Skip to main content

Directory: All Listings 

Results 301 - 320 of 1237 This Category
All Listings

It's time to rethink your email security. Cisco's Secure Email rapidly detects, quarantines, investigates, and remediates cyber attacks that target your email. Watch Cisco's layered security approach in action.  Features: Protecting the #1 threat ...

Cisco Secure Email (formerly Email Security)
ManageEngine

Patch Manager Plus is an all-around patching solution, offering automated patch deployment for Windows, macOS, and Linux endpoints, along with patching support for 950+ third-party updates across 850+ third party applications. It's available both on-premi ...

University of Westminster

4 years Full Time

Nuix Evidence Mover is designed to copy evidence files images from one storage location, to antoher. It creates a hash of the files before and after moving to ensure the data has been copied accurately, and to maintain the chain of custody.

Category Forensic Tools
Nuix Evidence Mover
BCC Risk Advisory

edgescan is the only hybrid cloud based solution in Europe which combines both vulnerability scanning and manual verification on an on-going basis. It is a SaaS (Software as a Service) solution which detects technical vulnerabilities in Internet-facing sy ...

edgescan

This product controls XML data entering and leaving the organisation, defending against advanced attacks and misuse. It is used by organisations that need to tightly control web services traffic used for document management, collaboration, billing, e-comm ...

Category Guards XML
Deep-Secure XML Guard

Over the past several years security has dominated the corporate agenda. While there has been significant effort expended in protecting organizational resources, security incidents have been on the rise. There has also been a paucity of research in dealin ...

Cyberlab Technologies

Removes spyware, unwanted programs, junk files, unwanted registry keys, tracking cookies and more to make your computer and browsers faster, safer and error free! Cyberlab Registry clean Manual Updates Registry Tuneup Windows and Browsers Op ...

Cyberlab and Cyberlab Ultimate

The worlds security professionals converge to discuss new technology, and share best practices. The most significant new discoveries, technologies, and products will be presented at the annual EUSecWest conference, brought to you by the organizers of PacS ...

RVAsec is the first Richmond, VA based security convention that showcases local talent as well as brings the best speakers to the midatlantic region.  RVAsec attracts over 400 security professionals from across the country.  The conference is dual-track a ...

University of Westminster

3 years Full Time / 4 years Sandwich Course

Infosec Institute

 This boot camp teaches you how to use the tools and techniques used by cybercriminals to perform an ethical hack on your organization. You’ll learn ethical hacking methodologies and gain hands-on hacking experience in our cloud-hosted cyber range, i ...

Category Ethical Hacking
Ethical Hacking Dual Certification Boot Camp

Arbor Sightline Popular

Arbor Sightline provides robust capabilities from network-wide capacity planning, to identifying and managing the mitigation of threats to the network.  Network Peering Analysis Your network delivers value to customers and users when it connects to ...

Arbor Sightline

The Solaris Operating System Network Intrusion Detection course provides students with the knowledge and skills necessary to perform the advanced administration skills required to firewall, monitor, log, identify and respond to network security breaches.

Hitachi ID Systems, Inc.

Hitachi ID Bravura Identity is an integrated solution for managing identities, groups and security entitlements across systems and applications. It ensures that users are granted access quickly, that entitlements are appropriate to business need and that ...

Hitachi ID Bravura Identity

The main aim of the HITBSecConf conference series is to enable the dissemination, discussion and sharing of deep knowledge network security information. Featuring presentations by respected members of both the mainstream network security arena as well as ...

The Black Hat Briefings brings together a unique mix in security: the best minds from government agencies and global corporations with the most respected independent researchers and hackers. These forums take place regularly in Las Vegas, Amsterdam, Tokyo ...

Risk Based Security

VulnDB is the most comprehensive and timely vulnerability intelligence available and provides actionable information about the latest in security vulnerabilities via an easy-to-use SaaS Portal, or a RESTful API that allows easy integration into GRC tool ...

VulnDB

McAfee Application Control software provides an effective way to block unauthorized applications and code on servers, corporate desktops, and fixed-function devices. This centrally managed whitelisting solution uses a dynamic trust model and innovative se ...

McAfee Application Control
Intense School

Intense School offers the finest Cisco Firewall Specialist certification training in the industry. During our intense boot camp, we guide you through configuring, troubleshooting and administering Cisco firewalls (PIX) and ASA (Adaptive Security Appliance ...