Misc. Network Security Tools

Last Updated on 24 June 2013, Total: 61 Products

Network Security Tools

  1. Featured

    Netwrix Auditor – User Session Activity

    Netwrix Auditor acts like a surveillance camera for your servers, recording all user activity for later review. The product records dynamic screen activity, providing essential auditing visibility to critical applications that are not accessible through traditional event-log-based auditing solutions. Netwrix VideoScape playback technology lets you jump to a specific activity and watch the actual actions performed as if you were... Read More

  2. Netwrix Desktop Password Reset

    Gives users the ability to securely manage their local computer passwords and resolve account lockouts in a self-service fashion, without gaining privileged access to computers. The product provides secure password management for computers in disconnected workgroup environments, such as laptops that are not members of the domain... Read More

  3. Netwrix Password Manager

    Gives end users the ability to securely manage their passwords and resolve account lockout incidents in a self-service fashion without involvement of helpdesk personnel. This allows organizations to implement strong password policies in Active Directory environments, to meet regulatory compliance requirements and address identity management challenges... Read More

  4. GFI EndPointSecurity

    GFI EndPointSecurity lets you control entry and exit of data via portable storage devices, allowing you to prevent users from taking confidential data or introducing viruses and trojans to your network. GFI EndPointSecurity allows you to actively manage user access to media players (including iPod and Creative Zen), USB sticks, memory cards and more. GFI EndPointSecurity allows administrators to actively... Read More

  5. eIQnetworks SecureVue

    eIQ's SecureVue, a true Unified Situational Awareness solution can address these challenges. It provides an accurate, timely and coherent view of threat, risk and compliance. SecureVue delivers Unified Situational Awareness by combining Next Gen SIEM, Secure Configuration Audit, Compliance Automation and Contextual Forensic Analysis, through a single console yielding a unified view, operational efficiency and lower TCO... Read More

  6. UserLock

    Logins are the first line of defense for your network. UserLock provides and enforces granular rules and policies to control and secure network access. UserLock allows you to limit or prevent concurrent logins on your Windows network. You can control interactive sessions, RAS sessions, IIS sessions and set limitations per user, user group, organizational unit. UserLock also allows you to... Read More

  7. FileAudit

    FileAudit is a solution to audit, monitor and archive all access to sensitive files and folders of your Windows server. With a right click in the Windows Explorer or from the FileAudit console, you get a history, which can be filtered based on status (granted, rejected), access type (red, write, delete, permissions, ownership), by user and event time. You can... Read More

  8. SharePoint Column Permission

    SharePoint Column Permission assigns users or groups read/edit permissions to list columns. SharePoint default permission setting does not define column permissions. SharePoint Permission Boost controls column permissions by overwriting some control templates... Read More

  9. Hide Folders 2009

    Hide Folders 2009 effectively protects your data by hiding and locking your secret files. It allows you to set different protection (hide, lock, read-only) for your files and folders and protect them with a password. The program comes with smooth graphical user interface with visual styles support and extremely easy in use. You will get several ways to control the... Read More

  10. Indigo Scape Enterprise

    Indigo Scape Enterprise is an Internet Management and Security Software System for Microsoft Windows platforms. Indigo Scape features sophisticated Internet Filtering, Content Control, Acceptable Use Policies and Reporting allowing you to Monitor, Control and Restrict Access to all resources on the Internet... Read More

Featured Links