Browse Software
List Your Product
Loading...
Endpoint Protector logo

Endpoint Protector

  Add to Compare

76% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

LeaksID logo
Visit Website

76% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

ReflectDB logo
Visit Website

Overview

Description LeaksID is a cloud-based app built with our proprietary technology at its core the best solution to prevent valuable data leaks via physical copying, such as taking snapshots or printing. The LeaksID algorithm will accurately identify the originator of the leak by the unique, invisible document marks. Every single time the document is opened, emailed or printed out, it is imperceptibly marked, and the end-user receives a unique copy of the document that is visually indistinguishable from the original. Read more ReflectDB is an all in one solution to protect your database from internal and external attacks. It acts as a proxy between any client and your database to provide many security features. Secure your database by enabling your users to unlock access with their mobile phone only when they need access. We support Okta Verify and YUBI Keys. Read more
Pricing Options
  • Free Trial Available
  • Starts at $7.5. Offers Free-forever plan.
  • Free Trial Not Available
  • Starts at $4.5.
SW Score & Breakdown

76% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    81%
  • Reviews
    71%
  • Momentum
    63%
  • Popularity
    62%

76% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    86%
  • Reviews
    60%
  • Momentum
    62%
  • Popularity
    62%

Features

Total Features
5 Features
6 Features
Common Features for All
    Blacklisting The practice of blocking identified entities to access particular privilege and services
    Compliance Reporting Helps in creating a compliance report to establish an effective and efficient policy and procedure management.
    Data Leak Detection Helps to prevent and mitigate data leaks through endpoints
    File Analysis Helps to analyze and identity ROT (redundant, outdated, and trivial) files to perform disk optimization
    Incident Management Helps in identifying, analyzing and rectifying a bad incident or issues to ensure it does not reoccur in future
    Policy Management Helps to design, maintain, update and report on compliance rules, regulations and policy status electronically so that it is easily accessible
    Sensitive Data Identification Inspects the sensitive data (PII, PCI, PHI) in file contents and classifies the files, folders, and data based on vulnerability
    Threat Protection This feature will defend the system and application from cyber threats
    Whitelisting The practice of allowing identified entities to access particular privilege and services
  • + 2 More - Show Less
    • Blacklisting The practice of blocking identified entities to access particular privilege and services
      Compliance Reporting Helps in creating a compliance report to establish an effective and efficient policy and procedure management.
      Data Leak Detection Helps to prevent and mitigate data leaks through endpoints
      File Analysis Helps to analyze and identity ROT (redundant, outdated, and trivial) files to perform disk optimization
      Incident Management Helps in identifying, analyzing and rectifying a bad incident or issues to ensure it does not reoccur in future
      Policy Management Helps to design, maintain, update and report on compliance rules, regulations and policy status electronically so that it is easily accessible
      Sensitive Data Identification Inspects the sensitive data (PII, PCI, PHI) in file contents and classifies the files, folders, and data based on vulnerability
      Threat Protection This feature will defend the system and application from cyber threats
      Whitelisting The practice of allowing identified entities to access particular privilege and services
  • + 3 More - Show Less
  • Technical Details

    Organization Types Supported
    • Large Enterprises
    • Medium Business
    • Small Business
    • Large Enterprises
    • Medium Business
    • Small Business
    Platforms Supported
    • SaaS/Web/Cloud
    • Installed - Windows
    • Installed - Mac
    • SaaS/Web/Cloud
    • Installed - Windows
    • Installed - Mac
    Modes of Support
    • 24/7 (Live rep)
    • Online
    • 24/7 (Live rep)
    • Online

    Reviews & Ratings

    User Rating
    4.9/5 1 user ratings
    Not Available
    Ratings Distribution
    • Excellent

      86.7%
    • Very Good

      13.3%
    • Average

      0%
    • Poor

      0%
    • Terrible

      0%
    Not Available
      Read All User Reviews Read All User Reviews

    AI-Generated from the text of User Reviews

    Pricing

    Pricing Options
    • Free Trial Available
    • Starts at $7.5. Offers Free-forever plan.
    • Free Trial Not Available
    • Starts at $4.5.
    Pricing Plans
    Monthly Plans Annual Plans

    Team $20.00 $24.00 per user / month

    Business (Team) $32.50 $39.00 per user / month

    Free (Personal) Free

    Standard (Personal) $7.50 $9.00 per user / month

    Unlimited (Personal) $11.70 $14.00 per user / month

    Pro $4.50 $4.50 per month

     
    View Detailed Pricing
    View Detailed Pricing

    Screenshots & Videos

    Videos Not Available Video Thumbnail

    Vendor information

    Company Details Located in: Brooklyn, New York Located in: Paris, France
    Contact Details

    +1 737 236 39 39

    https://www.leaksid.com/

    Not available

    https://reflectdb.net/

    Social Media Handles

    We understand SaaS better

    SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

    icon

    Buyers

    Looking for the right SaaS

    We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

    icon

    Makers

    Want more customers?

    Our experts will research about your product and list it on SaaSworthy for FREE.

    Get Listed