The manual audit of a firewall policy is a very subjective and laborious process which is dependent on the user?s skill set and experience. The AlgoSec Firewall Analyzer (FA) automatically and non-intrusively analyzes a firewall?s policy. Within a matter ...
AVG File Server Business Edition's network virus scanner helps keep your customer and business data safe from hackers and malware: hassle and worry you just don't need. Hackers and malware can sneak in and disrupt your operations, costing you time and mon ...
Easy-to-use business protection with features specific to Windows servers. Don’t overlook protecting your infrastructure - securing Windows servers is a vital part of comprehensive cybersecurity for businesses that use them. Keep your network protected, ...
Protect your business Endpoints today against ransomware, malware, hackers and much more. Features: CyberCapture - When an unrecognized file is downloaded onto one of your PCs, a copy will be sent to our experts at our Threat Labs to identify if it’s ...
The International Conference on Availability, Reliability and Security will bring together researchers and practitioners in the area of dependability. This conference highlights the various aspects of dependability - with special focus on the crucial link ...
An international conference focussing on IT security for CFOs, CIOs, CTOs and technical staff from government agencies, universities and industry. Featuring local and international IT security experts.
ACNS is an annual conference concentrating on current developments that advance the areas of applied cryptography and its application to systems and network security. The goal is to represent both academic research works as well as developments in industr ...
The Asiacrypt Conferences are series of annual International Conference on Theory and Application of Cryptology and Information Security. The conference is sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the ...
In Advanced Ethical Hacking: Expert Penetration Testing, you will delve deep into the less well-known, less obvious, and consequently more difficult to master techniques that are available today to penetration testers. you will walk out the door with the ...
This course is geared towards those with significant Linux knowledge, experience, and understanding. If you are a strong Linux power user and you know and understand at least the very basics of Linux forensics (I.E., have used 'dd' to create images, 'grep ...
This five-day course is designed for computer security incident response team (CSIRT) technical personnel with several months of incident-handling experience. Building on the methods and tools discussed in the fundamentals course, this course focuses on p ...
This course is geared towards those with significant Linux knowledge, experience, and understanding. If you are a strong Linux power user and you know and understand at least the very basics of Linux forensics (I.E., have used 'dd' to create images, 'grep ...
Computer networks are built to support business functionality and beyond communication the result of business is data. The data important to your business is your company's digital assets; it needs organisation, maintainenance and above all protection fro ...
Complete line-of-defense against the most extreme forms of malware and cyber threats, Ad-Aware Pro Security provides the most advanced anti-spyware and antivirus detection and threat blocking algorithms, complemented with a powerful two-way firewall, web ...
AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire. It does the same things as the semi-free Tripwire and more. It creates a database from the regular expression rules that it finds from the config file. Once this data ...
Internet Connection Sharing, Internet Content Filtering , and Network Resource Management Proxy Server for Windows Filter web content with this content filtering software for windows. Control and understand how your Internet connection is being used. W ...
Acunetix has pioneered the web application security scanning technology: Its engineers have focused on web security as early as 1997 and developed an engineering lead in web site analysis and vulnerability detection. Acunetix Web Vulnerability Scanner inc ...
The Complete Remote Access VPN * Multiple access methods to securely connect to your email, files and applications * Enterprise-class features with simple deployment and unparalled ease-of-use * Installs on existing server without having ...
You will learn the skills required to reverse-engineer applications to find vulnerabilities, perform remote user application and kernel debugging, analyze patches for one-day exploits, perform advanced fuzzing, and write complex exploits against targets s ...
The Certified Computer Examiner (CCE) certification is a challenging test of the knowledge required to work in computer forensics, involving an on-line proctored exam and a thorough practical component involving correct investigation of several physical i ...
© Computer Network Defence Limited 2023