Utilities & Tools|
Utilities & Tools
(Showing headlines 1621 - 1640) << 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 ...
Software allows hardware independent data restoration.
StorageCraft Technology Corp. - ShadowStor
Draper, UT 84020
Oct 24, 2007
ShadowProtect Server Edition v3.0 and ShadowProtect Desktop Edition v3.0 include hardware independent restoration, allowing IT administrators to backup, restore or migrate server, desktop, and laptop systems to any environment, whether physical or virtual. ShadowProtect can migrate to new systems: from physical machine to another physical machine, physical to virtual machine, virtual machine to another virtual machine, or from virtual machine to physical machine.
Software monitors what user is doing online and offline.
Clarisoft Technologies, LLC
Portland, ME 04102
Oct 24, 2007
Providing digital surveillance for computer, iMonitorPC v2.2.1 records user's activity such as programs used, websites visited, chat room activity, and social network usage. Password-protected program also includes selective website blocking, activity reports, screen shots, top 10 used programs, user warnings, and program usage limits. With iMonitorPC, users can define and enforce PC rules and review activity reports online or via email.
Data Leakage Protection guards on-demand applications.
St. Louis, MO 63119
Oct 23, 2007
Offered as on-demand service available to salesforce.com customers via AppExchange, OutProtect guards companies against theft of downloaded data by authorized users of on-demand applications. This solution blocks removal of files without company's knowledge or authorization by controlling, monitoring, and managing use of files downloaded on users' PCs or laptops. Downloaded data is deleted should employee leave company or if PC/laptop is lost or stolen.
Data Security Solution delivers centralized key management.
San Jose, CA 95110
Oct 22, 2007
Available as scalable solution across LTO-4-equipped Scalar® i500 and Scalar i2000 tape libraries, Quantum Encryption Key Manager (Q-EKM) generates, protects, stores, and manages encryption keys. This Java software program leverages industry-standard algorithms for secure and centralized management of encryption keys for backup, restore, and disaster recovery processes. Once installed and configured, Q-EKM is entirely automated.
Software automates NSF to PST file migration.
Global System Services Corporation (GSS)
Mountain View, CA 94041
Oct 19, 2007
Used for e-mail migrations as well as data recovery and computer forensics, NSF2PST enables large-scale conversion of Lotus Notes e-mail files (NSF) to Microsoft Outlook Personal Store (PST) format. It works without Notes or Domino server and can operate unattended in batch mode. Compatible with all language versions of Notes and Outlook, software can recover messages from almost any NSF file and accurately preserves all message attributes compatible with PST format.
Software monitors and reports employee computer usage.
Miami, FL 33166-2626
Oct 18, 2007
Offered in Standard and Professional editions, Work Examiner v2.1 lets managers monitor and control employees' computer usage in order to optimize their efficiency. Tool gives company managers data for analysis, providing reports on employee Internet and applications usage. In addition to revealing what sites were visited and what applications were run, solution also indicates active and passive durations. Attendance tracking function tallies total time employees spend working/idling.
Software offers governance, risk, and compliance management.
McLean, VA 22102
Oct 16, 2007
Featuring role-based dashboards, Brabeion IT Risk and Compliance Manager v3.0 delivers unified view of risks across people, processes, and technologies tied to regulations, standards, and company policies. Compliance risk scoring factors in likelihood of IT control failures, while document workflow and repository management features minimize cycle time and redundancies. With online and offline capabilities, web-based survey and questionnaire engine provides distributed assessments.
Software lets user set PDF document properties.
UNIVERSE Software GmbH
Oct 12, 2007
With pdf-DocPro v4.0, users can define settings, security permissions, encryption levels, and printing options. Users can also preset Acrobat Reader appearance, as well as set new document titles, author information, topics, and document keywords for search engines or DMS systems. With optional digital signature feature, users can securely use PDFs for official business communication such as electronic invoicing and digital signing of contracts.
Network Intrusion Protection System uses behavioral methods.
Mahwah, NJ 07430
Oct 12, 2007
DefensePro v4.0 offers adaptive behavioral server-based IPS feature set, protecting against misuse of application authorization and preventing break-in attempts to enterprise critical application servers. Without any human intervention, Intrusion Prevention System (IPS) lets network respond to attacks targeted at revenue-generating applications. Solution integrates multiple layers of defense for signature-based, adaptive behavioral network-based, and HTTP page flood attack protection.
Web Services enable secure, end-to-end identity management.
Oct 12, 2007
Based on open standards and built on SAP NetWeaver® platform, GRC Web Services enable seamless integration of identity management software solutions with SAP® GRC Access control application for monitoring and enforcing user access and authorization controls. Customers can use single set of tools to manage user identities, enforce corporate security policies, and ensure compliance with regulatory mandates.
Software proactively monitors health of email environment.
Austin, TX 78746
Oct 11, 2007
With Neverfail for IBM® Lotus® Domino® 8, IT managers can deploy Notes from single console and users can access range of messaging tools. By replicating data from active to passive server, program creates real-time, duplicate copy of entire environment, and if problem occurs, program can take corrective actions without resorting to full system failover. In extreme cases, non-disruptive, seamless failover to secondary server occurs automatically, enabling users to stay continuously connected.
RS232 Serial Component Library is designed for Visual Basic.
Huntsville, AL 35815
Oct 11, 2007
Supporting up to 256 ports, Windows Standard Serial Communications Library for Visual Basic (WSCVB) v4.3 controls multiple ports simultaneously and is fully thread safe. Solution provides serial line status and control as well as modem control. Supporting all versions of Microsoft Visual Basic - and VBA - through VB.NET, product supports virtual ports (USB to serial, Bluetooth serial), hardware/software flow control, and line control.
Software helps manage Windows Services across enterprise.
FireDaemon Technologies Ltd.
Cambridge CB4 0WS United Kingdom
Oct 11, 2007
With FireDaemon Trinity v2.1, users can connect to all workstations and servers across network or Internet and view, start, stop, and manage Windows services using legacy Windows connectivity methods such as RPC or more secure HTTPS/SOAP. Trinity Web Server lets users setup secure HTTPS/SOAP layer for remote management and deliver service status and other statistical information via RSS. Trinity Service Runner monitors application for failure and takes corrective action.
Software provides mobile email for Federal Government.
Schaumburg, IL 60196 4041
Oct 11, 2007
Good Mobile Messaging Secure Multipurpose Internet Mail Extensions is compliant with mandated standards for public key encryption and signing of email. It works with Motorola Q smartphones, Bluetooth® CAC-readers, and standard DoD-issued common access cards to secure CAC communication as well as sign and encrypt emails/attachments. Automatic signing/encrypting of attachments, 3-click CAC pairing, and Automatic over-the-air synchronization of certificates is provided.
Software converts PowerPoint to Online-Flash presentations.
Chemnitz 09130 Germany
Oct 11, 2007
With ability to convert MS PowerPoint 2000/XP/2003/2007 to Macromedia Flash, PPT2Flash SDK v2.1 also converts PPT files to single SWF files for each slide, and PPT file in single self running Flash Presentation without additional player. It features Macromedia Flash Video generation including synchronization with sound, quality images in converted Flash Presentations, WMV Video Format support, video (MPEG, AVI) support, and converts different image export formats (PNG, BMP, JPG, GIF).
Software offers data protection and disaster recovery.
Woodcliff Lake, NJ 07675 7654
Oct 10, 2007
Designed to help organizations meet business continuity requirements, Backup Express provides bare metal recovery in minutes, including operating systems, settings, and applications software. Program can deliver near-instant read/write access to SQL, Exchange, and Oracle applications at any chosen recovery point. Instead of using file-level incrementals, Backup Express Block Level Incremental technology identifies and copies only changed blocks, minimizing storage, CPU, and bandwidth used.
Online Privacy Software hides IP addresses.
My Privacy Tools, Inc.
Encinitas, CA 92024-2801
Oct 10, 2007
Allowing users to surf anonymously by installing proxy IP address between their computer and Internet, Hide My IP v2007 protects them from hackers, spammers, identity thieves, and unwanted advertising. Online privacy software is compatible with Windows XP/Vista and web browsers such as Internet Explorer and FireFox, and works with various instant messengers, E-mail clients, games, and other Internet-based software.
Software supports database conversion processes.
Oct 09, 2007
DBConvert for Access & PostgreSQL v2.0 provides data conversion from MS Access database (MDB file) to MySQL Server and from MySQL to Microsoft Access. Database migration tool features advanced command line processing, allowing users to track each program step. Data filter support enables users to specify filtering criteria for conversion, while drop-synchronization allows deletion of records from destination database if those records are not presented/deleted in source.
Software provides security knowledge management.
Chantilly, VA 20151
Oct 08, 2007
Designed to protect facilities in financial, healthcare, education, and transportation industries, Security Knowledge Manager(TM) works with almost any IP, digital, or analog camera, and runs on any Intel or compatible server. Combined with policy-level administration and Storage Volume Manager, open, standards-based software provides organizations with scalable IP surveillance and security solution.
Anti-Spam Software features integral phishing protection.
Engate Technology Corp.
Reno, NE 89509
Oct 08, 2007
Engate MailSentinel(TM) v3.5 incorporates PhishFilet®, which is powered by Network Profiling technology and serves as network-layer, preemptive solution against phishing attacks. PhishFilet eliminates attacks at connection-level, prior to transmission to Engate protected network, with 99% accuracy or higher, and no false positives. Product can be used as standalone solution or as complement to existing reputation, content filters, and server-based products.
(Showing headlines 1621 - 1640) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158