Software Downloads for "Symantic Endpoint"

My Endpoint Protector provides device control and data loss prevention to everyone who want to centrally manage and control the use of USB, FireWire and other ports and portable storage device use. It works for PC and Mac OS X. Free for personal use. It is a SaaS Solution, meaning the management is happening in the cloud over an internet browser. My Endpoint Protector Key Benefits: 1. Centrally manage your endpoint / device use from anywhere 2. No server setup (hardware, licenses or maintenance) 3.

  • Platform: Mac, Windows
  • Publisher: CoSoSys
  • Date: 17-06-2010
  • Size: 4371 KB

Comodo Endpoint Security Manager BE (ESM BE) centrally manages the deployment of award-winning Comodo Internet Security (CIS) software that protects desktops and servers your business relies on. Offering unbeatable protection against internal and external threats, the Business Edition is specially designed to suit the needs of small businesses, ESM BE can be installed on a Windows server/ non-dedicated Windows PC and features highly detailed reports, task-orientated wizards, real-time alerts, automatic enforcement of security policy and a clearly organized touch-screen interface that helps admins resolve issues as soon as they occur.

Microsoft Endpoint Protection for Windows Azure provides the ability to include an antimalware protection agent in each Windows Azure virtual machine running your Windows Azure service.

It extends the Windows Azure SDK by providing an antimalware import which provides antimalware configuration and deployment capabilities.

Get Microsoft Endpoint Protection for Windows Azure and try it for yourself to fully assess its capabilities!

.

  • Platform: Windows
  • Publisher: Microsoft
  • Date:

Comodo Endpoint Security Manager (CESM) enables the remote, centralized management of end-point security products such as Comodo Internet Security on corporate workstations. With Comodo Endpoint Security Manager you will save time, money and increase network wide security. Unlike conventional security software providers; Comodo has adopted a Default Deny Protection model.

Default Deny Protection takes an advanced approach to preventing security breaches and reducing downtime. By working within the universe of known and safe executables, unknown applications within the environment are challenged prior to execution.

These tools make it easier for Forefront Endpoint Protection 2010 customers to use Group Policy for centralized management, provide optimized settings for various server roles, and diagnose and troubleshoot support issues.

FEP Group Policy Tools (fep2010grouppolicytools-en-us.exe)
The FEP Group Policy tool is used to import settings from FEP policy XML files into a Group Policy Object (GPO) in an Active Directory domain, or into the Local Group Policy object on a Windows computer.

  • Platform: Windows
  • Publisher: Microsoft
  • Date:

The System Center Security Monitoring Pack for Endpoint Protection provides real-time monitoring of your Endpoint Protection clients by using System Center Operations Manager. Alerts can be configured for virus activity, firewall downtime, or update failures.

In addition to real-time event monitoring, the Endpoint Protection Security Management Pack also provides automated response capabilities to remediate security related issues.

Get System Center Security Monitoring Pack for Endpoint Protection and try it for yourself to see just how useful it can actually be for you!

.

  • Platform: Windows
  • Publisher: Microsoft
  • Date:

Metadefender Endpoint Management (MEM) leverages the OESIS Framework to verify the security and compliance posture of endpoint devices via static analysis. MEM also exposes APIs to enable third party solutions to consume and react to reported postures. Compliance checks report the status of: Encryption Password protection Operating System patch level Anti-malware protection Patch management clients Potentially unwanted applications (File sharing, toolbars, etc.) Endpoint detection & response (EDR) clients And more Security checks report indications of infection by: Reporting threats identified by locally installed anti-malware Reporting reputation of remote connections of the device And more Supported endpoint operating systems: Windows (XP - Windows 10) Windows Server (2008 - 2012 R2) OS X (10.

  • Platform: Mac OS X
  • Publisher: OPSWAT, Inc.
  • Date: 18-10-2016
  • Size: 7040 KB

Privacyware's Endpoint Security Console (ESC) provides a centralized administrative control capacity for assuring network endpoint protection on desktop and notebook computers utilizing Privacyware's popular Personal Firewall and Intrusion Protection Application, Privatefirewall. ESC enables system administrators to install, monitor, and configure Privatefirewall endpoint defense solution on any Windows workstation, laptop or host within a server domain. Settings can be customized for individual computers or for Users/Groups defined and configured within Active Directory.

  • Platform: Windows
  • Publisher: Privacyware.com
  • Date: 14-12-2006
  • Size: 23121 KB

Cryptzone Endpoint Encryption is a complete desktop solution which features three products in one: Secured eMail (email encryption), Secured eFile (file/folder encryption), Secured eUSB (USB flash drive encryption). They are all tightly integrated with Windows and require very little time to get used to and start working with. Secured eFile: Secured eFile is a file/folder encryption solution designed for ease-of-use, while maintaining the highest possible level of security. Secured eFile is tightly integrated within your current environment, lying merely as a thin layer on top of your existing infrastructure.

  • Platform: Windows
  • Publisher: Cryptzone
  • Date: 19-03-2009
  • Size: 11100 KB

Lock the Bad Guys out of your USB ports with MyUSBOnly; Block Untrusted USB Memory Stick Activity in Office. Secure Your Files: Stealing information - or just reading it without permission - is a lot easier than it used to be. Prevent data theft by blocking all but your trusted USB storage devices. Stop your files from walking away on thumb drives, mp3 players, flash cards and portable USB hard drives. Secretly log all USB connect and disconnect activity. Run it invisibly, so you can catch, as well as deter, problem coworkers, visitors, family members, or managers.

  • Platform: Windows
  • Publisher: A.C. Element
  • Date: 05-09-2009
  • Size: 2631 KB

Comodo Business Antivirus enables remote, centralized management of PC security products such as Antivirus, Firewall and Disk Encryption on business workstations. With Comodo Business Antivirus businesses can save up to $30 per endpoint per year with the Power Management feature that allows administrators to control power settings from the management console. Comodo has integrated a game changing technology Default Deny Protection(tm) and Auto Sandbox Technology(tm). Default Deny Protection(tm) prevents virus attacks by working within a universe of known and safe applications, unknown applications are by default challenged prior to execution.

To protect your PC, we recommend to use Endpoint Protector Basic to monitor and control ports and interfaces such as USB, FireWire, card reader, CD / DVD, etc on your PC. This will protect them against unwanted use of portable storage devices like USB sticks, SD cards or portable hard drives to prevent data theft or data leaks. The best companion for your application firewall, Endpoint Protector Basic is designed to protect your computer’s endpoints acting as a USB firewall. Endpoint Protector Basic installs on your PC and helps you manage your USB device fleet and also to control what devices are authorized to connect to your computer.

  • Platform: Windows
  • Publisher: CoSoSys
  • Date: 17-12-2010
  • Size: 13576 KB

This function uses the Vincenty direct algorithm to solve the "forward geodesic problem," which is the problem of computing the endpoint of a geodesic (shortest-distance) path on the ellipsoidal earth, given the start point, a path length, and a starting azimuth. This process is also called "reckoning." In 1975, Vincenty published a rapidly converging algorithm for this calculation. Since then, his algorithm has since seen significant implementation in geodesy and engineering. The algorithm is precise to within a few millimeters.

  • Platform: Matlab, Scripts
  • Publisher: Michael Klede
  • Date: 10-05-2013
  • Size: 10 KB

This function solves the "forward geodesic problem," which is to compute the endpoint of a geodesic (shortest-distance) path on the ellipsoidal earth, given the start point, a path length, and a starting azimuth. In response to a user request, this function numerically inverts the previously published VDIST function, which is contained within. (VDIST solves the "inverse geodesic problem" of computing the distance and azimuth between two known points, using Vincenty's 1975 algorithm.) Although numerically inverting VDIST is not a very efficient way to solve the forward problem, it provides a quick solution and also serves as an example of how to invert a function numerically in Matlab.

  • Platform: Matlab, Scripts
  • Publisher: Michael Kleder
  • Date: 08-04-2013
  • Size: 10 KB

Twitter Media Endpoint allows you to use your WordPress install with your Twitter client to upload media, and host it on your site, where you maintain control and ownership. This is an initial release, and my first WP plugin, please report back any issues. When you use a service like Twitpic to upload media your media falls under that site's terms. You often lose most, if not all rights to your photos. With Twitter Media Endpoint you are uploading you images to you personal blog. A site you own have control over, thus you maintain control of your work.

  • Platform: PHP, Scripts
  • Publisher: sterling
  • Date: 01-03-2013
  • Size: 256 KB

This is the official location of the Endpoint Manager Module for FreePBX
Endpoint Manager License - GNU General Public License (GPL).

Kaspersky Endpoint Security uses the most modern technologies from Kaspersky Lab to protect Windows workstations and servers on business networks.

Business changes are placing tremendous demands on IT. New technologies are being adopted by IT as a response to these pressures - but these trends pose critical and dangerous malware risks to the organization.

Kaspersky enables customers to embrace new technologies and feel confident that they’re protected against the threats of tomorrow’s IT trends.

  • Platform: Windows
  • Publisher: Kaspersky
  • Date:

Microsoft Forefront Endpoint Protection, the next version of Forefront Client Security, will enable businesses to simplify and improve endpoint protection while greatly reducing infrastructure costs.

It builds on System Center Configuration Manager 2007, allowing customers to use their existing client management infrastructure to deploy and maintain endpoint protection.
Microsoft Forefront Endpoint Protection is powerful solution for securing your working environment!

NOTE:
- Forefront Endpoint Protection System Requirements can be found here.

  • Platform: Windows
  • Publisher: Microsoft
  • Date:

Clear Blue Security is a free full-featured endpoint security management suite that monitors, detects and reports endpoint security vulnerabilities, including the monitoring of installed malware applications, providing status on updates and patching, implementing a company wide security policy, monitoring installed but unapproved software, alerting suspicious and possibly malicious traffic and scanning network facing IPs for unwanted open ports.By installing Clear Blue Security, an IT professional will be provided an instantaneous assessment of their entire endpoint security situation that includes every desktop PC and even laptops outside the network.

Naturally this also includes Avira Management Console to efficiently administer the Avira virus protection.

Avira Endpoint Security brings together the protection of desktop PCs and file servers in a single license under Windows and Unix/Linux. This ensures your network is secure against viruses, worms, Trojans, adware, spyware and other malware.
.

  • Platform: Windows
  • Publisher: Avira GmbH
  • Date:
  • Size: 404295 KB
New Reviews


Print Inspector

Whether you are using a printer connected to your local desktop computer or a print server sometimes you need to see whats going on in your printer by having a close look at the print jobs sent by the users. Print Inspector is such type software ...


Disk Genius

Disk Genius was formerly known as Partition Guru which is an all-in-one solution for disk partition management, data recovery and disk repairing. It can recover lost files from partition, backup and restore partition table, clone partition or clone ...


Safe In Cloud

It is quite difficult to find any computer users nowadays who do not need to use the web, for any purpose. Whether it is for education or entertainment, the web is your best resource. You also need to use various online services for banking, ...


PictBear

Nowadays, a majority of PC users resort to digital image editing once in a while. It may be required for retouching image captured in smart phones or for creating an album in Facebook. For some people, tinkering with digital images is a pastime too. ...


Panda Cloud Cleaner

PC security has become a tricky and complicated subject both for home users and network supervisors, with complexity and risk factors multiplying over the years. Using a single antivirus app may not be enough anymore. That explains why many users ...


SnapCrab

Nearly every PC users need to take screenshots from time to time, whether it is for personal or professional needs. While using the basic Windows screenshot capture method is available, it is not adequate for everyone. When you want to capture ...


BitKiller

Dealing with various types of data efficiently holds the key to success in any computing task. Apart from generating new data and modifying existing files, it becomes necessary to delete existing files at times. While most users resort to using ...


SeaMonkey, Portable Edition

Using the Internet has become a necessity for a majority of people, including those who do not use a PC regularly. To browse web, stream video or download online content, people often resort to using various third party apps. For example, using ...


TuckAway Intelligent Email Organizer Pro

Using an email software allow you to do a number of things including managing your address lists, emails and even ending memos, documents and even virtual letters. You can also use it to manage your tasks easily. The email software comes in ...


WebAcappella

Web design sector has witnessed several trends and technological innovations affect website development in big ways. With time, designing websites has become easier. Nowadays, you can find web design software that nearly eliminates the need to ...


New Downloads

RationalPlan Single Project
for Mac

RationalPlan Single Project is
a project management software
covering the project
management areas starting with
WBS ...

DrawPad Plus

DrawPad Graphic Design and
Drawing software is an
easy-to-use image composition
and manipulation program, an
essential ...

Outlook4Gmail

Outlook4Gmail - sync your
Google Calendars, Contacts and
Tasks with Outlook easily

Devart ODBC Driver for SQL
Server

Devart ODBC Driver for SQL
Server is a high-performance
data connector with
enterprise-level features for
accessing SQL ...

Spool Queue Viewer++

Spool Queue Viewer++ is a
feature rich spool queue
viewer that windows should
have by default, we have taken
it to the ...

RationalPlan Single Project
for Linux

RationalPlan Single Project is
a project management software
covering the project
management areas starting with
WBS ...

Active@ KillDisk

Active@ KillDisk provides the
ultimate solution how to erase
hard drive data in such a way
that no one can ever retrieve
...

Devart ODBC Driver for
SQLite

Devart ODBC Driver for SQLite
is a high-performance
connectivity solution with
enterprise-level features for
accessing ...

Express Burn Plus for Mac

Express Burn Plus for Mac is
an ultra fast burner to help
save you time. Burn audio,
video, or files to CD, DVD.
Express ...

Net Monitor for Employees
Professional

The Net Monitor for Employees
is employee monitoring
software that allows you to
see screens of remote
computers or show ...