Skip to main content

Directory: Random Listings 

Results 861 - 880 of 1235
Applied Computer Security Association
Commercial

The Annual Computer Security Applications Conference (ACSAC) is an internationally recognized forum where practitioners, researchers, and developers in information and system security meet to learn and to exchange practical ideas and experiences. If you a ...

Emsisoft
Limited Free Trial

Strong security starts with a malware-free device. Two eyes are better than one – Emsisoft has combined two powerful antivirus technologies into one lightning-fast scanner. Designed to be as efficient as possible, this dual-engine scanner allows you to de ...

Emsisoft Anti-Malware
G-Lock Software
Commercial

G-Lock SpamCombat uses a set of spam email filters to prevent spam from entering your inbox: Complex Filter, Whitelist, Blacklist, HTML Validator, DNSBL filter, and the Bayesian filter. With our filtering software spam does not even reach your inbox. G-L ...

Spam Combat
Teramind
Commercial

The weakest link in most systems is invariably the human element. How do you ensure that confidential files do not get uploaded to the cloud?, how can you tell if a disgruntled employee is carrying out malicious activities which compromise the integrity o ...

Net-Security Training

This course is for those IT professionals who want to master network security. In our course they will learn the best practices to safe-guard their network perimeter. We offer training on using Multi-Vendor firewall products such as Zone Alarm, Smoothwall ...

IBM Corporation
Commercial

Learn how to set up and administer a Linux(TM)-based firewall.

University of Glamorgan, Cardiff and Pontypridd
Open Source

2 years Full Time

Broadcom
Commercial

Content Analysis delivers multi-layer file inspection to better protect your organization against known and unknown threats. Unknown or suspicious content from sources like Proxy, Messaging Gateway, or other tools is delivered to Content Analysis for deep ...

Category Appliances
Content Analysis and Sandboxing
Siemens AG
Commercial

DirX Access is a comprehensive access management and identity federation solution for protecting Web services and Web applications against unauthorized access. User access is controlled and enforced on the basis of central role-based security policies ...

Birmingham City University
Open Source

4 years Full Time / 5 years Full Time

Hoxhunt
Commercial

Phishing Training Designed for People. Built for Enterprise. Cognitive automation enables individual learning paths that motivate people to recognize and report real attacks. 90% of breaches start with email. Focus your training where it's needed most. ...

Hoxhunt Phishing Training
Novell
Commercial

Stellar perimeter security and a clear path to the future. Novell BorderManager has been keeping systems secure and employees productive for nearly a decade. And the newly-released Novell BorderManager 3.9 continues this tradition. Like earlier versions, ...

Category VPN Servers
University of Westminster
Commercial

The Cyber Security and Forensics MSc is is fully certified by the National Cyber Security Centre (NCSC), marking it as a program of national excellence. The course focuses on two key areas: Cyber Security, where you will learn to analyse and mitigate ris ...

Collin Mulliner and Martin Herfurt

Blueprinting is a method to remotely find out details about bluetooth-enabled devices. Blueprinting can be used for generating statistics about manufacturers and models and to find out whether there are devices in range that have issues with Bluetooth sec ...

De Montfort University
Open Source

3 years Full Time / 4 years Sandwich Course

IH
Commercial

For many years, Information Hiding has captured the imagination of researchers. Digital watermarking and steganography tools are used to address digital rights management, protect information, and conceal secrets. From an investigators perspective, inform ...

Beyond Security
Service

WSSA examines your website pages, applications and web servers to find security weaknesses and vulnerabilities that would give hackers an opportunity to do damage. Every scan starts by testing the equipment that hosts your site. No matter how carefully c ...

Web Site Security Audit
Middlesex University
Open Source

3 years Full Time

SoftTree Technologies
Limited Free Trial

DB Audit and Security 360 is a complete out-of-the-box database security & auditing solution for Oracle, Sybase, MySQL, DB2 and MS SQL Server. DB Audit allows database and system administrators, security administrators, auditors and operators to track and ...

DB audit and Security 360
Rocket Software Inc.
Commercial

NetCure Discovery is a free version of NetCure that autodiscovers your network from layer-2 to layer-7. Use NetCure Discovery to browse and print images of your network topology.

Category Network Mapping
Rocket NetCure