List Categories and Listings by H

Commercial
Pricing Model

HP's Host Intrusion Detection System (HIDS) alerts you about hackers who have reached the HP-UX 11i operating environment and are about to do harm in the places most critical to your computing environment―the operating system and applications. Host int ...

Category Host IDS
Modified

Formerly SPI Dynamics HP WebInspect performs web application security testing and assessment for today's complex web applications, built on emerging Web 2.0 technologies. HP WebInspect delivers fast scanning capabilities, broad security assessment covera ...

Category Website Scanners
Modified
HP WebInspect
Halon Security
Limited Free Trial
Pricing Model

Spam Prevention, Done Right The SPG and VSP block spam, not mail. Stop wasting time searching the spam folder. Further, the outbound mode helps you stay off blacklists, by scanning the clients mail for spam and viruses.

Modified
Halon Virtual Spam Prevention
Halon Security
Commercial
Pricing Model

Halon SX-200 is the security gateway to support mission-critical operation. High capacity, flexibility, functionality and manageability to be the core in complex, demanding networks. Serving as DDoS protective firewall, OSPF/BGP router, multiple ISP uplin ...

Modified
Halon SX-200
Hitachi Software Engineering, Ltd.
Commercial
Pricing Model

Controlling sensitive information flow begins with a well-thought-out total security plan — a corporate scheme that sticks to compliance issues, ties in clear policy directives and ends with thorough end-user training. HIBUN Advance Edition (HIBUN AE), th ...

ModifiedNever
Commercial
Pricing Model

Hexamail Guard acts as a sentinel for your incoming and outgoing mail. By analyzing each mail received and sent by your organization it intelligently alerts, routes, blocks and audits all email traffic. Features include: Anti-Spam, AntiVirus, Trojan a ...

Modified
Hexamail Guard
Freeware
Pricing Model

Free SSL Sniffer We have decided to release a very straightforward free HTTP and HTTPS sniffer (SSL sniffer) for Internet Explorer (versions 6.0 and 7.0) and Mozilla Firefox, in order to demonstrate the abilities of our SSL redirector SDK platfor ...

Modified
Jason Bittel
Open Source
Pricing Model

httpry is a specialized packet sniffer designed for displaying and logging HTTP traffic. It is not intended to perform analysis itself, but to capture, parse, and log the traffic for later analysis. It can be run in real-time displaying the traffic as it ...

Modified

In this industry standard training on penetration testing, students will learn step-by-step procedures for executing Internet, intranet, and host-level attacks. Tranchulas Hands-on Penetration Testing is the definitive training regimen for developing coun ...

Category Ethical Hacking
ModifiedNever

This training course is a series of educational interactive training sessions where the attendees will gain hands-on experience. They will be able to identify security flaws in web applications customised or built for the training course. They will also b ...

Modified
Hitachi ID Systems, Inc.
Commercial
Pricing Model

Hitachi ID Password Manager (formerly P-Synch) is an enterprise solution for managing passwords and other authentication factors. It improves the security of passwords and related IT support processes, reduces the cost of user support and improves ...

Modified
Hitachi ID Password Manager
Hitachi ID Systems, Inc.
Commercial
Pricing Model

Hitachi ID Identity Manager is a complete identity management solution that automates and simplifies the tasks of managing users and entitlements across multiple systems and applications throughout the user lifecycle. Organizations depend on Identi ...

Modified
Hitachi ID Identity Manager
Hitachi ID Systems, Inc.
Commercial
Pricing Model

Hitachi ID Privileged Access Manager is a system for securing access to privileged accounts. It works by regularly randomizing privileged passwords on workstations, servers, network devices and applications. Random passwords are encrypted and store ...

Modified
Hitachi ID Privileged Access Manager
Hitachi ID Systems, Inc.
Commercial
Pricing Model

Hitachi ID Group Manager is a self-service group management solution. It allows users to request access to resources such as shares and folders, rather than requesting access to groups. Group Manager automatically maps requests to the appropriate ...

Modified
Hitachi ID Group Manager
HackerTarget.com LLC

HackerTarget.com provides free security scans for websites.  You can purchase a Scan Membership, which then removes the scan limits per day. They provide scans using known, Open Source tools, including: * Nmap Port Scan * Nikto Web Scan * OpenVas ...

ModifiedNever

Helix3 Enterprise is acyber security solution integrated into your network giving you visibility across your entire infrastructure revealing malicious activities such as Internet abuse, data sharing and harassment. H3E also allows you to isolate and respo ...

Category Remote Forensics
ModifiedNever
Outpost24 AB
Commercial
Pricing Model

HIAB is a plug and play appliance that enables organizations to assess and manage internal vulnerability. Installed inside the network, HIAB is able to perform a wide view and successfully identify and manage vulnerabilities on all servers, workstations a ...

Modified
HIAB
Commercial
Pricing Model

Huntsman® is an intelligent SIEM solution (Security Information & Event Management) that consolidates IT system information from all assets into a high integrity repository suitable for real time analysis, remediation and compliance reporting.   Using rea ...

Modified
Huntsman
Commercial
Pricing Model

  A multi-platform LIVE side for three environments; Mac OS X, Windows and Linux with one simple to use interface Make forensic images of all internal devices Make a forensic image of physical memory (32 and 64 bit) Determine if disk level en ...

Category Forensic Tools
Modified
Helix3 Pro
Arkoon Network Security
Open Source
Pricing Model

Hakabana is an open source monitoring tool, which visiualises network traffic using Haka and Kibana. It leverages on the Haka framework to capture packets, dissect them  and extract various pieces of information from the network, such as; bandwidth, ...

Modified
Hakabana

© Computer Network Defence Limited 2021