Compare more security software in this current market overview. The solutions listed here are suitable, for example, for IT vulnerability analyses, software-supported IT emergency planning and can prevent the execution of unwanted macros. Certain solutions can also be used for complete and immediate recovery of computer workstations. However, security software is not only used to restore data or PCs, but is also needed for complete deletion as part of IT security. Besides deleting files and hard disks, the software can also be used to securely remove Internet traces, temporary files or forensic traces.