List Categories and Listings by S

Snort is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks ...

Category IPS Network
Snort

Trust your inbox again with cloud email security protecting your people and critical information from malware, as well as malware free phishing and impersonation attempts. Keep Imposters OutAutomatically identify your high-profile targets for malware-fre ...

Sophos Email

This certification option is centered on Snort, the industry leading open source intrusion prevention solution. Candidates are assessed on a wide range of criteria that encompasses all the necessary open source components and technical skills for successf ...

Snort Certified Professional (SnortCP)
Safer Networking Ltd.

Spybot - Search & Destroy can detect and remove spyware of different kinds from your computer. Spyware is a relatively new kind of threat that common anti-virus applications do not yet cover. If you see new toolbars in your Internet Explorer that you ...

Spybot - Search & Destroy
Corero Network Security

The SmartWall family of DDoS protection solutions mitigates a wide range of attacks all while maintaining the availability of applications and services it is protecting and without disrupting the delivery of legitimate traffic. It is designed to handle la ...

SmartWall DDoS Protection

Disk EncryptionIncreased remote working makes it more important than ever to secure computers and the data on them. With the huge number of laptops lost, stolen, or misplaced every day, a crucial first line of defense against the loss or theft of devices ...

Sophos Central Device Encryption
The Apache Software Foundation

Wide-spectrum: SpamAssassin uses a wide variety of local and network tests to identify spam signatures. This makes it harder for spammers to identify one aspect which they can craft their messages to work around.   Free software: it is distributed ...

Total control over malicious traffic The award-winning Strata Guard® high-speed intrusion detection/prevention system (IDS/IPS) stops hackers dead in their tracks, preventing malware, spyware, port scans, viruses, and DoS and DDoS attacks from compromisi ...

Category IPS Network

snort_inline is basically a modified version of Snort. It accepts packets from iptables, via libipq, instead of libpcap. It then uses new rule types to tell iptables if the packet should be dropped or allowed to pass based on the snort rule set.[talisker] ...

Category IPS Network

Event Data Warehouse for Security, Compliance, Logs & Analytics SenSage AP is an event data warehouse solution for detecting threats as well as meeting compliance requirements. It enables Security and Compliance Officers to collect and analyze m ...

SenSage AP

Vulnerability intelligence for ALL your applications and systems Get security alerts covering the applications and systems you care about Discover details about how software vulnerabilities may affect you, including their solution status Focus on what ma ...

Software Vulnerability Research
SolarWinds Network Management Solutions

Leveraging a unique multi-level discovery technique, LANsurveyor automatically discovers your LAN or WAN and produces comprehensive, easy-to-view network diagrams that integrate OSI Layer 2 and Layer 3 topology data (including switch-to-switch, switch-to- ...

Category Network Mapping
Castle Rock Computing

Castle Rock Computing was the first company to deliver a Windows based SNMP management system. Our flagship product, SNMPc, is a secure distributed network management system which delivers proactive real-time monitoring for your entire network infrastruct ...

Category Network Mapping
Fortinet Inc.

Secure Office Networking from Fortinet streamlines your network without sacrificing the security, performance or functionality you need to grow. Minimize workarounds and troubleshooting with Next-Generation Firewall and SD-WAN, switches and access points ...

Secure Office Networking
SonicWALL Inc.

Protect your small business or branch location from intrusion, malware and ransomware with an easy-to-use, integrated security solution designed specifically for your needs. SonicWall TZ firewalls deliver enterprise-grade protection without the cost or co ...

SonicWALL TZ Series

Stormshield Network Security physical firewalls The hardware firewall is a stable and efficient security solution to protect corporate networks from cyber attacks. Real-time protection (intrusion prevention and detection, application control, antivirus, ...

Stormshield Network Security Firewall
Public Domain - SourceForge

Siproxd is a proxy/masquerading daemon for the SIP protocol. It allows SIP clients (softphones & hardphones) to work behind an IP masquerading firewall or router.

Securepoint GmbH

Securepoint has developed a professional and free of charge openVPN-Client based on SSL-VPN for Windows. The complex encryption and authentication methods can be managed in a very simple and clear manner in combination with the Securepoint SSL VPN Client ...

Category VPN Clients
SSL VPN Client
Securepoint GmbH

To build a VPN - Virtual Private Network - various conditions have to be fulfilled. The authentication of the partner, a standardised encryption as well as the access control and embeddening in the security structure of the company - together they establi ...

Category VPN Servers
strongSwan project

IPSEC is Internet Protocol SECurity. It uses strong cryptography to provide both authentication and encryption services. Authentication ensures that packets are from the right sender and have not been altered in transit. Encryption prevents unauthorised r ...

Category VPN Servers