Research in pervasive computing continues to gain momentum. The importance of security and privacy in a pervasive computing environment cannot be underestimated. As in previous years, PerSec will bring together the world's experts on this topic and provid ...
Welcome to the home of POC. POC is organized by Korean hackers & security experts. It is an international security & hacking conference in Korea. POC concentrates on technical and creative discussion and shows real hacking and security. POC wears both bla ...
In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Ad ...
This training is appropriate for system security officers, system administrators, applications integrators, and other users of the Argus security systems. The course assumes familiarity with either UNIX or Linux. Learn how to operate your system in the Ar ...
This training is appropriate for system security officers, system administrators, applications integrators, and other users of the Argus security systems. The course assumes familiarity with UNIX. * Learn how to operate your system in the Argus secure en ...
AnalogX PacketMon allows you to capture IP packets that pass through your network interface - whether they originated from the machine on which PacketMon is installed, or a completely different machine on your network! Once the packet is received, you can ...
Device discovery Track assets scattered across your entire enterprise. Gather a complete and accurate view of all network endpoints, including managed and unmanaged devices, and authorized and unauthorized devices. Understand what types of devices are on ...
Only PC Tattletale offers a complete Internet Monitoring and Parental Control Software solution, that's unmatched in the industry. It contains all the monitoring tools you'll need to keep your child safe - in one easy to use software suite. Features 7 ...
We wrote a program called "Paros" for people who need to evaluate the security of their web applications. It is free of charge and completely written in Java. Through Paros's proxy nature, all HTTP and HTTPS data between server and client, including cooki ...
The primary goal of Pantera is to combine automated capabilities with complete manual testing to get the best penetration testing results. The following are some notable Pantera Features: * User-friendly custom web GUI. (CSS): Pantera itself is a web appl ...
PGP Whole Disk Encryption provides enterprises with comprehensive, nonstop disk encryption, enabling quick, cost-effective protection for data on PCs, laptops, and removable media. The encrypted data is continuously safeguarded from unauthorized access, p ...
Wireless Scanner for Windows Mobile OS. [administrator's note: development on PeekPocket ended 5/2008]
ParsIPS presents a brilliant solution for Intrusion Prevention System. It uses innovative technologies to monitor network and system activities for malicious or unwanted behavior and can react in real-time and immediately to block or prevent those activit ...
Protect, monitor and control privileged access, with on-site deployment. Deploy in your datacenter, private or public cloud, to meet regulatory compliance or organizational needs Confidently migrate to SaaS with the backing of CyberArk’s proven expertis ...
P0f is a tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind any incidental TCP/IP communications (often as little as a single normal SYN) without interfering in any way. Version 3 ...
The Palo Alto Networks Next-Generation Security Platform has four key characteristics that enable the prevention of successful cyberattacks: Natively integrated technologies that leverage a single-pass architecture to exert positive control based on ap ...
PINsafe from Swivel Secure allows tokenless two factor and strong authentication without the expense and hassle of carrying around tokens maing it suitable for large scale and corporate through to small deployments. Using a simple PIN extraction proc ...
ProxyStrike is an active Web Application Proxy. It's a tool designed to find vulnerabilities while browsing an application. It was created because the problems we faced in the pentests of web applications that depends heavily on Javascript, not many web s ...
Email is the No. 1 threat vector. Social actions such as phishing and email scams arrive via email 96% of the time, and these security threats are always evolving. Proofpoint delivers the most effective unified solution to protect your people and critical ...
Proofpoint Enterprise Privacy provides powerful data loss prevention, protection, encryption capabilities – the easiest and most cost-effective way for organizations to prevent leaks of sensitive data. Powerful policies help organizations protect email da ...
© Computer Network Defence Limited 2023