P2 Commander is a fully automated computer forensic analysis tool designed to forensically analyze computer data. With a focus on email and network e-mail analysis, internet history analysis, chat log analysis, data triage, deleted data recovery, file...

TekTape

TekTape 2.4.3 updated

TekTape is an audio recorder and call detail records (CDR) generator runs under Windows (Vista, Windows 7/8/10, 2008-2019 Server). Visit https://www.kaplansoft.com/TekTape/ regularly for updates. Major features; Simple, easy to use interface....

Spector 360 active monitoring allows you to record, alert on, review and report employee computer and network activity such as IM/chat, emails sent and received, websites visited, web searches, applications used and files transferred or printed. Alerts...

PhoneSweep

PhoneSweep 5.4 build 784

Released in 2006, PhoneSweep 5.4 is the latest version of our commercial telephone line scanning tool. PhoneSweep permits you to dial telephone numbers under your control and identify systems (phone, fax, modem) so dialed. Useful for organizations with...

ISMS-RAT

ISMS-RAT 1.02

This tool handholds the information security professional to build ISMS into their organization. This tool is based on ISO 27001 and has the capability of executing Risk assesment/Risk Treatment (RA/RTP), automated SOA preparation, procedure/policies...

WebTimer

WebTimer 3.6

WebTimer is a powerful tool for managing corporate internet access, helping your company to save valuable time and money. WebTimer is an Microsoft ISA/Proxy Server filter which gives users a maximum time which they can spend on the internet. Users who are...

ModusGate

ModusGate 5.0

Complete email security and spam protection in a standalone gateway software for Windows. modusGate provides your organization with the tools to effectively counter security threats such as spam, viruses, fraud, phishing, botnets and other unauthorized...

Vanguard

Vanguard 15.02

Vanguard integrates well into existing infrastructures and can be run 'out of the box' or configured to meet your specific company requirements. Dual Anti Virus scanning engines provide traditional signature based scanning together with advanced, leading...