Utilities & Tools|
Utilities & Tools
(Showing headlines 181 - 200) << 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ...
Data Backup Software supports Exchange 2010.
Sichuan Province 610041 China
Jan 05, 2012
Built upon EaseUS' data protection technology, EaseUS Todo Backup 4.0 can back up GPT disk and Exchange 2010. Program offers 1-click system backup, differential backup, and backup to tape, ensuring that all critical information is protected. Using EaseUS Todo Backup Central Management Console, IT administrators can remotely deploy backup plans for multiple installations of widely distributed EaseUS Todo Backup clients in LAN.
Packet De-Duplication Tool enhances network monitoring efficacy.
VSS monitoring, Inc.
San Mateo, CA 94010
Dec 15, 2011
Compatible with IPv4 and IPv6, packet de-duplication lets enterprises and service providers realize full value of existing investments while improving performance and accuracy from network analytic and security monitoring tools. Feature specifically improves efficiency and effectiveness by eliminating redundant data packets, thereby reducing processing load on tools and false event alarming. By prioritizing bandwidth with premium data, network QoS can be assured.
Security and Compliance Software offers expanded reporting capabilities.
Vanguard Integrity Professionals, Inc.
Las Vegas, NV 89120-3478
Dec 14, 2011
Delivering optimized performance and automation, Vanguard Security and Compliance Solutions enable smart decision making by adding intelligence and information into all tools. Granular control and detailed reporting capabilities allow users to achieve better security and respond in accelerated manner to evolving regulatory requirements. Along with IBM z/OS® 1.13 support, features include operational security management and reporting capabilities.
Backup Software offers interruption-free data copying.
Austin, TX 78731
Dec 12, 2011
Handy Backup v7 offers Outlook hot backup service, part of general approach to smart copying of data that does not require closing of files, shutting down of applications, or interruption of service operation. With options for browsing backup data before recovery and restoring either individual emails or entire mail account, solution can copy complete Outlook data to safe storage service. Users can also open backup archive and read messages even before restoring said archive.
File Conversion Software converts PDFs to formatted XML files.
Dec 12, 2011
Incorporating advanced workflow automation features, PDF2ID Enterprise 2012 converts PDFs to InDesign and IDML types by targeting folder, eliminating user-intervention once conversion system is configured. Program enables recovery and reuse of contents stored in PDF files, and has built-in notification facilities and conversion server optimization controls. Any number of Hot/Watch folders can be defined, triggering automatic conversion of newly added PDFs in Hot/Watch folders.
Data Security Software delivers advanced reporting intelligence.
WatchGuard Technologies, Inc.
Seattle, WA 98104
Dec 06, 2011
Available for XTM line of UTM appliances, WatchGuard XTM OS provides advanced networking capabilities for mobile workers, as well as management and reporting functions that provide insight into applications, bandwidth usage, and user behavior. By supporting IPSec functionality on Apple devices, program lets users securely access corporate resources from anywhere. Release optimizes email security by providing options to require Transport Layer Security, which encrypts email communications.
Desktop Organizer Software contextualizes time via 2 clocks.
Crystal Cut s.a.
Dec 06, 2011
Windows®-compatible SpaceTimeAgent can serve as calendar, note taker, task manager, or address book. Information is entered in note-style records placed on board that carries 2 clocks: one shows time data for records (calendar), while other shows time data related to when records were absorbed (reference time). Using first clock, user can go to specific times in past/future and see or modify board at those times. Second clock lets user see how board has been formed over course of time.
Data Security Software reduces inter-system exchange risk.
Atlanta, GA 30328
Dec 06, 2011
As endpoint client for SEEBURGER Managed File Transfer suite, SEEBURGER Secure Link(TM) closes security and compliance loopholes of file sharing strategies. Deployment on PCs and servers inside/outside organization ensures secure, reliable, manageable, system-to-system data exchange. Built-in capabilities - policy enforcement, encryption, data integrity checking, centralized audit trail - thwart data theft and misdirected files while also aiding adherence to regulatory/corporate requirements.
Data Security Software centralizes management of Mac users.
Sunnyvale, CA 94085
Dec 05, 2011
Centrify DirectControl for Mac OS X delivers Active Directory-based authentication, single sign-on, smartcard, and group policy support for Apple Mac platform. To improve security, capabilities enable integration and management of Mac systems with existing enterprise infrastructure. Along with printer management and desktop lockdown, software adds support for automated digital certificate enrollment, U.S. Federal government smart cards, and Apple FileVault 2 Full Disk encryption.
Data Erasure Software prevents theft of hidden files.
Oradea 410072 Romania
Dec 02, 2011
Via built-in Wizard or custom-defined erasure methods, East-Tec Eraser 2012 targets caches of sensitive information on computer and deletes it permanently to protect confidential data from online predators. Program works with range of browsers, peer-to-peer programs, and diverse applications, removing all evidence of user's computer and online activity. Ability to import/export options facilitates configuration on multiple computers.
Mobile Device Management Software supports Android 4.0.
Odyssey Software, Inc.
W. Henrietta, NY 14586
Nov 30, 2011
Athena(TM) delivers functionality that complements and extends native MDM functions of Microsoft® System Center Configuration Manager platform, enabling broad management of Android, iOS, BlackBerry®, and Windows® Mobile/Embedded CE devices. Management policy lets administrators remotely disable cameras on managed device for users working in sensitive environments, and password controls offer granular settings for device password requirements.
Internet Content Security Software supports Mac users.
Trend Micro, Inc.
Cupertino, CA 95014
Nov 23, 2011
With SafeSync for Business, organizations can securely access, share, and synchronize files and folders from anywhere, anytime, from any device. Users can drag and drop files into SafeSync folder and have them sync with cloud immediately. SafeSync Folder goes on any device where SafeSync client or mobile app has been installed, without further configuration. Data can also be accessed through any web browser.
Data Security Software uses dynamic one time passwords.
Vasco Data Security Inc.
Oakbrook Terrace, IL 60181
Nov 23, 2011
Powered by Intel® IPT, DIGIPASS for Windows replaces use of static passwords with dynamic one time passwords that are user-specific and only valid for limited period of time. Two-factor authentication, embedded into 2nd Generation Intel® Core(TM) and Intel® vPro(TM) processor platforms, protects against online transaction fraud as well as data and identity theft. Solution is suited for enterprises and companies willing to add additional security layer to access network through VPN connection.
Data Security Software protects against HTML5-based threats.
Calgary, Alberta T2L 2K7 Canada
Nov 23, 2011
Accommodating trends such as mobile access and cloud-based applications, WedgeOS provides real-time, scalable Web application environment that detects and mitigates malware threats in HTML5-specific content and WebSocket protocol. Solution understands intent of data-in-motion and provides remediation when necessary. Able to support and secure HTML5 content and protocols, platform protects against known and zero day threats without impacting network performance.
Endpoint Security Software protects enterprise, SMB networks.
Norman Data Defense Systems, Inc.
Fairfax, VA 22031
Nov 21, 2011
Norman Endpoint Protection v9 delivers malware threat protection for SMBs and, using multilevel architecture, scales to serve large, complex enterprise network PCs and servers as well. Security policies may be set and managed centrally across multiple sites, accelerating security updates and ensuring effective local control. Able to be installed in minutes, solution offers UI that displays all clients and servers in network and offers drag-and-drop actions.
Wireless Security Software includes myriad threat signatures.
Camarillo, CA 93010
Nov 17, 2011
Wireless intrusion detection and prevention system (WIDS/WIPS), AirMagnet Enterprise v9.0, includes threat signatures which offer protection against wireless threats and vulnerabilities, including Karmetasploit, Apple's AirDrop feature, and DHCP starvation attack. By utilizing Dynamic Threat Update technology, system can generate signature updates for immediate protection and automatically push them to customers without requiring scheduled downtime or additional IT resources.
Network Management Software lets IT control remote users/devices.
South Jordan, UT 84095
Nov 17, 2011
LANDesk® Management Suite 9 and LANDesk® Security Suite 9 help organizations support range of platforms while controlling remote users and unmanaged mobile devices. Drillable dashboards for real-time analytics and dynamic click-through reporting enable IT to enforce security policies and manage patch distribution inside and outside network. Support is provided for OSs from Mac/Windows/Linux as well as cloud based services that let IT manage and secure users anywhere in world via Internet.
Cloud Server Security Platform offers event logging and alerts.
Menlo Park, CA 94025
Nov 16, 2011
Able to centralize and automate security management, Halo(TM) delivers all capabilities necessary at server level to secure cloud environments. Log entries and alerts can be generated on any rule created from cloud server configuration checks, and users can specify which system states and events generate logs or alerts, their level of importance, and who will receive them. Included REST API fosters diverse integration capabilities.
eDiscovery Software addresses information governance challenges.
Tampa, FL 33607
Nov 15, 2011
EMC® SourceOne(TM) eDiscovery - Kazeon v4.6 helps corporations, legal service providers, law firms, and consultants provide eDiscovery, litigation support, and other event-driven investigations. In addition to predefined and customizable personas, features include search and analytics with international language support; ECA capabilities, eDiscovery, and event-driven investigations; as well as ability to analyze, preserve, and categorize information in any place and at any time.
Data Encryption Service protects data in motion.
Pittsburgh, PA 15238
Nov 15, 2011
Powered by TrustNet Manager from Certes Networks, DataGuard Encryption-as-a-Service provides encryption of data in motion as it travels across WANs and cloud infrastructures. Available as standalone solution, or as part of Ascent2Cloud for cloud computing or Ascent DataColo for colocation, solution protects data on network without impacting network performance or service levels. DataGuard allows organizations to follow best practice of separating security and infrastructure management roles.
(Showing headlines 181 - 200) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158