Michele M Jordan
AVG Internet Security Business Edition * Ultimate endpoint security for your employees’ laptops and PCs * File Server protection to prevent malware from spreading across your network * Email Server protection against spam, phishing and em ...
Avira Free Antivirus 2015 protects against viruses, malware, and phishing, and the new Dropbox partnership offers secure syncing for your data. In security tests, Avira's latest update continues to deliver top-tier protection.
Malware protection for Windows and Mac. Advanced detection system for preventing novel ransomware and zero-day exploitsComplete web protection for safe online shopping and bankingEnhanced performance to keep your system fast and optimized Web protection ...
CleanMail is the first anti-spam & anti-virus filter, that was designed from the beginning to provide complete email security - protecting you from spam and all kinds of email-borne malware like viruses and phishing mails - while at the same time maki ...
Hitachi ID Bravura Privilege secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating st ...
4 years Full Time / 5 years Sandwich Course
4 years Sandwich Course
OverviewIntercept X for Mobile protects your Android device without compromising performance or battery life. Real-time synchronization with SophosLabs ensures that your mobile device is always protected from the latest malware and online threats – just l ...
3 years Full Time
w3af is a Web Application Attack and Audit Framework. The project's goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend. The framework is extended using plugins. For now, think about nessus p ...
Spiceworks! The free “everything IT” network management software. Inventory Your Network Monitor Your Network Run an IT Help Desk Manage Configuration Changes Map Your Network With Spiceworks you can: * Create a network map of your IT network * See networ ...
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and funct ...
Bravura Identity is an integrated solution for managing identities, groups and security entitlements across systems and applications. It ensures that users are granted access quickly, that entitlements are appropriate to business need and that access is r ...
Autopsy is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It is used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recov ...
The Palo Alto Networks Next-Generation Security Platform has four key characteristics that enable the prevention of successful cyberattacks: Natively integrated technologies that leverage a single-pass architecture to exert positive control based on ap ...
This training course offers a collection of live demonstrations featuring a variety of hacking and defensive techniques used by hackers. Tranchulas online labs are available 24×7 for practising the techniques and tools demonstrated by our instructor durin ...
This training course is a series of educational interactive training sessions where the attendees will gain hands-on experience. They will be able to identify security flaws in web applications customised or built for the training course. They will also b ...
Hitachi ID Bravura Pass is an integrated solution for managing credentials across systems and applications. It simplifies the management of passwords, tokens, smart cards, security questions and biometrics. Bravura Pass lowers IT support cost and imp ...
Hitachi ID Bravura Identity is an integrated solution for managing identities, groups and security entitlements across systems and applications. It ensures that users are granted access quickly, that entitlements are appropriate to business need and that ...
2 years Full Time
Page 13 of 57