Software Listing: Audit Windows Security

Secure Windows Auditor - A Windows security software solution & windows security auditing & assessment tools - information security auditing & assessment software, Secure Windows Auditor™ (SWA) is a windows security software solution which provides windows security auditing and assessment software which empower network administrators & IT security auditors to conduct in-depth security assessments of network based windows systems. This security software can run from a centralized location on the network during security assessments. It identifies vulnerabilities and categorizes them according to their respective risk levels and provides step by step solutions to eliminate them; thus simplifying the enormous task of information security audit.

  • Platform: Win2000, Win7 x32, Windows Server, WinOther, WinVista

Secure Windows Auditor (SWA) A must have windows security software for information security professionals to conduct in-depth security auditing and risk assessments of network-based windows systems. Regulatory compliance and the latest network auditing tools, all come as a package with this computer security software. Secure Windows Auditor (SWA) is a windows security software solution which provides windows security auditing and assessment software which empower network administrators & IT security auditors to conduct in-depth security assessments of network based windows systems. This security software can run from a centralized location on the network during security assessments.

  • Platform: Win2000, Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

Windows Security Officer is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Windows Security Officer enables you to protect and totally control access to your personal computer.

  • Platform: Win2000, Windows Server, Windows Vista, WinOther

Windows Security Tweaker is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Windows Security Tweaker enables you to protect and totally control access to your personal computer.

  • Platform: Win2000, Windows Server, WinOther
  • R-Guard
  • License: Shareware
  • Price: 39.99
  • Rating

To extend data protection beyond the limited scope of standard Microsoft Windows security services R-Guard allows users to set access rights not only for users but for applications and system processes as well. R-Guard Host based Intrusion Detection System shields users' files from viruses, spyware, Trojan horses, and other unwanted and potentially disastrous intruders. Most common applications presets protect your PC right away after the software installation. Improved interface provides you with easy and quick settings control. R-Guard features also include real time Files Monitoring, Files Operations Audit and Encryption.

  • Platform: Win2000, Windows Server, WinOther

Designed for everyone using or planning to use Windows Vista operating system, this Windows Vista security quick guide covers all daily used Windows Vista security features and options, provides quick solutions when crisis happens, and gives tips for users to better manage his/her system to achieve security goals. A comprehensive yet portable Windows Vista security reference for everyone and everyday to harnese the power of Windows Vista security features Security risks and Windows Vista solutions in the categories of data protection, system update, user management, anti-malware, Interne threats and wireless securities.

  • Platform: Not Applicable

Admin Report Kit for Windows Enterprise (ARKWE) is a powerful reporting solution for the Microsoft Windows Network. ARKWE collects configuration information about Windows domains & servers, users/groups, policies, events, services, installed applications, shares, permissions, printers, data sources etc. The reports are presented in a variety of formats that are simple, elegant and highly customizable for System Administrators, IT infrastructure Managers and Systems Audit personnel to use and act on. ARKWE's basket of Built-in reports provide powerful, ready-to-use reports that assist in both Management reporting and Compliance reporting requirements such as SOX and HIPAA.

  • Platform: Win2000, Windows Server, Windows Vista, WinOther

Secure-It is a local Windows security hardening tool, proactively secure your PC by either disabling the intrusion and propagation vectors proactively or simply reduce the attack surface by disabling unimportant functions. It secures Windows desktop PCs and Internet servers against new dangers by blocking the root cause of the vulnerabilities exploited by malware, worms and spy ware . In some cases Secure-it is even able to protect your PC against threats prior to a patch release of the vendor. * Harden your Local Zone Security (My Computer) settings. * Proactively disable scripting or Active-X controls which proved potential propagation vectors in the past.

  • Publisher: YASC LTD
  • Date: 18-02-2005
  • Size: 712 KB
  • Platform: Win2000, Windows Server, WinOther

Harden-It 1.1 Windows Security Hardening Tool, harden your TCP/IP Stack and Local System. Harden-It is a Network and System hardening tool for Windows. By hardening the IP stack your Network can sustain or completely twarth various sophisticated network attacks. By hardening your Local System lots of current malware, spyware, worm infection are completely blocked, proactively harden your system even against future uknown attacks. Network Hardening : · Harden your server's TCP and IP stack (Netbios, ICMP, SYN, SYN-ACK..) · Protect your servers from Denial of Service and other network based attacks · Enable SYN flood protection when an attack is detected · Set the threshold values that are used to determine what constitutes an attack · Various other protections.

  • Publisher: YASC LTD
  • Date: 18-01-2005
  • Size: 433 KB
  • Platform: Win2000, Windows Server, WinOther

A tool to optimize your online activity (and not only) and ensure a safe and reliable Windows experience is pretty much requisite. Cerberus Security Guard is such a program devoted to security challenges whose purpose is to keep your computer safe from attacks of Trojan horses, keyloggers, multiple interceptors, and other kinds of system hacks, including various types of spyware. Cerberus Security Guard is another highly demanded software offered by bestsecuritytips.com which guarantees a system well taken care of in terms of professional Internet protection. It sets up a central console to put you in charge of all that\'s happening to your system.

  • Platform: Win7 x32, Win7 x64, WinOther, WinVista, WinVista x64

Secure SQL Auditor (SQA) is a SQL security software that conducts database server security auditing & includes vulnerability assessment tools for SQL database server. It is a network based SQL security assessment tool capable of scanning multiple database servers. Secure SQL Auditor performs the massive task of identifying vulnerabilities and threats present in MS SQL database server. It helps administrators in closing loopholes which provide direct access to SQL database servers and lead to monetary, reputational and informational losses. Unlike traditional auditing practices, Secure SQL Auditor automates the process of vulnerability assessment on SQL Servers security and provides fast and accurate results within minutes.

  • Platform: Win2000, Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

WinCustomizer allows you to manipulate an enormous amount of windows settings. These settings are normally not available to the user except through the registry, which requires registry knowledge. However, with WinCustomizer, you can edit all of the these settings easily, without knowing anything about them or the registry. This edition from WinCustomizer is all about windows security and user privileges. It lets you control a lot of per-user settings, for example, you can let user A access the hard disk, prevent user B from changing some specific windows setting, prevent user C from running a certain application and so on.

  • Platform: Windows Server, WinOther

Increase your Windows security level. Get rid of the weak Windows password system. Replace it with a strong, highly secure, 2-Factor (or even more) login system, using your existing removable storage device. Protect & Lock your PC & your files by turning your existing removable device (USB drive, MP3 player...) into a secure key. At last a highly secure login software for Windows designed for human beings. When you plug your storage device into your PC you are identified and logged in. When you unplug it, the PC is locked. You can add additional security questions (N-Factor authentication).

  • Platform: Win2000, WinOther

The utility for any serious Windows tweaker! Change hundreds of registry settings from Windows XP, improving appearance, performance and functionality. Prevent others from changing your settings, increase Windows security. Lock down Control Panel applets, Internet Explorer options, even choose which applications can or can't be run on the computer. You can change Windows XP system performance, by selecting to keep the Windows XP core system in memory, and not paged to disk (advisable only if you have 512MB RAM or more). You can also optimize the CPU and memory usage for Programs, System cache or background services.

  • Platform: WinOther

Monitor what remote users do on your Windows Terminal Server. Audit Windows Remote Desktop sessions and Citrix shared desktop and virtual applications.
Terminal Server sessions recorder that captures every user action. Monitor your employees who tele-work from home or remote-in to the office during business trips via RDP. Monitor what users do on thin clients in your network without installing any software on them. Document server configuration changes by recording remote and local administrative sessions.
Secure your corporate data by preventing information theft by insiders. Increase staff productivity and improve security by using this unique software from SoftActivity.

  • Platform: Windows Server

Ashampoo Security Pack 2 is the control, installation and launch centre for all your Windows security needs. On installation it checks your computer for existing Ashampoo security tools and automatically integrates them in its launch pad interface. If you want, you can then download and install any of the other tools you would like to have in a simple, one-click process. You can also use it to try out the Ashampoo security tools – you get the normal free trial options for every tool. Just click once on the tool that interests you to download, install and run..

  • Platform: Misc Scripts

RegistryProt is a 100% free, standalone, compact, low-level realtime registry monitor and protector, that adds another dimension to Windows security and intrusion detection. By monitoring important locations and keys in the Windows system registry, RegistryProt will alert whenever a key is added or changed, and then give the option of accepting the key change, reverting back to the original key setting, or deleting the key. RegistryProt's most useful attribute is that it will detect the vast majority of trojans at the exact moment that they infect/install themselves into your system, and as such provides a new dimension in trojan and intrusion detection.

  • Platform: Win2000, WinOther
  • RegProt
  • License: Freeware
  • Price: 0.00
  • Rating

RegistryProt is a 100% free, standalone, compact, low-level realtime registry monitor and protector, that adds another dimension to Windows security and intrusion detection. By monitoring important locations and keys in the Windows system registry, RegistryProt will alert whenever a key is added or changed, and then give the option of accepting the key change, reverting back to the original key setting, or deleting the key. RegistryProt's most useful attribute is that it will detect the vast majority of trojans at the exact moment that they infect/install themselves into your system, and as such provides a new dimension in trojan and intrusion detection.

  • Platform: Win2000, Windows Server, WinOther

FPG can lock the specified folder, user who want to open the folder must input the admin password. FPG can hide specified folder too. User must provide admin password to unhide it. An example of FPG wide application is that you can lock or hide the personal folders by FPG when this computer is shared to other persons. Any body who used your computer can't browse your locked folder unless you give them your password.. Windows security software and useful Windows utilities at WinAbility.Biz. WinAbility.Biz - Windows security software and useful Windows utilities.

  • Platform: Win2000, WinOther

Real-time display of PC system, processes and performance information. Packet decode, active process matrix, in and outbound packet matrix, socket status, drive space status, IP address, computer name, OS, date and time clock. Gauges show packets per second, % CPU, connections, active processes and % physical and virtual memory. Background is a choice of two real-time revolving pictures of Earth from space showing major cities and local times.. Karalon IQ Solutions | Network Security Assessment | Vulnerability Assessment | Vulnerability Scanner | Network Security Scanner | Security Assessment | Internet Security.

  • Publisher: karalon
  • Date: 25-07-2009
  • Size: 1873 KB
  • Platform: Win2000, WinOther

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


Opera web browser

Opera is a free to download web browser, which is usually overlooked by the majority of people who use web browsers, in favour of the speed for google chrome, or the customisability for firefox. However opera certainly does have its own appeal ...


Encrypt my Folder

It’s always a good idea to consider some kind of protection for your sensitive data, and encryption is a really good way of protecting files and folders containing personal or secret data. This is even more important for users who are ...


USB Guardian

Gone are the days when Floppies, magnetic tapes and rewritable disks were used to transfer data. Nowadays, USB Flash Drives are used to transfer files. USB Flash Drives are faster, cheaper, easier and more convenient way to transfer data. Along with ...


Key Launch

Key Launch is the time saving utility by Konrad Papala, helping you open your applications quicker than using the Start Menu. Instead of clicking the Start Button and using the your mouse or other pointing device to navigate through potentially ...


Slash Xonix

Slash xonix is a freeware game which takes the lesser known classic title xonix, and revamps and reworks it into a title for the desktop computer. Xonix (the game on which slash xonix is obviously based) is a game in which you must split the screen ...


Auslogics Duplicate File Finder

If you have a lot of data and perform regular backups, or are particularly bad at keeping your system clean, tidy and organized, you may find that your computer starts to get a little clogged up with duplicate files. In my case, this is most obvious ...


Acebyte Utilities

Acebyte Utilities is a modern looking application, designed to help speed up your computer via system optimization and error correction. In the long run, this could help prevent freezes and slow downs, as well as the dreaded blue screen of death ...


LogMeIn Hamachi

Today, world is connected wirelessly with and without VPN. In coming time, VPN is going to be an absolute necessity for every organization. VPN stands for Virtual Private Network which is required to connect to the network of an organization without ...


Kaspersky Internet Security

With increasing use of Internet, there is increase in rate of transfer of malware and therefore more threat to your Computer. Security is an essential part of anything, be it your life or be it your PC. If your Personal Computer isn’t secure, ...



New Downloads

HelpSmith

HelpSmith allows you to create
CHM HTML Help files, Web Help
systems, and Printed Documents
from a single source.

WidsMob Retoucher

WidsMob Retoucher is the
excellent photo editor to
discover the magic of artistic
photo effects, which includes
photo ...

Code Compare Pro

Code Compare is the tool
specially adapted for
comparing source code files.
It locates changes in code
with regard to its ...

VeryPDF Barcode Generator
SDK

VeryPDF Barcode Generator SDK
for .NET is a royalty free SDK
for C#, ASP.NET, VB.NET
Developers. Create barcodes in
all ...

Radmin VPN

Radmin VPN - is a free and
easy-to-use software product
to create virtual private
network (VPN). The program
allows users ...

Rediffmail Backup

Export Rediffmail emails to
PST, MSG, EML, EMLX, MBOX,
HTML, MHT, XPS, PDF, RTF, DOC,
Windows Live Mail, Lotus
Notes, ...

Tipard iPhone Ringtone
Maker

Tipard iPhone Ringtone Maker
can help you make iPhone
ringtone with source
audio/video/DVD. Thus, audio
file including ...

Foxit PhantomPDF Business

Expands upon PhantomPDF
Standard by offering shared
review initiation, advanced
editing, security, and file
compression ...

Wondershare TunesGo for Mac

1.Transfer music, video,
Podcast, playlists, iTunes U
and audiobook from
iOS&Android to Mac/iTunes,
and the way back. ...



Related Searches

Windows Security Tweaker
Windows Security Officer
Uninstall Windows Security Center
Windows Security Alerts
Analyse Windows Security Log
Audit Windows File Server
Audit Windows File Share
Auto Audit Windows
Cisco Router Audit Windows
Download Windows Security Center
Ie Popups Windows Security Proxy
Parse Windows Security Logs Db