eBlaster records all web sites visted, keystrokes typed, incoming and outgoing emails and immediately forwards details via email, while Spector secretly takes a snapshot of the computer's screen and allows video-like playback.
Products and services to help protect homes and business computers from viruses, hackers, spam and abuse. Provides both free and pay services and virus information.
Provider of Internet security technology, a broad range of content and security software and appliance solutions to individuals and enterprises. Virus protection, firewall, intrusion prevention, Internet and email filtering, and remote management tools.
Email, file and hard disk encryption software, access control, authentication and password management solutions, SIM/smart cards and readers for security applications and encrypted secure flash drives for corporate and individual users.
|All About Privacy|
Programs designed to ensure privacy over the Internet for coporate, small business or personal networks. Monitors and filters email, reports and eliminates spam and much more.
Firewall software, Internet sharing, safe Internet access, Internet acceptable use, and a variety of network utilities. Visit the solutions section to determine which product is required.
Customized paperless software solutions, including webmaster tools, dial up networking logger, and paper and e-documents managers.
|Safe Data Technologies|
Newsletter manager with templates and automatic subscribe and unsubscribe option, secure and fully encrypted password manager, global email relay service, and attachment mail service that sends small or large files to single or multiple recipients.
Desktop and server-side solutions that provide secure messaging and protection against spam, viruses, identity theft, fraud and phishing scams for Microsoft Exchange server environments, Microsoft Outlook and Outlook Express. Free 15-day trial.
Filtering software that is designed primarily for home, educational and small business use. Runs secretly in the background, analyzing Internet activity, and can be configured to be completely invisible to the user.