[go: up one dir, main page]

Suggested Categories:

File Repair Software
File repair software enables users to repair corrupt or damaged files. File repair software tools are useful for companies and users that need to repair and access files of all kinds including documents, downloads, images, videos, PDFs, and more.
File Converters
File converters are software tools that enable users to convert file types from one file type to another. File converters can convert different types of files such as documents, PDFs, images, and more.
File Sharing Software
File sharing software is software that enables users to securely share and exchange files and data over the internet. It allows people to easily store, access, and transfer documents, files, photos, videos, music, and other types of data to and from multiple devices. There are many popular file sharing programs available for both home networks and business use. These provide features such as file synchronization across multiple devices, security protocols for protection against malicious activity/hacking attempts, cloud-based storage capabilities, etc.
File Copy Software
File copy software is designed to transfer files and folders quickly, reliably, and often with enhanced functionality compared to standard operating system copy tools. It can handle large files, resume interrupted transfers, and manage batch operations more efficiently. Many solutions include error recovery, speed optimization, file verification, and filtering to copy only specific file types or updated versions. Advanced tools may support copying across local drives, network locations, and external storage devices with minimal downtime. This makes file copy software essential for IT administrators, content managers, and anyone handling large-scale or frequent file transfers.
File Compression Software
File compression software reduces the size of files or folders to save storage space and speed up transfers. It works by using algorithms to eliminate redundancy and efficiently encode data, often resulting in significantly smaller file sizes. These tools typically support multiple compression formats, such as ZIP, RAR, and 7z, and can also encrypt archives for added security. Many include features like batch compression, password protection, file splitting, and integration with cloud storage. File compression software is essential for sharing large files, archiving data, and improving storage efficiency on both personal and enterprise systems.
Business Filing Services
Business filing services enable anyone to quickly and easily create a business. Business filing services streamline the process of business registration, obtaining business licenses, and creating business entities such as an LLC, corporation, limited company, S corp, and more. Business filing services may also offer a la carte legal services.
File Sync Software
File sync software assists in the process of ensuring that edited files from multiple sources and locations are synchronized and have the same information.
Duplicate File Finders
Duplicate file finders are software tools that enable users to find and identify duplicate files, duplicate images, duplicate videos, duplicate documents, and more in order to prevent duplicates and free up space on their system or hard drive. Duplicate file finders are also known as duplicate file removers or duplicate file cleaners.
File Managers
File managers, also known as file browsers or file explorers, are software applications that enable a user to browse, search, organize, and manage the files and folders on their computer or device.
E-Filing Software
E-filing software for legal purposes enables attorneys, law firms, and self-represented litigants to electronically submit court documents to judicial systems. It streamlines the filing process by ensuring compliance with court formatting rules, deadlines, and procedural requirements. The software provides features like document tracking, real-time status updates, and automated notifications of court acceptance or rejection. With secure encryption and user authentication, it protects sensitive legal information from unauthorized access. By reducing reliance on paper filings, it increases efficiency, saves time, and minimizes the risk of errors or missed deadlines.
File Archiving Software
File archiving software is designed to compress, organize, and store files efficiently for long-term retention and easy retrieval. It helps reduce storage costs by using compression techniques and managing data lifecycle policies, such as automatic archiving and deletion. This software supports indexing and search capabilities, enabling quick access to archived files when needed. Many solutions integrate with backup and compliance systems to ensure data security and regulatory adherence. By centralizing archived data, it improves data management and preserves critical information over time.
File and Document Comparison Software
File and document comparison software enables users to compare the difference between two or more files or documents. File comparison tools can detect differences between files such as images, code, PDFs, media files, and more. Document comparison tools can detect the differences between two or more documents.
File Integrity Monitoring Software
File integrity monitoring software is a type of security tool designed to monitor and track changes made to files on a computer system. It works by comparing the current state of a file to its known baseline, alerting users if any unauthorized modifications have been made. This software can detect both accidental and malicious changes, making it useful for maintaining the integrity of important files. It is often used in conjunction with other security measures such as firewalls and antivirus programs to provide comprehensive protection against cyber threats. Overall, file integrity monitoring software plays an important role in ensuring the security and reliability of computer systems.
Secure File Transfer Software
Secure file transfer software enables the safe exchange of files between users, systems, or organizations by encrypting data in transit and at rest. It often supports protocols like SFTP, FTPS, and HTTPS to ensure secure communication while preventing unauthorized access. Many solutions include authentication, access controls, and audit logs to enhance compliance with security regulations. Advanced features may include automation, integration with cloud storage, and endpoint protection for seamless and secure file sharing. These tools are essential for businesses handling sensitive data, such as financial institutions, healthcare providers, and enterprises with strict security requirements.
Data Recovery Software
Data recovery software provides the tools to restore, recover and retrieve lost, deleted, inaccessible, or corrupted data files from various systems, devices, or databases. It works by scanning the storage medium to locate and recover files that may have been deleted or damaged. These programs can help recover a variety of file types and handle different data loss scenarios. Some software includes advanced features for more complex recovery needs. It is useful for anyone looking to restore important data.
HR Employee File Management Software
HR employee file management software is designed to assist HR departments with the process of gathering, searching, structuring and managing all employee information.
Managed File Transfer (MFT) Software
Managed file transfer (MFT) software provides the tools to ensure the efficiency and security of file transfers and data exchange across a network from one machine to another.
File Transfer Protocol (FTP) Software
File transfer protocol (FTP) software is software used for transferring files between different devices over a network. It allows users to upload and download files securely and efficiently. The software uses a client-server architecture, meaning one device acts as the client initiating the file transfer while the other device acts as the server receiving the data. FTP software also allows for remote access to files stored on a server, making it convenient for businesses and individuals with large amounts of data. Additionally, it supports multiple file formats and can resume interrupted transfers.
Encryption Software
Encryption software protects sensitive data by converting it into unreadable code that can only be accessed with the correct decryption key. It secures files, communications, applications, and entire systems from unauthorized access, cyberattacks, and data breaches. These tools use algorithms like AES, RSA, and elliptic-curve cryptography to safeguard data at rest, in transit, or in use. Many encryption platforms offer key management, user authentication, and compliance features to meet industry regulations and enterprise security requirements. Overall, encryption software is essential for maintaining privacy, ensuring data integrity, and protecting information across digital environments.
Disaster Recovery Software
Disaster recovery software helps organizations prepare for, respond to, and recover from unexpected IT disruptions such as hardware failures, cyberattacks, or natural disasters. It automates backup, replication, and restoration of critical data and systems to minimize downtime and data loss. The software often includes features like failover management, recovery testing, and compliance reporting to ensure business continuity. By providing centralized control and monitoring, it streamlines disaster recovery planning and execution across physical, virtual, and cloud environments. Disaster recovery software is essential for maintaining operational resilience and meeting regulatory requirements.
View more categories (20) for "recover files"

26 Products for "recover files" with 1 filter applied:

  • 1
    Data Rescue

    Data Rescue

    Prosoft Engineering

    Have you accidentally deleted or lost important files? Our data recovery software can retrieve your priceless photos, videos, important business documents, school work, and more. All with only a few simple steps. Data Rescue is designed for the everyday home user to professional business users. Recover from internal and external hard drives, USB flash drives, and SD cards. Clone a failing hard drive and create a Recovery Drive so you can recover from your main drive. ...
    Starting Price: $19
  • 2
    Excel Password Recovery

    Excel Password Recovery

    eSoftTools Software

    eSoftTools Excel Password Recovery is a very helpful program for those who lost or forgot their MS Excel file opening password or excel worksheet password. This software moves you in 100% comfort zone by utilizing its smart technology driven Brute Force, Brute Force with Mask Attack and Dictionary Attack and recover lost excel file open password and worksheet password. User can easy to manage and recover XLS, XLSX, XLA, XLTM, XLSB, XLAM & XLSM file password recovery. eSoftTools Excel Unlocker tool easy to install on all versions of Windows operating systems and supported all version’s of Microsoft Excel file password recovery. ...
    Starting Price: $19
  • 3
    Magnet AXIOM

    Magnet AXIOM

    Magnet Forensics

    Recover & analyze your evidence in one case. Examine digital evidence from mobile, cloud, computer, and vehicle sources, alongside third-party extractions all in one case file. Use powerful and intuitive analytical tools to automatically surface case-relevant evidence quickly. Recover, analyze, and report on data from mobile, computer, cloud, and vehicle sources in one case file with Magnet Axiom.
  • 4
    Aid4Mail

    Aid4Mail

    Fookes Software Ltd

    Aid4Mail is a fast, reliable, and highly accurate tool to collect, recover, search, and convert emails. It supports most mailbox file formats (e.g. PST, OST, OLM, mbox), IMAP accounts (e.g. Yahoo! Mail, AOL) and popular mail service providers (e.g. Microsoft 365, Exchange, Gmail). Aid4Mail can recover double-deleted messages and corrupted emails, and extract MIME data from certain types of unknown file formats through file carving.
    Leader badge">
    Starting Price: $59.95
  • 5
    NeuShield Data Sentinel
    The War on Ransomware is Over. NeuShield Data Sentinel does more than just detecting and blocking ransomware attacks. We’re the only anti-ransomware technology that can recover your damaged data from malicious software attacks without a backup. Data Sentinel uses Mirror Shielding™ to protect files ensuring that you can instantly recover your important data from any ransomware attack. Patented technology that adds a barrier to protected files preventing them from being modified. Mirror Shielding™ makes an attacker believe they have access to a computer’s original data files, but they are in fact only seeing a mirror image of them. ...
  • 6
    Glary Utilities

    Glary Utilities

    Glary Utilities

    ...Malware Hunter is an award-winning product that provides comprehensive protection against all types of threats, secures your data, protects your privacy and ensures your PC remains virus-free. Glarysoft Files Recovery is aimed at both beginners and experts who lost data. It allows users to restore files from the recycle bin, virus-damaged files, permanently deleted files, or even formatted lost. It not only recover from computers, USB-drives, but also from external memory cards, such as camera storage devices.
    Starting Price: $19.97 per year
  • 7
    OpenText Data Protector
    ...Data Protector and OpenText™ Data Protector for Cloud Workloads deliver backup and disaster recovery for physical, virtual, cloud and container environments. Native application integrations make application-aware backup and recovery quick and easy. An enhanced interface provides a self-service option to recover single items. Built-in capabilities enable businesses to recover quickly, from granular file restores to automated bare metal recovery.
  • 8
    Datto File Protection

    Datto File Protection

    Datto, a Kaseya company

    Efficiently protect and recover data across client devices such as workstations and laptops. Datto File Protection safeguards business-critical files, with fully automated service delivery and end-client functionality. Continuous file and folder backup protects business documents against ever-present threats such as human error, hardware failure, ransomware and lost or stolen devices.
  • 9
    ShadowProtect

    ShadowProtect

    StorageCraft Technology

    ...ShadowProtect® backup and disaster recovery software ensures on-prem business systems and data are fully protected and always available. With ShadowProtect, meet or beat your recovery time and recovery point objectives (RTOs and RPOs). Recover files and folders in minutes. Restore failed servers. Use patented VirtualBoot technology to instantly boot a backup image into a virtual machine. ShadowProtect image-based backups arm you with multiple ways to recover. Grab a missing file, restore an entire data volume, or restore a failed server’s system to a new physical or virtual machine with no headaches (P2P, P2V, V2P, V2V). ...
  • 10
    Acronis Disaster Recovery Service
    Acronis Disaster Recovery Service is a complete IT business continuity solution that protects, and restores data, servers, or entire data centers suffering from a natural or man-made disaster. It will back up and replicate your systems into an on-site appliance and Acronis cloud data center. In case of outage, we can recover and restart your systems locally or in our cloud so you can continue providing IT services to your internal and external constituents until you can safely fail back. Acronis Disaster Recovery Service can protect any physical or virtual system in any environment and in any location. Whether you need to recover a single file, a database, or an entire server – it is as easy as a push of a button. ...
  • 11
    SysTools Exchange Log Analyzer
    Provides a save scan option to load the saved exchange log file. Export scanned Exchange files into multiple file formats. Provides support for export as PDF, MSG, EML, and HTML options. Exchange log analyzer provides the option to repair corrupt Exchange log files. Provision to analyze Exchange server log file along with all data items. It does not impose any edb.log file size limitation. EDB file is necessary to analyze and open Exchange log files. Supports various Exchange versions to...
    Starting Price: $29 per month
  • 12
    OSForensics

    OSForensics

    PassMark Software

    Extract forensic data from computers, quicker and easier than ever. Uncover everything hidden inside a PC. Discover relevant data faster through high performance file searching and indexing. Extract passwords, decrypt files and recover deleted files quickly and automatically from Windows, Mac and Linux file systems. Identify evidence and suspicious activity through our hash matching and drive signature analysis features. Identify and analyze all files and even automatically create a timeline of all user activity. 360° Case Management Solution. ...
    Starting Price: $799 per user per year
  • 13
    Protegent Antivirus

    Protegent Antivirus

    Unistal Systems

    A leading Total Security Software with advanced cloud protection technology, provides multiple effective features that not only safeguard against viruses but also from other web based threats. Proactive Data Recovery module, once installed recovers the data against any kind of logical crashes including file deletion, formatted hard drive, deleted partition etc. Data Theft Prevention module to protect your laptop from any kind of file transfer /or theft via any port without your authorization. It helps keeping your personal data safe and secure. A tracking and monitoring tool that captures all activities performed on your laptop or web. ...
    Starting Price: $15 per year
  • 14
    Passware Kit
    Passware Kit Forensic is the complete encrypted electronic evidence discovery solution that reports and decrypts all password-protected items on a computer. The software recognizes 340+ file types and works in batch mode recovering passwords. Analyzes live memory images and hibernation files and extracts encryption keys for hard disks and passwords for Windows & Mac accounts. Passware Bootable Memory Imager acquires memory of Windows, Linux, and Mac computers. Resolved navigation issues after stopping the password recovery process. ...
    Starting Price: $1,195 one-time payment
  • 15
    Advanced PC Cleanup

    Advanced PC Cleanup

    Advanced PC Cleanup

    ...Safeguards your computer from potential malware threats and removes the personal information saved online. Disable startup items and uninstall unwanted apps to enhance PC speed. The scan will show how much storage space can be recovered from deleting all the unused files & old downloads. Clear up the personal information saved on the web browser. Fix all issues such as PC cleanup and boost performance in one click. Remove malware, and adware to save the system from any potential threats to data.
    Starting Price: $30 one-time payment
  • 16
    Redstor

    Redstor

    Redstor

    Smarter cloud backup, with zero hardware required, delivering the broadest coverage of data sources from a single app and lightning-quick recovery of any files on demand. The only cloud-first backup with on-demand recovery of files and databases, in an instant. Redstor’s proprietary InstantData™ technology enables recovering entire systems in moments, with a seamless user experience that allows users to get back to work almost instantly, streaming what they need, when they need it. ...
  • 17
    NovaBACKUP for Servers

    NovaBACKUP for Servers

    NovaBACKUP Corporation

    Protect your business from data loss with fast, affordable Windows Server backup software with full disaster recovery protection plus local and offsite cloud backup storage with support for SQL, Exchange, and virtual machines. Instantly recover your entire system in just minutes and reduce your exposure to critical downtime. Choose from file or image backups with full, differential, and incremental backup modes. Backups utilize up to AES 256-bit & Blowfish encryption to password-protect your backup files from being opened by unauthorized users. NovaBACKUP Server Agent comes with 250 GB of Cloud Storage and Setup Assistance, so you can be sure that the software is configured in the best possible way for your environment. ...
    Starting Price: $399.95 /year
  • 18
    QShield

    QShield

    Quarkslab

    ...Software running on untrusted environments is at risk of reverse-engineering, an application running on a device that is available to an attacker is vulnerable to a wide range of techniques used to try and extract secrets, and intellectual property. To prevent unauthorized parties from gaining insight, tampering with or even recovering the source code from the binary, software protection mechanisms must be implemented to preserve revenues and intellectual property. 30+ obfuscation schemes are available. Granular control of the protection profile thanks to a file-based policy or comments throughout the code. Build diversification, each compiled application is different with a user-controlled randomness seed. ...
  • 19
    Acronis Cyber Protect Home Office
    ...Stop any threat from disrupting your digital life, from disk failure to device loss to the latest cyberattacks — including those never seen before. Back up and recover everything — files, applications, OSes, and the devices they’re on — through an intuitive interface that’s accessible from anywhere. Stop the latest cyberthreats from damaging your data, applications or system. Block attacks in real-time — before malware, ransomware, or cryptojackers can cause damage — thanks to advanced anti-malware technologies powered by artificial intelligence.
    Starting Price: $49.99 per year
  • 20
    Fortect

    Fortect

    Fortect

    Fortect is a comprehensive software designed to boost the performance and security of your PC. It provides real-time malware protection, browsing safety, and system optimization for Windows computers. The platform offers features like proactive protection against ransomware, instant virus scanning, and cloud-based security to detect threats swiftly. Additionally, Fortect helps maintain your computer’s health by repairing missing or damaged system files, optimizing speed, and resolving...
    Starting Price: $33.95/year
  • 21
    Infrascale Cloud Backup
    Infrascale offers an enterprise cloud backup solution which includes Anomaly Detection, to alert you when the number of “new” or “changed” files dramatically changes from established benchmark levels. The Anomaly Detection feature provides an important early warning system to quickly isolate a ransomware infection and allow you to recover important data before the entire network is frozen. Infrascale understands that backup and recovery of mission-critical data is of utmost importance. ...
  • 22
    BlackBerry Guard
    ...BlackBerry's 5th generation native AI platform stops zero-day payloads, polymorphic malware, APTs, and both file-based and fileless threats with proven 99.1% efficacy.
  • 23
    N2WS Backup & Recovery
    ...Award-winning backup and recovery with intelligent data lifecycle management, built for enterprises in AWS Cloud. Flexible policies and schedules (including backup for Amazon S3). Restore individual files and folders, or entire volumes and instances. Get application-consistent backups for your databases in AWS. All paid plans come with technical support from our in-house team. Recover from any outage or failure with 1-click and restore in 30 seconds. Schedule automated DR drills the same way you’d schedule a policy. Keep backups in a separate region for maximum data protection. ...
    Starting Price: $5 per instance per month
  • 24
    Rubrik

    Rubrik

    Rubrik

    ...Archive your data to your public cloud provider’s blob storage service. Quickly access archived data with real-time predictive search. Search across your entire environment, down to the file level, and select the right point in time to recover. Reduce recovery time from days and weeks to hours or less. Rubrik and Microsoft have joined forces to help you build a cyber-resilient business. Reduce the risk of backup data breach, loss, or theft by storing immutable copies of your data in a Rubrik-hosted cloud environment, isolated from your core workloads.
  • 25
    Datto SaaS Protection

    Datto SaaS Protection

    Datto, a Kaseya company

    Reliably and securely backup Microsoft 365 and Google Workspace (formerly G Suite) to ensure critical programs used for business, email and docs are protected from every day downtime events and cyber threats. Datto SaaS Protection is a cloud-to-cloud backup solution built exclusively for MSPs, protecting thousands of businesses today. Datto SaaS Protection offers comprehensive backup, recovery and overall cyber resiliency for critical cloud data that lives in Microsoft 365 and Google...
  • 26
    Commvault Cloud
    Commvault Cloud is a comprehensive cyber resilience platform designed to protect, manage, and recover data across diverse IT environments, including on-premises, cloud, and SaaS applications. Powered by Metallic AI, it offers advanced features such as AI-driven threat detection, automated compliance tools, and rapid recovery capabilities like Cleanroom Recovery and Cloudburst Recovery. The platform ensures continuous data security through proactive risk scanning, threat hunting, and cyber...
  • Previous
  • You're on page 1
  • Next