Skip to main content

List Categories and Listings by B

The Black Hat Briefings brings together a unique mix in security: the best minds from government agencies and global corporations with the most respected independent researchers and hackers. These forums take place regularly in Las Vegas, Amsterdam, Tokyo ...

Zynamix GmbH

Do you need to analyze multiple variations of essentially the same program ? Do you need to understand the changes between two versions of a program ? Are you trying to detect code theft ? SABRE BinDiff uses a unique graph-theoretical approach to allow co ...

Category Forensic Tools
London Metropolitan University

UMUC was named a National Center of Academic Excellence in Information Assurance and Cyber Defense Education by the National Security Agency and Department of Homeland Security. About the Software Development and Security Bachelor's Degree Your software d ...

Bachelor - Software Development and Security

Belkasoft X (Belkasoft Evidence Center X) is a flagship tool by Belkasoft for computer, mobile and cloud forensics. It can help you to acquire and analyze a wide range of mobile devices, run various analytical tasks, perform case-wide searches, bookmark a ...

Category Forensic Tools
Belkasoft Evidence Center Portable
Liverpool John Moores University

UMUC was named a National Center of Academic Excellence in Information Assurance and Cyber Defense Education by the National Security Agency and Department of Homeland Security. We've developed our cybersecurity policy and management degree in conjunctio ...

Bachelor - Cybersecurity Management and Policy
OpenStack Security Group

Bandit is a tool designed to find common security issues in Python code. By processing files, building an AST and running appropriate plugins against the AST nodes, Bandit is able to generate a report once it has finished scanning code.

bandit

Web classification continues to present a unique security challenge to anyone trying to offer secure web access to enterprises. In addition to keeping track of hundreds of millions of websites (with millions more added every year), security vendors must p ...

Category Content Filters
Barracuda Networks

With hundreds of lines of code to check - and vulnerabilities often subtle and hard to find - a serious data breach is often the first sign that a web application has problems. Having secured thousands of production applications against more than 11 billi ...

Category Guards Web
Barracuda Web Application Firewall
Barracuda Networks

The Barracuda SSL VPN makes it easy for remote users to access internal applications and files. Unlike traditional VPN technologies, the Barracuda SSL VPN does not require any additional client software or complicated settings. Logging in from home or the ...

Category VPN Clients
Barracuda SSL VPN
Barracuda Networks

The Barracuda NG Firewall is an enterprise-grade next-generation firewall that was purpose-built for efficient deployment and operation within dispersed, highly dynamic, and security-critical network environments. In addition to next-generation firewall ...

Barracuda NG Firewall
Barracuda Networks

As a cloud-based service, the Barracuda Web Security Service provides a convenient option to deploy Barracuda's powerful web security technology for organizations looking to leverage the scalability and flexibility of the cloud. Ideal for safeguarding use ...

Barracuda Web Security Service
Barracuda Networks

For most businesses, most of the communication between your business and the outside world occurs by email. While email is necessary for business, it also exposes your business to a variety of threats from time-wasting spam to data theft, hacking and viru ...

AlgoSec BusinessFlow makes it easy to securely provision, maintain and decommission connectivity for business applications. By automatically mapping application connectivity requirements to the underlying network infrastructure, BusinessFlow accelerates a ...

BusinessFlow
Bufferzone Inc

BUFFERZONE is a virtual container that protects any content source that you define as potentially insecure including web browsers, email, Skype, FTP and even removable storage. You are able to definite granular containment poloicies according to network s ...

Justin - presidentbeef

Brakeman is an open source vulnerability scanner specifically designed for Ruby on Rails applications. It statically analyzes Rails application code to find security issues at any stage of development.

Brakeman - Rails Security Scanner
Foxton Forensics

Browser History Examiner is a professional software tool for extracting, viewing and analysing internet history from the main desktop web browsers. BHE can assist in various digital investigations such as civil & criminal digital forensics cases ...

Category Forensic Tools
Browser History Examiner
Foxton Software

Browser History viewer is a free tool for extracting, viewing and analysing internet history from Firefox, Chrome and Internet Explorer web browsers. Website visits are displayed alongside an interactive graph, showing how many sites have been visited ov ...

Category Forensic Tools
Browser History Viewer
Foxton Forensics

Browser History Capturer is a free tool that allows you to easily capture web browser history from a Windows computer. The tool can be run from a USB dongle to capture history from Firefox, Chrome and Internet Explorer web browsers. The history files are ...

Category Forensic Tools
Browser History Capturer

Belkasoft Live RAM Capturer is a tiny free forensic tool that allows to reliably extract the entire contents of computer’s volatile memory—even if protected by an active anti-debugging or anti-dumping system. Separate 32-bit and 64-bit builds are availabl ...

Category Forensic Tools
Belkasoft Live RAM Capturer