Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Downloads // Jul 2015

    IBM X-Force Exchange

    A new platform to consume, share, and act on threat intelligence – backed by the reputation and scale of IBM X-Force.

    Sponsored By IBM

  • Downloads // Jul 2015

    IBM Security Network Protection No Charge Trial

    30 days no charge offer to try out IBM Security Network Protection Virtual

    Sponsored By IBM

  • Downloads // May 2015

    Do your digital assets have real-world protection from advanced cyber-attacks?

    Intel Security has developed the world’s first software-based testing environment for advanced evasion techniques (AETs). With this free security tool, you can test your organization’s network security devices against AETs that are increasingly used in sophisticated and targeted cyberattacks: • Launch controlled AET-borne attacks at your own defense technology....

    Sponsored By Intel Security

  • Downloads // Jan 2015

    Network Performance Monitoring Tool from SolarWinds

    Monitoring your network with SolarWinds Network Performance Monitor (NPM) will not only help you improve the performance of your network, but it can also have a direct impact on your organization’s bottom line. NPM will assist in: Simplifying detection, diagnosis, & resolution of network issues before outages occur Tracking response...

    Sponsored By Solarwinds APAC

  • Downloads // Mar 2014

    Download a FREE Trial of the Network Performance Monitor from SolarWinds

    Fix spotty wireless coverage and improve connectivity with the wireless heat maps in SolarWinds® Network Performance Monitor. Display wireless coverage and signal strength using automated polling of adjacent access points. Map the location of connected clients within a few meters. Generate user-sourced wireless signal strength surveys for coverage in...

    Sponsored By SolarWinds

  • Downloads // Nov 2009

    TechRepublic's Geek Gift Guide 2009

    Regardless of their current economic situation, technology geeks love to give and receive electronic gadgets. And, it is not just any gadget they want, but the best electronic gizmos. TechRepublic once again brings together our unique perspective reviews of some of the best geek gifts on the market, all just...

    Sponsored By TechRepublic

  • Downloads // May 2015

    A Network Performance Monitor Tool for You

    Monitoring your network with SolarWinds Network Performance Monitor (NPM) will not only help you improve the performance of your network, but it can also have a direct impact on your organisation’s bottom line. NPM will assist in: Simplifying detection, diagnosis, & resolution of network issues before outages occur Tracking response...

    Provided By SolarWinds

  • Downloads // Apr 2015

    Download your trial of AppAssure (TM) for an advanced data protection tool that unifies backup, replication and recovery in one software solution

    Download your trial of AppAssure™ - an advanced data protection tool that unifies backup, replication and recovery in one software solution. Designed for virtual, physical and cloud environments, AppAssure continually checks and updates your backups to ensure they’ll be ready when you need them. AppAssure stores your backups in a...

    Provided By Dell Software

  • Downloads // Apr 2015

    Find out who is sucking your bandwidth! Download Bandwidth Analyzer Pack now!

    Is someone or something sucking all your network bandwidth? SolarWinds® Bandwidth Analyzer Pack: Reveals which users, applications, and protocols are consuming the most bandwidth Contains out-of-the-box dashboards, alerts, reports, and shows performance statistics in real time via dynamic, drillable network maps Includes multi-vendor support - Analyze Cisco®...

    Provided By SolarWinds

  • Downloads // Sep 2014

    You're A Few Steps Away From Future-Proofing Your Career

    Prepare for the future of networking today with free 60-day trial software, web-based training, and a Brocade Network Function Virtualization Certification ($650 value). BE A BROCADE CERTIFIED PROFESSIONAL NOW. Build your skills by creating a virtualized network with the Brocade Vyatta vRouter Stay ahead of the industry's...

    Provided By Brocade

  • Downloads // Sep 2014

    Your FREE 60-Day Trial Starts Here

    Get instant access to the Brocade Vyatta 5400 vRouter. Download your free virtual router trial now and enjoy 24/7 support. KEY FEATURES INCLUDE: Advanced IPv4 and IPv6 Unicast and Multicast Stateful firewall, IPsec, SSL-Based OpenVPN and DMVPN Linux-based extensible network OS Hypervisors Supported: VMware ESX, Citrix...

    Provided By Brocade

  • Downloads // Aug 2014

    Easy-to-Use and Affordable Remote IT Administration and Support Software

    DameWare® Remote Support (DRS) simplifies IT service management & support process by allowing IT admins to remotely connect to and troubleshoot end-user computers located both inside & outside the corporate firewall. Includes a built-in remote control tool for remote access to Windows®, Linux® & Mac OS® X computers Lets...

    Provided By SolarWinds

  • Downloads // Jun 2014

    Citrix NetScaler VPX - 90 Day Trial

    Try the Citrix NetScaler VPX for 90 days and see for yourself the benefits for web app acceleration, availability and security. Key benefits of NetScaler VPX Freedom to choose your platform - Virtual appliance runs on Citrix XenServer, Microsoft or VMware Simple to install and manage - The...

    Provided By Citrix

  • Downloads // May 2014

    Recover from a Network Configuration Error in Under Five Minutes

    Researchers say that over 80% of network outages are caused by human error. Many errors are made when someone makes changes to a device configuration. When a network outage occurs, the standard triage questions are "what just happened", "did something fail or was something changed", and "how do we get...

    Provided By SolarWinds

  • Downloads // May 2014

    IBM Platform LSF Evaluation/Download

    IBM Platform LSF is a powerful workload management platform for demanding, distributed HPC environments. It provides a comprehensive set of intelligent, policy-driven scheduling features that enable you to utilize all of your compute infrastructure resources and ensure optimal application performance.

    Provided By IBM

  • Downloads // Apr 2014

    Comprehensive Virtualization Management - From VM to Spindle

    SolarWinds Virtualization Manager delivers integrated VMware & Microsoft Hyper-V capacity planning, performance monitoring, VM sprawl control, configuration management, & chargeback automation. All in one awesomely affordable product that’s easy to download, deploy, and use. Virtualization Manager auto-discovers the virtual machines in your environment making the creation of your monitoring environment...

    Provided By SolarWinds

  • Downloads // Apr 2014

    Business Essential: Complimentary Vulnerability Scan

    This complimentary security scanner searches for endpoint vulnerabilities, including misconfigurations, missing patches, open services and backdoors. Run the scan to receive a detailed report so you can address security vulnerabilities before they become a problem. Find out if your endpoints are secure. Try this FREE vulnerability scanner now.

    Provided By Webroot Software

  • Downloads // Mar 2014

    Big Data in HR and Finance: Understanding the Real Value

    Big Data continues to create new ways of gathering and analyzing information. In the latest research by Harvard Business Review Analytics Services, a real-world lens of big data is provided for HR and Finance. View this infographic below to discover why big data matters to you and your organization.

    Provided By Workday

  • Downloads // Feb 2014

    AppAssure 5 Trial

    Download your trial of AppAssure™ - an advanced data protection tool that unifies backup, replication and recovery in one software solution. It offers a variety of flexible recovery options so you can retrieve your data quickly, whether it resides on physical or virtual servers, or in the cloud.

    Provided By Dell Software

  • Downloads // Feb 2014

    Get the Lavastorm Analytics Engine Free – Try for yourself this new Agile Way to Analyze, Optimize and Control Data and Processes

    Download your free copy of the Lavastorm Analytics Engine Public Edition, an easy-to-use self-service business analytics solution that empowers analysts to rapidly acquire, transform, analyze and visualize data. Use it to: Acquire, integrate, and analyze data 10x faster Respond to information requests more quickly Eliminate Excel...

    Provided By Lavastorm Analytics

  • Downloads // Jan 2014

    Do More, Spend Less. Top 5 Reasons to Choose SolarWinds Log & Event Manager

    Real-Time, In-Memory, Event Log Correlation:Troubleshoot performance problems by understanding the relationship between different activities using multiple event correlations. Out-of-the-Box Security and Compliance Reporting Templates:Quickly & easily generate and schedule compliance reports using over 300 audit-proven templates. Fast and Easy Forensic Analysis:Quickly conduct forensic analysis to figure...

    Provided By SolarWinds

  • Downloads // Nov 2013

    IBM Security AppScan

    IBM® Security AppScan® enables organizations to assess the security of their applications and achieve regulatory compliance by identifying vulnerabilities and generating reports with intelligent fix recommendations to ease remediation.

    Provided By IBM

  • Downloads // Nov 2013

    IBM Worklight Developer Edition

    IBM® Worklight is an open, comprehensive, and advanced mobile application platform that helps organizations extend their business to mobile devices. Try it today.

    Provided By IBM

  • Downloads // Nov 2013

    Your Network's Early Warning System

    Tired of getting calls asking if the network is down? SolarWinds® NPM works as your early warning system to quickly detect, diagnose, and resolve network performance problems and outages. Top 5 Reasons to Try SolarWinds Network Performance Monitor 1. Quick, Do-It-Yourself Deployment: Download. Install. Deploy. Deploying SolarWinds NPM...

    Provided By SolarWinds

  • Downloads // Oct 2013

    Intel® VTune ™ Amplifier XE 2013

    Advanced performance and thread profiler for C, C++, C#, Fortran, Java, and MPI developers. New pre-sets deliver easier ‟point and shoot” profiling set-up. A threading timeline, data filtering, frame analysis, and source display make it easier to tune your application for today’s and tomorrow’s processors. Powerful bandwidth and memory access...

    Provided By Intel Software

  • Downloads // Sep 2013

    Free 20-day Trial: Netwrix Auditor Change Auditing for Your Active Directory

    Uncontrolled changes in Active Directory can lead to unauthorized additions to groups, modifications to objects and permissions, or even worse, deletions of your OUs. Netwrix Auditor provides complete visibility over changes to Active Directory configurations, automatically auditing management of every object, giving answers to the questions around when changes...

    Provided By netwrix

  • Downloads // Aug 2013

    Download a Free AppAssure 5 Trial

    Designed for virtual, physical and cloud environments, Dell AppAssure 5 provides continual data and application backups and flexible recovery options for unparalleled data protection. Download a Free Trial!

    Provided By Dell

  • Downloads // Jun 2013

    Control Your IT Universe with DameWare: Remote Support Made Simple, Affordable & Mobile

    DameWare Remote Support (DRS) delivers the tools you need to remotely manage the Windows® desktops and laptops in your IT universe. DRS includes DameWare Mini Remote control for powerful remote troubleshooting & management. Comprehensive Active Directory functionality, including filtering objects & attributes. Inventory & manage everything from domains to logs...

    Provided By SolarWinds

  • Downloads // May 2013

    Enhance IT Security with SolarWinds® Log & Event Manager

    What will you do when the security systems implemented to secure your IT environment are not secure anymore? Do you know what’s lurking in your network to exploit vulnerabilities and compromise IT security? SolarWinds Log & Event Manager (LEM) provides real-time insight and awareness into all your security, operational...

    Provided By SolarWinds

  • Downloads // May 2013

    Active Administrator Trial

    Take Active Administrator for a spin and see for yourself how this powerful, all-in-one solution allows you to control auditing, security, recovery, and health for Active Directory. It offers centralized management of Active Directory and Group Policy, saving you time and putting you in control over your critical AD...

    Provided By Dell Software

  • Downloads // May 2013

    Security Explorer Trial

    Take Security Explorer for a test drive, and see how it can deliver a unified solution for complete access control and security management across your entire Windows network. It’s a powerful, yet intuitive solution that takes the complexity out of security management. Your free trial is a Web-based, self-contained virtual...

    Provided By Dell Software

  • Downloads // May 2013

    It's time for multi-platform Enterprise Mobility Management

    Smartphones and tablets are proliferating in the workplace, with corporate and personal-owned devices often used side-by-side, driven by user demand and business strategy. Support of BYOD, end-user device choice, multiple operating systems and personal use on corporate devices is increasingly common. But with multiple platforms, mixed ownership and higher usage...

    Provided By BlackBerry Enterprise Service

  • Downloads // Apr 2013

    Ditch your spreadsheets & download a FREE IP Address Management Tool!

    Free IP Address Tracker from SolarWinds lets you track an unlimited number of IP addresses giving you a unified view of your entire IP address space. Now you can see which IP addresses are in use and which aren’t. Stop wasting precious time wading through cumbersome spreadsheets. Download free...

    Provided By SolarWinds

  • Downloads // Dec 2012

    Download a free 30-day trial of SolarWinds Server & Application Monitor now!

    Understanding how to achieve optimal performance for applications, hardware and operating systems will enable your organization to continually deliver on its core value proposition. Unfortunately, knowing what to monitor and how to resolve issues isn't intuitive. Finding the right technology partner to help guide this process across applications and platforms...

    Provided By SolarWinds

  • Downloads // Nov 2012

    5 Free Tools for Network Troubleshooting & Monitoring

    The ability to monitor your network in real-time can mean the difference between stagnation and success. The right mix of solutions and strategy can help ensure that your online ecosystem is up and running at all times. SolarWinds tools enable you to configure, monitor and troubleshoot your network easily...

    Provided By SolarWinds

  • Downloads // Oct 2012

    Server Backups and Configuration Management at Light Speed

    Don't allow simple tasks to delay your business processes and cost you money. Find out how to backup, transfer and secure your files with no effort at all. The need to automate new configurations and configuration backups has never been more important. As organizations expand internationally and more and...

    Provided By SolarWinds

  • Downloads // Sep 2012

    LogMeIn: Smartphone and PC remote support that the pros use.

    LogMeIn Rescue provides instant access to PCs and mobile devices from anywhere in the world. LogMeIn Rescue enables IT to do more: quickly access, diagnose and solve IT problems anywhere. Remote reboot, easy-to-use screens, comprehensive reporting, multiple user sessions, and in-app Chat. Improve productivity, customer satisfaction and resolve issues...

    Provided By LogMeIn

  • Downloads // Sep 2012

    Free Virtual Appliance - Free VM Backup - Download for Hyper-V or VMware

    Unitrends Enterprise Backup Free Edition: Enterprise-Class Data Protection for Every Business. Unitrends has provided next-generation enterprise-class data protection to thousands of customers. Now with Unitrends Enterprise Backup™ we are offering a software-only solution available as a virtual appliance for Microsoft Hyper-V and VMware vSphere. Use our Free Edition to...

    Provided By Unitrends

  • Downloads // Sep 2012

    Security Explorer trial download

    Secure Your Windows Environment for Free Right now, someone with elevated permissions is logging into your Windows network and accessing secure resources. Should he have access at all? Quest® Security Explorer centrally manages access controls and security on Windows and SQL Servers, SharePoint, Exchange and workstations across your business....

    Provided By Dell Software

  • Downloads // Sep 2012

    Quest Workspace Privilege Manager

    Centrally Manage User and Desktop Permissions Privilege Authority is an affordable Windows privilege management solution that centrally manages and applies permissions. Eliminate the pain of individually managing users and desktops - get a free trial of Privilege Authority today.

    Provided By Dell Software

  • Downloads // Mar 2014

    Download a FREE Trial of the Network Performance Monitor from SolarWinds

    Fix spotty wireless coverage and improve connectivity with the wireless heat maps in SolarWinds® Network Performance Monitor. Display wireless coverage and signal strength using automated polling of adjacent access points. Map the location of connected clients within a few meters. Generate user-sourced wireless signal strength surveys for coverage in...

    Sponsored By SolarWinds

  • Downloads // Nov 2009

    TechRepublic's Geek Gift Guide 2009

    Regardless of their current economic situation, technology geeks love to give and receive electronic gadgets. And, it is not just any gadget they want, but the best electronic gizmos. TechRepublic once again brings together our unique perspective reviews of some of the best geek gifts on the market, all just...

    Sponsored By TechRepublic

  • Downloads // May 2015

    Do your digital assets have real-world protection from advanced cyber-attacks?

    Intel Security has developed the world’s first software-based testing environment for advanced evasion techniques (AETs). With this free security tool, you can test your organization’s network security devices against AETs that are increasingly used in sophisticated and targeted cyberattacks: • Launch controlled AET-borne attacks at your own defense technology....

    Sponsored By Intel Security

  • Downloads // Jul 2015

    IBM X-Force Exchange

    A new platform to consume, share, and act on threat intelligence – backed by the reputation and scale of IBM X-Force.

    Sponsored By IBM

  • Downloads // Jul 2015

    IBM Security Network Protection No Charge Trial

    30 days no charge offer to try out IBM Security Network Protection Virtual

    Sponsored By IBM

  • Downloads // Jan 2015

    Network Performance Monitoring Tool from SolarWinds

    Monitoring your network with SolarWinds Network Performance Monitor (NPM) will not only help you improve the performance of your network, but it can also have a direct impact on your organization’s bottom line. NPM will assist in: Simplifying detection, diagnosis, & resolution of network issues before outages occur Tracking response...

    Sponsored By Solarwinds APAC

  • Downloads // Nov 2006

    10+ e-mail best practices to share with your users

    These days, e-mail is used by just about everyone. Unfortunately, a lot of users out there don't use it right, flirting with security risks, consuming excessive bandwidth, and practicing lousy etiquette. These basic usage guidelines, encompassing things like virus protection, e-mail scams, attachments, and forwarding practices, will help safeguard your...

    Provided By TechRepublic

  • Downloads // Aug 2010

    Sample storage service catalog

    This sample Excel worksheet allows administrators to quantify the storage offering for their storage area network (SAN) and data protection infrastructures. The material is an adaptation of the Storage Networking Industry Association's Tiered Services Catalog. Read the related entry in our Servers and Storage blog.

    Provided By Rick Vanover

  • Downloads // May 2014

    IBM Platform LSF Evaluation/Download

    IBM Platform LSF is a powerful workload management platform for demanding, distributed HPC environments. It provides a comprehensive set of intelligent, policy-driven scheduling features that enable you to utilize all of your compute infrastructure resources and ensure optimal application performance.

    Provided By IBM

  • Downloads // Jan 2007

    Use this template to configure a Cisco PIX Firewall

    Configuring a new Cisco PIX Firewall can be challenging and time-consuming. Why not automate the process with an Excel template? As a companion download to David Davis' article, "Configure a Cisco PIX Firewall with this template," this Excel workbook will generate the appropriate configuration for the firewall. All...

    Provided By David Davis

  • Downloads // Jan 2007

    TechRepublic's ultimate guide to enterprise wireless LAN security

    Enterprise wireless LAN security is a persistent concern for every system administrator and CIO. Threats from both within and without the enterprise threaten your data each and every day. This download gives you the basic foundation you need to secure your enterprise wireless connections by detailing security protocols such...

    Provided By George Ou

  • Downloads // Nov 2005

    Presentation: Raise user awareness about password security

    Employees don't always realize the importance of creating and safeguarding strong passwords. This presentation will give you a chance to explain best practices and walk users through your corporate password policy. User education is often cited as one of the most effective ways to help boost information security and...

    Provided By TechRepublic

  • Downloads // Aug 2006

    10 ethical issues confronting IT managers

    Advances in technology, just like advances in any other area of endeavor, can generate societal changes that should cause us to reexamine our behavior. The dynamic nature of civilization means some components of ethical codes that were perfectly appropriate in previous generations may no longer apply. CIO Jeff Relkin...

    Provided By Jeff Relkin

  • Downloads // Jul 2008

    Track a user's Internet Explorer History with IEHistoryView

    Tracking a user's browsing history can be both an expensive and a daunting task, especially if you're a one-man shop in a small company. IEHistoryView from NirSoft is a simple, yet powerful, tool you can use to quickly see a user's browsing history. This download is also available as an...

    Provided By Wally Bahny

  • Downloads // Jun 2009

    End-user password security

    Protecting your organization's important data starts with password security best practices. Use this Microsoft PowerPoint presentation to teach your users how to create strong passwords that are easy to remember.

    Provided By TechRepublic.com

  • Downloads // Jun 2009

    Sample social networking policy

    IT Pro Rick Vanover has crafted a sample social networking policy that you can customize to fit the needs of your organization. As sites like LinkedIn, Twitter, and Facebook become more intertwined with business uses, you need to establish clear guidelines for employees on workplace access and appropriate usage as...

    Provided By Rick Vanover

  • Downloads // Sep 2009

    10 ways to recover a corrupted Excel workbook

    When an Excel file goes haywire, don't give up hope. Using one of these recovery tricks, you may still be able to salvage the data.This download is also available as an entry in our 10 Things blog.

    Provided By Susan Harkins

  • Downloads // Aug 2009

    10 ways to detect computer malware

    In the ongoing war against malware threats, you need tools that will baseline your system, detect vulnerabilities, and remove existing malware. This download is also available as an entry in our 10 Things blog.

    Provided By Michael Kassner

  • Downloads // Oct 2010

    Microsoft Exchange 2010 Trial

    Free Trial of Microsoft Exchange 2010.

    Provided By Microsoft

  • Downloads // Jan 2010

    VIPRE® Antivirus + Antispyware Free Trial

    VIPRE Antivirus + Antispyware is high-performance antivirus software that doesn't slow down your PC like older, traditional security products. Old-style antivirus products have stacked layer upon layer of engines, and created bloatware in the process. They slow down your PC, have slow scan times and cause performance problems. VIPRE's...

    Provided By GFI Software, formerly Sunbelt Software

  • Downloads // Mar 2014

    Big Data in HR and Finance: Understanding the Real Value

    Big Data continues to create new ways of gathering and analyzing information. In the latest research by Harvard Business Review Analytics Services, a real-world lens of big data is provided for HR and Finance. View this infographic below to discover why big data matters to you and your organization.

    Provided By Workday

  • Downloads // Apr 2015

    Download your trial of AppAssure (TM) for an advanced data protection tool that unifies backup, replication and recovery in one software solution

    Download your trial of AppAssure™ - an advanced data protection tool that unifies backup, replication and recovery in one software solution. Designed for virtual, physical and cloud environments, AppAssure continually checks and updates your backups to ensure they’ll be ready when you need them. AppAssure stores your backups in a...

    Provided By Dell Software

  • Downloads // Jan 2010

    Practical application of biometrics

    Security expert Tom Olzak explains what you need to know if you're considering implementation of a biometrics solution. He discusses how the technology can fit into your existing security framework, examines the risks and benefits of the most popular biometrics approaches, and walks through a fictional case study that illustrates...

    Provided By Tom Olzak

  • Downloads // Feb 2011

    Five tips for removing viruses and spyware from client machines

    IT consultants must regularly remove stubborn, regenerative, and corrupting spyware and viruses from client machines. These pointers will help you return systems to stable operation.This download is also available as an entry in our Five Tips blog.

    Provided By Erik Eckel

  • Downloads // Feb 2011

    Use Fail2ban to blacklist IP addresses and alert you to attacks

    Vincent Danen takes you through some basic configuration of the Fail2ban network monitoring utility, which can help protect your systems and servers from brute-force attacks.

    Provided By Vincent Danen

  • Downloads // Jan 2011

    Cloud Security Guidance IBM Recommendations for the Implementation of Cloud Security

    Cloud computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. Cloud resources can be rapidly deployed and easily scaled, with all processes, applications, and services provisioned "on demand", regardless of user location or device. As a result, cloud computing gives...

    Provided By IBM

  • Downloads // Mar 2011

    10 ways to keep your messages out of spam filters

    Legitimate messages that get snagged by spam filters can lead to big problems -- such as derailed job searches, hard feelings, and lost business. These tips will help ensure that your messages reach their intended targets.This download is also available as an entry in our 10 Things blog.

    Provided By Susan Harkins

  • Downloads // Mar 2011

    Six free tools for removing malicious software

    Many tools are available that will help you protect your desktops from malware -- and some of the best ones are free.This download is also available as an entry in our DIY IT Guy blog.

    Provided By Jack Wallen

  • Downloads // Feb 2011

    Five tips for dealing with rootkits

    Rootkits are diverse, elusive, and difficult to get rid of. These basic pointers will help you combat this escalating threat.This download is also available as an entry in our Five Tips blog.

    Provided By Jack Wallen

  • Downloads // Apr 2011

    10 arguments for and against WikiLeaks

    Is WikiLeaks a whistleblower or a spy? Is transparency more important than privacy? Jaime Henriquez looks at both sides of the issues that have emerged in the wake of WikiLeaks' actions.This download (and a companion poll) is also available as an entry in our 10 Things blog.

    Provided By Jaime Henriquez

  • Downloads // Apr 2011

    10 things you should do to securely dispose of computers

    The need for good security practices doesn't go away just because a system has outlived its usefulness. These tips will help ensure that decommissioned equipment doesn't pose a threat.This download is also available as an entry in our 10 Things blog.

    Provided By Chad Perrin

  • Downloads // Mar 2011

    10 best practices for Windows security

    Security risks continue to grow for organizations both large and small. Brien Posey offers 10 suggestions for making sure your networks are as well protected as possible. This download is also available as an entry in our 10 Things blog.

    Provided By Brien Posey

  • Downloads // May 2011

    Kaspersky Total Space Security

    Provides integrated protection for corporate networks of any size or level of complexity from all types of contemporary computer threats. The solution includes components for the protection of workstations and smartphones, providing users with secure and fast access to company information resources and the Internet, as well as secure communications...

    Provided By Kaspersky Lab

  • Downloads // Dec 2010

    SW: Smart Work IBV Study video

    The organizations that outperform today distinguish themselves through their approach to work, response to change, data gathering and use of technology. Look at this study and video to find out how your organization can benefit from working smarter, too.

    Provided By IBM

  • Downloads // Dec 2010

    10 free anti-malware tools worth checking out

    The cost of anti-malware apps keeps rising. Luckily, there are effective tools you can use to prevent and remove infections without spending a dime.This download is also available as an entry in our 10 Things blog.

    Provided By Brien Posey

  • Downloads // Jan 2008

    The TechRepublic Spyware Removal Checklist

    Regardless of size, everyone from small businesses to enterprise organizations must battle the associated Spyware risks that include key trackers, Web page redirectors, persistent pop-up advertisements, inoperable network connections, unwanted tracking applications and other nefarious programs that slow and even render systems and programs non-operational. While not every infected system...

    Provided By Erik Eckel

  • Downloads // May 2009

    Sophos Endpoint Assessment Test

    Is your computer a security risk? Free scan to assess your security Find out if you're missing OS patches Discover if your security applications are up to date and active Use this free test to check your computer security. Download now!

    Provided By Sophos

  • Downloads // Mar 2001

    Software/hardware policy

    If you're developing software/hardware guidelines for your organization, this sample policy will help you get started. It covers acceptable use, licensing issues, equipment standards, and violations.

    Provided By TechRepublic

  • Downloads // Mar 2005

    Cisco PIX Firewall: Lock it down in 10 steps

    Cisco's PIX Firewall has long been one of the most popular enterprise firewalls in use around the world. While it is known for its tight security and strong performance, the PIX Firewall is not completely hardened in its default settings. Here are 10 steps that you can take to further...

    Provided By TechRepublic

  • Downloads // Oct 2005

    Target the best security vendors with this list of products and services

    This list of major security vendors and product descriptions will help you get started on your search for the security solution your organization needs. The offerings range from basic virus protection to companies who will manage it all. The need for secure systems to support e-commerce and other business-critical...

    Provided By TechRepublic