Newest Listing

Top Rated

Most Popular

Directory: Recently Added Listings RSS

Deep-Secure XML Guard

Visit the Product Site

This product controls XML data entering and leaving the organisation, defending against advanced attacks and misuse. It is used by organisations that need to tightly control web services traffic used for document management, collaboration, billing, e-comm ...

Category:Guards XML
VendorDeep-Secure
Pricing ModelCommercial
Modified
Redscan ThreatDetect

Visit the Product Site

THREATDETECT – Rapid detection and response to cyber threats Redscan ThreatDetect is a Security Operations Centre as-a-service platform that provides visibility of breaches and threats that impact information security risk. The service combines AlienVau ...

VendorRedscan
Pricing ModelService
Modified
NNT Change Tracker Gen 7

Visit the Product Site

NNT Change Tracker Gen 7™ provides continuous protection against known and emerging cyber security threats in an easy to use solution, offering true enterprise coverage through agent-based and agentless monitoring options. Unlike traditional scanning solu ...

VendorNew Net Technologies
Pricing ModelCommercial
Modified

SourceMeter

0 reviews
SourceMeter

Visit the Product Site

SourceMeter is a source code analyzer tool, which can perform deep static analysis of the source code of complex Java, C/C++, RPG (AS/400) and Python systems Features: Precise and deep static analysis, building full semantic graphs, containing semanti ...

VendorFrontEndART Ltd.
Pricing ModelCommercial
Modified

Visit the Product Site

This popular course explores malware analysis tools and techniques in depth. FOR610 training has helped forensic investigators, incident responders, security engineers, and IT administrators acquire the practical skills to examine malicious programs that ...

VendorSANS
Pricing ModelCommercial
Modified

REMnux

0 reviews
REMnux

Visit the Product Site

REMnux™ is a free Linux toolkit for assisting malware analysts with reverse-engineering malicious software. It strives to make it easier for forensic investigators and incident responders to start using the variety of freely-available tools that can exami ...

VendorLenny Zeltser
Pricing ModelOpen Source
Modified

Visit the Product Site

Simple site used to test firewall rules. Select TCP ports, click test, and it will attempt to connect to the target server you specify. Free, but does contain ads in header and footer.

Vendoridontwanttowork.com
Pricing ModelFreeware
Modified

OWASP DirBuster

0 reviews

Visit the Product Site

DirBuster is a multi threaded java application designed to brute force directories and files names on web/application servers. Often is the case now of what looks like a web server in a state of default installation is actually not, and has pages and appl ...

VendorOWASP
Pricing ModelFreeware
Modified

PCAP2XML

0 reviews
PCAP2XML

Visit the Product Site

PCAP2XML is a tool suite which takes 802.11 PCAP trace files as input and can convert them into XML or SQLITE representations. This allows a pentester to run arbitrary queries on the packet header fields. Why do we need this? Wireshark is great when it ...

Category:Uncategorised
VendorSecurityTube
Pricing ModelOpen Source
Modified

PentesterLab

0 reviews
PentesterLab

Visit the Product Site

PentesterLab is an easy and great way to learn penetration testing. PentesterLab provides vulnerable systems that can be used to test and understand vulnerabilities. Hands-on There is only one way to properly learn web penetration testing: by getting y ...

Category:Ethical Hacking
VendorPentesterLab
Pricing ModelFreeware
Modified
Wave Endpoint Monitor

Visit the Product Site

Malware can do its work for weeks or months before you ever know it’s there. But with Wave Endpoint Monitor, you can spot malware before it has a chance to cause damage. Antivirus software can’t detect rootkits and other malware; it works at the level of ...

VendorWave Systems Corp.
Pricing ModelCommercial
Modified
Wave Virtual Smart Card

Visit the Product Site

Wave Virtual Smart Card (VSC) uses secure hardware that already ships standard on most business-class laptops and tablets today: the Trusted Platform Module, or TPM, a hardware security chip developed by the Trusted Computing Group. Because TPM is an int ...

VendorWave Systems Corp.
Pricing ModelCommercial
Modified

Wave Cloud

0 reviews
Wave Cloud

Visit the Product Site

You know you should be encrypting data on every device in your organization, especially your laptops. Self-encrypting drives (SEDs) are the fastest, easiest and most secure way to do that. But setting up to support and manage SEDs can seem daunting. Even ...

VendorWave Systems Corp.
Pricing ModelCommercial
Modified

Wave Inspector

0 reviews
Wave Inspector

Visit the Product Site

Inspector lets you decide which people and which data need minding, and which can have more freedom. First you define which data you consider sensitive—for example, patient names or credit card numbers. Then you define how each class of information is goi ...

VendorWave Systems Corp.
Pricing ModelCommercial
Modified

Wave Reporter

0 reviews
Wave Reporter

Visit the Product Site

Knowing when your data has been accessed by removable storage devices and wireless ports is important. Reporter does that. But it also gives you the analysis you need to make sense of these incidents. It lets you chunk or chop up the information in a vari ...

Category:Compliance
VendorWave Systems Corp.
Pricing ModelCommercial
Modified
Check Point Network Policy Management

Visit the Product Site

The Check Point Network Policy Management Software Blade provides comprehensive, centralized network security policy management for Check Point gateways and Software Blades, via SmartDashboard—a single, unified console that provides control over even the ...

VendorCheck Point
Pricing ModelCommercial
Modified

Visit the Product Site

Mobile security and complexity don’t have to go hand in hand. Check Point Capsule is one seamless solution that addresses all your mobile security needs. Capsule protects your mobile devices from threats, provides a secure business environment for mobile ...

Category:Mobile Devices
VendorCheck Point
Pricing ModelCommercial
Modified

Visit the Product Site

Dynamic NAC is the Network Access Control solution that requires ZERO network changes, making it many times easier and faster to deploy than traditional NAC solutions. Dynamic NAC offers centralized management, flexible policies, granular quarantining and ...

VendorInfoexpress
Pricing ModelCommercial
Modified
Genie Networks GenieATM

Visit the Product Site

GenieATM Traffic Mining Solution from Genie Networks is a flow-based traffic analysis solution that delivers a real-time, network-wide view on traffic flows and network behaviors for service providers and large enterprises. GenieATM offers intelligent fl ...

VendorGenie Networks
Pricing ModelCommercial
Modified

Visit the Product Site

The BrightCloud Mobile Security SDK for Android™ and iOS® addresses mobile device vulnerabilities by enabling mobile management partners to offer enhanced security for their customers. It features antivirus, antimalware, device and application interrogati ...

Category:Mobile Devices
VendorWebroot
Pricing ModelCommercial
Modified