|
||||||
|
||
|
Home > Office security software |
Related keywords: security, Security, office, Office, computer security, internet security, security software, Microsoft Office, information security, SECURITY |
|
|
451. | DriveScrubber 2.0a (iolo.com) | ||
operating system. Its purpose is to ensure the safety, privacy, and security of private, personal, confidential, or proprietary information. Once a drive has been wiped with DriveScrubber, no attempts (regardless of their level of sophistication) will be able to recover any data that previously | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 729 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
452. | E-Service Center Manager (ESCM) - Server 2.3 (alarit.com) | ||
- shipping back to customer. Each Equipment is accounted by it's Model, Model Group, Manufacturer and Serial Number, and can have one or more Accessories (also available for repair). Repair pricing are automatically calculated by Rates assigned to each Model, Accessory depending on Defect found. As already mentioned, ESCM has great "Reports" section, covering all kinds of | |||
Updated: 9, 2005 | Rating: 0 | Author: Claus Wagner | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
453. | ECBackup 2.0 (softcomplete.com) | ||
is a archiver with strong-security, based on open key technology. It's very like to PGP, but uses more reliable and efficient methods of compression and encoding. You have oppotunity to work with ECBackup from the command line but not only. ECBackup can be used for creation of backup copies of the confidential information instead of accident-sensitive pkzip, arj etc | |||
Updated: 9, 2005 | Rating: 0 | Size: 1199 kb Go to category: Security & Privacy > Encryption Tools Similar programs | |||
454. | EldoS KeyLord 4.0 (eldos.org) | ||
information records to "expire" so that you are notified when it's time to go and change password or acount info. KeyLord integrates with your web browser and helps you store login information not in insecure Windows Password Storage (for which browsers and crackers exist), but in encrypted KeyLord file. EldoS KeyLord lets you arrange confidential information (passwords, account | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
455. | EldoS KeyLord for PocketPC 4.1 (eldos.org) | ||
information records to "expire" so that you are notified when it's time to go and change password or acount info. EldoS KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, print it and store it in secure encrypted file. You can store any data including files inside of the tree | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 176 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
456. | EmailObserver 5.2.2 (softsecurity.com) | ||
is a suitable tool for: - Parents concerned about their children's computer activity, i.e. what kind of messages they send by email, who they communicate with etc. - Spouses concerned about their partner's secret cyber relationship etc. - Businesses trying to control internal information turnover, to stop incorrect using of the company name, drain of trade/industrial | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 739 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
457. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment: 1) High | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
458. | Find Protected 2.0 (aks-labs.com) | ||
on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find Protected, IT administrators can do a deep inspection of employees' files to enforce an | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
459. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
if you are really concerned about privacy of your data, there's nothing to stop you from protecting your archives with password and encrypting them. Please be aware that many implementations of encryption algorithms exist on the market. While they all employ the same ideas they don't necessarily have to be binary compatible. Therefore, it may happen that files encrypted by | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
460. | Enforcer 6.2 (posum.com) | ||
provides security for systems that are accessible to many people and require a consistent configuration and a consistent, limited selection of services such as public displays or computer labs. It is also great for limiting users to the webpages you approve such as on a VPN or for childproofing individual systems. It is easy to configure and requires little to no modifications to | |||
Updated: 9, 2005 | Rating: 0 | Author: Stephen Jernigan | Size: 1566 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Office security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|