Software > IT Security > Miscellaneous IT Security

Miscellaneous IT Security Software

Compare more security software in this current market overview. The solutions listed here are suitable, for example, for IT vulnerability analyses, software-supported IT emergency planning and can prevent the execution of unwanted macros. Certain solutions can also be used for complete and immediate recovery of computer workstations. However, security software is not only used to restore data or PCs, but is also needed for complete deletion as part of IT security. Besides deleting files and hard disks, the software can also be used to securely remove Internet traces, temporary files or forensic traces.

Are you looking for a suitable IT security software?
show 1 to 1 (of 1 entries)
[alive-IT]
Comprehensive support for your BCM and ITSCM
Comprehensive support for your BCM and ITSCM With the emergency management software [alive-IT] you have all important functions at your disposal to install an effective emergency management in your company. With [alive-IT] you optimize your BCM and ITSCM program. The BIA module supports you in creating, performing and evaluating your business impact analysis. The software can also support the crisis team and the situation center in managing critical incidents.
show 1 to 1 (of 1 entries)
1

Looking for the right software? Trust SoftGuide!

Our experts will find the perfect solution for you - independently and at the cutting edge of software trends.

Search in similar categories:

Show all 352 Software categories