The AirStop Wireless client controls wireless access on laptop computers. forcing connection to authorized networks only. Unique features include enforcement of connectivity policy by ensuring that users can only access secure authorized wireless networks, while restriciting access to unauthorized networks. When upgrading to AirStop Pro, the AirStop Server can be used for enterprise-grade centralized monitoring, configuration and tracking. This makes for a powerful wireless connectivity and security policy enforcement solution. The server enables network administrators to remotely configure a specific machine or define individual, group and temporary wireless security policy. For example, if the administrator has defined specific authorized wireless networks and a user attempts to connect to an unauthorized network, the wireless adapter will be automatically disabled. Using the AirStop server, the administrator can remotely change the user's settings allowing them to access specific unauthorized networks according on a temporary or permanent basis.
Like it? Share with your friends!
Other Windows Software of Developer «Code Red Systems»:
AirStop wireless security softwareAirStop is an endpoint security solution which prevents data leakage by controlling all communications adapters and storage devices on laptop and desktop computers. Designed as an enterprise applications, the software enforces sec
AirStop Multiport The AirStop Multiport client controls communiations adapters on laptop computers. This enables full laptop lock-down and prevents a number of potential attacks such as wireless bridging and unauthorized wireless device access. Unique features include enfor
Zhegui Single Sign On Zhegui Single Sign On is a web-based Single Sign On software product. Support J2EE/ASP/ASP.NET/PHP based background applications. Key features: ZSSO is a web-based Single-Sign-On system. Work as a reverse-proxy. Easy to use. Least modification is need for
LanSpy LanSpy is a network security scanner, which allows getting different information about computer Domain and NetBios names, MAC address, Server information, Domain and Domain controller information, Remote control, Time, Discs, Transports, Users, Global and
Invisible Private Folder The Invisible Private Folder can help you keep your files protected from kids, friends and co-workers. It allows you to add any folders to the virtual invisible private folder. It enables you to block and hide any file or folder you do not want to be acces
Secure Oracle Auditor Secure Oracle Auditor (SOA) is an Oracle auditing and Oracle security vulnerability assessment software which is capable of scanning multiple Oracle database servers. This Oracle security software provides Oracle audit tools, Oracle password tools, databas
AuditPro Enterprise Edition AuditPro Enterprise Edition is a comprehensive enterprise security assessment solution featuring critical asset identification, policy compliance, risk analysis, real time vulnerability views, enhanced reporting capability, and graphical progress analysis.
Trusteer Pinpoint Malware Detection Trusteer Pinpoint Malware Detection accurately detects malware infected devices and determines both the nature of the threat and the risk it represents to the organization. Organizations receive alerts about malware infected devices accessing their web sit
Passware Kit Enterprise Passware Kit Enterprise provides corporate security administrators with the full control over employees' computers and files. System administrators, IT professionals and help desk personnel can now get access to any business file whenever required. Many ty
Proactive Password Auditor Proactive Password Auditor is a password security test tool that's designed to allow Windows NT, Windows 2000 and Windows Server 2003-based systems administrators to identify and close security holes in their networks. It helps secure networks by executing
Screen Pass Screen Pass is a screen locking system for Windows that extends the capability of the standard workstation lock and gives network administrators complete control over idle workstations. With Screen Pass, network administrators can enforce screensaver passw
Trusteer Cybercrime Prevention Architecture Trusteer Cybercrime Prevention Architecture enables organizations to protect their employees and customers against advanced threats and targeted attacks. Trusteer solutions prevent malware and phishing attacks, stop account takeover and new account fraud,
Supported Operating Systems:
Windows XP |
Comments on :
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10