Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Norman endpoint protection in Title/Summary

Norman Endpoint Protection

Norman Endpoint Protection

It is an application that protects laptops, desktops and servers against the latest malware, viruses and spyware. Main Features: - Supports multilevel architecture: Cost effective and new level of administrative ease-of-use. - Intuitive user interface: Drag-and-drop actions for logical group handling and security policy management.

  • Publisher: Norman AS
  • Last updated: June 5th, 2013
Symantec Endpoint Protection

Symantec Endpoint Protection

Symantec Endpoint Protection combines AntiVirus with advanced threat prevention to be able to deliver an excellent defense against malware intended for notebooks, desktops and servers. Block zero-day attacks that prey on memory-based vulnerabilities in many popular applications with memory exploit mitigation.

  • Publisher: Symantec Corporation
  • Home page: www.symantec.com
  • Last updated: February 1st, 2023
avast! Endpoint Protection Suite

avast! Endpoint Protection Suite

Full protection for your business in one comprehensive package. It combines the power of avast! endpoint solutions with high-performing file server protection and remote management, for easy installation and deployment. Your virus database will be continuously updated with the latest definitions in real-time via a connection to the AVAST Virus Lab.

  • Publisher: AVAST Software
  • Home page: www.avast.com
  • Last updated: January 25th, 2014

Norman endpoint protection in Description

FortiClient

FortiClient

FortiClient is an all-in-one comprehensive endpoint security solution. It strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, this tool can ensure endpoint compliance, mitigate risks, and reduce exposure.

  • Publisher: Fortinet, Inc.
  • Home page: www.fortinet.com
  • Last updated: August 1st, 2023
Symantec Network Access Control

Symantec Network Access Control

Symantec Network Access Control is a network security solution that controls access to corporate networks, enforces endpoint security policy and easily integrates with existing network infrastructures. Regardless of how endpoints connect to the network, Symantec's award-winning network security solution discovers and evaluates endpoint compliance status.

  • Publisher: Symantec Corporation
  • Last updated: October 13th, 2011
Check Point Endpoint Security

Check Point Endpoint Security

Check Point endpoint security solutions provide data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. Check Point Anti-Malware and Application Control further help to efficiently detect malware with a single scan and make sure only approved software programs are running on end-user systems.

  • Publisher: Checkpoint Software Inc.
  • Home page: www.checkpoint.com
  • Last updated: June 14th, 2016
K7 Business Lite

K7 Business Lite

K7 Business Lite is aimed at increasing small organizations with limited resources. Such organizations face challenges from malicious online threats, especially with the use of social network to promote their products and to expand their business. Business Lite offers endpoint protection including secure email and social media, with additional tools to assist small businesses.

ESET Endpoint Antivirus

ESET Endpoint Antivirus

If you use an antivirus to protect your PC against trojans, worms, viruses, dialers and other types of malware, you probably heard of ESET NOD32 Antivirus, a program developed by ESET North America in order to ensure PC protection against the above-mentioned threats.

  • Publisher: ESET North America
  • Home page: www.eset.com
  • Last updated: March 30th, 2023

Additional Norman endpoint protection selection

Trusteer Endpoint Protection

Trusteer Endpoint Protection

Trusteer Rapport is advanced security software that protects your online banking communication from being stolen by criminals. When you browse to a website, the Trusteer Rapport icon appears in or near the browser’s address bar. The icon is green when Rapport is protecting your communication with the website, and the icon is grey when the communication is not protected.

  • Publisher: Trusteer
  • Home page: www.trusteer.com
  • Last updated: October 18th, 2023
System Center 2012 Endpoint Protection

System Center 2012 Endpoint Protection

Built on System Center 2012 Configuration Manager, System Center 2012 Endpoint Protection provides a single, integrated platform that reduces your IT management and operating costs, in many cases using your existing client management infrastructure to deploy and manage your endpoint protection.

  • Publisher: Microsoft Corporation
  • Home page: docs.microsoft.com
  • Last updated: April 12th, 2013
Symantec Endpoint Protection Small Business Edition

Symantec Endpoint Protection Small Business Edition

Symantec Endpoint Protection Small Business Edition is a software that protects your computers and servers with the most effective small business antivirus, anti-malware technologies available in a single, integrated solution. It will not slow you down or swallow up system resources.

  • Publisher: Symantec Corporation
  • Home page: www.symantec.com
  • Last updated: June 2nd, 2011
Norman Security Suite

Norman Security Suite

Norman Security Suite is an easy to use internet security program, with effective antivirus and online activity protection. Automatic virus, spyware, spam, and phishing protection recognizes, blocks and removes viruses, worms, trojans, malware damage and other malicious code.

  • Publisher: Norman ASA
  • Home page: www.norman.com
  • Last updated: December 26th, 2014
Retrospect

Retrospect

Retrospect provides complete protection with backup, archive, and duplicate features built in. Deploy agents on every server, desktop, laptop to ensure complete protection across your entire infrastructure. Retrospect provides complete protection with backup, archive, and duplicate features built in.

  • Publisher: Retrospect, Inc
  • Home page: www.retrospect.com
  • Last updated: February 2nd, 2023
Blink

Blink

While signature-based anti-virus continues to be the primary security solution for servers, there is a major shift in threats that bypass legacy security solutions. Server administrators are constantly struggling to prevent attacks against server based application vulnerabilities, mis-configurations, missing operating system patches, and zero-day threats.

  • Publisher: eEye Digital Security
  • Home page: www.eEye.com
  • Last updated: December 13th, 2017
CUTe ARP Protector

CUTe ARP Protector

You can install this software to detect and protect against ARP Trojan, ARP spoofing, ARP DOS attack (netcut). -It is endpoint protection software based on Windows driver program. It can completely isolate the ARP spoofing issue in LAN. -It can detect and defend against ARP attack in real time. -It can find ARP Trojan / ARP spoofing program in your PC, and drop ARP spoofing packets.

  • Publisher: China University of Technology
  • Last updated: April 27th, 2011
Sophos Computer Security Scan

Sophos Computer Security Scan

With more than 100 million global users our Sophos Virus Removal Tool includes the same great security features available in our Sophos Endpoint Protection solution: You'll be able to see threats in all their forms. It could be removable media, games or other peer-to-peer software that are your biggest risks.

  • Publisher: Sophos Plc
  • Last updated: July 20th, 2012
FortiClient Lite

FortiClient Lite

FortiClient Lite is a free endpoint protection suite that includes malware/virus detection, parental web control, and VPN. Malware is detected using updated threat intelligence and definitions from Fortinet's FortiGuard Labs. Parental control offers a simple and effective way to block malicious and explicit web sites.

AVG Anti-Virus PRO

AVG Anti-Virus PRO

AVG Anti-Virus is a powerful and reliable anti-virus tool.Features: - Exceptional endpoint protection for your employees’ laptops and PCs - File server protection to prevent malware from spreading across your network - Automated security updates plus security monitoring and reporting and lots more