All / Freeware / Mobile

Data Leakage

Size: 6.7 MB | License: Shareware | Price: US$52.33
Category: Security and Encryption
EagleEyeOS One Quick and easy-to-manage data protection solution to prevent data leakage. Documents are protected from the unauthorized accesses efficiently and up to date. It generates alerts about portable devices connected illegally to the computer. Access policy can be created for mobile devices (Floppy, CD, DVD, InfraRed, COM, LPT, USB, Bluetooth, Wireless, etc.). Documents are protected in isolated areas.
Size: 35.4 MB | License: Shareware | Price: US$83.48 | Category: Security and Encryption
EagleEyeOS Professional Powerful and flexible security solution against data leakage. The program provides full-scale protection; it uniquely combines file lifecycle tracking with portable data stores and rights management for users and/or files. It allows you to track and enforce compliance with security policies and standards, and provides real time notification and post-event analysis of user activities and incidents.

OS: Windows
Software Terms: Data Leakage, Datasecurity, Devices, Eagleeyeos, Filemonitoring, Filesecurity, Logging, Snapshot, Sql, Storages
Size: 134.2 MB | License: Shareware | Price: US$20 | Category: Security and Encryption
AccessPatrol AccessPatrol provides a proactive solution for securing endpoints (USBs, CDs/DVDs, BlueTooth, WiFi, iPods, MP3s) to prevent illicit transfer of data to unauthorized devices. Benefits: - Totally block access to any portable devices such as USBs, CDs, DVDs, iPods, MP3 players, WiFi, FireWire, Bluetooth etc., thus reducing any incidences of confidential data leakage or virus infections of the network. - Through...

OS: Windows
Software Terms: Block Usb Devices, Device Lock, Disable External Devices, Disable Portable Devices, Disable Usb, Endpoint Device Security, Lock Storage Devices, Portable Storage Devices, Power Management, Prevent Data Theft Leakage
Size: 1.2 MB | License: Shareware | Price: US$45 | Category: Security and Encryption
SecrecyKeeper SecrecyKeeper is designed for companies and security services. With its help you can protect your company from accidental confidential information leakage caused by your employees’ carelessness. Common security software is absolutely useless in combating unauthorized data leakage caused by your employee's negligence or intentional harmful actions. A successful company's most trustworthy and devoted employees often become characters...

OS: Windows
Software Terms: Access, Block, Confidential, Control, Data, Employee, Information, Insider, Leakage, Mandatory
Size: 5.5 MB | License: Shareware | Price: US$24.95 | Category: Security and Encryption
Secure it Easy - USB Firewall Protect your data and control what portable storage and USB devices are used on your PC. See what data has been transferred from or to your PC. Prevent others from stealing data through the USB port with a USB Flash Drive or other portable device. Secure it Easy gives you the ability to control the use of USB Flash Drive, iPods, card readers, digital cameras, external hard drives and other portable storage devices, to prevent them from copying data from your PC or copying unwanted data to...

OS: Windows
Software Terms: Data Leakage, Data Loss, Endpoint Security, File Monitoring, File Tracing, File Transfer History, Intrusion Prevention, Podslurping, Usb Disable, Usb Firewall
Size: 279.5 KB | License: Freeware | Category: Firewall and Router
PrefixNE PrefixNE SOHO - Gives you Power and Control over your network assets, all wrapped up in one complete solution. With PrefixNE SOHO you'll know exactly what is happening on your Network PCs. Easy install, ready in minutes! PrefixNE provides everything you need to secure and retain full control of your network assets. Saving you time, reducing risk and boosting network availability and user productivity, it’s the IT professional’s essential toolkit. The suite...

OS: Windows
Software Terms: Asset Inventory, Asset Tracking, Data Leakage, Endpoint Security, Hardware Audit, Hardware Inventory, License Tracking, Monitoring, Network Management, Network Security
Size: 2.6 MB | License: Shareware | Price: US$12.95 | Category: Security and Encryption
EasyLock EasyLock is an enterprise grade portable data encryption solution for every computer user, from novice to expert, helping anyone turn any mobile storage device into a portable data safe. EasyLock protects your data: simple, fast, convenient and very secure. The crypto engine provides military and government- approved 256bit AES CBC-mode encryption. The intuitive interface lets you drag & drop files and folders to your portable device and...

OS: Windows
Software Terms: Data Compression, Data Protection, Endpoint Protector, Enforced Encryption, Intuitive Drag Drop Interface, Portable Applications, Portable Storage, Usb Flash Drive Protection
Size: 10.7 MB | License: Shareware | Price: US$39.99 | Category: Anti-Virus Scanners
Security Shield 2010 Security Shield 2010 Offers a Complete Internet Security Suite. Antivirus, Antispyware, Antispam, Firewall, Privacy Control, Parental Control, Identity Theft, Confidential Data Leakage, Security Shield 2010 gives you the best protection available today. Our Triple Threat Protection is a unique set of technologies that protect against identity theft, confidential data leakage and all Internet threats. Add privacy and parental...

OS: Windows
Software Terms: Antivirus Software, Firewall Protection, Identity Theft, Internet Security, Phishing Protection, Security Software, Spyware Protection
Size: 4.3 MB | License: Freeware | Category: Security and Encryption
My Endpoint Protector My Endpoint Protector provides device control and data loss prevention to everyone who want to centrally manage and control the use of USB, FireWire and other ports and portable storage device use. It works for PC and Mac OS X. Free for personal use. It is a SaaS Solution, meaning the management is happening in the cloud over an internet browser. My Endpoint Protector Key Benefits: 1. Centrally manage your endpoint / device use from...

OS: Windows, Mac
Software Terms: Block Usb, Data Loss Prevention, Device Control, Dlp, Firewire Lockdown, Hosted Services Endpoint Security, Portable Device Control, Saas, Security As A Service, Stop Data Leakage
Size: 3.2 MB | License: Shareware | Price: US$39.95 | Category: Backup and Restore
Leo Backup Leo Backup is a program designed for Windows and intended for backing up your data in various locations, including secure servers (SFTP and FTP/SSL) and network drives. Effective file protection and access verification options let you keep your network and data intact and maintain a stable and secure data management. Secure protocols support, interface password, special authorization methods, files encryption provide you and your company with...

OS: Windows
Software Terms: Access, Active Directory, Authorization, Backup, Com, Compression, Encryption, Filter, Ftp Ssl, Private Key
Size: 13.3 MB | License: Demo | Price: US$7.99 | Category: Security and Encryption is an invention to protect secret inside USB drives by pairing them with authorized computers. I shall no longer worry to lose my secret. Even the password is cracked, no one could access the information inside, except me. Tiny but high volume USB drives are overwhelming the market. Although these devices have provided mobility on data transfer, they lead to an increasing concern on data leakage problem to both corporate and...

OS: Windows
Software Terms: Data Leakage, Encryption, Flash Drive, Flash Drive Encryption, Free Encryption Software, Password Protect Flash Drive, Password Protect Usb Drive, Protect Storage, Secure Flash Drive, Security
Size: 11.8 MB | License: Commercial | Price: US$5000 | Category: Web Server Tools
ArtistScope Site Protection System ArtistScope Site Protection System provides the most secure copy protection for web pages, images, html, source code, Flash, movies, PDF, database records and other web content without data leakage and other exploits enabled by modern web browsers. The ArtistScope Site Protection System, ASPS, provides the most secure copy protection for web pages and is the only solution recommended where the prevention of copy and unauthorized redistribution is mission critical. Protect images, html,...

OS: Windows
Software Terms: Copy Protect, Protect Site, Protect Web, Secure Browser, Site Protection, Web Browser, Web Reader
Size: 1.9 MB | License: Freeware | Category: Security and Encryption
BestCrypt Traveller BestCrypt is easy-to-use, powerful data encryption software. BestCrypt is easy-to-use, powerful data encryption software. You allocate a portion (container) of free space of your drive where you keep all your sensitive data in encrypted form. BestCrypt creates a virtual drive in your system which you work...

OS: Windows
Software Terms: Clearing, Data Leakage, Data Loss, Data Protection, Delete File, Dod, Dod 5220 22-m, Encryption Software, Erase, Firewall
Size: 2.9 MB | License: Freeware | Category: Security and Encryption
BCArchive With BCArchive software you may encrypt and compress a group of files/folders to an encrypted archive (i. With BCArchive software you may encrypt and compress a group of files/folders to an encrypted archive (i.e. single file). You may store all you confidential files in such archive accessing it whenever you need it. All your files are encrypted,...

OS: Windows
Software Terms: Clearing, Data Leakage, Data Loss, Data Protection, Delete File, Dod, Dod 5220 22-m, Encryption Software, Erase, Firewall
Size: 13.6 MB | License: Shareware | Price: US$59.95 | Category: Security and Encryption
BestCrypt for Windows BestCrypt creates and supports encrypted virtual disks, which are visible as regular disks with corresponding drive letters (for example, D:, K:, Z:, i.e. with any drive letter that is not used by another system device). The data stored on a BestCrypt disk is stored in the container file. A container is a file, so it is possible to backup a container, move or copy it to other disk (CD-ROM or network, for instance) and continue to access your...

OS: Windows
Software Terms: Clearing, Data Leakage, Data Loss, Data Protection, Delete File, Dod, Dod 5220 22-m, Encryption Software, Erase, Firewall