File Lifecycle Tracking (FLT) Who did what and when did it with the file? Where and under what name can the file be found? FLT is a specially developed feature to trace what kind of operations happened with the file since its creation. This function marks the parallel life-tracks of the file with branches, it is also possible to search the files lifecycle directly from the queried Reports. Device handling Possibility to establish the access policy of a general purpose communication media. Such Devices can be Floppy-, CD-, DVD drives, Infrared, COM, LPT, USB, Bluetooth, Wireless ports, etc. The most important feature of it is to block the devices irrespectively of whether at the moment there is a Device connected to the host or not. Quarantine A special document area protection can be created, which provides the possibility to creat separate territories. Data movement can be controlled within this area, as well as beyond. It has the important ability to define approved users, applications, printers in the area, and specify the path to where the data can be exported to. It has the ability to separate the information from the Local and Domain Administrator, and the separation of the same application - running in the Quarantine and outside of it. Notebook handling - Running on the kernel level offers the possibility to keep the defined rules after losing the connection with the network, and to make them impossible to by-pass. It is possible to disable the Bluetooth devices, pen-drives on a notebook removed from the network. Furthermore it is an important property that the users processes will be logged locally together with the date and time of the disconnection and reconnection. At the next network connection to the Server, the rules and the logs will be synchronized. Printer - Printer rules can also be predefined. With their help, it can be determined which printers can be used or blocked on a certain host to maintain the control of the printed.
Spam Reader Spam Reader is an MS Outlook plugin that extends Outlook functionality with a Bayesian spam filter. Spam Reader analyzes each message when you receive it and puts it in the Spam folder if needed. The filter is self-trainable. Stops up to 98% of spam.
QuickSigner Tool for quickly digitally signing or verifying text or files with Public-Key-Encryption with RSA encryption algorithm (RSAES-OAEP).Key length for signing up to 7120 bit.
Idea crypting module for BestCrypt Idea crypting driver for BestCrypt. The module performs encryption using well-known IDEA algorithm. Works in Bestcrypt Environment in any Windows system.
MySecurityVault Securely manage and encrypt passwords, files, and personal information. MySecurityVault provides unparalleled security for your most confidential information. Auto-fill Internet forms, scan your system for sensitive data, and prevent identity theft.
Uimix Uimix is a window transparency manager that secures the viewing of sensitive information by allowing you to adjust the transparency of a selected window, mixing it with its background.
Version: 2.0.3 Released: Mar, 2 2006 License: Shareware, $67.00 Expires: Expires after 30 Days
File size: 28,496 K Platforms: Windows XP/2000 Downloads: 10
EagleEyeOS Professional 2.0 is a file and data security software, which is protecting information stored on networks from potential leakage. It assures that information in those files can only be read, copied, modified by user with sufficient rights.