Utilities & Tools ->
(Showing headlines 401 - 420) << 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ...
Information Protection Software incorporates BI reporting.
Bedford, MA 01730
Feb 01, 2011
Providing complete visibility while respecting employee privacy guidelines, SureView(TM) v6.6 captures malicious activity by proactively auditing end-user behavior on computer endpoints for policy violations and high-risk activities such as accessing classified or proprietary data and trying to send it outside firewall. Reporting capabilities have infrastructure based on JasperReports open source Java reporting tool, and 64-bit computing support is standard.
Network Monitoring Software automates malware analysis.
Herndon, VA 20170
Jan 31, 2011
NetWitness Spectrum(TM) replicates knowledge, process, and workflow of malware analysts to enable identification of advanced and zero-day malware. Software includes thousands of questions about specific objects and related network behavior, and also leverages NetWitness Live to locate information from threat intelligence and reputation services to assess, score, and prioritize risks. It also provides full network visibility and extraction of all content, including executable data and metadata.
Email Security Service lets administrator secure individual users.
Webroot Software Inc.
Boulder, CO 80308
Jan 21, 2011
Providing channel partners with consolidated view of all end users, Webroot® Email Security Service offers flexibility to manage user provisioning. Administrators can add or edit users individually or in bulk file uploads, un-delete users, and configure site usage policies globally, either for all users or for select groups. Service also provides administrators with 3 views of user list for additional insights into activities.
Cloud-Based Software provides security-as-a-service.
Glendale, CA 91204
Jan 21, 2011
Designed to optimize benefits to channel partners and service providers that remotely manage clients' security, Panda Cloud Office Protection v5.05 features single sign-on access to products in suite, giving administrators 360° view of all vulnerability access points from same console. Inventory function identifies systems not administered or protected by solution, while password-protected application un-install prevents end users from removing protection without administrator's approval.
Data Security Software Suite is approved for government use.
General Dynamics Corp.
Falls Church, VA 22042
Jan 19, 2011
Unified Cross Domain Management Office (UCDMO)-approved for use by U.S. government organizations, Trusted Network Environment (TNE®) v10 comprises suite of cross-domain information sharing software tools. Cyber security tool delivers MS Office® suite of software tools to promote intuitive operation and transitions users from Solaris® 8 to 10 OS. By using data-labeling technology to separate classified and unclassified data, users see only what their individual security profiles allow.
USB-Based Virus Scanner identifies infected industrial PCs.
Hagiwara Sys-Com Co., Ltd.
Jan 19, 2011
Intended for Windows®-based industrial computers, Vaccine USB solves issues associated with connectivity for updates and system slowdowns due to real-time virus monitoring. Portable virus detection tool, powered by McAfee, does not require any software installation. Virus definitions can be downloaded to unit from any Internet-accessible computer, and virus scan program will auto-run when inserted into PC. LED lights indicate scan results, and detailed scan log is saved on device.
Data Backup Software integrates with Windows 7.
Austin, TX 78731
Jan 18, 2011
In addition to task-oriented, wizard-driven options for image backup, Handy Backup v6.9.2 features advanced options for Windows 7 backup as well as network resource backup options. Program integrates with Handy Backup Disaster Recovery, which makes it possible to create bootable recovery drive to load system from in case of major failure. Data recovery first-aid kit contains Clam Antivirus, PhotoRec file recovery utility, and Gparted partition editor.
Source Code Analysis Software helps avoid in-field failures.
Ithaca, NY 14850
Jan 17, 2011
CodeSonar v3.6 performs whole-program, interprocedural analysis on code to identify complex programming bugs that can result in system crashes, memory corruption, and other serious problems. Specifically, compile-time analysis identifies quality and security problems. In addition to analysis engine capable of handling large code bases, this static analysis tool features GUI that helps developers understand key information, identify most important issues, and prioritize fixes.
Network Security Services cater to real-world business needs.
Pleasanton, CA 94588
Jan 13, 2011
Delivered from cloud, on-premises, or as hybrid solution, MegaPath Managed Security Services leverage company's PCI-certified MPLS network and Fortinet's Unified Threat Management solutions. Compliance Services incorporate managed logging, vulnerability scanning, and Security Information Management, while Attack Mitigation includes advanced firewall and intrusion prevention with rogue wireless detection, web filtering, anti-malware, and application security with data leak prevention.
Browser History Erasing Software automatically deletes data.
Richmond V7A 5J4 Canada
Jan 03, 2011
Featuring support for Firefox 3.6, NetShred X v4.5.2 runs on Mac OS X and permanently deletes Internet cache, history, and mail so that data can't be recovered. Internet eraser software deletes files left behind by Web browsers and email programs. Designed to run automatically, program does not require any user intervention and runs in background so as not to interfere with Web browsing.
Network Protection Software supports IPv6 deployments.
Enterasys Networks, Inc.
Andover, MA 01810
Dec 29, 2010
Enterasys Intrusion Prevention Solution (IPS) protects systems from variety of network and host-based threats, and allows user to remove threat from any multi-vendor network without impacting it's performance. Solution automatically removes attacker's access to network and reconfigures network to prevent attacker's penetration technique. Enterasys IPS Host Sensors can be operated on VMware ESX server, Windows, AIX, HP-UX, and Solaris platform.
Compliance Software runs risk management as business process.
New York, NY 10018
Dec 24, 2010
Designed to help users understand and manage risks, BWise v4.1.2 runs risk management and compliance processes as normal business processes. By following organization's structure, BWise can automatically roll up compliance assessments to highest corporate level, including policy acknowledgements and compliance statements. Program provides off-line audit testing, planning, scheduling and time-keeping as well as drag-and-drop reporting, and assessment and questionnaire capabilities.
Smartphone Security Software supports multiple platforms.
Copenhagen S Cvr.nr.27252567 Denmark
Dec 24, 2010
BullGuard Mobile Security v10 protects smartphones by stopping viruses, spyware, and hackers from accessing phone, and also secures personal details even if phone is lost or stolen. Supporting Android, Symbian, Windows, and Blackberry platforms, it also features parental control and firewall functionality. Anti-theft module lets users remotely delete data, lock device, or locate it using GPS, while spam filters screen both text messages and calls.
Test Coverage Software automates in-circuit analysis.
Agilent Technologies, Inc.
Santa Clara, CA 95051
Dec 22, 2010
N1194A Agilent Test Coverage Consultant (ATCC) measures test coverage of product after tests have been developed, then predicts test coverage based on CAD layout files. This allows engineers to estimate test coverage early in product life cycle. Report analyzes coverage based on user-selectable, Agilent in-circuit test features as well as PCOLA-SOQ metrics. When used during prototyping phase, software helps test engineers estimate how well their product can be tested during mass production.
Enterprise Smartphone App Manager centralizes discovery, deployment, and security.
Mountain View, CA 94043
Dec 14, 2010
Release 4.0 of Virtual Smartphone Platform enables enterprise IT groups to centralize discovery, deployment, and security of internally- and externally-developed apps for all company mobile devices. It includes Enterprise App Storefront that allows delivery of in-house iPhone and iPad apps to employees. Companies are also able to keep out apps that create security holes or violate policies. MobileIron Mobility API is included to track what apps are on what devices.
Troubleshooting Software fosters development of 4G networks.
New York, NY 10011
Dec 14, 2010
LTE Monitoring Solution provides help to assess network performances, benchmark equipment and terminals, and carry out investigations of network behavior at early stage of LTE lifecycle. Used for monitoring, optimizing, and troubleshooting 4G networks, product offers features such as eRAN monitoring capabilities on S1 and X2 interfaces as well as User Plane analysis with PSM (Packet Service Monitoring).
Wi-Fi Network Analysis Software runs on smartphones and tablets.
Ekahau, West Coast
Saratoga, CA 95070
Dec 09, 2010
Minimizing IT managers' need to carry separate devices, Ekahau Mobile Survey offers tools for monitoring, analyzing, and troubleshooting WiFi networks via smartphones and tablet computers. Active and passive tests determine if WiFi network is functional and meets coverage/performance requirements for services such as VoIP, video, data, and real-time location tracking. Also able to detect rogue access points, solution measures coverage, data rate, packet delay, and packet loss.
Data Protection Management Software is intended for SMBs.
Kirkland, WA 98033
Dec 09, 2010
Prism Lite enables smaller organizations or individual departments in large enterprises with less than 500 data protection clients in house to determine overall health of data protection environments. Functionality lets users troubleshoot problem areas as well as trend use over time for auditing, capacity planning, and policy management. Additional Data Protection Service Management (DPSM) functionality may be added via upgrade to full version of Bocada Prism.
Performance Management Software helps manage VMware vSphere.
Clear Lake, IA 50428
Dec 08, 2010
TeamQuest Performance Software Release 10.3 automatically discovers and analyzes VMware clusters, hosts, and virtual machines. It is able to track configuration and performance of clusters over time, as well as detect, analyze, and troubleshoot cluster performance problems. Users can also drill down from problem cluster to underlying host and VM performance.
Data Security Software supports Apple iPad and iPhone.
Absolute Software Corp.
Vancouver V6B 6A3 Canada
Nov 30, 2010
Available with Absolute Manage, Absolute Manage Mobile Device Management enables IT departments to remotely manage, wipe, and lock Apple® iOS 4 devices from either PC or Mac computer. Program provides asset inventory, gathering over 67 hardware and software information items, including device serial numbers, MAC addresses, installed applications, and telephone numbers. With software, users can remotely deploy profiles to configure email, restrict applications, and set up VPN.
(Showing headlines 401 - 420) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157