Best Virtru Alternatives & Competitors for 2024

Discover Virtru alternatives and competitors worth considering. Is Virtru the right tool for your business? See how it compares with others below...

No items found.
HomeCategoriesVirtru
Links containing /go/ may help pay for GHS*

Found 0 products
highlight

Filter

Reset

Attributes

Capabilities

No items found.
#10
No-Trial
Free Trial
Transparent Pricing
No available pricing
No-Trial
Free Trial
Transparent Pricing
No available pricing
NeoCertified provides secure email encryption for businesses and individuals alike. With no sales minimums, no setup fees, and a fully-refundable product guarantee, NeoCertified is the simple, easy-to-use, ready-to-go solution that defies that of the standard in the encryption industry. With a product that encompasses all industries and verticals -- healthcare, finance, legal, education, non-profit -- you can be sure that all of your documents, sensitive information, and secure email messages are protected through the entire process... in transit and at rest. NeoCertified - Secure Email Encryption since 2002.
true
true
false
false
#10
No-Trial
Free Trial
Transparent Pricing
No available pricing
No-Trial
Free Trial
Transparent Pricing
No available pricing
LuxSci enables organizations to communicate securely at scale. LuxSci protects sensitive data with email and web solutions that are uniquely flexible and secure. Certified by HITRUST CSF to support customers with HIPAA compliance requirements. LuxSci’s secure email and web solutions include: • Secure High Volume Sending: Enables organizations to send massive volumes of encrypted transactional and marketing emails via API or SMTP. • Secure Connector: Encrypts outbound emails sent from Microsoft Office 365 and Google Workspace. • Secure Email Marketing: Create and send encrypted email marketing campaigns to engage customers while protecting sensitive data. • Secure Email Hosting: Reliable day-to-day business email designed to protect sensitive data. • Secure Web and Database Hosting: Fully managed web hosting services for web applications that must meet compliance standards. • Secure Forms: Collect and store sensitive information safely online. LuxSci’s secure solutions are scalable to meet the needs of companies of any size that work with sensitive data including medical records, financial data, and other confidential information.
false
true
false
false
#10
No-Trial
Free Trial
Transparent Pricing
No available pricing
No-Trial
Free Trial
Transparent Pricing
No available pricing
Avanan, a Check Point Company, catches the advanced attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration solutions such as Office 365™, G-Suite™, and Slack™. The platform deploys in one click via API to prevent Business Email Compromise and block phishing, malware, data leakage, account takeover, and shadow IT across the enterprise. Avanan replaces the need for multiple tools to secure the entire cloud collaboration suite.
true
true
false
false
#10
No-Trial
Free Trial
Transparent Pricing
No available pricing
No-Trial
Free Trial
Transparent Pricing
No available pricing
Keyfactor is the industry leader in cloud-first machine identity management. We enable companies of all sizes to seamlessly orchestrate every key and certificate, anywhere. Our flagship product, Keyfactor Command, allows our customers to discover, control, and automate the lifecycle of keys and digital certificates across their IT landscape. It's the only solution to combine fully-hosted PKI as-a-Service and certificate lifecycle automation into a single, cloud-delivered platform.
false
true
false
false
#10
No-Trial
Free Trial
Transparent Pricing
No available pricing
No-Trial
Free Trial
Transparent Pricing
No available pricing
Netwrix Auditor is a visibility platform for user behavior analysis and risk mitigation that enables control over changes, configurations and access in hybrid IT environments to protect data regardless of its location. The platform provides security intelligence to identify security holes, detect anomalies in user behavior and investigate threat patterns in time to prevent real damage. Netwrix Auditor includes applications for Active Directory, Azure AD, Exchange, Office 365, Windows file servers, EMC storage devices, NetApp filer appliances, SharePoint, Oracle Database, SQL Server, VMware, Windows Server and network devices. Empowered with a RESTful API and user activity video recording, the platform delivers visibility and control across all of your on-premises and cloud-based IT systems in a unified way.
true
true
false
false
#10
No-Trial
Free Trial
Transparent Pricing
No available pricing
No-Trial
Free Trial
Transparent Pricing
No available pricing
Datasparc offers data security, database management, data governance and data analytics - all in one solution. With Datasparc's flagship product DBHawk, users only receive access to the data they need. DBHawk provides secure access to on-premise and cloud databases. DBHawk supports a wide array of SQL and NoSQL databases, including AWS Athena, Amazon Redshift, Cassandra, Greenplum, MongoDB, MySQL, Oracle, Microsoft SQL Server, SAP Hana, and Teradata. DBHawk integrates with SAML, LDAP, SSO, and OKTA. Its comprehensive object access control policy, dynamic data masking and auditing features allow logging all database activities, making it ideal for organizations seeking to comply with data protection regulations such as GDPR and HIPAA. CIOReview has named Datasparc as one of its Top 20 Most Promising Enterprise Security Solutions Providers.
true
false
false
false
#10
No-Trial
Free Trial
Transparent Pricing
No available pricing
No-Trial
Free Trial
Transparent Pricing
No available pricing
Apigee Sense works in conjunction with the Apigee Edge API Management Platform to give API teams a powerful weapon to protect APIs from attacks
false
false
false
false
#10
No-Trial
Free Trial
Transparent Pricing
No available pricing
No-Trial
Free Trial
Transparent Pricing
No available pricing
ManagedMethods is a leading cloud application security platform for K-12 school districts, mid-market companies, and local governments. The platform provides award-winning cloud security that empowers organizations with full visibility and control of data stored in cloud applications, including Google G Suite, Microsoft Office 365, OneDrive, SharePoint, Box, Dropbox, Slack, and more. ManagedMethods makes cloud security easy — no proxy, no agent and no special training needed. It helps IT & security teams secure data against internal and external breaches by leveraging AI and machine learning-powered malware and phishing threat protection, account takeover detection, and data loss prevention. ManagedMethods is the industry’s only cloud application security solution that can be deployed in minutes with no special training, and zero impact on users or network speed. Visit our website to start your 30-day free trial for cloud security, visibility, and control like you've never experienced before!
true
false
false
false
#10
No-Trial
Free Trial
Transparent Pricing
No available pricing
No-Trial
Free Trial
Transparent Pricing
No available pricing
DatAdvantage uses machine learning and bi-directional cluster analysis to pinpoint users that have access to files they don’t need to do their job. It’s your single interface for managing permissions and security groups.
false
false
false
false
#10
No-Trial
Free Trial
Transparent Pricing
No available pricing
No-Trial
Free Trial
Transparent Pricing
No available pricing
SSL Certificate Lifecycle Management empowers enterprises of all sizes to Govern and orchestrate SSL/TLS certificates from simple and centralized place. Key Features are : - Centralized inventory to manage your SSL/TLS certificates - Issuance of SSL certificates from a simple and centralized portal - Pick your favorite CA Vendor to buy a SSL/TLS certificate with the best market price - Generate various metrics in terms of Charts - CA gateway that integrates with any PKI running on the premise or on the cloud - Discover your certificates across Network range, website, IP address or Endpoint devices - Auto-enrollment feature to push the certificate to these devices automatically - Generation of 14+ reports across various metrics and with a full certificate list across every metric - Discover and manage Certificate stores across various places and push certificates to these stores - Discover and manage Certificate templates from Certificate authorities - Event handling to handle certificate expiration event, then followed by Auto-Enrollment via Certificate authority and Auto-Deployment to certificate stores
true
false
false
false
#10
No-Trial
Free Trial
Transparent Pricing
No available pricing
No-Trial
Free Trial
Transparent Pricing
No available pricing
FileAudit makes it easy to audit the access and usage of sensitive data across both Windows File Servers and Cloud Storage. - Monitor in real-time all access, and access attempts. - Alert on suspicious file activity, alteration events, and irregular access time. - Execute automated responses to react immediately to potential threats. - Report on file access activity across on-premise storage and the cloud. Agentless, Remote and Non-Intrusive: FileAudit is installed in less than 3 minutes to protect all file servers without intrusion.
true
false
false
false
#10
No-Trial
Free Trial
Transparent Pricing
No available pricing
No-Trial
Free Trial
Transparent Pricing
No available pricing
Check Point Harmony Email & Collaboration, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.
false
false
false
false
#10
No-Trial
Free Trial
Transparent Pricing
No available pricing
No-Trial
Free Trial
Transparent Pricing
No available pricing
The Egress Intelligent Email Security platform supports organizations in tackling the most complex cybersecurity challenge they face: insider risk. Recognizing that the biggest vulnerability in any business is email, we have built the only Human Layer Security platform that defends against inbound and outbound email threats. Using patented contextual machine learning we detect and prevent abnormal human behavior such as targeted phishing attacks, misdirected emails, and data exfiltration.
true
false
false
false
#10
No-Trial
Free Trial
Transparent Pricing
No available pricing
No-Trial
Free Trial
Transparent Pricing
No available pricing
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys.
false
false
false
false
#10
No-Trial
Free Trial
Transparent Pricing
No available pricing
No-Trial
Free Trial
Transparent Pricing
No available pricing
CloudGuard Network Security (IaaS) for private and public cloud platforms is designed to protect assets in the cloud against the most sophisticated threats.
false
false
false
false
#10
No-Trial
Free Trial
Transparent Pricing
No available pricing
No-Trial
Free Trial
Transparent Pricing
No available pricing
VPC Service Controls allow users to define a security perimeter around Google Cloud Platform resources such as Cloud Storage buckets, Bigtable instances, and BigQuery datasets to constrain data within a VPC and help mitigate data exfiltration risks. With VPC Service Controls, enterprises can keep their sensitive data private as they take advantage of the fully managed storage and data processing capabilities of Google Cloud Platform.
false
false
false
false
#10
No-Trial
Free Trial
Transparent Pricing
No available pricing
No-Trial
Free Trial
Transparent Pricing
No available pricing
FileVault is a disk encryption program in Mac OS X 10.3 and later.
false
false
false
false
#10
No-Trial
Free Trial
Transparent Pricing
No available pricing
No-Trial
Free Trial
Transparent Pricing
No available pricing
ESET Endpoint Encryption provides uniquely simple and powerful data encryption, including full-disk encryption (FDE) and encryption for files, removable media and email. It greatly increases your organization’s data security and helps you comply with GDPR and other regulations. The unique shared encryption key system means that the solution is both highly secure and practical, and sharing encrypted media never requires a shared password. The client side requires minimal user interaction and user training, decreasing to a minimum the time spent enforcing encryption across your entire organization. The solution is FIPS 140-2 validated, with 256-bit AES encryption.
false
false
false
false
#10
No-Trial
Free Trial
Transparent Pricing
No available pricing
No-Trial
Free Trial
Transparent Pricing
No available pricing
iManage Records Manager provides a central interface with advanced capabilities to manage both physical and electronic records. Records Manager is the industry-leading records management application used by professionals to manage both electronic and physical records on any device and from any location. A modern web-based interface delivers governance and legal hold capabilities for a variety of physical and electronic assets including physical files, electronic documents, and emails, ensuring information is retained based on organization retention polices and then disposed when it reaches end of life. Administrators can set governance policies, retention periods, and disposition rules, as well as monitor and enforce compliance without introducing burden or overhead for today’s busy knowledge professional user. Key Benefits - Manage and control all records from a single policy - Increase productivity and insights - Process dispositions intuitively - Integrate seamlessly with iManage Work - Enhance access controls with iManage Security Policy Manager
false
false
false
false
#10
No-Trial
Free Trial
Transparent Pricing
No available pricing
No-Trial
Free Trial
Transparent Pricing
No available pricing
Microsoft Defender for Cloud Apps is an enterprise-grade security for cloud apps.
false
false
false
false
#10
No-Trial
Free Trial
Transparent Pricing
No available pricing
No-Trial
Free Trial
Transparent Pricing
No available pricing
Securely adopt cloud apps and meet your regulatory compliance requirements with an industry-leading Cloud Access Security Broker (CASB) that integrates with the rest of your enterprise security. CloudSOC CASB provides visibility, data security and threat protection for today’s generation of cloud users across a wide range of sanctioned and unsanctioned apps.
false
false
false
false
colourful magnifying glass on doc icon
No products found
Please refine your search using the filters provided
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Compare Virtru alternatives and competitors

See how Virtru stacks up with these solutions. Our buyers typically compare these tools the most before making a decision.

No items found.
No items found.