Streaming isolated remote applications and desktops to the browser
Building effective anti-phishing, anti-malware and ransomware defenses has never been easier. Kasm’s isolation technology insulates users by creating a "chasm" between the user's personal computer and web-borne threats.
Try it Now
Cloudbrink Personal SASE service
For companies looking for low maintenance, secure, high performance connectivity for hybrid and remote workers
Cloudbrink’s Personal SASE is a high-performance connectivity and security service that delivers a lightning-fast, in-office experience to the modern hybrid workforce anywhere. Combining high-performance ZTNA with Automated Moving Target Defense (AMTD), and Personal SD-WAN all connections are ultra-secure.
Dir2Encrypt encrypt a folder with privat files and subfolders into a single password protected archive file. The archive file can be a zip file or a self extracting exe file. Microsoft Net Framwork 2 has to be installed.
This toolkit has complete security Package start from Tweak manager , Updater , Virus scanner ,Proxy server and many more This will be help full for user from corporate to small user we have already started working on it will completed with 2 months
A set of tools for querying and modifying the ACL's (access control lists) and ACE's (access control entries) of files, services, registry keys, printers, processes, threads, timers, mutexes, tokens, events, and semaphores in Windows 2000 and later
Enterprise-grade platform designed to connect strategy, planning, and execution across digital product development and software delivery
Planview links your technology vision directly to teams' daily work, providing complete visibility and control over your digital product delivery ecosystem.
SAVI-SAP is a shared library which links between Sophos Scan Interface SAVI and the SAP Virus Scan Interface (offical name: NW-VSI). A SAP application can use the Sophos engine to scan for malicious uploads in HTTP uploads for example.
DAD is a Windows event log and syslog management tool that allows you to aggregate logs from hundreds to thousands of systems in real time. DAD requires no agents on the servers or workstations. Correlation and analysis is driven through a web front end.
Derived from TrueCrypt 6.3 release, I added some command line options to "TrueCrypt Format.exe" to allow TrueCrypt volumes to be created without using the graphical user interface
Set of perl scripts to analyse and check expiration of user certificates in Microsoft Windows Certification Authority. Output is in HTML with list of expiration state of latest user certificates. Expirated are marked. List can be sent by e-mail.
Professional Email Hosting for Small Business | Greatmail
Ready to switch to a more reliable and secure email hosting solution?
Dependable cloud based email hosting with spam filtering, antivirus protection, generous storage and webmail. Compatible with Outlook and all other POP3/IMAP clients. High volume SMTP service for responsible senders. Outbound relay service for transactional messages, email marketing campaigns, newsletters and other applications. Dedicated email servers, clustering and multiple IP load balancing for high volume senders. Fixed monthly cost with unlimited sending and reputation monitoring. Greatmail is an email service provider (ESP) specializing in business class email hosting, SMTP hosting and email servers. For ISPs, application programmers and cloud developers, we also provide custom solutions including dedicated IP servers and process specific, load balanced configurations with multiple servers.
Proxymizer is an anonymizer (a proxy server connecting to other proxy servers), allowing simultaneous use of several public proxy servers, one per single request. Highly extensible and configurable.
Power Hasher is a program that allow you to get the hash code of multiple files at once, and export the results to a file, making easy for this file to be imported and the files checked. Currently it supports MD5, SHA1, SHA256, SHA384 and SHA512.
Velo is an open Identity and Access Management platform, with many IDM services such as provisioning, access control, password synchronization, audit & compliance, self service interfaces and much more.
A .NET password safe, which utilizes Windows encryption, Windows Communication Foundation (WCF), Windows Users/Groups, Active Directory authentication and granular security controls. Designed to securely share passwords in an enterprise environment.
LiveView is a forensics tool that creates a VMware virtual machine out of a raw (dd-style) disk image. This allows an examiner to "boot up" the image and gain an interactive, user-level perspective of the environment, all without modifying the imag
RunAsAdmin Explorer Shim is a tool that lets administrators to keep and easily use their administrative rights but still enjoy safety of using least privileged accounts.
RAS-SMS is a simple extension to Microsoft's Remote Access Service (RAS). RAS-SMS adds two factor authentication to standard VPN/PPTP clients on Windows, Mac-OS and Linux. RAS-SMS uses your mobile phone instead of smart cards, RSA keys or USB tokens.
Corporate Data Protection and Network Security is a IT project targeting policy-based and fully-automated data protection, encryption and transmission. We plan to create self-diagnostic risk-predict enterprise environment with artificial intelligence.
BizTalk components for e-Invoice
Set of add-on components, such as pipeline-components to address e-Invoice specific needs in the supply-chain sollution.
JavaLightServer is a multi-purpose server that can be used to share our desktop across the Internet with other authorized clients. It provides also a secure connection using SSL certificates.
The MD5Revolution is a small tool to calculate the MD5 checksum of entered strings. More features and additionally information about the tool, can be found under: http://md5r.x303.cc/