List Categories and Listings by L

IBM Corporation

This course focuses on network security and makes an excellent companion to: Enterprise Linux Security Administration (QLG55) After a detailed discussion of the TCP/IP suite component protocols and Ethernet operation, practice using various tools to ca ...

ModifiedNever
Open Source
Pricing Model

A kernel patch and admin tool to enhance the linux kernel security, with implementation of reference monitor in kernel and Mandatory Access Control in the kernel. It provides Protection of files, Protection of process, Fine-granulate Access Controls, use ...

Category Host IDS
Modified
Kerry Thompson
Freeware
Pricing Model

Logsurfer is a program for monitoring system logs in real-time, and reporting on the occurrence of events. It is similar to the well-known swatch program on which it is based, but offers a number of advanced features which swatch does not support. Logsur ...

Category Host IDS
Modified
Commercial
Pricing Model

LanHelper is an advanced remote administration tool for Windows servers and workstations, which integrates NT administration utilities, LAN monitoring, network scanning and network analyzing features. Owing to the optimized user interface, LanHelper allow ...

Modified
LanHelper
IBM Corporation
Commercial
Pricing Model

Learn how to set up and administer a Linux(TM)-based firewall.

ModifiedNever
Security University
Commercial
Pricing Model

This fast-paced, hands-on class will teach you how to secure UNIX and lock down Linux to protect a system from compromise. You'll learn how the attacks work and how to use hard-core hardening to defeat the bulk of them. You'll learn how to take your machi ...

ModifiedNever
Sanderson Forensics Ltd.
Commercial
Pricing Model

LinkAlyzer LinkAlyzer is a forensic tool that decodes and displays the content of multiple link files (Windows Shortcuts) at the same time. LinkAlyzer Loads multiple (tested on 40,000+) link files into a grid and Displays : • Internal dates (whe ...

Category Forensic Tools
ModifiedNever
LinkAlyzer
Kristinn Gudjonsson

log2timeline is a framework for automatic creation of a super timeline. The main purpose is to provide a single tool to parse various log files and artifacts found on suspect systems (and supporting systems, such as network equipment) and produce a timeli ...

Category Forensic Tools
ModifiedNever
Lan-Secure Company
Commercial
Pricing Model

Security Center network access protection software designed to provide real-time network security monitor for intrusion detection IDS and prevention IPS that helps to protect networks from being vulnerable to unauthorized network connections, malicious ne ...

Category IPS Network
Modified
Lan-Secure Security Center

A web application penetration testing tool that can extract data from SQL Server, MySQL, DB2, Oracle, Sybase, Informix, and Postgres. Further, it can crawl a website as a vulnerability scanner looking for sql injection vulnerabilities.   Features ...

Category Website Scanners
ModifiedNever
Commercial
Pricing Model

LAVA is a centralized security application that works in conjunction with Bromium's vSentry software installed at endpoints throughout the organization. LAVA gathers information from each vSentry endpoint - even mobile laptops not connected to the corpora ...

Category Enterprise
Modified
LAVA - Live Attack Visualization & Analysis

Application vulnerability mitigation is the next wave of cybersecurity. By analyzing source code, AVM systems are able to scan for, identify, and automatically mitigate application vulnerabilities. This process dramatically increases the security threshol ...

Modified
Lucent Sky CLEAR
Freeware
Pricing Model

Save as You Go: Download and setup with LastPass in minutes. Once you've created your account, LastPass prompts you to save new sites as you browse - so you'll never lose another password. Hassle-Free Login: After saving a website's username and passwo ...

Modified
LastPass Free
Lucy Phishing GmbH
Commercial
Pricing Model

The LUCY Social Engineering Suite and Malware Testing Suite (or CYBERSECURITY CRASH TEST DUMMY) facilitate multiple application areas. They can be used for: – People testing and education – Technology assessments – An inoffensive penetration test sho ...

Modified
LUCY

The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. The capabilities include Security Intelligence, SIEM, Security Analytics, Log Management, Network Monitoring and Forensics & Endpoint Monitoring. It b ...

Modified
LogRhythm Threat Lifecycle Management

Evidence of intruders and insider threats lies within network communications. Detect network-based threats with real-time network monitoring and big data analytics. Expedite investigations by giving your incident responders access to rich network forensic ...

Modified
LogRhythm Network Monitoring and Forensics

Transform your physical or virtual system into a network forensics sensor with extensive corresponding metadata, full packet capture, and customizable advanced correlation. With Network Monitor Freemium, you’ll quickly identify emerging threats on your n ...

Modified
LogRhythm Network Monitor Freemium
Lumension Security, Inc.
Commercial
Pricing Model

Lumension Endpoint Management and Security Suite provides the functions of IT operations and security through a single console, server and agent architecture to more effectively address IT risk and systems management requirements across the enterprise. Lu ...

Modified

© Computer Network Defence Limited 2021