Suggested Categories:

Disk Imaging Software
Disk imaging software creates an exact copy of a computer's hard drive, including the operating system, applications, settings, and files. It is commonly used for system backups, disaster recovery, and deploying standardized configurations across multiple machines. By capturing a full snapshot of a disk, users can restore their system quickly in case of data loss, hardware failure, or malware attacks. Many disk imaging tools offer incremental backups, compression, and encryption for efficient storage and security. This software is essential for IT professionals, businesses, and individuals looking to safeguard their data and streamline system recovery.
Disk Repair Software
Disk repair software is designed to diagnose, fix, and restore issues affecting hard drives, SSDs, USB drives, and other storage media. It can detect bad sectors, repair corrupted file systems, and recover inaccessible or lost data. Many solutions also offer preventive features such as disk health monitoring, error checking, and optimization tools to extend drive lifespan. By repairing logical errors and restoring damaged partitions, these tools help prevent data loss and improve system performance. Disk repair software is essential for IT technicians, data recovery specialists, and everyday users who need to maintain reliable storage devices.
Disk Cloning Software
Disk cloning software is a type of software used to create an exact replica, or clone, of the contents of one disk drive onto another. This technology is commonly used for data backup and restoration purposes, as it allows users to make exact copies of their original drives for storage or to transfer to another machine. Disk cloning software typically supports cloning from both hard disks and solid state drives, and many programs offer options for encrypting and compressing data before it is cloned over. Some disk cloning solutions enable user-friendly customization such as setting up periodic backups at regular intervals.
Disk Partition Tools
Disk partition tools are software utilities designed to manage the segmentation of a storage drive into distinct sections called partitions. These tools allow users to create, resize, format, delete, and organize partitions, enabling efficient use of storage space and improved data management. By separating different types of data, such as operating system files and personal files, partitions can enhance system performance and simplify backups or upgrades. Additionally, partition tools often support tasks like file system conversion, disk initialization, and partition recovery, making them vital for both routine maintenance and specialized configurations, such as setting up multiple operating systems or optimizing drive performance.
Disk Cleanup Software
Disk cleanup software is designed to help users clear their computer of unnecessary files, such as temporary internet files and old program installers. It can delete temporary data that builds up on a regular basis and free up disk space. Additionally, this type of software can locate duplicate files in order to help users prevent themselves from taking up too much storage space. This software can be found either pre-installed on computers or downloaded from the internet for free.
Disk Space Analyzers
Disk space analyzers are software tools used to analyze the storage capacity and usage of a computer's hard drive. They provide users with detailed reports and visual representations of their disk space, including file sizes, types, and locations. These tools can help users identify large or unnecessary files taking up valuable storage space. Some disk space analyzers also offer features such as duplicate file detection and organization tools to help optimize storage. Overall, disk space analyzers are useful for managing and maintaining efficient use of hard drive space.
Defrag Software
Defrag software optimizes the arrangement of files on a hard disk drive (HDD) to improve read and write speeds. By reorganizing fragmented data into contiguous blocks, it reduces seek time and enhances overall system performance. Many modern defrag tools also include scheduling, SSD optimization modes, and disk health monitoring. While SSDs don’t require traditional defragmentation, defrag software can still perform trimming and optimization tasks for them. These tools are especially valuable for extending the life of HDDs, speeding up boot times, and improving file access efficiency.
Data Recovery Software
Data recovery software provides the tools to restore, recover and retrieve lost, deleted, inaccessible, or corrupted data files from various systems, devices, or databases. It works by scanning the storage medium to locate and recover files that may have been deleted or damaged. These programs can help recover a variety of file types and handle different data loss scenarios. Some software includes advanced features for more complex recovery needs. It is useful for anyone looking to restore important data.
File Sync Software
File sync software assists in the process of ensuring that edited files from multiple sources and locations are synchronized and have the same information.
Digital Forensics Software
Digital forensics software is a type of tool used by cybersecurity professionals and law enforcement to investigate and analyze digital devices, networks, and data following a security breach or criminal activity. These tools help recover, preserve, and examine evidence from electronic devices such as computers, smartphones, servers, and storage devices. Digital forensics software typically includes features like data recovery, file carving, network traffic analysis, timeline creation, and forensic image creation to ensure that evidence remains unaltered. It also helps in tracking digital footprints, identifying malicious activity, and gathering critical information for legal purposes. By providing detailed insights into digital activities, these tools are essential for investigating cybercrimes, data breaches, and compliance violations.
Data Migration Software
Data migration software enables the seamless migration of data from one system or another. Data migration tools are useful for database migration, application migration, server migration, data center migration, and more.
Cloud Storage Services
Cloud storage services allow individuals and businesses to store, access, and manage data securely over the internet instead of relying on local hardware. They provide scalable storage solutions where users can upload, sync, and share files from any device with an internet connection. These services often include features like file versioning, encryption, and automated backups to ensure data protection and accessibility. Many platforms integrate with productivity and collaboration tools, making them essential for remote teams and modern workflows. Ultimately, cloud storage services offer flexibility, reliability, and cost efficiency for managing digital assets at any scale.
DJ Software
DJ software is designed for DJs (disc jockeys) and enables them to perform music production, live mixing, and more. DJ software is essential for DJs today that want powerful tools for live shows and music production. Some DJ software is designed purely for a computer only, while other DJ software may integrate with DVS (Digital Vinyl System) and turntables.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Encryption Software
Encryption software protects sensitive data by converting it into unreadable code that can only be accessed with the correct decryption key. It secures files, communications, applications, and entire systems from unauthorized access, cyberattacks, and data breaches. These tools use algorithms like AES, RSA, and elliptic-curve cryptography to safeguard data at rest, in transit, or in use. Many encryption platforms offer key management, user authentication, and compliance features to meet industry regulations and enterprise security requirements. Overall, encryption software is essential for maintaining privacy, ensuring data integrity, and protecting information across digital environments.

17 Products for "disk wipe" with 1 filter applied:

  • 1
    DriveStrike

    DriveStrike

    DriveStrike

    DriveStrike is easy to use, implement and manage. With DriveStrike you can execute secure remote wipe, remote lock, and remote locate commands on any platform. Integrated drive encryption support as well as mobile device management MDM for mobile platforms. Our professional support team is always available to answer your questions and help you install our services or manage your account and devices. Protecting your data and devices has never been easier or more cost effective. ...
    Starting Price: $0.99 per month
    View Software
    Visit Website
  • 2
    Xecrets Ez

    Xecrets Ez

    Axantum Software AB

    ...It is a fully integrated frontend to Xecrets Cli, an open source and free command line program that does all the heavy lifting with encryption, decryption and secure wiping. The command line can also be downloaded and used separately for scripting and integration into other software.
    Starting Price: €15/year
  • 3
    OpenText ZENworks Full Disk Encryption
    OpenText ZENworks Full Disk Encryption enables you to centrally enforce policies for encrypting entire hard disks on Windows 7, Windows 8, and Windows 10 machines in your organization. You manage them using the same web-based console and adaptive agent that you use for other ZENworks products. Protect your company data with the proven reliability of encrypting the entire hard disk drive.
  • 4
    ESET PROTECT Advanced
    ESET Protect Advanced is a comprehensive cybersecurity solution designed for businesses of all sizes. It offers advanced endpoint protection against ransomware, zero-day threats, and sophisticated attacks with ESET LiveSense technology. It includes full disk encryption for legal compliance and data protection. The solution features proactive cloud-based threat defense using adaptive scanning, machine learning, cloud sandboxing, and behavioral analysis to prevent new threats. Mobile threat defense secures Android and iOS devices with anti-malware, anti-theft, and mobile device management. ...
    Starting Price: $275/month/5 devices
  • 5
    Gilisoft #1 All-in-One Toolkit Suite
    22 Powerful and Useful Software in One Pack, which including Video Converter, Video Editor, Screen Recorder Pro, Slideshow Movie Creator, Movie DVD Converter, Movie DVD Copy, Movie DVD Creator, Audio Converter Ripper, Audio Recorder Pro, Audio Editor, MP3 CD Maker, File Lock Pro, USB Encryption, Secure Disc Creator, Full Disk Encryption, Private Disk, USB Lock, and RAM Disk, Image Watermark Remover, Video Watermark Remover, Formathor, Data Recovery. #1 All-in-One Toolkit Suite is able to do almost every multimedia ripping, converting, burning, and editing imaginable. You can make your PC perfectly safe with encryption tools, get back lost files and also speed up your PC performance with RAMDisk. ...
    Starting Price: $149.99
  • 6
    SafeConsole

    SafeConsole

    DataLocker

    ...Available as an on-premises software or as a DataLocker hosted cloud service with worldwide locations. Enforce policies such as password rules, file-type restrictions or geographic boundaries. Reset passwords, switch devices into read-only mode, and even remotely wipe them in case of loss or theft. Monitor all your encrypted drives, including their location anywhere in the world. Integrate with Active Directory to track users, assigned devices and connected computers with ease. See which files are saved to or deleted from your encrypted drives at any given moment.
    Starting Price: $28 per device per year
  • 7
    east-tec SafeBit
    East-tec SafeBit is an on-the-fly disk encryption software that protects your confidential data by creating secure, password-protected virtual drives. These encrypted safes work like regular drives in Windows, letting you use your files normally while keeping them fully secure. The software automatically encrypts files as they’re saved and decrypts them when accessed, using strong AES 256-bit encryption to ensure data is unreadable to unauthorized users, even if your device is lost or stolen. ...
    Starting Price: $29.95
  • 8
    Ubiq

    Ubiq

    Ubiq Security

    ...Application-native client-side encryption protects data from sophisticated attackers, supply-chain attacks, and insider threats. Most at-rest encryption solutions – transparent disk encryption, full disk encryption, etc. – are ineffective against modern threats because they grant admins, key processes, and attackers (who exploit privileged access) implicit access to plaintext data. Eliminate this gap and bridge the divide between engineering, security, and compliance teams with Ubiq’s developer-first, encryption-as-code platform. ...
    Starting Price: $0.001 per encrypt
  • 9
    JM-Crypt

    JM-Crypt

    JM-Crypt

    ...Our software use the best known algorythm : AES-256 – CBC – PKCS official unaltered version with authentication (encrypt-then-mac) and random IV (initialization vector). Hash functions and HMAC: SHA3 – 256. Better than full disk encryption slowing down your computer's performance, "JM-Crypt PC" can target for fast serial encryption specific folders or file extentions of your choice.
    Starting Price: $2.99 (Android) - $9.99 (PC)
  • 10
    SecureZIP
    Large-scale data breaches continue to expose the weaknesses in traditional information security strategies. Network and device protection is clearly not enough. Full-disk or volume encryption is a single-use-case approach that leaves information exposed at the data level. Persistent data-level encryption has become a necessity, especially in highly regulated industries. Files are compressed using PKWARE’s industry-best technology, reducing file sizes by up to 95%. Encrypted files can be shared and decrypted by authorized users on any enterprise operating platform. ...
  • 11
    Trend Micro Endpoint Encryption
    Trend Micro™ Endpoint Encryption encrypts data on a wide range of devices, such as PCs and Macs, laptops and desktops, USB drives, and other removable media. Available as a separate agent, this solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information. A single, well-integrated management console allows you to manage your users holistically—using the same console for endpoint protection and other Trend Micro security products. Deploying the Endpoint Encryption agent helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.
  • 12
    ESET Endpoint Encryption
    ...Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard. ESET Endpoint Encryption gives companies enhanced ability to protect specific files, folders, virtual disks or archives. By encrypting emails and attachments, and restricting access to removable media for specific users, you can protect data in transit and prevent their leakage outside the company. Full control of licensing and software features, security policy and encryption keys from a dedicated ESET Endpoint Encryption console.
  • 13
    Encrypto

    Encrypto

    MacPaw

    ...Send encrypted files via email, Messages, AirDrop, Dropbox, carrier pigeon with USB stick — however you send them, your files are protected. With Encrypto, not only can you encrypt and share files, but you can also save them to your own disk. Select your files, put them through Encrypto, and voilà — they’re protected. If you haven’t been living on Mars these last years, having a data encryption strategy is a must. Let Encrypto be part of it. It's easy to use and impossible to hack. Download and give it a spin right now.
  • 14
    Cryptainer Pro

    Cryptainer Pro

    Cypherix Software

    ...Cryptainer includes Password strength and monitor meter which is useful in setting up effective and strong passwords. A single password allows access to the virtual disk, thereby eliminating the need to remember separate passwords for each encrypted file. Just Drag and Drop to hide any data of any kind (documents, pictures, entire folders or even run programs) in a safe password protected vault. Cryptainer's ease of use and deployment coupled with its speed and versatility makes it an ideal security tool for all environments. ...
    Starting Price: $69.95
  • 15
    Sophos Central Device Encryption
    Increased remote working makes it more important than ever to secure computers and the data on them. With the huge number of laptops lost, stolen, or misplaced every day, a crucial first line of defense against the loss or theft of devices is full disk encryption. Sophos Central Device Encryption leverages Windows BitLocker and macOS FileVault to secure devices and data. Centralized security management and operations from the world’s most trusted and scalable cloud security platform. With open APIs, extensive third-party integrations, and consolidated dashboards and alerts, Sophos Central makes cybersecurity easier and more effective. ...
  • 16
    ESET PROTECT Complete
    ...It offers advanced protection against ransomware and zero-day threats through cloud-based sandboxing technology and machine learning-driven detection. It includes full disk encryption capabilities, aiding compliance with data protection regulations. ESET PROTECT Complete also provides robust security for mobile devices, file servers, and email servers, incorporating anti-malware, anti-phishing, and anti-spam measures. Its centralized, cloud-based management console allows for streamlined deployment, monitoring, and response to security incidents across the organization. ...
    Starting Price: $287.72 one-time payment
  • 17
    ESET PROTECT Elite
    ...The platform includes modern endpoint protection for computers and smartphones, server security for real-time data protection, and mobile threat defense. It also features full disk encryption, helping organizations comply with data protection regulations. ESET PROTECT Elite provides robust email security, including anti-phishing, anti-malware, and anti-spam technologies, along with cloud app protection for Microsoft 365 and Google Workspace. Vulnerability and patch management capabilities allow for automatic tracking and patching of vulnerabilities across all endpoints.
    Starting Price: $275 one-time payment
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB