Skip to main content

Directory: Random Listings 

Results 941 - 960 of 1235
Offensive Security
Commercial

Penetration Testing with Kali (PWK) is a self-paced online pen testing course designed for network administrators and security professionals who want to take a serious and meaningful step into the world of professional penetration testing. This unique pen ...

Category Ethical Hacking
Penetration Testing with Kali Linux
McAfee
Commercial

What Will You Learn? Understand the key security features of the J2EE platform, the common web security pitfalls developers make and how to build secure and reliable web applications using Java. Students are lead through hands on code examples that highli ...

Open Field Software
Freeware

Whether you're a business or home user, you can take control of your email and stop spam with the world's best spam filter - Ella for Spam Control. Ella is more than just spam filter software; it keeps important email in your inbox, moves your electronic ...

Ella for Spam Control
Check Point Software Technologies Ltd
Freeware

Get protected against inbound and outbound cyber attacksBlock unwanted traffic and control program access to the internetBecome invisible to hackers and guard your personal dataSecure your browsing experience with Web Secure Free

ZoneAlarm Free Firewall
DigiPortal Software

ChoiceMail is the anti-spam program that puts you in complete control of your mailbox. It lets you treat your Inbox the same way you treat your front door. You decide who gets in and who doesn't. With ChoiceMail, you will never get another piece of unwant ...

Snare
Commercial

Snare Central will help security teams worldwide meet evolving log management and collection requirements, enhance network security, and combat cyber attacks with richer data and reporting capabilities. Designed to help meet the demands of both public and ...

Snare Central
Middlesex University
Open Source

3 years Full Time

InfoExpress, Inc.
Commercial

CyberGatekeeper LAN and CyberGatekeeper Remote let systems access the network only after verifying they comply with security policies. If systems are not in compliance or do not participate in the audit, they are kept in a quarantine network. With network ...

CyberGatekeeper
Elcomsoft Co. Ltd
Commercial

Perform the complete forensic analysis of encrypted disks and volumes protected with desktop and portable versions of BitLocker, PGP and TrueCrypt. Elcomsoft Forensic Disk Decryptor allows decrypting data from encrypted containers or mounting encrypted vo ...

Category Forensic Tools
Forensic Disk Decryptor
Nicolas Surribas
Open Source

Wapiti - Web application vulnerability scanner / security auditor Wapiti allows you to audit the security of your web applications. It performs "black-box" scans, i.e. it does not study the source code of the application but it will scan the webpages of ...

Category Website Scanners
NetIQ
Commercial

NetIQ Security Solutions for iSeries helps you eliminate security risks and maintain business continuity across your iSeries environment by providing simplified auditing, intrusion protection, vulnerability management and security administration for your ...

Category Host IPS
NetIQ Security Solutions for iSeries
SUPERAntiSpyware
Freeware

Advanced Detection and Removal: Detect and Remove Spyware, Adware and Remove Malware, Trojans, Dialers, Worms, KeyLoggers, HiJackers, Parasites, Rootkits, Rogue Security Products and many other types of threats. Light on System Resources and designed ...

SUPERAntiSpyware

The Asiacrypt Conferences are series of annual International Conference on Theory and Application of Cryptology and Information Security. The conference is sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the ...

Cisco
Commercial

Secure Endpoint offers advanced endpoint protection across control points, enabling your business to stay resilient. Powerful EDR capabilities Stop threats with built-in or completely managed endpoint detection and response (EDR), threat hunting, and in ...

Cisco Secure Endpoint
TrendMicro
Commercial

Deep Security protects confidential data and critical applications to help prevent data breaches and ensure business continuity, while enabling compliance with important standards and regulations such as PCI, FISMA and HIPAA. Whether implemented as softwa ...

Category IPS Network
Trend Micro Deep Security
NT Kernel Resources
Commercial

NeT Firewall is a comprehensive stateful firewall solution built to protect Windows-based systems not currently protected by a firewall. Stateful inspection technology tracks each packet traversing the firewall and makes sure that they are legitimate. A ...

Sucuri Incorporated
Commercial

Sucuri is a managed security service provider for websites. Their cloud-based platform gives you complete website security, including an antivirus and firewall for your website. Monitors for security incidents, fixes website hacks, and protects your site ...

Category WAF - Cloud
Sucuri Firewall
Trellix
Commercial

Trellix Endpoint Security provides your prioritized security needs—from preventing threats and hunting them to tailoring security controls. Machine learning to identify and prevent new malwareMachine-learning behavior classification detects zero-day thre ...

Trellix Endpoint Security
Roaring Penguin Software Inc.
Commercial

Hosted CanIt® automatically protects email from Spam. Ads, fraud schemes, porn, viruses, phishing attempts... if it's junk e-mail, Roaring Penguin's Hosted CanIt will stop it before it reaches your mail server without the need for installing any softw ...

Kroll Ontrack Ltd
Commercial

Ontrack PowerControls recovers individual mailboxes, messages and attachments without needing to restore the entire backup. Use the powerful search capability to rapidly find the items you need for eDiscovery and compliance. Versions for Exchange, ShareP ...

Category Forensic Tools
Ontrack PowerControls