List Categories and Listings by P

Research in pervasive computing continues to gain momentum. The importance of security and privacy in a pervasive computing environment cannot be underestimated. As in previous years, PerSec will bring together the world's experts on this topic and provid ...

Welcome to the home of POC. POC is organized by Korean hackers & security experts. It is an international security & hacking conference in Korea. POC concentrates on technical and creative discussion and shows real hacking and security. POC wears both bla ...

In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Ad ...

Category Ethical Hacking
Penetration Testing Engineer
Argus Systems Group, Inc

This training is appropriate for system security officers, system administrators, applications integrators, and other users of the Argus security systems. The course assumes familiarity with either UNIX or Linux. Learn how to operate your system in the Ar ...

Argus Systems Group, Inc

This training is appropriate for system security officers, system administrators, applications integrators, and other users of the Argus security systems. The course assumes familiarity with UNIX. * Learn how to operate your system in the Argus secure en ...

PacketMon Popular

AnalogX PacketMon allows you to capture IP packets that pass through your network interface - whether they originated from the machine on which PacketMon is installed, or a completely different machine on your network! Once the packet is received, you can ...

PacketMon

Plixer NPMD Popular

Device discovery Track assets scattered across your entire enterprise. Gather a complete and accurate view of all network endpoints, including managed and unmanaged devices, and authorized and unauthorized devices. Understand what types of devices are on ...

Category Network Mapping
Plixer NPMD
Parental Control Software

Only PC Tattletale offers a complete Internet Monitoring and Parental Control Software solution, that's unmatched in the industry. It contains all the monitoring tools you'll need to keep your child safe - in one easy to use software suite. Features 7 ...

Category Uncategorised
PC TattleTale
Chinotec Technologies Company

We wrote a program called "Paros" for people who need to evaluate the security of their web applications. It is free of charge and completely written in Java. Through Paros's proxy nature, all HTTP and HTTPS data between server and client, including cooki ...

Category Website Scanners
Paros Proxy

The primary goal of Pantera is to combine automated capabilities with complete manual testing to get the best penetration testing results. The following are some notable Pantera Features: * User-friendly custom web GUI. (CSS): Pantera itself is a web appl ...

Category Website Scanners

PGP Whole Disk Encryption provides enterprises with comprehensive, nonstop disk encryption, enabling quick, cost-effective protection for data on PCs, laptops, and removable media. The encrypted data is continuously safeguarded from unauthorized access, p ...

Wireless Scanner for Windows Mobile OS. [administrator's note: development on PeekPocket ended 5/2008]

Category Wireless Tools
Amnafzar (Sharif Secureware)

ParsIPS presents a brilliant solution for Intrusion Prevention System. It uses innovative technologies to monitor network and system activities for malicious or unwanted behavior and can react in real-time and immediately to block or prevent those activit ...

Category IPS Network
CyberArk Software

Protect, monitor and control privileged access, with on-site deployment. Deploy in your datacenter, private or public cloud, to meet regulatory compliance or organizational needs Confidently migrate to SaaS with the backing of CyberArk’s proven expertis ...

Privileged Access Manager

p0f

Michal Zalewski (lcamtuf@coredump.cx)

P0f is a tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind any incidental TCP/IP communications (often as little as a single normal SYN) without interfering in any way. Version 3 ...

Palo Alto Networks

The Palo Alto Networks Next-Generation Security Platform has four key characteristics that enable the prevention of successful cyberattacks: Natively integrated technologies that leverage a single-pass architecture to exert positive control based on ap ...

Palo Alto Networks Next Generation Firewalls
Swivel Secure Ltd

PINsafe from Swivel Secure allows tokenless two factor and strong authentication without the expense and hassle of carrying around tokens maing it suitable for large scale and corporate through to small deployments. Using a simple PIN extraction proc ...

PINsafe

ProxyStrike is an active Web Application Proxy. It's a tool designed to find vulnerabilities while browsing an application. It was created because the problems we faced in the pentests of web applications that depends heavily on Javascript, not many web s ...

Category Website Scanners
Proofpoint, Inc.

Email is the No. 1 threat vector. Social actions such as phishing and email scams arrive via email 96% of the time, and these security threats are always evolving. Proofpoint delivers the most effective unified solution to protect your people and critical ...

Proofpoint Email Security and Protection
Proofpoint, Inc.

Proofpoint Enterprise Privacy provides powerful data loss prevention, protection, encryption capabilities – the easiest and most cost-effective way for organizations to prevent leaks of sensitive data. Powerful policies help organizations protect email da ...

Category DLP Network