Software Listing: Endpoint Security M

Comodo Endpoint Security Manager BE (ESM BE) centrally manages the deployment of award-winning Comodo Internet Security (CIS) software that protects desktops and servers your business relies on. Offering unbeatable protection against internal and external threats, the Business Edition is specially designed to suit the needs of small businesses, ESM BE can be installed on a Windows server/ non-dedicated Windows PC and features highly detailed reports, task-orientated wizards, real-time alerts, automatic enforcement of security policy and a clearly organized touch-screen interface that helps admins resolve issues as soon as they occur.

  • Platform: WinOther

Comodo Endpoint Security Manager (CESM) enables the remote, centralized management of end-point security products such as Comodo Internet Security on corporate workstations. With Comodo Endpoint Security Manager you will save time, money and increase network wide security. Unlike conventional security software providers; Comodo has adopted a Default Deny Protection model.

Default Deny Protection takes an advanced approach to preventing security breaches and reducing downtime. By working within the universe of known and safe executables, unknown applications within the environment are challenged prior to execution.

  • Platform: Win7 x64, Windows 7, WinOther, WinServer, WinVista, WinVista x64

Privacyware's Endpoint Security Console (ESC) provides a centralized administrative control capacity for assuring network endpoint protection on desktop and notebook computers utilizing Privacyware's popular Personal Firewall and Intrusion Protection Application, Privatefirewall. ESC enables system administrators to install, monitor, and configure Privatefirewall endpoint defense solution on any Windows workstation, laptop or host within a server domain. Settings can be customized for individual computers or for Users/Groups defined and configured within Active Directory. The key capabilities of the ESC are the network configurable aspects of security policies and system use enforcement enabled by Privatefirewall on an enterprise endpoint.

  • Platform: Win2000, Windows Server, WinOther

Clear Blue Security is a free full-featured endpoint security management suite that monitors, detects and reports endpoint security vulnerabilities, including the monitoring of installed malware applications, providing status on updates and patching, implementing a company wide security policy, monitoring installed but unapproved software, alerting suspicious and possibly malicious traffic and scanning network facing IPs for unwanted open ports.By installing Clear Blue Security, an IT professional will be provided an instantaneous assessment of their entire endpoint security situation that includes every desktop PC and even laptops outside the network.

  • Platform: Windows Vista, WinOther

Lock the Bad Guys out of your USB ports with MyUSBOnly; Block Untrusted USB Memory Stick Activity in Office. Secure Your Files: Stealing information - or just reading it without permission - is a lot easier than it used to be. Prevent data theft by blocking all but your trusted USB storage devices. Stop your files from walking away on thumb drives, mp3 players, flash cards and portable USB hard drives. Secretly log all USB connect and disconnect activity. Run it invisibly, so you can catch, as well as deter, problem coworkers, visitors, family members, or managers.. MyUSBOnly: USB Security Software, Device Control, Endpoint Security, USB Port Security solution : Index.

  • Platform: Win2000, WinOther

Kaspersky Endpoint Security uses the most modern technologies from Kaspersky Lab to protect Windows workstations and servers on business networks.

Business changes are placing tremendous demands on IT. New technologies are being adopted by IT as a response to these pressures - but these trends pose critical and dangerous malware risks to the organization.

Kaspersky enables customers to embrace new technologies and feel confident that they’re protected against the threats of tomorrow’s IT trends.

As a cornerstone of Kaspersky’s solutions, Kaspersky Endpoint Security provides centralized protection of Windows workstations and Windows servers from malware, potentially dangerous programs and network attacks.

  • Platform: Win7 x64, Windows 7, WinOther, WinServer, WinVista, WinVista x64

Naturally this also includes Avira Management Console to efficiently administer the Avira virus protection.

Avira Endpoint Security brings together the protection of desktop PCs and file servers in a single license under Windows and Unix/Linux. This ensures your network is secure against viruses, worms, Trojans, adware, spyware and other malware.
.

  • Platform: Win7 x64, Windows 7, Windows 8, WinOther, WinServer, WinVista, WinVista x64

My Endpoint Protector provides device control and data loss prevention to everyone who want to centrally manage and control the use of USB, FireWire and other ports and portable storage device use. It works for PC and Mac OS X. Free for personal use. It is a SaaS Solution, meaning the management is happening in the cloud over an internet browser. My Endpoint Protector Key Benefits: 1. Centrally manage your endpoint / device use from anywhere 2. No server setup (hardware, licenses or maintenance) 3. Enterprise class endpoint security for every size company 4. Manage one or hundreds of PC endpoints from one online place 5.

  • Publisher: CoSoSys
  • Date: 17-06-2010
  • Size: 4371 KB
  • Platform: Mac OS X, Win7 x32, Win7 x64, WinOther, WinVista, WinVista x64

Comodo Business Antivirus enables remote, centralized management of PC security products such as Antivirus, Firewall and Disk Encryption on business workstations. With Comodo Business Antivirus businesses can save up to $30 per endpoint per year with the Power Management feature that allows administrators to control power settings from the management console. Comodo has integrated a game changing technology Default Deny Protection(tm) and Auto Sandbox Technology(tm). Default Deny Protection(tm) prevents virus attacks by working within a universe of known and safe applications, unknown applications are by default challenged prior to execution.

  • Platform: Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

Outpost Network Security 3.0.2 is specially designed to help small and medium business organizations protect against modern security challenges and address the problem of productivity waste. ONS works on both client (e.g. Windows XP) and server (e.g. Windows 2003) platform software. Agnitum's ONS 3.0.2 safeguards office networks against external attacks and internal sabotage, keeps endpoint PCs clean of malware, blocking aggressive web content and spyware activity, stopping data transfer to non-authorized USB devices, preventing disclosure of confidential information to non-trusted web-sites, polices employee Internet access and shifts the task of deploying and managing protection away from the busy workforce.

  • Platform: WinOther

The freeware NetWrix USB Blocker enforces centralized access control to prevent unauthorized use of removable media that connects to computer USB ports, for example, memory sticks, removable hard disks, iPods, and more. USB port access control is a very important aspect of your endpoint security, no matter how good your antivirus and firewall are. The USB device lockdown protects your network against malware and prevents theft of sensitive corporate data. Unlike other solutions, it requires no deployment of agents on client computers. Another advantage of the tool is simplicity, only a couple of mouse clicks to get the work done.

  • Platform: Win2000, Windows Server, Windows Vista, WinOther

The AirStop Client is a wireless endpoint security solution which prevents data leakage by controlling communications adapters and storage devices on laptop computers. Unique features include "Sticky Wireless"(TM) functionality which ensures connection to approved wireless networks only and dynamic adapter control for prevention of wireless bridging attacks. The AirStop Server provides enterprise-grade centralized monitoring, configuration and tracking. A powerful wireless security policy enforcement solution, the server enables network administrators to remotely configure a specific machine or define individual, group and temporary wireless security policy.

  • Platform: WinOther

NetWrix Enterprise Management Suite is the most complete set of systems management tools for IT professionals. The Suite includes products for change auditing, identity management, virtualization, endpoint security, event management, that enable security and compliance with regulations. Broad range of platforms are supported: Active Directory, Exchange, VMware, file servers, network devices, SQL Server, SharePoint, NetApp, EMC, and others. Most popular products included in the Suite: - Change Reporter family of products that audit who changed what, when, and where in your IT infrastructure. - Identity management products that minimize IT help desk costs and enable secure and compliant password management, user provisioning.

  • Platform: Win2000, Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

StormShield Personal Edition is a free security software application developed from SkyRecon's industry-leading professional solution StormShield Endpoint Security. StormShield Personal Edition provides protection against major risks in Internet browsing and attacks against the operating system and applications.

The sophistication of threats spread by the Internet continues to grow at an alarming rate. More numerous and increasingly difficult to detect, these attacksd-deOCLfrom viruses, spyware, Trojan horses, malware, etc. d-deOCL are poorly addressed by conventional personal protection technologies.

  • Platform: WinOther

CORE FORCEdlT* is a free comprehensive endpoint security solution for Windows 2000 and Windows XP systems.

CORE FORCE can be used to:

Protect your computer from compromises by worms, virus and email-borne malware
Prevent your computer from being used as a staging point to amplify attacks and compromise others
Prevent exploitation of known bugs in the operating system and applications running on your computer
Prevent exploitation of unknown bugs (0-day) in the operating system and applications running on your computer
Detect and prevent execution of adware, spyware, trojan horses and other malware on you computer

CORE FORCE provides inbound and outbound stateful packet filtering for TCP/IP protocols using a Windows port of OpenBSD's PF firewall, granular file system and registry...

  • Platform: WinOther

The Comodo ESM Console for Microsoft Windows Phone mobile app takes full advantage of the latest *Mango* phones and alerts users to changes in the endpoint security status of their environment. It provides views of the status of antivirus updates, compliance and malware detections for all endpoints protected by Comodo Internet Security antivirus and firewall software and managed by Comodo Endpoint Security Manager 2.0 Business Edition. The app*s Active Reports with built-in remediation make it possible for IT admins to more quickly respond to security issues right from their smartphone as problems arise.

  • Publisher: CESM
  • Date:
  • Size: 2048 KB
  • Platform: Windows Phone, WinMobile

Netwrix Enterprise Management Suite is the most complete set of systems management tools for IT professionals. The Suite includes products for change auditing, identity management, virtualization, endpoint security, event management, that enable security and compliance with regulations. Broad range of platforms are supported: Active Directory, Exchange, VMware, file servers, network devices, SQL Server, SharePoint, NetApp, EMC, and others. Most popular products included in the Suite: - Change Reporter family of products that audit who changed what, when, and where in your IT infrastructure. - Identity management products that minimize IT help desk costs and enable secure and compliant password management, user provisioning.

  • Platform: Win2000, Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

Metadefender Endpoint Management (MEM) leverages the OESIS Framework to verify the security and compliance posture of endpoint devices via static analysis. MEM also exposes APIs to enable third party solutions to consume and react to reported postures. Compliance checks report the status of: Encryption Password protection Operating System patch level Anti-malware protection Patch management clients Potentially unwanted applications (File sharing, toolbars, etc.) Endpoint detection & response (EDR) clients And more Security checks report indications of infection by: Reporting threats identified by locally installed anti-malware Reporting reputation of remote connections of the device And more Supported endpoint operating systems: Windows (XP - Windows 10) Windows Server (2008 - 2012 R2) OS X (10.

  • Platform: Mac OS X

Whether you are using a single PC or managing a network of computers at workplace, using security solution is a prerequisite. However, standalone antivirus solutions do not quite fit the bill in networked environments. You have to use a suitable system security solution that can be managed remotely for a number of workstations. You can try Trend Micro Worry-Free Business Security for such needs. It offers protection for Windows Servers and workstations along with attached storages and USB drives. This is endpoint protection software offering high level of data protection and internet security options.

  • Platform: Win2000, Win7 x64, Windows 7, WinOther, WinServer, WinVista, WinVista x64

SecuBox provides on-the-fly encryption of sensitive data stored on Windows Mobile smartphone and its removable cards. Creates an encrypted volume that looks and feels like a smartphone memory card. Data written to this card is transparently encrypted with AES 256-bit algorithm. SecuBox prevents data theft even if the device is lost or stolen.Highlights: strong and unbreakable AES 256-bit encryption, encryption key backup, file erasing mechanisms compliant with the US Department of Defense specifications (U.S. DoD 5220.22-M) and Windows Mobile File Explorer integration.. Mobile endpoint security - data encryption and data wiping for PDAs and Smartphones.

  • Platform: Win2000, WinOther

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


Intergalactic War

Inter galactic war is another free ware two dimensional shooter game, falling into the ever prevalent genre of top down shooters. As the title suggests, in inter galactic war you play as a space ship fighting enemy space ships as you fight your way ...


Castle Wars

Castle wars is a unique blend of the strategy genre with a small amount of war and micro management elements added in to make it more unique. In castle wars the aim is to eliminate all the other players from the map, and become the only player left ...


FireStones

Fire stones is a freeware puzzle game in which you must match three of the same coloured block in a row to destroy them, and although this may start to sound like bejeweled, the game actually takes a lot from tetris, as your blocks will fall from ...


Bubble Shooter Deluxe

Bubble shooter deluxe (referred to in game as bubble shooter premium edition) is a freeware puzzle game. At first look, bubble shooter deluxe appears to be a clone of many other games similar to it, in which you must fire balls from a stationary ...


Sentry

When you are away from your computer, to most users its important to make sure no one uses or accesses your computer and changes how you left it. Its even more important to make sure no one views your private files, emails, instant messenger ...


RomCenter

Rom centre is a very handy downloadable piece of free ware that helps greatly when it comes to finding roms for a variety of emulators, checking roms to see if they are in full working order, and fixing roms if they are not working, so you don't ...


Astronoid

Astanoid is a freeware arcade game which takes the core gameplay elements and ideas from the classic game breakout (also known as arcanoid) but instead of being a generic clone like every other game which takes the basic game mechanics from ...


Acebyte Utilities

Acebyte Utilities is a modern looking application, designed to help speed up your computer via system optimization and error correction. In the long run, this could help prevent freezes and slow downs, as well as the dreaded blue screen of death ...


Brainteaser Cubes

Brain teaser cubes is a freeware first person action puzzle game, which is fully 3d, and has a fairly unique concept, most comparable to the console game portal, minus the portal elements (leaving just the cube based puzzles). The game is fairly ...



New Downloads

Soda PDF

Soda PDF Anywhere is the first
full-featured PDF solution
available both on desktop and
online. It allows users to
read, ...

UltraFileSearch Std

File Search Utility which is
able to quickly find Files,
Folders and Text on your
Local, Network, DVD, CD-ROM,
USB Hard ...

PhotoStage Pro Edition

PhotoStage Pro Edition for
Windows makes creating a
slideshow easy and fun. Share
your memories with a
professional ...

.NET Email Validation
Library

Easy to use, cutting edge
Email Validation for .NET
Developers. Performs industry
standard syntax, MxRecord, and
Mailbox ...

3DCombine

STEREOSCOPIC EDITING SOFTWARE.
3DCombine allows you to create
and edit 3D photos and videos.
It supports a wide range of
...

DiskBoss Pro

DiskBoss Pro is an automated,
rule-based file and disk
management solution allowing
one to perform various types
of file ...

tuneXplorer

What do you need to create
perfect mix? No matter what
method you use - harmonic
mixing or beatmatching, you
will need to ...

PJPro

[FRANCE] A utility that allows
to extract the e-mail
addresses of the yellow pages.
After making your selection
this ...

Defender

Defender is a system that
provides secure wiretapping
protection of your premises.
It makes noise masking using
standard ...



Related Searches

Comodo Endpoint Security Manager
Cmc Endpoint Security
Download Cmc Endpoint Security
Download Endpoint Security Family
Comodo Endpoint Security Manager Price
Endpoint Security Comparison
Safetica Endpoint Security
Cyber Security Free
Rm To M Convert
Ts To M Convert
Vinyl M Convert
Amr M Converter