Skip to main content

Directory: All Listings 

Results 81 - 100 of 1237 This Category
All Listings
Check Point Software Technologies Ltd.

The Internet provides a flexible and cost-effective infrastructure for extending the corporate network to all employees and key partners. Yet the Internet also conceals constantly changing threats. To take full advantage of the Internet, you must prevent ...

Category VPN Servers

Stellar perimeter security and a clear path to the future. Novell BorderManager has been keeping systems secure and employees productive for nearly a decade. And the newly-released Novell BorderManager 3.9 continues this tradition. Like earlier versions, ...

Category VPN Servers
SonicWALL Inc.

The SonicWALL? PRO Series solves these issues by combining multiple network and security functions including a deep packet inspection firewall, IPSec VPN, layered anti-virus, anti-spyware, intrusion prevention and Web content filtering capabilities into a ...

SonicWALL Inc.

Protect your small business or branch location from intrusion, malware and ransomware with an easy-to-use, integrated security solution designed specifically for your needs. SonicWall TZ firewalls deliver enterprise-grade protection without the cost or co ...

SonicWALL TZ Series
SystemWare Europe Ltd

The SystemWare Advanced Receiver Module (SWARM) Travel Case (STC) provides signal acquisition and analysis needs in a compact and portable package. Quick and simple to operate it can scan the RF spectrum from 1 kHz to 3GHz or 6 GHz with the internal recei ...

ISECOM - Institute for Security and Open Methodologies

The premise of the training course is to support the necessary knowledge transfer for a person to be considered a capable, resourceful, and self-sufficient security tester. The training course focuses on the technical skills necessary for security testing ...

Category Ethical Hacking

Safend Protector prevents internal/external data leakage by monitoring endpoint devices and data flow. Using granular and customizable security policies and rules, Protector automatically detects, permits and restricts files and encrypts media devices. Ve ...

Safend Protector

The main aim of the HITBSecConf conference series is to enable the dissemination, discussion and sharing of deep knowledge network security information. Featuring presentations by respected members of both the mainstream network security arena as well as ...

Process Software

PreciseMail Anti-Spam Gateway is an enterprise solution that eliminates spam, phishing and virus threats at the Internet gateway or mail server. High Spam Detection Accuracy - PreciseMail Anti-Spam Gateway has a proven out-of-the-box spam detection accur ...

Turner and Sons Productions Inc.

If2k-Only V2.3.0    Security matters ! Lockout adware, spyware, unauthorized downloads, viruses, p2p activity, pornography, legal liabilities -lockout everything except what you determine you want ! The future of your business will depend upon ...

Category Uncategorised
Internet Filter if2k
Intense School

Intense School offers the finest Cisco Firewall Specialist certification training in the industry. During our intense boot camp, we guide you through configuring, troubleshooting and administering Cisco firewalls (PIX) and ASA (Adaptive Security Appliance ...

GFI Software

KerioControl is a next-generation firewall and unified threat management product for small and medium-sized businesses (SMBs). With KerioControl, businesses gain:A firewall that connects you to the internetIntrusion protection that monitors trafficWeb con ...

KerioControl
7Safe Limited

This is an advanced practical 3 day web hacking training course for penetration testers, security researchers, and security professionals needing to learn the art of security testing web applications. This hands-on course helps the attendees gain in-d ...

CAST Application Security Training

Plixer NPMD Popular

Device discovery Track assets scattered across your entire enterprise. Gather a complete and accurate view of all network endpoints, including managed and unmanaged devices, and authorized and unauthorized devices. Understand what types of devices are on ...

Category Network Mapping
Plixer NPMD
WaveFront Consulting Group

This 4-day course aims to provide web application developers with an understanding of application security issues and attack vectors, and the skills necessary to code defensively against web attacks. We will show how hackers can abuse a web application, ...

Security University

Earn your CWSP™ certification and master the fundamentals of wireless and how to secure your wireless infrastructures. This course targets experienced networking professionals who wish to gain critical skills in wireless networking security, incl ...

Chinotec Technologies Company

We wrote a program called "Paros" for people who need to evaluate the security of their web applications. It is free of charge and completely written in Java. Through Paros's proxy nature, all HTTP and HTTPS data between server and client, including cooki ...

Category Website Scanners
Paros Proxy

Trust your inbox again with cloud email security protecting your people and critical information from malware, as well as malware free phishing and impersonation attempts. Keep Imposters OutAutomatically identify your high-profile targets for malware-fre ...

Sophos Email
German Informatics Society

In order to advance the fields of IT-Incident Management and Forensics the special interest-group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) organises an annual conference, bringing together experts from thr ...

Scott Ullrich

pfSense is a open source firewall derived from the m0n0wall operating system platform with radically different goals such as using Packet Filter, FreeBSD 6.X (or DragonFly BSD when ALTQ and CARP is finished) ALTQ for excellent packet queueing and finally ...