(Page 2 of 40)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >

Category: System Security Management

Assh, the Anonymous Secure SHell
Added 2008-11-06
by jlzz & lorenzzz
Assh is an anonymous ssh client. It use free SSL proxies to get connected on remote sshd servers.

OSSEC HIDS
Added 2008-08-29
by Third Brigade
OSSEC is an Open Source Host-based Intrusion Detection System. It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, real-time alerting and active response. It runs on most operating systems, including Linux, OpenBSD, FreeBSD, MacOS, Solaris and Windows.

Solsoft ChangeManager
Added 2008-08-20
by
Solsoft ChangeManager is the only centralized, Intelligent Multivendor platform that streamlines the end to end Design and Generation of Network Security rules for Firewalls, Router, VPN, IPS’s. ChangeManager acts as a central Network Security Rule repository. It’s visual policy interface designs, generates, implements, tracks and audits your security rules for multi-vendor networks consisting of firewalls, routers, switches, VPNs and IPs. ChangeManager's Topology or Tabular interface streamlines the change management process during firewall migration and other complex security update configuration changes. Users can simply drag-and-drop a new service across their network and ChangeManager will translate this high level, business policy change request into device-level instructions providing a simple, scalable model that can represent the most complex policies. ChangeManager’s “Rules Engine” automatically optimizes, orders, inserts, checks rules for conflicts and applies these generated security configurations on the network devices effected by the rule change. Thus providing true end-to-end security rule design and auditing capability. After the acquisition of Solsoft by Exaprotect, Solsoft Policy Server, Firewall Manager and NetFilterOne were integrated into the Exaprotect security product line as Solsoft ChangeManager. Exaprotect provides centralized Configuration Management, Log Management, and Event Monitoring and Correlation solutions for enterprises and service providers with large-scale, heterogeneous network infrastructures.

SPAMfighter Exchange Module
Added 2008-08-20
by SPAMfighter
SPAMfighter Exchange Module is a Spam and Antivirus Filter for Exchange Server 2000, 2003 and 2007. As email arrives and the Exchange Server routes it to its addressees, SEM makes a unique encrypted signature for each message and sends it to the SPAMfighter Server for evaluation. If the SPAMfighter Server determines that a message is spam, it notifies SEM and the spam mail is moved to the user's spam folder.

DAVIX
Added 2008-08-17
by Jan P. Monsch, Raffael Marty
DAVIX - the Data Analysis & Visualization Linux® - brings the most important tools for data processing and visualization to your desk. This solution allows you to get started with security visualization without cumbersome compiling and installing tools. The DAVIX CD is based on SLAX 6.0 and follows a modularized approach. Thus, the SLAX ISO image can easily be customized for various purposes. It can even be installed on USB sticks and provide you with mobile analysis capabilities. The CD is shipped with a comprehensive manual that gives you a quick start for all tools and provides information on how-to tailor DAVIX to your needs. All tools are accessible through the KDE start menu and are accompanied with links to external manuals and tutorials.

Scuba
Added 2007-07-16
by Imperva ADC
Freeware database security assessment tool. Safe for production environments. Does not contain exploit code.

SpyStudio
Added 2007-05-02
by Hernan Gonzalez, Rodrigo Perez Varas
SpyStudio is an application to monitor API calls made by different processes. It simplifies the code execution interception operations to really know what is happening in the Windows Operating System's processes and in its applications.

Training in a Flash Malware Protection
Added 2007-04-18
by Guy Huntington
A free, 3 minute Flash Program to train enterprise users on malware attacks and how to avoid them.

Secret Server
Added 2007-04-09
by Thycotic Software
Secret Server is a password management system designed for colleagues in enterprises to securely store and share secrets. Secrets include but are not limited to: passwords, bank account information, product license keys, etc.

Activity and Authentication Analyzer
Added 2007-03-13
by Valient Newman
Security software destined to comprehensive analysis of the user traces (evidences) left after work. AAAnalyzer allows user to search the traces left in system registry, edit registry keys related to the activity and authentication analysis, eradicate them in safe way, keep search log-files, and backup made changes. Utility works in 9x/NT/2000/XP/2003 Windows - and needs additionally only Internet Explorer version 4 or higher

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus