Utilities & Tools ->
(Showing headlines 521 - 540) << 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ...
Disk Backup/Recovery Tool includes bare metal restore capabilities.
LabTech Software LLC
Toledo, OH 43604
Jul 07, 2010
Allowing users to deploy, automate, and manage client backup and recovery, LT Backup offers automated recoverability tests that execute daily to evaluate backup restorations. Its image-based backup captures snapshots of entire system and allows those images to be restored to any computer or virtual machine. Software also supports server migration processes, including physical servers to virtual servers, and can also set up, schedule, execute, and delete backup jobs.
Data Erasure Software secures smartphones for reuse or disposal.
JOENSUU 800110 Finland
Jul 07, 2010
Capable of erasing up to 150 devices/day, Blancco Mobile Edition helps eliminate risk of inadvertent data leaks by erasing retired smartphones that may contain sensitive business and personal information. Program securely overwrites all data and provides detailed erasure reports for audit and regulatory purposes. Consisting of Windows PC application and platform-specific smartphone clients, program is compatible with smartphones running Symbian, Blackberry, and Microsoft operating systems.
Data Security Software includes firewall management features.
Skybox Security, Inc.
San Jose, CA 95110
Jul 06, 2010
Designed to help prevent cyber attacks and avoid risks of network outages, Skybox View v5.0 consists of 3 products that meet needs of enterprise and mid-size organizations. Firewall Assurance identifies compliance issues and risks in firewall configurations and features capibilities to streamline change management process. Network Assurance evaluates network and access policy compliance, while Risk Control provides detailed model of network and potential risks and attack scenarios.
Hybrid Software-as-a-Service provides email security solution.
Trend Micro, Inc.
Cupertino, CA 95014
Jul 06, 2010
Integrating in-the-cloud protection and SaaS security services with on-premise virtual appliance, InterScan(TM) Messaging Security Virtual Appliance 8.0 stops email threats close to source without compromising email privacy. Solution is powered by Trend Micro(TM) Smart Protection Network, which scans, filters, and correlates more than 20 billion emails, Websites, and files every day. By scanning URLs embedded in emails, Web Reputation technology determines if link will lead to malicious Website.
Data Discovery Suite integrates loss prevention functionality.
Identity Finder, LLC
New York, NY 10107
Jul 02, 2010
Developed to address needs of small and large organizations, Enterprise Suite v4.5 reduces risk of data leakage by discovering and protecting sensitive information across organization. It automatically searches through electronic data in files, emails, and system areas on desktops, servers, databases, websites, and other remote devices. Then, software provides workflow to remediate any unprotected sensitive information by shredding, redacting, encrypting, or quarantining data.
Online Backup and Recovery Software protects business server data.
Middleboro, MA 02346-1030
Jul 01, 2010
Powered by Nine PRO protects business servers of all sizes and gives managed service providers online backup and recovery service to offer to business clients and partners. It provides block-level global data deduplication and compression to minimize data size, number of files, and bandwidth impact. Scalable to protect unlimited amount of data, product offers simple administration and management console and has built-in mechanism for data protection through replication.
Email Security Software includes Policy Management module.
Jun 30, 2010
Available as standalone software, virtual appliance, or hardware appliance, modusGate(TM) v5.0 performs spam filtering and data leakage prevention for virtual and physical email servers. Sender Reputation System delivers real-time IP reputation to counter modern botnets, while integrated Policy Management module lets organizations control what content can leave or enter local network through email, and whether it should be rejected, moderated, encrypted, archived, or redirected.
Identity Security Software extends access control to cloud.
San Mateo, CA 94403
Jun 29, 2010
Delivered to enterprises as virtual machine, myOneLogin Enterprise Connector v2.0 enables business users to enter login only once to securely access all applications in cloud as well as on company network. Solution integrates desktop authentication, SSL VPNs and directories with myOneLogin Identity Services Platform to eliminate dependence on passwords, security exposures, and administrative overhead from resets and other credential management activities.
IT Management Software works with security, restore solutions.
Faronics Technologies USA Inc.
San Ramon, CA 94583
Jun 22, 2010
To help organizations achieve layered security approach to protect IT environment, Deep Freeze v7 leverages management capabilities of Faronics Core system-restore software and also integrates with Faronics Anti-Virus. Workstation protection solution eliminates need for IT professionals to perform rebuilds, re-image, or troubleshoot computers. IT administrators can retain data between protected sessions by redirecting user accounts to unprotected partition or Thawspace.
File/Email Security Software supports secure Web file transfer.
Randolph, NJ 07869-4222
Jun 22, 2010
Used for securing files, email messages, and attachments, ESafeFile v5 supports direct uploading of large files that cannot be emailed to secure password protected internet site using CDXWebSpace. Solution creates encrypted, password-protected self-extracting files, includes contact management functionality, and uses secure AES. Compatible with MS Outlook and Outlook Express as well as other MAPI-based email programs, software also supports standard browser uploads.
All-Inclusive Network Security System averts hybrid attacks.
Mahwah, NJ 07430
Jun 14, 2010
APSolute Attack Prevention includes DefensePro, with throughput of up to 12 Gbps, that has signature, protocol anomaly, and traffic anomaly detection as well as stateful inspection. APSolute Vision tool is provided for centralized attack management, real-time monitoring, forensics, and historical reporting across modules and DefensePro devices. System is backed by Emergency Response Team service for professional attack response and restoration of network and service operation.
Network Security Software proactively stops viruses, malware.
Jersey City, NJ 07310
Jun 09, 2010
Comodo Endpoint Security Manager v1.5 combines malware prevention of Comodo Internet Security v4.0 software with centralized administration features for businesses with dozens to thousands of PCs. Files on safe whitelist are allowed to run and access critical system resources or information, and all other files are either blocked or automatically sandboxed. While sandboxed, application is closely monitored and can only write to virtual file system and registry.
Data Communications Software ensures secure IM, A/V file transfer.
Nashua, NH 03063
Jun 04, 2010
Dedicated to real-time secure messaging and information sharing for commercial organizations, MxM Secure provides both data protection as well as audit capabilities. Open standards-based software suite, featuring user-configurable GUI and adaptable functionality, offers secure IM, audio chat, and desktop/document sharing as well as synchronous/asynchronous file transfer and document management.
Authentication Software helps protect networks, applications.
Vasco Data Security Inc.
Oakbrook Terrace, IL 60181
Jun 04, 2010
DIGIPASS® for Windows accommodates companies that need to add strong authentication in order to secure their networks and applications, without using hardware-based devices or mobile phones as client authentication platforms. Optimized for securing remote access or online applications, solution resides on end-user desktop and supports one-time password (OTP), PIN code, and digital signature (e-signature) authentication. Users can also directly open protected web application.
Bug and Issue Tracking Software features customizable design.
14700 Prague Czech Republic
Jun 03, 2010
Adaptable to specific user needs, YouTrack v2.0 combines issue reporting with native language-like search queries and batch operations on multiple issues from command window. Users can create and manage custom attributes, perform batch operations programmatically with YouTrack REST API, and tune visibility for individual issues containing non-public data. With query-based search syntax, auto-completion, and highlighting features, users can quickly find and filter issues.
PC Cleaning/Repair Utility optimizes system functionality.
D'Iberville, MS 39540
Jun 02, 2010
As all-in-one cleaning utility, FixCleaner v2.0 repairs, updates, and stabilizes PCs. Updating utilities include patch support for one-stop software update control, junk-file cleaning, and performance gauges for tracking progress of cleaning and scanning. Removing software records no longer installed helps prevent system errors, while removing temporary junk files and bulk data frees up disk space. Also, functionality helps optimize start-up and Internet settings for less delay.
Data Backup Software offers adaptive deduplication.
Columbia, SC 29203
May 27, 2010
Unitrends Release 5 software features adaptive deduplication data reduction capability that reduces storage footprint of protected content. Software also has vStorage API-based VMware protector that supports VMware ESXi v3.5/ESXi backup v4.0 as well as VMware ESX v3.5/4.0. Disk-to-disk-to-disk archiving system supports appending of archives, and SQL Server backup option is also included. Product is available for all Unitrends all-in-one server backup appliances.
Windows Calendar Software manages recurring tasks and events.
Saint-Petersburg 199397 Russian Federation
May 27, 2010
Enabling users to add single event or create recurring event with multiple occurrences, Calendarscope v5.0 allows them to set start and end dates/times, add subject, specify location, define item type, set priority, and add notes. Events can be rescheduled by dragging and dropping, and tasks or events that had been previously marked as complete can be reactivated. Software also offers keyword search, simple information filters, encryption for sensitive data, and complex to-do lists.
CD/DVD Data Recovery Software suits Windows-based systems.
Digital Atlantic Corp.
Bradenton, FL 34203
May 26, 2010
CDRoller v8.81 recovers lost files from discs created by drag and drop CD/DVD/BD writing software. It includes UDF Reader for direct access to discs with UDF file systems and can find accidentally deleted files, files in corrupted folders, and files on incorrectly closed or quick-formatted discs. User can make new disc with recovered video while examine sectors allow view of sector content in text, binary, hexadecimal, or unicode mode. Flash data recovery is also included.
Secure File Transfer Software supports any data transport method.
Egress Software Technologies Ltd
London United Kingdom
May 25, 2010
Egress Switch v2.0 allows users to protect/classify confidential information sent by email, CD/DVD, and USB or uploaded to internal/Cloud servers. Recipients are notified automatically when large files are sent, while information owners can track user activity and revoke access in real-time. Automatic association between authorized email recipients and encrypted data eliminates need for passwords. Delivered as SaaS, product uses AES 256-bit encryption.
(Showing headlines 521 - 540) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157