Best USB Block Alternatives in 2024

Find the top alternatives to USB Block currently available. Compare ratings, reviews, pricing, and features of USB Block alternatives in 2024. Slashdot lists the best USB Block alternatives on the market that offer competing products that are similar to USB Block. Sort through USB Block alternatives below to make the best choice for your needs

  • 1
    Safetica Reviews
    Top Pick
    Top Pick See Software
    Learn More
    Compare Both
    Safetica is a global software company that provides Data Loss Prevention and Insider Risk Management solutions to organizations of all sizes worldwide. Whether deployed on-premise or in the cloud, our solution is designed to protect business-critical data against accidental leaks and intentional theft in today's hybrid landscape.
  • 2
    Kenesto Reviews

    Kenesto

    Kenesto Corporation

    $27/user/month (single user)
    1 Rating
    Kenesto is a cloud-based storage system used to manage engineering, design, construction documents. Less expensive than enterprise PDM software, Kenesto offers automatic file locking, versioning and vaulting, 2D/3D viewing and web-based design review tools that are not available in consumer-grade cloud storage solutions like Dropbox and Google Drive. The solution acts like a mounted disk in customer's office, but with a single source of truth in cloud. File locking prevents users overwriting each other's data. All files are kept in perpetuity. Windows Explorer's familiar user interface allows files and folders to be arranged in the same manner as a C Drive. Kenesto supports workflows and tasks. SolidWorks plugin is free. All files are encrypted and stored in secure AWS S3 storage.
  • 3
    ThreatLocker Reviews
    Top Pick
    For IT professionals to stop ransomware, you need to do more than look for threats. ThreatLocker helps you reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from only blocking known threats, to blocking everything that is not explicitly allowed. Combined with Ringfencing and additional controls, you enhance your Zero Trust protection and block attacks that live off the land. Discover today the ThreatLocker suite of Zero Trust endpoint security solutions: Allowlisting, Ringfencing, Elevation Control, Storage Control, Network Access Control, Unified Audit, ThreatLocker Ops, Community, Configuration Manager and Health Center. 
  • 4
    USB-LOCK-RP Reviews

    USB-LOCK-RP

    Advanced Systems International

    $20 per client/one-time
    2 Ratings
    USB Control & Lockdown Software to Block USB devices Access and Lock USB Ports within Windows Systems. Centralized USB Device Management, Monitoring, and Whitelisting to Protect Computers within a Network. Endpoint Security Management's USB Device Control program is an important component of Endpoint Security Management. It focuses on protecting computer systems and data assets against threats from unauthorized USB device use. To protect networks that store sensitive information or control machinery, it is necessary to control USB device access to endpoints. Latest version v12.968 (released: September 26, 2021 - Centralized USB Device Management - Secures Computers in Groups or Specific Computers. - Whitelists specific devices by Hardware ID and blocks the rest -Automatically apply Group 1 protection settings to unassigned clients. NEW! -Automatic Authorizations Mode, Whitelist USB devices across the network automatically. NEW -Receives alerts & logs USB device connections in the network. -Exports Status and Alerts Reports to csv format (Comma-separated value) - Presents Full Screen Locking on Blocking Devices (includes company logo). - Monitors and Encrypts File Transfers From Endpoints to USB.
  • 5
    Endpoint Protector Reviews
    Endpoint Protector, a comprehensive, all-in-one Data Loss Prevention Solution for Windows, macOS, and Linux, prevents data theft and data leakage and provides seamless control over portable storage devices. Endpoint Protector can filter data in motion and at rest using regular expressions, dictionaries or data protection regulations like GDPR, PCI DSS and HIPAA. Endpoint Protector has several modules that can be combined and matched to meet client needs. These modules include Content Aware Protection and Device Control. Enforced Encryption is also available. eDiscovery is available. It makes work easier, safer, and more enjoyable, with a great ROI.
  • 6
    Gilisoft USB Lock Reviews

    Gilisoft USB Lock

    Gilisoft

    $49.95 one-time payment
    Block non-system partitions. It will not allow any USB/SD drive access to your computer unless it is authorized or has been placed in the trusted devices White-list. You can create a list to allow 'certain approved USB pen drives'. Then, it will block all USB devices except those on the white-list. Blocking access to certain websites. This utility allows you block unwanted websites in internet explorer. When a website is blocked, the user is redirected to a blank or "blocked" page and the contents of the original webpage are not loaded onto your PC. GiliSoft USB Lock prevents data leakage to USB drives, external hard drives, CDs/DVDs, and other portable devices. Once installed, USB Lock allows you to block all drives and devices not belonging to you.
  • 7
    CPTRAX for Windows Reviews
    Server File Activity Tracking – Audit who is creating, accessing and moving your files and folders. Track file permission changes. Alerts in real-time about critical file activity Malicious activity containment (Ransomware and mass file deletions, etc. Automatically stop threats to your Windows servers by calling PowerShell scripts so you can determine exactly what you want to have happen for each type of alert/threat. Examples of containment: Disable the user causing the threat Block the remote IP causing the threat Workstation File Activity Tracking: Audit who copies files to USB or other removable media. Track who uploads files via FTP or a browser. Block files being created on USB/removable devices. Notifications by email when a removable device connects. Active Directory Auditing – Keep audit logs and receive real-time alerts about important Active Directory changes, without having to deal with SACLs or Windows Event Logs. Server Authentication Auditing: Track authentications into Citrix sessions and Windows Servers. All failed logon attempts are reviewed. Workstation Logon/Logoff Tracking: Get visibility on logons/logoffs at workstations, including locks, unlocks and password changes.
  • 8
    SysTools USB Blocker Software Reviews
    SysTools USB Port Blocked Software allows users to block and unblock USB ports on their computers. This software can disable and enable USB ports on any system. Download USB Port Locker free software for any Windows operating system version. You can recover a lost password by using your email address. You will need to create a new password in order to block and unblock USB ports. Re-login to the user's computer to block USB ports. USB Lock Tool is a very useful tool that blocks USB ports, preventing unauthorized users from using USB devices such as pen drives, USB drives and flash drives. A data extraction cannot be performed in your absence. USB blocker software can be used to block all USB ports on the machine.
  • 9
    AccessPatrol Reviews

    AccessPatrol

    CurrentWare Inc.

    $3.99 PUPM
    1 Rating
    AccessPatrol is a data loss prevention and device control software for preventing data leakage to portable storage hardware. With AccessPatrol you can restrict a variety of peripherals including USB portable storage devices, optical media, Bluetooth, WiFi, FireWire, and cell phones. Access permissions for USB devices can be set to Allow, Read Only, or Blocked. Peripheral devices can be identified based on Vendor ID, Serial Number, and PNP Device ID. Specific USBs, External Hard drives, Imaging devices, and portable devices can be added to an Allowed List to enforce the exclusive use of company-approved devices.
  • 10
    Acronis DeviceLock DLP Reviews

    Acronis DeviceLock DLP

    Acronis

    $615 one-time payment
    Acronis DeviceLock DLP offers comprehensive endpoint DLP (endpoint loss prevention) that identifies and protects sensitive data and monitors the operations involving it. By blocking unauthorized attempts to access or transfer data, employees can prevent data leakage and protect sensitive data-at rest. A single DLP solution can simplify data protection and reduce reporting times. It provides comprehensive visibility over data flows, user behavior, and allows for detailed visibility. By enforcing data handling policies that users cannot ignore and reducing information security risks, you can reduce information security risks. Reduce the time and hassle involved in managing a DLP solution. Acronis DeviceLock DLP can be easily deployed through Active Directory (AD). It also offers various central management consoles that can be customized to your organization's needs.
  • 11
    KakaSoft USB Security Reviews
    Protect your files immediately after plugging the USB disk into a PC. Enjoy protection anywhere and anytime without installation. Lock and unlock USB devices on any computer, without installation. USB Disk Security protects sensitive information on USB drives using the strongest encryption techniques. Protect USB flash drives, thumbdrives, pen drives and memory sticks with password protection, encryption, and locking. This USB disk security software ensures the comprehensive security of your confidential information on your USB flash drive. Multiple layers of protection and advanced cryptography techniques ensure data security on USB flash drives. All external USB storage devices can be password protected. In 3 easy steps, you can lock data on a USB disk. You can use USB Security on any computer, without having to install it again. You can access confidential documents and ensure data security on a USB drive as soon as it is plugged in.
  • 12
    DriveLock Reviews
    DriveLock makes it easy to protect your business data, IT systems and endpoints. DriveLock makes it easier than you might think. We share our knowledge and use the latest technologies. You don't need to worry about data security throughout its lifecycle or across all your endpoints. DriveLock Zero Trust Platform - Instead of closing gaps in an environment with independent and individual security silos, this model prevents access to all data. DriveLock’s centralized policies only allow access to data and applications needed by individual employees and endpoints, in line with the maxim “never trust, never verify”.
  • 13
    Google Titan Security Key Reviews
    This is a stronger way to protect your account. Titan Security Keys are like a second lock to your password. They prevent phishing attacks and keep out any person who should not have access your online accounts, such as Gmail. Titan security. Titan Security Keys are built on FIDO®, open standards and include special firmware that Google has engineered to verify the key's authenticity. Works with the Advanced Protection Program. The Titan Security Keys can be used with the Advanced Protection Program, Google’s strongest security offering. Use with Android and iOS devices To connect to your computer, you can also use the Micro USB-A connector cable. Titan Security Keys are compatible with Google phones, Chromebooks and tablets, Google's Advanced Protection Program and almost any device running Google Chrome.
  • 14
    DriveSecurity Reviews

    DriveSecurity

    DriveSecurity

    $ 0.71 per month
    DriveSecurity® by ClevX is a powerful anti-malware tool that prevents the spread of malware through USB drives. DriveSecurity is designed for users who use USB drives to transfer photos, music, videos, and other documents. It ensures that the files you place on your drive are free of malware. DriveSecurity removes all threats from your USB drive, including viruses, rootkits and worms. It also protects your computer from being inadvertently infected with malware.
  • 15
    ManageEngine Device Control Plus Reviews
    Device Control Plus Enterprise Software is designed to manage file access and device control. It features an intuitive interface that allows admins to classify USB and other peripheral devices in a way that is easy to use. It also has many data security capabilities, including the ability to restrict file copying and block unauthorized file transfers, as well as read-only file access. File shadowing and file tracing reports will also be generated to provide extensive visibility into device actions and forensic analysis on policy efficacy, network performance, and policy effectiveness.
  • 16
    Gilisoft #1 All-in-One Toolkit Suite Reviews
    The 22 Powerful and Usable Software in One Package includes Video Converter, Video Editor and Screen Recorder Pro. Also included are Audio Converter Ripper, Recorder Pro and Audio Editor. The #1 All-in-One Toolkit Suite can perform almost any multimedia ripping, conversion, burning, or editing task. You can make your computer safe with encryption tools. You can also recover lost files and speed up the performance of your PC with RAMDisk. You can perform almost any multimedia work using audio and video tools. And you can perform encryption operations with encryption software. Download it for free and try it out!
  • 17
    Donglify Reviews

    Donglify

    Donglify

    $16 per month
    Donglify solves dongle-sharing problems. The app allows you use a USB dongle even if you don't have it. You can use the app to redirect your USB dongles to any place on the network. It is common for a licensed USB key owner to need to access the functionality of their device even if a physical connection is not possible. Donglify solves this problem. The solution's advanced port redirection technology allows you to send your USB security dongles across any distance and in any environment. No problem if a USB dongle attached to your computer isn't recognized by the virtual machine running on it. Install Donglify on both your host and guest operating systems to redirect your device into a virtual environment. Send login tokens to other Donglify users.
  • 18
    USB Blocker Professional Reviews
    USB Blocker Professional, a security program, prevents data theft and loss by blocking all untrusted USB drives. All unauthorized USB devices, external drives and network drives will be blocked until you give them permission. The program keeps a list authorized USB devices which are allowed to access your PC. You can authorize multiple USB devices simultaneously. USB Blocker Professional will not allow you to access any USB device that is not authorized by default unless it has been authorized and you are an administrator. USB Blocker Professional keeps a record of Authorized USB Devices, invalid login attempts, device logs, invalid password changes, invalid device authorization, and invalid apply change to keep you informed about any suspicious activity when using the program. Reports can be viewed at any time when you have access to this program. You can export the report as a CSV, PDF or Text file.
  • 19
    Bitdefender GravityZone Reviews
    Bitdefender GravityZone gives organizations complete visibility into their overall security status, global security threats, as well as control over the security services that protect mobile devices, servers, and virtual desktops. All Bitdefender Enterprise Security solutions can be managed in the GravityZone via a single console, Control Center. This provides control, reporting and alerting services for different roles within the organization.
  • 20
    Yodot File Recovery Reviews

    Yodot File Recovery

    Yodot

    $39.95 one-time payment
    Files and folders that have been deleted, unerased, or lost should not be thrown out of the recycle bin. Not only can you recover from your hard drives, but also from external drives. Different views make it easy to select files after recovery. A handy file undelete tool that is suitable for all users. In case of a need to recover raw data from a hard drive with severe file system corruption, this tool automatically determines and calculates the file size for more than 300 file types. You can toggle between different views to quickly recover data. Two views are available to make it easier to select files and find and save data. To prevent overwriting, it blocks storage of the retrieved data to the source drives. It works in a read-only mode. It locates and reads the data and copies it to the destination location. You can scan and recover deleted files from any Windows partition in a matter of minutes using the "deleted File Recovery" option.
  • 21
    PC Matic Reviews

    PC Matic

    PC Matic

    $50 per year
    PC Matic Pro's Application Whitelisting is a critical layer of cyber-protection. It sits on top of other endpoint security products. Zero trust whitelisting solutions stop hacking and other cyber-attacks. Stop all malware, ransomware, or malicious scripts from being executed. Our whitelist cybersecurity solution will protect your network, users, and business data. PC Matic Pro is a long-overdue shift in cybersecurity industry towards absolute prevention. The threats to critical infrastructure, industry, government, and all levels of government today demand nothing less. PC Matic Pro offers a patented default deny security layer at the device. This prevents all unknown executions and does not create headaches for IT. Contrary to traditional security solutions, customer infected are not required to strengthen whitelist architecture. Local overrides can also be added after prevention, with a focus upon accuracy and no concern for responding to an active infection.
  • 22
    ShieldApps Identity Theft Preventer Reviews
    Identity Theft Preventer scans your device for vulnerabilities that may affect your privacy. It searches your computer for webmail credentials, bank details, health provider records and social networks profiles to identify any potential concerns. The latest version of the product is able to block hacking attempts on your webcams or microphones. Your audio and video ports are protected with the Identity Theft Preventer. You can enjoy your private life in confidence. Fend off hacking attacks on your devices. Identity Theft Preventer protects your webcam and mic from malicious threats. Enjoy web browsing without feeling as if you are being watched.
  • 23
    Antamedia Kiosk Software Reviews

    Antamedia Kiosk Software

    Antamedia

    $27 one-time payment
    Turn any computer into an easy-to-use Kiosk. Kiosk software secures your website or application, and reduces maintenance time. Internet Kiosk software turns your computer into a self-service kiosk. It prevents hacking, downtime, blocks system keys like Ctrl–Alt–Del, and restricts access to the computer, desktop, drives and folders. It can be used to display your website or app securely, show marketing messages, advertisements, bill for Internet usage, games, office applications, or sell tickets for WiFi HotSpot at your kiosk. The Kiosk software replaces the Windows shell and blocks access Windows Explorer, drives and desktop. It blocks access to Windows system files and standard browser menus, and prevents hacking.
  • 24
    Folder Lock Reviews

    Folder Lock

    NewSoftwares.net

    $39.95/one-time/user
    1 Rating
    Lock your files with AES256-bit military-grade encryption to protect them from prying eyes. Keep prying eyes away! Folder Lock allows you to lock and hide files and folders in seconds. It allows you to Password Protect and prevents unwelcome eyes from seeing files, folders, or drives. Once you have locked a folder, it will disappear from its previous location and cannot be accessed except through the software interface. Folder Lock creates Lockers. You would place your money in a safe. Would you rather keep your files in a digital "Locker" that is safer than a bank vault? You can create "Locker(s)," which are protected with AES256-bit encryption. Accessing files does not require encryption or decryption. Simply copy them to Locker, and voila! They are encrypted instantly. Folder Lock provides a 2-way encryption method and backup that allows you to back up your encrypted 'Lockers’ online.
  • 25
    Internet Lock Reviews

    Internet Lock

    TopLang Software

    $29.95/one-time/user
    Internet Lock provides access control and password protection for your internet connections. Internet Lock allows you to fully control your internet connections and programs. Internet Lock allows you to restrict or password protect internet access. You can also schedule internet access. It protects internet programs on specific IP addresses or domains. You can limit access to the websites you specify or prevent them from accessing unwelcome websites. Internet Lock can be used to block internet connections and programs. Internet Lock will block programs from accessing the internet. Internet Lock can be used to password protect internet connections and programs. To access protected programs, users must enter the correct password. Internet Lock displays a window asking users to enter their password when a password-protected program attempts to connect to the internet. If the user cannot provide the correct password, Internet Lock will pop up.
  • 26
    Humming Heads Reviews
    Lock down all authorized actions to prevent attacks and prevent stolen or leaked data from being read. Invisibly, continuously, and without fail. SDS allows you to focus your endpoint security efforts instead of trying to find the latest malware variants or training your users to become security experts. Shinobi Defense System is an innovative portfolio of proven technologies that has been made available in the USA for the first time. SDS protects businesses from the 3 most common and difficult endpoint security issues that cause business losses. DeepWhite, the most powerful whitelist-based protection technology, is combined with Evolution DLP, a seamless, automatic data loss protection solution. This integrated system is powered by our Active Intercept engine and ShinobiForensics reporting platform. Invisibly blocks any stolen or leaked files from being read. No interaction or rules from the end user.
  • 27
    Cisdem AppCrypt Reviews

    Cisdem AppCrypt

    Cisdem

    $29.99 one-time payment
    AppCrypt for Mac is a reliable tool to protect your data and prevent unwanted websites. AppCrypt allows you to lock any application using one password. You can also ban purchases in iTunes or App Store, block others from viewing your photos and videos in Photos, disable games apps, and encrypt chatting records on WhatsApp. All applications can be locked with one password. AppCrypt blocks access to distracting or harmful websites in Chrome browser and Safari browser. It can block the entire domain, or just specific URLs. Blocklist can be used to filter out inappropriate websites. Allowlist allows you to access websites that are useful for your study or work. AppCrypt allows you to set up a schedule when you can access the app or website. Predefined sessions can be set up at any time and day of your choosing.
  • 28
    Armorblox Reviews
    Armorblox protects enterprise communications against inbound threats and data loss using deep learning, natural language understanding, and statistical techniques. Armorblox uses a wide range of data sources, signals and detection techniques to protect enterprise communications. Stop email compromises, account takeovers, executive impersonations, and other targeted threats to business email. You can view detailed attack analysis made for human eyes. Pre-configured policies can be used to automatically delete, quarantine or label emails. Detect PII/PCI violations, and passwords that have been disclosed via email. Outbound emails containing confidential information should be blocked. Prevent data leakage via email, messaging and file-sharing. All false positives reported can be automatically remedied. One click remove similar suspicious emails from user mailboxes. Use dynamic policies to prevent similar attacks in the future.
  • 29
    Trellix Complete Data Protection Reviews
    Comprehensive endpoint encryption. Trellix Complete Data Protection is available in two packages. It provides enterprise-grade drive encryption, access control and monitoring of user behavior. Trellix ePolicy Orchestrator allows you to manage Apple FileVault for macOS and Microsoft BitLocker for Windows PCs. Secure network file sharing and protect removable media like USB flash drives and data stored in cloud storage services. Trellix Complete data protection--Advancesd features data loss prevention and full-disk encryption. Device control is also available. Data is rendered unreadable in the case of device theft or loss. Our enterprise-grade endpoint encryption solution has been certified by Common Criteria EAL2+ and FIPS 140-2. You can control which file types and folders you want to encrypt/block. You can encrypt files to cloud storage services like Box, Dropbox, Google Drive, Microsoft OneDrive, and Google Drive.
  • 30
    MemOptimizer Reviews

    MemOptimizer

    CapturePointStone

    $14.99 one-time payment
    The Problem: Nearly all software programs have memory leaks. These leaks can cause your computer to have less memory over time. Windows-based programs consume memory resources when they run. Unfortunately, many Windows programs don't "clean up" after their own programs and leave valuable memory "locked". This prevents other programs from using it and slows down your computer's performance. Memory is often locked in pages. This means that if your program used 100 bytes of memory, it would actually be locking up 2,048 bytes (a page) of memory. This "locked" memory could only be released by rebooting your computer. MemOptimizer™, however, is a better way to free up this "locked" memory. MemOptimizer removes memory from the inmemory cache, which accumulates with every file and application that is read from hard-disk.
  • 31
    east-tec InvisibleSecrets Reviews

    east-tec InvisibleSecrets

    East-Tec

    $39.95 one-time payment
    east-tec InvisibleSecrets, a revolutionary file encryption and steganography software, allows you to encrypt files and folder structures containing confidential data. It also gives you the ability to hide files making them invisible to anyone. Use east-tec InvisibleSecrets to encrypt and hide file contents. It is a complete privacy and encryption software solution. We will also discuss other useful features such as password manager, file shredder, and program lock. east-tec InvisibleSecrets, a file encryption program, helps you protect your confidential data from prying eyes and unwanted access. It encrypts file or folder structures on your computer. It features strong file encryption algorithms that provide privacy protection. Protect files and sensitive information by hiding them.
  • 32
    Google Endpoint Management Reviews
    Keep it simple and keep things moving. Endpoint management is easy for Android, iOS and Windows, Chrome OS and MacOS, as well as Linux. Lost phone? Stolen tablet? These are all possible. Endpoint management can help you keep your company's data safe. You can set screen locks and strong passwords, as well as wipe confidential data using device wipe or selective account wiping for Android and iOS. Also, you can block access to certain Windows, Chrome OS, Linux and MacOS sessions. G Suite simplifies endpoint management within your organization. With agentless endpoint management, you can enforce passcodes or wipe certain accounts without the need to install software on an iOS or Android device. This feature is enabled by default. The Admin console allows you to manage and secure Windows 10 devices. You can distribute business applications via the Admin console on Google Play (agentless), or Apple's App Store. You can host internal-only Android apps on the Play Private Channel.
  • 33
    Protegent Antivirus Reviews

    Protegent Antivirus

    Unistal Systems

    $15 per year
    The most trusted Total Security Software, with its advanced cloud protection technology, offers multiple effective features that protect against viruses and other web-based threats. Once installed, the Proactive Data Recovery module recovers data from any type of logical crash, including file deletion, formatted drive, deleted partition, and other types. Data Theft Prevention module protects your laptop from file transfer/or theft via any port without you authorization. It helps keep your personal data secure and safe. It is a tracking and monitoring tool that records all activities on your computer or web. This software is great for parents and corporates to increase employee productivity. In case of theft or loss, this software tracks the exact location of your laptop. This module can also automatically encrypt your important folders and files, making them unreadable to others.
  • 34
    LeafWallet Reviews
    All content from the leaf wallet can be saved to your device. Leaf Wallet will alert you proactively if there are any applications that have leaked data. This allows you to understand the risks associated with giving information to them. Leaf Wallet uses asymmetric encryption for single sign-on (SSO), which allows users to log in to the application with no password. Prevent account intrusion and hackers from stealing the necessary parts of your account. The plug-in icon will change in color to remind the user that an external website has been authorized by the plug. You can switch between accounts and list the currencies that are owned by your current account in the Wallet currency list. Account resource management, intuitive management resource mortgages, memory transactions. Account authority management, support account to any authority change operation. Each contract is executed in a clear and intuitive manner to ensure its safe and correct execution.
  • 35
    Weblock Reviews

    Weblock

    Weblock

    $1.99 one-time payment
    Choose from our predefined list to choose which ad servers or content providers you want to block from your iOS device. Import rules from EasyList and hosts files to your Android device. To block any URL, domain, or IP on both platforms, create your own blacklist or whitelist. You can use Weblock fully by visiting the Filters section. You can add your own rules and create Blacklists, Whitelists, and Redirects. Your device will not be able to access any locations or resources that match the Blacklist rules. All resources that match Whitelist rules will be available regardless of whether they are Blacklisted. You can also use proxy servers to define redirects and access URLs and domains. Block advertising - banners pop-ups and videos ads in most browsers.
  • 36
    KidLogger Reviews

    KidLogger

    KidLogger

    $9 per 3 months
    We have created a free and useful app that will allow you to see what your children are doing on their smartphones or computers. KidLogger is a parental control program that works with every OS. Get all the information you need about your children's activity on their Android, Windows, and Mac devices by installing the app "Parental time Control" for Android, Windows or Mac. You can monitor internet usage and log all websites visited. It works with Internet Explorer and Chrome, Firefox, Opera, Safari, and Opera. It allows you to see how much time your child spent on the computer or mobile phone. Log all USB flash drives, external HDD and other devices connected with the PC. Prevent data leakage. Keylogger allows you to view keystrokes and text entered on your computer. It also records text copied to the clipboard (Windows). It periodically captures the computer screen and allows you to view them online. When a user enters a keystroke, including a keyword for Windows or macOS, it also takes screenshots.
  • 37
    BUFFERZONE Reviews
    BUFFERZONE is a patent-pending containment and disarming system that protects endpoints from advanced malware and zero day attacks, while maximising user and IT productivity. BUFFERZONE protects individuals and organisations from advanced threats that evade detection by identifying potentially malicious content in browsers, email, and removable media. BUFFERZONE disarms the content and securely transfers it from the container to its native endpoint and secure network zones. It also provides critical intelligence that can be used for enterprise-wide security analysis. BUFFERZONE, a lightweight solution, is easy to deploy and configure. It provides cost-effective containment up to thousands of endpoints.
  • 38
    Maacrorit Data Wiper Reviews
    Maacrorit Data Wiper overwrites the sectors of the device using a storage-overwriting method. The storage-overwriting method complies with the requirements of the United States government for deleting sensitive data, including US Department of Defense Directive 5220.22-M (DoD 5220.22-M). Supports all popular Windows File Systems, including FAT16/32 and NTFS. Also supports Apple HFS+, ReFS, Apple Ext2/3/4, ReFS and other file formats. Supports all Windows operating systems including Windows 11/10/8/7/Vista/Windows XP (32 bit and 64 bit). Wipe sensitive data from disk drives or disk partitions completely and permanently. Unlimited Edition fully supports to directly wipe disk or partition, including system partition or drive. By default, many program files are stored on the system disk drive. This feature is required if you want to wipe the disk drive completely to prevent unauthorized use of your data.
  • 39
    AuthPass Reviews
    AuthPass is an open-source password manager that supports the popular Keepass format (kdbx 3.x and kdbx 4.x). You can store your passwords and share them across all devices so you can easily find them whenever needed. All your passwords in one location For each account, generate secure random passwords Secured with biometric lock, Quick Unlock Keep track of all your accounts on the internet. App available for Mac, iPhone and iPad, Android Phones & Tablets, Linux, Windows, and on the Web. Multiple password files can be opened simultaneously (e.g. One for work, one to use for personal, or share your password files with colleagues. Autofill your passwords (Android9+, Support in browser only for Android 10+).
  • 40
    Avira Security Antivirus & VPN Reviews
    Get more than just the best antivirus and virus removal for Android! The latest mobile antivirus software provides complete protection and a phone booster. Protect your privacy with a VPN. You can scan, block, and then remove malware, spyware, and viruses. VPN protects your data, anonymizes browsing, and unblocks georestricted sites. You can check if third parties have accessed your email addresses and accounts. This tool helps you track down your stolen or lost phone and retrieve it. This tool shows which apps have requested access to sensitive data. Camera and microphone protection stops someone listening to and spying on your device's microphone and camera. Your sensitive applications (chats, calls, Skype, etc.), are protected by the PIN. Find out which other devices are connected via the same Wi-Fi. Premium or free features. Avira Antivirus Security for Android is the ultimate antivirus and anti-malware software.
  • 41
    Passit Reviews
    A password manager can make you safer online. Our modern security features lock down passwords without allowing anyone to access them. Passit's code is open-source, so anyone can see how it works. This makes us more trustworthy and helps us create a safer product overall. You can easily access your passwords online and share them with others. Just in case, you can also view passwords that are already in use offline. Passit can import and export CSV files containing passwords. To share passwords, add other users to groups in a self-hosted instance.
  • 42
    Password Depot Reviews
    Password Depot protects your documents and passwords from unauthorized access. No matter if you work from home or at a large corporation. You can use it on your Windows, Android or iOS device. You will only need one password from now on - the password you use to open Password Depot. Your passwords are secured against external access by double encryption based on the highest security standard AES (Rijndael256) double encryption. Our clever password generator makes it easy to create secure passwords in just one click. Only a few password managers offer such a powerful and clever password generator. Your browser will automatically enter your access data. You can also enter any data that you normally use your keyboard to type manually. You may be a Windows user, but you prefer to use your iOS and Android smartphone at night. Password Depot allows you to access the same passwords.
  • 43
    AdBlocker Ultimate Reviews

    AdBlocker Ultimate

    AdAvoid

    $2.49 per 3 devices per month
    The best ad-blocking technology in the world. Block all display ads and pop-ups. Do not allow anyone to create a list of "acceptable ads". Make your own whitelist of trusted websites. Online activity analyzers and trackers can steal your personal data. AdBlocker Ultimate helps you avoid all phishing websites. Our advanced ad blocking technology was used as the core of our brand-new Windows-based software program. AdBlocker Ultimate is an extension for your web browser that blocks annoying ads. It doesn't have a predefined whitelist, unlike its competitors. We are proud to announce the addition of AdBlocker Ultimate technology to your Android mobile device.
  • 44
    Orangedox Reviews

    Orangedox

    Orangedox

    $65 per user per month
    Orangedox provides one-click create virtual data rooms that are directly synced with your Google Drive folders. Prevent your documents from being shared or forwarded and audit every time they've been opened. Easily manage your financial due diligence, fundraising, investor relations & investment management. No limits on the number of files/storage spaces used and share with up to 500 users per room. Unique Selling Features Seamless integration with Google Drive: Easily create data rooms from your existing Google Drive folders plus your rooms will always be synced with your Google Drive. No need to upload files to another app. Also integrated with Google Workspace, so you’ll never have to leave Google Drive or Gmail.
  • 45
    USBSecure Enterprise Reviews

    USBSecure Enterprise

    Lugrain Software

    $ 298 for 10 PCs
    USBSecure Enterprise is a USB port security software for enterprise networks. USBSecure Enterprise protects your network from unwanted USB devices. Whitelists allow you to define the allowed USB devices per user. Centralized management, but no dedicated server required. USBSecure Enterprise also supports standalone machines. Supported devices: USB devices, Bluetooth devices, eSATA and FireWire devices, SD cards, floppy and CD/DVD drives.
  • 46
    SafeConsole Reviews

    SafeConsole

    DataLocker

    $28 per device per year
    Central Management Server Software. SecureConsole central management software gives you instant access to all your encrypted USB flash drives or portable hard drives. It allows you to instantly gain complete control over them. You can enjoy the productivity benefits of USB storage devices without worrying about malware, data leaks or breaches. Available as an on-premises or DataLocker hosted cloud service with global locations. You can enforce policies such as file type restrictions, password rules, and geographic boundaries. Reset passwords, change devices to read-only mode, or remotely wipe them in the event of theft or loss. All encrypted drives can be monitored, including their location around the globe. Integrate Active Directory to easily track users, devices and computers connected. You can see which files are being saved to and deleted from your encrypted drives at any time.
  • 47
    iToolab UnlockGo Reviews

    iToolab UnlockGo

    iToolab

    $29.95 per month
    One-Click Samsung/Xiaomi/Redmi/Vivo/Motorola FRP Bypass Tool If you are second-hand phone resellers and would like to remove the Google FRP after factory reset, UnlockGo (Android) helps you remove FRP lock entirely in a few clicks. Help you bypass Google lock on Samsung/Xiaomi/Redmi/Vivo/OPPO/Motorola devices running Android 5-13 in only 3 minutes, then you gain full access to the phones and tablets. No Gmail or PIN code required. Works perfectly with most Samsung/Xiaomi/Redmi/Vivo/OPPO/Motorola models. Its easy-to-use steps save you time on training and operation. Master Key of Android Screen Locks Remove all Android screen locks: PIN, Pattern, Password, Fingerprints, and Face Recognition. Bypass screen locks on earlier Samsung without data loss or resetting (Before S7). Suitable for all major Android brands: Samsung, HUAWEI, Xiaomi, Motorola, etc. Support 15+ brands, 6000+ Android phones and tablet models. You will support by one on one customer service.
  • 48
    MyWorkDrive Reviews
    MyWorkDrive is a software-only service that allows secure remote access to your in-house file servers from any device. Users can access their files in minutes, without the need for Sync, VPN or RDP, and without migrating data. IT professionals looking for a cloud-like file-sharing solution can rely upon ransomware protection and DLP (data leak protection), data governance compliance FIPS, HIPAA, GDPR), enhanced Office 365 real time online collaboration, with a lower total price of ownership, in comparison to other options.
  • 49
    RecoverXData Reviews

    RecoverXData

    RecoverXData

    $29.96 per month
    RecoverXData Free is a powerful, secure and easy-to-use data recovery software for Windows that can restore deleted or lost files. RecoverXData free can help you get your important data back. It knows what it is doing and is very good at it. This freebie can not only restore deleted, lost, or cleaned files from your computer's hard drive, desktop, recycle bin, and recycle bin but it can also retrieve data from external devices connected to your PC, such as USB flash drives and (phone/camera) SD cards. HDD, SSD and USB flash drives, as well as (phone/camera-specific) SD cards. Supports data recovery from deletion, formatting, partition loss and system problems. Windows 10, 8, 7, Vista, and XP. RecoverXData is embedded with six data recovery modes. It can be used to recover deleted files from the computer desktop, recycle bin, hard drives, external HDD/SD card/USB flash drive/camera, as well as deleted and lost partitions.
  • 50
    TweakPass Password Manager Reviews

    TweakPass Password Manager

    Tweaking Technologies

    $2.99 per month
    TweakPass Password Manager allows you to lock your passwords in a vault to protect them from unwelcome intruders. It stores all passwords in one location, which is only accessible by you. Register Quickly and Effortlessly It's simple and hassle-free Generate unique passwords instantly.