Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Eset full disk encryption in Title/Summary

Check Point - Full Disk Encryption Dynamic Mount Utility

Check Point - Full Disk Encryption Dynamic Mount Utility

Full Disk Encryption’s Dynamic Mount Utility is used you need to access information on the hard disk of a Full Disk Encryption - protected machine and do not want to access this information by performing a recovery, for example, if you need to access a disk for forensic reasons or because a failure of the operating system makes it impossible to retrieve data on a disk.

idoo Full Disk Encryption

idoo Full Disk Encryption

One thing is to encrypt your data, and another thing to encrypt your disks – idoo Full Disk Encryption does both. It can protect all your local and USB drives and the data they contain using a powerful 256-bit AES encryption algorithm plus a password of your choice. No one will be capable of accessing your disks once password-locked and encrypted, let alone the information stored in them.

GiliSoft Full Disk Encryption

GiliSoft Full Disk Encryption

GiliSoft Full Disk Encryption is a disk encryption software designed for laptops and other small computing devices that can be physically lost or stolen. Through password protecting a disk, disk partition or operating system launch, the program disables any unauthorized reading/writing activity on your disk or PC, restricts access and launch of specific disks and files.

  • Publisher: Gilisoft International LLC.
  • Home page: www.gilisoft.com
  • Last updated: August 21st, 2017

Eset full disk encryption in Description

PGP

PGP

PGP® Whole Disk Encryption from Symantec provides organizations with comprehensive, high performance full disk encryption for all data (user files, swap files, system files, hidden files, etc.) on desktops, laptops, and removable media.The encrypted data is protected from unauthorized access, providing strong security for intellectual property, customer and partner data.

  • Publisher: PGP Corporation
  • Home page: www.symantec.com
  • Last updated: March 28th, 2012
Pointsec for PC

Pointsec for PC

The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.

BestCrypt Volume Encryption

BestCrypt Volume Encryption

BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks.

  • Publisher: Jetico Inc. Oy
  • Home page: www.jetico.com
  • Last updated: July 27th, 2019
K-Backup

K-Backup

KernSafe K-Backup is an advanced and powerful, full-featured automatic network level backup software, which contains two parts, K-Backup and K-Backup Server, K-Backup can be scheduled to backup data files to data-store (K-Backup Server) in minutely..

  • Publisher: KernSafe Technologies, Inc.
  • Home page: www.kernsafe.com
  • Last updated: October 10th, 2013
R-Crypto

R-Crypto

To protect the data R-Crypto creates encrypted virtual disks (virtual data storage devices). These disks provide real time data encryption and decryption which are fully transparent to the user, it means that the data is being encrypted just before it is being written to the disk and is being decrypted right after it is being read from the disk without the need of user intervention.

  • Publisher: R-tools Technology, Inc.
  • Home page: www.r-tt.com
  • Last updated: July 23rd, 2009

Additional Eset full disk encryption selection

Rohos Disk Encryption

Rohos Disk Encryption

Rohos Disk Encryption creates hidden and protected partitions on the computer or USB flash drive and password protects/locks access to your Internet applications. This application uses NIST approved AES encryption algorithm, 256 bit encryption key length.

  • Publisher: Tesline-service s.r.l.
  • Home page: www.rohos.com
  • Last updated: October 28th, 2015
Symantec Endpoint Encryption

Symantec Endpoint Encryption

Symantec Endpoint Encryption combines strong full-disk and removable media encryption with centralized management to protect sensitive information and ensure regulatory compliance. Symantec provides maximum protection by encrypting each drive, sector by sector, ensuring that all files are encrypted.

  • Publisher: Symantec Corporation
  • Home page: www.symantec.com
  • Last updated: October 26th, 2016
Best Folder Encryptor

Best Folder Encryptor

Best Folder Encryptor is a professional file and folder encryption software. With its advanced encryption algorithms, the encryption on your files and folders can be super strong in strength and is faultless. Encrypted files and folders cannot be decrypted without the original password, and can be prevented from deletion.

COMODO Disk Encryption

COMODO Disk Encryption

Comodo Disk Encryption is a security tool for encrypting your disks. It allows you to encrypt your hard drives or partitions so that no one but you can access them. The encryption of your disks can be carried out using several encryption algorithms. The whole process takes place on the fly, as opposed to a pre-OS encryption which requires a reboot.

DriveCrypt Plus Pack

DriveCrypt Plus Pack

DriveCrypt Plus Pack provides true real-time "on the fly" 256-bit disk encryption. DCPP allows you to secure your disk(s) (including removable media) with a powerful and proven encryption algorithm (AES-256) at the sector level, ensuring that only authorized users may access it.

  • Publisher: SecurStar GmbH
  • Last updated: May 24th, 2015
Workshare Protect

Workshare Protect

Workshare Protect is a program that spots the data you can't see in Excel spreadsheets, PowerPoint speaker notes, PDF metadata and tracked changes and comments in Word documents — so you can reduce and eliminate commercial risk. You can clean attachments in a single click or set a policy to do it automatically and transparently, based on criteria like the appearance of sensitive information.

  • Publisher: Workshare, Inc.
  • Home page: www.workshare.com
  • Last updated: July 28th, 2014
SafeNet Authentication Client

SafeNet Authentication Client

SafeNet Authentication Client is a middleware client that manages SafeNet’s extensive portfolio of certificate-based authenticators, including eToken and iKey smart card, USB tokens, and software-based devices. The program provides full local administration and support for multiple advanced security applications such as digital signing, pre-boot authentication and disk encryption.

MiniTool Partition Wizard Home Edition

MiniTool Partition Wizard Home Edition

The Home Edition of MiniTool Partition Wizard is a full-featured and highly useful partition manager designed to cover all your most pressing partition-related needs at no charge. The amount and quality of the functionality that it offers makes it stand out from the rest of its competitors. It adds a partition and disk copy functionality to its already extensive list of partition-related tools.

TrueCrypt

TrueCrypt

TrueCrypt is a utility that enables users to encrypt a disk within a file in order to protect the information stored on that specific disk. The encryption process is a virtual one and it does not affect the functionality of the encrypted disk. You can automatically mount and dismount drives.

  • Publisher: TrueCrypt Foundation
  • Home page: www.truecrypt.org
  • Last updated: June 10th, 2014
Symantec Endpoint Encryption Full Disk Edition

Symantec Endpoint Encryption Full Disk Edition

Symantec Endpoint Encryption Full Disk Edition provides advanced data and file encryption for desktops, laptops, and removable storage devices. This software offers scalable, enterprise-wide security that prevents unauthorized access by using strong access control and powerful encryption.

  • Publisher: Symantec Corporation