Cyber security in Title/Summary

K7 Total Security
K7 TOTAL SECURITY is a program that provides complete security against cyber criminals and other evolving cyber threats. The program automatically scans any USB media as soon as they are plugged in, it tracks websites accessed by kids and allows blocking of inappropriate sites and detects and blocks browser exploits.
- Publisher: K7 Computing Pvt Ltd
- Last updated: December 27th, 2024

G DATA INTERNET SECURITY
G Data Internet Security is a powerful suite that encapsulates various utilities that make your computer a more safe environment, by keeping the threats, such as viruses, malware, and other online threats. The utilities include an antivirus, a firewall, parental controls and a spam filter.
- Publisher: G DATA Software AG
- Home page: www.gdatasoftware.com
- Last updated: June 4th, 2018

Cyber Time Manager
Cyber Time Manger is a software which is used in the cyber cafes. It is responsible for keeping a track on how many customer are online and how many are offline. Assign your terminal's name in the box in the program to identify which terminal is free and which are busy.
- Publisher: Cupid Info Systems
- Last updated: July 26th, 2008
Cyber security in Description

RDS-Knight
RDS-Knight offers up to seven protections for your servers. In minutes, set the right Windows permissions, block brute force bots and ransomware, restrict access by device, time and location, and make sure your users environment stays under control.
- Publisher: RDS-Tools
- Home page: www.rds-tools.com
- Last updated: November 18th, 2024

CyberCIEGE
CyberCIEGE includes configurable firewalls, VPNs, link encryptors and access control mechanisms. It includes identity management components such as biometric scanners and authentication servers. Attack types include corrupt insiders, trap doors, Trojan horses, viruses, denial of service, and exploitation of weakly configured systems.
- Publisher: United States Government
- Last updated: June 8th, 2009

SysTrace
Systrace enforces system call policies for applications by constraining the application's access to the system. The policy is generated interactively. Operations not covered by the policy raise an alarm, allowing an user to refine the currently configured policy.
- Publisher: Niels Provos
- Home page: www.citi.umich.edu
- Last updated: October 31st, 2011

GhostSurf Platinum
GhostSurf Platinum ensures your safety online by providing an anonymous, encrypted Internet connection, and GhostSurf stops spyware, eliminates ads and erases your tracks
- Publisher: Tenebril Inc.
- Home page: www.tenebril.com
- Last updated: March 14th, 2009

Panda Adaptive Defense 360
Panda Adaptive Defense 360 is a cyber-security service for companies. It protects all your endpoints from a centralized platform, including laptops, smartphones, and Windows/Mac/Linux servers. Adaptive Defense 360 comes with the ability to classify all running processes, along with a traditional antivirus.
- Publisher: Panda Security
- Last updated: June 30th, 2016
Additional Cyber security selection

eScan Corporate for Microsoft SBS Standard
Eliminating threats is a challenge; hence businesses consider protection against such threats as a top management issue. eScan’s new anti-virus for corporates strengthens the cybersecurity capabilities of the businesses by providing multi-layered protection to complex threats and secures critical business information effectively without constraining business growth.
- Publisher: MicroWorld Technologies Inc.
- Last updated: March 30th, 2018

Kaspersky Endpoint Security for Windows
Kaspersky Endpoint Security for Windows is a software solution developed to help users to keep their personal devices safe from nowadays threats. It is best suited for owners of small to medium businesses because it allows them to secure the internal IT infrastructure easily.
- Publisher: Kaspersky Lab
- Home page: www.kaspersky.com
- Last updated: January 30th, 2024

VS Risk
vsRisk™ has been proven to save huge amounts of time, effort and expense when tackling information security risk assessments. Fully aligned with ISO 27001:2013, this comprehensive risk assessment tool automates and delivers an information security risk assessment quickly and easily.
- Publisher: Vigilant Software
- Home page: www.vigilantsoftware.co.uk
- Last updated: April 29th, 2011

P2P Marshal
P2P Marshal automatically detects a roster of the most commonly-used P2P client programs, and automatically captures and organizes vital forensic information on each client it detects. P2P Marshal automatically reveals shared files, downloaded files, peer servers, and configuration and log information by each user on the computer being investigated.
- Publisher: Cyber Security Technologie
- Last updated: February 2nd, 2010

CyberLink YouCam
CyberLink YouCam is a professional quality webcam streaming software. It can change the video stream in real-time to add backgrounds, change makeup, and apply various effects, filters, stickers, and emojis. YouCam can auto-zoom and track your face during video chat.
- Publisher: CyberLink
- Home page: www.cyberlink.com
- Last updated: April 6th, 2023

McAfee Security Scan Plus
McAfee Security Scan Plus actively checks your computer for anti-virus software, firewall protection, and web security, and threats in your open applications. When the scan is complete, you’ll see a report detailing the presence and status of your security protection. If problems are detected, McAfee will provide a recommendation on the best security solution.
- Publisher: McAfee, Inc.
- Home page: www.mcafee.com
- Last updated: February 29th, 2024

USB Disk Security
USB Disk Security is a nice piece of software to block threats that can damage your PC or compromise your personal information via USB storage. USB Disk Security uses advanced proactive detection techniques, and closes the window of vulnerability left open by other reactive, signature-based responses.
- Publisher: Zbshareware Lab.
- Home page: www.zbshareware.com
- Last updated: May 21st, 2021

Microsoft Security Essentials
Microsoft Security Essentials protects you against viruses, spyware, and other malicious threats. It provides real-time protection for your home or small business PCs. Main Features: - Protects you quietly in the background - Automatic updates - Comprehensive malware protection - Available in 33 languages
- Publisher: Microsoft
- Last updated: May 22nd, 2023

G DATA TOTAL SECURITY
G Data Total Security is a comprehensive security suite, comprised of several tools, which have to role to protect the system against all sorts of vulnerabilities, like phishing, viruses, spam, and malware. The app comes wrapped in a standard and nicely stylish interface, with red and grey nuances, lots of tabs, a well-organized menu, and large icons.
- Publisher: G Data Software, Inc.
- Home page: www.gdatasoftware.com
- Last updated: March 22nd, 2023

Norton Security
Norton Security provides real-time protection against existing and emerging viruses and malware. The program defends your computer against viruses, spyware, malware and other online threats, safeguards your identity and online transactions, and utilizes one of the largest global civilian intelligence networks to spot threats faster.
- Publisher: Symantec Corporation
- Home page: us.norton.com
- Last updated: March 5th, 2023

