Skip to main content

Directory: All Listings 

Results 21 - 40 of 1235 This Category
All Listings
Splunk
Commercial

Splunk Security Orchestration, Automation and Response (SOAR) Go from overwhelmed to in-control Automate manual tasks. Address every alert, every day. Establish repeatable procedures that allow security analysts to stop being reactive and focus on missi ...

Splunk SOAR
Rapid7
Limited Free Trial

Built and vetted by expertsInsightIDR has internal and external threat intel for our post-perimeter era, and the world’s most used penetration testing framework Metasploit. We do relentless research with Projects Sonar and Heisenberg. And because “we drin ...

InsightIDR
Integrigy Corporation
Commercial

AppDefend is an intrusion prevention system and web application firewall specifically written for the Oracle E-Business Suite Release R12 and Oracle PeopleSoft. The purpose of AppDefend is to block most types of web attacks against Oracle E-Business Suite ...

AppDefend
Webroot
Commercial

The BrightCloud Mobile Security SDK for Android™ and iOS® addresses mobile device vulnerabilities by enabling mobile management partners to offer enhanced security for their customers. It features antivirus, antimalware, device and application interrogati ...

Category Mobile Devices
Quadrant Information Security
Open Source

Sagan is an open source (GNU/GPLv2) high performance, real-time log analysis & correlation engine that run under *nix operating systems (Linux/FreeBSD/OpenBSD/etc). It is written in C and uses a multi-threaded architecture to deliver high performance log ...

Hewlett-Packard
Commercial

The TippingPoint IPS is an in-line device that is inserted seamlessly and transparently into the network. As packets pass through the IPS, they are fully inspected to determine whether they are legitimate or malicious. This instantaneous form of protectio ...

Category IPS Network
Quest Software Inc.
Commercial

Comprehensive patch management and deployment Reduce infrastructure and resource costs by using a single solution to manage patches for heterogeneous environments. Achieve peace of mind by making sure Windows and Mac platforms, as well as potentially vul ...

Quest Patch Management and Endpoint Security
BCS - Chartered Institute for IT
Commercial

The Certificate in Information Security Management Principles (CISMP) is an internationally recognised qualification which was developed by the British Computer Society and provides a requisite foundation of knowledge necessary for individuals new to the ...

Kela
Commercial

DARKBEAST provides incident responders, threat hunters, investigators, and intelligence analysts with a robust technology to dive into the cybercrime underground and investigate through KELA's cybercrime data lake. Gain visibility into underground operati ...

Darkbeast
Cisco
Commercial

Secure Endpoint offers advanced endpoint protection across control points, enabling your business to stay resilient. Powerful EDR capabilities Stop threats with built-in or completely managed endpoint detection and response (EDR), threat hunting, and in ...

Cisco Secure Endpoint
F5 Networks, Inc,
Commercial

Protect your apps with behavioural analytics, proactive bot defence, and application-layer encryption of sensitive data. Advanced App Protection Advanced WAF combines machine learning, threat intelligence and deep application expertise.  Proactive ...

Category WAF - Appliances
Advanced Web Application Firewall
TrustedSec
Open Source

For phishing, SET allows for sending spear-phishing emails as well as running mass mailer campaigns, as well as some more advanced options, such as flagging your message with high importance and adding list of target emails from a file. SET is Python base ...

University of Maryland - University College
Commercial

UMUC was named a National Center of Academic Excellence in Information Assurance and Cyber Defense Education by the National Security Agency and Department of Homeland Security. About the Cybersecurity Management and Policy Bachelor's Degree We've devel ...

Cybersecurity Management and Policy
Montreat College
Commercial

The Center for Cybersecurity Education and Leadership at Montreat College provides guidance and oversight to our academic program, to the distribution of cyber defense information, and to collaborative efforts in cybersecurity with an emphasis on combinin ...

Montreat College Cybersecurity Degree
KnowBe4
Commercial

Baseline Testing Baseline testing to assess the Phish-prone percentage through a simulated phishing attack.   Train Your Users A large library of security awareness training content; including interactive modules, videos, games, posters and ...

Kevin Mitnick Security Awareness Training
Oxygen Forensics
Commercial

Oxygen Forensic® Passware® Analyst is a brand-new and tightly integrated combination of two award-winning forensic tools in a single acquisition and analysis suite. The new product enables straightforward mobile acquisition, extraction, decryption and an ...

Oxygen Forensics Passware Analyst
Isode
Commercial

M-Guard is an XML guard that is used at a network boundary to control traffic. An M-Guard instance is an application level data diode, with traffic flowing in one direction only. Commonly, M-Guard instances will be deployed in pairs, one controlling flow ...

Category Guards XML
M-Guard
SysTools Software
Shareware

MailXaminer is a comprehensive email examination tool to carry out a thorough analysis of a bunch of emails and its header. With the help of this tool; forensicators can preview more than 20 email file types and perform advanced search operation within th ...

Category Forensic Tools
MailXaminer
Veracode
Commercial

Veracode Static Analysis provides automated feedback to developers in the IDE and CI/CD pipeline, conducts a full Policy Scan before deployment, and gives clear guidance on how to find, prioritise, and remediate issues. Veracode Static Analysis supports ...

Veracode Static Analysis
nix

hping2 is an interactive packet costructor and responses analyzer that uses the same CLI of the ping program (but with a lot of extensions). It can be used to performs a lot of tasks, like testing of firewall rules, (spoofed) port scanning, et cetera.