List Categories and Listings by D

DFRWS is dedicated to the sharing of knowledge and ideas about digital forensics research. Ever since it organized the first open workshop devoted to digital forensics in 2001, DFRWS continues to bring academics and practitioners together in an informal e ...

ModifiedNever
Learning Tree International

In this course, you gain extensive hands-on experience installing and configuring a firewall. You learn how to allow access to key services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private ne ...

ModifiedNever
Network Intelligence (I) Pvt. Ltd.

This is a practical hands-on two-day workshop on database security. It covers crucial aspects of Oracle and MS SQL Security and ensures an effective knowledge transfer with hands-on exercises. The course begins by looking at typical attack scenarios again ...

Modified
Enterasys Networks
Commercial
Pricing Model

Enterasys Dragon® ensures the confidentiality, integrity, and availability of business critical resources with industry-leading Intrusion Prevention capabilities, including: * Threat containment that leverages existing network investments * In ...

Category Host IDS
Modified
Daniel Barron
Open Source
Pricing Model

DansGuardian is an award winning Open Source web content filter which currently runs on Linux, FreeBSD, OpenBSD, NetBSD, Mac OS X, HP-UX, and Solaris. It filters the actual content of pages based on many methods including phrase matching, PICS filtering a ...

Category Uncategorised
Modified
DansGuardian
Datacom Systems
Commercial
Pricing Model

The 10/100 Full Duplex Ethernet Tap provides network monitoring tools with permanent 24x7 passive monitoring access to 10/100 BaseT Ethernet network segments. Our passive tap technology features exclusive, fault tolerant "no break the link" desi ...

Category Network Taps
Modified
Mobile Armor, Inc.
Commercial
Pricing Model

Mobile Armor's DataArmor™ software provides data protection, authentication, compliance, and advanced administration for all Windows, Linux, Blackberry, Palm, and Windows Mobile devices within your enterprise. With high-speed integrated encryption and uns ...

Modified
BeCrypt Limited
Commercial
Pricing Model

An assured full disk encryption solution securing data on desktop and laptop PCs from theft and loss BeCrypt DISK Protect is BeCrypt’s Data at Rest solution to secure an organisation’s data, whether on desktops or laptop PCs. With greater amounts of da ...

Modified
SecurStar GmbH
Commercial
Pricing Model

Full disk encryption with pre-boot authentication Ideal to encrypt an entire computer /notebook/ partition or just a single Hard drive. With DCPP the Hard drive (including the operating system) is encrypted 100%, therefore unauthorized person will not be ...

Modified
Commercial
Pricing Model

The processes and methodologies taught in this class will train you to collect an image on damaged evidence where standard forensic imaging would have failed. You will learn to understand what kinds of problems hard drives have and what your options are t ...

Modified
Commercial
Pricing Model

DEV522: Defending Web Applications Security Essentials is intended for anyone tasked with implementing, managing, or protecting Web applications. It is particularly well suited to application security analysts, developers, application architects, pen test ...

Modified
Commercial
Pricing Model

As zero-day vulnerabilities are discovered more frequently, malicious computer attackers are constantly writing exploits to attack them. But when a new flaw is discovered, it is often difficult to determine whether it is truly exploitable, making an analy ...

Category Ethical Hacking
Modified
Enterasys Networks
Commercial
Pricing Model

Dragon® Security Command Console is a leading Security Information and Event Manager (SIEM) product that combines best of breed detection methodologies with behavioral analysis and information from third party vulnerability assessment tools to provide the ...

Modified
DeviceLock, Inc.
Commercial
Pricing Model

DeviceLock DLP Suite consists of five modules that protect your organization from data leak threats: DeviceLock provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can&rsqu ...

Modified
DeviceLock DLP Suite
Commercial
Pricing Model

Dynamic NAC is the Network Access Control solution that requires ZERO network changes, making it many times easier and faster to deploy than traditional NAC solutions. Dynamic NAC offers centralized management, flexible policies, granular quarantining and ...

Modified
DFN (Deutsches Forschungs Netz)
Service
Pricing Model

Organised by the DFN-CERT (German Research Network). Mainly held in German with some international speakers. Visitors range from academic background, industry, civil government and Defence. Usually around mid March.

Modified
Commercial
Pricing Model

DirX Identity offers an extensive identity management solution for enterprises and organizations. It gives the right people the right access to the right resources at the right time and thus leads to productivity, information security, a perceptible reduc ...

Modified
Commercial
Pricing Model

DirX Audit provides a platform for the central collection, normalization, storage, and analysis of audit trails from different audit sources. Auditors can use DirX Audit's web-based user interface to analyze and correlate the audit logs in the central ...

Modified
Commercial
Pricing Model

DirX Directory enables the secure storage of unambiguous digital identities and is designed to handle a potentially very large number of users. Other data, such as the public keys for a public key infrastructure, can also be stored and managed reliably ...

Modified
Commercial
Pricing Model

DirX Access is a comprehensive access management and identity federation solution for protecting Web services and Web applications against unauthorized access. User access is controlled and enforced on the basis of central role-based security policies ...

Modified

© Computer Network Defence Limited 2021