Comodo disk encryption boot in Title/Summary
COMODO Disk Encryption
Comodo Disk Encryption is a security tool for encrypting your disks. It allows you to encrypt your hard drives or partitions so that no one but you can access them. The encryption of your disks can be carried out using several encryption algorithms. The whole process takes place on the fly, as opposed to a pre-OS encryption which requires a reboot.
- Publisher: Comodo Security Solutions, Inc.
- Last updated: November 18th, 2009
Rohos Disk Encryption
Rohos Disk Encryption creates hidden and protected partitions on the computer or USB flash drive and password protects/locks access to your Internet applications. This application uses NIST approved AES encryption algorithm, 256 bit encryption key length.
- Publisher: Tesline-service s.r.l.
- Home page: www.rohos.com
- Last updated: July 18th, 2023
Check Point - Full Disk Encryption Dynamic Mount Utility
Full Disk Encryption’s Dynamic Mount Utility is used you need to access information on the hard disk of a Full Disk Encryption - protected machine and do not want to access this information by performing a recovery, for example, if you need to access a disk for forensic reasons or because a failure of the operating system makes it impossible to retrieve data on a disk.
- Publisher: Check Point Software Technologies LTD
- Last updated: May 11th, 2010
Comodo disk encryption boot in Description
BestCrypt Volume Encryption
BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks.
- Publisher: Jetico Inc. Oy
- Last updated: February 4th, 2024
Pointsec for PC
The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
- Publisher: Check Point Software
- Home page: supportcenter.checkpoint.com
- Last updated: August 21st, 2008
Active@ Boot Disk Creator
Active@ Boot Disk is a complete and functioning computer operating system on CD, DVD, or USB drive. It includes a variety of tools to boot up a computer and fix startup, PC configuration, and system management issues. Useful tools such as Active@ Disk Image, KillDisk, File Recovery, Partition Recovery, and Password Changer.
- Publisher: LSoft Technologies Inc.
- Home page: www.boot-disk.com
- Last updated: November 18th, 2024
R-Crypto
To protect the data R-Crypto creates encrypted virtual disks (virtual data storage devices). These disks provide real time data encryption and decryption which are fully transparent to the user, it means that the data is being encrypted just before it is being written to the disk and is being decrypted right after it is being read from the disk without the need of user intervention.
- Publisher: R-tools Technology, Inc.
- Home page: www.r-tt.com
- Last updated: July 23rd, 2009
GiliSoft Full Disk Encryption
GiliSoft Full Disk Encryption is a disk encryption software designed for laptops and other small computing devices that can be physically lost or stolen. Through password protecting a disk, disk partition or operating system launch, the program disables any unauthorized reading/writing activity on your disk or PC, restricts access and launch of specific disks and files.
- Publisher: Gilisoft International LLC.
- Last updated: November 18th, 2024
Additional Comodo disk encryption boot selection
idoo Full Disk Encryption
One thing is to encrypt your data, and another thing to encrypt your disks – idoo Full Disk Encryption does both. It can protect all your local and USB drives and the data they contain using a powerful 256-bit AES encryption algorithm plus a password of your choice. No one will be capable of accessing your disks once password-locked and encrypted, let alone the information stored in them.
- Publisher: idoo Software
- Home page: www.idooencryption.com
- Last updated: October 20th, 2013
SafeNet Authentication Client
SafeNet Authentication Client is a unified middleware client that manages Thales's SafeNet portfolio of Identity and Access Management Solutions, including certificate-based authenticators such as eToken, IDPrime smart cards, and USB and software-based devices.
- Publisher: SafeNet, Inc.
- Home page: knowledge.digicert.com
- Last updated: August 10th, 2023
TrueCrypt
TrueCrypt is a utility that enables users to encrypt a disk within a file in order to protect the information stored on that specific disk. The encryption process is a virtual one and it does not affect the functionality of the encrypted disk. You can automatically mount and dismount drives.
- Publisher: TrueCrypt Foundation
- Last updated: July 6th, 2020
Disk Password Protection
You can set a password hint to ensure you don't forget your password. Disk Password Protection will display the hint when you deactivate protection. There are two types of partition table for drives: the old type (MBR) and the new (GPT). The software supports both.
- Publisher: EXLADE, Inc.
- Home page: www.exlade.com
- Last updated: December 3rd, 2021
VeraCrypt
VeraCrypt is intended to protect sensitive data by creating encrypted volumes. The tool allows storing files in an encrypted container file, which you can mount as a virtual drive. Moreover, it can encrypt a partition or a drive, even if it stores system files. Since the tool supports on-the-fly-encryption, there will not be any leftovers after the volume is unmounted.
- Publisher: IDRIX
- Home page: www.idrix.fr
- Last updated: November 18th, 2024
GetDataBack Simple
GetDataBack Simple is a completely redesigned and rewritten Data Recovery solution for Windows and Linux file systems. Developers had combined decades of data recovery experience with the newest technologies. GetDataBack Simple's clean interface guides you to your lost data in no time. You are literally one click away from your files.
- Publisher: Runtime Software
- Home page: www.runtime.org
- Last updated: June 6th, 2019
Privacy Drive
Privacy Drive is a program that provides you with a quick way to hide content from unauthorized users. This application enables you to create virtual drives where you can import the files and folders you wish to conceal and encrypt them using powerful encryption algorithms.
- Publisher: Cybertron Software Co., Ltd.
- Last updated: October 2nd, 2017
MiniTool Drive Copy
There are moments when a disk or a partition backup could prove an excellent idea to protect your data. MiniTool Drive Copy is designed as a solution for those situations, as it enables you to copy and clone FAT, NTFS partitions, IDE, SATA, SCSI and removable drives.
- Publisher: MiniTool Solution Ltd.
- Home page: www.minitool-drivecopy.com
- Last updated: June 4th, 2010
Active@ Boot Disk
Active@ Boot Disk for Windows XP/Vista/7/8/10 provides a full range of disk utilities for data recovery, secure erasure, disk imaging. You can use it to boot up otherwise unworkable computers to access your data and troubleshoot problems with ease.
- Publisher: LSoft Technologies Inc.
- Home page: www.boot-disk.com
- Last updated: November 18th, 2024
Cryptainer LE
Cryptainer LE is a freeware utility that creates encrypted containers (vaults) of up to 100 MB each to store files. You can encrypt files and folders by simply dragging and dropping them into this vault. Additionally, it lets you create secure e-mail files that you can send to anyone.
- Publisher: Cypherix
- Home page: cypherix.com
- Last updated: March 14th, 2022