Alternatives to Endpoint Protector

Compare Endpoint Protector alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Endpoint Protector in 2024. Compare features, ratings, user reviews, pricing, and more from Endpoint Protector competitors and alternatives in order to make an informed decision for your business.

  • 1
    Heimdal Endpoint Detection and Response (EDR)
    Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines some of the most advanced threat-hunting technologies: - Next-Gen Antivirus - Privileged Access Management - Application Control - Ransomware Encryption Protection - Patch & Asset Management - Email Security - Remote Desktop - Threat Prevention ( DNS based ) - Threat Hunting & Action Center With 9 modules working together seamlessly under one convenient roof, all within one agent and one platform, Heimdal Endpoint Detection and Response grants you access to all the essential cybersecurity layers your business needs to protect itself against both known and unknown online and insider threats. Our state-of-the-art product empowers you to quickly and effortlessly respond to sophisticated malware with stunning accuracy, protecting your digital assets and your reputation in the process as well.
    Leader badge
    Partner badge
    Compare vs. Endpoint Protector View Software
    Visit Website
  • 2
    Safetica

    Safetica

    Safetica

    Safetica is an integrated Data Loss Prevention (DLP) and Insider Risk Management (IRM) solution, which helps companies to identify, classify, and protect sensitive data as well as detect, analyze, and mitigate risks posed by insiders within an organization. Safetica covers the following data security solutions: ✅ Data Classification: Safetica offers complete data visibility across endpoints, networks, and cloud environments. ✅ Data Loss Prevention: With Safetica, you can protect sensitive business- or customer-related data, source codes, or blueprints from accidental or intentional exposure through instant notifications and policy enforcement. ✅ Insider Risk Management: With Safetica, you can analyze insider risks, detect threats, and mitigate them swiftly. ✅ Cloud Data Protection: Safetica can monitor and classify files directly during user operations. ✅ Regulatory compliance: GDPR, HIPAA, SOX, PCI-DSS, GLBA, ISO/IEC 27001, SOC2 or CCPA.
    Leader badge
    Partner badge
    Compare vs. Endpoint Protector View Software
    Visit Website
  • 3
    DriveStrike

    DriveStrike

    DriveStrike

    DriveStrike is easy to use, implement and manage. With DriveStrike you can execute secure remote wipe, remote lock, and remote locate commands on any platform. Integrated drive encryption support as well as mobile device management MDM for mobile platforms. Our professional support team is always available to answer your questions and help you install our services or manage your account and devices. Protecting your data and devices has never been easier or more cost effective. If you have questions or need help understanding how best to protect your data please contact us and we will gladly answer your questions. Protect your business with a device and data protection platform that keeps all devices safe with a single solution and Dashboard. Keep your Workstations, MacBooks, iPads, Smartphones, Tablets, Laptops safe, secure, and organized.
    Starting Price: $0.99 per month
  • 4
    ThreatLocker

    ThreatLocker

    ThreatLocker

    For IT Professionals to stop ransomware and other cyberattacks, you need to do more than just hunt for threats. ThreatLocker helps you reduce your surface areas of attack with Zero Trust policy-driven endpoint security solutions. Now you can change the paradigm from only blocking known threats, to blocking everything that you have not explicitly allowed. ThreatLocker Application Allowlisting is the gold standard when it comes to blocking ransomware, viruses, and other software-based threats. Discover today the ThreatLocker suite of Zero Trust endpoint security solutions: Allowlisting, Ringfencing, Elevation Control, Storage Control, Network Control, Unified Audit, ThreatLocker Ops, Community, Configuration Manager and Health Center. 
  • 5
    Trustifi

    Trustifi

    Trustifi

    Trustifi offers industry-leading solutions for email security that helps small, mid-size, and enterprise organizations manage threat detection, regulatory compliance, data encryption & more. Easily deployed on: Outlook, Gmail, or any email server by relay **Advanced Threat Protection**: -Malware and ransomware virus detection, BEC attack prevention and alerts **Data Loss Prevention**: -100% compliant with HIPAA/HITECH, PII, GDPR, FSA, FINRA, LGPD, CCPA, and more **Encryption**: -NSA-grade. Select Enterprise customers have access to company branding and product white labeling. Plus one-on-one team training. Encryption needs aren’t one-size-fits-all, so your email security platform shouldn’t be either. Customized solutions are available upon request, often without charge.
  • 6
    SharePass

    SharePass

    SharePass

    SharePass is a SaaS Secret Management platform that allows sharing and managing secrets and confidential information using a web application, extension, or mobile app. SharePass works with encrypted links transmitted from the sender to the receiver with various settings and flags. The settings include expiry restriction, availability, IP restrictions and an entire filtering funnel (patent pending). SharePass is platform-independent that can be used with your existing communication tools. When it comes to your privacy, SharePass or any of its employees cannot see the content of your secrets; the secrets can be seen only by the exchanging parties. SharePass meets the latest cybersecurity compliance and regulations. In the era of identity theft, SharePass will protect you and prevent your data from leaking to the dark web by eliminating your digital footprint. SharePass supports SSO with Office365, Google Workspace, MFA, and integration with Yubikeys for maximum security.
  • 7
    USB-LOCK-RP

    USB-LOCK-RP

    Advanced Systems International

    USB Control & Lockdown Software to Block USB Devices Access and Lock USB Ports in Windows Systems. Centralized USB Device Management, Monitoring and Whitelisting to Protect Computers in a Network. USB Device Control is an important part of Endpoint Security Management and focuses in the protection of computer systems and data assets from threats posed by unauthorized USB device usage. Controlling USB devices access to endpoints is required to secure networks that control machinery or store sensitive information. - Centralized USB Device Management. - Secures Groups of Computer or Specific Computers. - Whitelists Specific Devices by Hardware ID and Blocks the rest. -Automatically apply Group 1 protection settings to unassigned clients. NEW! - Receives Alerts & Logs Device Connections in the Network Automatically. -Export Status and Alerts Reports to csv format (Comma-separated value)NEW! -Automatic Authorizations Mode, Whitelist USB devices across the network automatically. NEW
    Starting Price: $20 per client/one-time
  • 8
    AccessPatrol

    AccessPatrol

    CurrentWare Inc.

    AccessPatrol is a device control software that provides a proactive solution for securing company endpoints against data breaches caused by illicit data transfers. AccessPatrol controls a variety of peripherals, including… - Storage devices such as USB flash drives and external hard drives - Wireless Devices such as Bluetooth, Infrared, and WiFi - Communication Ports such as Serial and Parallel ports - Imaging Devices such as Scanners or Cameras, and… - Other Devices such as network share drives, printers, and mobile phones File operations alerts and permissions can be configured to alert IT administrators to suspicious file operations and proactively prevent data transfers to unauthorized users. The security policies are enforced by a software agent that is installed on your user’s computers. This keeps devices restricted and monitored even when the computers are taken off of the network.
  • 9
    ManageEngine Endpoint DLP Plus
    ManageEngine's Endpoint DLP Plus is an enterprise solution that leverages advanced data loss prevention strategies to protect sensitive information contained within endpoint devices. The solution prevents the unauthorized transfer of important or classified data out side an organization, through the different communicative channels. This includes print or clipboard operations concerning sensitive files, upload of sensitive data to major Cloud platforms like Google Drive and Dropbox, offloading classified data on to removable storage devices and much more. Endpoint DLP Plus enables IT admins to create and deploy DLP policies for an organization's network from a centralized console and even offers ready-to-use templates to better meet compliance requirements of major regulatory bodies such as HIPAA & GDPR.
    Starting Price: $795/100 Workstations
  • 10
    SafeConsole

    SafeConsole

    DataLocker

    Central Management Server Software. Instantly gain complete and granular control over all of your encrypted USB flash drives and portable hard drives with the SafeConsole central management server software: Achieve compliance for USB storage usage, with full control and audit. Keep the productivity benefits of USB storage devices – without the risks of malware, data leaks and breaches. Available as an on-premises software or as a DataLocker hosted cloud service with worldwide locations. Enforce policies such as password rules, file-type restrictions or geographic boundaries. Reset passwords, switch devices into read-only mode, and even remotely wipe them in case of loss or theft. Monitor all your encrypted drives, including their location anywhere in the world. Integrate with Active Directory to track users, assigned devices and connected computers with ease. See which files are saved to or deleted from your encrypted drives at any given moment.
    Starting Price: $28 per device per year
  • 11
    Acronis DeviceLock DLP
    Acronis DeviceLock DLP provides comprehensive endpoint DLP (endpoint data loss prevention) – discovering and protecting sensitive data while monitoring the operations involving that information. Prevent data leakage due to employee negligence or malicious insiders by blocking any unauthorized attempt to access or transfer data, discovering and protecting sensitive data-at-rest. Reduce the complexity of data protection and cut reporting times with a single DLP solution for thorough visibility over data flows and user behavior. Reduce information security risks and comply with IT security standards and regulations by enforcing data use and handling policies that users can’t avoid following. Save the time and hassle associated with managing a DLP solution. Acronis DeviceLock DLP is easily deployable through Active Directory (AD) and offers various central management consoles, based on your organization’s requirements.
    Starting Price: $615 one-time payment
  • 12
    ManageEngine Device Control Plus
    Device Control Plus is an enterprise software, specially designed for complete device control and file access management. It is equipped with an intuitive interface using which the admin can efficiently classify USB and other peripheral devices as trusted, blocked or allowed temporary access. It is also equipped with numerous data security capabilities including assigning read-only file access, restricting file copying or blocking unauthorized file transfers. Additionally for extensive visibility over device actions and forensic analysis of policy efficacy and network performance, file tracing and file shadowing reports will be automatically generated. Know who is using what device on which endpoint with clear-cut audit data and reports, and receive instant alerts in case of unauthorized access.
    Starting Price: $5.95 per user per year
  • 13
    USB Block

    USB Block

    NewSoftwares

    Prevent data leaks by restricting USB drives, external devices, network computers, and ports on your PC. Whitelist your own portable drives and block all others. USB Block prevents data leaks through devices like USB drives, phones, tablets, and other devices that are attached to your PC. It even prevents certain ports and partitions from accessing. You can whitelist trusted devices. This way you can copy data to your own USB, External drives, your iPhone or Android phone but block other such devices from accessing your PC. This feature helps you check whether someone has tried to hack into USB Block by using incorrect passwords All incorrect passwords will be logged to monitor any suspicious activity. Lock and password protect your data from unwanted access and visibility by blocking access to the files, folders, drives, and programs. Windows kernel-level locking and filter driver makes it possible to lock files and folders in Windows.
  • 14
    Gilisoft USB Lock
    Disable reading from USB/SD disks, disable writing to USB/SD disks,Block non-system partition(s). It doesn’t allow any type of USB/SD drive to access your computer unless you authorize it or it has been whitelisted in trusted devices. You can create a whitelist to allow 'certain approved' USB pen drives. Then it will block all USB drives except the ones whitelisted. Block accessing some websites. This utility allows you to block unwanted websites from display in internet explorer. If a website is blocked the user is forwarded to a blank page or to a "blocked page" and the contents of the original page are not loaded on your PC. GiliSoft USB Lock is a data leak prevention tool that prevents leakage and copy of your data to USB drives, external drives, CDs/DVDs or other such portable devices. Once installed, USB Lock lets you block all such drives and devices that do not belong to you.
    Starting Price: $49.95 one-time payment
  • 15
    ESET Endpoint Security
    Uncover the unknown in your network with this EDR solution. This endpoint detection and response tool leverages ESET's multilayered Endpoint Protection Platform. All layers send relevant data to ESET Enterprise Inspector, which analyzes vast amounts of real-time endpoint data. Provides quick analysis and remediation of any security issue in the network. ESET Enterprise Inspector provides a unique behavior and reputation based detection that is fully transparent to security teams. All rules are easily editable via XML to allow fine-tuning. New rules can be created to match the needs of specific enterprise environments, including SIEM integrations. Utilize ESET’s endpoint detection and response tool to easily suppress false alarms by adjusting the sensitivity of detection rules for different computer groups or users. Combine criteria such as file name/path/hash/command line/signer to fine-tune the trigger conditions.
    Starting Price: $38 per user per year
  • 16
    Forcepoint DLP

    Forcepoint DLP

    Forcepoint

    Data protection does not have to get in the way of business productivity. Forcepoint’s focus on unified policies, user risk, and automation makes data security frictionless and intuitive. View and control all of your data with the industry's largest pre-defined policy library. Ensure regulatory compliance across 80+ countries for GDPR, CCPA and more. Deploy data classification with Boldon James and Azure Information Protection. Replace broad, sweeping rules with individualized, adaptive data security that doesn’t slow down your employees. Block actions only where you need to, and drive productivity. Protect PII and PHI, company financials, trade secrets, credit card data, and other pieces of sensitive customer data-even in images. Follow intellectual property (IP) in both structured and unstructured forms, and stop low & slow data theft even when user devices are off-network.
  • 17
    ESET Endpoint Encryption
    A simple to use standalone encryption solution providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Patented technology to protect data for businesses of all sizes. ESET Endpoint Encryption is FIPS 140-2 validated with 256 bit AES encryption. ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users. Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard. ESET Endpoint Encryption gives companies enhanced ability to protect specific files, folders, virtual disks or archives. By encrypting emails and attachments, and restricting access to removable media for specific users, you can protect data in transit and prevent their leakage outside the company. Full control of licensing and software features, security policy and encryption keys from a dedicated ESET Endpoint Encryption console.
  • 18
    Trellix Complete Data Protection
    Comprehensive endpoint encryption. Available in two suites, Trellix Complete Data Protection keeps data safe with enterprise-grade drive encryption, access control, and user behavior monitoring. Manage Apple FileVault on macOS and Microsoft BitLocker on Windows PCs via Trellix ePolicy Orchestrator. Secure network file shares and protect removable media such as USB flash drives and data in cloud storage services. Trellix Complete Data Protection—Advanced features data loss prevention, full-disk encryption, device control, and protection for cloud storage. Render data unreadable in the event of device loss or theft. Our enterprise-grade endpoint encryption solution is FIPS 140-2 and Common Criteria EAL2+ certified. Control the specific file types and folders to encrypt or block. Encrypt files to cloud storage services such as Box, Dropbox, Google Drive, and Microsoft OneDrive.
  • 19
    KakaSoft USB Security
    Protect your files automatically after the USB disk plugs into a PC. Enjoy protection anytime and anyplace without installation. Lock and unlock USB drives on any computer without installation. USB Disk Security well protects your sensitive information in USB drives with the strongest encryption technique. Lock, encrypt, password password-protect USB flash drives, thumb drives, pen drives, memory sticks, and other portable storage devices. This USB disk security program ensures comprehensive data security of your confidential data on your USB flash drives. Ensure data security in USB flash drives with multiple layers of protection and advanced encryption techniques. Password protects all types of external USB storage devices. Lock data in a USB disk in 3 simple steps. You can access the protection of USB Security freely on any computer without installing it again. You can ensure data security in a USB drive and access confidential documents as soon as they are plugged in.
    Starting Price: $14.95 per month
  • 20
    Gilisoft #1 All-in-One Toolkit Suite
    22 Powerful and Useful Software in One Pack, which including Video Converter, Video Editor, Screen Recorder Pro, Slideshow Movie Creator, Movie DVD Converter, Movie DVD Copy, Movie DVD Creator, Audio Converter Ripper, Audio Recorder Pro, Audio Editor, MP3 CD Maker, File Lock Pro, USB Encryption, Secure Disc Creator, Full Disk Encryption, Private Disk, USB Lock, and RAM Disk, Image Watermark Remover, Video Watermark Remover, Formathor, Data Recovery. #1 All-in-One Toolkit Suite is able to do almost every multimedia ripping, converting, burning, and editing imaginable. You can make your PC perfectly safe with encryption tools, get back lost files and also speed up your PC performance with RAMDisk. In conclusion, you can do almost multimedia work with audio and video tools, and you can do encryption operation with encryption software. Just free download and experience it now!
  • 21
    MyDLP

    MyDLP

    Comodo Group

    Monitor, discover and prevent data leakage on your company's network and endpoints. Sign up and get data loss protection for your company with MyDLP from Comodo! MyDLP from Comodo is a rock-solid all-in-one data loss prevention (DLP) solution. You don't need to buy several modules or products to Monitor, Discover and Prevent data leakage on your company network and endpoints. With MyDLP, you can block any data flow containing credit card numbers, social security numbers or any sensitive information. Your customers will be more comfortable when sharing their personal and financial information with you. MyDLP provides data security for web, mail, printers, removable devices and more. Your sensitive data will not leak out through network connections or endpoint devices. You train MyDLP with your private data files once, and MyDLP will protect them forever. No one will be able to transfer them outside your network.
  • 22
    Clearswift Endpoint Data Loss Prevention
    As a vital piece of your IT security strategy, Clearswift Endpoint Data Loss Protection (DLP) solution allows organizations to detect, inspect and secure critical data on endpoints. In one solution, it provides context-aware Data in Use (DIU) policies to control which devices can connect to a corporate network and what information can be transferred. It also executes scheduled Data at Rest (DAR) scans on file systems to audit and manage critical data residing on the network or in the cloud. A lightweight agent, Clearswift Endpoint DLP works behind the scenes to enforce your security and compliance policies and provides continuity even when users are not connected to the network. Flexible and context-aware DIU policies allow organizations to apply rules that either prevent documents containing critical data from being copied to removable media, shared on the network or uploaded to the cloud, or automatically encrypt them before they are transferred.
  • 23
    IBM Security Guardium Data Encryption
    Protect your file and database data from misuse and help comply with industry and government regulations with this suite of integrated encryption products. IBM Security Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data masking and key rotation can help organizations address compliance with government and industry regulations, including GDPR, CCPA, PCI DSS and HIPAA. Guardium Data Encryption's capabilities—such as data access audit logging, tokenization, data masking and key management—help meet regulations such as HIPAA, CCPA or GDPR.
  • 24
    ITsMine Beyond DLP
    ITsMine Beyond DLP™ goes beyond traditional Data Loss Prevention (DLP) to protect organizations against all data threats. No policies or endpoint agents needed zero effect on employee productivity, and protection even after data exfiltration. Data loss incidents are becoming more common and more destructive than ever before, whether deliberate or inadvertent or from internal or external factors. Beyond DLP™ is a completely new security approach, that enables organizations to easily track and secure their data wherever it is, within their internal network and beyond. Maintain your high-security standards regardless of whether your data is located in on-prem or cloud-based file systems. Empower employees’ full productivity while controlling the usage and whereabouts of your sensitive data. Hassle-free compliance to data protection regulations, from GDPR, CCPA, PCI to HIPPA, with access control options to sensitive data, data breach detection and clear reporting options.
  • 25
    Privacera

    Privacera

    Privacera

    At the intersection of data governance, privacy, and security, Privacera’s unified data access governance platform maximizes the value of data by providing secure data access control and governance across hybrid- and multi-cloud environments. The hybrid platform centralizes access and natively enforces policies across multiple cloud services—AWS, Azure, Google Cloud, Databricks, Snowflake, Starburst and more—to democratize trusted data enterprise-wide without compromising compliance with regulations such as GDPR, CCPA, LGPD, or HIPAA. Trusted by Fortune 500 customers across finance, insurance, retail, healthcare, media, public and the federal sector, Privacera is the industry’s leading data access governance platform that delivers unmatched scalability, elasticity, and performance. Headquartered in Fremont, California, Privacera was founded in 2016 to manage cloud data privacy and security by the creators of Apache Ranger™ and Apache Atlas™.
  • 26
    SURF Security

    SURF Security

    SURF Security

    Create a security air gap, reduce your attack surface and isolate your business from internal and external exploits, while streamlining SaaS apps and accessing your data. Grants access based on the identity of the users and their devices to any SaaS or on-prem apps. Isolated work environment from device and web threats locally on the endpoint, by encrypting, sandboxing and rendering content. Enforcing enterprise browser security policies like DLP, web filtering, phishing protection, extension management and more. SURF brings Zero-Trust principles to the user via the browser, protecting everyone and everything in the enterprise regardless of role. By configuring only a few policies, IT and security teams can significantly reduce the attack surface. Discover the benefits of utilizing SURF from an Information technology perspective.
  • 27
    GTB Technologies DLP

    GTB Technologies DLP

    GTB Technologies

    Data Loss Prevention is defined as a system that performs real-time data classification on data at rest and in motion while automatically enforcing data security policies. Data in motion is data going to the cloud, internet, devices, or the printer. Our solution is the technology leader. Protecting on-premises, off-premises, and the cloud whether it be Mac, Linux, or Windows; our Data Loss Prevention security engine accurately detects structured & unstructured data at the binary level. GTB is the only Data Loss Prevention solution that accurately protects data when off the network. Discover, identify, classify, inventory, index, redact, re-mediate, index, control and protect your data including PII, PCI, PHI, IP, unstructured data, structured data, FERC, NERC, SOX, GLBA & more. Our patented and patent-pending, proprietary technology is able to prevent the syncing of sensitive data to unsanctioned or private clouds, while allowing its users to automatically identify “sync folders”.
  • 28
    SecureTower

    SecureTower

    falcongaze

    Our DLP system helps companies protect against leaks of confidential information, as well as monitor the work of employees. Leaks of confidential information. Fraud schemes within the company. Insider activity, ineffective employees, control, actions on employees’ computers. Efficiency and loyalty of staff, employee communications, data channels, blocking, malicious actions of employees. Access to web resources (including by category), launching applications (including by category), saving data to the clipboard, connecting USB devices. Analysis, content of uploaded files (text, images, audio), employee efficiency, risk activity of employees. Statistical indicators of employee performance, investigation, information security incidents. Causes of safety violations, the reasons for the ineffective work of employees, fraud schemes within the company.
  • 29
    Mailprotector

    Mailprotector

    Mailprotector

    Mailprotector delivers award-winning email experiences exclusively through our amazing partner resellers. Easy to use encrypted email with no plugins or apps. Bracket has turned using email encryption from dread to delight. Just wrap brackets around the [subject] in any email client on any device, and Bracket handles the rest. Total email security that filters all the junk people don’t want. CloudFilter delivers full-stack protection from annoying spam and crippling email-based virus and phishing attacks in a way that’s effective, efficient, and easy to use. Prevents spam proliferation and keeps damaging or sensitive data from being leaked via email. SafeSend expands beyond CloudFilter’s outbound filtering by giving greater control over outbound email traffic with custom content rules and more.
  • 30
    DriveLock

    DriveLock

    DriveLock

    Protecting your IT systems, endpoints and business data should be just as natural you close your front door to protect your home. DriveLock made it easier than you think. We use the latest technology and share our expertise with you. With it, you don't have to worry about your data throughout its lifecycle and across your endpoints. DriveLock Zero Trust Platform: Instead of gradually closing gaps in a conventional environment with individual and independent security silos, the Zero Trust model prevents all access. DriveLock's centralized policies allow access to only the data and applications that are necessary for individual employees and endpoints - true to the maxim "never trust, always verify".
  • 31
    Bitdefender GravityZone
    Bitdefender GravityZone provides full visibility into organizations' overall security posture, global security threats, and control over its security services that protect virtual or physical desktops, servers and mobile devices. All Bitdefender's Enterprise Security solutions are managed within the GravityZone through a single console, Control Center, that provides control, reporting, and alerting services for various roles within the organization
  • 32
    Humming Heads

    Humming Heads

    Humming Heads

    Prevent attacks by locking down all authorized actions and prevent leaked or stolen data from being read. Invisibly, automatically, without fail. SDS helps you focus your endpoint security efforts on what you can positively control instead of chasing the latest malware variant or trying to train your users to be security experts. Shinobi Defense System is a unique integrated portfolio of proven technologies now available for the first time in the USA. SDS invisibly protects against the top 3 hardest and most prevalent endpoint security problems driving business losses. We combine DeepWhite, the strongest whitelist-based protection technology, and Evolution DLP, a seamless and automatic data loss protection solution, into one integrated system that is powered by our patented Active Intercept engine and Shinobi Forensics logging and reporting platform. Invisibly prevents any leaked or stolen files from being read. Zero end user rules or interaction needed.
  • 33
    Next DLP

    Next DLP

    Next DLP

    Discover risks, educate employees, enforce policies and prevent data loss with Reveal. Your people, users and data are dynamic: constantly changing and moving. In the hybrid world of work people create, manipulate and share data dynamically, across endless channels. The opportunities for data leaks are infinite and your people are the main target— securing your organization starts with securing your people. Reveal Cloud is cloud-native, so it is simple to buy, install, and use. You get automated protection from day 1 with out-of-the-box policies and machine learning, with smart remediation that works even if computers are disconnected from the network. The lightweight agent makes sure your data and employees are protected at all times without slowing you down. Continuous monitoring provides visibility into user behavior, data access, and system use. Security operators can search on file, USB device, connection, browser, application events, and more.
  • 34
    Sophos Central Device Encryption
    Increased remote working makes it more important than ever to secure computers and the data on them. With the huge number of laptops lost, stolen, or misplaced every day, a crucial first line of defense against the loss or theft of devices is full disk encryption. Sophos Central Device Encryption leverages Windows BitLocker and macOS FileVault to secure devices and data. Centralized security management and operations from the world’s most trusted and scalable cloud security platform. With open APIs, extensive third-party integrations, and consolidated dashboards and alerts, Sophos Central makes cybersecurity easier and more effective. Integrated SASE-ready solutions to secure your cloud and hybrid networks - now and into the future. From Firewall and Zero Trust to Switches, Wi-Fi, and more. Trust your inbox again with cloud email security that protects your people and critical information from malware, phishing and impersonation attempts.
  • 35
    Risk Monitor

    Risk Monitor

    SearchInform

    SearchInform Risk Monitor controls your maximum quantity of information channels as well as featuring built-in analytical tools. Provides your business with multifaceted protection against financial losses caused by internal threats in several stages: •Detecting incidents involving corporate fraud and profiteering •Controlling the human factor and predicting HR risks •Protecting confidential data from leaks during its storage, use and transfer •Facilitating regulatory compliance and investigation processes The system operates on two levels. It keeps track of the data leaving the network while at the same time monitors employee activities on computers. SearchInform Risk Monitor keeps an eye on the company’s assets 24/7 even if the employees are outside the office (field work, WFH or while on the business trip) but using corporate devices.
  • 36
    iSecurity Field Encryption

    iSecurity Field Encryption

    Raz-Lee Security

    iSecurity Field Encryption protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting compliance with PCI-DSS, GDPR, HIPAA, SOX, other government regulations and state privacy laws. Ransomware attacks any file it can access including connected devices, mapped network drivers, shared local networks, and cloud storage services that are mapped to the infected computer. Ransomware doesn’t discriminate. It encrypts every data file that it has access to, including the IFS files. Anti-Ransomware quickly detects high volume cyber threats deployed from an external source, isolates the threat, and prevents it from damaging valuable data that is stored on the IBM i while preserving performance.
  • 37
    Panda Full Encryption

    Panda Full Encryption

    WatchGuard Technologies

    Panda Full Encryption is the first line of defense to protect your data in a simple and effective way. It is a full-volume encryption solution that strengthens security against unauthorized access using established authentication mechanisms. Data encryption minimizes data exposure and provides an additional layer of security and control to your organization. data protection regulations by monitoring and enforcing BitLocker activation on Windows devices. All Aether-based solutions provide intuitive dashboards, detailed reports and change audits. Additionally, its role-based management allows administrators to implement different authorization levels and different policies for groups and devices from a single centralized web console.
  • 38
    CurrentWare

    CurrentWare

    CurrentWare

    Protect your business with our simple employee monitoring & security solutions. Protect your sensitive data with the robust data loss prevention and user activity monitoring features in the CurrentWare suite. Block unauthorized USB devices to prevent data theft, proactively block high-risk websites, monitor computer activity for anomalous behavior, and more. CurrentWare’s workplace internet filtering and monitoring software prevents the misuse of the internet in the workplace. Effortlessly restrict internet access and track employee web browsing to enforce your internet use policies. Use CurrentWare’s remote workforce management software to improve the productivity and security of your employees, no matter where they work. With CurrentWare you can monitor remote employee internet usage, block websites, and restrict USBs even when PCs disconnect from your network. Whether on-campus or taken home, CurrentWare’s computer monitoring and web filtering for schools ensures student safety.
    Starting Price: $5 per month
  • 39
    Box Shield
    Shield lets you classify content your way, both manually and automatically. We're excited to announce our powerful, native capability that identifies PII and custom terms within files, and automatically classifies them based on your policies — helping you protect your data at scale. Placing controls close to your content helps prevent leaks in real time, while powering a frictionless end-user experience. Configure access policies within minutes to keep your data secure while letting people do their mission-critical work. Using machine learning, Shield brings you timely, accurate alerts on insider threats, account compromise, and malware attacks. Quickly evaluate alerts in Shield, or send them to your existing tools for further analysis. Shield works with the best-of-breed security tools you already have in place. Alerts containing more insights than ever before can be integrated with your SIEM and CASB for a unified view.
    Starting Price: $130 per month
  • 40
    SecureZIP

    SecureZIP

    PKWARE

    Large-scale data breaches continue to expose the weaknesses in traditional information security strategies. Network and device protection is clearly not enough. Full-disk or volume encryption is a single-use-case approach that leaves information exposed at the data level. Persistent data-level encryption has become a necessity, especially in highly regulated industries. Files are compressed using PKWARE’s industry-best technology, reducing file sizes by up to 95%. Encrypted files can be shared and decrypted by authorized users on any enterprise operating platform. Sensitive data can be protected using a variety of methods, including password-based encryption and certificate-based encryption. Enables organization-wide control and consistent policy enforcement.
  • 41
    Trend Micro Endpoint Encryption
    Trend Micro™ Endpoint Encryption encrypts data on a wide range of devices, such as PCs and Macs, laptops and desktops, USB drives, and other removable media. Available as a separate agent, this solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information. A single, well-integrated management console allows you to manage your users holistically—using the same console for endpoint protection and other Trend Micro security products. Deploying the Endpoint Encryption agent helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.
  • 42
    Safend Protector
    Safend Protector prevents internal/external data leakage by monitoring endpoint devices and data flow. Using granular and customizable security policies and rules, Protector automatically detects, permits and restricts files and encrypts media devices. Very intuitive, Protector has strong reporting and analysis capabilities and already complies with PCI, HIPAA, SOX and EU GDPR. Preventing viruses from entering via removable devices, Protector’s AV SCAN blocks each device as soon as it is inserted, checks for viruses and then permits usage according to rules and policies. AV SCAN interfaces with most anti-virus solutions already used to protect data networks, and permits devices when no viruses are found and fully blocks devices that are contaminated. Selected, restricted or blocked endpoint connectivity without compromising on security.
  • 43
    Trellix DLP Endpoint
    Extend on-premises data loss prevention policies to the cloud for consistent data loss detection. Protect sensitive data such as PCI, PII, and PHI wherever it lives—on premises, in the cloud, or at the endpoints. Monitor and address day-to-day risky actions such as emailing, web posting, printing, screen capturing, uploading to the cloud, and more. Safeguard personal data and comply to regulatory compliance with automated reporting. Allow users to run endpoint discovery scans and perform self-remediation actions. With the support of DLP Endpoint on Trellix ePO, deployment, policies and incident management can be managed in the Cloud. Empower users to manually classify documents, increase employee data protection awareness, and reduce administrative burden. Includes enhanced content-aware protection and data loss prevention for Mac users. Integration with Threat Intelligence Exchange and Data Exchange Layer (DXL) helps block sensitive data in applications identified as malicious.
  • 44
    BUFFERZONE

    BUFFERZONE

    Bufferzone Security

    BUFFERZONE provides a patented containment and disarming solution that defends endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity. By isolating potentially malicious content coming from browsers, email and removable media, BUFFERZONE defends individuals and organizations from advanced threats that evade detection. BUFFERZONE disarms content for securely transferring it from the container to the native endpoint and secure network zones, and provides critical intelligence for enterprise-wide security analytics. Easy to deploy and configure, BUFFERZONE is a lightweight solution that provides cost-effective containment for up to thousands of endpoints.
  • 45
    Symantec Endpoint Encryption
    Your staff relies on mobility and anywhere-access to stay productive. Unfortunately, your sensitive data may be unknowingly synchronized from the cloud, and at risk when devices are lost or stolen. Symantec Endpoint Encryption protects sensitive information and ensures regulatory compliance. It encrypts all files on the hard drive, sector-by-sector, for maximum security. It supports Windows, Mac, tablets, self-encrypting drives, and removable media (USB drives, external hard drives, and DVDs). For maximum flexibility, Symantec Endpoint Encryption also manages BitLocker and File Vault-protected devices. Symantec Gateway Email Encryption provides centrally-managed, secure communications with customers and partners at the network gateway. It minimizes the risk of a data breach while ensuring regulatory compliance. For desktop applications, Symantec Desktop Email Encryption automatically encrypts and decrypts email directly between internal clients.
  • 46
    Talon Enterprise Browser

    Talon Enterprise Browser

    Talon Cyber Security

    The first secure enterprise browser designed for the future of work. Defend against malware and prevent data loss for SaaS and web-based applications for any business user from any location or device. TalonWork, is a hardened Chromium-based browser that isolates web traffic locally on the endpoint, providing a responsive, native user experience. TalonWork integrates with popular Identity Providers to streamline user onboarding and policy enforcement. TalonWork provides comprehensive DLP to reduce cyber risk. This includes file encryption to prevent sensitive files from being shared externally or stored on endpoints. TalonWork also provides granular clipboard, printing, and screenshot restrictions. TalonWork blocks access to malicious domains and phishing websites with URL filtering and enhanced safe browsing functions. TalonWork also prevents malicious files from being uploaded/downloaded using Talon’s file scanning engine or CrowdStrike Falcon X.
  • 47
    BestCrypt

    BestCrypt

    Jetico

    Massive data breaches are now spreading at an alarming rate. Confidential information and personal records are getting leaked, lost, and stolen. Use data encryption to protect your data from both physical and virtual threats. No information security strategy is complete unless data is properly protected at the source where it is stored. Data encryption secures the confidentiality of sensitive data to address the risks of data leaks and data theft, while also ensuring regulatory compliance. BestCrypt volume encryption 5 provides increased resilience against brute-force attacks, which are one of the simplest and most effective ways for a hacker to breach your system. Now users are able to customize the parameters of the scrypt key derivation algorithm, offering extra security against these password-iterating attacks. Data shelter, our new utility, also provides an additional layer of protection to data-in-use, which helps secure files when you are viewing or modifying them.
  • 48
    Somansa Privacy-i
    As more corporate information is stored in company desktops, laptops, mobile devices, and servers and copied or transferred to removable storage such as USB, DVD, through applications, and other channels, the liabilities and amount of resources exhausted for companies have also increased. Confidential and sensitive data leakage, meeting compliance requirements, and legal lawsuits can all lead to financial and resource loss for organizations of all sizes and industries, healthcare, financial, and government. Somansa Privacy-i is a endpoint data loss prevention (DLP) solution to protect personal and confidential data stored in company desktops, laptops, mobile devices, and servers and monitors, discovers, and secures confidential data based on policy rules to prevent copy and transfer to USB, CD/DVD, Printing, Wi-Fi/Bluetooth, and applications.
  • 49
    BlackBerry Cyber Suite
    Secure and protect your users and devices, even BYOD laptops and smartphones, with a solution that’s focused on earning trust across any endpoint and continuously validating that trust at every event or transaction. Is your organization equipped with the tools to empower your employees, no matter where they’re working? In a situation where employees may be unable to report to the office, it’s essential that they still have secure access to the data and apps they need, whether they use corporate or personal owned devices. The BlackBerry® Cyber Suite provides complete security, effectively preventing breaches and safeguarding against sophisticated threats with advanced AI. It provides a total Zero Trust solution with coverage across the full spectrum of devices, ownership models, network, apps and people. It continuously authenticates users and dynamically adapts security policies to deliver a Zero Touch experience that improves security with no user interruption.
  • 50
    Open Raven

    Open Raven

    Open Raven

    See what's exposed, stop data leaks and privacy violations. Open Raven is the cloud native data protection platform that prevents cloud security and privacy exposures driven by modern speed and sprawl. Restore full visibility and regain control within minutes, without agents. Restore visibility, regain control of your sensitive data. Open Raven is policy-driven to discover, classify, and protect your sensitive cloud assets. Stop data leaks and privacy violations at their source, from shadow accounts and dark data to misconfigurations and ill-advised access. Gain a full view of data security and privacy to avoid costly incidents. Get real-time inventory of cloud assets & data stores. Auto-discover all cloud assets instantly with live 3D maps including which accounts, VPCs, security groups may be leaking data. Classify sensitive data for privacy engineering and SecOps triage. Quickly and accurately identify all sensitive data in your cloud environment per your organization’s definition