Alternatives to Tape Encryption

Compare Tape Encryption alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Tape Encryption in 2026. Compare features, ratings, user reviews, pricing, and more from Tape Encryption competitors and alternatives in order to make an informed decision for your business.

  • 1
    IBM Z Multi-Factor Authentication
    Mainframe systems are the foundation of trusted digital experiences for most of the world’s largest companies and organizations. However, passwords protecting critical users, data, and applications are a relatively simple point of attack for hackers to exploit because the passwords rely on user education and compliance for both implementation and control. By using a variety of methods, such as social engineering and phishing, criminals have exploited employees, partners, and general users to hack into even the most secure platforms. IBM Z MFA raises the level of assurance of your mission-critical systems with expanded authentication capabilities and options for a comprehensive, user-centered strategy that helps mitigate the risk of compromised passwords and system hacks. Our designers are also IBM Z MFA users. Across every new version, we incorporate their growing knowledge and expertise in real-world mainframe security scenarios.
  • 2
    IBM Storage Archive
    IBM Storage Archive software in the IBM Storage portfolio provides a graphical interface to manage data in tape drives and libraries using the Linear Tape File System (LTFS) format standard for reading, writing and exchanging descriptive metadata on formatted tape cartridges. IBM Storage Archive gives you direct, intuitive and graphical access to data stored on tape while eliminating the need for additional tape management and software to access data. Storage Archive offers three software solutions for managing your digital files with the LTFS format: Single Drive Edition, Library Edition and Enterprise Edition.
  • 3
    Stellar Data Recovery for Tape

    Stellar Data Recovery for Tape

    Stellar Data Recovery Inc.

    Stellar Data Recovery for Tape recovers the data stored in the tape, creates a separate single file called Image, and saves it to your system. After an image is created, the software loads the image, scans it, and displays the scanned data in the tabular format. From the table, you can preview the data and save it to your system. 1(Creates an Image Dump for Data Recovery 2(Support for BKF, TAR, CPIO & TSM Archive Images 3(Recover all Files Formats from Tape Drives 4(Recover Data from all Makes & Models 5(Compatible with LTO 1, LTO 2, LTO 3, LTO 4, and above. 6(Displays Archived Data in Tabular Form 7(Save Tape Image and Recover Data Later 8(Straightforward and Intuitive Software 9(Select the Block Size to Restore Tape Data 10(Save Tape Data at the desired location 11(Supports LTO1, LTO2, LTO3, LTO4 and above Minimum System Requirements: •Processor: Intel-compatible (x86, x64) •OS: Windows 11, 10, 8.1, 8, 7 •Memory: 8 GB (recommended) 4 GB (Min) •Hard Disk: 250M
  • 4
    Trusted Access Manager for Z
    Reduce the risk of insider threats, from malicious attacks to inadvertent threats. Trusted Access Manager for Z helps deliver trusted systems and improve business efficiency through comprehensive privileged access management for your mainframe. By eliminating the need for shared credentials, working with existing tools, and producing forensics on all privileged user activity, you stay in complete control over vital mainframe data. Restrict users who have access to a privileged state and timebox the elevation duration to reduce the risk of insider threats. Simplify auditing by eliminating privileged credential sharing and maintaining a complete line of sight into individual privileged user activities. Maintain complete control of when users have access to the most sensitive data in the business, to deliver trusted systems and operate efficiently. Transform your company and build your career with Broadcom training, certifications, and resources.
  • 5
    StrongLink

    StrongLink

    StrongBox

    StrongLink is the only solution that combines cross-platform data management with policy-based storage resource management tools. Advanced metadata-driven technologies enable intelligent data management across flash, disk, cloud, and tape storage at any scale. StrongLink LTFS is a powerful next generation feature to provide seamless automated support for tape libraries from any vendor. This optional StrongLink capability is designed to make tape transparent to users and administrators, and acts as a seamless extension to tape for existing flash/disk storage platforms, opening it into a multi-protocol policy-based Global Namespace. The new StrongLink LTFS feature takes tape to the next level, with metadata-driven intelligence that enables policy-based workflows that integrate directly into the rest of your storage infrastructure. Perfect for growing environments, StrongLink with LTFS support can expand as needed to extreme scales, while providing simplicity and automation.
  • 6
    Encrypted Data Gateway Engine
    Authora's Encrypted Data Gateway Engine "EDGE" is a command line designed for organizations that must securely exchange large volumes of information. EDGE protects business-critical data easily and with little impact on existing systems. EDGE can also be used to protect large volumes of information stored on servers and backup media from unauthorized access. From tape backup processes to batch FTP transfers and data distribution to partners, EDGE provides robust encryption capabilities for automated data processing applications. Adding EDGE's cryptographic functions to business applications and processes allows organizations to address risk mitigation and compliance standards. Authora's Encrypted Data Gateway Engine, "EDGE", is an OpenPGP compliant command-line application. Edge elegentlyr integrates cryptogrphic functions into your existing business prosseses. Edge is platform independent and runs on Windows and on a variety of UNIX systems.
  • 7
    DAW Cassette
    DAW Cassette brings back the magic era of the 1980:s by emulating the sound of a tape deck. Saturation, distortion, noise, wobble, it's all there. While there's no real rational logic to it, the sound color gives us chills down the spines, (or it might be the mullet haircut that tickles). Fresh. Choose your preferred level of cassetteness with the different controls for input/output gain, tape/motor/head quality and tape/noise type. Now, look in the mirror and get stunned by your new mullet haircut. Choose between three different tape types (Normal, Chrome, Metal). Additional input gain, output gain and dry/wet mix parameters. Different types of cassette tape, as well as Noise reduction emulation. Choose between three different tape types (Normal, Chrome, Metal). Control the noise level with noise reduction emulation (including a noise-free option). Tape-, head- and motor quality knobs for dialling in the perfect sound. Additional input gain, output gain and dry/wet mix parameters.
    Starting Price: $39.99 one-time payment
  • 8
    StorCentric Data Mobility Suite
    StorCentric Data Mobility Suite (DMS), an all-inclusive software solution, empowers organizations to seamlessly move data where it needs to be. DMS is a cloud-enabled solution that supports data migration, data replication, and data synchronization across mixed environments including disk, tape, and cloud to maximize ROI by eliminating data silos. DMS supports vendor-agnostic file replications and synchronization and is easily deployed and managed on a non-proprietary server. DMS can transfer millions of files simultaneously and protects data in transit to and from the cloud with SSL encryption. DMS streamlines point-to-point data movement and tackles data flow requirements from any storage platform to another. Fine-grained filtering and continuous incremental updates alleviate the challenges of moving and consolidating data across heterogeneous environments. DMS enables files to be synchronized across multiple storage repositories, including disk and tape.
  • 9
    StarWind VTL
    StarWind VTL helps businesses move beyond their costly physical tape backup processes without sacrificing regulatory data archival and retention requirements thanks to on-premises Virtual Tape Libraries with cloud and object storage tiering. Protect your backups from ransomware by keeping them “air-gapped” on virtual tapes. Replicate and tier your backups to any public cloud and use any industry-standard object storage for flexible scalability, as well as maximized security and cost-efficiency. We're happy to offer you a consumption-based licensing model for StarWind VTL. No more limitations on installations or number of backup servers. You simply pay for the amount of data managed by VTL instances running in your infrastructure. We automatically add discounts for big data sets: the bigger the archive, the better the cost per terabyte. We're rolling out the subscription model one region at a time, your sales representative can tell you more about the availability in your region.
  • 10
    SDS E-Business Server

    SDS E-Business Server

    Software Diversified Services

    SDS is now distributing, supporting, and actively developing new features for the proven E-Business Server, the authentic OpenPGP encryption tool originally developed by cryptography pioneer Phil Zimmerman. Using OpenPGP encryption technology and versatile APIs, SDS E-Business Server offers strong encryption that integrates with the widest range of applications and platforms, including the mainframe. E-Business Server is designed for companies that require the highest levels of protection for data stored internally, transmitted within the organization, and distributed beyond its firewalls. Today’s data security mandates are complex but critical. Gain compliance with GDPR and other required standards with unbreakable signature creation and reliable authentication. E-Business Server dramatically reduces file sizes, bandwidth consumption, processing time, and disk space to keep resources under control.
  • 11
    TPX Session Management for z/OS
    Support the unique organizational specifications and session manager requirements within an enterprise. TPX Session Management for z/OS solves the problem of repeatedly logging in and out of your various applications connected to a VTAM network by enabling you to securely access and navigate between all the applications from a single menu. Securely grants authenticated access to dynamically built application menus. Supports multiple departmentalized requirements through customization of different users. Delivers enhanced performance and usability through data compression, simplified administration, and a single point of control, enabling commands and responses to be passed between instances. Transform your company and build your career with Broadcom training, certifications, and resources. Your hub for creating seamless integrations that tap into the full capabilities of mainframe services.
  • 12
    Protectstar Camera Guard
    Put an end to spying and unsightly taping. Not only millions of users but also the founder of Facebook, Mark Zuckerberg, and former FBI chief James Comey are taping over the webcam of their devices. Everything and everyone is being spied on. We have known this since June 2013, when the first NSA documents by whistleblower Edward Snowden were published. But not only hackers found ways to misuse the webcam without a warning signal to the user: Also, the latest malware is highly dangerous because it specifically targets control of the integrated device camera. Then, with just one click, protection is enabled, and Camera Guard blocks and monitors processes that try to access your device's camera. Any security breach is reported. You can easily choose which apps on your device can access your camera or webcam. With Deep Detective, we have created an intelligent and versatile detective that monitors all accesses of the macOS device.
    Starting Price: $8.90 per year
  • 13
    Tape

    Tape

    Tape Technologies

    Tape is a mobile workspace in the cloud. From task management, HR processes, sales pipeline or inventory lists all sorts of use cases can be implemented using customizable apps. Users can change fields and create new use cases and apps anytime. Furthermore, Tape is a collaboration tool that combines the simplicity of information management with real-time collaboration and file sharing. Users can quickly share files, see everyone's tasks at all times, and stay up to date on connections between people or projects easily. Everyone within the team has access to the same files and workflows at all times. Confidential things remain confidential - Tape creates transparency only where applicable. Access to files, workflows and project statuses - always and everywhere using the iOS and Android mobile apps.
    Starting Price: $9/user/month
  • 14
    SampleTron

    SampleTron

    Ik Multimedia

    SampleTron 2 combines the powerful sound engine of IK’s award-winning SampleTank 4 with our industry-leading tape modeling technology to recreate the distinctive, ultra-vibey sounds of tape-based samplers from the ‘60s and ‘70s, along with quirky early digital sample players and vocoders. This comprehensive collection features deep sampling of vintage Mellotron® and Chamberlin tapes, a collection of new acoustic “non-Tron” sounds with tape processing, and now enables you to load your own samples and create modern audiophile Tron sounds that are uniquely yours. 8GB virtual instrument collection of sought-after vintage and tape-based samplers. Over 400 tracks sampled from vintage Mellotrons, Chamberlins, Optigans and other rare pieces. Each preset can load three tracks to split, layer and solo from over 400 available. Features a collection of modern non-Tron and vintage digital sample-based instruments.
    Starting Price: $249.99 one-time payment
  • 15
    IBM ProtecTIER
    ProtecTIER® is a disk-based data storage system. It uses data deduplication technology to store data to disk arrays. With Feature Code 9022, the ProtecTIER Virtual Tape Library (VTL) service emulates traditional automated tape libraries. With Feature Code 9024, a stand-alone TS7650G can be configured as FSI. Several software applications run on various TS7650G components and configurations. The ProtecTIER Manager workstation is a customer-supplied workstation that runs the ProtecTIER Manager software. The ProtecTIER Manager software provides the management GUI interface to the TS7650G. The ProtecTIER VTL service emulates traditional tape libraries. By emulating tape libraries, ProtecTIER VTL provides the capability to transition to disk backup without having to replace your entire backup environment. Your existing backup application can access virtual robots to move virtual cartridges between virtual slots and drives.
  • 16
    Atempo

    Atempo

    Atempo

    What if there was a solution that protected all your data – systems, applications and files in one complete solution? Back up to disk, tape, and deduplicated storage all working together from one central interface. Save time, save money and take back control. Speed is of the essence when data has been attacked or a machine breaks down. Businesses can’t wait days to return to full production capacity. Choosing the right disaster recovery solution is the key to success. Atempo knows exactly where the data is located whether on disk, deduplicated storage or tape so you don’t need to search through data sets or backup jobs. Simply use the search feature and let user interfaces present you with the choice. Disk, VTL, optical disk, tape, or any combination of these, can be based on one or more storage technology. Because backup must respect both budget and performance, Atempo offers a broad storage compatibility list with deep integration guaranteeing optimal performance.
  • 17
    Precisely Ironstream
    Integrate mainframe and IBM i systems into leading IT analytics and operations platforms for an enterprise-wide view to support your digital business. In today’s digital, always-on world, IT is arguably the most important department across your organization. A single security breach or service outage can bring your business to a standstill. But knowing what’s happening across an increasingly complex landscape of infrastructure and apps, and resolving issues before they impact the business, is a daunting task. The good news is that there are several platforms to help you monitor IT security and operations across the enterprise in real-time, and take action fast. The challenge, however, is that mainframe or IBM i systems aren’t natively supported by these modern tools. So, if you rely on these critical servers to run your business and you’re managing them in isolation, you have a dangerous blind spot.
  • 18
    IBM Storage Protect Plus
    IBM Storage Protect Plus is IBM Storage software that provides recovery, replication, retention and reuse for VMs, databases, applications, file systems, SaaS workloads and containers. Data can be copied to cloud-based object storage and on-premises storage including IBM Storage Protect and physical tape. IBM Storage Protect Plus can be easily deployed as a virtual appliance or as a container application and the agentless architecture is easy to maintain. This modern data resilience solution unlocks the value of your data by improving the quality and speed of development, testing and analytics. Cost-effective data retention, data compliance and disaster recovery are achieved via data copy to both on-premises, cloud-based object storage and IBM Storage Protect, including support for physical tape.
    Starting Price: $60 per 10 managed VMs
  • 19
    DataCore Swarm

    DataCore Swarm

    DataCore Software

    Are you struggling with protecting and providing access to rapidly scaling data sets or enabling distributed content-based use cases? Using tape is cost-effective but data is not instantly accessible; and tape is difficult to manage. The public cloud often presents the challenge of compounding, unpredictable recurring costs, and the inability to meet local performance and privacy requirements. DataCore Swarm provides an on-premises object storage solution that radically simplifies the ability to manage, store, and protect data while allowing S3/HTTP access to any application, device, or end-user. Swarm transforms your data archive into a flexible and immediately accessible content library that enables remote workflows, on-demand access, and massive scalability.
  • 20
    TekTape

    TekTape

    KaplanSoft

    TekTape is an audio recorder and call detail records (CDR) generator for Windows server editions (2003-2019 Server). Simple, easy to use HTTP interface. Real time monitoring of SIP calls. Recording of audio streams of SIP calls. Recorded calls are saved in 16 bits, 8 Khz mono format wave files. Support for TZSP (TaZmen Sniffer Protocol). CDR generation for monitored calls. TekTape also creates CDR for failed calls. Real time listening of audio for a selected SIP call and call termination. TLS decoding with SRTP decryption for SIP calls. TekTape can record audio conversations between Lync endpoints if Lync server certificate with its private key is installed on to TekTape installed system. Supported codes are G.711 A-mu Law, G.722, G.729 and GSM. Multi-site recording support.
    Starting Price: $1100 one-time payment
  • 21
    BMC AMI Security

    BMC AMI Security

    BMC Software

    Suspicious and known malicious actions are automatically halted before your systems are compromised. Real-time visibility for security responders and your operations team to rapidly close the window of opportunity for attackers. Data is correlated across multiple systems and translated into common security terms for clarity and context. Out-of-the-box scorecards help improve adherence to HIPAA, PCI DSS, and GDPR. Automated security scans tailored by security experts uncover and halt threats before a compromise occurs. Reports crafted by experts help you address risks by informing you of threat events, suspicious activity and regulatory compliance risks. Policy scanning based on real-world penetration tests uncovers configuration vulnerabilities before they are exploited.
  • 22
    IBM Resource Access Control Facility (RACF)
    IBM RACF for z/OS enables the protection of your mainframe resources by making access control decisions through resource managers. Granting access to only authorized users keeps your data safe and secure. RACF authenticates users with a password, password phrase, digital certificate, Kerberos ticket, or a PassTicket. Protect your mainframe resources with tools that manage and control access to valuable z/OS data. RACF retains information about your users, resources, and access authorities in its database. This database determines access to protected mainframe system resources based on your security policy. RACF has logging and reporting functions that identify users who attempt to access the resource, either successfully or unsuccessfully. Detection of security exposures or threats is made possible by this feature. Through the RRSF, you have the capability to run most RACF commands on a node and a user ID different from the one you are logged on to.
  • 23
    GreenTape

    GreenTape

    GreenTape

    GreenTape is an AI-driven document automation platform that uses intelligent AI Agents to read, analyze, and extract structured data from complex documents such as PDFs and spreadsheets, automatically organizing and integrating results into Excel, ERP systems, or other business workflows so teams can eliminate repetitive manual tasks and focus on higher-value work. Its AI Agents are trained to handle diverse file types and formats, accurately interpret tables and unstructured content, verify and clean data, and seamlessly deliver the output into user-preferred destinations, helping reduce human error and accelerate data processing across reporting, accounting, procurement, compliance, and operations. GreenTape emphasizes privacy and control in document handling while offering fast implementation and ease of use that doesn’t require coding or specialized IT resources, enabling teams to instantly start automating document-based work and improve productivity.
  • 24
    Rocket Enterprise Storage
    Rocket Enterprise Storage is a suite of mainframe storage and resilience solutions that keep critical IBM z/OS data available, compliant, and recoverable—while lowering I/O and infrastructure cost and supporting hybrid‑cloud modernization. The portfolio spans catalog integrity, backup & surgical recovery, DFSMShsm health, tape migration/virtualization workflows, and batch I/O optimization, so you can prevent outages, accelerate recovery, and simplify audit reporting across complex storage estates.
  • 25
    iland Secure Cloud Object Storage
    iland has redefined what customers can expect from object storage. Managed through the Secure Cloud Console, iland Secure Cloud Object Storage provides a cost-effective solution for the long-term storage and protection of older backups, “cold” application data, or tape replacement. iland Secure Cloud Object Storage offers industry-specific security and compliance, all-inclusive, pay for what you consume pricing, and our recognized iland experts and customer support every step along the way. In addition, iland Object Storage is fully-integrated into your other iland services, such as disaster recovery and backup, giving you the ability to manage all your services from a single, unified platform. With immediate search and restore functionality – remove the need for legacy tape based solutions.
  • 26
    CyberArk Privileged Access Manager
    Keep your business safe by preventing the malicious use of privileged accounts and credentials – a common path to an organization’s most valuable assets. The CyberArk PAM as a Service solution leverages leading automation technologies to protect your business as it grows. Attackers never stop seeking ways in. Manage privileged access to minimize risk. Prevent credential exposure and keep critical assets from falling into the wrong hands. Maintain compliance with recorded key events and tamper-resistant audits. Privileged Access Manager easily integrates with a host of applications, platforms and automation tools.
  • 27
    ACF2

    ACF2

    Broadcom

    Reliable, scalable security and streamlined administration for your mainframe. The success of businesses today depends on a reliable, comprehensive, and efficient security infrastructure. Businesses need access to their mainframe databases but without the stress of security concerns. And consumers only trust businesses that protect their personal information. ACF2 provides comprehensive security for your valuable information assets, enabling your business to fully realize the mainframe's reliability, scalability, and cost-effectiveness. ACF2 Supports multi-factor advanced authentication with ACF2 for z/OS and, with ACF2 for Db2 for z/OS, provides the ability to externalize security for IBM Db2 without the need for an exit. Out-of-the-box identity and access management, logging, and audit reporting. Provides complete cybersecurity for your valuable information assets, enabling your business to fully realize the mainframe's reliability, scalability, and cost-effectiveness.
  • 28
    CA Mainframe Security Insights Platform
    Security Insights Platform helps ensure a trusted environment for your customers and employees by easily identifying and reducing risk from threats. It can quickly interpret and assess the security posture of your Mainframe. And, for risky findings, it helps develop remediation steps –all on an ongoing and ad hoc basis. Security Insights offers a foundation that enables your Mainframe to connect with your network and hybrid cloud across your enterprise. It enables you to securely deliver vital support for digital transformation. And, CA Security Insights output integrates with additional in-house tools such as SOC and SIEMs to provide a single, enterprise-wide view of your security posture. Collect, aggregate, and analyze security data to help remediate mainframe security risk. Eliminate manual, resource intensive, and time consuming data collection. Automate the heavy lifting.
  • 29
    Top Secret

    Top Secret

    Broadcom

    The success of today’s business strategies depends on a reliable, comprehensive, and cost-effective security infrastructure. Businesses need access to their mainframe databases but without the stress of security concerns. Consumers will only trust businesses that protect their personal information. Top Secret provides comprehensive security for your valuable information assets, enabling your business to fully realize the mainframe's reliability, scalability, and efficiency. Get out-of-the-box identity and access management, logging, and audit reporting. Get comprehensive cybersecurity for your valuable information assets, enabling your business to fully realize the mainframe's reliability, scalability, and cost-effectiveness. Get a flexible configuration mechanism that monitors and adjusts your security policies and accommodates virtually all organizational structures.
  • 30
    LUNA

    LUNA

    Universal Audio

    Designed for seamless integration with Apollo audio interfaces, LUNA is our free Mac‑based recording application that lets you do music recording, audio editing, composition, sound design, and more, all in real time, and with big analog studio sound. Far beyond plug‑ins, LUNA extensions are built into the fabric of LUNA's mixer, giving you authentic analog sounds without having to manage multiple plug‑in windows. Create with precisely emulated analog summing from legendary Neve and API consoles. These optional LUNA Extensions will transform a clean, sterile mix to sound as if it was mixed on a classic analog desk. Get the punch and rich textures of magnetic tape on any audio or instrument track, as well as your master fader and buses, with optional Studer A800 and Ampex ATR-102 LUNA Extensions. You can also sculpt warm analog tape tones with the included Oxide Tape Machine Extension.
  • 31
    SDS IronSphere

    SDS IronSphere

    Software Diversified Services

    This continuous monitoring solution can further strengthen even the most secure mainframe. SDS IronSphere for z/OS also provides assistance, while complying with, standards that U.S. agencies are required to follow. Automatic z/OS STIG compliance monitoring is a major highlight, but IronSphere offers many more security compliance features for the mainframe. This tool was created by mainframe penetration testers and compliance-minded, security experts. Due to their experience in the field, IronSphere for z/OS follows the guidelines that play integral roles in the framework of security compliance mandates and are required to be followed within certain sectors. This solution automatically and continuously identifies system risks and then delivers easy-to-follow remediation steps as part of the assessment results. In addition, results are kept within the tool, proving to compliance auditors that you’ve been continuously monitoring your z/OS system and adhering to ISCM and RMF protocols.
  • 32
    Rocket z/Assure VAP

    Rocket z/Assure VAP

    Rocket Software

    Rocket z/Assure Vulnerability Analysis Program (VAP) is a specialized mainframe security solution that scans and analyzes vulnerabilities in IBM z/OS operating system code to help organizations identify, assess, track, and mitigate security risks that could expose critical data. Unlike traditional vulnerability tools that focus on application layers, z/Assure VAP conducts thorough and precise binary code scanning at the OS level to detect zero-day and integrity-based vulnerabilities without relying on signature files, using an Interactive Application Security Testing (IAST)-style approach to pinpoint real weaknesses and guide developers to the exact code requiring remediation. It generates detailed vulnerability disclosure reports that provide actionable insights and clear paths to fix issues, enabling teams to prioritize risk, strengthen defenses, and make mainframe vulnerability management a repeatable part of IT security and compliance programs.
  • 33
    IBM Guardium Data Protection
    IBM Guardium Data Protection supports a zero trust approach to security. It discovers and classifies sensitive data from across the enterprise, providing real-time data activity monitoring and advanced user behavior analytics to help discover unusual activity around sensitive data. Guardium Data Protection is built on a scalable architecture, which provides full visibility into structured, semi-structured and unstructured data activity across all major data repositories—stored on-premises, in private and public cloud and in containers. Using a single interface, you can set access policies, monitor user access to protected data and discover, investigate and remediate vulnerabilities and threats as they occur in real time across your data environment.
  • 34
    BMC Compuware Application Audit
    BMC Compuware Application Audit enables security and compliance teams to easily capture start-to-finish mainframe user behavior in real time, including all successful logins, session keyboard commands and menu selections, and specific data viewed without making any changes to mainframe applications. Application Audit enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates. Get deep insight into user behavior including data viewed, by whom, and which applications were used to access it. Deliver the granular intelligence and reporting needed to comply with regulations such as HIPAA, GDPR, the Australian NDB scheme, as well as company security policies. Separate the system administrator’s duties from the responsibilities of auditors with a web UI, so that no single person is in a position to engage in malicious activities without detection.
  • 35
    CA Auditor for z/OS
    With each new generation of computers, operating systems become more complex. These complexities have made auditing the operating systems more time consuming and difficult. Any operating system, even the mainframe, can be subject to security exposures due to errors in installation, customizations, and/or product bugs and maintenance. CA Auditor is a comprehensive software package that can perform an automated technical review of the system, hardware and software environment and identify integrity exposures. Identifies potential areas of security risk and exposure from improperly configured implementations. Capability to perform a high-level look at the operating system and components. Provides the capability to monitor usage and ensure the integrity of your system files. CA Auditor addresses a significant exposure point in the z/OS operating system by empowering you to perform comprehensive auditing, integrity checks, and verifications.
  • 36
    IBM X-Force
    X-Force can help you build and manage an integrated security program to protect your organization from global threats. With a deep understanding of how threat actors think, strategize, and strike, our team knows how to prevent, detect, respond to, and recover from incidents so that you can focus on business priorities. X-Force offensive and defensive services are underpinned by threat research, intelligence, and remediation services. The team is comprised of hackers, responders, researchers, and analysts, many of whom are world-renowned security thought leaders. Because X-Force operates in 170 countries, the team is by your side whenever and wherever you need them. X-Force can bring peace of mind to your security team because we are in the trenches preventing, responding to, and containing breaches when they happen, so you can withstand cyberattacks and continue business operations.
  • 37
    AudioThing

    AudioThing

    AudioThing

    AudioThing is an audio software company focused on audio plugins (VST2, VST3, AU, AAX). We are committed to developing professional yet affordable products for every kind of composer, producer and sound designer. We offer a wide range of audio plugins, including vintage tape and valve emulations, analog tape echos, analog drum machine emulations, complex convolution processing effects, and more. Our copy protection is simple and user-friendly, no iLok, no dongles, no internet required. To activate a plugin you can choose between online and offline authorization. Create an account, log in through the plugin to activate, or download your license file for offline activation. Motor is a plugin effect that uses side-chaining to combine signals in new and interesting ways. Put in any two signals and they will dance around each other like courting birds drunk on fermented cherries.
    Starting Price: $35 one-time payment
  • 38
    Tectia

    Tectia

    SSH Communications Security

    We are a cybersecurity company dedicated to safeguarding mission-critical data in transit, in use, and at rest for leading organizations around the world. Assess your SSH key estate and related SSH key risks with our self-service tool SSHerlock. SSHerlock is an SSH key and post-quantum resilience discovery and audit self-service tool and can be used free of charge. Passwordless authentication, operational technology (OT) security, defensive cybersecurity, and more. What are the top trends that will shape cybersecurity in the upcoming year? PrivX is perfect for securing, managing and tracking superuser and power user access in the hybrid cloud - by also eliminating risky privileged passwords from critical infrastructures. UKM Zero Trust manages and automates the lifecycle of millions of encryption keys for risk mitigation and audit success - also by making access keyless. Software-based NQX features matchless performance and security.
  • 39
    SDS VitalSigns

    SDS VitalSigns

    Software Diversified Services

    Every product in the VitalSigns family is a money saver. Each VitalSigns product provides a quick install, an economical alternative to costly legacy products, minimal demand on the mainframe, and 24/7 access to our world-class support team. VitalSigns is a full-spectrum tool set for… Event Log Management and Compliance – VitalSigns SIEM Agent for z/OS FTP Monitoring – VitalSigns for FTP Complete FTP Security – The VFTP/SSH Collaboration IP Monitoring – VitalSigns for IP Network Automation – VitalSigns for Network Automation and Control SNA and IP Monitoring – VitalSigns for VTAM
  • 40
    Index Engines

    Index Engines

    Index Engines

    Paying to maintain legacy backup catalogs is expensive. Getting data off legacy tape has been a long, complex process. Ignoring backup data archives can be a governance nightmare. Index Engines empowers organizations to make smarter decisions regarding legacy backup data through patented direct indexing technology that does not require the original backup software. This non-invasive scan of backup images on tape or disk allows intelligence to be obtained about the contents: files types, dates, users, and more. Extraction allows the selection and specific content to be gathered for ad hoc requests or a complete compliance-driven migration. Index Engines clients range from small data environments that manage terabytes of content to global firms that support complex data environments measured in petabytes. Deployments include everything from data minimization, legacy backup catalog and data consolidation, to ransomware recovery and governance readiness.
  • 41
    PoINT Archival Gateway

    PoINT Archival Gateway

    PoINT Software & Systems

    In today's world, data is being generated faster and faster, and in increasingly larger volumes – especially in fields like research, media or diagnostics. The PoINT Archival Gateway, a software product that securely stores large volumes of data on tape storage systems at high transfer rates and in compliance with regulations, solves the resulting problem of storing and archiving all of this data. The PoINT Archival Gateway is a software-based, high-performance object storage system and supports tape libraries. This combination makes it possible to store and archive hundreds of petabytes of data. The decisive factor that makes this possible is the way the PoINT Archival Gateway quickly receives data and securely writes it to storage media in a format that means this data can also be quickly read again afterwards. The PoINT Archival Gateway high level of scalability means it can handle transfer rates of over 1 PB per day.
  • 42
    CA Cleanup

    CA Cleanup

    Broadcom

    Easily automate continuous and unattended security file cleanup. CA Cleanup is designed to help you comply with many regulations and laws requiring due diligence for information security, protection and privacy. Mainframe security databases accumulate obsolete user IDs and entitlement definitions which may be valid but not appropriate for an individual’s role. This creates uncertainty, risk and greater potential for security exposure. It also creates an unnecessary burden for administrators and the system. More so, increasing regulatory, statutory, audit and staffing pressures are bringing new concerns and mandates to address the problem of excessive security entitlements. This is why CA Cleanup is needed. Executes continuously, monitoring your security system activity to record the actual security definitions that the system is or is not using. Monitors security activity and can identify used and unused access for any user or application.
  • 43
    AWS Storage Gateway
    AWS Storage Gateway is a hybrid cloud storage service that gives you on-premises access to virtually unlimited cloud storage. Customers use Storage Gateway to simplify storage management and reduce costs for key hybrid cloud storage use cases. These include moving tape backups to the cloud, reducing on-premises storage with cloud-backed file shares, providing low latency access to data in AWS for on-premises applications, as well as various migration, archiving, processing, and disaster recovery use cases. To support these use cases, the service provides three different types of gateways – Tape Gateway, File Gateway, and Volume Gateway – that seamlessly connect on-premises applications to cloud storage, caching data locally for low-latency access. Your applications connect to the service through a virtual machine or hardware gateway appliance using standard storage protocols, such as NFS, SMB, and iSCSI.
  • 44
    Skyward Municipality Management Suite
    Perfect for any municipality with a "new business office" mindset, where efficiency and culture win out over bottlenecks and red tape. With Skyward's Municipality Management Suite, you will have the tools in place to build a high-performing culture your whole team can rally around. Features include data-rich position management, payroll, and built-in ACA compliance tools. With Skyward's Municipality Management Suite, you can implement stronger financial controls to mitigate fraud opportunities. Features include accounts payable and receivable, budget forecasting, and a real-time general ledger.
  • 45
    RBackup

    RBackup

    Remote Backup Systems

    RBackup GSuite is an onsite backup solution for securely backing up users data from Google Workspace. RBackup GSuite is a standalone desktop application designed to backup Gmail, Google Drive data, contacts, and calendar data from the Google workspace to an onsite location in an encrypted format. Gmail, contacts, calendar, and Google Drive data are critical for any business, and it is required to protect them from accidental deletion, user errors, ransomware, and data corruption. RBackup GSuite is a one-stop solution to mitigate both internal and external threat. In case if any threat or accidental deletion, you can restore the onsite users data (Gmail / Google Drive / Contacts / Calendar) to Google Workspace or to local machine. RBackup Remote Backup Software works like regular data backup software, but with one important difference. Instead of sending backups to a tape drive or other media attached to the computer it is backing up, RBackup online backup software sends the backup.
    Starting Price: $898.00/one-time
  • 46
    IBM Unified Key Orchestrator
    Unified Key Orchestrator for IBM z/OS, formerly IBM Enterprise Key Management Foundation-Web Edition, is a key management software that centrally orchestrates and secures the lifecycle of encryption keys across your enterprise for both on-premises and multiple cloud environments, including IBM Cloud, AWS KMS, Azure Key Vault, and Google Cloud. Unified Key Orchestrator for z/OS (UKO for z/OS) can help your enterprise manage and move key management workloads across and between your on-premises and cloud environments, assisting with compliance and security. With UKO for z/OS, you can manage your encryption keys across your enterprise from a single, trusted user interface. Deployed as a z/OS software, UKO for z/OS enables you to orchestrate keys across all your IBM z/OS systems and multiple public clouds. It even extends support to key management for zKey on Linux® on IBM Z and IBM Security Guardium key lifecycle manager.
  • 47
    AudioLava

    AudioLava

    Acon Digital

    AudioLava is the ideal audio cleaning software for restoring and recording high-quality audio from LP or tape to CD. The new version now runs on both Macintosh and Windows PCs and comes with a modern dark theme that appears crystal sharp on retina-style displays. The user-friendly interface helps to find the best way to bring old recordings back to life and guides the user through all the steps from recording, file import and track splitting to restoration and CD burning. You can remove noise such as tape hiss, hum or clicks and crackle on LP records as well as improve clipped audio. The algorithms are based on our award-winning audio restoration technology but offers a simplified user interface that makes the restoration process easier. Recordings are automatically split into separate tracks, which can also be edited manually. The large set of integrated tools range from dynamic processing and equalization to highly realistic reverb.
    Starting Price: $30.50 one-time payment
  • 48
    Skyward School Business Suite
    Perfect for any school or district with a "new business office" mindset, where efficiency and culture win out over bottlenecks and red tape. With Skyward's Business Suite, you will have the tools in place to build a high-performing culture your whole team can rally around. Features include data-rich position management, payroll, and built-in ACA compliance tools. With Skyward's Business Suite, you can take the guesswork out of budgeting and implement stronger financial controls to mitigate fraud opportunities. Features include accounts payable and receivable, budget forecasting, and a real-time general ledger.
  • 49
    UKM Universal SSH Key Manager

    UKM Universal SSH Key Manager

    Software Diversified Services

    UKM discovers, remediates, and manages SSH user keys without interrupting business systems or impeding workflow. UKM finds and tracks existing keys, verifies trusted connections, renews authorizations, and removes inactive keys as needed. No changes to processes, no guessing about compliance. And it cuts costs along the way. UKM is the solution for any size business that is concerned about managing and safeguarding the secure shell environment. UKM automatically traces SSH key usage and updates authorizations while detecting and removing potentially dangerous, unused keys. All without disrupting operations. Eliminate all the overhead costs related to SSH keys by centralizing oversight and automating administration. Savings can reach millions of dollars per year. While SSH is the gold standard for securing data transfers, improperly managed SSH keys represent a significant security risk. UKM solves this issue and assures compliance.
  • 50
    Platypus ISP Billing
    Platypus has been providing billing software to the Internet Service Provider market since 1996. Platypus is a service of Tucows Inc., an ICANN accredited, publicly-traded internet company serving thousands of businesses and millions of internet users worldwide since 1994. Platypus Printing Service is an inexpensive solution. The average price for a standard customer statement is 83 cents for mailing within the continental United States and that includes printing, folding, stuffing, envelope, return envelope, perforated tear-offs and even the stamp. Platypus Printing Service can be initiated immediately by pressing the "Send to Platypus" button right inside the Platypus Billing System statement screen. No exporting of files, FTP'ing data or mailing tapes. Your encrypted data is automatically sent directly to our printing office where our staff handles the rest.