USB Data Leakage Protection
Data theft protection tool for USB drive prevent you from unofficial data transfer through USB mass storage media. Monitoring software alerts by playing sound when any pen / thumb drive is connected at any machine in local area network. Surveillance ...
- Audio & Multimedia
- Business
- Communications
- Desktop
- Development
- Education
- Games
- Graphics
- Home & Hobby
- Network & Internet
- Screen Savers
- Security & Privacy
- Servers
- System Utilities
- Web Development
- SSuite NetSurfer Browser x64
- UltraFileSearch Std
- Pen Drive Recovery Free
- Aiseesoft iPhone Cleaner...
- AnyMP4 Blu-ray Ripper
- Apeaksoft iOS Unlocker
- Apeaksoft Screen Recorder...
- AnyRec Video Enhancer
- Windows Data Files Undelete
- Data Unerase Software
- Mac Removable Media File...
- Data Recovery Software
- Vista Partition Data...
- Softaken MS PowerPoint...
- Verwijderde Bestanden...
- ADRC Data Recovery Tools
- avast! Antivirus
- Revo Uninstaller
- Java Runtime Environment
- AVG Anti-Virus Free Edition
- GOM Media Player
- RegSeeker
- IrfanView
- CPU-Z
- Malwarebytes Anti-Malware
- Spybot Search & Destroy
- Skype
- µTorrent
- Ai File Extension Editor
- Remove Drm From Pdf Files
- Download Word Templates For...
- Assault Cube Sounds
- Download Song As Zip File
- Rankquest Watchseo
- Free Becker Cpa
- Creative Smiley Faces Text
- Portable Photo Editor Free...
- Screen Capture Master
- Bat Merge
- Daz Iso Compressor
- Destroy Recycle Bin Windows
- Decode Firefox Cache File
- Link Directory Script
Data Theft Download
-
1$120.00
-
2USB Drive Blocking Software 2.0.1.5
Disable pen drives access to protect important files from data theft activities. USB flash drives blocker software helps you to disabling removable media drive. Tool can remotely control multiple client machines having local area network connection. ...$120.00 -
3Enterprise Security Reporter 3.00
Enterprise Security Reporter automates the documentation of Windows security for compliance audits and security reviews, preventing data theft, protecting confidential records and meeting regulatory requirements. -
4Data Leakage Prevention 4.0.0.1
Today’s competitive corporate environment puts your important data at a greater risk of theft and leakage scenarios. It, therefore, becomes increasingly important for modern organizations as well as individuals to take advanced measures for ensuring ...$30.00
Buy -
5MyUSBOnly 6.7
Without MyUSBOnly, your data can be easily stolen by any of the people who come in and out of your home or office every day. With MyUSBOnly, your information is protected. Prevent data theft by blocking all but your trusted USB storage devices. Stop ...$29.90 -
6USBSE Pro 1.8
It can help protect you against data theft. USBSE Pro is the best software that helps you control USB stroage devices. For each USB storage device, you can set three Modes: Disabled, ReadOnly or Read/Write. You can protect your confidential data from ...$35.00
Buy -
7PCBooster Free File Locker 7.3.4
PCBooster Free File Locker is a safeguard against any kind of data theft or the loss of data during a system crash. It provides most advanced cryptographic algorithms and allows you to use your own password to preserve file secrecy and confidentiality.Freeware -
8Data Protecto 2.1.2
Data Protecto is the world's best file encryption software for your computers. It also features the most Secure Online Cloud Storage Service with Encrypted File Sharing with your friends. Data Protecto helps you protect your files, folders, drives, ...$34.95
Buy -
9EasyLock 1.0.4.8
EasyLock is an enterprise grade portable data encryption solution for every computer user, from novice to expert, helping anyone turn any mobile storage device into a portable data safe. EasyLock protects your data: simple, fast, convenient and very ...$12.95
Buy -
10USB Drive Guard 1.1
USB Drive Guard is a data leak prevention (DLP) security solution that enables network administrators to centrally control USB drives on the network. This application runs silently on any windows PC and when someone inserts any type of storage device ...$49.00 -
11Lumension Device control 4.4
Lumension® Device Control enforces flexible usage policies for removable devices, removable media, and data (such as read/write, encryption) that enable organizations to embrace productivity-enhancing tools while limiting the potential for data ...$37.94 -
12AccessPatrol 4.2
, thus reducing any incidences of confidential data leakage or virus infections of the network. - Through the Allowed List, permit use of only company authorized USBs, FireWire and External Hard Drive devices. -Assign security levels of full access, ...$79.00
Buy -
13SecretsSaver 3.05
SecretsSaver allows grouping data stored on workstations and servers by information security level and define users that may access that information by users access level. SecretsSaver will help you prevent both accidental data leakage and intentional ...$70.00 -
14dgdiscover 3.2
Enterprises constantly make copies of production application data to support development, testing, QA and business analysis. While most organizations have locked down their production environments sensitive data in non-production environments is exposed ...$53.00 -
15LAN USB Controller 2.0.1.5
Analyzer application prevents unauthorized copying of your confidential data on USB sticks/drives. Software is helpful for IT companies, financial institutions, law firms, college and many more. Help option aware you with working and functionality of ...$120.00 -
16SecuBox for Smartphone 1.6
SecuBox provides on-the-fly encryption of sensitive data stored on Windows Mobile smartphone and its removable cards. Creates an encrypted volume that looks and feels like a smartphone memory card. Data written to this card is transparently encrypted ...$39.95 -
17Kryptel 6.4
But your data may be no less important. Data theft can be as bad as property theft and sometimes it can easily ruin an emerging business. It is time to think about security of your data, and encryption software is the only reliable way to ensure it.$29.95
Buy -
18abylon LOGON 11.00.2
memory stick), or a CD/DVD with your windows login data and in the future this medium is your authentication for the computer. It is possible to use a two-factor authentication as optional extended protection. Beside the physical key a master-password ...$28.00
Buy -
19USB Security Application 2.5
Main features: - Blocks unauthorized USB devices of all kinds - Helps prevent data theft and virus infections - White-lists permit using devices such as printers, keyboards and mice - Optional password-protection allows operating certain USB devices ...$34.95 -
20All-In-One Protector Premium Plus
Companies, for example, can safeguard conference materials against misuse, information designed for the sales force against disclosure and course and workshop contents against data theft.$1,246.00 -
21USB Security Enterprise 1.9
Main Features: - Blocks unauthorized USB devices of all kinds - Helps prevent data theft and virus infections - White-lists permit using devices such as printers, keyboards and mice - Optional password-protection allows operating certain USB devices ...$34.95 -
22COMODO Memory Firewall 2.0
Free Comodo Memory Firewall detects most buffer overflow attack attempts such as attacks on STACK memory, HEAP memory, ret2libc attacks and of corrupted/bad SEH Chains, Comodo Memory Firewall protects against data theft, computer crashes and system ... -
23zPod Creator 2.6
Next level in privacy solutions Worried about the confidentiality of your documents, business data, sensitive information? When you store, or even just access, your private files on your laptop, at work or on any other computer, you leave yourself ...$89.00 -
24Beaconaut APICalc 2.0
In computer science, arbitrary-precision arithmetic is a technique whereby calculations are performed on numbers whose digits of precision are limited only by the available memory of the host system, It is also called bignum arithmetic. Arbitrary precision ...$39.95 -
25DragonWAF IIS7 Demo Version 3.1.2.5
Abuse of Functionality (emails, spiders, data theft) 18. Command Injection