What is Torsion?

Torsion provides exceptional clarity and oversight regarding access permissions within Microsoft 365. It enables data owners to effectively manage their own information, leveraging their in-depth knowledge of the data. With comprehensive visibility and continuous audit trails, Torsion meets compliance demands with ease. Additionally, its smart automation swiftly rectifies any unauthorized permissions across extensive datasets, operating seamlessly and autonomously in real-time. This results in a more secure and organized data environment for all users.

Pricing

Free Trial Offered?:
Yes

Integrations

Offers API?:
Yes, Torsion provides an API

Screenshots and Video

Torsion Screenshot 1

Company Facts

Company Name:
Torsion
Date Founded:
2017
Company Location:
United Kingdom
Company Website:
www.torsionis.com
Edit This Page

Product Details

Deployment
SaaS
Training Options
Documentation Hub
Online Training
Webinars
On-Site Training
Video Library
Support
24 Hour Support
Web-Based Support

Product Details

Target Company Sizes
Individual
1-10
11-50
51-200
201-500
501-1000
1001-5000
5001-10000
10001+
Target Organization Types
Mid Size Business
Small Business
Enterprise
Freelance
Nonprofit
Government
Startup
Supported Languages
English

Torsion Categories and Features

Risk Management Software

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

Privileged Access Management Software

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

GDPR Compliance Software

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Document Management Software

Access Controls
Archiving & Retention
Collaboration Tools
Compliance Tracking
Document Archiving
Document Assembly
Document Capture
Document Conversion
Document Delivery
Document Indexing
Document Retention
Electronic Signature
Email Management
File Recovery
File Type Conversion
Forms Management
Full Text Search
Offline Access
Optical Character Recognition
Print Management
Version Control

Data Governance Software

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Customer Identity and Access Management (CIAM) Software

Access Certification
Access Management
Analytics / Reporting
Automatic User/Device Recognition
Behavioral Analytics
Credential Management
Data Security
Multi-Factor Authentication (MFA)
Privacy / Consent Management
Real Time Notifications
Self-Service Portal
Single Sign On
User Provisioning