List Categories and Listings by S

Lancope's StealthWatch System is aimed at both network and security administrators – with an integrated platform that leverages network intelligence for both parties. Leveraging NetFlow, sFlow and packet capture, StealthWatch unifies and optimizes behavio ...

VendorLanscope
Pricing ModelCommercial
Modified
Snort

Snort is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks ...

Category IPS Network
VendorSourcefire
Pricing ModelOpen Source
Modified

Symantec Security Information Manager 4.6 enables organizations to collect, store, and analyze log data as well as monitor and respond to security events to meet IT risk and compliance requirements. It can collect and normalize a broad scope of event data ...

VendorSymantec
Pricing ModelCommercial
Modified

Sophos Enterprise Console is engineered to allow powerful, scalable and enforceable policy-based management of Sophos Anti-Virus across file servers, desktops and remote computers on Windows and Mac OS X platforms. It provides intuitive, centralised manag ...

Category Enterprise
VendorSophos
Pricing ModelCommercial
Modified

Sophos PureMessage provides a secure solution at the email gateway, uniquely integrating anti-virus, anti-spam and policy enforcement capabilities. Based on a scalable architecture, PureMessage includes innovative detection techniques that deliver proacti ...

VendorSophos
Pricing ModelCommercial
Modified

Intrusion offers a suite of secure network taps which enable easy, fast, and robust deployment of any of Intrusion’s network security appliances. Using a Secure Tap is the best method for deploying network appliances. Connects to Your Network in Second ...

Category Network Taps
VendorIntrusion Inc
Pricing ModelCommercial
Modified
Snort Certified Professional (SnortCP)

This certification option is centered on Snort, the industry leading open source intrusion prevention solution. Candidates are assessed on a wide range of criteria that encompasses all the necessary open source components and technical skills for successf ...

VendorSourcefire
Pricing ModelCommercial
Modified
Sourcefire AMP for FirePOWER

Sourcefire Advanced Malware Protection for FirePOWER™ provides users with the ability to protect against sophisticated network malware, advanced persistent threats (APTs) and targeted attacks – from point of entry, through propagation, to post-infection r ...

VendorSourcefire
Pricing ModelCommercial
Modified
Spybot - Search & Destroy

Spybot - Search & Destroy can detect and remove spyware of different kinds from your computer. Spyware is a relatively new kind of threat that common anti-virus applications do not yet cover. If you see new toolbars in your Internet Explorer that you ...

VendorSafer Networking Ltd.
Pricing ModelCommercial
Modified
SafeGuard Encryption

Sophos SafeGuard Enterprise Encryption 7, formally SafeGuard Easy, introduces the most complete data protection solution on the market today, protecting data on multiple devices and operating systems. Whether your data resides on a laptop, a mobile device ...

VendorSophos PLC
Pricing ModelCommercial
Modified

IBM Security Network Intrusion Prevention System appliances are designed to stop constantly evolving threats before they impact your business. This means providing both high levels of protection and performance, while lowering the overall cost and complex ...

Category IPS Network
VendorIBM
Pricing ModelCommercial
Modified

Wide-spectrum: SpamAssassin uses a wide variety of local and network tests to identify spam signatures. This makes it harder for spammers to identify one aspect which they can craft their messages to work around.   Free software: it is distributed ...

VendorThe Apache Software Foundation
Pricing ModelOpen Source
Modified

Total control over malicious traffic The award-winning Strata Guard® high-speed intrusion detection/prevention system (IDS/IPS) stops hackers dead in their tracks, preventing malware, spyware, port scans, viruses, and DoS and DDoS attacks from compromisi ...

Category IPS Network
VendorStillSecure
Pricing ModelCommercial
Modified

snort_inline is basically a modified version of Snort. It accepts packets from iptables, via libipq, instead of libpcap. It then uses new rule types to tell iptables if the packet should be dropped or allowed to pass based on the snort rule set.[talisker] ...

Category IPS Network
Pricing ModelFreeware
ModifiedNever
Symantec Critical System Protection

Symantec Critical System Protection protects against day zero attacks, hardens systems, and helps maintain compliance by enforcing behavior-based security policies on clients and servers. A centralized management console enables administrators to configur ...

Category Host IPS
VendorSymantec Corporation
Pricing ModelCommercial
Modified

System Safety Monitor (SSM) allows you to track down Microsoft Windows operating system activity in real-time and to prevent undesirable actions from various malware and spyware programs. SSM's main goal is to discover and block malicious actions of any a ...

Category Host IPS
VendorSystem Safety Limited
Pricing ModelCommercial
Modified

Intellitactics Security Manager (ISM) is a comprehensive enterprise security management software solution that adapts to unique enterprise requirements. ISM is ideally suited for organizations wanting to implement welldeveloped processes, integrate with e ...

VendorIntellitactics
Pricing ModelCommercial
Modified

All SenSage solutions are built on SenSage 4, the company's patented columnar based event data warehouse. More than 400 customers have deployed SenSage Solutions to reduce Security, Compliance and Operations risks at a fraction of the cost of traditional ...

VendorSenSage
Pricing ModelCommercial
Modified

An important element of the Cisco Self-Defending Network, the CiscoWorks Security Information Management Solution (SIMS) integrates, correlates, and analyzes security event data from the enterprise network to improve visibility and provide actionable inte ...

VendorCisco
Pricing ModelCommercial
Modified

Produced on an ad-hoc basis, the Alert mailing list is generated whenever threats arise, providing extremely timely, accurate reporting to recipients.

VendorS–nnet Beskerming Pty. Ltd.
Modified

© Computer Network Defence Limited 2019