Tags: monitoring

Open Source
Pricing Model

OSSIM provides all of the features that a security professional needs from a SIEM offering – event collection, normalization, and correlation. Established and launched by security engineers out of necessity, OSSIM was created with an understanding of the ...

Modified
OSSIM™ - Open Source SIEM
Open Source
Pricing Model

Zabbix is listed here for it's Network Mapping and visualisation capabilities, but it is truly a Monitoring application. Auto discovery * Discovery by IP range, services and SNMP * Automatic monitoring of discovered devices

Category Network Mapping
Modified
Commercial
Pricing Model

CrowdStrike Falcon is a Big Data Active Defense platform focused on raising the adversaries' costs and giving the strategic advantage back to defenders. Designed to continuously monitor, share, and mitigate the adversary's Tactics, Techniques, and Pr ...

Modified
CrowdStrike Falcon Platform
Commercial
Pricing Model

McAfee Vulnerability Manager, with its McAfee Asset Manager feature, actively or passively canvases everything on your network. Now you can uncover devices hidden on your network as well as smartphones, tablets, and laptops that come and go between schedu ...

Modified
McAfee Vulnerability Manager
Commercial
Pricing Model

McAfee Vulnerability Manager for Databases automatically discovers databases on your network, determines if the latest patches have been applied, and tests for common weaknesses such as weak passwords, default accounts, and other common threats. Vulnerabi ...

Modified
Commercial
Pricing Model

Unlike traditional discovery approaches, McAfee Asset Manager uses both passive and active scanning techniques to canvass everything on your network in real time. This continuous asset monitoring integrates with vulnerability scanning and incident managem ...

Category Network Scanners
Modified
McAfee Asset Manager
Commercial
Pricing Model

McAfee Change Reconciliation creates a comprehensive inventory of changes carried out on all systems, grouping and matching them with change tickets and approvals. It flags ad hoc changes made without approvals, and reports on emergency changes that were ...

Modified
McAfee Change Reconciliation
Commercial
Pricing Model

Corporate data is constantly at risk of loss, theft, and exposure. The McAfee Total Protection for Data solution suite protects your data using a combination of powerful encryption, access control, and user-behavior monitoring. It helps you establish and ...

Category Host DLP
Modified
Commercial
Pricing Model

McAfee Total Protection for Data Loss Prevention (DLP) safeguards intellectual property and ensures compliance by protecting sensitive data wherever it lives — on premise, in the cloud, or at the endpoints. McAfee DLP is delivered through low-maintenance ...

Category DLP Network
Modified
Total Protection for Data Loss Prevention
Commercial
Pricing Model

LAVA is a centralized security application that works in conjunction with Bromium's vSentry software installed at endpoints throughout the organization. LAVA gathers information from each vSentry endpoint - even mobile laptops not connected to the corpora ...

Category Enterprise
Modified
LAVA - Live Attack Visualization & Analysis
Watchful Software
Commercial
Pricing Model

TypeWATCH is an eBiometrics solution that needs no hardware, yet continuously monitors for identity data theft attempts, by analyzing free text typing patterns of each user. It provides continuous security post-login (inside the perimeter) and secures th ...

Modified
Sentinel Labs
Commercial
Pricing Model

About Real time, system wide monitoring Monitoring technology knows what every process on your machine is doing at every given moment - and is specially designed to be lightweight and with a small footprint. Behavioural based detection Purely behaviou ...

Modified
EMC Corporation
Commercial
Pricing Model

By bringing together security information event management (SIEM) , network security monitoring, and combining them with the advanced analysis capabilities of a data security warehouse and integrated threat intelligence, RSA Security Analytics helps secur ...

Modified
RSA Security Analytics
EMC Corporation
Commercial
Pricing Model

RSA ECAT is an endpoint compromise-assessment and monitoring tool that enables organizations to detect and respond to threats.  Using a unique signature-less approach, it identifies previously unknown malware and compromises that other solutions may ...

Modified
RSA: ECAT
Freeware
Pricing Model

EtherApe is a graphical network monitor for Unix modeled after etherman. Featuring link layer, IP and TCP modes, it displays network activity graphically. Hosts and links change in size with traffic. Color coded protocols display. It supports Ethernet, F ...

Modified
Mobile Active Defense
Commercial
Pricing Model

Android Security is a security package, by Mobile Active Defense, that provides on demand IPSec VPN with any IP data traffic so that the device is protected behind a VPN at all times. It is compatible with Android 2.2 and higher, but recommends 4.0 or abo ...

Category Mobile Devices
Modified
M@D Security Enhanced for Android
Commercial
Pricing Model

The fully assembled and enclosed brother to the Throwing Star LAN Tap Kit. The pro model sports all of the same 10BASET and 100BASETX monitoring goodness ready to go in your kit bag, no soldering necessary. To a target network this little guy looks just ...

Category Network Taps
Modified
Throwing Star LAN Tap Pro

© Computer Network Defence Limited 2021