Skip to main content

List Categories and Listings by I

AppSense Environment Manager provides consistent and contextual user environments across multiple application delivery mechanisms. With AppSense Environment Manager, IT can manage user profiles with minimal maintenance as well as provide users with some l ...

Ivanti Environment Manager

Intercept X Endpoint Features Endpoint Detection and Response (EDR)Automatically detect and prioritize potential threats and quickly see where to focus attention and know which machines may be impacted Extended Detection and Response (XDR)Go beyond the ...

Intercept X Endpoint

With the widest, most comprehensive range of message interception, handling and monitoring options, M-Switch Anti-Spam is your best defence against spam. A flexible server-based solution that defeats spam before it reaches the user's desktop, M-Switch An ...

ISACA (Information Systems Audit and Control Association and Foundation), a recognized global leader in IT governance, control and assurance, is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in ...

Win the battle against email threats with Trend Micro’s InterScan Messaging Security Suite. It protects your network by integrating award-winning antivirus with zero-day protection, powerful anti-spam, and anti-phishing along with content filtering for co ...

Category Guards Mail
InterScan Messaging Security Suite

For many years, Information Hiding has captured the imagination of researchers. Digital watermarking and steganography tools are used to address digital rights management, protect information, and conceal secrets. From an investigators perspective, inform ...

Information assurance and security has become an important research issue in networked and distributed information sharing environments. Finding effective ways to protect information systems, networks and sensitive data within the critical information inf ...

Computers are now available anytime, anywhere, by different means, and distributed unobtrusively throughout the everyday environments in which physical objects/artifacts embedded with invisible computers are sensible and networked locally and globally. Su ...

The State Key Laboratory of Information Security (SKLOIS) of China is one of the largest research groups in China in the area of Information Security and Cryptology. The SKLOIS conference on information security and cryptology (Inscrypt, formerly CISC) wi ...

German Informatics Society

In order to advance the fields of IT-Incident Management and Forensics the special interest-group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) organises an annual conference, bringing together experts from thr ...

SP Hailey Enterprises

Packet Analysis and Intrusion Detection 5 Day You'll learn how to properly read and interpret packets and packet headers including IP, TCP, ICMP, and UDP. You will learn how to distinguish between normal, abnormal, and malicious traffic. You will also c ...

InfoSec Institute

The Intrusion Prevention training offered by InfoSec Institute covers all areas of intrusion prevention. Host Intrusion Prevention and Network Intrusion Prevention are covered in great detail. You will learn the technical details that make Intrusion Preve ...

ROMAN - Consulting & Engineering AG

In order to protect computer systems against hacker attacks, various firewalls are used today. Doubtlessly, firewalls increase IT security. However, firewalls cannot ward off all attacks. They are useless against attacks initiated from within the network ...

SP Hailey Enterprises

Computer Forensics Core Competencies 5day This computer forensics training is meant for those without any previous experience with computer forensics. The student will be introduced to concepts and techniques that every computer forensics practitioner mu ...

Exports to SFlow

CheckPoint Software Technologies, Ltd.

Check Point IPS-1 is a dedicated intrusion detection and prevention system (IDS/IPS) that helps organizations secure their enterprise network, and protect servers and critical data against known and unknown worms, automated malware, and blended threats. ...

Category IPS Network
Turner and Sons Productions Inc.

If2k-Only V2.3.0    Security matters ! Lockout adware, spyware, unauthorized downloads, viruses, p2p activity, pornography, legal liabilities -lockout everything except what you determine you want ! The future of your business will depend upon ...

Category Uncategorised
Internet Filter if2k