Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Comodo disk encryption review in Title/Summary

COMODO Disk Encryption

COMODO Disk Encryption

Comodo Disk Encryption is a security tool for encrypting your disks. It allows you to encrypt your hard drives or partitions so that no one but you can access them. The encryption of your disks can be carried out using several encryption algorithms. The whole process takes place on the fly, as opposed to a pre-OS encryption which requires a reboot.

Rohos Disk Encryption

Rohos Disk Encryption

Rohos Disk Encryption creates hidden and protected partitions on the computer or USB flash drive and password protects/locks access to your Internet applications. This application uses NIST approved AES encryption algorithm, 256 bit encryption key length.

  • Publisher: Tesline-service s.r.l.
  • Home page: www.rohos.com
  • Last updated: October 28th, 2015
Check Point - Full Disk Encryption Dynamic Mount Utility

Check Point - Full Disk Encryption Dynamic Mount Utility

Full Disk Encryption’s Dynamic Mount Utility is used you need to access information on the hard disk of a Full Disk Encryption - protected machine and do not want to access this information by performing a recovery, for example, if you need to access a disk for forensic reasons or because a failure of the operating system makes it impossible to retrieve data on a disk.

Comodo disk encryption review in Description

BestCrypt Volume Encryption

BestCrypt Volume Encryption

BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks.

  • Publisher: Jetico Inc. Oy
  • Home page: www.jetico.com
  • Last updated: January 22nd, 2020
R-Crypto

R-Crypto

To protect the data R-Crypto creates encrypted virtual disks (virtual data storage devices). These disks provide real time data encryption and decryption which are fully transparent to the user, it means that the data is being encrypted just before it is being written to the disk and is being decrypted right after it is being read from the disk without the need of user intervention.

  • Publisher: R-tools Technology, Inc.
  • Home page: www.r-tt.com
  • Last updated: July 23rd, 2009
GiliSoft Full Disk Encryption

GiliSoft Full Disk Encryption

GiliSoft Full Disk Encryption is a disk encryption software designed for laptops and other small computing devices that can be physically lost or stolen. Through password protecting a disk, disk partition or operating system launch, the program disables any unauthorized reading/writing activity on your disk or PC, restricts access and launch of specific disks and files.

  • Publisher: Gilisoft International LLC.
  • Home page: www.gilisoft.com
  • Last updated: August 21st, 2017
idoo Full Disk Encryption

idoo Full Disk Encryption

One thing is to encrypt your data, and another thing to encrypt your disks – idoo Full Disk Encryption does both. It can protect all your local and USB drives and the data they contain using a powerful 256-bit AES encryption algorithm plus a password of your choice. No one will be capable of accessing your disks once password-locked and encrypted, let alone the information stored in them.

DriveCrypt Plus Pack

DriveCrypt Plus Pack

DriveCrypt Plus Pack provides true real-time "on the fly" 256-bit disk encryption. DCPP allows you to secure your disk(s) (including removable media) with a powerful and proven encryption algorithm (AES-256) at the sector level, ensuring that only authorized users may access it.

  • Publisher: SecurStar GmbH
  • Last updated: May 24th, 2015

Additional Comodo disk encryption review selection

TrueCrypt

TrueCrypt

TrueCrypt is a utility that enables users to encrypt a disk within a file in order to protect the information stored on that specific disk. The encryption process is a virtual one and it does not affect the functionality of the encrypted disk. You can automatically mount and dismount drives.

  • Publisher: TrueCrypt Foundation
  • Home page: www.truecrypt.org
  • Last updated: June 10th, 2014
SafeNet Authentication Client

SafeNet Authentication Client

SafeNet Authentication Client is a middleware client that manages SafeNet’s extensive portfolio of certificate-based authenticators, including eToken and iKey smart card, USB tokens, and software-based devices. The program provides full local administration and support for multiple advanced security applications such as digital signing, pre-boot authentication and disk encryption.

Disk Password Protection

Disk Password Protection

You can set a password hint to ensure you don't forget your password. Disk Password Protection will display the hint when you deactivate protection. There are two types of partition table for drives: the old type (MBR) and the new (GPT). The software supports both.

  • Publisher: EXLADE, Inc.
  • Home page: www.exlade.com
  • Last updated: April 27th, 2018
VeraCrypt

VeraCrypt

VeraCrypt is intended to protect sensitive data by creating encrypted volumes. The tool allows storing files in an encrypted container file, which you can mount as a virtual drive. Moreover, it can encrypt a partition or a drive, even if it stores system files. Since the tool supports on-the-fly-encryption, there will not be any leftovers after the volume is unmounted.

  • Publisher: IDRIX
  • Home page: www.idrix.fr
  • Last updated: November 29th, 2019
Privacy Drive

Privacy Drive

Privacy Drive is a program that provides you with a quick way to hide content from unauthorized users. This application enables you to create virtual drives where you can import the files and folders you wish to conceal and encrypt them using powerful encryption algorithms.

  • Publisher: Cybertron Software Co., Ltd.
  • Home page: www.cybertronsoft.com
  • Last updated: October 2nd, 2017
Cryptainer LE

Cryptainer LE

Cryptainer LE is a 448-bit disk encryption software, which creates encrypted containers (vaults) of up to 100 MB each to store any type of data. You can encrypt files and folders by simply dragging and dropping them into this vault. It also lets you create secure e-mail files that you can send to anyone.

  • Publisher: Cypherix
  • Home page: cypherix.com
  • Last updated: January 23rd, 2020
FreeOTFE

FreeOTFE

A free, open source, "on-the-fly" (OTFE) transparent disk encryption program. Using this software, you can create one or more "virtual disks" on your PC - anything written to which will be automatically, and securely, encrypted before being stored

  • Publisher: Sarah Dean
  • Home page: www.FreeOTFE.org
  • Last updated: February 15th, 2010
Sybase Adaptive Server Enterprise Suite

Sybase Adaptive Server Enterprise Suite

Adaptive Server Enterprise is a relational database management system application. It was predominantly used on UNIX platform but is also available for Windows. What it does is to handle enormous demands on large databases and high transaction volumes at an excellent cost.

  • Publisher: Sybase
  • Home page: www.sybase.com
  • Last updated: March 22nd, 2013
TotalMounter

TotalMounter

TotalMounter is a free application that enables you to mount virtual CD/DVD burner that is allowing to directly burn data onto an ISO file, not to an optical disk. Main features: - Provides CD-RW and DVD+RW emulators that allow you to "write" data into an CD/DVD drive, you may also create ISO9660 files by using any CD/DVD burning software.

  • Publisher: KernSafe Technologies
  • Home page: www.kernsafe.com
  • Last updated: September 9th, 2011
Cryptic Disk

Cryptic Disk

Cryptic Disk is a application that enables you to encrypt your disk in order to keep your data safe. The program can create virtual encrypted disks as well as encrypt physical hard disks (in their entirety or just certain partitions), USB drives and memory cards.

  • Publisher: Exlade
  • Home page: www.exlade.com
  • Last updated: September 11th, 2018