Data Leakage Prevention 4.0.0.1
Today’s competitive corporate environment puts your important data at a greater risk of theft and leakage scenarios. It, therefore, becomes increasingly important for modern organizations as well as individuals to take advanced measures for ensuring ...
- Audio & Multimedia
- Business
- Communications
- Desktop
- Development
- Education
- Games
- Graphics
- Home & Hobby
- Network & Internet
- Screen Savers
- Security & Privacy
- Servers
- System Utilities
- Web Development
- PickMeApp Pro
- imyPass iPassGo
- RPM Remote Print Manager...
- GHC Timetables generator EN
- ExtraDisks Home
- FTP Client Engine for...
- Professional File Recovery...
- 7Caps
- BriskBard
- DocPad
- VidMasta
- Aml Pages
- BW Meter
- PDFMarkz
- ToolsBaer MSG to HTML...
- ADRC Data Recovery Tools
- avast! Antivirus
- Revo Uninstaller
- Java Runtime Environment
- AVG Anti-Virus Free Edition
- GOM Media Player
- RegSeeker
- IrfanView
- CPU-Z
- Malwarebytes Anti-Malware
- Spybot Search & Destroy
- Skype
- µTorrent
- Ai File Extension Editor
- Remove Drm From Pdf Files
- Download Word Templates For...
- Assault Cube Sounds
- Download Song As Zip File
- Rankquest Watchseo
- Free Becker Cpa
- Creative Smiley Faces Text
- Portable Photo Editor Free...
- Screen Capture Master
- Bat Merge
- Daz Iso Compressor
- Destroy Recycle Bin Windows
- Decode Firefox Cache File
- Link Directory Script
Data Leakage Download
-
1$30.00
Buy -
2AirStop Endpoint Security Software
AirStop is an endpoint security solution which prevents data leakage by controlling all communications adapters and storage devices on laptop and desktop computers. Designed for enterprise applications, the software enforces security policy by allowing ...$45.00 -
3AirStop Sticky Wireless Edition
The AirStop Client is a wireless endpoint security solution which prevents data leakage by controlling communications adapters and storage devices on laptop computers. Unique features include "Sticky Wireless"(TM) functionality which ensures ...$60.00 -
4Lumension Device control 4.4
Lumension® Device Control enforces flexible usage policies for removable devices, removable media, and data (such as read/write, encryption) that enable organizations to embrace productivity-enhancing tools while limiting the potential for data ...$37.94 -
5Jihosoft Free Eraser 2.0
Have some sensitive information on your computer and worry about the data leakage one day? Now with Jihosoft Eraser, you can permanently remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Key ...Freeware -
6Security Shield 2008 7.0.1
Our Triple Threat Protection is a unique set of technologies that protect against identity theft, confidential data leakage and all Internet threats. Add privacy and parental controls, an integrated firewall, a new and improved interface and much, much ...$39.99 -
7AccessPatrol 4.2
, thus reducing any incidences of confidential data leakage or virus infections of the network. - Through the Allowed List, permit use of only company authorized USBs, FireWire and External Hard Drive devices. -Assign security levels of full access, ...$79.00
Buy -
8USB Data Leakage Protection
Data theft protection tool for USB drive prevent you from unofficial data transfer through USB mass storage media. Monitoring software alerts by playing sound when any pen / thumb drive is connected at any machine in local area network. Surveillance ...$120.00 -
9EasyLock 1.0.4.8
EasyLock is an enterprise grade portable data encryption solution for every computer user, from novice to expert, helping anyone turn any mobile storage device into a portable data safe. EasyLock protects your data: simple, fast, convenient and very ...$12.95
Buy -
10USB Drive Guard 1.1
USB Drive Guard is a data leak prevention (DLP) security solution that enables network administrators to centrally control USB drives on the network. This application runs silently on any windows PC and when someone inserts any type of storage device ...$49.00 -
11Axence nVision 9.1.1.23337
The program provides network and user activity monitoring, software and hardware inventory, data leakage protection, remote control, and a wide range of reports, alerts and corrective actions - all with a user-friendly and very intuitive interface. ...$1,000.00
Buy -
12GFI EndPointSecurity 2009
With GFI EndPointSecurity you are able to prevent users from stealing confidential company data or introducing malware such as viruses and Trojans to your network. Available in FREEWARE mode and used by thousands of customers, GFI EndPointSecurity allows ...$297.50
Buy -
13SecretsSaver 3.05
SecretsSaver allows grouping data stored on workstations and servers by information security level and define users that may access that information by users access level. SecretsSaver will help you prevent both accidental data leakage and intentional ...$70.00 -
14Protegent Enterprise Security 2.1
Protegent Enterprise Security is an advanced security solution available for remotely managing the data security of a close knitted network. It has a centralized management console, which enables the administrators to manage data/information flow from ... -
15JumbleDB 1.0
JumbleDB is a complete database scrambling solution which allows protection of sensitive data in non-production environments. JumbleDB supplies the database/security administrators with a comprehensive set of tools that enable: a) Detection of sensitive ...$200.00 -
16LAN USB Controller 2.0.1.5
Analyzer application prevents unauthorized copying of your confidential data on USB sticks/drives. Software is helpful for IT companies, financial institutions, law firms, college and many more. Help option aware you with working and functionality of ...$120.00 -
17Axence nVision Pro 8.5.2.21100
The program provides network and user activity monitoring, software and hardware inventory, data leakage protection, remote control, and a wide range of reports, alerts and corrective actions - all with a user-friendly and very intuitive interface! ...$425.00
Buy -
18NetWitness Investigator 9.7
Investigator provides security operations staff, auditors, and fraud and forensics investigators the power to perform unprecedented free-form contextual analysis of raw network data. You need to know everything that is happening on your network and ... -
19SpectraGuard SAFE 3.1
Confidential business data often resides on employee laptops. Protect against data leakage when laptops use wireless connections in the office, on the road, at home or at airports.$2,000.00 -
20Complete Security Software 3.0.0
In the wake of risky programs and malicious codes attempting to put your data and information at stake, Protegent 360 comes as a foolproof security application which ensures comprehensive protection without compromising on performance. This remarkable ...$53.00
Buy -
21Advanced Port Locker Software
As these harmful elements may destroy the dignity of the data as a whole and make them lost, deleted or even futile. Port Locker works affirmatively with every platform and every hardware configuration. This tool is very flexible as it has the capability ...$30.00
Buy -
22ToolsBaer EML to PST Conversion 1.0
The users have an option to convert their entire EML files data into the PST format or can convert a single EML file by this amazing tool. Even the user can enter the unique name of the file and can save it according to their wish where they want the ...$29.00
Buy -
23ActivTrak for MacOS 8.3.3.0
ActivTrak captures user activity data in the digital workplace, helping teams address security and compliance concerns while also identifying opportunities for greater engagement, productivity and efficiency. Unlike traditional UAM providers that offer ...Freeware -
24ActivTrak for Windows 8.4
ActivTrak captures user activity data in the digital workplace, helping teams address security and compliance concerns while also identifying opportunities for greater engagement, productivity and efficiency. Unlike traditional UAM providers that offer ...Freeware -
25modusGate 5.0
Designed to help protect against data leakage of personal, financial or proprietary information through email, it will: * Allow organizations to protect their valuable information against theft and accidents. * Enforce and monitor company policies ...$1,500.00
Buy