Utilities & Tools ->
(Showing headlines 461 - 480) << 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ...
Virtual NAS File Server helps manage files in private cloud.
Natick, MA 01760
Sep 27, 2010
Nasuni Filer v2.0 supports Hyper-V server virtualization, Distributed File System (DFS) namespaces, as well as private clouds, allowing customers to provide their own cloud credentials. It allows users to restore their own files and to create volumes on Windows Azure, Microsoft's cloud services platform. Simplified file access with Microsoft DFS allows setup of DFS namespace and adding of desired share from Filer as folder target. Software also simplifies security and disaster recovery.
Data Security Software supports public cloud servers.
Glattbrugg 8152 Switzerland
Sep 24, 2010
Designed to work with existing web console interface, Cloud Server Security Suite enables customers to choose level of restriction they wish to achieve. Users can enable/disable FTP gateway functionality, control web console inactivity timeout periods, and allow 2-stage login authentication using SMS. To control access, users can switch off API access completely, create IP white list, allow http/https or only https API access, and choose between plain or digest authentification.
Access Management Software supports cross-platform systems.
Sunnyvale, CA 94085
Sep 24, 2010
Supporting 260+ versions of UNIX, Linux, and Mac OS X, Centrify Suite 2010 Update 2 centrally secures cross-platform data centers through Active Directory-based identity and access management of heterogeneous systems, hypervisors, and applications. Components include integrated authentication, access control, role-based privilege management, user-level auditing, and server protection solutions. Together, components consolidate identities across resources deployed on premise and in cloud.
Spam Filtering Software uses MS SQL server as backend.
Mosta MST01 Malta
Sep 23, 2010
With web-based quarantine and reporting interface, IMF Tune v5.5 can quarantine any email, even if blocked with SMTP rejection. General Reports feature gives overall picture of filtering performance through bar charts and line graphs, while Detailed Reports function provides more specific information, such as top list of spam sender IPs. Integrating with Exchange 2003 Intelligent Message Filter as well as Exchange 2007/2010 Content Filter, IMF Tune provides effective anti-spam solution.
Managed File Transfer Solution adds encryption capabilities.
Patrick Townsend Security Solutions
Olympia, WA 98501
Sep 22, 2010
Alliance FTP Manager v5.20 combines features of Alliance FTP Security, Cross Data, and All-Ways Secure into one Managed File Transfer product and adds encrypted PDF/zip file capabilities. Intended for IBM i customers who send data over networks, solution lets users generate encrypted and non-encrypted PDFs and then distribute them via email, FTP, or other methods. Users can also create Zip files, compatible with WinZip standards, and use various delivery methods for distribution.
Communication Software ensures secure data, voice transfer.
Zurich 8050 Switzerland
Sep 22, 2010
Suited for organizations dependent upon mobile communications, Qtalk secure enables encrypted, secure communication for telephone calls, chats, data transfers, and SMS. Security solution prevents any means of illegally procuring and viewing information from mobile communications. Integrated into existing infrastructure, solution delivers secure encryption/decryption based on Diffie-Hellmann 4,096-bit, Elliptic Curve 384-bit, and AES 256-bit modules.
Database Activity Monitoring Software assesses vulnerability.
Woburn, MA 01801
Sep 21, 2010
Providing database activity monitoring and intrusion prevention platform, Hedgehog Enterprise(TM) v4.0 includes Hedgehog DBscanner, which identifies sensitive data on network and secures it properly. Hedgehog DBscanner conducts more than 3,000 different checks of Oracle, Microsoft SQL Server, IBM DB2, and MySQL databases, discovering vulnerabilities. To simplify compliance audits, Hedgehog DBscanner provides regulatory compliance report templates as well as custom reporting.
Corporate Incident Tracking Software supports Encase® data.
DF LABS Srl
Milano 20123 Italy
Sep 21, 2010
IncMan - Incident Management Suite v3.5 manages over 170 types of customizable information. It enables users to personalize and reuse standard templates, to exchange notes and reports on incident and forensic investigations, and transfer information acquired with Encase®, including bookmarks and snapshots. Supporting entire incident tracking process from security to fraud, FISMA-compliant software also incorporates digital forensic case management.
Network Backup and Restore Software has open-source design.
Bacula Systems SA
Sep 20, 2010
Bacula Enterprise Edition 4.0(TM) offers open source backup and restore solution to enterprises, scalable up to thousands of servers and clients. It includes BWeb Enterprise Management Center to manage multiple data centers as well as Windows plug-ins such as registry, systemstate, Active Directory, Exchange, and SharePoint. Backup to disk, tape, and robotic media libraries is enabled, and program also features file level deduplication, security, and Microsoft VSS functionality.
Website Management Software helps develop secure SMB sites.
Alexandria, VA 22314
Sep 20, 2010
Bitrix® Site Manager v9.0 includes web anti-virus module, enabling it to prevent malicious code distribution to website visitors and provide detection and disinfection capabilities, including automatic purging of infected code. Design and content templates for corporate, personal, and community websites and online shops are integrated, along with step-by-step wizard. Software supports grid modeling for designing custom catalogs, inventories, directories, and contact management.
Backup Software restores irreplaceable files.
Boston, MA 02116
Sep 20, 2010
Able to recover lost files, photos, videos, and music, Carbonite 4.0 for Windows includes Restore Manager, which guides users through each step of restore process. Restore Search lets users search for and build complete list of files to restore. Program also provides ability to choose which files to restore first through Priority File Restore feature. If users are restoring to new operating system, Migration Wizard will ensure all restored data ends up in proper file structure.
Mainframe Security Software supports IBM z/OS 1.12 release.
Vanguard Integrity Professionals, Inc.
Las Vegas, NV 89120-3478
Sep 16, 2010
With Custom Fields support, Vanguard Security Solutions v8.2 lets users create and define custom fields without having to know native RACF commands. Ownership-based policy creation capabilities prevent unauthorized profile modifications to data set and general resource profiles. With real-time active alerts, users can rapidly respond to unauthorized changes in security postures. Custom Fields Reporting enables creation of predefined and QuickGen custom reports on all Custom Fields data.
Data Security Software helps meet compliance mandates.
Houston, TX 77002
Sep 16, 2010
Designed to monitor structured data and applications usage across enterprise, InfoSphere Guardium v8 alerts management to unusual activity. Program provides fraud protection for SAP systems as well as protection of SharePoint files. Database activity monitoring capabilities for IBM DB2 databases running on System z allow businesses to protect information from unauthorized access by administrators. Additionally, businesses can perform automated tests to assess security vulnerabilities.
Compliance Management Software supports cloud computing.
Hopkinton, MA 01748-9103
Sep 03, 2010
Featuring dashboard based on RSA® Archer(TM) eGRC platform, RSA Solution for Cloud Security and Compliance manages security, risk, and regulatory compliance of cloud infrastructures. Software gives organizations complete assessment of security and compliance posture across VMware virtual infrastructure. Dashboard integrates with library of more than 100 VMware-specific controls that map to global regulations such as PCI-DSS and HIPAA to ensure best practices for deployment.
Utility Company Software analyzes low-income assistance eligibility.
Schaumburg, IL 60173
Sep 03, 2010
Financial Assistance CheckerSM is score that helps utility companies qualify and recertify consumers for their low-income assistance programs. It automates large portion of manual review involved in these programs, and automatically recertifies customers, validates new customers for enrollment, and identifies customers not enrolled in low-income assistance programs. Product also helps users comply with Low Income Home Energy Assistance Program requirements.
PC Migration Software helps users move from PC to Mac.
Laplink Software Inc.
Bellevue, WA 98007
Sep 02, 2010
Designed to copy all selected files and folders from PC to Mac, Switch and Sync(TM) automatically converts email, contacts, and calendars from PC format for use on Mac with programs such as Apple Mail and Entourage. Program keeps all files and folders up-to-date with automated synchronization and SpeedSync® technology, which only syncs portions of files that have been changed. Software also uses SmartXChange®, which recognizes when files have been deleted, renamed, or replaced.
DoD Virtual Appliance Software suits BlackBerry Enterprise Server.
Herndon, VA 20171
Sep 02, 2010
SteelWorks® FedMobile(TM) VM helps deploy BlackBerry® Enterprise Server in Department of Defense virtual machine (VM) environments. Software installs in VM infrastructure to create complete DISA STIG-compliant BlackBerry Enterprise Server environment, while supporting new installations of BlackBerry Enterprise Server v5 as well as migrations from previous versions. It also includes EverAvail(TM) software suite for high availability, patch management, back-up, and disaster recovery.
Cloud-Hosted Security Service lets providers deliver secure access.
Waltham, MA 02451
Sep 01, 2010
Novell Cloud Security Service enables enterprises to extend their identity infrastructure to any public cloud. Any changes made to users or permissions are immediately replicated in cloud environment, ensuring one consistent identity and security framework for enterprise. Service includes application connectors that capture deep page-level user activity and provide audit stream for compliance purposes. User can log on directly or via enterprise identity system.
CDP Software for Mac offers backup, synchronization, cloning.
Irvine, CA 92618-2508
Aug 31, 2010
NTI Shadow v5 brings bootable clone backups, folder synchronization, and continuous backup to Mac. Continuous Data Protection (CDP) software consists of Universal Binary application for Mac OS X Snow Leopard, Leopard, and Tiger. Backups occur as changes are saved, and GUI with Mini Status window helps keep track of all backup jobs. Along with full system and native format backup, software offers user-configurable schedule, file filtering, and ability to back up to FAT32 volumes.
Operational Intelligence Software advances event-driven BPM.
Vitria Technology, Inc.
Sunnyvale, CA 94085
Aug 25, 2010
Incorporating Complex Event Processing, Business Process Management, and visualization, Vitria M3O Suite v3.1 enables companies to model, monitor, track, and analyze hidden processes in real-time; detect anomalies and exceptions as they occur; and correct exceptions before business process is jeopardized. BPMN 2.0-based BPM Process Engine includes Feed Server for capturing events that are signs of hidden processes, while CEP engine provides multidimensional event analysis.
(Showing headlines 461 - 480) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157