Security Audit Sap


Advertisement

WPSecurity  v.1.21



Features



Perform security audit with just 1 click!
Test your system against 27 scientifically proven most dangerous WordPress vulnerabilities
All tests contain form to solve the problem, or a tip ...

Karalon - Traffic IQ Basic  v.1.0.223

idappcom's Traffic IQ Basic solution has been specifically designed for use by security vendors and their sales engineers to accurately demonstrate the technical capabilities of their products and devices in a controlled, reliable and predictable manor.





Advertisement

Intensive Care Utilities  v.4.20.04082

Intensive Care Utilities protects domains and servers by automatically capturing all security information (SAM) into human readable text files. Network administrators can quickly diagnose the health of their environment and make necessary changes, including ...

Account Reset Console  v.2.50.05040

This same database can be accessed by program administrators within your company to view the audit trail of program usage. This same information can be provided to your information security department as well as to external auditors should they need ...

IPNetMon  v.1.0

If any new combination is detected it is logged to a database and in addition an Email can be sent via SMTP to the network manager or security staff. You can print reports directly to PDF or Excel. IPNetMon can be used to determine the active IP devices ...

Nessus for Windows  v.5.0.1

The Nessus vulnerability scanner is the world-leader in active scanners, featuring high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed ...

JiJi Account Lockout Tool  v.2.5.0.1

Account Lockout and Management Tools will Audit Account Management Computer, Audit Account Management Policy, Audit Account Management Security. Easy to use Account Lockout Policy Security Configuration. Security Audit Policy helps to prevent Active ...

Secure Auditor  v.3.0

It provides security tools and utilities for asset identification, compliance auditing, penetration testing and forensic analysis like PCI Compliance Check, HIPAA Compliance Check, password auditor, event log viewer, access rights auditor and SNMP scanners ...

Nessus  v.4. 4. 2001

With more than five million downloads to-date, Nessus features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners may be distributed throughout an ...

Snare  v.4.0.0.2



Event logs from the Security, Application and System logs, as well as the new DNS, File Replication Service, and Active Directory logs are supported. The supported version of the agent also accommodates custom Windows event logs. Log data ...

Password Recovery Console  v.2.52.05050

In addition to Domain or Active Directory security, each Windows desktop and server system in the company also has local security; this means that every system has a local Administrator account that allows access to that system, and potentially exposes ...

Admin Report Kit for Active Directory (ARKAD)  v.8.4

The reports are presented in a variety of formats that are simple, elegant and highly customizable for System Administrators, IT infrastructure Managers and Systems Audit personnel to use and act on. ARKAD's basket of Built-in reports provide powerful, ...

Dr.Web for Android  v.12.6.4

Protection components: anti-virus, anti-spam, anti-theft, firewall, URL filter, Security Auditor. The users of Dr.Web Security Space or Dr.Web Anti-virus are entitled to use Dr.Web for Android FREE OF CHARGE.
Features
Performs a quick ...

NVIDIA nTune  v.2011.7

SIW can create a report file (CSV, HTML, TXT or XML), and is able to run in batch mode (for PC Software and Hardware Inventory, Asset Inventory, Software License Management, Security Audit, Server Configuration Management).

COM+ Manager  v.1.14.04090

With COM+ Manager, administrators now have the ability to see and manage all of the identity information on all of their components/systems in a single view. They can see the places an identity is used on all systems and then change it in a single operation, ...

Pages : < 1 | 2
Newest Reviews