- Data Leak Detection
- Blacklisting
- Whitelisting
- Policy Management
- Threat Protection
Secure your data, wherever it goes.
(2 ratings)
Starts from $5/User/Month when Billed Yearly, also offers free forever plan
Overview
Features
Pricing
Alternatives
Media
Integrations
Customers
FAQs
Support
8.1/10
Spot Score
Box Shield is the IT security software for cloud, built from the ground up by Box. Shield offers state-of-the-art encryption that allows to protect data from sophisticated attacks – even when mobile employees store sensitive company information on their personal ... Read More
Data leak detection is a crucial feature that helps organizations protect their sensitive data from being accessed or disclosed without authorization. It involves the identification and monitoring of data flows within an organization's network to detect any potential data leaks. One of the main objectives of data leak detection is to prevent any unauthorized access to sensitive information, whether intentional or accidental. This is achieved by setting up certain protocols and security measures to detect any data leaks in real-time. With the increase in cyber threats and data breaches, data leak
Blacklisting, also known as blocklisting, is a software feature that allows users to control and limit access to certain content or websites. This feature is often used in security software, such as firewalls and antivirus programs, to prevent users from accessing malicious or inappropriate websites. With blacklisting, the user or administrator can create a list of specific websites or types of content that are deemed inappropriate or dangerous. When a user attempts to access a blacklisted site, the software will automatically block the connection,
Whitelisting is a software feature that allows users to create a list of trusted sources, programs, or processes that are given permission to access a computer’s system. This feature serves as an additional security measure to prevent unauthorized or malicious programs from infecting the system. With whitelisting, users can specify which applications or processes are allowed to run on their computer. This is achieved by creating a list of approved programs, which can be based on various criteria such as digital signatures, file names,
Policy Management is a software feature that allows organizations to easily create, update, and enforce policies across their entire network. It serves as a central repository for all policies, ensuring consistency and compliance across departments and locations. With Policy Management, administrators can define policies, such as acceptable use and security protocols, and assign them to different user groups. They can also track policy changes and updates, ensuring that employees are aware of any revisions. The feature also allows for automated enforcement of policies, ensuring that all devices
Threat protection is a software feature designed to safeguard computer systems from potential cyber threats and attacks. This comprehensive security feature offers a layered defense mechanism that utilizes various techniques to identify, prevent, and mitigate potential threats. One of the main capabilities of threat protection is its ability to detect and block malware, such as viruses, spyware, and ransomware. This is achieved through the use of real-time scanning, behavioral analysis, and machine learning algorithms that rapidly identify and quarantine any malicious files. Moreover,
Starts from $5 when Billed Yearly, also offers free forever plan
Monthly plans
Show all features
Individual
10 GB of storage
250 MB file upload limit
Personal Pro
$10
Up to 100 GB of storage
5 GB file upload
Starter
$7
Up to 100 GB of storage
Collaboration with up to 10 users
Built-in integrations with Office 365 and G Suite
Business
$20
Unlimited storage
Collaboration across your entire organization
Built-in integrations with Office 365 and G Suite, plus:
1 additional enterprise app integration
Admin Console access
Data loss protection
Custom branding
Yearly plans
Show all features
Individual
10 GB of storage
250 MB file upload limit
Personal Pro
$10
/Month
Up to 100 GB of storage
5 GB file upload
Starter
$5
/User/Month
Up to 100 GB of storage
Collaboration with up to 10 users
Built-in integrations with Office 365 and G Suite
Business
$15
/User/Month
Unlimited storage
Collaboration across your entire organization
Built-in integrations with Office 365 and G Suite, plus:
1 additional enterprise app integration
Admin Console access
Data loss protection
Custom branding
Individual
10 GB of storage
250 MB file upload limit
Personal Pro
$10
Up to 100 GB of storage
5 GB file upload
Starter
$7
Up to 100 GB of storage
Collaboration with up to 10 users
Built-in integrations with Office 365 and G Suite
Business
$20
Unlimited storage
Collaboration across your entire organization
Built-in integrations with Office 365 and G Suite, plus:
1 additional enterprise app integration
Admin Console access
Data loss protection
Custom branding
Screenshot of the Box Shield Pricing Page (Click on the image to visit Box Shield 's Pricing page)
Disclaimer: Pricing information for Box Shield is provided by the software vendor or sourced from publicly accessible materials. Final cost negotiations and purchasing must be handled directly with the seller. For the latest information on pricing, visit website. Pricing information was last updated on .
Contact
1.877.729.4269
Customer Service
Online
Location
Redwood City, California
Box Shield is the IT security software for cloud, built from the ground up by Box. Shield offers state-of-the-art encryption that allows to protect data from sophisticated attacks – even when mobile employees store sensitive company information on their personal devices. With Box Shield, companies can effectively protect sensitive customer and employee data against attacks, regardless of how or where the data is stored: at work on corporate servers or in the cloud.
Disclaimer: This research has been collated from a variety of authoritative sources. We welcome your feedback at [email protected].
Researched by Rajat Gupta