Michele M Jordan
The Barracuda Firewall provides extensive application control and user identity functions in an easy-to-use solution. This firewall is optimised for bandwidth-sensitive tasks like packet forwarding and routing layer 7 applications, Intrusion Prevention (I ...
NetworkMiner is an open source Network Forensic Analysis Tool (NFAT) for Windows (but also works in Linux / Mac OS X / FreeBSD). NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, ho ...
FlowNBA is a complete solution for network monitoring based on NetFlow/IPFIX. Thanks to the used technology it enables complete overview of the network traffic, detailed information about all communications and provides information about who communicates ...
RFD-01 Wide Range RF Signal Detector is a super heterodyne receiver with low IF and frequency synthesizer. Scanning and analyzing cycle period is 1.0-1.5 sec. It can operate within guard, sweep, search, difference search modes and monitoring of digital si ...
PistolStar, Inc. maker of PortalGuard offers an on-premise turnkey user authentication solution-set for companies with external-facing web applications to their employees, contractors, suppliers, and vendors. This all-in-one integrated design includes two ...
Ike-scan is a command-line tool that uses the IKE protocol to discover, fingerprint and test IPSec VPN servers. It is available for Linux, Unix, MacOS and Windows under the GPL license.
Every day, Shadowserver sends custom remediation reports to more than 7000 vetted subscribers, including over 133 national governments (201 National CSIRTs) covering 175 countries and territories, as well as many Fortune 500 companies. These reports are d ...
Unisys Stealth™ is an innovative, software-based security solution that: ?Conceals communication endpoints making them undetectable to all unauthorized parties inside and outside the enterprise Implements with no disruption to your existing IT infrast ...
Firewalk is an active reconnaissance network security tool that attempts to determine what layer 4 protocols a given IP forwarding device will pass. Firewalk works by sending out TCP or UDP packets with a TTL one greater than the targete ...
Security Onion is a Linux distro for intrusion detection, network security monitoring, and log management. It's based on Ubuntu and contains Snort, Suricata, Bro, OSSEC, Sguil, Squert, Snorby, ELSA, Xplico, NetworkMiner, and many other security tools. The ...
Hakabana is an open source monitoring tool, which allows users to visiualizes Haka network traffic using Kibana and Elasticsearch. It leverages on the Haka framework to capture packets, dissect them and extract various pieces of information from the ...
VIPRE ThreatIQ gives you the real-time intelligence you need to strengthen your cyber-defense and stop attackers cold. Up-to-the-minute data VIPRE ThreatIQ compiles real-time, global threat intelligence to help you understand where attackers are coming ...
VIPRE ThreatAnalyzer is a dynamic malware analysis sandbox that lets you safely reveal the potential impact of malware on your organization—so you can respond faster and smarter in the event of a real threat.
E-Detective is a real-time Internet interception, monitoring and forensics system that captures, decodes, and reconstructs various types of Internet traffic. It is commonly used for organization Internet behavioral monitoring, auditing, record keeping, fo ...
Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. Its main goal is to provide a remote access on the vulnerable DB server, even in a very hostile environment. It shou ...
The Deep-Secure Chat Guard is one of our family of Content Inspection Guards. It controls the use of Internet standard chat, to allow an organisation to make use of chat without putting sensitive information or critical business processes at risk.   ...
Enjoy the freedom and flexibility of remote working with the peace of mind that your files will remain safe on your secure USB, even in the event of loss or theft with the SafeToGo® Solo. Prevent unauthorised access – with the device’s AES 256-bit XTS en ...
WebGoat is a deliberately insecure web application maintained by OWASP designed to teach web application security lessons. You can install and practice with WebGoat in either J2EE (this page) or [WebGoat for .Net] in ASP.NET. In each lesson, users must d ...
Maltego is a platform developed to deliver a clear threat picture to the environment that an organization owns and operates. Maltego’s demonstrates the complexity and severity of single points of failure as well as trust relationships that exist currently ...
Nipper accurately audits the security of firewalls, switches and routers to detect exploitable misconfigurations that pose risk to the network, prioritized by criticality. Applying Nipper’s compliance lens to the findings also provides the evidence needed ...
Page 24 of 56