Introducing G2.ai, the future of software buying.Try now
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at Network Security Task Manager, reclaim access to make changes.
Product Avatar Image
Network Security Task Manager

By Neuber Software

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at Network Security Task Manager, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
3.0 out of 5 stars
5 star
0%
4 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Network Security Task Manager?

It's been two months since this profile received a new review
Leave a Review

Network Security Task Manager Reviews & Product Details

Pricing

Pricing provided by Network Security Task Manager.

10 clients

190
$

100 clients

800
$

Network Security Task Manager Media

Network Security Task Manager Demo - Network Security Task Manager
Console
Network Security Task Manager Demo - Remote scan
With Network Security Task Manager, all running processes on any of your network clients can be viewed at a glance. A unique feature: See the potential risk inherent in each individual process. No other Task Manager or Network Process Viewer offers this capability. You can remotely quarantine pro...
Network Security Task Manager Demo - Settings
No time-consuming installation required! The software is immediately ready to go. Schedules can automate scanning of clients.
Product Avatar Image

Have you used Network Security Task Manager before?

Answer a few questions to help the Network Security Task Manager community

Network Security Task Manager Reviews (2)

Reviews

Network Security Task Manager Reviews (2)

3.0
2 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Subash P.
SP
DevOps Engineer
Small-Business (50 or fewer emp.)
"Never software review"
What do you like best about Network Security Task Manager?

The risk rating feature for every process. Review collected by and hosted on G2.com.

What do you dislike about Network Security Task Manager?

The unavailability of cross platform support of this tool. Review collected by and hosted on G2.com.

Verified User in Business Supplies and Equipment
UB
Small-Business (50 or fewer emp.)
"Good to go"
What do you like best about Network Security Task Manager?

Flexible took for network security

All running process in one window Review collected by and hosted on G2.com.

What do you dislike about Network Security Task Manager?

No concerns as far as now.

Kills the task swiftly. Review collected by and hosted on G2.com.

There are not enough reviews of Network Security Task Manager for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Palo Alto Expedition Logo
Palo Alto Expedition
4.3
(21)
The open-source Expedition tool speeds your migration to next-generation firewall technologies and more efficient processes, enabling you to keep pace with emerging security threats and industry best practices.
2
Suhosin Logo
Suhosin
4.4
(17)
Suhosin is an advanced protection system for PHP 5 installations. It is designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core.
3
mSpy Logo
mSpy
3.1
(13)
mSpy is a comprehensive parental control and monitoring application designed for iOS devices, enabling users to discreetly track and manage various activities on a target iPhone. It operates in stealth mode, ensuring that the monitored individual remains unaware of its presence. With mSpy, users can access a wide range of data, including text messages, call logs, GPS locations, social media interactions, and more, all through a personalized dashboard. Key Features and Functionality: - Text Message Monitoring: View all sent and received SMS and iMessages, including deleted ones. - Call Monitoring: Access detailed call logs with timestamps, durations, and contact information. - GPS Location Tracking: Track the real-time location of the device and view location history. - Social Media Monitoring: Monitor activities on platforms like WhatsApp, Facebook Messenger, Instagram, Snapchat, Telegram, and more. - Keylogger: Record all keystrokes made on the device, providing insights into typed messages and searches. - Screen Recorder: Capture screenshots of the device's activity at regular intervals. - Geofencing Alerts: Set up virtual boundaries and receive notifications when the device enters or exits specified areas. - App and Website Blocking: Restrict access to specific applications and websites as needed. Primary Value and User Solutions: mSpy addresses the need for parents and guardians to ensure the safety and well-being of their children in the digital age. By providing comprehensive monitoring tools, it allows users to: - Protect Children from Online Threats: Identify and prevent exposure to cyberbullying, online predators, and inappropriate content. - Monitor Digital Behavior: Gain insights into children's online interactions, helping to guide and educate them on responsible internet usage. - Ensure Physical Safety: Track real-time locations to ensure children are where they are supposed to be and receive alerts if they enter restricted areas. - Manage Screen Time: Control and limit the use of certain apps and websites to promote healthy digital habits. By offering these functionalities, mSpy empowers parents to take an active role in their children's digital lives, fostering a safer and more controlled online environment.
4
SecureBridge Logo
SecureBridge
4.9
(12)
SecureBridge is a tool that represents clients and servers for SSH, SFTP and SSL protocols as a network security solution, it protects any TCP traffic using SSH or SSL secure transport layer protocols, that provide authentication for both client and server, strong data encryption, and data integrity verification.
5
Execweb Logo
Execweb
5.0
(7)
Execweb is a leading Cybersecurity Executive Network that connects vendors with CISOs/CIOs via 1:1 virtual meetings & roundtables
6
DICloak Antidetect Browser Logo
DICloak Antidetect Browser
5.0
(7)
DICloak modifies and hides your digital identity by simulating all parameters that websites can see. This can effectively circumvent detections by systems. With DICloak, you can create multiple independent browser profiles for easy multi-accounting. Each account is run within its own independent browser profile, reducing the risk of account bans.
7
Outlook PST Recovery Logo
Outlook PST Recovery
4.7
(5)
Voimakas Outlook PST Recovery is a software that recover emails from corrupted PST file save them into new PST files or existing PST file with whole emails items and attachments and also recovers deleted Outlook emails items without any data defeat.
8
Sentinel Software Logo
Sentinel Software
4.7
(5)
Sentinel gives you the tools to mitigate security risks, improve compliance and reduce the cost of PeopleSoft Security administration.
9
Remoasset Logo
Remoasset
4.7
(5)
Everything you need to manage your remote workforce's hardware lifecycle, from procurement to recovery, in one unified platform. From procurement to recovery, we handle every aspect of your remote device management with transparency and automation
10
SiteOwl Logo
SiteOwl
4.5
(4)
SiteOwl is the world’s first unified, digital platform for security integrators and system managers that provides an end-to-end solution to help users design, install, and manage their security systems. SiteOwl brings modern technology to the job site by equipping designers, field technicians, and integrator customers with a suite of mobile and cloud-based applications to efficiently manage security system design, installations, and service management. Positioned as a drag-and-drop solution for security teams, SiteOwl makes it easy to construct powerful security solutions on the fly while receiving real-time updates on customer approvals, installation progress, and more.
Show More

Pricing Options

Pricing provided by Network Security Task Manager.

10 clients

190
$

100 clients

800
$

1 client

19
$
Product Avatar Image
Network Security Task Manager