Alternatives to Smart Eye Technology
Compare Smart Eye Technology alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Smart Eye Technology in 2025. Compare features, ratings, user reviews, pricing, and more from Smart Eye Technology competitors and alternatives in order to make an informed decision for your business.
-
1
Air
Air.inc
Centralize your team's content in a workspace that's organized, versioned, and easy to share. Sure, Air stores your content. But it also has smart search, guest permissions, custom layouts, version tracking, and hassle-free sharing that makes every part of the creative process easier and more enjoyable. Stop hiding your assets in folders and zip files. Plan social media posts, create lightweight presentations, and organize your content in a workspace that reflects your brand. Navigate your workspace like a search engine. Built-in features like image recognition and smart tags enable anyone on your team to jump in and locate assets all by themselves. Now the only painful part of the feedback cycle is the feedback. Create public boards and allow guests to upload directly into your workspace. Leave comments, have discussions, and make selects with context. Track new changes and clearly identify the latest asset version. -
2
Filecamp
Filecamp
Filecamp is a cloud-based Digital Asset Management system that allows marketing professionals to organize, share, tag, and distribute their digital assets. All from their own custom-branded, password-protected, easy-to-use, space in the cloud. Filecamp is used by over 1,600 brands from more than 60 countries around the world. Thousands of brand managers, marketers, and creatives from global organizations like The Wall Street Journal, Unilever, FSC, and Lego use Filecamp to organize company files; review, comment and approve projects in real-time; distribute brand materials, and make the right content available to others at the click of a button. Even small companies and freelancers are using Filecamp to share files and collaborate with their clients and partners. -
3
MASV
MASV
MASV Inc. is a secure cloud software company designed to quickly transfer heavy media files worldwide to meet fast-paced production schedules. Global media organizations rely on MASV to automatically deliver their large files without any restrictions, allowing them to concentrate on their next big deliverable. MASV Inc. specializes in the fast and secure transfer of large files, making it an ideal solution for media workflows. It is capable of accelerating hundreds of gigabytes at once, entirely over the web, without the need for file compression or splitting. This is excellent for media professionals who often work remotely and need to share high-resolution assets and copyrighted content with each other on a deadline. In addition to file transfer, MASV Inc. provides a number of other tools to make workflows more efficient, including file collection portals, cloud storage, automation tools, and integrations with third-party storage providers. -
4
Dropbox
Dropbox
Dropbox Business is more than just secure file storage—it’s a smart workspace where teams, tools, and content come together. Create, store, and share cloud content from Google Docs, Sheets, and Slides, Microsoft Office files, and Dropbox Paper alongside traditional files in Dropbox. Dropbox Spaces brings your files and cloud content together, so that your PowerPoints can live next to your Google Docs, Trello boards, and whatever tools your team wants to use. Easily access your team’s work from your computer, mobile device, or any web browser. Keep your team’s files and the conversations about them in the same place by connecting tools like Slack and Zoom. Intelligently suggested files and folders keep your team one step ahead by giving everyone the content they need, when they need it. A secure, distributed infrastructure—plus admin tools for control and visibility—keep your company’s data safe on Dropbox.Starting Price: $12.50 per month per user -
5
InfinCE
Fingent
InfinCE, a digital workplace platform to manage your end-to-end business operations and enhance the employee experience. It is a smart collaboration and remote working platform hosted on a secure private cloud that can easily integrate with third party apps/software's to empower employees to collaborate and work from anywhere. InfinCE is equipped with all the essential collaboration, communication, and productivity tools for businesses to manage employees, customers, business communications, and project management. Virtual phone system to streamline your business communication. Customizable dashboards with smart tiles for complete data visualization. Curated marketplace with many open-source and commercial business software. Guest users can view dashboards, share files/documents, and collaborate with the team, customers or partners, without being part of InfinCE. Smart video calling experience with multiple screen share and simultaneous document editing. Control your IT assetsStarting Price: $5 per user per month -
6
Oz Liveness
Oz Forensics
Oz Liveness is a leading facial recognition and authentication software used by private and public organizations across the globe to lower the risk of biometric fraud by preventing deepfake and spoofing attacks with 100% accuracy. The technology has been validated by the industry’s most rigorous testing standard, ISO 30107-3 iBeta level 1 and 2 certifications. It helps organizations validate they are dealing with a real person within seconds, lowering compliance and fraud risks. Oz Liveness features advanced algorithms able to detect many forms of biometric spoofing, including 3D and 2D masks and photos along with photos or videos displayed on a mobile or a laptop screen. On-device Liveness detection and face biometry checks allow to use of a phone as a personal biometric device. No data is sent to the server from the device and stays in the customer's hands. On-device Liveness is perfect in any customer’s use case, improving the reachability and stability of the services .Starting Price: $2,625/year/12,500 transaction -
7
Zivver
ZIVVER
Zivver is the effortless, smart, secure digital communications platform powering the next generation of secure digital communications. Trusted by over 5,000 organizations globally, Zivver prevents data leaks caused by human error and ensures compliance. Zivver seamlessly integrates with all major email clients including Gmail, Outlook, and Microsoft 365 and features unparalleled zero-keys encryption, with smart features such as contextual machine learning powered business rules. Zivver allows anyone to share large files up to 5TB securely via their existing email client. Zivver is fully compliant with all leading data security standards, including ISO 27001, NTA 7516, GDPR, HIPPA.Starting Price: 0.99€/month/user -
8
Secret Double Octopus
Secret Double Octopus
Secret Double Octopus (SDO) provides a “best-in-class” enterprise passwordless MFA solution. In addition to market-leading completeness of features, SDO’s solution is differentiated by its patented automated password rotation approach and flexibility around enabling a “passwordless journey”. Organizations that are apprehensive about the move to passwordless, can progressively achieve Full Passwordless™ by beginning with traditional MFA on desktops or for remote worker use cases and eventually “flipping the switch” when they are ready. The company recently won AITE Novarica’s highest distinction in an evaluation of all major solutions, and has been designated a Gartner Cool Vendor.Starting Price: $3/month/user -
9
Ondato
Ondato
Ondato is a tech company that streamlines KYC and AML-related processes. We're providing advanced technological solutions for digital identity verification, business customer onboarding, data validation, fraud detection, and more. All of them meet the highest quality standards available for KYC online or offline onboarding for all business and customer types orchestrated from a single interface. We're turning compliance into a business benefit by creating a safer environment for organizations and individuals alike.Starting Price: €149.00/month -
10
Onfido
Entrust
Onfido, an Entrust company, is a technology provider specializing in AI-powered digital identity verification to help businesses securely and efficiently onboard customers. Its Real Identity Platform verifies users by analyzing government-issued IDs and matching them with facial biometrics, ensuring accurate authentication. Supporting various document types, including passports and driver’s licenses, Onfido integrates seamlessly with business systems to create a frictionless user experience. Its solutions help organizations reduce fraud, comply with global regulations, and streamline customer acquisition. With a focus on trust and security, Onfido enables businesses to verify identities with confidence in an increasingly digital world. -
11
iCoordinator
Designtech Solutions
iCoordinator™ is a cloud-based solution for secure storage and easy sharing of documents for organizations, companies and projects that meet different users' requirements for collaboration and mobile access with the possibility of powerful access control, document viewing and subscription to changes. iCoordinator™ is developed based on the increasing need from organizations, businesses and projects to support enterprise-level of permission control, meta data possibilities in organizing files with labels and smart folders and emailing of attachments directly to folders within the EFSS solution area. iCoordinator™ allows organizations, businesses and projects to take control over sensitive business data while meeting the secure storage, easy accessibility and collaboration needs of users. iCoordinator™ Customer portal provides the opportunity to share documents with all the company's customers and suppliers at a fixed, low and calculable cost.Starting Price: $4.00/month/user -
12
LumenVox Voice Biometrics
LumenVox
Using voice biometrics authentication, companies can provide a delightful customer experience without sacrificing security. LumenVox Voice Biometrics technology screens customers by comparing input voice audio to a collection of stored voice samples (“voiceprints”) that are known to be authentic or fraudulent. Just like a fingerprint, each voice is unique. This makes Voice Biometric Authentication an incredibly effective way to validate identity. LumenVox’s flexible voice biometrics technology can be deployed in the method of choice and gives organizations the ability to create a seamless and secure process to verify its customers. LumenVox Voice Biometrics not only creates a better user experience, but also reduces operational costs and strengthens security. Anti-fraud measures such as liveness detection provide an additional security layer. -
13
Secfense
Secfense
Protect your company, employees, and customers with simpler and stronger authentication. Deploy 2FA in minutes, not weeks. 2FA (and other user access security policies) built into the fabric of the infrastructure, not rigidly fixed to the applications. Enabling the use of any 2FA methods available on the market now and in the future without changing the core. Protection is available across the entire organization, spanning from on-premise, public and private cloud. Secfense is deployed in between your users and the applications they access. It learns the traffic patterns related to authentication. It can then enforce multi-factor authentication login and other sensitive actions without interfering with the applications existing code or database. Up-to-date 2FA methods are always available on the platform. Application changes don’t affect Secfense and applied methods. Take control over session expiration rules across all apps. Don’t rely on VPNs, base trust on users and their devices. -
14
TECH5
TECH5
In a world where identity is moving away from the physical documents we have carried for decades and is becoming increasingly digital, online, and mobile, a solution is needed that can ensure citizens’ trust in the organizations that collect, store and access their data. TECH5 introduces T5-Digital ID – the inclusive technology solution for identity issuance and verification. It allows the strong binding of the digital credential to the holder biometrically and brings ownership of the identity to its authorized holder. With T5-Digital ID, the holder controls what data to share under what circumstances. We built our solution from the ground up by taking the analogy of the physical ID document and asking five fundamental questions related to where identity comes from and what it is moving toward. We then went further and applied all of the above questions to building an ecosystem where a physical smart card, with its (expensive) reader infrastructure, is not necessary. -
15
SmartFile
SmartFile
Secure File Sharing & Transfer Solutions for Business and Enterprise. Easily manage and share large file structures inside and outside your business. The perfect blend of simplicity for users and control for IT. SmartFile aims to enhance usability, decrease unauthorized file sharing and eliminate IT file-related headaches. Make secure file sharing a breeze for your users by allowing them to send, receive and manage files through their desktop, browser, FTP client and our API. File and user activity is tracked and recorded for compliance, along with email notifications for instant alerts. Granular permissions and access rights ensure that only authorized users can see certain files. A simple interface lets users securely access files onsite and offsite while maintaining company security procedures. -
16
Diplomat Managed File Transfer
Coviant Software
Coviant Diplomat MFT offers the best value for secure, reliable automation of file transfer from anywhere, to anywhere, with full visibility and alerting across any OS, in the cloud or on-premises. It supports transfers using FTP/S, SFTP, HTTP/S, Local Network (including attached storage and Network Shares) and AS2 as well as Cloud Storage providers: AWS S3 and compatible, Azure Files and Blob Storage, Oracle Cloud, Google Cloud, Citrix ShareFile, Box, Dropbox, and Biscom Transit. Your organization has a lot going on and you’re sending and receiving a lot of sensitive data. Maybe you’re a healthcare provider handling a lot of electronic health records and insurance files under HIPAA; or you’re a financial service provider whose customers trust you to handle their digital assets reliably and securely; or maybe you’re a retailer working with suppliers, payment card processors, employee data, and other vendors who need certain files on time and securely. -
17
Tranxfer
IRIS Group
Tranxfer is a very easy-to-use platform designed so that companies of all sizes can send and receive files through a secure channel. In addition to encryption, you can set other preferences for sending and downloading, such as the expiration date of the file or the display of the file with a watermark by your recipient, receiving all acknowledgments of receipt and reception in real time. Offer Tranxfer to your employees to prevent large or sensitive files from being sent through unsafe channels that do not offer traceability and cause information leaks. Hassle-free security. Tranxfer tool has a very intuitive interface, increasing adoption among organizations. The recipient do not need to install anything, just follow 3 easy steps. We are a GDPR compliance platform.Starting Price: $9 per month -
18
BluSync
Parablu Inc.
Increasingly, organizations are tapping into cloud solutions that make collaboration between team members simple and secure. The need of the hour is future-ready technology that improves speed of collaboration, boosts employee productivity, and supports a culture of agile innovation, while also upholding the privacy and integrity of the content being shared and stored. BluSync™ is a secure Enterprise File Sync & Share (EFSS) solution. It is a secure platform for teams to access, edit and share files in a fast and efficient way. With BluSync, team members can connect to content in the enterprise share cloud, or mini-clouds, and access the information therein securely. BluSync™ maintains an auditable trail of activities that takes place in the cloud environment, helping organizations retain full and complete control and visibility into the way content collaboration and file sharing happens. -
19
BlueFiles
Forecomm
How do you do today when you need to quickly send a confidential file or email to a customer, partner, or employee outside of your company, outside the secure network? CNIL strongly advises businesses and organizations to " use data encryption during transfers " and " have people trained in the risks ". Data encryption is a central part of the modern data protection strategy. Using specialized encryption, like BlueFiles, companies can encode their data so that it becomes indecipherable to anyone but the intended recipient. BlueFiles provides a real guarantee on all your digital data transfers: Integrity of the BlueFiles file, 100% confidentiality, remote control of the files sent, and tracking. Save time, ease of use, and lower costs, we need to communicate with confidence over the Internet without the risk of our sensitive data being disclosed. Under the GDPR law, companies must take steps to encrypt their personal data flows or face high fines. -
20
Everleagues
Everleagues
Work remotely and collaborate with your team and clients. Create your firm’s own private workspace in minutes. Bring all the tools you need to one location and enhance your productivity while working remotely. EverLeagues seamlessly connects your company’s internal and external users to collaborate on day-to-day tasks in a secure platform, resulting in better service, saved time, and lowered costs. Collaborate through multiple channels, groups, and teams among employees, clients, and other contacts. Communicate with secure messaging, video conference, and file sharing. Everleagues provides security to all your files and messages without compromising productivity. Organize and manage your business or organization with a role and tier based organizational system. With Everleagues you can easily assign team members to specific organizations if you have different locations or departments. You can also assign specific clients to certain professionals or team members.Starting Price: $5.00 per user per month -
21
Sharetru
Sharetru
Trust your data is secure as you store, transfer, and share files with complete confidence. Keep your information private in our fully redundant cloud-based platform that exceeds the compliance requirements of major industry frameworks. We equip companies with an agile cloud-based platform designed to store and transfer files securely and in compliance with all applicable regulations. Doing all of our development in-house and in the U.S., we serve as a digital safety deposit box and secure courier for our clients. We put people’s minds at ease by making it simple for them to keep their data safe and stay compliant, so they can expand their business. Built and hosted entirely within the United States, our private cloud-based platform is trusted by hundreds of organizations in: Aerospace, Defense & Government Healthcare Financial Services Information Technology Manufacturing & Engineering And many other industriesStarting Price: $120 -
22
Spintly
Spintly
Truly wireless, cloud-based door access control system for a seamless, hassle-free, and contactless user experience. A modern access management system that combines the power of the cloud, smartphone, and wireless technology. Spintly is transforming the physical security industry with its fully wireless, cloud-based access control system. It removes the complexity of the process of deploying an access control solution in a building. With absolutely no wiring the installers can save more than 60% of their time and cost and be more productive. Our vision is to make the built world smarter and simpler by providing a frictionless access control experience to users and to make the building smarter with our fully wireless mesh platform for smart building devices. Spintly offers solutions to various industry segments with its fully wireless access control hardware along with cloud-based software. -
23
Incognia
Incognia
Location Behavioral Biometrics. Using the location behavioral pattern unique to each user, we create a dynamic location fingerprint that is very difficult for fraudsters to mimic or forge. Incognia location-based fraud solutions help financial institutions and retailers prevent new account fraud and account takeover. Using network signals and on-device sensor data our precise location technology creates unique behavioral patterns to identify and authenticate users. Our solution requires no PII and works in the background to deliver a secure and frictionless experience. Validate addresses anywhere in the world with real-time location data. Detect location spoofing techniques used to execute identity fraud and ATO. Recognize anomalies to block fraudulent accounts, logins, transactions and fraud farms. Guide your identity decisions with real-time location data. -
24
Hive.id
Hive.id
Separate fake signups from real users, stop fraudulent accounts and protect your good users from account takeover. Free trials are great, but don’t let bad actors waste your time or money. Align risk with your business objectives and keep fraudsters and bots from signing up and damaging your brand and bottom line. Detect suspicious access on user accounts in real-time without manual overhead. Easily automate alerts, step-up authentication and account recovery process, appropriate to the specific level of risk. Detect email addresses that look undeliverable, or just plain fake. Add different signals, and you've identified most low quality signups. Your user experience is still great, but now it aligns with your business objectives and risk tolerance. Companies of all sizes face the question of whether to build or buy a security solution. Hive gives you a cost effective option with a faster time to market. -
25
EMDYN BioTrace
EMDYN
EMDYN recognizes that many organizations struggle to verify the identity of persons, especially in this interconnected and fast-changing world where an individual can easily hide, fraudulently mask or change their identity in various ways. Such actions can be used for malicious activities against different organizations. The tools currently available are mostly old-fashioned or restricted by privacy laws and cannot necessarily give the correct information on identity, let alone provide situational awareness to the organization. Current facial recognition systems are used for accreditation of a person against a passport or ID document, but are incapable of rapidly searching very large databases or video repositories for that same face, or linking that face to other information sources. But now we have a ready solution to these issues; one that is a key component in a genuine investigative tool, ultra-fast and user friendly. Welcome to EMDYN BioTrace. -
26
BioCatch
BioCatch
BioCatch delivers advanced behavioral insights to provide global organizations with actionable intelligence so you can create a secure customer journey. BioCatch analyzes a user's physical and cognitive digital behaviors to generate insights that distinguish between legitimate applicants and cybercriminals. BioCatch detects behavioral anomalies indicative of human and non-human cyberthreats such as Remote Access Tools attacks, Bots, malware and manual account takeover methods. BioCatch detects subtle behavioral indicators that suggest a victim is being unwittingly guided through a fraudulent money transfer. BioCatch's Al-driven behavioral biometrics technology significantly reduces online fraud and enables online identity verification, without compromising the user experience. BioCatch's patented solution is designed to protect identities online while providing web and mobile users with a frictionless experience. -
27
VU Security
VU Security
We are a cybersecurity company specialized in fraud prevention and identity protection. Our mission is to provide secure digital experiences without friction, both for citizens and businesses, during the digital transformation process. We use different technologies applied for people recognition, based on their physiological or behavioral characteristics. Once the data has been captured, the system extracts a unique pattern for each individual, which will be used to make comparisons in the future. Transactional analysis of user behavior and channels for fraud detection and prevention. Secure, fast-response exchange of sensitive data through references to a vault of encrypted data. We provide a multi-channel fraud prevention solution that uses machine learning to create intelligent profiles and detect potentially fraudulent operations based on user behavior. -
28
LaborTrack
M2SYS Technology
LaborTrack™ is a fully customizable and end-to-end, cloud-based biometric workforce management solution for organizational workforce management to accurately identify employees. Within industries that have high employee turnover rates, organizations often face difficulties in managing cross-departmental employees. In addition, enterprises that recruit new employees have a responsibility to ensure they are held accountable, maximize productivity, and can be quickly and accurately identified. Establishing accurate employee identification also helps to reduce payroll inflation and error rates and ensure compliance with labor tracking laws. M2SYS Technology offers LaborTrack™ as a flexible and accurate employee profile management and reporting solution that can be easily customized to meet the unique labor tracking needs of any business. LaborTrack™ helps to address problems that lead to workforce management inefficiencies. -
29
NordPass Business
Nord Security
NordPass Business is a password manager for SMBs and Enterprises to help optimize the company’s workflow and boost productivity. What can you do with NordPass Business? - Securely store business and personal information like passwords, bank cards, shipping addresses, private notes, and more - Share access between teams to make collaboration easier - Get immediate alert reports about data breaches - Automate onboarding and offboarding of your employees - Make purchases without delay - Fill in forms faster with the autofill feature - Track weak and outdated passwords among all employees - Enable multi-factor authentication Start a 30-day free trial (no card required) to boost your company’s productivity and safety.Starting Price: $3.59 per user / per month -
30
Alice Biometrics
Alice Biometrics
ALICE offers a frictionless, automatic, immediate and accurate online identity verification solution with the highest level of security at an efficient cost, which is purchased without commercial assistance and integrates in minutes. Alice Biometrics is the perfect solutions for companies with a need to verify users either for business operations (shared mobility) or due to legal requirements (fintech). We provide leading anti-fraud technology with more than 10 years of research and 64 technical papers published. Our algorithm has been evaluated by NIST (National Institute of Standards and Technology).Starting Price: Free -
31
SpeechPro
SpeechPro
SpeechPro is a reseller of intelligent speech technologies, voice and facial biometrics, as well as solutions for audio and video recording, processing and analysis. SpeechPro is one of the few companies in the world that offers both biometric modalities: face and voice. SpeechPro's goal is to build and maintain long-term trust-based customer relationships. Technologies and solutions offered by SpeechPro are used by private companies and public sector in over 70 countries of the world. We share our experience and help our clients to become experts in our products by providing training services, professional consulting services and customization. SpeechPro delivers innovative products and technologies to empower people, make the interaction of human and the digital environment safe, confidential and comfortable, and eventually to help client's business to succeed. Audio forensics solutions from an industry leader. -
32
Keyless Authenticator
Keyless Technologies
Nothing to remember. Nothing to steal. You are the key. Adopt zero-trust authentication to protect your remote workforce and enable strong customer authentication with just a look. Anywhere. Any time. Any device. Embrace passwordless, multi-factor authentication to eliminate fraud, phishing and credential reuse – all while enhancing customer and employee experiences and protecting their privacy. Unique capabilities powered by unique technology. Hardware Agnostic. Since we do not rely on the device hardware or sensors, Keyless can be deployed on a large set of devices and appliances. Drive better outcomes for your organization by eliminating passwords. Top-Notch Security. No central honeypot, no data on user devices. Data can never be stolen or lost because no private information is accessible to anyone but the user. Reduce password associated costs by going passwordless. Password Reset Costs. The average helpdesk labor cost is estimated at $70. -
33
LastPass
LastPass
LastPass is a cloud-based password manager available on any system or device, ensuring credentials are protected, private, and always within reach. Simple to set up and effortless to use, LastPass delivers the world's most convenient password management experience for consumers and businesses of all sizes and technical requirements. Say goodbye to password fatigue by generating, sharing, accessing, and managing credentials at the click of a button, while preventing bad actors from accessing precious data and account logins. Businesses also utilize LastPass to consolidate their tech stacks or to fill access management gaps with native integrations for MS Entra, Okta, and other IdPs and IAMs. With over 100 customizable policies, flexible privileges, detailed reporting, MFA and passwordless authentication options, LastPass makes it easy for organizations with numerous logins and increasing security risks to standardize password management company wide.Starting Price: $4 per user per month -
34
Callsign
Callsign
We are an identity fraud, authorization & authentication company, solving the challenges that organizations face in getting their users on to & interacting with their digital platforms. Often innovative solutions focus on the capability of technology and do not give applicability to a user base the same weighting. Our engineering team comes from a banking and ecommerce background, with over 300 years combined experience in making software work for all. That’s why we are chosen to help some of the world’s largest banks and, offer the same “bank grade” identification solutions to public and private sector clients of all sizes. Callsign helps your users get on with their digital lives in the most seamless way possible – checked, verified and safe, because we enhance, rather than block, user experience. Our Intelligence Driven Authentication recognizes users by combining deep learning insights - derived across device, location and behavioral data. -
35
ICFiles
Service2Client
Secure File Share, Secure File Transfer, CPA Secure File Share, CPA File Transfer. 1 Million Dollar Data Breach Guarantee. These days, when it comes to being safe, you can’t be too careful. That’s why we created ICFiles and put it in an AICPA-rated SOC 2 Type II data center, an encrypted communication system, aka CPA secure file sharing, like no other. Our advanced technology delivers unrivaled end-to-end security covering all the access points to and from any virtual or physical location. Simply put, we provide customers with confidence. ICFiles are stored on an encrypted server that is password-protected, allowing you to secure file share your client’s files over the Internet. However, this communication airtight is in that all account passwords are designed with one-way encryption so that we don’t know your password. All data is stored encrypted, and only you have the key.Starting Price: $1.00/month -
36
FileShadow
FileShadow
No more organizing into folders or even needing to name your files. FileShadow manages your documents and photos by incorporating content and metadata scanning with automatic, geolocation and custom tagging for seamless organization and searching. One or more of your Slack Workspaces can be linked as FileShadow sources allowing files from your channels, regardless of who sent them, to be archived in your FileShadow Vault. Any attachments sent to you or by you in Slack conversations can be archived, cataloged, and secured within FileShadow. FileShadow uses machine learning (ML) and artificial intelligence (AI) for a superior indexing and searching experience. Quickly find your files with advanced search features such as file content, OCR of PDFs, GPS/geolocation, and image searches. Share files stored in your FileShadow vault with anyone; all they need is a FileShadow account! You can easily give or restrict access to your files, decide which files can be seen or altered, etc.Starting Price: $7 per month -
37
Scelloo Dome
Scelloo
Are you unable to keep track of changes made to files within your business? Are you concerned about the security and integrity of your business files? Are you looking for file storage and sharing application customized for businesses? Do you want to restrict access to some files within your organization? Do you want your team to collaborate and share files? -
38
Kiteworks
Kiteworks
The only security platform authorized by FedRAMP that provides support for file sharing, managed file transfer, and email data communications to meet the compliance requirements of standards such as CMMC 2.0, ITAR, IRAP, NIS 2, HIPAA, and others. A content communication “tool soup” ratchets up cost and resource inefficiencies. Managing zero-trust security policies centrally is virtually impossible, and organizations lack consolidated security and compliance visibility over the communications of sensitive content, which increases security and compliance risks. Compliance and security risks increase due to the lack of governance. Organizations must control and track who can access content, who can edit it, to whom it can be sent and shared, and where it is sent and shared. Cybercriminals and malicious insiders target sensitive content like PII, IP, financial documents, and PHI because it can be monetized or even weaponized. -
39
Kamzan
Kamzan
Cloud suite for business digitization, collaboration and sharing. A Private Cloud dedicated exclusively to you. We create an ad-hoc technological infrastructure for each customer and separate from the others to minimize the risk of data-breach. The data is stored exclusively in the European Union, in a Data Center located in Germany which is part of the CISPE. All data is encrypted with a different key for each private cloud, just as the database on which the service is based is also encrypted. The encrypted communication protocol uses a unique TLS 1.3 certificate for each customer. A uniquely European supply chain and a contract in which we make it clear that profiling will never be carried out, that no data will ever be sold or transferred to third parties and that the intellectual and physical property of the data in their entirety is held by the client company. -
40
PreVeil
PreVeil
PreVeil applies end-to-end encryption in a radically different way. We protect organizations’ email & files from phishing, spoofing, BEC & more. Seamless for users. Easy for admins. PreVeil provides the enterprise with an easy-to-use encrypted email and encrypted cloud storage solution to protect important email and files. Moreover, PreVeil uses the gold standard of end-to-end encryption to secure data. PreVeil also provides the enterprise with a “Trusted Community” for communicating with fellow employees, contractors, vendors or other third parties. With a Trusted Community, employees can communicate and exchange information without worrying about being phished, spoofed, becoming victims of BEC, or having their admins compromised.Starting Price: $20 per user per month -
41
Objective Connect
Objective Corporation
Ultimate protection over your information, when you share it with anyone outside your organization. Designed specifically for government and regulated industries, Objective Connect is a secure external file-sharing application that gives complete control over the information you share outside your organization. Extend your internal information governance externally. Maintain control over shared documents. Collaborate across devices, across teams, or across the world. Maintain one version of the truth. Record who did what and when all from one solution. Choose what documents can be sent externally, by sharing containers of documents directly from your existing file plan. Before any document is shared, all access controls, security levels, and caveats are checked. Two-way synchronization with your existing file plan ensures everyone is kept up to date. Any file you receive is automatically filed in the correct location and flagged to ensure your metadata is always accurate.Starting Price: Free -
42
EFSS
Defense IT Solutions Inc
Thru is an end-to-end file sharing and collaboration solution, exclusively built for the business user. It not only offers enterprise-grade security and reliability at the core, but also offers easy-to-use interface and deep integration into a variety of business applications. With access via Web, mobile apps for iOS and Android, Thru Desktop Sync and Thru Add-Ins for Microsoft Outlook, IBM Notes, Microsoft SharePoint and Salesforce, Thru gives your organization 360-degree access and ability to sync and share files from anywhere, anytime and from any device. Collaborate in real time by connecting all departments and giving your employees a secure virtual office experience that government and financial organizations trust. Collaborate in real time and manage your data and content on a platform that government and financial organizations trust. Manage your files online and organize by department or project. Share folders with your team members with policy based access. -
43
SendThisFile
SendThisFile
Our technology easily removes size limitations that are typical with corporate or even free email accounts. Sending large files shouldn't have to be complicated and with a free account with SendThisFile, it's not. With our professional level encryption, your privacy remains intact. With our large file sharing products, you can send any size file to anyone. The best part is, your recipient's location doesn't matter, and they won't even need to create an account. It's the only resource you need for digital data delivery. You can use a Filebox to receive large files. Each Filebox is hosted on its own unique URL and provides users with simple step-by-step instructions for uploading and sharing files. Just give your personalized link to any person who you'd to receive files from and ask them to use it to send the files. It's easy for them and you. They won't even need a SendThisFile account.Starting Price: $4.95 per month -
44
AlephTransfer
AlephTransfer
Reduce the likelihood of insider threats, data breaches and ransomware attacks. Maximize organizational adherence to regulatory compliance requirements and cyber-security best practices and standards. Sharing large files or massive folders can be a huge pain. AlephTransfer makes it easier and makes external sharing seamless. Aleph Transfer is the fastest and most reliable way to transfer time-critical files. AlephTransfer helps in reducing infrastructure maintenance cost, increasing employee productivity gain, and boosting project efficiency. Today, Business Email Compromise (BEC) is responsible for over 50% of cybercrime losses. At the same time, organizations throughout virtually every industry continue to share highly sensitive information via low-security email attachments or easily breached cloud sharing services. At AlephTransfer, our streamlined Managed File Transfer (MFT) platform was designed to promote a smooth workflow while keeping files safe. -
45
Microsoft SharePoint
Microsoft
Your mobile, intelligent intranet. Share and manage content, knowledge, and applications to empower teamwork, quickly find information, and seamlessly collaborate across the organization. SharePoint empowers teamwork with dynamic and productive team sites for every project team, department, and division. Share files, data, news, and resources. Customize your site to streamline your team’s work. Collaborate effortlessly and securely with team members inside and outside your organization, across PCs, Macs, and mobile devices. Build cohesion and inform your employees throughout your intranet. Drive organizational efficiency by sharing common resources and applications on home sites and portals. Tell your story with beautiful communication sites. And stay in the know with personalized, targeted news on the web and the SharePoint mobile apps. You’re just a click away from what you are looking for, with powerful search and intelligent ways to discover information.Starting Price: $1.00/one-time/user -
46
GigaTribe
Gigatribe
All your files remain on your hard drive eliminating the need to transfer them to an external server. In just a few clicks you can share and also find files as if you were in a virtual library. You will see files as they were organized on the hard drive and you can download them in their original format. Files you have decided to share are not stored on another company’s servers. You keep your data under your control. Once you select which folders you want to share, the contents of those folders are instantly accessible to your friends. You don't spend time uploading your files for your contacts. You let your contacts browse your shared folders and download the files they need. Each contact can both share and download. The more contacts you invite the more content you get. Your community continues to grow and more files become available.Starting Price: $2.50 per month -
47
BeSafe
BeSafe
Protect control monitor, your files everywhere in all platforms, all drives, all boxes. Protect any kind of files (PDF, Office, videos and more) with state of the art encryption. BeSafe’s preserves native collaboration features in Dropbox, Google Drive, and Slack. Stay in control of your documents by enabling one-time viewing or specifying an expiration time for shared access. Instantly revoke access if you have sent the file to the wrong recipient. Get 360° data access visibility: Know who, when, where and how your content is accessed. Find out what matters most with instant “read” notifications and even page-by-page view analytics. We are revolutionizing end-to-end encrypted cloud collaboration with Proxy Re-Encryption cryptography. Besafe uses patent pending technology for encrypting your data and enabling secure sharing over any email or cloud file sharing application. BeSafe can be integrated to Dropbox via the user’s BeSafe web portal. -
48
Resilio Sync
Resilio
Resilio Sync is a fast, reliable, and simple file sync and share solution, powered by P2P technology. Sync any folder to all your devices. Sync photos, videos, music, PDFs, docs or any other file types to/from your mobile phone, laptop, or NAS. The fastest and most private way to send files to friends and family. Send one or more files to multiple recipients without sharing the whole folder or creating a permanent sync connection. Send photos, videos, movies, or any other large file directly to friends. Cloud free. Sending files is a Pro feature, and any user can receive files. Sync every folder automatically to all your devices. You add a folder to one and it automatically becomes available on all your linked devices. Change access permissions at any time using 'Advanced Folders'. Assign ownership to another user, revoke access, or change read and write permissions on the fly.Starting Price: $6 per month -
49
Tricent
Tricent
Tricent is the #1 file-sharing governance SaaS platform that helps organizations make their file-sharing more secure and compliant without sacrificing collaboration. For Microsoft 365 OneDrive & Sharepoint, and Google Workspace MyDrives and Shared Drives. Tricent enables administrators to: 🚀 Effortless Onboarding in less than 30 Minutes. 🔍 Unparalleled Insights: From day one, gain a comprehensive overview of all files shared and permissions granted—across both personal drives and shared drives. ⭕️ Bulk Remediation Made Simple: Our admin-friendly cleanup tools allow you to tackle file sprawl efficiently. 😇 Empowering End-Users Responsibly: We use automation to involve your employees in the cleanup process. . 💪🏼 Customizable Governance Policies: Set different cycles for different user groups 🔮 Stay Ahead with Abnormality Detection: Our machine learning feature keeps you informed, detecting anomalies before they escalate *Only Google WorkspaceStarting Price: €18/year/user -
50
ShareDocView
ShareDocView
Get leads and analytics from your documents. We support a wide variety of file formats for your convenience. Feel free to upload PDF, DOC, DOCX, PPT, PPTX, ODT, or ODP, and you will get the same experience. All modern browsers are supported, with special emphasis on Chrome, Safari, Edge, and Opera. Simply upload the updated PDF file to ShareDocView and we'll automatically reflect the changes with everyone you've shared the document links. Keep shareable team files organized in one place. Easily create a data room for your team. Team members know more easily what documents can be shared. Protect your docs by requesting an email, plus remove access anytime! No more old version files circling around your customers or investors. The latest version can be updated with a few clicks. No need to download or install software on your devices. Just open up your browser and access ShareDocView from any device.Starting Price: $3 per month