Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Quatrix Features

What are the features of Quatrix?

File Management

  • Device Syncing
  • Web Interface
  • File Type Support
  • Search

Collaboration

  • File following
  • File Sharing
  • Simultaneously Editing
  • Change Tracking / Audit Logs

Administration

  • User and Role Management
  • Single Sign-On
  • Policies and Controls
  • Device Management
  • Storage Limits
  • Storage Zones
  • Security

Top Rated Quatrix Alternatives

Filter for Features

File Management

Device Syncing

Based on 17 Quatrix reviews. Provides functionality that manages file syncing between both PC and Mobile devices to ensure files are up to date no matter who or what device they are updated on
86%
(Based on 17 reviews)

Web Interface

Ability to access documents via a web interface without a client being installed on a device 17 reviewers of Quatrix have provided feedback on this feature.
94%
(Based on 17 reviews)

File Type Support

Based on 17 Quatrix reviews. Supports all required file types including but not limited to: Google Docs, MS Office, images, videos, etc.
93%
(Based on 17 reviews)

Search

Can easily find files via a simple and/or advanced search 16 reviewers of Quatrix have provided feedback on this feature.
89%
(Based on 16 reviews)

Collaboration

File following

Allows users to receive updates when files have been updated, added, deleted or moved. This feature was mentioned in 17 Quatrix reviews.
86%
(Based on 17 reviews)

File Sharing

As reported in 17 Quatrix reviews. Allows users to share individual files/folders to persons outside or inside organization. Ability to assign edit or view only privileges.
91%
(Based on 17 reviews)

Simultaneously Editing

Users can work simultaneously on files. This feature was mentioned in 15 Quatrix reviews.
91%
(Based on 15 reviews)

Change Tracking / Audit Logs

Provides an audit log of changes and enables users to revert to a specific version 17 reviewers of Quatrix have provided feedback on this feature.
85%
(Based on 17 reviews)

Administration

User and Role Management

Enables administrator to provide segmented access to tool based on role. Easy to create new users and remove users. 17 reviewers of Quatrix have provided feedback on this feature.
90%
(Based on 17 reviews)

Single Sign-On

On boarding and off boarding team members with Active Directory/SAML based identity providers 17 reviewers of Quatrix have provided feedback on this feature.
90%
(Based on 17 reviews)

Policies and Controls

Ability to control by user/group file/folder access, external sharing permissions, editing policies, device location restrictions, sharing by device, etc. This feature was mentioned in 15 Quatrix reviews.
88%
(Based on 15 reviews)

Device Management

Based on 16 Quatrix reviews. Admins can restrict access to files by device in the event of lost/stolen devices as well as users that no long work for organization. Also may provide ability to wipe files from devices remotely.
92%
(Based on 16 reviews)

Storage Limits

Administer storage limits by user or group This feature was mentioned in 17 Quatrix reviews.
87%
(Based on 17 reviews)

Storage Zones

As reported in 17 Quatrix reviews. Choose data center your files should be stored at
90%
(Based on 17 reviews)

Security

Based on 17 Quatrix reviews. Stores and transfers files in secure environment
94%
(Based on 17 reviews)

Platform

Internationalization

Allows organizations multi-national organizations to use tool effectively across multiple languages and currencies

Not enough data

Performance and Reliability

Software is consistently available (up-time) and allows users to complete tasks quickly because they are not waiting for the software to respond to an action they took.

Not enough data

Reporting and Auditing

Access pre-built and custom reports to monitor user activity and storage

Not enough data

System of Record Integration

Integrates to systems other systems of record such as CRM, ERP, Outlook, Sharepoint

Not enough data

APIs

Enables custom integration to external systems

Not enough data

Data Delivery

Load Balancing

Monitors traffic and distribute resources and scales infrastructure workloads to match traffic.

Not enough data

Application Integration

Allows files and data to integrate directly into applications using APIs.

Not enough data

File Transfer Acceleration

Provides scalable administrative controls over file transfer speeds.

Not enough data

Content Routing

Routing of static and dynamic content for faster delivery of desired files.

Not enough data

Functionality

Mobile Support

Supports accessability through differing operating systems and mobile devices

Not enough data

Encryption

Protects data with within and as it leaves your secure or local network.

Not enough data

Extensibility

Provides the ability to extend the platform to include additional features and functionalities

Not enough data

Reporting and Analytics

Tools to visualize and analyze data.

Not enough data

File Transfer

Allows file transfer between remote computers over a network.

Not enough data

Language Support

Supports Unicode i.e. Is available in multiple languages.

Not enough data

File Backup

Allows backup of huge files.

Not enough data

Mobile Support

Supports accessability through differing operating systems and mobile devices.

Not enough data

Governance

Access Control

Supports LDAP Protocol to enable access control and governance.

Not enough data

Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.

Not enough data

Provisioning and Governance

Allows administrators to set user access privileges to permit approved parties to access sensitive data.

Not enough data

Management

File Management

Drag-and-drop feature to transfer files and directories.

Not enough data

Synchronization

Supports synchronization of remote and local directories.

Not enough data

Scheduling

Initiates transfers at specified times.

Not enough data

Performance

Protocol offers high performance data transfer.

Not enough data

Security

Encryption

Transform or encode the files before the transfer to ensure security.

Not enough data

Authentication

Ensures a client's identity and rights to access a server.

Not enough data

Access Control

Allows limited user access over the file transfers and servers.

Not enough data