Newest Listing

Top Rated

Most Popular

Directory: Recently Added Listings RSS

RSA Security Analytics

Visit the Product Site

By bringing together security information event management (SIEM) , network security monitoring, and combining them with the advanced analysis capabilities of a data security warehouse and integrated threat intelligence, RSA Security Analytics helps secur ...

VendorEMC Corporation
Pricing ModelCommercial
Modified
Encrypted Mobile Phone Communication Micro SD Card

Visit the Product Site

CEN-02 Encrypted Mobile Phone Communication Micro SD Card provides you with supreme point-to-point voice encryption. You can exempt the doubt of being tapped through hardware encryption technology. CEN-02 Encrypted Mobile Phone Communication Micro SD Card ...

Category:Mobile Devices
VendorClever Intelligence Unity
Pricing ModelCommercial
Modified
Wide Range RF Signal Detector GPS Detector

Visit the Product Site

RFD-01 Wide Range RF Signal Detector is a super heterodyne receiver with low IF and frequency synthesizer. Scanning and analyzing cycle period is 1.0-1.5 sec. It can operate within guard, sweep, search, difference search modes and monitoring of digital si ...

VendorClever Intelligence Unity
Pricing ModelCommercial
Modified

Visit the Product Site

FlowNBA is a complete solution for network monitoring based on NetFlow/IPFIX. Thanks to the used technology it enables complete overview of the network traffic, detailed information about all communications and provides information about who communicates ...

VendorFlowNBA.com
Pricing ModelLimited Free Trial
Modified
Tags
FlowMon

Visit the Product Site

The FlowMon solution delivers the flow-based (NetFlow/IPFIX) monitoring for all organizations and all networks from 10 Mbps to 10 Gbps. It provides the statistics necessary for network monitoring, security, troubleshooting, IP accounting and billing, capa ...

VendorINVEA-TECH a.s.
Pricing ModelCommercial
Modified
NetworkMiner

Visit the Product Site

NetworkMiner is a comprehensive Network Forensic Analysis Tool (NFAT) for Windows (but also works in Linux / Mac OS X / FreeBSD), which has become increasingly popular among incident response teams and law enforcement. Without placing any traffic on the n ...

VendorNETRESSEC AB
Pricing ModelCommercial
Modified
Barracuda Firewall

Visit the Product Site

The Barracuda Firewall provides extensive application control and user identity functions in an easy-to-use solution. This firewall is optimised for bandwidth-sensitive tasks like packet forwarding and routing layer 7 applications, Intrusion Prevention (I ...

VendorBarracuda
Pricing ModelCommercial
Modified
iVE - Vehicle Forensics

Visit the Product Site

iVe is a vehicle system forensic tool that acquires user data from vehicles and allows forensic examiners and investigators a means to quickly and intuitively analyze it. Vehicle Infotainment systems store a vast amount of user related data such as recen ...

VendorBerla
Pricing ModelCommercial
Modified

Visit the Product Site

ADD is a physical memory anti-analysis tool designed to pollute memory with fake artifacts. This tool was first presented at Shmoocon 2014. Please note that this is a proof of concept tool. It forges OS objects in memory (poorly). It would be easy (very e ...

VendorJake Williams
Pricing ModelOpen Source
Modified
Barracuda Web Filter

Visit the Product Site

The Barracuda Web Filter lets organizations benefit from online applications and tools without exposure to web-borne malware and viruses, lost user productivity, and misused bandwidth. As a comprehensive solution for web security and management, it unite ...

Category:Guards Web
VendorBarracuda
Pricing ModelCommercial
Modified
Tags, ,
The Cyber Scheme Team Member Training (CSTM)

Visit the Product Site

The Cyber Scheme CSTM course is suitable for both public and private sector IT Security professionals who wish to develop their penetration testing skills to a standard undergoing accreditation by CESG for CHECK Team Members. Covering a broad range of dis ...

Category:Ethical Hacking
VendorEncription Limited
Pricing ModelCommercial
Modified
OSSIM™ - Open Source SIEM

Visit the Product Site

OSSIM provides all of the features that a security professional needs from a SIEM offering – event collection, normalization, and correlation. Established and launched by security engineers out of necessity, OSSIM was created with an understanding of the ...

VendorAlienVault
Pricing ModelOpen Source
Modified
AlienVault Reputation Monitor

Visit the Product Site

Free Reputation Monitor Alert Service Receive rapid alerts when your IPs & domains are compromised. No hardware or software required. Simply submit your IPs and domains. AlienVault will take care of the rest... you'll receive an email as soon as they ...

VendorAlienVault
Pricing ModelFreeware
Modified

Visit the Product Site

About Real time, system wide monitoring Monitoring technology knows what every process on your machine is doing at every given moment - and is specially designed to be lightweight and with a small footprint. Behavioural based detection Purely behaviou ...

VendorSentinel Labs
Pricing ModelCommercial
Modified
Averail Access

Visit the Product Site

Averail Access is one solution to access and control all content on mobile devices. It is an app that employees easily download to their personal or corporate owned devices to access content in the cloud and on a corporate network, combined with a managem ...

Category:Mobile Devices
VendorAverail
Pricing ModelService
Modified
LAVA - Live Attack Visualization & Analysis

Visit the Product Site

LAVA is a centralized security application that works in conjunction with Bromium's vSentry software installed at endpoints throughout the organization. LAVA gathers information from each vSentry endpoint - even mobile laptops not connected to the corpora ...

Category:Enterprise
VendorBromium
Pricing ModelCommercial
Modified
Helix3 Pro

Visit the Product Site

  A multi-platform LIVE side for three environments; Mac OS X, Windows and Linux with one simple to use interface Make forensic images of all internal devices Make a forensic image of physical memory (32 and 64 bit) Determine if disk level en ...

Category:Forensic Tools
Vendore-fense
Pricing ModelCommercial
Modified
Lucent Sky CLEAR

Visit the Product Site

Application vulnerability mitigation is the next wave of cybersecurity. By analyzing source code, AVM systems are able to scan for, identify, and automatically mitigate application vulnerabilities. This process dramatically increases the security threshol ...

VendorLucent Sky
Pricing ModelCommercial
Modified

Visit the Product Site

PixelPin is a B2B2C solution which replaces passwords with pictures. Users choose a picture and click on it in 4 places in sequence to sign in. Key benefits of PixelPin's picture password Simple, quick & easy to use across all platforms On mobile d ...

VendorPixelPin
Pricing ModelCommercial
Modified
Stormpath User Management and Authentication

Visit the Product Site

Stormpath is a User Management API that reduces development time with instant-on, scalable user infrastructure. Stormpath's intuitive API and expert support make it easy for developers to authenticate, manage and secure users and roles in any application. ...

VendorStormpath
Pricing ModelService
Modified