Utilities & Tools ->
(Showing headlines 2981 - 3000) << 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157
Software enables encrypted transmissions over networks.
IBM (Corporate Headquarters)
Armonk, NY 10504-1783
Oct 19, 2004 WebSphere® Everyplaceâ„˘ Connection Manager v5.1 is a scalable, multipurpose communications platform that creates mobile VPN, which encrypts data over wireless LAN and WAN connections, allowing enterprises to extend existing applications to mobile workers. Seamless network roaming allows mobile users to maintain session persistence when mobile device changes network connections. Dynamic Session Profiles allow recognition of type of network and automatic application of tuning parameters.
Software provides vulnerability assessment scans.
Digital Defense, Inc.
San Antonio, TX 78209
Oct 18, 2004 Frontline 3.0â„˘ Security Management Service offers security management portal that provides clients with immediate access to vulnerability management tools, an array of reports, and power to self-schedule internal and external vulnerability assessments. It includes workflow management and reconciling tool and provides analysis data on integrity of network. Active Viewâ„˘ feature allows users to assess entire network and tailor testing based on recent installations or configuration changes.
Software provides mission-based risk assessment.
Tysons Corner, VA 22043
Oct 14, 2004 C.R.I.S.â„˘ (Critical Risk Identification System)walks user through defining organizationâ€™s mission and identifying critical assets that support mission, existing countermeasures, vulnerability, and likelihood of threats, risks, and potential countermeasures. Interface uses questions that dynamically adjust based on answers to previous questions. Assessment progress feature provides automatic email notification when workflow steps are completed.
Pocket PC Software facilitates note-taking.
Mountain View, CA 94040-1457
Oct 13, 2004 PhatPad v2.0 for Windows Mobile-based Pocket PCs includes companion desktop PC application that allows all features to be accessed from user's PC. With PDA stylus, users can draw pictures, jot text notes, or combine text, drawings, and pictures. Software gives users ability to load JPEG or bitmap files as background, and switch orders of layers when needed. Pop-up toolbar can be customized with as many as 10 buttons from selection of 40 functions.
Identification Software offers Unicode language support.
Minnetonka, MN 55343
Oct 04, 2004 ID Works® v5.0 gives administrators ability to grant users varying levels of access to settings and projects, monitor activity, and set login timeouts. It supports LDAP protocol, allowing security professionals in enterprise organizations to manage and update identity information in directory service. Software includes photo adjustment wizard, thumbnail previews of photo and graphic files, and multi-record table views.
Software tracks and analyzes backup and restore operations.
Palo Alto, CA 94303
Sep 30, 2004 Helping companies ensure that business-critical data is safe, Time Navigator Reporterâ„˘ automatically compiles data across heterogeneous, geographically-dispersed systems comprising multiple backup servers and catalogs. Suite of reports helps administrators identify and address problems before they cause interruptions. Auditable record of backup and restore operations demonstrates compliance with audit, risk management, and regulatory requirements.
Software facilitates authentication of embedded devices.
Fremont, CA 94538
Sep 30, 2004 AuthAgent X.509 modular authentication framework is based on X.509 digital certificates. It can be used with diverse security technologies requiring digital-certificate based authentication, such as SSL and SSH for secure device management and IPsec for layer 3 security. AuthAgent RADIUS interacts with enterprise authentication databases to decide whether embedded device it is used in should grant privileges or not. It secures everything from VPNs to wireless networks.
SSL VPN Software provides remote access solution.
Palo Alto, CA 94301
Sep 28, 2004 AccessPoint SSL VPN Toolkit v1.2 supports identity-based authentication, allowing network administrators to permit or deny access depending on whether valid SSL certificate is present. Multiple authentication domains can be created with different security requirements. Administrators can customize end user portal with optional login banner message, web cache control settings, portal theme, and navigation. Toolkit supports Microsoft Terminal Services v5.0.
File Compression Software offers 512-bit RC4 encryption.
Allume Systems, Inc.
Watsonville, CA 95076
Sep 27, 2004
StuffIt Deluxe v9.0 file compression, access, and organization software for Mac OS X offers archive tool that allows user to create StuffIt, Zip, and .tar archives from single location. DropStuff lets archives be saved directly to CDs, DVDs, and FTP servers. Segmentation technology splits archives across multiple disks as they are being created. ArchiveAssistant(TM) provides backup solution that allows user to archive folders on local or network drives.
Software provides data integrity monitoring solution.
Global Data Integrity
Carlisle CA1 2BS United Kingdom
Sep 21, 2004 Xintegrity Professional detects accidental or malicious changes to Windows systems during new software installation. Monitored areas include directory structure, registry, files security access permissions, and contents of files. This aids in identification of viruses, trojans, malware, and spyware. Software can also automatically create protected backup files, optionally encrypted with 256 bit AES, and send Email notifications whenever modifications are detected.
Software backs up data on Exchange® servers.
San Jose, CA 95120
Sep 20, 2004 Point-Click Recoveryâ„˘, a data protection management console for Microsoft® Exchange® Server, automates backup and recovery processes for Exchange servers in single or multi-server environment. Software backs up data as well as corresponding domain controller/active directory files without stopping services or suspending e-mail access. When recovery is required, it selects appropriate files and restores server to original state.
Software protects computers from Internet threats.
Armor2net Software Ltd.
Sparks, NV 89434
Sep 03, 2004 Armor2net Personal Firewall v3.12 provides complete spectrum of Internet security and Internet privacy for computers. It protects computer from hackers, data thieves, and other Internet-based dangers. Software monitors computer and tracks all connections, both incoming and outgoing, allowing user to determine which connections are allowed and which are not. Armor2net Personal Firewall also stops pop-up ads and searches computer for spyware.
Server Software protects against site downtime/disasters.
Provo, UT 84606-6194
Aug 26, 2004
Novell® Business Continuity Clustering v1.0 automates configuration and management of geographically dispersed clustered-server solutions, protecting business systems against site downtime. It also automates failover process between cluster sites with no loss of data or application services. Software connects and synchronizes 2-4 server clusters with up to 32 servers per cluster, enabling users to migrate services, configurations, and essential data.
Software enables control of portable storage devices.
GFI Software USA, Inc.
Cary, NC 27513
Aug 25, 2004 GFI LANguard P.S.C. prevents unauthorized users from taking information from network or introducing malware via USB sticks and other removable media. It also allows administrators to control connection of devices that can register storage in Windows, such as iPods, smartphones, digital cameras, and handhelds. Product installs 1.2 Mb agent on user's machine, which queries Active Directory when user logs on, and sets permissions for removable storage accordingly.
Software simplifies user account maintenance.
Bethlehem, PA 18017-8936
Aug 24, 2004 Running under Windows Server 2003 and XP Pro, D/3® Process Automation System v12.0 uses Windowsâ€™ Active Directory to maintain user accounts on IT Domain Controller for increased system security. Hardware interfaces include support for Siemens 505 I/O, HART, and NovaTechâ€™s Orion processors, and multi-level redundancy is available for historical trending. Advanced Diagnostic package is also included for monitoring and alarming health of control systems.
Data Recovery Software has batch backout capabilities.
IBM (Corporate Headquarters)
Armonk, NY 10504-1783
Aug 19, 2004 CICS® VSAM Recovery v3 recovers CICS and batch VSAM data after physical or logical corruption. Batch backout feature allows all updates made by failed batch job step to be removed from VSAM data sets, while file copy notification service allows program to be notified of logical backups created for VSAM data sets. With server address space available 24 x 7, software includes disaster recovery utilities that provide control over items sent to remote recovery site.
Software cleans-up Macs and enhances their performance.
Allume Systems, Inc.
Watsonville, CA 95076
Aug 19, 2004
Spring Cleaning® v7.0 consists of Mac clean-up tool that graphically displays size of files taking up unnecessary space. It also enables users to scan their computer and displays snapshot of what has changed since last scan. Other features clean out temporary and log files, while saving custom searches for use at later time. Software cleans up clutter, organizes files, and includes QuickCompare feature for comparison of files.
Software provides dual-monitor viewing solution.
Trier 54296 Germany
Aug 17, 2004 Running under Windows 2000/XP, MaxiVista® turns any existing desktop, laptop, or tablet secondary PC into additional display for primary PC. Its virtual graphics adapter fakes primary PC into believing that additional monitor display is installed. Screen content of extra display is transmitted to secondary PC via network connection and displayed by MaxiVista viewer program. Software provides lossless image quality without adding much to CPU or network load.
Antispam Software offers 6-step filtering process.
Shanghai 201203 China
Aug 11, 2004
Able to function with most POP3 mail clients, Lockspam Free v3.0 and Lockspam Pro v3.0 support multi-user OS and have 6-step filtering process for probable spam messages: allowed list, allowed keywords, blocked list, blocked keywords, Polesoft Security Pack, and heuristic Polesoft Anti-spam Engine. By blocking spam and unblocking innocent mails, software learns users' preferences and judges mail accordingly.
Windows Installer offers simplified authoring procedures.
Craiova 1100 Romania
Aug 11, 2004 Built on standard, open formats, Advanced Installer Professional v1.8 enables development of MSI packages. User interface requires no learning of scripts or editing of database tables. Program has ability to create installers that will check if prerequisite applications are present on target machine and optionally download and install them. Created install packages run on Microsoft Windows 9x/ME/NT/2k/XP OS.
(Showing headlines 2981 - 3000) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157