Directory: A-Z
Red Hat Enterprise Linux has gained considerable momentum as the operating system of choice for deploying network services such as web, ftp, email, and file sharing. RHS333 Red Hat Enterprise Security: Network Services is an intensive course that provides ...
Course Description RHS429 introduces advanced system administrators, security administrators, and applications programmers to SELinux policy writing. Participants in this course will learn how SELinux works; how to manage SELinux; and how to write an S ...
Rifiuti2 analyses recycle bin files from Windows. Rifiuti2 can extract file deletion time, original path and size of deleted files. For more ancient versions of Windows, it can also check whether deleted items were not in recycle bin anymore (that is, eit ...
Exports to NetFlow
One click convenience RoboForm securely stores all of your passwords and logs you in with a single click (or tap). Save time entering personal and billing information with AutoFill for long web forms. Capture passwords while you browse Go about surfing ...
NetCure Discovery is a free version of NetCure that autodiscovers your network from layer-2 to layer-7. Use NetCure Discovery to browse and print images of your network topology.
ROCSECURE is a division of Rocstor; pioneering in the secure encryption of digital content in any standard digital format. resolving security issues before they arise As businesses become increasingly dependent on data security, the reliability and availa ...
Routerctl (pronounced "router control") is a program to convert a normal PC into a network router. It manages network connectivity, DNS, DHCP, NAT, packet filtering, firewall policies, port forwarding, and IP forwarding via a single high-level configurati ...
With hundreds of targeted classroom sessions, real-life case studies, innovative learning programs, keynotes by industry luminaries and a world-class Exposition, RSA Conference is the unbiased resource thousands of information security professionals aroun ...
RVAsec is the first Richmond, VA based security convention that showcases local talent as well as brings the best speakers to the midatlantic region. RVAsec attracts over 400 security professionals from across the country. The conference is dual-track a ...
SACMAT is a successful series of symposiums that continue the tradition, first established by the ACM Workshop on Role-Based Access Control, of being the premier forum for presentation of research results and experience reports on leading edge issues of a ...
As your business grows and you leverage the Internet to connect customers and partners, your exposure to cyber threats increases. For foolproof network protection that is cost-effective, easily maintained, and remains effective at all times, small busines ...
With a 25-year record of providing high-assurance security solutions to the federal government and the most demanding commercial enterprises, SafeNet is a proven industry leader you can trust to provide remote access to your more sensitive data. SafeNet?s ...
Continually tracking your network’s endpoints, Safend Auditor silently pinpoints all usage of USB, FireWire, PCMCIA, PCI, internal storage and WiFi connections. Displaying complex information comprehensively, Auditor reports can be exported and manipulat ...
Safend Inspector prevents transfer of sensitive company information. As information is processed it is classified and its access permissions and security profile are configured. During data transfer Inspector checks for sensitive information in its c ...
Safend Protector prevents internal/external data leakage by monitoring endpoint devices and data flow. Using granular and customizable security policies and rules, Protector automatically detects, permits and restricts files and encrypts media devices. Ve ...
Safend Reporter automatically generates reports on intentional and unintentional misuse of private company information. Reports can be strategic and periodic and built-in or customized by an administrator. Each report is set in a comprehensive interface a ...
Enjoy the freedom and flexibility of remote working with the peace of mind that your files will remain safe on your secure USB, even in the event of loss or theft with the SafeToGo® Solo. Prevent unauthorised access – with the device’s AES 256-bit XTS en ...
Sagan is an open source (GNU/GPLv2) high performance, real-time log analysis & correlation engine that run under *nix operating systems (Linux/FreeBSD/OpenBSD/etc). It is written in C and uses a multi-threaded architecture to deliver high performance log ...
Before you can secure a network, you have to know how it's threatened. SAINT, or the Security Administrator's Integrated Network Tool, uncovers areas of weakness and recommends fixes. With the SAINT® vulnerability scanner, you can: Identify vulnerabilitie ...