Skip to main content

Home/ Avangate Outsourced E-Commerce Solutions/ Group items tagged east

Rss Feed Group items tagged

tech writer

DisposeSecure Plan - Yearly Subscription | East-Tec Secure Store - 0 views

  •  
    Don't give away sensitive information, valuable corporate trade secrets, business plans, personal files and letters, or traces of Internet or newsgroup activity with the old computers that you or your company resells, donates, reassigns to different departments or removes from operation. Deleting all the files or even formatting the hard disk is not enough to stop people to restore information using basic recovery programs. east-tec DisposeSecure however removes all traces of data from the computer hard disk, by overwriting and destroying beyond recovery every sector and bit of information. Data is removed according to U.S. Department of Defense standards or custom user security levels. east-tec DisposeSecure can be operated either from a bootable media (floppy disk, CD, DVD) to sanitize any drive or partition from the computer, or through the network to sanitize a large number of computers, centralize sanitization logs (reports) on the server and more. The computers can be sanitized regardless of the file system or the operating system. Whether you want to prevent identity theft, protect your privacy or stop competitors from stealing your sensitive information, east-tec DisposeSecure offers the solution.
tech writer

Eraser Plan - Yearly Subscription | East-Tec Secure Store - 0 views

  •  
    Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Go beyond any system optimization or cleanup tool, improve your PC performance, and keep it clean and secure! east-tec Eraser has been continuously improved since its launch in 1998, and exceeds government and industry standards for the permanent erasure of digital information. east-tec Eraser easily removes every trace of sensitive data from your PC: Internet history, Web pages, pictures, unwanted cookies, chats, conversations, deleted files, confidential documents, e-mails, USB flash drives or cards. It cleans away evidence from the latest versions of the most popular Internet browsers (Google Chrome, Microsoft Edge & Internet Explorer, Mozilla Firefox, Opera, Safari, and more) and over 350 popular programs (Microsoft Office, Dropbox, Flash Player, Skype, Adobe Photoshop, Windows Media Player, the Facebook app, and many other audio, chat, entertainment, Internet, office, productivity, and security applications). east-tec Eraser features a modern and intuitive interface with active 24/7 risk monitoring and tray notification of privacy risks, an improved task scheduler for automatic cleaning and shutdown, Anti-Boss/Panic key to protect your privacy in emergency situations, support for custom privacy needs, user-defined erasure methods, built-in safety features that prevent you from accidentally removing critical files or folders, password protection, advanced command-line support, and many more.
tech writer

East-Tec - Privacy Protection and File & Disk Encryption Software - 0 views

  •  
    East-Tec (formerly EAST Technologies) - Privacy Protection and File & Disk Encryption Software: Developers of online privacy protection and file encryption software. Solutions to securely erase files, Internet traces, and old PCs. Since 1997.
tech writer

DisposeSecure Plan - Yearly Subscription - 0 views

  •  
    Don't give away sensitive information, valuable corporate trade secrets, business plans, personal files and letters, or traces of Internet or newsgroup activity with the old computers that you or your company resells, donates, reassigns to different departments or removes from operation. Deleting all the files or even formatting the hard disk is not enough to stop people to restore information using basic recovery programs. east-tec DisposeSecure however removes all traces of data from the computer hard disk, by overwriting and destroying beyond recovery every sector and bit of information. Data is removed according to U.S. Department of Defense standards or custom user security levels. east-tec DisposeSecure can be operated either from a bootable media (floppy disk, CD, DVD) to sanitize any drive or partition from the computer, or through the network to sanitize a large number of computers, centralize sanitization logs (reports) on the server and more. The computers can be sanitized regardless of the file system or the operating system. Whether you want to prevent identity theft, protect your privacy or stop competitors from stealing your sensitive information, east-tec DisposeSecure offers the solution.
tech writer

InvisibleSecrets Plan - Yearly Subscription | East-Tec Secure Store - 0 views

  •  
    Keep those prying eyes out of your emails and prevent unwanted people from reading your private documents! east-tec InvisibleSecrets hides your private data into innocent looking files, like pictures, or web pages. It also features: strong encryption algorithms; a locker that allows you to password protect certain applications; a password management solution and a real-random password generator; a shredder that helps you destroy beyond recovery files, folders and internet traces; the ability to create self-decrypting packages; secured password transfer.
tech writer

SafeBit Plan - Yearly Subscription | East-Tec Secure Store - 0 views

  •  
    east-tec SafeBit 2 is the perfect electronic vault you need for your privacy. It features military strength on-the-fly encryption, by creating virtual disk drives, where you can hide files and folders, keep them encrypted all them time, but still work with these files just like you work with normal files. SafeBit is the last line of defense if your current security system fails against viruses, trojans or hacker attacks. Protect yourself now!
tech writer

InvisibleSecrets Plan - Yearly Subscription - 0 views

  •  
    Keep those prying eyes out of your emails and prevent unwanted people from reading your private documents! east-tec InvisibleSecrets hides your private data into innocent looking files, like pictures, or web pages. It also features: strong encryption algorithms; a locker that allows you to password protect certain applications; a password management solution and a real-random password generator; a shredder that helps you destroy beyond recovery files, folders and internet traces; the ability to create self-decrypting packages; secured password transfer.
tech writer

SafeBit Plan - Yearly Subscription - 0 views

  •  
    east-tec SafeBit 2 features military strength on-the-fly AES encryption, by creating virtual drives, where you can hide files and folders, keep them encrypted all them time, but still work with these files just like you work with normal files.
1 - 20 of 40 Next ›
Showing 20 items per page