List Categories and Listings by I

netfilter.org
Commercial
Pricing Model

iptables is a generic table structure for the definition of rulesets. Each rule within an IP table consists of a number of classifiers (iptables matches) and one connected action (iptables target).

Modified
Iptables

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

ModifiedNever
Commercial
Pricing Model

This hands-on track offers a practical working knowledge in intrusion detection and traffic analysis, taught by top practitioners/authors in the field. This is the most advanced program in network intrusion detection that has ever been taught. All of the ...

Modified
CheckPoint Software Technologies, Ltd.
Commercial
Pricing Model

Check Point IPS-1 is a dedicated intrusion detection and prevention system (IDS/IPS) that helps organizations secure their enterprise network, and protect servers and critical data against known and unknown worms, automated malware, and blended threats. ...

Category IPS Network
Modified
Bitwise Works GmbH
Commercial
Pricing Model

This multi-purpose Firewall readies you for the future through Deep Packet Inspection, unique multi-platform support, and market-leading IPSec VPN support. Its unparalleled network monitoring turns you into an security professional with unique real-time i ...

Modified
InJoy Firewall
bww bitwise works
Commercial
Pricing Model

Complete "Deep Packet Inspection" Security Provides unprecedented broad-scoped security and enables the network administrator to effortlessly eliminate (D)DoS attacks, trojans, worms, SYN floods, ICMP floods, port-scanning, e-borne viruses, executable e-m ...

Modified
InJoy Firewall
Freeware
Pricing Model

PFilter is a software package that can be used to provide network address translation (NAT) or firewall services. To use, it can either be used as a loadable kernel module or incorporated into your UNIX kernel; use as a loadable kernel module where possib ...

Modified
F/X Communications
Commercial
Pricing Model

Transparent, standards-based cross-platform unified IPSec technology, extends the InJoy Firewall? with capability of building VPN's and secure channels ? allowing corporations to deploy it either as a VPN Gateway or as a secure VPN Client.

Category VPN Servers
Modified
Innominate Security Technology AG
Commercial
Pricing Model

The Innominate mGuard products offer extensive security functions such as VPNs (Virtual Private Networks), firewall and optional virus protection (powered by Kaspersky) ? regardless of the computer platform used. With the Innominate Security Configuration ...

Category VPN Servers
Modified
Trispen Technologies
Commercial
Pricing Model

IP-Granite is capable of securing all your information travelling over the Intranet or the Internet. Making use of the widely respected IPSec protocol, IP-Granite authenticates users, servers and gateways to one another, encrypting all communication flowi ...

Category VPN Servers
Modified
Commercial
Pricing Model

The Ingate SIParator / Firewall SBC RTS-FW The Ingate SIParator is a powerful, flexible and cost-effective Enterprise Session Border Controller (E-SBC) for SIP connectivity, security and interoperability, such as connecting PBXs and Unified Communication ...

Modified
Ingate SIParator / Firewall
Commercial
Pricing Model

east-tec InvisibleSecrets is a steganography and file encryption software that allows you to encrypt file and folder structures that contain confidential data and hide files, making it completely invisible to any user. Other useful features include: Powe ...

Modified
Commercial
Pricing Model

IDA Pro as a disassembler is capable of creating maps of their execution to show the binary instructions that are actually executed by the processor in a symbolic representation (assembly language). Advanced techniques have been implemented into IDA Pro s ...

Category Forensic Tools
Modified
IDA Pro Disassembler
Commercial
Pricing Model

AppSense Environment Manager provides consistent and contextual user environments across multiple application delivery mechanisms. With AppSense Environment Manager, IT can manage user profiles with minimal maintenance as well as provide users with some l ...

Modified
Ivanti Environment Manager
Commercial
Pricing Model

Intercept X Endpoint Features Endpoint Detection and Response (EDR)Automatically detect and prioritize potential threats and quickly see where to focus attention and know which machines may be impacted Extended Detection and Response (XDR)Go beyond the ...

Modified
Intercept X Endpoint
Commercial
Pricing Model

With the widest, most comprehensive range of message interception, handling and monitoring options, M-Switch Anti-Spam is your best defence against spam. A flexible server-based solution that defeats spam before it reaches the user's desktop, M-Switch An ...

Modified
Commercial
Pricing Model

ISACA (Information Systems Audit and Control Association and Foundation), a recognized global leader in IT governance, control and assurance, is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in ...

Modified
Commercial
Pricing Model

The main goal of this conference is to promote research on all aspects of network security and cryptology.

Modified
Commercial
Pricing Model

For many years, Information Hiding has captured the imagination of researchers. Digital watermarking and steganography tools are used to address digital rights management, protect information, and conceal secrets. From an investigators perspective, inform ...

Modified

Information assurance and security has become an important research issue in networked and distributed information sharing environments. Finding effective ways to protect information systems, networks and sensitive data within the critical information inf ...

ModifiedNever