Michele M Jordan

NetStumbler is a Windows utility for 802.11b based wireless network auditing

Category Wireless Tools
ModifiedNever
Check Point Software Technologies Ltd.
Commercial
Pricing Model

Check Point VPN-1 Pro provides you the most intelligent, reliable security for stopping attacks while simplifying business communications across the Internet. A tightly integrated combination of firewall, VPN and intrusion prevention, VPN-1 Pro is built o ...

Modified
Thomasez@zelow.no
Free
Pricing Model

floppyfw is a router with the advanced firewall-capabilities in Linux that fits on one single floppy disc.

Modified
Crossbeam Systems Inc.
Commercial
Pricing Model

Crossbeam Systems X-Series equipment delivers flexible, high scaling network security in perimeter, core and data center architectures. Carriers use the X-Series to deliver a new generation of virtualized services such as firewall, VPN and intrusion preve ...

ModifiedNever
Brian Carrier
FREEWARE
Pricing Model

The @stake Sleuth Kit (TASK) allows an investigator examine the file systems of a suspect computer in a non-intrusive fashion. TASK is a collection of UNIX-based command line tools that can analyze NTFS, FAT, FFS, EXT2FS, and EXT3FS file systems. TASK rea ...

Modified
Zynamix GmbH
Commercial
Pricing Model

Do you need to analyze multiple variations of essentially the same program ? Do you need to understand the changes between two versions of a program ? Are you trying to detect code theft ? SABRE BinDiff uses a unique graph-theoretical approach to allow co ...

Category Forensic Tools
Modified
Commercial
Pricing Model

Sophos SafeGuard Enterprise Encryption 7, formally SafeGuard Easy, introduces the most complete data protection solution on the market today, protecting data on multiple devices and operating systems. Whether your data resides on a laptop, a mobile device ...

Modified
SafeGuard Encryption
Commercial
Pricing Model

CyberGatekeeper LAN and CyberGatekeeper Remote let systems access the network only after verifying they comply with security policies. If systems are not in compliance or do not participate in the audit, they are kept in a quarantine network. With network ...

Modified

The Black Hat Briefings brings together a unique mix in security: the best minds from government agencies and global corporations with the most respected independent researchers and hackers. These forums take place regularly in Las Vegas, Amsterdam, Tokyo ...

ModifiedNever
Firebrand Training
Commercial
Pricing Model

TThe goal of this seven-day accelerated course is to provide information security professionals a fully-immersed, zero-distraction, all-inclusive CISSP CBK training and certification experience. Our CISSP Firebrand Training encompasses the (ISC)2 CISSP CB ...

Category CISSP Training
Modified
Arbor Networks
Commercial
Pricing Model

Arbor Networks' Peakflow X security platform was purpose-built to meet the demands of the largest enterprises, addressing a wide range of external and internal security threats while maintaining business continuity. It constructs a system-wide view of the ...

ModifiedNever
GFI Software
Commercial
Pricing Model

WebFilter edition: Includes time- and bandwidth-based browsing control, as well as website categorization and URL filtering for increased productivity and security WebSecurity edition: Includes download control, virus scanning through multiple anti-virus ...

Category Guards Web
Modified
GFI WebMonitor
eEye Digital Security
Commercial
Pricing Model

Retina can scan every machine on your network, including a variety of operating system platforms (e.g. Windows, Unix, Linux), networked devices (e.g. firewalls, routers, etc.), databases and third-party or custom applications, all in record time. After sc ...

Category Network Scanners
Modified
NetWitness Corporation
Commercial
Pricing Model

NetWitness NextGen is designed for enterprises to address concurrent problems of insider threat management, data leakage protection, compliance verification, network e-discovery, and designer malware and zero-day detection. Originally developed for the US ...

Modified
NetWitness NextGen
Commercial
Pricing Model

This course will give you a firm understanding of advanced incident response and computer forensics tools and techniques to investigate data breach intrusions, tech-savvy rogue employees, advanced persistent threats, and complex digital forensic cases. ...

Modified
Commercial
Pricing Model

IBM Security Network Intrusion Prevention System appliances are designed to stop constantly evolving threats before they impact your business. This means providing both high levels of protection and performance, while lowering the overall cost and complex ...

Category IPS Network
Modified
The Apache Software Foundation
Open Source
Pricing Model

Wide-spectrum: SpamAssassin uses a wide variety of local and network tests to identify spam signatures. This makes it harder for spammers to identify one aspect which they can craft their messages to work around.   Free software: it is distributed ...

Modified
Guidance Software, Inc.
Commercial
Pricing Model

With an intuitive, yet flexible GUI, and unmatched performance, EnCase Version 4 provides investigators with the tools to conduct large-scale and complex investigation with accuracy and efficiency. Our award winning solution yields completely non-invasive ...

Modified
Tomas Junnonen
Free/Open Source
Pricing Model

Firestarter is an Open Source visual firewall program. The software aims to combine ease of use with powerful features, therefore serving both Linux desktop users and system administrators. We strongly believe that your job is to make the high level secur ...

Modified
Check Point Software Technologies Ltd.
Commercial
Pricing Model

As employees become more mobile, sophisticated VPN solutions are required to meet key security challenges such as securing access to corporate resources and protecting remote desktops. To meet the VPN client needs of any organization, Check Point offers V ...

Category VPN Clients
Modified

© Computer Network Defence Limited 2021