Skip to main content

Directory: A-Z 

Results 1081 - 1100 of 1235

Anyone wanting to secure their enterprise and infrastructure. Those interested in learning about state of the art security practices and practical implementation.

SecPoint
Service

SecPoint delivers online vulnerability scanning service. You get the following benefits: Online Vulnerability Scanning Get HTML, XML, PDF Reports Get Clear Solutions how to fix the found vulnerabilities User Friendly interface Scan any operating ...

New Technologies Inc

This course provides the participants with "hands-on" experience in developing and presenting computer evidence testimony in a courtroom setting. It relies upon the sanitized facts and evidence in an actual civil litigation case which involved the theft o ...

New Technologies Inc

This course provides the participants with "hands-on" experience in developing and presenting computer evidence testimony in a courtroom setting. It relies upon the sanitized facts and evidence in an actual civil litigation case which involved the theft o ...

Dan Farmer and Wietse Venema
OPEN SOURCE

TCT is a collection of programs by Dan Farmer and Wietse Venema for a post-mortem analysis of a UNIX system after break-in. The software was presented first in a Computer Forensics Analysis class in August 1999 (handouts can be found here). Examples of us ...

Halon Secuirty
Commercial

Halon is an email software distribution. It provides a full stack, scriptable approach to functions such as delivery (SMTP/LMTP), routing, security (anti-spam, signing), automation and integration; everything you need in front of your email storage. You ...

Category Appliances
The Halon MTA
The Harvester
Open Source

The objective of this program is to gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN computer database. This tool is intended to help Penetration tester ...

Category Uncategorised

Over the past several years security has dominated the corporate agenda. While there has been significant effort expended in protecting organizational resources, security incidents have been on the rise. There has also been a paucity of research in dealin ...

EDUCAUSE
Commercial

Sponsored by the EDUCAUSE & Internet2 Computer and Network Security Task Force, this annual meeting brings together information security professionals, IT staff, and others from across the higher education community. The 2007 conference will include keyno ...

Brian Carrier
FREEWARE

The @stake Sleuth Kit (TASK) allows an investigator examine the file systems of a suspect computer in a non-intrusive fashion. TASK is a collection of UNIX-based command line tools that can analyze NTFS, FAT, FFS, EXT2FS, and EXT3FS file systems. TASK rea ...

Sistech SA
Commercial

TheGreenBow VPN Client is an on demand IPSec VPN Client, compliant with most of popular VPN gateways with network tools to deploy security in large and medium Enterprises. Highly efficient and easy to configure, the VPN Client also allows peer-to-peer VPN ...

Category VPN Clients
VIPRE Security
Commercial

VIPRE ThreatIQ gives you the real-time intelligence you need to strengthen your cyber-defense and stop attackers cold. Up-to-the-minute data VIPRE ThreatIQ compiles real-time, global threat intelligence to help you understand where attackers are coming ...

PrivacyWare Inc.
Commercial

Web Application Firewall & Intrusion Prevention Software for Microsoft IISServer 2016/2019/IIS 10 Support ThreatSentry combines a state-of-the-art Web Application Firewall and port-level firewall with advanced behavioral filtering to block unwanted I ...

Category Host IPS
ThreatSentry
Wombat Security Technologies
Service

ThreatSim attack simulation product provides a phishing-focused security awareness training program. The ThreatSim mock attack system allows you to deliver simulated phishing emails with embedded Teachable Moments, which display targeted "just-in-time tea ...

Hakshop
Commercial

The fully assembled and enclosed brother to the Throwing Star LAN Tap Kit. The pro model sports all of the same 10BASET and 100BASETX monitoring goodness ready to go in your kit bag, no soldering necessary. To a target network this little guy looks just ...

Category Network Taps
Throwing Star LAN Tap Pro
Hewlett-Packard
Commercial

The TippingPoint IPS is an in-line device that is inserted seamlessly and transparently into the network. As packets pass through the IPS, they are fully inspected to determine whether they are legitimate or malicious. This instantaneous form of protectio ...

Category IPS Network
Titania Ltd
Limited Free Trial

Nipper accurately audits the security of firewalls, switches and routers to detect exploitable misconfigurations that pose risk to the network, prioritized by criticality. Applying Nipper’s compliance lens to the findings also provides the evidence needed ...

Category PCI DSS
Titania Nipper

Located in sunny San Diego during September for the past 8 years, ToorCon has been providing a meeting place for many of the top hackers and security professionals from all around the world to get together and discuss today's bleeding edge issues. ToorCon ...

Total Defense Inc.
Commercial

Total Defense Essential Anti-Virus Internet Security Malware protection – simple, smart, and reliable protection from viruses, spyware, ransomware and other malware threats on up to 3 of your PCsMulti-layer technology – real-time and on-demand malware sc ...

Total Defense Anti-Virus
McAfee
Commercial

McAfee Total Protection for Data Loss Prevention (DLP) safeguards intellectual property and ensures compliance by protecting sensitive data wherever it lives — on premise, in the cloud, or at the endpoints. McAfee DLP is delivered through low-maintenance ...

Category DLP Network
Total Protection for Data Loss Prevention