Skip to main content

Directory: All Listings 

Results 41 - 60 of 1237 This Category
All Listings
PTR Associates, Ltd.

This 3 day instructor led course is task orientated and teaches the skills needed to describe, configure, verify and manage the PIX Firewalls.

SonicWall, Inc.

Secure your infrastructure while empowering your workforce. The Secure Mobile Access (SMA) series offers complete security for remote access to corporate resources hosted on-prem, in cloud and in hybrid datacenters. SonicWall Secure Mobile Access (SMA) i ...

Category VPN Servers
Secure Mobile Access
Carnegie Mellon SEI

This five-day course is designed for computer security incident response team (CSIRT) technical personnel with little or no incident-handling experience. Through interactive instruction and practical exercises, the course provides insight into the type an ...

Integrigy Corporation

AppDefend is an intrusion prevention system and web application firewall specifically written for the Oracle E-Business Suite Release R12 and Oracle PeopleSoft. The purpose of AppDefend is to block most types of web attacks against Oracle E-Business Suite ...

AppDefend
Nevis Networks

The LANenforcer 2024 and 2124 LAN Security Appliances transparently integrate into existing network infrastructures, sitting between existing switches at the access and distribution layers. The LANenforcer Appliance is an ideal solution for organizations ...

Over the past several years security has dominated the corporate agenda. While there has been significant effort expended in protecting organizational resources, security incidents have been on the rise. There has also been a paucity of research in dealin ...

ISECOM - Institute for Security and Open Methodologies

The premise of the training course is to support the necessary knowledge transfer for a person to be considered a capable, resourceful, and self-sufficient security tester. The training course focuses on the technical skills necessary for security testing ...

Category Ethical Hacking
Red Hat, Inc

Red Hat Enterprise Linux has gained considerable momentum as the operating system of choice for deploying network services such as web, ftp, email, and file sharing. RHS333 Red Hat Enterprise Security: Network Services is an intensive course that provides ...

Stellar perimeter security and a clear path to the future. Novell BorderManager has been keeping systems secure and employees productive for nearly a decade. And the newly-released Novell BorderManager 3.9 continues this tradition. Like earlier versions, ...

Category VPN Servers
Kaspersky Labs

Protect your browsing, shopping, chats & data across your PC, Mac & Android devices. Get antivirus plus a range of tools built to guard your private life and identity. It also includes: Free VPN with up to 300 MB of traffic per day Safe Money to ...

Kaspersky Internet Security

hping2 is an interactive packet costructor and responses analyzer that uses the same CLI of the ping program (but with a lot of extensions). It can be used to performs a lot of tasks, like testing of firewall rules, (spoofed) port scanning, et cetera.

Arne Vidstrom

PMDump is a tool that lets you dump the memory contents of a process to a file without stopping the process. This can be useful in a forensic investigation.

Category Forensic Tools

Information is the most important resource any organization controls, and ensuring its confidentiality is crucial in today?s world. Secure IT addresses continuing and new threats to information security as well as responses to the increasing risk of data ...

NetSentron Popular

Kobelt Development Inc.

Netsentron uses a quadruple filtering system to prevent threatening content, images and pages from loading on your computer, while allowing content you have predetermined as safe to pass through. You are in control of deciding which pages your organizatio ...

Category Guards Web
NetSentron

Trust your inbox again with cloud email security protecting your people and critical information from malware, as well as malware free phishing and impersonation attempts. Keep Imposters OutAutomatically identify your high-profile targets for malware-fre ...

Sophos Email

SPAMfighter Exchange Module, SPAMfighter SMTP Anti Spam Server and SPAMfighter Hosted Spam Filter are the most effective and easy-to-use Spam Filters for protecting the company network against spam and phishing fraud. SPAMfighter Exchange Module (SEM), i ...

Computers are now available anytime, anywhere, by different means, and distributed unobtrusively throughout the everyday environments in which physical objects/artifacts embedded with invisible computers are sensible and networked locally and globally. Su ...

Tenable Network Security Inc

The Tenable Passive Vulnerability Scanner (PVS) can find out what is happening on your network without actively scanning it. Each PVS monitors your network for vulnerable systems, watches for potential application compromises, client and server trust rela ...

Avast Business

Easy-to-use business protection with features specific to Windows servers. Don’t overlook protecting your infrastructure - securing Windows servers is a vital part of comprehensive cybersecurity for businesses that use them. Keep your network protected, ...

Category Servers
Avast Next-Gen Antivirus for Windows servers
Scott Ullrich

pfSense is a open source firewall derived from the m0n0wall operating system platform with radically different goals such as using Packet Filter, FreeBSD 6.X (or DragonFly BSD when ALTQ and CARP is finished) ALTQ for excellent packet queueing and finally ...