Category Archives: Security & Privacy

Access Control, Anti-Spam & Anti-Spy Tools, Anti-Virus Tools, Covert Surveillance, Encryption Tools, Other, Password Managers

Dr.Web Katana 1.0.8

Product Page: https://products.drweb.com/home/katana/?lng=en

main_window_800.png

A non-signature anti-virus offering preventive protection against the latest active threats, targeted attacks, and attempts by Trojans and exploits to use vulnerabilities, including zero-day ones, to penetrate systems, that is unknown to your anti-virus. Neutralises the latest malicious programs that have been designed to bypass detection by traditional signature-based scanning and heuristic mechanisms and that are completely new and not yet known to your anti-virus. Starts protecting a system during the boot-up phase, even before the traditional, signature-based anti-virus is loaded! Neutralises the actions of active malware programs without overloading the system. Analyses the behaviour of each threat in real time by comparing it with the reputation information stored in the Dr.Web Cloud which is constantly being updated. Immediately neutralises harmful scripts and processes that your anti-virus did not manage to recognise. Monitors all system processes and blocks those that exhibit malicious behaviour. Determines whether a program is dangerous and then takes whatever measures are necessary to neutralise the threat. Does not require any configuration and starts operating effectively as soon as its installed. Protects the system even if a PC is not connected to the Internet.

BCWipe Total WipeOut 5.02.1

Product Page: https://www.jetico.com/data-wiping/wipe-hard-drives-bcwipe-total-wipeout

erase20hard20drives20wizard_0.png

Before selling, disposing or donating used computers, securely erase hard drives with BCWipe Total WipeOut. Trusted as the de-facto standard for the U.S. DoD, BCWipe Total WipeOut erases boot records, filesystem structures, operating system files and service areas like Host Protected Area (HPA) and Device Configuration Overlay (DCO). BCWipe Total WipeOut comes built with the U.S. Department of Defense (DoD 5220.22-M) and U.S. Department of Energy (DoE M 205.1-2) standards, as well as other popular wiping standards. In addition, you can also create your own customized wiping scheme. The wiping procedure can be run on any hardware platform with x386 and 64-bit AMD/Intel architecture, Itanium or 64-bit SPARC, regardless of the operating system installed on the computer.

BestCrypt Volume Encryption 5.10

Product Page: https://www.jetico.com/data-encryption/encrypt-hard-drives-bestcrypt-volume-encryption

bcve_screenshot_min.png

BestCrypt Volume for Disk Encryption protects all data on all types of volumes residing on fixed and removable disks – simple volumes, mount points, multipartition volumes (spanned, mirrored, striped, RAID-5), while also working on UEFI and GPT partitions. Jetico’s encryption software provides protection from physical threats – such as lost computers and USB sticks – to protect your privacy and comply with regulations (HIPAA, PCI). BestCrypt Volume Encryption utilizes a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes. By working with volumes, Jetico’s disk encryption is the best TrueCrypt alternative.
Disk encryption features:
– Encrypt system and boot volumes
– Support for UEFI-based computers, including secure boot
– Encrypt RAID and all types of volumes residing on fixed and removable disks
– Pre-boot authentication
– Support for Tokens for secure hardware storage of encryption keys
– Two-factor authentication with removable disk drives
– User-friendly encryption
– Option to boot encrypted volumes only from trusted network
– Support for Trusted Platform Module (TPM) for unattended reboot
– Secure hibernation
– Rescue functions to decrypt volumes in emergency case
– Central management for deployment, monitoring, encryption policy distribution and password recovery (Enterprise Edition only)