icon

Search Results for "centralized Endpoint Security Tool"

Please type in the keywords that best describe the software you are searching for.

Only search for freeware (Fewer results)

These categories may be related to what you're looking for:

Filter results:

Intel-SA-00086 Detection Tool screenshot

icon Intel-SA-00086 Detection Tool

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 44

The INTEL-SA-00086 Detection Tool will assist with detection of the security vulnerability described in INTEL-SA-00086, commonly referred to as "Meltdown" CPU security flaw. The vulnerability affe... more Category: Misc. Security Tools

DeviceLock screenshot

icon DeviceLock

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 66

DeviceLock gives network administrators control over which users can access what removable devices on a local computer. Once DeviceLock is installed, administrators can control access to USB driv... more Category: PC Access Control

Password Policy Enforcer screenshot

icon Password Policy Enforcer

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 55

Password Policy Enforcer allows network administrators to go beyond the standard Windows options and create and enforce a password policy, that ensures that users are choosing strong (difficult to crack) passwords. PPE ... more Category: Misc. Server Tools

NetVizor screenshot

icon NetVizor

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 66

NetVizor is a powerful network surveillance tool, that allows you to monitor your entire network from one centralized location. It enables you to track workstations and individual users that may use multiple PCs on a n... more Category: Computer Surveillance

EventSentry Light screenshot

icon EventSentry Light

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 66

EventSentry Light enables system administrators to have eventlog messages sent by email. The free version allows you to specify one filter criteria, to limit notification to selected (or all) events, based on EventID, c... more Category: Misc. Server Tools

Lock Folder XP screenshot

icon Lock Folder XP

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 55

Lock Folder XP lets you hide selected files, folders and drives and protect them with your personal password. Just drag your file, folder or drive onto the interface, or select them from the dialog to activate protecti... more Category: File and Folder Protection

Matrix Screen Locker screenshot

icon Matrix Screen Locker

  • Our Rating: stars
  • User Rating: 5 (3)
  • Popularity: 11

Matrix Screen Locker is a small and simple system tray application, that allows you to lock your desktop with a single click, using a Matrix like screen effect. In order to unlock the desktop, you need to enter the corr... more Category: PC Access Control

SiteKiosk screenshot

icon SiteKiosk

  • Our Rating: stars
  • User Rating: 5 (1)
  • Popularity: 44

SiteKiosk lets you turn any computer into a secure, multilingual Internet access terminal that allows the user to access the Internet, but not the underlying operating system and files. It works wi... more Category: PC Access Control

WinLock screenshot

icon WinLock

  • Our Rating: stars
  • User Rating: 5 (1)
  • Popularity: 44

WinLock allows you to control access to your computer, documents and programs. You can control how long others can use your computer, disable Windows hot keys (such as Alt-Ctrl-Del, Alt-Tab, Ctrl-Esc, etc.), lock the de... more Category: PC Access Control

ComputerTime screenshot

icon ComputerTime

  • Our Rating: stars
  • User Rating: 3 (1)
  • Popularity: 55

ComputerTime enables parents to set limits on the amount of time and the time-of-day when their children can use the computer. Whenever the computer is used, the user must log on with a password, and the limitations tha... more Category: PC Access Control

Filter results:

Result pages: 1 2 3 4 5 6 7 8 9 10 »» Next


Need more search power? Search our site with Google! See results for centralized Endpoint Security Tool