Resultado da Pesquisa - Audit

Safeguard Enterprise PDF DRM 5.0.40

Safeguard Enterprise PDF DRM 5.0.40  3593 

PDF DRM security for the enterprise. Locklizard PDF document security software enables you to secure PDF documents from unauthorized use,…

AssureFiles Secure File Sharing 4.4.2.4

AssureFiles Secure File Sharing 4.4.2.4 versão gratuita 3788 

Secure File Sharing With Digital Rights Management.Safeguard file sharing without boundaries. AssureFiles Secure File Sharing combines AES 256 bit encryption…

EaseFilter Secure File Sharing SDK 4.4.2.3

EaseFilter Secure File Sharing SDK 4.4.2.3  3938 

Create Windows application to track, control and secure your files in one step with EaseFilter file system filter driver SDK.…

Hash Suite 3.6

Hash Suite 3.6  4530 

Hash Suite is a very efficient auditing tool for many password hash types. It is very fast, yet it has…

SpotAuditor 5.3.5

SpotAuditor 5.3.5  3397 

SpotAuditor is a feature-rich application that recovers passwords saved in various platforms, including Internet Explorer, Google Chrome, Mozilla Firefox, Opera…

Omega DB Scanner Standalone 2.1.0

Omega DB Scanner Standalone 2.1.0 versão gratuita 3327 

Omega DB Scanner Standalone is an out-of-box, software-only solution. This Standalone and Free Edition is a simple client-side solution that…

Omega Core Audit 3.0.0

Omega Core Audit 3.0.0  3340 

Access Control, Continuous Audit Monitoring and Real-Time Protection for Oracle databases. Security applied at the core - from within the…

Action1 Block USB Devices 2.6

Action1 Block USB Devices 2.6 versão gratuita 5597 

Action1 Block USB Devices is a free USB removable media real-time monitoring tool that is entirely SaaS, running in your…

Action1 Software Inventory Manager 2.6

Action1 Software Inventory Manager 2.6 versão gratuita 5301 

Action1 Software Inventory Manager is a free software inventory management tool that is entirely SaaS, with online web interface (no…

Ekran 4.4

Ekran 4.4 versão gratuita 3089 

Ekran System helps companies of any size to build their strategies of mitigating user-based security risks. It is a universal…

« First « Prev 7 Next » Last »