Michele M Jordan

Top Layer's Attack Mitigator? IPS is a family of high performance, ASIC-based intrusion prevention solutions with intelligent blocking and control against the most prevalent cyber attacks. Hybrid attacks such as HTTP worms, DoS / DDoS attacks, protocol an ...

VendorTop Layer Networks
Pricing ModelCOMMERCIAL
Modified

NetStumbler is a Windows utility for 802.11b based wireless network auditing

Category Wireless Tools
ModifiedNever

Check Point VPN-1 Pro provides you the most intelligent, reliable security for stopping attacks while simplifying business communications across the Internet. A tightly integrated combination of firewall, VPN and intrusion prevention, VPN-1 Pro is built o ...

VendorCheck Point Software Technologies Ltd.
Pricing ModelCommercial
Modified

floppyfw is a router with the advanced firewall-capabilities in Linux that fits on one single floppy disc.

VendorThomasez@zelow.no
Pricing ModelFree
Modified

Crossbeam Systems X-Series equipment delivers flexible, high scaling network security in perimeter, core and data center architectures. Carriers use the X-Series to deliver a new generation of virtualized services such as firewall, VPN and intrusion preve ...

VendorCrossbeam Systems Inc.
Pricing ModelCommercial
ModifiedNever

The @stake Sleuth Kit (TASK) allows an investigator examine the file systems of a suspect computer in a non-intrusive fashion. TASK is a collection of UNIX-based command line tools that can analyze NTFS, FAT, FFS, EXT2FS, and EXT3FS file systems. TASK rea ...

VendorBrian Carrier
Pricing ModelFREEWARE
Modified

Do you need to analyze multiple variations of essentially the same program ? Do you need to understand the changes between two versions of a program ? Are you trying to detect code theft ? SABRE BinDiff uses a unique graph-theoretical approach to allow co ...

Category Forensic Tools
VendorZynamix GmbH
Pricing ModelCommercial
Modified
SafeGuard Encryption

Sophos SafeGuard Enterprise Encryption 7, formally SafeGuard Easy, introduces the most complete data protection solution on the market today, protecting data on multiple devices and operating systems. Whether your data resides on a laptop, a mobile device ...

VendorSophos PLC
Pricing ModelCommercial
Modified

CyberGatekeeper LAN and CyberGatekeeper Remote let systems access the network only after verifying they comply with security policies. If systems are not in compliance or do not participate in the audit, they are kept in a quarantine network. With network ...

VendorInfoExpress
Pricing ModelCommercial
Modified

The Black Hat Briefings brings together a unique mix in security: the best minds from government agencies and global corporations with the most respected independent researchers and hackers. These forums take place regularly in Las Vegas, Amsterdam, Tokyo ...

ModifiedNever

TThe goal of this seven-day accelerated course is to provide information security professionals a fully-immersed, zero-distraction, all-inclusive CISSP CBK training and certification experience. Our CISSP Firebrand Training encompasses the (ISC)2 CISSP CB ...

Category CISSP Training
VendorFirebrand Training
Pricing ModelCommercial
Modified

Arbor Networks' Peakflow X security platform was purpose-built to meet the demands of the largest enterprises, addressing a wide range of external and internal security threats while maintaining business continuity. It constructs a system-wide view of the ...

VendorArbor Networks
Pricing ModelCommercial
ModifiedNever
GFI WebMonitor

WebFilter edition: Includes time- and bandwidth-based browsing control, as well as website categorization and URL filtering for increased productivity and security WebSecurity edition: Includes download control, virus scanning through multiple anti-virus ...

Category Guards Web
VendorGFI Software
Pricing ModelCommercial
Modified

Retina can scan every machine on your network, including a variety of operating system platforms (e.g. Windows, Unix, Linux), networked devices (e.g. firewalls, routers, etc.), databases and third-party or custom applications, all in record time. After sc ...

Category Network Scanners
VendoreEye Digital Security
Pricing ModelCommercial
Modified
NetWitness NextGen

NetWitness NextGen is designed for enterprises to address concurrent problems of insider threat management, data leakage protection, compliance verification, network e-discovery, and designer malware and zero-day detection. Originally developed for the US ...

VendorNetWitness Corporation
Pricing ModelCommercial
Modified

This course will give you a firm understanding of advanced incident response and computer forensics tools and techniques to investigate data breach intrusions, tech-savvy rogue employees, advanced persistent threats, and complex digital forensic cases. ...

VendorSANS
Pricing ModelCommercial
Modified

IBM Security Network Intrusion Prevention System appliances are designed to stop constantly evolving threats before they impact your business. This means providing both high levels of protection and performance, while lowering the overall cost and complex ...

Category IPS Network
VendorIBM
Pricing ModelCommercial
Modified

Wide-spectrum: SpamAssassin uses a wide variety of local and network tests to identify spam signatures. This makes it harder for spammers to identify one aspect which they can craft their messages to work around.   Free software: it is distributed ...

VendorThe Apache Software Foundation
Pricing ModelOpen Source
Modified

With an intuitive, yet flexible GUI, and unmatched performance, EnCase Version 4 provides investigators with the tools to conduct large-scale and complex investigation with accuracy and efficiency. Our award winning solution yields completely non-invasive ...

VendorGuidance Software, Inc.
Pricing ModelCommercial
Modified

Firestarter is an Open Source visual firewall program. The software aims to combine ease of use with powerful features, therefore serving both Linux desktop users and system administrators. We strongly believe that your job is to make the high level secur ...

VendorTomas Junnonen
Pricing ModelFree/Open Source
Modified

© Computer Network Defence Limited 2021