Skip to main content

Directory: Random Listings 

Results 561 - 580 of 1235
Centrifuge Analytics
Limited Free Trial

 Centrifuge Analytics makes it easy to harness the power of your data, visualize discoveries, collaborate to draw conclusions and make effective predictions that will have an immediate impact to your organization. Data Discovery Not Data Processing ...

Category Forensic Tools
Turner and Sons Productions Inc.
Commercial

If2k-Only V2.3.0    Security matters ! Lockout adware, spyware, unauthorized downloads, viruses, p2p activity, pornography, legal liabilities -lockout everything except what you determine you want ! The future of your business will depend upon ...

Category Uncategorised
Internet Filter if2k
Kali Linux
Freeware

btscanner is a tool designed specifically to extract as much information as possible from a Bluetooth device without the requirement to pair. A detailed information screen extracts HCI and SDP information, and maintains an open connection to monitor the R ...

Leading Edge Business Solutions (Pty) Ltd

Linux and other operating systems face a number of threats in a networked environment. It is possible to secure Linux against these threats. The Leading Edge Linux Security course provides an understanding of the security threats as well as the techniques ...

Microsoft
Commercial

Microsoft Defender is simplified online security that meets you and your family where you are by bringing multiple protections together into a single dashboard. It provides online protection across the devices you and your family use. It offers tips and r ...

Microsoft Defender
AlgoSec Inc.
Commercial

AlgoSec FireFlow automates the entire security policy change workflow – from submission and design to risk analysis, implementation, validation and audit - enabling security and operations teams to: Reduce the time required to process firewall changes ...

AlgoSec FireFlow
Lucidata Data Communications Consultants
Commercial

Hackerproof - The LuciGate Firewall is a piece of dedicated hardware (sometimes referred to as a Firewall Appliance) that sits between your network and the outside world. Without its smartcard key, it will not allow ANY data to pass through it. It is not ...

SANS
Commercial

This course will give you a firm understanding of advanced incident response and computer forensics tools and techniques to investigate data breach intrusions, tech-savvy rogue employees, advanced persistent threats, and complex digital forensic cases. ...

McAfee
Commercial

McAfee® Internet Security makes PC and online protection easy for everyone. This set-it-and-forget-it solution comes with award-winning McAfee SiteAdvisor® web security, so you know the safety of web sites before you visit, bank, shop or trade online. Thi ...

McAfee Internet Security
Oracle
Commercial

Oracle identity and access management solutions secure access to enterprise applications for both cloud and on-premises deployments. Flexible protection for your workloads Oracle Identity and Access Management solutions provide deployment options to pro ...

Oracle Identity and Access Management
Winfrasoft
Commercial

VPN-Q 2010 is a multi-layer remote access gateway solution which implements real-world security principles by layering strong authentication, health state checking, quarantine control, network access controls and protocol filtering in a single solution. C ...

Category VPN Clients
VPN-Q 2010
Lucidata Data Communications Consultants
Commercial

Hackerproof - The LuciGate Firewall is a piece of dedicated hardware (sometimes referred to as a Firewall Appliance) that sits between your network and the outside world. Without its smartcard key, it will not allow ANY data to pass through it. It is not ...

LuciGate Firewall
Oracle
Commercial

The Solaris Operating System Network Intrusion Detection course provides students with the knowledge and skills necessary to perform the advanced administration skills required to firewall, monitor, log, identify and respond to network security breaches.

Jordan Ritter
Open Source

ngrep strives to provide most of GNU grep's common features, applying them to the network layer. ngrep is a pcap-aware tool that will allow you to specify extended regular or hexadecimal expressions to match against data payloads of packets. It currently ...

The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks.

McAfee
Commercial

This course will give the ultimate comparison of classic Windows attacks directed at Windows 2000 and Windows 2003 networks. Using the unique Foundstone Hands-On approach and an innovative parallel learning technique, you will execute all demonstrations, ...

Category Windows Security
FrontEndART Ltd.
Commercial

SourceMeter is an innovative tool built for the precise static source code analysis of C/C++, Java, C#, Python, and RPG projects. This tool makes it possible to find the weak spots of a system under development from the source code only, without the need ...

Qualys
Service

Qualys is the leading provider of on demand IT security risk and compliance solutions - delivered as a service. Qualys solutions enable organizations of all sizes to easily and cost-effectively ensure that their business technology systems remain highly s ...

Category Network Scanners
QualysGuard Vulnerability Management
NTA Monitor
Freeware

Ike-scan is a command-line tool that uses the IKE protocol to discover, fingerprint and test IPSec VPN servers. It is available for Linux, Unix, MacOS and Windows under the GPL license.

Category Network Mapping
Ike-Scan
Fox-IT
Commercial

The Fox DataDiode helps you to prevent data leakage of classified information, using a one-way connection, while still having access to up-to-date unclassified data such as updates for Anti-Virus or Microsoft Windows. It also prevents unwanted access ...

Category Data Diodes