List Categories and Listings by D

Welcome to the largest underground hacking event in the world. DefCon hosts lots of small, regional meetings, and a DefCon event that coincides with the Black Hat Briefings in Las Vegas.

ModifiedNever
Radware Ltd.
Commercial
Pricing Model

DefensePro’s behavior-based, self-learning mechanism proactively scans for anomalous network, server and client traffic patterns. When detecting an attack, DefensePro characterizes the attack’s unique behavior, establishes a real-time signature and create ...

Category IPS Network
Modified
Open Door Networks
Limited Free Trial
Pricing Model

Protects your Mac from outside attackEasy-to-use interface means less chance of mistakesCritical improvements to OS X's "built-in" firewall

Modified
DoorStop X Firewall
Inferno Nettverk A/S
Commercial
Pricing Model

Dante is a circuit-level firewall/proxy that can be used to provide convenient and secure network connectivity to a wide range of hosts while requiring only the server Dante runs on to have external network connectivity. Once installed, Dante can in most ...

Modified
Dante
Freeware
Pricing Model

Darik's Boot and Nuke ("DBAN") is a self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for ...

Modified
dtSearch Corp.

Provides over two dozen indexed and unindexed text search options for all popular file types. Supports full-text as well as field searching in all supported file types. Has multiple relevancy-ranking and other search sorting options. dtSearch can instantl ...

Category Forensic Tools
Modified
Commercial
Pricing Model

Dell SonicWALL offers a variety of flexible email security solutions to match the unique email security needs of your organization—whether you have one user or 100,000. From appliances and software to virtual appliances and services, all solutions o ...

Modified
Dell SonicWALL
Commercial
Pricing Model

The annual DIMVA conference serves as a premier forum for advancing the state of the art in intrusion detection, malware detection, and vulnerability assessment. Each year DIMVA brings together international experts from academia, industry and government ...

Modified

DFRWS is dedicated to the sharing of knowledge and ideas about digital forensics research. Ever since it organized the first open workshop devoted to digital forensics in 2001, DFRWS continues to bring academics and practitioners together in an informal e ...

ModifiedNever
Learning Tree International

In this course, you gain extensive hands-on experience installing and configuring a firewall. You learn how to allow access to key services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private ne ...

ModifiedNever
Network Intelligence (I) Pvt. Ltd.

This is a practical hands-on two-day workshop on database security. It covers crucial aspects of Oracle and MS SQL Security and ensures an effective knowledge transfer with hands-on exercises. The course begins by looking at typical attack scenarios again ...

Modified
Daniel Barron
Open Source
Pricing Model

DansGuardian is an award winning Open Source web content filter which currently runs on Linux, FreeBSD, OpenBSD, NetBSD, Mac OS X, HP-UX, and Solaris. It filters the actual content of pages based on many methods including phrase matching, PICS filtering a ...

Category Uncategorised
Modified
DansGuardian
Datacom Systems
Commercial
Pricing Model

The 10/100 Full Duplex Ethernet Tap provides network monitoring tools with permanent 24x7 passive monitoring access to 10/100 BaseT Ethernet network segments. Our passive tap technology features exclusive, fault tolerant "no break the link" desi ...

Category Network Taps
Modified
BeCrypt Limited
Commercial
Pricing Model

Disk Protect is a full disk encryption solution for business, designed to protect data-at-rest held on desktops, laptops, tablets and servers from theft or loss. The solution transparently encrypts device data and uses strong authentication to prevent una ...

Modified
DISK Protect
SecurStar GmbH
Commercial
Pricing Model

Full disk encryption with pre-boot authentication Ideal to encrypt an entire computer /notebook/ partition or just a single Hard drive. With DCPP the Hard drive (including the operating system) is encrypted 100%, therefore unauthorized person will not be ...

Modified
Commercial
Pricing Model

The processes and methodologies taught in this class will train you to collect an image on damaged evidence where standard forensic imaging would have failed. You will learn to understand what kinds of problems hard drives have and what your options are t ...

Modified
Commercial
Pricing Model

DEV522: Defending Web Applications Security Essentials is intended for anyone tasked with implementing, managing, or protecting Web applications. It is particularly well suited to application security analysts, developers, application architects, pen test ...

Modified
DeviceLock, Inc.
Commercial
Pricing Model

DeviceLock DLP Suite consists of five modules that protect your organization from data leak threats: DeviceLock provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can&rsqu ...

Modified
DeviceLock DLP Suite
DFN (Deutsches Forschungs Netz)
Service
Pricing Model

Organised by the DFN-CERT (German Research Network). Mainly held in German with some international speakers. Visitors range from academic background, industry, civil government and Defence. Usually around mid March.

Modified