Skip to main content

Directory: Recently Added Listings 

Results 21 - 40 of 60

The Certified Penetration Testing Consultant course is designed for IT Security Professionals and IT Network Administrators who are interested in taking an in-depth look into specific penetration testing techniques used against operating systems. This cou ...

Category Ethical Hacking
Penetration Testing Consultant
Learning Tree International

In this CEH training course, you are provided with the foundational knowledge needed to pass the EC-Council Certified Ethical Hacker (CEH v11) exam. You will learn how to deploy tools and techniques to protect your network through hands-on labs that mimic ...

Category Ethical Hacking
Certified Ethical Hacker
Net-Security Training

The CREST penetration testing course takes students of varying IT experience levels and re-skills them so that they can enter the industry not as a trainee but as qualified Penetration Tester making them productive from day one. This is an Accredited CRES ...

Category Ethical Hacking
CREST Registered Penetration Tester
Check Point Software Technologies

Harmony Endpoint provides comprehensive endpoint protection at the highest security level, crucial to avoid security breaches and data compromise. Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’ ...

Harmony Endpoint Protection

Get complete data security - Empower the enterprise to discover, monitor, and protect sensitive data, centralize management and reporting, and synchronize on-premises and cloud policies. Secure data wherever it resides - Protect business-critical informa ...

Category DLP Network
Trellix Data Protection
Eric Gerbier

Afick is a security tool, very close from to well known tripwire. It allows to monitor the changes on your file systems, and so can detect intrusions. It's designed to be quick and portable. For now, it has been tested on Windows XP, 2000, Vista, Seve ...

AFICK

File integrity monitoring (FIM) protects sensitive information from theft, loss, and malware.  Included as part of the Security Event Manager software suite.

File Integrity Monitoring Software

Real-time threat protection - 24/7 protection for everyone’s devices from ever-evolving malware and online threats.Easy to use - Connect all your computers and smartphones and easily manage them from a single dashboard. All products include:Award-winning ...

McAfee Antivirus
d

Barracuda Web Application Firewall The Barracuda Web Application Firewall protects applications, APIs, and mobile app backends against a variety of attacks including the OWASP Top 10, zero-day threats, data leakage, and application-layer denial of ...

Category WAF - Appliances

EtherDetect Popular

This protocol analyser will Organize captured packets in a connection-oriented view. Capture IP packets on your LAN with nearly no packets losing. Its real-time analyzer enables on-the-fly content viewing while capturing and analyzing, parse and decode an ...

EtherDetect

CommView Popular

TamoSoft, Inc.

CommView is a powerful network monitor and analyzer designed for LAN administrators, security professionals, network programmers, home users…virtually anyone who wants a full picture of the traffic flowing through a PC or LAN segment. Loaded with many use ...

CommView

PacketMon Popular

AnalogX PacketMon allows you to capture IP packets that pass through your network interface - whether they originated from the machine on which PacketMon is installed, or a completely different machine on your network! Once the packet is received, you can ...

PacketMon

Capsa Popular

Capsa is a portable network analyzer application for both LANs and WLANs which performs real-time packet capturing capability, 24x7 network monitoring, advanced protocol analysis, in-depth packet decoding, and automatic expert diagnosis. Capsa's comprehen ...

Built and vetted by expertsInsightIDR has internal and external threat intel for our post-perimeter era, and the world’s most used penetration testing framework Metasploit. We do relentless research with Projects Sonar and Heisenberg. And because “we drin ...

InsightIDR

Easy to use and fast to deploy Privileged Access Management (PAM) available both on-premises or in the cloud. IBM Security Verify Privilege Vault makes it easy to identify and secure all service, application, administrator, and root accounts across your ...

IBM Security Verify Privilege Vault

Features: Intelligent insights across environments - provides visibility and applies context to on-prem and cloud-based resources; leverages continuous monitoring for a zero trust approach to security. Built-in analytics to accurately detect threats - ...

IBM Security QRadar SIEM

Avira Password Manager - Remember only one master password, it does the rest. Automatically logs you in to your online accounts. Generates strong, unique passwords and securely stores them. Checks for weak or reused passwords. Notifies you if an onl ...

Avira Password Manager
Sticky Password

Keep your credit cards safe and ready for checkout. Encrypted vault for your credit card numbers, synced to all your devices, for easy one-click payment. Protects your private notes and other text data. Keep your secrets, licenses, passport information ...

Sticky Password

Zoho Vault offers a robust free plan for individuals, with easy-to-use unlimited password storage, and flexible business plans for teams. Powerful security dashboards Get clear security insights into both your personal and business passwords. Identify a ...

Zoho Vault

RememBear is a friendly app that saves and autofills your passwords to save you time and keep you safe online. Benefits: Friendly, approachable design  Log in faster - let a Bear type your passwords and login to website with one click Faster on ...

RememBear