advertisement
Home Tags Audit

Tag: audit

News

Coverity Calls a Halt to Unsafe Software

Coverity, Inc., the software integrity market leader, today announced that it will provide software integrity audits to qualified Global 2000 companies with safety-critical software...
Download

Secure Auditor 2.0.1262

Secure Auditor is an integrated network security solution to minimize information security risks. It determines the network vulnerability severity for the ISMS environment, their...
News

Lease Audits Reduce Operating Costs

According to the International Tenant Representative Alliance (ITRA), whose members specialize in tenant representation, most commercial tenants have received 2009 expense reconciliation statements of...
Download

SPACEWatch Enterprise Edition 6.0

File storage management is not easy. Organizations continue to store growing amounts of unstructured data on file servers and expect ready access to files....
Download

EVEREST Corporate Edition 5.30

EVEREST Corporate Edition is an automated network audit, system change tracking and network monitoring solution for small and large corporate enterprises, based on the...
Download

EMCO Network Inventory 5.6

EMCO Network Inventory is a tool that helps you automatically collect up-to-date information about all hardware and software assets from all remote PCs in...
Download

Roadkil’s Audit 1.35

Creates a database of computers on your network and their configurations. Allows you to track what applications are installed across your network for license...
Download

L0phtCrack 6.0

L0phtCrack 6 is packed with powerful features such as scheduling, hash extraction from 64 bit Windows versions, multiprocessor algorithms, and networks monitoring and decoding....
Download

Proactive Password Auditor 2.01

Proactive Password Auditor helps network administrators to examine the security of their networks by executing an audit of account passwords. By exposing insecure passwords,...
Download

AZScan 3.4

AZScan is a Windows based software tool which lets you quickly audit the security of mid-range systems including:-The software works by reviewing copies of...
- Advertisement -
advertisement