Araloc by Modevity-logo

Araloc by Modevity - Security

  • Deployment:
  • Company Size:SML
  • Features:
  • Platforms:
  • Pricing:

Details

Our customers share a need to protect their intellectual property and confidential digital content from competitive forces or unauthorized use. Today’s digital environment precludes organizations from developing and distributing confidential and proprietary content without taking measured safeguards to protect their digital assets from non-approved content viewers.Modevity’s ARALOC™ market leading digital content distribution platform protects an organization’s confidential content and intellectual property assets from leakage – malicious or accidental – without impacting collaboration between all stakeholders.ARALOC provides clients with powerful 256-bit AES encryption technology, extensive content rights management controls and viewer reporting and analytics. We focus on providing our clients the highest level content rights management software technology for protecting their intellectual property and confidential materials from unauthorized viewing, misuse and piracy. ARALOC provides a comprehensive suite of features including Notes and Annotations, Background-Sync, Offline viewing, and Reporting & Analytics. In addition, ARALOC provides several automation and collaboration options to improve productivity.

 

Features

Security Features
  • Multi-Factor Authentication
  • Endpoint Security
  • Anti-Virus Protection
  • Malware Protection
  • Single Login
  • App Catalog
  • Unified Directory
  • Adaptive Authentication
  • Mobile Identity
  • Compliance
  • User Provisioning
  • Virtual LDAP
  • Remote Wipe
  • Content Encryption
  • Digital Rights Management
  • Analytics and Reporting
  • Secure Content Storage and Sharing
  • e-Signature
  • Inbound and Outbound Traffic Filtering
  • Data Loss Prevention
  • Device Control
  • eDiscovery
  • Enterprise Mobility Management
  • Whitelists and Blacklists
  • File Tracing and Shadowing
  • Content Filtering
  • Static and Dynamic Attack Protection
  • Dashboards
  • Application Hardening
  • Application Behavior
  • Web Protection
  • Exploit Mitigation
  • Ransomware Mitigation
  • Payload Analysis
  • Policy Management
  • Cloud Protection
  • Network Security
  • Security Management
  • Server Security
  • Data Backup and Recovery
  • Gateway Security
  • Visualization
  • Firewall
  • Sandboxing
  • Spam Blocker
  • Email Protection
  • Security Trend Reporting
  • Password Security Enforcement
Pricing Model
  • Monthly subscription per user
  • Monthly subscription
  • Yearly subscription per user
  • Monthly site license
  • Yearly site license
  • Metered per minute
  • Flat fee
  • Percentage-based (% of collections or claims)
  • Fee-based (fixed $/claim)
  • Hybrid (combination of % and fixed amount/claim)
Service Terms Offered
  • Commitment Free
  • Free Setup
  • Free Cancellation
  • Money Back Guarantee
  • Month-to-Month Option
  • Keep Original Number
  • Customizable Plans
  • Account Manager
  • Free In-Network Calls
  • Unlimited Minutes
  • International Calls
  • Reduced Price for Multiple Users
Mobile Apps Offered
  • None
  • iOS
  • Android
Mobile friendly?
  • Yes
  • No
Service Terms Offered
  • Commitment Free
  • Free Setup
  • Free Cancellation
  • Money Back Guarantee
  • Month-to-Month Option
  • Keep Original Number
  • Customizable Plans
  • Account Manager
  • Free In-Network Calls
  • Unlimited Minutes
  • International Calls
  • Reduced Price for Multiple Users
Support Features
  • FAQs Section
  • Tutorials
  • Telephone Support
  • Email Support
  • 24/7 Support
  • Online Chat
  • Forum
  • In-Person Training
  • Social Media
  • Knowledge Base
  • Webinars

Pricing

Request a custom quote for your business

Get Pricing

Recommended Articles

4 Ways AI is Redefining Enterprise Security

Artificial Intelligence (AI) isn’t necessarily a new technology, but it’s been perceived more as a work o...

The Most Notorious Cyber Attacks Of the Past Decade

From Yahoo! to NotPetya - so much happened in the cyberspace during the course of these 10 years. Here's a flashback.

How to Protect Your Business from Known Cyber Security Risks

Maintaining tight cybersecurity within your business has some standard protocols - and the right security software is one of them.

Let's Make a Deal: Basic Steps for Switching to Cloud Computing

Moving your business data online doesn't have to be a scary proposition.

5 Steps Toward PCI DSS Compliance

The latest in credit-card protection requires a new approach.

Identity Theft: OpenID and What It Means for Web Security

The new open-source identity initiative is finally kick-starting online-identity standards.

Colocation-Center Security Trends

What are colocation datacenters doing to protect your company's assets?

The Essential Guide to Spam Control

What you need to know about managing junk messages.

The Essential Guide to NAC

What you need to know about locking down your network.

Managed Authentication Offers Password-Policy Options

New technologies try to do away with scribbled notes forever.

Virtualization Security

Even the latest network technologies can introduce security holes.

Is It Real or Is It Spam?

Learn to spot the differences between genuine and junk email.