Michele M Jordan

Lancope's StealthWatch System is aimed at both network and security administrators – with an integrated platform that leverages network intelligence for both parties. Leveraging NetFlow, sFlow and packet capture, StealthWatch unifies and optimizes behavio ...

VendorLanscope
Pricing ModelCommercial
Modified
Snort

Snort is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks ...

Category IPS Network
VendorSourcefire
Pricing ModelOpen Source
Modified

Symantec Security Information Manager 4.6 enables organizations to collect, store, and analyze log data as well as monitor and respond to security events to meet IT risk and compliance requirements. It can collect and normalize a broad scope of event data ...

VendorSymantec
Pricing ModelCommercial
Modified

ArcSight ESM is a comprehensive enterprise security platform. By centrally collecting and analyzing security data from heterogeneous devices, ArcSight helps customers worldwide to manage information risk and protect critical assets.Security organizations ...

VendorArcSight
Pricing ModelCommercial
Modified

The TriGeo solution combines Real-Time Log Analysis, Event Correlation, Intrusion Detection and Intrusion Prevention to deliver a unique network defense

VendorTriGeo
Pricing ModelCommercial
Modified

RNA

Sourcefire Real-time Network Awareness (RNA) Sourcefire RNA is an innovative, passive sensing technology that provides real-time network intelligence to the Sourcefire 3D™ System. RNA enables organizations to confidently protect their dynamic networks ...

VendorSourcefire, Inc
Pricing ModelCommercial
Modified

CORE IMPACT Pro is the most comprehensive software solution for assessing the security of network systems, endpoint systems, email users and web applications. IMPACT Pro takes security testing to the next level by using penetration testing techniques to s ...

VendorCore Security Technologies
Pricing ModelCommercial
Modified

The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perf ...

VendorMetasploit LLC
Pricing ModelOpen Source
Modified

Kismet is a 802.11b wireless network sniffer. It is capable of sniffing using almost any wireless card supported in Linux, including Prism2 based cards supported by the Wlan-NG project (Linksys, Dlink, Rangelan, etc), cards which support standard packet c ...

Category Wireless Tools
Vendordragorn@kismetwireless.net
Pricing ModelFreeware
Modified

WEPCrack is an open source tool for breaking 802.11 WEP secret keys

Category Wireless Tools
ModifiedNever

Internet Security combines the power of COMODO's award-winning Firewall and AntiVirus software to protect your PC from malicious software and Hackers.     Removes existing viruses instantly Blocks all unwanted Internet attacks Pro ...

VendorComodo Group
Pricing ModelFreeware
Modified

iptables is a generic table structure for the definition of rulesets. Each rule within an IP table consists of a number of classifiers (iptables matches) and one connected action (iptables target).

Vendornetfilter.org
Pricing ModelFree, Under terms of GNU/GPL
Modified

Cisco Adaptive Security Appliance (ASA) Software is the core operating system that powers the Cisco ASA family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form factors - standalone appliances, blades, and virtual. AS ...

VendorCisco Systems
Pricing ModelCommercial
Modified

© Computer Network Defence Limited 2019