(Page 2 of 50)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Category: Access Control

Lan-Secure Security Center
Added 2008-10-04
by Lan-Secure.com
Security Center is network security software for real-time intrusion detection IDS and prevention IPS that helps to protect networks from potential intruders, unauthorized connections and malicious activities. Security Center can be connected in any network either it is switched or hubs network without the need of remote agents or special network configuration. The unique network monitoring engine provide real-time threats and vulnerabilities discovery. The built-in manual and automatic protection rules enable to enforce any network security policy with proactive blocking of network nodes that violated the security protection rules. The software can be used in distributed environment using any number of remote viewers for controlling the network security permissions and operation status. Security Center key features: Provides online network discovery. Automatic threats and vulnerabilities level discovery. Real-time manual and automatic protection rules against potential intruders. Real-time protection rules including intrusion detection IDS and prevention IPS services. Real-time nodes display for analyzing network connections and transmission rates. Real-time protection using MAC, IP, DNS name or Username attributes. Proactive blocking of networks nodes based on their threat level. Alerts forwarding using SMTP email and SNMP traps. Support wireless intrusion detection and prevention.

IIS Secure Parameter Filter (SPF)
Added 2008-08-22
by Brian Holyfield / Gotham Digital Science
SPF is an application security module designed for Microsoft IIS web servers. SPF uses cryptography to dynamically secure embedded application parameters at runtime (Query String Values, Form Inputs & Cookies). SPF does not require any changes to the underlying application code and provides instant protection against parameter tampering, URL manipulation and replay attacks. SPF also includes the capability to define forbidden input patterns (Black-Lists) using regular expressions to block known attack signatures.

Solsoft ChangeManager
Added 2008-08-20
by
Solsoft ChangeManager is the only centralized, Intelligent Multivendor platform that streamlines the end to end Design and Generation of Network Security rules for Firewalls, Router, VPN, IPS’s. ChangeManager acts as a central Network Security Rule repository. It’s visual policy interface designs, generates, implements, tracks and audits your security rules for multi-vendor networks consisting of firewalls, routers, switches, VPNs and IPs. ChangeManager's Topology or Tabular interface streamlines the change management process during firewall migration and other complex security update configuration changes. Users can simply drag-and-drop a new service across their network and ChangeManager will translate this high level, business policy change request into device-level instructions providing a simple, scalable model that can represent the most complex policies. ChangeManager’s “Rules Engine” automatically optimizes, orders, inserts, checks rules for conflicts and applies these generated security configurations on the network devices effected by the rule change. Thus providing true end-to-end security rule design and auditing capability. After the acquisition of Solsoft by Exaprotect, Solsoft Policy Server, Firewall Manager and NetFilterOne were integrated into the Exaprotect security product line as Solsoft ChangeManager. Exaprotect provides centralized Configuration Management, Log Management, and Event Monitoring and Correlation solutions for enterprises and service providers with large-scale, heterogeneous network infrastructures.

SPAMfighter Exchange Module
Added 2008-08-20
by SPAMfighter
SPAMfighter Exchange Module is a Spam and Antivirus Filter for Exchange Server 2000, 2003 and 2007. As email arrives and the Exchange Server routes it to its addressees, SEM makes a unique encrypted signature for each message and sends it to the SPAMfighter Server for evaluation. If the SPAMfighter Server determines that a message is spam, it notifies SEM and the spam mail is moved to the user's spam folder.

srgn-file2text
Added 2007-07-15
by SuRGeoN/SeSp
Converts a BINARY file to TEXT Supports files bigger than 64KB and control for bytes perl line also read this-> http://surgeon.gotdns.org/tutos/srgn-pentest-02.txt

The Encryption Wizard for Oracle
Added 2007-06-26
by RDC, Inc.
The Encryption Wizard for Oracle is a database encryption tool designed exclusively for the Oracle RDBMS. The Encryption Wizard allows you to physically encrypt the data that resides within your database through an easy-to-use Java interface. Download a free full-featured of the Encryption Wizard for Oracle today! Along with database encryption features, the Encryption Wizard ships with advanced security and auditing functions built on the foundation of dependable encryption techniques - an intuitive interface to Oracle's own certified and tested DBMS_Crypto and DBMS_Obfuscation_Tookit packages.

Teamviewer
Added 2007-05-21
by TeamViewer GmbH
TeamViewer is a simple and fast solution for remote control, desktop sharing and file transfer that works behind any firewall and NAT proxy. To connect to another computer just run TeamViewer on both machines without the need of an installation procedure. With the first start automatic partner IDs are generated on both computers. Enter your partner's ID into TeamViewer and the connection is established immediately. With many thousand users worldwide TeamViewer is a standard tool to give support and assistance to people in remote locations. The software can also be used for presentations, where you can show your own desktop to a partner. TeamViewer also is VNC compatible and offers secure, encrypted data transfer with maximum security.

Training in a Flash Malware Protection
Added 2007-04-18
by Guy Huntington
A free, 3 minute Flash Program to train enterprise users on malware attacks and how to avoid them.

Prometheus
Added 2007-03-02
by Nemesis (BlackAngels Staff)
Prometheus borns as a tool for Mac OS X system firewall configuration (eredited from FreeBSD IPFW); it is wrote in Perl. It is really versatile and it has two ways of configuration: 1) Step by step configuration, for novice users (by a series of simple questions, it automatically configures firewall rules) 2) Manual configuration, for expert users (read rules directly from user input) Next releases, will include a independet rules library, to give a more complete list of rules to novice users, a firewall log parsing and search function, for system administrators and maybe a GUI.

Safe Access
Added 2006-12-04
by StillSecure
Safe Access v5.0 is the industry’s most powerful, flexible network access control (NAC) solution. Customers seamlessly integrate Safe Access v5.0 into distributed environments regardless of size or complexity using single-pane-of-glass management, Enforcement Server clustering, and multi-user, role-based access. To ensure ease-of-use, Safe Access v5.0 also includes a new user interface specifically designed to support installations ranging from single sites to large enterprise-class networks.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus