Ratings and Reviews 0 Ratings
Ratings and Reviews 0 Ratings
Alternatives to Consider
-
ManageEngine ADManager PlusADManager Plus is a user-friendly management and reporting solution for Windows Active Directory (AD) that assists both AD administrators and help desk staff in their everyday operations. Featuring a centralized and intuitive web-based interface, this software simplifies complex operations like bulk user account management and the delegation of role-based access to help desk agents. Additionally, it produces an extensive array of AD reports that are crucial for meeting compliance audit requirements. The tool also offers mobile applications, allowing AD professionals to manage user tasks conveniently from their mobile devices while on the move. This flexibility ensures that administrators can maintain productivity and oversight, regardless of their location.
-
StrongDMThe landscape of access and access management has evolved into a more intricate and often frustrating challenge. strongDM reimagines access by focusing on the individuals who require it, resulting in a solution that is not only user-friendly but also maintains rigorous security and compliance standards. This innovative approach is referred to as People-First Access. Users benefit from quick, straightforward, and traceable access to essential resources, while administrators enjoy enhanced control that reduces the risk of unauthorized and excessive permissions. Additionally, teams in IT, Security, DevOps, and Compliance can effortlessly track activities with detailed audit logs answering critical questions about actions taken, locations, and timings. The system integrates seamlessly and securely across various environments and protocols, complemented by reliable 24/7 customer support to ensure optimal functionality. This comprehensive approach guarantees both efficiency and security in managing access.
-
CarbideCarbide is a tech-enabled solution that helps organizations elevate their information security and privacy management programs. Designed for teams pursuing a mature security posture, Carbide is especially valuable for companies with strict compliance obligations and a need for hands-on expert support. With features like continuous cloud monitoring and access to Carbide Academy’s educational resources, our platform empowers teams to stay secure and informed. Carbide also supports 100+ technical integrations to streamline evidence collection and satisfy security framework controls, making audit readiness faster and more efficient.
-
Interfacing Integrated Management System (IMS)Interfacing’s IMS is an AI-enabled platform that combines business process modeling, quality management, controlled documentation, and governance/risk capabilities in a single hub. Organizations rely on IMS to document and automate workflows, maintain versioned records, manage risk programs, and keep compliance activities aligned with regulatory requirements through full lifecycle traceability. Developed for industries where accountability and oversight are essential, including aerospace, pharma/biotech, finance, and government, IMS delivers operational insight, workflow automation, and intelligent recommendations that help reduce risk and improve quality outcomes. The platform holds ISO 27001 certification and includes 21 CFR Part 11 validation, supporting secure use in high-compliance environments. Additional capabilities include low-code app creation, AI-based process mining, audit management, CAPA and training modules, and performance dashboards. AI improves governance accuracy, strengthens compliance posture, and supports ongoing improvement.
-
SafeticaSafetica Intelligent Data Security ensures the protection of sensitive enterprise information no matter where your team operates. This international software organization specializes in providing solutions for Data Loss Prevention and Insider Risk Management to various businesses. ✔️ Identify what needs safeguarding: Effectively detect personally identifiable information, intellectual property, financial details, and more, no matter where they are accessed within the organization, cloud, or on endpoint devices. ✔️ Mitigate risks: Recognize and respond to dangerous behaviors by automatically detecting unusual file access, email interactions, and online activities, receiving alerts that help in proactively managing threats and avoiding data breaches. ✔️ Protect your information: Prevent unauthorized access to sensitive personal data, proprietary information, and intellectual assets. ✔️ Enhance productivity: Support teams with live data management hints that assist them while accessing and sharing confidential information. Additionally, implementing such robust security measures can foster a culture of accountability and awareness among employees regarding data protection.
-
csideEffectively tracking third-party scripts removes ambiguity, guaranteeing that you remain informed about what is sent to your users' browsers, while also boosting script efficiency by as much as 30%. The uncontrolled existence of these scripts within users' browsers can lead to major complications when issues arise, resulting in negative publicity, possible legal repercussions, and claims for damages due to security violations. Organizations that manage cardholder information must adhere to PCI DSS 4.0 requirements, specifically sections 6.4.3 and 11.6.1, which mandate the implementation of tamper-detection mechanisms by March 31, 2025, to avert attacks by alerting relevant parties of unauthorized changes to HTTP headers and payment details. c/side is distinguished as the only fully autonomous detection system focused on assessing third-party scripts, moving past a mere reliance on threat intelligence feeds or easily circumvented detection methods. Utilizing historical data and advanced artificial intelligence, c/side thoroughly evaluates the payloads and behaviors of scripts, taking a proactive approach to counter new threats. Our ongoing surveillance of numerous websites enables us to remain ahead of emerging attack methods, as we analyze all scripts to improve and strengthen our detection systems continually. This all-encompassing strategy not only protects your digital landscape but also cultivates increased assurance in the security of third-party integrations, fostering a safer online experience for users. Ultimately, embracing such robust monitoring practices can significantly enhance both the performance and security of web applications.
-
UniqkeyUniqkey stands out as Europe's foremost password and access management solution, streamlining security for employees while granting organizations superior oversight of their cloud systems, access protocols, and workforce administration. By addressing major threats to corporate infrastructure, Uniqkey protects essential systems and organizational credentials through cutting-edge encryption techniques. Additionally, it provides exclusive insights and a holistic overview of IT frameworks, employee access, and security metrics, proving invaluable for IT departments to effectively monitor security strategies and evaluate the success of educational initiatives with assurance. Thanks to robust integrations with existing platforms like Microsoft, IT administrators can efficiently manage user provisioning and de-provisioning, facilitating smooth onboarding and offboarding while ensuring comprehensive protection of their IT ecosystems through sophisticated encryption measures. Developed by top-tier security professionals in Europe, we utilize the latest encryption technologies, including the offline encryption of all data. Our advanced technology stack and servers, located in Denmark, guarantee optimal security, data reliability, and adherence to European standards, ultimately providing our clients with a sense of security and trust in our services. Furthermore, Uniqkey’s commitment to continual improvement ensures that we stay ahead in the evolving landscape of cybersecurity threats.
-
SkillcastSkillcast delivers compliance training and RegTech through a unified Compliance Portal that brings e-learning, Policy Hub (versioning & attestations), staff declarations, compliance registers, CPD/Training 360 and Events Management in one place. Use Skillcast as your LMS or deliver content into your LMS via Remote SCORM/xAPI. Aida, the built-in AI assistant, answers policy-aware questions. Integrates with HR/LXP platforms and supports SCIM. Security: Azure hosting; ISO 27001, Cyber Essentials/Plus and SOC 2. Standards: SCORM 1.2/2004, xAPI. Library: 400+ courses spanning anti-money laundering, financial crime, GDPR/data protection, health & safety, cybersecurity, anti-bribery, sanctions and equality. Prebuilt registers cover Gifts & Hospitality, Whistleblowing, Data Breach and RIDDOR, with configurable workflows and approvals. Industries: financial services, manufacturing, hospitality and retail. Free trial available. Multilingual, accessible delivery.
-
Captain ComplianceCaptain Compliance is a comprehensive privacy management solution designed to facilitate adherence to international data protection laws and emerging AI regulatory standards. Featuring a Consent Management Platform, it allows organizations to efficiently handle user consent and design personalized cookie consent banners tailored to their needs. Additionally, the platform includes an advanced Cookie Scanner that identifies and classifies all cookies present on your website, thereby guaranteeing compliance with a fluid regulatory framework. The DSAR Portal simplifies the process of handling requests from data subjects, while the AI Compliance Tool provides ongoing monitoring and adaptation to changing regulations. For those requiring expert guidance on data privacy matters, we also offer the option of a virtual Data Protection Officer or Chief Privacy Officer. Our Hosted Privacy Policy Generator ensures that your privacy policies are automatically updated in real-time, aligning them with the latest legal requirements. With Captain Compliance, you gain access to a suite of tools designed to help you maintain regulatory compliance, safeguard user data, and do so at a cost-effective rate. Ultimately, this platform empowers businesses to navigate the complexities of data privacy with confidence and ease.
-
Source DefenseSource Defense plays a crucial role in safeguarding web safety by securing data precisely at the point of entry. Its platform delivers a straightforward yet powerful approach to ensuring data security and meeting privacy compliance requirements. This solution effectively tackles the threats and risks associated with the growing reliance on JavaScript, third-party vendors, and open-source code within your online assets. By providing various options for code security, it also fills a significant gap in managing the risks of third-party digital supply chains, which includes regulating the actions of third-party, fourth-party, and beyond JavaScript that enhance your website's functionality. Furthermore, Source Defense Platform defends against a wide range of client-side security threats, such as keylogging, formjacking, and digital skimming, while also offering protection against Magecart attacks by extending security measures from the browser to the server environment. In doing so, it ensures a comprehensive security framework that adapts to the complexities of modern web interactions.
What is Torsion?
Torsion provides exceptional clarity and oversight regarding access permissions within Microsoft 365. It enables data owners to effectively manage their own information, leveraging their in-depth knowledge of the data. With comprehensive visibility and continuous audit trails, Torsion meets compliance demands with ease. Additionally, its smart automation swiftly rectifies any unauthorized permissions across extensive datasets, operating seamlessly and autonomously in real-time. This results in a more secure and organized data environment for all users.
What is AppConsent?
Utilize the same advantageous features that the premium version, preferred by reputable organizations, offers. In exchange for the free CMP, we collect organic data with explicit permission from internet users. This data is meticulously tagged and forwarded to marketing agencies, advertisers, and brand companies. Unlike numerous other organizations, we do not store the data; it seamlessly passes through our XChange platform. You will always have the ability to monitor the trajectory of your data, including when it has been sent and to whom. The robustness of our blockchain technology allows us to explain the rationale behind our data transfers, which include User Authorization, Current Contract, and compliance with the Privacy Shield. We also gather a limited amount of data to help us manage the ecosystem and safeguard both ourselves and our partners against data misuse, such as ignoring user preferences or processing intents. Furthermore, you will benefit from continuous support via email and Slack both during and after the integration phase. Our dedication to transparency guarantees that users are kept informed and empowered throughout their entire data experience, ensuring a secure and trustworthy process.
Integrations Supported
Microsoft 365
Microsoft OneDrive
Microsoft SharePoint
Microsoft Teams
Integrations Supported
Microsoft 365
Microsoft OneDrive
Microsoft SharePoint
Microsoft Teams
API Availability
Has API
API Availability
Has API
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Pricing Information
€250 per month
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
Torsion
Date Founded
2017
Company Location
United Kingdom
Company Website
www.torsionis.com
Company Facts
Organization Name
SFBX
Date Founded
2017
Company Location
France
Company Website
appconsent.io/en
Categories and Features
Customer Identity and Access Management (CIAM)
Access Certification
Access Management
Analytics / Reporting
Automatic User/Device Recognition
Behavioral Analytics
Credential Management
Data Security
Multi-Factor Authentication (MFA)
Privacy / Consent Management
Real Time Notifications
Self-Service Portal
Single Sign On
User Provisioning
Data Governance
Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management
Document Management
Access Controls
Archiving & Retention
Collaboration Tools
Compliance Tracking
Document Archiving
Document Assembly
Document Capture
Document Conversion
Document Delivery
Document Indexing
Document Retention
Electronic Signature
Email Management
File Recovery
File Type Conversion
Forms Management
Full Text Search
Offline Access
Optical Character Recognition
Print Management
Version Control
GDPR Compliance
Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
Privileged Access Management
Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring
Risk Management
Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment
Categories and Features
GDPR Compliance
Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification