List Categories and Listings by E

Open Field Software
Freeware
Pricing Model

Whether you're a business or home user, you can take control of your email and stop spam with the world's best spam filter - Ella for Spam Control. Ella is more than just spam filter software; it keeps important email in your inbox, moves your electronic ...

Modified
Ella for Spam Control
SafeNet, Inc.
Commercial
Pricing Model

eSafe’s Mail Security Gateway uses a dual anti-spam engine with real-time reputation and deep content analysis to block spam and virus outbreaks with more than 99% detection rate. It also includes a user self managed spam quarantine. Dual anti-virus en ...

Modified
J.A. Korsmeyer, Inc.
Commercial
Pricing Model

Protect Microsoft Exchange Server, Lotus Domino and Sendmail from spam, viruses, phishing / fraud attacks and other objectionable email content. Position Extensible Messaging Platform between Microsoft Exchange Server or Domino or GroupWise, and the Inter ...

Modified

The worlds security professionals converge to discuss new technology, and share best practices. The most significant new discoveries, technologies, and products will be presented at the annual EUSecWest conference, brought to you by the organizers of PacS ...

ModifiedNever
Commercial
Pricing Model

The theme of the conference is the protection of computer networks. The conference will draw participants from academia and industry in Europe and beyond to discuss hot topics in applied network and systems security. Topics include but are not limited to ...

Modified
Net-Security Training
Commercial
Pricing Model

Hacking involves creativity and thinking 'out-of-the-box', then vulnerability testing and security audits will not ensure the security proofing of an organization. To ensure that organisations have adequately protected their information assets, they must ...

Category Ethical Hacking
Modified
InfoSec Institute

Our most popular information security training course goes in-depth into the techniques used by malicious, black hat hackers with attention getting lectures and hands-on lab exercises. While these hacking skills can be used for malicious purposes, Ethical ...

Category Ethical Hacking
ModifiedNever
cwnp (Certified Wireless Network Professional)
Commercial
Pricing Model

The Wireless LAN Security course consists of hands on learning using the latest enterprise wireless LAN security and auditing equipment. This course addresses in detail the most up-to-date WLAN intrusion and DoS tools and techniques, functionality of the ...

Modified

This protocol analyser will Organize captured packets in a connection-oriented view. Capture IP packets on your LAN with nearly no packets losing. Its real-time analyzer enables on-the-fly content viewing while capturing and analyzing, parse and decode an ...

ModifiedNever

Etherscan Analyzer is an advanced network traffic and protocol analyzer, which works in all Windows-based operating systems. With Etherscan, you can capture and analyze all packets transmitted in your segment of the local network. Etherscan decodes all m ...

ModifiedNever
Enterasys Networks
Commercial
Pricing Model

Enterasys switches & routers export to NetFlow

Modified
Extreme Networks
Commercial
Pricing Model

Exports to NetFlow Exports to SFlow

Modified
SRI International
Freeware
Pricing Model

EMERALD's eXpert-BSM Monitor is a host-based intrusion detection system that provides realtime security monitoring for critical application servers and workstations. eXpert-BSM provides comprehensive knowledge-base for detecting insider misuse, policy vio ...

Category Host IDS
Modified
Commercial
Pricing Model

Packed with 49 powerful tools, Engineer’s Toolset delivers the network management, monitoring, and troubleshooting tools you need to easily and effectively manage your infrastructure – all in one extremely affordable package. The toolset includes the SNM ...

Category Network Scanners
Modified
WaveFront Consulting Group
Commercial
Pricing Model

"This four-day course is based on Sun Tzu's principle that knowing one's enemy will strengthen one's defenses and more adequately prepare one for battle. It is better for us to find the vulnerabilities in our systems ourselves and fix them, before th ...

Category Ethical Hacking
Modified
Wave Systems Corp.
Commercial
Pricing Model

Wave Systems' EMBASSY Trust Suite (ETS) delivers advanced levels of security to the client PC using the TPM security chip found on most enterprise PCs today. ETS 6 features a variety of secure business productivity capabilities with an easy-to-use securit ...

Modified
Commercial
Pricing Model

The ViaSat Eclypt® Core encrypted internal hard drive protects data-at-rest in commercial-off-the-shelf (COTS) laptop and desktop computers. During high-risk operations, this self-encrypting hard drive protects your valuable data on manned and unmanned mo ...

Modified
Tryten Technologies, Inc.
Commercial
Pricing Model

Encryption Plus Hard Disk is vital in protecting sensitive data. While Windows provides minimal security protection to prevent unauthorized logins, password cracking tools such as lopht crack can break through a Windows password in hours or even minutes. ...

ModifiedNever
Commercial
Pricing Model

The Enterprise Intrusion Analysis course provides students with the skills needed to discover and analyze enterprise intrusions in a UNIX environment. Upon completion of this course, students should be able to: * 1. Detect an enterprise system i ...

Modified
Enterasys Networks
Commercial
Pricing Model

Enterasys® Network Access Control is a complete standards-based, multi-vendor interoperable pre-connect and post-connect Network Access Control solution. Using Enterasys NAC Controller and/or NAC Gateway appliances with NetSight® NAC Manager configuration ...

ModifiedNever

© Computer Network Defence Limited 2021