List Categories and Listings by O

Outpost24 AB
Commercial
Pricing Model

OUTSCAN combines ease-of-use with rich functionality and a powerful vulnerability scanning engine into a unique solution. OUTSCAN scans your perimeter which consists of the same Internet-facing devices that hackers target. With OUTSCAN, it is easy to dete ...

Modified
OUTSCAN
WildPackets, Inc.
Commercial
Pricing Model

For the simple convenience of guest access, or for mission-critical network services, constant monitoring and analysis of your wireless network is required to maintain user satisfaction and to keep your organization safe and secure. As more companies begi ...

Category Wireless Tools
Modified
OmniPeek
Open Source
Pricing Model

Oracle OpenSSO is a complete solution that provides Web access management, federated single sign-on and Web services security in a single, self-contained application. Oracle OpenSSO is optimized for both, internal Web access management and extranet authen ...

Modified
Freeware
Pricing Model

Oracle Directory Server Enterprise Edition (formerly SUN Directory Server Enterprise Edition) is the best known directory server with proven large deployments in carrier and enterprise environments. It is also the most supported directory by ISVs, so it ...

Modified
Commercial
Pricing Model

Oracle Identity Analytics provides intelligence with rich identity analytics, dashboards, and advanced compliance features, that monitor, analyze, review, and govern user access to mitigate risk, build transparency and satisfy compliance mandates. Oracle ...

Modified
Commercial
Pricing Model

Oracle Identity Manager is the next-generation role and user administration solution that automates the process of adding, updating, and deleting both user accounts and attribute-level entitlements across enterprise resources. With Oracle Identity Manager ...

Modified
Open Source
Pricing Model

A regularly-updated signature-based scanner that can detect file inclusion, sql injection, command execution, XSS, DOS, directory traversal vulnerabilities of a target Joomla! web site. Overview Joomla! is probably the most widely-used CMS out there ...

Category Website Scanners
Modified
Sanderson Forensics Ltd.
Freeware
Pricing Model

At the 2008 Microsoft Law Enforcement conference, I presented a short demonstration of my software OleDeconstruct. The operation of OleDeconstruct is very simple - point the software at a Word, Excel etc. file (not the new docx and xlsx files) and view ...

Category Forensic Tools
ModifiedNever
Owl Cyber Defense
Commercial
Pricing Model

Owl offers a flexible line of data diode cybersecurity products. Customers can choose from the appropriate hardware platform, which includes a base software package, and then select optional add-on software modules to meet their solution needs.

Category Data Diodes
Modified
Commercial
Pricing Model

Oracle Directory Services Plus is the only integrated solution that provides a comprehensive set of directory solutions for high performance enterprises and carrier-grade environments. Oracle Directory Services Plus is a single package comprising of: ...

ModifiedNever
Commercial
Pricing Model

* Faster deployments—An integrated suite approach enables faster deployments and streamlined day-to-day operations * Improved security—Proven, best-in-class solutions work together as a single solution by abstracting and centralizing security for app ...

ModifiedNever
Oracle
Commercial
Pricing Model

Oracle Access Manager allows users of your applications or IT systems to log in once and gain access to a broad range of IT resources. Oracle Access Manager provides an identity management and access control system that is shared by all your applications. ...

ModifiedNever
Commercial
Pricing Model

Oracle Identity Federation 11g provides a self-contained and flexible multi-protocol federation server that can be rapidly deployed with your existing identity and access management systems. With its support for leading standards-based protocols, it ensur ...

ModifiedNever

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and funct ...

Category Website Scanners
Modified
Cyber Security Technologies Corp.

OnLineDFS enables a rapid but forensically sound determination about whether an issue exists in a computer so that quick action can be taken to address the situation. Since OnLineDFS enables non-disruptive but forensically-sound examination and informatio ...

Category Remote Forensics
Modified

OpenDLP Popular

Open Source
Pricing Model

  OpenDLP is a free and open source, agent- and agentless-based, centrally-managed, massively distributable data loss prevention tool released under the GPL. Given appropriate Windows, UNIX, MySQL, or MSSQL credentials, OpenDLP can simultaneously id ...

Category Host DLP
Modified
Oxygen Software Company

Besides the general data extracted by similar products, Oxygen Forensic Suite can extract a lot of unique information Using low-level protocols allows the program to extract: phone basic information and SIM-card data, contacts list, caller groups, speed ...

Category Forensic Tools
ModifiedNever
OpenVAS Project

  The Open Vulnerability Assessment System (OpenVAS) is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution. OpenVAS is a framework of several services and too ...

Category Network Scanners
ModifiedNever
Offensive Security

The Offensive Security Wireless Professional (OSWP) is the only practical wireless attacks certification in the security field today. The OSWP challenges the students to prove they have the practical ability to perform 802.11 wireless audits using open so ...

Category Ethical Hacking
Modified
Offensive Security

The Offensive Security Certified Expert (OSCE) is an extremely challenging exam wherein students are required to demonstrate that they comprehend not only the material directly covered in the CTP course, but that they also fully grasp the concepts present ...

Category Ethical Hacking
Modified

© Computer Network Defence Limited 2021