256file.com
Security Software

Games
Graphic Design Software
Developer Tools
Utilities & Operating Systems
Security Software
Business Software
Video Software
Entertainment Software
Communications
Productivity Software
Home Software
Networking Software
MP3 & Audio Software
Browsers
Screensavers & Wallpaper
Educational Software
Drivers
Internet Software
iTunes & iPod Software
Digital Photo Software
Desktop Enhancements
Travel
The Download Blog
Features
Downloads
Security Software

Corporate Security Software

P2 Commander 3.6 Perform computer forensic examinations, e-mail analysis, and deleted data recovery.
Device Seizure 6.6 Monitor driver
Gidiware_Dexktop_Security 1.5 Restrict users from using certain applications on a PC.
TekCERT 2.2.0 Generate self-signed certificates and Certificate Signing Request (CSR).
ForYourIrisOnly 32-bit 2.0.24 Manage user data, protect accounts, and control privacy using biometric data.
HT System Administrator 8.8.5 Store all your passwords and usernames in an encrypted file.
Fortres 101 7.0.5522 Restrict and control local hard drives, folders, applications, and Windows operations.
Clean Slate 7.0 Build 4432 Clear unwanted user changes at log off and reboot providing a clean, secure, and consistent computer.
Malicious File Hunter 2.1 Find malware files on your business network using exact or wildcard search for suspicious files.
Trusteer Management Application Not available Web-based reporting and configuration console for Trusteer's customers.
Trusteer Cybercrime Prevention Architecture Not available Enable organizations to protect their employees and customers against advanced threats and targeted attacks.
Trusteer Mobile App (Secure Browser) Not available Provide end users with a secure mobile browser that ensures safe web access.
Embedded Security Library for Native Mobile Apps Not available Embedded Security Library for Native Mobile Apps
Trusteer Mobile Risk Engine Not available Conclusive Mobile Fraud Risk Detection Based on Device and Account Risk Factors Across Channels.
Trusteer Rapport Not available Prevent phishing and Man-in-the-Browser (MitB) malware attacks.
Trusteer Apex Not available Prevent phishing and Man-in-the-Browser (MitB) malware attacks.
Trusteer Pinpoint Account Takeover (ATO) Detection Not available Protect web sites against account takeover and fraudulent transactions.
Trusteer Pinpoint Malware Detection Not available Detects malware infected devices and determines both the nature of the threat and the risk it represents.
XML Link dumper 1.2 beta Provide a tool which aids in mapping out web servers for security testing.
SpectraByte Anti-Executable Security 2.1 Enforce parental control and security policies.

183 programs in this category / 10 pages.
1 2 3 4 5 ... 10


Contacts