2 3 Next >
Category: Policy Enforcement » Web Access
PacketFence is a fully supported, Free and Open Source network access control (NAC) system. PacketFence is actively maintained and has been deployed in numerous large-scale institutions over the past years. It can be used to effectively secure networks - from small to very large heterogeneous networks. PacketFence has been deployed in production environments where thousands of users are involved. Among the different markets are : * banks * colleges and universities * engineering companies * manufacturing businesses * school boards (K-12) ... and many more! Released under the GPL, PacketFence offers an impressive amount of features.
w3af is a Web Application Attack and Audit Framework. The project goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend.
IIS Secure Parameter Filter (SPF)
SPF is an application security module designed for Microsoft IIS web servers. SPF uses cryptography to dynamically secure embedded application parameters at runtime (Query String Values, Form Inputs & Cookies). SPF does not require any changes to the underlying application code and provides instant protection against parameter tampering, URL manipulation and replay attacks. SPF also includes the capability to define forbidden input patterns (Black-Lists) using regular expressions to block known attack signatures.
BinarySEC is an intelligent web application firewall. It suppresses 99,9% malicious HTTP(S) traffic and installs in less than 15 minutes. Its AI engine can modelize normal requests and reject abnormal traffic in minutes. Software solution working as a module. Less than 2% impact on performance.
JAAScois PC Monitor v1.0
» Protecting system and windows startup » Protecting internet explorer from hijacks & spyware » Preventing access to computer settings » Internet filtering for web sites , chat rooms and e-mail
dotDefender secures websites against a broad range of HTTP-based attacks, including Session attacks (e.g. Denial of Service), Web application attacks (e.g. SQL injection, Cross-site scripting, and known attack signatures), as well as requests originating from known attack sources ( e.g. spammer bots and compromised servers). easily installed, dotDefender requires minimal administrator maintanance and updates via a "live update" functionality that keeps its rule set up to date, enabling it to secure the Web environment from the moment it is deployed. dotDefender is cost-effective and is available for a 30 day evaluation period at www.dotdefender.com
dotDefender secures websites against a broad range of HTTP-based attacks, including Session attacks (e.g. Denial of Service), Web application attacks (e.g. SQL injection, Cross-site scripting, and known attack signatures), as well as requests originating from known attack sources ( e.g. spammer bots and compromised servers). dotDefender installs within moments on the Web server along with a predefined, configurable rule-base - enabling it to secure the Web environment from the moment it is deployed, with virtually no administrator intervention. dotDefender retails at a fraction of the cost of conventional web application firewalls, and is available for evaluation via a free 30-day trial.
Profense is an application firewall that provides true proactive protection of web servers and web applications by implementing a positive security model.
Apache module that intercepts the requests and rejects those which are not compliant with the constraints expected by the scripts. Use a XML Configuration file that describe the type and allowed values for the parameters. Released with automated tools that help the Administrator building the XML Configuration file.
Access Control Designer
Access Control Designer is a universal modular tool for visually designing access control policies. The user of this system depicts requirements for the designed security policy in a graphical notation based on a generally accepted security model. The tool will then generate a configuration of security mechanisms, which will be used for the implementation of the security policy. Modularity of the tool will allow users to design security policies for a lot of various environments - systems needed to have access controlled. A pluggable module API allows third-party programmers to provide ACD modules for systems and so allow users to use ACD for designing access control policies for the systems.
Browse by category