Any Windows Software - Shareware and Freeware Download Center for Windows

Top Downloads

New Downloads

Recent Searches

Latest Reviews

  • Acronis True Image for Mac   (Henry)

    Takes full backup of a Mac system which includes saved files and folder plus installed apps.

  • Lodgit Desk Hotel Software for Mac   (Arnold)

    I run a small guest house in Nepal where this software is in use for last two years, we felt this is good enough for any...

  • XolidoSign   (Zico)

    Allows me to insert signature on any document automatically before dispatching, other software requires manual instruction.

  • Wurlie   (Tenesy)

    Make unlimited number of short urls with this script without knowing much about processes that take place in background.

  • Start Hotspot   (heltvet)

    You may turn your android phone to a wifi hotspot but your data may be misused unless you have some sort of control over...

  • NCheck Bio Attendance Trial for Windows   (Jeusme)

    The system is implemented in my office premises, it maintains the employees in and out time accurately, helps the accounts...

  • FirePlotter   (Kacper)

    Monitors all in-coming and outgoing traffic to your PC, also shows the consumed bandwidth to calculate internet bill.

  • FolderMill   (Fairyn)

    FolderMill is an automation software which looks for incoming files and send them to printer by filtering as per your...

  • DocuVieware   (Sigfrid)

    Fully featured document viewer which can be added in your page to load and read almost any type files, the software can...

  • Kiosk Software   (Emmerentiana)

    Restricts access to the public computers and kiosks to prevent changes or viruses from affecting it, hence you need no...


Endpoint Encryption

From Title
Show: All Software | Free Software Only | Mobile Software Only
1.  endpoint encryption - Security/Encryption Tools
... Cryptzone endpoint encryption is a complete desktop solution which features three products in one: Secured eMail (email encryption), Secured eFile (file/folder encryption), Secured eUSB (USB flash drive encryption). They are all tightly integrated with Windows and require very little time to get used to and start working with.Secured eFile:Secured eFile is a file/folder encryption solution designed for ease-of-use, while maintaining the highest possible level of security. Secured eFile is ...
 








2.  My endpoint Protector - Security/Misc
... My endpoint Protector provides device control and data loss prevention to everyone who want to centrally manage and control the use of USB, FireWire and other ports and portable storage device use. It works for PC and Mac OS X. Free for personal use.It is a SaaS Solution, meaning the management is happening in the cloud over an internet browser.My endpoint Protector Key Benefits:1. Centrally manage your endpoint / device use from anywhere2. No server setup (hardware, licenses or maintenance)3. ...
 
3.  endpoint Protector Basic - Security/Anti-Virus Tools
... To protect your PC, we recommend to use endpoint Protector Basic to monitor and control ports and interfaces such as USB, FireWire, card reader, CD / DVD, etc on your PC. This will protect them against unwanted use of portable storage devices like USB sticks, SD cards or portable hard drives to prevent data theft or data leaks. The best companion for your application firewall, endpoint Protector Basic is designed to protect your computera€™s endpoints acting as a USB firewall. endpoint ...
 
4.  endpoint Security Console - Utilities
... Privacyware’s endpoint Security Console (ESC) provides a centralized administrative control capacity for assuring network endpoint protection on desktop and notebook computers utilizing Privacyware's popular Personal Firewall and Intrusion Protection Application, Privatefirewall. ESC enables system administrators to install, monitor, and configure Privatefirewall endpoint defense solution on any Windows workstation, laptop or host within a server domain. Settings can be customized for ...
 
5.  Symantec endpoint Protection - Security/Anti-Virus Tools
... Symantec endpoint Protection 11.0 combines Symantec AntiVirus with advanced threat prevention to deliver unmatched defense against malware for laptops, desktops and servers. It seamlessly integrates essential security technologies in a single agent and management console, increasing protection and helping lower total cost of ownership. Key Features * Seamlessly integrates essential technologies such as antivirus, antispyware, firewall, intrusion prevention, device and application control. * ...
 




6.  Forefront endpoint Protection Tools - Security/Misc
... These tools make it easier for Forefront endpoint Protection 2010 customers to use Group Policy for centralized management, provide optimized settings for various server roles, and diagnose and troubleshoot support issues.FEP Group Policy Tools (fep2010grouppolicytools-en-us.exe)The FEP Group Policy tool is used to import settings from FEP policy XML files into a Group Policy Object (GPO) in an Active Directory domain, or into the Local Group Policy object on a Windows computer. The tool can ...
 
7.  Cyberoam endpoint Data Protection Suite - Security/Misc
... Cyberoam endpoint Data Protection protects the organization's endpoints from data leakage through Identity and group-based policy controls, encryption, shadow copies, logging, reporting and archiving. Cyberoam offers data protection and asset management in four easy-to-deploy and use modules - Data Protection and encryption, Device Management, Application Control and Asset Management. These modules enable organizations to limit access only to trusted devices, applications and recipients while ...
 
8.  System Center (formerly Microsoft Forefront endpoint Protection) - Security/Anti-Virus Tools
... Microsoft Forefront endpoint Protection, the next version of Forefront Client Security, will enable businesses to simplify and improve endpoint protection while greatly reducing infrastructure costs.It builds on System Center Configuration Manager 2007, allowing customers to use their existing client management infrastructure to deploy and maintain endpoint protection. Microsoft Forefront endpoint Protection is powerful solution for securing your working environment!NOTE:- Forefront endpoint ...
 
9.  KR-encryption - Security/Encryption Tools
... KR_Encryiption will help you quickly and easily encrypt and protect your important files. KR-File encryption uses the very powerfull "Blowfish" cryptographic algorithm, designed in 1993 by Bruce Schneier. Please make sure that you don't forget the password you selected during the encryption process. If you forget the password, you will not be able to decrypt your files and you will lose your data, permanently. ...
 
10.  Challenger encryption - Utilities/Security & Encryption
... Challenger is a encryption software for files and folders. Simple user rights for the installation and for the execution suffice. Through this the program is also flexibly usable on a USB flash drive (also U3). With Bart's PE-Builder Challenger can be integrated into a bootable CD. With that you can realize a mobile high security application. A synchronous stream cipher, a development from Germany, delivers a fast encryption. ...
 

Endpoint Encryption

From Short Description
1.  Dekart Private Disk Multifactor - Utilities
... Private Disk Multifactor is a disk encryption program that secures confidential data on laptops, USB disks and other endpoint devices. It combines the industry standard NIST-certified AES 256-bit encryption, an innovative Disk Firewall mechanism, 64-bit platform compatibility, USB disk portability and smart card authentication into a low-cost and easy-to-deploy solution. It provides proactive protection against viruses, Trojans, adware, spyware and unauthorized network access. Sensitive data are ...
 
2.  Clear Blue Security - Security/Misc
... Clear Blue Security is a free full-featured endpoint security management suite that monitors, detects and reports endpoint security vulnerabilities, including the monitoring of installed malware applications, providing status on updates and patching, implementing a company wide security policy, monitoring installed but unapproved software, alerting suspicious and possibly malicious traffic and scanning network facing IPs for unwanted open ports. ...
 
3.  Lark File encryption - Security/Encryption Tools
... Lark File encryption is a powerful file encryption tools, five encryption algorithms ( AES, MD5, DES,SHA,ECC), encryption speed is fast, No file format and size limits,easy to use.Once your data has been protected. There is no way of restoring the data without the correct password. ...
 
4.  encryption Toolkit 2003 Trial Edition - Security/Encryption Tools
... The encryption Toolkit includes all the tools you need to add file encryption and data encryption to your software applications. The toolkit includes COM encryption objects with a standard interface for both the Pocket PC and Windows® desktop platforms. This enables you to use the same source code on both platforms to encrypt files and encrypt data to be transmitted between Pocket PC devices, between desktop computers or servers, or between a Pocket PC and a desktop computer or server. This ...
 
5.  Chilkat Python encryption Library - Programming
... The Chilkat Python encryption library provides an advanced API for symmetric encryption, public-key encryption, digital signatures, hashing, and encoding/decoding. The Chilkat components and libraries have an established user base of approximately 10,000 customers. Chilkat's licensing provides for free new-version upgrades, 1 year unlimited email and phone support, and royalty-free redistribution. ...
 




6.  Chilkat Perl encryption Library - Programming
... The Chilkat Perl encryption library provides an advanced API for symmetric encryption, public-key encryption, digital signatures, hashing, and encoding/decoding. The Chilkat components and libraries have an established user base of approximately 10,000 customers. Chilkat's licensing provides for free new-version upgrades, 1 year unlimited email and phone support, and royalty-free redistribution. ...
 
7.  Chilkat Ruby encryption Library - Programming
... The Chilkat Ruby encryption library provides an advanced API for symmetric encryption, public-key encryption, digital signatures, hashing, and encoding/decoding. The Chilkat components and libraries have an established user base of approximately 10,000 customers. Chilkat's licensing provides for free new-version upgrades, 1 year unlimited email and phone support, and royalty-free redistribution. ...
 
8.  Chilkat Java encryption Library - Programming
... The Chilkat Java encryption library provides an advanced API for symmetric encryption, public-key encryption, digital signatures, hashing, and encoding/decoding. The Chilkat components and libraries have an established user base of approximately 10,000 customers. Chilkat's licensing provides for free new-version upgrades, 1 year unlimited email and phone support, and royalty-free redistribution. ...
 
9.  JvCrypt - Home & Personal/Misc
... JvCrypt is a powerful encryption and compression utility that allows you to create encrypted files and text messages with up to 448-bit encryption using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt you can select a single file or multiple files to be compressed and encrypted all in one step. You have the option of creating a single encrypted zip file for each file selected or combining ...
 
10.  P-encryption Suite - Utilities
... P-encryption Suite is a powerful encryption program for the windows operating system used to store your private documents into a single encrypted file. There are two different encrypted archives P-encryption Suite can create, Stealth and Normal. Stealth archives are PES archives disguised as a different file, such as an image or audio file. You can also take your encrypted data with you anywhere you go by using CD/DVD encryption. ...
 

Endpoint Encryption

From Long Description
1.  EasyLock - Security/Encryption Tools
... EasyLock is an enterprise grade portable data encryption solution for every computer user, from novice to expert, helping anyone turn any mobile storage device into a portable data safe. EasyLock protects your data: simple, fast, convenient and very secure. The crypto engine provides military and government- approved 256bit AES CBC-mode encryption. The intuitive interface lets you drag & drop files and folders to your portable device and encrypts them on the fly. Additional security is provided ...
 
2.  Vaultize - Mobile/Business
... - Secure anywhere/anytime file access and sharing: View, Edit and Share files - no setup required! - Recent files: Quickly view and edit the files you worked on recently (on any of your devices) - Browse: Browse through all your files organised neatly into devices, folders and even versions! - Search: Search through your files and folders (including the shared ones) - Edit: Edit any document from any of your devices or any document shared with you - Content Management and Control: Control ...
 
3.  Jbi4CICS - Utilities/Mac Utilities
... jbi4cics is a binding component compliant with the JBI specification that allows to call CICS services. No code is required to publish a CICS service as internal JBI endpoint. Having an internal JBI endpoint is straightforward creating its WebService. ...
 
4.  Comm Tunnel - Programming/Debuggers/Decompilers/Dissasemblers
... Comm Tunnel is a free tool to connect two endpoints. It builds a tunnel between two endpoints. The endpoints can be any of serial port, TCP/IP server, TCP/IP client or UDP. The data received on one endpoint will be forward to anther endpoint. It displays data in text, hex and decimal format. ...
 
5.  Flexcrypt email encryption - Utilities/Security & Encryption
... GENERALFlexcrypt is a small software application that enables encryption and decryption of your emails. The reason for encrypting is to ensure the integrity and privacy of your email. Flexcrypt is very easy to install and use. After installation, simply add the email addresses you wish to send and receive encrypted emails with.For each address, you must make up a password. This password is the key used in order to decrypt the message, thus, you must inform the receiver of the encrypted email of ...
 
6.  ShareThere - Mobile/Utilities
... With ShareThere, you can upload images and photos from your phone to your own server or webspace. You only have to specify the URL of your upload endpoint to get started. Choose. Choose an image from your Camera Roll. Upload. Wait while the app uploads the file to your endpoint. Share. Share the URL of the uploaded image via Twitter, Facebook or mail. Do you want to use it somewhere else? Use the 'Clipboard' button to copy the URL to your clipboard! ...
 
7.  Armor System5 - Security/Encryption Tools
... Armor System5 is a professional, easy-to-use encryption program for everyone who is serious about data security. The program includes three modules: File encryption Module, Text encryption Module (with built-in word processor), and Email encryption Module. Each module takes a full advantage of the 40 industry-standard encryption algorithms and eliminates the need of user management of encryption keys. ...
 
8.  Code Master 2 - Utilities/Other Utilities
... Code Master 2 is back and ready for some quick and heavy encryption for windows! Algos:AES256;des;Rijndael;dictionary and many more <br>Encrypt Files With Popular Algorithms<br>Encrypt Messages With Popular Algorithms<br>AES encryption<br>DES encryption<br>Rijndael encryption<br>Triple DES encryption<br>RC2 encryption<br>Blowfish encryption<br>T ...
 
9.  GiliSoft Full Disk encryption - Security/Encryption Tools
... The value of Full Disk encryption (FDE) technology grows with every report of a lost or stolen laptop or sensitive data record. The cost of exposing sensitive business or personal data is devastating. With so many incidents of data loss in recent years, both federal and state governments have taken action to hold companies accountable for protecting the sensitive information they handle. Laws that require disclosure of data breaches and assign liability in some cases reflect widespread concern ...
 
10.  Metadefender Cloud Client - Security/Anti-Virus Tools
... Metadefender Cloud Client is the most thorough free malware analysis tool available. A lightweight tool, it scans endpoints for viruses, keyloggers, and other malware. Metadefender Cloud Client performs a deep endpoint forensic analysis for malware using several unique methods: memory module multi-scanning with 40+ anti-malware engines, local anti-malware log file analysis, and IP reputation analysis to identify potential threats. Look for threats and assess the security state of an endpoint if ...
 

Endpoint Encryption

Related Searches:

a - b - c - d - e - f - g - h - i - j - k - l - m - n - o - p - q - r - s - t - u - v - w - x - y - z - #
© 1997-2018 ShareMe Last Update: Thursday, November 15, 2018 shareme | contact | notice | privacy | bookmark | link to us

Welcome to the ShareMe. Shareme is a dedicated internet portal bringing users the latest shareware & freeware from the world's best Software Authors. Shareme allows Shareware & Freeware Authors to submit their latest wares, so you the user are able to download their latest software updates all the time, after they are released! Always visit Shareme for your software needs.