Directory: A-Z
Erase data securely from PCs, laptops, servers and storage environments. This fully automated and centrally managed erasure solution offers cutting edge efficiency and productivity. The most advanced data erasure solution on the market, this next generati ...
Guarantee your data has been erased from any type of?drive in?desktop/laptop computers, servers and storage environments. Blancco’s secure erasure methods ensure data is written across the full logical capacity of the drive (and not just compressed). &nb ...
Blancco Mobile is designed to securely erase your smartphone’s internal and external memory. Restoring factory settings does not ensure that data is permanently destroyed, because your data can still be recovered afterwards. With Blancco Mobile, all user ...
Blancco Removable Media Eraser?is?deliverable?as a simple desktop application,?or?an?MSI package delivered to multiple users, allowing single data erasure processes or simultaneous erasure. Achieve Compliance?Securely erase removable media to improve dat ...
Blooover II is the successor of the very popular application Blooover. After 150000 downloads of Blooover, a new version of this mobile phone auditing toool is on its ready. Besides the BlueBug attack, Blooover II supports the HeloMoto attack (which is qu ...
Bloxx Inc., the enterprise Web filtering company, offers appliance-based Internet filtering for medium and large organizations in both the business and public sectors. The Bloxx Web filter is a dynamic content filtering solution that uses industry-leading ...
Blueprinting is a method to remotely find out details about bluetooth-enabled devices. Blueprinting can be used for generating statistics about manufacturers and models and to find out whether there are devices in range that have issues with Bluetooth sec ...
Bluesnarfer will download the phonebook of any mobile device vulnerable to bluesnarfing.
The gun, which is called the BlueSniper rifle, can scan and attack Bluetooth devices from more than a mile away.
BlueSpam searches for all discoverable bluetooth devices and sends a file to them (spams them) if they support OBEX. By default a small text will be send. To customize the message that should be send you need a palm with an SD/MMC card, then you create th ...
The BorderGuard 6000 Secure Communications Platform builds on a decade-long legacy of offering the best combination of price, performance, reliability, and security in the industry.
Brakeman is an open source vulnerability scanner specifically designed for Ruby on Rails applications. It statically analyzes Rails application code to find security issues at any stage of development.
Bravura Identity is an integrated solution for managing identities, groups and security entitlements across systems and applications. It ensures that users are granted access quickly, that entitlements are appropriate to business need and that access is r ...
The BrightCloud File Reputation Service provides next-generation Webroot threat intelligence by offering customers a dynamic, up-to-the-minute file reputation service to protect their data and assets. This real-time lookup service of known malicious and w ...
The BrightCloud IP Reputation Service helps enterprise customers augment their defenses by adding a dynamic IP reputation service. Through a continuously updated feed of known malicious IP addresses, IT security administrators can easily identify threats ...
The BrightCloud Mobile App Reputation Service helps vendors who provide mobile management and security solutions address the new security vulnerabilities that mobility creates. Powered by the Webroot® Intelligence Network (WIN), the service continuously a ...
The BrightCloud Mobile Security SDK for Android™ and iOS® addresses mobile device vulnerabilities by enabling mobile management partners to offer enhanced security for their customers. It features antivirus, antimalware, device and application interrogati ...
Web classification continues to present a unique security challenge to anyone trying to offer secure web access to enterprises. In addition to keeping track of hundreds of millions of websites (with millions more added every year), security vendors must p ...
Add a layer of real-time security to your web defenses by accurately assessing the risk posed when opening a URL. This critical layer of proactive protection helps defend against emerging threats by determining a website's risk level – independent of its ...
Browser History Capturer is a free tool that allows you to easily capture web browser history from a Windows computer. The tool can be run from a USB dongle to capture history from Firefox, Chrome and Internet Explorer web browsers. The history files are ...