Batch File Encryptor
Encrypt and decrypt whole files or their parts using AES, 3-DES, RC2, and DES symmetric algorithms. You can encrypt files with a single password or specify cryptographic...
Encrypt and decrypt whole files or their parts using AES, 3-DES, RC2, and DES symmetric algorithms. You can encrypt files with a single password or specify cryptographic...
SSL Enforcer - Force SSL/TLS encryption for any browser or app. Block all unsecure connections. Today any network activity involves a number of requests to the web....
Learn about our vulnerability management software, Nexpose. See how our vulnerability scanner prioritizes vulnerabilities and speeds up remediation.
Light-weight and extra-configurable peruser of systemd journal logs: ban IP, send immediate email, daily report… all based on a single JSON configuration file.
HeatShield is a network firewall management service and SSH brute force blocker for Linux servers.
e.guardo protects your RDP, MSSQL, FTP, SMTP, EXCHANGE, OWA, LYNC, MICROSOFT DYNAMICS CRM, SHAREPOINT and many more services from Brute Force and Dictionary Attacks
Check account security issues related to stolen data that could allow hackers to violate your private data.
ScreenWings helps stop dangerous loggers from spying. FEATURES * protect up to six screens * very stable and portable application * minimalistic user interface...
GuardedID takes a proactive approach to stopping malicious keylogging programs by encrypting every keystroke at the point of typing the keys, and rerouting those...
Check Point is a leader in network security software, firewall solutions, VPN solutions, endpoint security, network protection, security management, data protection and...
RootkitRevealer is an advanced rootkit detection utility. It runs on Windows NT 4 and higher and its output lists Registry and file system API discrepancies that may...
Vba32 AntiRootkit is designed to analyze the computer for the anomalies that arise due to the presence of malware in the system. Due to this, you will be able to detect...
Tallow is a fail2ban/lard replacement that uses systemd's native journal API to scan for attempted ssh logins, and issues temporary IP bans for clients that violate...
redborder is an Open Source, Big Data cybersecurity and traffic analysis platform accompanied by a set of active probes managed in an integrated manner. Can be deployed...
Share your Internet through Wi-Fi. Virtual AP is an easy-to-use software, that turns any LAN-connected PC or laptop into a Wi-Fi wireless access point. So anyone...
RapidSupport allows you to effortlessly support your clients no matter where they are located! It works through most firewalls and routers without any special...
Provide secure identity management and single sign-on to any application, whether in the cloud, on-premises or on a mobile device for your employees, partners and...
IDM365 is a suite of processes and tools that provide easy implementation and continued maintenance of identity and access management roles. IDM365 follows the...