Software Listing: Secure Endpoint

MyUSBOnly will help you lock the Bad Guys out of your USB ports; Block Untrusted USB Memory Stick Activity in Office. Secure Your Files: Stealing information - or just reading it without permission - is a lot easier than it used to be. Prevent data theft by blocking all but your trusted USB storage devices.

Stop your files from walking away on thumb drives, MP3 players, flash cards and portable USB hard drives. Secretly log all USB connect, disconnect and files/folders copied, modified, deleted activity. Run it invisibly, so you can catch, as well as deter, problem coworkers, visitors, family members, or managers.

  • Platform: Win2000, Windows 7, WinOther, WinServer, WinVista, WinVista x64

MyUSBOnly will help you lock the Bad Guys out of your USB ports; Block Untrusted USB Memory Stick Activity in Office. Secure Your Files: Stealing information - or just reading it without permission - is a lot easier than it used to be. Prevent data theft by blocking all but your trusted USB storage devices.

Stop your files from walking away on thumb drives, MP3 players, flash cards and portable USB hard drives. Secretly log all USB connect, disconnect and files/folders copied, modified, deleted activity. Run it invisibly, so you can catch, as well as deter, problem coworkers, visitors, family members, or managers.

  • Platform: Win2000, Windows 7, WinOther, WinServer, WinVista, WinVista x64

Comodo Endpoint Security Manager (CESM) enables the remote, centralized management of end-point security products such as Comodo Internet Security on corporate workstations. With Comodo Endpoint Security Manager you will save time, money and increase network wide security. Unlike conventional security software providers; Comodo has adopted a Default Deny Protection model.

Default Deny Protection takes an advanced approach to preventing security breaches and reducing downtime. By working within the universe of known and safe executables, unknown applications within the environment are challenged prior to execution.

  • Platform: Win7 x64, Windows 7, WinOther, WinServer, WinVista, WinVista x64

Naturally this also includes Avira Management Console to efficiently administer the Avira virus protection.

Avira Endpoint Security brings together the protection of desktop PCs and file servers in a single license under Windows and Unix/Linux. This ensures your network is secure against viruses, worms, Trojans, adware, spyware and other malware.
.

  • Platform: Win7 x64, Windows 7, Windows 8, WinOther, WinServer, WinVista, WinVista x64

When you print checks, you need a secure way to print the amount. This package includes six different Secure Number fonts. These fonts let you print check amounts in dollars, pounds sterling, euros, or yens that are very hard to alter. You get six styles of Secure Number fonts, and each style comes in a standard version and a version with the word for each character or number printed below it..

  • Platform: WinOther

Secure Address Book for Windows allows you to protect your email contact information in a secure, encrypted database file that is totally immune to email viruses and worms. Now you can completely protect your valuable email contact information. Never be embarrassed by email viruses and worms again! Your business and personal contacts will really appreciate this!.

  • Platform: WinOther

Secure Network Messenger (SNM) - is a real time network communication program able to send and receive messages and files from one computer to another without using dedicated servers. SNM is especially designed to work with medium and large local area networks, but it is also convenient for small local networks consisting of two and up to several dozen computers.With SNM, your employees will be able to communicate without leaving working places..

  • Platform: WinOther

Secure Information Courier brings secure email encryption to your organization's web site. Visitors to your web site can send secure email to your organization and even convey digital documents securely using industry standard encryption. Secure Information Courier is easy to use and nothing is assumed about the skill level of visitors to your site or about software pre-installed on their computers..

  • Platform: WinOther

SecEx is a network file manager and secure terminal emulator that allows encrypted file transfer between your PC and network servers running Secure Shell. SecEx seamlessly interoperates with either SSH1 or SSH2 servers on both Unix and Windows operating systems. You can transfer files to and from remote servers, view remote files, and execute remote files on your local PC - using strong, industry standard encryption. If you are a travelling executive who wants to access files on a corporate server or a system administrator maintaining a remote site, SecEx is your complete remote file management solution.

  • Platform: Win2000, Windows Server, WinOther

Secure and safe web surfing software to surf Internet anonymously. ProxyWay provides high Internet anonymity, guards your privacy, helps to optimize Internet surfing and speeds up web surfing by eliminating ads and popups. ProxyWay is anonymous web surfing software that makes you invisible to the web sites you visit: hides real IP (anonymous proxy surfing), changes computer information that is sent out by your web browser (User-Agent, Referrer), prevents scripts and Java applets from running without your knowledge, removes traces of computer and Internet activity. Using ProxyWay you can create proxy services with any number of proxy servers in the chain (supports HTTP, HTTPS, SOCKS4 and SOCKS5) to provide IP address security and tunnel Internet activity through proxy servers.

  • Platform: Win2000, WinOther

Copy protect the images on your web site or CD using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the html page the image is first encrypted for insertion into a viewer. It is the applet viewer that sits on the page replacing the image. The encrypted image is unusable unless displayed from its viewer. It is only the encrypted images that are uploaded to the server, so the master images are safe from everyone.

  • Publisher: ArtistScope
  • Date: 13-10-2004
  • Size: 1819 KB
  • Platform: Mac OS X, Mac PPC

Copy protect the images on your web site or CD using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the html page the image is first encrypted for insertion into a viewer. It is the applet viewer that sits on the page replacing the image. The encrypted image is unusable unless displayed from its viewer. It is only the encrypted images that are uploaded to the server, so the master images are safe from everyone.

  • Publisher: ArtistScope
  • Date: 20-08-2003
  • Size: 1372 KB
  • Platform: Mac OS X, Mac PPC

Secure Hive is a powerful tool for secure archiving and sharing of files. It enables you to create encrypted archives and self-extracting .exe files for secure storage and file sharing. It also includes a simple but powerful means of encrypting parts of, or entire, documents, email messages, etc. Secure Hive offers the enterprise a method of: Securing sensitive documents Protecting information during transfer Securing emails Securing portions of a document (e.g. individual graphics or clauses in a contract) Protecting the integrity of your company by ensuring information is kept confidential Controlling access to documents and files using digital certificates Unlike other, similar, products Secure Hive incorporates a number of features that make it ideal for both enterprise and personal use:...

  • Platform: Win2000, WinOther

Secure File Vault is a file and folder locker software incorporating 128 bit encryption techniques.This data encryption software not only locks your 'Content Sensitive' files and folders quickly and professionally using 128-bit Thayer encryption, but also makes it unable for others to view or use them without your consent. It has security features like file locker,security vault, email encryption. Other features include password manager,file shredder and favorites manager.It is the ultimate file locking utilty with an easy to use interface. Each Feature designed for maximum simplicity, security and utility.

  • Platform: Win2000, WinOther

When you work on your computer surfing the Internet, paying your bills online, logging in with passwords, your PC records the information traces of all your actions. For example, the history of all web sites you visited, all the pictures you downloaded, all the pages and text you saw, are recorded by the system. So when you log in next time, you don't need to type the user names and passwords again. The information that you may consider as confidential is kept on your computer unprotected and may be recovered by people with some minimal computer knowledge. In general, this is done for ease of use, but the problem is you compromise with your security by using these features.

  • Platform: Win2000, Windows Mobile, Windows Server, WinOther

Set up a VPN server in less than 1 minute. Free client software. Using powerful 256-bit AES encryption technology, the iOpus Private Internet Gateway (iPIG) creates a secure "tunnel" that protects your inbound and outbound communications (Email, Web, IM, VOIP, calls, FTP, etc.) at any Wi-Fi hotspot or wired network. iPIG shields your data from even the most sophisticated methods of online spying and snooping like the "Evil twin attacks". In addition, your sensitive information is not only protected between your computer and the wireless access point you're using, but all the way to iOpus' secure connection servers deep in the Internet.

  • Platform: Win2000, Windows Server, WinOther

BigSpeed Secure Socket Library is an ActiveX control that dramatically simplifies and accelerates the development of proprietary communication solutions over the Internet. It implements a flexible message-oriented protocol on top of a single TCP connection. The transfered data are scrambled using on-the-fly 128-bit AES encryption with random session keys, without need of SSL certificates. The security is provided in two different modes: symmetric encryption with shared secret key and asymmetric encryption with 1024-bit public/private keys. Transport level authentication is available with optional digital fingerprints or secret keys.

  • Platform: Win2000, Windows Server, WinOther

SafeIT Secure Disk is a user-friendly program that allows you to prevent unauthorized access to restricted documents. The program makes a part of your current hard disk a secure disk. All private and confidential information stored on this disk will be protected using strong encryption. Your secure disk is only accessible by entering the correct password. The program is easy to install and the step-by-step guides will walk you through the process of creating your own secure disk. After installation, the user friendly interface makes securing a file as easy as copying it. The encryption technology used supports several encryption algorithms, including the new AES-standard Rijndael with key length of 256 bits.

  • Platform: Windows Server, WinOther

Want to be absolutely sure your data is always protected? Want to have your files encrypted but don't want to hinder access to them? Get Secure Storage Pro, a virtual disk utility that encrypts data on the fly. Place all your confidential data (files, folders, documents, pictures, e-mails, etc) onto a virtual disk and set the password. Only the password bearer will be able to access data, the others won't even know it's there! Virtual disk technology was invented by the KGB, FBI and CIA computer specialists (separately) who found the way to hide the contents of the disk and encrypt them. Now you can use this technology with some minor improvements for your own benefit.

  • Platform: Win2000, Windows Server, WinOther

Internet Secure Tunneling can forward otherwise insecure TCP traffic through encrypted SSH Secure Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwise be insecure. The tunneling capability of SSH Secure Shell is a feature that allows, for example, company employees to access their email, company intraweb pages and shared files securely by even when working from home or on the road. Tunneling makes it possible to access email from any type of Internet service (whether accessed via modem, a DSL line or a cable connection, or a hotel Internet service).

  • Platform: Win2000, Windows Server, WinOther

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


SpeedUpMyPC

SpeedUpMyPC is a program which apparently has the capabilities to boost your system performance by resolving computer issues it finds after scanning though your system SpeedUpMyPC is most definitely not the only piece of software that claims to be ...


Kryptelite

Kryptelite is an application that can help you quickly and simply encrypt your files. File encryption can be very important, as its an effective way to help prevent unauthorized access to your files and their contents, and acts as a layer of ...


IE Internet Security

IE Internet Security isn't the program that I thought it’d be. After a bit of Googling, I discovered that IE Internet Security is in fact embedded into one larger application called 1st Security Agent, which is an all in one tweaking ...


Wise Disk Cleaner

Everybody computer is full of temporary and unnecessary files! Even if you don’t know they are there, they are! Wise Disk Cleaner helps to rid your system of these useless files that are just sitting around taking up your disk space. ...


WinLock

WinLock is a program that helps users lock down and limit access to certain functions of a Windows PC. Applications such as WinLock are crucial in environments where public access is allowed to PC’s, such as libraries or internet cafes, as ...


Wise Registry Cleaner

Wise Registry Cleaner is a free registry cleaner, that is in fact more than just a registry cleaner. Its main purpose is to indeed clean your computer registry, but it also acts as a general system tune up tool, as well as a registry defragmenter, ...


TopDesk

It feels better, when the main screen of the computer looks good. However, in most of the cases, you would find the main screen or desktop of the computer is filled with the ugly looking icons which spoil the beauty of your desktop, and there comes ...


Internet Explorer

There was once a time when the browser world was dominated by a single piece of software from Microsoft. Yes, we're talking about Microsoft's Internet Explorer. The internet has evolved and so have browsers. As a result, we have numerous ...


Vehicles 2

Vehicles 2 is a great example of innovation in a game, from the very beginning cut scene (which explains the general back story to the game in a very light, humorous way) to the gameplay style, it has a lot of influence from other games in the ...



New Downloads

VyprVPN for Mac

The VyprVPN for Mac
application automatically
configures and simplifies
managing your VPN connections.
Switch freely ...

RoboTask

RoboTask allows you to
automate any combination of
tasks on your computer,
ranging from simply launching
applications, to ...

Wayk Now

Wayk Now lets you take control
of a remote computer, or allow
an authorized user to take
control of your computer. Wayk
...

Active@ UNDELETE

Losing important data due to
accidentally deleting it or
formatting a disk can leave
you in a very bothersome
situation. ...

Bank2IIF

Finally, the solution to
import your transactions in
the IIF format. Convert
QFX/OFX/QBO/QIF to IIF and
import into ...

Event Registration Pro
Calendar

Event Registration Pro
Calendar is the best open
source software for online
event registration and event
booking for your ...

Check Writer III Plus macOS

Print checks and their
accompanying letter directly
from your Mac with this easy
to use check printing
application : ...

Secure IT Encryption
Software

Encrypt and compress any type
of data on any Windows PC with
Secure IT File Encryption
Software. Shred any file or
...

WidsMob HDR Plus

WidsMob HDR Plus recreate HDR
effects as eye view with 3
bracketed images in JPEG and
RAW formats. It also provides
...



Related Searches

F Secure Endpoint Usb Software
Secure Da Creak
Dod Secure Dat
Break Secure Wireless
F Secure
Invisible Browsing Secure
Lan Secure
Secure Delete Pro
Secure E Mail
Secure Vnc
Wave Secure
Pdf Secure Sa