The Protector: Unified Threat Management 6.2.7

"The Protector: Unified Threat Management" snapshot

Unified threat management such as the Protector from Secpoint allows you to secure your entire company network and protected it from hackers and malware with a single appliance.

Software information
Platform:
Windows 7/Vista/XP, Unix/Linux, Mac OS
Publisher:
Victor Christiansenn
Price:
$195
File size:
86.02 Mb
Date added:
September 12, 2011
Screenshot:
Product page:
Description from the Publisher
The Protector is one of the industry leaders in unified threat management, offering a complete solution to protect large corporate networks of up to 1000 users with a single, centrally located appliance. If your business is feeling the damage done by hacking attempts, malicious software and a never-ending influx of spam, then administrators should certainly start looking for unified threat management solutions such as the Protector.
Users reviews & testimonials

This software is not reviewed yet.

Other downloads from this publisher

Penetrator Vulnerability Scanner is a complete solution for thoroughly scanning your company's network including all of its clients, servers and devices for vulnerabilities. It automates the process, saving huge amounts of manual labor.

Portable Penetrator is a complete solution for securing your wireless network and identifying any security flaws before hackers have a chance to do so. This wifi security software provides detailed reports, exposing security issues quickly.

Google Hack Database is a completely free IT security tool which allows you to scan your web addresses for major vulnerabilities and match them to those found in the popular Google Hack Database.

Netbios Share Scanner is a completely free network share scanner from one of the leading IT security software developers. It runs on both Linux- and Windows-based systems.

TCP Port scanner Multi threaded with possibility to scan 65535 TCP ports on an IP address. You can specify how many threads to run and the timeout. Further more it will tell you the MAC address of the target and the service running.