Directory: A-Z
Comprehensive patch management and deployment Reduce infrastructure and resource costs by using a single solution to manage patches for heterogeneous environments. Achieve peace of mind by making sure Windows and Mac platforms, as well as potentially vul ...
R-Firewall is an effective and easy-to-use solution to secure your on-line activity. It protects a computer connected to a local network and/or to the Internet against any intrusions, attacks, trojans, spyware, and other external and internal threats. R-F ...
Developed with the German Federal Office for Information Security (BSI), the fully virtualized R&S Browser in the Box surfing environment offers an innovative, multi-level concept for secure and convenient Internet surfing and optimum protection again ...
The RAID symposium is an annual event dedicated to the sharing of information in the field of intrusion-detection.
A semi-automated, largely passive web application security audit tool, optimized for an accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-init ...
Recon-ng is a full-featured Web Reconnaissance framework written in Python. Complete with independent modules, database interaction, built in convenience functions, interactive help, and command completion, Recon-ng provides a powerful environment in whic ...
Turn your RedHat Linux machine into a Windows VPN Server.
RedSeal’s hybrid multi-cloud security solution brings complex hybrid multi-cloud networks into one, unified model. You’ll be able to understand all your cloud architecture environments in one dynamic visualization, where your high value assets are, and al ...
RedSeal’s cloud security solution integrates with your public cloud and private cloud managers to include all your network environments in a full network visualization. RedSeal’s network monitoring platform adds configuration files from switches, routers, ...
Cloud security is complex and distributed. In organizations with on-premise environments, the controls sit with the network security team and in firewalls. In the cloud, controls sit with multiple DevOps teams, Kubernetes, 3rd parties, inside AWS and Azur ...
RememBear is a friendly app that saves and autofills your passwords to save you time and keep you safe online. Benefits: Friendly, approachable design Log in faster - let a Bear type your passwords and login to website with one click Faster on ...
REMnux™ is a free Linux toolkit for assisting malware analysts with reverse-engineering malicious software. It strives to make it easier for forensic investigators and incident responders to start using the variety of freely-available tools that can exami ...
Remote Access Client is available for Windows and MacOS. VPN Client VPN Auto-Connect Multi-Factor Authentication Support Secure Hotspot Registration Compliance Scanning Central Management There is also the Capsule Connect product for Android and iOS, a ...
The Remote Forensics architecture allows companies to reduce their investigation budgets and enable analysts to work more productively by providing a fast, secure and effective incident response framework that enforces a consistent methodology allowing an ...
Resilience offers iHA? firewall/VPN solutions in the performance range and expandability for users who vary from high-traffic telecom carriers all the way down to low-traffic SMBs and ROBOs. Covered by the Continuous Secured Ownership WarrantySM, these ar ...
There is a plethora of JavaScript libraries for use on the web and in node.js apps out there. This greatly simplifies, but we need to stay update on security fixes. "Using Components with Known Vulnerabilities" is now a part of the OWASP Top 10 and insecu ...
Learn to turn malware inside out! This popular course explores malware analysis tools and techniques in depth. FOR610 training has helped forensic investigators, incident responders, security engineers, and IT administrators acquire the practical skills t ...
Learn to turn malware inside out! This popular reversing course explores malware analysis tools and techniques in depth. FOR610 training has helped forensic investigators, incident responders, security engineers, and threat analysts acquire the practical ...
RFProtectTM software prevents denial-of-service and man-in-the-middle attacks and mitigates over-the-air security threats.
For Linux- and/or UNIX- systems administrators who want to build skills at configuring common network services and security administration using Red Hat Linux