Skip to main content

List Categories and Listings by D

Welcome to the largest underground hacking event in the world. DefCon hosts lots of small, regional meetings, and a DefCon event that coincides with the Black Hat Briefings in Las Vegas.

Radware Ltd.

DefensePro’s behavior-based, self-learning mechanism proactively scans for anomalous network, server and client traffic patterns. When detecting an attack, DefensePro characterizes the attack’s unique behavior, establishes a real-time signature and create ...

Category IPS Network
Open Door Networks

Protects your Mac from outside attackEasy-to-use interface means less chance of mistakesCritical improvements to OS X's "built-in" firewall

DoorStop X Firewall
Inferno Nettverk A/S

Dante is a circuit-level firewall/proxy that can be used to provide convenient and secure network connectivity to a wide range of hosts while requiring only the server Dante runs on to have external network connectivity. Once installed, Dante can in most ...

Dante

Darik's Boot and Nuke ("DBAN") is a self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for ...

dtSearch Corp.

Provides over two dozen indexed and unindexed text search options for all popular file types. Supports full-text as well as field searching in all supported file types. Has multiple relevancy-ranking and other search sorting options. dtSearch can instantl ...

Category Forensic Tools

Dell SonicWALL offers a variety of flexible email security solutions to match the unique email security needs of your organization—whether you have one user or 100,000. From appliances and software to virtual appliances and services, all solutions o ...

Dell SonicWALL

The annual DIMVA conference serves as a premier forum for advancing the state of the art in intrusion detection, malware detection, and vulnerability assessment. Each year DIMVA brings together international experts from academia, industry and government ...

DFRWS is dedicated to the sharing of knowledge and ideas about digital forensics research. Ever since it organized the first open workshop devoted to digital forensics in 2001, DFRWS continues to bring academics and practitioners together in an informal e ...

Learning Tree International

In this course, you gain extensive hands-on experience installing and configuring a firewall. You learn how to allow access to key services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private ne ...

Network Intelligence (I) Pvt. Ltd.

This is a practical hands-on two-day workshop on database security. It covers crucial aspects of Oracle and MS SQL Security and ensures an effective knowledge transfer with hands-on exercises. The course begins by looking at typical attack scenarios again ...

Daniel Barron

DansGuardian is an award winning Open Source web content filter which currently runs on Linux, FreeBSD, OpenBSD, NetBSD, Mac OS X, HP-UX, and Solaris. It filters the actual content of pages based on many methods including phrase matching, PICS filtering a ...

Category Uncategorised
DansGuardian
Datacom Systems

The 10/100 Full Duplex Ethernet Tap provides network monitoring tools with permanent 24x7 passive monitoring access to 10/100 BaseT Ethernet network segments. Our passive tap technology features exclusive, fault tolerant "no break the link" desi ...

Category Network Taps
BeCrypt Limited

Disk Protect is a full disk encryption solution for business, designed to protect data-at-rest held on desktops, laptops, tablets and servers from theft or loss. The solution transparently encrypts device data and uses strong authentication to prevent una ...

DISK Protect
SecurStar GmbH

Full disk encryption with pre-boot authentication Ideal to encrypt an entire computer /notebook/ partition or just a single Hard drive. With DCPP the Hard drive (including the operating system) is encrypted 100%, therefore unauthorized person will not be ...

The processes and methodologies taught in this class will train you to collect an image on damaged evidence where standard forensic imaging would have failed. You will learn to understand what kinds of problems hard drives have and what your options are t ...

DEV522: Defending Web Applications Security Essentials is intended for anyone tasked with implementing, managing, or protecting Web applications. It is particularly well suited to application security analysts, developers, application architects, pen test ...

DeviceLock, Inc.

DeviceLock DLP Suite consists of five modules that protect your organization from data leak threats: DeviceLock provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can&rsqu ...

DeviceLock DLP Suite
DFN (Deutsches Forschungs Netz)

Organised by the DFN-CERT (German Research Network). Mainly held in German with some international speakers. Visitors range from academic background, industry, civil government and Defence. Usually around mid March.