What is Cornerstone MFT Server?

Cornerstone MFT Server is a fully featured Security Management Software designed to serve Startups, Agencies. Cornerstone MFT Server provides end-to-end solutions designed for Windows. This online Security Management system offers File Access Control, Audit Trail, Two-Factor Authentication, Web Threat Management, Real Time Monitoring at one place.

Pricing

Cornerstone MFT Server Starting Price

Awards
Cornerstone MFT Server Award

Our Awards and Recognition

More Awards
Need a Little Help?

Talk with a software expert for free. Get a list of software that's great for you in less than 10 minutes.

Cornerstone MFT Server Screenshots

Key Features of Cornerstone MFT Server

Here are the powerful features that make Cornerstone MFT Server stand out from the competition. Packed with innovative tools and advanced functionalities, this software offers a range of benefits.

  • Access control
  • Activity Log
  • Activity Monitoring
  • Advanced Firewall
  • AI / Machine Learning
  • Anonymous Browsing
  • Anti Spam
  • Anti Virus
  • Application Access Control
  • Application Security
  • Archiving
  • Asset Discovery
  • Asset Tagging
  • Audit Trail
  • Audit Trails
  • Availability Testing
  • Backup Management
  • Bandwidth Monitoring
  • Baseline Manager
  • Basic Firewall
  • Behavioral Analytics
  • Billing & Invoicing
  • Biometric
  • Compliance Management
  • Compliance Reporting
  • Configuration Management
  • Connectivity Management
  • Consolidation
  • Content Routing
  • Credential Management
  • Customer Management
  • Dashboard
  • Data Export
  • Data Visualization
  • Database Security Audit
  • Defect Tracking
  • Deployment Management
  • Diagnostic Tools
  • DNS Leak Protection
  • Document Imaging
  • eDiscovery
  • Email Attachment Protection
  • Encryption
  • Endpoint Management
  • Event Logs
  • Event Tracking
  • Event-Based Notifications
  • File Access Control
  • File Integrity Monitoring
  • Financial Data Protection
  • Firewall
  • Forensic Analysis
  • FTP Monitoring
  • Full Transaction Diagnostics
  • Granular Access Controls
  • Health Monitoring
  • Incident Management
  • Internet Security
  • Internet Usage Monitoring
  • Intrusion Detection System
  • Inventory Management
  • IP Address Monitoring
  • IP Protection
  • Job Costing
  • Kill Switch
  • Lead management
  • Least Privilege
  • Log Management
  • Maintenance Scheduling
  • Mobile Access
  • Mobile Authentication
  • Multi-Language
  • Multi-Protocol
  • Multifactor Authentication
  • Network Diagnosis
  • Network Logs
  • Network Monitoring
  • Network Scanning
  • Password Management
  • Password Protection
  • Patch Management
  • PCI Assessment
  • Peer-to-Peer
  • Performance Control
  • Performance Metrics
  • Policy Management
  • Predefined Protocols
  • Prioritization
  • Quarantine
  • Quotes / Estimates
  • Real Time Monitoring
  • Real-Time Reporting & Dashboards
  • Real-time Scheduling
  • Redundancy Checking
  • Release Management
  • Remediation
  • Remote Access
  • Reporting/Analytics
  • Reverse Proxy
  • Risk Assessment
  • Risk Management
  • Role based management
  • Root-Cause Diagnosis
  • Schedulers
  • Scheduling
  • Security Event Log
  • Sensitive Data Identification
  • Server Performance
  • Signature Matching
  • Single Sign On
  • SLA Monitoring
  • Spyware Removal
  • SSL Offload
  • Subscriber Management
  • Syslogs
  • Threat Intelligence
  • Threat Protection
  • Thresholds
  • Trace individual transactions
  • Transaction Monitoring
  • Two-Factor Authentication
  • Uptime Reporting
  • User Activity Monitoring
  • User Friendly Webportal
  • User Management
  • Version Control
  • Virtual Machine Monitoring
  • Virus Definition Update
  • Vulnerability Assessment
  • Vulnerability Management
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Inspection
  • Web Logs
  • Web Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting / Blacklisting
  • Work Order Management
Show More
  • Activity Log
  • Anti Spam
  • Anti Virus
  • App Management
  • Application Security
  • Audit Trail
  • Backup Log
  • Behavioral Analytics
  • Compliance management
  • Compression
  • Continuous Backup
  • Database Security Audit
  • Device management
  • Encryption
  • File Access Control
  • Financial Data Protection
  • Forms Automation
  • Local Server Options
  • Maintenance Scheduling
  • Multifactor Authentication
  • Multiple System Support
  • Password Reset
  • Real Time Monitoring
  • Remote Server Options
  • Secure Data Storage
  • Security Event Log
  • Signature Matching
  • User Management
  • Virus Definition Update
  • Vulnerability Protection
  • Web Access / Restoration
  • Web Threat Management
  • Whitelisting / Blacklisting
Show More
  • Call Sheets
  • Client Approvals
  • Company Size
  • Frequency of Use
  • Image Import
  • Import PDF / Documents / Files
  • Length of Use
  • Notes
  • Outlining
  • Rating
  • Reviewer's Role
  • Script Import
  • Track Changes
  • Access control
  • Access Controls/Permissions
  • Activity / News Feed
  • AI / Machine Learning
  • Anonymity Management
  • Archiving & Retention
  • AS2 Capability
  • Audit Trail
  • Auditing
  • Backup
  • Backup Scheduling
  • Cloud Backup
  • Cloud Storage
  • Collaboration
  • Compliance Reporting
  • Compression
  • Content Collaboration
  • Continuous Backup
  • Conversion Tracking
  • Customizable Templates
  • Cybersecurity
  • Data Format Translation
  • Data Migration
  • Data Protection
  • Data storage management
  • Data Synchronization
  • Distribution Management
  • Document Archiving
  • Document Management
  • Document Tagging
  • Drag & Drop
  • Due Diligence Management
  • EDI Testing
  • Electronic Signature
  • Employee Directory
  • Encryption
  • Event Calendar
  • Faceted Search / Filtering
  • File Access Control
  • File Integrity Monitoring
  • File Repair
  • File Sharing
  • Film Production Management
  • Full Text Search
  • Incident Management
  • Incremental Backup
  • Indexing
  • Intrusion Detection System
  • Knowledge Management
  • Local Server Options
  • Log Management
  • Managed File Transfer (MFT)
  • Media Library
  • Messaging
  • Multiple System Support
  • Payroll
  • PCI Assessment
  • Procurement Management
  • Project Management
  • Real Time Monitoring
  • Real Time Synchronization
  • Remote Server Options
  • Reporting/Analytics
  • Role-Based Permissions
  • Screen Sharing
  • Screenwriting
  • Search/Filter
  • Secure Data Storage
  • Secure Preview
  • Sensitive Data Identification
  • Storyboard
  • Text Analytics
  • Video Review & Collaboration
  • Vulnerability Protection
  • Web Access / Restoration
  • Whitelisting / Blacklisting
  • Workflow Management
Show More
  • Advanced persistent threat (APT) protection
  • Antivirus and malware protection
  • Application control and whitelisting
  • Data backup and recovery
  • Data encryption at rest and in transit
  • Data loss prevention (DLP)
  • Endpoint protection and device control
  • Firewall protection
  • Identity and access management (IAM)
  • Incident response and threat intelligence
  • Intrusion detection and prevention system (IDS/IPS)
  • Log management and auditing
  • Network anomaly detection
  • Network encryption (SSL/TLS)
  • Network forensics and packet analysis
  • Network load balancing and failover
  • Network segmentation and isolation
  • Network traffic monitoring and analysis
  • Secure email and messaging
  • Secure file transfer protocols (SFTP)
  • Secure remote access
  • Security assessment and compliance
  • Security incident response automation
  • Security information and event management (SIEM)
  • Security policy management
  • Two-factor authentication (2FA)
  • User behavior analytics (UBA)
  • Virtual private network (VPN) support
  • Vulnerability scanning and assessment
  • Web filtering and content control
  • Wireless network security
Show More

Cornerstone MFT Server Specifications

Get a closer look at the technical specifications and system requirements for Cornerstone MFT Server. Find out if it's compatible with your operating system and other software.

Deployment :
Hybrid
Subscription Plan :
Monthly, Yearly
Accessibility :
API
Customization
Mobile Support
Desktop Platforms :
Web app
MacOs
Windows
Language Support :
English
Business :
StartUps
SMBs
Agencies
Enterprises
Available Support :
Email
Cornerstone MFT Server Categories on SoftwareSuggest :
Company Details :
Company Name : South River Technologies
Headquarter : Annapolis
Website : Visit Website
South River Technologies logo
Do you work for South River Technologies?
Claim This Profile

Cornerstone MFT Server Videos

Cornerstone MFT Server Reviews (0)

Ask a question

No reviews yet. Rate this app or be the first to review.

Write a Review

Alternatives of Cornerstone MFT Server

Explore alternative software options that can fulfill similar requirements as Cornerstone MFT Server. Evaluate their features, pricing, and user feedback to find the perfect fit for your needs.

Cornerstone MFT Server FAQs

What are the top 5 features for Cornerstone MFT Server?

The top 5 features for Cornerstone MFT Server are:

  • Audit Trail
  • Real Time Monitoring
  • Compliance Management
  • Email Attachment Protection
  • Event Tracking

What type of customer support is available from Cornerstone MFT Server?

The available support which Cornerstone MFT Server provides is:

  • Email

Where is the headquarters/company of Cornerstone MFT Server located?

The headquarters/company of Cornerstone MFT Server is located at Annapolis.

Free Demo Get Pricing
Free Demo