Software > IT Security > Data protection

Data protection software - current market overview

Data protection defines information security or the confidentiality, availability and integrity of data in software systems. Data protection software secures or supports the protection of sensitive operational or personal data. This refers to software that directly encrypts data, monitors encryption, or provides assistance in handling data protection.

Leave us the

Software solutions such as data protection management, authentication, password management, electronic guides, IT baseline protection or data analysis are described here. Within the framework of the EU-GDPR, which finally came into force on 25.5.2018, numerous requirements must be met. Solutions for these requirements are also available in this section.

show 1 to 8 (of 8 entries)
caralegal
Experience the privacy workflow of your dreams
Experience the privacy workflow of your dreams
With the data protection management software caralegal, start-ups and large corporations alike master the bureaucratic duties and save one month of working time per year. The intelligent data protection management software offers companies the essential functionalities for achieving efficient GDPR compliance, answers data protection-related questions, supports documentation and - through the further development of an AI - takes over ever greater parts of the data protection-related audit effort.
abylon APP-BLOCKER
Process monitoring: permanently blocks unwanted applications, services and drivers
Process monitoring: permanently blocks unwanted applications, services and drivers
When Windows is started, many processes, services and drivers are started. The user notices very little of most of the processes on the PC. In addition, he can hardly judge the necessity of many processes. These background processes, for example, monitor the computer, search for updates or take over periodic tasks. These processes are not always desired, but cannot usually be deactivated individually. In addition, each started application requires a part of the computer power and slows down the computer a bit ...
otris privacy
otris privacy supports the data protection officer in his daily work
otris privacy supports the data protection officer in his daily work
The data protection solution offers you targeted analysis and control of operational data protection and IT security standards. With the software, you can optimize security gaps and comprehensively document all data protection measures taken. otris privacy supports company and external data protection officers in their daily work. The software can be used across all industries and maps any company structure. With its comprehensive range of services, otris privacy sets the course for a successful long-term ...
abylon ENTERPRISE
Comprehensive security suite for computers, data, privacy and more
Comprehensive security suite for computers, data, privacy and more
abylon ENTERPRISE installs numerous functions in one setup to optimize and encrypt the PC, the data on it and your privacy. Background services ensure the regular and secure destruction of temporary files, forensic traces and Internet traces with all cookies created. Within the scope of all encryption functions, conventional passwords, software and hardware certificates (X.509) and smart cards as well as USB sticks can be used as security keys (security tokens).
abylon LOGON
Gesicherte Windowsanmeldung und Single Sign-On
Gesicherte Windowsanmeldung und Single Sign-On
The abylon LOGON software is offered in three variants and enables secure logon to the Windows computer (credential provider) and other logon screens (SSO). Smart cards, RFID radio chip cards, USB sticks, Bluetooth devices or CDs/DVDs can be used as hardware keys (security tokens) for login. When the hardware key is removed, the computer is automatically locked, logged off or shut down. The software increases security with increased convenience.
abylon SHREDDER
Delete files and Internet traces irrevocably and securely
Delete files and Internet traces irrevocably and securely
When deleting files, only the references to the files are removed without actually deleting them. With the appropriate APPs, this data can be reconstructed even without special knowledge. Even formatting the hard disk leaves recoverable data, which is not desirable when selling the computer. Remedy is provided by the software abylon SHREDDER. By using recognized deletion methods, files are irrevocably deleted and completely removed. In addition to deleting files and hard disks, Internet traces, temporary files or forensic traces can also be safely removed ...
Compliance Aspekte
Is a practical GRC tool for implementing ISMS and DSMS
With the Compliance Aspekte solution, you easily implement the general data protection regulations. Benefit from the ready-to-use software for implementing data protection compliance and EU-DSGVO in your company. Among other things, a list of processing activities to meet the requirements of the General Data Protection Regulation as well as catalogs of risks and measures for data protection are available.
QSEC - GRC/ISMS, ISO 27001/BSI standard- IT protection, B3S and data protection
GRC, ISMS, risk management, IMS, IKS, and data protection - "All-in-one"!
GRC, ISMS, risk management, IMS, IKS, and data protection - All-in-one!
QSEC is an integrated management system that provides the management with decisions based on transparency and facts and supplies the corporate risk management with important decision basics from the operative risk management. The implementation of. the Compliance, of Information Security Management according to the requirements of ISO 27001, BSI standard (IT-Grundschutz), B3S Risk Management anddata protection according to GDPR Data Protection according to GDPR In addition, a wide range of other requirements ...
show 1 to 8 (of 8 entries)
1

Search in similar categories:

Backup, Data Protection DTP (Desktop Publishing) ISMS - Information Security Management IT Security (miscellaneous) IT surveillance, monitoring Knowledge Management Mobile-Device-Management (MDM, EMM) Network Administration Organization Sales and Marketing (miscellaneous)
Show all 336 Software categories