SDL Threat Modeling Tool 3.1
As part of the design phase of the SDL, threat modeling allows software architects to identify and mitigate potential security issues early, when they are relatively easy and cost-effective to resolve. Therefore, it helps reduce the total cost of development.
- Audio & Multimedia
- Business
- Communications
- Desktop
- Development
- Education
- Games
- Graphics
- Home & Hobby
- Network & Internet
- Screen Savers
- Security & Privacy
- Servers
- System Utilities
- Web Development
- DeskConnect
- Data Undelete Software...
- TrustVare OST to MBOX...
- MSSQL to MySQL database...
- Mac Memory Card Restore
- ClickCharts FlowCharts Free...
- ActivTrak for MacOS
- File Recovery Utility
- JobCard 2
- Windows Files Salvage Utility
- DailySoft MBOX to MSG...
- Windows FAT Recovery Program
- iPod Shuffle Repair Software
- FixVare TGZ to HTML Converter
- Data Recovery Software
- ADRC Data Recovery Tools
- avast! Antivirus
- Revo Uninstaller
- Java Runtime Environment
- AVG Anti-Virus Free Edition
- GOM Media Player
- RegSeeker
- IrfanView
- CPU-Z
- Malwarebytes Anti-Malware
- Spybot Search & Destroy
- Skype
- µTorrent
- Ai File Extension Editor
- Remove Drm From Pdf Files
- Download Word Templates For...
- Assault Cube Sounds
- Download Song As Zip File
- Rankquest Watchseo
- Free Becker Cpa
- Creative Smiley Faces Text
- Portable Photo Editor Free...
- Screen Capture Master
- Bat Merge
- Daz Iso Compressor
- Destroy Recycle Bin Windows
- Decode Firefox Cache File
- Link Directory Script
Threat Download
-
1Freeware
-
2USB Threat Defender 1.0
USB Threat Defender is the ultimate USB Anti-Virus solution, its unique Proactive and Definition scan Technology combined together unleashes a new security stronghold level.USB Threat Defender is not just another autorun.inf virus remover, it takes more ...$39.95
Buy -
3Mobile Threat Net 1.3
The mobile storm tracker of choice for chasers and emergency responders, Mobile Threat Net delivers high-resolution radar display, patented storm tracking and GPS compatibility with a user-friendly interface. Only WxWorx delivers the accuracy of patented ...$299.00 -
4ThreatModeler 1.0
ThreatModeler™ will allow companies to build threat models in less than an hour without any knowledge of security. Its Intelligent Threat Engine (ITE), identifies the threat to your application, classifies them based on risk so that the mitigation ...$4,999.00 -
5NetWitness Investigator 9.7
NetWitness Investigator is the award-winning interactive threat analysis application of the NetWitness enterprise network monitoring platform. Investigator provides security operations staff, auditors, and fraud and forensics investigators the power ... -
6Threat Killer 1.7
Threat Killer is a fully-scriptable malware remover able to remove persistent files, kernel drivers installed by rootkits, registry keys and values, terminate processes (even if critical), delete an entire folder (also using recursive) and much more ...Freeware -
7Microsoft Threat Analysis and
This Microsoft Threat Analysis Modeling Tool will no longer be our primary tool. We are providing this tool (binaries and code) for people who have older projects where they previously used this tool and for in flight teams that started their threat ...Freeware -
8Microsoft Forefront TMG Best
The Forefront Threat Management Gateway (TMG) Best Practices Analyzer (BPA) Tool is designed for administrators who want to determine the overall health of their Forefront TMG computers and to diagnose current problems. The tool scans the configuration ...Freeware -
9US Security Threat Monitor 1.0
The Homeland Security Threat Monitor is a small Windows application that runs in your system tray, showing the current terrorism threat level. It periodically checks to make sure the information is up to date by contacting the Department of Homeland ...Freeware -
10RAMAS Red List 3.0
RAMAS Red List implements IUCN threatened species criteria (IUCN 2001), which are rules for assigning species into categories representing different level of threat. The IUCN rules are based on information about such characteristics as number and distribution ...$495.00 -
11Triple Threat Mahjong Solitaire 1.0
Triple Threat Mahjong Solitaire is 3x as hard as traditional Mahjong Solitaire. Triple Threat Mahjong Solitaire has 3 pyramids of Mahjong Tiles to break down for you to beat the game. Eliminate mahjong tiles by clicking on matching pairs. You can also ...Freeware -
12Stop Bank Foreclosure Now! 1.0
Browser Toolbar for Internet Explorer providing free information about saving your home from the threat of foreclosureFreeware -
13Alien Sky 1.8.6
Make a raid deep into alien force positions to eliminate the threat for your homeworld. You'll encounter lots of different alien ships, upgrade your weaponry with extra-weapons, blow up enemy barriers and defeat powerful bosses. Lots of special ...$19.95 -
14Discovering Nature 1.0
Travel the world and help Professor Jane Pinckleport to put an end to a deadly virus, which is a great threat to the whole animal kingdom. Create your strategy for the challenge and clear piles of bananas and spider webs as you match up the animals in ...$19.99 -
15VisNetic AntiVirus for
VisNetic AntiVirus for Workstations provides reliable virus protection to your computer, whether the threat arrives via email, web, or other delivery methods. Comes complete with scanner and an automated update scheduler.Coupled with the Server or Network ...$49.95 -
16Trend Micro TrendProtect for
Trend Micro TrendProtect for Internet Explorer is a handy browser plug-in that informs you of the present any unwanted content or potential threat in the website you are about to visit and also pages listed in Google, MSN, and Yahoo search results. The ...Freeware -
17UserLock 5.5
UserLock secures access to Windows networks and mitigate insider threat by restricting simultaneous sessions, limiting user access to the network and providing administrators with remote session control, alert options and advanced reporting for session ...$11.25 -
18Check Point SmartConsole R70 6.1
SmartDashboard is a single, comprehensive user interface for defining and managing multiple elements of a security policy: firewall security, VPNs, network address translation, web security, desktop security, anti-virus security, SmartDefense threat defense protections, ... -
19Cyclope Internet Filtering Proxy
Cyclope Internet Filtering Proxy is an internet content filtering software designed to accomplish the needs of a company threat by low productivity and inefficient work force. The program ensures companies the required protection, by monitoring the employees' ...$10.00 -
20AGOBOTKURemoval Tool 1.0
As any other worm AGOBOT-KU is self-copying and replicating threat and it gets to your PC through local or global network. And the you will get the most imact on your network and internet connection. Worms are not easy to remove and we advise you to ...$39.95 -
21Trend Micro OfficeScan 10.6
Get the industry’s strongest data and threat protection – a collection of vital technology – built into a single endpoint agent, which can be deployed and managed together, from a single console. Consolidating your endpoints ... -
22ZLOBRemoval Tool 1.0
Trojans is one of the most wide-spread threat in the internet. They can spread in lot of ways (torrents, e-mail attachments, video codecs etc.). ZLOB as well as any other trojan can harm your PC in different ways. Originally, trojans stole just your ...Freeware -
23FileThreat Check 1.0
The application starts automatically and searches in the database for the threat rank file of the selected file. If the file is not yet known to us it will be immediately uploaded to the server. Within minutes the result will be visible on your screen.Freeware -
24X2 ModManager 2.5
X2 ModManager is program for managing Catalog files (CATs) and Packed Files (PCKs/PBDs) used by X2 The Threat and X3 Reunion games. Features: - list content of catalogs - extract selected files from catalogs or extract whole catalogs (normally or with ... -
25Paperport Removal Tool 1.0
The program can alter PC preferences resulting in slow connexion speeds, diverse home WWW pages and loss of WAD or functionality of other programs creating a absolute necessity to remove threat with special removal tool. It is required to remove Paperport ...Freeware