Alternatives to iSecurity Safe-Update

Compare iSecurity Safe-Update alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to iSecurity Safe-Update in 2026. Compare features, ratings, user reviews, pricing, and more from iSecurity Safe-Update competitors and alternatives in order to make an informed decision for your business.

  • 1
    ArcTitan

    ArcTitan

    TitanHQ

    ArcTitan is an email archiving and email data protection (EDP) solution allowing users to securely archive emails and simply retrieve them. ArcTitan is compliant, fast, secure, and M365 friendly. You can Save up to 75% of email storage space and costs with lightning fast search and retrieval. Significantly enhances Microsoft 365 email Search and Storage functionality with cost and time savings. With ArcTitan, our Cloud-Based Archiving Solution, users can fully offload their email storage requirements to the cloud. Email Archiving provides businesses with unlimited archiving of both inbound and outbound mail, as well as attachments, folders, calendar entries and contacts. The main features of our business email archiving solution include lightning fast search and retrieval, ultimate scalability, and full compliance with GDPR, eDiscovery, Sarbanes–Oxley, HIPAA, and other legislation for e-discovery, retention and audit. Book a demo today.
  • 2
    iSecurity AP-Journal

    iSecurity AP-Journal

    Raz-Lee Security

    iSecurity AP-Journal protects business-critical information from insider threats and from external security breaches, and notifies managers of any changes to information assets and streamlines IBM i journaling procedures. iSecurity AP-Journal logs the who, what, when and which of activities. It logs database access (READ operations) directly into the journal receivers, which is not provided by IBM i journaling and is an important component of compliance. Monitors changes to objects, application files and members. Supports periodic file structure changes to application files. Enables monitoring application files across changes to file structures. Programmable field-specific exit routines. Real-time alerts indicating changes in business-critical data; these application alerts are activated by user-defined thresholds. Comprehensive reports displaying all application changes on a single timeline in various formats.
  • 3
    USB Blocker Professional
    USB Blocker Professional is a security software that prevents data theft, data loss and malware infections by blocking all untrusted USB devices. All unauthorized USB drives, external drives, network drives, non-system drives, CDs, DVDs, CDs, Blu-ray discs and memory sticks will be blocked unless you authorize them. The program maintains a list of authorized USB devices that are permitted to access your PC. You can authorize several USB devices at once. By default, USB Blocker Professional does not allow access to any unauthorized USB device unless you authorize it and must be an administrator. USB Blocker Professional maintains a record of Authorized USB devices, invalid login attempt, device log, invalid password change, invalid device authorization and invalid apply changes to keep you informed of any suspicious activity while using the program. You can easily view reports anytime you have access to the program. You can export your report as a PDF, Text or CSV file.
  • 4
    iTransact
    You can now add multiple users to your gateway and can create custom roles in order to comply with Sarbanes–Oxley regulations. The virtual terminal has been re-written to better support partial approvals and allows you to navigate away from it without losing state. A reactive design framework has been used so that the control panel is useful on any device, be it a computer, tablet, or phone. Our virtual terminal allows you to run multiple transaction types using a single intuitive interface. Partial approvals are clearly handled, and an USB swiper can be used in a retail situation. Setup recurring recipes based on monthly, weekly, or daily schedules. Your customers can update their billing information directly using a link included in their recurring receipts. Upload batch files containing transaction information. We will process these transactions in the background and will notify you when they are all done.
  • 5
    iSecurity SIEM / DAM Support
    iSecurity helps companies protect valuable information assets against insider threats, unauthorized external access and malicious, or inadvertent, changes to field-level data in business-critical applications by sending real-time alerts to specific recipients. Real-time Syslog alerts sent from all iSecurity modules are fully integrated with leading SIEM/DAM products such as IBM’s Tivoli, McAfee, RSA enVision, Q1Labs, GFI Solutions and have been tested with products such as ArcSight, HPOpenView, CA UniCenter and others. iSecurity supports Imperva SecureSphere DAM. Integration with SIEM products for forensic analysis of security-related events is an increasingly important requirement at companies worldwide; indeed, Raz-Lee’s iSecurity suite has supported Syslog-to-SIEM for numerous years. Proven integration with all SIEM products. Field-mode support for the 2 major standards – LEEF (IBM QRadar) and CEF (ArcSight). These standards are supported in many other SIEM products as well.
  • 6
    Comensure GRC

    Comensure GRC

    Comensure

    In today’s dynamic business landscape, replete with internal and external risks, risk mitigation is a key element in driving success. Threats like complex regulation, cyber-attacks and new competitors put today’s enterprises at risk. Regardless of size or industry, Comensure GRC delivers risk management to protect processes, programs, business units and the enterprise as a whole. Beyond helping organizations tackle specific regulations and reporting demands required by legislation such as Sarbanes-Oxley (SOX), Comensure’s intuitive GRC platform can be used across departments and in nearly any industry to help organizations ensure enterprise risk management with pre-built and custom frameworks. Commensurate GRC’s ease of adoption, rapid implementation, clear and intuitive reporting, and a systematic approach make managing risk across the organization simple. Unrivaled compliance platform, unparalleled ease of use.
  • 7
    AppDetectivePRO
    A database and big data scanner that identifies configuration mistakes, identification and access control issues, missing patches, and any toxic combination of settings that could lead to bad outcomes like data loss and DDoS attacks. Databases are critical repositories of customer information and intellectual property, making them enticing targets for cybercriminals. Trustwave AppDetectivePRO allows your business to discover, assess and report in minutes on the security, risk or compliance posture of any database or big data store within your environment – on premises or in the cloud. AppDetectivePRO is a database and big data scanner that identifies configuration mistakes, identification and access control issues, missing patches, and any toxic combination of settings that could lead to escalation of privilege attacks, data leakage, denial-of-service (DoS), or the unauthorized modification of data held within data stores.
  • 8
    NetSfere

    NetSfere

    Infinite Convergence

    NetSfere is the leading enterprise mobile messaging service that provides all preferred means of communication - text, video, and voice - all in one encrypted platform. NetSfere provides industry-leading security and message delivery capabilities, including global cloud-based service availability, device-to-device encryption, location-based features and administrative controls. NetSfere is also compliant with regulatory requirements, including the Health Insurance Portability and Accountability Act (HIPAA), General Data Protection Regulation (GDPR), Sarbanes-Oxley and others. Designed to meet the industry-specific challenges your organization is up against, NetSfere's next-generation approach allows employees to safely communicate business information in real-time via a user-friendly Web interface or mobile messaging app.
    Starting Price: $7 per user per month
  • 9
    Nikto

    Nikto

    CIRT.net

    Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version-specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated. Nikto is not designed as a stealthy tool. It will test a web server in the quickest time possible and is obvious in log files or to an IPS/IDS. However, there is support for LibWhisker's anti-IDS methods in case you want to give it a try (or test your IDS system). Not every check is a security problem, though most are.
  • 10
    iSecurity Field Encryption
    iSecurity Field Encryption protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting compliance with PCI-DSS, GDPR, HIPAA, SOX, other government regulations and state privacy laws. Ransomware attacks any file it can access including connected devices, mapped network drivers, shared local networks, and cloud storage services that are mapped to the infected computer. Ransomware doesn’t discriminate. It encrypts every data file that it has access to, including the IFS files. Anti-Ransomware quickly detects high volume cyber threats deployed from an external source, isolates the threat, and prevents it from damaging valuable data that is stored on the IBM i while preserving performance.
  • 11
    IBM Guardium Vulnerability Assessment
    IBM Guardium Vulnerability Assessment scans data infrastructures (databases, data warehouses and big data environments) to detect vulnerabilities and suggest remedial actions. The solution identifies exposures such as missing patches, weak passwords, unauthorized changes and misconfigured privileges. Full reports are provided as well as suggestions to address all vulnerabilities. Guardium Vulnerability Assessment detects behavioral vulnerabilities such as account sharing, excessive administrative logins and unusual after-hours activity. It identifies threats and security gaps in databases that could be exploited by hackers. Discover and classify sensitive data in heterogeneous environments. View detailed reporting on entitlements and risky configurations. Automate compliance audits and exception management.
  • 12
    Trellix Database Security
    Trellix Database Security finds and protects sensitive information in databases from accidental leakage and intentional exposure while maintaining security, optimizing performance, and managing access. Discover sensitive and proprietary information in databases across the environment. Improve regulatory compliance by blocking unauthorized access to sensitive data. Address vulnerabilities quickly, with little to no downtime. Monitor, log, and control database access, in addition to identifying and blocking potential threats before they can damage the environment. Perform automated scans to find supported databases and the sensitive data they contain. Identify and prioritize known vulnerabilities, and receive detailed remediation advice. Protect databases from known and unknown vulnerabilities without downtime. Stop intrusions and other exploits before they impact your environment.
  • 13
    Optial EHS SmartStart
    Implemented by Fortune 500 organizations in over 50 countries, Optial SmartStart provides advanced IT solutions for Environmental, Health & Safety, Audit, Governance, Risk and Compliance. Equipped with features that include Audit Trail, Environmental, FDA, HIPAA, ISO, OSHA, and Sarbanes-Oxley compliance, the platform also provides a number key solutions. The seamless data import from existing third-party systems allows onboarding business to integrate current configurations easily with the Optial SmartStart solution.
    Starting Price: $15000.00/year
  • 14
    IBM Db2 Analytics Accelerator
    IBM Db2® Analytics Accelerator is a high-performance component tightly integrated with Db2 for z/OS®. It delivers high-speed processing for complex Db2 queries to support business-critical reporting and analytic workloads. The accelerator transforms the mainframe into a hybrid transaction and analytic processing (HTAP) environment. It drives out cost and complexity and enables analytics on transactional data as it is generated. Use your business-critical data where it originates to integrate real-time insight with real-time operational decisions. Quickly gain insight from your enterprise data to support time-sensitive decisions. Use analytics and business insight to quickly identify risk, improve customer experience, better anticipate the impact of global events on your business, and more. Simplify your infrastructure, reduce data movement off-platform and free up computer resources.
  • 15
    Oracle Advanced Security
    Encrypt application tablespaces to prevent out-of-band access to sensitive data using Oracle Advanced Security. Redaction policies prevent the proliferation of sensitive data and aid in compliance with data protection regulations. Transparent Data Encryption (TDE) stops would-be attackers from bypassing the database and reading sensitive information directly from storage by enforcing data-at-rest encryption in the database layer. Encrypt individual data columns, entire tablespaces, database exports, and backups to control access to sensitive data. Data Redaction complements TDE by reducing the risk of unauthorized data exposure in applications, redacting sensitive data before it leaves the database. Partial or full redaction prevents large-scale extraction of sensitive data into reports and spreadsheets. Encryption is implemented at the database kernel level, eliminating the need for any changes to applications.
  • 16
    FDM Platform

    FDM Platform

    Framesoft

    Legal or regulatory requirements (e.g. Sarbanes-Oxley Act or Basel II) or simply business needs require an easy and safe storage, archival and exchange of an ever-growing quantity of documents and content of different types, such as e-Mails, faxes, correspondence, plans, electronic documents, websites, etc. It allows the creation of the required organizational structures as well as managing of all types of electronic files (e-Files) and documents to be tracked, stored & searched via full-text search or by assigning keywords configured on the basis of self-defined business rules. Documents can be accessed, stored, or searched in FDM in multiple ways providing a complete FDM integration into the corporate’s business environment. Flexible tree-based structure containing folders & E-Files (Collection of documents incl. substructures under a common profile) Fine grained authorization privilege system (access control) to handle access to (single) folders & documents .
  • 17
    JackDB

    JackDB

    JackDB

    Write and execute queries in a fully interactive SQL editor. JackDB has everything you'd want in a database client, including: syntax highlighting, code formatting, and intelligent autocompletion. Snippets allow your most useful SQL queries to be saved and shared. Simply write and save any query in JackDB, and share the snippet publicly with your team. Whenever anyone updates a snippet, everyone gets access to its latest version. Security is our highest priority at JackDB. Roles are a very convenient and secure way to restrict database access to authorized users and provision new users with access to data sources. Explore everything in your database, not just tables and views. View your indexes, schemas, and other important system details such as tablespaces and user sessions.
    Starting Price: $49 per user per month
  • 18
    Google Advanced Protection Program
    The Advanced Protection Program safeguards users with high visibility and sensitive information from targeted online attacks. New protections are automatically added to defend against today’s wide range of threats. Gmail blocks over 100 million phishing attempts every day. But sophisticated phishing tactics can trick the most savvy users into giving their sign-in credentials to hackers. Advanced Protection requires you to use a security key to verify your identity and sign in to your Google account. Unauthorized users won’t be able to sign in without your username and password. Safe browsing on Chrome protects 4 billion devices against risky sites, and Advanced Protection performs even more stringent checks before each download. It flags or even blocks you from downloading, files that may be harmful. Only app installations from verified stores, like Google Play Store and your device manufacturer’s app store, are allowed.
  • 19
    Simple TimeClock

    Simple TimeClock

    BlockHead Ventures

    Simple Time Clock software, easy for employees to use and simple for employers to maintain. Check in and out with a single password entry. The current date and time is recorded to file ready for report. Time clock can be used by multiple employees, up to five hundred are supported. Manage all employee time sheets under one simple program. Add, edit, and report employee attendance with a few clicks. Print time sheet reports for any number of days. Password protect the Editor from unauthorized access. Simple TimeClock, a set of time clock software programs designed for employee time and attendance tracking on the PC. The TimeClock program records employee times and the TimeClock Editor allows employers to edit and report those times. Together they reduce the need for more expensive hardware time clock solutions.
  • 20
    Cisco AI Defense
    Cisco AI Defense is a comprehensive security solution designed to enable enterprises to safely develop, deploy, and utilize AI applications. It addresses critical security challenges such as shadow AI—unauthorized use of third-party generative AI apps—and application security by providing full visibility into AI assets and enforcing controls to prevent data leakage and mitigate threats. Key components include AI Access, which offers control over third-party AI applications; AI Model and Application Validation, which conducts automated vulnerability assessments; AI Runtime Protection, which implements real-time guardrails against adversarial attacks; and AI Cloud Visibility, which inventories AI models and data sources across distributed environments. Leveraging Cisco's network-layer visibility and continuous threat intelligence updates, AI Defense ensures robust protection against evolving AI-related risks.
  • 21
    BarScan

    BarScan

    BarScan

    Whenever you are required to perform inventories of assets. Bar|Scan can dramatically improve accuracy and save up to 80% of the time you spend on compliance inventories after the first year. When your employees use personal computers and peripherals. Improve utilization, provide better maintenance and technical support by identifying the models and serial numbers prior to a field service call or help desk function. Improve record-keeping for warranties and repair. Deter theft by assigning assets to departments or individuals. When your auditors insist on greater control of your assets or when you need to meet regulatory requirements. Compliance with the Unique Identification mandate (UID) from the DoD, GASB 34, Sarbanes-Oxley, ISO certification and others often requires a system like Bar|Scan. When you need to track requests for equipment and furniture. Bar|Scan’s Work Order Module allows you to create, track and automatically update the status of each request.
    Starting Price: $7,000 one-time payment
  • 22
    Altitude Networks

    Altitude Networks

    Altitude Networks

    Data that stays safe means collaborating without the risk. Altitude Networks is at the forefront of cloud security⁠—protecting your company’s cloud data against unauthorized access, accidental or malicious sharing, and theft. Tracking stolen cloud documents is time consuming. With 1 click, remediate unauthorized access. Someone just shared a critical file. To the wrong person. Identify who has undesired access to your important files and resolve it before it becomes an incident. Continuous protection. For all your cloud collaboration. Employees share files all the time which means you need security that is always working. Continuously Securing Your Enterprise Data Data is constantly shared. Your security must be constantly defending.
  • 23
    CA Harvest SCM
    CA Harvest Software Change Manager (CA Harvest SCM) provides powerful, process-driven capabilities for managing development teams across your enterprise, encompassing multiple platforms and release management tools. This release management software enforces your IT governance policies and corporate compliance initiatives including those defined by the Sarbanes-Oxley Act. It also can ensure adherence to your ITIL®-based best practices. CA Harvest SCM can help your enterprise simplify the software release management process as well as the development and maintenance of business applications with streamlined workflows and automated source code versioning. This ITIL release management software can optimize your development resources.
  • 24
    iSecurity DB-Gate

    iSecurity DB-Gate

    Raz-Lee Security

    DB-Gate empowers IBM i customers with exciting data access capabilities, based on Open Database Connectivity (ODBC), employing standard IBM i facilities to enable fully database-transparent access to remote systems. Using native SQL on the IBM i, users can now access specific files on DB2 and non-DB2 remote databases without any special hardware appliance or software on the remote database. From interactive STRSQL and from any standard program in RPG, Cobol, C, or other languages, access is now easier and more natural than ever. DB-Gate has been proven to be a full, successful replacement for OAM, the Oracle Access Manager, which has not been supported since IBM i release 7.3. As your enterprise applications expand in database requirements and complexity, so does the need to access multiple databases from your main application server. Current methods of accessing specific files on a remote database from within the IBM i require considerable time and resources.
  • 25
    NetMass

    NetMass

    NetMass

    Our backup services, offered under the operational arm of ServerBackup.com, deliver the highest level of data protection. Your data is encrypted and stored in our secure data centers for quick and easy recovery from any location. Our product and services are SEC, SOX and HIPAA compliant. Our remote offic solutions help you comply with the latest rules including those mandated by Sarbanes-Oxley, HIPAA, SEC Rule 17a, the Patriot Act, and others. Our backup solutions also work with our archive solutions (offered under the operational arm of DataArchiving.com) to provide a fully optimized backup, archive, disaster recovery, and business continuity solution. At NetMass, we engage with customers to holistically examine their business needs. Our assets, solutions, and services are then tailored to meet these requirements, to deliver the key Cloud benefits of data protection and data durability in a robust and secure environment.
    Starting Price: $50 per month
  • 26
    Senturo

    Senturo

    Senturo

    Senturo safeguards Apple, Chromebook, Windows, and Android devices against loss, theft, and unauthorized access with powerful location tracking, device monitoring, and advanced recovery tools, while enhancing mobile device and data security through robust remote security policies and actions such as remote lock to protect your fleet. IT Fleet location tracking Senturo’s intuitive global map view built on Google Maps lets you monitor your entire device fleet at a glance. Pinpoint the real-time location of any device or review its movement history over the past year, ensuring you stay informed and in control. Monitoring and incident detection Ensure your devices stay where they belong. With geofencing and IP whitelisting, you’ll receive instant email alerts if a device leaves your approved area or connects to an unauthorized network, keeping your assets secure. Multi-OS messaging Send critical updates or alerts to your entire fleet in seconds.
    Starting Price: $25 per month
  • 27
    HarfangLab

    HarfangLab

    HarfangLab

    Detect files considered malicious based on specific signatures discovered by researchers, publishers and our CTI team. Set up detection alerts on IOCs corresponding to known threats and enrich them with your own IOCs to adapt EDR to your environment. Our R&D team is constantly training its algorithms to enable you to detect binaries that are reputed to be undetectable. Take advantage of 1,200+ detection rules and identify potential new threats not listed by IOCs or in signature databases. An engine developed specifically to counter ransomware. Safeguards your EDR system against unauthorized tampering, ensuring it remains operational. Prevents the download and installation of malicious or vulnerable drivers using our continuously updated list. Receive alerts in case any malicious driver attempts to modify your EDR's monitoring and protection capabilities.
  • 28
    DBHawk

    DBHawk

    Datasparc

    Using DBHawk, our customers were able to comply with GDPR, HIPAA, SOX, GLBA, and other regulations and were able to implement SOD. Self-Service BI & Ad-Hoc Reporting Tool with feature to define Data Access Policy, Connect to multiple Data sources, Build Powerful SQL Charts and data Dashboards. DBHawk SQL editor is an advanced editor that allows users to build, edit, and run database queries with a web-based interface. DBHawk Query Builder is supported with all major databases such as Oracle, Microsoft SQL Server, PostgreSQL, Greenplum, MySQL, DB2, Amazon Redshift, Hive, Amazon Athena. Database SQL tasks and batch job automation with a web-based centralized tool. Secure access to SQL, NoSQL and Cloud databases with our all-in-one data platform. Trusted by our customers to protect and access their data. Centralized Security, Auditing and insights about your user’s activities.
    Starting Price: $99.00/month/user
  • 29
    PremiumWare

    PremiumWare

    Premium Ware

    PremiumWare, the nation's leading automated enterprise premium audit software solution for the Property & Casualty Insurance industry providing premium audit management, premium audit tracking and risk management with an array of pre-programmed premium audit reporting capabilities as well as auto-populating appointment and form letter features for additional overall increases of efficiency for your office and field personnel. As a complete, turnkey and SOX - Sarbanes Oxley compliant system, PremiumWare provides full implementation and integration, including continuing maintenance and support, in collaboration with our customer's internal support staff. This comprehensive, mission-critical, application completely automates all aspects of the premium audit business unit as well as provides local or remote support across LAN, WAN or Internet connections, for Underwriting, Claims, Loss Control, Agents and the Insured Risks.
  • 30
    Zillya! for Android
    Complex protection against all types of cyber threats, together with an antitheft system, and parental control will provide maximum protection for your devices and the gadgets of your relatives. Blocks phishing and other potentially dangerous sites. To ensure the most reliable protection the base of malicious sites is updated several times a day. The Battery module displays the current charge level and provides additional features such as battery usage history and power-saving settings. The module provides you the possibility to clear the cache memory of the phone and delete unnecessary files. Also, the module provides the ability to independently choose to clear the downloads folder. Includes an antivirus scanner and protection against malicious links. The program offers users a simple interface that allows them to easily configure and manage device protection. Automatically scans installed applications for viruses.
  • 31
    Anti-Executable
    Stop threats before they start by blocking unauthorized executables. Faronics Anti-Executable blocks any unknown threats that can bypass your antivirus solution. It protects you from sophisticated threats like zero-day attacks, mutating malware and advanced persistent threats that necessitate an approach that goes beyond a traditional antivirus solution, by ensuring only approved applications are allowed to run on a computer. Protect your endpoints with balance of flexibility and security using Faronics Anti-Executable. Ensure your servers are protected at all times with Faronics Anti-Executable. Protect your identity and keep your computer safe from malware with Faronics Anti-Executable. Faronics Anti-Executable provides security beyond an antivirus by blocking unauthorized programs– whether malicious, unlicensed or simply unwanted – from ever executing.
  • 32
    T-Recs

    T-Recs

    Trintech

    Accurately reconciling accounts and identifying the source of missing funds prior to issuing financial statements is challenging, especially if you’re using spreadsheets as part of this process. The necessary steps for reconciliation are extremely tedious, and spreadsheets are particularly labor intensive, error-prone, insecure, unverifiable and, often, inconsistently processed. What’s more—today’s compliance-focused environment, driven by Sarbanes-Oxley (SOX) and several other regulatory requirements, means that the scrutiny of internal controls, data security and process flows will only increase. For these reasons, unidentified errors and poor reconciliation compliance will quickly lead to serious consequences. T-Recs by Trintech offers a complete control framework for daily, monthly and periodic reconciliation.
  • 33
    Oracle Data Safe
    Data Safe is a unified control center for your Oracle Databases which helps you understand the sensitivity of your data, evaluate risks to data, mask sensitive data, implement and monitor security controls, assess user security, monitor user activity, and address data security compliance requirements. Whether you’re using Oracle Autonomous Database. Oracle Database Cloud Service (exadata, virtual machine, or bare metal), or Oracle Databases on-premises in your own data center, Data Safe delivers essential data security capabilities that help you reduce risk and improve security. Assess user risk by highlighting critical users, roles and privileges. Configure audit policies and collect user activity to identify unusual behavior. Discover sensitive data and understand where it is located. Remove risk from non-production data sets by masking sensitive data.
  • 34
    Krontech Single Connect
    Establish a flexible, centrally managed and layered defense security architecture against insider threats with the world's leading Privileged Access Management platform. Single Connect™ Privileged Access Management Suite, known as the fastest to deploy and the most secure PAM solution, delivering IT operational security and efficiency to Enterprises and Telco's globally. Single Connect™ enables IT managers and network admins to efficiently secure the access, control configurations and indisputably record all activities in the data center or network infrastructure, in which any breach in privileged accounts access might have material impact on business continuity. Single Connect™ provides tools, capabilities, indisputable log records and audit trails to help organizations comply with regulations including ISO 27001, ISO 31000: 2009, KVKK, PCI DSS, EPDK, SOX, HIPAA, GDPR in highly regulated industries like finance, energy, health and telecommunications.
  • 35
    Asset4000

    Asset4000

    MRI Software

    Have confidence in the accuracy of your asset register and get the depreciation data you need at the touch of a button. MRI’s specialist fixed asset management software helps organizations to meet the latest corporate governance regulations and tax rules with accurate depreciation, verified asset data and excellent reporting. It enables compliance with the ever changing requirements of GASB, US GAAP, Sarbanes-Oxley, and other SOX-type regulations and provides a comprehensive audit trail enabling organizations to meet and surpass audit regulations. When it comes to fixed asset management, MRI’s software controls, tracks, and records each change that occurs during an asset’s lifetime and encompasses depreciation processing and forecasting, capital expenditure control and asset tracking/physical auditing.
  • 36
    GOM Mix Pro

    GOM Mix Pro

    GOM & Company

    GOM Mix Pro is being described as the "video editor for all." It provides straightforward editing and source control, making it pretty easy for anyone to give their videos a professional look. Without any fuss, this editor and encoder are able to combine clips and files, as well as add text and images into moving footage. Thanks to this user-friendly interface this program really is suitable for all, from beginners to complete experts. Key features include overlay clips, image transition, and frame effects. Video editing sources. Continuous updates. Photoshop for Videos’ with more than 100 filters. Huge resources for video editing. Straightforward and effective experience. This program is constantly being updated to make sure that the user is always getting the most out of the experience. Also being added regularly are the numerous templates, overlay clips, editing tools, and filters.
    Starting Price: $33 one-time payment
  • 37
    Trend Micro Antivirus for Mac
    Defend against ransomware and other online dangers. Prevent malicious files and applications from infecting your Mac. Prohibit unauthorized use of your camera and microphone. Flag malicious phishing emails and scam websites. Block dangerous websites that can steal personal data. Trend Micro blocks viruses, spyware, and other malicious software, so you can enjoy your digital life safely. Trend Micro protects you against the newest types of attacks, including ransomware, which can encrypt your data until you pay off the bad guys. Stop cyber criminals from taking you hostage. Security doesn’t have to be complex. Trend Micro offers intuitive settings and clear, easy-to-understand status reports. Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, our cybersecurity platform protects 500,000+ organizations and 250+ million individuals.
    Starting Price: $29.95 per year
  • 38
    Timeclock.Kiwi

    Timeclock.Kiwi

    Timeclock.Kiwi

    A cloud timeclock program that is simple and straightforward to use. Either track hours worked or log time against a job. Export the calculated data in the format of your choice or even straight into your favourite payroll program. Update Kiosk settings in the portal and watch it update instantly from anywhere Time can be logged against a job or task, keep track of materials used and record notes if something out of the ordinary happens. Everything can be associated to a Cost Code so you can export the data into your accounting software. We know that it can take time to implement a new system, that is why we give such a long free trial. And at a cost of 42 USD per kiosk per year it costs only a fraction of any other solution!
  • 39
    Intapp Walls
    Intapp Walls lets your firm efficiently manage, secure, and enforce need-to-know access to confidential and sensitive information across all firm systems, from a centralized location, without impacting user productivity. Provide clear traceability of wall management, access, and attempted breaches. Enforce and maintain confidentiality across all sensitive client information. Adhere to changes in policies and procedures from a centralized location. Secure and manage protection across all firm systems that store sensitive information. Enforce ethical wall maintenance and policy adherence with user acknowledgments and automatically updated access rights. Automatically correct unauthorized modifications and ensure proper access with built-in monitoring and detection of changes to internal teams. Stay informed of changes to ethical walls, internal teams, and user acknowledgments with scheduled, on-demand, and trigger-based notifications.
  • 40
    InstaKey

    InstaKey

    InstaKey Security Systems

    InstaKey Security Systems offers a comprehensive key control program designed to enhance security and reduce costs through innovative hardware solutions, cloud-based management, and dedicated support. Their program includes restricted, serialized keys that prevent unauthorized duplication, user-rekeyable locks that can be rekeyed up to 12 times without locksmith assistance. InstaKey's approach ensures that organizations maintain control over their key access systems, streamline key management processes, and effectively respond to security breaches or key losses. Our keyways are restricted, meaning the key blanks themselves are not available on the open market. Local locksmiths and hardware stores are unable to acquire them, thus limiting unauthorized duplication opportunities and providing better controls. On top of that, each InstaKey key blank is stamped with a unique serial number, recording when and how it was cut, and who it was issued to, giving it a distinct fingerprint.
  • 41
    DBF Sync

    DBF Sync

    Astersoft Co

    Do you need to regularly update or synchronize DBF files? Then DBF Sync is your comprehensive solution! IT professionals, DBF system administrators and many other database users will find the wizard based DBF Sync tool affordable, indispensable and easy to use for the routine maintenance of their data. A typical use for DBF Sync would be for updating fields in a main file with fields from an update file, both sets of fields being independently selectable from within DBF Sync. DBF Sync supports projects which allow settings and file details to be entered and stored for future use. As well as the easy to use wizard interface, the program supports a command line interface and can be automatically executed from an application scheduler, such as the Windows Scheduled Tasks wizard. This allows you to closely integrate the program into your existing data management chores. To ensure the safety and security of your data, DBF Sync can be run in simulation mode.
    Starting Price: $29.95 per user
  • 42
    Cypherix Secure IT

    Cypherix Secure IT

    Cypherix Software

    Cypherix's SecureIT File and Folder Encryption Software is an easy to use, feature packed program that protects all your files and folders using 448-bit strong Blowfish encryption. It includes a powerful, customizable file shredder. SecureIT File Encryption Software has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy of the program. This strong encryption software ensures that it is statistically impossible for an unauthorized person to access the encrypted data. It includes virtual keyboard and privilege mode option that can help to prevent a keylogger from capturing keystrokes. SecureIT is so simple to use. SIT is designed to meet the growing security and privacy needs of all computer users. The software combines ease of use with state of the art technology to ensure total security with a zero learning curve and maximum convenience. It runs on all version of Windows.
  • 43
    Ashampoo Driver Updater
    Wrong or old drivers are the enemy of every computer system. Often, drivers are missing or hopelessly outdated. Ashampoo® Driver Updater not only finds the best drivers but also installs them for you. There's no need for menu acrobatics with Ashampoo Driver Updater. The well-designed program performs its job of keeping your computer up to date quickly and with a high degree of usability. It analyzes your hardware components and drivers, compares the results against a gigantic database - and then replaces outdated drivers with their latest versions. You decide when Ashampoo Driver Updater will spring into action. The built-in scheduler gives you reliable control over when the program will scan your system for updates. Once set up, you don't have to waste another thought on it and your system will stay up-to-date, always!
    Starting Price: $17.99 per 3 devices per year
  • 44
    IBM Guardium Data Encryption
    Protect your file and database data from misuse and help comply with industry and government regulations with this suite of integrated encryption products. IBM Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data masking and key rotation can help organizations address compliance with government and industry regulations, including GDPR, CCPA, PCI DSS and HIPAA. Guardium Data Encryption's capabilities—such as data access audit logging, tokenization, data masking and key management—help meet regulations such as HIPAA, CCPA or GDPR.
  • 45
    Systweak Antivirus

    Systweak Antivirus

    Systweak Antivirus

    With a combination of advanced security features like real-time protection, exploit and malware protection, regular updates, USB Stick protection, Systweak Antivirus keeps you and your data safe. Exploit & malware protection ensures that your system stays safe from malware, viruses, zero-day threats, PUP, Trojan & adware. With real-time protection, instantly detect and neutralize threats, adware, viruses & apps that may try to sneak past your system security. Detect & remove malicious startup items to protect your system against programs that can compromise the security of your system. Exploit Protection is the part of Systweak Antivirus multi-layered, next-gen protection. It specifically marks Malware, viruses that take advantage of software vulnerabilities. Using it you can keep your system protected against zero-day attacks.
    Starting Price: $39.95 per device per year
  • 46
    Demand Commander

    Demand Commander

    Demand Foresight

    A complete S&OP platform that drives measureable improvement across your value chain. A complete end-to-end S&OP supply chain management software suite that can easily integrate into any ERP and be configured module by module. Interactive Neural Computing technology that actually learns, adapts, and improves accuracy on its own unlike the traditional statistical methods that limit all other major vendors. We reduce error by our guaranteed minimum 25% and can directly tie that to a minimum 5% increase in pre-tax profitability and ROCE; especially relevant to public companies for reporting and Sarbanes-Oxley requirements. Easy to navigate and understand user interface, workflow, and alerts that can be tailored to your distinct, competitive business process advantages while easily adapting as your business grows and changes while not impairing support or upgrade paths.
  • 47
    SkyDRM

    SkyDRM

    NextLabs

    Keep your documents safe from unauthorized access and control how they can be used. Move faster, automate, improve efficiency, and be more agile. Prevent wrongful disclosure of customer data and provide secure access to critical business applications. Protect trade secrets and intellectual property. Close the security gap of perimeter security while allowing users to collaborate effectively. Protect and monitor your business-critical document such as intellectual property and product design, wherever it lives or travels, across devices, apps, cloud services, and on-premises. SkyDRM uses digital rights management and dynamic authorization technology to protect files and enable secure sharing. Protection stays with the document, regardless of where it’s stored or who it’s shared with: inside or outside your network, on file servers, or in the cloud. Determine whether your file can be accessed, viewed, edited, printed, or shared.
  • 48
    Bablic

    Bablic

    Bablic

    Real-time publishing, 1-minute integration, no programming needed. Customize in our Visual Editor. Choose immediate machine translation, use your own translators, or pick one, of our professional translation partners. Detect new content automatically, add languages, make changes on the fly, and keep all your versions organized with just a few clicks. Gain visibility on international search engines and appear in local search results. Easily blend automation with professional translation and update your site’s content dynamically. Gain visibility on international search engines and appear in local search results. Choose translation preferences and manage updates on the fly. Easily blend automation with professional translation and update your site’s content dynamically. Translate your site to sell globally. Bablic is the simplest, most cost-effective translation management tool for businesses of all sizes. Maximize SEO while controlling all your localized content.
    Starting Price: $24 per month
  • 49
    CourtRoom Program

    CourtRoom Program

    Service Education

    The current version of The CourtRoom Program is listed above. Updates to The CourtRoom Program are listed here. Updates to The Parking Program are listed here. Due to the pandemic, please continue to stay up to date with current directives from the Office of Justice Court Support. Now that The CourtRoom Program is part of the Unified Court System, we will also be following the same Holiday schedule. A listing of Holidays can be found here. We welcome your feedback as well as any future program enhancement suggestions. To send a suggestion please click here. The CourtRoom Program is an electronic docketing system designed to track every case from start to finish. It allows the Court to immediately update the case with current adjournment information, preventing cases from 'falling through the cracks' and assuring timely adjudication and reporting. Over 200 forms and letters are included in the program.
  • 50
    PDF Unshare

    PDF Unshare

    PDF Unshare

    PDF Unshare is a PDF copyright protection utility that creates unshared PDF files to protect your PDF files from sharing, printing, editing, copying or unauthorized accessing. This creative document protection tool also allows you to set an expiry date for the protected PDFs, and then all these documents would not be viewed after that date. Now entrepreneurs, book publishers or educational institutions can easily protect their documents from unauthorized sharing to other people or publishing online with this handy application. The protected files can be viewed on Windows PC/laptops, iPhone/iPad and Android devices by the free Unshared PDF reader program, also prevents people from taking screenshots while viewing the document content. You can also set the watermark text and customize the watermark color to the protected documents.