Download Security Curator 5.7 B2070 Beta - Security Curator is a software product designed to provide information security...
Software Index
Windows Software Security Tools  

Security Curator 5.7 B2070 Beta

download download home home   report broken
important software information
company name:
AtomPark Software
license: Shareware
minimum requirements:
functional limitations:
Security Curator 5.7 B2070 Beta description
Security Curator is a software product designed to provide information security for your company, including monitoring and control of personnel to improve business efficiency. The software allows you to: Detect and prevent possible information leakage. Find out the most time-consuming computer processes run by each and every staff member. Block access to prohibited websites and files. Improve the efficiency of individual departments as well as the company in general. According to statistics, most information outflow occurs due to negligence of staff or through a deliberate employee leak. In order to prevent information leakage in a timely manner, employee work computer activities may be constantly monitored. Logs can expose almost all activities performed on work computers. Activity logging allows the evaluation of personnel effectiveness. Logs record the duration of inappropriate time usage and can identify potential sources of confidential information leakage. Information and man-hours are the main resources of modern companies. With Security Curator software, you can monitor, analyze and optimize the use of these resources in your company. With Security Curator, you can eliminate the possibility of improper employee use of time: simply block access to all objectionable sites and programs. Productivity rises after the implementation of Security Curator. Implementation of staff monitoring increases the softwareOCOs productivity by several times. Have you ever wondered about the effectiveness of your staff? Most people tend to think that they are working too much. They do not reflect on the fact that, according to their labor contracts, they are required to work full-time. Employees are often looking for possible ways to spend a workday doing less work: viewing entertainment and news websites, engaging in social networking and online gamesOCo all of these actions reduce staff productivity.Release notes: New ReleaseTE Main dialog of Administrators panels was redesigned; access to the main program has become more convenient.TE Implemented the automatic update feature of agentOCOs modules on users' computers, which greatly simplifies the process of updating the system.TE Quick Set Up wizard for the whole system, which simplifies the process of configuring of the product.TE Implemented feature of centralized exception of monitored applications.TE Ability to disable certain types of monitoring for selected agents added.TE Implemented simplified banning of prohibited actions: blocking of programs and websites.TE Ability to enter a range of networks to add agents. This greatly accelerates the process of installing large quantity of agents. [ Security Curator full changelog ]
Similar software
LAlarm - Free Laptop Alarm 5.7 B (Popularity: ) : LAlarm is a free laptop alarm. LAlarm emits a loud alarm sound when a thief tries to steal a laptop and it recovers and destroys sensitive data if the laptop is stolen. Besides, it alarms when the battery is under ...
Files Terminator Free (Popularity: ) : Secure deletion of sensitive data! Files Terminator Free is an easy to use application that allows users to permanently delete their files and wipe free disk space. The utility protects the users privacy by permanently delete sensitive documents, images, videos ...
uHook USB Disk Security (Popularity: ) : About uHook USB Disk Security: uHook USB Disk Security is a usb security solution to protect your files from getting stolen or accidentally leaked out of your PC through unauthorized USB storage devices like Flash Drives, External USB Hard Drives, ...
ProtectStar Data Shredder Professional (Popularity: ) : The new version 2.5 Professional of ProtectStar Data Shredder is now available as download and as a free upgrade for current clients. The professional award-winning Windows software for secure deletion of data and storage including state-of-the-art deletion logs ushers in ...
UltraSurf (Popularity: ) : Privacy, Security and Freedom Ultrasurf is a product of Ultrareach Internet Corporation. Originally created to help internet users in China find security and freedom online, Ultrasurf has now become the world's most popular pro-privacy, anti-censorship software, with millions of people ...
Kerio Control 7.4.1 Build (Popularity: ) : Kerio Control is an award-winning UTM firewall designed to protect medium and small businesses from a comprehensive range of invasive and crippling corporate network threats. Kerio ControlOCOs auto-updating security layer detects and prevents emerging threats automatically while providing network administrators ...
uHook USB Disk Security Personal (Popularity: ) : uHook USB Disk Security Personal is an application designed to prevent and protect your files from getting stolen or accidently leaked out of your PC. uHook USB Disk Security Personal will stop the eventual leakage through unauthorized USB storage devices ...
Zer0 (Popularity: ) : Zer0 is a user friendly file deletion tool with a high level of security. Using Zer0, users will be able to erase files and prevent file recovery by a third person. So far, no user reported an efficient method to ...
SecureTower (Popularity: ) : A complex data leak protection system, SecureTower is an essential for any business that extensively uses Internet communication channels in its daily working. The Internet is often the biggest source of any company's leaks and in order to preserve your ...
Geotag Security (Popularity: ) : Did you know that great picture from today's lunch might reveal your exact location (and we're not talking about the address on the menu)? What about those fun pictures of your kids at school? Think before you post. When you ...
Index.dat Viewer (Popularity: ) : Index.dat Viewer allows you to see the contents of files hidden on your computer that contain all of the Web sites that you have ever visited. Index.dat are files hidden on your computer that contain all of the Web sites ...
Malzilla (Popularity: ) : Web pages that contain exploits often use a series of redirects and obfuscated code to make it more difficult for somebody to follow. Malzilla is a useful utility that enables you to explore malicious webpages. Malzilla allows you to choose ...
User reviews

Write a review:
1 2 3 4 5 6 7 8 9 10
1=poor 10=excellent
Write review*
Your name*
  (Comments are moderated, and will not appear on this site until the editor has approved them)
Similar scripts
Security Hole In ASP.NET Beta 1 (Popularity: ) : Security Hole In ASP.NET Beta 1 is an article in which the author discusses about the process of securing the private settings of web applications by using Beta 1. The author gives details about two methods of providing security for ...
Web Host 5.7 (Popularity: ) : Web Host 5.7 is an online accounting system designed to be quick and easy to use. Auto-Billing Features as well as Credit Card and PayPal integration. East to install and very affordable.
Webhost 5.7 (Popularity: ) : WebHost 5.7 was designed to be a quick and easy billing module for the web host, web designer, web technician or programmer who needs an easy way to administrate monthly billing, one time charges and auto monthly billing. / Features: ...
Ponto Version Control 5.x-.0-beta (Popularity: ) : This module cannot compete with Version Control API in terms of functionality, but it is designed to be more lightweight.InstallationUnpack in your modules folder (usually /sites/all/modules/) and enable under Administer > Site Building > Modules. Requirements: · Drupal 5.x · ...
Post Also 5.x-.0-beta (Popularity: ) : Post Also uses xmlrpc to talk to various web engines using so-called blog APIs.At the moment only posting to other Drupal and Wordpress sites is supported.InstallationUnpack in your modules folder (usually /sites/all/modules/) and enable under Administer > Site Building > ...
WebCalendar integration 5.x-.0-beta (Popularity: ) : Only the 1.1.x versions of WebCalendar are supported.InstallationUnpack in your modules folder (usually /sites/all/modules/) and enable under Administer > Site Building > Modules. Requirements: · Drupal 5.x · WebCalendar
Save As Draft 5.x-.0-beta (Popularity: ) : The module implements new permissions that can be assigned to users and roles in order to achieve this functionality.InstallationUnpack in your modules folder (usually /sites/all/modules/) and enable under Administer > Site Building > Modules. Requirements: · Drupal 5.x
Node Access Control 5.x-.0-beta (Popularity: ) : Permissions can be dynamically created in the administration interface of this module. You can turn node access control on/off for each node type (default off). When node access control is enabled for a node type, the node form will allow ...
Block Save and Edit Buttons 6.x-.0-beta / 5.x-.0-beta (Popularity: ) : This module speeds up the development of custom blocks.InstallationUnpack in your modules folder (usually /sites/all/modules/) and enable under Administer > Site Building > Modules. Requirements: · Drupal 5.x/6.x
OOP 6.x-.x-dev / 5.x-.0-beta (Popularity: ) : This can be used to extend a core or contributed module with custom functionality without patching or forking the original module.InstallationUnpack in your modules folder (usually /sites/all/modules/) and enable under Administer > Site Building > Modules. Requirements: · Drupal 5.x/6.x
Security Curator 5.7 B2070 Beta
Rate me
supported os's
Windows 7
    Windows 7
    Windows Vista Starter
downloads 4
price $42.00
version 1.0
size in Kb 19,251
user rating 5/10
our rating 0 Stars
share info
Recommend Security Curator 5.7 B2070 Beta
Report spyware
New Software
Popular Software
Latest Reviews