Information Security Research Library

Powered by Bitpipe.com

Acceptable Use PoliciesIT Downloads

  • AlienVault Unified Security Mangement: Real-time Threat Detection

    Sponsored by: AlienVault

    This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.

  • Evaluate: IBM Endpoint Manager

    Sponsored by: IBM

    This 30-day trial offers an endpoint manager that provides a single-agent, single-console approach to lifecycle management, security, and endpoint protection.

  • Genius Project Version 7.0

    Sponsored by: Genius Inside

    Download your free, 15-day trial of Genius Project and discover the benefits of a system designed to eradicate common project portfolio management (PPM) challenges such as a lack of visibility and poor collaboration. Realize the advantages of a system consolidates all project information and provides you with complete 360-degree visibility.

  • IBM Tivoli Endpoint Manager: Unified Lifecycle Management for Distributed Endpoints

    Sponsored by: IBM

    Explore this menu interface that provides a high-level overview, product demonstration, expert interviews, and resource links for a top vendor's endpoint manager solution. View now to see what unified endpoint management can deliver to your organization.

  • A free Demonstration of Panda Cloud Systems Management

    Sponsored by: Panda Security

    Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.

  • Active Administrator™, Version 5.6.1

    Sponsored by: ScriptLogic Corporation

    Active Administrator™ is a comprehensive and proactive Active Directory management solution. Active Administrator provides four powerful integrated AD management features within one console, including centralized event auditing and reporting, back-up and recovery, Group Policy offline editing and rollback, and simplified delegation of AD rights.

  • AlienVault Unified Security Management: Complete Security Visibility

    Sponsored by: AlienVault

    AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.

  • Application Discovery Tool

    Sponsored by: Sophos, Inc.

    With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.

  • Best for Business: Security and Manageability on the Chip

    Sponsored by: Intel Corporation

    This demo explains how to secure and manage notebooks with Intel Centrino2 with vPro technology and desktops with Intel Core 2 processors with vPro technology.

  • CA Clarity Project and Portfolio Management

    Sponsored by: CA Technologies.

    Watch this in-depth product demo to learn how CA Clarity works. This project and portfolio management solution enables users to view all projects, programs, services, assets, and applications in a collection of portfolios.

  • CA eHealth Performance Manager Demo

    Sponsored by: CA Technologies.

    Download this demo to learn how you can proactively monitor performance of data and voice networks, physical and virtual systems, environmentals, databases and client/server applications across IT, all from one interface, before your business is negatively impacted.

  • Centrify Express 2010.1

    Sponsored by: Centrify Corporation

    Centrify Express is the #1 choice of IT professionals for Active Directory-based single sign-on to Linux and Mac systems.  It is a free solution with more functionality, tools, and upgrade options than alternative offerings.

  • Control Compliance Suite Trialware

    Sponsored by: Symantec Corporation

    Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial.

  • CORE IMPACT Pro V10

    Sponsored by: Core Security Technologies

    Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.

  • Deep Defender Blogs

    Sponsored by: Intel

    Find out why protecting your operating system no longer serves as enough security to keep your business safe. By downloading this software, you can see the results of stopping stealth attacks with endpoint security that goes beyond the operating system.

  • ESET Online Scanner

    Sponsored by: ESET

    ESET Online Scanner is designed only to detect and remove threats via on-demand scan and is not a permanent proactive antivirus solution. To receive complete proactive protection, get a free custom business trial and find out why IT pros worldwide recommend ESET for server-to-endpoint security.

  • ESET: Threat Center

    Sponsored by: ESET

    IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.

  • ExtremeZ-IP: Could ExtremeZ-IP Help Your Business?

    Sponsored by: Acronis

    Find out if ExtremeZ-IP is right for your environment and can deliver a better experience for Mac users and your IT department.

  • Hitachi IT Operations Analyzer Software

    Sponsored by: Hitachi Data Systems

    Hitachi IT Operations Analyzer delivers all-in-one monitoring for the data center. A single interface provides a view to the availability and performance of servers and network and storage devices on a network. It eases troubleshooting without agents.

  • Hitachi IT Operations Analyzer Software

    Sponsored by: Hitachi Data Systems

    Hitachi IT Operations Analyzer delivers all-in-one monitoring for the data center. A single interface provides a view to the availability and performance of servers and network and storage devices on a network. It eases troubleshooting without agents.

  • HP GlancePlus

    Sponsored by: Hewlett-Packard Company

    Keep business applications running smoothly and efficiently. HP GlancePlus software arms your organization with powerful system performance monitoring and diagnostic capabilities. It enables you to easily examine system activities, identify and resolve performance bottlenecks, and tune your system for more efficient operation.

  • HP Network Automation 9.00 Evaluation

    Sponsored by: Hewlett-Packard Company

    HP Network Automation software tracks, regulates, and automates configuration and software changes across globally distributed, multi-vendor networks.

  • IBM Lotus Complete Collaboration Express Starter Pack

    Sponsored by: IBM

    Check out this software demo to see how the IBM Lotus Complete Collaboration Express Starter Pack works in conjunction with Lotus Domino and other applications to provide excellent collaboration capabilities and numerous other benefits.

  • IBM Lotus Sametime Demo: Unified Communications and Collaboration Solution

    Sponsored by: IBM

    IBM Lotus Sametime software provides an easy-to-use unified communications and collaboration solution with the policy controls and security features your business requires. Check out this demo to see how IBM Lotus Sametime can be used in everyday business situations to quickly and efficiently communicate and drive business success.

  • IBM Tivoli Live Monitoring Services Demo

    Sponsored by: IBM

    Watch this demo to see how Tivoli Live can help you manage the health and performance of your data center's resources—including operating systems, virtualized servers, middleware and applications.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.