USB Security Enterprise 1.9
USB Security runs completely in background, invisible and undetectable to PC users. No pop-up windows and warning messages unless explicitly configured. Running unnoticed, USB Security logs all attempts to connect authorized and disallowed USB devices, ...
- Audio & Multimedia
- Business
- Communications
- Desktop
- Development
- Education
- Games
- Graphics
- Home & Hobby
- Network & Internet
- Screen Savers
- Security & Privacy
- Servers
- System Utilities
- Web Development
- AnyMP4 DVD Ripper for Mac
- FoneLab Data Retriever
- Recupero File Cancellati
- AnyRec Video Repair
- Aiseesoft Mac FoneLab
- SSuite NetSurfer E-Gamer x64
- USB Disk Undelete
- Verwijderde Bestanden...
- Business Purchase Order
- Secure Eraser
- Atlantis Word Processor
- FrontSketch
- Apeaksoft DVD Creator for Mac
- UltraFileSearch Std
- Pen Drive Recovery Free
- ADRC Data Recovery Tools
- avast! Antivirus
- Revo Uninstaller
- Java Runtime Environment
- AVG Anti-Virus Free Edition
- GOM Media Player
- RegSeeker
- IrfanView
- CPU-Z
- Malwarebytes Anti-Malware
- Spybot Search & Destroy
- Skype
- µTorrent
- Ai File Extension Editor
- Remove Drm From Pdf Files
- Download Word Templates For...
- Assault Cube Sounds
- Download Song As Zip File
- Rankquest Watchseo
- Free Becker Cpa
- Creative Smiley Faces Text
- Portable Photo Editor Free...
- Screen Capture Master
- Bat Merge
- Daz Iso Compressor
- Destroy Recycle Bin Windows
- Decode Firefox Cache File
- Link Directory Script
Security Logs Download
-
1$34.95
-
2PC Network EventLog Scanner
PC Network EventLog Scanner is a program that allows you to scan your network computers for all types of eventlogs added, including eventlog data from 'application', 'security', ' system' and other custom added eventlog criteria available in Microsoft ...$45.00 -
3USB Security Application 2.5
USB Security blocks unauthorized USB devices such as memory card readers and USB flash drives, removable storage and USB hard disks while allowing devices such as keyboards, mice and printers to be used normally. USB Security can be used at homes, ...$34.95 -
4Screen Anytime 3.1
Based on our advanced SSCV2 technology, you can record and keep security logs for years on limited disk space (Typically, 4G/per month/per workstation). And those logs are well sorted by time line, terminals and users, supporting keyword searching and ...$199.00
Buy -
5ELM Manager 6.0
ELM Enterprise Manager is a comprehensive system monitoring and event log management solution complete with alerting, reporting, and archiving. Busy System Administrators and IT Managers alike will appreciate the power of automated log management together ...$11,475.00 -
6Netwrix Active Directory Change
One single change can put your organization at risk, introducing security breaches and compliance issues. Built-in Active Directory auditing lacks many important features and doesn't have reporting capabilities. Careful analysis of multi-megabyte Security ...Freeware -
7AD Auditor 12.10.01
Manual monitoring of Windows Active Directory changes is awkward procedure as administrator needs to collect information from all security logs of the Active directory. Lepide Auditor for Active Directory can effectively track all the changes made in ... -
8Windows Server 2008 Auditing
Administrator need to analyze Windows security logs every time to ascertain the Active Directory status. LepideAuditor for Active Directory has been designed to monitor every changes in the Active Directory structure. It monitors every change that user ... -
9Netwrix Change Notifier for Active
One single change can put your organization at risk, introducing security breaches and compliance issues. Built-in Active Directory auditing lacks many important features and doesn't have reporting capabilities. Careful analysis of multi-megabyte Security ...Freeware -
10Event Log Explorer 4.5
Event log analysis of Windows event logs is a vital task for any system administrator. The standard Windows Event Log Viewer has limited facilities, and doesn't allow you to perform effective event log analysis. Event Log Explorer is a simple but powerful ...$149.00
Buy -
11Ascella Log Monitor 1.0
Allows users to monitor events recorded in the Application, Security, System logs, dispatches the notifications about events via LAN, which can be received by the Windows NT4/2000 Messenger service, and using e-mail, SMS and ICQ (via e-mail gates)Freeware -
12WDumpEvt 2.2
WDumpEvt is an administration tool that makes it easy to view and manage all the informations from Windows NT/2000 logs:Ask for system, security, application log or evt file information. View, print or dump the list of events, user, failure or ras sessions, ...$50.00 -
13Ascella Log Monitor Plus 1.3
Allows users to monitor events recorded in the Application, Security, System logs, dispatches the notifications about events via LAN, which can be received by the Windows NT4/2000 Messenger service, and using e-mail, SMS and ICQ (via e-mail gates). Works ...$50.00 -
14Event Log Analyzer 12.10.01
Lepide event log analyzer is an efficient tool that can easily manage event logs as well as analyze various network security and system health related issues. Event logs are the major sources of information for monitoring systems and even the entire ...Freeware -
15EventReporter 8.0
Automatically monitor your Windows NT/2000/XP event logs. Detect security compromises and hard- or software failures before they hurt. Integrates Windows systems in UNIX based management systems. EventReporter continously monitors the Windows Event Logs ...$49.00 -
16Netintelligence Broadband Security
Netintelligence Home Edition offers security and parental control for up to three computers in a broadband-connected home. It monitors and records IM and chat, blocks inappropriate web sites in six categories, and logs just what software is being usedOCoand ...$39.99 -
171st Security Center Pro 7.5.5.519
1st Security Center is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables you to impose a variety of access restrictions to protect ...$19.95
Buy -
18Winalysis 3.1
Monitor for changes to files, the registry, users, groups, services, security policies, and more. Archive Event Logs from multiple machines to a central database. Restore files and the registry from snapshots. Schedule jobs to monitor the network for ...$55.00 -
19Perfect Security Icons 2015.1
Perfect Security Icons is a collection of royalty-free stock icons for use in commercial and personal products, including software applications, websites, blogs, and presentations. The icons have been carefully created pixel by pixel by professional ...$49.95
Buy -
20Network Security Protector 3.2
Network Security Protector is the best network-based security software for corporations, public libraries, internet cafes, schools, universities and other public environment applications where administrator has to secure and maintain a lot of network ...$59.00
Buy -
21Comodo Endpoint Security Manager
Comodo Endpoint Security Manager centrally manages the deployment of award-winning Comodo Internet Security (CIS) software that protects the laptops, desktops and servers your business relies on. Offering unbeatable protection against internal and external ...Freeware -
22Zillya! Internet Security
Internet Security - Complete protection against viruses and hackers. Zillya! Internet Security has a very simple and user-friendly interface that is easy for beginners. Zillya! Internet Security has all antivirus functionality: - Real-time file ...$35.00
Buy -
23Security Software Icon 2012
Well, your web products as well as your security software will definitely appear attractive & advanced by using these types of icons. These icons consist of two types of colour formats, one is 8 bit and the other one is Windows 7/8. In fact these ...$99.95
Buy -
24Office Security OwnerGuard
Office OwnerGuard is the ultimate Security, Digital Rights Management (DRM), Copy Protection, Licensing, Watermarking and Distribution Management solution for Excel, Word, PowerPoint Documents ( xls, xlsx, xlsm, xlsb, doc, docx, ppt, pps, pptx ). This ...995.00
Buy -
25Outlook Security Component
Now it is easy to disable the warnings with our Outlook Security Component. It is an ActiveX component which means you can drop it easiy to your VB, Delphi or .Net application, then you should be able to use outlook by pass the annoying security warnings.$149.95
Buy