Skip to main content

Directory: All Listings 

Results 281 - 300 of 1235 This Category
All Listings
WithSecure
Commercial

 Armory Drive is as easy to use as other USB drives but adds encryption and multifactor authentication to help safeguard your data. Plug your Armory Drive USB armory into your computer. Use Armory Drive's iPhone app to unlock your microSD card inside ...

Armory Drive
PTR Associates Ltd

You will learn what the components of Microsoft SQL Server 7 are and understand what the system administrators should be doing. Find out how to get information out of SQL Server and how to interpret it. Experiment with a live SQL Server 7 network in a lab ...

German Informatics Society
Commercial

In order to advance the fields of IT-Incident Management and Forensics the special interest-group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) organises an annual conference, bringing together experts from thr ...

SPAMFighter
Commercial

SPAMfighter Exchange Module, SPAMfighter SMTP Anti Spam Server and SPAMfighter Hosted Spam Filter are the most effective and easy-to-use Spam Filters for protecting the company network against spam and phishing fraud. SPAMfighter Exchange Module (SEM), i ...

LogSat Software
Commercial

We created SPAM Filter ISP to implement what many SMTP servers lack: Spam Filtering. SPAMFilter ISP's implementation is very simple. Its use is designed for ISPs and companies running their SMTP servers, not end-users. SPAM Filter ISP is designed to be a ...

Liverpool John Moores University
Open Source

UMUC was named a National Center of Academic Excellence in Information Assurance and Cyber Defense Education by the National Security Agency and Department of Homeland Security. We've developed our cybersecurity policy and management degree in conjunctio ...

Bachelor - Cybersecurity Management and Policy
Global TSCM Group, Inc.
Commercial

The Stealth SM2020 is the most advanced portable speech protection system which protects you against listening and recording devices. The Stealth SM2020 creates sound barrier interference which masks your speech and any sound to be extremely difficult or ...

Microsoft
Freeware

BitLocker Drive Encryption is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. BitLocker provides the most protection w ...

Windows Bitlocker
Telemate.Net Software
Commercial

NetSpective® is an accurate, easy-to-use, and reliable Internet content filtering device designed to maximize the availability and performance of critical network resources. It scans every piece of traffic coming in and out of the network and filters harm ...

Category Uncategorised
NetSpective
Crazytrain

This course will put you through the paces in Linux as it stands itself (the operating system), and then move you into Linux and Data Forensics. The idea here is to take someone new to Linux and get them up and running with enough knowledge and hands on e ...

Edge-Security
Open Source

Wfuzz is a tool designed for bruteforcing Web Applications, it can be used for finding resources not linked (directories, servlets, scripts, etc), bruteforce GET and POST parameters for checking different kind of injections (SQL, XSS, LDAP,etc), bruteforc ...

Category Website Scanners
Sophos
Commercial

Trust your inbox again with cloud email security protecting your people and critical information from malware, as well as malware free phishing and impersonation attempts. Keep Imposters OutAutomatically identify your high-profile targets for malware-fre ...

Sophos Email
J.A. Korsmeyer, Inc.
Commercial

EMP Cloud substantially expands the former EMP on-premise feature set. Also, it will protect both on-premise email servers, as well as cloud based services such as Office 365 and Gmail.

Extensible Messaging Platform
Cisco
Commercial

In zero-trust architecture, ISE is the policy decision point. It gathers intel from the stack to authenticate users and endpoints, automatically containing threats. ?Harness the power of resilience? ?Resilience begins with secure connections. ISE helps ...

Cisco Identity Services Engine
Zabbix, SIA
Open Source

Zabbix is listed here for it's Network Mapping and visualisation capabilities, but it is truly a Monitoring application. Auto discovery * Discovery by IP range, services and SNMP * Automatic monitoring of discovered devices

Category Network Mapping
Viasat
Commercial

The Viasat Eclypt Core encrypted internal hard drive protects data at rest in commercial-off-the-shelf (COTS) laptop and desktop computers in enterprise and tactical environments, as well as data stored in vehicles, aircraft, and ships. During high-risk o ...

Eclypt Core Encrypted Internal Hard Drive
360 Analytics Limited
Open Source

360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, Perl firewall policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in Checkpoint dbedit, Cisco PIX/ASA or Netscreen ...

360-FAAR Firewall Analysis Audit Repair
lcamtuf
Freeware

A semi-automated, largely passive web application security audit tool, optimized for an accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-init ...

Category Website Scanners
Cisco
Commercial

Secure Endpoint offers advanced endpoint protection across control points, enabling your business to stay resilient. Powerful EDR capabilities Stop threats with built-in or completely managed endpoint detection and response (EDR), threat hunting, and in ...

Cisco Secure Endpoint
Process Software
Commercial

PreciseMail Anti-Spam Gateway is an enterprise solution that eliminates spam, phishing and virus threats at the Internet gateway or mail server. High Spam Detection Accuracy - PreciseMail Anti-Spam Gateway has a proven out-of-the-box spam detection accur ...