|
|
Related Products
-
DriveStrike
DriveStrike is easy to use, implement and manage. With DriveStrike you can execute secure remote wipe, remote lock, and remote locate commands on any platform. Integrated drive encryption support as well as mobile device management MDM for mobile platforms. Our professional support team is always available to answer your questions and help you install our services or manage your account and devices. Protecting your data and devices has never been easier or more cost effective. If you have questions or need help understanding how best to protect your data please contact us and we will gladly answer your questions. Protect your business with a device and data protection platform that keeps all devices safe with a single solution and Dashboard. Keep your Workstations, MacBooks, iPads, Smartphones, Tablets, Laptops safe, secure, and organized.
-
Filerev
Use the Filerev app to organize Google Drive and reduce storage costs. The Duplicate File Finder quickly shows all duplicates in Google Drive without downloading all of your files. The Storage Analyzer lets you browse your folders by size in Google Drive. You can also view your Google Drive files in different categories such as: hidden / orphaned files, large files, empty files, empty folders, large folders, old files, temporary files, files by extension. Every category includes powerful filters and the ability to bulk delete your files in Google Drive. Plus, there are charts and graphs to help you quickly see how your storage space is being used and the number of files and specific types of files or folders that are consuming the most space. You can get started for free to see what is consuming your Google Drive storage space and quickly clean up the clutter.
-
ManageEngine ADAudit Plus
ADAudit Plus helps keep your Windows Server ecosystem secure and compliant by providing full visibility into all activities. ADAudit Plus provides a clear picture of all changes made to your AD resources including AD objects and their attributes, group policy, and more. AD auditing helps detect and respond to insider threat, privilege misuse, and other indicators of compromise, and in short, strengthens your organization's security posture. Gain granular visibility into everything that resides in AD, including objects such as users, computers, groups, OUs, GPOs, schema, and sites, along with their attributes. Audit user management actions including creation, deletion, password resets, and permission changes, along with details on who did what, when, and from where. Keep track of when users are added or removed from security and distribution groups to ensure that users have the bare minimum privileges.
-
IPVanish
IPVanish VPN protects your personal data in the heat of privacy threats with one touch. Keep your connection safe over hotspots and unsecured networks today. Whether you need a Wi-Fi hotspot shield, or safe file access, we have a solution for you. IPVanish VPN and storage tools simplify online security for the whole home with setups for desktop, mobile, consoles, and routers. Shield your internet activity with VPN privacy, or pair VPN + storage for complete online protection. It takes more than a private internet browser to go incognito. Keep your internet activity private with our anonymous IP addresses, and we’ll help keep network hackers, ISPs, and advertisers out of your connection. Secure your Wi-Fi connection and armor your location data with VPN. The best data defense pairs security with convenience. Safeguard access to your most important files with encrypted backup, automated syncing, and remote wiping controls.
-
PDFCreator
PDFCreator converts every printable document to PDF and many other formats. Convert your documents to PDF, JPG, PNG, TIF and more. Merge multiple documents to one file. Use automatic saving to have a fully automated PDF printer. Profiles make frequently used settings available with one click. We take care of the complexity and make converting PDFs simple for you.
PDFCreator is used in many companies worldwide, including leading industries like banks and financial service providers, insurances and the healthcare sector. Alongside our free edition PDFCreator Free we offer three paid business editions. They include solutions for all IT infrastructures. PDFCreator Professional is used on standalone workstations. PDFCreator Terminal Server is for the use on Windows Servers with installed Remote Desktop Services and on Citrix Servers. PDFCreator Server works as Windows service application and allows central management of settings and users.
-
Globalscape Enhanced File Transfer (EFT)
Globalscape’s Enhanced File Transfer (EFT) platform is a comprehensive, user-friendly managed file transfer (MFT) software. Thousands of Windows-Centric Organizations trust Globalscape EFT for their mission-critical file transfers.
EFT provides security and compliance combined with powerful tools for automation, collaboration, and analysis. It is available in cloud/SaaS (EFT Arcus) and on-premises EFT deployments.
Unlike traditional file transfer software, EFT provides enterprise-level data security as well as data transfer automation through integration with back-end systems. Administration is easy, yet detailed enough for complete control of your file transfer system. EFT replaces insecure legacy systems, homegrown servers, manual delivery, expensive leased lines, and VANs with a top-performing, scalable alternative.
-
Cerberus FTP Server
Cerberus FTP Server provides a secure and reliable file transfer solution for the demanding IT professional in any industry. Supporting SFTP and SCP, FTP/S, and HTTP/S, Cerberus is able to authenticate against Active Directory and LDAP, run as a Windows service, has native x64 support, includes a robust set of integrity and security features and offers an easy-to-use manager for controlling user access to files and file operations.
- FTP/S, SCP, SFTP, HTTPS
- SAML SSO
- Active Directory & LDAP
- Secure SSL Encryption
- Two-Factor Authentication
- IP Auto-Banning and Geoblocking
- HIPAA Compliant
- FIPS 140-2 Validated
- Advanced Reporting
- Comprehensive Auditing
- Web File Transfer Client
- Email Notifications
- Event Support & Automation
- File Retention Policies
-Unlimited Connections
-Virtual Directories
-Users & Groups
-Detailed Logs
-Full IPv6 Support
-FTP with TLS/SSL
-SOAP control API
-Web Administration
-SSH2 SFTP and SCP
-Public Key Authentication
-
CirrusPrint
CirrusPrint is designed to manage and streamline printing and document delivery across networks. It solves cloud migration problems related to printing, and provides the most direct and immediate method to deliver documents to your users. Traditional network printing works without changing operations, plus there are new capabilities: you can print to your users, or email your printers, or send a file from your phone to a printer across the country. CirrusPrint runs on Windows and Linux, in the cloud or your own data center. It accepts print jobs and other documents, parses and compresses them, and delivers them to remote printers or users. Integration with applications is simple and flexible: print to it like any network printer, email files to it, drop files into it, or use the REST API. Print jobs sent through CirrusPrint arrive quickly and securely at remote printers, as precise duplicates of the original print job.
-
Label LIVE
Label LIVE is label printer software that takes the pain out of label design and printing. You can print barcodes, address labels, shelf tags, inventory labels and more. Works with printers from mydpi.com, Brother, DYMO, Zebra, ROLLO & more. Compatible with macOS or Windows 10 and higher. Label LIVE generates PDFs that can be sent to any printer that is installed using a driver. This means you can send complex print jobs to inkjet and laser printers, too. Label LIVE replaces clunky "mail merge" and integrates directly with Microsoft Excel Spreadsheets, Apple Numbers Spreadsheets, or CSV files. Need to import spreadsheet data? Label LIVE can import Excel, Numbers or CSV files with a few clicks.
-
Securden Password Vault
Store, manage, and share passwords, files, SSH keys, and DevOps secrets among IT teams. Enforce password security best practices. Ensure compliance with industry standards using comprehensive audit trails.
• Centralized repository for passwords, SSH keys, DevOps secrets, and sensitive files.
• Enforce password security best practices like periodic password resets.
• Generate and assign unique & strong passwords to IT assets.
• Share resources with IT teams and collaborate seamlessly
• Eliminate hard-coded credentials with API-based application password management.
• Control ‘Who’ has access to ‘What’ with granular controls.
• One-click remote access to IT assets through native apps & web-based sessions.
• Track all privileged activities with comprehensive Audit trails.
• Demonstrate compliance with industry standards using customized reports on privileged access.
• Check for breached passwords through dark web monitoring.
• Auto-fill credentials on websites.
|
|