Prometric Lockdown


Advertisement

Indigo Secure Lite  v.1.0

It can be configured for security and lockdown, user management, remote access, firewall and packet filtering, stock control modules, finance and mortgage modules, diary and task management, reservations, call management and human resources.

Quick File Locker  v.1.0

Do you want to protect private pictures, hide sensitive videos or lockdown documents ? Do you want to ensure your privacy by locking, hiding and encrypting sensitive data ?

Then this free application is for you.

Quick File Locker ...





Advertisement

KidRocket Web Browser - Kids Browser

Password-protected lockdown mode and Parental Admin Area, Art section Sketchpad Paint activity, Games, offline Math Flashcards for addition, subtraction, multiplication and division. Internet Filter, Web Blocker ...

DeviceLock

DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire drives, Bluetooth, ZIPs, etc.) on a local computer. Once DeviceLock is installed, ...

Plax Network Suite  v.4.0.5



Just in case you need and instant internet lockdown, Plax Network Suite offers the possibility to block all internet connections by the flick of a button. This works like an Internet shield preventing any spyware reaching your computer.

Whenever ...

Automatically Lock Computer Software  v.7.0

This software offers a solution to users who want to automatically lock a computer at specific intervals. The user enters a username and password for unlocking the system and then chooses the required interval from a list: 30 seconds, 1 minute, 5 minutes, ...

My Endpoint Protector  v.3.0.8.9

My Endpoint Protector provides device control and data loss prevention to everyone who want to centrally manage and control the use of USB, FireWire and other ports and portable storage device use. It works for PC and Mac OS X. Free for personal use.

Endpoint Protector Basic  v.1.0.3.2

To protect your PC, we recommend to use Endpoint Protector Basic to monitor and control ports and interfaces such as USB, FireWire, card reader, CD / DVD, etc on your PC. This will protect them against unwanted use of portable storage devices like USB ...

HealthUse  v.1.0

HealthUse is a reliable program that enables you to restrict the computer access for children or other users. The software can lock the computer if one of the specified users logs in during the unauthorised time. The administrator can unlock the computer ...

Respondus  v.4.0.1

Respondus is a powerful tool for creating and managing exams that can be printed to paper or published directly to Blackboard, ANGEL, Desire2Learn, eCollege, Moodle, and other eLearning systems.

Exams can be created offline using a familiar ...

Cybera Server  v.1.9.0.300

Features include workstation control, user rights lockdown, accounting, stats and screen replication for CAI.

Cybera controls the access to the workstations and permits customers to use them in several different ways :

- Prepaid ...

Cisco Configuration Professional  v.2 5

CCP also offers a one-click router lockdown and an innovative security auditing capability to check and recommend changes to router configuration based on Cisco TAC recommendations.

Main features:

- One-click router lockdown
...

Secure it Easy  v.1.1.5.5

Gives the administrator the ability to authorize the use of devices. These Authorized Devices are also called Trusted Devices. By authorizing a device a user will be allowed to use only this particular device. Any other portable storage device connected ...

GiliSoft Exe Lock  v.2 2

GiliSoft Exe Lock can lock any executable programs on your local computer, a person
can not run the locked programs without a password. If you do don't want other persons to use your tax preparation software, personal finance or other programs you ...

DeviceLock Service  v.7. 1. 2004

The data you are striving to protect behind firewalls and passwords is likely still slipping through your fingers. Data leaks can be initiated by either unwitting employees or users with malicious intent copying proprietary or sensitive information from ...

Pages : < 1 | 2
Newest Reviews