Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Security risk assessment tool in Title/Summary

Microsoft Security Assessment Tool

Microsoft Security Assessment Tool

The Microsoft Security Assessment Tool (MSAT) is a risk-assessment application designed to provide information and recommendations about best practices for security within an information technology (IT) infrastructure. The tool employs a holistic approach to measuring your security posture by covering topics across people, process, and technology

  • Publisher: Microsoft Corporation
  • Home page: www.microsoft.com
  • Last updated: January 13th, 2012
Lightning Protection Risk Assessment Calculator

Lightning Protection Risk Assessment Calculator

The simplified IEC Risk Assessment Calculator is intended to function as a companion, and not alternative, to the written standard.

The Security Risk Management Guide

The Security Risk Management Guide

It helps you to plan, build, and maintain a successful security risk management program. In a four phase technology-agnostic process, the guide explains how to build an ongoing process to measure and drive security risks to an acceptable level. This guide references many industry accepted standards for managing security risks.

  • Publisher: Microsoft
  • Last updated: June 27th, 2008

Security risk assessment tool in Description

VS Risk

VS Risk

vsRisk™ has been proven to save huge amounts of time, effort and expense when tackling information security risk assessments. Fully aligned with ISO 27001:2013, this comprehensive risk assessment tool automates and delivers an information security risk assessment quickly and easily.

Task Inventory and Risk Assessments

Task Inventory and Risk Assessments

TIRA as a risk assessment tool has a primary objective to reduce the overall risk to employees and employers by making risk management simpler, less bureaucratic and more efficient. The program allows instant access to performance and tracking information.

  • Publisher: On Safe Lines QHSE Software
  • Home page: www.onsafelines.com
  • Last updated: May 15th, 2014
ChessRally

ChessRally

ChessRally is a very complete chess game for Windows. It supports both single-player and multi-player games. It has a very clean interface with a well designed board and shiny chess pieces. The single player mode also allows you to use the computer as a real-time, on-site chess teacher.

  • Publisher: Ingenuware, Ltd.
  • Home page: www.chessrally.com
  • Last updated: January 31st, 2010
BowTieXP

BowTieXP

BowTieXP is a powerful risk assessment tool that uses the Bowtie Method to assess risks. The highly visual and interactive nature of BowTie building ensures maximum involvement from operational staff. You can build a Safety Management System that is rooted in a Bowtie risk analysis.

  • Publisher: CGE Risk Management Solutions B.V.
  • Home page: www.cgerisk.com
  • Last updated: February 16th, 2015
AppRanger

AppRanger

Servers and desktops get infected because firewalls and old anti-virus are not effective against new attacks. AppRanger™ provides answers for server and desktop security: -Fast scan detects and removes any spyware and virus. -Protects computers without patches against zero-day attacks. -Tracks changes made to the system. -Protects applications against hacks

  • Publisher: AppRanger
  • Last updated: November 15th, 2009

Additional Security risk assessment tool selection

Microsoft Application Compatibility Toolkit

Microsoft Application Compatibility Toolkit

The Microsoft Application Compatibility Toolkit (ACT) helps customers understand their application compatibility situation by identifying which applications are compatible with the Windows 7® and Windows Vista® operating system and which require further testing.

  • Publisher: Microsoft Corporation
  • Home page: www.microsoft.com
  • Last updated: September 11th, 2010
Punto Switcher

Punto Switcher

Punto Switcher is a program that automatically switches the keyboard layout. She knows that "ghbdtn" is "Привет"and "пщщв ьщктштп" is "good morning".

  • Publisher: Yandex
  • Home page: punto.yandex.ru
  • Last updated: June 29th, 2020
Symantec Backup Exec License Assessment Tool

Symantec Backup Exec License Assessment Tool

The objective of this utility is to offer an easy way for partners and customers to determine how much Backup Exec product has been deployed, and to report back on the number and type of Backup Exec licenses available in a given environment. Please note: BELAT is currently not covered by Technical Support.

  • Publisher: Symantec Corporation
  • Home page: www.symantec.com
  • Last updated: November 10th, 2009
Kaspersky Small Office Security

Kaspersky Small Office Security

Kaspersky Small Office Security is designed for businesses running 5-25 computers, some servers and mobile devices. The program protects your Windows-based computers, file servers and Android smartphones and tablets to safeguard your online banking transactions, your business data and the information your customers entrust to you.

  • Publisher: Kaspersky Lab
  • Home page: www.kaspersky.com
  • Last updated: July 28th, 2015
Spy Sweeper

Spy Sweeper

Spy Sweeper can detect, remove and protect against spyware threats. It doesn’t cause any conflicts with your other installed security applications and it provides protection against various types of threats, including viruses, worms, Trojans, or rootkits.

  • Publisher: Webroot Software, Inc.
  • Home page: www.webroot.com
  • Last updated: May 26th, 2020
Application Compatibility Toolkit

Application Compatibility Toolkit

Application Compatibility Toolkit contains the necessary tools and documentation to evaluate and mitigate application compatibility issues before deploying Windows 7, Windows Vista, a Windows Update, or a new version of Windows Internet Explorer in your environment.

  • Publisher: Microsoft
  • Last updated: October 10th, 2011
WinLock

WinLock

WinLock is a comprehensive security software for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer.

Metasploit

Metasploit

Metasploit simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners such as Nexpose - for free. This helps prioritize remediation and eliminate false positives, providing true security risk intelligence.

  • Publisher: Rapid7 LLC
  • Home page: www.rapid7.com
  • Last updated: May 22nd, 2020
IP Video System Design Tool

IP Video System Design Tool

IP Video System Design Tool can be used to design video surveillance systems. It can help you increase the efficiency of your security system while lowering costs by finding the best camera locations. It can precisely calculate the camera lens focal length , viewing angles, and pixel density (PPM/PPF).

  • Publisher: IPICA Software LLC
  • Home page: www.jvsg.com
  • Last updated: October 23rd, 2020
Sticky Password

Sticky Password

Sticky Password is a password manager that can save all your login IDs, passwords, addresses, credit card numbers, and auto-fill them on web forms. Its password generator lets you create strong passwords. You can also use it to store your passport data, licenses, and other sensitive information.