Protect-UX allows you to manage file permissions and ACLs across your Unix, Linux and HP OSS environment. Protect-UX provides a centralized view of file and directory permissions on your Linux and Unix systems, enabling administrators to ensure that access rights comply with corporate policies and standards as well as industry or government regulations. Key features: * Access matrix tools for defining, implementing and reviewing access rights policies * Interactive analysis of file access rights * Packaged access right templates can be applied or compared * Centralized management of 100's of systems * Controlled use of privileged IDs * Complete audit of all activities The Protect-UX Windows based GUI replaces the use of command line utilities and scripts and complements existing security solutions. The Protect-UX server modules provide privileged access with full audit and without exposing root to external use.
Protect-UX is a Windows based management console for Linux and Unix systems. On target Linux and Unix servers, a server component must be installed. Platforms supported include Red Hat, Ubuntu, SuSe and HP OSS.
Other Windows Software of Developer «Computer Security Products»:
CopyNotify Small Business Edition Control and Block USB drive usage across the office network. Monitor all files being copied onto USB drives and Block Unauthorized USB drives in office (white listing). Disallow USB port usage for data transfer out of office.Limitations:15 day trial
Desksense Professional Desksense is the easiest way to suite your all needs to stay Protected!! Desksense password protects your folders, block unwanted websites and domains, and prevents your data theft by locking down external devices like USB Flash, CD/DVD, Smart Cards or rat
Microsoft IIS4 Session ID Cookie Marking Vulnerability Patch This patch eliminates a security vulnerability in Microsoft Internet Information server that would allow a malicious user to hijack another user's secure Web session under a very restricted set of circumstances.IIS supports the use of a session ID cookie t
NetMaster Gateway Guardian Create your own dedicated enterprise level security appliance by easily installing our GG-OS software onto your own hardware to provide network firewalling, unlimited VPN tunnels, and centralized remote management. Core features include: Centralized remote
WebDAV Vulnerability Tester Detecting if WebDAV is enabled. Testing IIS WebDAV authentication bypass vulnerability (CVE-2009-1676) . Listing directory and files. find a protected folder (/secret/) and then try inserting the %c0%af character.
ISA Stats ISA Stats allows to control Internet usage in your company. Statistics collecting system analyses traffic and summarizes the information about working process. It gives a chance to find out the most active users, to reveal when and which Web sites they hav
Secret Server Secret Server is a secure password management system for information technology teams. This password manager features AES 256 bit encryption, the U.S. government standard encryption algorithm. Users can safely store, view, audit and when necessary, share a
AD2Factor AD2factor is designed by IT administrators to IT administrators and there users.
AD2Factor fits perfectly with your existing Microsoft environment and integrates with Active Directory and most routers, firewalls and remote desktop setups.Requirements:GS
Synergix AD Client Extensions 2012 ADCE is a unique software solution that bridges major gaps between LAN connected & remote Windows computers, where users log in with cached credentials. SYNERGIX AD Client Extensions [ADCE] for Microsoft Windows is a unique software solution that bridges m
Supported Operating Systems:
Windows 7 |
Windows 8 |
Windows Vista |
Comments on :
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10