SpamSentinel has been stopping spam and viruses natively on Domino servers since 2003. Our motto "It just works." Included also, InboxGenius and MacroKiller The InboxGeniusSpamSentinel comes with our proprietary Inbox Genius built-in, which learns from w ...
Antispam server software, Spam Sleuth Enterprise eliminates spam, harmful viruses, web bugs, and phishing scams for your entire organization. The perfect anti-spam solution for ISPs, businesses, schools, governments and other organizations. Works with any ...
SpamTitan Gateway is a powerful Anti-Spam appliance that equips network administrators with extensive tools to control mail flow and protect against unwanted email and malware. Multilayered anti spam analysis. Including Sender Policy Framework (SPF ...
ShmooCon is an annual East coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software & hardware solutions, and open discussions of critical infosec issues. The first ...
Information is the most important resource any organization controls, and ensuring its confidentiality is crucial in today?s world. Secure IT addresses continuing and new threats to information security as well as responses to the increasing risk of data ...
The Symposium on Security for Asia Network aims to be a very different security conference from the rest of the security conferences that the information security community in Asia has come to be so familiar and frustrated with. SyScan intends to be a non ...
SAM is an international conference held simultaneously (ie, same location and dates) with a number of other joint conferences as part of WORLDCOMP (The World Congress in Computer Science, Computer Engineering, and Applied Computing). WORLDCOMP is the larg ...
SACMAT is a successful series of symposiums that continue the tradition, first established by the ACM Workshop on Role-Based Access Control, of being the premier forum for presentation of research results and experience reports on leading edge issues of a ...
Summercon is our chance to get together, talk to each other face-to-face, and swap information about innovations, trends, practices, and rumors in the field of computer security. We welcome all walks of life and all sides of the debate to Summercon: hacke ...
This 5-day course is designed for IT professionals who want to learn the fundamentals of network security. The course offers practical training in areas such as TCP/IP for computer communications, types of attack, applied cryptography, multi-firewalls ...
Experience in-depth coverage of Linux and Unix security issues. Examine how to mitigate or eliminate general problems that apply to all Unix-like operating systems, including vulnerabilities in the password authentication system, file system, virtual memo ...
The Securing Windows track at SANS (SEC505) is a comprehensive set of courses for Windows security architects and administrators. It tackles tough problems like Active Directory forest design, how to use Group Policy to lock down desktops, deploying a Mic ...
You Will Learn How To * Apply Windows Server 2008 features to secure your infrastructure * Deploy a Windows-based Public Key Infrastructure (PKI) as a foundation for security services * Enhance access controls with policy-based multifactor ...
Defcom have been acquired and are no longer offering training
You Will Learn How To * Implement and test secure Web applications in your organisation * Identify, diagnose and correct the most serious Web application vulnerabilities * Configure a Web server to encrypt Web traffic with HTTPS * Prot ...
A hands on training course concentrating solely on wireless LAN security. The course progresses from attacking a basic WLAN onto implementing evermore stronger security features in order to secure the WLAN.
At the end of the day, the large majority of security vulnerabilities are primarily related to poorly software design and coding. This course goes to heart of the problem and educates developers about secure application design, development, and testing. I ...
The StealthWatch sensor appliance provides fast, accurate monitoring for unexpected or unauthorized network behavior. Using flow-based architecture it provides continuous, real-time network traffic monitoring and instant identification of attack
Sawmill is universal log analysis software that runs on every major platform. It can process almost any type of log data. The reports that Sawmill generates are hierarchical, attractive, and heavily cross-linked for easy navigation. Complete documentation ...
Spyware, adware, browser hijackers, and dialers are some of the most annoying and pervasive threats on the Internet today. By simply browsing a web page, you could find your computer to be the brand-new host of one of these unwanted fiends! Prevent the ...
© Computer Network Defence Limited 2023