Skip to main content

Michele M Jordan

Snort is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks ...

Category IPS Network
Snort

ArcSight ESM is a comprehensive enterprise security platform. By centrally collecting and analyzing security data from heterogeneous devices, ArcSight helps customers worldwide to manage information risk and protect critical assets.Security organizations ...

coresecurity by HelpSystems

Core Impact is designed to enable security teams to conduct advanced penetration tests with ease. With guided automation and certified exploits, the powerful penetration testing software enables you to safely test your environment using the same technique ...

Core Impact
Metasploit LLC

The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perf ...

dragorn@kismetwireless.net

Kismet is a 802.11b wireless network sniffer. It is capable of sniffing using almost any wireless card supported in Linux, including Prism2 based cards supported by the Wlan-NG project (Linksys, Dlink, Rangelan, etc), cards which support standard packet c ...

Category Wireless Tools

WEPCrack is an open source tool for breaking 802.11 WEP secret keys

Category Wireless Tools
Comodo Security Solutions

Internet Security Pro combines the power of COMODO's award-winning Firewall and AntiVirus software to protect your PC from malicious software and Hackers.     Removes existing viruses instantly Blocks all unwanted Internet attacks ...

Comodo Internet Security Pro
netfilter.org

iptables is a generic table structure for the definition of rulesets. Each rule within an IP table consists of a number of classifiers (iptables matches) and one connected action (iptables target).

Iptables
Cisco Systems

Cisco Adaptive Security Appliance (ASA) Software is the core operating system that powers the Cisco ASA family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form factors - standalone appliances, blades, and virtual. AS ...

Nmap ("Network Mapper") is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts ...

Tufin Software Technologies Ltd.

SecureTrack empowers large corporations to automate and streamline Firewall management activities. With Tufin SecureTrack, you can effectively audit your Firewall, monitor policy changes in real-time and test changes for compliance with corporate policies ...

Tufin SecureTrack

NIKSUN NetDetector is a full-featured appliance for network securitymonitoring built on NIKSUN’s NikOS architecture. It is a security monitoring appliance that integrates signature-based IDS functionality with statistical anomaly detection, analytics and ...

NIKSUN NetDetector

NOD32 Antivirus provides well balanced, state-of-the-art protection against threats endangering your PC and enterprise systems running various platforms. Anti-phishing - Secure your data and money against digital fraud.No slowdowns - Enjoy the full power ...

NOD32 Antivirus

Trust your inbox again with cloud email security protecting your people and critical information from malware, as well as malware free phishing and impersonation attempts. Keep Imposters OutAutomatically identify your high-profile targets for malware-fre ...

Sophos Email

Core Protection for Your PC 10 years of malware experience combined in one dynamic application. Ad-Aware - Anniversary Edition offers radically improved performance and efficiency, along with comprehensive malware protection. With real-time monitoring, ...

Ad-Aware Free

CanSecWest, the world's most advanced conference focusing on applied digital security, is about bringing the industry luminaries together in a relaxed environment which promotes collaboration and social networking. The conference lasts for three days and ...