Utilities & Tools ->
(Showing headlines 2901 - 2920) << 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157
Software enables secure communications.
Sun Microsystems, Inc.
Santa Clara, CA 95054
Feb 24, 2005 Sun Javaâ„˘ System Communications Suite helps customers protect information assets, ensure end-user privacy, and facilitate regulatory compliance. It provides secure platform for deploying e-mail, calendaring, instant messaging, and other collaboration services. Support for S/MIME protocol enables users to sign and encrypt messages. Delegated Administration utility leverages capabilities of Java System Access Manager for role-based administration.
Software offers automated data protection.
Marlborouugh, MA 01752
Feb 24, 2005 LiveVault InControl for remote offices and LiveVault InSync for small and mid-sized businesses address data backup, offsite storage, archiving, and data recovery. Offering centralized management, InControl provides unattended backup of remote office data and transmission of backups to corporate data center. Available as subscription service, InSync combines disk-based backup with advantage of moving data offsite via secure network connection.
Software manages secure file transfer.
Gardendale, AL 35071
Feb 24, 2005 IQ Swift® incorporates built-in controls to automatically manage entire file transfer process and maintains detailed record of all activity, making it suited for industries that must comply with government privacy regulations, such as Health Insurance Portability and Accountability Act. IQ Swift is able to transfer 1.72 gigabytes of information in 260 files over T1 line between 2 points on either side of United States in 17 min with no packet loss.
Network Security Appliance offers application-layer security.
Fort Lauderdale, FL 33309
Feb 24, 2005
Model TSP 7100 detects and defeats known and zero-day threats to enterprises at gigabit throughput. Unit is powered by CyberGuards's software, which provides 7-layer inspection, secure content policy enforcement on entire communications stream, and stateful packet inspection. Adaptive response feature provides intelligent, automatic rule activation based on current network activity and status as defined by system administration, allowing for real-time network monitoring.
Hybrid Software Solution enables secure e-mail archiving.
Greenwich, CT 06831
Feb 24, 2005 With DoubleBlind Encryptionâ„˘ technology, Fortiva Archiving and Compliance Suiteâ„˘ offers hybrid solution for e-mail archiving, compliance, and legal discovery. Hybrid model lets companies choose managed solution without worrying about sharing data with third party; Fortiva maintains data, but does not have encryption keys needed to view content. Suite also provides complete data privacy in real-time search and discovery, supervision, and enforcement features.
Anti-Spyware Software meets needs of small-large businesses.
Santa Clara, CA 95054
Feb 23, 2005 McAfee® Anti-Spyware Enterprise uses proactive On-Access Scanning to identify and safely eliminate potentially unwanted programs such as spyware, adware, dialers, keyloggers, cookies, and remote-control programs. It is centrally managed under single console with McAfee ePO and McAfee ProtectionPilot, giving IT and security administrators visibility and control to configure system security policy, evaluate security status, and customize reports to fit needs.
Software offers integrated web security solution.
San Diego, CA 92121
Feb 23, 2005 Web Security Suiteâ„˘ closes window of exposure between when vulnerability is exploited and when remedy becomes available. Offered as Web Security Suite or Web Security Suite Lockdown Edition, suite protects organizations at Internet gateway, network, and employee desktop against security breaches and malicious code outbreaks. They also provide web security for mitigating spyware, MMC, phishing attacks, instant messaging attachments, P2P, and other web-based threats.
Software delivers complete gateway security.
Waltham, MA 02451
Feb 23, 2005 Novell® Security Manager, powered by Astaro, contains 6 perimeter security applications that protect businesses against security threats caused by hackers, viruses, worms, spam, and intrusions. It provides multiple defenses in one SUSE® Linux-based application that is able to respond to new threats with automated updates. Web-based, common management platform provides single installation, interface, and reporting tool.
Network Appliance provides intrusion protection.
Lucid Security Corporation
Ambler, PA 19002
Feb 23, 2005 Equipped with Threat Remediation Dashboard and Central Management System, self-tuning ipAngel X3V incorporates anti-virus capabilities as well as ability to eliminate spyware and adware. It integrates intrusion prevention technology with vulnerability assessment, transparent firewalling, and multi-vector correlation in one interoperable platform. Series is comprised of AVS-100/400/1000 models that have LCD panel and run hardened Linux OS.
Messaging Solution promotes secure data transfer.
Cupertino, CA 95014
Feb 23, 2005 With RSA Secured certification, Trusted E-Business solution compliments RSA Keon® digital certificate management software in RSA Secured® Partner Program to provide identity and access management solution. Certification helps joint users achieve secure channel in which to convey sensitive documentation. Solution integrates seamlessly with existing infrastructure and helps manage digital identities of diverse user bases such as employees, partners and customers.
Software and Client deploy secure, flexible network.
Sun Microsystems, Inc.
Santa Clara, CA 95054
Feb 23, 2005 Sun Rayâ„˘ Server Software 3 provides cross-platform support for Solarisâ„˘ and Linux OS, enabling users to expand Linux environments onto desktop. Product features Sun Ray ultra-thin client LAN deployment capability and privacy mode function for traffic encryption. Sun Ray 170 Ultra-Thin Client provides interoperable desktop computing solution with stateless nature for complete session mobility and data protection. It leverages smart card reader for secure access.
Software manages tokens and related security solutions.
Aladdin Knowledge Systems, Inc.
Arlington Heights, IL 60004
Feb 22, 2005
Token Management System v1.1 enables deployment, provisioning, and maintenance of eToken user authentication devices, including security tokens, smartcards, and ID badges. It supports network logon, VPN, Web access, one-time password authentication, secure email, and data encryption. Software provides full life cycle management capabilities, self-service token management through secure web site, and backup and restoration of user keys and credentials.
Security Software delivers true incident response.
Guidance Software, Inc
Pasadena, CA 91101
Feb 22, 2005 EnCase Enterprise v5 provides automated real-time incident response and near-time compromise assessment using more than 20 software tools in one enterprise product to assess more than 10,000 machines per hour. Enterprise IT teams can detect, analyze, process, and respond to large number of security events. Software automatically assesses computers to determine if something is wrong, such as unknown network connection, unauthorized or rogue process, or latest rootkit.
Software eliminates spyware from enterprise networks.
Fremont, CA 94555
Feb 22, 2005 Sygate Secure Enterprise v4.1 ensures Compliance on Contactâ„˘ through intelligent policy enforcement, protecting computers, data, and networks from misuse, malicious access, and misconfiguration. By integrating Lavasoft's Ad-Aware, software ensures that any endpoint connecting to network or Internet is free from spyware and in continuous compliance with corporate security policies before it is granted network access.
Software secures data for enterprises and home users.
StorageCraft Technology Corp. - ShadowStor
Draper, UT 84020
Feb 16, 2005
ShadowMode(TM) provides non-restrictive server and desktop security and protection for Windows OS. Version includes ability to continue session, even across reboots of system. It helps prevent disasters before they occur and keeps critical systems online at all times. With ShadowMode, users can safely test system updates before saving changes, instantly undo accidental changes, and surf Internet without unwanted cookies, history, temporary files, spam, spyware, and viruses.
Authentication System offers solution for SMBs.
RSA Security Inc.
Beford, MA 01730
Feb 16, 2005 Intended for organizations with fewer than 1,000 employees, RSA® SecureID® System includes SecurID® Appliance, RSA SecurID® tokens, RSA® Authentication Manager 6.0 software, and hardware/software support. Two-factor authentication ensures only authorized users can access network through security layer that combines something user knows, such as PIN, with something user possesses, such as SecurID token, which generates unique, 1-time passcode every 60 sec.
Scanners and Software are suited for medical industry.
Fujitsu America Inc.
San Jose, CA 95134 2017
Feb 15, 2005 Designed to aid in document management and ECM projects, fi-4120C2 and fi-4220C2 scanners integrate hard-card scanning capability for insurance or identification cards as well as duplex and color scanning capabilities. Software Architects Disk Drive TuneUp!â„˘ for Windows provides Write-Once-Read-Many archive solution that enables users to permanently write files to magneto-optical (MO) disk, preventing accidental deletion or alteration.
Software protects enterprise data.
Woodcliff Lake, NJ 07675 7654
Feb 15, 2005 Backup Express v2.3 offers backup and restore with instant availability for files and applications. Agents work with Network Appliance SnapVault technology for disk backup and recovery, including bare metal recovery of Windows primary servers from SnapVault storage volume. Data for disaster recovery can be consolidated on centralized storage system, eliminating need for tape at remote sites. Software supports NDMP and includes agent for Oracle 10g.
Software protects PCs and data from unauthorized access.
Seattle, WA 98124-1069
Feb 14, 2005 When ActiveScreenLock v2.3 is activated, PC becomes inaccessible to passersby. If access is attempted, program displays password-protected window placed on top of all others. Software disables Alt+F4, Ctrl+Alt+Del, Alt+Tab, and WinKey key combinations, and restarting locked PC will not undo protection. Program also logs all login attempts as well as passwords used.
Software monitors, tests, and analyzes serial ports.
Moscow 117216 Russian Federation
Feb 14, 2005
Serial Monitor v3.22 for Windows NT4.0/2000/XP lets users monitor data sent and received through serial ports, reverse engineer serial protocols, and test software that uses serial ports. Protocol Analyzer feature establishes virtual link between 2 computer serial ports. Able to capture and process all serial I/O control codes, software can provide full dump of parameters and allows users to record data from entire monitoring session.
(Showing headlines 2901 - 2920) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157