Skip to main content

Directory: All Listings 

Results 341 - 360 of 1235 This Category
All Listings
DIMVA
Commercial

The annual DIMVA conference serves as a premier forum for advancing the state of the art in intrusion detection, malware detection, and vulnerability assessment. Each year DIMVA brings together international experts from academia, industry and government ...

Akamai Technologies
Commercial

Customisable and Automated Protection Kona Site Defender provides both customizable and automated protection in one solution, while curated rule sets allow you to tailor protection for accuracy. Automated protection extends security across your entire ap ...

Category WAF - Cloud
Kona Site Defender
Hitachi ID Systems, Inc.
Commercial

Hitachi ID Bravura Pass is an integrated solution for managing credentials across systems and applications. It simplifies the management of passwords, tokens, smart cards, security questions and biometrics. Bravura Pass lowers IT support cost and imp ...

Hitachi ID Bravura Pass
IBM Corporation
Commercial

Learn how to set up and administer a Linux(TM)-based firewall.

SonicWall, Inc.
Commercial

The SonicWALL Content Security Manager Series (CSM), featuring the 2200 and 3200 models, is an appliance-based gateway security and content filtering solution that integrates real-time gateway anti-virus, anti-spyware and intrusion prevention to deliver m ...

Category Uncategorised
SonicWALL Content Security Manager
Citrix Systems, Inc.
Commercial

NetScaler AppFirewall is a best-of-breed web application firewall (WAF) that protects web applications and sites from both known and unknown attacks, including OWASP top 10 and zero-day threats. NetScaler AppFirewall delivers comprehensive protection ...

Category WAF - Appliances
NetScaler AppFirewall
Crazytrain

This course will put you through the paces in Linux as it stands itself (the operating system), and then move you into Linux and Data Forensics. The idea here is to take someone new to Linux and get them up and running with enough knowledge and hands on e ...

Computers are now available anytime, anywhere, by different means, and distributed unobtrusively throughout the everyday environments in which physical objects/artifacts embedded with invisible computers are sensible and networked locally and globally. Su ...

FIRST conferences promote worldwide coordination and cooperation among Computer Security Incident Response Teams (CSIRTs). The conference provides a forum for sharing goals, ideas, and information on how to improve global computer security. The five-day e ...

Elcomsoft Co. Ltd
Commercial

Perform full file system and logical acquisition of iPhone, iPad and iPod Touch devices. Image device file system, extract device secrets (passwords, encryption keys and protected data) and decrypt the file system image.   Features and Benefits: ...

iOS Forensic Toolkit
ericfish at gmail.com
Freeware

A web application security scanner and some other security tools.

Category Website Scanners
AVG Technologies
Commercial

Essential anti-virus, anti-spyware and anti-spam protection for your email servers. * Unclutter and safeguard your email servers with email server protection Keeps your email servers free from viruses and spam, ensuring the smooth running of your vital em ...

Category Servers
GoSecure
Commercial

Multi-Layered Content Filtering and Web Security GoSecure Web Security offers fine-grained content filtering combined with threat detection and mitigation methods to assure powerful protection from Advanced Persistent Threats, including botnets, malware, ...

Category Appliances
Web Security
Crazytrain

This course is geared towards those with significant Linux knowledge, experience, and understanding. If you are a strong Linux power user and you know and understand at least the very basics of Linux forensics (I.E., have used 'dd' to create images, 'grep ...

Centrifuge Analytics
Limited Free Trial

 Centrifuge Analytics makes it easy to harness the power of your data, visualize discoveries, collaborate to draw conclusions and make effective predictions that will have an immediate impact to your organization. Data Discovery Not Data Processing ...

Category Forensic Tools
German Informatics Society
Commercial

In order to advance the fields of IT-Incident Management and Forensics the special interest-group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) organises an annual conference, bringing together experts from thr ...

No Vendor
Commercial

The theme of the conference is the protection of computer networks. The conference will draw participants from academia and industry in Europe and beyond to discuss hot topics in applied network and systems security. Topics include but are not limited to ...

DFRWS is dedicated to the sharing of knowledge and ideas about digital forensics research. Ever since it organized the first open workshop devoted to digital forensics in 2001, DFRWS continues to bring academics and practitioners together in an informal e ...

Elcomsoft Co. Ltd
Commercial

Elcomsoft Phone Password Breaker enables forensic access to password-protected backups for smartphones and portable devices based on RIM BlackBerry and Apple iOS platforms. The password recovery tool supports all Blackberry smartphones as well as Apple de ...

Category Forensic Tools
Phone Password Breaker
Utilikilts
Commercial

Utilikilts offers a total of 6 different models Standard Models: The Mocker The Spartan The Workman The Survival Special Offerings or Limited Run Offerings: The Tuxedo The Beast (Leather)

Category Geeky Gadgets
Utilikilts