Newest Listing

Top Rated

Most Popular

Directory: Recently Added Listings RSS

Deep Secure Web Guard

Visit the Product Site

This product controls web traffic entering and leaving the organisation, defending against advanced attacks and misuse. It is increasingly used by organisations that need to tightly control Internet browsing traffic or need to use web protocols to transfe ...

Category:Guards Web
VendorDeep Secure
Pricing ModelCommercial
Modified
Deep-Secure Mail Guard

Visit the Product Site

This product controls web traffic entering and leaving the organisation, defending against advanced attacks and misuse. It is increasingly used by organisations that need to tightly control Internet browsing traffic or need to use web protocols to transfe ...

Category:Guards Mail
VendorDeep-Secure
Pricing ModelCommercial
Modified
Deep-Secure Minerva

Visit the Product Site

Minerva is Deep-Secure's next gneration data diode that allows information to be checked before being securely passed in or out of an isolated system whilst protecting against attack from the opposite direction.   Features and benefits Integrate ...

Category:Data Diodes
VendorDeep-Secure
Pricing ModelCommercial
Modified
Deep Secure File Transfer Guard

Visit the Product Site

This product controls file transfers entering and leaving the organisation, defending against advanced attacks and misuse. It is used by organisations that need to tightly control file transfers with Internet servers or need to pass files between separate ...

VendorDeep Secure
Pricing ModelCommercial
Modified
Deep Secure Network Management Guard

Visit the Product Site

This product controls network management traffic as it passes between the enterprise networks and the management system. Its self-defending architecture means it can exert the required control without itself becoming vulnerable to attack.   Featur ...

VendorDeep Secure
Pricing ModelCommercial
Modified
Deep-Secure XML Guard

Visit the Product Site

This product controls XML data entering and leaving the organisation, defending against advanced attacks and misuse. It is used by organisations that need to tightly control web services traffic used for document management, collaboration, billing, e-comm ...

Category:Guards XML
VendorDeep-Secure
Pricing ModelCommercial
Modified
Redscan ThreatDetect

Visit the Product Site

THREATDETECT – Rapid detection and response to cyber threats Redscan ThreatDetect is a Security Operations Centre as-a-service platform that provides visibility of breaches and threats that impact information security risk. The service combines AlienVau ...

VendorRedscan
Pricing ModelService
Modified
NNT Change Tracker Gen 7

Visit the Product Site

NNT Change Tracker Gen 7™ provides continuous protection against known and emerging cyber security threats in an easy to use solution, offering true enterprise coverage through agent-based and agentless monitoring options. Unlike traditional scanning solu ...

VendorNew Net Technologies
Pricing ModelCommercial
Modified

SourceMeter

0 reviews
SourceMeter

Visit the Product Site

SourceMeter is a source code analyzer tool, which can perform deep static analysis of the source code of complex Java, C/C++, RPG (AS/400) and Python systems Features: Precise and deep static analysis, building full semantic graphs, containing semanti ...

VendorFrontEndART Ltd.
Pricing ModelCommercial
Modified

Visit the Product Site

This popular course explores malware analysis tools and techniques in depth. FOR610 training has helped forensic investigators, incident responders, security engineers, and IT administrators acquire the practical skills to examine malicious programs that ...

VendorSANS
Pricing ModelCommercial
Modified

REMnux

0 reviews
REMnux

Visit the Product Site

REMnux™ is a free Linux toolkit for assisting malware analysts with reverse-engineering malicious software. It strives to make it easier for forensic investigators and incident responders to start using the variety of freely-available tools that can exami ...

VendorLenny Zeltser
Pricing ModelOpen Source
Modified

Visit the Product Site

Simple site used to test firewall rules. Select TCP ports, click test, and it will attempt to connect to the target server you specify. Free, but does contain ads in header and footer.

Vendoridontwanttowork.com
Pricing ModelFreeware
Modified

OWASP DirBuster

0 reviews

Visit the Product Site

DirBuster is a multi threaded java application designed to brute force directories and files names on web/application servers. Often is the case now of what looks like a web server in a state of default installation is actually not, and has pages and appl ...

VendorOWASP
Pricing ModelFreeware
Modified

PCAP2XML

0 reviews
PCAP2XML

Visit the Product Site

PCAP2XML is a tool suite which takes 802.11 PCAP trace files as input and can convert them into XML or SQLITE representations. This allows a pentester to run arbitrary queries on the packet header fields. Why do we need this? Wireshark is great when it ...

Category:Uncategorised
VendorSecurityTube
Pricing ModelOpen Source
Modified

PentesterLab

0 reviews
PentesterLab

Visit the Product Site

PentesterLab is an easy and great way to learn penetration testing. PentesterLab provides vulnerable systems that can be used to test and understand vulnerabilities. Hands-on There is only one way to properly learn web penetration testing: by getting y ...

Category:Ethical Hacking
VendorPentesterLab
Pricing ModelFreeware
Modified
Wave Endpoint Monitor

Visit the Product Site

Malware can do its work for weeks or months before you ever know it’s there. But with Wave Endpoint Monitor, you can spot malware before it has a chance to cause damage. Antivirus software can’t detect rootkits and other malware; it works at the level of ...

VendorWave Systems Corp.
Pricing ModelCommercial
Modified
Wave Virtual Smart Card

Visit the Product Site

Wave Virtual Smart Card (VSC) uses secure hardware that already ships standard on most business-class laptops and tablets today: the Trusted Platform Module, or TPM, a hardware security chip developed by the Trusted Computing Group. Because TPM is an int ...

VendorWave Systems Corp.
Pricing ModelCommercial
Modified

Wave Cloud

0 reviews
Wave Cloud

Visit the Product Site

You know you should be encrypting data on every device in your organization, especially your laptops. Self-encrypting drives (SEDs) are the fastest, easiest and most secure way to do that. But setting up to support and manage SEDs can seem daunting. Even ...

VendorWave Systems Corp.
Pricing ModelCommercial
Modified

Wave Inspector

0 reviews
Wave Inspector

Visit the Product Site

Inspector lets you decide which people and which data need minding, and which can have more freedom. First you define which data you consider sensitive—for example, patient names or credit card numbers. Then you define how each class of information is goi ...

VendorWave Systems Corp.
Pricing ModelCommercial
Modified

Wave Reporter

0 reviews
Wave Reporter

Visit the Product Site

Knowing when your data has been accessed by removable storage devices and wireless ports is important. Reporter does that. But it also gives you the analysis you need to make sense of these incidents. It lets you chunk or chop up the information in a vari ...

Category:Compliance
VendorWave Systems Corp.
Pricing ModelCommercial
Modified