Skip to main content

Home/ Avangate Outsourced E-Commerce Solutions/ Group items matching "sensitive" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

Staffcop Enterprise (12 months) - 4.5 | atom security - 0 views

  •  
    StaffCop Enterprise is an employee monitoring and corporate information security solution for corporations. It can work on 10 to 10 000+ workstations in a single company. StaffCop Enterprise is not just an ordinary monitoring & tracking solution, it is an all-in-one system that tracks working time, analyses data loss threats, prevent security breaches, and allows to control employees remotely. Get detailed records of your employees work time. StaffCop Enterprise records start/end time of employees business day, lunch breaks, coffee breaks, etc. This option enables you to maintain discipline among your staff at work, avoid delays during a business day, and improve efficiency of your employees. Staffcop Enterprise enables you to protect sensitive commercial information and information assets that may cause irreparable financial and reputational damages if it is leaked to third parties. StaffCop Enterprise detects and logs instances when employee visits job websites, sends out resume, prints out confidential documents, copies sensitive information and customer database on USB drive or cloud services. StaffCop Enterprise provides powerful tools for investigation of incidents - relationship communications charts, migration file tracking, search by regular expressions and keywords, diagrams and charts to identify anomalies.
1More

StaffCop Enterprise (3 months) - 4.5 - 0 views

  •  
    StaffCop Enterprise is an employee monitoring and corporate information security solution for corporations. It can work on 10 to 10 000+ workstations in a single company. StaffCop Enterprise is not just an ordinary monitoring & tracking solution, it is an all-in-one system that tracks working time, analyses data loss threats, prevent security breaches, and allows to control employees remotely. Get detailed records of your employees work time. StaffCop Enterprise records start/end time of employees business day, lunch breaks, coffee breaks, etc. This option enables you to maintain discipline among your staff at work, avoid delays during a business day, and improve efficiency of your employees. Staffcop Enterprise enables you to protect sensitive commercial information and information assets that may cause irreparable financial and reputational damages if it is leaked to third parties. StaffCop Enterprise detects and logs instances when employee visits job websites, sends out resume, prints out confidential documents, copies sensitive information and customer database on USB drive or cloud services. StaffCop Enterprise provides powerful tools for investigation of incidents - relationship communications charts, migration file tracking, search by regular expressions and keywords, diagrams and charts to identify anomalies.
1More

StaffCop Enterprise (3 months) - 4.5 | atom security - 0 views

  •  
    StaffCop Enterprise is an employee monitoring and corporate information security solution for corporations. It can work on 10 to 10 000+ workstations in a single company. StaffCop Enterprise is not just an ordinary monitoring & tracking solution, it is an all-in-one system that tracks working time, analyses data loss threats, prevent security breaches, and allows to control employees remotely. Get detailed records of your employees work time. StaffCop Enterprise records start/end time of employees business day, lunch breaks, coffee breaks, etc. This option enables you to maintain discipline among your staff at work, avoid delays during a business day, and improve efficiency of your employees. Staffcop Enterprise enables you to protect sensitive commercial information and information assets that may cause irreparable financial and reputational damages if it is leaked to third parties. StaffCop Enterprise detects and logs instances when employee visits job websites, sends out resume, prints out confidential documents, copies sensitive information and customer database on USB drive or cloud services. StaffCop Enterprise provides powerful tools for investigation of incidents - relationship communications charts, migration file tracking, search by regular expressions and keywords, diagrams and charts to identify anomalies.
1More

Digital Sentry - 0 views

  •  
    Digital Sentry monitors your system for specific events, and then can perform a vast array of unique actions in response. Use it to automate certain redundant computer tasks, perform covert surveillance, or even protect your sensitive data during unauthorized access or theft! :: For every action... :: Digital Sentry monitors your system for specific events, and then can perform a vast array of unique actions in response. Use it to automatically cleanse internet history when closing a browser, automate redundant computer tasks, perform covert surveillance, or even protect your sensitive data during unauthorized access or theft! :: Monitor numerous system events :: Watch for such system events as waking from sleep, program launches, closes, or switches, file modifications, incorrect password attempts, mouse and keyboard input, and many more. Then, perform any number of tasks like sending an e-mail, shutting down the computer, starting a simulated self-destruct, pinging a web URL, taking a web cam shot, taking a screenshot, playing a multimedia file, speaking some text, executing a shell script... the list goes on! :: Anti-theft protection :: Curious who's been using your computer while you make a quick trip out of the room? Turn on the 'incorrect password' attempt monitor, and have Digital Sentry take a picture of them with a web cam, e-mail it to you, and then sending you a notification by text message to your cell phone! Ideal for catching a thief in the event your laptop has been stolen. :: Countless uses :: Alternatively, use Digital Sentry to organize your life by performing a task such as speaking a line of text on an interval to remind you to get up from the computer and stretch, or to perform a system backup. In the case of a backup, then even get Digital Sentry to do it for you by executing a shell script.
1More

Digital Sentry | Koingo Software - 0 views

  •  
    Digital Sentry monitors your system for specific events, and then can perform a vast array of unique actions in response. Use it to automate certain redundant computer tasks, perform covert surveillance, or even protect your sensitive data during unauthorized access or theft! :: For every action... :: Digital Sentry monitors your system for specific events, and then can perform a vast array of unique actions in response. Use it to automatically cleanse internet history when closing a browser, automate redundant computer tasks, perform covert surveillance, or even protect your sensitive data during unauthorized access or theft! :: Monitor numerous system events :: Watch for such system events as waking from sleep, program launches, closes, or switches, file modifications, incorrect password attempts, mouse and keyboard input, and many more. Then, perform any number of tasks like sending an e-mail, shutting down the computer, starting a simulated self-destruct, pinging a web URL, taking a web cam shot, taking a screenshot, playing a multimedia file, speaking some text, executing a shell script... the list goes on! :: Anti-theft protection :: Curious who's been using your computer while you make a quick trip out of the room? Turn on the 'incorrect password' attempt monitor, and have Digital Sentry take a picture of them with a web cam, e-mail it to you, and then sending you a notification by text message to your cell phone! Ideal for catching a thief in the event your laptop has been stolen. :: Countless uses :: Alternatively, use Digital Sentry to organize your life by performing a task such as speaking a line of text on an interval to remind you to get up from the computer and stretch, or to perform a system backup. In the case of a backup, then even get Digital Sentry to do it for you by executing a shell script.
1More

Safetica Business - 0 views

  •  
    Safetica Business - Your staff can threaten security of sensitive corporate data. Firewalls and antivirus software do not protect you from internal threats. Protect yourselves from data leakage from corporate computers and disks. Gain control over the staff's access to sensitive data and increase their working attitude by monitoring their activity. Save access data safely and do not allow spyware to log your passwords. Administer your company's security centrally.
1More

DisposeSecure Plan - Yearly Subscription - 0 views

  •  
    Don't give away sensitive information, valuable corporate trade secrets, business plans, personal files and letters, or traces of Internet or newsgroup activity with the old computers that you or your company resells, donates, reassigns to different departments or removes from operation. Deleting all the files or even formatting the hard disk is not enough to stop people to restore information using basic recovery programs. east-tec DisposeSecure however removes all traces of data from the computer hard disk, by overwriting and destroying beyond recovery every sector and bit of information. Data is removed according to U.S. Department of Defense standards or custom user security levels. east-tec DisposeSecure can be operated either from a bootable media (floppy disk, CD, DVD) to sanitize any drive or partition from the computer, or through the network to sanitize a large number of computers, centralize sanitization logs (reports) on the server and more. The computers can be sanitized regardless of the file system or the operating system. Whether you want to prevent identity theft, protect your privacy or stop competitors from stealing your sensitive information, east-tec DisposeSecure offers the solution.
1More

DisposeSecure Plan - Yearly Subscription | East-Tec Secure Store - 0 views

  •  
    Don't give away sensitive information, valuable corporate trade secrets, business plans, personal files and letters, or traces of Internet or newsgroup activity with the old computers that you or your company resells, donates, reassigns to different departments or removes from operation. Deleting all the files or even formatting the hard disk is not enough to stop people to restore information using basic recovery programs. east-tec DisposeSecure however removes all traces of data from the computer hard disk, by overwriting and destroying beyond recovery every sector and bit of information. Data is removed according to U.S. Department of Defense standards or custom user security levels. east-tec DisposeSecure can be operated either from a bootable media (floppy disk, CD, DVD) to sanitize any drive or partition from the computer, or through the network to sanitize a large number of computers, centralize sanitization logs (reports) on the server and more. The computers can be sanitized regardless of the file system or the operating system. Whether you want to prevent identity theft, protect your privacy or stop competitors from stealing your sensitive information, east-tec DisposeSecure offers the solution.
1More

Eraser Plan - Yearly Subscription | East-Tec Secure Store - 0 views

  •  
    Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Go beyond any system optimization or cleanup tool, improve your PC performance, and keep it clean and secure! east-tec Eraser has been continuously improved since its launch in 1998, and exceeds government and industry standards for the permanent erasure of digital information. east-tec Eraser easily removes every trace of sensitive data from your PC: Internet history, Web pages, pictures, unwanted cookies, chats, conversations, deleted files, confidential documents, e-mails, USB flash drives or cards. It cleans away evidence from the latest versions of the most popular Internet browsers (Google Chrome, Microsoft Edge & Internet Explorer, Mozilla Firefox, Opera, Safari, and more) and over 350 popular programs (Microsoft Office, Dropbox, Flash Player, Skype, Adobe Photoshop, Windows Media Player, the Facebook app, and many other audio, chat, entertainment, Internet, office, productivity, and security applications). east-tec Eraser features a modern and intuitive interface with active 24/7 risk monitoring and tray notification of privacy risks, an improved task scheduler for automatic cleaning and shutdown, Anti-Boss/Panic key to protect your privacy in emergency situations, support for custom privacy needs, user-defined erasure methods, built-in safety features that prevent you from accidentally removing critical files or folders, password protection, advanced command-line support, and many more.
1More

BitRaser File Eraser - 5.0 - 0 views

  •  
    BitRaser for File permanently erases files, folders, internet history, & application traces from laptops, desktops, & servers. It performs secure file erasure as per 17 international data erasure standards such as DOD Standard 5220.22-M, NATO etc. BitRaser for File is a must-have software to ensure data privacy in both online and offline worlds. The software brings in dedicated features to erase internet activities, system traces, and application traces which contains sensitive information such as browsing history, cookies, chat messages, email data, attachments, autosave temporary files, passwords, debit/credit card details, etc. You can erase confidential files and folders from an internal or external drive such as hard drive, solid-state drive (SSD), thumb drive, SD card, etc. beyond the scope of recovery. The software is 100% safe for the system, as it does not erase operating system files. BitRaser for File uses 17 international data erasure standards such as U.S. Department of Defense (DOD 5220.22-M), NATO, etc. to sanitize multiple files, folders, and drive partitions beyond the scope of recovery. It also features two verification methods-Random Verification and Total Verification-that simultaneously check and confirm file erasure beyond recovery. Files once sanitized by using BitRaser for File cannot be recovered in usable format by using any data recovery software or services including forensic tools. For assurance, a tamper-proof certificate of erasure is generated to help attain compliance with data protection, privacy, & regulatory compliances such as GDPR, SOX, GLB, HIPAA, ISO27001, EU-GDPR, and PCI-DSS. The software also allows you to automate the file eraser process. Just pre-select the files and folders along with the data erasure algorithm and verification method. The software securely erases them automatically every time the system shutdown/restart happens or at a pre-selected time of the day, week, and month. The software free trial can
1More

BitRaser File Eraser | Stellar Data Recovery Inc - 0 views

  •  
    BitRaser for File permanently erases files, folders, internet history, & application traces from laptops, desktops, & servers. It performs secure file erasure as per 17 international data erasure standards such as DOD Standard 5220.22-M, NATO etc. BitRaser for File is a must-have software to ensure data privacy in both online and offline worlds. The software brings in dedicated features to erase internet activities, system traces, and application traces which contains sensitive information such as browsing history, cookies, chat messages, email data, attachments, autosave temporary files, passwords, debit/credit card details, etc. You can erase confidential files and folders from an internal or external drive such as hard drive, solid-state drive (SSD), thumb drive, SD card, etc. beyond the scope of recovery. The software is 100% safe for the system, as it does not erase operating system files. BitRaser for File uses 17 international data erasure standards such as U.S. Department of Defense (DOD 5220.22-M), NATO, etc. to sanitize multiple files, folders, and drive partitions beyond the scope of recovery. It also features two verification methods-Random Verification and Total Verification-that simultaneously check and confirm file erasure beyond recovery. Files once sanitized by using BitRaser for File cannot be recovered in usable format by using any data recovery software or services including forensic tools. For assurance, a tamper-proof certificate of erasure is generated to help attain compliance with data protection, privacy, & regulatory compliances such as GDPR, SOX, GLB, HIPAA, ISO27001, EU-GDPR, and PCI-DSS. The software also allows you to automate the file eraser process. Just pre-select the files and folders along with the data erasure algorithm and verification method. The software securely erases them automatically every time the system shutdown/restart happens or at a pre-selected time of the day, week, and month. The software free trial can
« First ‹ Previous 41 - 60 of 317 Next › Last »
Showing 20 items per page