Software Listing: Prevent Data Leakage

Port Locker is advanced solution to secure your private or vital data. Port Locker prevents vital & important data to be transferred from one PC to another using Flash drive, DVD/CD Writers, PCMCIA Ports, Ethernet Ports. Port Locker prevent two way threat to businesses because the Flash drive, DVD/CD writers, PCMCIA ports, Ethernet ports can be used not only to carry sensitive data out, but also upload malicious software code onto company's network.
Port Locker allows the user to safeguard data/ file from unauthorized access. It provides the options to lock/unlock single or multiple ports with authorized password.

  • Platform: Win2000, Win7 x32, Win7 x64, WinOther, WinVista, WinVista x64

Quick and easy-to-manage data protection solution to prevent data leakage. Documents are protected from the unauthorized accesses efficiently and up to date. It generates alerts about portable devices connected illegally to the computer. Access policy can be created for mobile devices (Floppy, CD, DVD, InfraRed, COM, LPT, USB, Bluetooth, Wireless, etc.). Documents are protected in isolated areas. Storages suitable to take out information (e.g. Pen-Drive) can be disabled; furthermore the activities done by them are traceable. EagleEyeOS One sends alerts about connecting or disconnecting of storages, about file processes performed on those storages, if required.

  • Platform: Win2000, Windows Server, WinOther, WinVista

You value your personal data and professional information more than anything else. But, do you have sufficient security measures to protect the same? Perhaps not. In today\'s highly competitive information era when every piece of data is stored in one\'s laptop or PC in digital format, having a comprehensive protection program is really important. Data leakage prevention software takes charge of your security needs and guards all your leakage points. Port Locker is an advanced security application which blocks different ports on your PC, such as DVD/CD writers, USB, printer ports, Ethernet ports as well as PCMCIA ports, so that no body can ever attempt any unauthorized access on them.

  • Platform: Win2000, Win7 x32, Win7 x64, Windows 8, Windows Server, WinOther, WinVista, WinVista x64

Powerful and flexible security solution against data leakage. The program provides full-scale protection, uniquely combines file lifecycle tracking with portable data stores and rights management for users and/or files. It allows you to track and enforce compliance with security policies and standards (ISO/IEC 27001:2005 (BS7799), CobIT, SOA), and provides real-time notification and post-event analysis of user activities and incidents. Supports logging and evaluating file level operations, as well as copy/paste/print actions. By creating reports, the program can not only search for and sort simple actions, but can also return exact results about actions taken on certain files, the user these actions were performed by, and the time of these actions; the results can show when, where and by whom an external data storage device was...

  • Platform: Win2000, Windows Server, Windows Vista, WinOther

The basic idea of the EagleEyeOS Easy Series' development is to orient to your demands and provides a quick and easy-to-use solution in order to prevent specific areas of data-leakage. It fits to everyone who neither operate extended IT systems that are significant for the enterprise segment nor wants to run complex software, by having special professional protections in certain fields. EagleEyeOS Easy Series contain every unique functionality, which ones already proved in previously released EagleEyeOS products and are ready-to-market as single solutions. With the need of having professional protection creating access policies to protect electronically stored data and intellectual properties.

  • Platform: Win2000, WinOther

To protect stored data, comply with regulations, such as HIPAA or PCI, and prevent data breaches, BestCrypt Container Encryption delivers \'on-the-fly\' data encryption that\'s easy to use for virtual drives and selected files or folders. BestCrypt encrypts files and folders on Windows, Mac OS X and Linux by utilizing a wide variety of algorithms (AES, Blowfish, Twofish, CAST, GOST 28147-89, Triple-Des, Serpent) and the largest possible key sizes with XTS, LRW and CBC encryption modes. By featuring deniable encryption and dynamic containers, Jetico file encryption is the best TrueCrypt alternative.

  • Platform: Win2000, WinXP, Win7 x32, Win7 x64, Windows 8, Windows 10, WinServer, WinOther, WinVista, WinVista x64

Benefits: - Totally block access to any portable devices such as USBs, CDs, DVDs, iPods, MP3 players, WiFi, FireWire, Bluetooth etc., thus reducing any incidences of confidential data leakage or virus infections of the network. - Through the Allowed List, permit use of only company authorized USBs, FireWire and External Hard Drive devices. -Assign security levels of full access, read mode or no access. -Allow use of specific portable devices at allocated day/time slots, through the Scheduler. -Control which Groups or PCs, have permissions to access the endpoint devices. -Prevent unauthorized administrative users from stopping or uninstalling the AccessPatrol client service.

  • Publisher: Currentware
  • Date: 12-03-2015
  • Size: 137393 KB
  • Platform: WinXP, Win7 x32, Win7 x64, Windows 8, WinServer, WinVista, WinVista x64

The typical security software is absolutely useless in combating unauthorized data leakage caused by your employees' negligence or intentionally harmful actions. Firewalls and AV-based security systems cannot protect you from theft of your company's confidential information by employees that have authority to access that data freely due to their duties. A successful company's most trustworthy and devoted employees often become characters in attacks planned by your competitors; they are bribed, blackmailed, threatened. SecretsSaver is a fundamentally new system for guarding your confidential data from threats originating from your company's (once) most trustworthy and devoted employees.

  • Platform: Win2000, Windows Server, WinOther

AirStop is an endpoint safety solution that prevents data outflow by controlling all communications adapters and storage devices on desktop computers and laptop. Controlled storage devices include: USB Flash Memory, CD / DVD RW Drive, Floppy Disk Drive. Controlled communications adapters include: LAN, WLAN, Cellular/3G, Bluetooth, Fax/Modem, Firewire. Designed for venture applications, the software enforces security policy by allowing a single communications adapter to be used during a given computing session. For example, the software automatically senses use of a wired Ethernet connection and automatically disables all other communciations and storage devices.

  • Platform: Win2000, Windows Server, WinOther, WinVista

USB Block is a data leak prevention software that lets you restrict the unauthorized USB Ports, External Drives, Flash Disks and much more. This data security software lets you limit all such untrusted devices that you do not trust and enables you to use the trusted devices by whitelisting them. In this way, you can protect your files, folders, photos, videos, documents and much more. In the same way, USB Block protects your files and folders from being burned directly to CDs/DVDs, etc. you can restrict such act with the help of USB Block and have a complete peace of mind. This data leak prevention software also blocks unauthorized network computers, non-system drives and much more to keep malicious activity as far away as possible from your PC! If you use several computers in your office, installing USB Block on each computer...

  • Platform: Win2000, WinXP, Win7 x32, Win7 x64, Windows 8, Windows 10, WinServer, WinOther, WinVista, WinVista x64

USB data leakage protection software is capable to track any USB communication on client computer system easily and alert to administrator by playing a sound on server side. Tool used powerful monitoring algorithm that quickly captures plug in plug out of USB device even your home or office network is disconnected or broken. USB drive data theft monitoring utility provides administrative control over entire LAN network and facilitates to restrict any USB port for accessing any type of data, file or document from removable USB device like pen drive, memory stick, flash drive, memory card etc. USB drive activity monitoring software provides complete detail of USB storage drive even any USB media is inserted or removed from any Client PC on network.

  • Publisher: Monitor USB
  • Date: 11-01-2008
  • Size: 3010 KB
  • Platform: Win2000, Windows Server, Windows Vista, WinOther

Search your computer for personally identifiable information Identity Finder application was designed to be an easy-to-use software that will search your computer for personally identifiable information.As a simple, effective, and inexpensive tool that addresses an increasingly critical need not met even by leading antivirus and anti-spyware computer programs, Identity Finder plays a unique and crucial role in helping individuals and small-to-medium sized businesses prevent identity theft.Here are some key features of "Identity Finder Business Edition":Social Security NumbersCredit Card NumbersBank Account NumbersPasswordsSocial Insurance Numbers (Canada)National Insurance Numbers (United Kingdom)National Health Service Number (United Kingdom)Tax File Numbers (Australia)Social Security NumbersCredit Card NumbersBank Account...

  • Platform: Win2000, WinOther, WinVista

Company offers USB data theft protection software that provides tracking for insertion and extraction activities of USB mass storage on client machine over Windows network. Reliable and secure USB drive activity monitoring software runs in hidden mode to track overall activities of USB mass storage device on client system configured on Windows network application. LAN USB drive data security software for Windows network helps to prevent block USB accessing or data theft through USB device in real time by external or unauthorized users. Secure USB drive data leakage protection application enables user to track insertion and extraction of USB mass storage on client system.

  • Platform: Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

Favortools USB Locker is designed to securely control your USB ports, so as to prevent unauthorized data transfer through USB drives and reduce the risk of data leakage and theft. Lock your USB mass storage devices and normalize them in case you want to use to prevent others from copying your data through USB ports. Lock your USB mass storage devices to prevent the running of all USB storage devices. Normalize these devices with single mouse click if you want to run them. Support USB storage drives including zip drives, thumb drives, jump drives, digital cameras, memory sticks, MP3 players, iPods, compact flash cards and many others.

  • Platform: Win2000, Win7 x32, Win7 x64, WinOther, WinVista, WinVista x64

USB Data Theft Protection Tool is compatible to monitor various USB storage device including USB video players, pen drives, Mp3 player, USB Cameras (mass storage), USB Flash cards, USB Audio players, Pocket PCs, mobile phones, Ipods and Other USB mass storage enabled device. Professional USB monitoring software tracks the entire plug in and plug out performed by the USB device in windows network performed in real time on client personal computer system. Software from www.liveusbmonitor.com keeps tracks of all the USB devices activity running on the client system by working in a hidden mode. USB Monitoring software easily captures all performed entire activity, capable to change access permission of any client machine USB port within network domain and prevent unauthorized data transfer.

  • Platform: Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

Windows network USB drive access monitoring software is an efficient LAN based utility that disable pen drives to prevent data theft. USB drive blocking application can examine client machine's activities performed on USB port. Tool plays a special sound when removable flash drive is connected or removed from client computer. USB pen drive blocker program allows you to observe multiple logical drives activities on several computers. Software is fully capable to monitor machines when network cable is not connected to the client system. Flash drive disabling utility is compatible with various USB supported storage drives including zip drive, thumb drive, memory sticks, digital cameras, MP3 music players, jump drives, iPods, compact flash cards etc.

  • Platform: WinOther

Secure it Easy gives you the ability to control the use of USB Flash Drive, iPods, card readers, digital cameras, external hard drives and other portable storage devices, to prevent them from copying data from your PC or copying unwanted data to your PC. With Secure it Easy you also have the option to trace all file transfers from and to the portable storage device. With this detailed File Transfer History you can clearly monitor what user is copying what data from a protected PC. In the past everybody that had a portable storage device was able to copy data from your PC to the portable storage device.

  • Publisher: CoSoSys
  • Date: 24-05-2012
  • Size: 5007 KB
  • Platform: WinOther

Lock Flash drive, DVD/CD writers, PCMCIA ports, Ethernet ports, Printer ports, Infrared ports and Bluetooth port. Options to open single or multiple ports with authorized password. Block ports to prevent unauthorized access. Block ports when PC is idle. Special feature of Print Screen Locking Block ports in scheduled duration. File Transfer Log shows the detail reports of files added, removed and renamed to and from USB mass storage device. Feature of USB Read Only makes any USB mass storage device read only. E-mail Filtering log shows the complete report of filtered and blocked Emails of the MS Outlook client.

  • Platform: Win2000, Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

Ever wondered what would happen if your important data is fallen into the wrong hands? What if your colleague gets hold of your important presentation, or your business competitors get to know about your tender details, or if your personal photographs are got into the hands of someone with malicious intentions? You, definitely, would not like to even imagine such scenarios. But, this is how today\'s technological environment taking shape. Aside all the benefits, the hi-tech IT era comes with several pitfalls too. Employ advanced applications to tackle advanced risks of modern technological environment.

  • Platform: Win2000, Win7 x32, Win7 x64, Windows 8, Windows Server, WinOther, WinVista, WinVista x64

Secure it Easy gives you the ability to control the use of USB Flash Drive, iPods, card readers, digital cameras, external hard drives and other portable storage devices, to prevent them from copying data from your PC or copying unwanted data to your PC. With Secure it Easy you also have the option to trace all file transfers from and to the portable storage device. With this detailed File Transfer History you can clearly monitor what user is copying what data from a protected PC. In the past everybody that had a portable storage device was able to copy data from your PC to the portable storage device.

  • Platform: WinOther, WinVista

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


Skies of War

Skies of war is a top down plane shooter free ware game which really does reinvent the concept, and add a great deal to it. In skies of war you are a plane tasked with destroying a vast number of bases, enemy units and enemy planes. As you play ...


MarkdownPad

It is not really difficult to create basic webpages, having said that, if you don’t know about HTML, it can be a tedious task. HTML stands for Hypertext Markup Language which basically is used to create webpages. It is not a difficult language ...


SD QuickExec

Im always scouting the internet looking for quality applications that’ll help me save time carrying out some of the basic things I do every time I switch on my computer. For example, launch my internet browser, email client, iTunes and so on. ...


Castle Wars

Castle wars is a unique blend of the strategy genre with a small amount of war and micro management elements added in to make it more unique. In castle wars the aim is to eliminate all the other players from the map, and become the only player left ...


AM Browser

AM browser is a freeware browser from 2009, which markets itself allowing you to surf the web in a more comfortable, less confusing way. Once you install and open AM browser, the first thing you will notice is how out dated the look of it is. Most ...


Flower Power

Flower power is a freeware puzzle game which is very similar in gameplay style and nature to the classic arcade game bejeweled, taking all the basic concept, idea and gameplay from bejeweled, and adding its own twist in the form of the art style of ...


Kaspersky Internet Security

With increasing use of Internet, there is increase in rate of transfer of malware and therefore more threat to your Computer. Security is an essential part of anything, be it your life or be it your PC. If your Personal Computer isn’t secure, ...


Hide Files & Folders

Hide Files and Folders is a program that will let you password protect files and folders on your Windows system, preventing unauthorized access to them.

Hide Files and Folders gives you five different ways to protect data on your ...


Simple Sticky Notes

Simple sticky notes is a freeware note taking utility to appeal to users in the same way in which a physical sticky note would; by allowing you to write something down very quickly with very little effort (without having to open a program or pull ...



New Downloads

File Viewer Express

File Viewer is an multi
purpose Disk/File Management
Program with functions for
finding, viewing, printing,
email, and ...

ClickCharts Free Flowchart
Software

ClickCharts Free Diagram and
Flowchart Software lets you
lay out your ideas,
organization, process or
create UML ...

Advanced TIFF Editor

TIF (TIFF), PDF, EPS, AI, FAX,
DCX editor and converter,
offers you a full solution for
viewing, editing, printing,
...

Happytime Onvif Client

Happytime Onvif Client is a
Network Video Client (NVC) to
manage Network Video
Transmitters (NVT) devices.
Full support ...

SmartsysSoft Business
Publisher

SmartsysSoft Business
Publisher lets you design
address labels, flyers,
brochures, business cards,
newsletters, ...

Portable Efficient To-Do
List Free

Efficient To-Do List Free is a
cross-platform task manager.
It makes every effort to
assist you in following the
"First ...

RoboTask

RoboTask allows you to
automate any combination of
tasks on your computer,
ranging from simply launching
applications, to ...

Banners Module for Directy
CMF

The Banners Module allows
administrator to upload images
for banner and display them in
banner slider on the site or
...

Multimedia Xpert

Convert, extract, split,
concatenate, join, shift
audio, burn in text or images,
scan for defects, repair and
display ...



Related Searches

Data Leakage Prevention Email
Css Prevent Data Input
Disable Data Leakage Prevention
Mining Your Data How Prevent
Prevent Copy Data Cd
Prevent Devices Data Transfer Usb Port
Prevent Flash Data Transfer
Prevent Copy
Data Be Copying
Corrupt Data
Data County
Data Driv Crash