Filter Results (61)
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean company Prey Inc. Learn more about Prey Prey is a mobile security, management and data protection platform for both enterprises and personal use, developed by Prey Inc. Learn more about Prey
Prevents data breach during storage, use and transfer. Assists with fast automated relocation of processes outside the office and makes remote employees connect to internal assets maintaining security standards and ensuring as safe data transfer as within a corporate perimeter. Facilitates inventorying and detection of corporate fraud. Minimizes human error and HR risks. Operates as an early warning system alerting to possible threats. Instrumental in conducting investigation and compliance. Learn more about SearchInform DLP Protects information breach, monitors data in motion and data at rest, controls communication channels and reports events. Learn more about SearchInform DLP
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices that have escaped your control, to prevent data compromise. From personal accounts to Fortune 500 organizations in healthcare, legal, financial services, government, e-commerce, and entertainment, DriveStrike prevents data breaches to secure confidentiality, compliance, and competitive advantage. Learn more about DriveStrike Computer & mobile remote wipe, lock, and locate for all operating systems and hardware. Learn more about DriveStrike
Endpoint Protector is a Data Loss Prevention solution for Enterprise and Small-Medium businesses, available as hardware and virtual appliance, or as cloud infrastructure. Endpoint Protector puts an end to data leaks and data theft and offers seamless control of portable storage devices. It's content filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or regulations such as GDPR, PCI DSS, CCPA, HIPAA etc. Learn more about Endpoint Protector Data Loss Prevention. Device Control and eDiscovery capabilities on Windows, macOS and Linux Learn more about Endpoint Protector
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications. Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware.
NAKIVO Backup & Replication helps prevent any potential data loss or corruption in virtual, physical, cloud and SaaS environments. Keep copies of your data on-site and off-site ¿ on tape or in the AWS/Azure clouds. Use the software to perform both full and incremental backup copy to tape. Combine several storage options to eliminate a single point of failure and ensure reliable data protection. Prevent data loss and corruption in virtual, physical, cloud and SaaS environments.
NeoCertified's secure email solution is an essential piece for your DLP strategy for businesses looking to protect confidential information, while meeting compliance obligations. NeoCertified gives you the flexibility and assured protection that you're looking for in an encryption provider. An included Microsoft Outlook-integrated button, a 24/7 customer support team, and commercial-grade encryption -- NeoCertified 's the upgrade your DLP solution has needed. Receive a personalized quote. NeoCertified provides an essential component for your DLP strategy: a trusted secure email solution for businesses of all industries.
DLP app that protects intellectual property or financial data from unexpected disappearance via virtual data protection policies. DLP app that protects intellectual property or financial data from unexpected disappearance via virtual data protection policies.
If managing backups is just one of your countless responsibilities in IT, then consider Unitrends for all-in-one ease-of-use. Unitrends Backup Software is a prepackaged virtual appliance with fully integrated backup, replication, deduplication, archive, and instant recovery. Run it on vSphere, Hyper-V, XenServer, or deploy it as a VM within the Azure or AWS cloud. Integrate with our cloud which is purpose-built for effortless, cost-efficient backup, offsite storage, long-term retention and DRaaS If managing backups is just one of your countless responsibilities in IT, then consider Unitrends Backup for all-in-one ease-of-use.
Symantec Data Loss Prevention (DLP) provides a comprehensive approach to information protection that embraces todays cloud- and mobile-centered realities. Provides a comprehensive approach to information protection that embraces todays cloud- and mobile-centered realities.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface. Data Control is designed to assist in complying with data protection regulations, as well as discovering and protecting sensitive data.
Chimpa MDM is an EMM (Enterprise Mobility Management) solution that is able to guarantee the control of mobile devices, IFPs and VRs visors because: streamlines management of iOS, iPadOS, tvOS and Android devices with zero-touch deployments; is an Android Enterprise validated solution and it's also completely integrated with Apple services; supports BYOD, COBO, COPE, single purpose device managements (COSU); let IT Admins to manage privacy, policies, apps/content deployment with an easy UX. Chimpa MDM is an EMM crossplatform solution that allows to manage, monitor and protect the mobile devices in schools and business.
Elevate to new levels of security with Forcepoint Dynamic Data Protection by mitigating risk to critical data and assets. Leverage behavioral analytics to proactively respond to threats and dynamically apply monitoring and enforcement controls on web, cloud, email and endpoint. Integrated UAM facilitates real-time risk-scoring based on user activity and data sensitivity, and supports closed-loop investigation and forensics. Behavioral, risk-adaptive security enables proactive threat response and dynamic monitoring and enforcement of data controls.
Commvault Orchestrate provides automated service delivery technology that enables users to provision, sync and validate data in any environment for important IT needs such as disaster recovery (DR) testing, Dev/Test operations and workload migrations. Orchestrate allows customers to extend the value of their data sitting in secondary storage, meaning operations that were previously manual can now be orchestrated and automated, saving customers valuable time and money. Web-based tool that allows provisioning, syncing and migrating data across environments and manage organizational needs.
FILERECOVERY recovers deleted and lost files from all types of media, including hard drives, flash drives and more. Whether you need to recover files from a hard rive, flash drive, GoPro camera or others, FILERECOVERY will recover your lost data. Easy to use. Recovery is just a few mouse clicks away. FILERECOVERY® recovers deleted and lost files from all types of media, including hard drives, flash drives and more. Easy to use.
Bridging the SECURITY gap between the enterprise and cloud with seamlessly integrated CASB solutions agile enough to suit all industry verticals. One integrated for multiple solutions like Single Sign On, Data Loss Prevention, Shadow IT, Access Control, Identity Management and more. CloudCOdes is one of the most preferres CASB solution provider by SMBs globally. Most preferred CASB vendor for SMBs globally - Single Sign On, Data Loss Prevention, Identity Management, Shadow IT, Access Control,etc
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions. Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications. Designed for SMBs and with service providers in mind Cross Platform Hybrid Solution Archive, Backup, or Duplicate Data Central management and Endpoint Protection Protects Physical and Virtual environments Affordable and Flexible licensing model Disk, Tape and Cloud support Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications.
Striim combines real-time data integration, stream analytics, and visualization in a single platform. It continuously ingests a wide variety of semi-structured, unstructured, and structured data, including data from enterprise databases via change data capture. It offers built-in validation, SQL-based stream processing such as filtering, transformations, aggregations, and enrichment, multi-source correlation, complex pattern matching, predictive analytics, and real-time dashboards with alerts. Data management solution that enables businesses to process and deliver real-time data through serialization, access control, and more.
Centrally managed system that scans for sensitive data such as social security numbers for data at rest. DataSense can take an inventory of the sensitive data that is lurking in your network and databases, and alert you which servers are the culprits. There is no need to install endpoints as DataSense's architecture allows for central management without the pain of trying to install agents for reporting. Centrally managed system that scans for sensitive data such as social security numbers for data at rest.
Exabeam Security Management Platform (SMP) empowers enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smarternot harder. Equipped with the Exabeam Security Management Platform, analysts can collect unlimited log data, use behavioral analytics to detect attacks, and automate incident responsesboth on-premises or in the cloud. Security management and operations platform with detection, analytics, and response capabilities.
Your visual content is your business front lines. Protect them. Main features: - Web crawling, Visual Search and Identification of your images and videos on the web, on social media, and on print. - Leaker identification. Integrates with existing solutions: - Extends your DRM capabilities beyond your own servers with analytics view of who uses your visual media, how, and where. - Complements the capabilities of your DLP with specific feature of image and video leaker identification. Protects and monitors visual content via a patented invisible watermark, reporting on its location, whether print or online.
WITH DEVICE CONTROL PLUS, YOU CAN: Control, block, and monitor all USB and peripheral devices effortlessly. Eliminate data loss due to unauthorized data transfers. Implement file access control to prevent unprivileged access. Get your work done quickly by granting temporary access to third-party devices when required. Create a trusted device list, and authorize specific devices to access your computer safely. A data loss prevention solution that can control, block and monitor USB devices from having unauthorized access to sensitive data.
Provides 24x7 record & replay of all window sessions, whether they are remote access or console access. With support for Terminal Services, Citrix, Remote Desktop, PC-Anywhere, VMware, VNC and NetOP, ObserveIT is agnostic to protocol and to client application. ObserveIT captures textual meta-data during the recording. This detailed information on the state of the OS and the application in use allows you to find relevant user sessions without the need to replay the entire recording. User activity monitoring solution that allows you to capture video recording, identify users, and generate textual audit logs.
Have you accidentally deleted or lost important files? Or does your external or internal drive no longer appear/respond? Our data recovery software can retrieve those priceless photos or videos and important business or school documents for you with a few simple steps. Data recovery solution that helps businesses retrieve media as well as documents from hard drives, USB flash disks, SD cards, and more.
Nowadays source code becomes the most valuable asset of the companies worldwide. Companies sign NDAs with their employees, but it doesn't work, as it's very hard to know who and how using your source code. There is no reason to trust your employees unless you check them. Hivecode helps companies to keep an eye on their digital assets and track web applications and software usage. No longer worries about copying web design of your web site, you will know in seconds about it. Tracking for your data to avoid data leaks and prevent others from using your source code
DataSecurity Plus is a data visibility and security solution that offers data discovery, file storage analysis, and real-time Windows file server auditing, alerting & reporting. Furthermore, it monitors file integrity; streamlines compliance requirements; generates instant, user-defined email alerts; finds sensitive personal data (PII/ePHI) stored in files, folders, or shares; and automatically executes predefined responses when security threats such as ransomware attacks occur. DataSecurity Plus offers data discovery and real-time server auditing, alerting, and reporting.
Data management platform that helps collect, manage and protect customer data through multi-factor authentication, encryption & more. Data management platform that helps collect, manage and protect customer data through multi-factor authentication, encryption & more.
Prevent office or home applications against data leakage with Runtime Application Self Protection (RASP) tool that controls devices and blocks threat attacks. Prevent office or home applications against data leakage with tool that controls devices and blocks threat attacks.
Clearswift's Adaptive Data Loss Prevention (A-DLP) technology protects organizations from advanced cyber threats and sensitive data loss, and ensures compliance with data protection regulations. The solution offers an automated, disruption-free and content-aware approach to protecting the unauthorized loss of sensitive data through email, the internet, including cloud collaboration applications, and removable devices. A-DLP includes real-time redaction, encryption, blocking or deleting. Take critical information protection to the next level. Clearswift's Adaptive-DLP is data loss prevention redefined.
DLP system that controls enterprises online communication, stops HTTP, HTTPS and FTP policies entering, and detects sensitive data. DLP system that controls enterprises online communication, stops HTTP, HTTPS and FTP policies entering, and detects sensitive data.
System that protects office applications from internal or external data loss, detects private data, and alerts about possible leakage. System that protects office applications from internal or external data loss, detects private data, and alerts about possible leakage.
Data protection tool that helps enterprises screen online content and reveal sensitive data through safeguarding confidential data. Data protection tool that helps enterprises screen online content and reveal sensitive data through safeguarding confidential data.
Stellar Phoenix Mailbox Exchange Recovery software repairs severely corrupt or damaged Microsoft Exchange Server Database (EDB) files efficiently and swiftly. With this powerful software, you can recover all the components of an EDB file including contacts, calendars, emails, attachments journals, and tasks.The software scans corrupt EDB files, repairs them and shows the preview of all recoverable mailbox items. Users can then select the required mailbox items and save it in several formats. Stellar Phoenix Mailbox Exchange Recovery efficiently repairs corrupt Exchange Database (EDB) files.
O365 Manager Plus is a reporting, auditing, monitoring, management, and alerting solution for Office 365. With this solution, easily administer Exchange Online, Azure AD, Skype for Business, OneDrive for Business, and other Office 365 services from one place. Comply with industrial mandates with detailed audit reports. Create custom roles for cross-tenant and domain-based delegation.Monitor the Office 365 setup 24X7 and receive real-time emailnotifications when service degradation occurs. O365 Manager Plus is the one-stop Office 365 solution with reporting, auditing, monitoring, management, alerting, and delegation capabi
Humming Heads Evolution DLP (data loss prevention) includes: 1. Automatic Encryption: Detects and automatically encrypts data moving out of the organization. 2. Whitelist Protection: Advanced API-level whitelist protects computers from malware, targeted attacks, and phishing. 3. Write Control: Shuts off outbound transfers and writes of all files, by all programs, through all pathways unless permitted. 4. Operation History: Records every detailed user and program action on all PCs. Humming Heads Evolution DLP provides strong encryption, detailed forensic tools, kernel-level whitelisting, and robust write controls.
Data protection solution that applies encryption, tokenization, and anonymization policies to ensure secure storage of sensitive data and documents. Data protection solution that applies encryption, tokenization, and anonymization policies to ensure secure storage of sensitive data.
Dathena's Guardian Suite allows users to address important data loss issues efficiently by helping organisations perform data discovery and classification according to document type and confidentiality, labelling documents as such and integrating seamlessly with third-party DLP tools and other risk management solutions (IRM, RMS etc.). Separately, Dathena Guardian Suite also helps companies reduce data management costs by identifying duplicates throughout all information repositories. Comprehensive data protection suite that includes leading data discovery and classification that powers world-class data protection
Protect sensitive data and intervene to prevent data loss. Detect sophisticated threats from internal or external actors to reduce risk of data loss. Accelerate forensic investigations, and reduce false positives, ensuring that resources are spent on alerts most likely to be fraudulent. Protect sensitive data and intervene to prevent data loss. Detect sophisticated threats from internal or external actors.
iBoysoft Mac Data Recovery is a user-friendly data recovery tool capable of recovering photos, videos, documents, music, documents. iBoysoft Mac Data Recovery is a user-friendly data recovery tool capable of recovering photos, videos, documents, music, documents.
Founded in 1997 with its America headquarter office in San Jose, California, Somansa is a global leader in Data Loss Prevention security to protect sensitive data and help meet regulatory compliance requirements. Somansa provides its worldwide customers in Financial, Healthcare, Manufacturing, Telecom/Media, and Government with a total DLP solution to Monitor, Prevent, and Discover sensitive data in motion, Emails, Cloud and at rest, USBs, Printing, etc. Somansa provides total data loss prevention to monitor, prevent, and discover sensitive data in emails, cloud, social media, and USBs.
Data protection tool that provides SMBs with document creation & management, order processing, event management and privacy breakdown. Data protection tool that provides SMBs with document creation & management, order processing, event management and privacy breakdown.
Arcserve Continuous Availability synchronizes the data on your Windows and Linux systems with a second physical or virtual system that you provision locally, at a remote location, or in the cloud. Once synchronized, byte-level changes are continuously replicated from your production system to the replica system, providing constant protection to keep data and information accurate, and systems operational Business continuity solution that protects and your data in both physical and virtual environments.
Beyond DLP is a unique and proactive Data Loss Prevention solution. It uses AI, behavior analysis, and deception techniques to secure all stages of digital data and protect against both internal and external threats. Even after data exfiltration, Beyond DLP provides security personnel with detailed forensic information on the breach. Additionally, the solution is cost-effective, quick to implement, requires no endpoint agent, and has zero impact on employee productivity. Protect data within company boundaries and beyond
CubexSoft Data Recovery is like a data backup tool, can easily backup and recover deleted data, documents, photo, audio, files video, folders and many more from partition losses, deletions, formatted, corrupted and other data loss scenarios. The Tool supports to recover storage disk of all models having NTFS, FAT (FAT16/FAT32), and exFAT file system. CubexSoft Data Recovery also comes with a free version to provide a preview of the selected drive. See license pricing details for Data Recovery. Data Recovery Tool is for anyone who wants back their lost, corrupted, unmounted and deleted data from any storage derive.
In this exposed environment, the right approach is to make applications self-defending, allowing them to run securely regardless of the device state. Verimatrix Code Protection provides powerful application shielding technology. Proven in toughest markets, like finance and movie streaming, and validated against the most stringent security standards Verimatrixs technology provides protection you can trust. A full product family from our ProtectMyApp service, to our Code Protection tool, through to our Whitebox tool for crypto protection.
Fast, simple recovery of business-critical data in the event of a disaster, helping you bring critical applications back online. Maintain business continuity and minimise data loss while saving valuable budget and time, with PAYG platform billing and automated solution failover. Should disaster strike, instantly activate your DRaaS resources and take advantage of 24/7 support. Our expert engineers are always on hand to help get you back up and running as soon as possible. Fast, simple recovery of business-critical data in the event of a disaster, helping you bring critical applications back online.