Active Folders is an email search engine that looks for multiple attributes. It automates the manual task of finding unwanted attachments or abusive emails, or can be used to bring together all communications on a specific subject.
This is a security and routing application for email systems. It protects them from spam, malware and DoS attacks, but its main feature is the ability to direct messaging traffic based on content, rather than the destination address.
Policy Server appeared with the release of Acrobat 7 earlier this year. It builds substantially on the encryption and password security of past editions of Acrobat and provides control over how Acrobat PDF format documents are accessed.
ECM started as a Windows inventory management tool, but has moved with the times. This release turns it into a systems policy management and compliance system for Windows, Solaris and Red Hat.
Targeting policies for email and web use, NETconsent is an on-screen employee policy development environment.
Configuring the security settings on Windows servers, desktops and notebooks is an overly complex chore. Ensuring that the users do not reset any of the settings just adds to the headache. Policy Commander automates this task using predetermined policies.
Technology can only go so far in imposing policies, and there are times when text-based policies must be used. Legal requirements, health and safety, and personal conduct issues require employees to read and digest information.
The UniGuard-V34 modem and Port Authority 44 (PA44) offer secure out-of-band control of networking hardware and servers.
In the Unix world, anyone who knows the root password has access to the root account. This gives them complete control, as there is no way to delegate specific privileges. The systems admin has to decide to control everything, or allow other users root access to perform specific tasks allocated to them. One way leads to overwork, the other to security compromise.
This suite of programs is designed to control access to the internet and keep the enemy at bay. It integrates with many third-party defense applications to offer a war room in a browser from which the state of the defenses can be examined, as well as dictating how the various units work together to shield the internal network.
Distributing information in Microsoft Office documents can reveal more than was intended.
Backup for Workgroups is an unpretentious name for what turns out to be an uncomplicated product. Not much about this product is very clever, but that works to its advantage. Its lack of sophistication makes it a must-have for the workgroups it mentions, and for many more small business networks who might miss the point.
One of the
Pervasive's SQL database is designed to be embedded in applications designed for small to medium businesses. AuditMaster has been created to ensure that changes to the database are efficiently and accurately logged. The audit trail produced not only allows the database manager to keep track of routine changes, but also sends alerts if and when key data, such as staff salaries or catalog prices, are altered.