List Categories and Listings by L

This course focuses on network security and makes an excellent companion to: Enterprise Linux Security Administration (QLG55) After a detailed discussion of the TCP/IP suite component protocols and Ethernet operation, practice using various tools to ca ...

VendorIBM Corporation
ModifiedNever

A kernel patch and admin tool to enhance the linux kernel security, with implementation of reference monitor in kernel and Mandatory Access Control in the kernel. It provides Protection of files, Protection of process, Fine-granulate Access Controls, use ...

Category Host IDS
Vendorhttp://www.lids.org/?q=node/5
Pricing ModelOpen Source
Modified

Logsurfer is a program for monitoring system logs in real-time, and reporting on the occurrence of events. It is similar to the well-known swatch program on which it is based, but offers a number of advanced features which swatch does not support. Logsur ...

Category Host IDS
VendorKerry Thompson
Pricing ModelFreeware
Modified
LanHelper

LanHelper is an advanced remote administration tool for Windows servers and workstations, which integrates NT administration utilities, LAN monitoring, network scanning and network analyzing features. Owing to the optimized user interface, LanHelper allow ...

VendorHainsoft
Pricing ModelCommercial
Modified

Learn how to set up and administer a Linux(TM)-based firewall.

VendorIBM Corporation
Pricing ModelCommercial
ModifiedNever

This fast-paced, hands-on class will teach you how to secure UNIX and lock down Linux to protect a system from compromise. You'll learn how the attacks work and how to use hard-core hardening to defeat the bulk of them. You'll learn how to take your machi ...

VendorSecurity University
Pricing ModelCommercial
ModifiedNever
LinkAlyzer

LinkAlyzer LinkAlyzer is a forensic tool that decodes and displays the content of multiple link files (Windows Shortcuts) at the same time. LinkAlyzer Loads multiple (tested on 40,000+) link files into a grid and Displays : • Internal dates (whe ...

Category Forensic Tools
VendorSanderson Forensics Ltd.
Pricing ModelCommercial
ModifiedNever

log2timeline is a framework for automatic creation of a super timeline. The main purpose is to provide a single tool to parse various log files and artifacts found on suspect systems (and supporting systems, such as network equipment) and produce a timeli ...

Category Forensic Tools
VendorKristinn Gudjonsson
Pricing ModelFreeware
ModifiedNever
Lan-Secure Security Center

Security Center network access protection software designed to provide real-time network security monitor for intrusion detection IDS and prevention IPS that helps to protect networks from being vulnerable to unauthorized network connections, malicious ne ...

Category IPS Network
VendorLan-Secure Company
Pricing ModelCommercial
Modified

A web application penetration testing tool that can extract data from SQL Server, MySQL, DB2, Oracle, Sybase, Informix, and Postgres. Further, it can crawl a website as a vulnerability scanner looking for sql injection vulnerabilities.   Features ...

Category Website Scanners
Vendorashamanboyd
Pricing ModelFreeware
ModifiedNever
LAVA - Live Attack Visualization & Analysis

LAVA is a centralized security application that works in conjunction with Bromium's vSentry software installed at endpoints throughout the organization. LAVA gathers information from each vSentry endpoint - even mobile laptops not connected to the corpora ...

Category Enterprise
VendorBromium
Pricing ModelCommercial
Modified
Lucent Sky CLEAR

Application vulnerability mitigation is the next wave of cybersecurity. By analyzing source code, AVM systems are able to scan for, identify, and automatically mitigate application vulnerabilities. This process dramatically increases the security threshol ...

VendorLucent Sky
Pricing ModelCommercial
Modified
LAPSE+: The Security Scanner for Java EE Applications

LAPSE+ is a security scanner for detecting vulnerabilities of untrusted data injection in Java EE Applications. It has been developed as a plugin for Eclipse Java Development Environment, working specifically with Eclipse Helios and Java 1.6 or higher. L ...

VendorOWASP
Pricing ModelOpen Source
Modified
LastPass Free

Save as You Go: Download and setup with LastPass in minutes. Once you've created your account, LastPass prompts you to save new sites as you browse - so you'll never lose another password. Hassle-Free Login: After saving a website's username and passwo ...

VendorLastPass
Pricing ModelFreeware
Modified
LUCY

The LUCY Social Engineering Suite and Malware Testing Suite (or CYBERSECURITY CRASH TEST DUMMY) facilitate multiple application areas. They can be used for: – People testing and education – Technology assessments – An inoffensive penetration test sho ...

VendorLucy Phishing GmbH
Pricing ModelCommercial
Modified
Tags
LogRhythm Threat Lifecycle Management

The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. The capabilities include Security Intelligence, SIEM, Security Analytics, Log Management, Network Monitoring and Forensics & Endpoint Monitoring. It b ...

VendorLogRhythm
Pricing ModelCommercial
Modified
LogRhythm Network Monitoring and Forensics

Evidence of intruders and insider threats lies within network communications. Detect network-based threats with real-time network monitoring and big data analytics. Expedite investigations by giving your incident responders access to rich network forensic ...

VendorLogRhythm
Pricing ModelCommercial
Modified
LogRhythm Network Monitor Freemium

Transform your physical or virtual system into a network forensics sensor with extensive corresponding metadata, full packet capture, and customizable advanced correlation. With Network Monitor Freemium, you’ll quickly identify emerging threats on your n ...

VendorLogRhythm
Pricing ModelFreeware
Modified

Lumension Endpoint Management and Security Suite provides the functions of IT operations and security through a single console, server and agent architecture to more effectively address IT risk and systems management requirements across the enterprise. Lu ...

VendorLumension Security, Inc.
Pricing ModelCommercial
Modified

© Computer Network Defence Limited 2020