mobile phone, laptop, or NAS. The fastest and most private way to send files to friends and family. Send one or more files to multiple recipients without sharing the whole folder or creating a permanent sync connection. Send photos, videos, movies, or any other large file directly to friends. Cloud free. Sending files is a Pro feature, and any user can receive files. Sync every folder automatically to all your devices. You add a folder to one and it automatically becomes available on all your linked devices. Change access permissions at any time using 'Advanced Folders'. Assign ownership to another user, revoke access, or change read and write permissions on the fly.
  • 22
    Rubli

    Rubli

    Rubli

    Rubli is the proven, all-in-one solution that will free up your time, providing everything needed to comply with IFRS 16 and ASC 842 effortlessly. Our lease experts will transition you quickly to our platform. This includes a full recon of your opening balances to ensure no surprises at your next reporting cycle. Incorporate a wide range of lease terms, conditions, and modifications. The flexibility of our tool facilitates fast decision-making and instant results that your business can trust. Our software has been used thousands of times and received a clean audit from all the big audit firms. Detailed reports make it easy for your teams and auditors to reconcile balances and sign off. Multiple users can be created with various permission levels, based on their role within your firm. A full audit trail of all changes is stored. Our team focuses only on lease accounting and we provide you with more than just an accounting tool.
  • 23
    Amazon Verified Permissions
    Amazon Verified Permissions is a fully managed authorization service that uses the provably correct Cedar policy language, so you can build more secure applications. With Verified Permissions, developers can build applications faster by externalizing authorization and centralizing policy management. They can also align authorization within the application with Zero Trust principles. Security and audit teams can better analyze and audit who has access to what within applications. Accelerate application development by decoupling authorization from business logic. Protect application resources and manage user access to the principle of least privilege. Amazon Verified Permissions is a fully managed, Cedar-compatible permissions management and fine-grained authorization service for the applications that you build. Using Cedar, an expressive, performant, and analyzable open source policy language, developers and admins can define policy-based access controls.
    Starting Price: $0.00015 per request
  • 24
    Visual Guard
    Visual Guard is an advanced identity and access management (IAM) tool offering a complete solution for securing sensitive applications and data. With centralized management of users and permissions, Visual Guard facilitates the implementation of robust, standards-compliant security policies. User management : Create, modify & delete user accounts Integration with LDAP or Active Directory directories Automatic synchronization of user information Access control : Precise definition of access rights to features and resources Role and Permission Management Multi-factor authentication (MFA) Single Sign-On (SSO) Security Audit and Monitoring : Permission Matrix Detailed Event log Real-time and Historical Graphs Integration & compatibility : Compatibility with major development platforms, frameworks, and protocols. .NET API Benefits : Simplified access management Enhanced data security Improved regulatory compliance Reduce identity management cost
    Starting Price: 1.55/month/user
  • 25
    Directory Opus

    Directory Opus

    GPSoftware

    Directory Opus is a complete replacement for Explorer, with far more power and functionality than any other file manager available today. Single or dual pane file display and folder trees. Tabbed interface let you keep multiple folders open and switch quickly between them. Unique Explorer Replacement mode provides a full replacement for Windows Explorer. Quickly filter, sort, group, and search your folders. Color-code your files, and assign status icons, star ratings, tags, and descriptions. View images, documents, and more. Image marking lets you sort your photos quickly and easily. Batch renaming including easy-to-use keyboard macros. View and edit file metadata. Support for FTP and archive formats like Zip, 7Zip, and RAR. Built-in tools including synchronize and duplicate file finder. Calculate folder sizes and print or export folder listings. Queue multiple file copies for improved performance. Fully configurable user interface, colors, fonts, toolbars, keyboard hotkeys, etc.
    Starting Price: $31.65 one-time payment
  • 26
    Dataprius

    Dataprius

    Dataprius

    Dataprius offers a different way to work with files in the Cloud. It is designed for companies. It is not just another virtual drive. There is no need of synchronisation. Maximum file protection against local threats. It allows you to work with company files without synchronizing, without conflicts, with multiple Users connected at the same time. Works just like Windows desktop. Using Windows all your life? In less than 5 minutes you will be an expert handling files and folders in the Cloud with Dataprius. Easy management of Users’ folder permissions.Today, the Dataprius folder permissions model is a success. All companies need central document storage. All those files can be stored in the Cloud and shared inside the company and with customers. Forget about local servers. The Cloud allows payment for use, adjusting resources to the needs of the moment. Reduce and rationalise costs.
  • 27
    Tyler Ethics Management

    Tyler Ethics Management

    Tyler Technologies

    Tyler's Ethics Management solution automates ethics management programs through the preparation, review, and filing of annual financial disclosure and ethics training reports. Tyler’s Ethics Management software adheres to the complex rules and regulations that drive ethics management programs and includes numerous summary reports that can be run by users based on defined roles and access permissions. Additional reports can be easily configured to match an organization’s needs. The audit finding management solution is an efficient tool to manage and administer an audit compliance program. A background investigation software solution plays a critical role in the larger personnel security and suitability process, which also includes adjudication, evaluation, analytics, and even invoicing. Tyler’s Criminal Justice Information System application tracks and manages data and workflows to help federal law enforcement with any kind of case.
  • 28
    bSource
    With this sales enablement tool, your home office controls access to all files and folders at all times. Instantly replace or update any file or folder from the back office to the field with the click of a mouse. No work for a sales rep to do. All the right files are always in all the right folders when they need them. The bSource Enterprise Content Management app allows you to password protect confidential folders and files to assure that your reps do not accidentally share or send them to your customers. You have access to create multiple levels of permission hierarchies so that you can deliver the correct material to the people who need it. The Enterprise Content Management for iPad allows your reps to import, create and manage their own content in the app and they can manage all non-confidential folders and files to best prepare and organize their daily sales calls and presentations.
  • 29
    TrackMyRisks

    TrackMyRisks

    Continuity Partner

    All your governance, risk & compliance documents in one place. Upload and share PDFs, Office docs, images and more. Automatic version control makes it easy to manage your files. No more searching through inboxes and network folders. Other helpful features include: - Document expiry reminders - Unlimited permissioned users - Custom document tagging - In system notifications Secure and reliable visibility. Having the most up-to-date version of a document is not enough. Version control and user access tracking are essential aspects of proving compliance. TrackMyRisks offers: - User activity log - Backup and virus scan - Document revision history - Encryption of all files
  • 30
    DSRAZOR for Windows

    DSRAZOR for Windows

    Visual Click Software

    Quickly document user and/or group NTFS effective and share permissions. Discover file ownership throughout your shared disk space. Report on users, groups, computers, permissions. Make sure your Active Directory object attributes match your enterprise standard. Find accounts that are locked, disabled, expired or unused for x days. Automate common Active Directory management tasks. Automatically synchronize your Student Information System (SIS) to Active Directory. Create/Import/Update users, groups and computers including bulk management. Effectively manage Active Directory - no scripting required! Delete/Move unused users, groups and computers. Reset passwords in bulk. Perform mass object imports from a CSV file. Modify trustee permissions for desired Folders. Document and manage Office 365 accounts. Allow non-admins to perform Active Directory management functions. Delegate the small stuff, focus on the big stuff.
  • 31
    icmInspector

    icmInspector

    icMobile Systems

    icmInspector is a system for automation of control, review and audit processes. It consists of a central part responsible for administration and management and a mobile application for Android. Improvment of quality in the organization through the implementation of modern control, inspection and interial audit processes that allow for the detection of irregular and undesirable situations in an unreliable, dispersed way and in real time. Minimalization of operating costs by shortening the time of preparation and distribution of materials and tools for control activities by replacing them with electronic versions. Increase the efficiency of employees responsible for controls and audits thanks to tools of fast and flawless data collection, protecting against omission of key information and introducing the possibility of scheduling work. Eliminate errors, abuses and fraud in the control process, by enforcing only logically permissible responses, recording metadata of data collection.
    Starting Price: 21€ per month
  • 32
    Auditions Manager

    Auditions Manager

    Auditions Manager

    Auditions Manager is an online software solution to help theater and entertainment companies manage auditions and online submissions. Create an audition with individual or group time slots. Allow actors to register online. Receive, review and manage online submissions. Automatically assign actors an audition time upon registration. Register actors on a waiting list. Automatically send confirmation emails and reminders to actors. Review, tag, and filter actors. Request headshots, resumes, and video links. Create custom registration fields. Organize callbacks and send callbacks or additional information requests. Export lists as XLS (Excel spreadsheet). Export lists as DOC (Word document). Request a new account and get a 1-month free trial. Start enjoying the benefits of Auditions Manager.
  • 33
    FileAudit

    FileAudit

    IS Decisions

    Proactively track, audit, report, alert on and respond to, all access to files and folders on Windows Servers and in the cloud. Monitor, in real time, access to sensitive files stored on both Windows Servers and in the cloud. Powerful filtering helps you find the answers you need quickly; tracking IP address and machine name pinpoints the exact access. Set up email alerts and a triggered response for access events (access denied - file deletion - a specific user, machine or IP address - time of access) and mass access events such as the copy, deletion or movement of bulk files. Review a searchable, secure and always-available audit trail. Analyze the access to and usage of files stored both on-premises and in the cloud. Schedule centralized reports according to multiple criteria.
    Starting Price: $826 one-time payment
  • 34
    CopyFolder

    CopyFolder

    CopyFolder

    CopyFolder 1.8 is a filtered backup program that copies your files in their original formats. As a result, you can access your copied files without using this program. After using the preview feature to generate a list of files to copy and making any adjustments to this list, you can press the Copy button and then do something else while this program runs. Unless you tell it otherwise, CopyFolder will run unattended after initial validation until it copies all the files it can and presents a summary report. CopyFolder provides many options for copying the contents of one folder to another. Subfolders can be filtered by paths, names or patterns and may or may not include their subfolders. File names can be filtered by patterns. Files can be filtered by paths, dates, sizes or attributes and may optionally include typos. It has various overwrite and dispose options, including file versions. With an external compare program, text files can be compared before copying to see differences.
  • 35
    HTTP Commander

    HTTP Commander

    Element-IT Software

    HTTP Commander is a web-based file management solution hosted on your own server. It provides a basic functionality for working with files (creating, coping, deleting, etc.) and many other additional features such as the integration with cloud services, editing Office documents online directly in your browser, tags, comments, and more. It's ideal for the integration into an existing Active Directory Structure since you can use your existing user base, existing network shares and NTFS permissions. With HTTP Commander you can configure external access to existing SMB shares within 10 minutes. It also can be used without an AD, so users can register themselves, and administrators can manage the users directly within the application. HTTP Commander helps you quickly organize external access to internal folders/files (located within the organization) for Employees to Work From Home.
    Starting Price: $199 one-time payment
  • 36
    MacSonik Thunderbird Backup Tool
    MacSonik Thunderbird Backup Tool is a dedicated software for Mac users to backup Thunderbird emails into 15+ file formats and email clients on Mac OS. It can easily convert and backup complete Thunderbird emails on Mac with high data accuracy. The software offers the users to backup and migrate selective emails only using the Mail Filter and Task Filter options. Users can easily remove duplicate emails from the backup and conversion process by maintaining the original folder hierarchy throughout the process. By using this software, users can save email attachments in a separate folder. This utility also provides a feature to split the PST files that are large in size. Moreover, users get an option to preview the emails before conversion and select the custom name with the location of the resultant file. The software can easily be run on all the updated versions of Mac OS. Users can backup and export 50 emails per folder in the trial version of this software without any hassle.
    Starting Price: $39 one-time payment
  • 37
    Docupile

    Docupile

    Docupile

    Docupile is an advanced AI-powered Electronic Document and Records Management System (EDRMS) built to simplify how organizations manage documents, records, and compliance. It helps businesses streamline document workflows, reduce manual effort, and maintain control over information across its entire lifecycle. With enterprise-grade security at its core, Docupile is compliant with SOC 2 Type II and ISO 27001 standards, ensuring strong data protection, secure access controls, audit trails, and reliable compliance readiness. The platform supports automated retention, version control, and audit-friendly document handling, making regulatory requirements easier to manage. Docupile’s intelligent automation features include AI-driven auto file naming, metadata extraction, automated folder creation, and structured filing based on predefined rules. A centralized and searchable repository allows teams to quickly locate documents without digging through disorganized folders.
  • 38
    Yandex Load Testing
    Create preconfigured VMs with load generators right in the console. Set test parameters via the form or a configuration file. Test results automatically export to storage. View detailed test reports at any time. Set up test parameters in a convenient way, through the form or using the configuration file. An agent is started in your cloud and loads your service. You don’t need to grant any additional permissions and can fully control its actions. The service was designed for the cloud, so you don’t have to spend time adapting other tools.
  • 39
    ConductorOne

    ConductorOne

    ConductorOne

    ConductorOne is a user-friendly, cloud-loving identity security platform that makes access requests, access reviews, and deprovisioning fast, secure, and compliant. The explosion of cloud apps and infrastructure is great for productivity and collaboration. But for security and GRC teams, managing those SaaS identities and permissions is clunky and error-prone. This results in painful audits, over-permissioned users, and increased risk for breaches. ConductorOne’s identity security platform provides seamless automation, a deep bench of integrations, and best-in-class user experience to help you manage the full lifecycle of cloud permissions and access. No more spreadsheets. No more manually pulling data from apps. No more pinging managers and resource owners for access reviews. Quickly and easily automate access reviews.
  • 40
    Kube

    Kube

    Kuberno

    Kube by Kuberno is a global legal-entity governance platform built to streamline and centralize the management of corporate entities, officers, shares, compliance data, and related administrative tasks. As a “single source of truth,” it stores up-to-date entity and officer information, integrates via API with HR, legal, finance, and tax systems, and supports unlimited data storage and users with permission-based access. Kube offers configurable workflows to align with a company’s compliance obligations, automates routine processes (such as share allocations/transfers, certificate generation, and entity data updates), and maintains a complete audit trail of every action and change. It enables seamless collaboration between different departments, legal, corporate secretariat (CoSec), compliance, HR, finance, tax, and external auditors, ensuring everyone works from the same version of entity data.
  • 41
    Cygna Auditor

    Cygna Auditor

    Cygna Labs

    Audit and roll back AD changes, enforce entitlements, and improve compliance reporting. Request a demo. Pinpoint changes and instantly roll back unwanted changes to Active Directory to recover from errors with minimal effort. Audit, alert and report on Windows file system and NetApp access faster and with greater detail than native auditing. Get real-time auditing, analysis, and alerts for Microsoft Exchange, and report on changes made to SQL Server. Cygna Auditor provides centralized real-time change auditing for Active Directory, file systems, Exchange, SQL and NetApp; offers the ability to restore Active Directory objects or attributes; and helps to establish and enforce entitlements across the Windows infrastructure. Through simpler administration, IT organizations can mitigate the risks of unwanted changes and better understand user activity to meet compliance requirements.
  • 42
    SEMYOU audit
    Create and manage internal audits, monitor findings, and centrally control task processing. The real-time assessment within the audit software keeps users informed about the current processing status and the assessment of the audit at all times. Use the provided results for a clearly structured and binding processing of all audit results. Create result overviews, audit reports and findings reports easily and without additional effort. Both internal audits, as well as those carried out at suppliers or customers, are taken into account. In addition, you can also plan audits that are carried out by external auditors on-site at your company. SEMYOU audit can be used flexibly and meets the current requirements of quality management standards and guidelines. The central overview gives you a complete overview of your active audits, the status of the findings contained and the degree of completion of the measures.
    Starting Price: $5.00/month/user
  • 43
    eAuditor Audits & Inspections

    eAuditor Audits & Inspections

    Lyons Information Systems

    1. It all starts with a checklist template Digitize your existing checklists 2. Conduct an inspection anywhere on your mobile device eAuditor makes it easy for anyone in your team to conduct inspections and audits on the go and records your audit results while you're in the field. 3. Export and share professional reports Instantly generate a report after an inspection is complete. Share it with your team, managers, clients or customers with the tap of a finger. 4. Gain insights with analytics Automatic syncing between mobile devices and desktop platform provide real-time analytics dashboards. Get visibility into your productivity, compliance, accuracy and more. eAuditor software streamlines audit-related tasks which include creating standardized audit and checklist templates, generating an audit plan, conducting audits, identifying non-conformances and recommendations, tracking CAPAs and reporting results.
  • 44
    Prove AI

    Prove AI

    Prove AI

    Prove AI is an AI governance and management platform that centralizes AI models, datasets, and event logs into a tamper‑proof, blockchain‑backed data store, now built on Hedera and integrated with IBM’s watsonx.governance. It provides real‑time logging of AI lifecycle events, version control, multi‑party access permissions, automated compliance alignment (e.g., EU AI Act, ISO 42001, NIST), and detailed audit trails for troubleshooting, accountability, and regulator validation. Organizations gain unified oversight of AI operations via a centralized console controlling configurations, access, updates, and event monitoring, all with fully auditable, serialized records. It empowers enterprises to manage AI risk, ensure transparency, and confidently scale responsible AI initiatives.
  • 45
    Cypago

    Cypago

    Cypago

    Reduce manual efforts, lower costs and strengthen trust with customers with no-code automation workflows. Elevate your security Governance, Risk, and Compliance (GRC) maturity through simplified and automated cross-functional processes. Everything you need to know about achieving and maintaining compliance across all security frameworks and IT environments. Get in-depth ongoing insight into your compliance and risk posture. Save thousands of hours of manual work by leveraging the power of true automation. Put security policies and procedures into action to maintain accountability. At last, a complete audit automation experience, including audit scope generation and customization, 3600 evidence collection across data silos, in-context gap analysis, and auditor-trusted reports. Because audits can be easier and way more efficient than they are today. Transform chaos into compliance and enjoy instant insights on your employee and user base access privileges and permissions.
  • 46
    Book Collector Pro

    Book Collector Pro

    Collectorz.com

    Book Collector is our legacy desktop software. Old-skool software that you install on your own computer, with your data stored locally. Using Book Collector is only recommended for advanced Windows users, who know how to install/update software, manage folder and file permissions, configure firewall/security software, make their own backups, etc.
  • 47
    Audit Pro

    Audit Pro

    Omnex Systems

    Effective audit management requires managing the growing complexity of business, risk, and compliance. Audit Pro provides an Enterprise Integrated approach for managing internal, external, and customer audit programs. By installing Audit Pro you can manage the entire audit lifecycle, planning, scheduling, and monitoring the status of audits & non-conformances, flexibly. AuditPro has feature conducive to performing audits online, where the auditors are provided with Checklists, Forms, and Reference Materials. Auditors can create documents and set them as templates that can be downloaded, filled, and uploaded or auditors can customize Audit Checklists. AuditPro also enables tracking and reporting responses and CAPA, in a timely and effective manner. Plan, schedule, conduct, and close audits in all disciplines, QMS, EMS, Safety and Information Security Management and others.
    Starting Price: $8,000 one-time payment
  • 48
    Barcodery

    Barcodery

    Barcodery

    Master your inventory with Barcodery. Almost everything can be customized. Android app to scan items and manage your inventory. You can have multiple users with different permissions. Email alerts for minimum count or date expiration. You can add documents to the items. If you don't need the web app and syncing data, then you can use the Android app totally free. Just choose the local plan. Works offline, when you don't have an internet connection you can still do your job. Then, when you have an internet connection again, everything is synced with the web app. You can scan items using the camera scanner, connected Bluetooth scanner, or NFC. You can export or import data into the Android app using an Excel file (.xls). Just set up which column should be imported into which field and you are good to go. Audits are done using the Android app or web app. You create an audit, then go to the chosen location and scan all items there to see what is missing.
  • 49
    Infiltrator

    Infiltrator

    Infiltration Systems

    Infiltrator is a free easy to use, intuitive network security scanner that can quickly audit your network computers for vulnerabilities, exploits, and information enumerations. Infiltrator can reveal and catalog a plethora of information on scanned computers - such as installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports and much more! Infiltrator can audit each computer's password and security policies, alerting you when changes should be made to increase security. All results can be generated into sleek, easy to read report by the report generator. Infiltrator also comes with over 15 powerful network utilities for footprinting, scanning, enumerating and gaining access to machines. Included utilities are ping sweep, whois lookups, email tracing, brute force cracking tools, share scanning, network enumerating, and many more!
  • 50
    ManageEngine Firewall Analyzer
    Firewall Analyzer helps manage and optimize firewall policies, automates firewall rule administration, tracks configuration, rule changes, helps schedule configuration backup, executes regular compliance audit checks, performs periodic security audits, generates real-time alerts for security events, tracks VPN usage, generates VPN reports, displays the current security status of firewalls, tracks employee internet usage, monitors to generate live, historical bandwidth reports, alerts when bandwidth is exceeded, collects, consolidates, and analyzes firewall logs to generate security, bandwidth reports.