Suggested Categories:

USB Security Software
USB security software is a type of application designed to protect against malicious USB attacks. It can help keep your data safe by monitoring your USB ports for any unauthorized activity and preventing the transfer of any potentially dangerous files from unsecured flash drives. This software comes with various levels of protection, such as encryption, anti-malware scans, and real-time alerts. In addition, it can also provide you with an audit trail that tracks all activities associated with your USB ports. Lastly, these applications are simple to install and use yet can be highly effective in keeping your data secure against malicious attacks.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.

10 Products for "bootable usb" with 2 filters applied:

  • 1
    Endpoint Protector
    Endpoint Protector is an advanced, all-in-one Data Loss Prevention solution for Windows, macOS and Linux, that puts an end to data leaks and data theft and offers seamless control of portable storage devices. Endpoint Protector’s filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or data protection regulations such as GDPR, PCI DSS, CCPA, HIPAA, etc. Endpoint Protector features several specialized...
  • 2
    ThreatLocker

    ThreatLocker

    ThreatLocker

    The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run on their networks. We envision a future in which all organizations can chart their own course free from the influence of cybercriminals and the damage their incursions cause, and our team of veteran cybersecurity professionals created ThreatLocker to make this vision a reality. The team at...
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 3
    Passware Kit
    ...The software recognizes 340+ file types and works in batch mode recovering passwords. Analyzes live memory images and hibernation files and extracts encryption keys for hard disks and passwords for Windows & Mac accounts. Passware Bootable Memory Imager acquires memory of Windows, Linux, and Mac computers. Resolved navigation issues after stopping the password recovery process. Instant decryption of the latest VeraCrypt versions via memory analysis. Accelerated password recovery with multiple computers, NVIDIA and AMD GPUs, and Rainbow Tables. In addition to all the key features of a Windows version, Passware Kit Forensic for Mac provides access to APFS disks from Mac computers with Apple T2 chip.
    Starting Price: $1,195 one-time payment
  • 4
    ESET Smart Security Premium
    Built without compromise for users who want it all, including extra theft protection and easy password management. Secures Windows, Mac, Android and Linux devices. Stay protected even in case of data theft or laptop and USB key loss. Remember only one password while having them all safely under control. Protect your Windows, Mac and Android devices with a single license for the ultimate in security and convenience. Protect your digital identity with our powerful antivirus technology. Keep your confidential data safe from ransomware and phishing. Encrypt your files and removable media. ...
    Starting Price: $59.99 per device per year
  • 5
    AhnLab V3 Endpoint Security
    ...Reap the benefits of this powerful product to take your business to a new level of threat protection.​​ Allows device control when integrated with AhnLab’s central management solution. Provides wide-ranging control over removable media, such as USB devices, Bluetooth, and CD/DVD.
  • 6
    Keyote

    Keyote

    TeskaLabs

    ...Keyote is built by cyber security veterans, following standard authorized cryptography to give you the strongest possible protection. Everyone has a smartphone today, you don't need to have any additional hardware such as a USB token or smart card to be more secure. Software keys are easy to be copied and hence lost. Keyote stores keys in the phone security chip, effectively preventing their extraction. You must authorize the use of keys with biometry such as a fingerprint, Face ID, etc. So even if the phone is lost or stolen, your keys are still safe. Passwords are dead. ...
  • 7
    Netwrix Endpoint Protector
    ...It offers cross-platform capabilities, supporting Windows, macOS, and Linux operating systems, ensuring comprehensive security across diverse IT environments. The solution provides customizable device control to manage USB and peripheral ports, preventing unauthorized data transfers and mitigating risks associated with data leaks. Additionally, it includes content inspection features that enforce sophisticated policies based on sensitive data categories, keywords, and file types, effectively preventing unauthorized data transfers. Netwrix Endpoint Protector also assists organizations in achieving regulatory compliance with standards such as GDPR, HIPAA, and PCI DSS by securing personally identifiable information, protected health information, and payment card information.
  • 8
    Ivanti Endpoint Security for Endpoint Manager
    ...It combines passive visibility, discovering and inventorying every IP-enabled device and installed software in real time, including rogue devices, with active control features such as application whitelisting, device control (USB/media lockdown and detailed copy logs) and antivirus orchestration (Ivanti AV or third-party engines) to detect and prevent threats before they spread. Automated patch management covers Windows, macOS, Linux, and third-party applications across on-site, remote, and offline devices, ensuring systems stay up to date without impacting users. ...
  • 9
    X-Ways Forensics
    ...Compared to its competitors, X-Ways Forensics is more efficient to use after a while, by far not as resource-hungry, often runs much faster, finds deleted files and search hits that the competitors will miss, offers many features that the others lack, as a German product is potentially more trustworthy, comes at a fraction of the cost, does not have any ridiculous hardware requirements, does not depend on setting up a complex database, etc.! X-Ways Forensics is fully portable and runs off a USB stick on any given Windows system without installation if you want. Downloads and installs within seconds (just a few MB in size, not GB). X-Ways Forensics is based on the WinHex hex and disk editor and part of an efficient workflow model.
    Starting Price: $18,589
  • 10
    MetaDefender Kiosk
    ...Enables users to transfer large files automatically, implement data-at-rest encryption, provide role-based access, and ensure regulatory compliance and audit trails. Provides a second layer of defense against threats by blocking access to USB drives and other media devices until security conditions are met.
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB