Skip to main content

Directory: All Listings 

Results 161 - 180 of 1237 This Category
All Listings

This course will put you through the paces in Linux as it stands itself (the operating system), and then move you into Linux and Data Forensics. The idea here is to take someone new to Linux and get them up and running with enough knowledge and hands on e ...

The BrightCloud File Reputation Service provides next-generation Webroot threat intelligence by offering customers a dynamic, up-to-the-minute file reputation service to protect their data and assets. This real-time lookup service of known malicious and w ...

Category Guards Web
Avast Business

Easy-to-use business protection with features specific to Windows servers. Don’t overlook protecting your infrastructure - securing Windows servers is a vital part of comprehensive cybersecurity for businesses that use them. Keep your network protected, ...

Category Servers
Avast Next-Gen Antivirus for Windows servers
SystemWare Europe Ltd

The SystemWare Advanced Receiver Module (SWARM) Travel Case (STC) provides signal acquisition and analysis needs in a compact and portable package. Quick and simple to operate it can scan the RF spectrum from 1 kHz to 3GHz or 6 GHz with the internal recei ...

DirX Audit provides a platform for the central collection, normalization, storage, and analysis of audit trails from different audit sources. Auditors can use DirX Audit's web-based user interface to analyze and correlate the audit logs in the central ...

Resilience Corporation

Resilience offers iHA? firewall/VPN solutions in the performance range and expandability for users who vary from high-traffic telecom carriers all the way down to low-traffic SMBs and ROBOs. Covered by the Continuous Secured Ownership WarrantySM, these ar ...

Category VPN Servers
AlgoSec Inc.

AlgoSec FireFlow automates the entire security policy change workflow – from submission and design to risk analysis, implementation, validation and audit - enabling security and operations teams to: Reduce the time required to process firewall changes ...

AlgoSec FireFlow

The Certified Digital Forensics Examiner program is designed to train Cyber Crime Investigators. Students are taught electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while con ...

Over the past several years security has dominated the corporate agenda. While there has been significant effort expended in protecting organizational resources, security incidents have been on the rise. There has also been a paucity of research in dealin ...

Newcastle College

2 years Full Time

The Viasat Eclypt Core encrypted internal hard drive protects data at rest in commercial-off-the-shelf (COTS) laptop and desktop computers in enterprise and tactical environments, as well as data stored in vehicles, aircraft, and ships. During high-risk o ...

Eclypt Core Encrypted Internal Hard Drive
Stratus Engineering

The EZ-Tap Pro is an industry leading protocol analyzer.

Fortress Technologies

The Fortress product family provides the most robust, scalable and easy-to-manage line of security gateway solutions for ensuring privacy of wireless networks and mission-critical enterprise applications. These FIPS certified security products provide use ...

Category VPN Servers
Middlesex University

3 years Full Time

Exports to SFlow

Harrow School of Computer Science, University of Westminster

This innovative and flexible course aims to equip those responsible for the development and implementation of IT security policy to:

VPN Dynamics, Inc.

The CSSA Instructor-led Training is designed to reinforce the foundational knowledge in the SonicWALL Technical e*Training courses. These courses provide the hands-on experiential training that will enhance problem solving and provide dynamic feedback in ...

Foxton Software

Browser History viewer is a free tool for extracting, viewing and analysing internet history from Firefox, Chrome and Internet Explorer web browsers. Website visits are displayed alongside an interactive graph, showing how many sites have been visited ov ...

Category Forensic Tools
Browser History Viewer
Check Point Software Technologies

Harmony Endpoint provides comprehensive endpoint protection at the highest security level, crucial to avoid security breaches and data compromise. Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’ ...

Harmony Endpoint Protection
SonicWALL Inc.

The SonicWALL? PRO Series solves these issues by combining multiple network and security functions including a deep packet inspection firewall, IPSec VPN, layered anti-virus, anti-spyware, intrusion prevention and Web content filtering capabilities into a ...