Security software software
Security software downloads
by Alex & Matt Neuber Anti-Spy.Info is your security and personal privacy tool that detects and removes spyware, trojans, keyloggers and adware. Anti-Spy.Info finds hidden functions of all processes currently active on your computer.
License: Free to try ; 29 to buy | Download
[ 2.1 Mb ]
by ExactTrend Shared Monitor is an advanced shared resource monitor and logger. The program sits in your system tray and constantly monitors all the MS Network connections. It allows you to monitor active connections to your resources and browse historical data.
License: Free to try ; 29.9 to buy | Download
[ 1 Mb ]
by GFI Software GFI MailSecurity for Exchange/SMTP is an email content checking, exploit detection, threats analysis and anti-virus solution that removes all types of email-borne threats before they can affect an organization's email users.
License: Free to try ; 500 to buy | Download
[ 43.4 Mb ]
by Nsasoft LLC. NetShareWatcher is network security improvement software. It allows network administrators to monitor network shares and identify shares which are violating data access policy in their organization.
License: Free to try ; 28.5 to buy | Download
[ 1.2 Mb ]
by Nsasoft LLC. ShareAlarmPro monitoring network access to shared folders and resources, allows to see parameters of the workstation which tries to establish a connection with your computer.The remote workstation, user, path, OS, permissions of the accessed folder.
License: Free to try ; 19.5 to buy | Download
[ 1.1 Mb ]
by Nsasoft LLC. SpotAuditor recovers MSN, Internet Explorer, Outlook, Dial up, ICQ, Trillian,Miranda,VNC,Far ftp, SecureFX ftp,WebDrive ftp, FTP Voyager, FTP Contro, AutoFTP passwords, IE Auto Complete Fields,reveals passwords behind the asterisks in password boxes.
License: Free to try ; 24.5 to buy | Download
[ 1.1 Mb ]
by Privacyware Signature-less, zero hour protection from known or new malware and intrusions for Windows desktops and servers. DSA continuously evaluates system processes, applications, registry and other variables to block potential threats.