Skip to main content

Directory: All Listings 

Results 401 - 420 of 1235 This Category
All Listings
Core Security
Commercial

Access Assurance Suite is an intelligent identity and access management (IAM) software solution that enables organizations to deliver informed provisioning, meet ongoing regulatory compliance, and leverage actionable analytics for improved identity govern ...

Access Assurance Suite
Seagate Technology, LLC
Commercial

Seagate Secure™ encryption hard drives keep your data safe even if your drives are lost, stolen, or misplaced. * Instant Secure Erase renders all data on the hard drive unreadable in less than a second via a cryptographic erase of the data encryption ke ...

Seagate Secure
GamaSec
Limited Free Trial

GamaSec scanner explores the entire Web application environment and registers its structure and contents. Then it mimics actual hacking methods to identify and uncover the details of any point that is vulnerable to an attack including: SQL Injection Atta ...

GamaScan
Argus Systems Group, Inc
Commercial

This training is appropriate for system security officers, system administrators, applications integrators, and other users of the Argus security systems. The course assumes familiarity with either UNIX or Linux. Learn how to operate your system in the Ar ...

Argus Systems Group, Inc
Commercial

This training is appropriate for system security officers, system administrators, applications integrators, and other users of the Argus security systems. The course assumes familiarity with UNIX. * Learn how to operate your system in the Argus secure en ...

Systems & Network Training Ltd

A hands-on course focusing on security of UNIX systems. Hands on sessions will be with Red Hat Linux but the course covers all flavours of UNIX and highlights differences.

Check Point
Commercial

Mobile security and complexity don’t have to go hand in hand. Check Point Capsule is one seamless solution that addresses all your mobile security needs. Capsule protects your mobile devices from threats, provides a secure business environment for mobile ...

Category Mobile Devices
Birmingham City University
Open Source

3 years Full Time / 4 years Sandwich Course

Oracle
Commercial

Oracle Identity Analytics provides enterprises with the ability to define and manage roles and automate critical identity-based controls. Once roles are defined, certified, and assigned, the software continues to deliver scalable and sustainable identity ...

Oracle Identity Analytics
Microsoft
Freeware

BitLocker Drive Encryption is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. BitLocker provides the most protection w ...

Windows Bitlocker
University of Abertay
Open Source

4 years Full Time

Mile2
Commercial

The Certified Digital Forensics Examiner program is designed to train Cyber Crime Investigators. Students are taught electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while con ...

Crazytrain

This course will put you through the paces in Linux as it stands itself (the operating system), and then move you into Linux and Data Forensics. The idea here is to take someone new to Linux and get them up and running with enough knowledge and hands on e ...

Crazytrain

This course is geared towards those with significant Linux knowledge, experience, and understanding. If you are a strong Linux power user and you know and understand at least the very basics of Linux forensics (I.E., have used 'dd' to create images, 'grep ...

Infoexpress, Inc.
Commercial

Know and control your network with Easy NAC, the simple and affordable Network Access Control solution. Easy NAC automatically discovers devices, profiles them, and controls access to the network. Easy NAC’s unique technology requires no network changes ...

Easy NAC
Decision Group Inc.
Commercial

E-Detective is a real-time Internet interception, monitoring and forensics system that captures, decodes, and reconstructs various types of Internet traffic. It is commonly used for organization Internet behavioral monitoring, auditing, record keeping, fo ...

Oracle
Freeware

Oracle Directory Server Enterprise Edition (formerly SUN Directory Server Enterprise Edition) is the best known directory server with proven large deployments in carrier and enterprise environments. It is also the most supported directory by ISVs, so it ...

Viasat
Commercial

The Viasat Eclypt Core encrypted internal hard drive protects data at rest in commercial-off-the-shelf (COTS) laptop and desktop computers in enterprise and tactical environments, as well as data stored in vehicles, aircraft, and ships. During high-risk o ...

Eclypt Core Encrypted Internal Hard Drive
Zscaler
Commercial

Zscaler, as a 100% cloud service, seamlessly integrates SSL traffic inspection without any deterioration in performance or requiring any additional hardware or software. Since Zscaler is always deployed in-line, it can always take action on SSL encrypte ...

Carnegie Mellon SEI

This five-day course is designed for computer security incident response team (CSIRT) technical personnel with little or no incident-handling experience. Through interactive instruction and practical exercises, the course provides insight into the type an ...