Michele M Jordan

Entrust Entelligence™ Disk Security, based on the award-winning Pointsec for PC technology, can enable automatic full disk encryption for laptop and desktop security. Full disk encryption protects all data on the disk, including the operating system ...

VendorEntrust
Pricing ModelCommercial
Modified
AlertBoot

AlertBoot offers a cloud-based full disk encryption, file encryption and mobile device security service for companies of any size who want a scalable and easy-to-deploy solution. Centrally managed through a web based console, AlertBoot offers mobile devic ...

VendorData Guard Systems Inc
Pricing ModelCommercial
Modified

The course begins by covering fundamental aspects of malware analysis. You'll learn how to set up an inexpensive and flexible laboratory for understanding the inner-workings of malicious software and will understand how to use the lab for exploring charac ...

Category Virus Training
VendorSANS
Pricing ModelCommercial
Modified
CFIP Certified Forensic Investigation Practitioner

3 day practical computer forensics training course - Learn about forensic principles, evidence continuity and methodology to employ when conducting a forensic investigation. Using practical case scenarios, you will be guided through the process ...

Vendor7Safe
Pricing ModelCommercial
Modified

NNT Change Tracker Gen provides continuous protection against known and emerging cyber security threats in an easy to use solution, offering true enterprise coverage through agent-based and agentless monitoring options. NNT Change Tracker Generation 7 u ...

VendorNew Net Technologies
Pricing ModelCommercial
Modified
Penetration Testing with Kali Linux

Penetration Testing with Kali (PWK) is a self-paced online pen testing course designed for network administrators and security professionals who want to take a serious and meaningful step into the world of professional penetration testing. This unique pen ...

Category Ethical Hacking
VendorOffensive Security
Pricing ModelCommercial
Modified
Snort Certified Professional (SnortCP)

This certification option is centered on Snort, the industry leading open source intrusion prevention solution. Candidates are assessed on a wide range of criteria that encompasses all the necessary open source components and technical skills for successf ...

VendorSourcefire
Pricing ModelCommercial
Modified
FlowMon

The FlowMon solution delivers the flow-based (NetFlow/IPFIX) monitoring for all organizations and all networks from 10 Mbps to 10 Gbps. It provides the statistics necessary for network monitoring, security, troubleshooting, IP accounting and billing, capa ...

VendorINVEA-TECH a.s.
Pricing ModelCommercial
Modified
Nexor Data Diode

The Nexor Data Diode is an EAL7+* evaluated solution to the information sharing problem by only allowing data transfers in one direction, guaranteeing that no data will leak back from the secure to the less secure network.

Category Data Diodes
VendorNexor Limited
Pricing ModelCommercial
Modified
QualysGuard Vulnerability Management

Qualys is the leading provider of on demand IT security risk and compliance solutions - delivered as a service. Qualys solutions enable organizations of all sizes to easily and cost-effectively ensure that their business technology systems remain highly s ...

Category Network Scanners
VendorQualys
Pricing ModelService
Modified
"Hacker" Button-down Work Shirt

Button-down work shirt with a typical Name Patch that reads "Hacker". Think of this buttondown as a polite reminder for your co-workers that they should not make you angry. When they do (and they *will*), just tap the patch lightly, give a casual wink, ...

Category Geeky Gadgets
VendorJinx, Inc.
Pricing ModelCommercial
Modified

Pytbull is a python based flexible IDS/IPS testing framework shipped with more than 300 tests, grouped in 9 modules, covering a large scope of attacks (clientSideAttacks, testRules, badTraffic, fragmentedPackets, multipleFailedLogins, evasionTechniques, s ...

Category IPS Network
VendorSébastien Damaye
Pricing ModelOpen Source
Modified

HostingArmor scans your server for more than 40,000 vulnerabilities each day - alerting you to the latest security holes in your system. HostingArmor's scanning and reporting technology uses the Nessus scanning engine - an Enterprise class scanner. Our v ...

VendorHosting Armor
Pricing ModelService
ModifiedNever

Manage all of your vulnerability data from 3rd party scanners with one console. proVM Auditor ingests data from vulnerability assessment scanners and allows you to perform centralized analysis of all of your findings. The SQL database supports features su ...

VendorProlific Solutions
Pricing ModelCommercial
Modified
OSSIM™ - Open Source SIEM

OSSIM provides all of the features that a security professional needs from a SIEM offering – event collection, normalization, and correlation. Established and launched by security engineers out of necessity, OSSIM was created with an understanding of the ...

VendorAlienVault
Pricing ModelOpen Source
Modified
KeePass Password Safe

Today you need to remember many passwords. You need a password for the Windows network logon, your e-mail account, your website's FTP password, online passwords (like website member account), etc. etc. etc. The list is endless. Also, you should use differ ...

VendorKeePass
Pricing ModelFreeware
Modified
MailXaminer

MailXaminer is a comprehensive email examination tool to carry out a thorough analysis of a bunch of emails and its header. With the help of this tool; forensicators can preview more than 20 email file types and perform advanced search operation within th ...

Category Forensic Tools
VendorSysTools Software
Pricing ModelShareware
Modified
edgescan

edgescan is the only hybrid cloud based solution in Europe which combines both vulnerability scanning and manual verification on an on-going basis. It is a SaaS (Software as a Service) solution which detects technical vulnerabilities in Internet-facing sy ...

VendorBCC Risk Advisory
Pricing ModelCommercial
Modified

This hands-on track offers a practical working knowledge in intrusion detection and traffic analysis, taught by top practitioners/authors in the field. This is the most advanced program in network intrusion detection that has ever been taught. All of the ...

VendorSANS
Pricing ModelCommercial
Modified
VendorJuniper Networks
Pricing ModelCommercial
Modified

© Computer Network Defence Limited 2021