Skip to main content

Directory: All Listings 

Results 181 - 200 of 1237 This Category
All Listings
SonicWALL Inc.

The SonicWALL? PRO Series solves these issues by combining multiple network and security functions including a deep packet inspection firewall, IPSec VPN, layered anti-virus, anti-spyware, intrusion prevention and Web content filtering capabilities into a ...

4Secure offers a flexible line of data diode cyber security products. Customers can choose from the appropriate hardware platform, which includes a base software package, and then select optional add-on software modules (at an additional cost) to meet the ...

Category Data Diodes
4Secure Data Diodes

With the Clearswift SECURE Email Gateway installed, your organisation can be confident that it is protected from digital threats and data leaks while employees communicate freely by email.Clearswift SECURE Email Gateway Capabilities Policy Controls  ...

Category Guards Mail
Clearswift Secure Email Gateway Virtual Appliance
BCC Risk Advisory

edgescan is the only hybrid cloud based solution in Europe which combines both vulnerability scanning and manual verification on an on-going basis. It is a SaaS (Software as a Service) solution which detects technical vulnerabilities in Internet-facing sy ...

edgescan
Sanderson Forensics Ltd.

Analyze Skype chat logs, contact lists, SMS messages with SkypeAlyzer a forensic tool designed to work with both the old Skype database files – found in a series of .dbb files and the newer Skype database files (main.db).

Category Forensic Tools
SkypeAlyzer

Certified Penetration Testing Engineer graduates will obtain real world security knowledge enabling them to recognize vulnerabilities, exploit system weaknesses, and safeguard organizations against threats. Graduates will learn the art of Ethical Hacking ...

Category Ethical Hacking

srm

srm is a secure replacement for rm(1). Unlike the standard rm, it overwrites the data in the target files before unlinking them. This prevents command-line recovery of the data by examining the raw block device. It may also help frustrate physical examina ...

NetSentron Popular

Kobelt Development Inc.

Netsentron uses a quadruple filtering system to prevent threatening content, images and pages from loading on your computer, while allowing content you have predetermined as safe to pass through. You are in control of deciding which pages your organizatio ...

Category Guards Web
NetSentron

Centrally managed cyber-security for your office workstations, servers and remote workers. Emsisoft Business Security in a nutshell Made to protect small and medium sized businesses. Created by the world’s best ransomware experts. Super-fast and low on r ...

Emsisoft Business Security

Zabbix is listed here for it's Network Mapping and visualisation capabilities, but it is truly a Monitoring application. Auto discovery * Discovery by IP range, services and SNMP * Automatic monitoring of discovered devices

Category Network Mapping
Netflix Technologies Inc.

SNIPS (System & Network Integrated Polling Software), formally NOCOL, is a system and network monitoring software that runs on Unix systems and can monitor network and system devices. It is capable of monitoring DNS, NTP, TCP or web ports, host performanc ...

Category Host IDS

Real-time threat detections across endpoints, data centers, and the cloud. Securing your network against advanced persistent threats (APTs) requires greater visibility to detect actors and their actions so that you can reduce your response time. As threa ...

LogRhythm NDR
Sucuri Incorporated

Sucuri is a managed security service provider for websites. Their cloud-based platform gives you complete website security, including an antivirus and firewall for your website. Monitors for security incidents, fixes website hacks, and protects your site ...

Category WAF - Cloud
Sucuri Firewall
The Mathworks, Inc.

Polyspace®static code analysis products use formal methods to prove the absence of critical run-time errors under all possible control flows and data flows. They include checkers for coding rules, security vulnerabilities, code metrics, and hundreds of ad ...

Arne Vidstrom

PMDump is a tool that lets you dump the memory contents of a process to a file without stopping the process. This can be useful in a forensic investigation.

Category Forensic Tools
Costa Tsaousis

FireHOL is an iptables firewall generator producing stateful iptables packet filtering firewalls, on Linux hosts and routers with any number of network interfaces, any number of routes, any number of services served, any number of complexity between varia ...

RedSeal Inc.

RedSeal’s cloud security solution integrates with your public cloud and private cloud managers to include all your network environments in a full network visualization. RedSeal’s network monitoring platform adds configuration files from switches, routers, ...

RedSeal Classic

A professional commercial software that provides in-depth IP traffic analysis, traffic accounting and bandwidth monitoring. It contains a network traffic analyzer and collector that supports NetFlow, sFlow, IPFIX, IPv6 and Port Mirroring. It provides cust ...

WANSIGHT

AppScan delivers application security testing tools to ensure your business, and your customers, are not vulnerable to attacks. Detect application vulnerabilities before they become a problem, remediate them and ensure compliance with regulations. Four pr ...

HCL AppScan
German Informatics Society

In order to advance the fields of IT-Incident Management and Forensics the special interest-group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) organises an annual conference, bringing together experts from thr ...