Newest Listing

Top Rated

Most Popular

Directory: Recently Added Listings RSS

RSA Archer Compliance Management

Visit the Product Site

This flexible, web-based compliance software enables you to document process and technical controls, link them to authoritative sources, perform risk-based scoping, execute design and operating tests, and respond to gaps. You can also report assessment re ...

Category:Compliance
VendorEMC Corporation
Pricing ModelCommercial
Modified
RSA Archer Business Continuity Management

Visit the Product Site

RSA Archer Business Continuity Management provides a centralized, automated approach to business continuity and disaster recovery planning, allowing you to respond swiftly in a crisis to protect your operations. This web-based software combines business ...

Category:Compliance
VendorEMC Corporation
Pricing ModelOnline Use Only
Modified
RSA Archer Audit Management

Visit the Product Site

This solution enables Internal Audit to use a consistent, risk-based audit approach to drive greater efficiency in the execution of the audit plan. Features include risk-based prioritization of your audit universe, resource scheduling and staffing, manage ...

Category:Compliance
VendorEMC Corporation
Pricing ModelCommercial
Modified
RSA Archer GRC

Visit the Product Site

RSA Archer GRC: RSA Archer GRC modules allow you to build an efficient, collaborative enterprise governance, risk, and compliance (GRC) program across IT, finance, operations, and legal domains. With RSA Archer, you can manage risks, demonstrate complianc ...

Category:Compliance
VendorEMC2
Pricing ModelCommercial
Modified
RSA: ECAT

Visit the Product Site

RSA ECAT is an endpoint compromise-assessment and monitoring tool that enables organizations to detect and respond to threats.  Using a unique signature-less approach, it identifies previously unknown malware and compromises that other solutions may ...

VendorEMC Corporation
Pricing ModelCommercial
Modified
RSA CyberCrime Intelligence Service

Visit the Product Site

Provides information on corporate machines, network resources, access credentials, business data, and email correspondence that may have been compromised by malware. Enabling security professionals to identify gaps in existing processes and adjust or crea ...

Category:Enterprise
VendorEMC Corporation
Pricing ModelService
Modified
RSA Adaptive Authentication

Visit the Product Site

Adaptive Authentication monitors and authenticates online activities in real time by correlating behavioral analysis, device profiling, and data feeds from RSA eFraudNetwork. AT A GLANCE Measures risk of login and post login activities by evaluating o ...

VendorRSA
Pricing ModelCommercial
Modified
RSA Security Analytics

Visit the Product Site

By bringing together security information event management (SIEM) , network security monitoring, and combining them with the advanced analysis capabilities of a data security warehouse and integrated threat intelligence, RSA Security Analytics helps secur ...

VendorEMC Corporation
Pricing ModelCommercial
Modified
Encrypted Mobile Phone Communication Micro SD Card

Visit the Product Site

CEN-02 Encrypted Mobile Phone Communication Micro SD Card provides you with supreme point-to-point voice encryption. You can exempt the doubt of being tapped through hardware encryption technology. CEN-02 Encrypted Mobile Phone Communication Micro SD Card ...

Category:Mobile Devices
VendorClever Intelligence Unity
Pricing ModelCommercial
Modified
Wide Range RF Signal Detector GPS Detector

Visit the Product Site

RFD-01 Wide Range RF Signal Detector is a super heterodyne receiver with low IF and frequency synthesizer. Scanning and analyzing cycle period is 1.0-1.5 sec. It can operate within guard, sweep, search, difference search modes and monitoring of digital si ...

VendorClever Intelligence Unity
Pricing ModelCommercial
Modified

Visit the Product Site

FlowNBA is a complete solution for network monitoring based on NetFlow/IPFIX. Thanks to the used technology it enables complete overview of the network traffic, detailed information about all communications and provides information about who communicates ...

VendorFlowNBA.com
Pricing ModelLimited Free Trial
Modified
Tags
FlowMon

Visit the Product Site

The FlowMon solution delivers the flow-based (NetFlow/IPFIX) monitoring for all organizations and all networks from 10 Mbps to 10 Gbps. It provides the statistics necessary for network monitoring, security, troubleshooting, IP accounting and billing, capa ...

VendorINVEA-TECH a.s.
Pricing ModelCommercial
Modified
NetworkMiner

Visit the Product Site

NetworkMiner is a comprehensive Network Forensic Analysis Tool (NFAT) for Windows (but also works in Linux / Mac OS X / FreeBSD), which has become increasingly popular among incident response teams and law enforcement. Without placing any traffic on the n ...

VendorNETRESSEC AB
Pricing ModelCommercial
Modified
Barracuda Firewall

Visit the Product Site

The Barracuda Firewall provides extensive application control and user identity functions in an easy-to-use solution. This firewall is optimised for bandwidth-sensitive tasks like packet forwarding and routing layer 7 applications, Intrusion Prevention (I ...

VendorBarracuda
Pricing ModelCommercial
Modified
iVE - Vehicle Forensics

Visit the Product Site

iVe is a vehicle system forensic tool that acquires user data from vehicles and allows forensic examiners and investigators a means to quickly and intuitively analyze it. Vehicle Infotainment systems store a vast amount of user related data such as recen ...

VendorBerla
Pricing ModelCommercial
Modified

Visit the Product Site

ADD is a physical memory anti-analysis tool designed to pollute memory with fake artifacts. This tool was first presented at Shmoocon 2014. Please note that this is a proof of concept tool. It forges OS objects in memory (poorly). It would be easy (very e ...

VendorJake Williams
Pricing ModelOpen Source
Modified
Barracuda Web Filter

Visit the Product Site

The Barracuda Web Filter lets organizations benefit from online applications and tools without exposure to web-borne malware and viruses, lost user productivity, and misused bandwidth. As a comprehensive solution for web security and management, it unite ...

Category:Guards Web
VendorBarracuda
Pricing ModelCommercial
Modified
Tags, ,
The Cyber Scheme Team Member Training (CSTM)

Visit the Product Site

The Cyber Scheme CSTM course is suitable for both public and private sector IT Security professionals who wish to develop their penetration testing skills to a standard undergoing accreditation by CESG for CHECK Team Members. Covering a broad range of dis ...

Category:Ethical Hacking
VendorEncription Limited
Pricing ModelCommercial
Modified
OSSIM™ - Open Source SIEM

Visit the Product Site

OSSIM provides all of the features that a security professional needs from a SIEM offering – event collection, normalization, and correlation. Established and launched by security engineers out of necessity, OSSIM was created with an understanding of the ...

VendorAlienVault
Pricing ModelOpen Source
Modified
AlienVault Reputation Monitor

Visit the Product Site

Free Reputation Monitor Alert Service Receive rapid alerts when your IPs & domains are compromised. No hardware or software required. Simply submit your IPs and domains. AlienVault will take care of the rest... you'll receive an email as soon as they ...

VendorAlienVault
Pricing ModelFreeware
Modified