< Prev 1 2 3 4 5 6 7 8 9 10 11 Next >
Category: Access Control
Lan-Secure Security Center
Security Center is network security software for real-time intrusion detection IDS and prevention IPS that helps to protect networks from potential intruders, unauthorized connections and malicious activities. Security Center can be connected in any network either it is switched or hubs network without the need of remote agents or special network configuration. The unique network monitoring engine provide real-time threats and vulnerabilities discovery. The built-in manual and automatic protection rules enable to enforce any network security policy with proactive blocking of network nodes that violated the security protection rules. The software can be used in distributed environment using any number of remote viewers for controlling the network security permissions and operation status. Security Center key features: Provides online network discovery. Automatic threats and vulnerabilities level discovery. Real-time manual and automatic protection rules against potential intruders. Real-time protection rules including intrusion detection IDS and prevention IPS services. Real-time nodes display for analyzing network connections and transmission rates. Real-time protection using MAC, IP, DNS name or Username attributes. Proactive blocking of networks nodes based on their threat level. Alerts forwarding using SMTP email and SNMP traps. Support wireless intrusion detection and prevention.
IIS Secure Parameter Filter (SPF)
SPF is an application security module designed for Microsoft IIS web servers. SPF uses cryptography to dynamically secure embedded application parameters at runtime (Query String Values, Form Inputs & Cookies). SPF does not require any changes to the underlying application code and provides instant protection against parameter tampering, URL manipulation and replay attacks. SPF also includes the capability to define forbidden input patterns (Black-Lists) using regular expressions to block known attack signatures.
Solsoft ChangeManager is the only centralized, Intelligent Multivendor platform that streamlines the end to end Design and Generation of Network Security rules for Firewalls, Router, VPN, IPSs. ChangeManager acts as a central Network Security Rule repository. Its visual policy interface designs, generates, implements, tracks and audits your security rules for multi-vendor networks consisting of firewalls, routers, switches, VPNs and IPs. ChangeManager's Topology or Tabular interface streamlines the change management process during firewall migration and other complex security update configuration changes. Users can simply drag-and-drop a new service across their network and ChangeManager will translate this high level, business policy change request into device-level instructions providing a simple, scalable model that can represent the most complex policies. ChangeManagers Rules Engine automatically optimizes, orders, inserts, checks rules for conflicts and applies these generated security configurations on the network devices effected by the rule change. Thus providing true end-to-end security rule design and auditing capability. After the acquisition of Solsoft by Exaprotect, Solsoft Policy Server, Firewall Manager and NetFilterOne were integrated into the Exaprotect security product line as Solsoft ChangeManager. Exaprotect provides centralized Configuration Management, Log Management, and Event Monitoring and Correlation solutions for enterprises and service providers with large-scale, heterogeneous network infrastructures.
SPAMfighter Exchange Module
SPAMfighter Exchange Module is a Spam and Antivirus Filter for Exchange Server 2000, 2003 and 2007. As email arrives and the Exchange Server routes it to its addressees, SEM makes a unique encrypted signature for each message and sends it to the SPAMfighter Server for evaluation. If the SPAMfighter Server determines that a message is spam, it notifies SEM and the spam mail is moved to the user's spam folder.
Converts a BINARY file to TEXT Supports files bigger than 64KB and control for bytes perl line also read this-> http://surgeon.gotdns.org/tutos/srgn-pentest-02.txt
The Encryption Wizard for Oracle
The Encryption Wizard for Oracle is a database encryption tool designed exclusively for the Oracle RDBMS. The Encryption Wizard allows you to physically encrypt the data that resides within your database through an easy-to-use Java interface. Download a free full-featured of the Encryption Wizard for Oracle today! Along with database encryption features, the Encryption Wizard ships with advanced security and auditing functions built on the foundation of dependable encryption techniques - an intuitive interface to Oracle's own certified and tested DBMS_Crypto and DBMS_Obfuscation_Tookit packages.
TeamViewer is a simple and fast solution for remote control, desktop sharing and file transfer that works behind any firewall and NAT proxy. To connect to another computer just run TeamViewer on both machines without the need of an installation procedure. With the first start automatic partner IDs are generated on both computers. Enter your partner's ID into TeamViewer and the connection is established immediately. With many thousand users worldwide TeamViewer is a standard tool to give support and assistance to people in remote locations. The software can also be used for presentations, where you can show your own desktop to a partner. TeamViewer also is VNC compatible and offers secure, encrypted data transfer with maximum security.
Training in a Flash Malware Protection
A free, 3 minute Flash Program to train enterprise users on malware attacks and how to avoid them.
Prometheus borns as a tool for Mac OS X system firewall configuration (eredited from FreeBSD IPFW); it is wrote in Perl. It is really versatile and it has two ways of configuration: 1) Step by step configuration, for novice users (by a series of simple questions, it automatically configures firewall rules) 2) Manual configuration, for expert users (read rules directly from user input) Next releases, will include a independet rules library, to give a more complete list of rules to novice users, a firewall log parsing and search function, for system administrators and maybe a GUI.
Safe Access v5.0 is the industrys most powerful, flexible network access control (NAC) solution. Customers seamlessly integrate Safe Access v5.0 into distributed environments regardless of size or complexity using single-pane-of-glass management, Enforcement Server clustering, and multi-user, role-based access. To ensure ease-of-use, Safe Access v5.0 also includes a new user interface specifically designed to support installations ranging from single sites to large enterprise-class networks.
Browse by category