Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Proton VPN Reviews & Ratings
    41,009 Ratings
    Company Website
  • Air Reviews & Ratings
    802 Ratings
    Company Website
  • BrewPOS Reviews & Ratings
    8 Ratings
    Company Website
  • ONLYOFFICE Docs Reviews & Ratings
    708 Ratings
    Company Website
  • Unimus Reviews & Ratings
    31 Ratings
    Company Website
  • ManageEngine Log360 Reviews & Ratings
    141 Ratings
    Company Website
  • Bitdefender Ultimate Small Business Security Reviews & Ratings
    3 Ratings
    Company Website
  • GW Apps Reviews & Ratings
    37 Ratings
    Company Website
  • ManageEngine EventLog Analyzer Reviews & Ratings
    190 Ratings
    Company Website
  • ManageEngine ADAudit Plus Reviews & Ratings
    485 Ratings
    Company Website

What is NTFS Permissions Reporter?

Acquire our intuitive NTFS permissions analysis tool for seamless evaluation and documentation of NTFS security! Create comprehensive reports that showcase NTFS permissions in a structured Excel spreadsheet or an HTML format. Provide essential NTFS permissions insights directly to the data owner for better management. Retrieve user-specific effective NTFS permissions for any folder or share, including its complete hierarchy. With the Company Edition or Enterprise Edition, you have the option to save any Permissions Report in a built-in local database or an external Microsoft SQL Server, enabling you to revisit historical data and monitor changes over time. Ensure your NTFS Permissions Report remains clear by excluding any Active Directory security groups from your analysis. There’s no need to include names of recognized accounts, such as backup operators or share operators, which streamlines the report. Furthermore, if unique Access Control Entries (ACEs) are present on folders, you can translate these security settings into user-friendly labels for improved understanding. This approach guarantees that your reports are both precise and easy to grasp, enhancing the overall usability of the information provided. By simplifying the complexities of NTFS permissions, you empower users to make informed decisions about their data security.

What is Entitle?

Entitle employs a security-driven approach to provisioning and governance, ensuring that it also facilitates business operations across all sectors, including research and development, sales, human resources, and finance. It enhances the provisioning workflow to support security measures that evolve in response to changing infrastructure and diverse employee requirements. Permissions can be allocated to specific resources like Google Drive folders, database tables, Git repositories, and more, enabling effective oversight. Sensitive resources and positions are protected by granting access only when required and retracting it when no longer necessary. This strategy allows colleagues, managers, and resource owners to approve access requests, which helps ensure the reliability of permissions granted. With the incorporation of automated access requests and a zero-touch provisioning model, teams in DevOps, IT, and other areas can greatly boost their efficiency and manage resources more effectively. Users can easily request access through communication platforms such as Slack, Teams, Jira, or email, creating a seamless approval process. Furthermore, the ability to quickly assign bulk permissions aids in expediting onboarding and offboarding tasks, allowing the organization to respond adeptly to its evolving needs. This holistic approach not only protects sensitive data but also cultivates a collaborative atmosphere that empowers teams to excel, ultimately driving overall business success.

Media

Media

Integrations Supported

Amazon EKS
Azure DevOps
Box
Cisco Duo
Cloudflare
Google Cloud BigQuery
Google Drive
Google Kubernetes Engine (GKE)
HashiCorp Boundary
HubSpot CRM
HubSpot Customer Platform
Intercom
Jira
LDAP Admin Tool
NetSuite
Okta
PostgreSQL
Teleport
Twingate
Zendesk

Integrations Supported

Amazon EKS
Azure DevOps
Box
Cisco Duo
Cloudflare
Google Cloud BigQuery
Google Drive
Google Kubernetes Engine (GKE)
HashiCorp Boundary
HubSpot CRM
HubSpot Customer Platform
Intercom
Jira
LDAP Admin Tool
NetSuite
Okta
PostgreSQL
Teleport
Twingate
Zendesk

API Availability

Has API

API Availability

Has API

Pricing Information

€997 per year
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

G-TAC Software

Company Location

India

Company Website

www.foldersecurityviewer.com

Company Facts

Organization Name

BeyondTrust

Date Founded

1985

Company Location

United States

Company Website

www.entitle.io

Categories and Features

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Categories and Features

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Popular Alternatives

Popular Alternatives

DSRAZOR for Windows Reviews & Ratings

DSRAZOR for Windows

Visual Click Software
Quest ControlPoint Reviews & Ratings

Quest ControlPoint

Quest Software
UQube Reviews & Ratings

UQube

Upper Quadrant
Bravura Identity Reviews & Ratings

Bravura Identity

Bravura Security