Sort
McAfee solutions deliver complete virus protection and internet security. Download McAfee anti-virus and anti-spyware software to protect against the latest online threats. McAfee solutions deliver the highest levels of threat visibility and antimalware protection, including comprehensive system and endpoint protection, network security, cloud security, database security, endpoint detection and...
Rank
1
Vote
Sponsor
0.0
Virtru is your data privacy force field, wrapping and protecting emails and files wherever they’re shared. Easy-to-use data security software for business. "The key with what Virtru does is that it works across different platforms, something that is largely a gap today.". "Virtru's technology enables users to encrypt every email and attachment with the strongest encryption out there.". "Virtru...
Rank
2
Vote
Sponsor
0.0
Boxcryptor protects your data in the cloud with end-to-end encryption. It works with Dropbox, GoogleDrive and many more providers, on all platforms. While being compliant with internal and external regulations. Define custom policies, manage your users, for example with Active Directory Support,...
Rank
3
Vote
Sponsor
0.0
HPE Security - Data Security delivers data-centric security software solutions to protect data across enterprise, cloud, mobile devices, and big data environments. HPE Security – Data Security provides best-in-class data encryption and tokenization for structured and unstructured data and enables...
Rank
4
Vote
Sponsor
0.0
RSA provides Business-Driven Security solutions for advanced threat detection and cyber incident response, identity and access management, and GRC. ​With cyber attacks growing more targeted, covert and sophisticated, many security professionals wonder how they can possibly protect their...
Rank
5
Vote
Sponsor
0.0
The most powerful data-centric security software. Protect your data with cryptographic splitting encryption, provide access controls, and meet compliance. SPxSHARC ll software is the most secure way of storing data-at-rest in all environments through its FIPS 140-2 certified, EAL4+ compliance and AES-256 encryption. Further fortified with 300+ patents on its cryptographic splitting core...
Rank
6
Vote
Sponsor
0.0
Some cookies on this site are essential, and the site won't work as expected without them. These cookies are set when you submit a form, login or interact with the site by doing something that goes beyond clicking on simple links. We also use some non-essential cookies to anonymously track visitors or enhance your experience of the site. To control third party cookies, you can also adjust your...
Rank
7
Vote
Sponsor
0.0
Share your knowledge & discuss all aspects of Computer & Internet Security via a worldwide community. Discussion specific to networks and networking. Issues covered include: Internet access, Wireless Networks (Wifi / WLAN's), Routing, Gateways, Internet Sharing, WAPS, WEP, war-driving, SID's and how to setup and secure your WAP and WLAN. For discussions related to the design and dissection of...
Rank
8
Vote
Sponsor
0.0
CIS is a forward-thinking, nonprofit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threat. Safely Dispose of Old Computers It's important to erase all personal information from old computers before disposing of them. Simply reformatting a hard drive or reinstalling the operating system does not guarantee the old data is...
Rank
9
Vote
Sponsor
0.0
Cloud-based email security, archiving, encryption, and continuity for managed service providers (MSPs). Explore real-time data on the top malware threats from our award-winning Sophos Labs team. We keep track of all known and emerging malware here. We’ve collected metrics on all the latest malware threats, and we update them as soon as we get new information. See the top threats and where...
Rank
10
Vote
Sponsor
0.0
Stay one step ahead of threats with Check Point’s industry leading cyber security products for threat prevention, mobile security, data centers, next-generation firewalls, and security management. Fireball and WannaCry Impact More Than 1 in 4 Organizations Globally, According to Check Point's Latest Threat Index. Discover how systems integrator RoundTower Technology protects its customer’s SDN...
Rank
11
Vote
Sponsor
0.0
SSL certificates by DigiCert secure unlimited servers with the strongest encryption and highest authentication available. If you have questions about any of our solutions (or need help with a certificate you purchased somewhere else) our award-winning support staff is happy to help anytime of day or night. We use cookies to ensure that we give you the best experience on our website. If you...
Rank
12
Vote
Sponsor
0.0
SecureMac - Security News, Advisories, Reviews and Software for Everything Apple and Mac. Mac security is a more serious problem than most people think. It’s true that Macintosh computers have lower security risks than the average PC, but running security software for Macs is every bit as essential. SecureMac has operated at the cutting edge of Apple security for over a decade. We produce some...
Rank
13
Vote
Sponsor
0.0
Lockbin, the free online email encryption service. Send secure email messages and files that are protected with AES-256 bit encryption. Lockbin protects messages in transit with 256-bit TLS/SSL, while FIPS 140-2 verified AES-256 bit encryption protects messages at rest. Learn more. Conveniently connect Microsoft Outlook directly to Lockbin. Run Lockbin on any device that supports Java....
Rank
14
Vote
Sponsor
0.0
WinAbility Software: the home of Folder Guard, USBCrypt, AB Commander and other useful Windows utilities and security and encryption software. Do you share your computer with others? Do you want to have your personal folders protected with passwords? Or, how about completely hiding a private folder and making it invisible to any Windows program? Learn how to set up a hidden folder or a...
Rank
15
Vote
Sponsor
0.0
MET, INC is a Mobile Solutions & Encryption Company who focus on Mobile Solutions, Mobile Encryption, Mobile Device Management, and Mobile Encrypt-Cloud Storage. Mobile Encryption Technologies provide a list of different services that will allow our customers to maximize potential profits. Our services include everything from mobile solutions to digital media management. Some of our other...
Rank
16
Vote
Sponsor
0.0
Free award-winning SafeHouse makes your secret files invisible and completely secure. Advanced AES encryption for any hard disk or USB Flash drive. Inside Fabric is an online fabric store featuring over 100,000 name-brand fabric patterns. If you're looking for upholstery fabric at discounted pricing, including famous brands such as beacon hill fabric, Fabricut fabric and Lee Jofa fabric, then...
Rank
17
Vote
Sponsor
0.0
We're here to provide you with encryption software of premium quality and reliability to ensure ultimate computer privacy and data protection of any valuable information stored on your computer. Leakage of your company-sensitive information to competitors may be not only irritating, but also devastating to business. Imagine what your competitors would do if they are able to retrieve...
Rank
18
Vote
Sponsor
0.0
Encryption and privacy in the digital age. Learn how to protect yourself on the Internet. Security and privacy have long been important issues forming the basis of numerous democracies around the world. In the digital age, securing personal information and ensuring privacy pose to be issues of paramount concern. And the post 9/11 era presents an even bigger challenge as the boogeyman of...
Rank
19
Vote
Sponsor
0.0
Free hard disk and USB Flash drive encryption software by SafeHouse. Make your secret files invisible using a password with just a few clicks. SafeHouse Explorer is just one of several award-winning security products in the trusted family of SafeHouse encryption software. Our primary website is SafeHouseSoftware.com Our SafeHouse Professional Edition is designed for power users and corporate...
Rank
20
Vote
Sponsor
0.0