Sort
McAfee solutions deliver complete virus protection and internet security. Download McAfee anti-virus and anti-spyware software to protect against the latest online threats. McAfee solutions deliver the highest levels of threat visibility and antimalware protection, including comprehensive system and endpoint protection, network security, cloud security, database security, endpoint detection and...
Rank
1
Vote
Sponsor
0.0
With Virtru Data Protection, security is no longer the enemy of convenience. More than 7,000 companies protect sensitive data with ease. Seamless email encryption, powerful access control, and unparalleled security — built for the enterprise and easy enough for everyone. See why more than 7,000 organizations trust Virtru to protect their most sensitive information. “Virtru is a must-have for...
Rank
2
Vote
Sponsor
0.0
Boxcryptor protects your data in the cloud with end-to-end encryption. It works with Dropbox, GoogleDrive and many more providers, on all platforms. While being compliant with internal and external regulations. Define custom policies, manage your users, for example with Active Directory Support,...
Rank
3
Vote
Sponsor
0.0
Micro Focus - Voltage delivers data-centric security software solutions to protect data across enterprise, cloud, mobile devices, and big data environments. Voltage provides best-in-class data encryption and tokenization for structured and unstructured data and enables cost-effective PCI...
Rank
4
Vote
Sponsor
0.0
RSA provides Business-Driven Security solutions for advanced threat detection and cyber incident response, identity and access management, and GRC. ​With cyber attacks growing more targeted, covert and sophisticated, many security professionals wonder how they can possibly protect their...
Rank
5
Vote
Sponsor
0.0
The most powerful data-centric security software. Protect your data with cryptographic splitting encryption, provide access controls, and meet compliance. SPxSHARC ll software is the most secure way of storing data-at-rest in all environments through its FIPS 140-2 certified, EAL4+ compliance and AES-256 encryption. Further fortified with 300+ patents on its cryptographic splitting core...
Rank
6
Vote
Sponsor
0.0
Some cookies on this site are essential, and the site won't work as expected without them. These cookies are set when you submit a form, login or interact with the site by doing something that goes beyond clicking on simple links. We also use some non-essential cookies to anonymously track visitors or enhance your experience of the site. To control third party cookies, you can also adjust your...
Rank
7
Vote
Sponsor
0.0
Share your knowledge & discuss all aspects of Computer & Internet Security via a worldwide community. Discussion specific to networks and networking. Issues covered include: Internet access, Wireless Networks (Wifi / WLAN's), Routing, Gateways, Internet Sharing, WAPS, WEP, war-driving, SID's and how to setup and secure your WAP and WLAN. For discussions related to the design and dissection of...
Rank
8
Vote
Sponsor
0.0
Stay one step ahead of threats with Check Point’s industry leading cyber security products for threat prevention, mobile security, data centers, next-generation firewalls, and security management. New Check Point Research of 850+ Global Businesses Reports That 100% Have Been Victims of Mobile Attack. Check Point Software Technologies Report 2017 Third Quarter Financial Results. Cryptocurrency...
Rank
9
Vote
Sponsor
0.0
CIS is a forward-thinking, nonprofit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threat. Start Secure, Stay Secure A CIS SecureSuite Membership combines and automates the CIS Benchmarks, CIS Controls, and CIS-CAT Pro into one powerful, time-saving cybersecurity resource for businesses, nonprofits, and governmental...
Rank
10
Vote
Sponsor
0.0
Cloud-based email security, archiving, encryption, and continuity for managed service providers (MSPs). Explore real-time data on the top malware threats from our award-winning Sophos Labs team. We keep track of all known and emerging malware here. We’ve collected metrics on all the latest malware threats, and we update them as soon as we get new information. See the top threats and where...
Rank
11
Vote
Sponsor
0.0
WinAbility Software: the home of Folder Guard, USBCrypt, AB Commander and other useful Windows utilities and security and encryption software. Do you share your computer with others? Do you want to have your personal folders protected with passwords? Or, how about completely hiding a private folder and making it invisible to any Windows program? Learn how to set up a hidden folder or a...
Rank
12
Vote
Sponsor
0.0
SecureMac - Security News, Advisories, Reviews and Software for Everything Apple and Mac. Mac security is a more serious problem than most people think. It’s true that Macintosh computers have lower security risks than the average PC, but running security software for Macs is every bit as essential. SecureMac has operated at the cutting edge of Apple security for over a decade. We produce some...
Rank
13
Vote
Sponsor
0.0
Lockbin, the free online email encryption service. Send secure email messages and files that are protected with AES-256 bit encryption. Lockbin protects messages in transit with 256-bit TLS/SSL, while FIPS 140-2 verified AES-256 bit encryption protects messages at rest. Learn more. Conveniently connect Microsoft Outlook directly to Lockbin. Run Lockbin on any device that supports Java....
Rank
14
Vote
Sponsor
0.0
Free award-winning SafeHouse makes your secret files invisible and completely secure. Advanced AES encryption for any hard disk or USB Flash drive. Inside Fabric is an online fabric store featuring over 100,000 name-brand fabric patterns. If you're looking for upholstery fabric at discounted pricing, including famous brands such as beacon hill fabric, Fabricut fabric and Lee Jofa fabric, then...
Rank
15
Vote
Sponsor
0.0
SSL certificates by DigiCert secure unlimited servers with the strongest encryption and highest authentication available. Faster tracking, approvals, and issuance for individuals and teams Automated certificate installation via REST, SCEP, or EST Detailed discovery and inspection Timely remediation suggestions and alerts for weaknesses Time-saving auto renewal Learn More. If you have questions...
Rank
16
Vote
Sponsor
0.0
We're here to provide you with encryption software of premium quality and reliability to ensure ultimate computer privacy and data protection of any valuable information stored on your computer. Leakage of your company-sensitive information to competitors may be not only irritating, but also devastating to business. Imagine what your competitors would do if they are able to retrieve...
Rank
17
Vote
Sponsor
0.0
Encryption and privacy in the digital age. Learn how to protect yourself on the Internet. Security and privacy have long been important issues forming the basis of numerous democracies around the world. In the digital age, securing personal information and ensuring privacy pose to be issues of paramount concern. And the post 9/11 era presents an even bigger challenge as the boogeyman of...
Rank
18
Vote
Sponsor
0.0