List Categories and Listings by R

Commercial
Pricing Model

Deepen your understanding of malware analysis tools and approaches with this two-day course, building upon the concepts covered in SEC601: Reverse Engineering Malware: The Essentials of Malware Analysis. You will begin this course by reviewing key asse ...

Category Virus Training
Modified
Commercial
Pricing Model

Expand your capacity to fight malicious code by learning how to analyze bots, worms, and trojans. This two-day course discusses the essential techniques for examining malware using a variety of system monitoring tools, a disassembler, and a debugger. You ...

Category Virus Training
Modified
Red Hat, Inc
Commercial
Pricing Model

Course Description RHS429 introduces advanced system administrators, security administrators, and applications programmers to SELinux policy writing. Participants in this course will learn how SELinux works; how to manage SELinux; and how to write an S ...

ModifiedNever
Aruba Networks, Inc.
Commercial
Pricing Model

Aruba's RFProtect software module protects the network against wireless threats to network security by incorporating wireless intrusion protection into the network infrastructure and eliminating the need for a separate system of RF sensors and security ap ...

Category Wireless IDS
Modified
RFProtect Wireless Intrusion Protection
RedSeal Systems Inc.
Commercial
Pricing Model

RedSeal Network Advisor is automated assurance software for network security. Every day, it gathers the configurations of all your network devices: firewalls, routers, load balancers, and more. It analyzes how the rules on all of these devices work togeth ...

Category Network Scanners
Modified
RedSeal Systems Inc.
Commercial
Pricing Model

RedSeal Vulnerability Advisor transforms scanning into actionable vulnerability management. It gathers the configurations of all your network devices — firewalls, routers, load balancers, wireless access points, and more—and combines this info ...

Modified
Sanderson Forensics Ltd.
Commercial
Pricing Model

RevEnge is a fully featured hex viewer designed with Reverse Engineering in mind, hence the name. It comes packed with features not seen in other Hex viewers such as it ability to perform on the fly decompression of ZLib compressed data, display and searc ...

Category Forensic Tools
ModifiedNever

A Recycle Bin Forensic Analysis Tool. Many important files within Microsoft Windows have structures that are undocumented. One of the principals of computer forensics is that all analysis methodologies must be well documented and repeatable, and they m ...

Category Forensic Tools
Modified
eEye Digital Security

Retina Web Security Scanner is a best-in-class web scanning solution that rapidly and accurately scans large, complex web sites and web applications to tackle web-based vulnerabilities. Retina Web Security Scanner identifies application vulnerabilities as ...

Category Website Scanners
ModifiedNever
Evidence Talks

The Remote Forensics architecture allows companies to reduce their investigation budgets and enable analysts to work more productively by providing a fast, secure and effective incident response framework that enforces a consistent methodology allowing an ...

Category Remote Forensics
ModifiedNever
Vere Software

Vere Software has partnered with Digital Intelligence to bring you R.E.O.: the only computer system designed entirely as the online investigator's best friend. R.E.O., along with Vere Software’s incomparable online evidence collection software WebCase®, m ...

Category Forensic Tools
ModifiedNever

  RSA DLP Network covers various channels of network communications including corporate email, web and social media, IM, encrypted traffic, email from smartphones and tablets, FTP, and generic TCP. It leverages state-of-the-art classification techno ...

Category DLP Network
Modified

  In addition to monitoring end-user actions in real time, RSA DLP Endpoint can also scan all local drives for sensitive data and provide unprecedented visibility into the risk from sensitive data whether the PCs are physical laptops or virtual desk ...

Category Host DLP
Modified

  RSA DLP Datacenter supports storage platforms including Windows file servers, UNIX file servers, NAS/SAN, Microsoft SharePoint, Lotus Notes, databases, Windows PC local drives, and more for automated data discovery. Unique technologies such as gri ...

Category Host DLP
Modified
Watchful Software
Commercial
Pricing Model

RightsWATCH delivers the data-centric solution for information protection, ensuring that information is kept protected no matter who has access to the network and systems. Protection is enforced on the files/data itself, instead of only on the system or n ...

Category DLP Network
Modified
RightsWATCH
EMC Corporation
Commercial
Pricing Model

By bringing together security information event management (SIEM) , network security monitoring, and combining them with the advanced analysis capabilities of a data security warehouse and integrated threat intelligence, RSA Security Analytics helps secur ...

Modified
RSA Security Analytics
Commercial
Pricing Model

Adaptive Authentication monitors and authenticates online activities in real time by correlating behavioral analysis, device profiling, and data feeds from RSA eFraudNetwork. AT A GLANCE Measures risk of login and post login activities by evaluating o ...

Modified
RSA Adaptive Authentication
EMC Corporation
Service
Pricing Model

Provides information on corporate machines, network resources, access credentials, business data, and email correspondence that may have been compromised by malware. Enabling security professionals to identify gaps in existing processes and adjust or crea ...

Category Enterprise
Modified
RSA CyberCrime Intelligence Service
EMC Corporation
Commercial
Pricing Model

RSA ECAT is an endpoint compromise-assessment and monitoring tool that enables organizations to detect and respond to threats.  Using a unique signature-less approach, it identifies previously unknown malware and compromises that other solutions may ...

Modified
RSA: ECAT
Commercial
Pricing Model

RSA Archer GRC: RSA Archer GRC modules allow you to build an efficient, collaborative enterprise governance, risk, and compliance (GRC) program across IT, finance, operations, and legal domains. With RSA Archer, you can manage risks, demonstrate complianc ...

Category Compliance
Modified
RSA Archer GRC

© Computer Network Defence Limited 2021