Tags: Network

Network Security Analysis Tool is a robust scanner which is designed for: Different kinds of wide-ranging scans, keeping stable for days Scanning on multi-user boxes (local stealth and non-priority scanning options) Professional-grade penetration tes ...

VendorMixter, 2xs
Pricing ModelFreeware
Modified
CounterACT

ForeScout CounterACT works with your existing network infrastructure and automatically enforces whatever network access policies you desire for your organisation. Being agentless, and contained in a single appliance, ForeScout CounterACT is easy to instal ...

VendorForescout Technologies
Pricing ModelCommercial
Modified
Wave Auditor

Auditor is a lightweight, intuitive, clientless software utility that illuminates enterprise endpoint blind spots – providing organizations with the visibility they need to identify and effectively manage endpoint vulnerabilities. With Auditor, adm ...

VendorWave Systems Corp.
Pricing ModelCommercial
Modified
Wireless Protector

Wireless Protector is windows software that automatically disables wireless 802.11 / Broadband devices on computers that connected to the network LAN and re-enable the devices when the LAN cable is disconnected from the protected compu ...

Category Wireless Tools
VendorLan-Secure Company
Pricing ModelCommercial
Modified
Lan-Secure Security Center

Security Center network access protection software designed to provide real-time network security monitor for intrusion detection IDS and prevention IPS that helps to protect networks from being vulnerable to unauthorized network connections, malicious ne ...

Category IPS Network
VendorLan-Secure Company
Pricing ModelCommercial
Modified
Secure Cisco Auditor

Secure Bytes provides Secure Cisco Auditor, which  is a state of the art Next Generation network security auditing software for Cisco firewalls, routers and switches along with different Router audit tools and Network security Software. Secure Cisco ...

Category Network Scanners
VendorSecure Bytes
Pricing ModelCommercial
Modified
AD eDiscovery

AD eDiscovery is AccessData’s holistic e-discovery product that integrates a collection of early case assessment features with the advanced final review functionality of Summation. It covers the entire e-discovery lifecycle from Litigation Hold to Final R ...

Category Remote Forensics
VendorAccess Data
Pricing ModelCommercial
Modified
Virtual Patching for Databases

McAfee Virtual Patching for Databases shields databases from the risk presented by unpatched vulnerabilities by detecting and preventing attempted attacks and intrusions in real time, without requiring database downtime or application testing. With Virtua ...

VendorMcAfee
Pricing ModelCommercial
Modified
McAfee Content Security Suite

McAfee Content Security Suite bundles McAfee Web Protection, McAfee Email Protection, McAfee Network DLP Prevent, and McAfee Device Control into a one-suite purchase. This unified approach offers the right security to protect your users and data from toda ...

VendorMcAfee
Pricing ModelCommercial
Modified

EtherApe is a graphical network monitor for Unix modeled after etherman. Featuring link layer, IP and TCP modes, it displays network activity graphically. Hosts and links change in size with traffic. Color coded protocols display. It supports Ethernet, F ...

VendorSourceforge
Pricing ModelFreeware
Modified

During a network audit Nipper Studio processes the devices’ native configurations and enables you to create a variety of different audit reports. By using traditional methodology for your network audit, such as manual Penetration Testing, Agent-base ...

VendorTitania
Pricing ModelCommercial
Modified
Observer nTAP

nTAPs are passive, full-duplex devices, offering complete visibility to monitoring devices regardless of traffic level. They work with the leading management tools for quick and easy deployment. nTAPs are transparent for monitoring critical links, and pro ...

Category Network Taps
VendorNetwork Instruments
Pricing ModelCommercial
Modified
Throwing Star LAN Tap Pro

The fully assembled and enclosed brother to the Throwing Star LAN Tap Kit. The pro model sports all of the same 10BASET and 100BASETX monitoring goodness ready to go in your kit bag, no soldering necessary. To a target network this little guy looks just ...

Category Network Taps
VendorHakshop
Pricing ModelCommercial
Modified

FOR572: Advanced Network Forensics and Analysis, was built from the ground up to cover the most critical skills needed to mount efficient and effective post-incident response investigations. It focuses on the knowledge necessary to expand the forensic min ...

VendorSANS
Pricing ModelCommercial
Modified
SecurityTube Wi-Fi Security Expert

The SecurityTube Wi-Fi Security Expert (SWSE) is an online certification for Wi-Fi Security and Penetration Testing. This course is ideal for penetration testers, security enthusiasts and network administrators. The course leading to the certification exa ...

Category Network Security
VendorSecurityTube
Pricing ModelCommercial
Modified

Vistumbler is an open source Windows application that finds Wireless access points - Uses the Vista command 'netsh wlan show networks mode=bssid' to get wireless information.  It displays the basic AP details, including the exact authentication and e ...

Category Wireless Tools
VendorVistumbler
Pricing ModelFreeware
Modified
Wifi Analyzer

Wifi Analyzer is a free Android app you can use for finding APs on your Android-based smartphone or tablet. It lists the basic details for APs on the 2.4-GHz band, and on supported devices on the 5-GHz band as well. You can export the AP list (in XML form ...

Category Wireless Tools
VendorFarproc Tools
Pricing ModelFreeware
Modified
Wigle WiFi Wardriving

Open-source wardriving app to netstumble, display and map found wireless networks and cell towers anywhere in the world, easily uploading to the http://wigle.net database. WiGLE was started in 2001 and now has over 150 million wifi networks worldwide. ...

Category Wireless Tools
VendorWiGLE.net
Pricing ModelOpen Source
Modified
Sandboxie

Sandboxie runs your programs in an isolated space which prevents them from making permanent changes to other programs and data on your computer. Running your Web Browser under the protection of Sandboxie means that all malicous software downloaded by the ...

VendorSandboxie Holdings
Pricing ModelFreeware
Modified

BUFFERZONE is a virtual container that protects any content source that you define as potentially insecure including web browsers, email, Skype, FTP and even removable storage. You are able to definite granular containment poloicies according to network s ...

VendorBufferzone Inc
Pricing ModelCommercial
Modified

© Computer Network Defence Limited 2019