Internet Lock

Internet Lock

TopLang Software
+
+

Related Products

  • Astra Pentest
    211 Ratings
    Visit Website
  • Aikido Security
    106 Ratings
    Visit Website
  • Wiz
    1,059 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    67 Ratings
    Visit Website
  • Chainguard
    42 Ratings
    Visit Website
  • Criminal IP
    13 Ratings
    Visit Website
  • Reflectiz
    14 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,343 Ratings
    Visit Website
  • NINJIO
    393 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,109 Ratings
    Visit Website

About

Simplify the security assessment process with hosted vulnerability scanners. From attack surface discovery to vulnerability identification, actionable network intelligence for IT & security operations. Proactively hunt for security weakness. Pivot from attack surface discovery to vulnerability identification. Find security holes with trusted open source tools. Get access to tools used by penetration testers and security professionals around the world. Hunt vulnerabilities from the attackers perspective. Simulating real world security events, testing vulnerabilities and incident response. Discover the attack surface with tools and open source intelligence. Protect your network with improved visibility. Over 1 million scans performed last year. Our vulnerability scanners have been launching packets since 2007. Fixing security issues requires you find them. Identify the issue, re-mediate the risk and test again to be sure.

About

Internet Lock is an access control and password protection solution for your internet connections and internet programs. With Internet Lock, you can fully control the internet connections and programs on your computer. By using Internet Lock, you can restrict or password protect internet access, schedule internet access, protect internet programs on certain IP addresses or domains, limit users to access only the websites you specified, or keep them from accessing unwanted websites. You can use Internet Lock to restrict internet connections and programs. Programs blocked by Internet Lock will not be able to access the internet. You can use Internet Lock to password protect internet programs and connections. Users must provide correct password in order to use the protected programs to access internet. When a password protected program tries to connect to internet, Internet Lock pops up a password window to ask user to enter password. If user couldn't provide the correct password.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT security teams wanting a vulnerability scanner solution to simplify their security assessment processes and operations

Audience

IT managers searching for a solution to manage and improve their security operations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$10 per month
Free Version
Free Trial

Pricing

$29.95/one-time/user
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Hacker Target
Founded: 2009
Australia
hackertarget.com

Company Information

TopLang Software
www.toplang.com

Alternatives

Alternatives

Smoothwall Filter

Smoothwall Filter

Smoothwall
FortiGate SWG

FortiGate SWG

Fortinet
Check Point URL Filtering

Check Point URL Filtering

Check Point Software Technologies

Categories

Categories

Computer Security Features

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Integrations

Drupal
Joomla!
Microsoft SharePoint
Nmap
OpenVAS
Stripe
Wappalyzer
WordPress

Integrations

Drupal
Joomla!
Microsoft SharePoint
Nmap
OpenVAS
Stripe
Wappalyzer
WordPress
Claim Hacker Target and update features and information
Claim Hacker Target and update features and information
Claim Internet Lock and update features and information
Claim Internet Lock and update features and information