Utilities & Tools ->
(Showing headlines 1381 - 1400) << 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 ...
Software offers governance, risk, and compliance management.
McLean, VA 22102
Mar 10, 2008
Brabeion Polaris IT GRC Management Suite v7.1 comes with governance, policy reporting, and usability features. It is comprised of Polaris Pathfinder for policy lifecycle management and controls mapping, Polaris Navigator for automated general controls collection and testing including manual assessments for surveys, and Polaris Knowledgebase for risk and compliance content. Suite features custom reference modules, expanded data management, and policy acceptance notification.
Software offers unlimited number of spreadsheet hosting.
Menlo Park, CA 94025
Mar 10, 2008
Web-based eXpresso Pro allows users of Microsoft Excel® to upload, distribute, and collaborate in real-time on Excel files via Internet, as well as authorize others to view or edit same spreadsheets as needed. Using Track Cells feature, spreadsheet owners are notified when changes are made, who made changes, when they were made, and what pre- and post-change data values are. Software also gives users offline access to their online spreadsheets from within Excel.
Password Management Software works directly from flash drive.
Chisinau MD2071 Moldova
Mar 07, 2008
Run under Windows 95/98/ME/NT/2000/XP/Vista, Password Carrier v2.05 can fill in Web forms as well as Windows applications logins and protect all passwords with strong AES 256-bit encryption to guard against security threats. Login credentials and other personal data are stored on and accessed directly from flash drive, offering secure access to data regardless of location. Solution leaves no traces on host computer, and auto lock option initiates after defined period of inactivity.
Software replaces form, not functionality, of Office 2007.
Haikou City, Hainan Province, China
Mar 06, 2008
Offered as interface add-on, Classic Menu for Office 2007 v3.91 is designed to promote worker productivity. Add-on reverts menus and toolbars of MS Office 2007 back to MS Office 2003 style, while retaining all of current version's features. It also adds automatic deployment capability for clients' computers throughout enterprises and organizations. To facilitate migration from classic to current Office style, program also lets users switch between interfaces.
Software protects SMB computers against security threats.
Orlando, FL 32810
Mar 05, 2008
Employing multi-threaded scanning engine, AVG Internet Security v8.0 guards against traditional threats such as viruses, spam, spyware, and trojans as well as emerging threats such as web exploits, drive-by downloads, phishing, and rootkits. LinkScanner technology scans search results, web links, and web pages in real-time to ensure they are safe before they are opened. Additional functionality addresses MSN and ICQ instant messaging and infected file downloads.
Software manages PC processes and startup items.
New York, NY 107589
Mar 05, 2008
Through variety of included tools, Virus Destroyer gives users full control over their computers by providing detailed information about every running process as well as applications running automatically on Windows startup (including hidden ones). Solution also serves to protect computers from becoming infected with viruses, and cures infected computers via included antivirus functionality. Also included, tray icons relay current information about CPU/HDD usage.
Software facilitates hard drive migration.
Data Protection Solutions by Arco (DPS)
Hollywood, FL 33020
Mar 04, 2008
Run under Windows XP/2000/2003/Vista, EzMigration aids in copying boot drive to new or larger drive. It performs bit by bit drive copy, transferring exact image of entire original drive to new one, and eliminates all work involved in building/rebuilding boot drive by installing one application at a time. It also includes drive partition expansion utility.
Software provides netowrk security auditing solution.
Baton Rouge, LA 70809
Feb 29, 2008
Available as SaaS, TraceSecurity IT Security Audit Manager (TraceSecurity ISAM) enables IT auditors, management, and staff to navigate intricacies of their policies, procedures, and controls to ensure information and data security align with organizational and regulatory standards. IT administrators can identify and isolate deficiencies in multiple security domains such as host security, application security, encryption, and business continuity.
Software is suited for on-the-fly-encrypted drive.
Herndon, VA 20171
Feb 29, 2008
TrueCrypt v4.3a is software system for establishing and maintaining on-the-fly-encrypted drive. Data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on encrypted volume can be read (decrypted) without using correct password or correct encryption key. Entire file system is encrypted including file names, folder names, contents of every file, and free space.
Software enables Web-based authentication.
San Mateo, CA 94403
Feb 28, 2008
Providing strong authentication and single sign-on, myOneLogin allows seamless integration of multiple SaaS applications. It also authenticates access to Web-based applications with unphishable credential that securely connects employees to third-party and internal Web-based applications through one secure username and password. Solution automatically and securely maintains and changes application passwords and is built on TriCipher Armored Credential System.
Software offers centralized security for school and office.
Barcelona 08290 Spain
Feb 27, 2008
Designed to create safe and productive environments, Desktop Orbiter v6.0 allows users to manage and protect multiple workstations remotely. Users can monitor and restrict network connections; view, print, and send reports of user activity by email; and filter software usage, making sure unwanted applications are never used. Providing 256-bit AES encryption, program also includes website filtering, automation of repetitive tasks, and multiple administration tools.
Software unlocks Microsoft Word passwords.
ElcomSoft Co. Ltd.
Moscow 129085 Russian Federation
Feb 27, 2008
With ability to tackle 40-bit Word passwords in Microsoft Office 97/2000/XP/2003, Advanced Office Password Breaker (AOPB) v2.0 is suited for information technology support administrators, business managers, and law enforcement officials to protect their organizations from losing access to critical documents. Including Enterprise, Professional, and Standard versions, software uses rainbow attack subsystem, and runs under Windows 2000/XP/Vista/2003/2008.
Software helps deploy/upgrade desktop systems.
Computer Sciences Corp.
El Segundo, CA 90245
Feb 27, 2008
Based on Citrix XenDesktop(TM), CSC Dynamic Desktop enables employees to access their desktop remotely and securely, regardless of location, and allows IT department to rapidly deploy systems to new users or refresh desktops without having to touch them individually. Users can run previously incompatible systems simultaneously and upgrade to systems like Microsoft Vista. Solution also helps improve business compliance, increase business continuity, and aid disaster recovery.
Service protects data and ensures disaster recovery.
Continuity Software Inc
New York, NY 10001
Feb 26, 2008
Utilizing RecoverGuard(TM) disaster recovery testing and monitoring software, DR Assurance(TM) Service scans customer's storage, database, servers, and replication configurations for risks such as unprotected databases. Daily statistics, tickets, and event notifications are sent to DR Specialists Team for review and analysis. If problem is detected, specialist alerts appropriate individuals at customer site and provides details on issue, as well as recommendations on how to resolve.
Software promotes quick service call resolutions.
Marietta, GA 30068
Feb 26, 2008
By facilitating and accelerating access to known product-repair problem/solution sets, Service Knowledge Management helps manufacturers' service organizations improve first time fix rates, avoid unnecessary dispatches, and enable customer self-service. Case-based reasoning enables real-time comparison of each new customer problem with existing cases in continuously enriched database, and then matches them with most likely resolution to resolve service calls in timely manner.
Software tests code over real-world network conditions.
New York, NY 10018
Feb 26, 2008
Used directly from desktop, Shunra VE Desktop Standard v4.0 emulates WAN link so that users can test application performance under various existing and potential network conditions such as latency, packet loss, and bandwidth. Single-user, Windows®-based desktop application testing tool provides immediate feedback on end-user experience, enabling development and QA groups to produce network-aware applications that perform as expected.
Software manages programs loaded during Windows Startup.
Coburg 96450 Germany
Feb 26, 2008
StartEd v4.2 helps manage programs that load from registry, Startup folders, and Win.ini at Windows Startup. Allowing direct control of programs loaded during startup, it allows user to modify and backup Startup configuration, detects more than 120 Trojan Horses, and manages Startup shortcuts.
Software delivers compliance and audit reporting.
Redwood Shores, CA 94065
Feb 25, 2008
Part of Oracle Fusion Middleware, Oracle® Identity Manager enables organizations to automate process of adding, updating, and deleting user accounts from applications and directories. Attestation capabilities provide certification of access privileges as required by compliance requirements, while compliance and operational report templates streamline audit processes. WS-SPML 2.0 Inbound Gateway enables rapid integration across heterogeneous environments, accelerating deployment.
Service offers assessment of website security.
WhiteHat Security, Inc.
Santa Clara, CA 95054
Feb 25, 2008
WhiteHat Sentinel Service allows customers to rank their sites based upon scoring system that combines business value of each site with severity and threat of individual vulnerability. It provides advanced reporting to facilitate remediation, on-demand vulnerability retest, and Q&A features. Web-based API enables users to integrate vulnerability data with critical development software and security information systems.
Software logs AutoCAD drawing history.
Engineered Design Solutions
Rockford, IL 61101
Feb 22, 2008
Chronos for AutoCAD v3.2 automatic time logging utility for AutoCAD maintains history log for each drawing worked on. History log provides managers with graphical display of drawing history to see when users entered and exited AutoCAD drawing, and data file synchronization and merge capabilities extend history logging to span several weeks or even months of accumulated time. Detailed text report is also generated and can be printed along with graph.
(Showing headlines 1381 - 1400) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157