Try our new Live Software Search. Just start typing your keywords below and watch the software magically appear!
SysAid scans your network, providing information (such as hardware/software) about your assets, and allowing remote control. It also provides help desk, reports, and more.
Active Directory Change Reporter
LepideAuditor for Active Directory is ideal AD change reporter application that helps in easy extraction of data from domains and help you perform AD auditing, and know Who made What change, When and from Where.
LBE Desktop Helpdesk
Easy to use helpdesk system - sensibly priced. No extensive training required. Easily configured to reflect the way that you work. Uses e-mail to keep everyone informed. Maintains a complete audit trail of all actions. Extensive reports supplied.
Archive Event Logs from multiple computers to a central database. Monitor for changes to files, the registry, users, groups, services, security policies, and more. Restore files and the registry from snapshots. User account auditing and analysis.
EMCO EventLog Audit
EMCO Eventlog Audit collects the eventlog from the computers on the LAN, to a database where you can search for any details such as Event ID, Type, Category, Source, User SID, String from the Event description and Time period.
Asset Navigator for IT
Network harware and software PC audit, IT asset management, help desk software that is adaptable solution to operations IT department needs.
BusinessMan is a comprehensive, modular, CRM system. BusinesMan includes a prospect and customer management module, quotations and invoicing modules, suppliers and stock modules, a comprehensive integrated email client and a Resource Scheduler.
Network Inventory Advisor
Network Inventory Advisor is an agent-free solution for PC network inventory. It excellently performs remote agentless scanning of Windows, Mac OS X and Linux and builds custom inventory reports.
Infiltrator Network Security Scanner
Infiltrator is an intuitive network security scanner that can quickly audit computers for vulnerabilities, security holes and exploits, and information enumerations. Infiltrator can reveal security holes and alert the user.
PresenTense NTP Auditor
PresenTense NTP Auditor monitors your computer's built-in clock and compares it's time to the real time. PresenTense NTP Auditor can save logs for days, months and years so you can PROVE what time your computer had at any given point.