Best Gilisoft USB Lock Alternatives in 2024

Find the top alternatives to Gilisoft USB Lock currently available. Compare ratings, reviews, pricing, and features of Gilisoft USB Lock alternatives in 2024. Slashdot lists the best Gilisoft USB Lock alternatives on the market that offer competing products that are similar to Gilisoft USB Lock. Sort through Gilisoft USB Lock alternatives below to make the best choice for your needs

  • 1
    Safetica Reviews
    Top Pick
    Top Pick See Software
    Learn More
    Compare Both
    Safetica is a global software company that provides Data Loss Prevention and Insider Risk Management solutions to organizations of all sizes worldwide. Whether deployed on-premise or in the cloud, our solution is designed to protect business-critical data against accidental leaks and intentional theft in today's hybrid landscape.
  • 2
    Endpoint Protector Reviews
    Endpoint Protector, a comprehensive, all-in-one Data Loss Prevention Solution for Windows, macOS, and Linux, prevents data theft and data leakage and provides seamless control over portable storage devices. Endpoint Protector can filter data in motion and at rest using regular expressions, dictionaries or data protection regulations like GDPR, PCI DSS and HIPAA. Endpoint Protector has several modules that can be combined and matched to meet client needs. These modules include Content Aware Protection and Device Control. Enforced Encryption is also available. eDiscovery is available. It makes work easier, safer, and more enjoyable, with a great ROI.
  • 3
    ThreatLocker Reviews
    Top Pick
    For IT professionals to stop ransomware, you need to do more than look for threats. ThreatLocker helps you reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from only blocking known threats, to blocking everything that is not explicitly allowed. Combined with Ringfencing and additional controls, you enhance your Zero Trust protection and block attacks that live off the land. Discover today the ThreatLocker suite of Zero Trust endpoint security solutions: Allowlisting, Ringfencing, Elevation Control, Storage Control, Network Access Control, Unified Audit, ThreatLocker Ops, Community, Configuration Manager and Health Center. 
  • 4
    USB Block Reviews
    Limit USB drives, external devices and ports on your computer to prevent data leakage. You can whitelist your portable drives and block the rest. USB Block blocks data leaks from devices such as USB drives, mobile phones, tablets and other devices attached to your computer. It can even block certain ports and partitions. You can whitelist trusted device. You can then copy data onto your own USB drives, external drives, iPhones or Android phones, but prevent other devices from gaining access to your PC. This feature allows you to check if someone has attempted to hack USB Block using incorrect passwords. All incorrect passwords are logged in order to monitor any suspicious activities. By blocking access to files, folders and drives, you can protect your data against unwanted access. Windows kernel-level filtering and locking driver allows you to lock folders and files in Windows.
  • 5
    USB-LOCK-RP Reviews

    USB-LOCK-RP

    Advanced Systems International

    $20 per client/one-time
    2 Ratings
    USB Control & Lockdown Software to Block USB devices Access and Lock USB Ports within Windows Systems. Centralized USB Device Management, Monitoring, and Whitelisting to Protect Computers within a Network. Endpoint Security Management's USB Device Control program is an important component of Endpoint Security Management. It focuses on protecting computer systems and data assets against threats from unauthorized USB device use. To protect networks that store sensitive information or control machinery, it is necessary to control USB device access to endpoints. Latest version v12.968 (released: September 26, 2021 - Centralized USB Device Management - Secures Computers in Groups or Specific Computers. - Whitelists specific devices by Hardware ID and blocks the rest -Automatically apply Group 1 protection settings to unassigned clients. NEW! -Automatic Authorizations Mode, Whitelist USB devices across the network automatically. NEW -Receives alerts & logs USB device connections in the network. -Exports Status and Alerts Reports to csv format (Comma-separated value) - Presents Full Screen Locking on Blocking Devices (includes company logo). - Monitors and Encrypts File Transfers From Endpoints to USB.
  • 6
    KakaSoft USB Security Reviews
    Protect your files immediately after plugging the USB disk into a PC. Enjoy protection anywhere and anytime without installation. Lock and unlock USB devices on any computer, without installation. USB Disk Security protects sensitive information on USB drives using the strongest encryption techniques. Protect USB flash drives, thumbdrives, pen drives and memory sticks with password protection, encryption, and locking. This USB disk security software ensures the comprehensive security of your confidential information on your USB flash drive. Multiple layers of protection and advanced cryptography techniques ensure data security on USB flash drives. All external USB storage devices can be password protected. In 3 easy steps, you can lock data on a USB disk. You can use USB Security on any computer, without having to install it again. You can access confidential documents and ensure data security on a USB drive as soon as it is plugged in.
  • 7
    SysTools USB Blocker Software Reviews
    SysTools USB Port Blocked Software allows users to block and unblock USB ports on their computers. This software can disable and enable USB ports on any system. Download USB Port Locker free software for any Windows operating system version. You can recover a lost password by using your email address. You will need to create a new password in order to block and unblock USB ports. Re-login to the user's computer to block USB ports. USB Lock Tool is a very useful tool that blocks USB ports, preventing unauthorized users from using USB devices such as pen drives, USB drives and flash drives. A data extraction cannot be performed in your absence. USB blocker software can be used to block all USB ports on the machine.
  • 8
    DriveLock Reviews
    DriveLock makes it easy to protect your business data, IT systems and endpoints. DriveLock makes it easier than you might think. We share our knowledge and use the latest technologies. You don't need to worry about data security throughout its lifecycle or across all your endpoints. DriveLock Zero Trust Platform - Instead of closing gaps in an environment with independent and individual security silos, this model prevents access to all data. DriveLock’s centralized policies only allow access to data and applications needed by individual employees and endpoints, in line with the maxim “never trust, never verify”.
  • 9
    Acronis DeviceLock DLP Reviews

    Acronis DeviceLock DLP

    Acronis

    $615 one-time payment
    Acronis DeviceLock DLP offers comprehensive endpoint DLP (endpoint loss prevention) that identifies and protects sensitive data and monitors the operations involving it. By blocking unauthorized attempts to access or transfer data, employees can prevent data leakage and protect sensitive data-at rest. A single DLP solution can simplify data protection and reduce reporting times. It provides comprehensive visibility over data flows, user behavior, and allows for detailed visibility. By enforcing data handling policies that users cannot ignore and reducing information security risks, you can reduce information security risks. Reduce the time and hassle involved in managing a DLP solution. Acronis DeviceLock DLP can be easily deployed through Active Directory (AD). It also offers various central management consoles that can be customized to your organization's needs.
  • 10
    AccessPatrol Reviews

    AccessPatrol

    CurrentWare Inc.

    $3.99 PUPM
    1 Rating
    AccessPatrol is a data loss prevention and device control software for preventing data leakage to portable storage hardware. With AccessPatrol you can restrict a variety of peripherals including USB portable storage devices, optical media, Bluetooth, WiFi, FireWire, and cell phones. Access permissions for USB devices can be set to Allow, Read Only, or Blocked. Peripheral devices can be identified based on Vendor ID, Serial Number, and PNP Device ID. Specific USBs, External Hard drives, Imaging devices, and portable devices can be added to an Allowed List to enforce the exclusive use of company-approved devices.
  • 11
    ManageEngine Device Control Plus Reviews
    Device Control Plus Enterprise Software is designed to manage file access and device control. It features an intuitive interface that allows admins to classify USB and other peripheral devices in a way that is easy to use. It also has many data security capabilities, including the ability to restrict file copying and block unauthorized file transfers, as well as read-only file access. File shadowing and file tracing reports will also be generated to provide extensive visibility into device actions and forensic analysis on policy efficacy, network performance, and policy effectiveness.
  • 12
    DriveSecurity Reviews

    DriveSecurity

    DriveSecurity

    $ 0.71 per month
    DriveSecurity® by ClevX is a powerful anti-malware tool that prevents the spread of malware through USB drives. DriveSecurity is designed for users who use USB drives to transfer photos, music, videos, and other documents. It ensures that the files you place on your drive are free of malware. DriveSecurity removes all threats from your USB drive, including viruses, rootkits and worms. It also protects your computer from being inadvertently infected with malware.
  • 13
    Google Titan Security Key Reviews
    This is a stronger way to protect your account. Titan Security Keys are like a second lock to your password. They prevent phishing attacks and keep out any person who should not have access your online accounts, such as Gmail. Titan security. Titan Security Keys are built on FIDO®, open standards and include special firmware that Google has engineered to verify the key's authenticity. Works with the Advanced Protection Program. The Titan Security Keys can be used with the Advanced Protection Program, Google’s strongest security offering. Use with Android and iOS devices To connect to your computer, you can also use the Micro USB-A connector cable. Titan Security Keys are compatible with Google phones, Chromebooks and tablets, Google's Advanced Protection Program and almost any device running Google Chrome.
  • 14
    Donglify Reviews

    Donglify

    Donglify

    $16 per month
    Donglify solves dongle-sharing problems. The app allows you use a USB dongle even if you don't have it. You can use the app to redirect your USB dongles to any place on the network. It is common for a licensed USB key owner to need to access the functionality of their device even if a physical connection is not possible. Donglify solves this problem. The solution's advanced port redirection technology allows you to send your USB security dongles across any distance and in any environment. No problem if a USB dongle attached to your computer isn't recognized by the virtual machine running on it. Install Donglify on both your host and guest operating systems to redirect your device into a virtual environment. Send login tokens to other Donglify users.
  • 15
    Gilisoft #1 All-in-One Toolkit Suite Reviews
    The 22 Powerful and Usable Software in One Package includes Video Converter, Video Editor and Screen Recorder Pro. Also included are Audio Converter Ripper, Recorder Pro and Audio Editor. The #1 All-in-One Toolkit Suite can perform almost any multimedia ripping, conversion, burning, or editing task. You can make your computer safe with encryption tools. You can also recover lost files and speed up the performance of your PC with RAMDisk. You can perform almost any multimedia work using audio and video tools. And you can perform encryption operations with encryption software. Download it for free and try it out!
  • 16
    Domain Blocker Reviews
    It helps you hide ads, avoid tracking and load pages faster. Domain Blocker was designed to be as efficient in terms of speed (CPU), memory (RAM) and efficiency (RAM). The idea behind Domain Blocker is that you won't ever use all of the rules in a blocklist with thousands of rules. Domain Blocker allows you to build your blocklist as you go. You can block advertisement domains to disable the display of certain pervasive ads. You can block tracking domains to prevent services from obtaining information about your browsing habits. You can save traffic and speed up pages by blocking requests from unneeded domains. Keep Facebook off the Whitelist, and do more! To intercept HTTP requests from your browser, you can read and modify all data on websites that you visit. Absolutely free and without ads
  • 17
    Bitdefender GravityZone Reviews
    Bitdefender GravityZone gives organizations complete visibility into their overall security status, global security threats, as well as control over the security services that protect mobile devices, servers, and virtual desktops. All Bitdefender Enterprise Security solutions can be managed in the GravityZone via a single console, Control Center. This provides control, reporting and alerting services for different roles within the organization.
  • 18
    Domain Whitelist Reviews
    Ultimate blocker that blocks all network packets unless you allow it. Domain Whitelist blocks all network packets by default. Everything. It is up to you to create your own whitelist of domains that you trust. Everything else is blocked and kept out of your browser. It works in the same way as AdBlock, but completely. You can block most pervasive ads by blocking advertisement domains. You can protect yourself from tracking domains that collect information about your browsing habits by blocking them. You can save a lot of traffic by blocking unwanted domains (requests). This will make pages load faster and more efficiently. To intercept HTTP requests, you will need to read and modify all data on websites that you visit. Absolutely free and without ads
  • 19
    USB Blocker Professional Reviews
    USB Blocker Professional, a security program, prevents data theft and loss by blocking all untrusted USB drives. All unauthorized USB devices, external drives and network drives will be blocked until you give them permission. The program keeps a list authorized USB devices which are allowed to access your PC. You can authorize multiple USB devices simultaneously. USB Blocker Professional will not allow you to access any USB device that is not authorized by default unless it has been authorized and you are an administrator. USB Blocker Professional keeps a record of Authorized USB Devices, invalid login attempts, device logs, invalid password changes, invalid device authorization, and invalid apply change to keep you informed about any suspicious activity when using the program. Reports can be viewed at any time when you have access to this program. You can export the report as a CSV, PDF or Text file.
  • 20
    BUFFERZONE Reviews
    BUFFERZONE is a patent-pending containment and disarming system that protects endpoints from advanced malware and zero day attacks, while maximising user and IT productivity. BUFFERZONE protects individuals and organisations from advanced threats that evade detection by identifying potentially malicious content in browsers, email, and removable media. BUFFERZONE disarms the content and securely transfers it from the container to its native endpoint and secure network zones. It also provides critical intelligence that can be used for enterprise-wide security analysis. BUFFERZONE, a lightweight solution, is easy to deploy and configure. It provides cost-effective containment up to thousands of endpoints.
  • 21
    AdBlocker Ultimate Reviews

    AdBlocker Ultimate

    AdAvoid

    $2.49 per 3 devices per month
    The best ad-blocking technology in the world. Block all display ads and pop-ups. Do not allow anyone to create a list of "acceptable ads". Make your own whitelist of trusted websites. Online activity analyzers and trackers can steal your personal data. AdBlocker Ultimate helps you avoid all phishing websites. Our advanced ad blocking technology was used as the core of our brand-new Windows-based software program. AdBlocker Ultimate is an extension for your web browser that blocks annoying ads. It doesn't have a predefined whitelist, unlike its competitors. We are proud to announce the addition of AdBlocker Ultimate technology to your Android mobile device.
  • 22
    PC Matic Reviews

    PC Matic

    PC Matic

    $50 per year
    PC Matic Pro's Application Whitelisting is a critical layer of cyber-protection. It sits on top of other endpoint security products. Zero trust whitelisting solutions stop hacking and other cyber-attacks. Stop all malware, ransomware, or malicious scripts from being executed. Our whitelist cybersecurity solution will protect your network, users, and business data. PC Matic Pro is a long-overdue shift in cybersecurity industry towards absolute prevention. The threats to critical infrastructure, industry, government, and all levels of government today demand nothing less. PC Matic Pro offers a patented default deny security layer at the device. This prevents all unknown executions and does not create headaches for IT. Contrary to traditional security solutions, customer infected are not required to strengthen whitelist architecture. Local overrides can also be added after prevention, with a focus upon accuracy and no concern for responding to an active infection.
  • 23
    TestDisk Reviews
    TestDisk is a powerful, free data recovery tool! It was designed to recover deleted partitions and/or make non booting disks bootable again. This is possible when the symptoms are caused either by faulty software, viruses or human error (e.g. accidentally deleting a Partition Table). TestDisk makes it easy to recover partition tables. Fix partition table, recover deleted partition. Recover FAT32 boot section from its backup. Rebuild the FAT12/FAT16/FAT32 boots sector. Fix FAT tables. Rebuild the NTFS boot section. Recover the NTFS boot section from its backup. MFT mirror to fix MFT. Locate ext2/ext3/ext4 Backup SuperBlock. Files from FAT, exFAT and NTFS can be undeleted. Files from deleted FAT, exFAT and NTFS partitions can be copied to ext2/ext3/ext4. TestDisk offers features for both beginners and experts. TestDisk is a tool that allows you to gather detailed information about non-booting drives for those who don't know much about data recovery techniques.
  • 24
    hBlock Reviews
    hBlock, a POSIX-compliant script, creates a hosts file that blocks your system from connecting to domains that are serving ads, tracking scripts, and malware. You can download the latest version of the default blocklist from our website. Or, you can create your own using the instructions on this project page. Block tracking, malware domains, and ads to improve your privacy and security. hBlock can be found in many package managers. A system timer can also be set to update the host's file regularly for new additions. Multiple options allow you to modify the default behavior of hBlock. The hBlock website offers nightly builds of the host's files, as well as other formats. Sometimes, you might need to temporarily disable the hBlock. A quick solution is to create a hosts file with no blocked domains.
  • 25
    BlockBear Reviews
    BlockBear is an extremely simple and powerful adblocking application that allows you to browse the internet ad-free and save valuable screen space. Blocks popups, banners, and text ads. It loads many websites up to 3-5x faster, saving bandwidth and time. With a simple switch, you can block ads, online tracking, and social buttons. BlockBear Safari extension allows you to whitelist your favorite websites.
  • 26
    Kidslox Reviews

    Kidslox

    Kidslox

    $0.99 one-time payment
    You can now block specific apps on both iOS and Android. The iOS app blocking feature blocks internet access to some of the most disruptive and popular gaming apps. Kidslox's powerful content-blocking features protect your children from more than 4 million inappropriate URLs. They can only see the Google SafeSearch and Youtube restricted results. You can also manually add blocked sites. You can easily set screen time limits for your children using the daily limits feature. You can set how much screen time your children can use for the day. Their device goes into lock mode when the time is up. You can see the location of your children on the map. To make it easier to track their movements, enable location tracking. Parents everywhere will feel more secure knowing that their children are safe and well taken care of. You can filter out bad websites and keep track.
  • 27
    Maacrorit Data Wiper Reviews
    Maacrorit Data Wiper overwrites the sectors of the device using a storage-overwriting method. The storage-overwriting method complies with the requirements of the United States government for deleting sensitive data, including US Department of Defense Directive 5220.22-M (DoD 5220.22-M). Supports all popular Windows File Systems, including FAT16/32 and NTFS. Also supports Apple HFS+, ReFS, Apple Ext2/3/4, ReFS and other file formats. Supports all Windows operating systems including Windows 11/10/8/7/Vista/Windows XP (32 bit and 64 bit). Wipe sensitive data from disk drives or disk partitions completely and permanently. Unlimited Edition fully supports to directly wipe disk or partition, including system partition or drive. By default, many program files are stored on the system disk drive. This feature is required if you want to wipe the disk drive completely to prevent unauthorized use of your data.
  • 28
    SprintWork Distraction Blocker Reviews
    SprintWork is a time tracking and distraction blocking software that can help you get your work done on time. It can also help you recover time lost from social media and games. SprintWork blocks Facebook and Youtube by default. It uses a fully customizable website blocking system that can be set up in three modes: block, allow, and complete blocking of all Internet traffic. You can set each mode to only take effect at specific times or days of the week. You also have the option to lock settings for a specified time. SprintWork can block or restrict online games and programs. It also tracks active time, total run time, and each window title used while the program was running.
  • 29
    Sanitize Reviews
    Sanitize is a powerful ad-blocker that can be used as an iOS app or as a Safari extension on OS X. It blocks pop-ups, tracking scripts and pop-ups from websites visited. These things can waste mobile data, compromise privacy, slow down web browsing, and cause data loss. Sanitize speeds up web browsing, protects privacy, and leaves you with more data at month's end. Whitelist of high quality ad networks -- If you want to support independent blogs or websites but block annoying ads everywhere else you can only allow ads from networks that serve small, discreet ads. Full custom whitelist support is available to you so that you can support the sites that you love. Blocks tracking scripts and ads with a large and frequently-updated list.
  • 30
    GFI EndPointSecurity Reviews
    BYOD (Bring Your Own Device) and the use of portable storage devices in the workplace can significantly increase the risk of your business having data leakage problems. GFI EndPointSecurity has risk assessment capabilities that can identify assets that could double as data leakage sources. The dashboard provides all functionality and offers suggestions for improving protection. It also gives shortcuts to common security tasks. Data awareness module adds an additional layer of protection to your endpoints. It scans each file and searches for the most vulnerable types of information (e.g. SSNs, PANs, etc.). The module supports inputs in regular expressions and dictionary file formats. It can also help you with data loss prevention (DLP), and compliance efforts. You can use enhanced file control capabilities for scanning archived files and blocking files based on their size.
  • 31
    Cisdem AppCrypt Reviews

    Cisdem AppCrypt

    Cisdem

    $29.99 one-time payment
    AppCrypt for Mac is a reliable tool to protect your data and prevent unwanted websites. AppCrypt allows you to lock any application using one password. You can also ban purchases in iTunes or App Store, block others from viewing your photos and videos in Photos, disable games apps, and encrypt chatting records on WhatsApp. All applications can be locked with one password. AppCrypt blocks access to distracting or harmful websites in Chrome browser and Safari browser. It can block the entire domain, or just specific URLs. Blocklist can be used to filter out inappropriate websites. Allowlist allows you to access websites that are useful for your study or work. AppCrypt allows you to set up a schedule when you can access the app or website. Predefined sessions can be set up at any time and day of your choosing.
  • 32
    iSumsoft Cloner Reviews

    iSumsoft Cloner

    iSumsoft

    $19.95 one-time payment
    iSumsoft Cloner for Windows PC is a disk cloning program that can be used to copy Windows OS, data partitions and even entire hard drives. It allows you to quickly upgrade or replace the hard drive of your computer without having to reinstall Windows and lose data. iSumsoft Cloner lets you clone or copy only the Windows OS, from your computer's HDD, to another disk. It copies only the operating system partition and not any other data partitions. The cloned operating system will run flawlessly on the destination disk. iSumsoft Cloner allows you to easily backup the Windows OS, or any data partition, as an archive file and restore it to the required disk when needed.
  • 33
    Parted Magic Reviews

    Parted Magic

    Parted Magic

    $49 per year
    Parted Magic is a complete solution for hard disk management. PartedMagic provides all the tools you need to accomplish your task. You can move, copy, or resize partitions using the Partition editor. You can shrink or grow your C: drive. Make space for new operating system. Data rescue from deleted partitions: PartedMagic makes it easy to reset or change Windows passwords. Recover lost files. Files damaged by disk read errors can be saved. You can clone a computer's entire hard drive or one partition. The cloned data can be saved as an image file, or as a duplicate copy of the data. The data could be saved to a local storage device, an SSH Server, a Samba server, or a Network File System Share. You can then use the clone file to restore the original if necessary. PartedMagic can be used as a standalone Linux operating system. It can be run from a CD or USB stick. Nothing is installed. PartedMagic needs at least a 64-bit processor and 8GB RAM.
  • 34
    HDDScan Reviews
    HDDScan is freeware for hard drive diagnosis (supports RAID array servers, Flash USB and SSD drives). The program can test storage device for errors (Bad Blocks and Bad Sectors), show S.M.A.R.T. The program can change HDD parameters like AAM, APM and others. HDDScan is useful for performing a regular "health check" on your drive, predicting its degradation and allowing you to backup your files and prevent data loss before you need to contact a data recovery service. The software can also be used to monitor the temperature of the hard drive and as a reading/writing benchmark. A performance graph is shown for each test.
  • 35
    Purify Reviews

    Purify

    Purify

    $1.99 one-time payment
    Purify can often load pages 4x faster, which means you can browse the web lightning fast. Purify is a web browser that keeps up with your browsing habits. Purify prevents you from downloading junk to your device. This can eat up valuable data on your mobile plan. Purify can save you up to 50% on your data usage. Purify not only doubles the speed of your web browsing, but also reduces your data plan usage by half. The whitelist, despite the name, reflects all the colors in your deeply personal browsing choices. Purify won't filter content on whitelisted websites -- so you can support a site by allowing advertisements.
  • 36
    AOMEI Partition Assistant Reviews

    AOMEI Partition Assistant

    AOMEI Software

    $49.95 /Professional/Yearly
    AOMEI Partition assistant has more than 30 useful functions that optimize your hard disk partition's performance. It can solve the problem of low disk space, irrational partitions, and re-partition hard drives without losing data. It can manage your partitions and hard disks in the most efficient way possible. Its intuitive interface and step by step wizards make complicated partition management operations easy. Most operations don't require a reboot of your computer. All operations can be performed smoothly and without any downtime.
  • 37
    Weblock Reviews

    Weblock

    Weblock

    $1.99 one-time payment
    Choose from our predefined list to choose which ad servers or content providers you want to block from your iOS device. Import rules from EasyList and hosts files to your Android device. To block any URL, domain, or IP on both platforms, create your own blacklist or whitelist. You can use Weblock fully by visiting the Filters section. You can add your own rules and create Blacklists, Whitelists, and Redirects. Your device will not be able to access any locations or resources that match the Blacklist rules. All resources that match Whitelist rules will be available regardless of whether they are Blacklisted. You can also use proxy servers to define redirects and access URLs and domains. Block advertising - banners pop-ups and videos ads in most browsers.
  • 38
    Paragon Drive Copy Professional Reviews

    Paragon Drive Copy Professional

    Paragon Software

    $79.95 one-time payment
    Transfer your data and home OS from any source to any destination. Hard Disk Manager is available! Create backups, manage partitions, migrate data. Start working immediately after migrating the OS to a new computer. You can copy your OS to a USB flash disk and use it wherever you are. Make sure your disk is well organized. Create backups and easily migrate data. Move your laptop to a bigger hard drive by cloning your hard disk. Copy or restore data to a disk with a different size sector. Move Windows to new storage devices, backup the system and restore data. Full range of operations available, copy entire hard disk or a single partition. No additional actions are required to copy or restore the contents of a hard drive 512 bytes in size to a 4k disk. Any Windows OS, starting with Windows 7, can be migrated from HDD to a high performance SSD. You can exclude data that you don't wish to copy. Partition operations are necessary to ensure that disks are properly organized.
  • 39
    Humming Heads Reviews
    Lock down all authorized actions to prevent attacks and prevent stolen or leaked data from being read. Invisibly, continuously, and without fail. SDS allows you to focus your endpoint security efforts instead of trying to find the latest malware variants or training your users to become security experts. Shinobi Defense System is an innovative portfolio of proven technologies that has been made available in the USA for the first time. SDS protects businesses from the 3 most common and difficult endpoint security issues that cause business losses. DeepWhite, the most powerful whitelist-based protection technology, is combined with Evolution DLP, a seamless, automatic data loss protection solution. This integrated system is powered by our Active Intercept engine and ShinobiForensics reporting platform. Invisibly blocks any stolen or leaked files from being read. No interaction or rules from the end user.
  • 40
    Linutop Kiosk Reviews

    Linutop Kiosk

    Linutop

    $99 one-time payment
    Linutop Kiosk software allows you to set your computer up as an Internet kiosk. This software allows you select the starting homepage, lock the Linutop on certain websites, or block certain websites. This software can display automatically JPEG files, web page URLs and video files on a screen. Linutop.tv allows web management of the playlist including the order and time. It can be used on one or more screens. The Linutop OS includes Chromium pre-installed extensions that are fully compatible with Chrome. Firefox is pre-installed with extensions that allow you to access different web content, such as Flash, PDF, and Microsoft Word. The Linutop OS can read audio streams, network radio, webTV, Television DVB-T, and other files. Linutop software is optimized to view video files in full-screen mode.
  • 41
    Trellix Complete Data Protection Reviews
    Comprehensive endpoint encryption. Trellix Complete Data Protection is available in two packages. It provides enterprise-grade drive encryption, access control and monitoring of user behavior. Trellix ePolicy Orchestrator allows you to manage Apple FileVault for macOS and Microsoft BitLocker for Windows PCs. Secure network file sharing and protect removable media like USB flash drives and data stored in cloud storage services. Trellix Complete data protection--Advancesd features data loss prevention and full-disk encryption. Device control is also available. Data is rendered unreadable in the case of device theft or loss. Our enterprise-grade endpoint encryption solution has been certified by Common Criteria EAL2+ and FIPS 140-2. You can control which file types and folders you want to encrypt/block. You can encrypt files to cloud storage services like Box, Dropbox, Google Drive, Microsoft OneDrive, and Google Drive.
  • 42
    Vert Reviews

    Vert

    Vert

    $4 per month
    Let us build your website or you can do it yourself. Vert's website builder and lead management software keeps your business current. You should run your business, not a website design company. There are more important things you need to do than learning how to code and design. Vert makes it easy to create a website that is pixel perfect and will work across all devices. We have done all the hard work in coding and designing the blocks that will give your business a professional website that can be used on multiple devices. Simply select the block that you require, fill out the form and then stack additional blocks to complete your page. Vert allows you to create custom blocks and add plugins. Take a look at our collection of Vert-created websites. Track new leads, track their sales journeys, view all communications history, and more. All your leads can be managed in one place.
  • 43
    Sotion Reviews

    Sotion

    Cloakist Ltd

    $10 per month
    Create a website within 2 minutes, and publish it on your own domain. Control access to your Notion website with Password Protection. Email Signup. Email Whitelist. Or Paid Membership. Create a password to protect the Notion site. Access is granted to anyone who enters an email address. Ideal for collecting email addresses. Email lists allow you to control who can access the Notion site. Control access by using an email whitelist. Gumroad allows members to pay to access your content. API access for managing members via Zapier or Make. Keep your Notion page private and only allow access through your custom domain.
  • 44
    HogWallop Reviews
    HogWallop will quickly identify duplicate files, and then show you exactly where they are. This makes it easy to decide what you want to keep. HogWallop does not pay attention to the file name - it will find exact duplications regardless of the file extension or file name. HogWallop searches across all disks including CDs/DVDs, mapped network drives and more. HogWallop has a high accuracy and is easy to use. On our website (Hogwallop.com) you can see a video demo and download the app,
  • 45
    MemOptimizer Reviews

    MemOptimizer

    CapturePointStone

    $14.99 one-time payment
    The Problem: Nearly all software programs have memory leaks. These leaks can cause your computer to have less memory over time. Windows-based programs consume memory resources when they run. Unfortunately, many Windows programs don't "clean up" after their own programs and leave valuable memory "locked". This prevents other programs from using it and slows down your computer's performance. Memory is often locked in pages. This means that if your program used 100 bytes of memory, it would actually be locking up 2,048 bytes (a page) of memory. This "locked" memory could only be released by rebooting your computer. MemOptimizer™, however, is a better way to free up this "locked" memory. MemOptimizer removes memory from the inmemory cache, which accumulates with every file and application that is read from hard-disk.
  • 46
    Oracle Web Application Firewall Reviews
    Protect your applications from unwanted and malicious internet traffic using a cloud-based, PCI compliant, global web application firewall service. Oracle Cloud Infrastructure Web Application Firewall combines threat intelligence with consistent rule enforcement to strengthen defenses and protect internet-facing applications servers. A web application firewall is a tool that combines threat intelligence from multiple sources, including WebRoot BrightCloud®, and more than 250 predefined OWASP and application rules. This allows you to adopt an edge security strategy. Access controls based on geolocation, whitelisted and blacklisted IP addresses as well as HTTP URL and HTTP header, protect Oracle Cloud Infrastructure applications on-premises and in multicloud environments. You can identify and block malicious bot traffic using an advanced set verification methods, such as JavaScript, CAPTCHA and device fingerprinting.
  • 47
    Trellix Application Control Reviews
    Advanced persistent threats (APTs), which can control servers, points, and fixed devices via remote attacks or social engineering, make it more difficult to protect your business. Trellix Application Control is a tool that helps you outsmart cybercriminals. It keeps your business safe and productive. You can ensure that only trusted apps run on desktops, servers, and devices. Trellix Application Control offers organizations the ability to increase their whitelisting strategy to prevent threats. Users are demanding more flexibility in using applications in their cloud-enabled social and business worlds. Trellix Application Control gives IT multiple options to allow users to install unknown applications. These include user notifications and user self-approvals. By blocking execution of unauthorized apps, you can prevent zero-day attacks and APT attacks. To quickly identify and fix compliance and security problems in your environment, use inventory search and predefined reports.
  • 48
    USBSecure Enterprise Reviews

    USBSecure Enterprise

    Lugrain Software

    $ 298 for 10 PCs
    USBSecure Enterprise is a USB port security software for enterprise networks. USBSecure Enterprise protects your network from unwanted USB devices. Whitelists allow you to define the allowed USB devices per user. Centralized management, but no dedicated server required. USBSecure Enterprise also supports standalone machines. Supported devices: USB devices, Bluetooth devices, eSATA and FireWire devices, SD cards, floppy and CD/DVD drives.
  • 49
    Datawisp Reviews
    Learning code shouldn't stop you from finding mission-critical information. Datawisp replaces code with visual blocks. Simply pick a data source, transform the data, and choose an output type. The visual query builder allows you to work with multiple data sets and format the result as a table or chart. Datawisp is a no-code query generator that allows you to work with one or more data sets and format the results as a table or chart. This will help your team work with data effectively and help you drive your business forward. Datawisp sheets can be easily shared across teams, making it simple to collaborate with others in real-time. Our API allows you to access analysis from third-party websites and apps. You can create an in-game leaderboard and export wallet addresses to make a whitelist.
  • 50
    ONERECOVERY Reviews
    ONERECOVERY, a trump-card product of MAX&MINI TECHNOLOGY LTD, provides the most comprehensive solution to all types data loss. Hard drive recovery(HDD recovery), photo&video recovery, system crash computer recovery, USB data recovery, SD card data recovery, etc. All of these methods are easy to use and require only three simple steps. ONERECOVERY's advanced recovery technology allows you to recover your data from any scenario. This includes accidental deletion by a human, hard drive failures, computer OS crashes, virus attacks, BSODs, and many more.