Software > IT Security > Miscellaneous IT Security

Miscellaneous IT Security Software

Compare more security software in this current market overview. The solutions listed here are suitable, for example, for IT vulnerability analyses, software-supported IT emergency planning and can prevent the execution of unwanted macros. Certain solutions can also be used for complete and immediate recovery of computer workstations. However, security software is not only used to restore data or PCs, but is also needed for complete deletion as part of IT security. Besides deleting files and hard disks, the software can also be used to securely remove Internet traces, temporary files or forensic traces.

Are you looking for a suitable IT security software?
show 1 to 10 (of 10 software programs)
[alive-IT]
Comprehensive support for your BCM and ITSCM
Comprehensive support for your BCM and ITSCM With the emergency management software [alive-IT] you have all important functions at your disposal to install an effective emergency management in your company. With [alive-IT] you optimize your BCM and ITSCM program. The BIA module supports you in creating, performing and evaluating your business impact analysis. The software can also support the crisis team and the situation center in managing critical incidents.
abylon SHREDDER
Delete files and Internet traces irrevocably and securely
Delete files and Internet traces irrevocably and securely When deleting files, only the references to the files are removed without actually deleting them. With the appropriate APPs, this data can be reconstructed even without special knowledge. Even formatting the hard disk leaves recoverable data, which is not desirable when selling the computer. Remedy is provided by the software abylon SHREDDER. By using recognized deletion methods, files are irrevocably deleted and completely removed. In addition to deleting files and hard disks, Internet traces, temporary files or forensic traces can also be safely removed ...
tenfold - Next Generation Access Management
tenfold - Next Generation Access Management
tenfold - Next Generation Access Management tenfold is a powerful and user-friendly identity and access management software. Managing access rights has never been easier! Organize your file servers: tenfold is perfectly tailored to meet the demands of Microsoft environments. The software creates all Active Directory accounts automatically and builds the necessary access structures in accordance with best practices right from the start. Data owners are included into specified workflows. tenfold helps you maintain control over who has access to which folders at any time.
abylon ENTERPRISE
Comprehensive security suite for computers, data, privacy and more
Comprehensive security suite for computers, data, privacy and more abylon ENTERPRISE installs numerous functions in one setup to optimize and encrypt the PC, the data on it and your privacy. Background services ensure the regular and secure destruction of temporary files, forensic traces and Internet traces with all cookies created. Within the scope of all encryption functions, conventional passwords, software and hardware certificates (X.509) and smart cards as well as USB sticks can be used as security keys (security tokens).
BvLArchivio DMS
Document Management System
Document Management System Protect your sensitive company data with the certified security software BvLArchivio. Thanks to 2,048-bit encryption and comprehensive protection against cyberattacks, your documents and files remain safe from ransomware and tampering.
CRYPTO-BOX SERIAL
Software and data protection for the serial interface
Software and data protection for the serial interface The CRYPTO-BOX® Serial is a protection system with a serial RS232 interface. The perfect software protection dongle for all platforms with a serial interface, such as PCs, set-top boxes, controller units, workstations, etc. CRYPTO-BOX® Serial is suitable for use in industry as well as for customer-specific solutions.
FLINTEC IT - Alerting by telephone and SMS/email
Telephony solution for automatic alerting with real-time feedback
Telephony solution for automatic alerting with real-time feedback Alerting by telephone in real time and additionally by email or SMS for documentation purposes. Flintec receives an alarm request e.g. via the Remedy ticket system, authorized persons by telephone or system monitoring. Customizable!...
AT+C VM.7 - DCIM
Software for cable management and network documentation
Software for cable management and network documentation The AT+C Connection Manager VM.7 provides a perfect overview in the area of CAFM cable management and network management. The current status of the network is visualized using software. The software supports network planning, manages the flow of information and ensures comprehensive documentation of the network.
abylon APP-BLOCKER
Process monitoring: permanently blocks unwanted applications, services and drivers
Process monitoring: permanently blocks unwanted applications, services and drivers When Windows is started, many processes, services and drivers are started. The user notices very little of most of the processes on the PC. In addition, he can hardly judge the necessity of many processes. These background processes, for example, monitor the computer, search for updates or take over periodic tasks. These processes are not always desired, but cannot usually be deactivated individually. In addition, each started application requires a part of the computer power and slows down the computer a bit ...
abylon LOGON
Gesicherte Windowsanmeldung und Single Sign-On
Gesicherte Windowsanmeldung und Single Sign-On The abylon LOGON software is offered in three variants and enables secure logon to the Windows computer (credential provider) and other logon screens (SSO). Smart cards, RFID radio chip cards, USB sticks, Bluetooth devices or CDs/DVDs can be used as hardware keys (security tokens) for login. When the hardware key is removed, the computer is automatically locked, logged off or shut down. The software increases security with increased convenience.
show 1 to 10 (of 10 software programs)
1

Looking for the right software? Trust SoftGuide!

Our experts will find the perfect solution for you - independently and at the cutting edge of software trends.

Search in similar categories:

Show all 357 Software categories