Any Windows Software - Shareware and Freeware Download Center for Windows

Top Downloads

New Downloads

Recent Searches

Latest Reviews


Information Security Policy Template

From Title
1.  Meta-policy information Base - Utilities/Mac Utilities
... The Meta policy information Base is a project that implements the ideas of adding meta-policies to a policy-based network environment. Added functionality to the traditional approach is modeled with new classes that improve the performance of the former ...
 




2.  Warify information security Toolkit - Utilities/Mac Utilities
... An information security toolkit to help companies understand what information can be gleaned about them without performing any hacking attempts ...
 
3.  ISO 27001 - information security Management - Educational/Teaching Tools
... 7 Step Consulting is a leading ISO certifications and IT security consulting firm expert at providing assistance to business in implementation and maintenance of various management systems like ISO 9001, ISO 27001, ISO 2008 and quality management. 7 Step Consulting is a renowned Delhi based business process and IT best practices specialist. With decades of experience in ISO certification and consulting industry we make ISO certification a very easy task for our clients and keep them one step ...
 
4.  uCertify GISF GIAC information security - Educational/Teaching Tools
... PrepKit GISF, GIAC information security Fundamentals is an interactive software application that helps you learn, tracks your progress, identifies areas for improvements and simulates the actual exam. This PrepKit contains 4 interactive practice tests with over 447 challenging questions guaranteed to comprehensively cover all the objectives for the GISF: GIAC information security Fundamentals exam. With detailed analysis for each question, over 107 study notes, interactive quizzes, tips and ...
 
5.  policy Patrol Disclaimers (formerly policy Patrol Spam Filter) - Security/Anti-Spam & Anti-Spy Tools
... policy Patrol Disclaimers will provide users with professional email disclaimers and email signatures for Microsoft Exchange Server. The program includes a powerful rules wizard that allows you to configure customized user-based disclaimers and signatures. With policy Patrol Disclaimers's advanced formatting and positioning options you can create the disclaimer and signature that is just right for your organization. policy Patrol Disclaimers is the first email disclaimer product to show the ...
 




6.  policy Patrol - Communications/E-Mail Tools
... policy Patrol is a comprehensive email filtering tool that offers anti-spam, virus scanning, keyword filtering, attachment checking, compression, reporting, archiving, disclaimers & signatures and many unique email management features. The product is easy to install and configure, and its powerful rules wizard allows you to create customized user-based rules by specifying conditions, exceptions and actions. policy Patrol includes 20 sample rules that can get your email system fully protected ...
 
7.  policy Patrol Signatures - Communications/E-Mail Tools
... Would you like to have more control over your employeesâ Outlook email signatures? policy Patrol Signatures is a professional application designed to enable you to centrally manage your employeesâ Outlook (and Outlook Web Access) email signatures. This way, it ensures you that your corporate emails contain a professional and consistent email signature along with the necessary legal disclaimer and company footer. With policy Patrolâs Microsoft Active Directory merge fields, you only need to ...
 
8.  SELinux policy Editor - Utilities/Other Utilities
... SELinux policy Editor(seedit) is a tool to make SELinux easy. It is composed of Simplified policy and its tools. The main feature is Simplified policy. Simplified policy hides detail of SELinux. ...
 
9.  JRC policy Workbench - Utilities/Other Utilities
... The JRC policy Workbench is an API for building policy editing and testing environments, which includes an implementation of an editor for P3P 1.1 and P3P 1.0 policies. ...
 
10.  Password policy Enforcer - Security/Misc
... Password policy Enforcer allows network administrators to create and enforce multiple Windows domain password policies. A password policy ensures that users are choosing strong (difficult to crack) passwords. PPE checks every new password for compliance with the password policy. Passwords that do not comply with the policy are instantly rejected. Password policy Enforcer even helps users to choose compliant password.Unlike password cracking products that evaluate passwords after they have been ...
 

Information Security Policy Template

From Short Description
1.  Stik's security Module - Utilities/Other Utilities
... The goal of the Stik's security Module project is to provide a vehicle for implementation of a label based security policy complimentary to the existing Linux security model. The module is implemented by hooking the Linux 2.4.x system call table. ...
 
2.  PortsLock - Internet
... PortsLock is an endpoint security solution that allows system administrators to specify network policy rules based on user and group membership. It provides user-level network policy restrictions for Windows workstations and servers. Once PortsLock is installed, administrators can assign permissions to TCP/IP connections, just as they would in managing permissions on an NTFS partition of a hard disk. It lets you control which users or groups can access what TCP/IP based protocols (HTTP, FTP, ...
 
3.  PHP Data Source template Parser - Utilities/Other Utilities
... With this PHP template parser you can load in one huge array of information and use it in your template (html document). It's a bit like the XML / XSL methods but these don't work very good in PHP so I wrote this replacement. ...
 
4.  InfoShare - Utilities/Other Utilities
... InfoShare allows information owners to share information with collaborators while maintaining control of its access control policy centrally. Any changes to the policy will remove access from the collaborator next time they try to open the file. ...
 
5.  Virgil - Utilities/Other Utilities
... Virgil is a utility for generating SELinux policy for user domains not covered by the distributed policy packages. The Virgil GUI allows a policy creator to select options and identify file system resources, then generate the desired source policy files. ...
 




6.  HIPAA security Rule Assistant - Business & Productivity Tools
... HIPAA security Rule Assistant provides HIPAA covered entities a program to learn and understand the HIPAA security Rule. It contains Risk Analysis worksheet, sample policy templates, sample disaster recovery plan, and a sample Incident Report form. It also has areas to tract actions taken and enter policies and procedures developed to meet the requirements of the rule. You can view the entire rule or portions thereof. Enter and track actions taken, enter comments, and more. A simple word ...
 
7.  MotOrBAC - Security/Misc
... MotOrBAC is a simple and accessible instrument that's been created in order to help you design and implement a security policy using the OrBAC (Organisation Based Access Control) model. It is developed using the OrBAC API, an implementation of the OrBAC model. ...
 
8.  Group policy Object Search Tool - Utilities/Other Utilities
... Group policy Object Search Tool - Group policy Search Management tool helps individual settings search locate GPO JiJi GPO Search tool enables Group policy Management easy to search GPO It extends GPO search by Advanced Group policy Management search Group policy Management editorWhats the problem with GPMC Search?Builtin Search facility available in Group policy Management Console (GPMC) can be used to find the existence of a GPO Extension or a group of settings and not the actual individual ...
 
9.  policy based smart pointer (smart_ptr) - Utilities/Other Utilities
... Smart pointer (smart_ptr) policy class that is exchangeable and lockable with easy to use policy interface that allows for different ownership policies, reference policies, lock policies, allocation policies, and much more ...
 
10.  NT Registry Tweaker for U3 flash drives - Utilities/Registry Tools
... The Windows registry is a directory which stores settings and options. It contains information and settings for all the hardware, operating system software, most non-operating system software, users, preferences of the PC, etc. Whenever a user makes changes to Control Panel settings, file associations, system policies, or installed software, the changes are reflected and stored in the registry. The registry also provides a window into the operation of the kernel, exposing runtime information ...
 

Information Security Policy Template

From Long Description
1.  NetWrix Group policy Reporter SCOM Pack - Network Tools/Miscellaneous Network Tools
... Group policy auditing is an essential process in providing enterprise security for all organizations relying on Group policy infrastructure, because even small unwanted changes to security policies can impose major security and compliance risks for an IT infrastructure. NetWrix SCOM Management Pack for Group policy Change Reporter is a solution that captures all changes made to Group policy and feeds the audit data to Microsoft System Center Operations Manager, which generates appropriate ...
 
2.  PDFapps security and Privacy Audit - Business & Productivity Tools/Other Related Tools
... pdfapps PDF security and Privacy Audit 2.0Do you leave private, confidential or sensitive information in PDFs?Do your published PDFs conform to your information security policy?Auditing your PDF documents before release is a crucial business step in information management. PDF security and Privacy Audit helps perform this step by instantly showing and reporting on the metadata and security permissions in your PDF documents. ...
 
3.  Account Lockout Tools - Security/Password Managers & Generators
... Account Lockout Tools is a Account Lockout and Management Tools. Account Lockout Threshold policy helps in further Active Directory Account Lockout. Account Lockout and Management Tools will Audit Account Management Computer, Audit Account Management policy, Audit Account Management security. Easy to use Account Lockout policy security Configuration. security Audit policy helps to prevent Active Directory Account Lockout. Account Lockout Duration, Account Lockout Status, Account Lockout policy ...
 
4.  ConcurrentLinkedHashMap - Utilities/Mac Utilities
... Concurrent hash map and linked list implementation of the ConcurrentMap interface, with predictable iteration order. This implementation differs from ConcurrentHashMap in that it maintains a doubly-linked list running through all of its entries. <br>FIFO eviction policy <br>LIFO eviction policy<br>LFU eviction policy<br>LRU eviction policy<br>MRU eviction policy<br>Expiration (age and idle time) eviction policy<br>Random eviction policy<br>Pluggable custom evict ...
 
5.  JiJi Account Lockout Tool - Security/Security Related
... JiJi Account Lockout Tool is a Account Lockout and Management Tool. Account Lockout Threshold policy helps in further Active Directory Account Lockout. Account Lockout and Management Tools will Audit Account Management Computer, Audit Account Management policy, Audit Account Management security. Easy to use Account Lockout policy security Configuration. security Audit policy helps to prevent Active Directory Account Lockout. Account Lockout Duration, Account Lockout Status, Account Lockout ...
 
6.  NetWrix Group policy Change Reporter - Network Tools/Miscellaneous Network Tools
... Group policy change auditing is highly important for all organizations utilizing Group policy in their IT environments. Native Group policy management tools don't offer built-in auditing capabilities. Manual audit of changes made to security policies, desktop configurations, software deployment and other settings can be time consuming, unsecure and error-prone. The freeware NetWrix Group policy Change Reporter makes Group policy auditing and change reporting convenient and easy to implement. The ...
 
7.  Secure Win Auditor - Security/Misc
... Secure Windows Auditoraâ? (SWA)A must have windows security software for information security professionals to conduct in-depth security auditing and risk assessments of network-based windows systems. Regulatory compliance and the latest network auditing tools, all come as a package with this computer security software. Secure Windows Auditoraâ? (SWA) is a windows security software solution which provides windows security auditing and assessment software which empower network administrators ...
 
8.  SterJo Portable Firewall Free - Network Tools/Network Monitoring & Info
... SterJo Portable Firewall Free is device designed to prevent outsiders from accessing your network even if it is run from a USB drive. The unit serves as the single entry point to your network and evaluate all TCP connections requests as they are received comparing them with each rule in the policy. This is advanced easy-to-use software with ability to watch for all ports on your system and block them if necessary. - Activity provides a real-time view of the open connections through the ...
 
9.  NetWrix Group policy Backup and Restore - Network Tools/Miscellaneous Network Tools
... Group policy is a key component of every Active Directory infrastructure and without regular backup and quick recovery capabilities can lead to system failures and downtime, user frustration, and security issues. NetWrix Group policy Backup and Restore is a freeware product for automated Group policy backup and recovery. The product automatically creates backups of all GPOs and settings and provides granular restore capabilities. The product also sends daily summary by e-mail detailing all ...
 
10.  Forefront Endpoint Protection Tools - Security/Misc
... These tools make it easier for Forefront Endpoint Protection 2010 customers to use Group policy for centralized management, provide optimized settings for various server roles, and diagnose and troubleshoot support issues.FEP Group policy Tools (fep2010grouppolicytools-en-us.exe)The FEP Group policy tool is used to import settings from FEP policy XML files into a Group policy Object (GPO) in an Active Directory domain, or into the Local Group policy object on a Windows computer. The tool can ...
 

Information Security Policy Template

Related Searches:

a - b - c - d - e - f - g - h - i - j - k - l - m - n - o - p - q - r - s - t - u - v - w - x - y - z - #
© 1997-2012 ShareMe Last Update: Sunday, July 27, 2014 shareme | contact | notice | privacy | bookmark | link to us

Welcome to the ShareMe. Shareme is a dedicated internet portal bringing users the latest shareware & freeware from the world's best Software Authors. Shareme allows Shareware & Freeware Authors to submit their latest wares, so you the user are able to download their latest software updates all the time, after they are released! Always visit Shareme for your software needs.