Data leak prevention matrix in Title/Summary
USB Drive Guard is a data leak prevention (DLP) security solution that enables network administrators to centrally control USB drives on the network. This application runs silently on any windows PC and when someone inserts any type of storage device it will check a database on your network to see if its has been authorized.
- Publisher: SERVICE MASTER SOFTWARE
- Last updated: July 2nd, 2018
Websense® Data Endpoint picks up where network data loss prevention (DLP) and discovery leave off, by providing endpoint security and control over what confidential data is and should be stored (through local discovery); who is using it; how it is being used (with what applications); where it is being transferred (USB storage, printer); and real-time action to prevent the data loss.
- Publisher: Websense, Inc.
- Home page: www.websense.com
- Last updated: April 26th, 2011
Data Matrix barcode symbol is made up of square modules either black or white. Usually Data Matrix symbols are black printed on white background, users can also print them as white upon black background. Barcodesoft Data Matrix Encoder supports MIL-STD-130N standard.
- Publisher: Barcodesoft
- Last updated: July 2nd, 2018
Data leak prevention matrix in Description
USB Block lets you protect your PC from data loss. Prevent duplication of your data to External Drives, USB Ports, Flash Disks, or data getting burned to a CD/DVD. Block unwanted devices by all means necessary.
- Publisher: newsoftwares.net
- Home page: www.newsoftwares.net
- Last updated: May 20th, 2022
Safetica is a complete internal security solution which brings a paradigm shift to understanding the threats facing companies. Safetica provides a Data Leak Prevention (DLP) suite topped by the complete prevention from all threats originating from human activities. It filters key data, distilling discoveries into actionable management reports.
- Publisher: Safetica Technologies
- Home page: www.safetica.com
- Last updated: November 13th, 2014
Lotus Notes Repair Kit is a compact, powerful and reliable Lotus Notes repair solution based on intelligent algorithms developed by Repair Kit engineers.
- Publisher: Repair Kit, Inc.
- Home page: www.lotusnotes.repair
- Last updated: July 29th, 2015
CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. You can restrict access by two ways: hide your devices from viewing or lock access to them.
- Publisher: Ixis Research LTD
- Home page: www.softheap.com
- Last updated: May 27th, 2020
Protegent PC Complete PC security is an innovative module that has been specially design to provide complete security solution to all the Desktop users. It’s has a 4-tier security protection process which includes antivirus solution with firewall, activity monitoring and reporting, port locker and data leakage prevention and data backup solution.
- Publisher: Unistal Systems Pvt. Ltd
- Last updated: April 6th, 2010
Additional Data leak prevention matrix selection
LanAgent Standard performs two tasks that are vital for any company today: employee surveillance to ensure productive work time use and data leak prevention for confidential information. This is possible thanks to the application's activity monitor, which keeps a close eye on all activity on the corporate network.
- Publisher: NetworkProfi
- Home page: www.lanagent.com
- Last updated: December 3rd, 2020
Accessing your most valuable data can be done in many different ways. That is why GiliSoft USB Lock offers you individual locks for all possible entries to your data. The program can block your hard and USB drives, disc drives, selected websites, connected devices, programs, etc. It requires a master password to use the program, guaranteeing that only you can access, edit, and remove your locks.
- Publisher: GiliSoft International LLC
- Home page: www.gilisoft.com
- Last updated: August 30th, 2022
Here we have the best Math program.MATLAB R2008a 7.6 is a language for technical computing that integrates computation, visualization, and programming in an easy to use environment. It can be used in, Math and computation, Algorithm development, Data acquisition, modeling, and simulation. It cah aldo be used for data analysis, etc.
- Publisher: The MathWorks, Inc.
- Home page: www.mathworks.com
- Last updated: March 11th, 2008
DeviceLock provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can’t be moved to or from company laptops or desktop PCs via devices like phones, digital cameras, USB sticks, CD/DVD-R, tablets, printers or MP3 players.
- Publisher: DeviceLock, Inc.
- Home page: www.devicelock.com
- Last updated: November 17th, 2015
Cibecs User Agent is a program that enables you to backup and recover data. You can centrally define and enforce data backup policies, automate user PC data backups – ensure no unauthorized access to business files, ensure compliance with Corporate Governance and legal data protection requirements.
- Publisher: Cibecs (Pty) Ltd.
- Last updated: August 2nd, 2016
Protegent Internet Security Software comes as an advanced defense against all kinds of viruses, spywares, rootkits and other e-threats. The internet protection utility secures all inbound and outbound data over internet. A proactive Internet virus protection application, it is also capable of detecting and preventing access to suspicious web content, thereby securing web for you and your family.
- Publisher: Unistal Systems Pvt. Ltd.
- Last updated: October 7th, 2013
Boldon James File Classifier enables you to add visual and metadata labels to messages and files. This operation helps you proactively manage and protect sensitive information, ensuring it goes to the right people in a safe, controlled and efficient way.
- Publisher: Boldon James
- Last updated: January 29th, 2015
Trend Micro Internet Security Pro is a complete security solution for your computer with all the security tools like, Anti virus, spam filter, firewall and parental control. Trend Micro Internet Security Pro enables you to browse the web safely and also keeps your identity and private data safe.
- Publisher: Trend Micro Inc.
- Home page: emea.trendmicro.com
- Last updated: March 17th, 2010
Manage Users, Groups, OUs, Printers, and Print Traffic over your network and have full control of your corporate, government, and SMB environment. Implement Data Loss Prevention with over 10 permission based restrictions or even hard quotas. Print Management solutions for organizations, that allows for full control of your printing resources.
- Publisher: Software Shelf International, Inc.
- Last updated: September 27th, 2011
Hide and Protect any Drives is a tool that you can use to hide or restrict access to any drives such as Hard drive, CD, DVD, floppy and flash, and deny access to partitions of your hard drives with "Hide & Protect Drives". Stop unauthorized software installations and data leak by removable media.
- Publisher: Soft Stack
- Home page: www.softstack.com
- Last updated: May 21st, 2012