Any Windows Software - Shareware and Freeware Download Center for Windows

Top Downloads

New Downloads

Recent Searches

Latest Reviews

  • Keyboard & Mouse Locker   (Danilo)

    Great program. Locked my pc and keyboard conveniently.

  • 123 Pdf to Word Converter for Doc   (Ameer)

    Very expensive, unregistered version will let you have just a small part of pdf document but that's not enough to get idea...

  • MoneyLine Free Personal Finance for Mac   (Anton)

    It's very good. Lightweight and easy to use tool for managing my finances.

  • BE-Guestbook   (Smith)

    Integrated easily with my site and looking good.

  • Likno Web Builders Collection   (David)

    A nice set of applications that are essential for me when I create websites.

  • Timer-7   (Oliver)

    Excellent tool. Very much appreciated.

  • Avro Keyboard Bangla Software   (Munna)

    Avro is very useful program for writing in Bangla. It's free and has some very good tools like spell checker, font fixer...

  • Encrypt my Folder   (Raino)

    It's old and never updated since they released it. You can use it only 20 times before purchasing, and the website for...

  • Wall Street Raider   (Ludvig)

    Interface was complicated to use, some popular stock symbols I entered shows 'Company not available'. Very confusing game.

  • BootRacer   (Iiro)

    I use it to see if my pc booting normally or taking long time. So far it helps me great.


Information Security Policy Template

From Title
1.  Meta-policy information Base - Utilities/Mac Utilities
... The Meta policy information Base is a project that implements the ideas of adding meta-policies to a policy-based network environment. Added functionality to the traditional approach is modeled with new classes that improve the performance of the former ...
 




2.  Warify information security Toolkit - Utilities/Mac Utilities
... An information security toolkit to help companies understand what information can be gleaned about them without performing any hacking attempts ...
 
3.  ISO 27001 - information security Management - Educational/Teaching Tools
... 7 Step Consulting is a leading ISO certifications and IT security consulting firm expert at providing assistance to business in implementation and maintenance of various management systems like ISO 9001, ISO 27001, ISO 2008 and quality management. 7 Step Consulting is a renowned Delhi based business process and IT best practices specialist. With decades of experience in ISO certification and consulting industry we make ISO certification a very easy task for our clients and keep them one step ...
 
4.  uCertify GISF GIAC information security - Educational/Teaching Tools
... PrepKit GISF, GIAC information security Fundamentals is an interactive software application that helps you learn, tracks your progress, identifies areas for improvements and simulates the actual exam. This PrepKit contains 4 interactive practice tests with over 447 challenging questions guaranteed to comprehensively cover all the objectives for the GISF: GIAC information security Fundamentals exam. With detailed analysis for each question, over 107 study notes, interactive quizzes, tips and ...
 
5.  policy Patrol Disclaimers (formerly policy Patrol Spam Filter) - Security/Anti-Spam & Anti-Spy Tools
... policy Patrol Disclaimers will provide users with professional email disclaimers and email signatures for Microsoft Exchange Server. The program includes a powerful rules wizard that allows you to configure customized user-based disclaimers and signatures. With policy Patrol Disclaimers's advanced formatting and positioning options you can create the disclaimer and signature that is just right for your organization. policy Patrol Disclaimers is the first email disclaimer product to show the ...
 




6.  policy Patrol - Communications/E-Mail Tools
... policy Patrol is a comprehensive email filtering tool that offers anti-spam, virus scanning, keyword filtering, attachment checking, compression, reporting, archiving, disclaimers & signatures and many unique email management features. The product is easy to install and configure, and its powerful rules wizard allows you to create customized user-based rules by specifying conditions, exceptions and actions. policy Patrol includes 20 sample rules that can get your email system fully protected ...
 
7.  SELinux policy Editor - Utilities/Other Utilities
... SELinux policy Editor(seedit) is a tool to make SELinux easy. It is composed of Simplified policy and its tools. The main feature is Simplified policy. Simplified policy hides detail of SELinux. ...
 
8.  Greylist policy Service - Utilities/Other Utilities
... gps is an implementation of a greylist policy service for postfix. Greylisting very effectively reduces the amount of spam by technical means. Tested with mysql, postgresql, sqlite, Written in C/C++ ...
 
9.  Password policy Enforcer - Security/Misc
... Password policy Enforcer allows network administrators to create and enforce multiple Windows domain password policies. A password policy ensures that users are choosing strong (difficult to crack) passwords. PPE checks every new password for compliance with the password policy. Passwords that do not comply with the policy are instantly rejected. Password policy Enforcer even helps users to choose compliant password.Unlike password cracking products that evaluate passwords after they have been ...
 
10.  Change a policy face - Games/Action
... Change a policy face. This fun game. You can change policy face. ...
 

Information Security Policy Template

From Short Description
1.  Stik's security Module - Utilities/Other Utilities
... The goal of the Stik's security Module project is to provide a vehicle for implementation of a label based security policy complimentary to the existing Linux security model. The module is implemented by hooking the Linux 2.4.x system call table. ...
 
2.  PortsLock - Internet
... PortsLock is an endpoint security solution that allows system administrators to specify network policy rules based on user and group membership. It provides user-level network policy restrictions for Windows workstations and servers. Once PortsLock is installed, administrators can assign permissions to TCP/IP connections, just as they would in managing permissions on an NTFS partition of a hard disk. It lets you control which users or groups can access what TCP/IP based protocols (HTTP, FTP, ...
 
3.  PHP Data Source template Parser - Utilities/Other Utilities
... With this PHP template parser you can load in one huge array of information and use it in your template (html document). It's a bit like the XML / XSL methods but these don't work very good in PHP so I wrote this replacement. ...
 
4.  HIPAA security Rule Assistant - Business & Productivity Tools
... HIPAA security Rule Assistant provides HIPAA covered entities a program to learn and understand the HIPAA security Rule. It contains Risk Analysis worksheet, sample policy templates, sample disaster recovery plan, and a sample Incident Report form. It also has areas to tract actions taken and enter policies and procedures developed to meet the requirements of the rule. You can view the entire rule or portions thereof. Enter and track actions taken, enter comments, and more. A simple word ...
 
5.  Virgil - Utilities/Other Utilities
... Virgil is a utility for generating SELinux policy for user domains not covered by the distributed policy packages. The Virgil GUI allows a policy creator to select options and identify file system resources, then generate the desired source policy files. ...
 




6.  JRC policy Workbench - Utilities/Other Utilities
... The JRC policy Workbench is an API for building policy editing and testing environments, which includes an implementation of an editor for P3P 1.1 and P3P 1.0 policies. ...
 
7.  HTML::Menu::DateTime - Utilities/Mac Utilities
... A Perl module for easily creating HTML dropdown menus for use with HTML::template, template Toolkit or template::Magic templating systems.Allows any number of dropdown menus to be displayed on a single page, each independantly configurable. ...
 
8.  HTML-template-Pro - Utilities/Other Utilities
... HTML-template-Pro is a fast lightweight C template engine that supports syntax of HTML::template perl module as well as many of its extensions. It consists of core htmltmplpro C library and bindings to perl/php/C#/.... ...
 
9.  PhotoShine - Multimedia & Design/Image Editing
... PhotoShine gives you an easy way to make photo collage by adding your photo into different beautiful templates. For example, you can add your photo into a classical love style template, a pink girl style template, a baby cartoon template, or a magazine cover template etc by just one click in PhotoShine. Key Features Of "PhotoShine": 1) Easy to use Just one click, you can add your photo into the template which you like. 2) 9 themes (styles), more than 680 beautiful templates included. ...
 
10.  MotOrBAC - Security/Misc
... MotOrBAC is a simple and accessible instrument that's been created in order to help you design and implement a security policy using the OrBAC (Organisation Based Access Control) model. It is developed using the OrBAC API, an implementation of the OrBAC model. ...
 

Information Security Policy Template

From Long Description
1.  NetWrix Group policy Reporter SCOM Pack - Network Tools/Miscellaneous Network Tools
... Group policy auditing is an essential process in providing enterprise security for all organizations relying on Group policy infrastructure, because even small unwanted changes to security policies can impose major security and compliance risks for an IT infrastructure. NetWrix SCOM Management Pack for Group policy Change Reporter is a solution that captures all changes made to Group policy and feeds the audit data to Microsoft System Center Operations Manager, which generates appropriate ...
 
2.  PDFapps security and Privacy Audit - Business & Productivity Tools/Other Related Tools
... pdfapps PDF security and Privacy Audit 2.0Do you leave private, confidential or sensitive information in PDFs?Do your published PDFs conform to your information security policy?Auditing your PDF documents before release is a crucial business step in information management. PDF security and Privacy Audit helps perform this step by instantly showing and reporting on the metadata and security permissions in your PDF documents. ...
 
3.  Account Lockout Tools - Security/Password Managers & Generators
... Account Lockout Tools is a Account Lockout and Management Tools. Account Lockout Threshold policy helps in further Active Directory Account Lockout. Account Lockout and Management Tools will Audit Account Management Computer, Audit Account Management policy, Audit Account Management security. Easy to use Account Lockout policy security Configuration. security Audit policy helps to prevent Active Directory Account Lockout. Account Lockout Duration, Account Lockout Status, Account Lockout policy ...
 
4.  JiJi Account Lockout Tool - Security/Security Related
... JiJi Account Lockout Tool is a Account Lockout and Management Tool. Account Lockout Threshold policy helps in further Active Directory Account Lockout. Account Lockout and Management Tools will Audit Account Management Computer, Audit Account Management policy, Audit Account Management security. Easy to use Account Lockout policy security Configuration. security Audit policy helps to prevent Active Directory Account Lockout. Account Lockout Duration, Account Lockout Status, Account Lockout ...
 
5.  Secure Win Auditor - Security/Misc
... Secure Windows Auditoraâ? (SWA)A must have windows security software for information security professionals to conduct in-depth security auditing and risk assessments of network-based windows systems. Regulatory compliance and the latest network auditing tools, all come as a package with this computer security software. Secure Windows Auditoraâ? (SWA) is a windows security software solution which provides windows security auditing and assessment software which empower network administrators ...
 
6.  NetWrix Group policy Change Reporter - Network Tools/Miscellaneous Network Tools
... Group policy change auditing is highly important for all organizations utilizing Group policy in their IT environments. Native Group policy management tools don't offer built-in auditing capabilities. Manual audit of changes made to security policies, desktop configurations, software deployment and other settings can be time consuming, unsecure and error-prone. The freeware NetWrix Group policy Change Reporter makes Group policy auditing and change reporting convenient and easy to implement. The ...
 
7.  ConcurrentLinkedHashMap - Utilities/Mac Utilities
... Concurrent hash map and linked list implementation of the ConcurrentMap interface, with predictable iteration order. This implementation differs from ConcurrentHashMap in that it maintains a doubly-linked list running through all of its entries. <br>FIFO eviction policy <br>LIFO eviction policy<br>LFU eviction policy<br>LRU eviction policy<br>MRU eviction policy<br>Expiration (age and idle time) eviction policy<br>Random eviction policy<br>Pluggable custom evict ...
 
8.  Secure Windows Auditor - Security/Misc
... Secure Windows Auditoraâ? (SWA) A must have windows security software for information security professionals to conduct in-depth security auditing and risk assessments of network-based windows systems. Regulatory compliance and the latest network auditing tools, all come as a package with this computer security software. Secure Windows Auditoraâ? (SWA) is a windows security software solution which provides windows security auditing and assessment software which empower network administrators ...
 
9.  SterJo Portable Firewall Free - Network Tools/Network Monitoring & Info
... SterJo Portable Firewall Free is device designed to prevent outsiders from accessing your network even if it is run from a USB drive. The unit serves as the single entry point to your network and evaluate all TCP connections requests as they are received comparing them with each rule in the policy. This is advanced easy-to-use software with ability to watch for all ports on your system and block them if necessary. - Activity provides a real-time view of the open connections through the ...
 
10.  Forefront Endpoint Protection Tools - Security/Misc
... These tools make it easier for Forefront Endpoint Protection 2010 customers to use Group policy for centralized management, provide optimized settings for various server roles, and diagnose and troubleshoot support issues.FEP Group policy Tools (fep2010grouppolicytools-en-us.exe)The FEP Group policy tool is used to import settings from FEP policy XML files into a Group policy Object (GPO) in an Active Directory domain, or into the Local Group policy object on a Windows computer. The tool can ...
 

Information Security Policy Template

Related Searches:

a - b - c - d - e - f - g - h - i - j - k - l - m - n - o - p - q - r - s - t - u - v - w - x - y - z - #
© 1997-2012 ShareMe Last Update: Tuesday, September 30, 2014 shareme | contact | notice | privacy | bookmark | link to us

Welcome to the ShareMe. Shareme is a dedicated internet portal bringing users the latest shareware & freeware from the world's best Software Authors. Shareme allows Shareware & Freeware Authors to submit their latest wares, so you the user are able to download their latest software updates all the time, after they are released! Always visit Shareme for your software needs.