List Categories and Listings by A

AlgoSec Inc.

The manual audit of a firewall policy is a very subjective and laborious process which is dependent on the user?s skill set and experience. The AlgoSec Firewall Analyzer (FA) automatically and non-intrusively analyzes a firewall?s policy. Within a matter ...

AVG Technologies

AVG File Server Business Edition's network virus scanner helps keep your customer and business data safe from hackers and malware: hassle and worry you just don't need. Hackers and malware can sneak in and disrupt your operations, costing you time and mon ...

Category Servers
AVG File Server Business Edition
Avast Business

Easy-to-use business protection with features specific to Windows servers. Don’t overlook protecting your infrastructure - securing Windows servers is a vital part of comprehensive cybersecurity for businesses that use them. Keep your network protected, ...

Category Servers
Avast Next-Gen Antivirus for Windows servers
AVG Technologies

Protect your business Endpoints today against ransomware, malware, hackers and much more. Features: CyberCapture - When an unrecognized file is downloaded onto one of your PCs, a copy will be sent to our experts at our Threat Labs to identify if it’s ...

Category Enterprise
AVG Anti-Virus Business Edition

The International Conference on Availability, Reliability and Security will bring together researchers and practitioners in the area of dependability. This conference highlights the various aspects of dependability - with special focus on the crucial link ...

An international conference focussing on IT security for CFOs, CIOs, CTOs and technical staff from government agencies, universities and industry. Featuring local and international IT security experts.

ACNS is an annual conference concentrating on current developments that advance the areas of applied cryptography and its application to systems and network security. The goal is to represent both academic research works as well as developments in industr ...

The Asiacrypt Conferences are series of annual International Conference on Theory and Application of Cryptology and Information Security. The conference is sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the ...

InfoSec Institute

In Advanced Ethical Hacking: Expert Penetration Testing, you will delve deep into the less well-known, less obvious, and consequently more difficult to master techniques that are available today to penetration testers. you will walk out the door with the ...

Category Ethical Hacking

This course is geared towards those with significant Linux knowledge, experience, and understanding. If you are a strong Linux power user and you know and understand at least the very basics of Linux forensics (I.E., have used 'dd' to create images, 'grep ...

Carnegie Mellon SEI

This five-day course is designed for computer security incident response team (CSIRT) technical personnel with several months of incident-handling experience. Building on the methods and tools discussed in the fundamentals course, this course focuses on p ...

This course is geared towards those with significant Linux knowledge, experience, and understanding. If you are a strong Linux power user and you know and understand at least the very basics of Linux forensics (I.E., have used 'dd' to create images, 'grep ...

Next Generation Security Software Ltd and InterQuad Group Ltd.

Computer networks are built to support business functionality and beyond communication the result of business is data. The data important to your business is your company's digital assets; it needs organisation, maintainenance and above all protection fro ...

Complete line-of-defense against the most extreme forms of malware and cyber threats, Ad-Aware Pro Security provides the most advanced anti-spyware and antivirus detection and threat blocking algorithms, complemented with a powerful two-way firewall, web ...

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire. It does the same things as the semi-free Tripwire and more. It creates a database from the regular expression rules that it finds from the config file. Once this data ...

RhinoSoft.com

Internet Connection Sharing, Internet Content Filtering , and Network Resource Management Proxy Server for Windows Filter web content with this content filtering software for windows. Control and understand how your Internet connection is being used. W ...

Category Uncategorised
AllegroSurf
Acunetix Ltd

Acunetix has pioneered the web application security scanning technology: Its engineers have focused on web security as early as 1997 and developed an engineering lead in web site analysis and vulnerability detection. Acunetix Web Vulnerability Scanner inc ...

Category Website Scanners
Asavie Technologies

The Complete Remote Access VPN * Multiple access methods to securely connect to your email, files and applications * Enterprise-class features with simple deployment and unparalled ease-of-use * Installs on existing server without having ...

Category VPN Servers

You will learn the skills required to reverse-engineer applications to find vulnerabilities, perform remote user application and kernel debugging, analyze patches for one-day exploits, perform advanced fuzzing, and write complex exploits against targets s ...

Category Ethical Hacking
Advanced Exploit Development for Penetration Testers: SEC760
Intense School

The Certified Computer Examiner (CCE) certification is a challenging test of the knowledge required to work in computer forensics, involving an on-line proctored exam and a thorough practical component involving correct investigation of several physical i ...