Skip to main content

List Categories and Listings by R

Learn to turn malware inside out! This popular course explores malware analysis tools and techniques in depth. FOR610 training has helped forensic investigators, incident responders, security engineers, and IT administrators acquire the practical skills t ...

Category Virus Training
Check Point Software Technologies Ltd.

Remote Access Client is available for Windows and MacOS. VPN Client VPN Auto-Connect Multi-Factor Authentication Support Secure Hotspot Registration Compliance Scanning Central Management There is also the Capsule Connect product for Android and iOS, a ...

Category VPN Clients
Remote Access Client
RedSeal Systems Inc.

Cloud security is complex and distributed. In organizations with on-premise environments, the controls sit with the network security team and in firewalls. In the cloud, controls sit with multiple DevOps teams, Kubernetes, 3rd parties, inside AWS and Azur ...

Category Network Mapping
RedSeal Stratus
Rocket Software Inc.

NetCure Discovery is a free version of NetCure that autodiscovers your network from layer-2 to layer-7. Use NetCure Discovery to browse and print images of your network topology.

Category Network Mapping
Rocket NetCure
R-tools Technology

R-Firewall is an effective and easy-to-use solution to secure your on-line activity. It protects a computer connected to a local network and/or to the Internet against any intrusions, attacks, trojans, spyware, and other external and internal threats. R-F ...

Routerctl (pronounced "router control") is a program to convert a normal PC into a network router. It manages network connectivity, DNS, DHCP, NAT, packet filtering, firewall policies, port forwarding, and IP forwarding via a single high-level configurati ...

Phil Hollenback

Turn your RedHat Linux machine into a Windows VPN Server.

Category VPN Servers
Resilience Corporation

Resilience offers iHA? firewall/VPN solutions in the performance range and expandability for users who vary from high-traffic telecom carriers all the way down to low-traffic SMBs and ROBOs. Covered by the Continuous Secured Ownership WarrantySM, these ar ...

Category VPN Servers

With hundreds of targeted classroom sessions, real-life case studies, innovative learning programs, keynotes by industry luminaries and a world-class Exposition, RSA Conference is the unbiased resource thousands of information security professionals aroun ...

The RAID symposium is an annual event dedicated to the sharing of information in the field of intrusion-detection.

Red Hat, Inc

For Linux- and/or UNIX- systems administrators who want to build skills at configuring common network services and security administration using Red Hat Linux

Red Hat, Inc

Red Hat Enterprise Linux has gained considerable momentum as the operating system of choice for deploying network services such as web, ftp, email, and file sharing. RHS333 Red Hat Enterprise Security: Network Services is an intensive course that provides ...

Riverstone Networks

Exports to NetFlow

A semi-automated, largely passive web application security audit tool, optimized for an accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-init ...

Category Website Scanners

ROCSECURE is a division of Rocstor; pioneering in the secure encryption of digital content in any standard digital format. resolving security issues before they arise As businesses become increasingly dependent on data security, the reliability and availa ...

Learn to turn malware inside out! This popular reversing course explores malware analysis tools and techniques in depth. FOR610 training has helped forensic investigators, incident responders, security engineers, and threat analysts acquire the practical ...

Category Virus Training
Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Red Hat, Inc

Course Description RHS429 introduces advanced system administrators, security administrators, and applications programmers to SELinux policy writing. Participants in this course will learn how SELinux works; how to manage SELinux; and how to write an S ...

Aruba Networks, Inc.

RFProtectTM software prevents denial-of-service and man-in-the-middle attacks and mitigates over-the-air security threats.

Category Wireless IDS
RFProtect Wireless Intrusion Protection
RedSeal Systems Inc.

RedSeal’s hybrid multi-cloud security solution brings complex hybrid multi-cloud networks into one, unified model. You’ll be able to understand all your cloud architecture environments in one dynamic visualization, where your high value assets are, and al ...

Category Network Scanners

Rifiuti2 analyses recycle bin files from Windows. Rifiuti2 can extract file deletion time, original path and size of deleted files. For more ancient versions of Windows, it can also check whether deleted items were not in recycle bin anymore (that is, eit ...

Category Forensic Tools