Software Downloads for "Edata Security Management"

The NTFS Security Management Suite 2014 is a packaged solution offering the combined potential of NTFS Security Auditor and the NTFS Security Manager. While the Auditor helps Windows administrators with security audit reports, the Manager helps them copy, modify or create new permissions by managing ACEs and the ACLs. This solution is a must have for Windows systems administrator who need regular updates into the permissions and security configuration of their networks as well as a quick window to update the security configuration when the moment arises.

Clear Blue Security is a free full-featured endpoint security management suite that monitors, detects and reports endpoint security vulnerabilities, including the monitoring of installed malware applications, providing status on updates and patching, implementing a company wide security policy, monitoring installed but unapproved software, alerting suspicious and possibly malicious traffic and scanning network facing IPs for unwanted open ports.By installing Clear Blue Security, an IT professional will be provided an instantaneous assessment of their entire endpoint security situation that includes every desktop PC and even laptops outside the network.

ISO 17799 - Code of practice for information security management. Creation of methodology and documentation for audit adapted to ISO. One is made up of an introduction on general aspects of the security of the information.
Open Information Security Management Gui License - GNU General Public License (GPL).

  • Platform: WinOther
  • Publisher: Iso17799
  • Date:

Avira Professional Security will reliably protect your Windows computers from virus and hacker attacks while using as few resources as possible. Optimum protection against viruses and other undesirable elements - Rootkit protection to detect and remove hidden malware installed in computer systems - AHeAD technology to detect and repulse unknown or fast-changing attackers - Real-time monitoring of all access to files by an on-access scanner (incl. archive scanning) and an on-demand scanner for manual/scheduled searches - AntiVir ProActiv detects attacks from the system’s behavior patterns and repells them immediately - Integrated WebGuard to check HTTP-based Internet data traffic for viruses and malware.

  • ATool
  • License: Freeware
  • Rating

An advanced security management software that will detect and deal with all kinds of harmful applications ATool is a small, but powerful security management tool, which can detect and deal with all kinds of harmful programs.. Antiy Ghostbusters - Free Download Anti Spyware, Antivirus, Adware,Trojans,Internet Security software. Antiy Ghostbusters detects, removes and protects your PC from thousands of potential threats including adware, Trojan,virus, spy bots..

  • Platform: Windows
  • Publisher: antiy.net
  • Date: 26-9-2009
  • Size: 2099 KB

The Tyco Integrated Security Mobile Security Management app has been updated with exciting new capabilities — easier, more intuitive security system control, user management and remote location management features. It’s a terrific way to help you improve your work life balance as well as business productivity and efficiency with enhanced security management. The app combines remote control security with the ability to view live streaming video of your business wherever you are on your Android™ smartphone or tablet.

evalSMSI is a web application, developed in PHP / MySQL, to evaluate the Information Security Management System for some entities..

Enterprise security management system using server/agent technology that combines many security and administration tools under a single integrated console..

Role Manager is a security management framework based on the NIST model for Role Based Access Control (RBAC) and the Java[TM] 2 Platform security standards. The access control policies and the RBAC Model are implemented using the RBAC profile of XACML..

The goal of this project is to develop an open source event correlator called SEC (Simple Event Correlator) that could be used for network management, log file monitoring, security management, and other tasks which involve event correlation..

Security Officers Management and Analysis Project (SOMAP) is all about defining security management work methods and supplying Security Officers with tools to do their job more efficient and following standards easily..

  • Platform: Linux, Mac, Unix, Windows
  • Publisher: somap.org
  • Date: 12-11-2012
  • Size: 13190 KB

MessageWatch is a community driven email security & management system harnessing the power of industry leading open source software.

PicSafePro is an easy-to-use photo security management tool.With its double security locks, we firmly believe it is the most secure app in the Marketplace.

Features:
*Double password settings for both the app and the album.
*Take photos directly from the app. Multiple import methods: Multiple images import,Auto-sync.
*Multiple images Move/Export/Delete.
*Share photos directly on Facebook,Twitter ect.
*Support sort-by-date.Smooth "Pinch and Zoom" operation.
*Customize album property.

ISO 28000:2007 specifies the requirements for a security management system, including those aspects critical to security assurance of the supply chain. Security management is linked to many other aspects of business management. Aspects include all activities controlled or influenced by organizations that impact on supply chain security. These other aspects should be considered directly, where and when they have an impact on security management, including transporting these goods along the supply chain.

  • Platform: Android 2.x, Android 3.x, Android 4.4, Android 4.x
  • Publisher: Dasinfomedia
  • Date: 16-12-2014
  • Size: 1024 KB

*** GuardTek m-Post subscription required. Contact sales for more information at 845.474.0033 or visit www.trackforce.com ***

THE COMPLETE MOBILE SECURITY MANAGEMENT SOLUTION!
You will be able to monitor your personnel’s job attendance, review all incident and event reports, follow guard tours in real-time, etc.
REAL-TIME REPORTING
Reports are generated in real-time and are immediately actionable. All reports are online all the time.
FIELD REPORTS WITH PHOTOS, VIDEOS AND SIGNATURES
Incident and event reports include photos, videos, and signatures for greater accuracy.

THE COMPLETE MOBILE SECURITY MANAGEMENT SOLUTION!
You will be able to monitor your personnel’s job attendance, review all incident and event reports, follow guard tours in real-time, etc.
REAL-TIME REPORTING
Reports are generated in real-time and are immediately actionable. All reports are online all the time.
FIELD REPORTS WITH PHOTOS, VIDEOS AND SIGNATURES
Incident and event reports include photos, videos, and signatures for greater accuracy. Guard tour reports include photos, videos and comments.

Comodo Endpoint Security Manager (CESM) enables the remote, centralized management of end-point security products such as Comodo Internet Security on corporate workstations. With Comodo Endpoint Security Manager you will save time, money and increase network wide security. Unlike conventional security software providers; Comodo has adopted a Default Deny Protection model.

Default Deny Protection takes an advanced approach to preventing security breaches and reducing downtime. By working within the universe of known and safe executables, unknown applications within the environment are challenged prior to execution.

The Microsoft Security Compliance Manager package provides centralized security baseline management features, a baseline portfolio, customization capabilities, and security baseline export flexibility to accelerate your organization's ability to efficiently manage the security and compliance process for the most widely used Microsoft technologies.

Take advantage of the experience of Microsoft security professionals, and reduce the time and money required to harden your environment. This end-to-end Solution Accelerator will help you plan, deploy, operate, and manage your security baselines for Windows client and server operating systems, and Microsoft applications.

  • Platform: Windows
  • Publisher: Microsoft
  • Date:
  • Size: 34713 KB

Metadefender Endpoint Management (MEM) leverages the OESIS Framework to verify the security and compliance posture of endpoint devices via static analysis. MEM also exposes APIs to enable third party solutions to consume and react to reported postures. Compliance checks report the status of: Encryption Password protection Operating System patch level Anti-malware protection Patch management clients Potentially unwanted applications (File sharing, toolbars, etc.) Endpoint detection & response (EDR) clients And more Security checks report indications of infection by: Reporting threats identified by locally installed anti-malware Reporting reputation of remote connections of the device And more Supported endpoint operating systems: Windows (XP - Windows 10) Windows Server (2008 - 2012 R2) OS X (10.

  • Platform: Mac OS X
  • Publisher: OPSWAT, Inc.
  • Date: 18-10-2016
  • Size: 7040 KB

Now security of the Information is very important to be gone to the Information Technology department. As security of the information is now a main issue at the level of business. Today information is the best support of any business. Something that is of worth inner side the organization would be of worth to someone outer it. The panel is accountable for making sure that decisive information and the expertise that house and courses it, is protected. Regulation and legislation is an issue of governance.

New Reviews


Print Inspector

Whether you are using a printer connected to your local desktop computer or a print server sometimes you need to see whats going on in your printer by having a close look at the print jobs sent by the users. Print Inspector is such type software ...


Disk Genius

Disk Genius was formerly known as Partition Guru which is an all-in-one solution for disk partition management, data recovery and disk repairing. It can recover lost files from partition, backup and restore partition table, clone partition or clone ...


Safe In Cloud

It is quite difficult to find any computer users nowadays who do not need to use the web, for any purpose. Whether it is for education or entertainment, the web is your best resource. You also need to use various online services for banking, ...


PictBear

Nowadays, a majority of PC users resort to digital image editing once in a while. It may be required for retouching image captured in smart phones or for creating an album in Facebook. For some people, tinkering with digital images is a pastime too. ...


Panda Cloud Cleaner

PC security has become a tricky and complicated subject both for home users and network supervisors, with complexity and risk factors multiplying over the years. Using a single antivirus app may not be enough anymore. That explains why many users ...


SnapCrab

Nearly every PC users need to take screenshots from time to time, whether it is for personal or professional needs. While using the basic Windows screenshot capture method is available, it is not adequate for everyone. When you want to capture ...


BitKiller

Dealing with various types of data efficiently holds the key to success in any computing task. Apart from generating new data and modifying existing files, it becomes necessary to delete existing files at times. While most users resort to using ...


SeaMonkey, Portable Edition

Using the Internet has become a necessity for a majority of people, including those who do not use a PC regularly. To browse web, stream video or download online content, people often resort to using various third party apps. For example, using ...


TuckAway Intelligent Email Organizer Pro

Using an email software allow you to do a number of things including managing your address lists, emails and even ending memos, documents and even virtual letters. You can also use it to manage your tasks easily. The email software comes in ...


WebAcappella

Web design sector has witnessed several trends and technological innovations affect website development in big ways. With time, designing websites has become easier. Nowadays, you can find web design software that nearly eliminates the need to ...


New Downloads

Flowrigami

Flowrigami is an open-source
BPM workflow editor and
visualization tool that allows
creating, editing and
visualizing ...

Awave Studio

Awave Studio is a
multi-purpose audio tool that
reads 300 audio file formats
from different platforms,
synthesizers, ...

Acronis True Image for Mac

Acronis True Image - the only
personal backup software that
actively defends against
ransomware. Protect the
personal ...

InterBase Data Access
Components

IBDAC is an enhanced component
library for fast direct access
to InterBase, Firebird and
Yaffil from Delphi, C++Builder
...

dotConnect for Oracle

dotConnect for Oracle is an
enhanced ORM enabled data
provider for Oracle that
builds on ADO.NET technology
to present a ...

Sheet Lightning Pro

Sheet Lightning is a
specialised engineering 2D/3D
CAD System for creating and
unfolding sheet metal designs
for ...

Copernic Desktop Search

Smart Windows Desktop Search
engine for your computer
provided by Copernic. Copernic
Desktop Search is the best ...

Database Workbench Pro

Cross database engine
developer IDE for PostgreSQL,
InterBase, SQL Server,
Firebird, MySQL, Oracle,
NexusDB, MSDE and ...

EasyCargo

Truck and container loading
software. Easy to learn.
Unlimited load plan
calculations, manual load plan
adjustments. Real ...

Active@ UNDELETE

Losing important data due to
accidentally deleting it or
formatting a disk can leave
you in a very bothersome
situation. ...