Leak Blocker
Leak Blocker prevents data leakage from corporate computers using removable devices. It can be used to achieve two main goals: restricting the use of external devices and activity monitoring (including file access actions).
LidLocker
Lock your laptop automatically when you close the lid in Windows 10. Return this feature to Windows 10, every time you close your laptop lid it will lock your work station so it requires you to input your password to open up your workstation.
RDS Knight Ultimate Protection
RDS-Knight is the right shield for your windows servers. In minutes you will prevent foreigners from opening a session, block brute force and ransomware attacks, restrict access by device and by time, and lock down your users environment.
Smart Privacy Cleaner
Smart Privacy Cleaner removes the history of all recent web activity including visited websites, tracking cookies, downloaded files or photos and chat conversations. Important documents or other items can also be shredded making them unrecoverable.
Time Lock
Time Lock is a simple program, which allows to protect your computer against unwanted use. When the computer is locked by the Time Lock software, nobody can access documents on your computer, run programs, browse on the internet, etc.
USB Safe Guard
The *USB Safe Guard* product s regular USB to secure USB. This secure USB can have an expiration date and expiration count policy. Administrators can remotely control the use of secure USB. You can also receive USB usage logs by email.
VPNKS VPN Killswitch
VPNKS is a free standalone Killswitch for Windows that automatically stops all traffic and data from leaking out and exposing your internet activity when your VPN connection drops. No sneaky trial periods, no limits!
WinLock Professional
WinLock Professional is a powerful security solution that lets you restrict access to various computer resources.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .