Software Listing: Prevent Data Breaches

To protect stored data, comply with regulations, such as HIPAA or PCI, and prevent data breaches, BestCrypt Container Encryption delivers \'on-the-fly\' data encryption that\'s easy to use for virtual drives and selected files or folders. BestCrypt encrypts files and folders on Windows, Mac OS X and Linux by utilizing a wide variety of algorithms (AES, Blowfish, Twofish, CAST, GOST 28147-89, Triple-Des, Serpent) and the largest possible key sizes with XTS, LRW and CBC encryption modes. By featuring deniable encryption and dynamic containers, Jetico file encryption is the best TrueCrypt alternative.

  • Platform: Win2000, WinXP, Win7 x32, Win7 x64, Windows 8, Windows 10, WinServer, WinOther, WinVista, WinVista x64

Metasploit Pro will provide user swith a suite of tools that will help enterprise defenders prevent data breaches by efficiently prioritizing vulnerabilities, verifying controls and mitigation strategies, and conducting real-world, collaborative, broad-scope penetration tests to improve your security risk intelligence.

Note: In order to acquire the trial key, users will be required to register here.

.

  • Platform: Win7 x64, Windows 7, WinOther, WinServer, WinVista, WinVista x64

ZenOK includes Online Backup in real-time, Web Restore, Military-grade 448 bit Encryption, System Health Check and patent pending Data Loss Protection Warning System (AIRC) that help you prevent data loss. The Warning System (AIRC) monitors the health of your computer and warns you when your system is about to crash. When you decide to upgrade, the safety of your photos, documents, spreadsheets and music are guaranteed safe. The warranty includes (1) Free Professional Antivirus (2) Free Data Recovery Service (3) Data Loss Coverage up to $100,000 (4) Free Online Backup Storage (150GB) (5) System health monitor (6) Data Loss Risk Management System and full access to everything ZenOK has to offer at an unbelievable price of $34/year.

  • Publisher: ZenOK
  • Date:
  • Size: 30863 KB
  • Platform: Win7 x64, Windows 7, Windows 7 Home Basic, Windows 7 Home Premium, Windows Mobile, WinOther, WinVista, WinVista x64

BestCrypt Volume for Disk Encryption protects all data on all types of volumes residing on fixed and removable disks - simple volumes, mount points, multipartition volumes (spanned, mirrored, striped, RAID-5), plus supports RAID and GPT partitions, UEFI and Windows 8 computers. Jetico encryption software provides protection from physical threats, such as lost or stolen computers and USB drives, and compliance with regulations, such as HIPAA or PCI. BestCrypt Volume Encryption utilizes a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes.

  • Platform: Win2000, WinXP, Win7 x32, Win7 x64, Windows 8, Windows 10, WinServer, WinOther, WinVista, WinVista x64

Detect Hard Drive Issues Before Catastrophe Strikes The work that you do on your computer is extremely important, so why leave potential hard drive issues up to fate? By the time your system starts behaving strangely or making odd noises, it may be too late to save your data! With Hard Disk Sentinel, you\'ll always have a complete overview of your hard disk drive\'s health, so you can spot potential problems before they result in an irrecoverable data catastrophe. Hard Disk Sentinel is your key to identifying, testing, diagnosing, and repairing hard drive problems, even with Solid State Drives.

  • Platform: Win10, Win2000, Win7 x32, Win7 x64, Win98, WinOther, WinServer, WinVista, WinVista x64, WinXP, Windows 8

Personal SmartCheck 3.0 uses S.M.A.R.T. technology to monitor hard drives internal S.M.A.R.T. attributes, predict possible drive failure and prevent data loss. Using predictions settings, Personal SmartCheck lets you know about a potential disk health problem before you lose valuable data. With Personal SmartCheck you will have the most recent information about the health of all hard drives on your computer. Prediction of the nearest T.E.C. of any hard drive can prevent valuable data loss by replacing dangerous drives and backing up all data. For example, motor and/or bearing failure can be predicted by an increase in the drive spin-up time and the number of retries it takes to succeed in spinning up the drive.

  • Platform: Win2000, Windows Server, Windows Vista, WinOther

Quick and easy-to-manage data protection solution to prevent data leakage. Documents are protected from the unauthorized accesses efficiently and up to date. It generates alerts about portable devices connected illegally to the computer. Access policy can be created for mobile devices (Floppy, CD, DVD, InfraRed, COM, LPT, USB, Bluetooth, Wireless, etc.). Documents are protected in isolated areas. Storages suitable to take out information (e.g. Pen-Drive) can be disabled; furthermore the activities done by them are traceable. EagleEyeOS One sends alerts about connecting or disconnecting of storages, about file processes performed on those storages, if required.

  • Platform: Win2000, Windows Server, WinOther, WinVista

Active@ Hard Disk Monitor is a freeware disk utility that checks and monitors the status of your hard drives to help prevent data loss. The system is based on the Self-Monitoring Analysis and Reporting Technology (S.M.A.R.T.). This software monitors hard disk parameters such as Temperature, Head Flying Height and Spin-Up Time and notifies a user when a critical condition occurs. Disk Monitor also displays hard disk information, current S.M.A.R.T. attributes and the overall status of the hard disk's health. Advanced disk scan allows you to detect bad sectors on a disk surface. The software can be launched automatically at Windows startup and monitor the system in the background.

  • Platform: Win2000, Windows Server, Windows Vista, WinOther

When don't you hear about data breaches?Medical records and credit card information are being compromised at an alarming rate. Televisions shows are even demonstrating how house burglars target home computers so that they can capture financial and identity information. What about employee access?We can helpWe have the rock solid security technology that's every day easy-to-use. You enter the password once and the virtual disk appears as a drive letter -- all other security functions are quick and invisible.Copy hard disks, CDs, DVDs, floppies, etc.Use the Cloning Wizard to make identical copies of your favorite disks.

  • Publisher: modsol.com
  • Date: 07-09-2009
  • Size: 992 KB
  • Platform: Win2000, WinOther

An ActionScript 3 TCP socket wrapper with buffering and acknowledgment mechanism to prevent data loss problems in READ methods of SOCKET class.
Buffering, Acknowledgment Packet
AS3 Socket Wrapper License - Mozilla Public License 2.0 (MPL 2.0).

  • Platform: WinOther

NeverLost is a handy application designed to save your portable storage devices and prevent data loss.

Never forget your USB key, portable hard drive, CD/DVD media ever again. NeverLost has a wide variety of configuration options including automatic email notification with user, device and computer information.

Individual users can also configure NeverLost to run in USB mode directly from their USB key or similar device. This means wherever you go, NeverLost will be there to protect your data.

.

  • Platform: Win2000, Win7 x64, Windows 7, WinOther, WinServer, WinVista, WinVista x64

Prevent data loss easily and securely! With O&O DiskImage 4 you can create images of your entire computer or individual partitions during operation. If data loss occurs, your imaged data (files, folders, partitions) will be available to you in no time with just a few clicks - even if Windows cannot be started anymore!Differences to previous versionBesides the continuous maintenance and enhancement of the existing program components, you will find several additional new and helpful features in Version 4. For example, the new interactive DiskView offers a complete overview of the entire hard disk.

  • Platform: Win2000, Windows Vista, WinOther

AirStop is an endpoint safety solution that prevents data outflow by controlling all communications adapters and storage devices on desktop computers and laptop. Controlled storage devices include: USB Flash Memory, CD / DVD RW Drive, Floppy Disk Drive. Controlled communications adapters include: LAN, WLAN, Cellular/3G, Bluetooth, Fax/Modem, Firewire. Designed for venture applications, the software enforces security policy by allowing a single communications adapter to be used during a given computing session. For example, the software automatically senses use of a wired Ethernet connection and automatically disables all other communciations and storage devices.

  • Platform: Win2000, Windows Server, WinOther, WinVista

Benefits: - Totally block access to any portable devices such as USBs, CDs, DVDs, iPods, MP3 players, WiFi, FireWire, Bluetooth etc., thus reducing any incidences of confidential data leakage or virus infections of the network. - Through the Allowed List, permit use of only company authorized USBs, FireWire and External Hard Drive devices. -Assign security levels of full access, read mode or no access. -Allow use of specific portable devices at allocated day/time slots, through the Scheduler. -Control which Groups or PCs, have permissions to access the endpoint devices. -Prevent unauthorized administrative users from stopping or uninstalling the AccessPatrol client service.

  • Publisher: Currentware
  • Date: 12-03-2015
  • Size: 137393 KB
  • Platform: WinXP, Win7 x32, Win7 x64, Windows 8, WinServer, WinVista, WinVista x64

USB Block is a data leak prevention software that lets you restrict the unauthorized USB Ports, External Drives, Flash Disks and much more. This data security software lets you limit all such untrusted devices that you do not trust and enables you to use the trusted devices by whitelisting them. In this way, you can protect your files, folders, photos, videos, documents and much more. In the same way, USB Block protects your files and folders from being burned directly to CDs/DVDs, etc. you can restrict such act with the help of USB Block and have a complete peace of mind. This data leak prevention software also blocks unauthorized network computers, non-system drives and much more to keep malicious activity as far away as possible from your PC! If you use several computers in your office, installing USB Block on each computer...

  • Platform: Win2000, WinXP, Win7 x32, Win7 x64, Windows 8, Windows 10, WinServer, WinOther, WinVista, WinVista x64

CryptoDisk is a powerful tool for creating and managing virtual encrypted disks (encrypted volumes). It creates encrypted volume within a file on a hard drive or any external data storage device (flash memory card, USB drive, etc) and then mount it as a real disk. All the data are automatically encrypted using your password right before they are saved to disk or decrypted right before they are loaded, without any user intervention. Mounted volumes behave as real physical disk drives, however even when the volume is mounted, data stored in the volume is still encrypted. Why do you need CryptoDisk? To protect your sensitive information.

  • Publisher: WinCrypto
  • Date: 20-08-2007
  • Size: 2915 KB
  • Platform: Tablets, Win2000, Windows Server, Windows Vista, WinOther

USB data leakage protection software is capable to track any USB communication on client computer system easily and alert to administrator by playing a sound on server side. Tool used powerful monitoring algorithm that quickly captures plug in plug out of USB device even your home or office network is disconnected or broken. USB drive data theft monitoring utility provides administrative control over entire LAN network and facilitates to restrict any USB port for accessing any type of data, file or document from removable USB device like pen drive, memory stick, flash drive, memory card etc. USB drive activity monitoring software provides complete detail of USB storage drive even any USB media is inserted or removed from any Client PC on network.

  • Publisher: Monitor USB
  • Date: 11-01-2008
  • Size: 3010 KB
  • Platform: Win2000, Windows Server, Windows Vista, WinOther

Port Locker is advanced solution to secure your private or vital data. Port Locker prevents vital & important data to be transferred from one PC to another using Flash drive, DVD/CD Writers, PCMCIA Ports, Ethernet Ports. Port Locker prevent two way threat to businesses because the Flash drive, DVD/CD writers, PCMCIA ports, Ethernet ports can be used not only to carry sensitive data out, but also upload malicious software code onto company's network.
Port Locker allows the user to safeguard data/ file from unauthorized access. It provides the options to lock/unlock single or multiple ports with authorized password.

  • Platform: Win2000, Win7 x32, Win7 x64, WinOther, WinVista, WinVista x64

USB Data Theft Protection Tool is compatible to monitor various USB storage device including USB video players, pen drives, Mp3 player, USB Cameras (mass storage), USB Flash cards, USB Audio players, Pocket PCs, mobile phones, Ipods and Other USB mass storage enabled device. Professional USB monitoring software tracks the entire plug in and plug out performed by the USB device in windows network performed in real time on client personal computer system. Software from www.liveusbmonitor.com keeps tracks of all the USB devices activity running on the client system by working in a hidden mode. USB Monitoring software easily captures all performed entire activity, capable to change access permission of any client machine USB port within network domain and prevent unauthorized data transfer.

  • Platform: Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

Windows network USB drive access monitoring software is an efficient LAN based utility that disable pen drives to prevent data theft. USB drive blocking application can examine client machine's activities performed on USB port. Tool plays a special sound when removable flash drive is connected or removed from client computer. USB pen drive blocker program allows you to observe multiple logical drives activities on several computers. Software is fully capable to monitor machines when network cable is not connected to the client system. Flash drive disabling utility is compatible with various USB supported storage drives including zip drive, thumb drive, memory sticks, digital cameras, MP3 music players, jump drives, iPods, compact flash cards etc.

  • Platform: WinOther

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


USB Guardian

Gone are the days when Floppies, magnetic tapes and rewritable disks were used to transfer data. Nowadays, USB Flash Drives are used to transfer files. USB Flash Drives are faster, cheaper, easier and more convenient way to transfer data. Along with ...


FILExtinguisher

FILExtinguisher is a simplistic looking data removal tool, that will assist you in totally and completely removing sensitive data from your computer hard drive. This means that you can securely remove your online surfing history, banking details, ...


Windows Movie Maker

Windows movie maker, expressed as windows live movie maker in the latest updates, is a piece of video and picture editing software for windows (as the name of the software no doubt suggests) designed to be simple, easy to use while still keeping as ...


Auslogics Duplicate File Finder

If you have a lot of data and perform regular backups, or are particularly bad at keeping your system clean, tidy and organized, you may find that your computer starts to get a little clogged up with duplicate files. In my case, this is most obvious ...


Battle of Britain

Battle of Britain is a top down strategy and shooter game that takes place during the historic battle of Britain, as the name would suggest. The game takes place from a top down perspective, and has a fairly interesting method of control. Instead of ...


Castle Wars

Castle wars is a unique blend of the strategy genre with a small amount of war and micro management elements added in to make it more unique. In castle wars the aim is to eliminate all the other players from the map, and become the only player left ...


Easy Tweaker

Easy Tweaker is one of the many thousands of applications out there aiming to assist frustrated Windows users with their slow, sluggish and bogged up systems. Easy Tweaker is more than just one application however. It contains a number of different ...


Intergalactic War

Inter galactic war is another free ware two dimensional shooter game, falling into the ever prevalent genre of top down shooters. As the title suggests, in inter galactic war you play as a space ship fighting enemy space ships as you fight your way ...


Atomic Minesweeper

Atomic mine sweeper is a freeware mine sweeper clone style game, programmed and playable using flash player. Although the name (and genre) of the game suggests that it is simply a mine sweeper clone, the actual game itself is a very complex ...



New Downloads

SoundTap Professional
Edition

SoundTap Pro records any
digital audio playing through
your computer with excellent
digital quality. SoundTap can
record ...

VShell Server for UNIX

VShell SSH server is a secure
alternative to Telnet and FTP
on Windows, Mac, and UNIX
providing strong encryption,
robust ...

CoffeeCup Sonar

Sonar goes deep - really deep
- into a website and transmits
back a comprehensive overview
with instant data on your ...

ModCom

Free Windows software for Data
Acquisition & Control, HMI
/ SCADA, Industrial
Automation, Process Control,
and Data ...

SpamAssassin in a Box

SpamAssassin in a Box is a
powerful and reliable spam
filter for Windows. Beside the
famous e-mail filter
SpamAssassin, ...

BearShare MP3

Bearshare MP3 is a feature
loaded, secure and smart P2P
application designed to
download your favorite music,
movies, ...

DWG to SVG Converter MX

DWG To SVG Converter MX allows
you convert DWG to SVG, DXF to
SVG and DWF to SVG directly
without need of AutoCAD, it
...

NetShred X

Wipe cache, erase history and
more with this internet track
eraser for Mac OS X that is
easy, fast and cleaner. Easy
...

7GIF

7GIF is a full features
animated GIFs player for
Windows. With 7GIF you have
full control over the
animation: play, ...



Related Searches

Css Prevent Data Input
Mining Your Data How Prevent
Prevent Copy Data Cd
Prevent Devices Data Transfer Usb Port
Prevent Flash Data Transfer
Prevent Copy
Data Be Copying
Corrupt Data
Data County
Data Driv Crash
Data Cd Create
Data Creloaded