Checkout

Your cart is empty.

Scenario Recently some Chrome extension publishers had their extensions hijacked by malicious third parties, who installed adware and possibly other spyware into these extensions. As a consequence, auditing and controlling the use of Chrome extensions…

Scenario   Many software products, e.g Google Chrome, can be installed on a per-user basis. This typically means that a non-privileged user can install the product, with all executable and data files being placed in…

Scenario There are a number of critical registry entries which control Nomad, along with firewall rules, ActiveEfficiency connectivity etc. This product pack will assist in verifying whether any Nomad settings or firewall rules etc. are…

Easily find services with open ports on any device in your environment.

Assess your network readiness for Skype for Business, by automating the Microsoft Skype for Business Network Assessment Tool.

Scenario Local machine accounts that share passwords with other accounts are a security vulnerability. Additionally, local machine accounts that have passwords whose hash can be determined by trivially scanning 'rainbow tables' are also a security…