Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Satori Reviews & Ratings
    86 Ratings
    Company Website
  • ManageEngine ADManager Plus Reviews & Ratings
    489 Ratings
    Company Website
  • Netwrix Auditor Reviews & Ratings
    296 Ratings
    Company Website
  • StandardFusion Reviews & Ratings
    88 Ratings
    Company Website
  • StrongDM Reviews & Ratings
    85 Ratings
    Company Website
  • Hyperproof Reviews & Ratings
    228 Ratings
    Company Website
  • Interfacing Enterprise Process Center (EPC) Reviews & Ratings
    55 Ratings
    Company Website
  • Veriam Reviews & Ratings
    3 Ratings
    Company Website
  • Safetica Reviews & Ratings
    356 Ratings
    Company Website
  • Source Defense Reviews & Ratings
    7 Ratings
    Company Website

What is Torsion?

Torsion provides exceptional clarity and oversight regarding access permissions within Microsoft 365. It enables data owners to effectively manage their own information, leveraging their in-depth knowledge of the data. With comprehensive visibility and continuous audit trails, Torsion meets compliance demands with ease. Additionally, its smart automation swiftly rectifies any unauthorized permissions across extensive datasets, operating seamlessly and autonomously in real-time. This results in a more secure and organized data environment for all users.

What is MinerEye DataTracker?

MinerEye's DataTracker empowers organizations to tackle the challenges associated with information governance and protection. By automatically scanning, indexing, and analyzing all unstructured and dark data within their data repositories, it streamlines the management process. Utilizing proprietary Interpretive AI™, computer vision, and machine learning technologies, the solution efficiently identifies pertinent files hidden among billions of stored data entries. In the event of conflicts, duplicates, or potential violations, it autonomously issues alerts along with actionable recommendations for the next best steps. This innovative approach not only significantly strengthens data protection but also leads to a reduction in operational costs, making it a vital tool for modern organizations. Additionally, the comprehensive nature of the DataTracker ensures that businesses can maintain better oversight of their data assets.

Media

Media

Integrations Supported

Microsoft 365
Microsoft OneDrive
Microsoft SharePoint
Microsoft Teams
Amazon S3
Amazon Web Services (AWS)
Gmail
Google Drive
Microsoft Azure
Microsoft Exchange
Nutanix AHV
Salesforce
Seclore EDRM
VMware ESXi

Integrations Supported

Microsoft 365
Microsoft OneDrive
Microsoft SharePoint
Microsoft Teams
Amazon S3
Amazon Web Services (AWS)
Gmail
Google Drive
Microsoft Azure
Microsoft Exchange
Nutanix AHV
Salesforce
Seclore EDRM
VMware ESXi

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

$2000/1TB/month
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Torsion

Date Founded

2017

Company Location

United Kingdom

Company Website

www.torsionis.com

Company Facts

Organization Name

MinerEye

Date Founded

2014

Company Location

Israel

Company Website

minereye.com

Categories and Features

Customer Identity and Access Management (CIAM)

Access Certification
Access Management
Analytics / Reporting
Automatic User/Device Recognition
Behavioral Analytics
Credential Management
Data Security
Multi-Factor Authentication (MFA)
Privacy / Consent Management
Real Time Notifications
Self-Service Portal
Single Sign On
User Provisioning

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Document Management

Access Controls
Archiving & Retention
Collaboration Tools
Compliance Tracking
Document Archiving
Document Assembly
Document Capture
Document Conversion
Document Delivery
Document Indexing
Document Retention
Electronic Signature
Email Management
File Recovery
File Type Conversion
Forms Management
Full Text Search
Offline Access
Optical Character Recognition
Print Management
Version Control

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Risk Management

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

Categories and Features

Data Discovery

Contextual Search
Data Classification
Data Matching
False Positives Reduction
Self Service Data Preparation
Sensitive Data Identification
Visual Analytics

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Data Management

Customer Data
Data Analysis
Data Capture
Data Integration
Data Migration
Data Quality Control
Data Security
Information Governance
Master Data Management
Match & Merge

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

eDiscovery

Case Analytics
Compliance Management
Discussion Threads
Document Indexing
Document Tracking
Full Text Extraction
Keyword Search
Metadata Extraction
Topic Clustering

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

PCI Compliance

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management

Popular Alternatives

Popular Alternatives

Data Identification Manager™ Reviews & Ratings

Data Identification Manager™

Data443 Risk Mitigation, Inc.