Software

View All RSS Feed

Last Updated on 16 Feb. 2015, Total: 432 Products

30 Anti Virus 16 Feb. 2015
14 Authentication / Smart cards 30 Jan. 2015
23 Email Anti-Virus 30 June 2014
16 Email Content Security 19 Dec. 2014
14 Email Encryption 12 Feb. 2014
22 Encryption 16 Sept. 2014
12 Endpoint Security 30 Sept. 2014
25 Event Log Monitoring 20 Jan. 2015
8 File integrity checkers 19 Dec. 2014
10 Firewall security log analyzers 20 March 2014
24 Firewalls 12 Jan. 2015
15 Free Tools 2 Oct. 2014
14 Group Policy Management 19 Dec. 2014
9 Intrusion Detection 25 Feb. 2014
59 Misc. Network Security Tools 19 Dec. 2014
12 Network Access Control 28 July 2014
52 Network Auditing 20 Jan. 2015
18 Patch Management 29 Aug. 2014
20 Security Scanners 3 Nov. 2014
10 VPNs 5 Dec. 2014
10 Web Application Security 12 Jan. 2015
15 Web Content Security 3 Feb. 2015
  1. Trend Micro ServerProtect

    Trend Micro ServerProtect for Microsoft Windows and Novell NetWare scans, detects and removes virus from files and compressed files in real time. ServerProtect delivers 24x7 antivirus support and protection with automatic, incremental virus updates. Centralized management of servers via a Web-based console simplifies network protection... Read More

  2. F-Secure Security for Virtual & Cloud Environments

    Designed to protect the modern business culture, Security for Virtual and Cloud Environments brings ultimate, incorporated protection for all virtual environments. It lets you stay in the center of your IT and manage clouds virtually without hassle. Security for Virtual and Cloud Environments offers security for public and private cloud solutions, virtual servers and virtual desktops (VDI)... Read More

  3. Kaspersky Endpoint Security

    Kaspersky Endpoint Security for Business ADVANCED delivers Kaspersky Lab’s award-winning anti-malware technologies plus a host of other security functions – so your business benefits from multi-layer defences. Vulnerability scanning and patch management technologies help to eradicate vulnerabilities within your operating systems and application software, while data encryption helps to safeguard confidential business information if a laptop is lost or unauthorised... Read More

  4. GFI WebMonitor

    GFI WebMonitor allows IT administrators to control internet access, reports on users' website browsing habits and downloads, while providing web security features such as antivirus and malware protection in real-time for SMEs, using multiple antivirus engines. GFI WebMonitor enables businesses to improve employee productivity and reduce cyber-slacking. Its reporting capabilities allow companies to effectively enforce an Internet usage policy because... Read More

  5. GFI WebMonitor

    GFI WebMonitor allows IT administrators to control internet access, reports on users' website browsing habits and downloads, while providing web security features such as antivirus and malware protection in real-time for SMEs, using multiple antivirus engines. GFI WebMonitor enables businesses to improve employee productivity and reduce cyber-slacking. Its reporting capabilities allow companies to effectively enforce an Internet usage policy because... Read More

  6. Entrust IdentityGuard

    Entrust IdentityGuard is a risk-based strong authentication platform that enables you to layer security across your diverse users, transactions and applications. It is a common sense approach to strong authentication that enables you to apply the right level of strong authentication tailored to the risk associated with the transaction that the user is performing... Read More

  7. Authenex Powerful Authentication Server

    The APAS Milestone is the new generation authentication server which combines One-Time Password (OTP) with other user authentication requirements to provide two-factor authentication for secure LAN, remote, Outlook Web Access (OWA) and web access. Milestone can be linked with different directory servers such as Microsoft Active Directory, Open LDAP and even Oracle databases to implement any type of strong user... Read More

  8. RSA SecurID

    RSA SecurID® two-factor authentication is based on something you know (a password or PIN) and something you have (an authenticator)—providing a much more reliable level of user authentication than reusable passwords... Read More

  9. LepideAuditor Suite

    LepideAuditor Suite is a complete configuration change auditing solution from Lepide Software. It audits Active Directory, Group Policy Objects (GPO), Exchange Server, SQL Server and SharePoint. The best part about software is that all modules are available on a single console yet their licenses can be purchased separately giving you the freedom of purchase-as-per-use policy yet seamlessly integrating different components... Read More

  10. LepideAuditor for File Server

    LepideAuditor for File Server is a complete change auditing solution to audit all changes to files, folders, permissions, and shared resources on File Servers. To meet audit compliance such as HIPAA, SOX, PCI DSS, GLBA, FISMA, etc. and ensure security of all File Servers in the network, it tracks all events such as editing, sharing, reading, creating, renaming, deleting, moving... Read More

Featured Links