Directory: Random Listings
Endian Firewall Software Appliance offers the same technology that resides in the unified threat management (UTM) appliances by Endian, making it possible to turn any PC into a full featured security appliance. Unleash the power of Endian Firewall using y ...
Intrusion Prevention System (IPS) for ssh (default port 22), this IPS responds to the suspicious activity by setting the linux firewall (iptables) to block network traffic from the suspected malicious source. Suspicious activity is determined via auth or ...
3 years Full Time
The Forcepoint™ Stonesoft Next Generation Firewall meets both demands by integrating application control, sophisticated evasion prevention and an intrusion prevention system (IPS) into a single solution that is cost-effective and easy to deploy. It has a ...
Enova X-Wall is an embedded hardware Real-time Crypto System ASIC (Application Specific Integrated Circuit) engineered specifically to handle high throughput disk I/O and providing real-time encryption and decryption using DES (Data Encryption Standard),3 ...
The Enterprise Intrusion Analysis course provides students with the skills needed to discover and analyze enterprise intrusions in a UNIX environment. Upon completion of this course, students should be able to: * 1. Detect an enterprise system i ...
srm is a secure replacement for rm(1). Unlike the standard rm, it overwrites the data in the target files before unlinking them. This prevents command-line recovery of the data by examining the raw block device. It may also help frustrate physical examina ...
MailXaminer is a comprehensive email examination tool to carry out a thorough analysis of a bunch of emails and its header. With the help of this tool; forensicators can preview more than 20 email file types and perform advanced search operation within th ...
4 years Full Time
A VPN is a Virtual Private Network. VPNs use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. A VPN provides you with the same capabilities as a system of privat ...
SecurityIQ combines a phishing simulator and computer-based security awareness training in one cloud-based service.
Internet Connection Sharing, Internet Content Filtering , and Network Resource Management Proxy Server for Windows Filter web content with this content filtering software for windows. Control and understand how your Internet connection is being used. W ...
A professional commercial software that provides in-depth IP traffic analysis, traffic accounting and bandwidth monitoring. It contains a network traffic analyzer and collector that supports NetFlow, sFlow, IPFIX, IPv6 and Port Mirroring. It provides cust ...
PhishingBox's Phishing Simulator allows organisations to target any employee or group of employees with a simulated spear phishing attack to test their security awareness. The phishing simulator includes a library of templates which are designed to mimic ...
With the signature Emperor scorpion shape and outline, an industrial grade steel structure, tilting capabilities, integrated audio system, LED lighting and much more, the Emperor is the future of high-end home and office computer work environments. The E ...
Bloxx Inc., the enterprise Web filtering company, offers appliance-based Internet filtering for medium and large organizations in both the business and public sectors. The Bloxx Web filter is a dynamic content filtering solution that uses industry-leading ...
The Innominate mGuard products offer extensive security functions such as VPNs (Virtual Private Networks), firewall and optional virus protection (powered by Kaspersky) ? regardless of the computer platform used. With the Innominate Security Configuration ...
Secure Firewall helps you plan, prioritize, close gaps, and recover from disaster—stronger. Turn intent into action Unify policy across your environment and prioritize what’s important. Having security resilience is about shoring up your architecture ag ...
EMP Cloud substantially expands the former EMP on-premise feature set. Also, it will protect both on-premise email servers, as well as cloud based services such as Office 365 and Gmail.
This five-day course is designed for computer security incident response team (CSIRT) technical personnel with little or no incident-handling experience. Through interactive instruction and practical exercises, the course provides insight into the type an ...