Alternatives to Vera
Compare Vera alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Vera in 2026. Compare features, ratings, user reviews, pricing, and more from Vera competitors and alternatives in order to make an informed decision for your business.
-
1
Proton Drive
Proton AG
Proton Drive is the all-in-one workspace for storing sensitive data and collaborating with your teams, clients, and partners. Collaborate securely without compromising control: Share client files, contracts, and sensitive business documents with full end-to-end encryption. You control who can access what. Set passwords, add expiry dates, or revoke access anytime. Protect all your business data: Plans come with 1 TB of storage allowance per user, giving your team enough space for all their files and docs. You can always add more storage later if needed. Simplify compliance across industries: Proton Drive supports GDPR, HIPAA, NIS2, DORA, and ISO 27001 compliance out of the box, and has been successfully audited for SOC 2 Type II. There's no need for custom configurations or third-party tools, as this helps you meet regulatory standards with minimal effort. -
2
Air
Air.inc
Centralize your team's content in a workspace that's organized, versioned, and easy to share. Sure, Air stores your content. But it also has smart search, guest permissions, custom layouts, version tracking, and hassle-free sharing that makes every part of the creative process easier and more enjoyable. Stop hiding your assets in folders and zip files. Plan social media posts, create lightweight presentations, and organize your content in a workspace that reflects your brand. Navigate your workspace like a search engine. Built-in features like image recognition and smart tags enable anyone on your team to jump in and locate assets all by themselves. Now the only painful part of the feedback cycle is the feedback. Create public boards and allow guests to upload directly into your workspace. Leave comments, have discussions, and make selects with context. Track new changes and clearly identify the latest asset version. -
3
FileCloud
FileCloud
FileCloud is a hyper-secure EFSS (enterprise file sync and share) platform that provides industry leading compliance, data governance, data leak protection, data retention and digital rights management capabilities. Workflow automation and granular control of content sharing across most enterprise platforms are fully integrated into the complete EFSS stack. FileCloud is a leader in content governance and collaboration for unstructured data, trusted and used worldwide across Global 1000 enterprises, educational institutions, government organizations, and service providers. Granular control of content sharing is fully integrated into the stack through comprehensive audit logs and access permissions, and the Compliance Center helps with regulations like GDPR, HIPAA, and NIST 800-171 (among others). FileCloud also provides Zero Trust File Sharing® an industry first innovation that allows users to share sensitive data via an encrypted zip file that cannot be accessed by unauthorized userStarting Price: $6.00/month/user -
4
Imatag
IMATAG
IMATAG protects your visual content online, such as product images, brand visuals, licensed content, or sensitive files. Based on a patented technology of Invisible Watermark (or Forensic Watermark), it comes in two flavors: - IMATAG LEAKS, the first online solution for the identification of photo or video leaks, - and IMATAG MONITOR, the most reliable visual search solution to track the use of your content on the internet. How it works: The software discreetly places an imperceptible identifier at the pixel level of images or videos. This invisible watermark allows to identify your content on the web regardless if it has been resized, cropped or trimmed, posted on social media or copied via a screenshot. Used as a tracker, it is also able to trace the origin of a leak. Supports images (photos, renders, design), videos, and PDF. Available as SaaS via Web UI or API, or on premise software. -
5
Fasoo Enterprise DRM
Fasoo
Fasoo Enterprise DRM (FED) is an advanced data-centric security solution designed to protect sensitive information at rest, in transit, and in use. With granular permission control, organizations can define and enforce user-specific access rights to ensure only authorized personnel can view or edit sensitive files. Centralized policy management simplifies the enforcement of consistent security policies across the organization, reducing administrative overhead. FED’s enhanced monitoring capabilities provide real-time visibility into file usage, allowing businesses to identify risks, prevent unauthorized access, and maintain control over their data. By supporting compliance with regulations such as GDPR, HIPAA< and CCPA, Fasoo Enterprise DRM helps organizations enhance data governance. Trusted by global enterprises, FED empowers organizations to secure intellectual properties, mitigate insider threats, and maintain productivity while ensuring the highest levels of data security. -
6
EaseFilter
EaseFilter Technologies
Track file change, control file access in real time, prevent your sensitive data from being accessed by unauthorized users or processes. Secure file sharing with digital rights management(DRM), share files with fully control, grant or revoke the file access at any time. Implement file audit, file access control, file protection and encryption Windows applications with C#,C++ demo source code.Starting Price: $1500 -
7
Locklizard Safeguard PDF Security
LockLizard
Locklizard protects PDF files and other digital documents from piracy, leakage and misuse. We stop unuauthorized access to documents and control how authorized users can use them. Stop theft of confidential and sensitive information, intellectual property, trade secrets, training courses, reports, ebooks, etc. Share and sell documents securely, stop data leakage and enforce compliance. Lock documents to devices and locations, dynamically watermark content, control expiry, stop printing, editing, copying and screen grabbing, and revoke access at any time. Track how your documents are being used. Locklizard uses strong US Gov strength encryption, DRM and licensing controls to ensure your documents remain fully protected at all times regardless of their location.Starting Price: $500.00/month -
8
Vaultize DRM
Vaultize Technologies
Achieve security and governance of files throughout their lifecycles, inside and outside your network. Vaultize enables your team to store, access and share files securely & easily and, you to protect & manage them, with digital rights management (DRM), secure file sharing and continuous data protection. The Vaultize platform is designed to protect enterprise data end-to-end - from external or internal threats, from accidental or intentional data leakage and, exposure. Vaultize offers secure and user-friendly solutions that enable teams to store and share files easily via any kind of device while giving IT and auditors complete visibility and control over those files. DRM protection - give and revoke access rights (view, edit, print, share, copy/paste & more). Powerful sharing controls at admin and user level. Full control of who, where, when, how & more.Starting Price: $5,000 one-time payment -
9
SkyDRM
NextLabs
Keep your documents safe from unauthorized access and control how they can be used. Move faster, automate, improve efficiency, and be more agile. Prevent wrongful disclosure of customer data and provide secure access to critical business applications. Protect trade secrets and intellectual property. Close the security gap of perimeter security while allowing users to collaborate effectively. Protect and monitor your business-critical document such as intellectual property and product design, wherever it lives or travels, across devices, apps, cloud services, and on-premises. SkyDRM uses digital rights management and dynamic authorization technology to protect files and enable secure sharing. Protection stays with the document, regardless of where it’s stored or who it’s shared with: inside or outside your network, on file servers, or in the cloud. Determine whether your file can be accessed, viewed, edited, printed, or shared. -
10
Wrapsody eCo
Fasoo
Wrapsody eCo is an all-in-one secure collaboration platform. The solution is designed to enhance productivity and security for external collaboration. It facilitates seamless content sharing and synchronization with features including real-time updates, version control, advanced encryption, and access controls. Wrapsody eCo provides a wide range of collaboration tools, from enterprise messaging and video conferencing to comprehensive monitoring and auditing features to track document usage and user activities. Additionally, its robust security framework with advanced file encryption and access controls ensures that sensitive data remains protected at all times (at rest, in transit, and even in use). With Wrapsody eCo, organizations can share documents internally and externally while maintaining security, regardless of where the files are viewed in a browser, downloaded, or edited locally. The protection is applied to data and travels with them throughout their entire lifecycle. -
11
What you don’t know can hurt you. Identify and help prevent risks to sensitive business data that may impact business processes, operations, and competitive position. IBM Data Risk Manager provides executives and their teams a business-consumable data risk control center that helps to uncover, analyze, and visualize data-related business risks so they can take action to protect their business. Identify high-value, business-sensitive information assets that are at risk from internal and external threats. Provide an end-to-end view of business metadata associated with crown jewel data. Convey meaning and value to executives with a business-consumable data risk control center. Enable conversations with IT, security, and the line of business to improve processes and mitigate risks.
-
12
Sealit
Sealit Technologies
When implementing a Zero Trust security model you shouldn’t question if your accounts or devices will get get compromised - assume they will. With Sealit, the sensitive data in your emails and files will remain fully protected even in that scenario. It takes one click from your existing inbox to encrypt your sensitive emails. It takes one click to encrypt any file format on your desktop. We made sure your workflow isn’t disrupted as we add a strong layer of protection to your sensitive data. Human error accounts for over 90 percent of cyber attacks on businesses, so you need to have a system in place to minimize the risk. Our patent-pending end-to-end encryption ensures each facet of your business is protected. Our app uses biometrics as authentication which provides you a seamless protection experience. Unlike passwords, biometrics cannot be taken away from you, there’s nothing you need to remember, and you always have it with you. -
13
Clearswift Information Governance Server (IGS) provides additional data loss prevention (DLP) features to protect your organization’s valuable intellectual property or classified data from accidental or malicious data breaches. It acts as a secure central repository for document owners to register classified and sensitive information, e.g., M&A projects, payroll information, intellectual property, and product designs, to protect it from accidental, unauthorized sharing, or malicious breaches both internally and externally. Files are registered using a web browser or through a client application where text is extracted and registered in a hashed form. If registered files or fragments of these files are emailed to unauthorized recipients internally or externally, or shared over the web to unsanctioned sites, action is taken according to the policy set for that data. The Clearswift IGS integrates seamlessly with all Clearswift Secure Gateways and ARgon for Email.
-
14
Smart Eye Technology
Smart Eye Technology
Smart Eye Technology protects businesses that share highly sensitive files such as financials, legal contracts, wiring instructions, employee information, new innovation ideas, and more. Whether sharing internally with employees – working on-site or remotely, or externally with vendors or customers, Smart Eye Technology provides unprecedented data and information security. Fraudsters impersonating vendors are requesting wiring changes through email costing businesses upwards of 500 billion dollars a year. Our enterprise-level private communication platform only allows those companies you approve of to send or receive files from your organization. This puts an end to fraudulent wire changes sent by unapproved individuals or companies, saving your organization thousands of dollars. No matter what size your organization is, intellectual property is your most valuable asset. -
15
Verimatrix
Verimatrix
Verimatrix helps power the modern connected world with security made for people. We protect digital content, applications, and devices with intuitive, people-centered and frictionless security. Leading brands turn to Verimatrix to secure everything from premium movies and live streaming sports, to sensitive financial and healthcare data, to mission-critical mobile applications. We enable the trusted connections our customers depend on to deliver compelling content and experiences to millions of consumers around the world. Verimatrix helps partners get to market faster, scale easily, protect valuable revenue streams and win new business. Get to market faster, scale easily, protect valuable revenue streams and win new business. That’s what we do. We help protect your valuable digital content, applications and devices with intuitive, people-centered and frictionless security. Verimatrix has the leading portfolio for protecting video content for IPTV, OTT, DVB. -
16
Fasoo Smart Print
Fasoo
Fasoo Smart Print (FSP) is a print security solution that prevents unauthorized data breaches through printouts. The solution applies dynamic watermarks containing user name, IP address, printed time, user ID, and company information to make documents traceable to their source. With context-aware print control, it prevents unauthorized printing and applies data masking to detected sensitive information. A comprehensive audit trail monitors all printing activities, capturing both text and images of what users printed, ensuring a secure chain of custody for privacy and a robust defense against data breaches. Key Features of Fasoo Smart Print include: Dynamic print watermark, Context-aware print control, Smart pull-printing, and Comprehensive logging. -
17
SS&C Intralinks VIA Elite
SS&C Intralinks
Gain full control over sensitive documentation with SS&C Intralinks VIA Elite, our secure file-sharing solution built upon the industry-leading dealmaking platform. Collaborate seamlessly with internal and external stakeholders. Reduce time spent on manual uploads and synchronizations, ensuring data accuracy and enhanced governance. Maintain control over sensitive content with granular user permission management, customizable workflows, information rights management, watermarking, download prevention, and other advanced features. Access Intralinks from your mobile device, anytime, anywhere. With our secure app, you can manage files, user access, alerts, and more. Get deep insight into user activity and engagement, document usage, and project progress with advanced reporting modules. Intralinks provides secure collaboration software and secures online document-sharing solutions that enable enterprise collaboration across organizational, corporate, and geographical boundaries. -
18
AlephTransfer
AlephTransfer
Reduce the likelihood of insider threats, data breaches and ransomware attacks. Maximize organizational adherence to regulatory compliance requirements and cyber-security best practices and standards. Sharing large files or massive folders can be a huge pain. AlephTransfer makes it easier and makes external sharing seamless. Aleph Transfer is the fastest and most reliable way to transfer time-critical files. AlephTransfer helps in reducing infrastructure maintenance cost, increasing employee productivity gain, and boosting project efficiency. Today, Business Email Compromise (BEC) is responsible for over 50% of cybercrime losses. At the same time, organizations throughout virtually every industry continue to share highly sensitive information via low-security email attachments or easily breached cloud sharing services. At AlephTransfer, our streamlined Managed File Transfer (MFT) platform was designed to promote a smooth workflow while keeping files safe. -
19
AMS File Transfer
Automated Messaging Systems
Secure 2-way communication made simple with AMS File Transfer. AMS File Transfer is a secure encrypted solution, allowing your users to transfer files securely with a full audit trail to internal colleagues or external recipients whilst maintaining control over the access of the information. With 3 authentication options, plus unique sender controls the solution offers peace of mind that the transfer is protected throughout the whole process. Secure files using 256bit AES encryption with full virus scan, 3 authentication options for recipients including 2-factor and the ability to initiate DRM. No more concerns of file size limitations when transferring or receiving files via the secure branded web portal or Outlook. Have your portal branded how you like, allowing you to increase brand recognition and add additional reassurance for external parties. Eliminate the concern of sensitive information being sent via email. -
20
BooleBox
Boole Server
BooleBox is a content security platform that maintains clients data integrity and confidentiality from unauthorized access while ensuring the highest level of encryption to protect sensitive data from attacks. Thanks to an advanced encryption system and various security settings, users can finally create, edit, share and classify files and folders, without compromising the usability. With boolebox solutions, we protect your data wherever it is, at work, in the cloud, in transit via e-mail, in shared projects, and in the most commonly used platforms, such as Windows, Outlook, Gmail, OneDrive, and SharePoint. We understand your potential digital vulnerabilities, and we protect them like no one else can because our protection is the bodyguard of your data. It never abandons it and follows it everywhere! We protect large amounts of data in different types of business sectors. We have been doing this every day since 2011. -
21
Fasoo Smart Screen
Fasoo
Fasoo Smart Screen (FSS) is an advanced security solution designed to protect sensitive information displayed on computer screens. The solution displays visible dynamic watermarks, containing detailed user-specific information, discouraging users to take a photo with their smart devices. FSS also blocks unauthorized screen capture attempts from specific website URLs and applications, to secure confidential data from malicious users. In addition, FSS tracks all screen capture attempts, including an image of what was captured, providing detailed insights and audit trails for organizations. Key Features: - Dynamic Watermark - Screen Capture Blocking - Audit Trail -
22
Switch Secure Workspace
Egress Software Technologies
Secure Workspace makes it easy for users to upload, control, and share documents securely with teammates and external partners. Our encrypted environment offers enterprise-grade access permissions at the click of a button. Our mobile app and productivity toolkit enable teams to collaborate seamlessly from anywhere. Detailed reporting helps you to demonstrate compliance and stay clear of burned reputations and regulatory fines. Secure Workspace lets you easily and securely share your most confidential data both internally and with your supply chain. Zones act as secure containers, making it easy for you to clearly organize content within folders and keep sensitive content safe from unauthorized access. With access permissions and controls, accredited security frameworks, and flexible authentication, your team can stay in control while sharing sensitive documents internally and with external partners. -
23
ShareVault
ShareVault
A virtual data room or VDR is an essential tool for facilitating due diligence and other business transactions where it is imperative to share documents in a controlled manner. Retain control of your sensitive documents easily, even on computers and devices that are outside the control of your IT department. From remote shredding to user analytics, ShareVault maximizes your visibility and control, so you focus on the deal, not the data room. ShareVault's powerful Information Rights Management (IRM) technology, available only with ShareVault Pro and ShareVault Enterprise, allows you to retain persistent control over documents shared with third parties. Protected documents are AES-256 bit encrypted and can only be opened by users with current rights, so documents can be remotely "shredded". In other words, a user's permission to open a document can be revoked retroactively, even for files already downloaded. -
24
Robot Vera
Stafory
Vera in a few minutes will make a selection of resumes from job sites according to the requirements of the vacancy. With the help of modern technologies, Vera asks questions, analyzes the answers and even answers the questions of applicants. Vera recognizes the candidate's emotions during the video interview and sends you a recording. Vera connects to various work sites. Enter a short query and see how many active candidates there are on one portal. For those candidates who are interested in your vacancy, Vera will offer to go through an online interview, this can be done right in the browser. You don't have to worry about calling or texting the same candidate twice. When searching on several job sites or uploading her own database, Vera removes resume matches. Vera copes with completely different vacancies: cashiers, programmers, drivers, marketers. Moreover, it works with them simultaneously without loss of quality and speed. -
25
Veras CheckOut
Veras Retail
Using real-time enterprise inventory data, centralized order visibility and alerting, Veras CheckOut brings the power of e-commerce to your stores. Enterprise-enabled with offline reliability, seamless omnichannel and cross-store selling, rich promotional engine, hardware agnostic, PCI out-of-scope payment integrations. Additionally, CheckOut includes Veras Stock for inventory management, Veras Control for central office administration and Veras Extend for mobile selling. Accelerate store-level processes and simplify your inventory management. With real-time integrations into corporate merchandising systems, Veras Stock delivers a single source of truth for enterprise inventory management data. Veras Control’s centralized cross-store and cross-channel administrative capabilities ensure that stores and corporate levels are aligned for optimal business performance and customer service. -
26
Wizuda
Wizuda
Powerful Solutions to revolutionize how your organization shares data internally and externally. Designed with security, compliance and efficiency at its core, Wizuda MFT enables IT to manage the movement of critical data within your organization and with external parties, from one centralized solution. Wizuda MFT scales with your business and provides full end-to-end accountability of all file transfer operations. Provide people in your organization and clients with an easy, secure and compliant way to share sensitive data. With no file size limitations and encryption by default, using insecure alternatives such as USBs can be a thing of the past. Users have the added flexibility of sending emails with Wizuda either straight from their Outlook email or the secure web portal. Wizuda Virtual Data Rooms provide your business with a secure online repository for document storage, collaboration and distribution. Built with ‘privacy by design’, Wizuda VDRs can be set up in minutes.Starting Price: $9.99/month/user -
27
Fastevo
Fastevo
Fastevo is a cloud-based digital content protection and delivery platform that combines advanced DRM (Digital Rights Management) with proprietary multi-layer security to safeguard videos, images, and other media from piracy while ensuring seamless playback worldwide. It embeds enterprise-grade technologies such as Google Widevine, invisible and forensic watermarking, and adaptive protection that adjusts based on risk, helping prevent unauthorized copying, screen capture, and distribution across web browsers, mobile apps, and devices. It also handles secure transcoding and global content distribution through an international network of PoPs, offers detailed analytics and playback statistics, and supports flexible configuration of protection levels and player settings. Fastevo integrates into existing systems via APIs and provides tools like secure token-based access control, customizable players, and device-specific security policies to balance protection. -
28
Accellion
Accellion
The Accellion secure content communication platform prevents data breaches and compliance violations from third party cyber risk. CIOs and CISOs rely on the Accellion platform for complete visibility, compliance and control over the communication of IP, PII, PHI, and other sensitive content across all third-party communication channels, including email, file sharing, mobile, enterprise apps, web portals, SFTP, and automated inter-business workflows. When users click the Accellion button, they know it’s the safe, secure way to share sensitive information with the outside world. With on-premise, private cloud, hybrid and FedRAMP deployment options, the Accellion platform provides the security and governance CISOs need to protect their organizations, mitigate risk, and adhere to rigorous compliance regulations such as NIST 800-171, HIPAA, SOX, GDPR, GLBA, FISMA, and others. Accellion solutions have protected more than 25 million end users at more than 3,000 companies.Starting Price: $15.00/month/user -
29
CloudFish
CloudFish
Cloud-Fish protects your sensitive data across all platforms and provides your business with a solid defense against cyber-attacks and data breaches. Your sensitive business information, intellectual property assets, and customer data are stored on your employees’ computers, mobile devices, and on external cloud servers that your company uses. Securing this sensitive information is critical to protecting your business from financial risks, regulatory violations, and reputation setbacks. How do you ensure the security of your sensitive data that is dispersed across different platforms? Your company has regional as well as global offshore offices. You have little visibility and control over what is going on in your offshore organization. Who is sharing what information? You need an ability to monitor and an effective mechanism to respond if a cyber-attack or a security violation occurs.Starting Price: $9.09 one-time payment -
30
PassVult
PassVult
PassVult is a privacy-focused, anti-cloud password manager designed for users who prioritise data security and control. This innovative app stores passwords, codes, and sensitive information locally on your device, ensuring your data remains offline and encrypted, away from potential cloud vulnerabilities. Key Features - Local Data Storage: All sensitive information is stored exclusively on your iPhone, completely off the cloud and protected from external threats. - AES Encryption: Utilizes industry-leading AES-256 encryption to secure your passwords and sensitive data. - Secure Password Generator: Creates complex and unique passwords to enhance your online account security. - Breach Check Feature: Allows you to verify if your email has been exposed in known data breaches. - Travel Mode: Temporarily locks your data while traveling, ensuring it remains secure. - Loyalty cards: PassVult also allows you to store your loyalty cards free of prying eyes!Starting Price: $7.99/month -
31
Vitrium Security
Vitrium Systems
A robust, yet easy to use content security and enterprise digital rights management software. Get started today with our cloud-hosted subscription service or contact our team to learn how you can implement in your business as part of your overall content strategy or workflow process. Protect all your video, document, and image content files for secured and controlled distribution with Vitrium’s Enterprise Content Security Software. Enjoy one of the highest levels of encryption while still offering seamless access for your customers and gain incredible insight with detailed, analytics reports. Your customers (clients, students or employees) do not require any apps or plug-ins to view their secured content and they can access the content from any device at anytime.Starting Price: $300.00/month -
32
DRM-X
Haihaisoft
DRM-X 4.0 content protection platform, with new security architecture and more advanced security features. You can securely distribute protected Audio/Video, PDF, Web pages, Images and Javascript to Windows, Mac, iPhone/iPad and Android. With DRM-X 4.0 protection, you can get rid of the problem that you cannot effectively deliver and sell these contents due to piracy. DRM-X, Haihaisoft's digital rights management platform. Haihaisoft provides DRM as a service. The copy protection platform includes: File Encryption, Audio/Video Encryption, PDF Encryption, and Web Page (HTML DRM Encryption), all of them with DRM-X 4.0 advanced DRM features, and you can manage users, groups, rights and license profiles online in your DRM-X account. DRM-X 4.0 is a new generation DRM software platform based-on Xvast browser. It with new security architecture, support online/offline playback, improved user experience. DRM-X provides dynamic watermarking capabilities on protected digital content. -
33
MediaRights Revolution
Rightscreen
MediaRights Revolution (MR2) is designed for broadcasting, production, and distribution firms in the film, music, publishing, and merchandising industries. Managing diverse intellectual properties - music, audiovisual content, texts, images, and brands - provides detailed metadata, including rightsholder shares, and securely stores digital content copies with shared access functionality. MR2 enhances licensing processes with real-time control, simplifying deal creation through contract templates. Manage financial reports, including licensee royalties, using intricate fund distribution calculations based on contracts and rights holders' shares. Ensure effective sales management through reports for counterparts and internal analytics. Automation in royalty and licensing payments accelerates workflows, reducing manual efforts and ensuring financial precision, enhancing efficiency, and lowering operational costs. -
34
BlueFiles
Forecomm
How do you do today when you need to quickly send a confidential file or email to a customer, partner, or employee outside of your company, outside the secure network? CNIL strongly advises businesses and organizations to " use data encryption during transfers " and " have people trained in the risks ". Data encryption is a central part of the modern data protection strategy. Using specialized encryption, like BlueFiles, companies can encode their data so that it becomes indecipherable to anyone but the intended recipient. BlueFiles provides a real guarantee on all your digital data transfers: Integrity of the BlueFiles file, 100% confidentiality, remote control of the files sent, and tracking. Save time, ease of use, and lower costs, we need to communicate with confidence over the Internet without the risk of our sensitive data being disclosed. Under the GDPR law, companies must take steps to encrypt their personal data flows or face high fines. -
35
Serv-U FTP
SolarWinds
The Serv-U FTP software from SolarWinds is built to deliver quick, easy, and reliable file transfer for your organization. You can exchange sensitive files with your trading partners using secure FTPS (FTP over SSL/TLS) over IPv4 and IPv6 networks. Users can view, upload, and download files from intuitive web and mobile interfaces. Designed for small businesses, Serv-U FTP Server is a safe file transfer software designed to help accomplish all your internal and external file transfer needs.Starting Price: $528 one-time payment -
36
NextLabs
NextLabs
NextLabs CloudAz is a zero trust policy platform that enforces security policies consistently across the enterprise and beyond. It’s powered by a patented dynamic authorization policy engine and is the backbone of NextLabs’ Data Centric Security Suite consisting of Entitlement Management, Data Access Security, and Digital Rights Management (DRM) products. CloudAz integrates automated data classification, attribute-based access control (ABAC), data masking & segregation, digital rights (DRM) protection, and audit capabilities into one powerful platform that enables you to better align policies with rapidly changing business requirements while keeping up with the increasing cybersecurity challenge. The platform can be delivered either on-premises or in the cloud. -
37
Amp Impact
Vera Solutions
Amp Impact is a Salesforce-based solution by Vera Solutions, for organizations pursuing impact. Built on common needs observed during hundreds of digital transformation projects, Amp Impact enables social-impact organizations to trade in complex spreadsheets for a flexible, friendly, and integrated technology solution. It's a tool designed for grantees and grantors – a tool that streamlines workflow and data flow, from the field to local offices to HQ to funders. Amp Impact is now used in more than 150+ countries to manage data for over $12.5 billion in development programs and grants. Vera Solutions has worked with 430+ international clients in the nonprofit sector, committed to tracking their impact and streamlining their operations.Starting Price: $7000/year -
38
Objective Connect
Objective Corporation
Ultimate protection over your information, when you share it with anyone outside your organization. Designed specifically for government and regulated industries, Objective Connect is a secure external file-sharing application that gives complete control over the information you share outside your organization. Extend your internal information governance externally. Maintain control over shared documents. Collaborate across devices, across teams, or across the world. Maintain one version of the truth. Record who did what and when all from one solution. Choose what documents can be sent externally, by sharing containers of documents directly from your existing file plan. Before any document is shared, all access controls, security levels, and caveats are checked. Two-way synchronization with your existing file plan ensures everyone is kept up to date. Any file you receive is automatically filed in the correct location and flagged to ensure your metadata is always accurate.Starting Price: Free -
39
ITsMine Beyond DLP
ITsMine
ITsMine Beyond DLP™ goes beyond traditional Data Loss Prevention (DLP) to protect organizations against all data threats. No policies or endpoint agents needed zero effect on employee productivity, and protection even after data exfiltration. Data loss incidents are becoming more common and more destructive than ever before, whether deliberate or inadvertent or from internal or external factors. Beyond DLP™ is a completely new security approach, that enables organizations to easily track and secure their data wherever it is, within their internal network and beyond. Maintain your high-security standards regardless of whether your data is located in on-prem or cloud-based file systems. Empower employees’ full productivity while controlling the usage and whereabouts of your sensitive data. Hassle-free compliance to data protection regulations, from GDPR, CCPA, PCI to HIPAA, with access control options to sensitive data, data breach detection and clear reporting options. -
40
My MX Data
My MX Data
MX Data Exchange is a fully trackable file transfer tool for businesses, providing a fast, easy, and secure way to share sensitive or technical data internally and across the supply chain. As well as offering ultra-fast upload speed and an intuitive interface, MX records all transactions and allows the history to be searched and exported to champion accountability. My MX Data gives you superior data protection capabilities. It converts your data into an unrecognizable format, shreds it, and sends it to different global locations, adding another layer of security. Once downloaded, the data reverts to its original, comprehensible state. Thanks to our patented technology, all transferred data retains complete secrecy, barring any unauthorized extraction. Furthermore, our adaptable system adheres to data sovereignty rules, letting users pick where their data fragments are located. Tailored for business-to-business file sharing, we offer premium services that are highly recommended.Starting Price: $8.83 per month -
41
ArtistScope Site Protection System (ASPS)
ArtistScope
ArtistScope Site Protection Software (ASPS) provides the most robust and most secure website security and copy protection for all web page media, safe from all copy including screen capture, download, scraping, etc. In fact ASPS provides the most secure solution for data security and the prevention of data loss and plagiarism ever imagined. The ASPS server module is installed on the web server (Apache or Windows) to deliver encrypted web pages from your web site that only the ArtisBrowser can interpret and display, creating a secure tunnel between website and the user's web browser in which no data or media can be copied or extracted by any means, not even from browser cache or memory. ASPS is most unique and it is most secure because it does not depend on popular web browsers which are useless for copy protection. Any media displayed on your web page will be copy protected and you can use any video file format or embedded player that you like.Starting Price: $495.00 -
42
BeSafe
BeSafe
Protect control monitor, your files everywhere in all platforms, all drives, all boxes. Protect any kind of files (PDF, Office, videos and more) with state of the art encryption. BeSafe’s preserves native collaboration features in Dropbox, Google Drive, and Slack. Stay in control of your documents by enabling one-time viewing or specifying an expiration time for shared access. Instantly revoke access if you have sent the file to the wrong recipient. Get 360° data access visibility: Know who, when, where and how your content is accessed. Find out what matters most with instant “read” notifications and even page-by-page view analytics. We are revolutionizing end-to-end encrypted cloud collaboration with Proxy Re-Encryption cryptography. Besafe uses patent pending technology for encrypting your data and enabling secure sharing over any email or cloud file sharing application. BeSafe can be integrated to Dropbox via the user’s BeSafe web portal. -
43
VeraWallet
Verasity
VeraWallet is a simple and secure wallet designed for managing the VRA (VERA) token. It enables users to buy or deposit VRA via card or bank transfer, store and stake tokens, and earn up to 15 % annual staking rewards. It supports swapping, depositing, purchasing, and locking tokens through its staking program, which allows VRA holders to lock their tokens in return for rewards. VeraWallet takes less than five minutes to set up, offering an intuitive and streamlined interface to buy, stake, and manage VRA, all in one place. -
44
Symantec Endpoint Encryption
Broadcom
Your staff relies on mobility and anywhere-access to stay productive. Unfortunately, your sensitive data may be unknowingly synchronized from the cloud, and at risk when devices are lost or stolen. Symantec Endpoint Encryption protects sensitive information and ensures regulatory compliance. It encrypts all files on the hard drive, sector-by-sector, for maximum security. It supports Windows, Mac, tablets, self-encrypting drives, and removable media (USB drives, external hard drives, and DVDs). For maximum flexibility, Symantec Endpoint Encryption also manages BitLocker and File Vault-protected devices. Symantec Gateway Email Encryption provides centrally-managed, secure communications with customers and partners at the network gateway. It minimizes the risk of a data breach while ensuring regulatory compliance. For desktop applications, Symantec Desktop Email Encryption automatically encrypts and decrypts email directly between internal clients. -
45
DropSecure
DropSecure
With DropSecure, the keys to unlock your data are never shared with anyone you didn't intend to share with, including us. That means you get real privacy behind our military-grade encryption and file transfer technology. Discover the most secure way to share your documents. At DropSecure, it is our mission to empower you with technology that protects your digital valuables in a hassle-free manner. DropSecure protects your privacy and safeguards your data using military-grade algorithms before they leave your device. With end-to-end encryption, encrypted uploads, decrypted downloads, two-factor authentication, cryptographic keys, and zero knowledge transfers, we offer the ultimate technology to keep your data safe from the data centers. So whether you are an individual, business or enterprise, you are always aware of who has access to your sensitive documents. Most importantly, no one owns the keys to your documents apart from you, not even us.Starting Price: $10 per month -
46
Spherity VERA
Spherity
The synergy between Spherity’s VERA and RCS Global’s Claritas introduces a game-changing solution for the battery sector. Powered by our technology, the Battery Passport offers car and battery manufacturers the ability to issue digital battery passports, making product traceability easier than ever. VERA allows you to securely exchange data with your suppliers and create Digital Product Passports that demonstrate your compliance with new regulations. It makes the data in your passport digitally verifiable and you'll have complete control over your data, deciding who can access it. Plus, the DPP is an invaluable tool for tracking your product's journey throughout its entire lifecycle, from use to re-use and recycling. Confirms technical and functional standards set by SAP, ensuring compatibility, performance, and reliability throughout. -
47
Veras Extend
Veras Retail
Veras Extend, a Customer Experience Applications. Deliver a seamless, unified customer-facing strategy. mPOS CheckOut Anywhere. Veras Extend acts as “another register” natively using CheckOut’s ERP, CRM and payment integrations. Platform flexibility with iOS, Android and Windows. Associates see the same pricing and promotions for seamless operations. Execute full POS transactions or suspend and resume on a standard register. Operate mPOS at any offsite event or easily add another in-store register. Veras Affinity Clienteling. Veras Affinity is driven by an ultra-responsive engine. Unlike any other clienteling solution, direct associate input strengthens the data and trains the AI to make smarter recommendations to drive sales. Endless Aisle, Endless Possibilities. Associates can search your entire global catalog, including any number of vendor catalogs, to present product availability, relevant promotions, and recommend similar items to the customer in-aisle. -
48
Link-Busters
Link-Busters
Link-Busters is an anti-piracy service trusted by world-leading publishers, developers, and creatives. Our technology quickly detects infringing content across the web, disrupting the digital piracy ecosystem and providing sales protection and marketing optimization for enrolled products. With over 1 million products protected, more than 1 billion DMCA claims sent, and support for over 150,000 infringing sites, Link-Busters offers a comprehensive solution for digital creators. Our services help increase sales from the moment they start protecting your content, optimize traffic to your website after the removal of piracy links, and protect your content creators and their rights. Clients have reported significant improvements, including at least 400% more removals than in previous years and better detection of infringements compared to competitors. Link-Busters' platform is multifunctional and scalable, providing actionable data to tailor solutions for businesses of all sizes. -
49
DekkoSecure
DekkoSecure
Dekko Secure is a fast-growing SaaS company providing leading-edge, military-grade security. Unlike many popular file sharing and collaboration tools our security was designed from the ground up for end-to-end encrypted, zero-knowledge data defence and sovereignty, whatever the file size or type. That's why we are trusted and chosen by government and business at the highest level. They also love that our web-based platform needs no installation or training so is quick to deploy and easy to use. Our security starts where the popular solutions stop. DekkoGov™ - Ultra-secure file sharing, collaboration & eSignatures for Government workflows. DekkoGov™ is trusted by Government departments and external stakeholders globally. DekkoPro™ - Share sensitive data easily using military-grade security with no file-size limits. DekkoPro™ allows businesses of all sizes to keep their data ultra-secure, simplify workflows, compliance and increase productivity. -
50
FileAgo
FileAgo Software Services
FileAgo is the world's only software to have a combination of Waterfall and Granular Permission model, which enables users to implement precise access control and restriction over their data like never before. Organizations and users get the best of both worlds in FileAgo - control and ease of use. Manage data of your teams at a centralised storage on cloud, while securely allowing/restricting access and file sharing. Co-edit office documents with your co-workers in real-time using our builtin Collabora Online editor or Microsoft Office for the web. Our top priority is always to protect your sensitive files, and FileAgo's unique and flexible granular file and folder permission model is designed just for that. Also, the data is encrypted using AES-256 encryption and stored in datacenters which has passed various industry compliances and security certifications.Starting Price: $4 per user per month