Newest Listing

Top Rated

Most Popular

Directory: Recently Added Listings RSS

Visit the Product Site

Erase data securely from PCs, laptops, servers and storage environments. This fully automated and centrally managed erasure solution offers cutting edge efficiency and productivity. The most advanced data erasure solution on the market, this next generati ...

VendorBlancco
Pricing ModelCommercial
Modified
Observer nTAP

Visit the Product Site

nTAPs are passive, full-duplex devices, offering complete visibility to monitoring devices regardless of traffic level. They work with the leading management tools for quick and easy deployment. nTAPs are transparent for monitoring critical links, and pro ...

Category:Network Taps
VendorNetwork Instruments
Pricing ModelCommercial
Modified
Data Wiping Software

Visit the Product Site

DBAN is free erasure software designed for the home user. It automatically deletes the contents of any hard disk that it can detect. This method can help prevent identity theft before recycling a computer. DBAN is also a commonly used solution to remove v ...

VendorDBAN
Pricing ModelFreeware
Modified
Full Disk Encryption Software Blade

Visit the Product Site

The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot aut ...

VendorCheck Point
Pricing ModelCommercial
Modified

Visit the Product Site

The Offensive Security Web Expert (OSWE) is an entirely hands-on web application penetration testing security certification. The OSWE challenges the students to prove they have a clear and practical understanding of the web application assessment and hack ...

Category:Ethical Hacking
VendorOffensive Security
Modified

Visit the Product Site

The Offensive Security Exploitation Expert (OSEE) is the companion certification to the extremely demanding Advanced Windows Exploitation (AWE) course. The OSEE certification thoroughly assesses not only the students understanding of the course content, b ...

Category:Ethical Hacking
VendorOffensive Security
Pricing ModelCommercial
Modified

Visit the Product Site

The Offensive Security Certified Expert (OSCE) is an extremely challenging exam wherein students are required to demonstrate that they comprehend not only the material directly covered in the CTP course, but that they also fully grasp the concepts present ...

Category:Ethical Hacking
VendorOffensive Security
Modified

Visit the Product Site

The Offensive Security Wireless Professional (OSWP) is the only practical wireless attacks certification in the security field today. The OSWP challenges the students to prove they have the practical ability to perform 802.11 wireless audits using open so ...

Category:Ethical Hacking
VendorOffensive Security
Modified
AlienVault Unified Security Mangement

Visit the Product Site

AlienVault USM is an all-in-one platofrm designed and priced to ensure that mid-market organisations can effectively defend themselves against todays' advanced threats. The AlienVault (USM) platform provides five security capabilities in a single console ...

VendorAlienVault
Pricing ModelCommercial
Modified
Network Protector-S

Visit the Product Site

This next-generation firewall offers all-round protection for enviroments with up to 100 uers. It uses a combination of port-indepentent application idenification, traffic management, anti-virus and mawalre filtering, as well as intrusion prevention syste ...

VendorGateprotect
Pricing ModelCommercial
Modified
Stealth for Amazon Web Services

Visit the Product Site

With Stealth, you can encrypt all communication to, from and between Stealth-protected assets. When Unisys Stealth is used to secure a VM running in the AWS Cloud, it encrypts the data in the communication channel all the way through to the VM, and not ju ...

VendorUnisys
Pricing ModelCommercial
ModifiedNever
Shadowserver ASN & Netblock Alerting and Reporting Service

Visit the Product Site

This reporting service is provided free-of-charge and is designed for ISPs, enterprises, hosting providers, and other organizations that directly own or control network space. It allows them to receive customized reports detailing detected malicious activ ...

VendorShadowserver Foundation
Pricing ModelOnline Use Only
ModifiedNever
Stealth

Visit the Product Site

Unisys Stealth™ is an innovative, software-based security solution that: ​Conceals communication endpoints making them undetectable to all unauthorized parties inside and outside the enterprise Implements with no disruption to your existing IT infrast ...

VendorUnisys
Pricing ModelCommercial
ModifiedNever
Stealth for Mobile

Visit the Product Site

Unisys Stealth for Mobile provides a comprehensive, innovative approach to mobile security – one that begins in the data center and extends to mobile applications. With Unisys Stealth for Mobile, security follows the user, not the device, so your mission- ...

Category:Mobile Devices
VendorUnisys
Pricing ModelCommercial
ModifiedNever
Firewalk

Visit the Product Site

Firewalk is an active reconnaissance network security tool that attempts to determine what layer 4 protocols a  given IP forwarding device will pass. Firewalk  works  by sending out TCP or UDP packets with a TTL one greater than the targete ...

VendorMike Schiffman
Pricing ModelFreeware
Modified
Hakabana

Visit the Product Site

Hakabana is an open source monitoring tool, which visiualises network traffic using Haka and Kibana. It leverages on the Haka framework to capture packets, dissect them  and extract various pieces of information from the network, such as; bandwidth, ...

VendorArkoon Network Security
Pricing ModelOpen Source
Modified
Security Onion

Visit the Product Site

Security Onion is a Linux distro for intrusion detection, network security monitoring, and log management. It's based on Ubuntu and contains Snort, Suricata, Bro, OSSEC, Sguil, Squert, Snorby, ELSA, Xplico, NetworkMiner, and many other security tools. The ...

Category:IPS Network
VendorSecurity Onion Solutions LLC
Pricing ModelOpen Source
Modified

Visit the Product Site

ThreatIQ is a cloud based, real-time, threat intelligence solution which shares information on known threats to ensure you are aware. Enterprises and government agencies are learning – in many cases the hard way – that a critical key to defending themsel ...

VendorThreat Track Security
Pricing ModelCommercial
Modified

Visit the Product Site

ThreatAnalyzer enables you to completely and accurately quantify the risk and exposure your organization faces from any malware threat. As a fully customizable platform, ThreatAnalyzer enables you to recreate your entire application stack (including virt ...

VendorThreat Track Security
Pricing ModelCommercial
Modified

Visit the Product Site

ThreatSecure enables users to indentify and isolate risks associated with Advanced persistent Threats (APTs), targeted attacks and Zero-Day threats. ThreatSecure reduces your exposure to advanced threats and data-breaching malware through  threat de ...

VendorThreat Track Security
Pricing ModelCommercial
Modified