Top 15 Marshal Alternative and Similar Softwares | May 2024

Marshal is the only online tool that lets you quickly scan your cloud services to immediately reveal exposed sensitive data you might be sharing.

Marshal works with Box, Dropbox, Google Drive, Microsoft OneDrive and Onehub, and can uncover exposed Social Security numbers, credit card numbers, phone numbers and email addresses.

Once you run a free scan, Marshal returns a sanitized, redacted report outlining how many data threats were found, where they are located, and if those files are still being shared.

1. Compaas

Compaas Using the public cloud without Compaas is like driving without a seatbelt. 60% of companies fail after a data breach and employee negligence is the leading cause of data exposure. Compaas protects your cloud data against employee negligence and 3rd party apps. Small and medium-sized businesses are plagued with employee......

2. Exploit Pack

Exploit Pack Exploit Pack is an open source project maintained only by me. It has now 5 years in the market. It’s NOT a replacement for metasploit or core impact.It’s a different approach you can use it to conduct a pentest, a real one, not only press enter in the command line.......

3. Handylock

Handylock handyLock is an application that locks your Mac screen when you move away from it. This way your Mac is safe and secured from unauthorized access. This is very convenient if you want to prevent access by kids, co-workers or others when you slip away to grab a coffee, a......

4. Authenticator

Authenticator Authenticator is a simple, free, and open source two-factor authentication app. It helps keep your online accounts secure by generating unique one-time passwords, which you use in combination with your other passwords to log into supporting websites. The simple combination of the password in your head and the rotating passwords......

5. east-tec Eraser

east-tec Eraser Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Go beyond any system optimization or cleanup tool, improve your PC performance, and keep it clean and secure! east-tec Eraser has been continuously improved since its launch in 1998, and exceeds government and......

6. SharkSSL

SharkSSL The SSL/TLS and Certificate tutorial for Windows enables you to fast track your understanding of the SSL/TLS protocol, Certificate Management, and secure communication. The download includes many C source code examples, including a secure WebSocket tutorial. You can either compile the examples "as is" or modify them to suite your......

7. CloudSploit

CloudSploit CloudSploit is a software-as-a-service startup with a mission to improve security in public clouds such as Amazon Web Services. With open source, free, and paid hosted products, CloudSploit is an affordable way to ensure simple misconfigurations or security risks do not compromise entire environments. CloudSploit works without the need to......

8. -

- Sorry, we have added any description on -......

9. Evident.io

Evident.io The Evident Security Platform streamlines and optimizes vulnerability and risk management. It continuously monitors your AWS cloud, automatically identifies security misconfigurations and enables rapid mitigation of risk through guided remediation.ESP’s automation, customization, and ease-of-use enables cloud teams to securely deploy and migrate workloads to AWS and implement a process of......

10. UNLOQ

UNLOQ UNLOQ comes in the shape of a widget, which you can easily embed into your site, and a companion mobile app that your users will need, in order to authenticate. The default authentication mechanism is a multi-factor system that uses out of band communication to authenticate a user. After a......

11. Malwarebytes Anti-Ransomware

Malwarebytes Anti-Ransomware Malwarebytes Anti-Ransomware uses advanced proactive technology that monitors what ransomware is doing and stops it cold before it even touches your files. It has no shot at encrypting. And it does not rely on signatures or heuristics, so it’s light and completely compatible with antivirus.These methods proved to be so......

12. Unified VRM by NopSec

Unified VRM by NopSec NopSec Unified VRM® provides up to a 40% time savings for security teams by eliminating the manual tasks involved with vulnerability risk management. Our cloud-base solution helps you identify, prioritize, proactively manage and report on IT vulnerabilities and security breaches from a single platform.Our Differentiators:1. Adaptive Expert Intelligence - Offers......

13. Defender

Defender Get regular security scans, vulnerability reports, safety recommendations and customized hardening for your site in just a few clicks. Defender is the analyst and enforcer that never sleeps.Security isn’t one-size-fits-all, so Defender will analyze your site, make suggestions for hardening and provide easy activation for the most effective layered security......

14. Security Plus

Security Plus Security Plus is a browser extension powered by VirusTotal 's public API that provides free checking of URLs for viruses. It uses up to 64 different antivirus products and scan engines to check for viruses that the user's own antivirus solution may have missed.Features• Powered by the VirusTotal......

15. Lynis

Lynis Lynis is an open source security auditing tool. Primary goal is to help users with auditing and hardening of Unix and Linux based systems. The software is very flexible and runs on almost every Unix based system (including Mac). Even the installation of the software itself is optional!How it worksLynis......