Michele M Jordan
Deep Security protects confidential data and critical applications to help prevent data breaches and ensure business continuity, while enabling compliance with important standards and regulations such as PCI, FISMA and HIPAA. Whether implemented as softwa ...
Snorby is a ruby on rails web application for network security monitoring that interfaces with current popular intrusion detection systems (Snort, Suricata and Sagan). The basic fundamental concepts behind Snorby are simplicity, organization and power. Th ...
DBAPPSecurity Database Auditor(DBAuditor)helps users to enhance the transparency of database monitoring and reduce the cost of manual auditing so as to visualize database running, monitor daily operation, control dangerous operation, audit all activities ...
Analyze Skype chat logs, contact lists, SMS messages with SkypeAlyzer a forensic tool designed to work with both the old Skype database files – found in a series of .dbb files and the newer Skype database files (main.db).
RedSeal’s hybrid multi-cloud security solution brings complex hybrid multi-cloud networks into one, unified model. You’ll be able to understand all your cloud architecture environments in one dynamic visualization, where your high value assets are, and al ...
A tool for techs Emsisoft Commandline Scanner is a console application for professionals who don’t need a graphical user interface. The scanner is included in the following products:Emsisoft Anti-Malware HomeEmsisoft Business SecurityEmsisoft Enterprise ...
Strong security starts with a malware-free device. Two eyes are better than one – Emsisoft has combined two powerful antivirus technologies into one lightning-fast scanner. Designed to be as efficient as possible, this dual-engine scanner allows you to de ...
Emsisoft Emergency KitThe malware Emergency Kit for infected PCs. A scanner that can be used without installation to scan and clean infected computers. Award-winningAward-winning dual-scanner to clean infections Portable100% portable – Ideal for USB fla ...
Cloudmark Platform is a high-performance, carrier-grade messaging security solution that automatically detects and mitigates all categories of email abuse and threats across a service provider’s network. Cloudmark Platform delivers a powerful, flexible fo ...
DirX Access is a comprehensive access management and identity federation solution for protecting Web services and Web applications against unauthorized access. User access is controlled and enforced on the basis of central role-based security policies ...
DirX Directory enables the secure storage of unambiguous digital identities and is designed to handle a potentially very large number of users. Other data, such as the public keys for a public key infrastructure, can also be stored and managed reliably ...
This fast-paced, hands-on class will teach you how to secure UNIX and lock down Linux to protect a system from compromise. You'll learn how the attacks work and how to use hard-core hardening to defeat the bulk of them. You'll learn how to take your machi ...
Organised by the DFN-CERT (German Research Network). Mainly held in German with some international speakers. Visitors range from academic background, industry, civil government and Defence. Usually around mid March.
Curuncula is a tool shipped as a loadable kernel module that aims to detect rootkits based on the Intel debugging support facilities. Rootkits that set the GD access flag are also detected. It makes use of the "last branch recording" mechanism provided by ...
Discover and protect sensitive data on premises and in the cloud. Identify Business Critical DataClassify structured and unstructured data with exact data matching and over 300 content types. Get Powerful ReportingCreate reports on demand or schedule fo ...
Take your career to the next level with Security University's Certified Information Systems Security Professional(CISSP®) exam preparation course. With our CISSP Experts and CISSP instructors, we have developed a reputation for excellence in t ...
This Intense 72 hour Q/EH® Qualified/ Ethical Hacker class provides you with basic understanding of the hacking skills and tools required to determine potential security weakness in your organization. This class is your next class after Security+ and befo ...
Earn your CWSP™ certification and master the fundamentals of wireless and how to secure your wireless infrastructures. This course targets experienced networking professionals who wish to gain critical skills in wireless networking security, incl ...
Free SSL Sniffer We have decided to release a very straightforward free HTTP and HTTPS sniffer (SSL sniffer) for Internet Explorer (versions 6.0 and 7.0) and Mozilla Firefox, in order to demonstrate the abilities of our SSL redirector SDK platfor ...
Earn your CWNA™ certification and master the fundamentals of wireless and how to secure your wireless infrastructures. This class provides the networking professional a complete foundation of knowledge for entering into or advancing in the ...
Page 11 of 57