Confidential Information Stamp


Advertisement

SecExFile  v.1 2

SecExFile is a data archiving and encryption tool to help you protect the integrity of confidential information contained in files and folders on your computer.

Main features :

- Integrates seamlessly with Windows explorer
...

Handy Safe Desktop Professional  v.3.01

Handy Safe Desktop is the best way to manage your confidential information with great convenience and to have encrypted backups on your PC. Handy Safe Desktop agent enables you to synchronize the information between your mobile device and PC so you're ...





Advertisement

PrivateSky  v.1.0

The PrivateSky for Internet Explorer Connector add-in is a whole new approach to securing confidential information posted to the web, and anyone can use it. The PrivateSky for IE add-in doesn't require multiple passwords, certificates, or complicated ...

12Ghosts Shredder

Delete even if the file is locked! No trails are left of any compromising or confidential information. Nobody will ever be able to recover files from your disk! Nobody will even find out the previous name or file size. The file can be overwritten several ...

DriveScrubber

DriveScrubber permanently and securely wipes away data from drives, to prevent confidential information from falling into the wrong hands when selling or donating a computer. In addition to thoroughly erasing all drive contents, DriveScrubber can now ...

PestBlock

PestBlock lets you protect your privacy and your computer from a variety of spyware and unwanted programs, from those that expose your confidential information, to those that diminish the performance of your computer. It also detects programs that pop ...

WinZip E-Mail Companion

WinZip E-mail Companion is an easy-to-use, time saving tool that reduces the size of outgoing e-mail attachments and provides password-based AES encryption to protect confidential information contained in those attachments. WinZip E-Mail Companion works ...

PestBlock Deutsch

PestBlock powerful protection against spyware, adware and other threats that expose your confidential information and diminish the performance of your PC. Our software give you anti-spyware protection that detects and removes spyware in real time. PestBlock ...

Comodo i-Vault

Comodo i-Vault Secure Password Management Software

* Instantly login to your favorite websites and applications
* Speed up surfing - No more forgotten passwords
* Single point of storage for all your confidential information
* ...

FILExtinguisher  v.4.0

FILExtinguisher securely deletes all confidential information. You can securely erase passwords, credit card numbers, customer information, tax records and other types of sensitive data. This software offers different 14 delete methods that vary from ...

The Software Safe

The Software Safe is a secure way to protect confidential information such as pictures, documents, PIN codes etc. You can use a password, but with the personal locks, you don't need to remember difficult codes anymore! Choose your favourite colors, click ...

SecureSafe Pro  v.3

If you are having problems remembering all your access passwords and logins, would like to protect yourself against identity theft and need a reliable software solution to store files with confidential information in one place safely and securely, you ...

File Locker

The best way to protect your important health, financial, private and other confidential information from falling into destructive hands is owning a file locking software like File Locker. Selected files and folders are locked and encrypted with a password.

Genie Eyes Only

Genie Eyes-Only is a professional easy-to-use security software that safeguards valuable data and prevents unauthorized access to confidential information using multiple levels of the thoroughly-tested Advanced Encryption Standard (AES) that is used by ...

Alligator Data Guard

Alligator Data Guard is a tool for protecting your confidential information, using AES algorithm with 256-bit key and Haval 256-bit Hash Message Authentication Code (HMAC) to simultaneously verify the data integrity and the authenticity for better security.

Pages : 1 | 2 >
Newest Reviews