Software > IT Security > Miscellaneous IT Security

Miscellaneous IT Security Software

Compare more security software in this current market overview. The solutions listed here are suitable, for example, for IT vulnerability analyses, software-supported IT emergency planning and can prevent the execution of unwanted macros. Certain solutions can also be used for complete and immediate recovery of computer workstations. However, security software is not only used to restore data or PCs, but is also needed for complete deletion as part of IT security. Besides deleting files and hard disks, the software can also be used to securely remove Internet traces, temporary files or forensic traces.

Are you looking for a suitable IT security software?
show 1 to 7 (of 7 entries)
abylon SHREDDER
Delete files and Internet traces irrevocably and securely
Delete files and Internet traces irrevocably and securely When deleting files, only the references to the files are removed without actually deleting them. With the appropriate APPs, this data can be reconstructed even without special knowledge. Even formatting the hard disk leaves recoverable data, which is not desirable when selling the computer. Remedy is provided by the software abylon SHREDDER. By using recognized deletion methods, files are irrevocably deleted and completely removed. In addition to deleting files and hard disks, Internet traces, temporary files or forensic traces can also be safely removed ...
[alive-IT]
Comprehensive support for your BCM and ITSCM
Comprehensive support for your BCM and ITSCM With the emergency management software [alive-IT] you have all important functions at your disposal to install an effective emergency management in your company. With [alive-IT] you optimize your BCM and ITSCM program. The BIA module supports you in creating, performing and evaluating your business impact analysis. The software can also support the crisis team and the situation center in managing critical incidents.
CRYPTO-BOX SERIAL
Software and data protection for the serial interface
The CRYPTO-BOX® Serial is a protection system with a serial RS232 interface. The perfect software protection dongle for all platforms with a serial interface, such as PCs, set-top boxes, controller units, workstations, etc. CRYPTO-BOX® Serial is suitable for use in industry as well as for customer-specific solutions.
abylon APP-BLOCKER
Process monitoring: permanently blocks unwanted applications, services and drivers
Process monitoring: permanently blocks unwanted applications, services and drivers When Windows is started, many processes, services and drivers are started. The user notices very little of most of the processes on the PC. In addition, he can hardly judge the necessity of many processes. These background processes, for example, monitor the computer, search for updates or take over periodic tasks. These processes are not always desired, but cannot usually be deactivated individually. In addition, each started application requires a part of the computer power and slows down the computer a bit ...
abylon LOGON
Gesicherte Windowsanmeldung und Single Sign-On
Gesicherte Windowsanmeldung und Single Sign-On The abylon LOGON software is offered in three variants and enables secure logon to the Windows computer (credential provider) and other logon screens (SSO). Smart cards, RFID radio chip cards, USB sticks, Bluetooth devices or CDs/DVDs can be used as hardware keys (security tokens) for login. When the hardware key is removed, the computer is automatically locked, logged off or shut down. The software increases security with increased convenience.
tenfold - Next Generation Access Management
tenfold - Next Generation Access Management
tenfold - Next Generation Access Management tenfold is a powerful and user-friendly identity and access management software. Managing access rights has never been easier! Organize your file servers: tenfold is perfectly tailored to meet the demands of Microsoft environments. The software creates all Active Directory accounts automatically and builds the necessary access structures in accordance with best practices right from the start. Data owners are included into specified workflows. tenfold helps you maintain control over who has access to which folders at any time.
abylon ENTERPRISE
Comprehensive security suite for computers, data, privacy and more
Comprehensive security suite for computers, data, privacy and more abylon ENTERPRISE installs numerous functions in one setup to optimize and encrypt the PC, the data on it and your privacy. Background services ensure the regular and secure destruction of temporary files, forensic traces and Internet traces with all cookies created. Within the scope of all encryption functions, conventional passwords, software and hardware certificates (X.509) and smart cards as well as USB sticks can be used as security keys (security tokens).
show 1 to 7 (of 7 entries)
1

Looking for the right software? Trust SoftGuide!

Our experts will find the perfect solution for you - independently and at the cutting edge of software trends.

Search in similar categories:

Show all 348 Software categories