Astaro Report Manager 4.6
Astaro Report Manager - Turn volumes of security data into actionable intelligence. Astaro Report Manager provides a distributed architecture for small to medium enterprises that scales to thousands of network devices. The architecture supports both ...
- Audio & Multimedia
- Business
- Communications
- Desktop
- Development
- Education
- Games
- Graphics
- Home & Hobby
- Network & Internet
- Screen Savers
- Security & Privacy
- Servers
- System Utilities
- Web Development
- Computer Data Recovery
- Android Data Recovery Software
- FAT Partition Files...
- Topography in AutoCAD
- Memory Cards Recovery Program
- DVD Labels
- SSuite NetSurfer E-Gamer x64
- Privacy Eraser Free
- EasyBilling Invoicing Software
- AnyMP4 Video Editor
- Windows Data Recovery Software
- Aiseesoft AI Photo Editor
- Files Recover Mac
- FoneLab iOS Unlocker
- NTFS Files Recovery Utility
- ADRC Data Recovery Tools
- avast! Antivirus
- Revo Uninstaller
- Java Runtime Environment
- AVG Anti-Virus Free Edition
- GOM Media Player
- RegSeeker
- IrfanView
- CPU-Z
- Malwarebytes Anti-Malware
- Spybot Search & Destroy
- Skype
- µTorrent
- Ai File Extension Editor
- Remove Drm From Pdf Files
- Download Word Templates For...
- Assault Cube Sounds
- Download Song As Zip File
- Rankquest Watchseo
- Free Becker Cpa
- Creative Smiley Faces Text
- Portable Photo Editor Free...
- Screen Capture Master
- Bat Merge
- Daz Iso Compressor
- Destroy Recycle Bin Windows
- Decode Firefox Cache File
- Link Directory Script
Security Data Download
-
1$395.00
-
2eMastering 3.0
Sterling has developed a completely new electronic transmission utility designed to insure data integrity and data security. Data Integrity – SHA-1 (Secure Hash Algorithm) is a highly sophisticated method of verifying data integrity. The eMastering ...Freeware -
3Kaspersky Security Scanner 2.0
Kaspersky Security Scanner. Award-winning scanning capability – built by the same world-class experts that develop other Kaspersky products. • Quick scanning for viruses and other security threats • Access to the latest, cloud-based security ...Freeware -
4Active@ Data Studio (Live CD) 8.5.5
Active@ Data Studio (Live CD) includes a set of powerful desktop applications as well as a bootable image which can be copied to either an optical disk or a flash drive. You can then dual-boot your computer into either a DOS or Windows environment. This ...$199.00
Buy -
5RDS Advanced Security 6.4.7.19
RDS-Advanced Security is the must-have cybersecurity software to detect attacks on remote connections, protect servers and improve network security. Cybersecurity threats to RDS infrastructures are booming and becoming more damaging than ever before.$250.00
Buy -
6Dell ControlPoint Security Manager
Like the Dell Controlpoint Connection Manager and the original Dell QuickSet (on which System Manager is based), Dell Controlpoint Security Manager is intended to provide a single point of entry to commonly used settings making it easier for the user ... -
7WatchGuard System Manager 11.5
WatchGuard System Manager (WSM) is a powerful, intuitive interface used to centrally manage WatchGuard security appliances. This includes rewall, VPN, intrusion prevention, URL filtering, web security, anti-virus and anti-spam services, and appliance ... -
8Core Insight 1.8
Core Insight - The First Continuous, Real-World Security Testing Solution. The CORE INSIGHT automated security testing appliance continuously and proactively assesses the security of your organization’s most critical information assets. By ...$499.00 -
9Active@ Partition Recovery
Active@ Partition Recovery Enterprise is a comprehensive and powerful data recovery tool that allows you to recover deleted partitions and logical disks on hard drives. With this version you can take advantage of both the DOS and Windows versions benefits ... -
10BounceBack Professional 11.0
This software initiates asking you for an initial backup, where automatically the data you select (files and/or folders) or the entire system drive can be backed up. The settings allow you to determine and modify backup sets, with characteristics such ... -
11Advanced Folder Safe 2.5.5.102
Lock your private files and folders with Advanced Folder Safe software, you can encrypt all file types (text, office documents, pdf, mp3, images, database files, vedio and more), Advanced Folder Safe provide a real bit per bit data encryption, Advanced ...Freeware -
12MTE Folder Locker 1.8.8.282
Lock your private files and folders with mte folder locker software, you can encrypt all file types (text, office documents, pdf, mp3, images, database files, vedio and more), mte folder locker provide a real bit per bit data encryption, mte folder locker ...$29.95
Buy -
13McAfee ePolicy Orchestrator 4.6
McAfee ePolicy Orchestrator (ePO) is widely acknowledged as the most advanced and scalable security management software in the industry. With ePO software, organizations of all sizes can efficiently manage any number of devices — all from a ... -
14AutoSave Essentials 3.5
If you are the person responsible for your family’s memories or your company’s accounts or even general data, it may just save your life. Plus no complications, it is as easy as 1-2-3!$39.95 -
15Shadow Defender (32 bit) 1.2.0.346
New security vulnerabilities are found every day by which many malicious programs or people attack the Windows operating system. Your computer may HAVE been attacked. Please protect your system with Shadow Defender ASAP! Shadow Defender is the best ...$35.00
Buy -
16Gili File Lock 5.1
It protects but does not encrypt the protected files and folders, so it will never have the chance to destroy your data and nobody can access or destroy your private data without password. It is easy to install and is very useful. Try it now! -
17Black Sheep 1.7
BlackSheep, a Firefox plugin, is designed to combat Firesheep. BlackSheep does this by dropping ‘fake’ session ID information on the wire and then monitors traffic to see if it has been hijacked. While Firesheep is largely passive, ...Freeware -
18Citrix Access Gateway 9.3
It gives IT administrators a single point to manage access control and limit actions within sessions based on both user identity and the endpoint device, providing better application security, data protection, and compliance management.$995.00 -
19Oubliette 1.9
Oubliette is a shareware database that is easy to use, fully functional and secure. It allows the creation of account lists with information like account name, password, notes, URL and the like. Easy accesses to information, copy to clipboard or conversion ...Freeware -
20Beaconaut APICalc 2.0
In computer science, arbitrary-precision arithmetic is a technique whereby calculations are performed on numbers whose digits of precision are limited only by the available memory of the host system, It is also called bignum arithmetic. Arbitrary precision ...$39.95 -
21Easy Email Encryption Lite 8.0
Easy Email Encryption Lite is designed to make it easy to send encrypted email (and to receive it). It can be used to encrypt email to be sent via any email program, in particular with Outlook Express. The message is encrypted before it is sent to ...$39.45 -
22ZoneMerger 1.0
NT/Windows 2000 GUI Utility for analyzing and merging the zoning databases of two Brocade SilkWorm Fabrics. Certain differences between the zoning databases can cause the two fabrics to segment when connected together. ZoneMerger will locate these conflicts ... -
23Peak Limiter 1.5
Softly compresses single peaks exceeding a user-defined level in such a way that the result cannot be distinguished from the original by the human ear. This permits rising the main volume of the sound file considerably without causing clipping or distortion!Freeware -
24CE Secure Free Express 4.3.0.7
CE-Secure Free Express enables you to create up to four 128MB encrypted vaults using AES-256 bit encryption. There is no time-out on our express edition, you can continue to use the product to access these vaults once created, or use this edition to ...Freeware -
25IM Glossary 1.0
Information Management (IM) Glossary is a glossary containing more than 150 Information Management related definitions in domains such as Master Data Management, Business Intelligence, Data Warehouse, Data Quality, Data Governance and Analytics. The ...$0.99