You are here:

AdminFavorites.com > Security Software and Intrusion Detection Systems
ActiveXperts Network Monitor 2015##AdminFavorites

Security & Encryption software

ActiveXperts Network Monitor 2015

ActiveXperts Network Monitor 2015 is the leading solution for monitoring every aspect of your LAN and WAN network. It proactively manages your virtualization servers (Vmware, XenServer, Hyper-V), network servers, printers, network devices, databases and more; It detects and corrects problems before network users start complaining. The product is extremely scalable. It's shipped with an impressive collection of pre-defined, built-in monitoring functions; but if this collection is not sufficient, operators can write their own functions in PowerShell and/or VBScript and add these to the configuration. The Monitoring engine is a multithread engine, capable of running up 99 threads simultaneously.

When problems are detected, you're immediately notified by network message, e-mail, pager, or SMS message. When a failure is detected, the network monitor tool will try to recover the problem by running a system administrator defined program or by restarting a process.

The product includes build-in monitor rules for: Active Directory, ADO databases, ADSI, Disk Drives, CPU Usage, Disk Spaces, Event Log (with content checking), Exchange, File Existence (with content checking), FTP sites, HTTP(s) (with content checking), ICMP/Ping, MS SQL Databases, Novell NDS, NNTP news servers, NTDS (NT4 compatible DS), NTP time servers, ODBC Databases, Oracle Databases (SQLNet), POP3 Mail servers, PowerShell, Printers, Processes, Services, SMTP Mail servers, SNMP, TCP ports (with handshaking), UDP, UNIX Shell Scripts (RSH), VBScript (custom scripts), WMI and more.

ActiveXperts Network Monitor is a complete solution. Regardless of what you want to monitor, ActiveXperts Network Monitor supports it all at a cost-effective price.

Access Manager for Windows

Access Manager for Windows allows you to restrict access to to key features of Windows, such as Control Panels or Start menu, network, Taskbar, desktop, system tray, Network Access Control Page, Control Internet usage and more.

It can also disable the Ctrl+alt+delete keys, the function keys at startup, allows to password protect Windows and restrict users to running specific applications only, control Internet usage, view statistics of computer use by your kids or employees and loads more. This program can lock your computer and ask for a password when Windows loads. Access Manager for Windows is just the thing for keeping employees , students or children from coming in and fiddling around with the computers. It has all the needed features to keep people from viewing or changing what you do not want them too. Every network administrator should get this nice security program!

Company:
IM-Soft

ActiveRoles Server

Simplify the security and protection of your Active Directory in order to solve security issues and meet compliance requirements with the help of ActiveRoles Server.

With automated tools to efficiently manage users and groups, as well as Active Directory delegation, ActiveRoles Server helps you to overcome Active Directory’s native limitations, enabling you to do your job faster. You can afford to meet your business requirements today and in the future thanks to ActiveRoles Server’s modular architecture.

With ActiveRoles Server, you can:

  • Eliminate unregulated access to resources while protecting critical Active Directory data
  • Automatically create user and group accounts for secure management in AD and AD-joined systems
Company:
Dell

Advanced Encryption Package 2003 Professional

Typically you encrypt files because you don't want others to see them, but sometimes you want to send someone an encrypted file.

Most if not all encryption programs allow you to do so--they vary, however, in terms of how difficult the process is. AEP2002 PRO's most noteworthy feature may be its flexibility: Not only can you encrypt files for your own protection but you can easily create "self-decrypting" versions of your files that others can run without needing AEP2002 PRO or any other software. The program includes a file shredder that wipes the contents of your original files. It also integrates nicely with Windows Explorer, allowing you to use Explorer's context menus and avoid having another window clutter your screen. It also uses military grade encryption for protecting your private files. Program includes 17(!) undustrial encryption algorithms: DESX, BLOWFISH, RIJNDAEL(AES), CAST, 3-DES, RC2, DIAMOND2, TEA, SAFER, 3-WAY, GOST, SHARK, SQUARE, SKIPJACK, TWOFISH, MARS, SERPENT. AEP2002 PRO supports skins technology and has 10 nice additional skins! Moreover program has full support for ZIP files! I.e. ability to add files into .ZIP file, browse and extract contents from .ZIP file. Compression rate is better than WinZip's one! Plus Complete support for Command Line Interface.

Bazooka Adware and Spyware Scanner

Bazooka Adware and Spyware Scanner detects a multitude of spyware, adware, trojan, keylogger and trackware components; sources of irritation that antivirus software does not deal with.

The scanning process will only take a fraction of a second and tell you how to uninstall the invasive spyware or put you in contact with the spyware developer for the most up-to-date and safe uninstall instructions. Spyware and adware is often bundled with software such as Kazaa, Morpheus, Grokster, Imesh, Xolox, Gnutella and a myriad of other programs, and in many cases installed without your knowledge. Some send information about your surfing habits to ad companies, which target you with popup ads that fit your preferences. Bazooka Adware and Spyware Scanner search for Gator, GAIN, Bargain Buddy, CommonName, FlashTrack, IPInsight, n-CASE, NetRatings, NewDotNet, SaveNow, Wurldmedia, etc. The complete list is available here. To stay-up-to date with the latest spyware and adware software Bazooka downloads the threat definitions from the web.

Company:
Kephyr

CamSurveillance

AbelCam's features leave no wishes unanswered:
Process Captured Images

AbelCam can deliver images to any web browser assingle images, Motion JPEG stream or Windows Media Stream.three different Capture Interfaces cover all requirementsUse Caption and Overlay Images, scale and zoom on demand

AbelCam lets you:
    Manage multiple webcam streams easily. Avoid using an independent hosting service by using the integrated web server. Capture images using motion detection.
Who Needs AbelCam?

You do if you've ever:

  • Wanted an effective yet inexpensive remote surveillance solution.
  • Needed the ability to manage remote webcams with full tilt, pan, and zoom support.
  • Found the software that came with your webcam to be limiting.
Company:
CamDevTeam

DeltaCrypt's OneClick Encryption Software

DeltaCrypt OneClick File Encryption Software is easy to usewhich makes public key encryption accessible to everyone.

Benefit fromencryption security with RSA protected keys. Encryption's integritysecured with SHA-256. DeltaCrypt OneClick commands allows the user toencrypt and decrypt in just a click. A digital signature is appended onencrypted information and on public keys for extra protection. Cipher datarapidly and efficiently, without compromising computer memory capacity oroperating speed. Encrypt any file format without any volume restrictionwith the OneClick application that under 800 kb! The delete option offeredby DeltaCrypt OneClick File Encryption Software substitutes the content ofthe original source files with space characters before wiping files out.Source files then become useless if recuperated. At decryption, DeltaCryptreconstructs files identical to the original ones: same name, same timeand same size. The DeltaCrypt OneClick File Encryption software comes in aself-executable file and is menu-driven. DeltaCrypt applications arepackaged in a dynamic linked library which offers multiple plug-inpossibilities to meet any special requirements.

DriveCrypt

DRIVECRYPT securely and easily protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security.

Any organization, from a small company to a large international firm with thousands of users in the field, can effectively protect business plans, client lists, product specifications, confidential corporate memos, stock information, and much more with this disk encryption product.

As data is read from the hard disk, DRIVECRYPT automatically decrypts the data before it is loaded into memory. When data is written back to the hard disk, it is automatically re-encrypted. The disk encryption/ decryption process is completely transparent to the user or any application program -the data is caught "on the fly" as it transfers back and forth between the hard disk and memory. Consequently, users don't need to remember to decrypt or re-encrypt their data, or change the normal operation of the PC. In addition, only individual files are decrypted at any one time, not the whole hard disk.

Company:
SecurStar GmbH

DriveScrubber

DriveScrubber is a utility designed to securely wipe all datafrom any hard or floppy drive, regardless of its file format or operatingsystem.

Its purpose is to ensure the safety, privacy, and security ofprivate, personal, confidential, or proprietary information.

Once a drive has been wiped with DriveScrubber, no attempts (regardless oftheir level of sophistication) will be able to recover any data thatpreviously existed thereon.

Most people believe that when a drive is formatted, all information withinis permanently and irrecoverably gone. The error in this belief is thatit relies on some basic assumptions that are very far from the truth.

Obviously, this poses a very significant security problem, and individualcomputer users who do not wish the data that existed on their computers tobe accessible after formatting (or simply donating, selling, or discardingtheir systems) are not the only ones that are subject to this predicament.Businesses, schools, government agencies, and military institutions thatfrequently deal with extremely sensitive, private, and confidential dataare also left wide open and vulnerable to attempts at breaching securityand recovering proprietary information from old or unused drives. Thisinformation usually represents dire consequences should it unintentionallyfall into the wrong hands!

Encrypt Easy

Encrypt Easy is a highly secure file encryption program enabling fast and simple one-click encryption for personal and professional security.

The program allows encryption and decryption of single files, folders and entire directory trees. It uses the best and most proven cryptographic algorithms such as Rijndael, Twofish, Blowfish, DES, TripleDES and RC2. Once the information has been encrypted, it can be stored on unsecured media devices or transmitted on unsecured networks and still remain secret. With just one mouse click and the password, the user can decrypt the information into its original form. The program is fully integrated with Microsoft® Windows Explorer.

Additional features of Encrypt Easy include a list of innovative utilities. It contains a self extracting utility, which enables the user to transmit encrypted files, then decrypt them without using the Encrypt Easy program. For secure data deletion, a file shredder function enables the user to remove files or folders containing sensitive data permanently from their systems in such a way that they cannot be recovered. Shredder uses DOD 5220.22-M method. Encrypt Easy's wipe-out utility will ensure that all traces of Internet and system activities containing privacy information will be removed. Together, all security utilities will ensure very fast, comfortable and safe care of your data!

Main Features of the Software:

  • encrypt files using the best and most proven cryptographic algorithms such as Rijndael 256bit, Twofish 256bit, Blowfish 448bit, DES 64bit, TripleDES 192bit, and RC2 1024bit;
  • fast and simple, with one-click encryption and decryption;
  • encrypt single files, folders and entire directory trees;
  • built-in powerful predictive Compression. Compression strengthens cryptographic security even more.
  • self extracting - decrypt files without using Encrypt Easy;
  • shred files in such a way that they cannot be recovered;
  • wipe out all traces of your Internet and system activities;
  • supports all Windows® versions;
  • full Integration with Microsoft® Windows Explorer;
  • and much more.
Company:
Baltsoft

GFI EventsManager

Event logs are a valuable tool to monitor network security and performance that are often underutilized due to their complexity and volume. As organizations grow in size, they require a more structured approach towards event log management and retention.

A recent survey carried out by SANS Institute found that 44% of system administrators do not keep logs more than a month.

GFI EventsManager collects data from all devices that use Windows event logs, W3C, and Syslog and applies the best rules and filtering in the industry to identify key data. This allows you to track when staff swipe their fob, pick up the phone to call home, turn on their PC, what they do on their PC and which files they access during their work day. GFI EventsManager also provides you with real-time alerting when critical events arise and suggests remedial action.

Company:
GFI Software

GFI LANguard

GFI LANguard is an award-winning vulnerability management solution that provides security scanning, patch management and network auditing. Used by over 20,000 customers worldwide, it identifies all possible security issues as it scans the entire network and, using its extensive reporting functionality, provides the tools needed to detect, assess, report and rectify any threats.

Over 15,000 vulnerability assessments are carried out across the network, including virtual environments, using vulnerability check databases based on OVAL (2,000+ checks) and SANS Top 20.

Main features:

  • Identify security vulnerabilities and take remedial action
  • Set-up your own custom vulnerability checks
  • Detection of Virtual Machines
  • Automatically deploy network-wide patch and service pack management
  • Automatic remediation of unauthorized applications
  • Remote Desktop Connection
  • Deploys custom/third party software and patches network-wide
  • Extended Hardware auditing facility
  • Automatically receive alerts of new security holes
  • Scan and retrieve OS data from Linux systems
Company:
GFI Software

Netwrix Auditor

Netwrix Auditor automates configuration auditing of the entire IT infrastructure. With Netwrix Auditor you can efficiently audit critical IT systems such as Active Directory, Group Policy, Exchange, Windows Server, File Servers, SharePoint, VMware, SQL Server, NetApp and various network devices.

Key Features:

  • Clear display of ‘Who changed what, when and where’
  • Shows 'before and after' values for all infrastructure changes
  • Allows reverting unwanted changes and recovering deleted AD objects
  • Compliance to SOX, HIPAA, FISMA, PCI and others
  • Archives data for seven years or longer
Company:
NetWrix

PC Security

PC Security is the ultimate in computer security, offering multiple locking systems for the windows environment and internet. Lock files, monitor programs activities, even detect intruders.

PC Security offers flexible and complete password protection, "Drag and Drop" support, plus many other handy features. All together, a incredible security package.

Personal Firewall

Armor2net personal firewall software stops hackers, data thieves, and protects your PC from Internet-borne threats. Armor2net firewall can meet your requirements for Internet security and Internet privacy.

This firewall monitors all Internet connections to and from your computer to ensure that only legitimate traffic is allowed and alerts you to attempted intrusions. You have the option to grant and deny access to Internet on a per-application basis, thus preventing worm, Trojan horse and spyware programs from hurting your computer.

Armor2net firewall shows the currently active connections and the details of these connections. With this personal firewall, you can shut off any unsafe connection, block the dangerous internet sites.More features. Pop-up stopper: Armor2net stops browsers' pop-up ads windows. You can also customize it on each individual web site.

Armor2net's interface is easy to use and amiable. It will bring you a smoother experience. Armor2net is intelligent firewall software. Many actions will be automatically processed. You will be free from the tedious and trivial operations.

PocketSafe

CRESOTECH POCKETSAFE provides the comfortable management andsecure storage of passwords, nicknames, credit card, bank account anddocument data as well as other confidential information.

The records indatabase are stored encrypted and password-protected. The mobile worldrequires mobile solutions with data confidentiality protected: PocketSafegives you this full protection. PocketSafe allows you to secure importantdata of 8 basic types: a specific template for each particular type makesdata entry more convenient. The database file and each data entry withinthe database can be password-protected, thus providing more security.Strong DES encryption algorithm and double password protection make surethat your confidential information is for your eyes only! PocketSafe alsoallows you to store information in several different files. It is quitehandy to structure all the information you need for your employees,colleagues, kids or spouse. Customizable interface and other adjustablefeatures make this software product user-friendly and easy-to-use.

Company:
Cresotech, Inc.

Private Desktop

Private Desktop allows you to keep a second, password-protected screen containing all your private applications.

The toolbar icon can be made very small or invisible, hot keys can be specified to remove you from the second screen in a split second, and special key sequences can be required before one is allowed to enter the password protected screen. Files and programs can be automatically unlocked and locked as you enter and exit your private screen.

Pulse Secure

Secure Access. Anywhere. Any Device.

Pulse Secure offers seamless, secure access from anywhere, any device with centralized management and visibility.

RegRun Security Suite

RegRun is an integrated suite of utilities that will make your computer-management life easier, and will help protect you from much of the destructive activity of today's Trojans.

It includes advanced Windows Startup Manager that gives you absolute control over what starts up when you load Windows. The new feature in this version is Startup Optimizer. It can automatically removes useless and dangerous applications from Windows Startup. A lot of well known applications are included into constantly updated Application Database. RegRun Rescue automates everyday backup of your registry. WinCleaner quickly wipes unwanted files and allows to manage cookies. In addition RegRun Suite includes fast registry search and replace feature, customizable registry tracer, bootlog analyser, process manager and trojan analyser. RegRun Suite is fully compatible with well known antiviral software.

Company:
Greatis Software

SecureAnywhere Business

Spy Sweeper detects and safely removes all forms of invasive spyware, including Trojans, adware, key loggers, and system monitors.

It eatures a real-time active memory shield, smart sweeper technology that adapts to dynamically changing spies to ensure your protection, support for detachable and network drives, customizable sweeping options to save you time and one-click access to a detailed spy database. The Spy Sweeper application offers one-time access to the latest updated spyware definitions, giving you immediate spyware protection. For ongoing protection against ever-evolving spyware, Spy Sweeper offers a fee-based subscription service that provides the most advanced security available. A Spy Sweeper subscription offers seamless updates to new definitions that detect and remove threats as they emerge plus the support of expert customer service to help keep your system free from spyware problems.

Company:
Webroot Software

Security Manager Plus

Security Manager Plus is a network security scanner that proactively reports on network vulnerabilities and helps to remediate them and ensure compliance.

Security Manager Plus provides detailed inventory of the network assets, assesses network vulnerabilities and identifies devices that are exposed.

By deploying missing patches/updates and service packs, Security Manager Plus automatically remediates some open threats to the systems. It also provides solutions to mitigate risks, secure IT environment and generates comprehensive audit reports for compliance and understanding.

Security Manager Plus offers

  • Vulnerability Scanning
  • Open Ports Detection
  • Hardware/ Software Inventories
  • Patch Management
  • Windows Change Management
  • Audit Reports
  • Compliance Reporting
Company:
ManageEngine

Spices.Net

Spices.Net is a set of .NET code security and code protection, software lifecycle management tools for .NET developers.

It includes .Net obfuscation, tamper defense tools, tools to recover source code and convert binaries to c# and VB.Net, documentation services, analysis and modeling tools in one environment that constantly offers new possibilities.Programming in Microsoft's .NET Framework platform gives additional horizons in realization of various ideas with an extensive set of features.

Spices.Net - next generation set of tools that helps .NET developers increase .NET сode security, safety and productivity, quality and efficience of .NET software, that continues to offer wide range of features for developers and many more new possibilities.

Company:
rays.net

Spytech NetVizor

NetVizor allows you to track workstations and individual users that may use multiple PC's on a network.

NetVizor records everything users do - from keystrokes typed to email activity. NetVizor can show you what everyone is doing on your network, in real-time, with a single mouse click via its visual network overview and real-time activity ticker.

Combining real-time remote surveillance with complete individual user monitoring, report creation, and security auditing, NetVizor is the most comprehensive network monitoring solution available!

Company:
Spytech Software

Super Folder Lock Software

Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly.

Backup them in real-time; protect portable drives; shred files & drives and clean history. Folder Lock is the most downloaded file-security application with more than 25 million users. It works on 32-bit and 64-bit versions of Windows.

Company:
NewSoftwares.net

Symantec Gateway Email Encryption

Gateway Email Encryption provides centrally managed email encryption to secure email communications with customers and partners.

With Gateway Email Encryption, organizations can minimize the risk of a data breach and comply with partner and regulatory mandates for information security and privacy.

Company:
Symantec

Symantec Host Intrusion Detection System

Symantec Host Intrusion Detection System (IDS) provides real-time monitoring, detection, and prevention of security breaches, delivering automated policy enforcement and incident response for servers, applications, and data.

As a complement to firewalls and other access controls, it enables administrators to develop proactive policies to stop hackers or authorized users with malicious intent from misusing systems.

Through its centralized management console, administrators can create and deploy monitoring and response policies, collect and archive audit logs for incident analysis and reporting, and automatically receive the latest intrusion signatures via LiveUpdate integration. If systems are threatened, Symantec Host IDS will notify administrators with an alarm and take countermeasures according to pre-established security policies in order to prevent the loss or theft of information.

Symantec Host IDS is highly scalable and easily managed from a single administrative console. Administrative wizards perform many routine tasks and silent installation and remote tune-up capabilities make it easy to deploy and maintain across the network. It includes specialized software agents that support server platforms running Windows® 2000 and can be configured to monitor Web or database applications running on Windows 2000 servers. To lower the cost of ownership even further, Symantec Host IDS integrates with Symantec Security Management System, a new management framework that provides consolidated data collection, logging, and reporting for Symantec and select third-party products. With Symantec Security Management System, administrators can view security alerts and manage incident response for a range of security products across the entire enterprise l from a single, easy-to-use control center.

Company:
Symantec

Web Remote Commander PRO

AWRC Pro allows you to remotely gather and manipulate more information than remote privileged users can dream about.

This is the only software in the World that can connect to other computers without installing any software on the remote machine. It seems impossible. We thought that as well! But this is just the beginning of a long story.

Remote Commander allows you to remotely gather and manipulate more information than remote privileged users can dream about. It is by far and large the most powerful remote audit and inventory software you can find. And with its great set of tools, you can do virtually anything on the remote system you can on the local system.

Remote Commander is a must-have for System Administrators and Helpdesk personnel. Recommended for a range of special remote access requirements, from Intelligence to Parental supervision.

When full power is the minimum requirement, you need Remote Commander…

AWRC Pro capitalized in more than 10 years experience of AWRC and came up as a completely renewed product, featuring amazing new features such as:

  • Only software in the World that can remotely access Remote Desktop (and Citrix) sessions.
  • Only software in the World that can connect to, view and control Remote Desktop/Terminal Service Sessions and Citrix Apps.
  • Capability to record movies even on motion detection.
  • Remote Console (if you know what is PsExec, you have the idea).
  • Full Unicode Support, even for Zipping and Unzipping.
  • Lists Installed Programs, Updates and Hotfixes.
  • Runs remotely as 64-bit on a 64-bit operating systems.
  • And almost 100 more…
Company:
Atelier Web

ZoneAlarm Extreme Security

Complete multi-device internet security package for your digital world.

  • Antivirus/Anti-Spyware Engine
    Detects and remove viruses, spyware, Trojan horses, worms, bots and rootkits.
  • Advanced Real-Time Antivirus NEW!
    Enhances protection by checking against an always up-to-date cloud database of antivirus signatures.
  • Advanced Firewall
    Monitors programs for suspicious behavior spotting and stopping new attacks that bypass traditional anti-virus protection.
  • Two-way Firewall
    Makes your PC invisible to hackers and stops spyware from sending your data out to the Internet.
  • Anti-Spam
    Filters out annoying and potentially dangerous emails.
  • PC Tune-up Improved!
    Cleans, organizes and streamlines your computer - improving its performance.
  • Online Backup
    Backs up files and restores your data in the event of hardware malfunction.
  • Identity Protection
    Helps to prevent identity theft by guarding your personal data.
  • Parental Controls
    Filters and blocks inappropriate websites and chat rooms and limits time spent online.
  • Threat Emulation NEW!
    Opens email attachments and web downloads in a virtual cloud environment to see if they are safe.
  • Enhanced Browser Protection NEW!
    Protects your computer from web threats before they reach your browser.
  • Find My Laptop NEW!/b>
    Locates your lost or stolen laptop on a map, locks it down and allows remote recovery of important files.
  • Anti-Keylogger Improved!/b>
    Prevents identity thieves from stealing your passwords and keystrokes.
  • Privacy & Security Toolbar/b>
    Provides Site Check, Do Not Track, Facebook Privacy Scan, private browsing and more.
  • Do Not Track/b>
    Stops data collecting companies from tracking you online.
  • Facebook Privacy Scan/b>
    Scans your recent Facebook activity and alerts you to privacy concerns. Control what others can see.
  • Private Browsing/b>
    Erases your tracks - allowing you to surf the Web in complete privacy.
Company:
ZoneLabs
ActiveXperts Network Monitor 2015##AdminFavorites