Comodo disk encryption review in Title/Summary
Comodo Disk Encryption is a security tool for encrypting your disks. It allows you to encrypt your hard drives or partitions so that no one but you can access them. The encryption of your disks can be carried out using several encryption algorithms. The whole process takes place on the fly, as opposed to a pre-OS encryption which requires a reboot.
- Publisher: Comodo Security Solutions, Inc.
- Home page: disk-encryption.comodo.com
- Last updated: November 18th, 2009
Rohos Disk Encryption creates hidden and protected partitions on the computer or USB flash drive and password protects/locks access to your Internet applications. This application uses NIST approved AES encryption algorithm, 256 bit encryption key length.
- Publisher: Tesline-service s.r.l.
- Home page: www.rohos.com
- Last updated: October 28th, 2015
Full Disk Encryption’s Dynamic Mount Utility is used you need to access information on the hard disk of a Full Disk Encryption - protected machine and do not want to access this information by performing a recovery, for example, if you need to access a disk for forensic reasons or because a failure of the operating system makes it impossible to retrieve data on a disk.
- Publisher: Check Point Software Technologies LTD
- Home page: supportcenter.checkpoint.com
- Last updated: May 11th, 2010
Comodo disk encryption review in Description
BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks.
- Publisher: Jetico Inc. Oy
- Home page: www.jetico.com
- Last updated: April 26th, 2020
To protect the data R-Crypto creates encrypted virtual disks (virtual data storage devices). These disks provide real time data encryption and decryption which are fully transparent to the user, it means that the data is being encrypted just before it is being written to the disk and is being decrypted right after it is being read from the disk without the need of user intervention.
- Publisher: R-tools Technology, Inc.
- Home page: www.r-tt.com
- Last updated: July 23rd, 2009
GiliSoft Full Disk Encryption is a disk encryption software designed for laptops and other small computing devices that can be physically lost or stolen. Through password protecting a disk, disk partition or operating system launch, the program disables any unauthorized reading/writing activity on your disk or PC, restricts access and launch of specific disks and files.
- Publisher: Gilisoft International LLC.
- Home page: www.gilisoft.com
- Last updated: August 19th, 2020
One thing is to encrypt your data, and another thing to encrypt your disks – idoo Full Disk Encryption does both. It can protect all your local and USB drives and the data they contain using a powerful 256-bit AES encryption algorithm plus a password of your choice. No one will be capable of accessing your disks once password-locked and encrypted, let alone the information stored in them.
- Publisher: idoo Software
- Home page: www.idooencryption.com
- Last updated: October 20th, 2013
DriveCrypt Plus Pack provides true real-time "on the fly" 256-bit disk encryption. DCPP allows you to secure your disk(s) (including removable media) with a powerful and proven encryption algorithm (AES-256) at the sector level, ensuring that only authorized users may access it.
- Publisher: SecurStar GmbH
- Last updated: May 24th, 2015
Additional Comodo disk encryption review selection
TrueCrypt is a utility that enables users to encrypt a disk within a file in order to protect the information stored on that specific disk. The encryption process is a virtual one and it does not affect the functionality of the encrypted disk. You can automatically mount and dismount drives.
- Publisher: TrueCrypt Foundation
- Last updated: July 6th, 2020
SafeNet Authentication Client is a middleware client that manages SafeNet’s extensive portfolio of certificate-based authenticators, including eToken and iKey smart card, USB tokens, and software-based devices. The program provides full local administration and support for multiple advanced security applications such as digital signing, pre-boot authentication and disk encryption.
- Publisher: SafeNet, Inc.
- Home page: www.safenet-inc.com
- Last updated: October 30th, 2016
You can set a password hint to ensure you don't forget your password. Disk Password Protection will display the hint when you deactivate protection. There are two types of partition table for drives: the old type (MBR) and the new (GPT). The software supports both.
- Publisher: EXLADE, Inc.
- Home page: www.exlade.com
- Last updated: April 27th, 2018
VeraCrypt is intended to protect sensitive data by creating encrypted volumes. The tool allows storing files in an encrypted container file, which you can mount as a virtual drive. Moreover, it can encrypt a partition or a drive, even if it stores system files. Since the tool supports on-the-fly-encryption, there will not be any leftovers after the volume is unmounted.
- Publisher: IDRIX
- Home page: www.idrix.fr
- Last updated: April 24th, 2020
Privacy Drive is a program that provides you with a quick way to hide content from unauthorized users. This application enables you to create virtual drives where you can import the files and folders you wish to conceal and encrypt them using powerful encryption algorithms.
- Publisher: Cybertron Software Co., Ltd.
- Home page: www.cybertronsoft.com
- Last updated: October 2nd, 2017
Cryptainer LE is a freeware utility that creates encrypted containers (vaults) of up to 100 MB each to store files. You can encrypt files and folders by simply dragging and dropping them into this vault. Additionally, it lets you create secure e-mail files that you can send to anyone.
- Publisher: Cypherix
- Home page: cypherix.com
- Last updated: September 22nd, 2020
A free, open source, "on-the-fly" (OTFE) transparent disk encryption program. Using this software, you can create one or more "virtual disks" on your PC - anything written to which will be automatically, and securely, encrypted before being stored
- Publisher: Sarah Dean
- Last updated: February 15th, 2010
Adaptive Server Enterprise is a relational database management system application. It was predominantly used on UNIX platform but is also available for Windows. What it does is to handle enormous demands on large databases and high transaction volumes at an excellent cost.
- Publisher: Sybase
- Home page: www.sybase.com
- Last updated: March 22nd, 2013
TotalMounter is a free application that enables you to mount virtual CD/DVD burner that is allowing to directly burn data onto an ISO file, not to an optical disk. Main features: - Provides CD-RW and DVD+RW emulators that allow you to "write" data into an CD/DVD drive, you may also create ISO9660 files by using any CD/DVD burning software.
- Publisher: KernSafe Technologies
- Home page: www.kernsafe.com
- Last updated: September 9th, 2011
Cryptic Disk is a application that enables you to encrypt your disk in order to keep your data safe. The program can create virtual encrypted disks as well as encrypt physical hard disks (in their entirety or just certain partitions), USB drives and memory cards.
- Publisher: Exlade
- Home page: www.exlade.com
- Last updated: September 11th, 2018