List Categories and Listings by E

BCC Risk Advisory

edgescan is the only hybrid cloud based solution in Europe which combines both vulnerability scanning and manual verification on an on-going basis. It is a SaaS (Software as a Service) solution which detects technical vulnerabilities in Internet-facing sy ...

Modified
edgescan
Guidance Software, Inc.
Commercial
Pricing Model

With an intuitive, yet flexible GUI, and unmatched performance, EnCase Version 4 provides investigators with the tools to conduct large-scale and complex investigation with accuracy and efficiency. Our award winning solution yields completely non-invasive ...

Modified
Commercial
Pricing Model

OpenText EnCase Forensic is a court-proven solution for finding, decrypting, collecting and preserving forensic data from a wide variety of devices, while ensuring evidence integrity and seamlessly integrating investigation workflows. Thorough evidence c ...

Category Remote Forensics
Modified
EnCase Forensic
The Dot Net Factory
Commercial
Pricing Model

An automated and centralized identity management platform is the only viable means for delivering consistent service and maintaining control over application security. As the only Identity Lifecycle Management solution built on a platform that incorporate ...

Modified
EmpowerID
Commercial
Pricing Model

This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the curren ...

Category Ethical Hacking
Modified
Alberto Ornaghi, Marco Valleri

Passive scanning of the LAN: you can retrieve info about: hosts in the lan, open ports, services version, type of the host (gateway, router or simple host) and estimated distance in hops.

Modified
Endian s.r.l.
Commercial
Pricing Model

Endian Firewall Software Appliance offers the same technology that resides in the unified threat management (UTM) appliances by Endian, making it possible to turn any PC into a full featured security appliance. Unleash the power of Endian Firewall using y ...

Modified
Commercial
Pricing Model

EdenWall is the hardware firewall developed by INL. It provides authentication and user-based network flow management. Thanks to EdenWall, network filtering policies based on actual user identity is now possible. Sole IP-based filtering time is over! ...

Modified
SecureLogix Corporation
Commercial
Pricing Model

SecureLogix delivers the world?s first Voice Firewall to secure corporate resources from telephony borne attacks and security risks, and defend your VoIP and legacy voice systems from service disruption and abuse, unauthorized access, toll fraud, and othe ...

Modified
Enterasys Networks Inc.
Commercial
Pricing Model

When combined with the XSR?s powerful IP routing, the integrated VPN (XSR-XXXX-V PN) dramatically increases the performance and functionality for enterprise networking. The addition of enterprise-class VPN complements the XSR?s industry-leading IP WAN rou ...

Category VPN Servers
Modified
Eland Systems
Commercial
Pricing Model

A VPN is a Virtual Private Network. VPNs use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. A VPN provides you with the same capabilities as a system of privat ...

Category VPN Servers
Modified
Eland Systems
Commercial
Pricing Model

The Eland SYS-2 Firewall/VPN is a network security appliance with a built-in firewall, Anti-Spam and Anti-Virus protection, web content filtering and a Virtual Private Network gateway to secure your internal network.

Modified
Eland SYS-2 Firewall/VPN
SonicWall, Inc.
Commercial
Pricing Model

SonicWall Email Security is ideal for organizations that need a dedicated on-premises solution. SonicWall’s solution can be deployed as a hardened physical appliance, robust virtual appliance or software application. The multi-layered solution provides co ...

Category Appliances
Modified
Email Security
eScan Enterprise Security
Commercial
Pricing Model

eScan Corporate Edition is a comprehensive security solution for your corporate network. The new and improved eScan Corporate Edition (with Hybrid Network Support) safeguards your corporate network from all kinds of cyber threats. As Informatio ...

Category Enterprise
Modified
eScan Corporate Edition
Open Field Software
Freeware
Pricing Model

Whether you're a business or home user, you can take control of your email and stop spam with the world's best spam filter - Ella for Spam Control. Ella is more than just spam filter software; it keeps important email in your inbox, moves your electronic ...

Modified
Ella for Spam Control
J.A. Korsmeyer, Inc.
Commercial
Pricing Model

EMP Cloud substantially expands the former EMP on-premise feature set. Also, it will protect both on-premise email servers, as well as cloud based services such as Office 365 and Gmail.

Modified
Extensible Messaging Platform

The worlds security professionals converge to discuss new technology, and share best practices. The most significant new discoveries, technologies, and products will be presented at the annual EUSecWest conference, brought to you by the organizers of PacS ...

ModifiedNever
Commercial
Pricing Model

The theme of the conference is the protection of computer networks. The conference will draw participants from academia and industry in Europe and beyond to discuss hot topics in applied network and systems security. Topics include but are not limited to ...

Modified
InfoSec Institute
Commercial
Pricing Model

Discover vulnerabilities before cybercriminals do! Our most popular information security and hacking training goes in-depth into the techniques used by malicious actors with attention-getting lectures and hands-on labs. Earn your CEH and PenTest+, guaran ...

Category Ethical Hacking
Modified
Ethical Hacking Dual Certification Boot Camp (CEH and PenTest+)
cwnp (Certified Wireless Network Professional)
Commercial
Pricing Model

The Wireless LAN Security course consists of hands on learning using the latest enterprise wireless LAN security and auditing equipment. This course addresses in detail the most up-to-date WLAN intrusion and DoS tools and techniques, functionality of the ...

Modified