Directory: Random Listings
The Remote Forensics architecture allows companies to reduce their investigation budgets and enable analysts to work more productively by providing a fast, secure and effective incident response framework that enforces a consistent methodology allowing an ...
Information assurance and security has become an important research issue in networked and distributed information sharing environments. Finding effective ways to protect information systems, networks and sensitive data within the critical information inf ...
Discover and protect sensitive data on premises and in the cloud. Identify Business Critical DataClassify structured and unstructured data with exact data matching and over 300 content types. Get Powerful ReportingCreate reports on demand or schedule fo ...
The vBroker Series provides you with flexible yet advanced network visibility by accessing, optimizing, and delivering traffic from multiple networks to multiple network monitoring and security tools – both passive and active (inline). Featuring both fix ...
The Offensive Security Web Expert (OSWE) is an entirely hands-on web application penetration testing security certification. The OSWE challenges the students to prove they have a clear and practical understanding of the web application assessment and hack ...
About Real time, system wide monitoring Monitoring technology knows what every process on your machine is doing at every given moment - and is specially designed to be lightweight and with a small footprint. Behavioural based detection Purely behaviou ...
Built to protect your PC, and your online life Malware protectionStops viruses, spyware, and malware with six powerful layers of protection Email ShieldBlocks dangerous email attachments and phishing links that could steal your data Real-time updatesUp ...
Our server is ready to send traffic to your computer. You may select either of two methods. If you would like to simply generate some event traffic on your computer to test the event notification dialog and see some events in the log choose the simple pro ...
The premise of the training course is to support the necessary knowledge transfer for a person to be considered a capable, resourceful, and self-sufficient security tester. The training course focuses on the technical skills necessary for security testing ...
Seagate Secure™ encryption hard drives keep your data safe even if your drives are lost, stolen, or misplaced. * Instant Secure Erase renders all data on the hard drive unreadable in less than a second via a cryptographic erase of the data encryption ke ...
mSecure is a leading password manager and digital wallet. Your data is safe in mSecure because it uses 256bit Blowfish encryption to protect your most personal information, account numbers, usernames, passwords and more! Guard your passwords with confi ...
Omega DB Security Reporter is a security auditing and software-only solution for Oracle Databases. Implementing quick reporting, visualisation and documentation of the security posture of the Oracle database on the following security areas: System Priv ...
The BrightCloud Mobile Security SDK for Android™ and iOS® addresses mobile device vulnerabilities by enabling mobile management partners to offer enhanced security for their customers. It features antivirus, antimalware, device and application interrogati ...
The Quantum Spark Next Generation Firewalls for small and medium size businesses, feature best-in-class threat protection, are easy to deploy and manage, and integrate communication and security into an “all in one” security gateway solution. Quantum Spa ...
OpenDLP Popular
OpenDLP is a free and open source, agent- and agentless-based, centrally-managed, massively distributable data loss prevention tool released under the GPL. Given appropriate Windows, UNIX, MySQL, or MSSQL credentials, OpenDLP can simultaneously id ...
2 years Full Time / 3 years Sandwich Course
The WPScan CLI tool is a free, for non-commercial use, black box WordPress security scanner written for security professionals and blog maintainers to test the security of their sites.
The Tenable Passive Vulnerability Scanner (PVS) can find out what is happening on your network without actively scanning it. Each PVS monitors your network for vulnerable systems, watches for potential application compromises, client and server trust rela ...
In this course, you gain extensive hands-on experience installing and configuring a firewall. You learn how to allow access to key services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private ne ...
Pompem is an open source tool, which is designed to automate the search for exploits in major databases. Developed in Python, has a system of advanced search, thus facilitating the work of pentesters and ethical hackers. In its current version, performs s ...