icon

Search Results for "centralized Endpoint Security Tool"

Please type in the keywords that best describe the software you are searching for.

Only search for freeware (Fewer results)

These categories may be related to what you're looking for:

Filter results:

Nsauditor Network Security Auditor screenshot

icon Nsauditor Network Security Auditor

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 66

Nsauditor Network Security Auditor is a complete networking utilities package that includes a wide range of tools for network auditing, scanning, monitoring and more. You can discover network servi... more Category: Network Scanner

XP-AntiSpy screenshot

icon XP-AntiSpy

  • Our Rating: stars
  • User Rating: 5 (5)
  • Popularity: 33

XP-AntiSpy is a small utility to quickly disable some of Windows' built-in update and authentication features that may raise security or privacy concerns for some people. The program also prov... more Category: Misc. Security Tools

Security Task Manager screenshot

icon Security Task Manager

  • Our Rating: stars
  • User Rating: 4 (4)
  • Popularity: 55

Security Task Manager is an enhanced task manager, that provides advanced information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, ... more Category: Misc. Security Tools

Sandboxie screenshot

icon Sandboxie

  • Our Rating: stars
  • User Rating: 4 (17)
  • Popularity: 99

Sandboxie allows you to run your browser, or any other program, so that all changes that result from the usage are kept in a sandbox environment, which can then be deleted later. This allows you to... more Category: Misc. Security Tools

iNet Protector screenshot

icon iNet Protector

  • Our Rating: stars
  • User Rating: 3 (1)
  • Popularity: 55

iNet Protector allows you to restrict Internet access for employees or children. You can chose to block all Internet access, unless a proper password is entered, or set user specific schedules that limits access to spec... more Category: PC Access Control

Zemana AntiLogger screenshot

icon Zemana AntiLogger

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 66

Zemana AntiLogger protects your system from keyloggers and other malware with the intent to steal your personal information. Rather than relying on signature updates to recognize known malware, the program uses proacti... more Category: Misc. Security Tools

Malware Defender screenshot

icon Malware Defender

  • Our Rating: stars
  • User Rating: 4 (1)
  • Popularity: 11

Malware Defender is a hands-on HIPS (Host Intrusion Prevention System) for advanced users. It enables you to create rules that can help you protect your computer from malware, Trojans, spyware and other threats. The pro... more Category: Misc. Security Tools

Identity Cloaker screenshot

icon Identity Cloaker

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 44

Identity Cloaker is an Internet Privacy and Anonymity Protection Service that enables you to hide your real IP address through a network of private anonymous proxy servers located in different countries. For additional ... more Category: Misc. Security Tools

The Tube screenshot

icon The Tube

  • Our Rating: stars
  • User Rating: 3 (1)
  • Popularity: 11

The Tube is a SSH Tunneling tool that makes it easy to set up one or more secure tunnel connections between a SSH server and a remote TCP host. The program can auto-configure the proxy settings for... more Category: Misc. Security Tools

Rohos Logon Key screenshot

icon Rohos Logon Key

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 66

Rohos Logon Key enables you to log into your computer by inserting a USB key instead of typing your password. The program will place a security token on your USB drive and add an additional `Login by USB` option to the ... more Category: Misc. Security Tools

Filter results:

Result pages: 1 2 3 4 5 6 7 8 9 10 »» Next


Need more search power? Search our site with Google! See results for centralized Endpoint Security Tool