List Categories and Listings by A

With the Avira Security Management Center you can keep use of your Avira security software under control. The administration tool enables network-wide remote management via a central cockpit. You can thus conveniently monitor and control all processes. It ...

Category Enterprise
VendorAvira GmbH
Pricing ModelCommercial
Modified

avast! Distributed Network Manager (ADNM) represents a suite of powerful tools designed to help network administrators manage other avast! antivirus products installed on the network. Its unrivaled flexibility and scalability makes it an ideal solution ...

Category Enterprise
VendorAVAST Software
Pricing ModelFreeware
Modified

AVG Anti-Virus Business Edition offers exceptional real-time protection against the latest online threats, keeping your critical business data safe and computers and networks running smoothly, thereby enabling you to focus on your business. Incorporating ...

Category Enterprise
VendorAVG Technologies
Pricing ModelCommercial
Modified

Acronis Privacy Expert Suite provides you with the proactive, real time protection against spyware parasites, adware, keyloggers, hidden dialers, browser hijackers, and other malicious programs.

VendorAcronis Inc.
Pricing ModelCommercial
Modified

The International Conference on Availability, Reliability and Security will bring together researchers and practitioners in the area of dependability. This conference highlights the various aspects of dependability - with special focus on the crucial link ...

VendorNo Vendor
Pricing ModelCommercial
Modified

An international conference focussing on IT security for CFOs, CIOs, CTOs and technical staff from government agencies, universities and industry. Featuring local and international IT security experts.

ModifiedNever

ACNS is an annual conference concentrating on current developments that advance the areas of applied cryptography and its application to systems and network security. The goal is to represent both academic research works as well as developments in industr ...

VendorACNS
Pricing ModelCommercial
Modified

The Asiacrypt Conferences are series of annual International Conference on Theory and Application of Cryptology and Information Security. The conference is sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the ...

ModifiedNever

5-Day Course. The course will combine interactive classroom instruction, demonstrations and hand on lab activities. The objective of this course is to level the playing field between security professionals and the most competent cyber criminals and terror ...

Category Ethical Hacking
VendorNTG Clarity Networks Inc
ModifiedNever

In Advanced Ethical Hacking: Expert Penetration Testing, you will delve deep into the less well-known, less obvious, and consequently more difficult to master techniques that are available today to penetration testers. you will walk out the door with the ...

Category Ethical Hacking
VendorInfoSec Institute
ModifiedNever

The Anti-Virus Workshop gives delegates a hands-on opportunity to experiment with viruses under supervision and in a controlled environment. The first day provides a comprehensive introduction to viruses and anti-virus warfare, while the second day provid ...

Category Virus Training
VendorSophos Plc
ModifiedNever

This course is geared towards those with significant Linux knowledge, experience, and understanding. If you are a strong Linux power user and you know and understand at least the very basics of Linux forensics (I.E., have used 'dd' to create images, 'grep ...

VendorCrazytrain
ModifiedNever

This five-day course is designed for computer security incident response team (CSIRT) technical personnel with several months of incident-handling experience. Building on the methods and tools discussed in the fundamentals course, this course focuses on p ...

VendorCarnegie Mellon SEI
ModifiedNever

This course is geared towards those with significant Linux knowledge, experience, and understanding. If you are a strong Linux power user and you know and understand at least the very basics of Linux forensics (I.E., have used 'dd' to create images, 'grep ...

VendorCrazytrain
ModifiedNever

Computer networks are built to support business functionality and beyond communication the result of business is data. The data important to your business is your company's digital assets; it needs organisation, maintainenance and above all protection fro ...

VendorNext Generation Security Software Ltd and InterQuad Gro...
Pricing ModelCommercial
Modified

Analyzer is a full configurable analyzer program. It was developed in Win32 environment. It can be used with both Windows 95/98 and Windows NT/2000 platforms. It is composed by three parts: a graphical interface, an analysis engine and a capture program.

VendorCOTSE
ModifiedNever

ANASIL 2.2 *(sniffer) is a software network analyzer of Ethernet networks for Windows 95/98/NT/2000/XP. Its basic functions include: network link monitoring; creating and maintaining of a list of active network stations (computers); testing of the network ...

VendorAnasil
Pricing ModelCommercial
Modified

Complete line-of-defense against the most extreme forms of malware and cyber threats, Ad-Aware Pro Security provides the most advanced anti-spyware and antivirus detection and threat blocking algorithms, complemented with a powerful two-way firewall, web ...

VendorLavasoft
Pricing ModelCommercial
Modified

AirDefense Enterprise 7.2 is the most powerful Wireless Intrusion Prevention System (IPS) available. Having pioneered the field of wireless IPS, AirDefense continues lead in innovation with 24 patents pending or granted. The AirDefense Enterprise solution ...

Category Wireless IDS
VendorAirDefense, Inc
Pricing ModelCommercial
Modified

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire. It does the same things as the semi-free Tripwire and more. It creates a database from the regular expression rules that it finds from the config file. Once this data ...

VendorOpen Source
Pricing ModelFreeware
Modified

© Computer Network Defence Limited 2019