|
||||||
|
||
|
Home > Security audit software |
Related keywords: security, Security, audit, computer security, internet security, security software, information security, SECURITY, file security, windows security |
|
|
1. | BB EAP 5.38 (bbsys.com) | ||
records), Produces and stores Client satisfaction surveys, HIPPA auditing data/security, and more. In addition, all of this information is collected with the minimum of data entry. Many data elements are "picklists". The user just click to select a value and it is inserted without typing. Individual objects on forms, such as buttons, or text boxes have "tool tips" | |||
Updated: 2, 2006 | Rating: 0 | Author: Bob Bolda | Size: 11718 kb | Shareware Go to category: Business > Other Similar programs | |||
2. | Remote Task Manager 3.8.2 (protect-me.com) | ||
add new services or devices, manage the run level and adjust the security (permissions, auditing and owner). The Process Function and the Task Manager allows remote termination and adjusting of priority. An Event Viewer lets the Administrator view all events as though they were being run on the | |||
Updated: 2, 2006 | Rating: 0 | Author: Ashot Oganesyan | Size: 2339 kb | Demo Similar programs | |||
3. | Winalysis 3.1 (winalysis.com) | ||
for changes to files, the registry, users, groups, services, security policies, and more. Archive Event Logs from multiple machines to a central database. Restore files and the registry from snapshots. Schedule jobs to monitor the network for critical changes, optionally generating alerts using SNMP traps, email, scripts, the event log... Create user-defined audit reports | |||
Updated: 2, 2006 | Rating: 0 | Author: Steve Fullerton | Size: 3122 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
4. | Server Maintenance Portal 3.2 (absolutedynamics.com) | ||
assets across the network. SMP also works with Microsoft Baseline Security Analyzer to determine the security state of your Windows systems. Integrated with MBSA 2.0. Disk space monitoring and reporting. Easy-to-navigate web pages. Flexible reporting options. Intuitive Active Directory searches. Import/Export options. Easy to automate using command line parameters. IT Asset | |||
Updated: 2, 2006 | Rating: 0 | Author: Donnie Byerley | Size: 764 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
5. | Registrar Registry Manager 4.03 (resplendence.com) | ||
a great tool for cleaning your registry from unwanted entries. Security editors allow you to set registry key access permissions, auditing and ownership. It offers multi-level undo so all registry changes can be individually undone. The program comes in an attractive explorer-style interface which is highly customizable. Registrar Registry Manager is a complete registry | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Terhell | Size: 2239 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
6. | Infiltrator Network Security Scanner 3.0 (infiltration-systems.com) | ||
is a network security scanner that can quickly audit your network computers for possible vulnerabilities, exploits, and information enumerations. It comes with a built-in database of know vulnerabilities, that can be updated online and allows you to select the items to scan for or to add custom entries to be included. Infiltrator can reveal and catalog a variety of | |||
Updated: 2, 2006 | Rating: 42 | Author: Nathan Polencheck | Size: 1350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
7. | Remote Task Manager 3.8.2 (ntutility.com) | ||
add new services or devices, manage the run level and adjust the security (permissions, auditing and owner). The Process Function and the Task Manager allows remote termination and adjusting of priority. An Event Viewer lets the Administrator view all events as though they were being run on the | |||
Updated: 2, 2006 | Rating: 0 | Author: Ashot Oganesyan | Size: 2339 kb | Demo Go to category: Network & Internet > Remote Computing Similar programs | |||
8. | Registrar Registry Manager 4.03 (resplendence.com) | ||
a great tool for cleaning your registry from unwanted entries. Security editors allow you to set registry key access permissions, auditing and ownership. It offers multi-level undo so all registry changes can be individually undone. The program comes in an attractive explorer-style interface which is highly customizable. Registrar Registry Manager is a complete registry | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Terhell | Size: 2239 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
9. | ShopAssist Point Of Sale System 4.92 (users.iafrica.com) | ||
Cashier Statistics. Over three hundred reports and charts. Security Five levels of password protection for its various modules and functions. Audit trail of all transactions. Integrated data backup and recovery. Network Up to two hundred terminals per server. Multi-Store Inter-Branch Transfers. Consolidated Sales, Consolidated Stockholding, Branch Orders | |||
Updated: 2, 2006 | Rating: 16 | Author: Ivan Smith | Size: 16796 kb | Shareware Go to category: Business > Other Similar programs | |||
10. | R-Guard 2.2 (r-tt.com) | ||
protection beyond the limited scope of standard Microsoft Windows security services R-Guard allows users to set access rights not only for users but for applications and system processes as well. R-Guard Host based Intrusion Detection System shields users’ files from viruses, spyware, Trojan horses, and other unwanted and potentially disastrous intruders. Most common applications | |||
Updated: 9, 2005 | Rating: 0 | Size: 3020 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > Security audit software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|