Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Endpoint media encryption in Title/Summary

Pointsec Media Encryption

Pointsec Media Encryption

The Check Point Media Encryption Software Blade provides centrally-enforceable encryption of removable storage media such as USB flash drives, backup hard drives, CDs and DVDs, for maximum data protection. You can encrypt files and folders; track and manage removable devices individually and much more

  • Publisher: Check Point Software Technologies, Inc.
  • Last updated: December 8th, 2009
Symantec Endpoint Encryption

Symantec Endpoint Encryption

Symantec Endpoint Encryption combines strong full-disk and removable media encryption with centralized management to protect sensitive information and ensure regulatory compliance. Symantec provides maximum protection by encrypting each drive, sector by sector, ensuring that all files are encrypted.

  • Publisher: Symantec Corporation
  • Home page: www.symantec.com
  • Last updated: October 26th, 2016
Symantec Endpoint Encryption - Removable Storage Edition

Symantec Endpoint Encryption - Removable Storage Edition

Symantec Endpoint Encryption Removable Storage Edition provides policy-controlled encryption of data on removable media and provides organizations with a safe harbor from data breach notification if removable media is lost or stolen. This industry-leading laptop security software allows users to encrypt data according to policy on most any form of removable storage.

  • Publisher: Symantec Corporation
  • Last updated: November 16th, 2011

Endpoint media encryption in Description

Private Encryptor

Private Encryptor

The latest in encryption technology to protect your sensitive data. Privacy tools include file/folder encryption, e-mail encryption, file shredder, file Backup with auto encryption, My Passwords, My Private Notes, Self Decrypting Executables.

  • Publisher: Tropical Software
  • Last updated: March 8th, 2008
Casper Secure Drive Backup

Casper Secure Drive Backup

Casper Secure Drive Backup is a PC backup and recovery solution designed specifically for users of Windows BitLocker and Symantec (PGP) Endpoint Drive Encryption technologies. With one click, Casper Secure Drive Backup creates a complete, fully-encrypted, instantly-bootable backup of your encrypted Windows system drive in its original encrypted state.

  • Publisher: Future Systems Solutions, Inc.
  • Last updated: May 27th, 2020
GiliSoft Full Disk Encryption

GiliSoft Full Disk Encryption

GiliSoft Full Disk Encryption is a disk encryption software designed for laptops and other small computing devices that can be physically lost or stolen. Through password protecting a disk, disk partition or operating system launch, the program disables any unauthorized reading/writing activity on your disk or PC, restricts access and launch of specific disks and files.

  • Publisher: Gilisoft International LLC.
  • Home page: www.gilisoft.com
  • Last updated: November 18th, 2024
Citrix Endpoint Analysis SDK

Citrix Endpoint Analysis SDK

The Citrix Endpoint Analysis Software Development Kit (Endpoint Analysis SDK) for Advanced Access Control is an add-in for Microsoft Visual Studio .NET 2005 that provides instructions for developing and testing C++ and VBScript endpoint analysis scan packages.

  • Publisher: Citrix Systems, Inc.
  • Last updated: December 6th, 2010
Dinner Timer Lite

Dinner Timer Lite

Dinner Timer Lite is a handy virtual chronometer to time your cooking or other time-based activity. It can display the running time in a big format which is easily readable from a considerable distance. It allows you to select from various notification methods to warn you once your programmed time is complete, and it allows you to know the exact amount of time you exceeded it, too.

Additional Endpoint media encryption selection

AES Encryption Module

AES Encryption Module

AES Encryption module is a free distributive package that convers the data encryption functionality for the Kaspersky Endpoint Security 10 product. You can also install the encryption module by using the setup wizard or by starting it from the command line.

  • Publisher: Kaspersky Lab UK Ltd
  • Last updated: September 6th, 2013
GreenForce-Player

GreenForce-Player

GreenForce-Player is an portable alternative media player, with many additional functions. One of these functions is to protect media files. You can save your audio and video files with a password and protect them against screenshots. An other very interesting function is the coverflow. Last but not least, there is a cache system that is used to reduce usage of your hard disc.

  • Publisher: GreenForce-Player
  • Last updated: September 2nd, 2012
Pointsec Protector Client

Pointsec Protector Client

The Check Point Media Encryption Software Blade provides centrally-enforceable encryption of removable storage media such as USB flash drives, backup hard drives, CDs and DVDs, for maximum data protection. Port control enables management of all endpoint ports, plus centralized logging of port activity for auditing and compliance.

Mars Dialer

Mars Dialer

Mars Dialer is a mobile and PC application which allow you to make calls through Sip Server. The program empowers you to run your brand/services even on lowest bandwidth like 2G/Edge network, and it has an option of hosted service for Encryption server.

  • Publisher: Mars Dialer
  • Last updated: December 28th, 2015
SafeIT Digital Media Shredder

SafeIT Digital Media Shredder

USB thumb drives, Secure Digital Card (SD) memories and other flash memories are rapidly increasing in popularity and capacity. It is entirely easy and affordable to carry around gigabytes of data in your pocket on media no larger than your thumb. This poses a potential problem since increased storage and availability also increases the risk losing sensitive information.

  • Publisher: SafeIT Security
  • Home page: www.safeit.com
  • Last updated: February 19th, 2010
Cascading Slides

Cascading Slides

Cascading Slides is a free photo album and media browser. The application allows you to add your photos into it and create as many albums as you want. Then you can use your mouse or keyboard to browse through your photos. You can view them in their original size or in full-screen mode. There is even a slideshow feature that you can access by simply clicking the play button on the top toolbar.

  • Publisher: Globalisk
  • Last updated: April 25th, 2012
File Phantom

File Phantom

File Phantom uses encryption, name mangling and file properties in order to hide your files and prevent access by unauthorized users. It can be used for multiple purposes, such as hiding files, hiding and encrypting files and even encrypting files located in specific directories. Files can also be assigned to categories and encrypted or hidden by category.

  • Publisher: Linewave Media
  • Last updated: November 25th, 2011
Endpoint Encryption Go

Endpoint Encryption Go

The utility indicates the readiness of the system to install either Endpoint Encryption for PC (EEPC) or other appropriate products. It provides an indication of readiness but not a definitive indication that no errors will occur. The utility provides some initial testing of the system to verify that it will be ready to install and activate the product.

  • Publisher: McAfee, Inc.
  • Home page: kc.mcafee.com
  • Last updated: February 12th, 2013
Kaspersky Endpoint Security for Windows

Kaspersky Endpoint Security for Windows

Kaspersky Endpoint Security for Windows is a software solution developed to help users to keep their personal devices safe from nowadays threats. It is best suited for owners of small to medium businesses because it allows them to secure the internal IT infrastructure easily.

  • Publisher: Kaspersky Lab
  • Home page: www.kaspersky.com
  • Last updated: January 30th, 2024
ESET Endpoint Antivirus

ESET Endpoint Antivirus

Powerful multilayered protection that leverages ESET's unique global threat detection network, machine learning capabilities and human expertise. A single layer of defense is not enough. Detect malware pre-execution, during execution and post-execution of the lifecycle to provide the highest level of protection possible.

  • Publisher: ESET North America
  • Home page: www.eset.com
  • Last updated: July 24th, 2024