Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Splashtop streamer security risk in Title/Summary

Splashtop Streamer

Splashtop Streamer

Splashtop Streamer is a program that allows you to remotely control your PC through the network. You must install the program on the computer that you want to access. You can see and control your computer from another computer, tablet, or smartphone; you can access all the applications, files, videos, music, and more.

  • Publisher: Splashtop Inc.
  • Home page: www.splashtop.com
  • Last updated: February 5th, 2019
The Security Risk Management Guide

The Security Risk Management Guide

It helps you to plan, build, and maintain a successful security risk management program. In a four phase technology-agnostic process, the guide explains how to build an ongoing process to measure and drive security risks to an acceptable level. This guide references many industry accepted standards for managing security risks.

  • Publisher: Microsoft
  • Last updated: June 27th, 2008
Splashtop Remote

Splashtop Remote

A computer with the Splashtop Streamer can receive connections from any device running Splashtop Remote Desktop , FileHound , Splashtop Remote Browser , Splashtop Whiteboard , Splashtop CamCam , Splashtop XDisplay , Splashtop Touchpad or Splashtop Presenter applications.

  • Publisher: Splashtop Inc.
  • Home page: www.splashtop.com
  • Last updated: March 30th, 2012

Splashtop streamer security risk in Description

Splashtop Business

Splashtop Business

Enable your entire team to use remote access. Invite users and set their roles and access permissions. Allow access to specific computers. Remote access is further protected by device authentication, two-step verification, and multiple 2nd-level password options.

  • Publisher: Splashtop Inc.
  • Home page: www.splashtop.com
  • Last updated: July 16th, 2018
VS Risk

VS Risk

vsRisk™ has been proven to save huge amounts of time, effort and expense when tackling information security risk assessments. Fully aligned with ISO 27001:2013, this comprehensive risk assessment tool automates and delivers an information security risk assessment quickly and easily.

Advanced Task Manager

Advanced Task Manager

Advanced Task Manager shows you exactly what is running on your computer, including hidden processes. It gives you lots of information and calculates a security risk rating for each process. Advanced Task Manager also tells you whether a program connects to the Internet, watches what you type, is an Internet server, is hidden, is encrypted on disk, has invisible windows, etc.

  • Publisher: Innovative Solutions
  • Last updated: June 18th, 2009
AnVir Task Manager Free

AnVir Task Manager Free

Startup tab shows all programs that run on Windows start. It includes name, file path, company and description. Disable or delete programs that you don't need, and your PC will run much faster. "Delayed Startup" lets you set up any startup program to run few minutes later after Windows startup.

  • Publisher: AnVir Software
  • Home page: www.anvir.com
  • Last updated: January 19th, 2018
AnVir Task Manager Pro

AnVir Task Manager Pro

Startup tab shows all programs that run on Windows start. It includes name, file path, company and description. Disable or delete programs that you don't need, and your PC will run much faster. Delayed Startup lets you set up any startup program to run few minutes later after Windows startup. This allows you to begin using the computer without waiting for Windows to load all startup applications.

  • Publisher: AnVir Software
  • Home page: www.anvir.com
  • Last updated: January 24th, 2018

Additional Splashtop streamer security risk selection

WinLock

WinLock

WinLock can protect sensitive data stored on a computer, which comes quite handy mainly if the machine is publicly accessible. The application is protected by a password, and only properly authenticated users can modify its settings while it is running from the System Tray. I would not say that the program is difficult to use.

Metasploit

Metasploit

Metasploit simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners such as Nexpose - for free. This helps prioritize remediation and eliminate false positives, providing true security risk intelligence.

  • Publisher: Rapid7 LLC
  • Last updated: September 16th, 2017
vpnium

vpnium

Vpnium allows you to connect to the Internet using proxy servers located in different countries. This way you can protect your privacy and hide your real IP address and location. The program provides you also with some basic functionality, such as anonymous web surfing and mailing. In addition, it allows you to select the location of your fake IP address.

  • Publisher: VPNium
  • Last updated: December 14th, 2012
McAfee Network Access Control Client

McAfee Network Access Control Client

Make network access control an integral part of your approach to security risk management. The powerful McAfee Network Access Control protects against today’s biggest internal threat—noncompliant systems that access and infect your corporate network.

  • Publisher: McAfee
  • Last updated: August 27th, 2012
Network Security Task Manager

Network Security Task Manager

Network Security Task Manager detects malware that traditional signature-based security solutions do not recognise. In this way, Network Security Task Manager helps to detect industrial espionage, sabotage and security-critical software. For each Windows process, Network Security Task Manager displays a unique security risk rating.

  • Publisher: Neuber GmbH
  • Home page: www.neuber.com
  • Last updated: May 24th, 2012
eEye Digital Security Retina

eEye Digital Security Retina

Retina CS is the only unified vulnerability and compliance management solution that integrates security risk discovery, prioritization, remediation, and reporting across your entire dynamic infrastructure. With Retina CS, you close the gaps across the vulnerability management lifecycle to reduce risk for your organization.

  • Publisher: eEye Digital Security
  • Last updated: December 25th, 2012
McAfee ePolicy Orchestrator

McAfee ePolicy Orchestrator

McAfee ePolicy Orchestrator (ePO) is an essential component of the McAfee Security Management Platform for business enterprises. It provides unified management of endpoint, network, and data security. By means of some powerful automations, it slashes incidence response times, dramatically strengthens protection and cuts down cost and complexity of managing risk and security.

  • Publisher: McAfee, Inc.
  • Home page: www.mcafee.com
  • Last updated: July 29th, 2014
AuditPro

AuditPro

AuditPro is a professional PC auditing tool for Windows users. The program provides real-time, ready-to-use outputs, reports and analyzes the critical data of your company's computers, licenses, jobs, printers, toner cartridges and all other office investments to ensure that you get the most out of your budget.

  • Publisher: TruconneXion co.
  • Last updated: October 28th, 2015
USB Secure

USB Secure

USB Secure can password protect any portable media including USB drives, External drives and even memory cards. It supports plug and play and automatic execution. No admin rights or install required on the other computer.

Network Security Taskmanager

Network Security Taskmanager

For each Windows process, Network Security Task Manager displays: -comments from our experts and the user community -full directory path and file name -process description -manufacturer -computers on which the process runs -product to which the process belongs -start time and start method -embedded hidden functions (e.g. keyboard monitoring, browser surveillance or manipulation)

  • Publisher: Neuber GmbH
  • Home page: www.neuber.com
  • Last updated: March 29th, 2012