Directory: Random Listings
Centrifuge Analytics makes it easy to harness the power of your data, visualize discoveries, collaborate to draw conclusions and make effective predictions that will have an immediate impact to your organization. Data Discovery Not Data Processing ...
If2k-Only V2.3.0 Security matters ! Lockout adware, spyware, unauthorized downloads, viruses, p2p activity, pornography, legal liabilities -lockout everything except what you determine you want ! The future of your business will depend upon ...
btscanner is a tool designed specifically to extract as much information as possible from a Bluetooth device without the requirement to pair. A detailed information screen extracts HCI and SDP information, and maintains an open connection to monitor the R ...
Linux and other operating systems face a number of threats in a networked environment. It is possible to secure Linux against these threats. The Leading Edge Linux Security course provides an understanding of the security threats as well as the techniques ...
Microsoft Defender is simplified online security that meets you and your family where you are by bringing multiple protections together into a single dashboard. It provides online protection across the devices you and your family use. It offers tips and r ...
AlgoSec FireFlow automates the entire security policy change workflow – from submission and design to risk analysis, implementation, validation and audit - enabling security and operations teams to: Reduce the time required to process firewall changes ...
Hackerproof - The LuciGate Firewall is a piece of dedicated hardware (sometimes referred to as a Firewall Appliance) that sits between your network and the outside world. Without its smartcard key, it will not allow ANY data to pass through it. It is not ...
This course will give you a firm understanding of advanced incident response and computer forensics tools and techniques to investigate data breach intrusions, tech-savvy rogue employees, advanced persistent threats, and complex digital forensic cases. ...
McAfee® Internet Security makes PC and online protection easy for everyone. This set-it-and-forget-it solution comes with award-winning McAfee SiteAdvisor® web security, so you know the safety of web sites before you visit, bank, shop or trade online. Thi ...
Oracle identity and access management solutions secure access to enterprise applications for both cloud and on-premises deployments. Flexible protection for your workloads Oracle Identity and Access Management solutions provide deployment options to pro ...
VPN-Q 2010 is a multi-layer remote access gateway solution which implements real-world security principles by layering strong authentication, health state checking, quarantine control, network access controls and protocol filtering in a single solution. C ...
Hackerproof - The LuciGate Firewall is a piece of dedicated hardware (sometimes referred to as a Firewall Appliance) that sits between your network and the outside world. Without its smartcard key, it will not allow ANY data to pass through it. It is not ...
The Solaris Operating System Network Intrusion Detection course provides students with the knowledge and skills necessary to perform the advanced administration skills required to firewall, monitor, log, identify and respond to network security breaches.
ngrep strives to provide most of GNU grep's common features, applying them to the network layer. ngrep is a pcap-aware tool that will allow you to specify extended regular or hexadecimal expressions to match against data payloads of packets. It currently ...
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks.
This course will give the ultimate comparison of classic Windows attacks directed at Windows 2000 and Windows 2003 networks. Using the unique Foundstone Hands-On approach and an innovative parallel learning technique, you will execute all demonstrations, ...
SourceMeter is an innovative tool built for the precise static source code analysis of C/C++, Java, C#, Python, and RPG projects. This tool makes it possible to find the weak spots of a system under development from the source code only, without the need ...
Qualys is the leading provider of on demand IT security risk and compliance solutions - delivered as a service. Qualys solutions enable organizations of all sizes to easily and cost-effectively ensure that their business technology systems remain highly s ...
Ike-scan is a command-line tool that uses the IKE protocol to discover, fingerprint and test IPSec VPN servers. It is available for Linux, Unix, MacOS and Windows under the GPL license.
The Fox DataDiode helps you to prevent data leakage of classified information, using a one-way connection, while still having access to up-to-date unclassified data such as updates for Anti-Virus or Microsoft Windows. It also prevents unwanted access ...