Skip to main content

Directory: Random Listings 

Results 461 - 480 of 1235
Leading Edge Business Solutions (Pty) Ltd

Linux and other operating systems face a number of threats in a networked environment. It is possible to secure Linux against these threats. The Leading Edge Linux Security course provides an understanding of the security threats as well as the techniques ...

Stellar Data Recovery
Commercial

Bitraser is a certified and secure data erasing software which permanently deletes hard disk data beyond the scope of data recovery. It supports multiple international erasure standards such as DoD 3 passes / 7 passes and NIST.

Bitraser
Open Text
Commercial

OpenText EnCase Forensic is a court-proven solution for finding, decrypting, collecting and preserving forensic data from a wide variety of devices, while ensuring evidence integrity and seamlessly integrating investigation workflows. Thorough evidence c ...

Category Remote Forensics
EnCase Forensic
Systems & Network Training Ltd

A hands on training course focusing on security in the Microsoft environment. The course progresses from patch management onto the use of Microsoft security tools. Then server, desktop and network security are studied in the Microsoft environment.

Category Windows Security
CIRT Inc
Open Source

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, versions on over 1200 servers, and version specific problems on over 270 serv ...

Category Website Scanners
Nikto
Sheffield Hallam University
Open Source

4 years Sandwich Course

Firetrust Ltd.
Commercial

Spam messages continuously adapt in order to bypass even the newest protection methods, and that’s why in order to achieve complete efficiency the antispam tools should also be in a continuous adapting process, learning permanently new ways to detec ...

Mailwasher Pro
Aker Security Solutions
Commercial

Aker Firewall 5.1 provides the implementation of advanced security measures for corporative networks and systems connected to the Internet: Security, Availability, Reliability and Privacy.

deepbit
Open Source

ProxyStrike is an active Web Application Proxy. It's a tool designed to find vulnerabilities while browsing an application. It was created because the problems we faced in the pentests of web applications that depends heavily on Javascript, not many web s ...

Category Website Scanners
Synopsys, Inc.
Commercial

Synopsys Static Analysis (Coverity) is a fast, accurate and scalable static analysis (SAST) solution that helps development and security teams address security and quality defects early in the software development lifecycle. Track and manage risks ac ...

Dan Farmer and Wietse Venema
OPEN SOURCE

TCT is a collection of programs by Dan Farmer and Wietse Venema for a post-mortem analysis of a UNIX system after break-in. The software was presented first in a Computer Forensics Analysis class in August 1999 (handouts can be found here). Examples of us ...

BeCrypt Limited
Commercial

Disk Protect is a full disk encryption solution for business, designed to protect data-at-rest held on desktops, laptops, tablets and servers from theft or loss. The solution transparently encrypts device data and uses strong authentication to prevent una ...

DISK Protect
BCC Risk Advisory
Commercial

edgescan is the only hybrid cloud based solution in Europe which combines both vulnerability scanning and manual verification on an on-going basis. It is a SaaS (Software as a Service) solution which detects technical vulnerabilities in Internet-facing sy ...

edgescan
Tripwire, Inc
Commercial

Tripwire File Integrity Monitoring (FIM) has the unique, built-in capability to reduce noise by providing multiple ways of determining low-risk change from high-risk change as part of assessing, prioritizing and reconciling detected change. Auto-promoting ...

Tripwire
Roaring Penguin Software Inc.
Commercial

Hosted CanIt® automatically protects email from Spam. Ads, fraud schemes, porn, viruses, phishing attempts... if it's junk e-mail, Roaring Penguin's Hosted CanIt will stop it before it reaches your mail server without the need for installing any softw ...

Blancco
Commercial

Erase data securely from PCs, laptops, servers and storage environments. This fully automated and centrally managed erasure solution offers cutting edge efficiency and productivity. The most advanced data erasure solution on the market, this next generati ...

University of West of England
Open Source

3 years Full Time / 4 years Sandwich Course

Cisco
Commercial

Cisco IOS NetFlow efficiently provides a key set of services for IP applications, including network traffic accounting, usage-based network billing, network planning, security, Denial of Service monitoring capabilities, and network monitoring. NetFlow pro ...

University of Maryland - University College
Open Source

The bachelor's degree program in computer networks and cybersecurity begins with courses designed to build your foundational IT skills. You'll then focus on the network security side of IT, learning Microsoft and Cisco technologies as well as other cybers ...

Computer Networks and Cybersecurity