Directory: A-Z
Data protection does not have to get in the way of business productivity. Forcepoint’s focus on unified policies, user risk, and automation makes data security frictionless and intuitive. Control all your data with one single policyReplace broad, sweepin ...
Protects your Mac from outside attackEasy-to-use interface means less chance of mistakesCritical improvements to OS X's "built-in" firewall
The processes and methodologies taught in this class will train you to collect an image on damaged evidence where standard forensic imaging would have failed. You will learn to understand what kinds of problems hard drives have and what your options are t ...
Full disk encryption with pre-boot authentication Ideal to encrypt an entire computer /notebook/ partition or just a single Hard drive. With DCPP the Hard drive (including the operating system) is encrypted 100%, therefore unauthorized person will not be ...
DroidBox is developed to offer dynamic analysis of Android applications. The following information is described in the results, generated when analysis is complete: Hashes for the analyzed package Incoming/outgoing network data File read and write op ...
An extensible network forensic analysis framework. Enables rapid development of plugins to support the dissection of network packet captures. Key features:Robust stream reassemblyIPv4 and IPv6 supportCustom output handlersChainable decoders
Damn Small SQLi Scanner (DSSS) has been made as a PoC where I wanted to show that commercial (SQLi) scanners can be beaten under 100 lines of code. It supports GET and POST parameters, blind/error SQLi tests and advanced comparison of different r ...
Provides over two dozen indexed and unindexed text search options for all popular file types. Supports full-text as well as field searching in all supported file types. Has multiple relevancy-ranking and other search sorting options. dtSearch can instantl ...
Duo Insight is a free phishing assessment tool by Duo Security that allows you to find vulnerable users and devices in minutes and start protecting them right away.
E-Detective is a real-time Internet interception, monitoring and forensics system that captures, decodes, and reconstructs various types of Internet traffic. It is commonly used for organization Internet behavioral monitoring, auditing, record keeping, fo ...
E3 Forensic Platform provides processing options for smartphones, computers, cloud data, email, and more. A comprehensive review of data together to find the gaps that hold the keys to your investigation. Universal Data ProcessingData processing in ...
Know and control your network with Easy NAC, the simple and affordable Network Access Control solution. Easy NAC automatically discovers devices, profiles them, and controls access to the network. Easy NAC’s unique technology requires no network changes ...
This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the curren ...
In this course you will learn the core skills to build a solid security foundation. You will examine in detail the traffic that traverses the network at the packet and binary level. You will build a solid knowledge of the lowest layers of the network. In ...
ECLAIR is a general platform for software verification. Applications range from coding rule validation, to automatic generation of testcases, to the proof of absence of run-time errors or generation of counterexamples, and to the specification of code mat ...
The Viasat Eclypt Core encrypted internal hard drive protects data at rest in commercial-off-the-shelf (COTS) laptop and desktop computers in enterprise and tactical environments, as well as data stored in vehicles, aircraft, and ships. During high-risk o ...
The Viasat Eclypt Freedom is an encrypted, portable drive that gives fast access to secure data. Accredited by government organizations around the world to protect important data, the Eclypt Freedom uses advanced hardware-based full disk encryption. In t ...
EdenWall is the hardware firewall developed by INL. It provides authentication and user-based network flow management. Thanks to EdenWall, network filtering policies based on actual user identity is now possible. Sole IP-based filtering time is over! ...
Why Edge SWG Defense in Depth Multi-layered inspection built into the proxy foundation--including site categorization and risk scoring, application classification, reputation analysis, anti-malware engines, and sandboxing--helps identify more threats an ...
edgescan is the only hybrid cloud based solution in Europe which combines both vulnerability scanning and manual verification on an on-going basis. It is a SaaS (Software as a Service) solution which detects technical vulnerabilities in Internet-facing sy ...