Skip to main content

Michele M Jordan

Deep Security protects confidential data and critical applications to help prevent data breaches and ensure business continuity, while enabling compliance with important standards and regulations such as PCI, FISMA and HIPAA. Whether implemented as softwa ...

Category IPS Network
Trend Micro Deep Security

Snorby is a ruby on rails web application for network security monitoring that interfaces with current popular intrusion detection systems (Snort, Suricata and Sagan). The basic fundamental concepts behind Snorby are simplicity, organization and power. Th ...

Category IPS Network
DBAPPSecurity

DBAPPSecurity Database Auditor(DBAuditor)helps users to enhance the transparency of database monitoring and reduce the cost of manual auditing so as to visualize database running, monitor daily operation, control dangerous operation, audit all activities ...

Sanderson Forensics Ltd.

Analyze Skype chat logs, contact lists, SMS messages with SkypeAlyzer a forensic tool designed to work with both the old Skype database files – found in a series of .dbb files and the newer Skype database files (main.db).

Category Forensic Tools
SkypeAlyzer
RedSeal Systems Inc.

RedSeal’s hybrid multi-cloud security solution brings complex hybrid multi-cloud networks into one, unified model. You’ll be able to understand all your cloud architecture environments in one dynamic visualization, where your high value assets are, and al ...

Category Network Scanners
RedSeal

A tool for techs Emsisoft Commandline Scanner is a console application for professionals who don’t need a graphical user interface. The scanner is included in the following products:Emsisoft Anti-Malware HomeEmsisoft Business SecurityEmsisoft Enterprise ...

Emsisoft Commandline Scanner

Strong security starts with a malware-free device. Two eyes are better than one – Emsisoft has combined two powerful antivirus technologies into one lightning-fast scanner. Designed to be as efficient as possible, this dual-engine scanner allows you to de ...

Emsisoft Anti-Malware

Emsisoft Emergency KitThe malware Emergency Kit for infected PCs. A scanner that can be used without installation to scan and clean infected computers. Award-winningAward-winning dual-scanner to clean infections Portable100% portable – Ideal for USB fla ...

Emsisoft Emergency Kit
Cloudmark Inc.

Cloudmark Platform is a high-performance, carrier-grade messaging security solution that automatically detects and mitigates all categories of email abuse and threats across a service provider’s network. Cloudmark Platform delivers a powerful, flexible fo ...

Cloudmark Platform for Email

DirX Access is a comprehensive access management and identity federation solution for protecting Web services and Web applications against unauthorized access. User access is controlled and enforced on the basis of central role-based security policies ...

DirX Directory enables the secure storage of unambiguous digital identities and is designed to handle a potentially very large number of users. Other data, such as the public keys for a public key infrastructure, can also be stored and managed reliably ...

Security University

This fast-paced, hands-on class will teach you how to secure UNIX and lock down Linux to protect a system from compromise. You'll learn how the attacks work and how to use hard-core hardening to defeat the bulk of them. You'll learn how to take your machi ...

DFN (Deutsches Forschungs Netz)

Organised by the DFN-CERT (German Research Network). Mainly held in German with some international speakers. Visitors range from academic background, industry, civil government and Defence. Usually around mid March.

Giuseppe Cocomazzi

Curuncula is a tool shipped as a loadable kernel module that aims to detect rootkits based on the Intel debugging support facilities. Rootkits that set the GD access flag are also detected. It makes use of the "last branch recording" mechanism provided by ...

Category Forensic Tools
Curuncula

Discover and protect sensitive data on premises and in the cloud. Identify Business Critical DataClassify structured and unstructured data with exact data matching and over 300 content types. Get Powerful ReportingCreate reports on demand or schedule fo ...

Trellix DLP Discover
Security University

Take your career to the next level with Security University's Certified Information Systems Security Professional(CISSP®) exam preparation course.  With our CISSP Experts and CISSP instructors, we have developed a reputation for excellence in t ...

Category CISSP Training
Security University

This Intense 72 hour Q/EH® Qualified/ Ethical Hacker class provides you with basic understanding of the hacking skills and tools required to determine potential security weakness in your organization. This class is your next class after Security+ and befo ...

Category Ethical Hacking
Qualified Ethical Hacker and Q/EH Exam
Security University

Earn your CWSP™ certification and master the fundamentals of wireless and how to secure your wireless infrastructures. This course targets experienced networking professionals who wish to gain critical skills in wireless networking security, incl ...

Free SSL Sniffer We have decided to release a very straightforward free HTTP and HTTPS sniffer (SSL sniffer) for Internet Explorer (versions 6.0 and 7.0) and Mozilla Firefox, in order to demonstrate the abilities of our SSL redirector SDK platfor ...

Security University

Earn your CWNA™ certification and master the fundamentals of wireless and how to secure your wireless infrastructures. This class provides the networking professional a complete foundation of knowledge for entering into or advancing in the ...