You are here:

WindowsManagement.com > Encryption Software
ActiveXperts Network Monitor 2015##ComSec
ActiveXperts Network Monitor 2015 proactively manages network servers, devices, databases and more.

Encryption Software

ActiveXperts Network Monitor 2015

ActiveXperts Network Monitor 2015 is a leading solution for monitoring every aspect of your LAN and WAN network. It proactively manages your network servers, network devices, web servers, databases, etc. It detects and corrects problems before network users start complaining. The product is scalable. It includes a large set of pre-defined, built-in monitoring checks;

When problems are detected, you're immediately notified by network message, e-mail, pager, or SMS message. When a failure is detected, the network monitor tool will try to recover the problem by running a system administrator defined program or by restarting a process.

The product includes build-in monitor rules for: Active Directory, ADO databases, ADSI, Disk Drives, CPU Usage, Disk Spaces, Event Log (with content checking), Exchange, File Existence (with content checking), FTP sites, HTTP(s) (with content checking), ICMP/Ping, MS SQL Databases, Novell NDS, NNTP news servers, NTDS (NT4 compatible DS), NTP time servers, ODBC Databases, Oracle Databases (SQLNet), POP3 Mail servers, Powershell, Printers, Processes, Services, SMTP Mail servers, SNMP, TCP ports (with handshaking), UDP, UNIX Shell Scripts (RSH), VBScript (custom scripts), WMI and more.

ActiveXperts Network Monitor 2015 is a complete solution. Regardless of what you want to monitor, ActiveXperts Network Monitor 2015 supports it all at a cost-effective price.

AutoKrypt for Windows

  • The encryption module is a commandline wrapper around GnuPG.
  • Tested on Windows, MacOSX, Linux (Ubuntu and Fedora)
  • Encryption methods include:
  • OpenPGP password encryption/decryption
  • public/private key encryption/decryption
  • key sign/verify
  • key encrypt and sign/decrypt and verify
  • Create profiles for each encryption method. Then use these profiles in Encryption tasks.
  • The encryption and decryption tasks can automatically encrypt/decrypt based on filename or file timestamp.
  • You can encrypt all files in an entire folder tree structure.
  • Both original and encrypted/decrypted files can be backed up to other folders.
  • Encrypted and Decrypted files can be renamed automatically using REGEX.
  • Task scheduler allows you to schedule tasks, execute tasks as well as other software programs and applications. No programming or script knowledge is required.
  • Email Notification for all tasks based on task exit code.
  • Dynamic variables are supported for most tasks. Most tasks also generate variables which can be used in other tasks.
  • Create advanced automation solutions using our tasks in conjunction with variables, directory/file monitors and our task chains.
  • You can run all tasks from the commandline using a Task Runner feature.
  • Task Runner feature allows you to run tasks from other programs.
  • Commandline module is also available to allow you to control the software via SSH from a remote system.
  • The engine that runs the tasks in the background can be run as a Windows Service or a Service on MacOSX and Linux.

Dekart Private Disk

Private Disk is hard disk encryption software with unique features, combining strong NIST-certified AES 256-bit encryption with a simple and straightforward interface.

This disk encryption program creates multiple encrypted disks for storage of confidential information. Encrypted disks behave like regular disks, your programs can use them in a usual way, there is no need to reconfigure them.

Automatic data encryption is transparent: files are encrypted on the fly when they are written to the encrypted disk, and decrypted when read from it.

Access to the encrypted disk is monitored by Disk Firewall, a unique data protection mechanism that guards your data from Trojans, viruses or other types of malware. Disk Firewall controls which applications are allowed to access the encrypted disk. If a specific application is not found in the white-list, it will be unable to read or change the confidential information stored on the encrypted disk.

Company:
Dekart

Encryption Family

Symantec’s encryption portfolio provides flexible data protection through a range of offerings including endpoint, file and folder and email encryption. Integration with Symantec Data Loss Prevention delivers added protection by automatically encrypting sensitive data being moved onto removable media devices or residing in emails and files. Robust management features include individual and group key management, automated policy controls, and out-of-the-box, compliance-based reporting.

Company:
Symantec

ObserveIT - Session Auditing

Free RDP, Citrix, VMWare & SSH Visual Recording
Like a Security Camera on Your Servers!
Record 3rd-party vendors and privileged user sessions.

Get the free award-winning server monitoring tool from ObserveIT. Record and Replay all user sessions on your network servers. Any remote access or console session is searchable and ready for playback! Protocol-agnostic: ObserveIT records Terminal Server, Citrix, Remote Desktop, VMware, Dameware, VNC and more. You'll be up and running in minutes, and will understand why the world's leading banks, manufacturers, telco and healthcare companies rely on ObserveIT to generate secure compliance audits, to monitor 3rd-party vendors and to improve system uptime.

Download Now: FREE!

Company:
ObserveIT

SafeHouse

SafeHouse provides total privacy and protection for your sensitive files and folders using passwords and strong encryption. SafeHouse features military-strength encryption which is completely transparent to the way you work and compatible with all Windows applications. This software is amazingly simple to use and works on all drives, including external USB devices, memory sticks and CD/DVDs. SafeHouse also supports saving passwords to smartcards.

SecureDoc Hard Disk Encryption

WinMagic offers software solutions for organizations who are serious about data security. WinMagic delivers robust and powerful protection for sensitive data. Supported platforms and hardware: Windows, Mac or Linux laptops and desktops, mobile devices, CDs, DVDs, USB drives and more.

SecureDoc Hard Disk Encryption increase mobile workforce by ensuring protection of sensitive information stored on desktops and laptops. This is done by employing authentication from password to hardware token, biometrics, and PKI commencing right at pre-boot.

Company:
WinMagic

Symantec Endpoint Encryption

Symantec Endpoint Encryption provides advanced encryption for desktops, laptops, mobile and removable storage devices. It offers scalable, enterprise-wide security that prevents unauthorized access by using strong access control and powerful encryption. Symantec Endpoint Encryption provides a central management console, enabling safe, central deployment and management of encryption to endpoints.

Features:

  • Pre-boot password or smartcard-based authentication ensures only authorized individuals have access to data.
  • Easy central deployment, administration, and management features.
  • Supports multiple users and administrators on individual machines.
Company:
Symantec
ActiveXperts Network Monitor 2015##ComSec