-
Mirage hálózati hozzáférés ellenőrzés, Network Access Control
www.networkaccesscontrol.hu - 2009-03-08
-
Search: Protect your Remote Office/Branch Office (ROBO) backup data. Meet regulatory compliance and business continuance requirements. Consolidate your ROBO ...
agentless backup  message level restore 
www.asigra.com - 2009-02-14
-
YOTTA280 is a leading data protection service provider that offers a unique alternative to traditional backup methods, replacing conventional one dimensional ...
www.yotta280.com - 2009-02-09
-
With Hyper9, VI administrators can uncover intelligence about their virtual world, organize the information, and make use of it right away. Arm yourself with a ...
query-based reporting  track virtual machines  uncover information  uncover intelligence  VI administrators  VMDNA 
www.hypernine.com - 2009-04-02
-
predictive dialer for call center outbound predictive dialing for collections and telemarketing
www.cashq.com - 2009-02-12
-
Infrasturcture Solutions, Inc.
credentialed inventory  nlayers  server dependencies  utilization metering 
www.isiisi.com - 2009-02-13
-
Promisec delivers clientless endpoint management solutions. These resolve IT and security problems.
www.promisec.com - 2009-02-07
-
--> EAGLE-i - End-to-end and top to bottom performance visibility for your information environment. Monitor and measure the performance of applications, ...
REMASYS 
www.remasys.com - 2009-02-04
-
XOU Solutions provide asset management and inventory software for Cisco network environments fully compliant with Shared Support requirements.
www.xouservices.com - 2009-02-13
-
AVADA Software delivers management portal for Websphere MQ administration and message testing
30 minutes installation  AVADA Software  Message Management Console  no Agents or clients  Single server installation 
www.avadasoftware.com - 2009-02-07
|
inventory
management
compliance
business
audit
disaster recovery
data recovery
business continuity
backup
consulting
software
|
|