List Categories and Listings by S

Securepoint GmbH
Commercial
Pricing Model

To build a VPN - Virtual Private Network - various conditions have to be fulfilled. The authentication of the partner, a standardised encryption as well as the access control and embeddening in the security structure of the company - together they establi ...

Category VPN Clients
Modified
SafeNet Inc.
Commercial
Pricing Model

While VPN gateway hardware addresses the needs of the network and remote access entry points, every VPN also consists of hundreds of individuals who need remote access from their laptops and desktop computers while in small offices, home, or traveling.

Category VPN Clients
Modified
Securepoint GmbH
Commercial
Pricing Model

To build a VPN - Virtual Private Network - various conditions have to be fulfilled. The authentication of the partner, a standardised encryption as well as the access control and embeddening in the security structure of the company - together they establi ...

Category VPN Servers
Modified
strongSwan project
Open Source
Pricing Model

IPSEC is Internet Protocol SECurity. It uses strong cryptography to provide both authentication and encryption services. Authentication ensures that packets are from the right sender and have not been altered in transit. Encryption prevents unauthorised r ...

Category VPN Servers
Modified
Commercial
Pricing Model

SonicWALL has added the award-winning Aventail SSL VPN product line to our E-Class SRA appliances. Aventail's best-of-breed SSL VPNs deliver secure remote access to the most resources from the most end point locations. Aventail was named in the Visionari ...

Category VPN Servers
Modified
Guardian Digital Inc.
Commercial
Pricing Model

The Guardian Digital Secure VPN Suite is a powerful Virtual Private Network solution for business operations on the Internet. Combined with a lightweight network intrusion detection system, organizations can protect their corporate online assets while mon ...

Category VPN Servers
Modified
Check Point Software Technologies Ltd.
Commercial
Pricing Model

As your business grows and you leverage the Internet to connect customers and partners, your exposure to cyber threats increases. For foolproof network protection that is cost-effective, easily maintained, and remains effective at all times, small busines ...

Category VPN Servers
Modified
SafeNet Inc.
Commercial
Pricing Model

With a 25-year record of providing high-assurance security solutions to the federal government and the most demanding commercial enterprises, SafeNet is a proven industry leader you can trust to provide remote access to your more sensitive data. SafeNet?s ...

Category VPN Servers
Modified
SonicWALL Inc.
Commercial
Pricing Model

The SonicWALL? PRO Series solves these issues by combining multiple network and security functions including a deep packet inspection firewall, IPSec VPN, layered anti-virus, anti-spyware, intrusion prevention and Web content filtering capabilities into a ...

ModifiedNever
Gibson Research Corporation
Online Use Only
Pricing Model

The Internet's quickest, most popular, reliable and trusted, free Internet security checkup and information service. And now in its Port Authority Edition, it's also the most powerful and complete. Check your system here, and begin learning about using th ...

Modified
Skybox Security Inc.
Commercial
Pricing Model

? Support for Most Major Firewall Types. Check Point, Cisco, Juniper. Out-of-the-Box Best Practice Policy. NIST, ISO, NSA, FISMA, Custom. Side-by-Side Comparison With Best Practices. Access Policy Compliance. Access Path Analysis. Rule Usage Analy ...

Modified

srm

GPL
Pricing Model

srm is a secure replacement for rm(1). Unlike the standard rm, it overwrites the data in the target files before unlinking them. This prevents command-line recovery of the data by examining the raw block device. It may also help frustrate physical examina ...

Modified
Cypherix Encryption Software
Commercial
Pricing Model

Secure IT 2000 is an easy to use, feature packed, file and folder encryption program based on 448-bit strong encryption using the Blowfish algorithm. It includes a customizable file shredder, and the ability to generate self decrypting email attachments.

Modified
Dave Bullock
Freeware
Pricing Model

snarl is a bootable forensics ISO based on FreeBSD and using @stake's autopsy and task as well as scmoo's list of known good checksums. Once you boot the iso just log in as root there is no password. You will boot into a dialog driven menu. select the fir ...

Modified
Commercial
Pricing Model

SMART is a software utility that has been designed and optimized to support data forensic practitioners and Information Security personnel in pursuit of their respective duties and goals. The SMART software and methodology have been developed with th ...

Modified
LastBit Software

Using Secret Explorer you will be able to locate hidden information in any Windows-based system. This includes form AutoComplete data offered by Internet Explorer every time you enter something into an form on a web page; various Internet passwords: passw ...

Category Forensic Tools
Modified
Secret Explorer
Commercial
Pricing Model

Total control over those dangerous endpoints Safe Access®—the world's best, most secure network access control (NAC) solution—ensures that compromised, dangerous endpoints don't get on your network and cause havoc. Take the pain out of compliance Yea ...

Modified
Commercial
Pricing Model

Sophos Network Access Control (NAC) Advanced safeguards data. NAC Advanced protects information by permitting access to the users who need it and enables companies to create comprehensive security policies to check that any computer accessing the network ...

Modified
Symantec Corporation
Commercial
Pricing Model

Symantec Network Access Control 11.0 securely controls access to corporate networks, enforces endpoint security policy and easily integrates with existing network infrastructures. Regardless of how endpoints connect to the network, Symantec's award-winnin ...

Modified
Symantec Network Access Control
Commercial
Pricing Model

E-mail is an invaluable business tool, yet it remains the number one vehicle for the spread of viruses, worms, Trojans, and other malicious code that can corrupt your company's valuable data and networks. As malicious code writers find new ways of circumv ...

Category Servers
Modified

© Computer Network Defence Limited 2021