|
More tags: monitor, audit, network, employee, government, business, compliance,
|
Category : |
Utilities - Security |
|
|
|
Platform : |
Win95, Win98, WinME, WinNT 4.x, Windows2000, WinXP, Windows2003 |
|
|
Price : |
USD 0 |
|
|
Developer: |
|
|
|
Rating : |
|
|
|
License : |
Freeware |
|
|
Limitations: |
N/A |
|
|
Date : |
07/06/2006 |
|
|
Size : |
7.13 MB |
|
|
3ami MAS is an employee monitoring and audit tool for business. Providing detailed and summary analysis of all user activity as well as hardware and software audits, it provides all the information you need to enforce your internal security policy and helps to ensure legal compliance. Transparent in operation, 3ami MAS Features comprehensive activity logging, keystrokes, screen-captures, exceptions analysis for users who exceed normal usage patterns, integration with Outlook, Lotus Notes and much more. An in-built SQL Interface and full multilanguage support makes 3ami MAS suitable for even the largest International companies. Exception Reporting easily and quickly identifies excessive use of specific applications and pinpoints the location and user. Reporting directly to your browser, detailed activity, graphical summaries, image thumbnails are produced with one click. Detailed hardware and software reports, historical system changes are also recorded for each workstation or user, enabling you to manage your assets and licence's easily, and effectively. Write-only data storage may be used for total security of recorded data and emails. Simple to install and use, the free version is limited to 2 workstations, is fully functional and contains no spyware, adware or popups of any kind. This version adds charts for SQL Reports and an Automatic Deployment tool. Important Note: 3ami MAS is not suitable for, is not supplied to, or supported for personal or home use. A business email address is required to enable the free version.
ISS Barcode IDCreative Collage FreePiratusImmobilier MarocSocidrogalcohol 2014KKM/BKP Audit Pendidikan KshtnClickarDDOS, Email Spoofing Detection
|
|
Also See
1)
Outlook Express Protector
Outlook Express Protector is designed for controlling access to Outlook Express and its e-mail and address data bases. It does not encrypt protected files and folders, however no programs can get acce...
License:Shareware USD 29
Size:0.62 MB
2)
InstallBlock
Install-Block allows you to require a password to be entered in order for new software to be installed on your computer. An ideal solution for parents, employers, and teachers who seek to secure their...
License:Shareware USD 19.95
Size:3.55 MB
3)
StormWindow 2000
Cetus StormWindow [TM] for Windows 2000 will allow the authorized user to add several types and degrees of protections to the desktop and system of a Windows 2000 computer. Intelligent use of StormWin...
License:Shareware USD 30
Size:1.25 MB
stormwindow, stormwindows, security, cetus, windows, windows 000, windows k, win000, wink, win k, registry, explorer, password,
4)
IDFile
File verification utility, uses SHA-2 algorithm....
License:Freeware USD 0
Size:0.22 MB
5)
CHAOS Public Key
CHAOS+PK uses the newest chaos. It is high speed and allows variable-length keys, making protection very reliable and suitable for use in working. Uses the Public Key for encryption CHAOS keys by send...
License:Shareware USD 59.95
Size:0,4 MB
6)
ANTITHIEFWARE
ANTITHIEFWARE is a program that eliminates all adwares, spywares, viruses, Dialers, and hijackers that might exist on your PC. ANTITHIEFWARE is a program that uses a database with tens of thousands fi...
License:Shareware USD 29.99
Size:0.45 MB
7)
asquared HiJackFree
a-squared HiJackFree is a detailed system analysis tool which helps advanced users to detect and remove all types of HiJackers, Spyware, Adware, Trojans and Worms. Manage all types of Autoruns on your...
License:Freeware USD 0
Size:1.54 MB
8)
Privacy Restorer
Your PC knows a lot about you. What websites you’ve visited. What you’ve seen and downloaded. Your passwords, personal preferences, files you’ve used, programs you’ve installed, your usage hab...
License:Shareware USD 29.95
Size:0.64 MB
9)
Privacy Keeper
Privacy Keeper is powerful privacy software to erase online Internet tracks and program activity. Privacy Keeper is a safe and easy-to-use privacy protection tool that securely deletes online Internet...
License:Freeware USD 0
Size:6.8 MB
10)
Beautiful Spyware Remover
Beautiful Spyware Remover is a popular and easy-to-use tool, Is the only company in the world that offers a 100% removal guarantee. Why accept a "solution" with anything less than 100%? With Beautiful...
License:Shareware USD 59.95
Size:2.12 MB
Tags: spyware, adware, remove, antispyware, remover, removal, spyware remover, remove spyware, adware remover
|
1)
AddressGrabber Standard
AddressGrabber is a data entry automation tool. It is a great time saving solution to entrepreneurs, sales and marketing folks, business people etc. The tool captures relevant contact details such as ...
License:Shareware USD 69.95
Size:
2)
Digital Camera Restoration Tool
Data Doctor Recovery software recovers deleted pictures audio video clips and photo. Restoration utility restore deleted jpeg, gif, bmp, mpeg, midi image files extracts lost snapshots due to accidenta...
License:Shareware USD 69
Size:1.70 MB
3)
ADWARESWEEPER
ADWARESWEEPER is a program that eliminates all adwares, spywares, viruses, Dialers, and hijackers that might exist on your PC. ADWARESWEEPER is a program that uses a database with tens of thousands fi...
License:Shareware USD 29.99
Size:0.52 MB
adware, adware, spyware, remover, removal, eliminator, free, anti, detection, removing, killer, from, detecting, detector, scan, blocker, checker, list, stopper, and, internet, protection, finder, delete, eliminate, adaware, disable, onlineprivacy, ads, gator, morpheus, kazaa, phishing, antiphishing, firewall, ers, protection, emails, spam, spoof, phony websites, securybanks phishing trojan, phishing scam, phishing scams,
4)
SSH Tunnel Client
SSH Tunnel Client allows to connect to different SSH-Servers. With the SSH Tunnel Client it is possible to connect each TCP/IP Service over a secure SSH-Tunnel. Supports local and remote forwarding wi...
License:Freeware USD 0.00
Size:3.34 MB
5)
Invisible Secrets Encryption Software
Invisible Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally in...
License:Shareware USD 39.95
Size:2.68 MB
6)
Spyware Killer
Free Spyware and Adware Detection & Removal Software. Provides a real-time protection solution against spyware & adware. Spyware Killer detects and remove a multitude of spyware, adware, Trojan horses...
License:Shareware USD 25.95
Size:16 MB
7)
Network Security Map
The network security map displays network security vulnerabilities associated with TCP/IP and LAN/WAN protocols. It also displays the latest network and information security technologies and solutions...
License:Data only USD 19.97
Size:0.04 MB
8)
Smart PC
By a few easy steps you can make your PC run faster, cleaner and error-free with the help of a new award-winning tool - Smart PC. The software fixes stubborn errors, cleans-up space-wasting junk and d...
License:Shareware USD 29.95
Size:2.24 MB
9)
XchangeCL
Need to change some text that could be in hundreds of text files? Well XchangeCL can make this easy for you. It will find files using wild cards and find and replace multiple strings in each one....
License:Shareware USD 40
Size:0.5 MB
10)
PC Serial Nr
This handy PC Serial Nr tool returns basic computer info as : Computer name, User account, Computer Manufacture, Model, Serial number, IP-address(es) Specially created to help PC-administrators or hel...
License:Freeware USD 0
Size:0.48 MB
Tags: address, number, serial, model
|
|
More tags: monitor, audit, network, employee, government, business, compliance,
|
|