Device Protector is Data Loss Prevention (DLP) and endpoint device control security software that enforce device protection policies on organization computers. The software helps to secure IT environments from data leakage and information theft. The Enterprise version supports unlimited computers.
Device Protector is acting as a server to all protected computers and can be deployed through the software management console or through any 3rd party deployment system by using the software deployment MSI package. The software provides online and offline protection including read-only, read-write, working hours, exclude users and exclude media serial numbers capabilities. The software support Windows operating systems and can protect the following devices: Bluetooth, DVD/CD-ROM, Firewire, Floppy, Imaging, Infrared, Microphones, Modems, Portable Mobile Phones, Ports, Printers, Removable Disks, SD Cards, Sound, Tape Drives, Wireless 802.11/Broadband devices.
What is new in this release:
Version 2.3 adds improved Endpoint devices and DLP protection options.
What is new in version 2.2:
Version 2.2 adds improved Data Loss Prevention and Endpoint Device Control options.
What is new in version 2.1:
Version 2.1 support the following Microsoft operating systems: Windows 10, Windows 8, Windows 7, Vista, XP.
What is new in version 1.9:
Version 1.9 add advance reporting options for the following devices: Bluetooth, DVD/CD-ROM, Firewire, Floppy, Imaging, Infrared, Microphones, Modems, Portable Mobile Phones, Ports, Printers, Removable Disks, SD Cards, Sound, Tape Drives, Wireless 802.11/Broadband devices.
What is new in version 1.8:
Version 1.8 add support for the following devices: Bluetooth, DVD/CD-ROM, Firewire, Floppy, Imaging, Infrared, Microphones, Modems, Portable Mobile Phones, Ports, Printers, Removable Disks, SD Cards, Sound, Tape Drives, Wireless 802.11/Broadband devices.
|TrustPort WebFilter 2010|
TrustPort WebFilter 2010 is a progressive solution for protection of your company network. It monitors web activities of all users in the network. It enables blocking of selected categories of websites, for instance porn, warez, gambling, and chats. This w
|LogQuest VF Standard|
LogQuest VF is a Log analysis tool for all types of logs that searches information in any log. By analyzing security data from mixed devices, LogQuest VF helps customers worldwide to arrive at a solution. Any firm for example security organization use LogQ
|Vista User Time Manager|
Vista User Time Manager lets you specify when exactly and how long the computer can be used and define users which will be allowed to use the computer without any limits. You can schedule time intervals and the number of hours each child can use the comput
File Safer lets you password protect folders, files. It lets you hide you data or make your data being read-only (write-protected and can not be deleted) easily. It also offers auto-protection and password prompt on access of protected item. You can visit
DEKSI Shield allows you to hide and password protect your folders and set access rights using an encryption tool and protection wizard. DEKSI Shield is the most advanced, powerful and feature rich protection program for your computer system: hide files,
|NTFS Security Manager|
NTFS Permissions management on Windows File Servers is now made easy with Vyapin's NTFS Security Manager - a powerful NTFS permissions management tool to secure your Shares, Folders and Files on windows servers and workstations across your entire network.
|Passware Kit Professional|
Passware Kit Professional recovers all kinds of lost or forgotten passwords for office-application files, including Excel, Word, Windows 2003, XP, 2K, or NT (both local and domain-administrator accounts), Lotus Notes, RAR, WinZip, Access, Outlook, Acrobat,
Protect-UX allows you to manage file permissions and ACLs across your Unix, Linux and HP OSS environment. Protect-UX provides a centralized view of file and directory permissions on your Linux and Unix systems, enabling administrators to ensure that access
LanSpy is a network security scanner, which allows getting different information about computer Domain and NetBios names, MAC address, Server information, Domain and Domain controller information, Remote control, Time, Discs, Transports, Users, Global and
|WebDAV Vulnerability Tester|
Detecting if WebDAV is enabled. Testing IIS WebDAV authentication bypass vulnerability (CVE-2009-1676) . Listing directory and files. find a protected folder (/secret/) and then try inserting the %c0%af character.