Newest Listing

Top Rated

Most Popular

Directory: Recently Added Listings RSS

SSHWatch

0 reviews

Visit the Product Site

Intrusion Prevention System (IPS) for ssh (default port 22), this IPS responds to the suspicious activity by setting the linux firewall (iptables) to block network traffic from the suspected malicious source. Suspicious activity is determined via auth or ...

Category:Host IPS
VendorMarshyski
Pricing ModelOpen Source
Modified

Visit the Product Site

Sagan is an open source (GNU/GPLv2) high performance, real-time log analysis & correlation engine that run under *nix operating systems (Linux/FreeBSD/OpenBSD/etc). It is written in C and uses a multi-threaded architecture to deliver high performance log ...

VendorQuadrant Information Security
Pricing ModelOpen Source
Modified

PassiveDNS

0 reviews

Visit the Product Site

A tool to collect DNS records passively to aid Incident handling, Network  Security Monitoring (NSM) and general digital forensics. PassiveDNS sniffs traffic from an interface or reads a pcap-file and outputs the DNS-server answers to a log file. Passive ...

VendorEdward Bjarte Fjellskål
Pricing ModelOpen Source
Modified
Tags,

NGREP

0 reviews

Visit the Product Site

ngrep strives to provide most of GNU grep's common features, applying them to the network layer. ngrep is a pcap-aware tool that will allow you to specify extended regular or hexadecimal expressions to match against data payloads of packets. It currently ...

VendorJordan Ritter
Pricing ModelOpen Source
Modified

Visit the Product Site

Justniffer is a network protocol analyzer that captures network traffic and produces logs in a customized way, it can emulate Apache web server log files, track response times and extract all "intercepted" files from the HTTP traffic. It lets you interac ...

VendorOnotelli
Pricing ModelFreeware
Modified

Visit the Product Site

Pompem is an open source tool, which is designed to automate the search for exploits in major databases. Developed in Python, has a system of advanced search, thus facilitating the work of pentesters and ethical hackers. In its current version, performs s ...

Vendorrfunix
Pricing ModelOpen Source
Modified

Visit the Product Site

Pig or (Packet intruder generator) is a Linux based packet crafting tool. You can use Pig for a number of different purposes such as testing your IDS/IPS through to spoofing ARP. Pig brings with it a number of well-known attack signatures which are ready ...

VendorRafael Santiago
Pricing ModelOpen Source
Modified

DSHELL

0 reviews

Visit the Product Site

An extensible network forensic analysis framework. Enables rapid development of plugins to support the dissection of network packet captures. Key features:Robust stream reassemblyIPv4 and IPv6 supportCustom output handlersChainable decoders

VendorUS Army Research Lab
Pricing ModelOpen Source
Modified

Visit the Product Site

The Practitioner level Certificate in Information Risk Management (PCIIRM) is aimed at information security and information assurance professionals.  The qualification covers the core concepts of Information Risk in a hands-on approach which will require ...

VendorBCS - Chartered Institute for IT
Pricing ModelCommercial
Modified

Visit the Product Site

The weakest link in most systems is invariably the human element. How do you ensure that confidential files do not get uploaded to the cloud?, how can you tell if a disgruntled employee is carrying out malicious activities which compromise the integrity o ...

VendorTeramind
Pricing ModelCommercial
Modified

Visit the Product Site

The Certificate in Information Security Management Principles (CISMP) is an internationally recognised qualification which was developed by the British Computer Society and provides a requisite foundation of knowledge necessary for individuals new to the ...

VendorBCS - Chartered Institute for IT
Pricing ModelCommercial
Modified

ImmuniWeb

0 reviews
ImmuniWeb

Visit the Product Site

ImmuniWeb - Web Penetration Testing. ImmuniWeb is a web application security and penetration testing service from High-Tech Bridge. It combines managed vulnerability scanning with manual penetration testing.

VendorHigh-Tech Bridge
Pricing ModelCommercial
Modified

IQProtector

0 reviews
IQProtector

Visit the Product Site

IQProtector assists users and processes and doesn’t hinder them. IQProtector's endpoint agent utilizes Secure Islands’ data-immunization technology to classify and protect all information created on or leaving endpoints with attributes that persist thro ...

Category:DLP Network
VendorSecure Islands
Pricing ModelLimited Free Trial
Modified

Xplico

0 reviews
Xplico

Visit the Product Site

The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico ...

VendorXplico.org
Pricing ModelOpen Source
Modified
DB audit and Security 360

Visit the Product Site

DB Audit and Security 360 is a complete out-of-the-box database security & auditing solution for Oracle, Sybase, MySQL, DB2 and MS SQL Server. DB Audit allows database and system administrators, security administrators, auditors and operators to track and ...

VendorSoftTree Technologies
Pricing ModelLimited Free Trial
Modified
Deep Secure Web Guard

Visit the Product Site

This product controls web traffic entering and leaving the organisation, defending against advanced attacks and misuse. It is increasingly used by organisations that need to tightly control Internet browsing traffic or need to use web protocols to transfe ...

Category:Guards Web
VendorDeep Secure
Pricing ModelCommercial
Modified
Deep-Secure Mail Guard

Visit the Product Site

This product controls web traffic entering and leaving the organisation, defending against advanced attacks and misuse. It is increasingly used by organisations that need to tightly control Internet browsing traffic or need to use web protocols to transfe ...

Category:Guards Mail
VendorDeep-Secure
Pricing ModelCommercial
Modified
Deep-Secure Minerva

Visit the Product Site

Minerva is Deep-Secure's next gneration data diode that allows information to be checked before being securely passed in or out of an isolated system whilst protecting against attack from the opposite direction.   Features and benefits Integrate ...

Category:Data Diodes
VendorDeep-Secure
Pricing ModelCommercial
Modified
Deep Secure File Transfer Guard

Visit the Product Site

This product controls file transfers entering and leaving the organisation, defending against advanced attacks and misuse. It is used by organisations that need to tightly control file transfers with Internet servers or need to pass files between separate ...

VendorDeep Secure
Pricing ModelCommercial
Modified
Deep Secure Network Management Guard

Visit the Product Site

This product controls network management traffic as it passes between the enterprise networks and the management system. Its self-defending architecture means it can exert the required control without itself becoming vulnerable to attack.   Featur ...

VendorDeep Secure
Pricing ModelCommercial
Modified