Software Listing: Endpoint

My Endpoint Protector provides device control and data loss prevention to everyone who want to centrally manage and control the use of USB, FireWire and other ports and portable storage device use. It works for PC and Mac OS X. Free for personal use. It is a SaaS Solution, meaning the management is happening in the cloud over an internet browser. My Endpoint Protector Key Benefits: 1. Centrally manage your endpoint / device use from anywhere 2. No server setup (hardware, licenses or maintenance) 3. Enterprise class endpoint security for every size company 4. Manage one or hundreds of PC endpoints from one online place 5.

  • Publisher: CoSoSys
  • Date: 17-06-2010
  • Size: 4371 KB
  • Platform: Mac OS X, Win7 x32, Win7 x64, WinOther, WinVista, WinVista x64

Comodo Endpoint Security Manager BE (ESM BE) centrally manages the deployment of award-winning Comodo Internet Security (CIS) software that protects desktops and servers your business relies on. Offering unbeatable protection against internal and external threats, the Business Edition is specially designed to suit the needs of small businesses, ESM BE can be installed on a Windows server/ non-dedicated Windows PC and features highly detailed reports, task-orientated wizards, real-time alerts, automatic enforcement of security policy and a clearly organized touch-screen interface that helps admins resolve issues as soon as they occur.

  • Platform: WinOther

Microsoft Endpoint Protection for Windows Azure provides the ability to include an antimalware protection agent in each Windows Azure virtual machine running your Windows Azure service.

It extends the Windows Azure SDK by providing an antimalware import which provides antimalware configuration and deployment capabilities.

Get Microsoft Endpoint Protection for Windows Azure and try it for yourself to fully assess its capabilities!

.

  • Platform: Win7 x64, Windows Server, WinServer

Comodo Endpoint Security Manager (CESM) enables the remote, centralized management of end-point security products such as Comodo Internet Security on corporate workstations. With Comodo Endpoint Security Manager you will save time, money and increase network wide security. Unlike conventional security software providers; Comodo has adopted a Default Deny Protection model.

Default Deny Protection takes an advanced approach to preventing security breaches and reducing downtime. By working within the universe of known and safe executables, unknown applications within the environment are challenged prior to execution.

  • Platform: Win7 x64, Windows 7, WinOther, WinServer, WinVista, WinVista x64

These tools make it easier for Forefront Endpoint Protection 2010 customers to use Group Policy for centralized management, provide optimized settings for various server roles, and diagnose and troubleshoot support issues.

FEP Group Policy Tools (fep2010grouppolicytools-en-us.exe)
The FEP Group Policy tool is used to import settings from FEP policy XML files into a Group Policy Object (GPO) in an Active Directory domain, or into the Local Group Policy object on a Windows computer. The tool can also be used to export FEP settings from a GPO into a FEP policy XML file. The FEP ADMX template is used in conjunction with Group Policy Editor in order to manage FEP antimalware settings with Group Policy.

  • Platform: Windows 7, WinOther, WinServer, WinVista

The System Center Security Monitoring Pack for Endpoint Protection provides real-time monitoring of your Endpoint Protection clients by using System Center Operations Manager. Alerts can be configured for virus activity, firewall downtime, or update failures.

In addition to real-time event monitoring, the Endpoint Protection Security Management Pack also provides automated response capabilities to remediate security related issues.

Get System Center Security Monitoring Pack for Endpoint Protection and try it for yourself to see just how useful it can actually be for you!

.

  • Platform: Windows Server, WinServer

Metadefender Endpoint Management (MEM) leverages the OESIS Framework to verify the security and compliance posture of endpoint devices via static analysis. MEM also exposes APIs to enable third party solutions to consume and react to reported postures. Compliance checks report the status of: Encryption Password protection Operating System patch level Anti-malware protection Patch management clients Potentially unwanted applications (File sharing, toolbars, etc.) Endpoint detection & response (EDR) clients And more Security checks report indications of infection by: Reporting threats identified by locally installed anti-malware Reporting reputation of remote connections of the device And more Supported endpoint operating systems: Windows (XP - Windows 10) Windows Server (2008 - 2012 R2) OS X (10.

  • Platform: Mac OS X

Privacyware's Endpoint Security Console (ESC) provides a centralized administrative control capacity for assuring network endpoint protection on desktop and notebook computers utilizing Privacyware's popular Personal Firewall and Intrusion Protection Application, Privatefirewall. ESC enables system administrators to install, monitor, and configure Privatefirewall endpoint defense solution on any Windows workstation, laptop or host within a server domain. Settings can be customized for individual computers or for Users/Groups defined and configured within Active Directory. The key capabilities of the ESC are the network configurable aspects of security policies and system use enforcement enabled by Privatefirewall on an enterprise endpoint.

  • Platform: Win2000, Windows Server, WinOther

Cryptzone Endpoint Encryption is a complete desktop solution which features three products in one: Secured eMail (email encryption), Secured eFile (file/folder encryption), Secured eUSB (USB flash drive encryption). They are all tightly integrated with Windows and require very little time to get used to and start working with. Secured eFile: Secured eFile is a file/folder encryption solution designed for ease-of-use, while maintaining the highest possible level of security. Secured eFile is tightly integrated within your current environment, lying merely as a thin layer on top of your existing infrastructure.

  • Publisher: Cryptzone
  • Date: 19-03-2009
  • Size: 11100 KB
  • Platform: Win2000, Windows Server, Windows Vista, WinOther

Lock the Bad Guys out of your USB ports with MyUSBOnly; Block Untrusted USB Memory Stick Activity in Office. Secure Your Files: Stealing information - or just reading it without permission - is a lot easier than it used to be. Prevent data theft by blocking all but your trusted USB storage devices. Stop your files from walking away on thumb drives, mp3 players, flash cards and portable USB hard drives. Secretly log all USB connect and disconnect activity. Run it invisibly, so you can catch, as well as deter, problem coworkers, visitors, family members, or managers.. MyUSBOnly: USB Security Software, Device Control, Endpoint Security, USB Port Security solution : Index.

  • Platform: Win2000, WinOther

Comodo Business Antivirus enables remote, centralized management of PC security products such as Antivirus, Firewall and Disk Encryption on business workstations. With Comodo Business Antivirus businesses can save up to $30 per endpoint per year with the Power Management feature that allows administrators to control power settings from the management console. Comodo has integrated a game changing technology Default Deny Protection(tm) and Auto Sandbox Technology(tm). Default Deny Protection(tm) prevents virus attacks by working within a universe of known and safe applications, unknown applications are by default challenged prior to execution.

  • Platform: Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

To protect your PC, we recommend to use Endpoint Protector Basic to monitor and control ports and interfaces such as USB, FireWire, card reader, CD / DVD, etc on your PC. This will protect them against unwanted use of portable storage devices like USB sticks, SD cards or portable hard drives to prevent data theft or data leaks. The best companion for your application firewall, Endpoint Protector Basic is designed to protect your computer’s endpoints acting as a USB firewall. Endpoint Protector Basic installs on your PC and helps you manage your USB device fleet and also to control what devices are authorized to connect to your computer.

  • Publisher: CoSoSys
  • Date: 17-12-2010
  • Size: 13576 KB
  • Platform: Win7 x32, Win7 x64, WinOther, WinVista, WinVista x64

This function uses the Vincenty direct algorithm to solve the "forward geodesic problem," which is the problem of computing the endpoint of a geodesic (shortest-distance) path on the ellipsoidal earth, given the start point, a path length, and a starting azimuth. This process is also called "reckoning." In 1975, Vincenty published a rapidly converging algorithm for this calculation. Since then, his algorithm has since seen significant implementation in geodesy and engineering. The algorithm is precise to within a few millimeters. Please see code comments for references. Michael Kleder, Nov 2007.

  • Platform: Matlab, Scripts

This function solves the "forward geodesic problem," which is to compute the endpoint of a geodesic (shortest-distance) path on the ellipsoidal earth, given the start point, a path length, and a starting azimuth. In response to a user request, this function numerically inverts the previously published VDIST function, which is contained within. (VDIST solves the "inverse geodesic problem" of computing the distance and azimuth between two known points, using Vincenty's 1975 algorithm.) Although numerically inverting VDIST is not a very efficient way to solve the forward problem, it provides a quick solution and also serves as an example of how to invert a function numerically in Matlab.

  • Platform: Matlab, Scripts

Twitter Media Endpoint allows you to use your WordPress install with your Twitter client to upload media, and host it on your site, where you maintain control and ownership. This is an initial release, and my first WP plugin, please report back any issues. When you use a service like Twitpic to upload media your media falls under that site's terms. You often lose most, if not all rights to your photos. With Twitter Media Endpoint you are uploading you images to you personal blog. A site you own have control over, thus you maintain control of your work. Install : 1. Place the twitter-media-endpoint folder in the /wp-content/plugins/ directory 2.

  • Publisher: sterling
  • Date: 01-03-2013
  • Size: 256 KB
  • Platform: PHP, Scripts

This is the official location of the Endpoint Manager Module for FreePBX
Endpoint Manager License - GNU General Public License (GPL).

  • Platform: WinOther

Kaspersky Endpoint Security uses the most modern technologies from Kaspersky Lab to protect Windows workstations and servers on business networks.

Business changes are placing tremendous demands on IT. New technologies are being adopted by IT as a response to these pressures - but these trends pose critical and dangerous malware risks to the organization.

Kaspersky enables customers to embrace new technologies and feel confident that they’re protected against the threats of tomorrow’s IT trends.

As a cornerstone of Kaspersky’s solutions, Kaspersky Endpoint Security provides centralized protection of Windows workstations and Windows servers from malware, potentially dangerous programs and network attacks.

  • Platform: Win7 x64, Windows 7, WinOther, WinServer, WinVista, WinVista x64

Microsoft Forefront Endpoint Protection, the next version of Forefront Client Security, will enable businesses to simplify and improve endpoint protection while greatly reducing infrastructure costs.

It builds on System Center Configuration Manager 2007, allowing customers to use their existing client management infrastructure to deploy and maintain endpoint protection.
Microsoft Forefront Endpoint Protection is powerful solution for securing your working environment!

NOTE:
- Forefront Endpoint Protection System Requirements can be found here.
- The term of FEP2010 Client agreement is one hundred eighty days, or commercial release of the software, whichever is first.

  • Platform: Windows 7, WinOther, WinServer, WinVista

Clear Blue Security is a free full-featured endpoint security management suite that monitors, detects and reports endpoint security vulnerabilities, including the monitoring of installed malware applications, providing status on updates and patching, implementing a company wide security policy, monitoring installed but unapproved software, alerting suspicious and possibly malicious traffic and scanning network facing IPs for unwanted open ports.By installing Clear Blue Security, an IT professional will be provided an instantaneous assessment of their entire endpoint security situation that includes every desktop PC and even laptops outside the network.

  • Platform: Windows Vista, WinOther

Naturally this also includes Avira Management Console to efficiently administer the Avira virus protection.

Avira Endpoint Security brings together the protection of desktop PCs and file servers in a single license under Windows and Unix/Linux. This ensures your network is secure against viruses, worms, Trojans, adware, spyware and other malware.
.

  • Platform: Win7 x64, Windows 7, Windows 8, WinOther, WinServer, WinVista, WinVista x64

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


USB Guardian

Gone are the days when Floppies, magnetic tapes and rewritable disks were used to transfer data. Nowadays, USB Flash Drives are used to transfer files. USB Flash Drives are faster, cheaper, easier and more convenient way to transfer data. Along with ...


TopDesk

It feels better, when the main screen of the computer looks good. However, in most of the cases, you would find the main screen or desktop of the computer is filled with the ugly looking icons which spoil the beauty of your desktop, and there comes ...


Ultrasurf

There are many cases where you need to access a website which is otherwise blocked by your ISP. You need to use a proxy but a using free proxy that is never easy and convincing. Also, whenever you want to hide your identity online, you need to use ...


IE Internet Security

IE Internet Security isn't the program that I thought it’d be. After a bit of Googling, I discovered that IE Internet Security is in fact embedded into one larger application called 1st Security Agent, which is an all in one tweaking ...


Easy Tweaker

Easy Tweaker is one of the many thousands of applications out there aiming to assist frustrated Windows users with their slow, sluggish and bogged up systems. Easy Tweaker is more than just one application however. It contains a number of different ...


Funny Photo Maker

It happens a lot of times that you capture a photograph, it is good enough but you still want to play with it and improve it. There are lots of programs available for photo editing and some might say that you should use Adobe’s Photoshop. Yes, ...


Slash Xonix

Slash xonix is a freeware game which takes the lesser known classic title xonix, and revamps and reworks it into a title for the desktop computer. Xonix (the game on which slash xonix is obviously based) is a game in which you must split the screen ...


Note Genie

Note Genie right from the very beginning seemed like a bit of a strange program to me. Fair enough, I was reviewing the software on Windows 7 when its clearly published as only supporting up to Windows XP, but nevertheless in my rebellious fashion I ...


AM Browser

AM browser is a freeware browser from 2009, which markets itself allowing you to surf the web in a more comfortable, less confusing way. Once you install and open AM browser, the first thing you will notice is how out dated the look of it is. Most ...



New Downloads

WebWatchBot

Constant monitoring is
critical to ensuring your
website and web-based
applications are error free
and performing with ...

Revulytics Usage
Intelligence, Mac ObjC

The first analytics solution
purpose-built for distributed
software applications gives
deep insight on product
feature ...

PDF2QIF

Easy to use secure solution to
review/convert your
transactions and import into
your accounting software.
Convert PDF to ...

Math Practice

Math Practice is an easy to
use software addressed to
parents who wish to help kids
make their first steps into
the world ...

InstallAware Free Installer

InstallAware\'s new Free
Installer runs inside Visual
Studio and creates setups
automatically, by scanning
your loaded ...

Security Task Manager

based on behavior analysis and
protects Windows computers
from new malware and
security-critical software.
The compact ...

PostgreSQL Data Access
Components

PgDAC is an enhanced component
library for fast direct access
to PostgreSQL from Delphi,
C++Builder and Lazarus. PgDAC
...

Attribute Manager

Attribute Manager program is a
practical tool to take control
of file and folder attributes.
It enables to modify ...

Easy PC Optimizer

Easy PC Optimizer is a
powerful app to speed up and
optimize computer performance.
It has all the tools needed
for ...



Related Searches

Symantec Endpoint Protection
Symantic Endpoint
Symentec Endpoint
Symantec Endpoint Protection Beta
Comodo Endpoint Security Manager
Symantec Endpoint
Norton Endpoint
Citrix Support Sip Endpoint
Cmc Endpoint Security
Company Spy Tivoli Endpoint
Defrag Symantec Endpoint Protection
Download Cmc Endpoint Security