Quatrix Features
What are the features of Quatrix?
File Management
- Device Syncing
- Web Interface
- File Type Support
- Search
Collaboration
- File following
- File Sharing
- Simultaneously Editing
- Change Tracking / Audit Logs
Administration
- User and Role Management
- Single Sign-On
- Policies and Controls
- Device Management
- Storage Limits
- Storage Zones
- Security
Top Rated Quatrix Alternatives
(61)
4.8 out of 5
Visit Website
Sponsored
Quatrix Categories on G2
Filter for Features
File Management
Device Syncing | Based on 17 Quatrix reviews. Provides functionality that manages file syncing between both PC and Mobile devices to ensure files are up to date no matter who or what device they are updated on | 86% (Based on 17 reviews) | |
Web Interface | Ability to access documents via a web interface without a client being installed on a device 17 reviewers of Quatrix have provided feedback on this feature. | 94% (Based on 17 reviews) | |
File Type Support | Based on 17 Quatrix reviews. Supports all required file types including but not limited to: Google Docs, MS Office, images, videos, etc. | 93% (Based on 17 reviews) | |
Search | Can easily find files via a simple and/or advanced search 16 reviewers of Quatrix have provided feedback on this feature. | 89% (Based on 16 reviews) |
Collaboration
File following | Allows users to receive updates when files have been updated, added, deleted or moved. This feature was mentioned in 17 Quatrix reviews. | 86% (Based on 17 reviews) | |
File Sharing | As reported in 17 Quatrix reviews. Allows users to share individual files/folders to persons outside or inside organization. Ability to assign edit or view only privileges. | 91% (Based on 17 reviews) | |
Simultaneously Editing | Users can work simultaneously on files. This feature was mentioned in 15 Quatrix reviews. | 91% (Based on 15 reviews) | |
Change Tracking / Audit Logs | Provides an audit log of changes and enables users to revert to a specific version 17 reviewers of Quatrix have provided feedback on this feature. | 85% (Based on 17 reviews) |
Administration
User and Role Management | Enables administrator to provide segmented access to tool based on role. Easy to create new users and remove users. 17 reviewers of Quatrix have provided feedback on this feature. | 90% (Based on 17 reviews) | |
Single Sign-On | On boarding and off boarding team members with Active Directory/SAML based identity providers 17 reviewers of Quatrix have provided feedback on this feature. | 90% (Based on 17 reviews) | |
Policies and Controls | Ability to control by user/group file/folder access, external sharing permissions, editing policies, device location restrictions, sharing by device, etc. This feature was mentioned in 15 Quatrix reviews. | 88% (Based on 15 reviews) | |
Device Management | Based on 16 Quatrix reviews. Admins can restrict access to files by device in the event of lost/stolen devices as well as users that no long work for organization. Also may provide ability to wipe files from devices remotely. | 92% (Based on 16 reviews) | |
Storage Limits | Administer storage limits by user or group This feature was mentioned in 17 Quatrix reviews. | 87% (Based on 17 reviews) | |
Storage Zones | As reported in 17 Quatrix reviews. Choose data center your files should be stored at | 90% (Based on 17 reviews) | |
Security | Based on 17 Quatrix reviews. Stores and transfers files in secure environment | 94% (Based on 17 reviews) |
Platform
Internationalization | Allows organizations multi-national organizations to use tool effectively across multiple languages and currencies | Not enough data | |
Performance and Reliability | Software is consistently available (up-time) and allows users to complete tasks quickly because they are not waiting for the software to respond to an action they took. | Not enough data | |
Reporting and Auditing | Access pre-built and custom reports to monitor user activity and storage | Not enough data | |
System of Record Integration | Integrates to systems other systems of record such as CRM, ERP, Outlook, Sharepoint | Not enough data | |
APIs | Enables custom integration to external systems | Not enough data |
Data Delivery
Load Balancing | Monitors traffic and distribute resources and scales infrastructure workloads to match traffic. | Not enough data | |
Application Integration | Allows files and data to integrate directly into applications using APIs. | Not enough data | |
File Transfer Acceleration | Provides scalable administrative controls over file transfer speeds. | Not enough data | |
Content Routing | Routing of static and dynamic content for faster delivery of desired files. | Not enough data |
Functionality
Mobile Support | Supports accessability through differing operating systems and mobile devices | Not enough data | |
Encryption | Protects data with within and as it leaves your secure or local network. | Not enough data | |
Extensibility | Provides the ability to extend the platform to include additional features and functionalities | Not enough data | |
Reporting and Analytics | Tools to visualize and analyze data. | Not enough data | |
File Transfer | Allows file transfer between remote computers over a network. | Not enough data | |
Language Support | Supports Unicode i.e. Is available in multiple languages. | Not enough data | |
File Backup | Allows backup of huge files. | Not enough data | |
Mobile Support | Supports accessability through differing operating systems and mobile devices. | Not enough data |
Governance
Access Control | Supports LDAP Protocol to enable access control and governance. | Not enough data | |
Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | Not enough data | |
Provisioning and Governance | Allows administrators to set user access privileges to permit approved parties to access sensitive data. | Not enough data |
Management
File Management | Drag-and-drop feature to transfer files and directories. | Not enough data | |
Synchronization | Supports synchronization of remote and local directories. | Not enough data | |
Scheduling | Initiates transfers at specified times. | Not enough data | |
Performance | Protocol offers high performance data transfer. | Not enough data |
Security
Encryption | Transform or encode the files before the transfer to ensure security. | Not enough data | |
Authentication | Ensures a client's identity and rights to access a server. | Not enough data | |
Access Control | Allows limited user access over the file transfers and servers. | Not enough data |