ServerFiles.com is a server software & hardware directory for Network administrators & IT professionals, listing networking & server software for Windows 2003, Windows 2000, NT and Linux; and now also listing networking hardware solutions focused on server based computing.
Automate Internet access management and create a safe, secure and productive working environment with Burstek’s bt-WebFilter. WebFilter installs on Microsoft ISA/TMG to provide flexible Web access and protection for your employees. With Active Directory support and 60+ predefined Web categories, WebFilter offers blocking by user, group, IP, bandwidth quota, file types, etc. If ISA/TMG is on your radar, our standalone WebFilter proxy offers the same filtering and blocking options which you can transfer at no additional cost. WebFilter’s replication feature ensures you to keep multiple servers in sync with automatic replication of policies, schedules, quotas, changes to AD and URL Control List updates.
Burstek’s sophisticated suite of filtering, blocking, monitoring, and reporting solutions will help you manage and secure your network environment - easy to install, easy to use, flexible, and customizable for both small and large user counts. Try our fully functional evaluation today.
NetWrix Change Reporter Suite automates and simplifies the auditing of critical IT systems across the entire IT infrastructure. With one simple deployment you can efficiently audit critical IT systems such as Active Directory, Group Policy, Exchange, VMware, Windows Server to name just a few - while staying within a reasonable budget.
Thanks to the NetWrix AuditIntelligence technology that transforms raw audit data into meaningful and actionable intelligence to drive security and compliance, NetWrix Change Reporter Suite allows you to easily track and report on the "4W detail": who changed what, where and when in your entire IT infrastructure. The product is used by thousands of satisfied customers all over the world. Multiple options are available for your convenience. You can download a free trial, evaluate the product in our hosted test lab or schedule a one-to-one demo with a NetWrix expert.
eIQ’s SecureVue, a true Unified Situational Awareness solution can address these challenges. It provides an accurate, timely and coherent view of threat, risk and compliance. SecureVue delivers Unified Situational Awareness by combining Next Gen SIEM, Secure Configuration Audit, Compliance Automation and Contextual Forensic Analysis, through a single console yielding a unified view, operational efficiency and lower TCO.
Trustwave SIEM Operations Edition (OE) is event management software for the enterprise - scalable, flexible and easily integrated with the enterprise infrastructure. SIEM OE automatically transforms logs into security events and prioritizes high risk events, providing actionable alerts to help businesses stay secure and compliant.
Cyberarms IDDS enhances Security by denying access to intruders on the network level. Cyberarms provides a pro-active Intrusion Detection and Defense System (IDDS). It's pro-active, because it not only logs, but also reacts to intrusion attempts. Once a "bad guy" is recognized, he won't have access to any of your systems protected by Cyberarms IDDS. Don't give a second chance to hackers!
ControlUp offers real-time visibility into your entire enterprise resources like you have never seen before. It's like having a dynamic excel pivot table of your entire enterprise resource fabric! It works on both physical and virtual desktops, including VDI and TS-based. You receive sortable views of every single process running on monitored machines, accounts, sessions, executables with process-specific and aggregate CPU and memory information.
Being more than a monitoring tool, with ControlUp you can remotely control your managed environment, while executing a comprehensive and ever-growing set of management tasks simultaneously on multiple targets computers and users. Try our fully functional Free edition that supports up to 50 concurrent user sessions.
NetIQ Change Guardian™ helps IT security professionals manage change to critical files, system configuration and applications, and achieve compliance with regulations and internal security policies. Unmanaged change is a leading cause of security breaches and unauthorized user activity is one of the early indications of a targeted attack.
With Change Guardian, you can proactively identify and respond to unmanaged changes that could lead to security breaches or failed audits, and identify potential breaches in real-time by monitoring privileged user activity across the enterprise.
Network Monitor allows you to capture, display, analyze, record and replay all the data your computer exchanges with network via IP connections. It can be successfully used for monitoring behavior of LAN and Internet applications and services. You can find this network monitor useful while developing network software, hardware and services, writing your device drivers and protocols.
CenturionMail 3.03 is a powerful yet easy-to-use security program for encrypting e-mails as well as files/folders. CenturionMail uses self-decrypting technology so your recipient needs nothing to open the encrypted email except the password.
Microsoft Outlook integration and administrator control tools make this the perfect email encryption software for companies.