Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Splashtop streamer security risk in Title/Summary

Splashtop Streamer

Splashtop Streamer

Splashtop Streamer is a client application that must be installed on computers that you want to remotely access, view, and control from other devices using the Splashtop app. Streamer can only be installed on Windows and MAC. However, Splashtop app can be run from your tablets, smartphones, and PCs.

  • Publisher: Splashtop Inc.
  • Home page: www.splashtop.com
  • Last updated: March 19th, 2024
The Security Risk Management Guide

The Security Risk Management Guide

It helps you to plan, build, and maintain a successful security risk management program. In a four phase technology-agnostic process, the guide explains how to build an ongoing process to measure and drive security risks to an acceptable level. This guide references many industry accepted standards for managing security risks.

  • Publisher: Microsoft
  • Last updated: June 27th, 2008
Splashtop Remote

Splashtop Remote

A computer with the Splashtop Streamer can receive connections from any device running Splashtop Remote Desktop , FileHound , Splashtop Remote Browser , Splashtop Whiteboard , Splashtop CamCam , Splashtop XDisplay , Splashtop Touchpad or Splashtop Presenter applications.

  • Publisher: Splashtop Inc.
  • Home page: www.splashtop.com
  • Last updated: March 30th, 2012

Splashtop streamer security risk in Description

Splashtop Business

Splashtop Business

Splashtop Business allows sharing desktops and other data over the Internet. This means that it lets you access and work on a remote computer as though you were sitting in front of it. For the program to work properly, it has to be accompanied with Splashtop Streamer, which needs to be installed on the target machines.

  • Publisher: Splashtop Inc.
  • Home page: www.splashtop.com
  • Last updated: February 21st, 2021
VS Risk

VS Risk

vsRisk™ has been proven to save huge amounts of time, effort and expense when tackling information security risk assessments. Fully aligned with ISO 27001:2013, this comprehensive risk assessment tool automates and delivers an information security risk assessment quickly and easily.

Advanced Task Manager

Advanced Task Manager

Advanced Task Manager shows you exactly what is running on your computer, including hidden processes. It gives you lots of information and calculates a security risk rating for each process. Advanced Task Manager also tells you whether a program connects to the Internet, watches what you type, is an Internet server, is hidden, is encrypted on disk, has invisible windows, etc.

  • Publisher: Innovative Solutions
  • Last updated: June 18th, 2009
AnVir Task Manager Free

AnVir Task Manager Free

AnVir Task Manager Free lets you monitor processes, services, startup programs, CPU, hard disk activity, etc. It is a perfect replacement for Windows Task Manager. This program can also help you get rid of spyware and viruses that your antivirus might have missed.

  • Publisher: AnVir Software
  • Home page: www.anvir.com
  • Last updated: September 9th, 2021
AnVir Task Manager Pro

AnVir Task Manager Pro

AnVir Task Manager gives you full control over the running processes, services, and startup programs in your Windows PC. It provides comprehensive information about processes including command line, DLLs that the program uses, inbound and outbound traffic, disk load, tray icon, performance graph, Internet connections, Windows, threads, and open files.

  • Publisher: AnVir Software
  • Home page: www.anvir.com
  • Last updated: September 9th, 2021

Additional Splashtop streamer security risk selection

WinLock

WinLock

WinLock is a comprehensive security software for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer.

Metasploit

Metasploit

Metasploit simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners such as Nexpose - for free. This helps prioritize remediation and eliminate false positives, providing true security risk intelligence.

  • Publisher: Rapid7 LLC
  • Last updated: May 22nd, 2020
vpnium

vpnium

Vpnium allows you to connect to the Internet using proxy servers located in different countries. This way you can protect your privacy and hide your real IP address and location. The program provides you also with some basic functionality, such as anonymous web surfing and mailing. In addition, it allows you to select the location of your fake IP address.

  • Publisher: VPNium
  • Last updated: December 14th, 2012
McAfee Network Access Control Client

McAfee Network Access Control Client

Make network access control an integral part of your approach to security risk management. The powerful McAfee Network Access Control protects against today’s biggest internal threat—noncompliant systems that access and infect your corporate network.

  • Publisher: McAfee
  • Home page: www.mcafee.com
  • Last updated: August 27th, 2012
Network Security Task Manager

Network Security Task Manager

Network Security Task Manager detects malware that traditional signature-based security solutions do not recognise. In this way, Network Security Task Manager helps to detect industrial espionage, sabotage and security-critical software. For each Windows process, Network Security Task Manager displays a unique security risk rating.

  • Publisher: Neuber GmbH
  • Home page: www.neuber.com
  • Last updated: May 24th, 2012
eEye Digital Security Retina

eEye Digital Security Retina

Retina CS is the only unified vulnerability and compliance management solution that integrates security risk discovery, prioritization, remediation, and reporting across your entire dynamic infrastructure. With Retina CS, you close the gaps across the vulnerability management lifecycle to reduce risk for your organization.

  • Publisher: eEye Digital Security
  • Home page: www.eeye.com
  • Last updated: December 25th, 2012
McAfee ePolicy Orchestrator

McAfee ePolicy Orchestrator

McAfee ePolicy Orchestrator (ePO) is an essential component of the McAfee Security Management Platform for business enterprises. It provides unified management of endpoint, network, and data security. By means of some powerful automations, it slashes incidence response times, dramatically strengthens protection and cuts down cost and complexity of managing risk and security.

  • Publisher: McAfee, Inc.
  • Home page: www.mcafee.com
  • Last updated: July 29th, 2014
AuditPro

AuditPro

AuditPro is a professional PC auditing tool for Windows users. The program provides real-time, ready-to-use outputs, reports and analyzes the critical data of your company's computers, licenses, jobs, printers, toner cartridges and all other office investments to ensure that you get the most out of your budget.

  • Publisher: TruconneXion co.
  • Last updated: October 28th, 2015
USB Secure

USB Secure

USB Secure can password protect any portable media including USB drives, External drives and even memory cards. It supports plug and play and automatic execution. No admin rights or install required on the other computer.

Network Security Taskmanager

Network Security Taskmanager

For each Windows process, Network Security Task Manager displays: -comments from our experts and the user community -full directory path and file name -process description -manufacturer -computers on which the process runs -product to which the process belongs -start time and start method -embedded hidden functions (e.g. keyboard monitoring, browser surveillance or manipulation)

  • Publisher: Neuber GmbH
  • Home page: www.neuber.com
  • Last updated: March 29th, 2012