(Page 2 of 25)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Category: Intrusion Detection

GreenSQL
Added 2008-10-23
by Yuli Stremovsky
GreenSQL is an Open Source database firewall used to protect databases from SQL injection attacks. GreenSQL works as a proxy for SQL commands and has built in support for MySQL. The logic is based on evaluation of SQL commands using a risk scoring matrix as well as blocking known db administrative commands (DROP, CREATE, etc). GreenSQL is distributed under the GPL license.

OSSEC HIDS
Added 2008-08-29
by Third Brigade
OSSEC is an Open Source Host-based Intrusion Detection System. It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, real-time alerting and active response. It runs on most operating systems, including Linux, OpenBSD, FreeBSD, MacOS, Solaris and Windows.

IIS Secure Parameter Filter (SPF)
Added 2008-08-22
by Brian Holyfield / Gotham Digital Science
SPF is an application security module designed for Microsoft IIS web servers. SPF uses cryptography to dynamically secure embedded application parameters at runtime (Query String Values, Form Inputs & Cookies). SPF does not require any changes to the underlying application code and provides instant protection against parameter tampering, URL manipulation and replay attacks. SPF also includes the capability to define forbidden input patterns (Black-Lists) using regular expressions to block known attack signatures.

EventManager
Added 2008-08-20
by Exaprotect
EventManager is a full-featured security breach and threat detection appliance. It integrates tightly with (and is upgradeable from) Exaprotect’s LogManager solution. EventManager constantly monitors and analyzes a vast array of input sources including security network devices, applications, operating systems, intrusion detection systems, and databases to correlate disparate events such as user authentication, VPN access, and database alterations to provide insight into potential security threats facing your organization’s infrastructure. An elegant user interface and reporting engine conceal the raw power and complexity of the advanced correlation engine that provides unparalleled accuracy in tracking multiple-step security threats and virtually eliminating false alarms. A large set of pre-built settings and a wizard-based AJAX interface for custom data sources make setup and maintenance fast and straightforward.

dotDefender
Added 2008-08-05
by Applicure Technologies
dotDefender provides plug-and-play protection against SQL Injection, Cross-site scripting, Path Traversal, and many other application attacks. Web server security is achieved by rapid deployment of dotDefender™ as a software plug-in. Residing on the web server, dotDefender can be installed and implemented in minutes without influence on traffic or network architecture. The dotDefender™ website protector comes with a predefined set of internet security rules for out of the box best practices website protection. Automatic live update ensures website security that is ready to counter the latest malicious attacks.

SnortNotify
Added 2007-03-24
by Adam Ely
Running from cron at a specified interval SnortNotify will search a snort database for new alerts. If new alerts match a pre configured priority level, an email will be sent to the contact. The email will include Sensor name, the signaturename, and the timestamp.

Scuba by Imperva
Added 2007-03-05
by Imperva
Scuba by Imperva is a free, lightweight Java utility that scans Oracle, DB2, MS-SQL, and Sybase databases for known vulnerabilities and configuration flaws. Based on its assessment results, Scuba creates clear, informative reports with detailed test descriptions. Summary reports, available in Java and HTML format, illustrate overall risk level. With Scuba by Imperva, you are quickly on your way to meeting industry-leading best practices for database configuration and management.

BinarySEC
Added 2007-01-25
by Michael Vergoz, Richard Touret
BinarySEC is an intelligent web application firewall. It suppresses 99,9% malicious HTTP(S) traffic and installs in less than 15 minutes. Its AI engine can modelize normal requests and reject abnormal traffic in minutes. Software solution working as a module. Less than 2% impact on performance.

Strata Guard
Added 2006-12-04
by StillSecure
Strata Guard is an award-winning family of network-based intrusion detection/prevention systems (IDS/IPS) that provide real-time, zero-day protection from network attacks and malicious traffic. With four different models and two deployment options, Strata Guard protects enterprise businesses from the network perimeter to the core, including remote and internal segments.

RiskProfile Tool
Added 2006-10-31
by Perimeter Internetworking
A uniquely powerful self-assessment and security planning tool for financial services institutions by Perimeter Internetworking, the only provider of complete e-security on demand. In a twenty-minute online session, the powerful RiskProfileTM system helps IT and technology executives align security plans and spending with the business risks of their institutions, and provides valuable data benchmarking the user’s results against other institutions.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus