Skip to main content

Directory: All Listings 

Results 641 - 660 of 1237 This Category
All Listings

Oracle Identity Analytics provides enterprises with the ability to define and manage roles and automate critical identity-based controls. Once roles are defined, certified, and assigned, the software continues to deliver scalable and sustainable identity ...

Oracle Identity Analytics
Core Security

Access Assurance Suite is an intelligent identity and access management (IAM) software solution that enables organizations to deliver informed provisioning, meet ongoing regulatory compliance, and leverage actionable analytics for improved identity govern ...

Access Assurance Suite
CyberArk Software

Protect, monitor and control privileged access, with on-site deployment. Deploy in your datacenter, private or public cloud, to meet regulatory compliance or organizational needs Confidently migrate to SaaS with the backing of CyberArk’s proven expertis ...

Privileged Access Manager

A regularly-updated signature-based scanner that can detect file inclusion, sql injection, command execution, XSS, DOS, directory traversal vulnerabilities of a target Joomla! web site. Overview Joomla! is probably the most widely-used CMS out there ...

Category Website Scanners

A Java Hijacking tool for web application session security assessment. A simple Java Fuzzer that can mainly be used for numeric session hijacking and parameter enumeration.

Category Website Scanners
Security University

Finally, a  Forensics class that teaches hands-on Tactical Forensics skills with validating  practical labs. This class is for students who want a comprehensive understanding of Forensic Examination and not just concepts of investigations. ...

Tangent, Inc.

WebHawk, next generation content filtering for one third the cost. Content Filtering WebHawk filters automatically block inappropriate websites based on the categorizations you define. Webhawk also monitors and logs all user web activity. In addition ...

Category Uncategorised

DirX Audit provides a platform for the central collection, normalization, storage, and analysis of audit trails from different audit sources. Auditors can use DirX Audit's web-based user interface to analyze and correlate the audit logs in the central ...

DirX Directory enables the secure storage of unambiguous digital identities and is designed to handle a potentially very large number of users. Other data, such as the public keys for a public key infrastructure, can also be stored and managed reliably ...

DirX Access is a comprehensive access management and identity federation solution for protecting Web services and Web applications against unauthorized access. User access is controlled and enforced on the basis of central role-based security policies ...

Cloudmark Inc.

Cloudmark Platform is a high-performance, carrier-grade messaging security solution that automatically detects and mitigates all categories of email abuse and threats across a service provider’s network. Cloudmark Platform delivers a powerful, flexible fo ...

Cloudmark Platform for Email

Emsisoft Emergency KitThe malware Emergency Kit for infected PCs. A scanner that can be used without installation to scan and clean infected computers. Award-winningAward-winning dual-scanner to clean infections Portable100% portable – Ideal for USB fla ...

Emsisoft Emergency Kit

Strong security starts with a malware-free device. Two eyes are better than one – Emsisoft has combined two powerful antivirus technologies into one lightning-fast scanner. Designed to be as efficient as possible, this dual-engine scanner allows you to de ...

Emsisoft Anti-Malware

A tool for techs Emsisoft Commandline Scanner is a console application for professionals who don’t need a graphical user interface. The scanner is included in the following products:Emsisoft Anti-Malware HomeEmsisoft Business SecurityEmsisoft Enterprise ...

Emsisoft Commandline Scanner
RedSeal Systems Inc.

RedSeal’s hybrid multi-cloud security solution brings complex hybrid multi-cloud networks into one, unified model. You’ll be able to understand all your cloud architecture environments in one dynamic visualization, where your high value assets are, and al ...

Category Network Scanners
RedSeal
Sanderson Forensics Ltd.

Analyze Skype chat logs, contact lists, SMS messages with SkypeAlyzer a forensic tool designed to work with both the old Skype database files – found in a series of .dbb files and the newer Skype database files (main.db).

Category Forensic Tools
SkypeAlyzer
DBAPPSecurity

DBAPPSecurity Database Auditor(DBAuditor)helps users to enhance the transparency of database monitoring and reduce the cost of manual auditing so as to visualize database running, monitor daily operation, control dangerous operation, audit all activities ...

Snorby is a ruby on rails web application for network security monitoring that interfaces with current popular intrusion detection systems (Snort, Suricata and Sagan). The basic fundamental concepts behind Snorby are simplicity, organization and power. Th ...

Category IPS Network

Deep Security protects confidential data and critical applications to help prevent data breaches and ensure business continuity, while enabling compliance with important standards and regulations such as PCI, FISMA and HIPAA. Whether implemented as softwa ...

Category IPS Network
Trend Micro Deep Security
Malwarebytes

Have you ever considered what makes an anti-malware application effective? We at Malwarebytes have created an easy-to-use, simple, and effective anti-malware application. Whether you know it or not your computer is always at risk of becoming infected with ...