Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Secure access package check point in Title/Summary

Check Point Capsule Docs

Check Point Capsule Docs

Check Point Capsule Docs is a secure mobile document management system that follows your documents wherever they go, making sure you have complete control over who is accessing sensitive data and what they can do with it. It secures all documents by default so they cannot be unintentionally shared.

  • Publisher: Check Point Software Technologies Ltd.
  • Home page: www.checkpoint.com
  • Last updated: March 29th, 2016
Check Point VPN-1 SecuRemote/SecureClient NGX R60 HFA1

Check Point VPN-1 SecuRemote/SecureClient NGX R60 HFA1

Check Point recommends that customers remain up-to-date with the latest HFAs, as they contain security enhancements and protection against new and evolving.rnThis HFA is a recommended update that resolves various issues and contains improvements for SecureClient and other Check Point products on a variety of platforms.

  • Publisher: Check Point Software Technologies
  • Last updated: March 2nd, 2008
Check Point VPN-1 SecuRemote/SecureClient NGX R60 HFA3

Check Point VPN-1 SecuRemote/SecureClient NGX R60 HFA3

The SecureClient allows you to connect to your organization in a secure manner, while at the same time protecting your machine from attacks that originate on the Internet. You can access private files over the Internet knowing that unauthorized persons cannot view the same file or alter it.

  • Publisher: Check Point
  • Last updated: December 18th, 2009

Secure access package check point in Description

HostAccess®

HostAccess®

Rogue Wave® HostAccess offers a suite of terminal emulation products that provide Windows™ users with secure access to legacy, host-based applications. It also has the ability to enhance the interface of existing applications with toolbars, mouse support, push buttons, combo boxes, check boxes, radio buttons, ActiveX™ controls, COM objects, and includes the powerful AutoGUI feature.

  • Publisher: Rogue Wave Software, Inc
  • Home page: www.roguewave.com
  • Last updated: October 28th, 2011
Check Point SmartConsole R71.30

Check Point SmartConsole R71.30

This version contains new features and resolves various issues for Check Point Software Blades. Check Point SmartConsole R71.30 features: - Check Point Mobile for iPhone and iPad - Access to Web applications - Access to email, calendar, and contacts - Two-factor authentication with client certificate and username/password

Check Point SmartConsole R75.10

Check Point SmartConsole R75.10

This release, E75.10 Remote Access Clients, adds new features and two additional VPN Clients: Check Point Mobile for Windows and SecuRemote.This Software Download Agreement (“Agreement”) is between you (either as an individual or company) and Check Point Software Technologies Ltd. ("Check Point"), for the software and documentation provided by this Agreement (“Software”).

IBM Host On Demand

IBM Host On Demand

WebSphere Host On-Demand provides secure access to your host applications and data from a Java™-enabled Web browser. Provides access to IBM i (5250), IBM System z (3270), and DEC/UNIX emulation in a single package. Enables centralized deployment and administration to meld the power of traditional terminal emulation with the control and cost savings found in "thin client" emulators

  • Publisher: IBM
  • Home page: www-01.ibm.com
  • Last updated: June 19th, 2012
Check Point Endpoint Security

Check Point Endpoint Security

Check Point endpoint security solutions provide data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. Check Point Anti-Malware and Application Control further help to efficiently detect malware with a single scan and make sure only approved software programs are running on end-user systems.

  • Publisher: Checkpoint Software Inc.
  • Home page: www.checkpoint.com
  • Last updated: June 14th, 2016

Additional Secure access package check point selection

Check Point SSL Network Extender

Check Point SSL Network Extender

SSL connections are a great remote access solution because they do not require IT departments to upgrade and manage client software. All a user needs is a Web browser. However, remote users still need to access network applications. SSL Network Extender is a browser plug-in that provides clientless remote access, while delivering full network connectivity for any IP-based application.

Check Point SmartConsole R70

Check Point SmartConsole R70

SmartDashboard is a single, comprehensive user interface for defining and managing multiple elements of a security policy: firewall security, VPNs, network address translation, web security, desktop security, anti-virus security, SmartDefense threat defense protections, QoS and VPN client security.

  • Publisher: Check Point Software Technologies Ltd.
  • Home page: www.checkpoint.com
  • Last updated: March 13th, 2009
Check Point SmartConsole R75

Check Point SmartConsole R75

In the face of increasingly sophisticated attacks, it takes multiple layers of security to be protected today - at the perimeter, inside the network, at all user endpoints. How can you manage the growing complexity? Check Point's Network Policy Management Software Blade gives you control over configuring and managing even the most complex security deployments

Check Point - Full Disk Encryption Dynamic Mount Utility

Check Point - Full Disk Encryption Dynamic Mount Utility

Full Disk Encryption’s Dynamic Mount Utility is used you need to access information on the hard disk of a Full Disk Encryption - protected machine and do not want to access this information by performing a recovery, for example, if you need to access a disk for forensic reasons or because a failure of the operating system makes it impossible to retrieve data on a disk.

  • Publisher: Check Point Software Technologies LTD
  • Last updated: May 11th, 2010
Hotspot Shield

Hotspot Shield

Protect your online privacy by surfing anonymously. Hotspot Shield hides your true IP address which means your privacy is secure. Surfing the web anonymously means that neither your government, your ISP, your network administrator, nor the online snoopers can trace your actual location.

Check Point SmartConsole NGX R60

Check Point SmartConsole NGX R60

Check Point SmartConsole NGX R60 5.0

  • Publisher: Check Point Software Technologies Ltd.
  • Home page: www.checkpoint.com
  • Last updated: April 18th, 2008
OpenVPN

OpenVPN

OpenVPN can create a virtual private network, which allows you to access contents that are forbidden from your country or that your local ISP is blocking. Likewise, it protects your privacy by making third-parties believe that you are using a different IP address, which makes it difficult to keep track of your activities.

  • Publisher: OpenVPN Inc
  • Home page: openvpn.net
  • Last updated: March 21st, 2024
Dashlane

Dashlane

Dashlane helps you manage your login IDs, passwords, payment information, and other sensitive personal data. It can also fill online forms and login pages with your stored passwords and personal info automatically. You can sync Dashlane across multiple devices including Mac, Linux, Android, and iOS.

  • Publisher: Dashlane Inc.
  • Home page: www.dashlane.com
  • Last updated: June 21st, 2023
Check Point R70

Check Point R70

Software Blades enable users to efficiently and quickly tailor Security Gateway and Management functionality to specific and changing needs. When running on multi-core platforms and appliances, Check Point CoreXL technology delivers near linear performance scalability for many of the Software Blades.

  • Publisher: CheckPoint
  • Last updated: May 23rd, 2012
Chrome Remote Desktop

Chrome Remote Desktop

Chrome Remote Desktop allows you to remotely access another computer through your Chrome browser or Chromebook. You also need to install this tool on the computer that needs to be connected. Computers can be made available on an short-term basis (for remote support), or on a more long-term basis for remote access to your applications and files.