dgdiscover 3.2
Enterprises constantly make copies of production application data to support development, testing, QA and business analysis. While most organizations have locked down their production environments sensitive data in non-production environments is exposed ...
- Audio & Multimedia
- Business
- Communications
- Desktop
- Development
- Education
- Games
- Graphics
- Home & Hobby
- Network & Internet
- Screen Savers
- Security & Privacy
- Servers
- System Utilities
- Web Development
- SSuite Office Premium HD+
- Android Files Recovery Program
- FoneLab HyperTrans
- Convert MySQL to Microsoft SQL
- Aiseesoft FoneLab for Android
- AnyMP4 Blu-ray Creator
- Flash Drive Data Restore
- FAT Volume Data Recovery
- Restore Deleted Mac Files
- Quick Receipt Software
- UltraFileSearch Std Portable
- MSMassEmailSenderPro
- USB Flash Drive Recovery
- Softaken MS Excel Recovery
- ToolsBaer MSG to Hotmail...
- ADRC Data Recovery Tools
- avast! Antivirus
- Revo Uninstaller
- Java Runtime Environment
- AVG Anti-Virus Free Edition
- GOM Media Player
- RegSeeker
- IrfanView
- CPU-Z
- Malwarebytes Anti-Malware
- Spybot Search & Destroy
- Skype
- µTorrent
- Ai File Extension Editor
- Remove Drm From Pdf Files
- Download Word Templates For...
- Assault Cube Sounds
- Download Song As Zip File
- Rankquest Watchseo
- Free Becker Cpa
- Creative Smiley Faces Text
- Portable Photo Editor Free...
- Screen Capture Master
- Bat Merge
- Daz Iso Compressor
- Destroy Recycle Bin Windows
- Decode Firefox Cache File
- Link Directory Script
Data Leakage Prevention Download
-
26$53.00
-
27LAN USB Controller 2.0.1.5
Analyzer application prevents unauthorized copying of your confidential data on USB sticks/drives. Software is helpful for IT companies, financial institutions, law firms, college and many more. Help option aware you with working and functionality of ...$120.00 -
28Axence nVision Pro 8.5.2.21100
The program provides network and user activity monitoring, software and hardware inventory, data leakage protection, remote control, and a wide range of reports, alerts and corrective actions - all with a user-friendly and very intuitive interface! ...$425.00
Buy -
29Free Folder Lock 2.3.8.8
Free Folder Lock is a data security solution that encrypt & secures your files, while keeping an automatic and real-time backup of encrypted files in the backup cloud. It also offers security for USB drives. Folder Lock Free is an Anti-Hack Solution ...Freeware -
30Comprehensive Complete File
In a single solution, EaseFilter Comprehensive Complete File Security SDK encompasses file security, digital rights management, encryption, file monitoring, file auditing, file tracking, data loss prevention, process monitoring and protection, and system ...$5,999.00
Buy -
31ReaSoft Network Firewall 3.0
Besides regular firewall functions, ReaSoft Network Firewall 3 is noted for elements of Data Loss Prevention system. Of course, they do not make it a full-featured DLP system, but they have proved more than sufficient for monitoring and tracking tasks.$199.00
Buy -
32Black Sheep 1.7
BlackSheep, a Firefox plugin, is designed to combat Firesheep. BlackSheep does this by dropping ‘fake’ session ID information on the wire and then monitors traffic to see if it has been hijacked. While Firesheep is largely passive, ...Freeware -
33NetWitness Investigator 9.7
Investigator provides security operations staff, auditors, and fraud and forensics investigators the power to perform unprecedented free-form contextual analysis of raw network data. You need to know everything that is happening on your network and ... -
34SpectraGuard SAFE 3.1
Confidential business data often resides on employee laptops. Protect against data leakage when laptops use wireless connections in the office, on the road, at home or at airports.$2,000.00 -
35WatchGuard System Manager 11.5
This includes rewall, VPN, intrusion prevention, URL filtering, web security, anti-virus and anti-spam services, and appliance software updates. Whether you’re a Managed Security Service Provider, novice network administrator of a small ... -
36GFI WebMonitor 2012
Capabilities also include the prevention of data leakage through socially-engineered websites and the ability to interrupt or stop a connection in real time.$310.00
Buy -
37ToolsBaer EML to PST Conversion 1.0
The users have an option to convert their entire EML files data into the PST format or can convert a single EML file by this amazing tool. Even the user can enter the unique name of the file and can save it according to their wish where they want the ...$29.00
Buy -
38ActivTrak for MacOS 8.3.3.0
ActivTrak captures user activity data in the digital workplace, helping teams address security and compliance concerns while also identifying opportunities for greater engagement, productivity and efficiency. Unlike traditional UAM providers that offer ...Freeware -
39ActivTrak for Windows 8.4
ActivTrak captures user activity data in the digital workplace, helping teams address security and compliance concerns while also identifying opportunities for greater engagement, productivity and efficiency. Unlike traditional UAM providers that offer ...Freeware -
40modusGate 5.0
Designed to help protect against data leakage of personal, financial or proprietary information through email, it will: * Allow organizations to protect their valuable information against theft and accidents. * Enforce and monitor company policies ...$1,500.00
Buy -
41ForPilots Logbook 2.3
We can start entering data in each field as we like best. There is also a toolbar from where we can make backups, restore a backup, repair logbook, import/export documents, repair index files, add and edit flights, lock/unlock interface for data loss ...$26.95 -
42GateWall Antispam 1.1
GateWall Antispam is a mail gateway solution with integrated spam filtering and antivirus tools. The product is built from multiple modules, which makes it more failsafe and allows running the server on a distributed system. GateWall Antispam supports ...$89.00 -
43Active Registry Monitor 1.3
Active Registry Monitor is a program designed by DeviceLock to keep track of what’s going on with your computer registry. The registry is where the all history of the computer is stored. Just like a computer record. Depending on how we use ...$40.00 -
44JSCAPE MFT Server Plugin for
JSCAPE MFT Server Plugin for Outlook can be used in combination with a compatible Outlook email client and JSCAPE MFT Server to perform ad-hoc email transfers. -Avoid bounced emails due to large file attachments or strict firewall rules at the email ...Freeware -
45ExG2antt 1.0
Features of eXG2antt include: - Compatible with the Data Execution Prevention (DEP) - Print and Print Preview support - WYSWYG Template/Layout Editor support - Skinnable Interface support ( ability to apply a skin to any background part ) - ADO, DAO ...Freeware -
46modusMail 5.0
Designed to help protect against data leakage of personal, financial or proprietary information through email, it will: Allow organizations to protect their valuable information against theft and accidents Enforce and monitor company policies to prevent ...$1,500.00 -
47Forefront Unified Access Gateway
Forefront UAG further improves security by enabling strong authentication to applications and mitigating the risks of downloaded data from unmanaged devices. Forefront UAG: Protects IT assets through fine-grained and built-in policies that provide ...Freeware -
48eXOrgChart 6.1.0.1
FEATURES: - Compatible with the Data Execution Prevention (DEP) - Skinnable Interface support ( ability to apply a skin to any background part ) - Ability to save/load the control's data to/from XML documents - Ability to arrange the child ...$208.00 -
49PeStudio 6.00
How do you verify whether an application is 64-bit capable or if the Data Execution Prevention (DEP) or the Address Space Layout Randomization (ASLR) features are used? Do you want to be sure whether your application uses functions that have been ...Freeware -
50MAPILab Search for Exchange 1.3
Corporate mail can be a channel of confidential data leakage. Therefore a powerful and convenient solution for searching messages in the corporate mail is required to comply with information security requirements for quick and effective investigations.$300.00
Buy