Michele M Jordan

Qualys is the leading provider of on demand IT security risk and compliance solutions - delivered as a service. Qualys solutions enable organizations of all sizes to easily and cost-effectively ensure that their business technology systems remain highly s ...

Category Network Scanners
Modified
QualysGuard Vulnerability Management
Open Source
Pricing Model

Next generation of pytbull, IDS/IPS testing framework

Category IPS Network
Modified
Prolific Solutions

Manage all of your vulnerability data from 3rd party scanners with one console. proVM Auditor ingests data from vulnerability assessment scanners and allows you to perform centralized analysis of all of your findings. The SQL database supports features su ...

Modified
Open Source
Pricing Model

OSSIM provides all of the features that a security professional needs from a SIEM offering – event collection, normalization, and correlation. Established and launched by security engineers out of necessity, OSSIM was created with an understanding of the ...

Modified
OSSIM™ - Open Source SIEM
Dominik Reichl
Freeware
Pricing Model

Today you need to remember many passwords. You need a password for the Windows network logon, your e-mail account, your website's FTP password, online passwords (like website member account), etc. etc. etc. The list is endless. Also, you should use differ ...

Modified
KeePass Password Safe
SysTools Software

MailXaminer is a comprehensive email examination tool to carry out a thorough analysis of a bunch of emails and its header. With the help of this tool; forensicators can preview more than 20 email file types and perform advanced search operation within th ...

Category Forensic Tools
Modified
MailXaminer
BCC Risk Advisory

edgescan is the only hybrid cloud based solution in Europe which combines both vulnerability scanning and manual verification on an on-going basis. It is a SaaS (Software as a Service) solution which detects technical vulnerabilities in Internet-facing sy ...

Modified
edgescan
Commercial
Pricing Model

This hands-on track offers a practical working knowledge in intrusion detection and traffic analysis, taught by top practitioners/authors in the field. This is the most advanced program in network intrusion detection that has ever been taught. All of the ...

Modified
Juniper Networks
Commercial
Pricing Model

Exports to NetFlow

Modified
Corero Network Security
Commercial
Pricing Model

The SmartWall family of DDoS protection solutions mitigates a wide range of attacks all while maintaining the availability of applications and services it is protecting and without disrupting the delivery of legitimate traffic. It is designed to handle la ...

Modified
SmartWall DDoS Protection

NetStumbler is a Windows utility for 802.11b based wireless network auditing

Category Wireless Tools
ModifiedNever
Thomasez@zelow.no
Commercial
Pricing Model

floppyfw is a router with the advanced firewall-capabilities in Linux that fits on one single floppy disc.

Modified
Brian Carrier
FREEWARE
Pricing Model

The @stake Sleuth Kit (TASK) allows an investigator examine the file systems of a suspect computer in a non-intrusive fashion. TASK is a collection of UNIX-based command line tools that can analyze NTFS, FAT, FFS, EXT2FS, and EXT3FS file systems. TASK rea ...

Modified
Zynamix GmbH
Commercial
Pricing Model

Do you need to analyze multiple variations of essentially the same program ? Do you need to understand the changes between two versions of a program ? Are you trying to detect code theft ? SABRE BinDiff uses a unique graph-theoretical approach to allow co ...

Category Forensic Tools
Modified
Commercial
Pricing Model

Disk EncryptionIncreased remote working makes it more important than ever to secure computers and the data on them. With the huge number of laptops lost, stolen, or misplaced every day, a crucial first line of defense against the loss or theft of devices ...

Modified
Sophos Central Device Encryption
InfoExpress, Inc.
Commercial
Pricing Model

CyberGatekeeper LAN and CyberGatekeeper Remote let systems access the network only after verifying they comply with security policies. If systems are not in compliance or do not participate in the audit, they are kept in a quarantine network. With network ...

Modified
CyberGatekeeper

The Black Hat Briefings brings together a unique mix in security: the best minds from government agencies and global corporations with the most respected independent researchers and hackers. These forums take place regularly in Las Vegas, Amsterdam, Tokyo ...

ModifiedNever
Firebrand Training
Commercial
Pricing Model

TThe goal of this seven-day accelerated course is to provide information security professionals a fully-immersed, zero-distraction, all-inclusive CISSP CBK training and certification experience. Our CISSP Firebrand Training encompasses the (ISC)2 CISSP CB ...

Category CISSP Training
Modified

Arbor Sightline Popular

Commercial
Pricing Model

Arbor Sightline provides robust capabilities from network-wide capacity planning, to identifying and managing the mitigation of threats to the network.  Network Peering Analysis Your network delivers value to customers and users when it connects to ...

Modified
Arbor Sightline
Commercial
Pricing Model

This course will give you a firm understanding of advanced incident response and computer forensics tools and techniques to investigate data breach intrusions, tech-savvy rogue employees, advanced persistent threats, and complex digital forensic cases. ...

Modified