enforcement shareware downloads


Search results for «enforcement»:

GeekAlarm! 2.0 GeekAlarm! 2.0
… e… 

CopMan 3.12.15 CopMan 3.12.15
… eed regarding your personnel instantly. Once you've used CopMan to track your sworn and non-sworn employees, you'll wonder how you ever managed without it!!… 

Trisnap 2.0 Trisnap 2.0
…  the easy to use wizard you may never need to run another scan! Trisnap is that effective in protecting your system against Malware Infestations!… 

SpaceGuard SRM 6.0 Build 1113 SpaceGuard SRM 6.0 Build 1113
… ta policy. The Active Directory integration will ensure your quotas are automatically assigned to its owner and mail notifications are always delivered to the correct user.… 

Citation 3.15.15 Citation 3.15.15
… nting options that let you print any one citation, or any list of citations. Altogether, Citation is a powerful, flexible tool for entering and maintaining a searchable, printable database of your agency's traffic citations.… 

TrafficQuota 1.0 TrafficQuota 1.0
…  his traffic exceeds a quota. - Any kind of ISA Server user authentication is supported. - It is possible to break all users' connections immediately when traffic exceeds a quota. - Active Directory is supported.… 

Captain Nemo 3.31 Captain Nemo 3.31
…  features a file viewer, which allows you to see the content of almost any file a search function, which enables you to do extensive search for containing text or files display of the owners and attributes of every file… 

Formdocs 7.0.24 Formdocs 7.0.24
… -functional but product logo appears on printed output.… 

Trojan Slayer 2.0.0 Trojan Slayer 2.0.0
… which helps to protect your computer from Trojan infections. It learns what programs you use on your computer, creating a list of "good" programs. Once it has learned what programs are acceptable on your computer, you can switch to one of several enforcement modes, where it runs continuously.… 

PGP Universal . Beta 1 PGP Universal . Beta 1
… P Universal is automatic and transparent to users, allowing them to concentrate on business requirements rather than learning and adhering to security policy or using desktop-oriented solutions. It also allows companies to extend internal policy enforcement to external suppliers, partners, resel… 


Related: enforcement  law enforcement  policy enforcement  trial enforcement  coding standards enforcement