Dropbox Decryptor from Magnet Forensics is a free tool that will decrypt the Dropbox filecache.dbx and config.dbx files, which are both encrypted SQLite databases. These two locations store information about files that have been synched to the cloud using ...
Software to gather the Volume Serial Number from an attached device including CDs. V5 now includes a built in registry viewer (NTUSER, SAM, SYSTEM, SOFTWARE) and disk explorer with multiple viewing formats.
Dashlane fills all your passwords, payments, and personal details wherever you need them, across the web, on any device. Every password, Everywhere Save passwords and logins as you browse. Store an unlimited number of passwords and access them anywhe ...
Data protection does not have to get in the way of business productivity. Forcepoint’s focus on unified policies, user risk, and automation makes data security frictionless and intuitive. Control all your data with one single policyReplace broad, sweepin ...
DB Audit and Security 360 is a complete out-of-the-box database security & auditing solution for Oracle, Sybase, MySQL, DB2 and MS SQL Server. DB Audit allows database and system administrators, security administrators, auditors and operators to track and ...
An extensible network forensic analysis framework. Enables rapid development of plugins to support the dissection of network packet captures. Key features:Robust stream reassemblyIPv4 and IPv6 supportCustom output handlersChainable decoders
DECOYnet learns the organizational network and deploys decoys that mirror valuable assets, applications and data. Then, it intelligently places mini-traps on endpoints and servers to lure attackers into the decoy – exposing their presence, slowing their a ...
Duo Insight is a free phishing assessment tool by Duo Security that allows you to find vulnerable users and devices in minutes and start protecting them right away.
A two-factor authentication , authorisation and access, Identity as a Service system, with inherent single sign-on capability. Passwords and other data-at-rest information is protected by virtual encryption keys, known only to the system, and otherwise i ...