Michele M Jordan
The Viasat Eclypt Core encrypted internal hard drive protects data at rest in commercial-off-the-shelf (COTS) laptop and desktop computers in enterprise and tactical environments, as well as data stored in vehicles, aircraft, and ships. During high-risk o ...
BitLocker Drive Encryption is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. BitLocker provides the most protection w ...
Seagate Secure™ encryption hard drives keep your data safe even if your drives are lost, stolen, or misplaced. * Instant Secure Erase renders all data on the hard drive unreadable in less than a second via a cryptographic erase of the data encryption ke ...
Disk Protect is a full disk encryption solution for business, designed to protect data-at-rest held on desktops, laptops, tablets and servers from theft or loss. The solution transparently encrypts device data and uses strong authentication to prevent una ...
Full disk encryption with pre-boot authentication Ideal to encrypt an entire computer /notebook/ partition or just a single Hard drive. With DCPP the Hard drive (including the operating system) is encrypted 100%, therefore unauthorized person will not be ...
SecureDoc will help you achieve your business goals by keeping track of all data and devices through one console. This endpoint encryption solution also supports various hardware and software platforms, including Windows, Mac, mobile devices, portable med ...
Enova X-Wall is an embedded hardware Real-time Crypto System ASIC (Application Specific Integrated Circuit) engineered specifically to handle high throughput disk I/O and providing real-time encryption and decryption using DES (Data Encryption Standard),3 ...
HIBUN Data Encryption encrypts data on hard drive, removable media, and file server to protect the secrecy of the information.
ROCSECURE is a division of Rocstor; pioneering in the secure encryption of digital content in any standard digital format. resolving security issues before they arise As businesses become increasingly dependent on data security, the reliability and availa ...
Hexamail Guard acts as a sentinel for your incoming and outgoing mail. By analyzing each mail received and sent by your organization it intelligently alerts, routes, blocks and audits all email traffic. Features include: Anti-Spam, AntiVirus, Trojan a ...
The Complete Remote Access VPN * Multiple access methods to securely connect to your email, files and applications * Enterprise-class features with simple deployment and unparalled ease-of-use * Installs on existing server without having ...
Separ offers a Web content filter that is completely self-contained and ready to deploy. With minimum setup and configuration, Separ can be working as your enterprise content filter, blocking damaging sites at the perimeter before they reach your internal ...
Wireless Scanner for Windows Mobile OS. [administrator's note: development on PeekPocket ended 5/2008]
Network software with over 60 must-have tools Key Features Automated network discovery Real-time monitoring and alerting Powerful diagnostic capabilities Enhanced network security Integration with SolarWinds NPM solution
SolarWinds’ newest free tool, Real-time NetFlow Analyzer, unlocks the power of NetFlow on your network, empowering you to shutdown the bandwidth hogs and ensure peak performance of your mission-critical network applications. Real-time NetFlow Analyzer cap ...
The Solaris Operating System Network Intrusion Detection course provides students with the knowledge and skills necessary to perform the advanced administration skills required to firewall, monitor, log, identify and respond to network security breaches.
The Enterprise Intrusion Analysis course provides students with the skills needed to discover and analyze enterprise intrusions in a UNIX environment. Upon completion of this course, students should be able to: * 1. Detect an enterprise system i ...
SEC617 will give you the skills you need to understand the security strengths and weaknesses in wireless systems. In this course, you will learn how to evaluate the ever-present cacophony of Wi-Fi networks and identify the Wi-Fi access points and client d ...
SANS recognizes the need for comprehensive Oracle security training to help organizations protect their most critical information resources. In this course, the student is lead through the process of auditing and securing Oracle by defining the risks to d ...
The processes and methodologies taught in this class will train you to collect an image on damaged evidence where standard forensic imaging would have failed. You will learn to understand what kinds of problems hard drives have and what your options are t ...
Page 28 of 57