Alternatives to LeaksID
Compare LeaksID alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to LeaksID in 2024. Compare features, ratings, user reviews, pricing, and more from LeaksID competitors and alternatives in order to make an informed decision for your business.
-
1
Safetica
Safetica
Safetica is an integrated Data Loss Prevention (DLP) and Insider Risk Management (IRM) solution, which helps companies to identify, classify, and protect sensitive data as well as detect, analyze, and mitigate risks posed by insiders within an organization. Safetica covers the following data security solutions: ✅ Data Classification: Safetica offers complete data visibility across endpoints, networks, and cloud environments. ✅ Data Loss Prevention: With Safetica, you can protect sensitive business- or customer-related data, source codes, or blueprints from accidental or intentional exposure through instant notifications and policy enforcement. ✅ Insider Risk Management: With Safetica, you can analyze insider risks, detect threats, and mitigate them swiftly. ✅ Cloud Data Protection: Safetica can monitor and classify files directly during user operations. ✅ Regulatory compliance: GDPR, HIPAA, SOX, PCI-DSS, GLBA, ISO/IEC 27001, SOC2 or CCPA. -
2
FormKiQ
FormKiQ
FormKiQ is a new way to manage documents in the cloud, using a powerful Open Source API paired with a dynamic ReactJS web client, both of which you can build on and extend. You can add FormKiQ to an existing application or product or install and run it as a full-featured electronic document management system on its own, with as little or as much customization as you need. NOTE: along with Pro and Enterprise versions, there is a free open-core version, FormKiQ Core, that provides the essential features of a document management system. What makes FormKiQ stand out from other document management software is that it is highly flexible and customizable, due to being designed and built with API-First principles and using Amazon Web Services (AWS). This allows a level of customization and flexibility that is far beyond what other electronic document management systems can offer, and that's a good reason why tech-oriented companies across a wide range of industries are choosing FormKiQ.Starting Price: $1,299 per month -
3
Code42 Incydr
Mimecast
Incydr gives you the visibility, context and control needed to stop data leak and IP theft. Detect file exfiltration via web browsers, USB, cloud apps, email, file link sharing, Airdrop, and more. See how files are moved and shared across your entire organization, without the need for policies, proxies, or plugins. Incydr automatically identifies when files move outside your trusted environment, allowing you to easily detect when files are sent to personal accounts and unmanaged devices. Incydr prioritizes file activity based on 120+ contextual Incydr Risk Indicators (IRIs). This prioritization works on day 1 without any configuration. Incydr’s risk-scoring logic is use case-driven and transparent to administrators. Incydr uses Watchlists to programmatically protect data from employees who are most likely to leak or steal files, such as departing employees. Incydr delivers a complete range of technical and administrative response controls to support the full spectrum of insider events. -
4
Risk Monitor
SearchInform
SearchInform Risk Monitor controls your maximum quantity of information channels as well as featuring built-in analytical tools. Provides your business with multifaceted protection against financial losses caused by internal threats in several stages: •Detecting incidents involving corporate fraud and profiteering •Controlling the human factor and predicting HR risks •Protecting confidential data from leaks during its storage, use and transfer •Facilitating regulatory compliance and investigation processes The system operates on two levels. It keeps track of the data leaving the network while at the same time monitors employee activities on computers. SearchInform Risk Monitor keeps an eye on the company’s assets 24/7 even if the employees are outside the office (field work, WFH or while on the business trip) but using corporate devices. -
5
MINDely
MIND
MIND is the first-ever data security platform that puts data loss prevention (DLP) and insider risk management (IRM) programs on autopilot, so you can automatically identify, detect, and prevent data leaks at machine speed. Continuously find your sensitive data in files spread across your IT environments whether at rest, in motion, or in use. MIND continuously exposes blindspots of sensitive data across your IT environments including SaaS, AI apps, endpoints, on-premise file shares, and emails. MIND monitors and analyzes billions of data security events in real time, enriches each incident with context, and remediates autonomously. MIND automatically blocks sensitive data in real-time from escaping your control, or collaborates with users to remediate risks and educate on your policies. MIND continuously exposes blindspots of sensitive data at rest, in motion, and in use by integrating with data sources across your IT workloads, e.g. SaaS, AI apps, on-premises, endpoints, and emails. -
6
SkyDRM
NextLabs
Keep your documents safe from unauthorized access and control how they can be used. Move faster, automate, improve efficiency, and be more agile. Prevent wrongful disclosure of customer data and provide secure access to critical business applications. Protect trade secrets and intellectual property. Close the security gap of perimeter security while allowing users to collaborate effectively. Protect and monitor your business-critical document such as intellectual property and product design, wherever it lives or travels, across devices, apps, cloud services, and on-premises. SkyDRM uses digital rights management and dynamic authorization technology to protect files and enable secure sharing. Protection stays with the document, regardless of where it’s stored or who it’s shared with: inside or outside your network, on file servers, or in the cloud. Determine whether your file can be accessed, viewed, edited, printed, or shared. -
7
Workiva
Workiva
Connect your enterprise to single-source clarity. Automate processes. Take control of data transformation. You didn’t get into this work to do menial tasks. We built a platform that does the things technology should be doing and frees you up to focus on what you love. Have an impact, not a headache. Spend your time on the things that matter most. Make numbers meaningful with more context. Create shared datasets that are always up to date. Don’t create another rogue spreadsheet, build reusable assets for your organization. Collaboration, but for sources of data. Connect and combine data from any source. Create reusable datasets. Have the right answers ready, for everybody. Because you don’t have to anymore. Our platform automates tedious, manual stuff like gathering data, updating numbers and narrative, keeping up with changes, managing approvals, and more. Is it magic? Maybe. -
8
Trendzact
Trendzact
Comprehensive threat protection and productivity enhancement for on-premise and remote work from anywhere. Automatically score and provide results to agents for every customer interaction. Tailored coaching is automatically provided to agents based on customer interactions. Continuous webcam image capture and live stream video/audio to identify security threats & productivity losses. Dynamic risk scoring and vulnerability scanning identify insider activity before they represent a real threat. Video recording of all employee activity, audio recording, session recording, immutable logs, and alerts. Users can access supervisors & cohorts to share tribal knowledge and for encouragement. Security and productivity events can be flagged and then ticketed for a controlled workflow process. Automatically take notes for agents during calls and post them into CRM. Define workflow for triggered events. -
9
Tungsten Output Manager
Tungsten Automation
Organizations are challenged to stay abreast and ahead of digital transformation. They need solutions that inject intelligence into their workflows, including their document control and print management work streams, so that they drive business outcomes, cut costs and impact the bottom line. Tungsten Output Manager helps organizations by delivering the most intelligent governance for your document control and print management needs. Its superior security features help organizations improve document security, minimize inefficiencies and mitigate compliance risks. Tungsten Output Manager’s best-in-class print and document control capabilities infuse process orchestration, including intelligent redaction, and keen re-routing to increase workforce capacity. Tungsten Output Manager helps protect printed documents and prevents the unauthorized flow of sensitive information. -
10
SCHEMA ST4
SCHEMA Group
The SCHEMA Group was established in Nuremberg in 1995 and is a medium-sized software manufacturer with more than 130 employees. The SCHEMA Group produces component content management and content delivery solutions for authoring departments creating product-related content. The SCHEMA ST4 component content management system is one of the most frequently used systems for the modularised creation of documentation, package inserts and marketing documentation. The system covers all areas of creation, versioning, variant control, translation, management and publication of product-related content – from authoring assistance during input to the finished layout for the printed catalog. A documentation portal based on Quanos InfoCube provides a central point of contact on the Internet where all technical documentation is available. Users can quickly and precisely find the right content in the entire information inventory with an easy-to-use search system. -
11
Greenbox
Discus Business Solutions
Greenbox is a remarkably unique document management system with an advanced integrated business process management system. It is a Document Management System that helps in storing, tracking, retrieving and managing documents while having centralized access. Anyone and everyone with permission can access a file irrespective of where they are. The system takes care of complete safety and confidentiality of the documents and is designed to simplify the otherwise complicated operations. Greenbox allows the user access to a variety of features like unlimited folders and subfolders, universal content search, Solr OCR/text search inside an image, document versioning and restoration, granular access control and advanced document control feature. Document approval workflow, smart handling of metadata, and an attractive price bracket are some of its most notable features.Starting Price: $9.00/month/user -
12
DocBridge Delta
Compart AG
Analyze and compare complex documents - automated, completely reliable and independent of the format and structure of the files to be checked. Avoid mistakes in document creation and delivery - because they cost time, money and reputation. DocBridge Delta® offers a separately available module for the analysis of print files of different formats (AFP, PDF, PCL etc.) and thus guarantees a smooth production. Personalized customer communication is the key word today. With DocBridge Delta®, the complexity remains under control. Protecting the brand identity of your business is essential. Thanks to the sophisticated testing methods of DocBridge Delta®, you prevent brand-killing deviations. Automated quality assurance pays off quickly: Eliminate expensive reprints. One of the largest printers in the world claims that they do not print a page before running it through Delta first. -
13
Next DLP
Next DLP
Discover risks, educate employees, enforce policies and prevent data loss with Reveal. Your people, users and data are dynamic: constantly changing and moving. In the hybrid world of work people create, manipulate and share data dynamically, across endless channels. The opportunities for data leaks are infinite and your people are the main target— securing your organization starts with securing your people. Reveal Cloud is cloud-native, so it is simple to buy, install, and use. You get automated protection from day 1 with out-of-the-box policies and machine learning, with smart remediation that works even if computers are disconnected from the network. The lightweight agent makes sure your data and employees are protected at all times without slowing you down. Continuous monitoring provides visibility into user behavior, data access, and system use. Security operators can search on file, USB device, connection, browser, application events, and more. -
14
DocSend
DocSend
Never send another attachment again. Securely share your documents with real-time control and insights—no matter where you're working. The secure document sharing platform everyone can use. Managing, sharing and tracking your important files is as easy as sharing a link. Increase security, control file downloads, and turn off access anytime. Be prepared for your next meeting with real-time intelligence. Update a file even after hitting send. And everyone automatically has the latest version. Our Gmail and Outlook plugins make uploading documents and sharing links a breeze. Protect your documents with passcodes and email verification, track if links are forwarded, or simply turn off access to take back control. Seamless, on-brand viewing experience. View on any device. No file downloads. Investors and business partners love DocSend’s easy, browser-compatible, mobile-first, viewing experience. Sharing Powerpoint? Keynote? Pdf? Gifs? We’ve got you covered.Starting Price: $10 per user per month -
15
CryptoSpike
ProLion
Based on full access transparency, CryptoSpike detects unusual activities in your file system and blocks attacks in real-time. In the event of a ransomware attack, the granular restore function makes it possible to restore affected files immediately. By analyzing all data access to the storage system, CryptoSpike detects ransomware attacks and unusual behavior, stops them in their tracks, and immediately gives you the chance to react and restore the exact data you need. Detect data access patterns and file extensions that are typical of ransomware. Targeted recovery of damaged data directly from the snapshot. Immediately and automatically prevent attacks and alert those responsible. Adjust monitoring policies at the volume or share level in real time. Complete data transparency with access traceability at the file or user level. If required for data protection reasons, user-specific data is only available via dual verification. -
16
Maltego
Maltego Technologies
Maltego is a Java application that runs on Windows, Mac and Linux. Maltego is used by a broad range of users, ranging from security professionals to forensic investigators, investigative journalists, and researchers. Easily gather information from dispersed data sources. View up to 1 million entities on a graph. Access over 58 data sources in the Maltego transform hub. Connect public (OSINT), commercial and own data sources. Write your own Transforms. Automatically link and combine all information in one graph. Automatically combine disparate data sources in point-and-click logic. Use our regex algorithms to auto-detect entity types. Enrich your data through our intuitive graphical user interface. Use entity weights to detect patterns even in the largest graphs. Annotate your graph and export it for further use.Starting Price: €5000 per user per year -
17
Monitor productivity, run investigations, and protect against insider risk with one platform. Our powerful workforce behavior analytics allow you to regain visibility into your remote or hybrid employee activity. Veriato workforce behavior analytics go beyond passive monitoring to proactively analyze productivity, monitor for insider risk and much more. Powerful, easy-to-use tools to keep your remote, hybrid and office teams productive. Veriato’s AI-powered algorithm analyzes user behavior patterns and automatically alerts you to any abnormal or suspicious activity. Assign productivity scores to websites, programs, and applications. Select between three types of screenshots: Continuous, Keyword Triggered and Activity Triggered. Track activities on local, removable, and cloud storage, as well as print operations. See when files are created, edited, deleted, or renamed.Starting Price: $25 per user per month
-
18
Varonis Data Security Platform
Varonis
The most powerful way to find, monitor, and protect sensitive data at scale. Rapidly reduce risk, detect abnormal behavior, and prove compliance with the all-in-one data security platform that won’t slow you down. A platform, a team, and a plan that give you every possible advantage. Classification, access governance and behavioral analytics combine to lock down data, stop threats, and take the pain out of compliance. We bring you a proven methodology to monitor, protect, and manage your data informed by thousands of successful rollouts. Hundreds of elite security pros build advanced threat models, update policies, and assist with incidents, freeing you to focus on other priorities. -
19
Purview Insider Risk
Microsoft
Discover new capabilities that will transform how you secure your organization's data across clouds, devices, and platforms. Manage data risks with pseudonymization and strong controls. Identify hidden risks with customizable machine learning templates requiring no endpoint agents. Work with teams across security, human resources, and legal departments with integrated investigation workflows. Intelligently identify, investigate, and take quick action on insider risks. Conduct an evaluation of potential insider risks in your organization without configuring any insider risk policies. Quickly create a policy with customizable machine learning templates that require no scripting or endpoint agents to deploy. Identify patient data misuse risks with built-in indicators and detectors that use data from electronic medical record systems. Easily understand the context of an alert to help focus your investigation on the riskiest activities. -
20
Getvisibility
Getvisibility
Getvisibility's customizable AI revolutionizes the DSPM landscape. With cutting-edge algorithms and user-friendly interfaces, it empowers businesses to unlock unprecedented insights, optimize performance, and detect anomalies in real time. Experience the power of tailored solutions that elevate your DSPM capabilities to new heights. Using AI and machine learning, Getvisibility provides the fastest and most accurate data discovery and classification platform. Our AI Models are trained on Industry-specific knowledge allowing you to quickly and accurately classify all of your data. Getvisibilities OCR capabilities enable organizations to see within pictures and images. Through our cutting-edge AI models, developed specifically for your security needs, our platform empowers your organization to swiftly identify your most sensitive data. With our advanced algorithms, Getvisibility enables the precise identification of protected surfaces, including personally identifiable information (PII). -
21
FortiInsight
Fortinet
30 percent of data breaches involve organization insiders acting negligently or maliciously. Insiders pose a unique threat to organizations because they have access to proprietary systems and often are able to bypass security measures, creating a security blind spot to the risk and security teams. Fortinet’s User and Entity Behavior Analytics (UEBA) technology protects organizations from insider threats by continuously monitoring users and endpoints with automated detection and response capabilities. Leveraging machine learning and advanced analytics, FortiInsight automatically identifies non-compliant, suspicious, or anomalous behavior and rapidly alerts any compromised user accounts. This proactive approach to threat detection delivers an additional layer of protection and visibility, whether users are on or off the corporate network. -
22
Coro
Coro Cybersecurity
Coro puts an end to the security tool sprawl and to the constant worry that things have been overlooked. No need to check everything 10 times a day. Coro will take care of the ongoing security, and will alert you only when you need to take action. Coro analyses the threats to your entire business, takes action to eliminate the risk, and guides you on what to do next to improve your security posture. Coro is the central control point for sensitive data, practice data, and user activity, enabling you to enforce a wide range of security, compliance and governance policies. We scan every email for phishing, malware, ransomware and automatically eliminate threats. We automatically identify and block insider threats, accounts hacking, and malicious activities. We scan every file and email, or any data share for PII/PCI/PHI, and prevent confidential information leakage.Starting Price: $8.99 per user per month -
23
Traced Security
Traced Security
SaaS platforms are increasingly targeted by cybercriminals, resulting in severe data breaches. Understanding and mitigating these threats is essential for maintaining security. Complex SaaS environments obscure security threats. Achieving full visibility is crucial for identifying and addressing potential vulnerabilities effectively. Inadequate SaaS security can lead to non-compliance with regulations. Ensuring compliance is vital to avoid penalties and maintain trust. Weak data governance in SaaS can result in unauthorized access and data loss. Robust data protection measures are necessary to secure sensitive information. Achieve comprehensive insights, user behavior, data exposure, SaaS risks, and compliance with Cybenta AI. Enhance your SaaS security by prioritizing and addressing vulnerabilities with AI-driven analytics and automated remediation. Streamline the management and governance of apps and identities through automation and orchestration. -
24
GoSecure
GoSecure
GoSecure, a recognized cybersecurity leader and innovator, combines more than 20+ years of market-leading security technology with highly skilled professionals who become an extension of in-house security team to mitigate threats before they can compromise business operations. GoSecure Titan® Managed Security Services pioneers the integration of endpoint, network, and email threat detection into a single Managed Extended Detection & Response (MXDR) service. Our GoSecure Titan® Platform offers superior visibility and protection, detecting more threats and reducing security costs with faster threat mitigation. GoSecure Professional Security Services provides a full portfolio of testing and assessment services to evaluate cybersecurity maturity, identify risks and gaps. We define a roadmap tailored to your situation, needs, and budget, improving security posture. Our Professional Services find issues, our Managed Services fix them, helping you thrive. -
25
Saasment
Saasment
Saasment solves security risks to prevent human error across your digital assets. We automate security programs to make sure your company information is protected. Fraud prevention, full coverage against emerging threats targeting online stores like Shopify and Wix. Automated cloud CISO, letting you focus on growing your business securely and win big logos. Identify your risks to understand what are the security vectors you exposed across cloud and saas applications. Build a security strategy that fits the business needs based on the risk we found in your environment. Implement the strategy and solutions, getting your business to best-in-class security with our saas security platform. Continuously monitor and ensure your business is free of vulnerabilities and risks. We help organizations to detect and prevent misconfigurations across 40+ applications and maintain continuous compliance tracking.Starting Price: $89 per month -
26
Proofpoint Insider Threat Management
Proofpoint
As the leading people-centric Insider Threat Management (ITM) solution, Proofpoint’s ITM protects against data loss and brand damage involving insiders acting maliciously, negligently, or unknowingly. Proofpoint correlates activity and data movement, empowering security teams to identify user risk, detect insider-led data breaches, and accelerate security incident response. 30% of data breaches are insider-driven, and the cost of these insider security threat incidents has doubled in the last three years. Proofpoint empowers security teams to reduce insider threat risk and frequency, accelerate insider threat response and increase the efficiency of their security operations. We’ve gathered all the resources for you, including reports, strategies, and more, to help you mitigate the risk of insider threats. Correlate user activity, data interaction, and user risk in unified explorations and visualized as timeline-based views. -
27
Dtex Systems
Dtex Systems
Take an interactive platform tour to learn how DTEX delivers human behavioral intelligence to enrich SOC workflows and response, augment NGAV with people-centric DLP and forensics, proactively mitigate insider threats and identify operational inefficiencies. Our approach is based on learning from employee behavior, not spying on them. We capture and synthesize hundreds of unique behaviors and automatically zero in on the ones that expose your organization to the greatest risk and inhibit operational excellence. Only DTEX delivers what other solutions promise. DTEX InTERCEPT is a first-of-its-kind Workforce Cyber Security solution that replaces first-generation Insider Threat Management, User Behavior Activity Monitoring, Digital Forensics, Endpoint DLP and Employee Monitoring tools with a lightweight, cloud-native platform that scales to thousands of endpoints and servers in hours with zero impact on user productivity and endpoint performance. -
28
DoControl
DoControl
DoControl enables fine-grained policies to control how employees, external users, and admins access, share and manipulate data stored in SaaS apps. The complexity of SaaS apps, users, and admins results in a ton of user interactions and a dynamic attack surface that are hard to follow. DoControl provides on-going visibility to data exposures across multiple SaaS apps. Different SaaS apps offer different security features, making it nearly impossible to enforce security policies consistently across the board. DoControl’s Data Access Controls redefine how threat prevention is done at scale. Protecting against unknown or unusual activity requires security teams to ingest logs from multiple apps, organize the metadata, detect anomalies, and take actions. DoControl automates all of it right out of the box. -
29
Curtain MonGuard
Coworkshop Solutions
Curtain MonGuard Screen Watermark is an enterprise solution that displays watermarks on users' screens, showing information like PC name, and username. It captures user attention and serves as a reminder before taking screenshots to share sensitive information. Key features: - On-screen watermark - Full screen-watermark - Application screen-watermark - Supports over 500 Applications - Self-defined content of watermark - Screen-watermark by condition - Central administration - Integration with Active Directory - Uninstall password for client - Password management - Admin delegation - Self protection for the software Licensing: Curtain MonGuard is shareware. You can download and use the software for free on a trial basis or commercial use. If you want to display [username] and [IP address] in screen watermark and some advanced features, you need to activate the software to paid version.Starting Price: Free with limited functions -
30
Cogility Cogynt
Cogility Software
Deliver Continuous Intelligence solutions easier, faster, and cost-effectively - with less engineering effort. The Cogility Cogynt platform delivers cloud-scalable event stream processing software powered by advanced, Expert AI-based analytics. A complete, integrated toolset enables organizations to quickly, easily, and more efficiently deliver continuous intelligence solutions. The end-to-end platform streamlines deployment, constructing model logic, customizing data source intake, processing data streams, examining, visualizing and sharing intelligence findings, auditing and improving results, and integrating with other applications. Cogynt’s Authoring Tool provides a convenient, zero-code design environment for creating, updating, and deploying data models. Cogynt’s Data Management Tool makes it easy to publish your model to immediately apply to stream data processing while abstracting Flink job coding. -
31
Certent DisclosureNet
insightsoftware
Search millions of public filings in seconds with Certent DisclosureNet, a cloud-based disclosure research, and peer analytics solution. Certent DisclosureNet features the combination of internal and external report creation with a built-in proprietary research engine. With Certent DisclosureNet, users can manage data throughout the disclosure process. Certent DisclosureNet also features XBRL tagging, software training, implementation, and validation report. -
32
Oracle Hyperion
Oracle
Oracle Hyperion Financial Management is a comprehensive, Web-based application that delivers global financial consolidation, reporting and analysis in a single, highly scalable software solution. Oracle Hyperion Financial Management utilizes today's most advanced technology, yet is built to be owned and maintained by the enterprise's finance team. The web user interface for this release has been enhanced for greater ease of use and consistency with other Hyperion products. The new user interface supports navigation across multiple applications as well as access to multiple modules and documents in an application. Other enhancements include the Point of View bar, Member Selector, Journals, Data Forms and Data Grids. You can also view dimension member properties from the Member Selector, data forms, data grids, journals, or Process Management. -
33
DataTracks
DataTracks
DataTracks can help you meet your reporting requirements in time, every time. We offer software solutions to help you prepare your compliance reports. Your report can be ready as soon as your books are ready. Numbers flow automatically from books to designated spots in reports. Your team has to review the numbers and write the narratives alone. All you need to do is review, not prepare. Minds on and hands-off preparation of compliance reports, not to mention the low cost. You can sleep well. Your reports would be consistent with your books. Even when your reports include a million pieces of data (as can be true if you are a country wide bank reporting to the Fed in multiple jurisdictions). Set up a data model, map from sources in your enterprise. Data will be fed automatically into data model when your source is ready. Data can be defined in report as in data model or as computed from sources in data model. -
34
CCH Tagetik
Wolters Kluwer
Companies trust CCH Tagetik Corporate Performance Management software to save time, lower costs and reduce risk. Get a faster close, more forward looking-planning and in-depth analytics by connecting data, processes and people with a single trusted source. CCH Tagetik Finance Transformation Platform, powered by the Analytic Information Hub, is the unified platform that connects finance and operations and streamlines your consolidation & close, planning, reporting & analytics, disclosures and compliance. -
35
Ethico
Ethico
Unify your case management and issue intake for an easy streamlined solution. Close cases faster with better intake info and resilient software. Signing on the dotted line with Ethico is not the end of the conversation with us. Unlike others, we want to stay with you and ensure our corporate compliance solutions are working for you. Our teams will work with you, answering questions quickly and giving results. Ethico seeks long-term relationships with our clients. Feedback is encouraged. We help protect your patients and organization by monitoring your healthcare populations for compliance and licensure risks before they become a problem. Both Licensure Monitoring and Healthcare Exclusion Screening for employees, contractors, providers, referring physicians and vendors. A full solution with options for DIY and full-service. -
36
OneTrust Ethics and Compliance Cloud
OneTrust
Strengthen your ability to monitor, create, and maintain a culture of trust where your team can thrive. The most resilient organizations nurture an ethical values-based culture – where everyone feels empowered to speak up, share their perspectives, ask challenging questions, and raise concerns that conflict with the values of the organization without fear of retaliation. The OneTrust Ethics and Compliance Cloud fosters and promotes an open and safe environment for employees, maximizing insights into the health of a company’s culture, so leaders can act decisively upon areas of risk. Strengthen your ethics and compliance program with a cloud-based, coordinated platform specifically designed to elevate trust and drive ethics to the center of your business. Proactively tackle emerging risks by providing a best-in-class global helpline with multiple intake channels, integrated case management, and built-in whistleblower protection. -
37
Certent Disclosure Management
insightsoftware
Certent offers a software that streamlines the financial reporting process of any kind of company. The web-based platform fully automates the reporting process in such a way to improve report accuracy, be compliant with the standards set by any regulatory organization, and be more efficient with each reporting cycle. Certent allows for direct connection with the Microsoft Office Suite and many other existing data sources for ease of integration and data sorting. Simplify access to disclosure research including legal, accounting, investor relations, and business development. Get unfettered access to a comprehensive suite of accounting standards, rules, and regulations that are full-text searchable. Filter searches of EDGAR, SEDAR, ASX, and HMRC using more than 50 built-in criteria, including industry, exchange, the company auditor, and filing date, and receive automatic email notifications as soon as filings are published. -
38
DERMALOG Biometric Software
DERMALOG Identification Systems
The world's fastest and most accurate software. DERMALOG high-speed identification software provides a crucial contribution to prevent identity fraud. It is continuously improved to guarantee reliable products. The software traces identities and duplicates of biometric documents such as national IDs, ePassports, for instance in border control, voters and refugee registration. DERMALOG offers scalable and customizable software that allows performing a wide variety of tasks for processing, editing, searching, retrieving and storing biometric templates and subject records. In addition to the DERMALOG fingerprint technology the German innovation leader presents multi-modal biometric systems which can combine fingerprint identification with an iris or face modality. DERMALOG provides the world's fastest Fingerprint matching. DERMALOG Face Identification provides highest accuracy and speed. DERMALOG Palm Identification for effective crime solving. -
39
SmartStamp.io
ARIADNEXT
Document fraud has become the third largest criminal industry in the world. Whether it is to take advantage of an unauthorized good or service, to flee legal proceedings, or to usurp identities, the motivations of fraudsters are multiple. Fraud involves not only identity documents, but also many other documents, which we call “supporting documents”: invoices, pay slips, bank details, contracts, etc. A significant number of these documents have no integrity measures, so it is easy for some fraudsters, using sophisticated techniques, to modify them without being visible to the naked eye. SmartStamp.io is our solution for document securing. It allows you to generate and affix a 2D-Doc Visible Digital Seal (VDS) in a few seconds, in the form of a 2-dimensional barcode on any document. This VDS then contains the essential information of the document in clear text as well as the hash signed by the issuer, and ensures that the delivered document is authentic and has not been falsified. -
40
Nagix
Consist
Many countries today require organizations and businesses to provide their customers with UA-compliant accessible documents. NAGIX is Consist's advanced accessible document system solutions that automatically and efficiently transform large volumes of documents into fully accessible PDFs, in compliance with the strictest regulations which apply to the rights of people with visual disabilities. Such documents can be customer forms, financial reports of publicly-traded companies, government and municipalities' public protocols, and others. NAGIX's proven technology is used by leading banks and other organizations. Consist is a global software solution group that has been operating since 1972, and has vast knowledge and experience in implementing advanced system solutions. NAGIX utilizes a revolutionary and robust automatic accessibility technology, which enables a visually-impaired customer to produce for himself or herself, an accessible version of any document, instantly. -
41
Veeva Vault QualityDocs
Veeva Systems
Providing automated workflows and comprehensive audit trails, Vault QualityDocs reduces compliance risk and improves quality processes. It accelerates review and approval processes and facilitates the sharing of SOPs and other GxP documents among employees and partners. Automated workflows and visibility into the content status and processes enable effective SOP management, reducing compliance risk. Intuitive, easy-to-use user interface drives adoption and efficiency. Detailed audit trails, content organization, and powerful search facilitate better audits and inspections. Securely access and use documents from any major web browser, or if enabled, print, distribute, and track controlled PDF copies. Predefined document taxonomy, metadata, and pick lists for quality, manufacturing, and validation documents facilitate operational harmonization and allow organizations to quickly adopt best practices. -
42
DocuSoft
DocuSoft
Docusoft works with financial services professionals to develop software and create an innovative solution; document management, cloud file storage, client data management, workflow processes, data protection, file sharing, and document delivery, and electronic signatures are among the issues we address. Together, we develop the best software solutions for accountants, insolvency practitioners, financial and business advisers, and other professional services businesses across the world. Every business communication or transaction results in the creation of files or documents. Docusoft CloudFiler gives you the best cloud document management solution to manage your business communications and records. With tools to index and file, create, automate and process, users can easily search and retrieve their business documents, use OCR search features and review documents, all from any web browser! -
43
ProofEasy
ProofEasy
The ideal tamper-proof documents solution for organizations of all sizes - great for legal, real estate, financial, and bank-related contractual documents. ProofEasy provides a safe and secure interface to send and receive documents in a secure manner without requiring enterprise-level software. Use ProofEasy and stop document fraud. Real-time QR code scanning leads to a highly trusted reference point for verification. To verify, just scan the QR code using any scanner like Google lens. The original uploaded document will be displayed. You can validate your copy against the original document. We bring secured verifiable transparency to your electronic and scanned documents, be it certificates, legal & financial collateral, reports, or any other sensitive document and prevent them from any form of tampering. We help you in taking out the burden of the need of a 3rd party verification by creating a reference point for verification on the immutable blockchain-based document verification.Starting Price: $19 per month -
44
HelpRange
HelpRange
Protect your documents and use PDF tracking to find out who, when and how is viewing your PDFs. Use HelpRange for lead generation so that your documents would work as lead magnets for you. HelpRange helps sales, analysts, content creators, and marketing teams to be more secure and efficient. Ask users about their email before they view your document (lead magnets). Track for how long and what pages were read. Let only one user to view your PDF at the same time. Use end-to-end encryption to secure your PDF.Starting Price: $25 per month -
45
Doc.It by IRIS
Doc.It Inc.
Document Management, Workflow, PDF Editing and Web Portal solutions for accounting firms to improve productivity and efficiency. Accounting and tax firms using Doc.It Suite software stay organized by streamlining and automating digital processes that drive efficiency, workflows and profitability while minimizing risk associated with dealing with the exchange and storage of financial documents. Doc.It was founded in 2001, is headquartered in Toronto, Canada and currently has 600 accounting firms and 16,000 users. There are three product options depending on your firms needs. 1. Doc.It Suite includes all functions of the software- Scan and Organize, document management, workflow, web portal, PDF Editor and all integrations. 2.. Doc.It Connect is focused around the web portal functionalities with the work binders for document storage. 3. Doc.It Explore is the starting point for document storage. and includes the PDF editorStarting Price: $29.00/month/user -
46
SigniFlow
SigniFlow
If you’re finding that the outdated pen to paper methods of signing documents and contracts are not meeting the modern demands of your business and its customers, then it’s time to go digital. Using our digital signature security, every document signed with SigniFlow has the necessary embedments to enhance non-repudiation. Deploy SigniFlow on-premise, in your own data center, or take advantage of our compliant, secure datacentre offerings, localized across regions And because electronic signatures are simply not good enough, SigniFlow applies the latest cryptographic digital signature standards to securely sign PDF documents. Join the millions worldwide that are switching from electronic, to digital signatures.Starting Price: $8.00/month/user -
47
FileString
FileString
FileString is an easy to use cloud-based service that attaches a digital string to the important files you share, so you can track and control how your recipients view, download and print your content. An easy to use file sharing service that protects important files you share. When files are shared or distributed with FileString, only authorized recipients can view, forward, and print files. Track every view by every recipient, including the duration of the view, and receive email notifications when files are viewed, and if authorized, when printed or downloaded. View your library by person, showing files you’ve sent to each person and files they’ve sent you. Revoke access to all files sent to a person at the click of a button. Protect your files by controlling each individual recipient’s ability to view, forward, print, and download. Add a watermark for further protection. Revoke an individual recipients’ access to files, remotely deleting distributed copies.Starting Price: $2 per month -
48
Synergis Adept
Synergis Software
Adept Software gives you fast, centralized access to your most important documents in a secure, collaborative environment that saves your business time, reduces risk, and lowers operating costs. Align your company on a common platform—a single source of truth that delivers a unified view of engineering and business content. Empower stakeholders located anywhere to quickly find the right document—regardless of where it’s stored—and improve productivity by 20 to 30%. Avoid expensive mistakes and safety issues by ensuring your workforce always finds the correct version. Improve efficiency and eliminate bottlenecks by ensuring documents automatically follow predefined approval processes. Notifications and time-based alerts keep everything on track. Design reviews and multi-site collaboration are easy with everyone on one platform. Vaults can be replicated so documents are available to everyone locally, and Adept keeps everything in sync.Starting Price: $19 per user per month -
49
FutureVault
FutureVault
FutureVault is an industry-leader in secure document exchange and Digital Vault solutions for financial services and wealth management organizations, changing the paradigm of document and information management with the Personal Life Management Vault™ and Business Life Management Vault™. FutureVault’s multi-tiered platform is transforming enterprise, advisor, and client value propositions by significantly improving the way documents, data, and information are managed within a secure, audit-ready, single source of truth. By powering firms with FutureVault’s white-labeled platform and mobile applications help firms meet books and records compliance, improve data privacy, drive front and back-office efficiency with automation and open APIs, and deliver an enhanced digital client experience to better engage with households and the next generation. Data extraction and AI-driven patterns to gain additional efficiency and insight are available for enterprise customers. -
50
RegDoc eSafe
MedPoint Digital
An eReg platform built with the study site in mind. Fast implementation, no forced workflow, intuitive design and function. Try RegDoc eSafe free today! A secure lock-box for source documents, with tools that make it easy to transfer, redact and assign role-based, time-limited remote access to these sensitive documents. RegDoc eSafe is designed for fast, flexible configuration, intuitive use with minimal training, and a thorough but streamlined validation process. Streamlined implementation process to get your clinical study sites up and running quickly. Regulatory binder templates pre-loaded into your site for easy access. User upload and access control configuration. Admin and user training sessions. MedPoint is committed to compliance and walks you through the necessary steps to validate our software. MedPoint is regularly audited by study sponsors and has long experience developing and supporting validated systems.