Michele M Jordan

Commercial
Pricing Model

The Viasat Eclypt Core encrypted internal hard drive protects data at rest in commercial-off-the-shelf (COTS) laptop and desktop computers in enterprise and tactical environments, as well as data stored in vehicles, aircraft, and ships. During high-risk o ...

Modified
Eclypt Core Encrypted Internal Hard Drive
Freeware
Pricing Model

BitLocker Drive Encryption is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. BitLocker provides the most protection w ...

Modified
Windows Bitlocker
Seagate Technology, LLC
Commercial
Pricing Model

Seagate Secure™ encryption hard drives keep your data safe even if your drives are lost, stolen, or misplaced. * Instant Secure Erase renders all data on the hard drive unreadable in less than a second via a cryptographic erase of the data encryption ke ...

Modified
Seagate Secure
BeCrypt Limited
Commercial
Pricing Model

Disk Protect is a full disk encryption solution for business, designed to protect data-at-rest held on desktops, laptops, tablets and servers from theft or loss. The solution transparently encrypts device data and uses strong authentication to prevent una ...

Modified
DISK Protect
SecurStar GmbH
Commercial
Pricing Model

Full disk encryption with pre-boot authentication Ideal to encrypt an entire computer /notebook/ partition or just a single Hard drive. With DCPP the Hard drive (including the operating system) is encrypted 100%, therefore unauthorized person will not be ...

Modified
WinMagic Inc
Commercial
Pricing Model

SecureDoc will help you achieve your business goals by keeping track of all data and devices through one console. This endpoint encryption solution also supports various hardware and software platforms, including Windows, Mac, mobile devices, portable med ...

Modified
SecureDoc Endpoint Encryption
Enova Technology Corporation
Commercial
Pricing Model

Enova X-Wall is an embedded hardware Real-time Crypto System ASIC (Application Specific Integrated Circuit) engineered specifically to handle high throughput disk I/O and providing real-time encryption and decryption using DES (Data Encryption Standard),3 ...

Modified
X-Wall Cryptographic IC Family
Hitachi Solutions
Commercial
Pricing Model

HIBUN Data Encryption encrypts data on hard drive, removable media, and file server to protect the secrecy of the information.

Modified
HIBUN Data Encryption
Commercial
Pricing Model

ROCSECURE is a division of Rocstor; pioneering in the secure encryption of digital content in any standard digital format. resolving security issues before they arise As businesses become increasingly dependent on data security, the reliability and availa ...

Modified
Commercial
Pricing Model

Hexamail Guard acts as a sentinel for your incoming and outgoing mail. By analyzing each mail received and sent by your organization it intelligently alerts, routes, blocks and audits all email traffic. Features include: Anti-Spam, AntiVirus, Trojan a ...

Modified
Hexamail Guard
Asavie Technologies
Service
Pricing Model

The Complete Remote Access VPN * Multiple access methods to securely connect to your email, files and applications * Enterprise-class features with simple deployment and unparalled ease-of-use * Installs on existing server without having ...

Category VPN Servers
Modified
Amnafzar (Sharif Secureware)
Commercial
Pricing Model

Separ offers a Web content filter that is completely self-contained and ready to deploy. With minimum setup and configuration, Separ can be working as your enterprise content filter, blocking damaging sites at the perimeter before they reach your internal ...

Category Uncategorised
Modified
Freeware
Pricing Model

Wireless Scanner for Windows Mobile OS. [administrator's note: development on PeekPocket ended 5/2008]

Category Wireless Tools
Modified
Commercial
Pricing Model

Network software with over 60 must-have tools Key Features Automated network discovery Real-time monitoring and alerting Powerful diagnostic capabilities Enhanced network security Integration with SolarWinds NPM solution  

Category Network Scanners
Modified
Engineer's Toolset
Freeware
Pricing Model

SolarWinds’ newest free tool, Real-time NetFlow Analyzer, unlocks the power of NetFlow on your network, empowering you to shutdown the bandwidth hogs and ensure peak performance of your mission-critical network applications. Real-time NetFlow Analyzer cap ...

Modified
SolarWinds NetFlow Analyzer
Commercial
Pricing Model

The Solaris Operating System Network Intrusion Detection course provides students with the knowledge and skills necessary to perform the advanced administration skills required to firewall, monitor, log, identify and respond to network security breaches.

Modified
Commercial
Pricing Model

The Enterprise Intrusion Analysis course provides students with the skills needed to discover and analyze enterprise intrusions in a UNIX environment. Upon completion of this course, students should be able to: * 1. Detect an enterprise system i ...

Modified
Commercial
Pricing Model

SEC617 will give you the skills you need to understand the security strengths and weaknesses in wireless systems. In this course, you will learn how to evaluate the ever-present cacophony of Wi-Fi networks and identify the Wi-Fi access points and client d ...

Category Ethical Hacking
Modified
Wireless Penetration Testing and Ethical Hacking: SEC617
Commercial
Pricing Model

SANS recognizes the need for comprehensive Oracle security training to help organizations protect their most critical information resources. In this course, the student is lead through the process of auditing and securing Oracle by defining the risks to d ...

Modified
Commercial
Pricing Model

The processes and methodologies taught in this class will train you to collect an image on damaged evidence where standard forensic imaging would have failed. You will learn to understand what kinds of problems hard drives have and what your options are t ...

Modified