Archive Security Logs


Advertisement

USB Security Enterprise  v.1 9

USB Security runs completely in background, invisible and undetectable to PC users. No pop-up windows and warning messages unless explicitly configured. Running unnoticed, USB Security logs all attempts to connect authorized and disallowed USB devices, ...

USB Security Application  v.2 5

Prevent unauthorized USB devices from being connected to your PC! USB Security blocks unauthorized USB devices such as memory card readers and USB flash drives, removable storage and USB hard disks while allowing devices such as keyboards, mice and printers ...





Advertisement

XLog-Solution  v.0.2.1

Whether your log data is generated by security system, syslog, Windows Event Log, web server or any kind of software or service, you will be able to search, analyze and troubleshoot from a single place. This product monitor all your logs and alert you ...

PC Network EventLog Scanner  v.2.15.56.110

PC Network EventLog Scanner is a program that allows you to scan your network computers for all types of eventlogs added, including eventlog data from 'application', 'security', ' system' and other custom added eventlog criteria available in Microsoft ...

NetWrix Active Directory Change  v.6.0.188

One single change can put your organization at risk, introducing security breaches and compliance issues. Built-in Active Directory auditing lacks many important features and doesn't have reporting capabilities. Careful analysis of multi-megabyte Security ...

Event Log Management  v.12.10.01

Event log management is a comprehensive process that entails gathering event logs from specific system on a network, analyzing all collected Windows and W3 Event logs, archiving Event logs in a centralized network location. For efficient administration ...

Microsoft System Center Operations Manager  v.2012 RC

Audit Collection
Operations Manager has the capability to securely and efficiently extract and collect security logs from Windows operating systems and store them for later analysis and reporting.10. Improved User Interfaces and Designers
Operations ...

Corner Bowl Server Manager 64-bit  v.12.0.0.539

Corner Bowl Server Manager 64-bit is an affordable enterprise Event Log Management and Server Monitoring software suite enabling both large enterprise and small business IT professionals to proactively monitor and manage their networks, fulfill PCI DSS and HIPAA compliance requirements, consolidate and archive Event Logs, includes ...

Netwrix Active Directory Change Reporter  v.7.508.873

One single change can put your organization at risk, introducing security breaches and compliance issues. Built-in Active Directory auditing lacks many important features and doesn't have reporting capabilities. Careful analysis of multi-megabyte Security ...

Windows Server 2008 Auditing  v.12.10.01

Administrator need to analyze Windows security logs every time to ascertain the Active Directory status. LepideAuditor for Active Directory has been designed to monitor every changes in the Active Directory structure. It monitors every change that user ...

Netwrix Change Notifier for Active Directory  v.7.519.873

One single change can put your organization at risk, introducing security breaches and compliance issues. Built-in Active Directory auditing lacks many important features and doesn't have reporting capabilities. Careful analysis of multi-megabyte Security ...

Xidie Security Suite

Xidie security suite is one of the top software steganography and encryption tools that include facility like: compressed archives (including Zip format), encryption, steganography with over 40 carrier types, Secure file deletion, and other components ...

Genie Archive for Outlook

Genie Archive for Outlook will take on the needs of the demanding industry and provide a solution for all your business needs providing you with a simple yet speedy and secure way for archiving, searching, and extracting e-mail. It works silently when ...

Perfect Security Icons  v.2015.1

Perfect Security Icons is a collection of royalty-free stock icons for use in commercial and personal products, including software applications, websites, blogs, and presentations.

The icons have been carefully created pixel by pixel by professional ...

Elcomsoft Wireless Security Auditor

Audit security of your wireless networks and recover WPA/WPA2 passwords with Elcomsoft Wireless Security Auditor. In addition to the CPU-only mode, the new wireless password recovery tool features a patent-pending GPU acceleration technology to speed ...

Pages : 1 | 2 >
Newest Reviews