
Securonix
Security Intelligence Platform for monitoring security Events, Identity and Access data to detect Insider Threats and Advanced targeted attacks.
Security Intelligence Platform for monitoring security Events, Identity and Access data to detect Insider Threats and Advanced targeted attacks.
Consume is a powerful and versatile usage monitor for your mobile phone, broadband, tolls, deliveries, rewards cards and more. Keep track of all your account balances...
For those who are not on un-limited voice plan from your country mobile network operators, you are usually given only certain minutes of free calls before they start to...
ironbee - Universal web application security sensor intended for real-time monitoring and defense.
# What is Naxsi? NAXSI means Nginx Anti XSS & SQL Injection. Technically, it is a third party nginx module, available as a package for many UNIX-like...
Secure Pipes makes managing SSH tunnels simple and robust. It's made for people who love and understand UNIX technology, but also love the simplicity and convenience...
Comodo Website Security software cWatch - best solution for website protection. It detects all web security threats, enhances website performance and speed.
Wireless tools for Linux is a package of Linux commands (simple text-based utilities/tools) intended to support and facilitate the configuration of wireless devices...
Proofpoint, Inc. (NASDAQ: PFPT) helps the largest and most successful companies in the world protect and govern their most sensitive data.
Our fast, mobile-friendly system enables facility managers to handle more properties, and provide better service in less time at lower cost. Join hundreds of satisfied...
NEXGEN Asset Management is a comprehensive software solution designed to efficiently manage and sustain your organization’s asset management program through a single...
Dream Maintenance is an easy-to-use maintenance management software, that through the use of the most innovative technologies, makes all processes simpler and more...
MDM allows for OS level control of multiple iOS devices from a centralized location, on your own server. A remote administrator can install/remove apps, install/revoke...
Let Asentinel help you increase your visibility, verifiability, and lifecycle management discipline while reducing your spend. Visit our site to learn more.
Kansoly helps businesses buy and manage their telecom services better. Kansoly capability is: - Sourcing with RFP's and reverse auctions - Expense management...
Stonesoft MobileID allows you to authenticate with the Stonesoft A2Cloud solution (SSL VPN and/or Authentication Server) using the Stonesoft Synchronized or Stonesoft...
Create fast and easy VPN connections from anywhere to WatchGuard XTM firewall appliances. WatchGuard Mobile VPN enables the creation of a mobile virtual private network...
GDPR Compliance in 3 Steps Step-by-step instructions, wizards, templates and know-how GDPR HQ Modules & Features GDPR HQ is a central repository for GDPR...
Hibernation Recon has been developed to support memory reconstruction from Windows hibernation files. It can identify and extract massive volumes of information from the...