Leak Blocker 1.1.2 Details
Leak Blocker prevents data leakage from corporate computers using removable devices. It can be used to achieve two main goals: restricting the use of external devices and activity monitoring (including file access actions). In addition Leak Blocker can allow only read operations. Key features: Blocks access to removable devices. Storage devices can also be configured either for complete blocking or for read-only access. Tracks all removable device-related activities, including file copying to or from such devices. Enforces time-restricted access: Temporarily excludes particular devices, users, or computers from blocking. Provides transparent integration. Native integration with Active Directory simplifies product deployment. Supports white lists of users, computers, and devices. Generates detailed reports with flexible filtering.
Download and use it now: Leak Blocker
The easy-to-use website uptime reporting and network monitoring software for Mac and Windows PCs. Monitor websites, web apps, web-driven databases, mail accounts, SSH accounts, FTP accounts, servers and other network equipment. STAR Device Monitor supports various protocols like HTTP/HTTPS, POP3/POP3S,...
Keylogger Blocker gives users the ability to detect and remove Keyloggers from their PC or Laptop. Trojans are a well-known threat to PC users, and most Trojans contain Keyloggers. Keyloggers are potentially dangerous programs that can be used to track...
Sorry, No screenshot available