Directory: Random Listings
The non-intrusive design of McAfee Database Event Monitor for SIEM supports your expanding compliance auditing and reporting requirements and enhances security operations. While it monitors all database transactions, Database Event Monitor for SIEM provid ...
Analyze Skype chat logs, contact lists, SMS messages with SkypeAlyzer a forensic tool designed to work with both the old Skype database files – found in a series of .dbb files and the newer Skype database files (main.db).
PPTP Client is a Linux, FreeBSD, NetBSD and OpenBSD client for the proprietary Microsoft Point-to-Point Tunneling Protocol, PPTP. Allows connection to a PPTP based Virtual Private Network (VPN) as used by employers and some cable and ADSL internet service ...
Unicornscan is a new information gathering and correlation engine built for and by members of the security research and testing communities. It was designed to provide an engine that is Scalable, Accurate, Flexible, and Efficient. It is released for the c ...
The Barracuda NG Firewall is an enterprise-grade next-generation firewall that was purpose-built for efficient deployment and operation within dispersed, highly dynamic, and security-critical network environments. In addition to next-generation firewall ...
The Sophos XG Firewall offers Unified Threat Management (UTM) protections that's easier to manage. Next-Gen Firewall Full Next-Gen Firewall protection with TLS Inspection, IPS, and ATP to stop the latest hacks and attacks. Synchronised Security Your S ...
small bluetooth audit suit containing psm_scan, rfcomm_scan and a script for generating database entries for btdsd
Extend the security capabilities of your Cisco firewall, router, and mobility products to other locations, on demand, with the new Cloud Web Security Connected. This technology directly integrates with the Cisco ASA firewalls, Integrated Services Routers, ...
Prepare every employee with phishing simulations and training Stop dreading the day a phishing attack slips past your cyber defenses. Get the peace of mind from knowing your employees are prepared if it happens. Choose from 1,000+ realistic phishing tem ...
Aker Firewall 5.1 provides the implementation of advanced security measures for corporative networks and systems connected to the Internet: Security, Availability, Reliability and Privacy.
LutelWall (formerly known as Lutel Firewall) is high-level linux firewall configuration tool. It uses human-readable and easy to understand configuration to set up Netfilter in most secure way. Its flexibility allows firewall admins build from very simple ...
SourceMeter is an innovative tool built for the precise static source code analysis of C/C++, Java, C#, Python, and RPG projects. This tool makes it possible to find the weak spots of a system under development from the source code only, without the need ...
Belkasoft Live RAM Capturer is a tiny free forensic tool that allows to reliably extract the entire contents of computer’s volatile memory—even if protected by an active anti-debugging or anti-dumping system. Separate 32-bit and 64-bit builds are availabl ...
The Barracuda Firewall provides extensive application control and user identity functions in an easy-to-use solution. This firewall is optimised for bandwidth-sensitive tasks like packet forwarding and routing layer 7 applications, Intrusion Prevention (I ...
Spamihilator works between your E-Mail client and the Internet and examines every incoming E-Mail. Useless spam mails (Junk) will be filtered out. This process runs completely in the background. The new Learning Filter (Bayesian Filter) uses the rules of ...
The Palo Alto Networks VM-Series comprises three virtualized next-generation firewall models – VM-100, VM-200, and VM-300, supported on VMware ESXi 4.1 and ESXi 5.0 platforms. 2, 4 or 8 CPU cores on the virtualized server platforms can be assign ...
Web Application Firewall & Intrusion Prevention Software for Microsoft IISServer 2016/2019/IIS 10 Support ThreatSentry combines a state-of-the-art Web Application Firewall and port-level firewall with advanced behavioral filtering to block unwanted I ...
One-way data transfer with optical isolation for uncompromising network security & protection Create boundaries between trusted & untrusted networks by creating a physically secure one-way communication channel. Send data from one secure network ...
Endian UTM Highlights Protect and connect your network so you can get back to focusing on your business. Application Control Take control of the network by properly managing time-wasting, high bandwidth or non-business applications like Skype, Wh ...