List Categories and Listings by A

Commercial
Pricing Model

With the Avira Security Management Center you can keep use of your Avira security software under control. The administration tool enables network-wide remote management via a central cockpit. You can thus conveniently monitor and control all processes. It ...

Category Enterprise
Modified
AVAST Software
Freeware
Pricing Model

avast! Distributed Network Manager (ADNM) represents a suite of powerful tools designed to help network administrators manage other avast! antivirus products installed on the network. Its unrivaled flexibility and scalability makes it an ideal solution ...

Category Enterprise
Modified
AVG Technologies
Commercial
Pricing Model

AVG Anti-Virus Business Edition offers exceptional real-time protection against the latest online threats, keeping your critical business data safe and computers and networks running smoothly, thereby enabling you to focus on your business. Incorporating ...

Category Enterprise
Modified
Acronis Inc.
Commercial
Pricing Model

Acronis Privacy Expert Suite provides you with the proactive, real time protection against spyware parasites, adware, keyloggers, hidden dialers, browser hijackers, and other malicious programs.

Modified
Commercial
Pricing Model

The International Conference on Availability, Reliability and Security will bring together researchers and practitioners in the area of dependability. This conference highlights the various aspects of dependability - with special focus on the crucial link ...

Modified

An international conference focussing on IT security for CFOs, CIOs, CTOs and technical staff from government agencies, universities and industry. Featuring local and international IT security experts.

ModifiedNever
Commercial
Pricing Model

ACNS is an annual conference concentrating on current developments that advance the areas of applied cryptography and its application to systems and network security. The goal is to represent both academic research works as well as developments in industr ...

Modified

The Asiacrypt Conferences are series of annual International Conference on Theory and Application of Cryptology and Information Security. The conference is sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the ...

ModifiedNever
NTG Clarity Networks Inc

5-Day Course. The course will combine interactive classroom instruction, demonstrations and hand on lab activities. The objective of this course is to level the playing field between security professionals and the most competent cyber criminals and terror ...

Category Ethical Hacking
ModifiedNever
InfoSec Institute

In Advanced Ethical Hacking: Expert Penetration Testing, you will delve deep into the less well-known, less obvious, and consequently more difficult to master techniques that are available today to penetration testers. you will walk out the door with the ...

Category Ethical Hacking
ModifiedNever

The Anti-Virus Workshop gives delegates a hands-on opportunity to experiment with viruses under supervision and in a controlled environment. The first day provides a comprehensive introduction to viruses and anti-virus warfare, while the second day provid ...

Category Virus Training
ModifiedNever

This course is geared towards those with significant Linux knowledge, experience, and understanding. If you are a strong Linux power user and you know and understand at least the very basics of Linux forensics (I.E., have used 'dd' to create images, 'grep ...

ModifiedNever
Carnegie Mellon SEI

This five-day course is designed for computer security incident response team (CSIRT) technical personnel with several months of incident-handling experience. Building on the methods and tools discussed in the fundamentals course, this course focuses on p ...

ModifiedNever

This course is geared towards those with significant Linux knowledge, experience, and understanding. If you are a strong Linux power user and you know and understand at least the very basics of Linux forensics (I.E., have used 'dd' to create images, 'grep ...

ModifiedNever
Next Generation Security Software Ltd and InterQuad Group Ltd.
Commercial
Pricing Model

Computer networks are built to support business functionality and beyond communication the result of business is data. The data important to your business is your company's digital assets; it needs organisation, maintainenance and above all protection fro ...

Modified

Analyzer is a full configurable analyzer program. It was developed in Win32 environment. It can be used with both Windows 95/98 and Windows NT/2000 platforms. It is composed by three parts: a graphical interface, an analysis engine and a capture program.

ModifiedNever
Commercial
Pricing Model

ANASIL 2.2 *(sniffer) is a software network analyzer of Ethernet networks for Windows 95/98/NT/2000/XP. Its basic functions include: network link monitoring; creating and maintaining of a list of active network stations (computers); testing of the network ...

Modified
Commercial
Pricing Model

Complete line-of-defense against the most extreme forms of malware and cyber threats, Ad-Aware Pro Security provides the most advanced anti-spyware and antivirus detection and threat blocking algorithms, complemented with a powerful two-way firewall, web ...

Modified
AirDefense, Inc
Commercial
Pricing Model

AirDefense Enterprise 7.2 is the most powerful Wireless Intrusion Prevention System (IPS) available. Having pioneered the field of wireless IPS, AirDefense continues lead in innovation with 24 patents pending or granted. The AirDefense Enterprise solution ...

Category Wireless IDS
Modified
Freeware
Pricing Model

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire. It does the same things as the semi-free Tripwire and more. It creates a database from the regular expression rules that it finds from the config file. Once this data ...

Modified

© Computer Network Defence Limited 2021