Sort
Free hard disk and USB Flash drive encryption software by SafeHouse. Make your secret files invisible using a password with just a few clicks. SafeHouse Explorer is just one of several award-winning security products in the trusted family of SafeHouse encryption software. Our primary website is SafeHouseSoftware.com Our SafeHouse Professional Edition is designed for power users and corporate...
Rank
1
Vote
Sponsor
0.0
AxCrypt is simple file encryption software for Windows, Mac and mobile. It integrates seamlessly with your workflow to keep your files safe. It’s really easy to use and easy to integrate into your workflow, thanks to its shell support. If you’re eager for more options, it also has a ton of command line options, so you can fire up the command prompt in Windows and perform more complex actions—or...
Rank
2
Vote
Sponsor
0.0
A proposed standard which allows websites to define security policies. “When security risks in web services are discovered by independent security researchers who understand the severity of the risk, they often lack the channels to disclose them properly. As a result, security issues may be left...
Rank
3
Vote
Sponsor
0.0
FileOpen Systems is a developer of digital rights management (DRM) software for Adobe PDF, Word, Excel, PPT. Expire access, control printing, watermark & more. FileOpen document rights management solutions are trusted by publishers, corporations, universities and governments worldwide to protect...
Rank
4
Vote
Sponsor
0.0
Al Qaeda Americas Ayatollah Ali Khamenei Barack Obama Bashar Assad Bin Laden Terror Binyamin Netanyahu DEBKA Weekly Donald Trump Egypt Erdogan Gaza Golan Hamas Hizballah IDF Intelligence Iran Iran nuclear Iraq Iraq war ISIS Israel John Kerry Jordan Lebanon Libya Muslim Brotherhood Palestinians...
Rank
5
Vote
Sponsor
0.0
Fireproof safes, fireproof file cabinets and a full range of specialty and high-security safes and cabinets to meet the most demanding performance requirements. Get the best protection from SafetyFile. View products. FireKing 2-1831-C Two Drawer 31" Deep Vertical Letter Size File Cabinet FireKing 2-1831-C, 2 drawer 31"... FireKing 3-1831-C Three Drawer 31" Deep Vertical Letter Size File Cabinet...
Rank
6
Vote
Sponsor
0.0
Peel back the layers of your network, Peel back the layers of your enterprise, IDS, NSM, ESM, Log Management, Hunting, intrusion detection, network security monitoring, enterprise security monitoring. Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort,...
Rank
7
Vote
Sponsor
0.0
Our data security applications give you unmatched certainty that when properly installed and organized, even in the event of disaster, you’ll be able to recover your data, if at all possible. ENC’s applications can be used on nearly all devices, across almost all operating systems. With ENC Security, you determine the level security you feel is appropriate, so that you are always in control of...
Rank
8
Vote
Sponsor
0.0
Join 435 million others and get award-winning free antivirus for PC, Mac & Android. Surf safely & privately with our VPN. Download Avast today! We use cookies and similar technologies to recognize your repeat visits and preferences, to measure the effectiveness of campaigns, and improve our websites. For settings and more information about cookies, view our Cookie Policy. By clicking “I accept”...
Rank
9
Vote
Sponsor
0.0
Free award-winning SafeHouse makes your secret files invisible and completely secure. Advanced AES encryption for any hard disk or USB Flash drive. Inside Fabric is an online fabric store featuring over 100,000 name-brand fabric patterns. If you're looking for upholstery fabric at discounted pricing, including famous brands such as beacon hill fabric, Fabricut fabric and Lee Jofa fabric, then...
Rank
10
Vote
Sponsor
0.0
File Cabinet Lock. These file locking bars can lock file cabinets that do not have a built in lock, or serve as a second layer of security. File Cabinet Security. Is the most popular filing cabinet lock on the market for a reason. It doesn't matter if you are a big company, a small company, or just need to secure your files at home from prying eyes; you all asked us for the same things. You...
Rank
11
Vote
Sponsor
0.0
Access Manager for Windows allows you to restrict access to key features of Windows, such as Control Panels or Start menu, network, Taskbar, desktop, system tray, Network Access Control Page, Control Internet usage and more. It can also disable the Ctrl+alt+delete keys, the function keys at startup, allows to password protect Windows and restrict users to running specific applications only,...
Rank
12
Vote
Sponsor
0.0
Votiro’s patented and award-winning content disarm and reconstruction solutions use next-generation CDR technology to identify and disarm malware from... Hundreds of ransomware attacks and a 130% increase in fraud incidents in 2017 alone! [pwc]. A prime prey for cybercriminals, the financial institutes’ transition to digital services is paved with ransomware attacks and fraud incidents. Whether...
Rank
13
Vote
Sponsor
0.0
Already have programmers working on a particular solution, and need consulting services only? We provide high-quality services, at an affordable price. Our engineers have worked in fields of local file systems, SAN (Storage Area Network) file systems, DRM (Distributed Rights Management) solutions, in-house file security and confidentiality, document tracking, privacy and other related fields....
Rank
14
Vote
Sponsor
0.0
Cybersecurity solutions for enterprise, energy, industrial and federal organizations with the industry’s best foundational security controls. Tripwire’s industry-leading FIM detects changes on assets across your enterprise, from on-premise data center to public cloud, and remediate them to a known and trusted state. Know who changed your systems with Tripwire Enterprise FIM. Discover and...
Rank
15
Vote
Sponsor
0.0
PKWARE's Smartcrypt platform provides automated data discovery, classification, and encryption in one simple workflow. Our enterprise encryption solutions protect sensitive information everywhere it is used, shared or stored. It’s happened to everyone: you type the first few letters of your recipient’s name in Outlook and hit Tab—and you don’t realize that your customer credit card lists just...
Rank
16
Vote
Sponsor
0.0
Protect, track and control your files, wherever they are and wherever they go. The Vaultize platform is designed to protect enterprise data end-to-end - from external or internal threats, from accidental or intentional data leakage and, exposure. Vaultize offers secure and user-friendly solutions that enable teams to store and share files easily via any kind of device while giving IT and...
Rank
17
Vote
Sponsor
0.0
Email is not secure. Use Send Files Securely to securely send any type of file. It's free, fast, and easy to use. No registration required. For added security, each file upload may be protected with a password. The password is never stored and is required in order to retrieve the file. It is highly recommended to add a password when uploading a file. Passwords should be long (12 characters or...
Rank
18
Vote
Sponsor
0.0
Fire King Safes from the fireproof safe experts at KL Security. A trusted and best choice for FireKing file cabinets, security safes, record storage cabinets and fire safe media protection. From the very first time I called, I have been treated with respect and professionalism. Not only the price was right, but little things like this follow up, show that the client is important for you. I...
Rank
19
Vote
Sponsor
0.0
Citrix ShareFile is the secure file sharing and transfer service that's built for business. Click here to try sharing files with clients and colleagues for free! Accelerate productivity with automated workflows you customize and control. Give real-time feedback, request approvals, co-edit—even get legally binding e-signatures seamlessly—on any device. Plus, with real-time tracking, you always...
Rank
20
Vote
Sponsor
0.0