Skip to main content

Michele M Jordan

NetFlow provides nearly real-time traffic monitoring, smart flow filtration, aggregation and statistic evaluation, multicriterial data flow selection, using source/destination IP addresses, protocols, etc. The NetFlow Analyzer should be able to deal with ...

Orion NetFlow Traffic Analyzer provides a new level of visibility into network traffic behavior and trends. Network engineers are now able to analyze the full breadth and depth of network traffic, including the most global view of bandwidth consumption, a ...

Plixer NPMD Popular

Device discovery Track assets scattered across your entire enterprise. Gather a complete and accurate view of all network endpoints, including managed and unmanaged devices, and authorized and unauthorized devices. Understand what types of devices are on ...

Category Network Mapping
Plixer NPMD

Complete line-of-defense against the most extreme forms of malware and cyber threats, Ad-Aware Pro Security provides the most advanced anti-spyware and antivirus detection and threat blocking algorithms, complemented with a powerful two-way firewall, web ...

Exports to NetFlow

Extreme Networks

Exports to NetFlow Exports to SFlow

Riverstone Networks

Exports to NetFlow

Force 10 Networks

Exports to SFlow


Exports to NetFlow and sFlow

Exports to SFlow

Exports to SFlow

Exports to SFlow

System auditing varies widely between differing UNIX and Linux systems, most of which lack the tools needed for easy configuration and use. Secure4Audit (previously known as auditGUARD) is a simple and easy-to-use software package for configuring and cont ...

Category Host IDS

Grsecurity is an extensive security enhancement to the Linux kernel that defends against a wide range of security threats through intelligent access control, memory corruption-based exploit prevention, and a host of other system hardening that generally r ...

Category Host IDS
Kerry Thompson

Logsurfer is a program for monitoring system logs in real-time, and reporting on the occurrence of events. It is similar to the well-known swatch program on which it is based, but offers a number of advanced features which swatch does not support. Logsur ...

Category Host IDS
Thomas Biege

The main target of M-ICE are hostbased ID Systems but it is also possible to interoperate with other IDS architectures as long as they use the open and standarized message format IDMEF. The main goal of M-ICE is to fit for every infrastructure and to be h ...

Category Host IDS
Psionic Inc - now Cisco

The Abacus Project suite consists of the following tools right now: Psionic Logcheck/LogSentry - This tool is a clone of a program that ships with the TIS Gauntlet firewall but has been changed in many ways to make it work nicely for normal system auditin ...

Category Host IDS

Snare Central will help security teams worldwide meet evolving log management and collection requirements, enhance network security, and combat cyber attacks with richer data and reporting capabilities. Designed to help meet the demands of both public and ...

Snare Central

Feature-rich, reliable, lightweight log collectors. Rock solid log collection is both a compliance and security imperative. Lightweight – Under 5% of CPU and 20 megs of memory Compliance – Gather data needed for PCI DSS, SOX, GDPR, HIPAA. NISPOM, PIPEDA ...

Category Host IDS
SNARE Agents
Netflix Technologies Inc.

SNIPS (System & Network Integrated Polling Software), formally NOCOL, is a system and network monitoring software that runs on Unix systems and can monitor network and system devices. It is capable of monitoring DNS, NTP, TCP or web ports, host performanc ...

Category Host IDS