This ThreatView provides a quick snapshot analysis of your network traffic inside the perimeter with an executive summary that includes overall risk level and IP packets analyzed from the computers hosting the ThreatView utility.
Windows NT/2000/XP/2003 Server
Like it? Share with your friends!
Other Windows Software of Developer «Apani Networks»:
Microsoft Security Compliance Manager Microsoft Security Compliance Manager provides centralized security baseline management features, a baseline portfolio, customization capabilities, and security baseline export flexibility to accelerate your organization's ability to efficiently manage the
Employer Surveillance Employer Surveillance is an advanced monitoring/surveillance application which gives you full control over what your employees do on their computers. It helps in improving the productivity of your employees and protecting your company's security. It record
Mareew Office Recovery Automatically recover lost and deleted Microsoft Office and OpenOffice documents with Mareew Office Recovery. Survive system crashes and disk corruption, recover documents from formatted or inaccessible disks, and rescue files deleted from the Recycle Bin
Secure Lockdown Standard Edition Lock down Windows XP/Vista/7/8/10 and create a virtual embedded environment. Inteset's inexpensive Secure Lockdown version 2.0 is perfect for kiosk setups, digital signage, trade shows, library and school labs, Internet cafes, gaming centers, media centers
Trusteer Pinpoint Account Takeover (ATO) Detection Trusteer Pinpoint Account Takeover Detection (PPATO) protects web sites against account takeover and fraudulent transactions. PPATO leverages Trusteer's visibility to the fraud life cycle to accurately detect criminal access to a customer's account. It cor
PEV - The PE file analysis toolkit PEV - The PE file analysis toolkit is a multiplatform PE analysis toolkit that includes tools to retrieve and parsing information about Windows PE files. It can be useful for programmers, security analysts, and forensic investigators.What is new in this re
Log Radar Log Radar centralizes the collection of SYSLOGs and SNMPs from IT network devices within the organization ranging from firewalls, ips/ids, anti spam appliances, ssl vpn appliances, switches as well as servers and PCs. Log Radar does not only analyze and co
Drive Blocker Block and disable removable drives (flash drives) and drives that use removable disks (CD's, floppies). User selected password required to access removable media. Stop data theft, installation of unauthorized software. Reduce infections of viruses, worms,
CrossTec Secure Secure 2.0 provides a safe, secure, and reliable computing experience, reducing downtime and increasing time on task. Secure is a good solution for shared computing environments, such as classroom computer labs or libraries.
IT staff can rest assured wi
N-Stalker Web Application Security Scanner N-Stalker Web Application Security Scanner is a Web security assessment tool. Incorporates well-known N-Stealth HTTP Security Scanner and 35,000 Web attack signature database. Its patent-pending self-owned technology allows to scan Web applications against
Supported Operating Systems:
Windows 2000 |
Windows NT |
Windows XP |
Comments on :
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10