icon

Search Results for "centralized Endpoint Security Tool"

Please type in the keywords that best describe the software you are searching for.

Only search for freeware (Fewer results)

These categories may be related to what you're looking for:

Filter results:

Password Policy Enforcer screenshot

icon Password Policy Enforcer

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 44

Password Policy Enforcer allows network administrators to go beyond the standard Windows options and create and enforce a password policy, that ensures that users are choosing strong (difficult to crack) passwords. PPE ... more Category: Misc. Server Tools

NetVizor screenshot

icon NetVizor

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 66

NetVizor is a powerful network surveillance tool, that allows you to monitor your entire network from one centralized location. It enables you to track workstations and individual users that may use multiple PCs on a n... more Category: Computer Surveillance

EventSentry Light screenshot

icon EventSentry Light

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 11

EventSentry Light enables system administrators to have eventlog messages sent by email. The free version allows you to specify one filter criteria, to limit notification to selected (or all) events, based on EventID, c... more Category: Misc. Server Tools

Matrix Screen Locker screenshot

icon Matrix Screen Locker

  • Our Rating: stars
  • User Rating: 5 (3)
  • Popularity: 11

Matrix Screen Locker is a small and simple system tray application, that allows you to lock your desktop with a single click, using a Matrix like screen effect. In order to unlock the desktop, you need to enter the corr... more Category: PC Access Control

SiteKiosk screenshot

icon SiteKiosk

  • Our Rating: stars
  • User Rating: 5 (1)
  • Popularity: 66

SiteKiosk lets you turn any computer into a secure, multilingual Internet access terminal that allows the user to access the Internet, but not the underlying operating system and files. It works wi... more Category: PC Access Control

WinLock screenshot

icon WinLock

  • Our Rating: stars
  • User Rating: 5 (1)
  • Popularity: 55

WinLock allows you to control access to your computer, documents and programs. You can control how long others can use your computer, disable Windows hot keys (such as Alt-Ctrl-Del, Alt-Tab, Ctrl-Esc, etc.), lock the de... more Category: PC Access Control

ComputerTime screenshot

icon ComputerTime

  • Our Rating: stars
  • User Rating: 3 (1)
  • Popularity: 55

ComputerTime enables parents to set limits on the amount of time and the time-of-day when their children can use the computer. Whenever the computer is used, the user must log on with a password, and the limitations tha... more Category: PC Access Control

Deskman screenshot

icon Deskman

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 88

Deskman helps you restrict access to Windows, block applications, filter websites and protect workstations from tampering. You can hide drives, disable keyboard commands, restrict File Explorer ac... more Category: PC Access Control

Hide Folders screenshot

icon Hide Folders

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 55

Hide Folders enables you to restrict access to files and folders on your computer by hiding and password protecting the content of selected folders. You can choose to simply hide the folders from view, leave them visibl... more Category: File and Folder Protection

Process Blocker screenshot

icon Process Blocker

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 33

Process Blocker is a simple tool, designed to help system administrators block the execution of certain programs on a workstation. It can be used to automatically terminate instant messengers, game... more Category: PC Access Control

Filter results:

Result pages: 1 2 3 4 5 6 7 8 9 10 »» Next


Need more search power? Search our site with Google! See results for centralized Endpoint Security Tool