Skip to main content

Directory: All Listings 

Results 141 - 160 of 1235 This Category
All Listings
360 Analytics Limited
Open Source

360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, Perl firewall policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in Checkpoint dbedit, Cisco PIX/ASA or Netscreen ...

360-FAAR Firewall Analysis Audit Repair
Total Defense Inc.
Commercial

Total Defense Essential Anti-Virus Internet Security Malware protection – simple, smart, and reliable protection from viruses, spyware, ransomware and other malware threats on up to 3 of your PCsMulti-layer technology – real-time and on-demand malware sc ...

Total Defense Anti-Virus
InnovTouch
Commercial

Snappy Tick Source Edition(SAST) is a source code review tool, it helps to identify the Vulnerability during static code review. Consider an in-line auditing approaches will identify the largest amount of most significant security issues in your applicati ...

Snappytick
Zabbix, SIA
Open Source

Zabbix is listed here for it's Network Mapping and visualisation capabilities, but it is truly a Monitoring application. Auto discovery * Discovery by IP range, services and SNMP * Automatic monitoring of discovered devices

Category Network Mapping
Viasat
Commercial

The Viasat Eclypt Core encrypted internal hard drive protects data at rest in commercial-off-the-shelf (COTS) laptop and desktop computers in enterprise and tactical environments, as well as data stored in vehicles, aircraft, and ships. During high-risk o ...

Eclypt Core Encrypted Internal Hard Drive
Yago Jesus and Patrick Gouin
Open Source

Unhide is a forensic tool to find hidden processes and TCP/UDP ports by rootkits / LKMs or by another hidden technique. // Unhide (ps) Detecting hidden processes. Implements six techniques * Compare /proc vs /bin/ps output * Compare inf ...

Category Forensic Tools
Resilience Corporation
Commercial

Resilience offers iHA? firewall/VPN solutions in the performance range and expandability for users who vary from high-traffic telecom carriers all the way down to low-traffic SMBs and ROBOs. Covered by the Continuous Secured Ownership WarrantySM, these ar ...

Category VPN Servers
Check Point Software Technologies Ltd.
Commercial

The Internet provides a flexible and cost-effective infrastructure for extending the corporate network to all employees and key partners. Yet the Internet also conceals constantly changing threats. To take full advantage of the Internet, you must prevent ...

Category VPN Servers
SysTools Software
Shareware

MailXaminer is a comprehensive email examination tool to carry out a thorough analysis of a bunch of emails and its header. With the help of this tool; forensicators can preview more than 20 email file types and perform advanced search operation within th ...

Category Forensic Tools
MailXaminer
Rapid7
Limited Free Trial

Built and vetted by expertsInsightIDR has internal and external threat intel for our post-perimeter era, and the world’s most used penetration testing framework Metasploit. We do relentless research with Projects Sonar and Heisenberg. And because “we drin ...

InsightIDR
University of Westminster
Open Source

Cyber Security and Forensics BSc is designed to meet the ever-growing requirements and challenges facing businesses, governments and individuals. The course brings together a mix of several disciplines and provides the fundamental skills needed for a suc ...

Emsisoft
Commercial

Centrally managed cyber-security for your office workstations, servers and remote workers. Web Protection & Browser SecurityIf a user attempts to access a malicious website, Emsisoft Anti-Malware Home will immediately block the connection and prevent ...

Emsisoft Enterprise Security
Webroot
Commercial

The BrightCloud Mobile Security SDK for Android™ and iOS® addresses mobile device vulnerabilities by enabling mobile management partners to offer enhanced security for their customers. It features antivirus, antimalware, device and application interrogati ...

Category Mobile Devices
SolarWinds
Freeware

SolarWinds’ newest free tool, Real-time NetFlow Analyzer, unlocks the power of NetFlow on your network, empowering you to shutdown the bandwidth hogs and ensure peak performance of your mission-critical network applications. Real-time NetFlow Analyzer cap ...

SolarWinds NetFlow Analyzer
deepbit
Open Source

ProxyStrike is an active Web Application Proxy. It's a tool designed to find vulnerabilities while browsing an application. It was created because the problems we faced in the pentests of web applications that depends heavily on Javascript, not many web s ...

Category Website Scanners
Innominate Security Technology AG
Commercial

The Innominate mGuard products offer extensive security functions such as VPNs (Virtual Private Networks), firewall and optional virus protection (powered by Kaspersky) ? regardless of the computer platform used. With the Innominate Security Configuration ...

Category VPN Servers

GRR

Collaboration of developers
Open Source

GRR is an Incident Response Framework focused on Remote Live Forensics. State of the Project August 2011 GRR is in proof of concept stage and is not considered production-ready. The basic principles have been proven, but there is significant work to be d ...

Category Remote Forensics
Intense School
Commercial

Intense School offers the finest Cisco Firewall Specialist certification training in the industry. During our intense boot camp, we guide you through configuring, troubleshooting and administering Cisco firewalls (PIX) and ASA (Adaptive Security Appliance ...

SANS
Commercial

This hands-on track offers a practical working knowledge in intrusion detection and traffic analysis, taught by top practitioners/authors in the field. This is the most advanced program in network intrusion detection that has ever been taught. All of the ...

Birmingham City University
Open Source

3 years Full Time / 4 years Sandwich Course