Curtain LogTrace File Activity Monitoring
In the daily work environment, companies often need to authorize their employees to access and use sensitive company data. However, most companies lack visibility into how their employees are actually utilizing this data, and whether any misuse is occurring. At the same time, companies have to meet internal audit requirements and comply with various data security regulations and policies. This creates a need for the IT department to find ways to effectively monitor and record how employees are accessing and using the company’s data resources.
Curtain LogTrace provides enterprise-wide file activity monitoring. It tracks user actions: create, copy, move, delete, rename, print, open, close, save. Includes source/destination paths and disk type. Perfect for monitoring user file activities.
Key Features:
- File log (create & delete file)
- File log (copy & move file)
- File log (print & rename file)
- App log (save, open & close file)
- Support MySQL & MS SQL
- Watermark for printout
- Central administration
- Integration with Active Directory
- Uninstall password for client
- Password management
- Admin delegation
- Self protection for the software
Learn more
Secure Eraser
Secure Eraser: Secure Data Deletion, Shredders Your Files & Folders.
Just because it has been removed from your hard drive doesn't mean that it is gone forever. Anyone can restore the information as long as it was not overwritten. It becomes more difficult if the computer has been resold, or given away.
Secure Eraser employs the most well-known method of data disposal. It overwrites sensitive information so that it cannot be recovered even with specialized software. Our award-winning solutions for permanently destroying data eliminate cross-references that may leave traces of deleted files within the allocation table of your hard disk.
This Windows software is easy to use and can overwrite sensitive data up to 35 times, regardless of whether they're files, folders or drives, recycle bins, or traces of surfing. You can also delete files that you have already deleted but not for good.
Learn more
iShredder
iShredder™ provides a deletion process that meets stringent international security standards, making it a trusted choice for defense ministries and government entities alike. This application is designed to cater to users ranging from novices to experts, ensuring secure data removal with the inclusion of a comprehensive deletion report. It utilizes advanced military-grade security measures, which allow both defense agencies and governmental bodies to rely on its efficacy. When files, such as documents or photographs, are deleted, they can remain recoverable from the device's available storage until their data has been thoroughly overwritten by robust deletion algorithms. iShredder™ features more than 20 certified erasure methods, surpassing international benchmarks for secure data elimination. Moreover, each of these deletion techniques has been rigorously evaluated by authorities and independent organizations to confirm their effectiveness in guaranteeing safe data destruction. With such a comprehensive approach to data security, users can trust that their sensitive information is handled with the utmost care and precision.
Learn more
CBL Data Shredder
The CBL Data Shredder is designed to ensure that any information on your hard drive cannot be retrieved once the device or computer is disposed of. Our observations indicate that files believed to have been permanently deleted long ago, which may include sensitive information such as personal identifiers, banking details, and credit card information, can often be retrieved quite simply, and merely formatting the drive fails to adequately secure this data. This issue is compounded by the presence of readily available tools that can facilitate the recovery process in various situations. By following the guidelines provided in this manual, the CBL Data Shredder will achieve what conventional file deletion and partition formatting cannot accomplish: it will completely erase all data on the designated hard drive, making it impossible for current or future software recovery methods to access it. Consequently, using the CBL Data Shredder offers an essential layer of protection for your data privacy during disposal.
Learn more