Michele M Jordan
Endian UTM Highlights Protect and connect your network so you can get back to focusing on your business. Application Control Take control of the network by properly managing time-wasting, high bandwidth or non-business applications like Skype, Wh ...
What Will You Learn? Understand the key security features of the J2EE platform, the common web security pitfalls developers make and how to build secure and reliable web applications using Java. Students are lead through hands on code examples that highli ...
What Will You Learn? Foundstone consultants/instructors bring real-world experience to the classroom to empower you with the skills to assess your security posture and implement effective countermeasures. As always Foundstone brings its consulting experie ...
What Will You Learn? This course will give you an in-depth study of the computer forensics process. Starting from creating evidentiary disk images to recognizing the often-faint trail of unauthorized activity, Foundstone updates this class continuously by ...
Essential anti-virus, anti-spyware and anti-spam protection for your email servers. * Unclutter and safeguard your email servers with email server protection Keeps your email servers free from viruses and spam, ensuring the smooth running of your vital em ...
Learn how to set up and administer a Linux(TM)-based firewall.
The Juniper Networks SRX Series Services Gateways is a purpose-built platform to perform essential networking security functions. The SRX Series provides integrated security and LAN/WAN routing across high-density LAN/WAN interfaces, Juniper Networks int ...
Centrally managed VPN Client Suite for Windows, macOS and Linux. VPN Client Suite for iOS and Android is here.
Trustwave MailMarshal is a sophisticated multi-layered approach to email security to reduce false positives and protect against spam, gateway attacks, viruses, phishing attempts, and malicious URLs embedded in email. It provides complete email protection ...
A full-featured, adaptable solution that simplifies the day-to-day use of SIEM. Sentinel’s plug and play SIEM streamlines security monitoring and seamlessly integrates identity intelligence. Virtual appliance packaging and out-of-the-box intelligence all ...
NetIQ Change Guardian for Windows gives you invaluable insight into the activities of, and changes implemented by, privileged-level users across your Windows systems, providing the visibility you need to protect your Windows environment, hosted data and a ...
NetIQ Change Guardian for Group Policy minimizes the risks associated with Group Policy Object (GPO) change management and helps determine and document all authorized and unauthorized Group Policy changes to the live environment. Group Policy is an ext ...
NetIQ Secure Configuration Manager audits system configurations and compares them to corporate policies, previous snapshots, and/or other systems. It also leverages this configuration information to reliably identify vulnerabilities and exposures, using t ...
NetIQ Security Solutions for iSeries helps you eliminate security risks and maintain business continuity across your iSeries environment by providing simplified auditing, intrusion protection, vulnerability management and security administration for your ...
Control what connects to the network, authorize access, and implement granular security control with consistent network policies for enterprise grade visibility. Automated policy control and responseAruba ClearPass Policy Manager helps IT teams deploy ro ...
RFProtectTM software prevents denial-of-service and man-in-the-middle attacks and mitigates over-the-air security threats.
When it comes to security, manual monitoring just doesn't cut it. For true policy enforcement, you need something that doesn't ever get tired, bored, distracted or lazy. The active dashboard in Sentinel automates the security monitoring of IT systems and ...
You manage hundreds or thousands of devices and applications, numerous assets, and an unending list of software patches. And on top of it all, your workforce is constantly changing with new requests every day. The ZENworks Suite can help. ZENworks Servic ...
Continually tracking your network’s endpoints, Safend Auditor silently pinpoints all usage of USB, FireWire, PCMCIA, PCI, internal storage and WiFi connections. Displaying complex information comprehensively, Auditor reports can be exported and manipulat ...
Self Encrypting Drives are the most secure, best-performing and most transparent encryption option for protecting data on laptops. These drives automatically encrypt all data written to the drive, so you don’t have to decide what’s important enough to enc ...
Page 30 of 56