Directory: Random Listings
netfilter.org is home to the software of the packet filtering framework inside the Linux 2.4.x and later kernel series. Software commonly associated with netfilter.org is iptables. Software inside this framework enables packet filtering, network address [ ...
Cisco Cloud Web Security (CWS) provides industry-leading security and control for the distributed enterprise. Users are protected everywhere, all the time when using CWS through Cisco worldwide threat intelligence, advanced threat defense capabilities, an ...
NetSentron NS200 Server is a standalone security appliance that answers the need for a complete, simple, secure and cost-effective method of keeping your network safe while at the same time giving you the ability to connect remote users to the corporate n ...
Zoho Vault offers a robust free plan for individuals, with easy-to-use unlimited password storage, and flexible business plans for teams. Powerful security dashboards Get clear security insights into both your personal and business passwords. Identify a ...
This is a practical hands-on two-day workshop on database security. It covers crucial aspects of Oracle and MS SQL Security and ensures an effective knowledge transfer with hands-on exercises. The course begins by looking at typical attack scenarios again ...
RAC Information Security Training Centre offers a standard set of computer forensic training courses. We offer, as an extension to our standard set of training courses, "Hot-spot workshops" based on your relevant problems. These workshops are oriented to ...
3 years Full Time
AIWAF from MONITORAPP can defend against attacks through the web, from DDoS attacks to OWASP 10 vulnerabilities, to NIS 8 vulnerabilities SQL injection / XSS attacks, to web shell attacks. Self-learning profiling implements profile DB based on the normal ...
16 months Full Time
CSI SX: The event that has become synonymous with security solutions for your business. At CSI SX, innocent servers may wind up dead. First, we invent a company with a global sales team. Then we build that sales team a real network, a private cloud, ...
Resilience offers iHA? firewall/VPN solutions in the performance range and expandability for users who vary from high-traffic telecom carriers all the way down to low-traffic SMBs and ROBOs. Covered by the Continuous Secured Ownership WarrantySM, these ar ...
Mac Forensics Training Featured
This forensics training course (3 days) gives delegates a practical understanding of Data structures and potential evidence as produced in Apple Mac OS X environments and Implementing forensic tools on Mac OS X-based file systems. Highlights of this t ...
Packet Analysis and Intrusion Detection 5 Day You'll learn how to properly read and interpret packets and packet headers including IP, TCP, ICMP, and UDP. You will learn how to distinguish between normal, abnormal, and malicious traffic. You will also c ...
Since 1996, the NordSec workshops have brought together computer security researchers and practitioners from the Nordic countries, Northern Europe, and elsewhere. The workshop is focused on applied computer security and is intended to encourage interchang ...
OSSIM provides all of the features that a security professional needs from a SIEM offering – event collection, normalization, and correlation. Established and launched by security engineers out of necessity, OSSIM was created with an understanding of the ...
PixelPin is a B2B2C solution which replaces passwords with pictures. Users choose a picture and click on it in 4 places in sequence to sign in. Key benefits of PixelPin's picture password Simple, quick & easy to use across all platforms On mobile d ...
Packet filtering is the selective passing or blocking of data packets as they pass through a network interface. The criteria that pf(4) uses when inspecting packets are based on the Layer 3 (IPv4 and IPv6) and Layer 4 (TCP, UDP, ICMP, and ICMPv6) headers. ...
Ipswitch WhatsUp Gold is the world's leading network management software with over 70,000 networks reliably monitored worldwide. Built on a scalable and extensible architecture offering automated device discovery and network mapping, real-time SNMP and WM ...
Tighten security with Firewall as a Service Legacy firewalls can protect the company’s internal perimeter, but they can’t ensure its safety across hybrid clouds. Perimeter 81's Firewall as a Service ensures that only authorized users can connect to your ...
Safeguard your sensitive company data. Blue Coat Data Loss Prevention (DLP) enables you to detect and block potential data leaks quickly and accurately, all while achieving industry and regulatory compliance. With Blue Coat DLP, you can leverage powerful ...