|Audio & Multimedia|
|Games & Entertainment|
|Home & Hobby|
|Network & Internet|
|Security & Privacy|
The data can inadvertently go astray when a device is lost or stolen or can deliberately be carried out by those with access to confidential files. Banning these devices in the workplace is becoming increasingly difficult to monitor. As a result, more and more companies are resorting to tools that can prevent users from implementing these devices to their workstations.
See also: accesspatrol, access, patrol, access patrol, device, device patrol, power patrol, power control, device control, device block, device restrict, device restriction, device lock, device block, USB, USB block, CD block, drive block, drive access, drive r
SecrecyKeeper allows grouping data stored on workstations and servers by information security level and defines users that may access the information by users access level. SecrecyKeeper will help you prevent both accidental data leakage and intentional data theft caused by employees with access to such data. SecrecyKeeper makes it difficult for a company's IT department employees to steal sensitive data.
See also: data, information, theft, insider, employee, protect, confidential, mandatory, access, control, preventing, leakage, restriction, policy, usb, block
System USB Monitor Software 188.8.131.52
Secure USB drive monitor application tracks USB mass storage media access activities of client computers. System USB device activity surveillance program records local area network clients computer USB ports activities with their computer name, IP address, data-time, used USB information. Windows networks data theft monitor program works in stealth mode and does not show its presence in desktop, control panel and task manager.
See also: Universal, serial, port, USB, reader, device, surveillance, record, LAN, activities, change, read, write, access, permission, send, log, report, file, administrator, block, pen, drive, data, theft, monitor, card
LAN USB Controller 184.108.40.206
USB drive activities surveillance application provides real time monitoring of multiple connected external USB storage devices at client machine in windows LAN. Pen drive monitoring software support all USB media including memory card and provide instantly sound alert notification when USB connect to system and create log details of USB manufactures name, hardware ID, client machine name, IP address and USB storage capacity in text file format.
See also: USB, device, data, monitor, analyze, file, folders, transfer, block, storage, permission, display, theft, information, leakage, traffic, steal, network, protection, protect, LAN, view, port, move, store, security, record, log
CybSecure is an internet filtering and application blocking tool. CybSecure blocks access to illegal file downloads and it also provides you increased protection with its EXE and Window Blocker which will prevent the usage of mis-usable software. The Device Security feature provides you with additional protection against data theft by blocking USB and other storage devices which are a threat to company?s sensitive internal data.
See also: email filter, web security, parental control, internet security, web security, network security, application blocking, window blocking, exe blocking, Restrict window, Restrict usage of device, Device Blocking, Block USB Port, URL Filtering
USB Drive Disabler Tool 220.127.116.11
USB data theft protection application automatically maintains log file in text or HTML format and provides USB device detailed information. Software also provides facility to user to enable or disable access permission of any USB drive storage media within LAN network. USB drive disabler tool monitors multiple computer system simultaneously within local area network. Pen drive blocker utility supports all windows operating system including VISTA.
See also: USB, drive, disabler, data, theft, protection, network, store, log, record, information, move, folders, manage, security, block, file, prevent, transfer, permission, detect, local, network, monitor, port, leakage, device
USB Data Leakage Protection Software 18.104.22.168
Data theft protection tool for USB drive prevent you from unofficial data transfer through USB mass storage media. Monitoring software alerts by playing sound when any pen / thumb drive is connected at any machine in local area network. Surveillance tool facilitate administrator to block or change different access permission of USB port and log connected USB disk information with machine domain name, IP, storage capacity, manufacture details etc.
See also: steal, LAN, network, leakage, analyze, theft, protect, USB, record, permission, security, device, block, log, folders, move, data, traffic, display, view, protection, file, monitor, port, transfer, store, information, storage
USB Devices Monitoring Software 22.214.171.124
USB stick activity blocker tool simultaneously blocks several USB port data storage device either network connection is established or breakdown in Local Area Network. USB data leakage prevention software can store all details of incoming and outgoing data into text or html format log file. Removable media blocker utility supports all kinds of USB mass storage device and provides beep alerts if anyone want to access without permission.
See also: USB, drive, blocker, monitor, USB port, activities, prevent, unauthorized, files, leakage, anti data, theft, network, client, server, analyze, detect, block, access, removable, drives, pen drive, blocking, disabler
Safetica BUSINESS 3.1.5
Your staff can threaten security of sensitive corporate data. Firewalls and antivirus software do not protect you from internal threats. Protect yourselves from data leakage from corporate computers and disks. Gain control over the staff?s access to sensitive data and increase their working attitude by monitoring their activity. Save access data safely and do not allow spyware to log your passwords. Administer your company?s security centrally.
See also: security, encryption, shredder, disk encryption, activity monitoring, parental lock, access block, usb lock, pc lock, application lock, usb token, password manager, key manager, privacy, private key, secret, secret key, protection, public key, DLP
uHook Enterprise Device Control 4.4.1
uHook Enterprise Device Control lets you control and manage the access of removable media devices such as USB sticks, CDs, DVDs etc in your business network from one single place. uHook Enterprise is meant for businesses, where it is not possible to track who is copying business critical information on removable media devices.
See also: endpoint, security, usb, monitor, disk, ipods, camera, protection, device, control, dlp, enterprise, data, loss, prevention, dvd, block, protect
Blocking Software 1.0.12
Blocking Software can block files, apps, usb, folders and websites for security. PC Protection Pro is advance application to bring multiple blocking process to hide and disable access of multiple documents and extensions, run in complete hidden mode. Advance security program to blocking unwanted url and web also block usb and dvd writer so no one can take data from system. Protection software is safe and secure to do several process for secure pc
See also: Protection, files, folder, block, usb, dvd, drives, protector, secure, stealth, hide, block, blocker, blocking, application inbuilt tools, website
Port Locker (Complete Data Leak Prevention) 126.96.36.199
Corporate data security is a major issue today, and such user friendly softwares work great deal towards managing data security. These self implementing Data Leakage Prevention softwares demand mere simple clicks on the part of users, for protecting user data effectively. But, before purchasing Data Leakage Prevention software, users shall keep few things in mind. Firstly, a utility from a trusted company shall be preferred.
See also: Port Locker, DLP Software, Data Leakage Prevention, Data Loss Prevention, Free USB Protection, Protection Of Data, Data Protection Programs, Endpoint Security, USB Security Manager, Block USB, USB Blocker, Data Leak Prevention
Port Locker 188.8.131.52 184.108.40.206
Port locker is an essential data security tool, which detects and prevents data leakage by selectively blocking specific ports on your PC. It is breakthrough data leakage prevention utility which prohibits important user data from leaving a computer system, thereby maintaining information confidentiality. The tool enables a user to have complete control over all kinds of information exchange through his computer or over a network.
See also: Data Prevention, Data Leak Prevention, Data Leakage Prevention, Port Locker, DLP Software, Data Loss Prevention, Free USB Protection, Protection Of Data, Data Protection Programs, USB Security Manager, Block USB
Data Leakage Prevention 220.127.116.11
Data loss prevention tool enables you to defy all the unauthorized attempts on your precious data and information. You can now block USB and other mass storage devices for the scheduled duration to prevent them from getting access to your data. Install free data protection software to understand the usage of the data loss prevention application for.
See also: Port Locker, DLP Software, Data Leakage Prevention, Data Loss Prevention, Protection Of Data, Data Protection Programs, Endpoint Security, USB Security Manager, Block USB, Data Leak Prevention, Free data protection, Data Leakage Prevention Software
Spamoed Pro - program for fight with spam (the undesirable electronic sending out), providing: High filtering the mail, spare bankrolls, 100% safety of the important letters, High velocity, Quick recoupment, Fight with the customer spam.
Spamoed can as itself delete the unnecessary user an e-mail, so and with TheBat, Outlook and other postal client.
See also: protection from spam, e-mail, letter, spam, program against spam, what dispose of spam, module of protection from spam, modules anti spam, program for fight with spam, what fight with spam, spam blocking, spam block, program anti-spam, anti-spam, spam filter, spam sheet, fight with spam, spamoed, anti-spam, buying the programme product, delivery of the programmed product, self-defense, anti, mailboxes
It converts 3D models saved in Ray Dream Studio© format into BLOCK format custom blocks for building immersive 3D website environments in 3DML. The full version of Block-IT! features UV mapping for effective texture detail and block optimisation for file size economy. It also includes a help file which shows the basics of block creation via Metasequoia©, exporting as RDS, and converting to BLOCK using Block-IT!
See also: environments, metasequoia, RDS, conversion, converter, Flatland, Rover, 3DML, mapping, BLOCK, obj, texture, building, model
Vanquish Personal Anti Spam (vqME.com) 3.0
Block spam, viruses, spyware, and phishing attempts before they enter your computer. Stop spam and dangerous e-mails containing viruses, spyware, and identity-theft. A complete suite of anti-spam software technologies and security features, including SurfMatch and SmartSubject automatically adapt to your habits. vqME AntiSpam works with all common e-mail clients such as Outlook, Outlook Express, Eudora, IncrediMail, Thunderbird, and Opera-M2.
See also: block, antispam, spam, junk email, anti spam
CPrivacy is an advanced privacy management software. It can not only erase all the evidences of use from your PC, it frees hard disk space and improving PC performance, it prevents home page hijacking, has an advanced POPUP blocker and trial is FREE.
See also: Block Popups, Popup Blocker, Remove Cookies, Clean PC, Security, Privacy, Security
BrowseControl v 2.0
In addition to restricting Internet activity, users can be denied access to unauthorized applications such as Kaaza, Solitaire etc.This is achieved through the App Blocker feature. browseControl also provides administrators to control some of the PC components of those users who are abusing company/school policies. Remotely, from the Console, you can temporarily lock an offensive users PC by blanking the screen and blocking use of the keyboard .
See also: browsercontrol, web filters, blocking software, control, limit, block, restrict, content filtering, browsecontrol, browse control, filter, blocker, smut filter, smut filtering, email filter, popup killer, url blocking, spam filter, internet protection
Cyclope Internet Filtering Proxy 2.1
Cyclope Internet Filtering Proxy monitors the entire Internet traffic and blocks the access to websites and files according to the chosen filter. The requested web pages are displayed only if they comply with the specified filters.
The Internet Filter allows to specify URL, keywords and file types (application, archive, Shockwave and Flash, audio and video) rules.
See also: Cyclope Internet Filtering Proxy, monitoring software, employee surveillance software, recording Internet Filtering software, Internet Filter, web filter, content filtering, internet filters, block internet access, control internet access