Outpost Firewall, personal firewall against Internet threats/nags: cookies, ads, email viruses, backdoors, spyware, crackers, adware. Tauscan - Trojan Horse detection and removal engine. Jammer - blocks every type of Trojan, backdoor, adware and spyware.
Software categories for anti-virus, MP3 audio, CD-DVD copy, firewall, graphics, Internet, system utilities, video and other utilities. Including browsers, download managers, Windows file manager, video players, and image and icon editing tools.
Desktop and server-side solutions that provide secure messaging and protection against spam, viruses, identity theft, fraud and phishing scams for Microsoft Exchange server environments, Microsoft Outlook and Outlook Express. Free 15-day trial.
Provider of Internet security technology, a broad range of content and security software and appliance solutions to individuals and enterprises. Virus protection, firewall, intrusion prevention, Internet and email filtering, and remote management tools.
Customized paperless software solutions, including webmaster tools, dial up networking logger, and paper and e-documents managers.
Products and services to help protect homes and business computers from viruses, hackers, spam and abuse. Provides both free and pay services and virus information.
|Safe Data Technologies|
Newsletter manager with templates and automatic subscribe and unsubscribe option, secure and fully encrypted password manager, global email relay service, and attachment mail service that sends small or large files to single or multiple recipients.
Firewall software, Internet sharing, safe Internet access, Internet acceptable use, and a variety of network utilities. Visit the solutions section to determine which product is required.
Email, file and hard disk encryption software, access control, authentication and password management solutions, SIM/smart cards and readers for security applications and encrypted secure flash drives for corporate and individual users.
Filtering software that is designed primarily for home, educational and small business use. Runs secretly in the background, analyzing Internet activity, and can be configured to be completely invisible to the user.