Skip to main content

List Categories and Listings by D

SoftTree Technologies

DB Audit and Security 360 is a complete out-of-the-box database security & auditing solution for Oracle, Sybase, MySQL, DB2 and MS SQL Server. DB Audit allows database and system administrators, security administrators, auditors and operators to track and ...

DB audit and Security 360
US Army Research Lab

An extensible network forensic analysis framework. Enables rapid development of plugins to support the dissection of network packet captures. Key features:Robust stream reassemblyIPv4 and IPv6 supportCustom output handlersChainable decoders

Duo Security

Duo Insight is a free phishing assessment tool by Duo Security that allows you to find vulnerable users and devices in minutes and start protecting them right away.

DARKBEAST provides incident responders, threat hunters, investigators, and intelligence analysts with a robust technology to dive into the cybercrime underground and investigate through KELA's cybercrime data lake. Gain visibility into underground operati ...

Darkbeast
Daniel Barron

DansGuardian is an award winning Open Source web content filter which currently runs on Linux, FreeBSD, OpenBSD, NetBSD, Mac OS X, HP-UX, and Solaris. It filters the actual content of pages based on many methods including phrase matching, PICS filtering a ...

Category Uncategorised
DansGuardian
Open Door Networks

Protects your Mac from outside attackEasy-to-use interface means less chance of mistakesCritical improvements to OS X's "built-in" firewall

DoorStop X Firewall
Inferno Nettverk A/S

Dante is a circuit-level firewall/proxy that can be used to provide convenient and secure network connectivity to a wide range of hosts while requiring only the server Dante runs on to have external network connectivity. Once installed, Dante can in most ...

Dante

Darik's Boot and Nuke ("DBAN") is a self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for ...

dtSearch Corp.

Provides over two dozen indexed and unindexed text search options for all popular file types. Supports full-text as well as field searching in all supported file types. Has multiple relevancy-ranking and other search sorting options. dtSearch can instantl ...

Category Forensic Tools

Dell SonicWALL offers a variety of flexible email security solutions to match the unique email security needs of your organization—whether you have one user or 100,000. From appliances and software to virtual appliances and services, all solutions o ...

Dell SonicWALL

The annual DIMVA conference serves as a premier forum for advancing the state of the art in intrusion detection, malware detection, and vulnerability assessment. Each year DIMVA brings together international experts from academia, industry and government ...

DFRWS is dedicated to the sharing of knowledge and ideas about digital forensics research. Ever since it organized the first open workshop devoted to digital forensics in 2001, DFRWS continues to bring academics and practitioners together in an informal e ...

Learning Tree International

In this course, you gain extensive hands-on experience installing and configuring a firewall. You learn how to allow access to key services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private ne ...

Network Intelligence (I) Pvt. Ltd.

This is a practical hands-on two-day workshop on database security. It covers crucial aspects of Oracle and MS SQL Security and ensures an effective knowledge transfer with hands-on exercises. The course begins by looking at typical attack scenarios again ...

DirX Access is a comprehensive access management and identity federation solution for protecting Web services and Web applications against unauthorized access. User access is controlled and enforced on the basis of central role-based security policies ...

Datacom Systems

The 10/100 Full Duplex Ethernet Tap provides network monitoring tools with permanent 24x7 passive monitoring access to 10/100 BaseT Ethernet network segments. Our passive tap technology features exclusive, fault tolerant "no break the link" desi ...

Category Network Taps
BeCrypt Limited

Disk Protect is a full disk encryption solution for business, designed to protect data-at-rest held on desktops, laptops, tablets and servers from theft or loss. The solution transparently encrypts device data and uses strong authentication to prevent una ...

DISK Protect
SecurStar GmbH

Full disk encryption with pre-boot authentication Ideal to encrypt an entire computer /notebook/ partition or just a single Hard drive. With DCPP the Hard drive (including the operating system) is encrypted 100%, therefore unauthorized person will not be ...

The processes and methodologies taught in this class will train you to collect an image on damaged evidence where standard forensic imaging would have failed. You will learn to understand what kinds of problems hard drives have and what your options are t ...