List Categories and Listings by M

Firetrust Ltd.
Commercial
Pricing Model

Spam messages continuously adapt in order to bypass even the newest protection methods, and that’s why in order to achieve complete efficiency the antispam tools should also be in a continuous adapting process, learning permanently new ways to detec ...

Modified
Mailwasher Pro
Triumvirate Technologies

Mailbox Filter is the only spam filter that automatically learns to think like you -- not for you -- about your email. Unlike spam blockers, Mailbox Filter is a "SMART" spam filter so it won't lose your important email. Our exclusive Smart Filter Technolo ...

Modified
Commercial
Pricing Model

MailWasher Server is an open-source, server-side junk mail filter package for businesses. MailWasher Server differs from other open-source server anti-spam packages in that it offers a polished, well-integrated web interface and built-in quarantine manage ...

Modified
alt-n Technologies
Commercial
Pricing Model

MDaemon , Windows-based email server software, contains full mail server functionality and control with a strong emphasis on security to protect your email communication needs. Available in Standard and Professional editions, the purchase of MDaemon also ...

Modified
Commercial
Pricing Model

modusGate is an on-premise email security gateway with a sophisticated multi-layered anti-spam solution. It incorporates state of the art real-time machine learning to effectively identify threats by reputation and advanced statistical models, harnessing ...

Modified
modusGate
Commercial
Pricing Model

ModusGate is a secure email management gateway solution designed to fit seamlessly onto existing email infrastructures. Built on fourth-generation technology, ModusGate heightens email security with sophisticated management tools including a rock-solid pe ...

Modified
Commercial
Pricing Model

The must-attend press-free event for both experienced information security and audit professionals and executives.

Modified
Information Security Group, Royal Holloway, University of London

The ISG offers an advanced MSc degree as an interdisciplinary course which embraces a range of technologies such as cryptography, computer security, and fraud detection, and also includes the study of how security can best be managed. The degree is design ...

ModifiedNever
Sheffield Hallam University.
Commercial
Pricing Model

The MSc in Information Systems Security has been developed in association with the British Standards Institution (BSI), growing out of successful and popular undergraduate provision, research and developing expertise within the Communications and Networks ...

Modified
Harrow School of Computer Science, University of Westminster

This innovative and flexible course aims to equip those responsible for the development and implementation of IT security policy to:

ModifiedNever
Net-Security Training

This course is for those IT professionals who want to master network security. In our course they will learn the best practices to safe-guard their network perimeter. We offer training on using Multi-Vendor firewall products such as Zone Alarm, Smoothwall ...

ModifiedNever
PTR Associates, Ltd.

This 5-day course is aimed at IT professionals who want to further their knowledge of establishing and maintaining secure networks. Students will learn the theory and best practices of protecting the network perimeter and put their knowledge into practice ...

ModifiedNever
Systems & Network Training Ltd

A hands on training course focusing on security in the Microsoft environment. The course progresses from patch management onto the use of Microsoft security tools. Then server, desktop and network security are studied in the Microsoft environment.

Category Windows Security
ModifiedNever
PTR Associates Ltd

You will learn what the components of Microsoft SQL Server 7 are and understand what the system administrators should be doing. Find out how to get information out of SQL Server and how to interpret it. Experiment with a live SQL Server 7 network in a lab ...

Modified
Thomas Biege
Freeware
Pricing Model

The main target of M-ICE are hostbased ID Systems but it is also possible to interoperate with other IDS architectures as long as they use the open and standarized message format IDMEF. The main goal of M-ICE is to fit for every infrastructure and to be h ...

Category Host IDS
Modified
Commercial
Pricing Model

Defeat business email compromise using advanced heuristics, BEC scam analysis, sender authentication enforcement & controls, and domain intelligence to help block typo squatting and identity spoofing.Protect your brand reputation by using automation t ...

Category Enterprise
Modified
Messaging Gateway

With the explosion of smartphones in the workplace, employees have recognized and demanded support for a growing list of new ways to leverage this technology for their work. Faced with the realities of dealing with an increasingly mobile workplace, organi ...

Category Mobile Devices
Modified
Mobile Security for Enterprises
McAfee (formerly NitroSecurity)

The McAfee Application Data Monitor appliance decodes an entire application session to Layer 7, providing a full analysis of everything from the underlying protocols and session integrity all the way up to the contents of the application (such as the text ...

Category Compliance
Modified
McAfee Application Data Monitor (Formerly NitroView ADM)
McAfee (formerly NitroSecurity)

The non-intrusive design of McAfee Database Event Monitor for SIEM supports your expanding compliance auditing and reporting requirements and enhances security operations. While it monitors all database transactions, Database Event Monitor for SIEM provid ...

Category Compliance
Modified
McAfee Database Event Monitor for SIEM (Formerly NitroView DBM)

MOBILedit Forensic is a phone extractor, data analyzer and report generator all in one solution. A powerful 64-bit application using both the physical and logical data acquisition methods, MOBILedit Forensic is excellent for advanced application analyzer, ...

Category Forensic Tools
Modified
MOBILedit Forensic