List Categories and Listings by R

RNA

Sourcefire Real-time Network Awareness (RNA) Sourcefire RNA is an innovative, passive sensing technology that provides real-time network intelligence to the Sourcefire 3D™ System. RNA enables organizations to confidently protect their dynamic networks ...

VendorSourcefire, Inc
Pricing ModelCommercial
Modified

The course begins by covering fundamental aspects of malware analysis. You'll learn how to set up an inexpensive and flexible laboratory for understanding the inner-workings of malicious software and will understand how to use the lab for exploring charac ...

Category Virus Training
VendorSANS
Pricing ModelCommercial
Modified

Retina can scan every machine on your network, including a variety of operating system platforms (e.g. Windows, Unix, Linux), networked devices (e.g. firewalls, routers, etc.), databases and third-party or custom applications, all in record time. After sc ...

Category Network Scanners
VendoreEye Digital Security
Pricing ModelCommercial
Modified
Rational AppScan

IBM® Rational AppScan® is a portfolio of application-security and risk-management solutions. With advanced security testing and a platform managing application risk, the IBM Rational AppScan portfolio delivers the security expertise and critical integrati ...

Category Website Scanners
VendorIBM Software
Pricing ModelCommercial
Modified

RedSeal Systems has automated proactive security management with a system that is easy to deploy, intuitive to use, and that yields actionable information within hours of installation. With RedSeal, enterprises can:

Category Network Mapping
VendorRedSeal Systems Inc.
Modified

NetCure Discovery is a free version of NetCure that autodiscovers your network from layer-2 to layer-7. Use NetCure Discovery to browse and print images of your network topology.

Category Network Mapping
VendorRocket Software Inc.
Modified

Redfang  is a small proof-of-concept application to find non-discoverable Bluetooth devices by brute-forcing the last six bytes of the device's Bluetooth address and doing a read_remote_name(). This new version has streamlined code, enumerates servic ...

VendorOllie Whitehouse
Pricing ModelOpen Source
Modified

R-Firewall is an effective and easy-to-use solution to secure your on-line activity. It protects a computer connected to a local network and/or to the Internet against any intrusions, attacks, trojans, spyware, and other external and internal threats. R-F ...

VendorR-tools Technology
Pricing ModelFreeware
Modified
RouteFinder SOHO

The RouteFinder? SOHO security appliance is ideal for the small branch office or telecommuter who needs secure access to the corporate LAN. In addition to providing a WAN Ethernet port for DSL or cable broadband Internet access, it also offers both client ...

VendorMulti-Tech Systems Inc.
Pricing ModelCommercial
Modified

Routerctl (pronounced "router control") is a program to convert a normal PC into a network router. It manages network connectivity, DNS, DHCP, NAT, packet filtering, firewall policies, port forwarding, and IP forwarding via a single high-level configurati ...

VendorOpen Source
Pricing ModelFree
Modified

Turn your RedHat Linux machine into a Windows VPN Server.

Category VPN Servers
VendorPhil Hollenback
Pricing Modelfreeware
Modified

Resilience offers iHA? firewall/VPN solutions in the performance range and expandability for users who vary from high-traffic telecom carriers all the way down to low-traffic SMBs and ROBOs. Covered by the Continuous Secured Ownership WarrantySM, these ar ...

Category VPN Servers
VendorResilience Corporation
Pricing ModelCommercial
Modified

The CyberAbuse Rootkit ID project is made of a software and a database which allows a unix user to detect rootkit files on his machine. The software compares SHA1 checksum of the files on the unix machine with the checksum present in our database. If the ...

Category Forensic Tools
VendorPhilippe Bourcier
Pricing ModelGPL
Modified

With hundreds of targeted classroom sessions, real-life case studies, innovative learning programs, keynotes by industry luminaries and a world-class Exposition, RSA Conference is the unbiased resource thousands of information security professionals aroun ...

VendorNo Vendor
Pricing ModelCommercial
Modified

The RAID symposium is an annual event dedicated to the sharing of information in the field of intrusion-detection.

VendorRAID
Pricing ModelCommercial
Modified

For Linux- and/or UNIX- systems administrators who want to build skills at configuring common network services and security administration using Red Hat Linux

VendorRed Hat, Inc
Pricing ModelCommercial
Modified

Red Hat Enterprise Linux has gained considerable momentum as the operating system of choice for deploying network services such as web, ftp, email, and file sharing. RHS333 Red Hat Enterprise Security: Network Services is an intensive course that provides ...

VendorRed Hat, Inc
Pricing ModelCommercial
Modified
VendorRiverstone Networks
Pricing ModelCommercial
ModifiedNever

A semi-automated, largely passive web application security audit tool, optimized for an accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-init ...

Category Website Scanners
Vendorlcamtuf
Pricing ModelFreeware
ModifiedNever

ROCSECURE is a division of Rocstor; pioneering in the secure encryption of digital content in any standard digital format. resolving security issues before they arise As businesses become increasingly dependent on data security, the reliability and availa ...

VendorRocStor
Pricing ModelCommercial
Modified

© Computer Network Defence Limited 2019