Must have Corporate Security Software for Windows
1st Security Center is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables you to impose a variety of access restrictions to protect...
5nine Security for Hyper-V Free provides a comprehensive host-based / agentless security solution for virtual machines running on Hyper-V hosts including: Windows Server 2012/2012 R2, Windows 8.x Thanks to its innovative agentless design, which installs...
With abylon LOGON you can protect your computer against illegal access in a comfortable. You only need to train your smart card, your USB-Stick or a CD or DVD with your windows login data, and in the future this medium is your authentication for the...
Abylon LOGON protects your computer against illegal access in a comfortable kind. You need only to train a smart card, and removable media (e. g. memory stick) or a CD with your windows login data. In future you need only this physical key for the login...
Abylon LOGON protects your computer against illegal access in a comfortable kind. You need only to train a smart card, and removable media (e. g. memory stick) or a CD with your windows login data. In future you need only this physical key for the login...
With an increasing popularity of portable storage devices, theft of proprietary data is becoming a growing security challenge in today's computing environments. Portable devices also provide an easy entryway for infecting systems with viruses, spyware,...
AccessPatrol is a proactive solution for securing company endpoints to prevent the illicit transfer of data and download of malware from unauthorized devices, resulting in an increase of network security for businesses of all sizes. Control what...
The Acoustic program is created as signalling noise system for any rooms. It can be used as audio security system, which call an appropriate macro in case of exceeding an acoustic signal set level at the controlled objects.
Acoustic program...
Install AD Collector on a server on your network and configure your Active Directory to run our login script and AD Collector will start recording information about your network in a MySQL database including: Logins, Logouts, Software installed on...
Active Directory (AD) is the backbone infrastructure for critical enterprise identity management and messaging services, and its availability and security must be assured. Windows native tools lack flexibility, automation and do not scale well in...