|
Security Audit Related Downloads
|
Apex SQL Log 2005.04
|
Apex SQL Log is a powerful SQL database auditing and recovery tool that analyzes SQL Server's own Transaction Log to display information on data and structural changes. Since Apex SQL Log reads the... |
|
|
|
|
EMCO EventLog Audit 1.0
|
EMCO Eventlog Audit collects the eventlog from the computers
on the LAN, to a database where you can search for any details
such as Event ID, Type, Category, Source, User SID, String from
the... |
|
|
|
|
Event Log Explorer 11.01.01
|
With thousands of devices in a network and millions of events per day, proficient event log managing is utterly important to keep the network up and running. Proper event collaboration, correlation... |
|
|
|
|
ThreatSentry 3.0
|
Host IPS/Application Firewall defends IIS against known and new attacks. An ISAPI filter hosted in MMC, ThreatSentry compares server requests to a knowledgebase and an evolving system baseline to... |
|
|
|
|
PortsLock 2.0
|
PortsLock is an endpoint security solution that allows system administrators to specify network policy rules based on user and group membership. It provides user-level network policy restrictions... |
|
|
|
|
Active System Locker 3.2
|
Use System Locker to restrict access to your PC by locking keyboard and mouse. It has startup and automation options, supports audit and scheduling features. Protects your system when you are... |
|
|
|
|
Remote Asset Tracker 1.6.8
|
Remote Asset Tracker is a network inventory and PC auditing program designed specifically for medium and large companies. It'll enable admins to take full control of all network assets with... |
|
|
|
|
CI Discovery Network Inventory 3.0.215
|
Comprehensive network inventory software for help desks and IT departments. No client installation required to audit targeted machines. Extensive hardware, software and system configuration data... |
|
|
|
|
PC Security Test 2006 5.0.0
|
PC Security Test is a free program for Windows that checks computer security against viruses, spyware and hackers. With a few mouse clicks, users can easily control the efficiency of their... |
|
|
|
|
EMCO RemoteAudit 2.0
|
EMCO RemoteAudit 2.0 collects installed software and hardware information from
Microsoft Network with export options to Access Excel Html and XML.
It is a read-only operation, nothing is written... |
|
|
|
|
IP-guard 2.74.2116
|
IP-guard enables your enterprise to understand exactly how the computer users are interacting with your information assets by capturing, collecting, managing and reporting the computer activities... |
|
|
|
|
LANwriter 1.0
|
LANwriter is a unique intranet software application for centralized, secure and audited publishing of data to CDs, DVDs, Pen Drives and FTP servers via a single computer on the network that acts as... |
|
|
|
|
O&K Print Watch 4.5.0.2462
|
Print manager to control and audit printing costs in your organization. O&K Print Watch helps managers learn about the true cost of printing by monitoring all local or networked print jobs. Cut... |
|
|
|
|
SLC Security Console 3.00
|
The SLC Security console is an integrated security console that supports Snort, Intruvert and Dragon IDS monitoring. Linksys wireless routers, Linux and Windows syslog devices for security events. |
|
|
|
|
FTP Scheduler Pro 7.1.8
|
This FTP utility was engineered with automation in mind. Strictly for businesses that require ftp'ng of files on a regular basis and requiring an audit trail to ensure data was Sent/Received as... |
|
|
|
|
Workshare Protect 4.5
|
Receive real-time warnings when your email or Office files contain passwords, social security and credit card numbers, financial data, hidden text or comments, private notes, and more. Workshare... |
|
|
|
|
Security Map 2007
|
With one nice poster, all the network and computer security vulnerabilities and threats, as well as the latest information security technologies, protocols and solutions are displayed. |
|
|
|
|
ManageEngine Security Manager Plus 5
|
Security Manager Plus is a network security scanner that proactively reports on network vulnerabilities and helps to remediate them and ensure compliance. With vulnerability scanning, open ports... |
|
|
|
Software: 21 to 40 of 200 | Pages: 1 2 3 4 5 6 ... 10 All | Freeware
|