Directory: Random Listings
F5's FirePass? SSL VPN appliance provides secure access to corporate applications and data using a standard web browser. Delivering outstanding performance, scalability, ease-of-use, and security, FirePass helps increase the productivity of those working ...
The number one solution for powerful PC surveillance and monitoring needs. Logs all keystrokes, applications, windows, websites, internet connections, passwords, chat conversations, and even screenshots. Also, SpyAgent can filter websites and applications ...
NAP is one of the most desired and highly anticipated features of Microsoft® Windows® Server 2008. NAP is a new platform and solution that controls access to network resources based on a client computer’s identity and compliance with corporate governance ...
WIDZ (Wireless Intrusion Detection System) is an IDS for 802.11. It guards APs and monitors local frequencies for potentially malevolent activity. It can detect scans, association floods, and bogus APs, and it can easily be intergrated with SNORT or Reals ...
KNOPPIX is a bootable CD with a collection of GNU/Linux software, automatic hardware detection, and support for many graphics cards, sound cards, SCSI and USB devices and other peripherals. KNOPPIX can be used as a Linux demo, educational CD, rescue syste ...
Safend Reporter automatically generates reports on intentional and unintentional misuse of private company information. Reports can be strategic and periodic and built-in or customized by an administrator. Each report is set in a comprehensive interface a ...
OpenFPC is a set of scripts that combine to provide a lightweight full-packet network traffic recorder and buffering tool. Its design goal is to allow non-expert users to deploy a distributed network traffic recorder on COTS hardware while integrating int ...
Wifi Analyzer is a free Android app you can use for finding APs on your Android-based smartphone or tablet. It lists the basic details for APs on the 2.4-GHz band, and on supported devices on the 5-GHz band as well. You can export the AP list (in XML form ...
Dell SonicWALL offers a variety of flexible email security solutions to match the unique email security needs of your organization—whether you have one user or 100,000. From appliances and software to virtual appliances and services, all solutions o ...
Becrypt have worked closely with the UK National Cyber Security Centre (NCSC) to support the enhanced security characteristics of NCSC’s Advanced Mobile Solutions program, resulting in the first MDM platform that can support dynamic Deep Packet Inspection ...
3 years Full Time
Emsisoft Mobile Security is a next-gen security solution for Android devices focused on little to no system or battery impact while providing access to a number of security functions in order to help you have a safer and more informed Android experience. ...
Avira AntiVir Server ensures that the central receiving and distributing stations of your network under Windows and Unix are protected against virus attacks. Avira AntiVir does not only have innovative technologies for reliable virus and malware detection ...
Tectia SSH Features Tectia SSH supports FIPS 140-2 certified cryptography Professional support & maintenance, including 24x7 support for business-critical applications Support for business platforms (Windows, Unix/Linux, IBM z/OS Mainframes) Integra ...
Certified Penetration Testing Engineer graduates will obtain real world security knowledge enabling them to recognize vulnerabilities, exploit system weaknesses, and safeguard organizations against threats. Graduates will learn the art of Ethical Hacking ...
We offer, as an extension to our standard set of training courses, "Hot-spot workshops" based on your relevant problems. These workshops are oriented to topical problems of digital evidence seizure, documentation, transportation, analysis and interpretati ...
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and funct ...
Stop those endless popup windows when you surf on the Internet. It works with all web browser. It can even kill those "flying little windows". No change to proxy setting. Distributed network traffic monitor: Display real time network traffic speed for ...
The WiFi Pineapple is a unique device developed by Hak5 for the purpose of WiFi auditing and penetration testing. Since 2008 the WiFi Pineapple has grown to encompass the best rogue access point features, unique purpose-built hardware, intuitive web inter ...
FIRST conferences promote worldwide coordination and cooperation among Computer Security Incident Response Teams (CSIRTs). The conference provides a forum for sharing goals, ideas, and information on how to improve global computer security. The five-day e ...