Best USB-LOCK-RP Alternatives in 2024

Find the top alternatives to USB-LOCK-RP currently available. Compare ratings, reviews, pricing, and features of USB-LOCK-RP alternatives in 2024. Slashdot lists the best USB-LOCK-RP alternatives on the market that offer competing products that are similar to USB-LOCK-RP. Sort through USB-LOCK-RP alternatives below to make the best choice for your needs

  • 1
    1Password Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    1Password is a password manager that's secure, scalable, easy-to-use, and trusted by some of the most prestigious companies in the world. 1Password makes it easy to keep your employees safe online with its simple interface. Good security habits will become second nature once 1Password is a part of your employees' workflow. 1Password Advanced Protection now available with 1Password Business You can set Master Password policies, enforce two factor authentication across the entire team, limit access with firewall rules, review sign in attempts, and require that your team use the latest version 1Password. Our award-winning apps can be downloaded for Mac, iOS and Linux as well as Windows, Android, and Windows. 1Password syncs seamlessly between devices so that your employees have access to their passwords at all times. Your risk is reduced and your productivity increases when everyone uses 1Password.
  • 2
    DriveStrike Reviews
    See Software
    Learn More
    Compare Both
    DriveStrike is simple to use, implement, and manage. DriveStrike allows you to perform remote wipe, remote lock, or remote locate commands on any platform. Mobile device management MDM for mobile platforms. Integrated drive encryption support. Our support team is available to answer any questions, help you install our services, or manage your account. It's never been easier to protect your data and devices. We are happy to answer any questions you may have or help you understand how to best protect your data. Protect your business with a device- and data protection platform that keeps all devices protected with a single solution. Your Workstations, iPads and iPads, Smartphones as well as Tablets, Tablets, Tablets, and Laptops will be protected, organized, secure, & protected.
  • 3
    Safetica Reviews
    Top Pick
    Top Pick See Software
    Learn More
    Compare Both
    Safetica Intelligent Data Security protects sensitive enterprise data wherever your team uses it. Safetica is a global software company that provides Data Loss Prevention and Insider Risk Management solutions to organizations. ✔️ Know what to protect: Accurately pinpoint personally identifiable information, intellectual property, financial data, and more, wherever it is utilized across the enterprise, cloud, and endpoint devices. ✔️ Prevent threats: Identify and address risky activities through automatic detection of unusual file access, email interactions, and web activity. Receive the alerts necessary to proactively identify risks and prevent data breaches. ✔️ Secure your data: Block unauthorized exposure of sensitive personal data, trade secrets, and intellectual property. ✔️ Work smarter: Assist teams with real-time data handling cues as they access and share sensitive information.
  • 4
    Endpoint Protector Reviews
    Endpoint Protector, a comprehensive, all-in-one Data Loss Prevention Solution for Windows, macOS, and Linux, prevents data theft and data leakage and provides seamless control over portable storage devices. Endpoint Protector can filter data in motion and at rest using regular expressions, dictionaries or data protection regulations like GDPR, PCI DSS and HIPAA. Endpoint Protector has several modules that can be combined and matched to meet client needs. These modules include Content Aware Protection and Device Control. Enforced Encryption is also available. eDiscovery is available. It makes work easier, safer, and more enjoyable, with a great ROI.
  • 5
    ThreatLocker Reviews
    Top Pick
    For IT professionals to stop ransomware, you need to do more than look for threats. ThreatLocker helps you reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from only blocking known threats, to blocking everything that is not explicitly allowed. Combined with Ringfencing and additional controls, you enhance your Zero Trust protection and block attacks that live off the land. Discover today the ThreatLocker suite of Zero Trust endpoint security solutions: Allowlisting, Ringfencing, Elevation Control, Storage Control, Network Access Control, Unified Audit, ThreatLocker Ops, Community, Configuration Manager and Health Center. 
  • 6
    AccessPatrol Reviews
    AccessPatrol is a data loss prevention and device control software for preventing data leakage to portable storage hardware. With AccessPatrol you can restrict a variety of peripherals including USB portable storage devices, optical media, Bluetooth, WiFi, FireWire, and cell phones. Access permissions for USB devices can be set to Allow, Read Only, or Blocked. Peripheral devices can be identified based on Vendor ID, Serial Number, and PNP Device ID. Specific USBs, External Hard drives, Imaging devices, and portable devices can be added to an Allowed List to enforce the exclusive use of company-approved devices.
  • 7
    USBSecure Enterprise Reviews
    USBSecure Enterprise is a USB port security software for enterprise networks. USBSecure Enterprise protects your network from unwanted USB devices. Whitelists allow you to define the allowed USB devices per user. Centralized management, but no dedicated server required. USBSecure Enterprise also supports standalone machines. Supported devices: USB devices, Bluetooth devices, eSATA and FireWire devices, SD cards, floppy and CD/DVD drives.
  • 8
    USB Block Reviews
    Limit USB drives, external devices and ports on your computer to prevent data leakage. You can whitelist your portable drives and block the rest. USB Block blocks data leaks from devices such as USB drives, mobile phones, tablets and other devices attached to your computer. It can even block certain ports and partitions. You can whitelist trusted device. You can then copy data onto your own USB drives, external drives, iPhones or Android phones, but prevent other devices from gaining access to your PC. This feature allows you to check if someone has attempted to hack USB Block using incorrect passwords. All incorrect passwords are logged in order to monitor any suspicious activities. By blocking access to files, folders and drives, you can protect your data against unwanted access. Windows kernel-level filtering and locking driver allows you to lock folders and files in Windows.
  • 9
    ManageEngine Device Control Plus Reviews
    Device Control Plus Enterprise Software is designed to manage file access and device control. It features an intuitive interface that allows admins to classify USB and other peripheral devices in a way that is easy to use. It also has many data security capabilities, including the ability to restrict file copying and block unauthorized file transfers, as well as read-only file access. File shadowing and file tracing reports will also be generated to provide extensive visibility into device actions and forensic analysis on policy efficacy, network performance, and policy effectiveness.
  • 10
    DriveLock Reviews
    DriveLock makes it easy to protect your business data, IT systems and endpoints. DriveLock makes it easier than you might think. We share our knowledge and use the latest technologies. You don't need to worry about data security throughout its lifecycle or across all your endpoints. DriveLock Zero Trust Platform - Instead of closing gaps in an environment with independent and individual security silos, this model prevents access to all data. DriveLock’s centralized policies only allow access to data and applications needed by individual employees and endpoints, in line with the maxim “never trust, never verify”.
  • 11
    Acronis DeviceLock DLP Reviews
    Acronis DeviceLock DLP offers comprehensive endpoint DLP (endpoint loss prevention) that identifies and protects sensitive data and monitors the operations involving it. By blocking unauthorized attempts to access or transfer data, employees can prevent data leakage and protect sensitive data-at rest. A single DLP solution can simplify data protection and reduce reporting times. It provides comprehensive visibility over data flows, user behavior, and allows for detailed visibility. By enforcing data handling policies that users cannot ignore and reducing information security risks, you can reduce information security risks. Reduce the time and hassle involved in managing a DLP solution. Acronis DeviceLock DLP can be easily deployed through Active Directory (AD). It also offers various central management consoles that can be customized to your organization's needs.
  • 12
    Kaspersky Endpoint Security Reviews
    You need to protect every device, including laptops and mobile devices, on your network as more business operations are going digital. Select Tier combines multi-layered technologies and flexible cloud management with centralized application, web, and device controls to protect sensitive data at every endpoint. Our security doesn't slow down your system. The Remediation Engine can undo most malicious actions if you are attacked. Users can continue working without interruption. You can be assured of world-class security, including post execution Behavior Detection (and Machine Learning) technologies. This will help to reduce attack risk and keep your endpoints safe and secured. There is no need to download frequent updates. Easy migration from third-party endpoint security, ensuring a smooth transition. You can be sure of optimal configuration with our post-deployment quality audit service.
  • 13
    ESET Endpoint Security Reviews
    This EDR solution will help you uncover the hidden potential in your network. This tool uses ESET's multilayered Endpoint Protection Platform to detect and respond to endpoints. All layers send relevant information to ESET Enterprise Inspector which analyzes large amounts of real-time data from endpoints. It can quickly identify and fix any security problem in the network. ESET Enterprise Inspector offers a unique reputation-based detection system that is transparent to security teams. To allow fine-tuning, all rules can be easily edited via XML. You can create new rules to meet the specific needs of your enterprise environment, including SIEM integrations. ESET's endpoint response and detection tool makes it easy to suppress false alarms. You can adjust the sensitivity of detection rules according to different computer groups or users. Combine criteria such as file name/path/hash/command line/signer to fine-tune the trigger conditions.
  • 14
    HiddenApp Reviews
    HiddenApp helps organizations protect their Apple, Chromebook, Windows, and Android fleet of devices against loss or theft through a suite of location tracking, device monitoring, and advanced recovery features.
  • 15
    BUFFERZONE Reviews
    BUFFERZONE is a patent-pending containment and disarming system that protects endpoints from advanced malware and zero day attacks, while maximising user and IT productivity. BUFFERZONE protects individuals and organisations from advanced threats that evade detection by identifying potentially malicious content in browsers, email, and removable media. BUFFERZONE disarms the content and securely transfers it from the container to its native endpoint and secure network zones. It also provides critical intelligence that can be used for enterprise-wide security analysis. BUFFERZONE, a lightweight solution, is easy to deploy and configure. It provides cost-effective containment up to thousands of endpoints.
  • 16
    Avast Small Business Solutions Reviews
    Avast Small Business Solutions deliver next-gen endpoint protection for business Windows PCs, Mac, and Windows servers that you can manage anywhere via a web browser. Go about your business knowing you are backed by effective cybersecurity built for small companies. Control your IT security from anywhere, powered by the cloud, advanced AI, and a global threat detection network. Avast Small Business Solutions consist of: * Avast Essential Business Security helps deliver device security for small businesses that want remote visibility and centrally controlled protection against viruses, phishing, ransomware, and advanced cyberattacks.  * Avast Premium Business Security combines our next-gen antivirus with VPN and USB control to help your employees and their devices stay more private and safer online, as well as offline.  * Avast Ultimate Business Security includes our award-winning next-gen antivirus with online privacy tools and patch management automation software to help keep your devices, data, and applications updated and secure.
  • 17
    BrowseControl Reviews
    BrowseControl web filtering software blocks websites based on URLs and categories. Granular internet restriction policies can be customized for each user, department, or organizational unit. Includes other device restriction features such as an app blocker, port filter, and internet restriction scheduler. BrowseControl’s security policies are enforced by a software agent that is installed on your user’s computers. This allows the solution to continue blocking websites and applications even when computers are taken off-site.
  • 18
    Bitdefender GravityZone Reviews
    Bitdefender GravityZone gives organizations complete visibility into their overall security status, global security threats, as well as control over the security services that protect mobile devices, servers, and virtual desktops. All Bitdefender Enterprise Security solutions can be managed in the GravityZone via a single console, Control Center. This provides control, reporting and alerting services for different roles within the organization.
  • 19
    Donglify Reviews

    Donglify

    Donglify

    $16 per month
    Donglify solves dongle-sharing problems. The app allows you use a USB dongle even if you don't have it. You can use the app to redirect your USB dongles to any place on the network. It is common for a licensed USB key owner to need to access the functionality of their device even if a physical connection is not possible. Donglify solves this problem. The solution's advanced port redirection technology allows you to send your USB security dongles across any distance and in any environment. No problem if a USB dongle attached to your computer isn't recognized by the virtual machine running on it. Install Donglify on both your host and guest operating systems to redirect your device into a virtual environment. Send login tokens to other Donglify users.
  • 20
    KakaSoft USB Security Reviews
    Protect your files immediately after plugging the USB disk into a PC. Enjoy protection anywhere and anytime without installation. Lock and unlock USB devices on any computer, without installation. USB Disk Security protects sensitive information on USB drives using the strongest encryption techniques. Protect USB flash drives, thumbdrives, pen drives and memory sticks with password protection, encryption, and locking. This USB disk security software ensures the comprehensive security of your confidential information on your USB flash drive. Multiple layers of protection and advanced cryptography techniques ensure data security on USB flash drives. All external USB storage devices can be password protected. In 3 easy steps, you can lock data on a USB disk. You can use USB Security on any computer, without having to install it again. You can access confidential documents and ensure data security on a USB drive as soon as it is plugged in.
  • 21
    LanScope Cat Reviews
    Your users can purchase new apps and devices, and they can access your network from any location, at any time. You can manage your IT before it gets out-of-control. LanScope Cat gives you greater visibility into your assets, and how users use them. Although user activity monitoring can be complex, LanScope Cat allows you to see who did what on which device. A warning is displayed to the user if an operational violation, such as the uploading of customer lists to a USB, is detected. The illicit operation is stopped. LanScope Cat allows you to monitor your remote and onsite workforce. IT devices can be difficult to manage and secure, which can cause problems for IT managers. LanScope Cat can lower security risks by solving an age-old problem. LanScope Cat protects data, applications, and devices while providing actionable insights into user behavior.
  • 22
    Gilisoft USB Lock Reviews

    Gilisoft USB Lock

    Gilisoft

    $49.95 one-time payment
    Block non-system partitions. It will not allow any USB/SD drive access to your computer unless it is authorized or has been placed in the trusted devices White-list. You can create a list to allow 'certain approved USB pen drives'. Then, it will block all USB devices except those on the white-list. Blocking access to certain websites. This utility allows you block unwanted websites in internet explorer. When a website is blocked, the user is redirected to a blank or "blocked" page and the contents of the original webpage are not loaded onto your PC. GiliSoft USB Lock prevents data leakage to USB drives, external hard drives, CDs/DVDs, and other portable devices. Once installed, USB Lock allows you to block all drives and devices not belonging to you.
  • 23
    ITsMine Beyond DLP Reviews
    ITsMine Beyond DLP™, which goes beyond traditional Data Loss Prevention, (DLP), protects organizations from all data threats. Endpoint agents and policies have no effect on employee productivity. Protection is available even after data exfiltration. Data loss incidents are becoming more frequent and more damaging than ever before, be they intentional or accidental, or from external or internal factors. Beyond DLP™, a new security approach, allows organizations to track and secure their data anywhere it is. This includes their internal network as well as external networks. No matter where your data is stored, maintain your high security standards. You can empower employees to be productive while controlling the use and whereabouts your sensitive data. Compliance with data protection regulations is easy, including GDPR, CCPA and PCI to HIPPA. Access control options for sensitive data, data breach detection, and reporting options are all available.
  • 24
    ManageEngine Application Control Plus Reviews
    Application Control Plus is an enterprise solution that combines application control and privilege management features to strengthen endpoint security. With application discovery, rule-based whitelisting/blacklisting, management of application-specific privileges, and just-in-time access enabled for temporary requirements, this software ensures that it caters to the end-to-end application needs of businesses.
  • 25
    Webroot Business Endpoint Protection Reviews
    Endpoint protection software is required to protect your business. It must be stronger and more intelligent than traditional antivirus. Endpoint protection or endpoint security is a general term for cybersecurity services that protect network endpoints such as laptops, desktops and smartphones, tablets, servers and virtual environments. These services can include antimalware and web filtering. Endpoint protection is essential for businesses to protect their critical systems, intellectual property, customers, employees, and guests from ransomware and other cyberattacks. You may be asking yourself, "Do I really need endpoint protection?" The truth is that criminals are constantly inventing new ways to attack networks, steal data, and take advantage of employee trust. Although smaller businesses may believe they are not at risk, this is false. Small businesses with 100 employees and fewer are now at the same risk as larger enterprises with 20,000 employees.
  • 26
    Avast Ultimate Business Security Reviews
    Top Pick
    Comprehensive cybersecurity and patch automation for growing businesses  Avast Ultimate Business Security includes our award-winning next-gen antivirus with online privacy tools and patch management automation software to help keep your devices, data, and applications updated and secure. Key Benefits: * Remote Management with online management console * Device Protection with next-gen antivirus * Data Protection with Firewall, Ransomware Shield, USB Protection, Password Protection * Online Security and Privacy with VPN, Web Shield, end Web Control * Patch Management
  • 27
    eScan Reviews

    eScan

    MicroWorld Technologies

    $58.95/one-time/user
    eScan's next generation antivirus solution protects your home network from malware, viruses, ransomware, and other threats using a layered approach. eScan is able to block a wide range of attacks thanks to its unique combination of modern and basic techniques. It includes web filtering, signature-based Malware detection and behavior analysis, as well as innovative techniques such deep learning malware detection, exploit prevention and heuristic scanning. eScan provides business endpoint protection, endpoint detection and response solutions (EDR), as well as anti-spam solutions email and multi-factor authentication.
  • 28
    SysTools USB Blocker Software Reviews
    SysTools USB Port Blocked Software allows users to block and unblock USB ports on their computers. This software can disable and enable USB ports on any system. Download USB Port Locker free software for any Windows operating system version. You can recover a lost password by using your email address. You will need to create a new password in order to block and unblock USB ports. Re-login to the user's computer to block USB ports. USB Lock Tool is a very useful tool that blocks USB ports, preventing unauthorized users from using USB devices such as pen drives, USB drives and flash drives. A data extraction cannot be performed in your absence. USB blocker software can be used to block all USB ports on the machine.
  • 29
    ColorTokens Xtended ZeroTrust Platform Reviews
    The cloud-delivered ColorTokens Xtended ZeroTrust Platform protects the inside with unified visibility, microsegmentation and zero-trust network access. It also protects endpoints, workloads, and endpoints with endpoint protection. Visibility across multiclouds and on-premise. Protection of cloud workloads via micro-segment Stop ransomware taking control of your endpoints. You can see all communications between processes, files and users. With built-in vulnerability and threat assessment, you can identify security gaps. Simpler and quicker time-to-compliance for HIPAA, PCI and GDPR. You can easily create ZeroTrust Zones™ and dramatically reduce the attack surface. Dynamic policies that protect cloud workloads. Without the need for cumbersome firewall rules or VLANs/ACLs, you can block lateral threats. By allowing only whitelisted processes, you can lock down any endpoint. Stop communication to C&C servers and block zero-day exploits.
  • 30
    BroShield Reviews
    BroShield is the best choice if you want to rid your system of unwanted spyware. This provides you with a powerful anti-snooping feature and detects harmful viruses. BroShield protects your computer. BroShield protects your computer and gives you full control over the internet. You can monitor what content your child is exposed to. You have the power to restrict access to adult websites and other harmful content. You can control internet access time. Many illegal websites still exist on the internet. We must make sure that our children are not exposed to porn, gambling, or other inappropriate websites. These sites can contain viruses and other undesirable things. BroShield is available 24/7 to monitor the computer for potential threats and viruses. BroShield's smart fail-safe feature is designed to detect remote snooping activities and prevent your computer from being compromised.
  • 31
    Block Ransomware and Backup Reviews
    There are many ways to stop ransomware, malware, or viruses. These malicious programs are constantly evolving, so blocking malicious programs based on patterns alone could infect your computer with other malware. There is a way. You can try the "Block Ransomware" and "Backup" product. Ransomware, malware and viruses are all possible. It can infiltrate your computer, but it cannot damage your files. This product allows you set the Desktop, Documents, and other folders as protected folders. Only authorized programs (e.g. MS Office programs) can modify files in the protected folder. Unauthorized programs cannot open the file as read only or stop the unauthorized program running. Malicious programs cannot be accessed to the protected directory. When you modify or create documents, backup files can be created automatically. These backup files are stored in a specific folder. Not all programs can modify these backup files unless you permit it.
  • 32
    Sequretek Percept EDR Reviews
    Cloud-native Percept EDR is a comprehensive, centrally-managed technology that works across platforms and detects and protects against advanced threats. Percept EDR, an intelligent, easy to manage, simple-to deploy product, works efficiently in heterogeneous environment. Percept EDR enhances detection capabilities by using AI-ML and EDR telemetry analytics. It is one of only a few products with on-agent artificial intelligence, ensuring devices are protected even when they are in offline mode. Percept EDR offers real-time protection against zero-day attacks, advanced persistent threats (APTs), ransomware, and other malicious activities. Percept EDR integrates components like device control, application blacklisting, and vulnerabilities management into a single, unified product. This gives you a dashboard view of your endpoint security.
  • 33
    Google Titan Security Key Reviews
    This is a stronger way to protect your account. Titan Security Keys are like a second lock to your password. They prevent phishing attacks and keep out any person who should not have access your online accounts, such as Gmail. Titan security. Titan Security Keys are built on FIDO®, open standards and include special firmware that Google has engineered to verify the key's authenticity. Works with the Advanced Protection Program. The Titan Security Keys can be used with the Advanced Protection Program, Google’s strongest security offering. Use with Android and iOS devices To connect to your computer, you can also use the Micro USB-A connector cable. Titan Security Keys are compatible with Google phones, Chromebooks and tablets, Google's Advanced Protection Program and almost any device running Google Chrome.
  • 34
    Automox Reviews
    Automox is cloud-native and available globally. It enforces OS and third-party patch management, security configurations and custom scripting across Windows and Mac from a single console. IT and SecOps are able to quickly gain control of and share visibility over virtual, on-prem and remote endpoints without having to deploy expensive infrastructure.
  • 35
    CrowdStrike Falcon Reviews
    Top Pick
    CrowdStrike Falcon, a cloud-native security platform, provides advanced protection from a wide range cyber threats including malware, ransomware and sophisticated attacks. It uses artificial intelligence (AI), machine learning, and incident response to detect and respond in real-time to threats. The platform uses a lightweight, agent-based solution that continuously monitors the endpoints to detect malicious activity. This provides visibility and protection with minimal impact on system performance. Falcon's cloud architecture ensures rapid updates, scalability and rapid threat response in large, distributed environments. Its comprehensive security capabilities help organizations detect, prevent, and mitigate cyber risks. This makes it a powerful tool in modern enterprise cybersecurity.
  • 36
    Microsoft Defender for Individuals Reviews
    The Microsoft Defender app is now available for download as part of your Microsoft 365 subscription. It provides easy-to-use online security for you, your family and your devices. One centralized view allows you to monitor and manage your security status across all your devices and computers. Anti-phishing and antivirus protection can help protect your family and you from online threats. Receive real-time alerts that include recommended actions and information about how you can stay safe online. All your online security status can be viewed from one central location. All your data and device protections for your family are available in one place. You can easily add or remove devices. You and your family can rest easy knowing that malware protection is available. You get continuous protection with antivirus scans for your devices and apps. You can control what files and apps are scanned by identifying trusted ones. Receive real-time alerts about security changes that affect you and your family.
  • 37
    Sealit Reviews
    You shouldn't be concerned about whether your accounts and devices will be compromised when you implement a Zero Trust security system. Sealit will ensure that your sensitive data, including files and emails, remains fully protected in any scenario. To encrypt sensitive emails, you only need to click one time from your existing inbox. You only need one click to encrypt any file on your desktop. As we add strong protection to sensitive data, we ensure that your workflow doesn't get disrupted. Cyberattacks on businesses are almost always caused by human error. You need to put in place a system to reduce the risk. Our patent-pending end to end encryption ensures that every aspect of your business is protected. Our app uses biometrics to provide seamless protection. Biometrics are not like passwords. They can't be taken from you and you always have them with you.
  • 38
    DriveSecurity Reviews

    DriveSecurity

    DriveSecurity

    $ 0.71 per month
    DriveSecurity® by ClevX is a powerful anti-malware tool that prevents the spread of malware through USB drives. DriveSecurity is designed for users who use USB drives to transfer photos, music, videos, and other documents. It ensures that the files you place on your drive are free of malware. DriveSecurity removes all threats from your USB drive, including viruses, rootkits and worms. It also protects your computer from being inadvertently infected with malware.
  • 39
    C-Prot Endpoint Security Reviews
    You can manage your endpoint devices easily with a user-friendly control panel, cloud-based management, or on-premises options. C-Prot Endpoint Security provides multi-layered security against all types of potential threats, without disrupting the workflows and institutions of businesses and organizations. It is supported by advanced machine-learning technology and comprehensive threat-intelligence. It offers effective protection against all threats, including fileless threats, hacking attempts, and rootkits. C-Prot Endpoint Security safeguards your organization's computers, servers and mobile devices against viruses, trojans and worms. It offers comprehensive protection by detecting malware, viruses, and spyware on mobile devices within your organization. It protects your employees against phishing and prevents them from clicking on harmful emails.
  • 40
    DDP Endpoint Security Suite Reviews
    Endpoint Security Suite offers threat protection, authentication, and encryption, all centrally-managed from the Dell Data Protection Server. Businesses can easily enforce compliance and prove compliance with their endpoints thanks to centralized management, consolidated reporting, and console alerts. For the best customer experience, ensure that security device drivers remain current. Visit http://www.dell.com/support to download Dell ControlVault drivers. Software-based Data Centric Encryption allows IT to easily enforce encryption policies regardless of whether data is on the system drive or an external media. It is compatible with mixed vendor environments and won't interfere with existing IT processes such as patch management or authentication. The optional Full Volume encryption* solution is available only to select Dell Latitude and OptiPlex systems. It provides end-user systems with military grade protection that won’t slow down your employees.
  • 41
    Clearswift Endpoint Data Loss Prevention Reviews
    Clearswift Endpoint Data Protection (DLP), a key component of your IT security strategy, allows organizations to detect, inspect, and secure critical data on endpoints. It provides context-aware Data in Use policies that allow you to control which devices are allowed to connect to your corporate network and what information may be transferred. It also performs scheduled Data at Rest scans on file system files to audit and manage important data residing on the network. Clearswift Endpoint DLP is a lightweight agent that works behind-the scenes to enforce compliance policies and continuity even when users don't have access to the network. Organizations can apply flexible and context-aware DIU rules to prevent documents containing sensitive data being copied to removable media, shared on network or uploaded to cloud or encrypt them before they're transferred.
  • 42
    Anti-Executable Reviews
    By blocking unauthorized executables, you can stop threats from ever starting. Faronics Anti-Executable stops unknown threats from bypassing your antivirus solution. It protects against sophisticated threats such as zero-day attacks, mutating malicious software, and advanced persistent threats. This requires an approach that goes beyond traditional antivirus solutions. By ensuring that only approved applications are allowed on a computer, it also ensures that you are protected from any unknown threats. Faronics Anti-Executable provides security and flexibility to protect your endpoints. Faronics Anti-Executable ensures that your servers are always protected. Faronics Anti-Executable protects your identity and keeps your computer safe against malware. Faronics Anti-Executable offers security beyond antivirus by preventing unauthorized programs - malicious, unlicensed, or simply undesirable - from ever executing.
  • 43
    BlackFog Reviews

    BlackFog

    BlackFog

    $19.95/year/user
    Protect your intellectual property, avoid ransomware and industrial espionage risks and stop malicious activity within your organization. To ensure compliance with data protection regulations worldwide, prevent cyberattacks on all endpoints. Monitor data exfiltration from any network and prevent data loss. BlackFog's data privacy technology on devices can prevent data loss and data breaches. Protect your network from unauthorised collection and transmission user data from all devices. We are the industry leader in ransomware prevention and data privacy. Our preventative approach is not limited to perimeter defense. It focuses on preventing data exfiltration from your devices. Our enterprise ransomware prevention software and data privacy software dramatically reduces the chance of data breaches and stops ransomware from disrupting organizations. In real-time, you can access detailed analytics and impact assessments.
  • 44
    AhnLab V3 Endpoint Security Reviews
    Many businesses are trying to figure out the best way to deploy and manage endpoint protection solutions, while maintaining security integrity and compliance. AhnLab V3 Endpoint Security provides comprehensive endpoint protection, allowing businesses to protect their most valuable assets with greater confidence. AhnLab V3 Endpoint Security offers one of the most cost-effective, user-friendly endpoint security solutions on the market. AhnLab V3 Endpoint Security uses a very small amount of system resources, compared to other endpoint security solutions. AhnLab V3 Endpoint Security is a powerful product that can help you take your business to the next level of threat protection. Allows for wide-ranging control of removable media such as USB devices and Bluetooth.
  • 45
    Fortres 101 Reviews
    Fortres 101's file and desktop lockdown security restricts Windows operation to a specific area. Affordable, effortless, powerful. Fortres 101 blocks downloads and software installation, including malware and viruses. Fortres 101 allows you to block or restrict local hard drives, removable media drives, and any file, folder, and application. Central Control is Fortres 101's complete administration tool. Central Control makes it easy to configure and manage Fortres 101 from a single screen, anywhere on the network. Find out more.
  • 46
    Google Advanced Protection Program Reviews
    The Advanced Protection Program protects users with sensitive information and high visibility from targeted online attacks. To defend against the wide range of threats that exist today, new protections are added automatically. Gmail blocks more than 100 million phishing attacks every day. But sophisticated phishing techniques can trick even the most savvy users to give their sign-in credentials away to hackers. Advanced Protection requires that you use a security code to verify your identity when signing in to your Google Account. Unauthorized users will not be able sign in without your username or password. Chrome's Safe Browsing protects 4 billion devices from risky websites, and Advanced Protection performs more stringent checks for each download. It can flag or block you from downloading files that could be harmful. Only apps from verified stores are allowed, such as Google Play Store or your device manufacturer's store.
  • 47
    RevBits Endpoint Security Reviews
    Real-time Endpoint Threat Identification, Isolation and Removal RevBits Endpoint Security is an intuitive, high-performance security program that blocks sophisticated attacks. RevBits Endpoint Security is unique in that it performs a three-phase analysis on threats. The comprehensive RevBits Endpoint Detection and Response module (EDR) is feature-rich and provides complete control and access from anywhere. Ransomware and malware attacks are examples of failed endpoint security. RevBIts Endpoint Security provides better protection and will make organizations safer by preventing malware from lateral movement.
  • 48
    TACHYON Endpoint Security 5.0 Reviews
    Advanced anti-virus solution that blocks cyber threats like malware, spyware, ransomware and others. Protect your system and other important information with enhanced monitoring and protection.
  • 49
    Protectstar Camera Guard Reviews
    Stop spying and unattractive taping. Mark Zuckerberg and James Comey, former FBI chief, as well as millions of Facebook users, are all recording over their webcams. Everyone and everything is being spied upon. Since Edward Snowden's first NSA documents were published in June 2013, we have known that. Not only have hackers found ways to abuse the webcam without warning the user, but the latest malware is also highly dangerous as it specifically targets the control of the integrated device's camera. With just one click you can activate protection and Camera Guard will monitor and block any processes that attempt to access the camera of your device. Security breaches are reported. You can easily select which apps on your device have access to your webcam or camera. Deep Detective is an intelligent and versatile detective which monitors all macOS device accesses.
  • 50
    Apozy Airlock Reviews
    Apozy Airlock. The browser endpoint detection platform and response platform that neutralizes all web attacks in just one click. The Internet can be dangerous. It doesn't have it to be. Airlock plugs the gap in the EPP/EDR. It protects your browser and delivers a safe, secure, and lightning-fast internet connection. Airlock is powered by the first visually-aware native browser isolate platform with over 6 petabytes visual data. It prevents web attacks in real-time. Airlock stops spearfishing from happening. Airlock's technology protects anyone clicking on malicious links by sandboxing them.