Skip to main content

Michele M Jordan

Owl Cyber Defense

Owl offers a flexible line of data diode cybersecurity products. Customers can choose from the appropriate hardware platform, which includes a base software package, and then select optional add-on software modules to meet their solution needs.

Category Data Diodes
Waterfall Security Solutions Ltd.

Waterfall’s™ Unidirectional Security Gateways and data diodes core is shared by all of its products and solutions. The Waterfall core, a unique non routable system, is coupled with software agents that mediate its integration into the surrounding envir ...

Category Data Diodes

The Fox DataDiode helps you to prevent data leakage of classified information, using a one-way connection, while still having access to up-to-date unclassified data such as updates for Anti-Virus or Microsoft Windows. It also prevents unwanted access ...

Category Data Diodes
Naval Research Laboratory

The Network Pump is a Cross Domain Solution (CDS) providing network domain separation through a failsafe and redundant security architecture. It performs high assurance validation, inspection, sanitization, and/or transliteration, as required, per data fl ...

Category Data Diodes
SystemWare Europe Ltd

Guardian is a portable RF search system that's small, lightweight and easy to use. State of the art hardware and software are merged to create a detection system easy enough for the most inexperienced security professional to use but powerful enough for t ...

SystemWare Europe Ltd

The SystemWare Advanced Receiver Module (SWARM) Travel Case (STC) provides signal acquisition and analysis needs in a compact and portable package. Quick and simple to operate it can scan the RF spectrum from 1 kHz to 3GHz or 6 GHz with the internal recei ...

Oracle Unified Directory is an all-in-one directory solution with storage, proxy, synchronization and virtualization capabilities. While unifying the approach, it provides all the services required for high-performance Enterprise and carrier-grade environ ...

Oracle Unified Directory

Oracle identity and access management solutions secure access to enterprise applications for both cloud and on-premises deployments. Flexible protection for your workloads Oracle Identity and Access Management solutions provide deployment options to pro ...

Oracle Identity and Access Management
Oracle

Oracle Access Manager allows users of your applications or IT systems to log in once and gain access to a broad range of IT resources. Oracle Access Manager provides an identity management and access control system that is shared by all your applications. ...

Oracle Identity Federation (OIF) is a complete, enterprise-level solution for secure identity information exchange between partners. OIF reduces account management for partner identities and lowers the cost of integrations through support of industry fede ...

Oracle Identity Federation
Webroot Inc.

Complete PC threat protection including antivirus, antispyware, and firewall security Securely backs up over 5,000 photos online* (10GB) Improves PC performance with system cleanup More effective against malware than competing Internet security softw ...

Webroot Internet Security Complete

The Samurai Web Testing Framework is a LiveCD focused on web application testing. We have collected the top testing tools and pre-installed them to build the perfect environment for testing applications.

Category Website Scanners
Cimcor, Inc.

CimTrak is a comprehensive file integrity monitoring and compliance software application that is easy to use and less expensive then similar solutions.  Customers worldwide look to CimTrak as an alternative to other file integrity monitoring tools such as ...

CimTrak Integrity and Compliance Suite

Zabbix is listed here for it's Network Mapping and visualisation capabilities, but it is truly a Monitoring application. Auto discovery * Discovery by IP range, services and SNMP * Automatic monitoring of discovered devices

Category Network Mapping
Kristinn Gudjonsson

log2timeline is a framework for automatic creation of a super timeline. The main purpose is to provide a single tool to parse various log files and artifacts found on suspect systems (and supporting systems, such as network equipment) and produce a timeli ...

Category Forensic Tools

AIR is a GUI front-end to dd/dc3dd designed for easily creating forensic images. by Steve Gibson and Nanni Bassetti Features: * auto-detection of IDE and SCSI drives, CD-ROMs, and tape drives * choice of using either dd or dc3dd (Note: dc3d ...

Category Forensic Tools

CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a project of Digital Forensics CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules ...

The CarolinaCon Group

CarolinaCon is an annual conference in North Carolina that is dedicated to sharing knowledge about technology, security and information rights. CarolinaCon also serves to enhance the local and international awareness of current technology related issues ...

Rifiuti2 analyses recycle bin files from Windows. Rifiuti2 can extract file deletion time, original path and size of deleted files. For more ancient versions of Windows, it can also check whether deleted items were not in recycle bin anymore (that is, eit ...

Category Forensic Tools
Rifiuti2

BruCON is an annual security and hacker(*) conference providing two days of an interesting atmosphere for open discussions of critical infosec issues, privacy, information technology and its cultural/technical implications on society. Organized in Brussel ...