SafeErase is specifically designed to make it quick and easy to delete private data - eliminating any chance of unauthorized access to your personal information. Whether individual files, folders, or an entire hard drive, SafeErase makes certain that confidential data is permanently deleted and unable to be recovered. Laplink SafeErase also comes with pre-defined deletion profiles, as well as the ability to let the user delete browser data and temporary internet files safely, simply, and forever.
From Laplink Software
- Product From Raytheon
DULLES, Va., (April 25, 2014) — Raytheon Company today announced the latest developments found in their new SureView release, which include new policy support features that enhance product capability for continuous monitoring and network auditing against insider threat and privileged user abuse.
- Product From Emsisoft
Salzburg, July 11th, 2013 –As of today, the fourth version of Emsisoft Emergency Kit is available. Popular amongst home users and security professionals alike, the Austrian security specialist‘s powerful software package is freely available to the general public and includes the multi-award winning scanning technology of Emsisoft Anti-Malware. The following features were improved in Emsisoft Emergency Kit 4.0:
- Product From Prolexic
HOLLYWOOD, FL – (June 4, 2013) – Prolexic, the global leader in Distributed Denial of Service (DDoS) protection services, announced today that it has released a role-based version of PLXplanner, the company’s free, online DDoS protection planning tool. PLXplanner is a strategic risk assessment and planning tool to help IT and security professionals build a better defense against increasingly powerful and sophisticated DDoS attacks. Based on answers entered in a role-based quiz, PLXplanner delivers strategic recommendations for improving business, technology or operational strategies to fight DDoS attacks.
- Product From Precise Biometrics Inc.
Precise Biometrics has launched Precise Sense combination fingerprint/smartcard readers, available in various configurations focusing on different types of requirements. The reader comes in versions including both smartcard and fingerprint reader, or fingerprint only, with either swipe or touch sensors. Because of its modular design, end-users can choose between six different variations. The unit is ideal for organizations looking to use smart cards and biometrics for logical access.
- Product From Vircom
directQuarantine is an Outlook add-on module for Vircom's modusGate email security software that provides end-user control of quarantine emails directly from Outlook.
- Product From 3M Cogent
3M Cogent’s BioTrust® biometric logon software is a fast, easy, and secure way to replace your Windows® computer logon. Your face or fingerprint replaces the traditional username and password logon. Just sit down in front of your computer or swipe your finger across the fingerprint sensor and BioTrust will do the rest. Lighting conditions, such as side lighting, backlit areas, low ambient lighting, or lighting from the LCD screen itself are not an issue with 3M Cogent’s advanced facial matching algorithm. All you need is a web camera or a fingerprint sensor.
- Product From Vasco
DIGIPASS for Mobile is VASCO's authentication solution that leverages the internet enabled mobile phone for authentication and signature purposes in m-banking, e-banking, e-commerce and enterprise security. The application supports multiple profiles (retail banking, cash management, remote access, application security, gaming). Menus, messages, logos, colors, font can be fully adapted to the service provider's branding, supporting the brand recognition for the end-user. The menus also contribute to the mobile experience offering additional services such as ATM/branch locator, information services, etc.
- Product From Absolute Software (computraceplus)
Absolute Software Corp. has added geofencing capabilities to its commercial line of Computrace products. The geofencing feature enables IT asset managers to incorporate the physical location of a device into their IT Asset Management strategy. End-users are alerted after a laptop or mobile device goes beyond a virtual perimeter, which has been defined on a Web-based map. To better protect the device and the data on it, the IT asset manager then can take the appropriate action, such as deleting data from the device and, if necessary, reporting it stolen.
- Product From Milton Security Group Inc.
FULLERTON, Calif., Feb. 6, 2014 /PRNewswire/ -- In the wake of the rampant spread of the Kaptoxa Malware, Milton Security Group is unveiling a breakthrough evolution of its Edge Security suite of products aimed at thwarting the threat known to have affected numerous retail giants such as Target Stores, Neiman Marcus, Michaels and countless other organizations.
- Product From DB Networks
SAN DIEGO – Oct. 23, 2013 -- DB Networks, an innovator of behavioral analysis in database security, today introduced the IDS-6300 intelligent security appliance, the industry’s first next-generation