leakage

Downloads All | Freeware
Products 1-30  |  Go to 1 Next >> page 
SecrecyKeeper - 2.00

SecrecyKeeper: a data security system for preventing both accidental data leakage and intentional data theft caused by employees with access to such data.





More Info
   
   
Rating: 0 Star0 Star0 Star0 Star0 Star
Current Version: 2.00
Release Date: Apr 15, 2007
License: Shareware
Price: $45
Downloads: 23


More on Leakage
EagleEyeOS Professional 2.5.4Data Added 1: June 21, 2007   
EagleEyeOS Professional. Data Leakage Datasecurity Devices.
Powerful and flexible security solution against data leakage. The program provides full-scale protection, uniquely combines file lifecycle tracking with portable data stores and rights management for users and/or files. It allows you to track and enforce compliance with security policies and standards (ISO/IEC 27001:2005 (BS7799), CobIT, SOA), and provides real-time notification and post-event analysis of user activities and incidents. Supports logging and evaluating file level operations, as...
Size: 35.4 MB License: Shareware Price: $83.48 
Keywords: Data Leakage - Datasecurity - Devices - Eagleeyeos - Filemonitoring - Filesecurity - Logging - Snapshot - Sql - Storages



Disable USB Port 2.0.1.5Data Added 1: November 11, 2008   
Disable USB Port. Access Activity Block.
How to disable the use of USB mass storage devices? How to change USB access permissions? This type of problems can be easily resolved by most powerful and efficient windows network USB drive data theft monitoring software that can easily disable or limit the access of USB mass storage devices. USB drive disabler is real time USB activities monitoring utility that prevents you from unauthorized data transfer like cut/copy/paste from external storage media device to network client machine. USB...
Size: 2.8 MB License: Shareware Price: 5729INR 
Keywords: Access - Activity - Block - Client - Data - Device - Drive - Examine - Lan - Leakage



USB Block 1.5.0Data Added 1: January 16, 2012   
USB Block. Block Data Block Devices Block Usb.
USB Block helps you prevent copy of your data to USB drives and CDs/DVDs that do not belong to you. It is a permission based software, once installed, the program asks you to set and confirm a password which it uses to allow access to your own USB drives, External drives, CDs, DVDs etc., while blocking every other drive. This prevents illegal copy, leakage and duplication of your private files and folders. USB Block also prevents spread of viruses and malware by not letting malicious USB...
Size: 3.5 MB License: Shareware Price: 49.95USD 
Keywords: Block Data - Block Devices - Block Usb - Cd Data Leak Prevention - Data Block - Data Copy Protection - Data Leak Prevention - Data Leak Protection - Data Protection - Device



Port Locker for Data Leakage Prevention 2.6.08Data Added 1: September 28, 2010   
Port Locker for Data Leakage Prevention. Data Leak Prevention Tool Data Leak Protection Data Leakage Prevention.
Port Locker is advanced solution to secure your private or vital data. Port Locker prevents vital & important data to be transferred from one PC to another using Flash drive, DVD/CD Writers, PCMCIA Ports, Ethernet Ports. Port Locker prevent two way threat to businesses because the Flash drive, DVD/CD writers, PCMCIA ports, Ethernet ports can be used not only to carry sensitive data out, but also upload malicious software code onto company's network. Port Locker allows the user to safeguard...
Size: 7.2 MB License: Trial Price: $49 
Keywords: Data Leak Prevention Tool - Data Leak Protection - Data Leakage Prevention - Lock Usb Drive - Lock Usb Port - Pen Drive Lock - Pen Drive Locker - Port Locker - Port Locker Utility - Port Locking



Leaklog 0.9.8 Preview 4Data Added 1: June 06, 2012   
Leaklog 0.9.8 Preview. Check Checker Leakage.
Leaklog is a leakage control system based on Regulation (EC) No 842/2006. It logs findings and parameters of leakage checks, shows a history of the development of parameters, compares them with nominal ones and calculates the percentage of leakage.
Size: 8.5 MB License: Freeware 
Keywords: Check - Checker - Leakage - Leakage Check - Leakage Control System - Leakage Percentage



Port Locker 1.0.3.0Data Added 1: March 12, 2013   
Port Locker. Data Leakage Data Leakage Prevention Data Prevention.
Port Locker is a tool that helps any user to block the unauthorized access to his computer. What it does is blocking unwanted access from/to your computer. Its purpose is to prohibit vulnerable access to certain ports. In this era, protecting the confidential data is the major concern. This tool equips the user to have a total security from data theft. Everyday data security is the practice of keeping data protected from unauthorized access. The focus behind data security is to ensure privacy...
Size: 4.3 MB License: Comercial Price: $30 
Keywords: Data Leakage - Data Leakage Prevention - Data Prevention



USB Block 1.6.2Data Added 1: October 22, 2014   
USB Block. Block Data Block Devices Block Usb.
USB Block helps you prevent copy of your data to USB drives and CDs/DVDs that do not belong to you. It is a permission based software, once installed, the program asks you to set and confirm a password which it uses to allow access to your own USB drives, External drives, CDs, DVDs etc., while blocking every other drive. This prevents illegal copy, leakage and duplication of your private files and folders. USB Block also prevents spread of viruses and malware by not letting malicious USB...
Size: 4.6 MB License: Shareware Price: 49.95USD 
Keywords: Block Data - Block Devices - Block Usb - Cd Data Leak Prevention - Data Block - Data Copy Protection - Data Leak Prevention - Data Leak Protection - Data Protection - Device



EagleEyeOS One 3.0.1Data Added 1: August 09, 2007   
EagleEyeOS One. Datasecurity Devices Eagleeyeos.
Quick and easy-to-manage data protection solution to prevent data leakage. Documents are protected from the unauthorized accesses efficiently and up to date. It generates alerts about portable devices connected illegally to the computer. Access policy can be created for mobile devices (Floppy, CD, DVD, InfraRed, COM, LPT, USB, Bluetooth, Wireless, etc.). Documents are protected in isolated areas. Storages suitable to take out information (e.g. Pen-Drive) can be disabled; furthermore the...
Size: 6.8 MB License: Shareware Price: $52.33 
Keywords: Datasecurity - Devices - Eagleeyeos - Filemonitoring - Filesecurity - Logging - Storages



USB Data Leakage Protection Software 2.0.1.5Data Added 1: May 31, 2008   
USB Data Leakage Protection Software. Analyze Data Device.
USB storage drive monitoring software is powerful surveillance utility that alert by playing default or selected sound when any storage drive (such as pen drive, flash drive, thumb drive, memory stick, multimedia card and other similar devices) is being connect at client machine in local area network. USB data prevention tool assist you to identify various data transfer from machine to storage drive or vice versa. USB data surveillance tool allow administrator to change (enable or disable)...
Size: 2.8 MB License: Shareware Price: 5099INR 
Keywords: Analyze - Data - Device - Display - Information - Leakage - Monitor - Network - Permission - Record



USB Drive Blocker 2.0.1.5Data Added 1: June 30, 2008   
USB Drive Blocker. Access Activities Analyze.
USB drive anti theft data software prevents data accessing in a local area network (LAN) from unauthorized persons. USB device monitoring utility aware to the users by playing sound when USB port connecting media is being plug-in or plug-out in any computer system within network system and capture device connect or removed with date, time, device manufactures name, unique hardware id, capacity, client name and IP address and data storage capacity status. PC USB port monitor utility is an...
Size: 2.8 MB License: Shareware Price: 5125INR 
Keywords: Access - Activities - Analyze - Anti - Block - Blocking - Client - Computer - Connection - Data



USB Drive Disabler Software 2.0.1.5Data Added 1: July 12, 2008   
USB Drive Disabler Software. Analyze Block Data.
PC USB port monitor inspection utility captures entire details of incoming and outgoing data of a connected USB device into the client computer in Local Area Network and save all information in text or html format log file. USB drive activity monitoring software alert to you by CPU sound or selected sound beep when USB drive devices connect or removed from any computer system in local domain. USB drive activity monitoring software provides facility to system administrator that they can assign...
Size: 2.8 MB License: Shareware Price: 5199INR 
Keywords: Analyze - Block - Data - Device - Display - File - Folders - Information - Lan - Leakage



USB Drive Disabling Software 2.0.1.5Data Added 1: August 25, 2008   
USB Drive Disabling Software. Access Block Data.
USB data theft protection tool is an innovative powerful framework designed to stop unauthorized illegal data exchanged through USB ports on windows network. Monitoring software is basically designed for corporate, financial institution and other small or large organizations, where data will be transferred via USB devices on LAN network. USB drive disabling software is used to trap intruders by installing the software to client machines on network. USB Monitor allows you to intercept,...
Size: 2.8 MB License: Shareware Price: 5099INR 
Keywords: Access - Block - Data - Detection - Device - Display - Drive - File - Information - Lan



USB Drive Blocker Software 2.0.1.5Data Added 1: August 30, 2008   
USB Drive Blocker Software. Access Activities Analyze.
Download removable drive disabler utility which is able to provide beep sounds to system administrators in case of any USB port connecting media is being plug-in or plug-out in any computer system or within network system as well as save information on device connect or removed with date, time, device manufactures name, unique hardware id, capacity, client name and IP address and data storage capacity status into log files.USB port disabler software can stop access of any unauthorized medium,...
Size: 2.8 MB License: Shareware Price: 5199INR 
Keywords: Access - Activities - Analyze - Anti Data - Block - Blocker - Blocking - Client - Detect - Disabler



AirStop Sticky Wireless Edition 2.3.6Data Added 1: October 07, 2008   
The AirStop Client is a wireless endpoint security solution which prevents data leakage by controlling communications adapters and storage devices on laptop computers. Unique features include "Sticky Wireless"(TM) functionality which ensures connection to approved wireless networks only and dynamic adapter control for prevention of wireless bridging attacks.The AirStop Server provides enterprise-grade centralized monitoring, configuration and tracking. A powerful wireless security policy...
Size: 3.8 MB License: Shareware Price: $60 


AirStop 2.3.1Data Added 1: October 07, 2008   
AirStop is an endpoint security solution which prevents data leakage by controlling all communications adapters and storage devices on laptop and desktop computers. Designed for enterprise applications, the software enforces security policy by allowing a single communications adapter to be used during a given computing session. For example, the software automatically senses use of a wired Ethernet connection and automatically disables all other communciations and storage devices. Once the...
Size: 3.4 MB License: Shareware Price: $45 


Pen Drive Blocking Software 2.0.1.5Data Added 1: October 25, 2008   
Pen Drive Blocking Software. Access Activity Blocking.
Anti data theft utility monitors transfer of official data, your secret information from system to USB storage media. USB drive surveillance software ensures the complete security to your data from unauthorized access or illegal data transfer. Pen drive blocking software records each and every insertion or removal activity of USB drive and stores in log files at specified location by administrator. Software facilitates with flexible monitoring of USB drive data transfer, administrator can...
Size: 2.8 MB License: Shareware Price: 5866INR 
Keywords: Access - Activity - Blocking - Client - Control - Data - Device - File - Leakage - Mass



USB Drive Disabler Tool 2.0.1.5Data Added 1: November 08, 2008   
USB Drive Disabler Tool. Block Data Detect.
USB drive disabler application is used in small, medium or large sized organization to enhance network security by controlling unauthorized access of USB external device on the local pc connected with server network. USB drive activity monitoring software continuously observe USB activities on computer system and save complete hardware information such as manufacturer, company name, hardware ID, storage capacity with clients IP and machine name in log file. USB pen drive data leakage...
Size: 2.8 MB License: Shareware Price: 5657INR 
Keywords: Block - Data - Detect - Device - Disabler - Drive - File - Folders - Information - Leakage



ArtistScope Site Protection System 2.0Data Added 1: June 30, 2020   
ArtistScope Site Protection System. Copy Protect Data Protection Data Security.
ArtistScope Site Protection System (ASPS) provides the most secure copy protection for all web data, pages, images, html, video and other embedded media without data leakage or memory exploit while viewed using the ArtisBrowser secure web browser. Fully compatible with all web applications and programming languages. ArtisBrowser provides the best security and copy protection for information kiosks, exams and workstations that view sensitive data and intellectual property. ArtisBrowser...
Size: 59.6 MB License: Commercial Price: $495 
Keywords: Copy Protect - Data Protection - Data Security - Protect Site - Protect Web - Secure Data - Site Protection



Leaklog rcData Added 1: July 29, 2012   
Leaklog is a leakage control system based on Regulation (EC) No 842/2006. It logs findings and parameters of leakage checks, shows a history of the development of parameters, compares them with nominal ones and calculates the percentage of leakage.
Size: 427.3 KB License: Freeware 


GALD - An Extensible Debugging system 1.0Data Added 1: August 12, 2012   
An Extensible memory leakage detection system which can be turn on/off just including or not a C header
Size: 2.3 KB License: Freeware 


LaneCat Inside 1.6.4.1Data Added 1: May 18, 2012   
LaneCat Inside. Email Monitoring File Action Monitoring Ftp Downloads Monitoring.
LaneCat Inside version is an enterprise-level monitoring software, As a excellent solution for companies wanting to end the misuse of computer and prevent the leakage of important information, it can monitor, manage and control all the computers in the LAN remotely and record the operation of the monitored computer. LaneCat Inside version is designed to detect ,intercept ,collect and manage the network resource. In addition ,it can perform the function of protecting against...
Size: 8.3 MB License: Shareware Price: $60 
Keywords: Email Monitoring - File Action Monitoring - Ftp Downloads Monitoring - Im Chat Monitoring - Print Monitoring - Screen Monitoring - Website Monoitoring



Favortools USB Locker 4 6Data Added 1: May 13, 2012   
Favortools USB Locker. Block Usb Drives Block Usb Ports Disable Usb Drives.
Favortools USB Locker is designed to securely control your USB ports, so as to prevent unauthorized data transfer through USB drives and reduce the risk of data leakage and theft. Lock your USB mass storage devices and normalize them in case you want to use to prevent others from copying your data through USB ports. Lock USB ports to prevent the running of all USB storage devices. Enable these devices with single mouse click if you want to run them. Support USB storage drives including zip...
Size: 1.1 MB License: Shareware Price: $15.5 
Keywords: Block Usb Drives - Block Usb Ports - Disable Usb Drives - Disable Usb Ports - Lock Usb Ports - Usb Block - Usb Control - Usb Lock - Usb Secure - Usb Security



SECUDRIVE Sanitizer Free 1.0.0.8Data Added 1: April 29, 2012   
SECUDRIVE Sanitizer Free. Delete Hard Drive Disk Erase Disk Sanitization.
SECUDRIVE Sanitizer Free is a powerful hard disk deletion software, designed to protect your data against leakage and theft when disposing of your PC. Since entered files, personal information, bank account number and confidential data of your private life or company that were input into your PC hard drive could be traced back, even after emptying the recycle bin and formatting the whole PC hard drive, having the proper software to delete the hard drive is crucial for a secure PC disposal....
Size: 359.0 KB License: Freeware 
Keywords: Delete Hard Drive - Disk Erase - Disk Sanitization - Disk Wipe - Erase Hard Drive - Full Disk Erase - Full Erase - Hard Drive Cleanup - Wipe Hard Disk



Cyberoam EndPoint Data Protection Suite 3.21.0723Data Added 1: July 14, 2012   
Cyberoam EndPoint Data Protection Suite. Data Encryption Data Protection Encrypt.
Cyberoam Endpoint Data Protection protects the organization's endpoints from data leakage through Identity and group-based policy controls, encryption, shadow copies, logging, reporting and archiving. Cyberoam offers data protection and asset management in four easy-to-deploy and use modules - Data Protection and Encryption, Device Management, Application Control and Asset Management. These modules enable organizations to limit access only to trusted devices, applications and...
Size: 93.5 MB License: Shareware 
Keywords: Data Encryption - Data Protection - Encrypt - Encryption - Protection - System Security



Windows 7 Firewall Control Plus Portable 3.5.1.131Data Added 1: May 20, 2012   
Windows 7 Firewall Control Plus Portable is a useful program that allows you to control personal information leakage via controlling application network traffic. Manages and synchronizes port forwarding provided by external network connection (firewall/router) box with applications requirements and activity. Features: A Decreases expenses of mobile/satellite connections A Zone based network permissions management A Integration with Window Explorer for...
Size: 1024.0 KB License: Shareware Price: $24.95 
Keywords: Firewall - Firewall Control - Permission - Port Forwarding - Secure - Windows 7 Firewall



StegoRT 1.0Data Added 1: February 16, 2013   
StegoRT is a Data Leakage Prevention (DLP) system, based in SNORT rules, that will detect data leaked or stolen using steganographic software. GNU General Public License (GPL)
Size: License: Freeware 


Jihosoft Free Eraser 2.0Data Added 1: December 23, 2013   
Jihosoft Free Eraser. Erase Data Securely Free Data Destruction Software Free Eraser.
Have some sensitive information on your computer and worry about the data leakage one day? Now with Jihosoft Eraser, you can permanently remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Key Features of Jihosoft Eraser: - Delete sensitive files and folders from targeted path - Shred an entire drive or partition securely - Completely erase files on the unused space and slack space on a drive - 5 advanced data erasure...
Size: 2.0 MB License: Freeware 
Keywords: Erase Data Securely - Free Data Destruction Software - Free Eraser



RequestPolicy for Linux 0.5.19Data Added 1: August 05, 2013   
RequestPolicy is an extension for Mozilla browsers that improves the privacy and security of your browsing by giving you control over when cross-site requests are allowed by webpages you visit. It is the first comprehensive client-side protection against CSRF attacks and the first tool to enable the use of modern browsers without cross-site information leakage.
Size: 133.1 KB License: Freeware 
Keywords: Allowed - Attacks - Browsers - Clientside - Comprehensive - Enable - Extension - Improves - Information - Leakage



RequestPolicy for Firefox 0.5.25Data Added 1: December 31, 2013   
RequestPolicy is an extension for Mozilla browsers that improves the privacy and security of your browsing by giving you control over when cross-site requests are allowed by webpages you visit. It is the first comprehensive client-side protection against CSRF attacks and the first tool to enable the use of modern browsers without cross-site information leakage. It is compatible with Firefox 3+, SeaMonkey 2.0, Flock 2.0, Songbird 1.0, and Fennec 1.0. It works wherever these browsers...
Size: 143.4 KB License: Shareware 
Keywords: Attacks - Compatible - Enable - Firefox - Flock - Information - Leakage - Modern - Seamonkey



For searches similar to leakage see "Related Downloads" under the categories listing.
Products 1-30  |  Go to 1 Next >> page 
Categories
Audio & Multimedia
Business
Communications
Desktop
Development
Education
Games & Entertainment
Graphic Apps
Home & Hobby
Mobile
Network & Internet
Screen Savers
Security & Privacy
Servers
Utilities
Web Development
Related Downloads
Water Leakage
Gas Leakage
Flux Leakage
Information Leakage
Personal Information Leakage
Usb Data Leakage Protection Software Freeware
Top Downloads
  Oxford Dictionary... 
  Server Genius 
  WinCHM - help... 
  Webcam and Screen... 
  iFunia Media Player... 
  CrossUI Builder... 
  1st Choice Free... 
  AudFree Audio... 
  DVDFab DVD Ripper 
  AudFree DRM Audio... 
  RDS WebAccess 
  Cute Web Phone... 
  Xing Lead Extractor 
  SSuite Agnot... 
  SSuite File Shredder 
  Soft4Boost TV Recorder 
  FewClix for Outlook 
  RecordPad... 
  Sidify Music... 
  Mgosoft XPS... 
New Downloads
  Virtual Data Access... 12.0.1
  SQLite Data Access... 5.0.1
  Boachsoft LandLord 2021.10
  Switch Audio... 9.34
  Free 2D Barcode... 12.0.0.2591
  Free 1D Barcode... 12.0.0.2236
  2D Barcode VCL... 12.0.0.2591
  1D Barcode VCL... 12.0.0.2236
  TwistedBrush Pro... 25.02
  RPM Remote Print... 6.2.0.526
  BuilderSYS 1.0.34/04.06
  Check Writer III Plus 5.03
  WinToHDD 5.4
  WinToUSB 6.2
  SSRS Code 128... 2019
  Active@ UNDELETE 17.0.7.2
  Express Zip Free... 8.29
  Express Zip Plus... 8.29
  EasyUEFI 4.8
  dbExpress driver... 8.0.1
Latest Downloads
Att Customer Service
Direct Echo Adding Software
Deepburner Pro
Sending Email Photos
Outlook Pst To Mbox Convertor
Ezonics Ezcam Webcam
To Decompile
Sharepoint Database Repair Tool
Play Snake
Karaoke Tapes
Pictures Of Utah
Solve Quizzes
Portland Airport
Flo Rida Elevator
Sim Card Data Delete Permanetly
Htc Hero Quezon City Map
Anime Mouse Cursors
Zombie Targets
Drain Pipe
Desktopmanager Software
Latest Reviews
SoftPerfect RAM Disk (Sean)
Superb disk utility for speeding up laptops and prolonging the life of their hdd.
StarCode Lite POS and Inventory Manager (Ed Martin)
I would say best inventory software for small shops or stores. Never found an app like this...
ConyEdit for Windows (reshim)
Programmers feel the comfort of coding using ConyEdit which is capable to edit codes in batch...
Disc Cover Studio (harish)
No need to go for a professional designer for the cover of new record, you can do it on your own...
Kaspersky Security Scanner (Anthony)
Scans software to find whether it is harmful for computer and also checks for updates of security...
Comodo Firewall (Maxmuller)
This just another awesome product from Comodo to protect your computer from unwanted inbound or...
TCP Splitter (Redrick)
This lets the data packets we send split into several packages which is convenient for many...
Project Viewer Lite (Tensialar)
This is a light weight software for viewing MS project files easily without the MS project...
PDF Shaper Professional (Mortinus)
I had difficulties with the pdf documents which needed to be edited before presentation, then I...
Hotelare (Nielsine)
You can enable your guests book any room instantly through your website, also receive the...
 
All software information on this site, is solely based on what our users submit. Download32.com disclaims that any right and responsibility for the information go to the user who submit the software, games, drivers. Some software may not have details explanation or their price, program version updated. You should contact the provider/actual author of the software for any questions. There are also user reviews/comments posted about various software downloads, please contact us if you believe someone has posted copyrighted information contained on this web site.   Copyright © 1996-2015 Download 32.