< Prev 1 2 3 4 5 6 7 8 9 10 11 Next >
Category: System Security Management
Assh, the Anonymous Secure SHell
Assh is an anonymous ssh client. It use free SSL proxies to get connected on remote sshd servers.
OSSEC is an Open Source Host-based Intrusion Detection System. It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, real-time alerting and active response. It runs on most operating systems, including Linux, OpenBSD, FreeBSD, MacOS, Solaris and Windows.
Solsoft ChangeManager is the only centralized, Intelligent Multivendor platform that streamlines the end to end Design and Generation of Network Security rules for Firewalls, Router, VPN, IPSs. ChangeManager acts as a central Network Security Rule repository. Its visual policy interface designs, generates, implements, tracks and audits your security rules for multi-vendor networks consisting of firewalls, routers, switches, VPNs and IPs. ChangeManager's Topology or Tabular interface streamlines the change management process during firewall migration and other complex security update configuration changes. Users can simply drag-and-drop a new service across their network and ChangeManager will translate this high level, business policy change request into device-level instructions providing a simple, scalable model that can represent the most complex policies. ChangeManagers Rules Engine automatically optimizes, orders, inserts, checks rules for conflicts and applies these generated security configurations on the network devices effected by the rule change. Thus providing true end-to-end security rule design and auditing capability. After the acquisition of Solsoft by Exaprotect, Solsoft Policy Server, Firewall Manager and NetFilterOne were integrated into the Exaprotect security product line as Solsoft ChangeManager. Exaprotect provides centralized Configuration Management, Log Management, and Event Monitoring and Correlation solutions for enterprises and service providers with large-scale, heterogeneous network infrastructures.
SPAMfighter Exchange Module
SPAMfighter Exchange Module is a Spam and Antivirus Filter for Exchange Server 2000, 2003 and 2007. As email arrives and the Exchange Server routes it to its addressees, SEM makes a unique encrypted signature for each message and sends it to the SPAMfighter Server for evaluation. If the SPAMfighter Server determines that a message is spam, it notifies SEM and the spam mail is moved to the user's spam folder.
DAVIX - the Data Analysis & Visualization Linux® - brings the most important tools for data processing and visualization to your desk. This solution allows you to get started with security visualization without cumbersome compiling and installing tools. The DAVIX CD is based on SLAX 6.0 and follows a modularized approach. Thus, the SLAX ISO image can easily be customized for various purposes. It can even be installed on USB sticks and provide you with mobile analysis capabilities. The CD is shipped with a comprehensive manual that gives you a quick start for all tools and provides information on how-to tailor DAVIX to your needs. All tools are accessible through the KDE start menu and are accompanied with links to external manuals and tutorials.
Freeware database security assessment tool. Safe for production environments. Does not contain exploit code.
SpyStudio is an application to monitor API calls made by different processes. It simplifies the code execution interception operations to really know what is happening in the Windows Operating System's processes and in its applications.
Training in a Flash Malware Protection
A free, 3 minute Flash Program to train enterprise users on malware attacks and how to avoid them.
Secret Server is a password management system designed for colleagues in enterprises to securely store and share secrets. Secrets include but are not limited to: passwords, bank account information, product license keys, etc.
Activity and Authentication Analyzer
Security software destined to comprehensive analysis of the user traces (evidences) left after work. AAAnalyzer allows user to search the traces left in system registry, edit registry keys related to the activity and authentication analysis, eradicate them in safe way, keep search log-files, and backup made changes. Utility works in 9x/NT/2000/XP/2003 Windows - and needs additionally only Internet Explorer version 4 or higher
Browse by category