What is Tricent?

Tricent stands out as the leading SaaS platform for file-sharing governance, designed to enhance secure and compliant file sharing across Microsoft 365 (including Teams, OneDrive, and SharePoint) and Google Workspace (covering MyDrive and Shared Drives), allowing teams to collaborate in a responsible manner.

This innovative solution empowers both administrators and all organizational members who share files with the tools they need to manage file-sharing effectively:

🚀 Quick Setup: Get started in under 30 minutes, enabling you to concentrate on your core priorities without delay.

🔍 Comprehensive Insights: From the very beginning, obtain a detailed overview of all shared files and the permissions associated with them, spanning both personal and shared drives.

⭕️ Efficient Bulk Remediation: Our user-friendly cleanup features help you manage file sprawl effectively, allowing for a streamlined approach to file management.

😇 Responsible Empowerment for Users: By incorporating automation, Tricent encourages employees to participate in the cleanup process while still collaborating, all while ensuring compliance is upheld.

💪🏼 Tailored Governance Policies: Configure different governance cycles for various user groups as Tricent adjusts to meet your specific requirements, striking a balance between flexibility and control.

🔮 Proactive Abnormality Detection: Stay one step ahead by identifying unusual activities, ensuring your file-sharing environment remains secure and compliant. As such, Tricent not only facilitates collaboration but also reinforces the importance of responsible file-sharing practices across your organization.

Pricing

Price Starts At:
€18/year/user
Price Overview:
Standard: €18/year/user
Education: €5/year/user
Enterprise: Quote - Contact Tricent
Free Trial Offered?:
Yes

Screenshots and Video

Company Facts

Company Name:
Tricent
Date Founded:
2018
Company Location:
Denmark
Company Website:
www.tricent.com
Edit This Page

Product Details

Deployment
SaaS
Training Options
Documentation Hub
Online Training
Webinars
Video Library
Support
Standard Support
Web-Based Support

Product Details

Target Company Sizes
51-200
201-500
501-1000
1001-5000
5001-10000
10001+
Target Organization Types
Mid Size Business
Small Business
Enterprise
Freelance
Nonprofit
Government
Startup
Supported Languages
Dutch
English
French
German
Italian
Spanish

Tricent Categories and Features

GRC Software

Auditing
Disaster Recovery
Environmental Compliance
IT Risk Management
Incident Management
Internal Controls Management
Operational Risk Management
Policy Management

GDPR Compliance Software

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

File Sharing Software

Audit Trail
Chat / Messaging
Collaboration
Document Management
Drag & Drop
Electronic Signature
Encryption
File Synchronization
Search
User Management
Version Control
Workflow Management

Document Control Software

Archiving & Retention
Automated Routing
Change Management
Compliance Management
Electronic Signature
Escalation Management
Periodic Review
Version Control

Data Governance Software

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Cybersecurity Software

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Compliance Software

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

Cloud Security Software

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management