Alternatives to USB Block
Compare USB Block alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to USB Block in 2024. Compare features, ratings, user reviews, pricing, and more from USB Block competitors and alternatives in order to make an informed decision for your business.
-
1
Safetica
Safetica
Safetica is an integrated Data Loss Prevention (DLP) and Insider Risk Management (IRM) solution, which helps companies to identify, classify, and protect sensitive data as well as detect, analyze, and mitigate risks posed by insiders within an organization. Safetica covers the following data security solutions: ✅ Data Classification: Safetica offers complete data visibility across endpoints, networks, and cloud environments. ✅ Data Loss Prevention: With Safetica, you can protect sensitive business- or customer-related data, source codes, or blueprints from accidental or intentional exposure through instant notifications and policy enforcement. ✅ Insider Risk Management: With Safetica, you can analyze insider risks, detect threats, and mitigate them swiftly. ✅ Cloud Data Protection: Safetica can monitor and classify files directly during user operations. ✅ Regulatory compliance: GDPR, HIPAA, SOX, PCI-DSS, GLBA, ISO/IEC 27001, SOC2 or CCPA. -
2
ThreatLocker
ThreatLocker
For IT Professionals to stop ransomware and other cyberattacks, you need to do more than just hunt for threats. ThreatLocker helps you reduce your surface areas of attack with Zero Trust policy-driven endpoint security solutions. Now you can change the paradigm from only blocking known threats, to blocking everything that you have not explicitly allowed. ThreatLocker Application Allowlisting is the gold standard when it comes to blocking ransomware, viruses, and other software-based threats. Discover today the ThreatLocker suite of Zero Trust endpoint security solutions: Allowlisting, Ringfencing, Elevation Control, Storage Control, Network Control, Unified Audit, ThreatLocker Ops, Community, Configuration Manager and Health Center. -
3
Endpoint Protector
CoSoSys
Endpoint Protector is an advanced, all-in-one Data Loss Prevention solution for Windows, macOS and Linux, that puts an end to data leaks and data theft and offers seamless control of portable storage devices. Endpoint Protector’s filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or data protection regulations such as GDPR, PCI DSS, CCPA, HIPAA, etc. Endpoint Protector features several specialized modules that can be mixed and matched based on client needs. The modules comprise: Content Aware Protection, Device Control, Enforced Encryption, and eDiscovery . It makes work more convenient, secure and enjoyable, offering an excellent ROI. -
4
USB-LOCK-RP
Advanced Systems International
USB Control & Lockdown Software to Block USB Devices Access and Lock USB Ports in Windows Systems. Centralized USB Device Management, Monitoring and Whitelisting to Protect Computers in a Network. USB Device Control is an important part of Endpoint Security Management and focuses in the protection of computer systems and data assets from threats posed by unauthorized USB device usage. Controlling USB devices access to endpoints is required to secure networks that control machinery or store sensitive information. - Centralized USB Device Management. - Secures Groups of Computer or Specific Computers. - Whitelists Specific Devices by Hardware ID and Blocks the rest. -Automatically apply Group 1 protection settings to unassigned clients. NEW! - Receives Alerts & Logs Device Connections in the Network Automatically. -Export Status and Alerts Reports to csv format (Comma-separated value)NEW! -Automatic Authorizations Mode, Whitelist USB devices across the network automatically. NEWStarting Price: $20 per client/one-time -
5
CPTRAX for Windows
Visual Click Software
Server File Activity Tracking - Audit who is creating, accessing, moving, and deleting your files and folders. Track file permission changes. Real-time alerts about critical file activities. Malicious activity containment (Ransomware, mass file deletes, etc.) Workstation File Activity Tracking - Audit who is copying files to USB or other removable drives. Track who is uploading files from a browser or via FTP. Block files from being created on USB/removable device. Email alerts when a removable device is connected. Active Directory Auditing - Keep audit logs and get real-time alerts of important Active Directory changes without dealing with SACLs or Windows Event Logs. Server Authentication Auditing - Track authentications into Windows Servers and Citrix sessions. Review all failed logon attempts. Workstation Logon/Logoff Tracking - Get visibility on workstation logons/logoffs, including locks, unlocks and password changes. Review all failed logon attempts. -
6
Gilisoft USB Lock
Gilisoft
Disable reading from USB/SD disks, disable writing to USB/SD disks,Block non-system partition(s). It doesn’t allow any type of USB/SD drive to access your computer unless you authorize it or it has been whitelisted in trusted devices. You can create a whitelist to allow 'certain approved' USB pen drives. Then it will block all USB drives except the ones whitelisted. Block accessing some websites. This utility allows you to block unwanted websites from display in internet explorer. If a website is blocked the user is forwarded to a blank page or to a "blocked page" and the contents of the original page are not loaded on your PC. GiliSoft USB Lock is a data leak prevention tool that prevents leakage and copy of your data to USB drives, external drives, CDs/DVDs or other such portable devices. Once installed, USB Lock lets you block all such drives and devices that do not belong to you.Starting Price: $49.95 one-time payment -
7
SysTools USB Blocker Software
SysTools
SysTools USB Port Blocker Software allows blocking and unblocking USB ports of users' computers. This software is able to disable and enable all USB ports from any system. USB Port Locker software free download on any version of Windows operating system. Option to recover lost user password using the email address. Need to set a new password for USB ports blocking & unblocking. Need to re-login into the user machine to block USB ports. USB Lock tool serves a very important function of blocking USB ports that restricts unwanted users from using USB devices on them like; pen drives, flash drives, USB drives, etc. Also, no data extract can be carried out from the machine in your absence. It is possible to block all USB ports present on the machine at once by using USB blocker software.Starting Price: $29 per month -
8
AccessPatrol
CurrentWare Inc.
AccessPatrol is a device control software that provides a proactive solution for securing company endpoints against data breaches caused by illicit data transfers. AccessPatrol controls a variety of peripherals, including… - Storage devices such as USB flash drives and external hard drives - Wireless Devices such as Bluetooth, Infrared, and WiFi - Communication Ports such as Serial and Parallel ports - Imaging Devices such as Scanners or Cameras, and… - Other Devices such as network share drives, printers, and mobile phones File operations alerts and permissions can be configured to alert IT administrators to suspicious file operations and proactively prevent data transfers to unauthorized users. The security policies are enforced by a software agent that is installed on your user’s computers. This keeps devices restricted and monitored even when the computers are taken off of the network.Starting Price: $3.99 PUPM -
9
KakaSoft USB Security
KakaSoft
Protect your files automatically after the USB disk plugs into a PC. Enjoy protection anytime and anyplace without installation. Lock and unlock USB drives on any computer without installation. USB Disk Security well protects your sensitive information in USB drives with the strongest encryption technique. Lock, encrypt, password password-protect USB flash drives, thumb drives, pen drives, memory sticks, and other portable storage devices. This USB disk security program ensures comprehensive data security of your confidential data on your USB flash drives. Ensure data security in USB flash drives with multiple layers of protection and advanced encryption techniques. Password protects all types of external USB storage devices. Lock data in a USB disk in 3 simple steps. You can access the protection of USB Security freely on any computer without installing it again. You can ensure data security in a USB drive and access confidential documents as soon as they are plugged in.Starting Price: $14.95 per month -
10
Acronis DeviceLock DLP
Acronis
Acronis DeviceLock DLP provides comprehensive endpoint DLP (endpoint data loss prevention) – discovering and protecting sensitive data while monitoring the operations involving that information. Prevent data leakage due to employee negligence or malicious insiders by blocking any unauthorized attempt to access or transfer data, discovering and protecting sensitive data-at-rest. Reduce the complexity of data protection and cut reporting times with a single DLP solution for thorough visibility over data flows and user behavior. Reduce information security risks and comply with IT security standards and regulations by enforcing data use and handling policies that users can’t avoid following. Save the time and hassle associated with managing a DLP solution. Acronis DeviceLock DLP is easily deployable through Active Directory (AD) and offers various central management consoles, based on your organization’s requirements.Starting Price: $615 one-time payment -
11
Google Titan Security Key
Google
A stronger way to protect your account. Like a second lock after your password, Titan Security Keys help prevent phishing and keep out anyone who shouldn’t have access to your online accounts, including Gmail. Backed by Titan security. Titan Security Keys include special firmware engineered by Google to verify the key’s integrity and are built on FIDO® open standards, so you can use them with many apps and services. Works with the Advanced Protection Program. Titan Security Keys are compatible with the Advanced Protection Program, Google's strongest security offering. For use with Android and iOS devices. You can also use the Micro USB to USB-A connecting cable to connect to your computer. Titan Security Keys work with Google phones, Chromebooks, tablets, Google’s Advanced Protection Program, and virtually anything running Google Chrome.Starting Price: $25 -
12
DriveLock
DriveLock
Protecting your IT systems, endpoints and business data should be just as natural you close your front door to protect your home. DriveLock made it easier than you think. We use the latest technology and share our expertise with you. With it, you don't have to worry about your data throughout its lifecycle and across your endpoints. DriveLock Zero Trust Platform: Instead of gradually closing gaps in a conventional environment with individual and independent security silos, the Zero Trust model prevents all access. DriveLock's centralized policies allow access to only the data and applications that are necessary for individual employees and endpoints - true to the maxim "never trust, always verify". -
13
Device Control Plus is an enterprise software, specially designed for complete device control and file access management. It is equipped with an intuitive interface using which the admin can efficiently classify USB and other peripheral devices as trusted, blocked or allowed temporary access. It is also equipped with numerous data security capabilities including assigning read-only file access, restricting file copying or blocking unauthorized file transfers. Additionally for extensive visibility over device actions and forensic analysis of policy efficacy and network performance, file tracing and file shadowing reports will be automatically generated. Know who is using what device on which endpoint with clear-cut audit data and reports, and receive instant alerts in case of unauthorized access.Starting Price: $5.95 per user per year
-
14
Donglify
Donglify
Donglify solves the dongle-sharing problem. The app allows you to use a USB dongle even when you don't have it at hand. You can redirect your licensed USB dongles to any location over the network. It’s not uncommon that an owner of a licensed USB key needs to access the functionality of their device when a physical connection to the device is not possible. Donglify helps resolve this problem once and for all. Thanks to the advanced port redirection technology that powers the solution, you can forward your USB security dongles over any distance and to any environment. If a USB dongle that’s attached to your computer is not recognized by the virtual machine you are running, no worries. Just install Donglify on both the host and guest operating systems and redirect your device to a virtual environment without any limitations. Create login tokens and send them to other Donglify users.Starting Price: $16 per month -
15
DriveSecurity
DriveSecurity
DriveSecurity® (by ClevX®) is a powerful antivirus tool that prevents malware from spreading through USB drives. Designed for users who transfer pictures, music, videos and other documents via USB drives, DriveSecurity ensures the files that you put on your drive are malware-free. DriveSecurity eliminates all types of threats, including viruses, rootkits, worms and spyware from your USB drive. More importantly, it protects you from inadvertently spreading malware to your home or shared computers.Starting Price: $ 0.71 per month -
16
Gilisoft #1 All-in-One Toolkit Suite
Gilisoft
22 Powerful and Useful Software in One Pack, which including Video Converter, Video Editor, Screen Recorder Pro, Slideshow Movie Creator, Movie DVD Converter, Movie DVD Copy, Movie DVD Creator, Audio Converter Ripper, Audio Recorder Pro, Audio Editor, MP3 CD Maker, File Lock Pro, USB Encryption, Secure Disc Creator, Full Disk Encryption, Private Disk, USB Lock, and RAM Disk, Image Watermark Remover, Video Watermark Remover, Formathor, Data Recovery. #1 All-in-One Toolkit Suite is able to do almost every multimedia ripping, converting, burning, and editing imaginable. You can make your PC perfectly safe with encryption tools, get back lost files and also speed up your PC performance with RAMDisk. In conclusion, you can do almost multimedia work with audio and video tools, and you can do encryption operation with encryption software. Just free download and experience it now!Starting Price: $149.99 -
17
Bitdefender GravityZone
Bitdefender
Bitdefender GravityZone provides full visibility into organizations' overall security posture, global security threats, and control over its security services that protect virtual or physical desktops, servers and mobile devices. All Bitdefender's Enterprise Security solutions are managed within the GravityZone through a single console, Control Center, that provides control, reporting, and alerting services for various roles within the organization -
18
PC Matic
PC Matic
PC Matic Pro's application whitelisting is a critical preventative layer of cyber-protection that resides on top of other endpoint security solutions. zero trust whitelisting solutions prevent hacking and cyber-attacks. Block all malware, ransomware, and malicious scripts from executing. Protect your business data, users, and network with our whitelist cybersecurity solution. PC Matic Pro represents a long overdue shift in the cybersecurity industry to absolute prevention. Today's threats to critical infrastructure, industry, and all levels of government demand nothing less. PC Matic Pro provides a patented default-deny security layer at the device that blocks all unknown executions without introducing headaches for IT. Unlike traditional security solutions, customer infections aren’t required to strengthen the whitelist architecture. Local overrides can be added after prevention with a focus on accuracy and without concern for responding to an already active infection.Starting Price: $50 per year -
19
USB Blocker Professional
Mwisoft
USB Blocker Professional is a security software that prevents data theft, data loss and malware infections by blocking all untrusted USB devices. All unauthorized USB drives, external drives, network drives, non-system drives, CDs, DVDs, CDs, Blu-ray discs and memory sticks will be blocked unless you authorize them. The program maintains a list of authorized USB devices that are permitted to access your PC. You can authorize several USB devices at once. By default, USB Blocker Professional does not allow access to any unauthorized USB device unless you authorize it and must be an administrator. USB Blocker Professional maintains a record of Authorized USB devices, invalid login attempt, device log, invalid password change, invalid device authorization and invalid apply changes to keep you informed of any suspicious activity while using the program. You can easily view reports anytime you have access to the program. You can export your report as a PDF, Text or CSV file.Starting Price: $19.00 -
20
ShieldApps Identity Theft Preventer
ShieldApps
Identity Theft Preventer searches your device to find where your privacy may be vulnerable. It scans through your computer for your webmail credentials, bank account details, health provider records, social networks profiles and more, to identify potential concerns that you should address. The most recent edition of the product can even block hacking attempts against your webcams and microphones. With the Identity Theft Preventer, your audio and visual ports are secure, enabling you to confidently enjoy your private life again. Fend off hacking attempts against your devices. Identity Theft Preventer blocks malicious threats and hacking attacks on your webcam and microphone.Keep others from tracking your online activity and targeting you with unwanted ads. Enjoy web surfing again without feeling like you are being watched.Starting Price: $49.99 one-time payment -
21
Internet Lock
TopLang Software
Internet Lock is an access control and password protection solution for your internet connections and internet programs. With Internet Lock, you can fully control the internet connections and programs on your computer. By using Internet Lock, you can restrict or password protect internet access, schedule internet access, protect internet programs on certain IP addresses or domains, limit users to access only the websites you specified, or keep them from accessing unwanted websites. You can use Internet Lock to restrict internet connections and programs. Programs blocked by Internet Lock will not be able to access the internet. You can use Internet Lock to password protect internet programs and connections. Users must provide correct password in order to use the protected programs to access internet. When a password protected program tries to connect to internet, Internet Lock pops up a password window to ask user to enter password. If user couldn't provide the correct password.Starting Price: $29.95/one-time/user -
22
Cisdem AppCrypt
Cisdem
AppCrypt is a reliable tool for Mac users to lock applications and block websites, it blocks online and offline distractions, keeps kids safe from inappropriate websites, protects privacy and secures data from unauthorized access. AppCrypt can lock any application with one password to control the usage of applications on Mac, you can stop others viewing your photos or videos in Photos, ban purchase in iTunes or App Store, encrypt chatting records in WhatsApp, disable game apps, prevents kids changing the settings, etc. Lock all applications, just one password. AppCrypt can block access to harmful or distracting websites in Chrome and Safari browser, it can block the entire domain or specific URLs. You can set up Blocklist to filter out inappropriate websites, or make Allowlist to access to websites that useful for your work or study. AppCrypt lets you set up a schedule for when you can use the app or website. The predefined sessions can be on any day and time of your choice.Starting Price: $29.99 one-time payment -
23
Antamedia Kiosk Software
Antamedia
Turn any computer into a self-service Kiosk. Kiosk software securely displays your website or application and reduces maintenance time. Internet Kiosk software converts computer into self-service kiosk. It prevents hacking and downtime, blocks the system keys like Ctrl-Alt-Del, restricts access to the system, desktop, drives, folders and programs. You can use it to securely display your website or application, show marketing messages and advertisements, bill for Internet use, games or office applications, sell tickets for WiFi HotSpot around your kiosk, and much more. Kiosk software replaces system shell and blocks access to the Windows Explorer, drives, desktop and taskbar. It prevents access to the Windows system files, standard browser menus and prevents hacking and downtime.Starting Price: $27 one-time payment -
24
Yodot File Recovery
Yodot
Unerase, erased or lost files and folders emptied from recycle bin. Recovery from not only hard drives but also from all other external drives. Different views make file selection easy after recovery. Handy file undelete tool, suitable for all types of users. Discovers and automatically calculates the file size of more than 300 different file types in case there is a need to recover raw data from a drive having severe file system corruption. Enable you to toggle between different views to recover data in a smooth manner. Provides two different views to ease out the file selection process to find and save data. Blocks storage of retrieved data to the source drives to prevent any overwriting. Operates in a read-only mode, locates and reads the lost data, and copies it to the destination location of your choice. Scan and recover lost files from any Windows partition using the “deleted file recovery” option within a few minutes.Starting Price: $39.95 one-time payment -
25
Folder Lock
NewSoftwares.net
Encrypt your files with AES 256-bit military-grade encryption or lock your files from view and access. Keep prying eyes at bay! Folder Lock can Lock and Hide files and folders within seconds. It enables you to Password Protect and restricts unwanted eyes from viewing files, folders, and drives. Once you’ve locked a folder, it will be hidden from its previous location and can only be accessed through the software interface. Folder Lock creates Lockers. Just as you would put your money in a safe, would you like to keep your files in a digital ‘Locker’ that’s safer than a bank’s vault? You can create ‘Locker(s)’ which are protected by AES 256-bit encryption. You need not encrypt or decrypt files when accessing; simply copy them to Locker and voila! They are encrypted on the fly. Folder Lock offers a 2-way encryption and backup method, letting you backup your encrypted ‘Lockers’ online.Starting Price: $39.95/one-time/user -
26
Google Endpoint Management
Google
Keep things simple—and moving. Endpoint management for Android, iOS, Windows, Chrome OS, MacOS, and Linux is easy to set up and use. Lost phone? Stolen tablet? These things happen. Keep your company's data secure with endpoint management. You can require screen locks and strong passwords and erase confidential data with device wipe or selective account wipe for Android and iOS, as well as block access to specific Windows, Chrome OS, Linux, and MacOS sessions. Simplify endpoint management in your organization with G Suite. Enforce passcodes and wipe specific accounts without installing software on a user's Android and iOS device with agentless endpoint management. This feature is on by default. Manage and secure Windows 10 devices through the Admin console. Distribute business applications from the Admin console on Google Play (agentless) or Apple’s App Store. Host internal-only Android apps in the Play Private Channel.Starting Price: $6 per user per month -
27
Humming Heads
Humming Heads
Prevent attacks by locking down all authorized actions and prevent leaked or stolen data from being read. Invisibly, automatically, without fail. SDS helps you focus your endpoint security efforts on what you can positively control instead of chasing the latest malware variant or trying to train your users to be security experts. Shinobi Defense System is a unique integrated portfolio of proven technologies now available for the first time in the USA. SDS invisibly protects against the top 3 hardest and most prevalent endpoint security problems driving business losses. We combine DeepWhite, the strongest whitelist-based protection technology, and Evolution DLP, a seamless and automatic data loss protection solution, into one integrated system that is powered by our patented Active Intercept engine and Shinobi Forensics logging and reporting platform. Invisibly prevents any leaked or stolen files from being read. Zero end user rules or interaction needed. -
28
LeafWallet
LeafWallet
All content in the leaf wallet is saved on your own device. Leaf Wallet will proactively warn you about applications that leaked data so that you can understand the risks of providing information to them. Leaf Wallet uses asymmetric encryption to provide single sign-on (SSO), which allows you to log in to the application without a password. Prevent hackers from hacking the necessary parts of the account, and prevent account intrusion. When the external website is authorized by the plug-in, the plug-in icon will change color to remind the user. Wallet currency list, you can switch multiple accounts, and list the currencies owned by the current account. Account resource management, intuitive management of resource mortgages, memory transactions. Account authority management, support account for any authority change operation. The execution of each contract is clear and intuitive to ensure the correct and safe execution of the contract. -
29
KidLogger
KidLogger
We’ve created a useful and free app to help you get to know what your children are doing on a computer or smartphone. KidLogger is a parental control software compatible with the most used OS in the world. Install the app “Parental Time Control” for Android, Windows, or Mac and get all information about the activity of your PC, mobile, or tablet of your kids. Monitor internet usage and log all visited websites. It works with Internet Explorer, Chrome, Firefox, Opera, and Safari. Allows knowing the actual time your kid spent working on the PC or Mobile phone. Log all USB flash drives, external HDD, and other devices connected to the PC. Prevent data leaks. Keylogger feature allows viewing keystrokes and texts entered on the computer. It also records the text copied into the clipboard (Windows). Periodically captures the computer screen, and you can view them online. Also makes screenshots when a user types a keystroke that includes a keyword for Windows and macOS.Starting Price: $9 per 3 months -
30
Armorblox
Armorblox
Armorblox uses natural language understanding, deep learning, and statistical techniques to protect all enterprise communications from inbound threats and outbound data loss. The Armorblox platform leverages a broad spectrum of data sources, signals, and detection techniques. Stop business email compromise, account takeover, executive impersonation, and other targeted threats. Study detailed attack analysis that’s built for human eyes. Automatically delete, quarantine, or label emails based on preconfigured policies. Detect PII/PCI violations and passwords disclosed through emails. Block outbound emails containing confidential information. Prevent lateral data leaks across email, messaging, and file-sharing solutions. Auto-remediate all reported false positives. Remove similar suspicious emails across user mailboxes with one click. Leverage dynamic policies to stop similar attacks in the future. -
31
AdBlocker Ultimate
AdAvoid
Take advantage of the world's finest ad-blocking technology. Block all display ads, pop-ups, video commercials, etc. Don't let anybody setlists of "acceptable ads" on your behalf. Create your own whitelist of trustworthy websites. Keep your personal data safe from online trackers and activity analyzers. Helps you stay away from all phishing websites and domains are known to distribute malware Over the years, ads evolved so did AdBlocker Ultimate. We used our advanced ad-blocking technology as a core for our brand new Windows-based software application. AdBlocker Ultimate is a free web browser extension, which blocks all annoying ads with no exceptions. Unlike its rivals, it doesn't come with a predefined whitelist. We are proud to announce that now we bring AdBlocker Ultimate technology onto your Android mobile device.Starting Price: $2.49 per 3 devices per month -
32
USBSecure Enterprise
Lugrain Software
USBSecure Enterprise is a USB port security software. It protects your corporate network from unknown USB devices. You can define allowed USB devices in whitelists on a per-user basis. Centralized management - no dedicated server required. USBSecure Enterprise supports USB devices, Bluetooth devices, FireWire and eSATA devices, SD cards, floppy and CD/DVD drives. A special OT version is also available (Operational Technology). USBSecure supports English and German languages, but is customizable to any other language.Starting Price: $ 298 for 10 PCs -
33
Get more than the best antivirus and virus remover for Android! The latest mobile antivirus software now combines ultimate protection with a phone cleaner and booster. Also, protect your privacy with a free VPN. Scan, block, and remove viruses, spyware, malware, etc. VPN secures your data, anonymizes your browsing, and unblocks geo-restricted websites. Check if your email addresses or accounts have been leaked by third parties. Helps you find, track, and recover your lost or stolen phone. Shows which apps request access to sensitive data. Camera and microphone protection prevents someone from listening and spying on you through your device's camera and microphone. The PIN protects your sensitive applications (chat, calls, Skype, etc.) Find out what other devices are connected to the same Wi-Fi. Free or premium features. The ultimate in antivirus security for Android, Avira Antivirus Security is a comprehensive security and anti-malware application.Starting Price: Free
-
34
BUFFERZONE
Bufferzone Security
BUFFERZONE provides a patented containment and disarming solution that defends endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity. By isolating potentially malicious content coming from browsers, email and removable media, BUFFERZONE defends individuals and organizations from advanced threats that evade detection. BUFFERZONE disarms content for securely transferring it from the container to the native endpoint and secure network zones, and provides critical intelligence for enterprise-wide security analytics. Easy to deploy and configure, BUFFERZONE is a lightweight solution that provides cost-effective containment for up to thousands of endpoints. -
35
TweakPass Password Manager
Tweaking Technologies
With TweakPass Password Manager, you can lock your passwords in a Vault to keep them safe from unwanted intruders. It stores all passwords in a single location, accessible only by you. Login Quickly and Effortlessly. Easy and Hassle-free. Generate unique passwords instantly.Starting Price: $2.99 per month -
36
MemOptimizer
CapturePointStone
The Problem: Almost 100% of software programs contain "memory leaks". Over time these leaks cause less and less memory to be available on your PC. Whenever a Windows based program is running, it's consuming memory resources - unfortunately many Windows programs do not "clean up" after themselves and often leave valuable memory "locked", preventing other programs from taking advantage of it and slowing your computer's performance! In addition, memory is often locked in pages so if your program needed 100 bytes of memory, it's actually locking up 2,048 bytes (a page of memory)! Until now, The only way to free up this "locked" memory was to reboot your computer. Not anymore, with MemOptimizer™! MemOptimizer frees memory from the in-memory cache that accumulates with every file or application read from hard-disk.Starting Price: $14.99 one-time payment -
37
east-tec InvisibleSecrets
East-Tec
east-tec InvisibleSecrets is a revolutionary steganography and file encryption software that allows you to not only encrypt file and folder structures that contain confidential data but it also offers you the possibility to hide files, making it completely invisible to any user. Encrypt file contents and hide files using east-tec InvisibleSecrets, a complete privacy and cryptography software solution. Other useful features (password manager, file shredder, program lock) will be described below. east-tec InvisibleSecrets is a file encryption software that helps you protect your confidential information from prying eyes or unwanted access by helping you encrypt file or folder structures on your computer. Featuring strong file encryption algorithms, it ensures you the maximum security level you need for complete privacy protection. Securely hide files and your sensitive information.Starting Price: $39.95 one-time payment -
38
Protegent Antivirus
Unistal Systems
A leading Total Security Software with advanced cloud protection technology, provides multiple effective features that not only safeguard against viruses but also from other web based threats. Proactive Data Recovery module, once installed recovers the data against any kind of logical crashes including file deletion, formatted hard drive, deleted partition etc. Data Theft Prevention module to protect your laptop from any kind of file transfer /or theft via any port without your authorization. It helps keeping your personal data safe and secure. A tracking and monitoring tool that captures all activities performed on your laptop or web. A great parenting software and beneficial for corporates to help increase employee performance efficiency. Tracks exact location of your laptop incase of loss or theft. This module also provides automatic encryption of your valuable folders and files, hence making them unreadable for others.Starting Price: $15 per year -
39
iToolab UnlockGo
iToolab
1-Click Samsung/Mi/vivo/OPPO/Motorola/Realme FRP Bypass Tool If you are stuck on the Google account verification screen after resetting your Samsung/Mi/vivo/OPPO/Motorola/Realme device or get a used phone with FRP lock, UnlockGo (Android) helps you remove FRP lock entirely in a few clicks. It supports Android 5-14. 3 minutes to regain full access to phones and tablets. No Gmail or PIN code requires to bypass the Samsung/Mi/vivo/OPPO/Motorola/Realme FRP lock. Remove the previous Google account from your device. Use Samsung/Mi/vivo/OPPO/Motorola/Realme device without limitations after unlocking FRP lock. Master Key of Android Screen Locks Remove all Android screen locks: PIN, Pattern, Password, Fingerprints, and Face Recognition. Bypass screen locks on earlier Samsung without data loss or resetting (Before S7). Suitable for all major Android brands: Samsung, HUAWEI, Xiaomi, Motorola, etc. Support 15 brands, 6000+ Android phones and tablet modelsStarting Price: $14.95 per month -
40
Guardian
Guardian
Guardian is the safest and most secure way to protect your privacy and data while using apps and browsing the web on your iOS device. Your IP address will be hidden from any websites visited as traffic is routed through our firewall servers, making it more difficult for advertisers to track you. Your password, financial information and other sensitive data will be protected anywhere you go using strong AES-256 encryption to thwart hackers. Guardian adds an extra layer of strong encryption to all outgoing network traffic and filters out known junk to improve your mobile experience. Grant permissions to specific apps on your device, knowing that any attempt to send data to unwanted trackers will be blocked. Blocks unwanted connections to location trackers, mail trackers, generic data trackers, and other online nuisancesStarting Price: $0.99 per day -
41
Weblock
Weblock
Choose from our predefined list which ad servers and content providers you want to block on your iOS device. Import rules from EasyList or hosts file on your Android device. Create your own blacklist and whitelist to block any URL, domain or IP on both platforms. To fully use Weblock, take a look into the Filters section. Add your own rules and define Blacklists, Whitelists and Redirects. All locations and resources matching Blacklist rules will be inaccessible from your device. All resources matching Whitelist rules will always be accessible (regardless of the Blacklist rules). You can also define Redirects and access domains and URLs using the proxy servers you choose. Block advertising – banners, pop-ups and video ads in most browsers and apps.Starting Price: $1.99 one-time payment -
42
AuthPass
CodeUX.design
AuthPass is an open source password manager with support for the popular and proven Keepass (kdbx 3.x AND kdbx 4.x 🎉️) format. Store your passwords, share across all your devices and easily find them whenever you need to login. 🗄 All your passwords in one place. 🧬 Generate secure random passwords for each of your accounts. 🔐 Quick Unlock secured with biometric lock. 🔍 Keep track of your accounts across the web. 🖥 App available for Mac, iPhone, iPad, Android Phones and Tablets, Linux, Windows and on the Web. 📂 Open multiple password files at the same time (e.g. one for work, one for personal - or even share your password files with coworkers) ✍ Autofill your passwords (Android 9+, Support in browser only since Android 10+) -
43
Kiosk Browser
ProCo IT
When provisioning a device using our provisioning app your device is locked down in the most secure way possible. Kiosk Browser becomes the "device owner" meaning that it is granted more permissions vs a standard Kiosk Browser installation. Set the default launcher programmatically without user intervention. Block access to the status bar (top of the screen) using official methods, rather than a workaround. Block launching of applications not in app drawer (apps launched from JavaScript unaffected). To start the provisioning process your device (the target device you want to install Kiosk Browser on) either needs to be brand new out of the box or factory reset. Prevents Kiosk Browser from being uninstalled without factory reset. Block launching of applications not in app drawer (apps launched from JavaScript unaffected) Prevents Kiosk Browser from being uninstalled without factory reset. -
44
Password Depot
AceBIT GmbH
Password Depot securely protects your passwords and documents from unauthorized access. Whether you work from home or at a large corporation access your passwords on your Windows, Android, iOS or macOS device. From now on, you will only need to remember one single password - for Password Depot. State-of-the-art security measures are in place to secure your sensitive data against external access by double encryption based on the highest security standard AES (Rijndael 256). All whilst remaining under your control as Password Depot functions as an on-premises solution. Our B2B solution "Password Depot Enterprise Server" offers straightforward implementation with no training required, as the software is self-explanatory at a cost-effective price. Collaborate securely on sensitive data across your organization and securely share passwords, documents, credit card details, and other confidential data with your team. Your IT department will cherish the Enterprise Server. -
45
Tenorshare 4uKey
Tenorshare
Find saved Wi-Fi password on iPhone/iPad from PC/Mac (iPhone 13 and iOS/iPadOS 15.3 included). Import passwords to iPhone/iPad (Win & Mac) new. Recover stored websites & app login passwords. Scan and view mail accounts, credit card information. Show Apple ID Account kept on your device. Transfer passwords to an iOS password manager app like 1Password. 4uKey Password Manager makes it easy for you to find, recover, view, export and manage all your passwords on iPhone and iPad. This tool is aimed to help those who have forgotten Wi-Fi passwords and other passwords stored on iPhones, any commercial use is not permitted. And, any credentials and individual data cannot be accessed. If you forgot your iPhone or iPad Screen time passcode, 4uKey Password Manager can quickly find the screen time passcode without restoring it from any iDevice. Save your current using and past used Apple ID, thus you can view them anytime.Starting Price: $14.95 per month -
46
AdLock
AdLock
When AdLock is on, ads are off. Enjoy fast internet and apps without pop-ups and banners. Meet AdLock — an unrivaled standalone ad blocker for Windows devices. Our adblocking software removes ads from all browsers, games, and other apps providing top-notch privacy security all along. Being lightweight, convenient, and elegant, AdLock is an absolute unit. AdLock is a complex multitool providing the best quality protection from phishing, malware intrusion, and malicious ads. Our defender module checks URLs of suspicious websites before you click them and warns you about the possibility of your device getting infected. The Web nowadays is like the streets of Brazil — everything and everyone tries to steal your valuables. AdLock is built by cybersecurity experts according to the best sensitive data protection practices. It protects your personal data from spies, crooks, and phishers.Starting Price: $1.60 per month -
47
REVE Secure
REVE Secure
Dual authentication check of login’s credibility via user’s registered credential (Password) and security token generated at authorized user end only. Passwords are incompetent in securing your logins. Adding 2nd-factor authentication will not only deliver dual authentication security but also ensure safe & secure login & protected account access. With Two Factor Authentication, secure your remote logins and access to Linux/UNIX servers from security breaches and malicious attacks. Integrate a second layer of authentication to existing Windows password-based security to ensure the all-round protection of your enterprise data. Secure & protect logins and access to each different web application and service to avoid unauthorized access and cyber-attacks. Blocks unauthorized login attempts made using passwords. Supports a multitude of platforms and devices. -
48
Maacrorit Data Wiper
Macrorit
Maacrorit Data Wiper uses a storage-overwriting process to overwrite the sectors on the device. The storage-overwriting process complies with United States government requirements for deleting sensitive user data, including US Department of Defense Directive 5220.22-M (DoD 5220.22-M). Supports all popular Windows file systems, FAT16/32, NTFS, Ext2/3/4, ReFS, Apple HFS+ and other file systems. Supports all Windows operating system including Windows 11/10/8/7/Vista/ and Windows XP (32 and 64 bit). Completely and permanently wipe sensitive data on disk drive volumes or disk partitions. Unlimited Edition fully support to directly wipe disk drive or partition including system partition or disk drive. Many program files are stored in system disk drive by default. If you want to completely wipe disk drive to prevent your data from unauthorized using, this feature is necessary.Starting Price: $29.95 per month -
49
Passit
Passit
Using a password manager makes you more safe online, and our modern security features lock down your passwords without getting in your way. Our code is open source, so anyone can learn how Passit works. This makes us more trustworthy, and we think it helps create a more secure product overall. Easily take your passwords to any online device and share them with others. Read existing passwords when offline, just in case. Import and export CSV files with passwords to get data into and out of Passit. Add other users to groups on a self-hosted instance to share passwords.Starting Price: Free -
50
Domain Whitelist
Peta Sittek
Ultimate blocker which says no to every network packet until you explicitly allow it. By default Domain Whitelist blocks everything. Everything. It's up to you to build your very customized whitelist of domains you trust. Everything else is blocked and well kept out of your browser. It's like AdBlock the other way around, completely. By blocking advertisement domains you're free of most of those pervasive ads. By blocking tracking domains you're protected from services that acquire information about your browsing behavior. By blocking unnecessary domains (requests) you save a lot of traffic and make pages load faster! Read and change all your data on the websites you visit to be able to intercept HTTP requests before they leave your browser. Completely free and with no ads.Starting Price: Free