Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Splashtop security risk in Title/Summary

The Security Risk Management Guide

The Security Risk Management Guide

It helps you to plan, build, and maintain a successful security risk management program. In a four phase technology-agnostic process, the guide explains how to build an ongoing process to measure and drive security risks to an acceptable level. This guide references many industry accepted standards for managing security risks.

  • Publisher: Microsoft
  • Last updated: June 27th, 2008
eEye Digital Security Retina

eEye Digital Security Retina

Retina CS is the only unified vulnerability and compliance management solution that integrates security risk discovery, prioritization, remediation, and reporting across your entire dynamic infrastructure. With Retina CS, you close the gaps across the vulnerability management lifecycle to reduce risk for your organization.

  • Publisher: eEye Digital Security
  • Home page: www.eeye.com
  • Last updated: December 25th, 2012
Splashtop

Splashtop

Use Splashtop on the local network to access your home computer from the comfort of your couch or bedroom. See and control your computer from another device, and feel as if you were still sitting in front of it. Access all the apps, files, videos, and music on your computer. View and edit Microsoft Office and PDF files. Browse the web using Chrome, IE, and Firefox with full Flash and Java support.

  • Publisher: Splashtop Inc.
  • Home page: www.splashtop.com
  • Last updated: September 8th, 2016

Splashtop security risk in Description

VS Risk

VS Risk

vsRisk™ has been proven to save huge amounts of time, effort and expense when tackling information security risk assessments. Fully aligned with ISO 27001:2013, this comprehensive risk assessment tool automates and delivers an information security risk assessment quickly and easily.

Advanced Task Manager

Advanced Task Manager

Advanced Task Manager shows you exactly what is running on your computer, including hidden processes. It gives you lots of information and calculates a security risk rating for each process. Advanced Task Manager also tells you whether a program connects to the Internet, watches what you type, is an Internet server, is hidden, is encrypted on disk, has invisible windows, etc.

  • Publisher: Innovative Solutions
  • Last updated: June 18th, 2009
AnVir Task Manager Free

AnVir Task Manager Free

AnVir Task Manager Free lets you monitor processes, services, startup programs, CPU, hard disk activity, etc. It is a perfect replacement for Windows Task Manager. This program can also help you get rid of spyware and viruses that your antivirus might have missed.

  • Publisher: AnVir Software
  • Home page: www.anvir.com
  • Last updated: September 9th, 2021
AnVir Task Manager Pro

AnVir Task Manager Pro

AnVir Task Manager gives you full control over the running processes, services, and startup programs in your Windows PC. It provides comprehensive information about processes including command line, DLLs that the program uses, inbound and outbound traffic, disk load, tray icon, performance graph, Internet connections, Windows, threads, and open files.

  • Publisher: AnVir Software
  • Home page: www.anvir.com
  • Last updated: September 9th, 2021
Network Security Taskmanager

Network Security Taskmanager

For each Windows process, Network Security Task Manager displays: -comments from our experts and the user community -full directory path and file name -process description -manufacturer -computers on which the process runs -product to which the process belongs -start time and start method -embedded hidden functions (e.g. keyboard monitoring, browser surveillance or manipulation)

  • Publisher: Neuber GmbH
  • Home page: www.neuber.com
  • Last updated: March 29th, 2012

Additional Splashtop security risk selection

WinLock

WinLock

WinLock is a comprehensive security software for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer.

Metasploit

Metasploit

Metasploit simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners such as Nexpose - for free. This helps prioritize remediation and eliminate false positives, providing true security risk intelligence.

  • Publisher: Rapid7 LLC
  • Last updated: May 22nd, 2020
vpnium

vpnium

Vpnium allows you to connect to the Internet using proxy servers located in different countries. This way you can protect your privacy and hide your real IP address and location. The program provides you also with some basic functionality, such as anonymous web surfing and mailing. In addition, it allows you to select the location of your fake IP address.

  • Publisher: VPNium
  • Last updated: December 14th, 2012
McAfee Network Access Control Client

McAfee Network Access Control Client

Make network access control an integral part of your approach to security risk management. The powerful McAfee Network Access Control protects against today’s biggest internal threat—noncompliant systems that access and infect your corporate network.

  • Publisher: McAfee
  • Home page: www.mcafee.com
  • Last updated: August 27th, 2012
Network Security Task Manager

Network Security Task Manager

Network Security Task Manager detects malware that traditional signature-based security solutions do not recognise. In this way, Network Security Task Manager helps to detect industrial espionage, sabotage and security-critical software. For each Windows process, Network Security Task Manager displays a unique security risk rating.

  • Publisher: Neuber GmbH
  • Home page: www.neuber.com
  • Last updated: May 24th, 2012
McAfee ePolicy Orchestrator

McAfee ePolicy Orchestrator

McAfee ePolicy Orchestrator (ePO) is an essential component of the McAfee Security Management Platform for business enterprises. It provides unified management of endpoint, network, and data security. By means of some powerful automations, it slashes incidence response times, dramatically strengthens protection and cuts down cost and complexity of managing risk and security.

  • Publisher: McAfee, Inc.
  • Home page: www.mcafee.com
  • Last updated: July 29th, 2014
AuditPro

AuditPro

AuditPro is a professional PC auditing tool for Windows users. The program provides real-time, ready-to-use outputs, reports and analyzes the critical data of your company's computers, licenses, jobs, printers, toner cartridges and all other office investments to ensure that you get the most out of your budget.

  • Publisher: TruconneXion co.
  • Last updated: October 28th, 2015
USB Secure

USB Secure

USB Secure can password protect any portable media including USB drives, External drives and even memory cards. It supports plug and play and automatic execution. No admin rights or install required on the other computer.

AppLauncher

AppLauncher

AppLauncherTM is a cost effective add-ons to Terminal Services found in Windows 2000 Server and .NET Server. AppLauncherTM is a program that allows you to deploy more than one application through Terminal Services without the confusion, overhead, or security risk of giving the entire desktop. It is a great alternative for people looking to use Citrix and a great add-on to Terminal Services.

  • Publisher: APPLauncher
  • Last updated: January 12th, 2010
ZipSplitter

ZipSplitter

ZipSplitter is a handy application designed to compress and split large files. When you split a file, the program converts the last part into an executable file automatically, whose function is to reconstruct the original file without need to have this or any other similar tool installed on your system. In addition, the program can copy the generated parts to floppy disks for you.

  • Publisher: Lithops Software
  • Last updated: March 16th, 2008