Utilities & Tools|
Utilities & Tools
(Showing headlines 2961 - 2980) << 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158
Software delivers 14 Mac utilities for custom experience.
Allume Systems, Inc.
Watsonville, CA 95076
Jan 13, 2005
Ten for X Utilities(TM) volume 3 maximizes Macintosh experience with tools to help with opening and saving files, typing special characters, printing information from web pages, customizing Dock and Finder, and Instant Messaging. Another tool lets specified screensaver run as desktop background. Collection also includes fully registered versions of CopyPaste Lite, DockFun!, KeyCue, MenuMeters, Nudge, PopCharX, RCDefaultApp, Safari Magic, TinkerTool, and XRay.
Software addresses data privacy challenge.
Detroit, MI 48226
Jan 11, 2005 Compuware File-AID/CS v3.1 lets users create test data without exposing sensitive customer information. Development teams can populate fields with names, addresses, social security numbers, and phone numbers using drag and drop functionality. Data can be generated from pre-packaged data library of unique values or customized to organization's naming standards. Software supports Oracle, Microsoft SQL Server, DB2 UDB, Sybase, XML, VSAM, IMS, and DB2 UDB for z/OS.
Anti-Spam Software runs on Java Virtual Machine platform.
Zurich 8002 Switzerland
Jan 11, 2005 Anti-spam filtering no.Spam.java provides messaging security features in addition to message archiving services for SMTP servers and POP client users. It features Web interface, sender authentication, adaptive probability filter, and various spam detection engines. Software also provides users with link evaluator and resolver, integrated MIME content scanner, and full message header checks.
Software provides protection from spam.
Burlington, MA 01803
Jan 04, 2005
Astaro Security Linux v5.1 offers spam blocking features and management tools that eliminate threats and enable IT staff to act quickly, ensuring overall security of corporate IT assets. It includes SPF record checking, graylisting, BATV reverse path signing, and list of quarantined emails. Bandwidth monitoring provides alerts when limits are exceeded. Software supports SNMP Traps to communicate system information in real-time to network management systems.
Software Distribution System supports Solaris server.
Aladdin Knowledge Systems, Inc.
Arlington Heights, IL 60004
Jan 03, 2005 HASP SL v6.4 allows software publishers to distribute secure software via CD, ESD, or peer-to-peer networks while protecting software copyrights and intellectual property. Solaris-based HASP Commerce Server provides administrative, customer service, and activation services required to create, manage, support, and activate software products. HASP SL offers web-based reporting, web-based customer service, secure remote role-based access, and multiple publisher support.
Software preempts phishing attacks.
Windham, NH 03087
Dec 29, 2004 SignupShieldâ„˘ v3.0 features PhishShieldâ„˘, which alerts users before they are about to submit sensitive information over Internet to suspicious web sites, allowing them to abort transfer. It looks behind scenes of every form user is about to submit and is not fooled by cloning of real web sites. SignupShield includes integrated Password Manager and Smart Form Filler.
Web-based Management Console connects users to information.
Santa Cruz, CA 95060
Dec 29, 2004 Tarantella Secure Global Desktop Terminal Services Edition (TSE) 4 provides users with certificate-based server authentication, ticketing, SSL encryption, and tunneling of all RDP and IFS traffic. Product also features DMZ-friendly configuration of its relay server as well as cross-platform RDP client support. Along with monitoring, reporting, and system administration capabilities, web-based management console can automate administrative tasks.
Software backs-up Linux databases without interruption.
Carlsbad, CA 92008
Dec 21, 2004 Compatible with Arkeia Network Backup and Arkeia Server Backup, plug-in provides online hot backup and restore solution for PostgreSQL open source database. It allows users to backup solutions and protect database without interrupting PostgreSQL services running under Linux. Online backup is configured through Arkeia GUI, which provides single click selection of databases to be backed up or restored on PostgreSQL server.
Software blocks unwanted e-mail.
Allume Systems, Inc.
Watsonville, CA 95076
Dec 21, 2004
SpamCatcher(TM) 4.0 combats phishing scams using patent-pending fingerprinting technology that allows users to control what they receive in their inbox. It lets users create their own black list and white list. Combination of heuristics, Bayesian analysis, fuzzy logic, source analysis, and artificial intelligence stops unwanted and unsolicited e-mails. Collaborative filtering provides real-time network updates and protection.
VPN Software features centrally-managed firewall.
Check Point Software Technologies, Inc.
Redwood City, CA 94065-5157
Dec 14, 2004 VPN-1® SecureClient for Mac OS X allows security administrators to enforce desktop security policies on network and push out centrally-managed policy to remote users, enabling consistent endpoint security throughout organization. Administrators can manage security for both remote Mac OS X and remote Windows users. Software ensures that mobile Mac users will not compromise network security or open up back door into corporate network.
Software checks downloads for spyware.
GFI Software USA, Inc.
Cary, NC 27513
Dec 09, 2004 DownloadSecurity for ISA Server allows administrators to review downloads and exercise control over what enters network. It provides customers who use Kaspersky SuperSecure anti-virus module with added protection against downloads containing spyware, adware, and related malicious software. Trojan and Executable Scanner detects unknown malicious executables in downloads by analyzing what executable does and using built-in intelligence to rate risk level.
Software protects against search vulnerabilities.
Fremont, CA 94555
Dec 03, 2004 Sygate On-Demand verifies security integrity of devices, creates encrypted Virtual Desktop, and erases data from system upon termination of session, ensuring that information cannot be viewed using Google Desktop Search. Host Integrity module offers administrators option to resrict SSL VPN access to endpoints running Google Desktop Search. Software enforces security compliance and ensures safe access to proprietary or private information and applications.
Software manages and protects enterprise data.
CommVault Systems, Inc.
Oceanport, NJ 07757-0900
Dec 02, 2004 Built on Microsoft Windows Server 2003 platform, QiNetix Second Generation software suite provides enterprise data management solution with granular data protection. Backup and recovery capabilities include 1-Touch Restore, which lets user recover entire server or workstation, and use of CommVault media management technology. Readiness Check feature performs pre-operation check of all components to ensure completion of critical data movement applications.
Security Software is FIPS 140-2 certified.
SSH Communications Security Corp
FIN-00100 Helsinki Finland
Nov 30, 2004
Enabling end-to-end secure communications throughout internal and external network, SSH Tectia(TM) client/server solution supports Red Hat Enterprise Linux v2.1 and v3.0, Solaris 9, Windows 2000, and Windows 2003 Server. It provides transparent encryption and authentication, and integrates into heterogeneous, multi-platform environments. Cryptographic module is approved for use in Federal agencies within context of complete security program.
Software proactivly protects against worm attacks.
Redwood city, CA 94065
Nov 30, 2004 SecureCore v2.0, built on proprietary Memory Firewall, stops known and Zero Day worms by preventing them from executing in memory before they can cause damage and spread. Suited for use in enterprise networks, it offers capabilities for centralized deployment, management, and reporting. Application prevents execution of even one line of malicious code when worms reach protected endpoint devices, insulating enterprises from information loss and downtime.
Intrusion Prevention Systems offer spyware protection.
TippingPoint Technologies, Inc.
Austin, TX 78731
Nov 30, 2004 UnityOneâ„˘ systems block spyware at network level, providing application, performance, and infrastructure protection at gigabit speeds through total packet inspection. Solution has filters that prevent computers that were infected prior to software implementation from uploading personal information to collection servers. Filters also prevent spyware servers from updating desktop agents with new functionality while also blocking download of ads.
Security Tools help resolve software vulnerabilities.
Fortify Software, Inc
San Mateo, CA 94404
Nov 30, 2004
Source Code Analysis tools mitigate enterprise security risk by automating identification, prioritization, and resolution of flaws in software applications. Multiple source code analyzers detect security vulnerabilities in software, while Fortify Audit Workbench reports vulnerabilities and prioritizes them for correction. Fortify Rules Builder lets users create custom rules to check for security flaws associated with company-specific application components.
Data Encryption Solution is available for Linux.
Pointsec Mobile Technologies, Inc.
Mokena, IL 60448
Nov 30, 2004
Providing complete hard disk encryption, Pointsec for Linux(TM) protects confidential data stored on laptops and desktop computers running Linux. It also enables secure deployment of mobile devices, making sure that confidential information is available only to legitimate users. Software ensures instant, automatic encryption and decryption that is transparent to users and secures all information stored on mobile devices as well as removable memory media.
Software protects data on hand-helds.
Santa Monica, CA 90403-5400
Nov 29, 2004 With BackupBuddyVFS v3.0 installed on Palm OS PDA or smartphone, users can backup critical data to Secure Digital, MultiMedia, or Sony CLIE Memory Stick® expansion cards. In event of data loss, software restores lost data from expansion card. BackupBuddyVFS provides automatic compression of backup files; checkpoints, which allow users to maintain multiple backup sets; data encryption to secure back-ups from unauthorized access; and archiving capabilities.
Software mitigates outbound email threats.
Cupertino, CA 95014
Nov 19, 2004 Proofpoint Content Security v3.0 comprises 3 modules that help organizations manage risks associated with outbound email. Content Complianceâ„˘ allows enterprises to define and enforce acceptable use policies for message content and attachments. Digital Asset Securityâ„˘ keeps valuable assets and confidential information from leaking outside organization via email. Regulatory Complianceâ„˘ protects organizations from liabilities associated with privacy regulations such as HIPAA and GLBA.
(Showing headlines 2961 - 2980) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158