List Categories and Listings by E
edgescan is the only hybrid cloud based solution in Europe which combines both vulnerability scanning and manual verification on an on-going basis. It is a SaaS (Software as a Service) solution which detects technical vulnerabilities in Internet-facing sy ...
With an intuitive, yet flexible GUI, and unmatched performance, EnCase Version 4 provides investigators with the tools to conduct large-scale and complex investigation with accuracy and efficiency. Our award winning solution yields completely non-invasive ...
OpenText EnCase Forensic is a court-proven solution for finding, decrypting, collecting and preserving forensic data from a wide variety of devices, while ensuring evidence integrity and seamlessly integrating investigation workflows. Thorough evidence c ...
An automated and centralized identity management platform is the only viable means for delivering consistent service and maintaining control over application security. As the only Identity Lifecycle Management solution built on a platform that incorporate ...
This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the curren ...
Passive scanning of the LAN: you can retrieve info about: hosts in the lan, open ports, services version, type of the host (gateway, router or simple host) and estimated distance in hops.
Endian Firewall Software Appliance offers the same technology that resides in the unified threat management (UTM) appliances by Endian, making it possible to turn any PC into a full featured security appliance. Unleash the power of Endian Firewall using y ...
EdenWall is the hardware firewall developed by INL. It provides authentication and user-based network flow management. Thanks to EdenWall, network filtering policies based on actual user identity is now possible. Sole IP-based filtering time is over! ...
SecureLogix delivers the world?s first Voice Firewall to secure corporate resources from telephony borne attacks and security risks, and defend your VoIP and legacy voice systems from service disruption and abuse, unauthorized access, toll fraud, and othe ...
When combined with the XSR?s powerful IP routing, the integrated VPN (XSR-XXXX-V PN) dramatically increases the performance and functionality for enterprise networking. The addition of enterprise-class VPN complements the XSR?s industry-leading IP WAN rou ...
A VPN is a Virtual Private Network. VPNs use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. A VPN provides you with the same capabilities as a system of privat ...
Eland SYS-2 Firewall/VPN Popular
The Eland SYS-2 Firewall/VPN is a network security appliance with a built-in firewall, Anti-Spam and Anti-Virus protection, web content filtering and a Virtual Private Network gateway to secure your internal network.
SonicWall Email Security is ideal for organizations that need a dedicated on-premises solution. SonicWall’s solution can be deployed as a hardened physical appliance, robust virtual appliance or software application. The multi-layered solution provides co ...
eScan Corporate Edition is a comprehensive security solution for your corporate network. The new and improved eScan Corporate Edition (with Hybrid Network Support) safeguards your corporate network from all kinds of cyber threats. As Informatio ...
Whether you're a business or home user, you can take control of your email and stop spam with the world's best spam filter - Ella for Spam Control. Ella is more than just spam filter software; it keeps important email in your inbox, moves your electronic ...
EMP Cloud substantially expands the former EMP on-premise feature set. Also, it will protect both on-premise email servers, as well as cloud based services such as Office 365 and Gmail.
The worlds security professionals converge to discuss new technology, and share best practices. The most significant new discoveries, technologies, and products will be presented at the annual EUSecWest conference, brought to you by the organizers of PacS ...
The theme of the conference is the protection of computer networks. The conference will draw participants from academia and industry in Europe and beyond to discuss hot topics in applied network and systems security. Topics include but are not limited to ...
Discover vulnerabilities before cybercriminals do! Our most popular information security and hacking training goes in-depth into the techniques used by malicious actors with attention-getting lectures and hands-on labs. Earn your CEH and PenTest+, guaran ...
The Wireless LAN Security course consists of hands on learning using the latest enterprise wireless LAN security and auditing equipment. This course addresses in detail the most up-to-date WLAN intrusion and DoS tools and techniques, functionality of the ...