Michele M Jordan
Cisco Adaptive Security Appliance (ASA) Software is the core operating system that powers the Cisco ASA family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form factors - standalone appliances, blades, and virtual. AS ...
Capsa Popular
Capsa is a portable network analyzer application for both LANs and WLANs which performs real-time packet capturing capability, 24x7 network monitoring, advanced protocol analysis, in-depth packet decoding, and automatic expert diagnosis. Capsa's comprehen ...
ArcSight ESM is a comprehensive enterprise security platform. By centrally collecting and analyzing security data from heterogeneous devices, ArcSight helps customers worldwide to manage information risk and protect critical assets.Security organizations ...
Trust your inbox again with cloud email security protecting your people and critical information from malware, as well as malware free phishing and impersonation attempts. Keep Imposters OutAutomatically identify your high-profile targets for malware-fre ...
Welcome to the largest underground hacking event in the world. DefCon hosts lots of small, regional meetings, and a DefCon event that coincides with the Black Hat Briefings in Las Vegas.
The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perf ...
Formerly Ethereal. Wireshark is the world's foremost network protocol analyzer, and is the de facto (and often de jure) standard across many industries, Features Include: Deep inspection of hundreds of protocols, with more being added all the time L ...
This hands-on track offers a practical working knowledge in intrusion detection and traffic analysis, taught by top practitioners/authors in the field. This is the most advanced program in network intrusion detection that has ever been taught. All of the ...
Exports to NetFlow
TThe goal of this seven-day accelerated course is to provide information security professionals a fully-immersed, zero-distraction, all-inclusive CISSP CBK training and certification experience. Our CISSP Firebrand Training encompasses the (ISC)2 CISSP CB ...
floppyfw is a router with the advanced firewall-capabilities in Linux that fits on one single floppy disc.
Disk EncryptionIncreased remote working makes it more important than ever to secure computers and the data on them. With the huge number of laptops lost, stolen, or misplaced every day, a crucial first line of defense against the loss or theft of devices ...
This course will give you a firm understanding of advanced incident response and computer forensics tools and techniques to investigate data breach intrusions, tech-savvy rogue employees, advanced persistent threats, and complex digital forensic cases. ...
The Black Hat Briefings brings together a unique mix in security: the best minds from government agencies and global corporations with the most respected independent researchers and hackers. These forums take place regularly in Las Vegas, Amsterdam, Tokyo ...
NetStumbler is a Windows utility for 802.11b based wireless network auditing
The @stake Sleuth Kit (TASK) allows an investigator examine the file systems of a suspect computer in a non-intrusive fashion. TASK is a collection of UNIX-based command line tools that can analyze NTFS, FAT, FFS, EXT2FS, and EXT3FS file systems. TASK rea ...
CyberGatekeeper LAN and CyberGatekeeper Remote let systems access the network only after verifying they comply with security policies. If systems are not in compliance or do not participate in the audit, they are kept in a quarantine network. With network ...
Do you need to analyze multiple variations of essentially the same program ? Do you need to understand the changes between two versions of a program ? Are you trying to detect code theft ? SABRE BinDiff uses a unique graph-theoretical approach to allow co ...
Arbor Sightline Popular
Arbor Sightline provides robust capabilities from network-wide capacity planning, to identifying and managing the mitigation of threats to the network. Network Peering Analysis Your network delivers value to customers and users when it connects to ...
The SmartWall family of DDoS protection solutions mitigates a wide range of attacks all while maintaining the availability of applications and services it is protecting and without disrupting the delivery of legitimate traffic. It is designed to handle la ...