Network security platforms are designed to protect networks from incursion by external sources. The features of network security platforms include protection against viruses, exploits (e.g. sniffers, keyloggers, buffer overflows, browser hijack...

Computer Terminals

(91 companies)
ICA) clients. A Citrix thin client is used in applications such as Citrix MetaFrame and WinFrame. The graphical user interface (GUI) of a Citrix thin client provides support for UNIX, Java, Windows and Macintosh applications, as well as browser...

Security Software

(437 companies)
Anti-spyware software provides protection against: Malicious startup scripts. Exploits (e.g., buffer overflow handling). Browser help object (BHO) threats. Keyloggers. Pop-up ads. Adware injectors. Applications. Application security is a highly desirable...

Graphics Software

(158 companies)
...compression, and work with most Web browsers. Vector graphics are used in applications designed to perform digital diagramming or computer-aided design (CAD). In simplest terms, vector graphic software is graphics software used to create, enhance...
Specifications. Web-based ECM software requires an Internet connection and a browser such as Internet Explorer. Web-based ECM applications provide cross-platform compatibility and support multiple concurrent users while placing fewer demands on end-user...
...workstations, personal computers (PCs), or handheld devices such as personal digital assistants (PDAs), tablet PCs, and pocket PCs. Instead, employees use a browser to connect to a remote web server. Most PC-based applications use the Microsoft Windows...
...random access memory (RAM) and hard disk space. Language translation software that uses a proprietary operating system such as Microsoft? Windows? or Palm OS? may include plug-ins for word processors, web browsers, and email clients. Microsoft...
...and operate specialized software that they install and maintain on their own servers. ASP customers then access tools and services through a web browser and internet connection, or a thin client and vendor-supplied software. Both approaches eliminate...

Retail Software

(42 companies)
...as a service (SaaS) applications are deployed via the Internet and sold through a subscription or priced based on usage. SaaS retail software resides on a vendor 's web server and requires users to access the application via a Web browser. Retail...
...such as Microsoft Excel. Web-based education management software is designed for use in a browser or with a handheld device. Touch screen software for educational institutions is used at kiosks or computer monitors located around a school, learning...
...and available disk space. Web-based learning management systems (LMS) use browsers such as Internet Explorer and provide remote access. Microsoft, Windows, and Internet Explorer are registered trademarks of Microsoft Corporation.

Anti-malware Software

(34 companies)
...modem to dial telephone numbers. URL injectors - Re-direct a computer 's Internet browser to a different Web site.
...digital asset management software does not require machine-based software licenses, and provides access from multiple workstations. Typically, users work within a Web browser such as Internet Explorer. Related Information. CR4 Community --Comparing...
Web-based document management software does not require machine-based software licenses and can provide access from multiple workstations. Typically, users work within a browser such as Internet Explorer. Selecting document management software requires...
...capabilities allow users to share documents, typically from a Web browser. Lightweight directory access protocol (LDAP) integration provides a standard for querying and modifying directory services. Some knowledge management software allows users...