List Categories and Listings by O

Open Source
Pricing Model

OSSIM provides all of the features that a security professional needs from a SIEM offering – event collection, normalization, and correlation. Established and launched by security engineers out of necessity, OSSIM was created with an understanding of the ...

Modified
OSSIM™ - Open Source SIEM
Freeware
Pricing Model

Oscanner is an Oracle assessment framework developed in Java. It has a plugin-based architecture and comes with a couple of plugins that currently do: Sid Enumeration Passwords tests (common & dictionary) Enumerate Oracle version Enumerate account ro ...

Modified
openswan.org
Open Source
Pricing Model

Openswan is an implementation of IPsec for Linux. It supports kernels 2.0, 2.2, 2.4 and 2.6, and runs on many different platforms, including x86, x86_64, ia64, MIPS and ARM.

Category VPN Servers
Modified
OpenVPN Solutions, LLC
distributed under the GPL license
Pricing Model

OpenVPN is a full-featured SSL VPN solution which can accomodate a wide range of configurations, including remote access, site-to-site VPNs, WiFi security, and enterprise-scale remote access solutions with load balancing, failover, and fine-grained access ...

Category VPN Servers
Modified
Kroll Ontrack Ltd
Commercial
Pricing Model

Ontrack PowerControls recovers individual mailboxes, messages and attachments without needing to restore the entire backup. Use the powerful search capability to rapidly find the items you need for eDiscovery and compliance. Versions for Exchange, ShareP ...

Category Forensic Tools
Modified
Ontrack PowerControls
Oleh Yuschuk
SHAREWARE
Pricing Model

OllyDbg is a 32-bit assembler level analysing debugger for Microsoft Windows. Emphasis on binary code analysis makes it particularly useful in cases where source is unavailable. OllyDbg is a shareware, but you can download and use it for free. Special hig ...

Category Forensic Tools
Modified
ISECOM - Institute for Security and Open Methodologies

The premise of the training course is to support the necessary knowledge transfer for a person to be considered a capable, resourceful, and self-sufficient security tester. The training course focuses on the technical skills necessary for security testing ...

Category Ethical Hacking
ModifiedNever
PTR Associates Ltd

This hands-on course is intended for auditors and security specialists who are aware their businesses use Oracle based products, but do not understand the database platform and therefore the risks it may carry. You will learn how Oracle is built and a con ...

Modified
Commercial
Pricing Model

Orion NetFlow Traffic Analyzer provides a new level of visibility into network traffic behavior and trends. Network engineers are now able to analyze the full breadth and depth of network traffic, including the most global view of bandwidth consumption, a ...

Modified
Commercial
Pricing Model

Opterna’s Fiber Sentinel System uses WaveSense TechnologyTM to monitor such optical anomalies and provides continuous, real-time, protocol independent physical layer monitoring of a fiber optic communication system. It detects any signal variations (inclu ...

Category Tap Detection
Modified
Opterna FiberSentinel System
Commercial
Pricing Model

OUTSCAN combines ease-of-use with rich functionality and a powerful vulnerability scanning engine into a unique solution. OUTSCAN scans your perimeter which consists of the same Internet-facing devices that hackers target. With OUTSCAN, it is easy to dete ...

Modified
OUTSCAN
Freeware
Pricing Model

Oracle Directory Server Enterprise Edition (formerly SUN Directory Server Enterprise Edition) is the best known directory server with proven large deployments in carrier and enterprise environments. It is also the most supported directory by ISVs, so it ...

Modified
Commercial
Pricing Model

Oracle Identity Analytics provides enterprises with the ability to define and manage roles and automate critical identity-based controls. Once roles are defined, certified, and assigned, the software continues to deliver scalable and sustainable identity ...

Modified
Oracle Identity Analytics
Open Source
Pricing Model

A regularly-updated signature-based scanner that can detect file inclusion, sql injection, command execution, XSS, DOS, directory traversal vulnerabilities of a target Joomla! web site. Overview Joomla! is probably the most widely-used CMS out there ...

Category Website Scanners
Modified
Owl Cyber Defense
Commercial
Pricing Model

Owl offers a flexible line of data diode cybersecurity products. Customers can choose from the appropriate hardware platform, which includes a base software package, and then select optional add-on software modules to meet their solution needs.

Category Data Diodes
Modified
Commercial
Pricing Model

Oracle Unified Directory is an all-in-one directory solution with storage, proxy, synchronization and virtualization capabilities. While unifying the approach, it provides all the services required for high-performance Enterprise and carrier-grade environ ...

Modified
Oracle Unified Directory
Commercial
Pricing Model

Oracle identity and access management solutions secure access to enterprise applications for both cloud and on-premises deployments. Flexible protection for your workloads Oracle Identity and Access Management solutions provide deployment options to pro ...

Modified
Oracle Identity and Access Management
Oracle
Commercial
Pricing Model

Oracle Access Manager allows users of your applications or IT systems to log in once and gain access to a broad range of IT resources. Oracle Access Manager provides an identity management and access control system that is shared by all your applications. ...

ModifiedNever
Commercial
Pricing Model

Oracle Identity Federation (OIF) is a complete, enterprise-level solution for secure identity information exchange between partners. OIF reduces account management for partner identities and lowers the cost of integrations through support of industry fede ...

Modified
Oracle Identity Federation

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and funct ...

Category Website Scanners
Modified