Newest Listing

Top Rated

Most Popular

Directory: Recently Added Listings RSS

Maltego

Visit the Product Site

Maltego is a platform developed to deliver a clear threat picture to the environment that an organization owns and operates. Maltego’s demonstrates the complexity and severity of single points of failure as well as trust relationships that exist currently ...

VendorPaterva
Pricing ModelCommercial
Modified
Nipper Studio

Visit the Product Site

During a network audit Nipper Studio processes the devices’ native configurations and enables you to create a variety of different audit reports. By using traditional methodology for your network audit, such as manual Penetration Testing, Agent-based soft ...

Category:Network Mapping
VendorTitania
Pricing ModelCommercial
Modified
M@D Security Enhanced for Android

Visit the Product Site

Android Security is a security package, by Mobile Active Defense, that provides on demand IPSec VPN with any IP data traffic so that the device is protected behind a VPN at all times. It is compatible with Android 2.2 and higher, but recommends 4.0 or abo ...

Category:Mobile Devices
VendorMobile Active Defense
Pricing ModelCommercial
Modified

Visit the Product Site

E-Detective is a real-time Internet interception, monitoring and forensics system that captures, decodes, and reconstructs various types of Internet traffic. It is commonly used for organization Internet behavioral monitoring, auditing, record keeping, fo ...

VendorDecision Group Inc.
Pricing ModelCommercial
Modified
Ike-Scan

Visit the Product Site

Ike-scan is a command-line tool that uses the IKE protocol to discover, fingerprint and test IPSec VPN servers. It is available for Linux, Unix, MacOS and Windows under the GPL license.

Category:Network Mapping
VendorNTA Monitor
Pricing ModelFreeware
Modified

Visit the Product Site

EtherApe is a graphical network monitor for Unix modeled after etherman. Featuring link layer, IP and TCP modes, it displays network activity graphically. Hosts and links change in size with traffic. Color coded protocols display. It supports Ethernet, F ...

VendorSourceforge
Pricing ModelFreeware
Modified
SQLNinja

Visit the Product Site

Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. Its main goal is to provide a remote access on the vulnerable DB server, even in a very hostile environment. It shou ...

VendorIcesurfer
Pricing ModelFreeware
Modified
WebGoat

Visit the Product Site

WebGoat is a deliberately insecure web application maintained by OWASP designed to teach web application security lessons. You can install and practice with WebGoat in either J2EE (this page) or [WebGoat for .Net] in ASP.NET. In each lesson, users must d ...

VendorOWASP
Pricing ModelFreeware
Modified
Deep Secure Web Guard

Visit the Product Site

The Deep-Secure Web Guard controls web traffic entering and leaving an organisation, defending against advanced attacks and misuse.  The Web Guard performs deep content inspection of the payload of both HTTP requests and responses looking for hidden malwa ...

Category:Guards Web
VendorDeep Secure
Pricing ModelCommercial
Modified
Deep-Secure Mail Guard

Visit the Product Site

The Deep-Secure Mail Guard helps businesses control email traffic entering and leaving an organisation.  It effectively defends against advanced attacks and misuse by focusing on the content. The Deep-Secure Mail Guard supports both Internet standards SMT ...

Category:Guards Mail
VendorDeep-Secure
Pricing ModelCommercial
Modified
Deep-Secure Minerva

Visit the Product Site

Deep-Secure Minerva is one of our Next Generation Diode family.  Minerva provides a guarded one-way data feed with configurable interfaces, it blocks the spread of malware, prevents data loss and defends against unknown attacks.  It also holds users accou ...

Category:Data Diodes
VendorDeep-Secure
Pricing ModelCommercial
Modified
Deep Secure File Transfer Guard

Visit the Product Site

The Deep-Secure File Transfer Guard controls file transfers entering and leaving the organisation, defending against advanced attacks and misuse. It is used by organisations that need to tightly control file transfers with Internet servers or need to pass ...

VendorDeep Secure
Pricing ModelCommercial
Modified
Deep Secure Network Management Guard

Visit the Product Site

The Deep-Secure Network Management Guard controls the network management traffic as it passes between the enterprise networks and the management system. Its self-defending architecture means it can exert the required control without itself becoming vulner ...

VendorDeep Secure
Pricing ModelCommercial
Modified
SafeToGo

Visit the Product Site

The next generation of highly secure USB 3.0 compliant flash drives SafeToGo™ from Cardwave is a fully robust, hardware encrypted USB3.0 flash drive that protects your sensitive data. SafeToGo™ can be fully managed through the SafeConsole Secure USB Mana ...

VendorCardwave
Pricing ModelCommercial
Modified

SAINT Popular

0 reviews
SAINT

Visit the Product Site

Before you can secure a network, you have to know how it's threatened. SAINT, or the Security Administrator's Integrated Network Tool, uncovers areas of weakness and recommends fixes. With the SAINT® vulnerability scanner, you can: Identify vulnerabilitie ...

VendorSAINT Corporation
Pricing ModelCommercial
Modified
PortalGuard

Visit the Product Site

PistolStar, Inc. maker of PortalGuard offers an on-premise turnkey user authentication solution-set for companies with external-facing web applications to their employees, contractors, suppliers, and vendors. This all-in-one integrated design includes two ...

VendorPistolStar Inc.
Pricing ModelService
Modified
Deep-Secure Chat Guard

Visit the Product Site

The Deep-Secure Chat Guard is one of our family of Content Inspection Guards.  It controls the use of Internet standard chat, to allow an organisation to make use of chat without putting sensitive information or critical business processes at risk. ...

VendorDeep-Secure
Pricing ModelCommercial
Modified
Deep-Secure XML Guard

Visit the Product Site

The Deep-Secure XML Guard is one Guard in our family of Content Control Guards.  It controls XML data entering and leaving an organisation, defending against advanced attacks and misuse.  Its self-defending architecture means it can exert the re ...

Category:Guards XML
VendorDeep-Secure
Pricing ModelCommercial
Modified
Paws Studio

Visit the Product Site

Paws Studio is a compliance solution which is cost effective, easy to use and produces compliance reports in seconds on your workstations and servers. • Audit against and edit pre-defined compliance policies such as SANS, NERC, PCI DSS, NSA and STIGs • ...

Category:Compliance
VendorTitania Ltd.
Pricing ModelCommercial
Modified
RSA SecurID Software Authenticator

Visit the Product Site

RSA SecurID Software Authenticator protects mobile users within your organisation with security tokens for their smartphones, tablets and PCs. It uses software tokens to secure access from popular mobile platforms, including iOS (iPhone, iPad), Android, B ...

VendorEMC Corporation
Pricing ModelCommercial
Modified