New Corporate Security Software for Windows Vista
Secure your endpoint PCs with avast! Endpoint Protection Plus, designed with a firewall and anti-spam to be the most intuitive, worry-free, and efficient security solution for SOHO networks of up to 199 computers and no server.
Your business gets...
SpectraByte Anti-Executable Security is an essential tool especially made
to enforce Parental Control and Security Policy Administration that suites
the security need of Networked/Workgroup Computers such as School Computer
laboratories, Cyber Cafes,...
This is a simple tool which reads a targets sitemap.xml file, dumps all the elements (URL's) and displays them in a GUI of which all the links can be clicked and navigated. This is a more elegant and practical way of mapping out a web server. Doing so...
EmiliOSE by AutumnTECH is a self-contained e-mail messaging server appliance built to effectively block e-mail spam and viruses before it reaches your production e-mail server.
EmiliOSE by AutumnTECH is delivered in ISO CD-ROM format for installing on...
Spector 360 active monitoring allows you to record, alert on, review and report employee computer and network activity such as IM/chat, emails sent and received, websites visited, web searches, applications used and files transferred or printed. Alerts...
Malicious File Hunter software lets you remotely search for any malware file(s) on any Windows computer on your network simply using file names. While other security tools scan files with definitions, heuristics and match them against one or multiple...
This is a computer based security software that helps computer administrators and Guidance to help keep their computers safe from users and also prevent users or children from performing activities that are not permitted by the administrator. Consider...
Perform logical and physical forensic extractions of mobile phone & device data such as iPhone, iPads, Androids, BlackBerry, & more. Forensically acquire user data such as contacts, call logs, SMS, MMS, pictures, videos, and much more. Recovers deleted...
P2 Commander is a fully automated computer forensic analysis tool designed to forensically analyze computer data. With a focus on email and network e-mail analysis, internet history analysis, chat log analysis, data triage, deleted data recovery, file...
FormosaAuditor Vulnerability Management is a highly secure, centrally managed security vulnerability platform that scans networks and highlights security vulnerabilities. the functions include network scanning, vulnerabilities evaluation, centralized risk...