Computer security is a branch of information security applied to both theoretical and actual computer systems. Computer security is a branch of computer science that addresses enforcement of 'secure' behavior on the operation of computers. The definition of 'secure' varies by application, and is typically defined implicitly or explicitly by a security policy that addresses confidentiality, integrity and availability of electronic information that is processed by or stored on computer systems.
RemotelyAnywhere Enterprise Get proactive with RemotelyAnywhere Enterprise Edition! Be the first to know about workstation issues ranging from attempted security breaches to unstable software installations. Rather than waiting for system downtime, use RemotelyAnywhere to monitor your systems, get alerts and resolve issues remotely using the industry's richest remote-support toolkit.
iLock Security Services Centralized management of users, groups and roles, role-based access control, entitlements and access policies.
Activclient Provides multi-factor, strong authentication to a variety of services on PCs.
esafe Internet Content Security from the gateway to the desktop, protecting against malicious code.
Big Fix Discovery 7 The BigFix Discovery 7 Platform implements a distributed "universal machine" for infrastructure-wide real-time visibility and control.
Security Update Manager (SUM) Security Update Manager (SUM), ECM's patch assessment and verification module, ensures continuous enterprise security for Windows platforms. SUM provides intelligent security patch assessment, remediation and verification and automatically alerts enterprises to security bulletins issued by Microsoft.
ControlGuard Endpoint Access Manager Prevents unauthorized use of enterprise data by policy-based control of access to portable devices/removable media.
Granite Safe Connect Cranite SafeConnect gives business users easy, no-hassles access to all their applications from anywhere on the Internet. It extends the protection of corporate security, compliance and leakage defenses to mobile and remote users, and ensures they can't be touched by network thieves and hackers.
Identity Manager Connector The Identity Manager connector enables you to access identity information and processes through a single connector reducing cost and complexity.
Access Master Manages and safeguards access to your data and lets you enforce a unified security policy across the enterprise.