List Categories and Listings by D

DBAPPSecurity
Commercial
Pricing Model

DBAPPSecurity Web Application Firewall (WAF) provides full solutions for web application with real-time deep protection, web application accelerating and sensitive information leakage prevention against any kind of web attacks such as SQL injection, cross ...

Modified
DBAPPSecurity
Commercial
Pricing Model

DBAPPSecurity Web monitor provides security solutions of real-time monitoring, security alarm and ex post facto for web application which support direct and bypassing connecting deployment and achieve zero-risk deployment to application layer

Modified
DBAPPSecurity
Commercial
Pricing Model

DBAPPSecurity Log Auditor can monitor and collect various information from the target information system (e.g.: Firewall, VPN, intrusion detection, intrusion protection, anti-virus systems, database and applications) to audit information security.

Modified
DBAPPSecurity
Commercial
Pricing Model

DBAPPSecurity Database Auditor(DBAuditor)helps users to enhance the transparency of database monitoring and reduce the cost of manual auditing so as to visualize database running, monitor daily operation, control dangerous operation, audit all activities ...

Modified
Live-Forensics
Freeware
Pricing Model

DateDecoder will decode the majority of the encoded date/time stamps found on Windows computers including Unix Formats, MAC Formats, email timestamps and flash cookie timestamps.  The software is offered free of charge to benefit the community.

Category Forensic Tools
Modified
DateDecoder
University of Abertay
Open Source
Pricing Model

4 years Full Time

ModifiedNever
University of Portsmouth
Open Source
Pricing Model

3 years Full Time / 4 years Sandwich Course

ModifiedNever
Teeside University
Open Source
Pricing Model

3 years Full Time / 4 years Sandwich Course

ModifiedNever
Glasgow Caldeonian University
Open Source
Pricing Model

4 years Full Time

ModifiedNever
Coventry University
Open Source
Pricing Model

4 years Sandwich Course

ModifiedNever
Glasgow Caldeonian University
Open Source
Pricing Model

4 years Full Time

ModifiedNever
Anthony Desnos

DroidBox is a sandbox for Android applications, and is developed to offer dynamic analysis of Android applications. The following information is shown in the results, generated when analysis is ended: Hashes for the analyzed package Incoming/outgoing ...

Category Forensic Tools
ModifiedNever
Miroslav Štampar

Damn Small SQLi Scanner (DSSS) has been made as a PoC where I wanted to show that commercial (SQLi) scanners can be beaten under 100 lines of code.   It supports GET and POST parameters, blind/error SQLi tests and advanced comparison of different r ...

Category Website Scanners
ModifiedNever
Commercial
Pricing Model

Damballa CSP sits out-of-band inside the service provider's network and monitors DNS requests (non-PII traffic) from the subscriber's IP address. By monitoring DNS query behavior, Damballa CSP can identify which subscriber's are infected with advanced ma ...

Modified
Damballa Communications Service Providers (CSP)

Minerva is Deep-Secure's next gneration data diode that allows information to be checked before being securely passed in or out of an isolated system whilst protecting against attack from the opposite direction.   Features and benefits Integrate ...

Category Data Diodes
Modified
Deep-Secure Minerva
Commercial
Pricing Model

This product controls network management traffic as it passes between the enterprise networks and the management system. Its self-defending architecture means it can exert the required control without itself becoming vulnerable to attack.   Featur ...

Modified
Deep Secure Network Management Guard
Commercial
Pricing Model

This product controls file transfers entering and leaving the organisation, defending against advanced attacks and misuse. It is used by organisations that need to tightly control file transfers with Internet servers or need to pass files between separate ...

Modified
Deep Secure File Transfer Guard
Commercial
Pricing Model

This product controls web traffic entering and leaving the organisation, defending against advanced attacks and misuse. It is increasingly used by organisations that need to tightly control Internet browsing traffic or need to use web protocols to transfe ...

Category Guards Web
Modified
Deep Secure Web Guard
Commercial
Pricing Model

When signed data is received, it is necessary to check that the signature is valid. This means establishing a chain of certificates from a trusted root to the signature and ensuring that none of the certificates have been revoked. Often the certificates a ...

Modified
DeepSecure Digital Identity Guard

This product controls web traffic entering and leaving the organisation, defending against advanced attacks and misuse. It is increasingly used by organisations that need to tightly control Internet browsing traffic or need to use web protocols to transfe ...

Category Guards Mail
Modified
Deep-Secure Mail Guard

© Computer Network Defence Limited 2021