Directory: Random Listings
McAfee Endpoint Protection — Advanced Suite delivers integrated, proactive security that blocks malware and zero-day threats. It protects Windows, Mac, and Linux systems on and off your network. With centralized policy-based management and auditing, Endpo ...
Erase data securely from PCs, laptops, servers and storage environments. This fully automated and centrally managed erasure solution offers cutting edge efficiency and productivity. The most advanced data erasure solution on the market, this next generati ...
Tripwire File Integrity Monitoring (FIM) has the unique, built-in capability to reduce noise by providing multiple ways of determining low-risk change from high-risk change as part of assessing, prioritizing and reconciling detected change. Auto-promoting ...
ProxyStrike is an active Web Application Proxy. It's a tool designed to find vulnerabilities while browsing an application. It was created because the problems we faced in the pentests of web applications that depends heavily on Javascript, not many web s ...
AstroFlowGuard is a Linux-based multi-function tool for network engineers - it incorporates all the proven bandwidth management functionality of AstroFlow, but also incorporates a statefull firewall, intrusion detection system and vpn server. With it's us ...
edgescan is the only hybrid cloud based solution in Europe which combines both vulnerability scanning and manual verification on an on-going basis. It is a SaaS (Software as a Service) solution which detects technical vulnerabilities in Internet-facing sy ...
Internet Security Pro combines the power of COMODO's award-winning Firewall and AntiVirus software to protect your PC from malicious software and Hackers. Removes existing viruses instantly Blocks all unwanted Internet attacks ...
2 years Full Time
Cross Site "Scripter" is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based aplications. It contains several options to try to bypass certain filters, and various special techniques of code injection.
A semi-automated, largely passive web application security audit tool, optimized for an accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-init ...
Organised by the DFN-CERT (German Research Network). Mainly held in German with some international speakers. Visitors range from academic background, industry, civil government and Defence. Usually around mid March.
Darik's Boot and Nuke ("DBAN") is a self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for ...
Reinforce security for hybrid network with SecuExtender as the Zero Trust agent, integrated always-on IPSec VPN, traffic shaping, IKEv2/EAP, supporting devices insight and more granular control over remote workplaces.
Blancco Mobile is designed to securely erase your smartphone’s internal and external memory. Restoring factory settings does not ensure that data is permanently destroyed, because your data can still be recovered afterwards. With Blancco Mobile, all user ...
Centralized Configuration Management, Tracking, and Reporting for WebThe Secure Email and Web Manager simplifies administration by publishing configurations from a single management console to multiple Cisco web security appliances. You can manage updates ...
4 years Full Time
Spam Sleuth monitors your e-mail box behind the scenes and analyzes e- mail messages for spam, Web bugs, phishing scams, and virus characteristics. When your e-mail program gets your e- mail, the spam has already been removed and you can read your message ...
Winfrasoft IAG Appliance solution running IAG 2007 (Microsoft Forefront Edge Security and Access) provides mobile and remote workers an easy to use method of accessing corporate resources from any location, using a variety of end-point devices such kiosks ...
Unicornscan is a new information gathering and correlation engine built for and by members of the security research and testing communities. It was designed to provide an engine that is Scalable, Accurate, Flexible, and Efficient. It is released for the c ...
The premise of the training course is to support the necessary knowledge transfer for a person to be considered a capable, resourceful, and self-sufficient security tester. The training course focuses on the technical skills necessary for security testing ...