Software Listing: Endpoint Security

Comodo Endpoint Security Manager BE (ESM BE) centrally manages the deployment of award-winning Comodo Internet Security (CIS) software that protects desktops and servers your business relies on. Offering unbeatable protection against internal and external threats, the Business Edition is specially designed to suit the needs of small businesses, ESM BE can be installed on a Windows server/ non-dedicated Windows PC and features highly detailed reports, task-orientated wizards, real-time alerts, automatic enforcement of security policy and a clearly organized touch-screen interface that helps admins resolve issues as soon as they occur.

  • Platform: WinOther

Comodo Endpoint Security Manager (CESM) enables the remote, centralized management of end-point security products such as Comodo Internet Security on corporate workstations. With Comodo Endpoint Security Manager you will save time, money and increase network wide security. Unlike conventional security software providers; Comodo has adopted a Default Deny Protection model.

Default Deny Protection takes an advanced approach to preventing security breaches and reducing downtime. By working within the universe of known and safe executables, unknown applications within the environment are challenged prior to execution.

  • Platform: Win7 x64, Windows 7, WinOther, WinServer, WinVista, WinVista x64

Privacyware's Endpoint Security Console (ESC) provides a centralized administrative control capacity for assuring network endpoint protection on desktop and notebook computers utilizing Privacyware's popular Personal Firewall and Intrusion Protection Application, Privatefirewall. ESC enables system administrators to install, monitor, and configure Privatefirewall endpoint defense solution on any Windows workstation, laptop or host within a server domain. Settings can be customized for individual computers or for Users/Groups defined and configured within Active Directory. The key capabilities of the ESC are the network configurable aspects of security policies and system use enforcement enabled by Privatefirewall on an enterprise endpoint.

  • Platform: Win2000, Windows Server, WinOther

Clear Blue Security is a free full-featured endpoint security management suite that monitors, detects and reports endpoint security vulnerabilities, including the monitoring of installed malware applications, providing status on updates and patching, implementing a company wide security policy, monitoring installed but unapproved software, alerting suspicious and possibly malicious traffic and scanning network facing IPs for unwanted open ports.By installing Clear Blue Security, an IT professional will be provided an instantaneous assessment of their entire endpoint security situation that includes every desktop PC and even laptops outside the network.

  • Platform: Windows Vista, WinOther

Lock the Bad Guys out of your USB ports with MyUSBOnly; Block Untrusted USB Memory Stick Activity in Office. Secure Your Files: Stealing information - or just reading it without permission - is a lot easier than it used to be. Prevent data theft by blocking all but your trusted USB storage devices. Stop your files from walking away on thumb drives, mp3 players, flash cards and portable USB hard drives. Secretly log all USB connect and disconnect activity. Run it invisibly, so you can catch, as well as deter, problem coworkers, visitors, family members, or managers.. MyUSBOnly: USB Security Software, Device Control, Endpoint Security, USB Port Security solution : Index.

  • Platform: Win2000, WinOther

Kaspersky Endpoint Security uses the most modern technologies from Kaspersky Lab to protect Windows workstations and servers on business networks.

Business changes are placing tremendous demands on IT. New technologies are being adopted by IT as a response to these pressures - but these trends pose critical and dangerous malware risks to the organization.

Kaspersky enables customers to embrace new technologies and feel confident that they’re protected against the threats of tomorrow’s IT trends.

As a cornerstone of Kaspersky’s solutions, Kaspersky Endpoint Security provides centralized protection of Windows workstations and Windows servers from malware, potentially dangerous programs and network attacks.

  • Platform: Win7 x64, Windows 7, WinOther, WinServer, WinVista, WinVista x64

Naturally this also includes Avira Management Console to efficiently administer the Avira virus protection.

Avira Endpoint Security brings together the protection of desktop PCs and file servers in a single license under Windows and Unix/Linux. This ensures your network is secure against viruses, worms, Trojans, adware, spyware and other malware.
.

  • Platform: Win7 x64, Windows 7, Windows 8, WinOther, WinServer, WinVista, WinVista x64

My Endpoint Protector provides device control and data loss prevention to everyone who want to centrally manage and control the use of USB, FireWire and other ports and portable storage device use. It works for PC and Mac OS X. Free for personal use. It is a SaaS Solution, meaning the management is happening in the cloud over an internet browser. My Endpoint Protector Key Benefits: 1. Centrally manage your endpoint / device use from anywhere 2. No server setup (hardware, licenses or maintenance) 3. Enterprise class endpoint security for every size company 4. Manage one or hundreds of PC endpoints from one online place 5.

  • Publisher: CoSoSys
  • Date: 17-06-2010
  • Size: 4371 KB
  • Platform: Mac OS X, Win7 x32, Win7 x64, WinOther, WinVista, WinVista x64

Comodo Business Antivirus enables remote, centralized management of PC security products such as Antivirus, Firewall and Disk Encryption on business workstations. With Comodo Business Antivirus businesses can save up to $30 per endpoint per year with the Power Management feature that allows administrators to control power settings from the management console. Comodo has integrated a game changing technology Default Deny Protection(tm) and Auto Sandbox Technology(tm). Default Deny Protection(tm) prevents virus attacks by working within a universe of known and safe applications, unknown applications are by default challenged prior to execution.

  • Platform: Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

Outpost Network Security 3.0.2 is specially designed to help small and medium business organizations protect against modern security challenges and address the problem of productivity waste. ONS works on both client (e.g. Windows XP) and server (e.g. Windows 2003) platform software. Agnitum's ONS 3.0.2 safeguards office networks against external attacks and internal sabotage, keeps endpoint PCs clean of malware, blocking aggressive web content and spyware activity, stopping data transfer to non-authorized USB devices, preventing disclosure of confidential information to non-trusted web-sites, polices employee Internet access and shifts the task of deploying and managing protection away from the busy workforce.

  • Platform: WinOther

The freeware NetWrix USB Blocker enforces centralized access control to prevent unauthorized use of removable media that connects to computer USB ports, for example, memory sticks, removable hard disks, iPods, and more. USB port access control is a very important aspect of your endpoint security, no matter how good your antivirus and firewall are. The USB device lockdown protects your network against malware and prevents theft of sensitive corporate data. Unlike other solutions, it requires no deployment of agents on client computers. Another advantage of the tool is simplicity, only a couple of mouse clicks to get the work done.

  • Platform: Win2000, Windows Server, Windows Vista, WinOther

The AirStop Client is a wireless endpoint security solution which prevents data leakage by controlling communications adapters and storage devices on laptop computers. Unique features include "Sticky Wireless"(TM) functionality which ensures connection to approved wireless networks only and dynamic adapter control for prevention of wireless bridging attacks. The AirStop Server provides enterprise-grade centralized monitoring, configuration and tracking. A powerful wireless security policy enforcement solution, the server enables network administrators to remotely configure a specific machine or define individual, group and temporary wireless security policy.

  • Platform: WinOther

NetWrix Enterprise Management Suite is the most complete set of systems management tools for IT professionals. The Suite includes products for change auditing, identity management, virtualization, endpoint security, event management, that enable security and compliance with regulations. Broad range of platforms are supported: Active Directory, Exchange, VMware, file servers, network devices, SQL Server, SharePoint, NetApp, EMC, and others. Most popular products included in the Suite: - Change Reporter family of products that audit who changed what, when, and where in your IT infrastructure. - Identity management products that minimize IT help desk costs and enable secure and compliant password management, user provisioning.

  • Platform: Win2000, Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

StormShield Personal Edition is a free security software application developed from SkyRecon's industry-leading professional solution StormShield Endpoint Security. StormShield Personal Edition provides protection against major risks in Internet browsing and attacks against the operating system and applications.

The sophistication of threats spread by the Internet continues to grow at an alarming rate. More numerous and increasingly difficult to detect, these attacksd-deOCLfrom viruses, spyware, Trojan horses, malware, etc. d-deOCL are poorly addressed by conventional personal protection technologies.

  • Platform: WinOther

CORE FORCEdlT* is a free comprehensive endpoint security solution for Windows 2000 and Windows XP systems.

CORE FORCE can be used to:

Protect your computer from compromises by worms, virus and email-borne malware
Prevent your computer from being used as a staging point to amplify attacks and compromise others
Prevent exploitation of known bugs in the operating system and applications running on your computer
Prevent exploitation of unknown bugs (0-day) in the operating system and applications running on your computer
Detect and prevent execution of adware, spyware, trojan horses and other malware on you computer

CORE FORCE provides inbound and outbound stateful packet filtering for TCP/IP protocols using a Windows port of OpenBSD's PF firewall, granular file system and registry...

  • Platform: WinOther

The Comodo ESM Console for Microsoft Windows Phone mobile app takes full advantage of the latest *Mango* phones and alerts users to changes in the endpoint security status of their environment. It provides views of the status of antivirus updates, compliance and malware detections for all endpoints protected by Comodo Internet Security antivirus and firewall software and managed by Comodo Endpoint Security Manager 2.0 Business Edition. The app*s Active Reports with built-in remediation make it possible for IT admins to more quickly respond to security issues right from their smartphone as problems arise.

  • Publisher: CESM
  • Date:
  • Size: 2048 KB
  • Platform: Windows Phone, WinMobile

Netwrix Enterprise Management Suite is the most complete set of systems management tools for IT professionals. The Suite includes products for change auditing, identity management, virtualization, endpoint security, event management, that enable security and compliance with regulations. Broad range of platforms are supported: Active Directory, Exchange, VMware, file servers, network devices, SQL Server, SharePoint, NetApp, EMC, and others. Most popular products included in the Suite: - Change Reporter family of products that audit who changed what, when, and where in your IT infrastructure. - Identity management products that minimize IT help desk costs and enable secure and compliant password management, user provisioning.

  • Platform: Win2000, Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

Metadefender Endpoint Management (MEM) leverages the OESIS Framework to verify the security and compliance posture of endpoint devices via static analysis. MEM also exposes APIs to enable third party solutions to consume and react to reported postures. Compliance checks report the status of: Encryption Password protection Operating System patch level Anti-malware protection Patch management clients Potentially unwanted applications (File sharing, toolbars, etc.) Endpoint detection & response (EDR) clients And more Security checks report indications of infection by: Reporting threats identified by locally installed anti-malware Reporting reputation of remote connections of the device And more Supported endpoint operating systems: Windows (XP - Windows 10) Windows Server (2008 - 2012 R2) OS X (10.

  • Platform: Mac OS X

Whether you are using a single PC or managing a network of computers at workplace, using security solution is a prerequisite. However, standalone antivirus solutions do not quite fit the bill in networked environments. You have to use a suitable system security solution that can be managed remotely for a number of workstations. You can try Trend Micro Worry-Free Business Security for such needs. It offers protection for Windows Servers and workstations along with attached storages and USB drives. This is endpoint protection software offering high level of data protection and internet security options.

  • Platform: Win2000, Win7 x64, Windows 7, WinOther, WinServer, WinVista, WinVista x64
  • PrefixNE
  • License: Comercial
  • Price: 1200.00
  • Rating

PrefixNE - Power and control over your network assets all wrapped up in one complete solution. With PrefixNE you'll know exactly what software is running on your network, and whether it's properly licensed. You'll know precisely what hardware is installed on each of your network PCs, (including removable devices). You'll be able to control who can use any given PC and what applications they can use on it. You can shut down PCs across your network at the end of the day. And you can identify and resolve problems and issues on the network that could bring your business grinding to a halt, before they actually occur.

  • Publisher: Prefix IT
  • Date: 25-07-2012
  • Size: 279 KB
  • Platform: WinOther

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


Bubble Shooter Deluxe

Bubble shooter deluxe (referred to in game as bubble shooter premium edition) is a freeware puzzle game. At first look, bubble shooter deluxe appears to be a clone of many other games similar to it, in which you must fire balls from a stationary ...


Ultrasurf

There are many cases where you need to access a website which is otherwise blocked by your ISP. You need to use a proxy but a using free proxy that is never easy and convincing. Also, whenever you want to hide your identity online, you need to use ...


File Finder

File Finder is such a simple and easy program to use to track down and locate files and folders on your system. I think this has to be a fantastic selling point, but maybe also its downfall. It instantly took me back to the retro MS-DOS based ...


Screen Resolution Manager

If you share a computer at home or at work, some users may their own have personal preferences regarding the screen resolution that your monitor or projector is set up, and the colors that are displayed. This could be because of bad eye sight, ...


Encrypt my Folder

It’s always a good idea to consider some kind of protection for your sensitive data, and encryption is a really good way of protecting files and folders containing personal or secret data. This is even more important for users who are ...


Audacity

Audacity is one of the few free audio recording programs out there, which is great for people like me who need to record audio on a regular basis. Audacity is more than just  the simple “microphone to MP3” software that many will ...


Auslogics Duplicate File Finder

If you have a lot of data and perform regular backups, or are particularly bad at keeping your system clean, tidy and organized, you may find that your computer starts to get a little clogged up with duplicate files. In my case, this is most obvious ...


World Domination 2

World domination 2 is a free flash turn based strategy game which has so many complex and realistic additions to the formula in the form of how production, technology and diplomacy between countries work, that it borders on being a realistic war ...


Cloud System Booster

Cloud System Booster is a very up to date and modern looking application. To me, it almost looks like it’d fit better into Mac desktop environment rather than a Windows one. Cloud System Booster exists and aims to clean the unnecessary junk ...



New Downloads

PhotoStage Pro Edition

PhotoStage Pro Edition for
Windows makes creating a
slideshow easy and fun. Share
your memories with a
professional ...

CADopia Professional
Edition

CADopia 18 Professional is a
full featured CAD software for
engineers and architects.
Supports AutoCAD DWG. New
features ...

Dynamsoft Barcode Reader
for Windows

Dynamsoft Barcode Reader
enables developers to expedite
the creation of applications
for the recognition of 1D
barcode ...

DiskPulse Pro

DiskPulse Pro is a powerful
and easy-to-use disk change
monitoring utility allowing
one to monitor one or more
disks or ...

DiskSavvy Pro

DiskSavvy Pro is a powerful,
fast and easy-to-use disk
space analyzer utility
allowing one to analyze disk
usage in one ...

ReplaceMagic.Total
Professional

Have you ever been in
situation that you move
documents to new location and
links were broken? This
usually happens ...

GdPicture.NET

Delivered as native .NET and
COM/ActiveX components,
GdPicture.NET SDK allows
developers to compose,
display, capture, ...

CAD DLL

The library integrates CAD
into applications in VC++, C#,
Delphi, etc. without AutoCAD
installation. CAD DLL license
is ...

SafeBytes Anti-Malware

Safebytes is built on the best
virus engine in the industry.
Not only is the database of
viruses and malware included
in ...



Related Searches

Comodo Endpoint Security Manager
Cmc Endpoint Security
Download Cmc Endpoint Security
Download Endpoint Security Family
Comodo Endpoint Security Manager Price
Endpoint Security Comparison
Safetica Endpoint Security
Cyber Security Free
Security Cover
Security Covert
Security P Data
Access Security Free