Data leak prevention matrix in Title/Summary
USB Drive Guard is a data leak prevention (DLP) security solution that enables network administrators to centrally control USB drives on the network. This application runs silently on any windows PC and when someone inserts any type of storage device it will check a database on your network to see if its has been authorized.
- Publisher: SERVICE MASTER SOFTWARE
- Home page: www.usbdriveguard.com
- Last updated: July 2nd, 2018
Websense® Data Endpoint picks up where network data loss prevention (DLP) and discovery leave off, by providing endpoint security and control over what confidential data is and should be stored (through local discovery); who is using it; how it is being used (with what applications); where it is being transferred (USB storage, printer); and real-time action to prevent the data loss.
- Publisher: Websense, Inc.
- Home page: www.websense.com
- Last updated: April 26th, 2011
Data Matrix barcode symbol is made up of square modules either black or white. Usually Data Matrix symbols are black printed on white background, users can also print them as white upon black background. Barcodesoft Data Matrix Encoder supports MIL-STD-130N standard.
- Publisher: Barcodesoft
- Home page: www.barcode-soft.com
- Last updated: July 2nd, 2018
Data leak prevention matrix in Description
USB Block lets you protect your PC from data loss. Prevent duplication of your data to External Drives, USB Ports, Flash Disks, or data getting burned to a CD/DVD. Block unwanted devices by all means necessary.
- Publisher: newsoftwares.net
- Last updated: June 6th, 2018
Safetica is a complete internal security solution which brings a paradigm shift to understanding the threats facing companies. Safetica provides a Data Leak Prevention (DLP) suite topped by the complete prevention from all threats originating from human activities. It filters key data, distilling discoveries into actionable management reports.
- Publisher: Safetica Technologies
- Home page: www.safetica.com
- Last updated: November 13th, 2014
Lotus Notes Repair Kit is a compact, powerful and reliable Lotus Notes repair solution based on intelligent algorithms developed by Repair Kit engineers.
- Publisher: Repair Kit, Inc.
- Home page: www.lotusnotes.repair
- Last updated: July 29th, 2015
CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. You can restrict access by two ways: hide your devices from viewing or lock access to them.
- Publisher: Ixis Research LTD
- Home page: www.softheap.com
- Last updated: May 5th, 2012
Protegent PC Complete PC security is an innovative module that has been specially design to provide complete security solution to all the Desktop users. It’s has a 4-tier security protection process which includes antivirus solution with firewall, activity monitoring and reporting, port locker and data leakage prevention and data backup solution.
- Publisher: Unistal Systems Pvt. Ltd
- Last updated: April 6th, 2010
Additional Data leak prevention matrix selection
LanAgent Standard performs two tasks that are vital for any company today: employee surveillance to ensure productive work time use and data leak prevention for confidential information. This is possible thanks to the application's activity monitor, which keeps a close eye on all activity on the corporate network.
- Publisher: NetworkProfi
- Home page: www.lanagent.com
- Last updated: June 10th, 2019
Instead of locking your entire PC with a password to prevent unwanted visitors to use your computer and steal your data, GiliSoft USB Lock offers you a more flexible solution that allows you to disable access to specific files, folders, drives, devices, websites, programs, etc. All you need is a master password, and make sure you don’t forget it.
- Publisher: GiliSoft International LLC
- Home page: www.gilisoft.com
- Last updated: June 6th, 2019
Here we have the best Math program.MATLAB R2008a 7.6 is a language for technical computing that integrates computation, visualization, and programming in an easy to use environment. It can be used in, Math and computation, Algorithm development, Data acquisition, modeling, and simulation. It cah aldo be used for data analysis, etc.
- Publisher: The MathWorks, Inc.
- Home page: www.mathworks.com
- Last updated: March 11th, 2008
DeviceLock provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can’t be moved to or from company laptops or desktop PCs via devices like phones, digital cameras, USB sticks, CD/DVD-R, tablets, printers or MP3 players.
- Publisher: DeviceLock, Inc.
- Home page: www.devicelock.com
- Last updated: November 17th, 2015
Cibecs User Agent is a program that enables you to backup and recover data. You can centrally define and enforce data backup policies, automate user PC data backups – ensure no unauthorized access to business files, ensure compliance with Corporate Governance and legal data protection requirements.
- Publisher: Cibecs (Pty) Ltd.
- Last updated: August 2nd, 2016
Protegent Internet Security Software comes as an advanced defense against all kinds of viruses, spywares, rootkits and other e-threats. The internet protection utility secures all inbound and outbound data over internet. A proactive Internet virus protection application, it is also capable of detecting and preventing access to suspicious web content, thereby securing web for you and your family.
- Publisher: Unistal Systems Pvt. Ltd.
- Home page: www.protegent360.com
- Last updated: October 7th, 2013
Boldon James File Classifier enables you to add visual and metadata labels to messages and files. This operation helps you proactively manage and protect sensitive information, ensuring it goes to the right people in a safe, controlled and efficient way.
- Publisher: Boldon James
- Home page: www.boldonjames.com
- Last updated: January 29th, 2015
Trend Micro Internet Security Pro is a complete security solution for your computer with all the security tools like, Anti virus, spam filter, firewall and parental control. Trend Micro Internet Security Pro enables you to browse the web safely and also keeps your identity and private data safe.
- Publisher: Trend Micro Inc.
- Home page: emea.trendmicro.com
- Last updated: March 17th, 2010
Manage Users, Groups, OUs, Printers, and Print Traffic over your network and have full control of your corporate, government, and SMB environment. Implement Data Loss Prevention with over 10 permission based restrictions or even hard quotas. Print Management solutions for organizations, that allows for full control of your printing resources.
- Publisher: Software Shelf International, Inc.
- Home page: www.softwareshelf.com
- Last updated: September 27th, 2011
Hide and Protect any Drives is a tool that you can use to hide or restrict access to any drives such as Hard drive, CD, DVD, floppy and flash, and deny access to partitions of your hard drives with "Hide & Protect Drives". Stop unauthorized software installations and data leak by removable media.
- Publisher: Soft Stack
- Home page: www.softstack.com
- Last updated: May 21st, 2012