Skip to main content

Directory: All Listings 

Results 141 - 160 of 1237 This Category
All Listings
Risk Based Security

VulnDB is the most comprehensive and timely vulnerability intelligence available and provides actionable information about the latest in security vulnerabilities via an easy-to-use SaaS Portal, or a RESTful API that allows easy integration into GRC tool ...

VulnDB
Total Defense Inc.

Total Defense Essential Anti-Virus Internet Security Malware protection – simple, smart, and reliable protection from viruses, spyware, ransomware and other malware threats on up to 3 of your PCsMulti-layer technology – real-time and on-demand malware sc ...

Total Defense Anti-Virus
Middlesex University

3 years Full Time

Kingston University

4 years Sandwich Course

The Viasat Eclypt Core encrypted internal hard drive protects data at rest in commercial-off-the-shelf (COTS) laptop and desktop computers in enterprise and tactical environments, as well as data stored in vehicles, aircraft, and ships. During high-risk o ...

Eclypt Core Encrypted Internal Hard Drive
University of West of England

3 years Full Time / 4 years Sandwich Course

Resilience Corporation

Resilience offers iHA? firewall/VPN solutions in the performance range and expandability for users who vary from high-traffic telecom carriers all the way down to low-traffic SMBs and ROBOs. Covered by the Continuous Secured Ownership WarrantySM, these ar ...

Category VPN Servers
Check Point Software Technologies Ltd.

The Internet provides a flexible and cost-effective infrastructure for extending the corporate network to all employees and key partners. Yet the Internet also conceals constantly changing threats. To take full advantage of the Internet, you must prevent ...

Category VPN Servers

Real-time threat detections across endpoints, data centers, and the cloud. Securing your network against advanced persistent threats (APTs) requires greater visibility to detect actors and their actions so that you can reduce your response time. As threa ...

LogRhythm NDR
SystemWare Europe Ltd

The SystemWare Advanced Receiver Module (SWARM) Travel Case (STC) provides signal acquisition and analysis needs in a compact and portable package. Quick and simple to operate it can scan the RF spectrum from 1 kHz to 3GHz or 6 GHz with the internal recei ...

WildFire utilizes near real-time analysis to detect previously unseen, targeted malware and advanced persistent threats, keeping your organization protected. Scan Malware Anywhere Access advanced file analysis capabilities to secure applications like we ...

Palo Alto WildFire
De Montfort University

3 years Full Time / 4 years Sandwich Course

Password Manager Pro is a secure vault for storing and managing shared sensitive information such as passwords, documents and digital identities of enterprises. The benefits of deploying Password Manager Pro include: Eliminating password fatigue and s ...

Password Manager Pro

SolarWinds’ newest free tool, Real-time NetFlow Analyzer, unlocks the power of NetFlow on your network, empowering you to shutdown the bandwidth hogs and ensure peak performance of your mission-critical network applications. Real-time NetFlow Analyzer cap ...

SolarWinds NetFlow Analyzer

The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico ...

Innominate Security Technology AG

The Innominate mGuard products offer extensive security functions such as VPNs (Virtual Private Networks), firewall and optional virus protection (powered by Kaspersky) ? regardless of the computer platform used. With the Innominate Security Configuration ...

Category VPN Servers
Brandon McCann

Phishing Frenzy is an Open Source Ruby on Rails application that is leveraged by penetration testers to manage email phishing campaigns. The goal of the project is to streamline the phishing process while still providing clients the best realistic phishi ...

Intense School

Intense School offers the finest Cisco Firewall Specialist certification training in the industry. During our intense boot camp, we guide you through configuring, troubleshooting and administering Cisco firewalls (PIX) and ASA (Adaptive Security Appliance ...

This hands-on track offers a practical working knowledge in intrusion detection and traffic analysis, taught by top practitioners/authors in the field. This is the most advanced program in network intrusion detection that has ever been taught. All of the ...

AlgoSec Inc.

AlgoSec FireFlow automates the entire security policy change workflow – from submission and design to risk analysis, implementation, validation and audit - enabling security and operations teams to: Reduce the time required to process firewall changes ...

AlgoSec FireFlow