Skip to main content

Directory: All Listings 

Results 321 - 340 of 1235 This Category
All Listings
University of Northampton
Open Source

2 years Full Time

InnovTouch
Commercial

Snappy Tick Source Edition(SAST) is a source code review tool, it helps to identify the Vulnerability during static code review. Consider an in-line auditing approaches will identify the largest amount of most significant security issues in your applicati ...

Snappytick
GamaSec
Limited Free Trial

GamaSec scanner explores the entire Web application environment and registers its structure and contents. Then it mimics actual hacking methods to identify and uncover the details of any point that is vulnerable to an attack including: SQL Injection Atta ...

GamaScan
InterGuard
Commercial

InterGuard’s employee monitoring software lets you track all employees activity from any endpoint - even when they work from home. Monitoring employee computer activity helps you proactively identify which employees are being productive and how much time ...

InterGuard Employee Monitoring Software

Over the past several years security has dominated the corporate agenda. While there has been significant effort expended in protecting organizational resources, security incidents have been on the rise. There has also been a paucity of research in dealin ...

ISACA
Commercial

ISACA (Information Systems Audit and Control Association and Foundation), a recognized global leader in IT governance, control and assurance, is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in ...

EDUCAUSE
Commercial

Sponsored by the EDUCAUSE & Internet2 Computer and Network Security Task Force, this annual meeting brings together information security professionals, IT staff, and others from across the higher education community. The 2007 conference will include keyno ...

MOBILedit
Commercial

MOBILedit Forensic is a phone extractor, data analyzer and report generator all in one solution. A powerful 64-bit application using both the physical and logical data acquisition methods, MOBILedit Forensic is excellent for advanced application analyzer, ...

Category Forensic Tools
MOBILedit Forensic
Barracuda Networks, Inc.
Commercial

The Barracuda Web Application Firewall protects applications, APIs, and mobile app backends against a variety of attacks including the OWASP Top 10, zero-day threats, data leakage, and application-layer denial of service (DoS) attacks. By combining both p ...

Category WAF - Cloud
Barracuda Web Application Firewall
University of Wales, Newport
Open Source

3 years Full Time

Webroot
Commercial

The BrightCloud Mobile Security SDK for Android™ and iOS® addresses mobile device vulnerabilities by enabling mobile management partners to offer enhanced security for their customers. It features antivirus, antimalware, device and application interrogati ...

Category Mobile Devices
Siemens AG
Commercial

DirX Audit provides a platform for the central collection, normalization, storage, and analysis of audit trails from different audit sources. Auditors can use DirX Audit's web-based user interface to analyze and correlate the audit logs in the central ...

Information is the most important resource any organization controls, and ensuring its confidentiality is crucial in today?s world. Secure IT addresses continuing and new threats to information security as well as responses to the increasing risk of data ...

The Conference, co-sponsored since 1998 by the NYS Office of Cyber Security and Critical Infrastructure Coordination (CSCIC) and the New York State Forum, added a new government sponsor, the NYS Center for Information Forensics and Assurance (CIFA) at the ...

Network security technologies must respond to ever more complex issues and malicious behaviors. The purpose of NDSS is to bring the global Internet community together to learn about and discuss cutting-edge advances in the science and application of netwo ...

360 Analytics Limited
Open Source

360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, Perl firewall policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in Checkpoint dbedit, Cisco PIX/ASA or Netscreen ...

360-FAAR Firewall Analysis Audit Repair
DBAPPSecurity
Commercial

DBAPPSecurity Database Auditor(DBAuditor)helps users to enhance the transparency of database monitoring and reduce the cost of manual auditing so as to visualize database running, monitor daily operation, control dangerous operation, audit all activities ...

Kela
Commercial

DARKBEAST provides incident responders, threat hunters, investigators, and intelligence analysts with a robust technology to dive into the cybercrime underground and investigate through KELA's cybercrime data lake. Gain visibility into underground operati ...

Darkbeast
Gammasec Ltd.
Service

GamaSec is a remote online web vulnerability assessment service delivered via SaaS (software as a service) and is designed to identify security weakness in web application, as well as site exposure risks. GamaScan tests the security of your web applicati ...

CANS
Commercial

The main goal of this conference is to promote research on all aspects of network security and cryptology.