2 3 4 5 6 7 8 9 10 11 Next >
Category: Policy Enforcement
PacketFence is a fully supported, Free and Open Source network access control (NAC) system. PacketFence is actively maintained and has been deployed in numerous large-scale institutions over the past years. It can be used to effectively secure networks - from small to very large heterogeneous networks. PacketFence has been deployed in production environments where thousands of users are involved. Among the different markets are : * banks * colleges and universities * engineering companies * manufacturing businesses * school boards (K-12) ... and many more! Released under the GPL, PacketFence offers an impressive amount of features.
Belkasoft Forensic Studio
Tool for forensic professionals helping them to search, analyze and extract histories of Instant Messengers, Browsers, Outlook mailboxes.
ASDIC is a system for advanced traffic analysis. It helps you to investigate the traffic in your network by parsing firewalls logs and/or sniffing the network. Detects anomalies, identifies patterns and presents graphical reports.
OSSEC is an Open Source Host-based Intrusion Detection System. It performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
w3af is a Web Application Attack and Audit Framework. The project goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend.
IIS Secure Parameter Filter (SPF)
SPF is an application security module designed for Microsoft IIS web servers. SPF uses cryptography to dynamically secure embedded application parameters at runtime (Query String Values, Form Inputs & Cookies). SPF does not require any changes to the underlying application code and provides instant protection against parameter tampering, URL manipulation and replay attacks. SPF also includes the capability to define forbidden input patterns (Black-Lists) using regular expressions to block known attack signatures.
EventManager is a full-featured security breach and threat detection appliance. It integrates tightly with (and is upgradeable from) Exaprotects LogManager solution. EventManager constantly monitors and analyzes a vast array of input sources including security network devices, applications, operating systems, intrusion detection systems, and databases to correlate disparate events such as user authentication, VPN access, and database alterations to provide insight into potential security threats facing your organizations infrastructure. An elegant user interface and reporting engine conceal the raw power and complexity of the advanced correlation engine that provides unparalleled accuracy in tracking multiple-step security threats and virtually eliminating false alarms. A large set of pre-built settings and a wizard-based AJAX interface for custom data sources make setup and maintenance fast and straightforward.
Activity and Authentication Analyzer
Security software destined to comprehensive analysis of the user traces (evidences) left after work. AAAnalyzer allows user to search the traces left in system registry, edit registry keys related to the activity and authentication analysis, eradicate them in safe way, keep search log-files, and backup made changes. Utility works in 9x/NT/2000/XP/2003 Windows - and needs additionally only Internet Explorer version 4 or higher
BinarySEC is an intelligent web application firewall. It suppresses 99,9% malicious HTTP(S) traffic and installs in less than 15 minutes. Its AI engine can modelize normal requests and reject abnormal traffic in minutes. Software solution working as a module. Less than 2% impact on performance.
Specops Password Policy
Specops Password Policy is an advanced password filter that gives you more than one password policy per domain in Windows. Something that Microsoft left out from Windows 2000 and Vista. With Specops Password Policy you can have an unlimited number of password policies per Active Directory domain. Specops Password Policy also increases your password granularity options a lot compared to the built-in password policy settings in Windows.
Browse by category