Software Alternatives, Accelerators & Startups

Top 9 Log Management Products in Encryption

The best Log Management Products within the Encryption category - based on our collection of reviews & verified products.

WiFi Scanner Lizard Systems WiFi Scanner Microsoft BitLocker MyUSBOnly Splashtop Business Access iToolab PassWiper for Excel Kernel for Zip Acronis Snap Deploy USBGuard

Summary

The top products on this list are WiFi Scanner, Lizard Systems WiFi Scanner, and Microsoft BitLocker. All products here are categorized as: Systems for managing and analyzing log files. Tools for securing data through encryption techniques. One of the criteria for ordering this list is the number of mentions that products have on reliable external sources. You can suggest additional sources through the form here.
  1. A 802.11 wireless scanner and connection manager for Mac OS X.

    #Log Management #Monitoring Tools #Development

  2. Lizard Systems WiFi Scanner is a multi purpose WiFi scanner and WiFi troubleshooting tool designed for dealing with all WiFi related issues conveniently.

    #Log Management #Monitoring Tools #Development 3 social mentions

  3. BitLocker is a full disk encryption feature included with Windows Vista and later.

    #Monitoring Tools #Encrypted Cloud Storage #Security & Privacy

  4. Endpoint security solution MyUSBOnly prevents unauthorized access to USB devices and Prevent sensitive data from leaking out and secure your files

    #Cloud Storage #Cyber Security #Security & Privacy

  5. Remote desktop for business professionals and teams.

    #Log Management #Monitoring Tools #Remote PC Access

  6. PassWiper for Excel is an professional Excel password remover that helps you unprotect Excel workbook and worksheet protection in clicks.
    Pricing:
    • Freemium
    • Free Trial
    • $15.95 / Monthly

    #Monitoring Tools #Security & Privacy #Excel Tools

  7. Kernel for Zip Repair tool repairs multiple Zip files without changing the formatting.

    #Security & Privacy #Password Recovery #Encryption

  8. OS deployment and disk imaging tool

    #Monitoring Tools #Cyber Security #Office & Productivity

  9. Protect your computer against rogue USB devices by implementing basic whitelisting and blacklisting...

    #Monitoring Tools #Governance, Risk And Compliance #Cyber Security

Related categories

Recently added products

If you want to make changes on any of the products, you can go to its page and click on the "Suggest Changes" link. Alternatively, if you are working on one of these products, it's best to verify it and make the changes directly through the management page. Thanks!