Download Shareware and Freeware Software for Windows, Linux, Macintosh, PDA

line Home  |  About Us  |  Link To Us  |  FAQ  |  Contact

Serving Software Downloads in 956 Categories, Downloaded 50.159.412 Times

PowerBroker Desktops DLP Edition 3.3

Company: BeyondTrust
Date Added: September 21, 2012  |  Visits: 676

PowerBroker Desktops DLP Edition

Report Broken Link
Printer Friendly Version


Product Homepage
Download (424 downloads)



PowerBroker® Desktops DLP Edition is a powerful data control and monitoring solution to the problem of data privacy and confidentiality in IT infrastructure. PowerBroker Desktops DLP Edition effectively replaces individual security tools, such as contentaware DLP, device control, e-mail control, web control, access control to files and more, combining them into unified data control policy, delivered through Microsoft's Group Policy infrastructure.

Loss of customer account details, exposure of confidential information and theft of sensitive data cost companies up to 5% of revenue every year. Additionally, insiders, employees and contractors who have authorized access to confidential data, are responsible for 70% of total data leaks.

PowerBroker Desktops DLP bridges strong security with user-friendly, simple operations, with enhanced 'Active Profiler' technology that marries 'set and forget' principles with effective data loss prevention. PowerBroker DLP provides comprehensive coverage of various data leak channels, including covert channels associated with data-in-processing. Active Profiler is a unique innovative feature in PowerBroker Desktops DLP that routinely creates user behavior profiles relating to sensitive content operations. Active Profiler automatically detects potential data leaks and sends detailed alerts to designated system administrators, managers or auditors.

Requirements: CLIENT: Windows 7, XP, Vista or Server 2003/2009. SERVER: 1GHz or better, 1GB RAM, 4GB diskspace
Release Date: September 21, 2012
Platforms: Win7 x32, Win7 x64, WinServer, WinVista, WinVista x64, WinXP
Keyword: Application Control Data Leak Prevention Data Loss Prevention Data Privacy Data Transfer Device Control Powerbroker Desktops Dlp
Users rating: 0/10

License: Freeware
USER REVIEWS
More Reviews or Write Review


POWERBROKER DESKTOPS DLP EDITION RELATED
Utilities  -  Fast Data Transfer 0.6.7
Fast Data Transfer is an application whose objectives are as the name suggests. It can read and write at disc speed on conventional network settings using the standard TCP protocol. It uses asynchronous systems that are flexible and with multiple...
3 KB  
Networking Tools  -  Zebedee 2.5.3
Zebedee is a simple program to establish an encrypted, compressed "tunnel" for TCP/IP or UDP data transfer between two systems. This allows data from, for example, telnet, ftp and X sessions to be protected from snooping. You can also use...
174.08 KB  
Networking Tools  -  progress 1.0
Progress is a utility used in a pipe to report progress of data transfer to standard error. Command-line arguments tells to specify how frequently to report, what character to use to report, and how much buffering to do. Whats New in This...
6.14 KB  
Networking Tools  -  WANPIPE 2.3.4-13 / 3.1.3 Beta
WANPIPE S-series is a family of intelligent multi-protocol WAN and ADSL adapters that support data transfer rates up to 8Mbps. All WAN protocols supported by WANPIPE are implemented in firmware and run on the card. An advantage of an intelligent...
10.1 MB  
Security  -  Zebedee 2.5.3
Zebedee is a simple program to establish an encrypted, compressed “tunnel” for TCP/IP or UDP data transfer between two systems. This allows traffic such as telnet, ftp and X to be protected from snooping as well as potentially gaining...
 
Windows Software  -  USB Drive Guard 1.1.20
USB Drive Guard is a data leak prevention (DLP) security solution that enables network administrators to centrally control USB drives on the network. This application runs silently on any windows PC and when someone inserts any type of storage...
37.04 MB  
Security Tools  -  PowerBroker Databases, Monitor & Audit 6.5
PowerBroker Databases Monitor & Audit helps Director's of IT, IT Security, and IT compliance address the threat to data security and compliance posed by un-controlled privileged database users. It provides a complete solution by addressing this...
 
Science  -  Data Mining 2
Learn data mining with easy-to-use examples. Teach computer to add, subtract, Boolean operations, Fishers Iris task and even chess moves with convenient application NeoNeuro Data Mining! You will be amazed how Data Mining learns chess step by...
2.09 MB  
Education  -  Regression mAKEr 0.9.11
Regression mAKEr project is a simple modular application for data investigation. This is an application to help user (mathematician) to make regression between series of data, draw grpahics, and export them into various formats by means of...
1.9 MB  
Utilities  -  DeviceIOView 1.02
DeviceIOView allows you to watch the data transfer between a software or service and a device driver (DeviceIoControl calls). For each call to a device driver, the following information is displayed: Handle, Control Code, number of input bytes,...
61.44 KB  
NEW DOWNLOADS IN WINDOWS SOFTWARE, SECURITY TOOLS
Windows Software  -  iTop Screen Recorder 4.5.0.1385
iTop Screen Recorder is an all-in-one screen recorder, video editor, and screenshot tool. It helps capture anything on your PC screen to be a high-quality video file or screenshot, as well as edit the recorded videos and local videos to make them...
144.59 MB  
Windows Software  -  Lock Cursor Tools 7.0
Lock Cursor Tools simply locks the mouse cursor. You may choose a predetermined area, the primary or secondary monitor screen or part of the window of a particular application. Lock Cursor Tools makes your computer work more productively by...
1.34 MB  
Windows Software  -  Sync2 Cloud 2.10
Synchronizing Outlook between multiple sources now made easy with Sync2 Cloud, powerful Microsoft Outlook synchronization software. Sync Outlook Calendar, Contacts and Tasks between multiple sources. Share Outlook Calendar with others without...
28.29 MB  
Windows Software  -  WDZ Hash Generator 1.0
A simple program that can generate hashes such as md5, sha1, sha2 and many others. Hash function - a function assigning any short number to any large number, always having a fixed size, non-specific, quasi-random value, so-called irreversible...
2.27 MB  
Windows Software  -  WriterHelper 1
WriterHelper consist of WordNet Dictionary, WordNet Thesaurus, Plagairism Checker, Encryption using TripleDES, DES, and AES. WriterHelper helps you to search for dictionary, thesurus using WordNet Dictionary, Encrypt Text using AES, DES,...
223 KB  
Security Tools  -  Privacy Eraser Free 6.4
Privacy Eraser is an all-in-one privacy suite that protects your privacy by cleaning up all your Internet history tracks and past computer activities. It supports popular web browsers such as Internet Explorer, Microsoft Edge, Mozilla Firefox,...
9.41 MB  
Security Tools  -  WinGPG 1.0.1.1
WinGPG developed by Scand Ltd. is a tray-based classical Windows application and a classic GPGv2 distribution (we use the cryptography from the official site without making any modifications). It supports the following operations:...
9.39 MB  
Security Tools  -  USB Lockit 1.0
USB Lockit - Password Lock USB Drive. Protects the USB drive with your photos, audios, videos and other files from prying eyes on Android & Windows. Once the drive is locked, nobody can access your files. All in 3 Easy Steps: 1. To lock...
11 KB  
Security Tools  -  Overwrite Program 1.4
Overwrite Program is a program that overwrites empty space on disk, data and metadata. The operating systems and programs automatically write and delete data on disk, for example text editors may save copies of the document for recovery and...
407 KB  
Security Tools  -  Security Camera Viewer 5.2
If you have one or more IP cameras, then you also need software that is able to receive and display a video stream from these devices. Most likely you will also want to monitor access to the rooms in automatic mode. A modern security system should...
29.53 MB