SuggestSoft.com

Token

Tic Tac Files 2.0

Tic Tac Files 2.0: We modernized an ancient logic game for you - check Tic Tac Files out NOW! token, so that all equal tokens will match single background color. Features: • side-displays show completed vs. uncompleted token sets • progress-bar is monitoring overall chances to finish a job soon • Yin Yang double click switches between YY-column and YY-row • review all moves by using backward and forward buttons • temporal game is saved already • full screen option enriches full player’s experience • game board frame follows






CAT Passwords Manager 4.0: CAT Passwords Manager manages Fixed and One Time Passwords
CAT Passwords Manager 4.0

CAT Passwords Manager manages Fixed and One Time Passwords on Java enabled Cellular. Easy to use and secured. Can manage multiple Passwords, PINs and OTPs. Using the menu you can Add, Update, Delete and Serach for sites. Site Details include the Site name, User ID, Password and Password type.

aladdin, eauthentication, internet security, two factor, password manager, etoken, strong authentication, phishing, identity magement, identity management, cellular authentication token





abylon ENTERPRISE 6.3: Innovative and professional security and encryption solution
abylon ENTERPRISE 6.3

token. After pulling the token the computer log off or shut down automatically. For ultimate deleting of files and internet traces the abylon SHREDDER supports five different wiping methods, whereby the data are overwritten several times. As further modules the software package provide abylon CRYPTZIP to generate compressed ZIP-files, abylon PASTE to optimise copy and move files, abylon FIND to find files and abylon CLIENT SECTURITY to deactivate

virtual drive, mapi, encode, coding, email, crypt, utilities, pkcs, digital envelop, attachment, cookies, history, deleting



abylon ENTERPRISE 9.50.7: Innovative and professional security and encryption solution
abylon ENTERPRISE 9.50.7

token. After pulling the token the computer log off or shut down automatically. For ultimate deleting of files and internet traces the abylon SHREDDER supports five different wiping methods, whereby the data are overwritten several times. As further modules the software package provide abylon CRYPTZIP to generate compressed ZIP-files, abylon PASTE to optimise copy and move files, abylon FIND to find files and abylon CLIENT SECTURITY to deactivate

virtual drive, mapi, encode, coding, email, crypt, utilities, pkcs, digital envelop, attachment, cookies, history, deleting



CryptDisk rscdisk 4.2: CryptDisk encryption on the fly Optimally protect sensitive data
CryptDisk rscdisk 4.2

Token, access to the data contained on the drive is exactly the same as accessing data on conventional drive assemblies. If a protected drive assembly is closed, all data contained on the drive is closed immediately and reliably codet to the image file. - Using Master / Slave Token - Two factor authentification - Single-Sign-On available - Your data can be encrypted with the International Encryption Standard AES with 256-bit encryption key. - Automatic

encrypt, disk, secure, file, encryption, cryptdisk, virtual, crypto, crypt, security, decrypt



No Image
EMCO Permissions Audit SQL 2.1.5

Token * Direct and Group Access Token * Direct and Everyone Access Toke * Access via Any Token It organizes the information about the network resources and shows which users have access to which resources on a domain in an excellent manner. It allows users to export the audit data in a variety of file formats including HTML, PDF, JPEG and Excel etc. EMCO Permission Audit has the ability to scan available servers on a domain with just one click. EMCO

folder rights, user rights, audit rights, share rights, permission audit



ArtistScope DRM Client 1.3: ArtistScope DRM is a total control solution for Document Rights Management
ArtistScope DRM Client 1.3

ArtistScope DRM is a total control solution for the Document Rights Management of documents, images and web pages where an author can assign different permissions per user or group of users. When DRM rights are assigned the document becomes "for their eyes only" and any copies of that document forwarded on cannot be viewed by others unless they also have rights of view. Tokens cannot be forged and certificates cannot be copied or redistributed.

authorize, rights, access, document, secure, protect, digital rights management, restrict, translate, web pages, security, manage, control


More Results: 1  2  3  4  5  6  

World IT News