Michele M Jordan

Check Point Software Technologies Ltd.
Commercial
Pricing Model

Check Point VPN-1 Pro provides you the most intelligent, reliable security for stopping attacks while simplifying business communications across the Internet. A tightly integrated combination of firewall, VPN and intrusion prevention, VPN-1 Pro is built o ...

Modified
Thomasez@zelow.no
Commercial
Pricing Model

floppyfw is a router with the advanced firewall-capabilities in Linux that fits on one single floppy disc.

Modified
Brian Carrier
FREEWARE
Pricing Model

The @stake Sleuth Kit (TASK) allows an investigator examine the file systems of a suspect computer in a non-intrusive fashion. TASK is a collection of UNIX-based command line tools that can analyze NTFS, FAT, FFS, EXT2FS, and EXT3FS file systems. TASK rea ...

Modified
Zynamix GmbH
Commercial
Pricing Model

Do you need to analyze multiple variations of essentially the same program ? Do you need to understand the changes between two versions of a program ? Are you trying to detect code theft ? SABRE BinDiff uses a unique graph-theoretical approach to allow co ...

Category Forensic Tools
Modified
Commercial
Pricing Model

Disk EncryptionIncreased remote working makes it more important than ever to secure computers and the data on them. With the huge number of laptops lost, stolen, or misplaced every day, a crucial first line of defense against the loss or theft of devices ...

Modified
Sophos Central Device Encryption
Commercial
Pricing Model

CyberGatekeeper LAN and CyberGatekeeper Remote let systems access the network only after verifying they comply with security policies. If systems are not in compliance or do not participate in the audit, they are kept in a quarantine network. With network ...

Modified

The Black Hat Briefings brings together a unique mix in security: the best minds from government agencies and global corporations with the most respected independent researchers and hackers. These forums take place regularly in Las Vegas, Amsterdam, Tokyo ...

ModifiedNever
Firebrand Training
Commercial
Pricing Model

TThe goal of this seven-day accelerated course is to provide information security professionals a fully-immersed, zero-distraction, all-inclusive CISSP CBK training and certification experience. Our CISSP Firebrand Training encompasses the (ISC)2 CISSP CB ...

Category CISSP Training
Modified
Arbor Networks
Commercial
Pricing Model

Arbor Networks' Peakflow X security platform was purpose-built to meet the demands of the largest enterprises, addressing a wide range of external and internal security threats while maintaining business continuity. It constructs a system-wide view of the ...

ModifiedNever
eEye Digital Security
Commercial
Pricing Model

Retina can scan every machine on your network, including a variety of operating system platforms (e.g. Windows, Unix, Linux), networked devices (e.g. firewalls, routers, etc.), databases and third-party or custom applications, all in record time. After sc ...

Category Network Scanners
Modified
NetWitness Corporation
Commercial
Pricing Model

NetWitness NextGen is designed for enterprises to address concurrent problems of insider threat management, data leakage protection, compliance verification, network e-discovery, and designer malware and zero-day detection. Originally developed for the US ...

Modified
NetWitness NextGen
Commercial
Pricing Model

This course will give you a firm understanding of advanced incident response and computer forensics tools and techniques to investigate data breach intrusions, tech-savvy rogue employees, advanced persistent threats, and complex digital forensic cases. ...

Modified
The Apache Software Foundation
Open Source
Pricing Model

Wide-spectrum: SpamAssassin uses a wide variety of local and network tests to identify spam signatures. This makes it harder for spammers to identify one aspect which they can craft their messages to work around.   Free software: it is distributed ...

Modified
Guidance Software, Inc.
Commercial
Pricing Model

With an intuitive, yet flexible GUI, and unmatched performance, EnCase Version 4 provides investigators with the tools to conduct large-scale and complex investigation with accuracy and efficiency. Our award winning solution yields completely non-invasive ...

Modified
Tomas Junnonen
Free/Open Source
Pricing Model

Firestarter is an Open Source visual firewall program. The software aims to combine ease of use with powerful features, therefore serving both Linux desktop users and system administrators. We strongly believe that your job is to make the high level secur ...

Modified
Check Point Software Technologies Ltd.
Commercial
Pricing Model

As employees become more mobile, sophisticated VPN solutions are required to meet key security challenges such as securing access to corporate resources and protecting remote desktops. To meet the VPN client needs of any organization, Check Point offers V ...

Category VPN Clients
Modified
Guidance Software, Inc.
Commercial
Pricing Model

EnCase Enterprise Edition is a revolutionary solution providing a platform for comprehensive enterprise wide incident response, information auditing and forensic discovery. Leveraging the powerful functionality of Guidance Software's flagship product, EnC ...

Category Remote Forensics
Modified
Barracuda Networks
Commercial
Pricing Model

The Barracuda Spam Firewall is compatible with all email servers and can fit into nearly any corporate or small business environment. It is used by small organizations with as few as 10 employees and large organizations with as many as 200,000 employees. ...

Category Appliances
Modified
The Dot Net Factory
Commercial
Pricing Model

An automated and centralized identity management platform is the only viable means for delivering consistent service and maintaining control over application security. As the only Identity Lifecycle Management solution built on a platform that incorporate ...

Modified
EmpowerID
Malwarebytes
Freeware
Pricing Model

Have you ever considered what makes an anti-malware application effective? We at Malwarebytes have created an easy-to-use, simple, and effective anti-malware application. Whether you know it or not your computer is always at risk of becoming infected with ...

Modified

© Computer Network Defence Limited 2022