0 Reviews - Trustscore 0
Filter by:
December 18, 2023
0
You may want to download some other project
Monitor and block the use of USB devices and other peripherals in your organization to protect corporate sensitive data against theft. BLOCK USB: You can restrict or permit device access to computers within your network by type device, device brand, and device serial number. DLP REPORTS: Investigate USB device usage, USB file transfer activity, and other file operations using AccessPatrol's report generator. DEVICES YOU CAN CONTROL WITH ACCESSPATROL: *Storage Devices* USB DVD /CD Floppy Disks Tape External Hard drives Firewire - Full / Read only / No access SD Cards & MM Cards *Wireless Devices* Bluetooth Infrared WiFi *Communication Ports* Serial Parallel *Imaging Devices* Scanners Cameras, Webcams & Others *Others* Printers USB Ethernet Adapter Sound Cards
This project was last updated September 29, 2022 byCloodo
Aperture is a Java framework for extracting and querying full-text content and metadata from various information systems (file systems, web sites, mail boxes, ...) and the file formats (documents, images, ...) occurring in these systems.
This project was last updated September 22, 2022 byCloodo
Data Rover is the solution for managing and securing user-generated data on any File System. We help you uncover the junk and examine valuable, and probably delicate, data information on your “Planet”, or in the Cloud! With this knowledge and our expertise you have the power to decide and do. Let us help you by discovering and taking full control over what you have... or, didn’t know you had! Let us also help you identify hidden threats within your organisation and then define preventive measures against further vulnerability. Let us show you on how to keep an eye on user behavioural patterns. Data Rover™ bridges the gap between user data and content management, data security and infrastructure. One really powerful dynamic solution for your business.
This project was last updated September 29, 2022 byCloodo
Prevent attacks by locking down all authorized actions and prevent leaked or stolen data from being read. Invisibly, automatically, without fail. SDS helps you focus your endpoint security efforts on what you can positively control instead of chasing the latest malware variant or trying to train your users to be security experts. Shinobi Defense System is a unique integrated portfolio of proven technologies now available for the first time in the USA. SDS invisibly protects against the top 3 hardest and most prevalent endpoint security problems driving business losses. We combine DeepWhite, the strongest whitelist-based protection technology, and Evolution DLP, a seamless and automatic data loss protection solution, into one integrated system that is powered by our patented Active Intercept engine and Shinobi Forensics logging and reporting platform. Invisibly prevents any leaked or stolen files from being read. Zero end user rules or interaction needed.
This project was last updated September 29, 2022 byCloodo
Cloodo helps to accellerate Digital Transformation for any business with Know-How Agencies supported by Smart Project Management Apps and Secured Payment for Final Result
Cloodo is a trademark of Cloodo Inc, an Atlas company with registered address at Suite 206, 651 N Broad St , MiddleTown, NewsCattle, Delaware, US
Cloodo Inc. Copyright ©2011-2021 All Rights Reserved.