Any Windows Software - Shareware and Freeware Download Center for Windows

Top Downloads

New Downloads

Recent Searches

Latest Reviews

  • Weeny Free Audio Cutter   (Tekle )

    Very easy to use, just select the start time and end time of a audio file and it will cut it conveniently. Great app.

  • Phone-lost/stolen Alerter   (Albert)

    My tecno H5 phone was stolen this morning and I wanted to block it with this program but it won't work.

  • AirMyPC   (Jack)

    Finally Perfect solution to view my documents that are saved on my Windows PC on my big TV screen using the AppleTV.

  • Snappy Bird   (Ravn)

    I love playing it on my phone. Very addictive.

  • WinMend File Copy   (Robin)

    Usable software, accessing it is a bit time consuming. Please add hotkey support if you could.

  • Keyboard & Mouse Locker   (Elias)

    Working fine as it should, very easy to use it.

  • Free Slideshow Maker   (Hron)

    It has also installed some kind of toolbar to show ads.

  • Household Accounting Book   (Ananda Das )

    It's been helpful for tracking income and expense easily. Must try.

  • Power MP3 WMA Free Converter 2010   (Melkamu Molla)

    Good to use this program. Clean interface and it works very good.

  • Timer-7   (James)

    Very helpful for me. I needed something to remind me to take a walk after a long sitting on computer. This program does it...


Information Security Policy Template

From Title
1.  Meta-policy information Base - Utilities/Mac Utilities
... The Meta policy information Base is a project that implements the ideas of adding meta-policies to a policy-based network environment. Added functionality to the traditional approach is modeled with new classes that improve the performance of the former ...
 




2.  Warify information security Toolkit - Utilities/Mac Utilities
... An information security toolkit to help companies understand what information can be gleaned about them without performing any hacking attempts ...
 
3.  uCertify GISF GIAC information security - Educational/Teaching Tools
... PrepKit GISF, GIAC information security Fundamentals is an interactive software application that helps you learn, tracks your progress, identifies areas for improvements and simulates the actual exam. This PrepKit contains 4 interactive practice tests with over 447 challenging questions guaranteed to comprehensively cover all the objectives for the GISF: GIAC information security Fundamentals exam. With detailed analysis for each question, over 107 study notes, interactive quizzes, tips and ...
 
4.  ISO 27001 - information security Management - Educational/Teaching Tools
... 7 Step Consulting is a leading ISO certifications and IT security consulting firm expert at providing assistance to business in implementation and maintenance of various management systems like ISO 9001, ISO 27001, ISO 2008 and quality management. 7 Step Consulting is a renowned Delhi based business process and IT best practices specialist. With decades of experience in ISO certification and consulting industry we make ISO certification a very easy task for our clients and keep them one step ...
 
5.  policy Patrol Disclaimers (formerly policy Patrol Spam Filter) - Security/Anti-Spam & Anti-Spy Tools
... policy Patrol Disclaimers will provide users with professional email disclaimers and email signatures for Microsoft Exchange Server. The program includes a powerful rules wizard that allows you to configure customized user-based disclaimers and signatures. With policy Patrol Disclaimers's advanced formatting and positioning options you can create the disclaimer and signature that is just right for your organization. policy Patrol Disclaimers is the first email disclaimer product to show the ...
 




6.  policy Patrol - Communications/E-Mail Tools
... policy Patrol is a comprehensive email filtering tool that offers anti-spam, virus scanning, keyword filtering, attachment checking, compression, reporting, archiving, disclaimers & signatures and many unique email management features. The product is easy to install and configure, and its powerful rules wizard allows you to create customized user-based rules by specifying conditions, exceptions and actions. policy Patrol includes 20 sample rules that can get your email system fully protected ...
 
7.  Password policy Enforcer - Security/Misc
... Password policy Enforcer allows network administrators to create and enforce multiple Windows domain password policies. A password policy ensures that users are choosing strong (difficult to crack) passwords. PPE checks every new password for compliance with the password policy. Passwords that do not comply with the policy are instantly rejected. Password policy Enforcer even helps users to choose compliant password.Unlike password cracking products that evaluate passwords after they have been ...
 
8.  SELinux policy Editor - Utilities/Other Utilities
... SELinux policy Editor(seedit) is a tool to make SELinux easy. It is composed of Simplified policy and its tools. The main feature is Simplified policy. Simplified policy hides detail of SELinux. ...
 
9.  policy Patrol Signatures - Communications/E-Mail Tools
... Would you like to have more control over your employeesâ Outlook email signatures? policy Patrol Signatures is a professional application designed to enable you to centrally manage your employeesâ Outlook (and Outlook Web Access) email signatures. This way, it ensures you that your corporate emails contain a professional and consistent email signature along with the necessary legal disclaimer and company footer. With policy Patrolâs Microsoft Active Directory merge fields, you only need to ...
 
10.  Change a policy face - Games/Action
... Change a policy face. This fun game. You can change policy face. ...
 

Information Security Policy Template

From Short Description
1.  Stik's security Module - Utilities/Other Utilities
... The goal of the Stik's security Module project is to provide a vehicle for implementation of a label based security policy complimentary to the existing Linux security model. The module is implemented by hooking the Linux 2.4.x system call table. ...
 
2.  PortsLock - Internet
... PortsLock is an endpoint security solution that allows system administrators to specify network policy rules based on user and group membership. It provides user-level network policy restrictions for Windows workstations and servers. Once PortsLock is installed, administrators can assign permissions to TCP/IP connections, just as they would in managing permissions on an NTFS partition of a hard disk. It lets you control which users or groups can access what TCP/IP based protocols (HTTP, FTP, ...
 
3.  PHP Data Source template Parser - Utilities/Other Utilities
... With this PHP template parser you can load in one huge array of information and use it in your template (html document). It's a bit like the XML / XSL methods but these don't work very good in PHP so I wrote this replacement. ...
 
4.  HIPAA security Rule Assistant - Business & Productivity Tools
... HIPAA security Rule Assistant provides HIPAA covered entities a program to learn and understand the HIPAA security Rule. It contains Risk Analysis worksheet, sample policy templates, sample disaster recovery plan, and a sample Incident Report form. It also has areas to tract actions taken and enter policies and procedures developed to meet the requirements of the rule. You can view the entire rule or portions thereof. Enter and track actions taken, enter comments, and more. A simple word ...
 
5.  InfoShare - Utilities/Other Utilities
... InfoShare allows information owners to share information with collaborators while maintaining control of its access control policy centrally. Any changes to the policy will remove access from the collaborator next time they try to open the file. ...
 




6.  Virgil - Utilities/Other Utilities
... Virgil is a utility for generating SELinux policy for user domains not covered by the distributed policy packages. The Virgil GUI allows a policy creator to select options and identify file system resources, then generate the desired source policy files. ...
 
7.  JRC policy Workbench - Utilities/Other Utilities
... The JRC policy Workbench is an API for building policy editing and testing environments, which includes an implementation of an editor for P3P 1.1 and P3P 1.0 policies. ...
 
8.  MotOrBAC - Security/Misc
... MotOrBAC is a simple and accessible instrument that's been created in order to help you design and implement a security policy using the OrBAC (Organisation Based Access Control) model. It is developed using the OrBAC API, an implementation of the OrBAC model. ...
 
9.  HTML::Menu::DateTime - Utilities/Mac Utilities
... A Perl module for easily creating HTML dropdown menus for use with HTML::template, template Toolkit or template::Magic templating systems.Allows any number of dropdown menus to be displayed on a single page, each independantly configurable. ...
 
10.  HTML-template-Pro - Utilities/Other Utilities
... HTML-template-Pro is a fast lightweight C template engine that supports syntax of HTML::template perl module as well as many of its extensions. It consists of core htmltmplpro C library and bindings to perl/php/C#/.... ...
 

Information Security Policy Template

From Long Description
1.  NetWrix Group policy Reporter SCOM Pack - Network Tools/Miscellaneous Network Tools
... Group policy auditing is an essential process in providing enterprise security for all organizations relying on Group policy infrastructure, because even small unwanted changes to security policies can impose major security and compliance risks for an IT infrastructure. NetWrix SCOM Management Pack for Group policy Change Reporter is a solution that captures all changes made to Group policy and feeds the audit data to Microsoft System Center Operations Manager, which generates appropriate ...
 
2.  PDFapps security and Privacy Audit - Business & Productivity Tools/Other Related Tools
... pdfapps PDF security and Privacy Audit 2.0Do you leave private, confidential or sensitive information in PDFs?Do your published PDFs conform to your information security policy?Auditing your PDF documents before release is a crucial business step in information management. PDF security and Privacy Audit helps perform this step by instantly showing and reporting on the metadata and security permissions in your PDF documents. ...
 
3.  Account Lockout Tools - Security/Password Managers & Generators
... Account Lockout Tools is a Account Lockout and Management Tools. Account Lockout Threshold policy helps in further Active Directory Account Lockout. Account Lockout and Management Tools will Audit Account Management Computer, Audit Account Management policy, Audit Account Management security. Easy to use Account Lockout policy security Configuration. security Audit policy helps to prevent Active Directory Account Lockout. Account Lockout Duration, Account Lockout Status, Account Lockout policy ...
 
4.  JiJi Account Lockout Tool - Security/Security Related
... JiJi Account Lockout Tool is a Account Lockout and Management Tool. Account Lockout Threshold policy helps in further Active Directory Account Lockout. Account Lockout and Management Tools will Audit Account Management Computer, Audit Account Management policy, Audit Account Management security. Easy to use Account Lockout policy security Configuration. security Audit policy helps to prevent Active Directory Account Lockout. Account Lockout Duration, Account Lockout Status, Account Lockout ...
 
5.  Secure Win Auditor - Security/Misc
... Secure Windows Auditoraâ? (SWA)A must have windows security software for information security professionals to conduct in-depth security auditing and risk assessments of network-based windows systems. Regulatory compliance and the latest network auditing tools, all come as a package with this computer security software. Secure Windows Auditoraâ? (SWA) is a windows security software solution which provides windows security auditing and assessment software which empower network administrators ...
 
6.  NetWrix Group policy Change Reporter - Network Tools/Miscellaneous Network Tools
... Group policy change auditing is highly important for all organizations utilizing Group policy in their IT environments. Native Group policy management tools don't offer built-in auditing capabilities. Manual audit of changes made to security policies, desktop configurations, software deployment and other settings can be time consuming, unsecure and error-prone. The freeware NetWrix Group policy Change Reporter makes Group policy auditing and change reporting convenient and easy to implement. The ...
 
7.  ConcurrentLinkedHashMap - Utilities/Mac Utilities
... Concurrent hash map and linked list implementation of the ConcurrentMap interface, with predictable iteration order. This implementation differs from ConcurrentHashMap in that it maintains a doubly-linked list running through all of its entries. <br>FIFO eviction policy <br>LIFO eviction policy<br>LFU eviction policy<br>LRU eviction policy<br>MRU eviction policy<br>Expiration (age and idle time) eviction policy<br>Random eviction policy<br>Pluggable custom evict ...
 
8.  Secure Windows Auditor - Security/Misc
... Secure Windows Auditoraâ? (SWA) A must have windows security software for information security professionals to conduct in-depth security auditing and risk assessments of network-based windows systems. Regulatory compliance and the latest network auditing tools, all come as a package with this computer security software. Secure Windows Auditoraâ? (SWA) is a windows security software solution which provides windows security auditing and assessment software which empower network administrators ...
 
9.  SterJo Portable Firewall Free - Network Tools/Network Monitoring & Info
... SterJo Portable Firewall Free is device designed to prevent outsiders from accessing your network even if it is run from a USB drive. The unit serves as the single entry point to your network and evaluate all TCP connections requests as they are received comparing them with each rule in the policy. This is advanced easy-to-use software with ability to watch for all ports on your system and block them if necessary. - Activity provides a real-time view of the open connections through the ...
 
10.  Forefront Endpoint Protection Tools - Security/Misc
... These tools make it easier for Forefront Endpoint Protection 2010 customers to use Group policy for centralized management, provide optimized settings for various server roles, and diagnose and troubleshoot support issues.FEP Group policy Tools (fep2010grouppolicytools-en-us.exe)The FEP Group policy tool is used to import settings from FEP policy XML files into a Group policy Object (GPO) in an Active Directory domain, or into the Local Group policy object on a Windows computer. The tool can ...
 

Information Security Policy Template

Related Searches:

a - b - c - d - e - f - g - h - i - j - k - l - m - n - o - p - q - r - s - t - u - v - w - x - y - z - #
© 1997-2012 ShareMe Last Update: Monday, September 15, 2014 shareme | contact | notice | privacy | bookmark | link to us

Welcome to the ShareMe. Shareme is a dedicated internet portal bringing users the latest shareware & freeware from the world's best Software Authors. Shareme allows Shareware & Freeware Authors to submit their latest wares, so you the user are able to download their latest software updates all the time, after they are released! Always visit Shareme for your software needs.