Best ShieldApps AppLock Alternatives in 2024

Find the top alternatives to ShieldApps AppLock currently available. Compare ratings, reviews, pricing, and features of ShieldApps AppLock alternatives in 2024. Slashdot lists the best ShieldApps AppLock alternatives on the market that offer competing products that are similar to ShieldApps AppLock. Sort through ShieldApps AppLock alternatives below to make the best choice for your needs

  • 1
    DriveStrike Reviews
    See Software
    Learn More
    Compare Both
    DriveStrike is simple to use, implement, and manage. DriveStrike allows you to perform remote wipe, remote lock, or remote locate commands on any platform. Mobile device management MDM for mobile platforms. Integrated drive encryption support. Our support team is available to answer any questions, help you install our services, or manage your account. It's never been easier to protect your data and devices. We are happy to answer any questions you may have or help you understand how to best protect your data. Protect your business with a device- and data protection platform that keeps all devices protected with a single solution. Your Workstations, iPads and iPads, Smartphones as well as Tablets, Tablets, Tablets, and Laptops will be protected, organized, secure, & protected.
  • 2
    Ransomware Defender Reviews

    Ransomware Defender

    ShieldApps Software Development

    $49.99 one-time payment
    Ransomware Defender from ShieldApps is a unique solution that deals with ransomware. Ransomware Defender is specially designed to detect and block ransomware before it causes any damage. It blacklists and stops both unique and common ransomware. Ransomware Defender is installed and stands guard 24 hours a day using active protection algorithms that are enhanced with user-friendly notifications and alerts. Ransomware Defender is fully automatic and takes care of all threats using an advanced Scan > Discover > Lock Down mechanism. This protects against detected threats and works with all major antiviruses and antimalware products. Ransomware Defender includes a scheduled automatic scan, a secure file eraser, lifetime updates, and support! It detects and removes all known ransomware before it can cause damage to your computer. This program will scan your computer and locate hidden ransomware in high- and low-level folders.
  • 3
    USB-LOCK-RP Reviews

    USB-LOCK-RP

    Advanced Systems International

    $20 per client/one-time
    1 Rating
    USB Control & Lockdown Software to Block USB devices Access and Lock USB Ports within Windows Systems. Centralized USB Device Management, Monitoring, and Whitelisting to Protect Computers within a Network. Endpoint Security Management's USB Device Control program is an important component of Endpoint Security Management. It focuses on protecting computer systems and data assets against threats from unauthorized USB device use. To protect networks that store sensitive information or control machinery, it is necessary to control USB device access to endpoints. Latest version v12.968 (released: September 26, 2021 - Centralized USB Device Management - Secures Computers in Groups or Specific Computers. - Whitelists specific devices by Hardware ID and blocks the rest -Automatically apply Group 1 protection settings to unassigned clients. NEW! -Automatic Authorizations Mode, Whitelist USB devices across the network automatically. NEW -Receives alerts & logs USB device connections in the network. -Exports Status and Alerts Reports to csv format (Comma-separated value) - Presents Full Screen Locking on Blocking Devices (includes company logo). - Monitors and Encrypts File Transfers From Endpoints to USB.
  • 4
    ShieldApps Webcam Blocker Reviews

    ShieldApps Webcam Blocker

    ShieldApps

    $29.99 one-time payment
    ShieldApps Webcam Blocker is a highly sophisticated security program that uses advanced privacy enhancement algorithms. It's packaged in an easy-to-use interface that provides protection with just one click. ShieldApps' Webcam Blocker stops hackers from accessing or using information collected via a webcam or microphone against you. The user-friendly interface allows you to easily control Webcam and Microphone-blocking features with just one click. ShieldApps' Webcam Blocker provides an additional layer of protection for your computer, and is proactive in protecting your privacy. After selecting the options, any attempt to access your webcam from the outside or inside will be denied.
  • 5
    ShieldApps VPN Reviews

    ShieldApps VPN

    ShieldApps

    $79.98 per year
    ShieldApps VPN secures your connection between the device you are using, the WiFi hotspot you have connected to and the internet. ShieldApps VPN protects your online browsing against tracking, information snooping and ip-logging, and more. It provides you with complete anonymity and privacy. ShieldApps VPN masks and fakes your location using strong encryption algorithms. This allows you to browse the internet without any geographical restrictions, censorship, or other restrictions. Watch any content from anywhere. ShieldApps VPN server locations are spread across multiple countries, allowing users to choose any remote server they want, and mask their location. ShieldApps can be used on desktops, laptops and android devices. ShieldApps is compatible with a variety of operating systems and devices. This ensures your privacy, wherever you use it.
  • 6
    Intelli-M Access Reviews
    Cost-effective security solutions that are simple to set up, manage, and scale to meet changing needs. Infinias access control systems have been trusted for many years. 3xLOGIC offers cost-effective security solutions that can be used in cloud or server-based environments. They are simple to set up, manage, and scale to your changing needs. Access control is easy and affordable with this cloud-based solution, regardless of your technical skills or business size. Users can view, monitor, and report on all events and alarms. They can also define multiple security roles and grant access privileges to individual users. The powerful rules engine allows customers to create the functionality they require such as Lock-down and First-in, Last-out, n–man rule, and many other features.
  • 7
    1Gallery Reviews
    1Gallery is the ideal alternative gallery app for managing your photos. Hidden encryption features allow you to protect your photos and videos. You can search, create new folders, move/copy data, and much more (including SD cards). You can crop, rotate, resize, and filter. View large images and many other photos and videos. Protect your privacy and your photos. Hide photos and videos (copies or ID cards, credit cards, etc.). All hidden files are encrypted. Password mode, PIN, pattern, fingerprint. This app is simple and elegant, and will provide a seamless experience. You can organize your photos and videos. View large images, photos and videos (RAW, SVG, panoramic, etc.). Transfer photos to a new phone. Show hidden folders and files on the computer. Copy folder gallery to storage. Paste folder gallery to new storage (root). Install 1Gallery app, and set up with the previous email.
  • 8
    LockDown Browser Reviews
    LockDown Browser®, a custom browser, locks down the testing environment within an learning management system. LockDown Browser has been used by over 2000 higher education institutions and is considered the "gold standard" in securing online exams in classrooms and proctored environments. LockDown Browser's title says it all: It "locks down" the browser from a computer or tablet. Online exams are not allowed to allow students to print, copy, access or view other applications, nor can they print from other websites. LockDown Browser blocks hundreds of advanced and common digital cheating methods, including screensharing, screensharing, instant messaging and screen recording. It also prevents students from accessing other websites during an online exam.
  • 9
    WinLock Professional Reviews

    WinLock Professional

    Crystal Office Systems

    $31.95/one-time/user
    This ultimate security solution allows you to restrict access to different computer resources. It includes all the features of the Standard edition and security capabilities for computer administrators and power users: parental control, Internet restrictions and guest password. Remote access, USB authentication, desktop or webcam snapshots and remote access are some of the other security capabilities available. This powerful security solution protects your computer from unauthorized use. All-in-one security solution that allows you to manage Windows security at a very low level. In a multi-user environment, create different protection schemes for each account. WinLock will only activate the restricted restrictions for each user. Internet Explorer restrictions and website content filters can be used to protect and control Internet access. It supports most of the well-known browsers. WinLock is accessible via USB flash drive. Any USB flash drive can be used as a protection key for WinLock.
  • 10
    Norton AntiTrack Reviews
    You can browse without losing speed, even on sites that restrict access to other tools. Clearing cookies doesn't stop companies from using your digital fingerprint to profile you. You can monitor tracking attempts and see how we keep your data more private with a dashboard. Your subscription starts when your purchase is complete (or when you pay). To get protection, you must install the software on each device. NortonLifeLock reserves the right to cancel any special offer. Subscribing means you are purchasing an automatic renewal subscription.
  • 11
    SureLock Kiosk Lockdown Reviews

    SureLock Kiosk Lockdown

    42Gears Mobility Systems

    $1.99 per month
    Kiosks can be used to provide self-service solutions and have proven to be a valuable tool for any industry. There are many types of kiosks available today that allow people to perform services that were previously performed manually. Businesses can use off-the-shelf smartphones and tablets as kiosks in high-foot-traffic areas to increase conversion and sales. Converting off-the-shelf devices into kiosks saves businesses money on infrastructure. SureLock is a leading industry tool that locks devices into kiosk mode. SureLock can be used as a standalone license. However, SureMDM, the 42Gears solution for managing devices, allows you to access SureLock. Kiosk solutions lock down devices to kiosk mode, giving businesses greater control over their apps. This kiosk lockdown software allows them to restrict user access to specific apps or content and configure business apps.
  • 12
    LoanTek Reviews
    It's never been easier to manage rate locks, compensation margins, overlays and margins. LoanTek's pricing engine feature, 'Lock Desk Manager', is an intuitive lock management system. Lock Desk Manager offers unparalleled efficiency and convenience in managing pricing rules, mortgage rate locks, and other financial information across all your lenders. LoanTek's best execution pricing tool allows users to manage overlays, compensation, create the best execution rate sheets and much more. LoanTek's Lock Desk Manager simplifies the process of managing your mortgage rate locks. It displays all of your current and future rate locks for all lenders in one simple-to-use interface. You can view and manage all your rate locks from one screen. This allows you to save time and ensure that the best execution pricing is being applied. Our mortgage pricing engine gives you access to historical pricing and allows you to access the best execution pricing results.
  • 13
    Veyon Reviews
    Veyon's user interface is optimized for ease of use and quick access to all the important features. Veyon gives you complete control over your classroom. With just one click, you can view all computer screens in an icon view. You can also access individual computers by clicking on the icons. It takes only one click to take screenshots of computers. You can draw attention to your lesson by locking all computers, and blocking input devices, with just one button. Demo allows you to share the screen contents of your (or a student’s) computer with all students. Everyone can see the contents of the presenting person's screen in real-time. There are two demo modes: Fullscreen mode locks all input devices during the presentation. Users can adapt the workflow in window mode. Veyon can access the information stored on your ActiveDirectory or LDAP server.
  • 14
    SureMDM Reviews

    SureMDM

    42Gears Mobility Systems

    $3.49 per month
    Secure, Monitor, Manage, and Manage employee-owned devices. You can avoid security risks and resolve maintenance issues throughout the device's lifecycle. 42Gears SureMDM is an intuitive and powerful MDM software and app for Android, iOS/iPadOS and Windows. It can also be used on iOS/iPadOS and Windows. You can manage, secure, monitor and manage company-owned devices. Employee-owned devices can also be used to access company data (BYOD). SureMDM integrates all aspects enterprise mobility through unified endpoint administration, including Mobile Application Management and Mobile Device Management. SureLock is available for kiosk lockdown, SureFox is a secure browser for lockdown, and SureVideo is a secure digital signage solution.
  • 15
    Samsung Gallery Reviews
    Samsung Gallery is the best app for image and video viewing for Galaxy users. Samsung Gallery allows you to view your images and videos quickly and easily. It is used in all Galaxy smartphones worldwide. The new Gallery feature can be easily experienced by updating the app. Get Samsung Gallery updated and enjoy images & videos in a smarter way. The default functionality of the service can be turned on for optional permissions. However, it is not allowed. To use Samsung Cloud, this service checks the device-unique identification information. When adding name tags to people, this information is used to get contact information. When editing location information, this information is used to provide current location information.
  • 16
    LimaxLock Reviews

    LimaxLock

    LimaxLock

    $1/month per device
    1 Rating
    LimaxLock MDM was created to help you manage all your android mobile devices using a single, simple-to-use platform. Our app will give you access to many features and tools that will help you: All devices must be subject to the same security policies Remotely wipe out or lock stolen or lost devices Track the exact location of your devices in real time Monitor device usage and activity Securely distribute apps, content, and files to devices LimaxLock MDM platform is designed to help companies protect data and other resources via device-level policies.
  • 17
    iToolab UnlockGo Reviews
    One-Click Samsung/Xiaomi/Redmi/Vivo/Motorola/Realme FRP Bypass Tool If you are second-hand phone resellers and would like to remove the Google FRP after factory reset, UnlockGo (Android) helps you remove FRP lock entirely in a few clicks. Help you bypass Google lock on Samsung/Xiaomi/Redmi/Vivo/OPPO/Motorola/Realme devices running Android 5-14 in only 3 minutes, then you gain full access to the phones and tablets. No Gmail or PIN code required. Works perfectly with most Samsung/Xiaomi/Redmi/Vivo/OPPO/Motorola/Realme models. Its easy-to-use steps save you time on training and operation. Master Key of Android Screen Locks Remove all Android screen locks: PIN, Pattern, Password, Fingerprints, and Face Recognition. Bypass screen locks on earlier Samsung without data loss or resetting (Before S7). Suitable for all major Android brands: Samsung, HUAWEI, Xiaomi, Motorola, etc. Support 15+ brands, 6000+ Android phones and tablet models. You will support by one on one customer service.
  • 18
    ImageGlass Reviews
    ImageGlass is another open-source basic image viewer. It is simple but it is very fast and a good choice for Windows users. ImageGlass comes with many shortcut keys that will help you save time in your daily workflows. This guide will provide a quick reference for each shortcut in ImageGlass. ImageGlass supports most image formats including GIF, PNG and WEBP. You can also customize this extension list easily. ImageGlass command lines are easy to use. These commands are useful for system administrators and other programs that call the application. ImageGlass can be used to configure, pre-define and lock certain settings during installation.
  • 19
    Folder Lock Reviews

    Folder Lock

    NewSoftwares.net

    $39.95/one-time/user
    1 Rating
    Lock your files with AES256-bit military-grade encryption to protect them from prying eyes. Keep prying eyes away! Folder Lock allows you to lock and hide files and folders in seconds. It allows you to Password Protect and prevents unwelcome eyes from seeing files, folders, or drives. Once you have locked a folder, it will disappear from its previous location and cannot be accessed except through the software interface. Folder Lock creates Lockers. You would place your money in a safe. Would you rather keep your files in a digital "Locker" that is safer than a bank vault? You can create "Locker(s)," which are protected with AES256-bit encryption. Accessing files does not require encryption or decryption. Simply copy them to Locker, and voila! They are encrypted instantly. Folder Lock provides a 2-way encryption method and backup that allows you to back up your encrypted 'Lockers’ online.
  • 20
    Acronis DeviceLock DLP Reviews
    Acronis DeviceLock DLP offers comprehensive endpoint DLP (endpoint loss prevention) that identifies and protects sensitive data and monitors the operations involving it. By blocking unauthorized attempts to access or transfer data, employees can prevent data leakage and protect sensitive data-at rest. A single DLP solution can simplify data protection and reduce reporting times. It provides comprehensive visibility over data flows, user behavior, and allows for detailed visibility. By enforcing data handling policies that users cannot ignore and reducing information security risks, you can reduce information security risks. Reduce the time and hassle involved in managing a DLP solution. Acronis DeviceLock DLP can be easily deployed through Active Directory (AD). It also offers various central management consoles that can be customized to your organization's needs.
  • 21
    Moki Kiosk Reviews

    Moki Kiosk

    Moki Mobility

    $8.00/month
    Businesses have new ways to interact with customers through digital kiosks. They can provide self-service or educational tools. Moki's remote management capabilities allow you to quickly deploy, monitor, and control tablet-based kiosks. Moki Kiosk mode allows for you to lock your devices to certain URLs and applications in order to provide consistent user experiences. It can be tedious and time-consuming to deploy tablets for Digital Kiosks. Moki's MDM solution can speed up deployments. Moki's automated enrollment, profile, and app installation can be used to quickly set up one or many devices.
  • 22
    jAlbum Reviews
    The jAlbum desktop app creates photo album websites using your images. Drag and drop your images and videos onto jAlbum. Then press "Make" to upload your website to your site. If you don't already have one, you can upload to jalbum.net. We don't lock your images in one place, unlike other image sharing services. You have complete control over the management, storage, and presentation of your images. Your metadata is protected by open standards. There is no lock-in. You can host your images with us, or any other web hotel you choose. Your galleries will work without us. There are few options for stylish presentations from competitors (mostly, only CSS variations of the same functionality). You have many options for templates/themes (we call them skins), each with its own unique functionality and presentation.
  • 23
    Cisdem AppCrypt Reviews

    Cisdem AppCrypt

    Cisdem

    $29.99 one-time payment
    AppCrypt for Mac is a reliable tool to protect your data and prevent unwanted websites. AppCrypt allows you to lock any application using one password. You can also ban purchases in iTunes or App Store, block others from viewing your photos and videos in Photos, disable games apps, and encrypt chatting records on WhatsApp. All applications can be locked with one password. AppCrypt blocks access to distracting or harmful websites in Chrome browser and Safari browser. It can block the entire domain, or just specific URLs. Blocklist can be used to filter out inappropriate websites. Allowlist allows you to access websites that are useful for your study or work. AppCrypt allows you to set up a schedule when you can access the app or website. Predefined sessions can be set up at any time and day of your choosing.
  • 24
    WikiLocks Reviews
    WikiLocks works in the same way as you do. It works within your most used applications. Select the data you wish protect, then assign access to individuals and groups. Finally, distribute the newly protected document. No matter how the document is accessed, copied or pasted, protection will continue to follow it throughout its lifecycle.
  • 25
    KakaSoft USB Security Reviews
    Protect your files immediately after plugging the USB disk into a PC. Enjoy protection anywhere and anytime without installation. Lock and unlock USB devices on any computer, without installation. USB Disk Security protects sensitive information on USB drives using the strongest encryption techniques. Protect USB flash drives, thumbdrives, pen drives and memory sticks with password protection, encryption, and locking. This USB disk security software ensures the comprehensive security of your confidential information on your USB flash drive. Multiple layers of protection and advanced cryptography techniques ensure data security on USB flash drives. All external USB storage devices can be password protected. In 3 easy steps, you can lock data on a USB disk. You can use USB Security on any computer, without having to install it again. You can access confidential documents and ensure data security on a USB drive as soon as it is plugged in.
  • 26
    SAIFE Connect Reviews
    The perimeter that was well-defined and locked down no longer exists. As applications, data, and people have become more distributed, the perimeter has moved to wherever users are and to whatever internet-connected devices they use. It's now even more porous than before. You might be wrong to believe that your perimeter-centric defenses are protecting it. It's time for you to switch off your VPN and use SAIFE®. SAIFE Connect eliminates the notions of a traditional network perimeter, trusted users, and devices. Instead, SAIFE Connect creates on-demand, zero trust network microperimeters for each connected device. These micro-perimeters are based on attributes like user identity, device identification, location, date, and time, as well as device posture. Zero trust security monitoring ensures devices are constantly monitored and immediately quarantined if they are found to be in violation.
  • 27
    EduManage Reviews

    EduManage

    Nexus Educational Services

    EduManage was designed to be easy and simple to use. It is easy to find relevant information and perform tasks with ease thanks to its clean and modern design. The site was built from the ground up using input from Child Care Center Directors and Owners. It is a real-world solution that addresses real needs of users like yourself! There is nothing to install. Access anywhere! Access anywhere! You can report on everything from payments to course scheduling, allergen tracking, reporting, and even reporting on payments. Explore a demo today! First-class support from the USA. Contact us by phone, email, and chat! $1/mo per child. No hidden fees. Additional users are not charged extra There are no restrictions on the features. You can access the entire application!
  • 28
    BlueID Reviews

    BlueID

    BlueID

    €5 per month
    BlueID provides secure and flexible digital locking systems and access control solutions, allowing for simple, efficient and future-proof management of access. Their products are compatible with both Bluetooth Low Energy (BLE), and classic NFC transponders, for unlocking using smartphones. The electronic door handle is a stylish solution for wireless access control that can be used for indoor and outdoor doors. BlueID's digital lock cylinder supports NFC and BLE technology and is suitable for indoor and outdoor usage. Their wall reader also allows for flexible control of electronic doors, barriers, turnstiles and elevators. These solutions are easy to install, retrofit and feature modern user interfaces. They can also be integrated with third-party system. BlueID's systems can be adapted to various sectors including office buildings, hotels and applications.
  • 29
    Shield Docs Reviews

    Shield Docs

    Shield Docs

    $49.95 per month
    KPMG Shield Docs allows you to achieve a balance between security and freedom by providing a trusted environment that allows you to share and work together on confidential information in confidence. KPMG Shield Docs, an innovative cloud-based software, combines secure file sharing with collaboration, virtual data rooms, document management, and data protection into a single solution. It offers a customizable and intuitive mix of functions that allows you to share, edit and store critical files and data sets, with complete visibility and efficiency. This gives your business peace-of-mind knowing that sensitive information is protected from unauthorized access. This module provides the core security functionality for the KPMG Shield Docs Platform. It includes features like granular access control for users, digital fingerprinting and remote document termination.
  • 30
    Randtronics DPM easyCipher Reviews
    Randronics DPM EasyCipher provides Transparent Data Encryption lock-box protection for files, folders and databases. The contents are automatically decrypted by authorized users. TDE-protected items are locked or unlocked like a lockbox. DPM easyCipher, a centrally-managed, policy-based encryption solution, allows an organization standardize its encryption by defining and implementing encryption policies on any server or laptop that has a DPM easyCipher Agent installed. DPM easyCipher secures all files and directories on servers and laptops. DPM easyCipher protects database servers, web/app server, and file servers. DPM easyCipher is a database-native TDE solution that can be extended or replaced by database vendors in order to secure their DB products. Use easyCipher for information outside the database.
  • 31
    PrefixNE Reviews

    PrefixNE

    Prefix IT

    $394.94 one-time payment
    PrefixNE gives you control over your network. You can access the most current software and hardware inventories, software licensing compliance monitoring, as well as critical alerts about asset status. PrefixNE automates and permits remote performance of a virtually limitless number of daily tasks, including software deployment, switching off PCs, and restarting. This saves you time and increases IT productivity. You can control devices such as memory sticks and PDA's connected to the network. This provides protection against malware attack and data theft without having to lock down all USB ports. PrefixNE is the most cost effective solution for IT professionals on the market. PrefixNE is a simple, cost-effective solution that provides all the functionality you need for managing your network assets.
  • 32
    InstaKey Reviews

    InstaKey

    InstaKey Security Systems

    InstaKey Security System offers a comprehensive program to control keys. It is designed to increase security and reduce costs by using innovative hardware solutions, cloud management, and dedicated customer support. Their program includes user-rekeyable lock that can be rekeyed 12 times without locksmith assistance, and restricted, serialized key that prevents unauthorized duplication. InstaKey's solution allows organizations to maintain control over key access systems and streamline key management processes. It also helps them respond effectively to security breaches and key losses. Our keyways are restricted. This means that the blanks are not available in the open market. Local locksmiths and hardware shops are unable to obtain them, limiting the possibility of unauthorized duplication and improving control. Each InstaKey blank key is stamped with an unique serial number that records when and how the key was cut and who issued it, giving it its own fingerprint.
  • 33
    Hidemium Reviews
    Hidemium software aims to protect privacy by creating a fingerprint that is consistent (no leaks, mismatches or mismatches). To pass BOT tests and avoid being banned for using multiple accounts, generate a hard fingerprint code. (Each browser is a finger print, masquerading under different parameters: IP address, Time Zone, Location Geography Font, Media Device Hardware, Operating System ...). Have you ever or do you still experience revenue loss as an MMO when advertising accounts or online stores are banned? Or do you spend a lot time managing multiple social networks that are often locked up? Hidemium software is designed to help users manage multiple social networks or perform multi-browser functions such as MMO, Airdrop etc... Even playing online games smoothly. Keep your Facebook, Gmail and Tiktok accounts, as well as any other account you may have, offline to prevent it from being deleted for unknown reasons.
  • 34
    Silent Install Builder Reviews
    Silent Install Builder was created to allow users to create silent setup packages that allow them install multiple applications on multiple computers. Silent Install Builder allows you to create multiple installers. These are recognized by the program. The supported categories are InstallShield (Inno Setup), Wise and NSIS. It is easy to get used to the application thanks to its two-sided interface. The left pane shows the components of your project in a well-organized manner. While the right side allows you to edit the properties of each component. You can provide detailed information about your package, including the name of the product, version, manufacturing company and a brief file description. A welcome message is also included in the final output. It is also necessary to specify the location of the actual installer files.
  • 35
    LockStep Reviews

    LockStep

    FFD

    $799.00/one-time/user
    LockStep is a fast authoring interface that can be used with the same integrated editors as WinSequence Enterprise. LockStep supports direct image capture using supported cameras just like WinSequence enterprise. LockStep is intended for smaller companies that only need a single-user desktop solution to author and export PDF instructions. LockStep and enterprise products share the same data model. LockStep can be easily upgraded to the enterprise suite when it is convenient. The transition occurs when authors require a networkable multi-user solution, when electronic work instructions via a web browser are required in production, or when integration is desired with other IT solutions. WinSequence Enterprise will look and feel the same as LockStep authoring software. This means that only minimal training is required to access additional functionality in WinSequence.
  • 36
    e-IEP PRO Reviews
    MediaNet Solutions, Inc. developed the e-IEP PRO student management system for special education. It is a web-based, customizable software that simplifies management of the special educational process. Our education management solutions include eIEP PRO, eELL PRO and eMTSS PRO. All student data can be managed centrally. Accessible from any computer, tablet or smartphone connected to the Internet. All stakeholders can easily access student IEPs, and more. Notification of important dates, including IEP and MET reviews, meetings, and due dates for IEPs. Documentation of assessment data and eligibility data is provided for each special education student. Easy paperless transfer electronic student records. Document locking allows IEP teams and students to lock down documents in order to protect data integrity. All users have 24/7 access to integrated training videos and a software support section.
  • 37
    DriveLock Reviews
    DriveLock makes it easy to protect your business data, IT systems and endpoints. DriveLock makes it easier than you might think. We share our knowledge and use the latest technologies. You don't need to worry about data security throughout its lifecycle or across all your endpoints. DriveLock Zero Trust Platform - Instead of closing gaps in an environment with independent and individual security silos, this model prevents access to all data. DriveLock’s centralized policies only allow access to data and applications needed by individual employees and endpoints, in line with the maxim “never trust, never verify”.
  • 38
    VIPRE Privacy Shield Reviews
    VIPRE Privacy Shield, a privacy-focused software, is designed to protect users' personal data and online identities from prying eyes. It has powerful features such as data file shredding that permanently deletes sensitive documents to prevent recovery and a history cleaning tool that removes browsing histories, cookies and other digital fingerprints. VIPRE Privacy Shield includes webcam and mic blockers to ensure that malware or unauthorized apps cannot access these devices. VIPRE Privacy Shield's easy-to-use controls, customizable settings and privacy protection against identity theft, data exposure and other risks are all protected by VIPRE Privacy shield.
  • 39
    Lockbox Reviews

    Lockbox

    Global Archives

    $250 per month
    LockBox's online document storage software is unrivalled in the industry due to its simplicity and security. LockBox allows clients to access their records anywhere they are. The services offered range from scanning one file from our storage facility to having all records scan and made available through our desktop portal. Staff can access the information they need with our simple and secure software without having to go to the basement or store room. LockBox is a collection of web-based software solutions that work together to archive documents in an offsite, private online library vault. Authorized users can access the library with minimal training and quickly view, share, and locate individual documents. To ensure security and control, a designated administrator oversees all user operations.
  • 40
    Privacy Reviews

    Privacy

    Privacy.com

    $10 per month
    Privacy allows you to control who and how much you can be charged. You can create virtual payment cards to pay for subscriptions or one-time purchases, right from your browser. You can set spend limits, unpause, pause, or close your cards whenever you like. Virtual payment cards can be used to protect your card details and money. Our browser extension will save you time when you shop online. With just one click, create and auto-fill secure card numbers during checkout. Privacy Cards are only valid at the first merchant they're used at. Your card number cannot be used elsewhere if the merchant is compromised. This adds an extra layer of protection. To prevent hidden fees or double charges on recurring expenses, create a Spend Limit for each card. If a transaction exceeds the limit, it will automatically decline.
  • 41
    Admidio Reviews
    You can manage your group, association or organization with just a few clicks. Admidio is an online membership management tool that is free and available for all types of organizations, groups, and associations. It offers user management and a variety modules that can be installed on existing or new homepages. Admidio is a webmaster tool that allows them to manage their group, association or organization. It also includes access control and membership management. Protects member data from unauthorized persons. You can freely configure member lists and export them to different file types (Excel PDF, CSV). You can create events that you can cancel or commit to. You can upload, manage, and view photos and albums in a photo gallery. Documents and other files can be made available to members and visitors. Individually assign rights to groups, departments, and properties.
  • 42
    NExTT Reviews
    Our single-based technology can be used to provide solutions for billing and claims discounting, verification insurance, and use of our injury tracking software. Vivature's first biometric kiosk allows athletes to check in when they arrive at the training room. It also allows them to see their scheduled appointments, repeat treatments, and self-document on items such as ice bags for preventative injury. Access to the kiosks is restricted by IP so you must have an IP address registered for each training room. This means that the system cannot be accessed without being tracked. All websites that are not associated with NExTT are also locked. The software will also register students and athletic trainers. Their fingerprints will bring up another screen to aid them in documenting in real-time.
  • 43
    Internet Lock Reviews

    Internet Lock

    TopLang Software

    $29.95/one-time/user
    Internet Lock provides access control and password protection for your internet connections. Internet Lock allows you to fully control your internet connections and programs. Internet Lock allows you to restrict or password protect internet access. You can also schedule internet access. It protects internet programs on specific IP addresses or domains. You can limit access to the websites you specify or prevent them from accessing unwelcome websites. Internet Lock can be used to block internet connections and programs. Internet Lock will block programs from accessing the internet. Internet Lock can be used to password protect internet connections and programs. To access protected programs, users must enter the correct password. Internet Lock displays a window asking users to enter their password when a password-protected program attempts to connect to the internet. If the user cannot provide the correct password, Internet Lock will pop up.
  • 44
    iLocker Reviews

    iLocker

    Protectstar

    $376 per year
    iLocker makes your Mac more flexible and safer, even if you are sharing your Mac with others. iLocker Mac protects each app from unauthorized access, including Apple Mail, Photos Contacts Safari and Games. iLocker Mac protects the apps you choose. It also records failed attempts to access protected apps so that you can see the date and time. To improve security, the automatic exit feature locks down the app after a certain time when you are away from the keyboard. There is only one way to protect the app you want. You can just drag and drop your apps onto the button. You can now unlock your Mac instantly. Apple Pay is a secure way to make online purchases. Access system settings and locked Notes quickly. You can even switch users with a single touch.
  • 45
    Voicekey Reviews
    Voicekey is a patent-pending voice biometrics product that uses stateless Neural Network Technology/AI to solve non-faceto-face identity authentication problems and security concerns. Voicekey is a computational NN/AI-engine that is used on-device and server-based in an identity security app. Voicekey processes that are involved in verification and enrolment can be accessed and consumed on-device. Voicekey is a user-configurable software 'lock' that only registered users can open. (The lock is based on the NN/AI technology.
  • 46
    Ericom Shield Reviews
    Ericom Software offers businesses Zero Trust Secure Access to corporate apps, on-premises and in the cloud, from any device or location. Ericom Shield, a clientless enterprise-grade security solution, is designed to meet the needs of IT professionals and security personnel. It also provides transparent Internet access for end users via Remote Browser Isolation. Ericom Shield is available for deployment across any organization, on any device, with any operating system or browser. It does not require the installation of any software or plug ins on endpoints. Before files can be downloaded, they are scanned and cleaned using a Content Disarm and Reconstruction process (CDR).
  • 47
    FileSearchEX Reviews
    FileSearchEX is a no-nonsense file search tool for Windows 7 and above. It provides a simple and classic search interface that makes searching for files and their contents easier. The most natural way to find files and folders on modern operating system systems. FileSearchEX, a Windows alternative search tool, provides a standard context menu that allows it to blend in with your OS. This makes it easy for users to understand how the software works. FileSearchEX is the Windows replacement for your search tool. It has low system requirements, can be deployed on a network easily, and locks down user accounts. FileSearchEX works well with LUA & SP (limited user and locked-down) accounts, while being easy to install for network administrators. No installer is required and admin rights are not required. FileSearchEX's simplified search interface will be a refreshing addition to any software that you may have in your business.
  • 48
    Gilisoft USB Lock Reviews

    Gilisoft USB Lock

    Gilisoft

    $49.95 one-time payment
    Block non-system partitions. It will not allow any USB/SD drive access to your computer unless it is authorized or has been placed in the trusted devices White-list. You can create a list to allow 'certain approved USB pen drives'. Then, it will block all USB devices except those on the white-list. Blocking access to certain websites. This utility allows you block unwanted websites in internet explorer. When a website is blocked, the user is redirected to a blank or "blocked" page and the contents of the original webpage are not loaded onto your PC. GiliSoft USB Lock prevents data leakage to USB drives, external hard drives, CDs/DVDs, and other portable devices. Once installed, USB Lock allows you to block all drives and devices not belonging to you.
  • 49
    CCIS Church Management Software Reviews

    CCIS Church Management Software

    CCIS Church Management Software

    $29.99/month
    CCIS Shield™, the latest church management system, was developed by CCIS Church Management Software. CCIS Shield™, which is fully web-enabled, can be accessed from any location with an Internet connection. CCIS Shield can be accessed from any device. However, it is best to use a desktop/laptop or tablet as a mobile device. CCIS Shield™, a web-based membership financial management system, offers a simple and flexible solution that you can customize to meet your church's specific needs. The program is flexible enough to allow you to choose what's most important to you, but powerful enough so that you can increase the depth of your data at anytime. You can keep secure notes about individuals, chart family relationships, track giving and contributions with the most ease, and create attendance and activities records. You can run reports, retrieve data, and improve your understanding of your church. CCIS Shield Web Church Member Management can help you improve the administration of your church.
  • 50
    Kiosk Browser Reviews
    Our provisioning app locks down your device in the most secure manner possible when you provision it. Kiosk Browser is now the "device owner", meaning it has more rights than a standard Kiosk Browser install. The default launcher can be set programmatically, without the need for user intervention. Official methods are better than any workaround to block access to the status bar (top right corner of the screen). Applications not in the app drawer can't be launched (apps launched using JavaScript are unaffected). Your device (the device you wish to install Kiosk browser on) must be either brand new or factory reset in order to start the provisioning process. This prevents Kiosk Browser being removed from the device without factory reset.