Skip to main content

List Categories and Listings by F

INVEA-TECH a.s.

The FlowMon solution delivers the flow-based (NetFlow/IPFIX) monitoring for all organizations and all networks from 10 Mbps to 10 Gbps. It provides the statistics necessary for network monitoring, security, troubleshooting, IP accounting and billing, capa ...

FlowMon
Thomasez@zelow.no

floppyfw is a router with the advanced firewall-capabilities in Linux that fits on one single floppy disc.

One-way data transfer with optical isolation for uncompromising network security & protection Create boundaries between trusted & untrusted networks by creating a physically secure one-way communication channel. Send data from one secure network ...

Category Data Diodes
Forcepoint Data Diode
Middlesex University

3 years Full Time

FortiGate Next-Generation Firewalls deliver enterprise security at any scale with full visibility and threat protection. Organisations can weave security into the hybrid IT architecture and build security-driven networks to achieve: Ultra-fast security ...

FortiGate Next-Generation Firewall
FortiNet Inc.

FortiWeb, Fortinet’s Web Application Firewall, protects your business-critical web applications from attacks that target known and unknown vulnerabilities. FortiWeb WAFs provide advanced features that defend your web applications and APIs from known and ...

Category WAF - Appliances
FortiWeb

FlowNBA is a complete solution for network monitoring based on NetFlow/IPFIX. Thanks to the used technology it enables complete overview of the network traffic, detailed information about all communications and provides information about who communicates ...

GetData Forensics

Forensic Explorer analysis software. Suitable for new or experienced investigators, Forensic Explorer combines a flexible and easy to use GUI with advanced sort, filter, keyword search, data recovery and script technology. Quickly process large volumes o ...

Category Forensic Tools
Forensic Explorer

Forcepoint’s Advanced Classification Engine (ACE) delivers optimized threat defenses through deep content inspection of traffic, which is performed in real time. ACE’s eight defense assessment areas enable Forcepoint solutions to protect against emerging ...

Forecepoint Advanced Classification Engine (ACE)

Every second of the day, the Forcepoint ThreatSeeker Intelligence scours the vast expanse of online content for potential threats. It’s up to the task. It receives global input from over 155 countries and, working in parallel with Forcepoint ACE, analyzes ...

F-Response is a vendor neutral, patented software utility that enables an investigator to conduct live forensics, Data Recovery, and eDiscovery over an IP network using their tool(s) of choice. F-Response is not another analysis tool. F-Response is a util ...

Category Remote Forensics
F-Response Enterprise
Middlesex University

4 years Full Time

Birmingham City University

4 years Full Time / 5 years Full Time

Bournemouth University

4 years Sandwich Course

Manchester Metropolitan University

4 years Full Time / 5 years Sandwich Course

Canterbury Christ Church University

4 years Full Time

Staffordshire University

3 years Full Time / 4 years Sandwich Course

Staffordshire University

2 years Full Time

University of Wales, Newport

3 years Full Time

File integrity monitoring (FIM) protects sensitive information from theft, loss, and malware.  Included as part of the Security Event Manager software suite.

File Integrity Monitoring Software