List Categories and Listings by I

Computers are now available anytime, anywhere, by different means, and distributed unobtrusively throughout the everyday environments in which physical objects/artifacts embedded with invisible computers are sensible and networked locally and globally. Su ...

ModifiedNever

The State Key Laboratory of Information Security (SKLOIS) of China is one of the largest research groups in China in the area of Information Security and Cryptology. The SKLOIS conference on information security and cryptology (Inscrypt, formerly CISC) wi ...

VendorSKLOIS
Pricing ModelCommercial
Modified

In order to advance the fields of IT-Incident Management and Forensics the special interest-group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) organises an annual conference, bringing together experts from thr ...

VendorGerman Informatics Society
Pricing ModelCommercial
Modified

Packet Analysis and Intrusion Detection 5 Day You'll learn how to properly read and interpret packets and packet headers including IP, TCP, ICMP, and UDP. You will learn how to distinguish between normal, abnormal, and malicious traffic. You will also c ...

VendorSP Hailey Enterprises
ModifiedNever

The Intrusion Prevention training offered by InfoSec Institute covers all areas of intrusion prevention. Host Intrusion Prevention and Network Intrusion Prevention are covered in great detail. You will learn the technical details that make Intrusion Preve ...

VendorInfoSec Institute
ModifiedNever

In order to protect computer systems against hacker attacks, various firewalls are used today. Doubtlessly, firewalls increase IT security. However, firewalls cannot ward off all attacks. They are useless against attacks initiated from within the network ...

VendorROMAN - Consulting & Engineering AG
ModifiedNever

Computer Forensics Core Competencies 5day This computer forensics training is meant for those without any previous experience with computer forensics. The student will be introduced to concepts and techniques that every computer forensics practitioner mu ...

VendorSP Hailey Enterprises
ModifiedNever

Iris utilizes and integrates the following advanced features and functionalities: Packet reconstruction Packet manipulation/forging Filter by Protocol Layer, keywords, MAC and IP address, TCP/UDP port, packets size and custom data Log network-wide foreign ...

ModifiedNever

Managing today's large, high-speed networks brings unique challenges, combining the problems of managing L2 switched networks with the complexity of routing and BGP peering. In order to provide cost-effective, uninterrupted, high-performance network servi ...

VendorInMon
Pricing ModelCommercial
ModifiedNever
VendorInmon Corp.
Pricing ModelCommercial
ModifiedNever

Working as an ISAPI filter, this products is a pure LOGGER, which can provide very extended and verbous information about the requests made to an IIS web server. This includes logging requests for those nasty exploits which in normal conditions would leav ...

Category Host IDS
VendorAdiscon
Pricing ModelCOMMERCIAL
Modified

integrit is an alternative to file integrity verification programs like tripwire and aide. It helps you determine whether an intruder has modified a computer system. Without a system like integrit, a sysadmin can't know whether the tools he/she uses to in ...

Vendor*nix
Pricing ModelFreeware
Modified
iPrism Web Filter

iPrism Web Filter from St. Bernard, now with antivirus, is the award-winning Internet filtering solution that secures your organization from Internet-based threats such as malware, spyware, IM, P2P, and inappropriate content, at the perimeter, while it he ...

Category Uncategorised
VendorSt. Bernard
Pricing ModelCommercial
Modified
InterScan Web Security Suite

Dynamically defend against web-based attacks with multi-layer, multi-threat protection at the Internet gateway. InterScan Web Security Suite leverages both local and in-the-cloud security information to protect HTTP and FTP traffic. Award-winning antiviru ...

Category Guards Web
VendorTrend Micro
Pricing ModelCommercial
Modified
Internet Filter if2k

If2k-Only V2.3.0    Security matters ! Lockout adware, spyware, unauthorized downloads, viruses, p2p activity, pornography, legal liabilities -lockout everything except what you determine you want ! The future of your business will depend upon ...

Category Uncategorised
VendorTurner and Sons Productions Inc.
Pricing ModelCommercial
Modified

IBM Security Server Protection offers multilayered protection against known and unknown threats and supports a broad range of operating systems. It helps provides host protection against data breaches and offers tracking and reporting to ease meeting regu ...

Category Host IPS
VendorIBM
Pricing ModelCommercial
Modified
InterScan Messaging Security Suite

Win the battle against email threats with Trend Micro’s InterScan Messaging Security Suite. It protects your network by integrating award-winning antivirus with zero-day protection, powerful anti-spam, and anti-phishing along with content filtering for co ...

Category Guards Mail
VendorTrend Micro
Pricing ModelCommercial
Modified

Winfrasoft IAG Appliance solution running IAG 2007 (Microsoft Forefront Edge Security and Access) provides mobile and remote workers an easy to use method of accessing corporate resources from any location, using a variety of end-point devices such kiosks ...

Category VPN Servers
VendorWinfrasoft
Pricing ModelCommercial
Modified

IBM Tivoli Access Manager for e-business is a hub for authentication and authorization for Web and other applications, centralizes security management and makes it easy and more cost effective to deploy secure applications. Enables flexible SSO to ...

VendorIBM
Pricing ModelCommercial
Modified

Easily automate lifecycle management of user roles, identities and access rights This user provisioning and role management software is a secure, automated and policy-based solution for managing user roles, identities and access rights that span hetero ...

VendorIBM
Pricing ModelCommercial
Modified

© Computer Network Defence Limited 2021