It Security Policy
TunnelEx is innovative software designed to redirect data removing all the obstacles that can be thrown in its way, bypass firewalls and any restrictions imposed by the local security policy. TunnelEx possesses a unique combination of features that support different data transfer protocols and...
|License: Shareware||Cost: $34.00 USD||Size: 3 MB||Download (512): TunnelEx Download|
Malicious File Hunter is a security software that runs on Windows and allows IT Security Administrators to search for the presence of one or multiple files across their entire network of Windows systems. For example, if a known malicious file is found on one computer, an IT Administrator can use...
Platforms: Windows, Windows 7, Windows Server
|License: Demo||Cost: $130.00 USD||Size: 4 MB||Download (17): Malicious File Hunter Download|
Solution that provides reports about the state of enterprise IT-infrastructure, security audits, inventory of hardware and software, and preparation for migration and upgrade. The product's historical and statistical reports allow changes in infrastructure to be clearly presented and evaluated,...
|License: Shareware||Cost: $499.00 USD||Size: 25.42 MB||Download (170): MAPILab Reports Download|
Comodo Endpoint Security Manager BE (ESM BE) centrally manages the deployment of award-winning Comodo Internet Security (CIS) software that protects desktops and servers your business relies on. Offering unbeatable protection against internal and external threats, the Business Edition is...
|License: Demo||Cost: $0.00 USD||Size: 42.31 MB||Download (80): Comodo Endpoint Security Manager Business Edition Download|
Audit security of your wireless networks and recover WPA/WPA2 passwords with Elcomsoft Wireless Security Auditor. In addition to the CPU-only mode, the new wireless password recovery tool features a patent-pending GPU acceleration technology to speed up password recovery if compatible NVIDIA or...
|License: Shareware||Cost: $1199.00 USD||Size: 2.59 MB||Download (478): Elcomsoft Wireless Security Auditor Download|
Local Account Manager is a tool you can use to manage local user and group accounts. With Local Account Manager you can easily add, modify, delete users and groups (manage security accounts), change account properties, assign user rights and privileges on Windows XP Home like within Windows XP...
|License: Shareware||Cost: $19.95 USD||Size: 533.3 KB||Download (109): Local Account Manager Download|
Secure Windows Auditor (SWA)
A must have windows security software for information security professionals to conduct in-depth security auditing and risk assessments of network-based windows systems. Regulatory compliance and the latest network auditing tools, all come as a package with this...
Platforms: Windows, Windows 7, Windows Server
|License: Demo||Cost: $20.00 USD||Size: 313.85 MB||Download (74): Secure Windows Auditor Download|
Every day we trust our personal files to a computer. Most of us store various bits of personal or business-critical information on our hard drives. If you share your computer with co-workers, children, or a spouse, or your computer is always connected to the Internet, your private files are under...
|License: Shareware||Cost: $29.95 USD||Size: 1.21 MB||Download (461): Hide Folders XP Download|
Desktop Orbiter is a comprehensive, easy-to-use, computer security administration solution. With Desktop Orbiter, protecting multiple local and remote machines is a matter of a point-and-click procedure. Security features include a suit of powerful desktop security settings, and filtering...
|License: Shareware||Cost: $59.00 USD||Size: 4.32 MB||Download (90): Desktop Orbiter Download|
Secure Bytes provides Secure Cisco Auditor, which is a state of the art Next Generation network security auditing software for Cisco firewalls, routers and switches along with different Router audit tools and Network security Software.
Secure Cisco Auditor (SCA) is the most advanced user...
Platforms: Windows, Windows Server
|License: Demo||Cost: $30.00 USD||Size: 315.34 MB||Download (135): Secure Cisco Auditor Download|
The AirStop Multiport client controls communiations adapters on laptop computers. This prevents a number of potential attacks such as wireless bridging and unauthorized wireless device access. Unique features include full lock-down, enforcement of security policy through definition of adapter...
|License: Commercial||Cost: $30.00 USD||Size: 3.3 MB||Download (61): AirStop Multiport Download|
Problems with static passwords as a security measure are too numerous to list - hacked passwords have been used to gain access to some of the world s most sensitive networks. And, with cyber-crime and identity theft becoming the domain of organized crime, the need for a strong...
|License: Demo||Cost: $0.00 USD||Size: 187 MB||Download (35): CRYPTO-Server Download|
A easy way to build private cloud!
Easy to restrict employee access to confidential information.
Easy to restrict the employee to internal or external web access.
Video capture and playback of all user activity within each session.
Know precisely what users did, including applications...
Platforms: Windows 7, Windows Server, Other
|License: Demo||Cost: $0.00 USD||Size: 4.15 MB||Download (16): TSAdmin Download|
e/pop is a complete, fast and secure instant messenger for the office. It includes IM, chat, voice conferencing, application sharing, status messages, out-of-the-office indicators, presence, file attachments, RSA security and help desk remote control. Network administrators can centrally manage...
|License: Commercial||Cost: $124.75 USD||Size: 4.15 MB||Download (2989): e/pop Download|
Acquaint yourself with the ISO 17799 / BS7799 standard and address key information security issues using Callio Toolkit 17799. This toolkit is comprised of a series of documents, tools, and other items brought together with the sole purpose of helping you understand the standard and enabling you...
|License: Demo||Cost: $295.00 USD||Size: 2.2 MB||Download (119): Callio Toolkit 17799 Download|
Machonist is a static disassembler of PPC code for Mac OS X. This software is still at alpha stage.There are many cases in which a disassembler comes in handy:To examine foreign code you do not trust: Reveal and reverse engineer potential malware like viruses, worms, trojans and adware.Using...
|License: Demo||Cost: $0.00 USD||Download (137): Machonist Download|
SharePoint Reports generated using Vyapin’s SharePoint Farm Reporter (formerly known as ARK for SharePoint 2010 / 2007) provides you a comprehensive SharePoint reporting solution, covering all aspects of Microsoft SharePoint Server 2013, Microsoft SharePoint Foundation 2013, Microsoft...
|License: Commercial||Cost: $1499.00 USD||Size: 30.08 MB||Download (145): SharePoint Farm Reporter Download|
Server Genius is the easiest reporting solution to set up on your Remote Desktop services server(s). Server Genius monitors, records and analyzes users activity in every application, over Remote Desktop and Terminal Services connection method. With session recording, Server Genius records all...
Platforms: Windows, Windows 8, Windows 7, Windows Server
|License: Demo||Cost: $275.00 USD||Size: 3.67 MB||Download (834): Server Genius Download|
Cyber crime PDF master password. Remove all limitations from your PDF file also Adobe digital rights management (DRM) and AES 256!
pdf-Recover disables restricted operations on PDF files instantly. It removes the master password and security settings with one click. If you can´t remember...
Platforms: Mac, *nix, Windows 8, Windows 7, Windows, Windows Server, Java
|License: Commercial||Cost: $24.89 USD||Size: 24.92 MB||Download (1130): PDF-Recover Download|
Group Policy auditing is an essential process in providing enterprise security for all organizations relying on Group Policy infrastructure, because even small unwanted changes to security policies can impose major security and compliance risks for an IT infrastructure. NetWrix SCOM Management...
|License: Commercial||Cost: $0.00 USD||Size: 78 KB||Download (27): NetWrix SCOM Management Pack for Group Policy Change Reporter Download|