Corporate Security Strategy


Advertisement

Safe n Sec Corporate  v.2.0

New generation of corporate security safensoft systems providing computer networks protection from all type of malware, intrusions and insiders. The solution protects from inside attacks based on mass malicious code usage, specially developed program ...

Document Trace Remover

Protect your privacy and corporate security by automatically cleaning all types of meta-information in Microsoft Office documents. Document Trace Remover discovers all types of meta-information and offers you an easy way to remove any instances of hidden ...





Advertisement

IDpack Plus  v.7 1

It allows you to design and produce photo ID cards, badges, labels and nametags for all kinds of uses: employees, schools, libraries, membership, corporate security cards, convention cards and all other needs. There is no need to buy expensive ID card-making ...

AlertMobile Pro

AlertMobile is a special software for computer security incidents response.
It monitors all attempts of unauthorized computer activity, sends SMS alerts
to mobile device, receives and handles response commands.
AlertMobile can be used by ...

SecrecyKeeper

SecrecyKeeper allows grouping data stored on workstations and servers by information security level and defines users that may access the information by users access level. SecrecyKeeper will help you prevent both accidental data leakage and intentional ...

Professional Audit Expander  v.3.0

Professional Audit Expander™ (PAE) is a powerful tool designed to analyse and audit the security and the configuration of your entire Microsoft© Windows NT/2000/2003/XP networks.

Professional Audit Expander is the only solution that allows ...

ESET Remote Administrator Server  v.3.0.153

ESET Remote Administrator lets you manage ESET Smart Security, ESET NOD32 Antivirus, and ESET server security solutions across your business network - whether large or small - effectively and efficiently.
Oversee your entire network of workstations ...

ESET Remote Administrator Console  v.4.0.138.21

With ESET Remote Administrator's built-
in task management system, you can install ESET security solutions on remote computers and quickly respond to new
problems and threats.

Intrusion Detection System - Sax2  v.4 7



With insight into all operations in your network, Sax2 makes it easy to isolate and solve your network security problems - detect network vulnerabilities, identify network security threats, catch actions against of security strategy and signs ...

PDFapps PDF Manager  v.2.0



It helps with the problem facing many content providers who publish using the PDF medium:

Can I create a report of all published PDFs?
Do I know what private, confidential or sensitive information is hidden in my PDFs?
Do my published PDFs conform to the information security policy?
Do ...

Bond Disc  v.1.0.0.0

On the other hand the data needed to be perfectly secure without requiring us to spend millions on corporate security as the large corporations do to protect their assets. Critical for us, and the reason to develop Bond Disc, is the combination of four ...

BVRP Connection Manager Pro  v.1.0

Automatically detects available networks and automates the creation and management of connection and security settings. Allows laptop users seamless migration between LAN or wireless networks with VPN connection support. Connection Manager Pro also enables ...

Sax2 Intrusion detection system(Free)  v.4 6



With insight into all operations in your network, Sax2 makes it easy to isolate and solve your network security problems - detect network vulnerabilities, identify network security threats, catch actions against of security strategy and signs ...

Safe AutoLogon  v.4.1.1265

It has many security options, including centralized password management!Safe AutoLogon allows your Windows 2000/XP/MCE/Vista/2003 computers to automatically logon when the computer is restarted or powered on. The logon password is always safely stored ...

Sax2 Free  v.4.60 Build 1.0.0.123

The New Components of the System Architecture
The system is composed of several modules: packets capturing, protocol analysis, matching rules, comprehensive diagnosis, incident response, security policy management, saving log and results display.

Pages : 1 | 2 >
Newest Reviews