ThreatLocker
ThreatLocker is a Zero Trust Platform that prevents cyber threats by blocking unknown applications, enforcing least privilege, and controlling what can run across your environment. Using Allowlisting, Ringfencing, Network Control, and more, ThreatLocker stops ransomware, zero-day attacks, and unauthorized activity before execution, rather than relying on detection after the fact.
Built for modern IT and cybersecurity teams, the platform delivers centralized visibility and policy management across endpoints, users, and applications. ThreatLocker reduces attack surface, limits lateral movement, and supports compliance with detailed audit logs. With fast deployment, a large built-in application library, and streamlined approvals, organizations can strengthen security while minimizing operational overhead and maintaining business continuity.
Learn more
Curtain LogTrace File Activity Monitoring
Curtain LogTrace File Activity Monitoring is an enterprise file activity monitoring solution. It tracks user actions: create, copy, move, delete, rename, print, open, close, save. Includes source/destination paths and disk type. Perfect for monitoring user file activities.
Key features:
- File log (create & delete file)
- File log (copy & move file)
- File log (print & rename file)
- App log (save, open & close file)
- Support MySQL & MS SQL
- Watermark for printout
- Central administration
- Integration with Active Directory
- Uninstall password for client
- Password management
- Admin delegation
- Self protection for the software
Licensing:
Curtain LogTrace is shareware. You can download and use the software for free on a trial basis or commercial use. If you want to log more file events (e.g. print, rename, save, open and close) and some advanced features, you need to activate the software to paid version.
Learn more
Safetica
Safetica’s Intelligent Data Security protects sensitive data where teams work, using powerful AI to deliver contextual awareness, reduce false positives, and stop real threats without disrupting productivity. With Safetica, security teams can maintain visibility and control over sensitive data, stay ahead of insider risks, maintain compliance, and secure sensitive cloud-based data.
✔️ Data Protection: Classify, monitor and control sensitive data across devices and clouds in real time.
✔️ Insider Risk and User Behavior: Spot risky behavior, detect intent, and stop insider threats to stay ahead of the careless handling of sensitive data, compromised user accounts and malicious user activity.
✔️ Compliance and Data Discovery: Prove compliance with audit-ready reporting for data in use, in motion, and at rest.
✔️ Cloud Security: Protect Microsoft 365, cloud, and file-sharing platforms to secure sensitive cloud-based data.
Learn more