SecurityWizardry.com - Recently Added Listings https://www.securitywizardry.com/ Thu, 28 Mar 2024 23:27:14 +0100 FeedCreator 1.7.3 Allcourses - Cyber Security training courses https://www.securitywizardry.com/security-training/allcourses-cyber-security-training-courses

Provides learners in Ireland with a range of learning courses through which they can improve their knowledge of cyber security

]]>
kelsey.chalmers Wed, 23 Aug 2023 11:46:44 +0100 https://www.securitywizardry.com/security-training/allcourses-cyber-security-training-courses
CoursesOnline: Cyber Security Courses https://www.securitywizardry.com/security-training/coursesonline-cyber-security-courses

CoursesOnline offers professionals the opportunity to hone their cyber security skills via a wide selection of online learning courses. There are options available for those new to the sector and likewise with those with more experience. The courses are provided by training institutions and universities from across the UK, and upon completion learners come away with fully certified accreditations.

]]>
kelsey.chalmers Fri, 18 Aug 2023 16:00:57 +0100 https://www.securitywizardry.com/security-training/coursesonline-cyber-security-courses
SanerNow https://www.securitywizardry.com/scanning-products/vulnerability-management/sanernow

SecPod’s SanerNow is an ADVANCED VULNERABILITY MANAGEMENT solution for preventing cyberattacks and achieving a security risk compliance posture. IT Security Teams use SanerNow to effectively reduce the risk imposed by vulnerabilities, misconfigurations, and more. It also automatically patches assets, enforces continuous compliance, and controls all endpoints from one single console.

]]>
kelsey.chalmers Thu, 25 May 2023 10:16:11 +0100 https://www.securitywizardry.com/scanning-products/vulnerability-management/sanernow
Become an Ethical Hacker https://www.securitywizardry.com/security-training/ethical-hacking/become-an-ethical-hacker

This course bundle includes access to 6 accredited courses, providing IT professionals with a strong overview of everything that they need to know about cyber security, IT, and networking. Learners will gain a complete understanding as to how systems are set up and maintained, and will have the opportunity to practice breaking into them in order to identify any weakspots that need reinforcing.

]]>
kelsey.chalmers Fri, 14 Apr 2023 11:39:15 +0100 https://www.securitywizardry.com/security-training/ethical-hacking/become-an-ethical-hacker
CISSP Boot Camp https://www.securitywizardry.com/security-training/cissp-training/cissp-boot-camp

 Earning your CISSP requires a broad range of cybersecurity skills, from developing security policies to managing risk to understanding technical security controls. Infosec’s industry-leading approach to CISSP training provides the tools you need to master this knowledge.

You’ll leave this training with the necessary skills and best practices to effectively create and execute enterprise-wide information security strategies — and pass your CISSP exam with flying colors the first time you take it.

What you'll learn

The goal of the boot camp is to prepare you for the challenging CISSP exam by covering the objectives defined in the (ISC)² common body of knowledge (CBK). The eight CISSP domain areas include:

Security and risk management
Asset security
Security engineering
Communication and network security
Identity and access management
Security assessment and testing
Security operations
Software development security

 

]]>
michelemjordan Tue, 06 Sep 2022 17:56:12 +0100 https://www.securitywizardry.com/security-training/cissp-training/cissp-boot-camp
Hands-On Web Application Penetration Testing Training https://www.securitywizardry.com/security-training/ethical-hacking/hands-on-web-application-penetration-testing-training

This training course is a series of educational interactive training sessions where the attendees will gain hands-on experience. They will be able to identify security flaws in web applications customised or built for the training course. They will also be able to exploit those security flaws to understand the value of fixing those flaws fully.

Tranchulas Hands-On Web Application Penetration Testing Training Course is Certified Training in association with the National Cyber Security Centre, UK. The course material has been rigorously assessed against the exacting standards of NCSC. The quality of the trainers’ delivery and the course administration has been quality checked and approved by APMG.

]]>
kelsey.chalmers Mon, 05 Sep 2022 16:32:04 +0100 https://www.securitywizardry.com/security-training/ethical-hacking/hands-on-web-application-penetration-testing-training
Ethical Hacking Dual Certification Boot Camp (CEH and PenTest+) https://www.securitywizardry.com/security-training/ethical-hacking/ethical-hacking-security-testing-for-professionals

Discover vulnerabilities before cybercriminals do! Our most popular information security and hacking training goes in-depth into the techniques used by malicious actors with attention-getting lectures and hands-on labs.

Earn your CEH and PenTest+, guaranteed!

  • Five days of live, expert ethical hacking instruction
  • Exam Pass Guarantee
  • Exam voucher
  • Unlimited practice exam attempts
  • 100% Satisfaction Guarantee
  • Free annual Infosec Skills subscription ($299 value!)
  • 1-year access to all boot camp video replays and materials
  • Onsite proctoring of exam
  • Knowledge Transfer Guarantee
]]>
michelemjordan Wed, 31 Aug 2022 21:30:32 +0100 https://www.securitywizardry.com/security-training/ethical-hacking/ethical-hacking-security-testing-for-professionals
Clavister NetShield https://www.securitywizardry.com/boundary-guard-products/enterprise-software-firewalls/clavister-netshield

The Services-Based Firewall (SBFW) is a product that answers to the need of modern network users and administrators. Applications and devices have become very powerful and prioritization is needed to maximize network resource usage. The IT administrator who wants to effectively use scarce company resources such as bandwidth and time – will want to take ownership of how applications behave in their network. Instead of leaving each client to decide independently, the SBFW takes a holistic approach and implement changes after analysing demand and availability. Built-in perimeter protection, secure traffic insights and optimisation analytics the SBFW will help you run your business effectively.

Clavisters Services-Based Firewall will not only make sure you have the correct security features at the correct place in your network, its also managable with a single tool with features such as Global Policies and Zero Touch deployment.

]]>
michelemjordan Wed, 31 Aug 2022 19:22:30 +0100 https://www.securitywizardry.com/boundary-guard-products/enterprise-software-firewalls/clavister-netshield
NetSentron https://www.securitywizardry.com/boundary-guard-products/guards-web/netsentron

Netsentron uses a quadruple filtering system to prevent threatening content, images and pages from loading on your computer, while allowing content you have predetermined as safe to pass through. You are in control of deciding which pages your organization, business, or educational institution will be able to view. Incorporated is a true content filter, which means that while using a search engine site such as Google, the inappropriate and banned links will be blocked, while the rest of the results will be available. Any cached pages or content coming through a rogue proxy server will also be blocked.

Netsentron not only prevents access to inappropriate content, but also protects and secures business’ and organizations’ confidential information. Let us help keep your information secure and protected.

]]>
michelemjordan Wed, 31 Aug 2022 19:07:22 +0100 https://www.securitywizardry.com/boundary-guard-products/guards-web/netsentron
Gatecraft Shield https://www.securitywizardry.com/boundary-guard-products/enterprise-appliance-firewalls/gatecraft-shield

SoftPLC Corporation provides high performance VPN firewalls that protect ethernet to ethernet connections such as industrial network to business network, or industrial networks/devices connected to remote sites via the internet. Powerful security features block dangerous and/or unwanted communications from entering your network. We offer two categories of industrial network protection products:

Embedded firmware adds firewall capability to any SoftPLC controller, RTU, or Gateway product
Stand-alone hardware firewalls on industrial computers loaded with our Gatecraft Linux and Firewall package. (Smart and Hardbook models are available)

The firewall protection and configuration features are the same for both categories. In most cases, the hardware is the same as well. The difference is whether additional SoftPLC product functions are also included in the firmware or not.

]]>
michelemjordan Wed, 31 Aug 2022 19:01:02 +0100 https://www.securitywizardry.com/boundary-guard-products/enterprise-appliance-firewalls/gatecraft-shield
Ingate SIParator / Firewall https://www.securitywizardry.com/server-security-products/telephony-firewalls/ingate-siparator-firewall

The Ingate SIParator / Firewall SBC RTS-FW

The Ingate SIParator is a powerful, flexible and cost-effective Enterprise Session Border Controller (E-SBC) for SIP connectivity, security and interoperability, such as connecting PBXs and Unified Communications (UC) solutions to SIP trunking service providers.

The Ingate Firewall, which is always included in the product, makes the Ingate SIParator an all-in-one appliance for data security as well as session border control.

Also available as a software version for your hardware platform.

]]>
michelemjordan Wed, 31 Aug 2022 18:51:37 +0100 https://www.securitywizardry.com/server-security-products/telephony-firewalls/ingate-siparator-firewall
Arbor Sightline https://www.securitywizardry.com/boundary-guard-products/ddos-mitigation-systems/arbor-sightline

Arbor Sightline provides robust capabilities from network-wide capacity planning, to identifying and managing the mitigation of threats to the network. 

Network Peering Analysis

Your network delivers value to customers and users when it connects to other networks. Peering analysis helps determine what traffic can transfer off of expensive transit links to either free peering or even become revenue-generating as a new customer.

Network Capacity Management

You can employ Sightline to monitor the capacity of network infrastructure, which allows you to avoid saturation and re-engineer network traffic for more efficient utilization.

Threat Detection

Through proactive detection of network or service availability threats, Sightline can quickly diagnose and manage DDoS attacks.

]]>
michelemjordan Wed, 24 Aug 2022 19:02:29 +0100 https://www.securitywizardry.com/boundary-guard-products/ddos-mitigation-systems/arbor-sightline
Traffic Sentinel https://www.securitywizardry.com/network-anomoly-detection/netflow-analyzers/traffic-sentinel

Traffic Sentinel makes use of embedded instrumentation within switches, routers, load balancers, and servers. Industry standard sFlow provides the richest information, greatest scalability, and is supported by the largest number of vendors (see sFlow Capable Devices). Traffic Sentinel also accepts IPFIX and a number of proprietary monitoring technologies, including: Cisco NetFlow, Juniper J-Flow, and HP Extended RMON. The use of embedded switch and router monitoring eliminates the need for probes, is simple to deploy, cost effective, and provides detailed network-wide visibility.

Network-wide thresholds and alarms
Real-time top n visualization
Host location
Automated L2 and L3 topology discovery and mapping
Application dependency mapping
Fullly detailed historical data retention
Customizable interactive and scheduled reporting
Continuous monitoring of tens of thousands of switch ports and servers
Access to performance data from any web browser or web-aware application
Easy integration with other applications through open interface and web-based queries

]]>
michelemjordan Wed, 24 Aug 2022 18:51:36 +0100 https://www.securitywizardry.com/network-anomoly-detection/netflow-analyzers/traffic-sentinel
NetFlow Analyzer https://www.securitywizardry.com/network-anomoly-detection/netflow-analyzers/netflow-analyzer

NetFlow Analyzer, a complete traffic analytics tool, that leverages flow technologies to provide real time visibility into the network bandwidth performance. NetFlow Analyzer is a unified solution that collects, analyzes and reports about what your network bandwidth is being used for and by whom.

]]>
michelemjordan Wed, 24 Aug 2022 18:44:05 +0100 https://www.securitywizardry.com/network-anomoly-detection/netflow-analyzers/netflow-analyzer
Plixer NPMD https://www.securitywizardry.com/scanning-products/network-mapping/plixer-npmd

Device discovery

Track assets scattered across your entire enterprise. Gather a complete and accurate view of all network endpoints, including managed and unmanaged devices, and authorized and unauthorized devices. Understand what types of devices are on your network, device locations, and behavior in real-time. Validate enterprise software license agreements and ensure contract compliance and audit readiness.

Device profiling

The Plixer NPMD platform collects and analyzes contextual data from a wide variety of sources, including DNS, DHCP, SNMP polling, SNMP traps, NetFlow/J-Flow/sFlow, Active Directory, RADIUS Accounting, and port mirroring. It then categorizes devices using thousands of predefined device profiles, reducing dependence upon manually intensive, time-consuming processes, which then frees staff to focus on core business tasks.

Risk assessment

Gauge your enterprise’s overall endpoint risk with a concise, aggregated score. The Plixer NPMD platform calculates a summary risk score and breaks out vulnerabilities into four distinct categories: operating-system-related risks, device-related risks (profile identity), communications-related risks, and risks identified by external endpoint management/security solutions (integration).

Application performance monitoring

Network and application optimizations and root cause analysis require true end-to-end visibility. The Plixer NPMD platform monitors application performance by collecting, visualizing, and reporting on data that extends all the way from the user to the cloud. It also provides real-time detection of DDoS attacks, minimizing disruption and loss of revenue.

Contextual data to identify root cause

Through visualization of every conversation from Layers 2-7, the Plixer NPMD platform then correlates network-related data with metadata collected from firewalls, IDS/IPS, SIEM, and distributed probes. Better context is achieved by correlating traffic flows and the metadata collected from all corners of the network into a single database. You can then instantly identify the user, device, location, protocol, and application data for every flow on the network, making it easy to pinpoint the root cause of any issue.

Faster time-to-resolution

Rapid root cause analysis of issues causing poor user experience requires a combination of end-to-end visibility and easy-to-read reports on important data elements. Fast problem resolution requires you to easily correlate a user’s traffic with jitter, latency, and QoS misconfi]]> michelemjordan Wed, 24 Aug 2022 18:37:54 +0100 https://www.securitywizardry.com/scanning-products/network-mapping/plixer-npmd WaveMon https://www.securitywizardry.com/scanning-products/wireless-tools/wavemon wavemon is an ncurses-based monitoring application for wireless network devices on Linux.

]]>
michelemjordan Wed, 24 Aug 2022 15:46:17 +0100 https://www.securitywizardry.com/scanning-products/wireless-tools/wavemon
AirMagnet https://www.securitywizardry.com/scanning-products/wireless-tools/airmagnet

From planning and deployment to ongoing network troubleshooting, the AirMagnet network tools span the entire WLAN lifecycle.

]]>
michelemjordan Wed, 24 Aug 2022 15:42:05 +0100 https://www.securitywizardry.com/scanning-products/wireless-tools/airmagnet
Outscan PCI https://www.securitywizardry.com/scanning-products/compliance/pci-dss/outscan-pci

Outpost24 is a certified Approved Scanning Vendor (ASV) by the PCI Security Standards Council and offers OUTSCAN PCI, an extension of our OUTSCAN vulnerability management tool designed specifically to verify and prove PCI DSS compliance. OUTSCAN PCI examines network perimeters, identifies vulnerabilities and sorts actionable remedies, and can repeatedly scan until all criteria are met to effectively protect the integrity of cardholder data and verify compliance.

]]>
michelemjordan Tue, 23 Aug 2022 18:27:33 +0100 https://www.securitywizardry.com/scanning-products/compliance/pci-dss/outscan-pci
CGX https://www.securitywizardry.com/network-access-control/cgx

The CGX server is a VM or appliance that provides a full suite of network access control applications to create a flexible and custom NAC solution. Optionally install agents to provide granular policy compliance and to deploy Dynamic NAC to control access without network changes.

]]>
michelemjordan Tue, 23 Aug 2022 15:04:09 +0100 https://www.securitywizardry.com/network-access-control/cgx
Armory Drive https://www.securitywizardry.com/endpoint-security/full-disk-encryption/armory-drive

 Armory Drive is as easy to use as other USB drives but adds encryption and multifactor authentication to help safeguard your data.
Plug your Armory Drive USB armory into your computer.
Use Armory Drive's iPhone app to unlock your microSD card inside the USB armory.
Access your decrypted data just like you would with any other USB drive.

]]>
michelemjordan Tue, 23 Aug 2022 14:45:19 +0100 https://www.securitywizardry.com/endpoint-security/full-disk-encryption/armory-drive
Penetration Testing Consultant https://www.securitywizardry.com/security-training/ethical-hacking/penetration-testing-consultant

The Certified Penetration Testing Consultant course is designed for IT Security Professionals and IT Network Administrators who are interested in taking an in-depth look into specific penetration testing techniques used against operating systems. This course will teach you the necessary skills to work with a penetration testing team, the exploitation process, and how to create a buffer overflow against programs running on Windows and Linux while subverting features such as DEP and ASLR.

]]>
michelemjordan Mon, 22 Aug 2022 17:28:57 +0100 https://www.securitywizardry.com/security-training/ethical-hacking/penetration-testing-consultant
Certified Ethical Hacker https://www.securitywizardry.com/security-training/ethical-hacking/certified-ethical-hacker

In this CEH training course, you are provided with the foundational knowledge needed to pass the EC-Council Certified Ethical Hacker (CEH v11) exam. You will learn how to deploy tools and techniques to protect your network through hands-on labs that mimic real-life scenarios.

]]>
michelemjordan Mon, 22 Aug 2022 17:09:16 +0100 https://www.securitywizardry.com/security-training/ethical-hacking/certified-ethical-hacker
CREST Registered Penetration Tester https://www.securitywizardry.com/security-training/ethical-hacking/crest-registered-penetration-tester

The CREST penetration testing course takes students of varying IT experience levels and re-skills them so that they can enter the industry not as a trainee but as qualified Penetration Tester making them productive from day one. This is an Accredited CREST Training course.

]]>
michelemjordan Mon, 22 Aug 2022 17:02:51 +0100 https://www.securitywizardry.com/security-training/ethical-hacking/crest-registered-penetration-tester
Harmony Endpoint Protection https://www.securitywizardry.com/endpoint-security/harmony-endpoint-protection

Harmony Endpoint provides comprehensive endpoint protection at the highest security level, crucial to avoid security breaches and data compromise.

Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s complex threat landscape. It prevents the most imminent threats to the endpoint such as ransomware, phishing or drive-by malware, while quickly minimizing breach impact with autonomous
detection and response. This way, your organization gets all the endpoint protection it needs, at the quality it deserves, in a single, efficient, and cost-effective solution.

UNIQUE PRODUCT CAPABILITIES
Advanced behavioral analysis and machine learning algorithms shut down malware before it inflicts damage
High catch rates and low false positives ensure security efficacy and effective prevention
Automated forensics data analysis offers detailed insights into threats
Full attack containment and remediation to quickly restore any infected systems

Data Protection – includes Full Disk Encryption and Removable Media Encryption, including Access Control and Port Protection

]]>
michelemjordan Mon, 22 Aug 2022 15:27:42 +0100 https://www.securitywizardry.com/endpoint-security/harmony-endpoint-protection
Trellix Data Protection https://www.securitywizardry.com/boundary-guard-products/dlp-network/trellix-data-protection

Get complete data security - Empower the enterprise to discover, monitor, and protect sensitive data, centralize management and reporting, and synchronize on-premises and cloud policies.

Secure data wherever it resides - Protect business-critical information—at rest and in motion—on your network, in the cloud, and at your endpoints.

Stay compliant automatically - Ensure data policy compliance and safeguard personal information with automated reporting.

Simplify deployment and management - Streamline incident workflows and administer policies easily with flexible deployment options.

]]>
michelemjordan Thu, 18 Aug 2022 17:07:51 +0100 https://www.securitywizardry.com/boundary-guard-products/dlp-network/trellix-data-protection
AFICK https://www.securitywizardry.com/endpoint-security/file-integrity-checkers/afick

Afick is a security tool, very close from to well known tripwire. It allows to monitor the changes on your file systems, and so can detect intrusions.

It's designed to be quick and portable. For now, it has been tested on

  • Windows XP, 2000, Vista, Seven, 10 with ActiveState's ActivePerl
  • linux Redhat (7.1, 7.3)
  • linux Fedora core (6 to 33)
  • linux Mandrake/Mandriva (8.2 to 2011.0)
  • linux Mageia (2 to 7 )
  • linux Suse Enterprise server 8.0, OpenSuse 11.x
  • linux Debian (3 to 10, Knoopix)
  • linux Ubuntu (6.04 to 20.10)
  • linux Slackware (9.1)
  • HP Tru64 Unix 5.1B
  • HPUX 11
  • AIX 5.2.0

but it should work on any computer with perl and its standard modules.

]]>
michelemjordan Wed, 17 Aug 2022 16:41:08 +0100 https://www.securitywizardry.com/endpoint-security/file-integrity-checkers/afick
File Integrity Monitoring Software https://www.securitywizardry.com/endpoint-security/file-integrity-checkers/file-integrity-monitoring-software

File integrity monitoring (FIM) protects sensitive information from theft, loss, and malware.  Included as part of the Security Event Manager software suite.

]]>
michelemjordan Wed, 17 Aug 2022 16:36:55 +0100 https://www.securitywizardry.com/endpoint-security/file-integrity-checkers/file-integrity-monitoring-software
McAfee Antivirus https://www.securitywizardry.com/endpoint-security/endpoint-anti-virus/mcafee-antivirus

Real-time threat protection - 24/7 protection for everyone’s devices from ever-evolving malware and online threats.
Easy to use - Connect all your computers and smartphones and easily manage them from a single dashboard.

All products include:
Award-winning antivirus
Firewall
Password manager
File shredder
Identity monitoring
Online security experts
Web protection
Protection Score

Windows | macOS | Android | iOS

]]>
michelemjordan Fri, 05 Aug 2022 19:20:26 +0100 https://www.securitywizardry.com/endpoint-security/endpoint-anti-virus/mcafee-antivirus
[Test] https://www.securitywizardry.com/web-application-firewalls/waf-appliances/test Barracuda Web Application Firewall

The Barracuda Web Application Firewall protects applications, APIs, and mobile app backends against a variety of attacks including the OWASP Top 10, zero-day threats, data leakage, and application-layer denial of service (DoS) attacks. By combining both positive signature-based policies with robust anomaly detection capabilities.

DDoS Protection

Barracuda Active DDoS Prevention—an add-on service for the Barracuda Web Application Firewall—filters out volumetric DDoS attacks.

Protect APIs and Mobile Apps

The Barracuda Web Application Firewall provides comprehensive security and availability for API’s. It can secure both XML and JSON API’s against all types of attacks, including API farming and scraping. The Barracuda WAF also secures the XML and JSON parsers, all while providing complete, granular access control. The built-in rate control and application delivery features enable consistent and reliable API delivery within SLA’s to ensure seamless scalability, all while virtual patching provides an automated feedback loop for security.

Block Malicious Bots

The Barracuda WAFs built-in bot detection technologies can distinguish between bad bots from good bots through a verity of countermeasures. Advanced Bot Protection uses cloud based machine learning to provide bot spam detect]]> dknight Thu, 28 Jul 2022 08:28:58 +0100 https://www.securitywizardry.com/web-application-firewalls/waf-appliances/test EtherDetect https://www.securitywizardry.com/forensic-solutions/porotocol-analyzers/etherdetect

This protocol analyser will Organize captured packets in a connection-oriented view. Capture IP packets on your LAN with nearly no packets losing. Its real-time analyzer enables on-the-fly content viewing while capturing and analyzing, parse and decode an variety of network protocol. Support saving captured packets for reopening afterward. It has a filter that provides a flexible mechanism to capture specific packets. While offering Syntax highlighting for application data in the format of HTML, HTTP and XML

Key Features:

  • Organize captured packets in a connection-oriented view
  • Capture IP packets on your LAN with nearly no packets losing.
  • Smart real-time analyzer enables on-the-fly content viewing while capturing and analyzing.
  • Parse and decode a variety of network protocol.
  • Support saving captured packets for reopening afterward.
  • Powerful filter provides a flexible mechanism to capture specific packets.
  • Syntax highlighting for application data in the format of HTML, HTTP and XML.
]]> michelemjordan Wed, 27 Jul 2022 16:33:23 +0100 https://www.securitywizardry.com/forensic-solutions/porotocol-analyzers/etherdetect CommView https://www.securitywizardry.com/forensic-solutions/porotocol-analyzers/commview

CommView is a powerful network monitor and analyzer designed for LAN administrators, security professionals, network programmers, home users…virtually anyone who wants a full picture of the traffic flowing through a PC or LAN segment. Loaded with many user-friendly features, CommView combines performance and flexibility with an ease of use unmatched in the industry.

This application captures every packet on the wire to display important information such as a list of packets and network connections, vital statistics, protocol distribution charts, and so on. You can examine, save, filter, import and export captured packets, view protocol decodes down to the lowest layer with full analysis of over 100 supported protocols. With this information, CommView can help you pinpoint network problems and troubleshoot software and hardware.

The newest CommView version 7.0 introduced SSL/TLS traffic decryption on the fly. A traditional packet-capture tool is useless when you need to inspect the contents of an encrypted session, be it your browser downloading a webpage or some application that contacts an unknown server for an obscure reason. Today, virtually all network traffic is encrypted. CommView 7.0 is a game-changer: It intercepts SSL and TLS traffic and displays the contents as if you were capturing an unencrypted TCP session.

CommView includes a VoIP analyzer for in-depth analysis, recording, and playback of SIP and H.323 voice communications. For remote monitoring tasks, you can use our special, optional add-on for CommView: CommView Remote Agent. It allows CommView users to capture network traffic on any computer where Remote Agent is running, regardless of the computer's physical location. This powerful and unique technology broadens your monitoring range: you are no longer limited by your LAN segment or personal computer.

]]>
michelemjordan Wed, 27 Jul 2022 16:26:54 +0100 https://www.securitywizardry.com/forensic-solutions/porotocol-analyzers/commview
PacketMon https://www.securitywizardry.com/forensic-solutions/porotocol-analyzers/packetmon

AnalogX PacketMon allows you to capture IP packets that pass through your network interface - whether they originated from the machine on which PacketMon is installed, or a completely different machine on your network! Once the packet is received, you can use the built in viewer to examine the header as well as the contents, and you can also export the results into a standard comma-delimited file for further processing. PacketMon includes a powerful rule system that allows advanced users to narrow down the packets it captures to ensure you get exactly what you re after, without having to dig through tons of unrelated information.

]]>
michelemjordan Wed, 27 Jul 2022 16:25:44 +0100 https://www.securitywizardry.com/forensic-solutions/porotocol-analyzers/packetmon
Capsa https://www.securitywizardry.com/forensic-solutions/porotocol-analyzers/capsa Capsa is a portable network analyzer application for both LANs and WLANs which performs real-time packet capturing capability, 24x7 network monitoring, advanced protocol analysis, in-depth packet decoding, and automatic expert diagnosis. Capsa's comprehensive high-level window view of entire network, gives quick insight to network administrators or network engineers allowing them to rapidly pinpoint and resolve application problems. With the most user-friendly interface and the most powerful data packet capture and analysis engine in the industry, Capsa is a necessary tool for network monitoring.

Features:

  • VoIP Analysis - by capturing and analyzing VoIP calls and displaying results, IT staff could baseline and troubleshoot VoIP-based networks.
  • Notifying Alarms by Emails & Audio - by sending an emails or play sounds, when an alarm is triggered.
  • Task Scheduler - it helps to run packet capture and analysis at pre-defined time automatically, which can be scheduled to run one time, daily or weekly.
  • TCP Flow Analysis - TCP packets reveal information to troubleshoot slow network, like slow website response, CRM transactions and downloading, etc.
  • Network Security Analysis - accurately detects DoS (DDoS) attack, Worm activity, ARP attack, TCP port scanning and suspicious conversation and locates the source and target in real-time.
  • Versatile Traffic & Bandwidth Statistics - monitors Network traffic and Network bandwidth details in graphs and numbers.
  • Network Protocol Analysis - being able to support more than 1800+ protocols, Capsa make it easy to analyze protocols in network and understand what is happening.
  • In-depth Packet Decoding - it captures all network packets transmitted on network and displays detailed packet decoding information in Hex, ASCII and EBCDIC.
  • Multiple Network Behavior Monitoring - monitors HTTP, Email, DNS, FTP, MSN and Yahoo! Messenger.
  • Extensive Statistics of Each Host - lists all hosts in network with details (traffic, IP, MAC, etc.).
  • Automatic Expert Network Diagnosis - automatically diagnoses network problems and suggests solutions.
  • Visualized Connections in Matrix - visualizes the entire network in an ellipse, showing connections and traffic.
  • Powerful Conversation Analysis - monitors all conversations and reconstruct packet stream.
  • Useful & Valuable Built-in Tools - free built-in tools to create and replay packets; scan and ping IPs.
  • Quick & Intuitive Report - quickly generates reports of most concerned items.
]]>
michelemjordan Wed, 20 Jul 2022 17:51:15 +0100 https://www.securitywizardry.com/forensic-solutions/porotocol-analyzers/capsa
InsightIDR https://www.securitywizardry.com/insider-threat-solutions/insightidr

Built and vetted by experts
InsightIDR has internal and external threat intel for our post-perimeter era, and the world’s most used penetration testing framework Metasploit. We do relentless research with Projects Sonar and Heisenberg. And because “we drink our own champagne” in our global MDR SOC, we understand your user experience.

Goodbye to alert fatigue
It’s one of many ways the security industry has failed you: you shouldn’t chase false alerts or get desensitized to real ones. InsightIDR gives you trustworthy, curated out-of-the box detections.

Show immediate ROI
The SIEM is a foundation — agile, tailored, adaptable, and built in the cloud. You’ll be up and running quickly while continuously upleveling your capabilities as you grow into the platform. Ready for XDR? Say the word.

Key features:

  • Endpoint Detection and Response (EDR)
  • Network Traffic Analysis (NTA)
  • User and Entity Behavior Analytics (UEBA)
  • Cloud and Integrations
  • Security Information and Event Management (SIEM)
  • Embedded Threat Intelligence
  • MITRE ATT&CK Alignment
  • Deception Technology
  • Incident Response and Investigations
  • Response and Automation
]]>
kelsey.chalmers Tue, 12 Jul 2022 16:54:58 +0100 https://www.securitywizardry.com/insider-threat-solutions/insightidr
IBM Security Verify Privilege Vault https://www.securitywizardry.com/insider-threat-solutions/ibm-security-verify-privilege-vault

Easy to use and fast to deploy Privileged Access Management (PAM) available both on-premises or in the cloud.

IBM Security Verify Privilege Vault makes it easy to identify and secure all service, application, administrator, and root accounts across your enterprise. Through continuous discovery, you’ll be able to curb privileged account sprawl and gain a full view of privileged access in your organization. Unlike traditional, more complex PAM solutions, Verify Privilege Vault is easy to use and fast to deploy, available both on-premises or in the cloud. Get started today with powerful password vaulting, auditing and privileged access control. With Verify Privilege Vault, empower your security and IT ops teams to keep all types of privileged accounts safe.

Feature spotlights:

 

  • Discover privileged, shared and service accounts - the first step in managing privileged accounts is finding accounts you don’t know exist. IBM Security Verify Privilege Vault’s Discovery quickly scans your network to find and take over unmanaged privileged, shared and service accounts.
  • 24x7 access to IBM Support - IBM Support is enterprise-ready and available around the world to help keep your business running smoothly. Experience 24x7 access to help you achieve success with IBM Security Verify Privilege Vault.
  • Protect passwords with a secure, encrypted vault - too often passwords are shared and stored in unsecure ways. Verify Privilege Vault stores privileged credentials in an encrypted, centralized vault, to ensure they are properly protected using advanced encryption standards.
  • Integrate with the IBM Security portfolio - verify Privilege Vault integrates with many IBM Security solutions, including IBM Security Verify for single sign-on and multi-factor authentication and Identity Governance & Intelligence (IGI) for lifecycle management and governance.
  • Change passwords automatically when they expire - privileged passwords should be changed regularly. Our built in password changing and expiration schedules ensure that critical passwords are changed automatically, without manual intervention.
  • Utilize IBM Security Expert Labs - IBM Security Expert Labs services are available for deployment and configuration for Verify Privilege Vault, partnering with your organization to enable you to get the greatest return from your IBM investment.
  • Monitor and record privileged sessions, log keystrokes - maintain a full audit trail for your critical systems by recording remote sessions. We provide real-time session monitoring and control including proxying, session recording, and keystroke logging.
  • Utilize IBM Security PAM Professional Services - PAM technologies often require a comprehensive strategy to effectively reduce risk. IBM offers additional PAM services alongside IBM Secret Server to help protect your organization from privile]]> kelsey.chalmers Tue, 12 Jul 2022 16:24:23 +0100 https://www.securitywizardry.com/insider-threat-solutions/ibm-security-verify-privilege-vault IBM Security QRadar SIEM https://www.securitywizardry.com/insider-threat-solutions/ibm-security-qradar-siem

    Features:

    • Intelligent insights across environments - provides visibility and applies context to on-prem and cloud-based resources; leverages continuous monitoring for a zero trust approach to security.
    • Built-in analytics to accurately detect threats - analyzes network, endpoint, asset, user, risk and threat data to uncover known and unknown threats; speeds time to value.
    • Correlation of related activities - identifies and tracks related activities throughout the kill chain; provides end-to-end visibility into a potential incident from a single screen.
    • Automatic parsing and normalizing of logs - automatically makes sense of data from disparate sources; provides an easy-to-use editor to quickly onboard custom log sources for analysis.
    • Threat intelligence and support for STIX/TAXII - includes threat intelligence from IBM Security™ X-Force®; enables clients to integrate additional threat intelligence feeds via STIX/TAXII.
    • Out-of-the-box integration with 450 solutions - provides over 450 integrations, APIs and an SDK to speed data ingestion, drive deeper insights and extend the value of existing solutions.
    • Multiple deployment options - offers flexible architecture for varied deployment and scaling needs; can be delivered as hardware, software or VM for on-prem or IaaS environments.
    • Highly scalable, self-managing database - streamlines management so teams can focus on operations; no dedicated database admins required, even at scale; helps reduce total cost of ownership.
    ]]>
    kelsey.chalmers Tue, 12 Jul 2022 16:13:51 +0100 https://www.securitywizardry.com/insider-threat-solutions/ibm-security-qradar-siem
    Avira Password Manager https://www.securitywizardry.com/password-managers/avira-password-manager

    Avira Password Manager - Remember only one master password, it does the rest.

    • Automatically logs you in to your online accounts.
    • Generates strong, unique passwords and securely stores them.
    • Checks for weak or reused passwords.
    • Notifies you if an online account has been hacked.

    Automatically create highly secure passwords

    Too many accounts, too few passwords? Today’s passwords are hard enough to create, let alone remember. Minimum 8 characters. Numbers. Symbols... Password Manager generates and remembers unique, strong passwords for you.

    Is one Master Password really safe enough?

    Much like online banking, Avira offers extra safeguards to prevent your Master Password from being compromised. 

    • Touch & Face ID: Access your passwords on your phone with your thumb or via your phone's face recognition software.
    • 2-Factor Authentication: To log in, you can receive a security code on our phone (optional). Just enter it along with your master password.
    • Bank-Grade Encryption: All your passwords are securely encrypted and inaccessible, even to hackers.
    • Restricted Access: Only you can see and access your passwords. Even Avira does not know what they are.
    • Data Privacy: Avira is a security expert and abides by strict privacy policies. Your data is safe with Avira and won't be shared with or sold to 3rd parties.

     

    ]]>
    kelsey.chalmers Thu, 07 Jul 2022 17:04:00 +0100 https://www.securitywizardry.com/password-managers/avira-password-manager
    Sticky Password https://www.securitywizardry.com/password-managers/sticky-password

    Keep your credit cards safe and ready for checkout.

    Encrypted vault for your credit card numbers, synced to all your devices, for easy one-click payment.

    Protects your private notes and other text data.

    Keep your secrets, licenses, passport information and more in the secure vault.

    Syncs your encrypted data across all your devices.

    Cloud sync & backup, local WiFi, manual offline, and no sync.

    Lets you securely share your passwords and logins.

    Grant, manage and remove access to your online accounts to other people, set permissions.

    Enables Emergency Access to safeguard your online legacy.

    Gain peace of mind knowing that a trusted personal will be able to access your passwords in case of emergency.

    Works on all your devices and in most popular browsers.

    Windows, Mac, Android and iPhone/iPad. Chrome, Firefox, Safari and more.

    Works even on USB and memory cards.

    Portable password manager lets you access your encrypted data even on computers that are not yours.

    Secures your data just like the military.

    2-step verification, military-grade AES-256 encryption and biometric authentication.

    ]]>
    kelsey.chalmers Thu, 07 Jul 2022 16:57:20 +0100 https://www.securitywizardry.com/password-managers/sticky-password
    Zoho Vault https://www.securitywizardry.com/password-managers/zoho-vault

    Zoho Vault offers a robust free plan for individuals, with easy-to-use unlimited password storage, and flexible business plans for teams.

    Powerful security dashboards

    Get clear security insights into both your personal and business passwords. Identify any weak passwords and change them in just a few clicks.

    Secure password management

    Securely store, share, and manage passwords with different levels of access privileges. You can also add notes, documents, credit cards, software licenses, SSH keys, and more to your password fault.

    Organized access with folders

    Organize passwords and other confidential data into groups as folders and sub-folders for easy password management and bulk-sharing.

    Single sign-on for cloud apps

    Allow users to log in to their everyday apps without passwords. Zoho Vault's catalog readily supports hundreds of popular cloud apps, as well as options for custom integration.

    Comprehensive audit

    Track all sensitive password operations around the clock with our exhaustive audit trails. This includes username, action, IP address, timestamp, and more.

    Extensive visual reports

    Get visual reports of all the important operations performed in your Vault account and export them as PDFs for your internal and external audits.

    ]]>
    kelsey.chalmers Thu, 07 Jul 2022 16:46:55 +0100 https://www.securitywizardry.com/password-managers/zoho-vault
    RememBear https://www.securitywizardry.com/password-managers/remembear

    RememBear is a friendly app that saves and autofills your passwords to save you time and keep you safe online.

    Benefits:

    • Friendly, approachable design 
    • Log in faster - let a Bear type your passwords and login to website with one click
    • Faster online checkout - access and autofill your credit cards and never get off the couch while shopping
    • Never forget a password - save your passwords in a single place and say goodbye to un-bear-able password resets
    • Store sensitive notes 
    • Access everywhere - passwords are automatically synced across all your computers, phones and tablets

    Feature List:

    • Save logins, credit cards, and secure notes
    • Autofill passwords and credit cards
    • Store one-time (2FA) codes
    • Password generator
    • Achievements to teach best practices
    • Support for face and fingerprint ID
    • Apps for iOS, Android, Windows and macOS
    • Browser extensions for Chrome, Firefox, and Safari
    • Synced securely across devices
    • End-to-end AES 256-bit encryption
    • Independently audited
    • Bears
    ]]>
    kelsey.chalmers Thu, 07 Jul 2022 16:40:40 +0100 https://www.securitywizardry.com/password-managers/remembear