Device Protector is Data Loss Prevention (DLP) and endpoint device control security software that enforce device protection policies on organization computers. The software helps to secure IT environments from data leakage and information theft. The Enterprise version supports unlimited computers.
Device Protector is acting as a server to all protected computers and can be deployed through the software management console or through any 3rd party deployment system by using the software deployment MSI package. The software provides online and offline protection including read-only, read-write, working hours, exclude users and exclude media serial numbers capabilities. The software support Windows operating systems and can protect the following devices: Bluetooth, DVD/CD-ROM, Firewire, Floppy, Imaging, Infrared, Microphones, Modems, Portable Mobile Phones, Ports, Printers, Removable Disks, SD Cards, Sound, Tape Drives, Wireless 802.11/Broadband devices.
What is new in this release:
Version 2.3 adds improved Endpoint devices and DLP protection options.
What is new in version 2.2:
Version 2.2 adds improved Data Loss Prevention and Endpoint Device Control options.
What is new in version 2.1:
Version 2.1 support the following Microsoft operating systems: Windows 10, Windows 8, Windows 7, Vista, XP.
What is new in version 1.9:
Version 1.9 add advance reporting options for the following devices: Bluetooth, DVD/CD-ROM, Firewire, Floppy, Imaging, Infrared, Microphones, Modems, Portable Mobile Phones, Ports, Printers, Removable Disks, SD Cards, Sound, Tape Drives, Wireless 802.11/Broadband devices.
What is new in version 1.8:
Version 1.8 add support for the following devices: Bluetooth, DVD/CD-ROM, Firewire, Floppy, Imaging, Infrared, Microphones, Modems, Portable Mobile Phones, Ports, Printers, Removable Disks, SD Cards, Sound, Tape Drives, Wireless 802.11/Broadband devices.
QBW Password by Thegrideon Software is advanced QuickBooks security audit and cleanup tool as well as password replacement (reset) and recovery tool.
QBW Password works with all editions (US, CA, UK) and version including QB 2016.
QBW Password scans for
|USB Virus Protector|
Q. How to virus comes into your Pen drive?
A. When you insert pen drive into an infected computer, then virus will automatically copy itself into pen drive from infected computer. This process is done at the loading time of the pen drive.
Q. What this pr
This tool handholds the information security professional to build ISMS into their organization. This tool is based on ISO 27001 and has the capability of executing Risk assesment/Risk Treatment (RA/RTP), automated SOA preparation, procedure/policies build
ISA Stats is a program for Microsoft ISA Server that allows you to control and block the hosts users are browsing in real time. This software for monitoring the efficiency of your company's Internet bandwidth usage. Using this product you can easily find o
|Digital Document Shredder|
Digital Document Shredder is an advanced, powerful and feature rich digital document shredder system, and is the world's leading digital shredding software system that permanently removes selected files and folders and other information from your computer.
Prevent loss of sensitive, confidential and industry data. Our solution provides a agent based solution to find the lurking data that exists on computer systems and networks. Our solution can find and identify files that contains industry specific data, se
|Microsoft IIS4 Session ID Cookie Marking Vulnerability Patch|
This patch eliminates a security vulnerability in Microsoft Internet Information server that would allow a malicious user to hijack another user's secure Web session under a very restricted set of circumstances.IIS supports the use of a session ID cookie t
Perform logical and physical forensic extractions of mobile phone & device data such as iPhone, iPads, Androids, BlackBerry, & more. Forensically acquire user data such as contacts, call logs, SMS, MMS, pictures, videos, and much more. Recovers deleted cel
ApreoFlex is a comprehensive solution that customizes and controls access policies and procedures for recreational usage of company's IT resources such as games, MP3 file swapping applications, instant messengers or any other applications running on your n
|Password Generator 2013|
Generate millions of unique strong random passwords, numbers, masked codes, pronounceable passwords, usernames, and more in any of the 5 available generation modes. Generate random numbers within a certain range or matching any one of 17 built-in distribut