Newest Listing

Top Rated

Most Popular

Directory: Recently Added Listings RSS

Visit the Product Site

OpenAthens MD is a completely hosted solution that will enable your organisation to securely and effectively manage your users’ access to web-based resources, allowing access to services outside or within federations such as the UK Access Management Feder ...

VendorEduserv
Pricing ModelService
Modified
ImmuniWeb

Visit the Product Site

ImmuniWeb - Web Penetration Testing. ImmuniWeb is a web application security and penetration testing service from High-Tech Bridge. It combines managed vulnerability scanning with manual penetration testing.

VendorHigh-Tech Bridge
Pricing ModelCommercial
Modified
OpenAthens Federation

Visit the Product Site

The OpenAthens Federation gives subscribing organisations (identity providers) and publishers (service providers) a framework to support information exchange using Shibboleth and SAML. Membership of the OpenAthens Federation includes a licence for use of ...

VendorEduserv
Pricing ModelService
Modified
OpenAthens Service Provider

Visit the Product Site

OpenAthens SP (Service Provider) standards-compliant access management solution enables you to support multiple access management federations and keep up to date with the latest standards and protocols as new technologies emerge. OpenAthens SP's simplicit ...

VendorEduserv
Pricing ModelService
Modified
OpenAthens Local Authentication

Visit the Product Site

OpenAthens LA (Local Authentication) is a locally installed identity and access management system that links to your internal user directory, providing your users with single sign-on (SSO) access to both internal and external web-based resources.OpenAthen ...

VendorEduserv
Pricing ModelService
Modified
IQProtector

Visit the Product Site

IQProtector assists users and processes and doesn’t hinder them. IQProtector's endpoint agent utilizes Secure Islands’ data-immunization technology to classify and protect all information created on or leaving endpoints with attributes that persist thro ...

Category:DLP Network
VendorSecure Islands
Pricing ModelLimited Free Trial
Modified
Xplico

Visit the Product Site

The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico ...

VendorXplico.org
Pricing ModelOpen Source
Modified
DB audit and Security 360

Visit the Product Site

DB Audit and Security 360 is a complete out-of-the-box database security & auditing solution for Oracle, Sybase, MySQL, DB2 and MS SQL Server. DB Audit allows database and system administrators, security administrators, auditors and operators to track and ...

VendorSoftTree Technologies
Pricing ModelLimited Free Trial
Modified
Deep Secure Web Guard

Visit the Product Site

This product controls web traffic entering and leaving the organisation, defending against advanced attacks and misuse. It is increasingly used by organisations that need to tightly control Internet browsing traffic or need to use web protocols to transfe ...

Category:Guards Web
VendorDeep Secure
Pricing ModelCommercial
Modified
Deep-Secure Mail Guard

Visit the Product Site

This product controls web traffic entering and leaving the organisation, defending against advanced attacks and misuse. It is increasingly used by organisations that need to tightly control Internet browsing traffic or need to use web protocols to transfe ...

Category:Guards Mail
VendorDeep-Secure
Pricing ModelCommercial
Modified
Deep-Secure Minerva

Visit the Product Site

Minerva is Deep-Secure's next gneration data diode that allows information to be checked before being securely passed in or out of an isolated system whilst protecting against attack from the opposite direction.   Features and benefits Integrate ...

Category:Data Diodes
VendorDeep-Secure
Pricing ModelCommercial
Modified
Deep Secure File Transfer Guard

Visit the Product Site

This product controls file transfers entering and leaving the organisation, defending against advanced attacks and misuse. It is used by organisations that need to tightly control file transfers with Internet servers or need to pass files between separate ...

VendorDeep Secure
Pricing ModelCommercial
Modified
Deep Secure Network Management Guard

Visit the Product Site

This product controls network management traffic as it passes between the enterprise networks and the management system. Its self-defending architecture means it can exert the required control without itself becoming vulnerable to attack.   Featur ...

VendorDeep Secure
Pricing ModelCommercial
Modified
Deep-Secure XML Guard

Visit the Product Site

This product controls XML data entering and leaving the organisation, defending against advanced attacks and misuse. It is used by organisations that need to tightly control web services traffic used for document management, collaboration, billing, e-comm ...

Category:Guards XML
VendorDeep-Secure
Pricing ModelCommercial
Modified
Redscan ThreatDetect

Visit the Product Site

THREATDETECT – Rapid detection and response to cyber threats Redscan ThreatDetect is a Security Operations Centre as-a-service platform that provides visibility of breaches and threats that impact information security risk. The service combines AlienVau ...

VendorRedscan
Pricing ModelService
Modified
NNT Change Tracker Gen 7

Visit the Product Site

NNT Change Tracker Gen 7™ provides continuous protection against known and emerging cyber security threats in an easy to use solution, offering true enterprise coverage through agent-based and agentless monitoring options. Unlike traditional scanning solu ...

VendorNew Net Technologies
Pricing ModelCommercial
Modified
SourceMeter

Visit the Product Site

SourceMeter is a source code analyzer tool, which can perform deep static analysis of the source code of complex Java, C/C++, RPG (AS/400) and Python systems Features: Precise and deep static analysis, building full semantic graphs, containing semanti ...

VendorFrontEndART Ltd.
Pricing ModelCommercial
Modified

Visit the Product Site

This popular course explores malware analysis tools and techniques in depth. FOR610 training has helped forensic investigators, incident responders, security engineers, and IT administrators acquire the practical skills to examine malicious programs that ...

VendorSANS
Pricing ModelCommercial
Modified
REMnux

Visit the Product Site

REMnux™ is a free Linux toolkit for assisting malware analysts with reverse-engineering malicious software. It strives to make it easier for forensic investigators and incident responders to start using the variety of freely-available tools that can exami ...

VendorLenny Zeltser
Pricing ModelOpen Source
Modified

Visit the Product Site

Simple site used to test firewall rules. Select TCP ports, click test, and it will attempt to connect to the target server you specify. Free, but does contain ads in header and footer.

Vendoridontwanttowork.com
Pricing ModelFreeware
Modified