Audience
IT teams looking for an IT Security solution
About Perfecto Encryptor
This unique program will help you to keep any of your files and folders in encrypted form. And only you will can decrypt your files. With our software your information will be completely protected from other users and you will feel yourself completely safe.
SSProtect
The :Foundation Client is very small and uses minimal system resources, operating in the background and in response to user-driven activities. Access the UI to enumerate managed resources, view reports, or as an Administrator, deploy and manage Users, Service Components, and Organization resources. The :Foundation Client coordinates user-driven activity, dispatching secure requests to KODiAC Cloud Services while handling end-user application workflow integration. Decryption, re-encryption, authentication – never concern yourself with manual activities, the :foundation Client makes encryption both practical and easy. Access the list of managed items, viewing enumerated Version Instances and/ or your Managed Data Archive. Restore content, acquire and review Usage Reports, and even protect large data sets – all from the same set of User Interface controls available to every User independent from the Role they play in an organization.
Learn more
StealthDisk Mobile
StealthDisk Mobile uses Virtual Disk Technology to easily and securely store all your important files and documents. Using industry-leading encryption algorithms, StealthDisk Mobile creates an encrypted virtual disk that encrypts and decrypts all data on-the-fly as you work. When you are done, simply dismount the StealthDisk volume and all your important files and documents will be instantly hidden and encrypted. There is no need to encrypt each and every file or each and every every folder like other file encryption applications. All our algorithms are optimized and blazing fast! Our software processes data on-the-fly meaning data only gets decrypted when it is accessed. Other file encryption software encrypts or decrypts the entire file before you can use it. StealthDisk Mobile does this automatically and only to the data that you access saving valuable time and resources.
Learn more
CPTRAX for Windows
Server File Activity Tracking - Audit who is creating, accessing, moving, and deleting your files and folders. Track file permission changes. Real-time alerts about critical file activities. Malicious activity containment (Ransomware, mass file deletes, etc.)
Workstation File Activity Tracking - Audit who is copying files to USB or other removable drives. Track who is uploading files from a browser or via FTP. Block files from being created on USB/removable device. Email alerts when a removable device is connected.
Active Directory Auditing - Keep audit logs and get real-time alerts of important Active Directory changes without dealing with SACLs or Windows Event Logs.
Server Authentication Auditing - Track authentications into Windows Servers and Citrix sessions. Review all failed logon attempts.
Workstation Logon/Logoff Tracking - Get visibility on workstation logons/logoffs, including locks, unlocks and password changes. Review all failed logon attempts.
Learn more
AVG AntiVirus Business Edition
When an unrecognized file is downloaded onto one of your PCs, a copy will be sent to our experts at our Threat Labs to identify if it’s safe or not. Checks webpages before they open in your browser and displays a safety rating in the search engine results to help you surf the web with more confidence. Better protection against even the newest malware thanks to cloud-based Real-Time Outbreak Detection and proactive AI Detection. Protects against online security threats like spam, viruses, hackers and malware. Anti-Spyware protects your identity from spyware and adware that tracks personal information. Our Windows file server security helps keep it safe, private and out of the hackers’ hands. Advanced File Shredder securely deletes files to help prevent unintended recovery. Scans your PC when you’re not working so it doesn't get in the way. It does the hard work so you and your employees can focus on your business without costly distractions and delays.
Learn more
Integrations
No integrations listed.
Company Information
Black Bird Cleaner Software
Founded: 2017
Ukraine
blackbirdcleaning.com
You Might Also Like
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Product Details
Platforms Supported
SaaS
Training
Documentation
Support
Phone Support
Online
Perfecto Encryptor Frequently Asked Questions
Perfecto Encryptor Product Features
IT Security
Intrusion Detection System
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting