Directory: A-Z
A full-featured, adaptable solution that simplifies the day-to-day use of SIEM. Sentinel’s plug and play SIEM streamlines security monitoring and seamlessly integrates identity intelligence. Virtual appliance packaging and out-of-the-box intelligence all ...
About Real time, system wide monitoring Monitoring technology knows what every process on your machine is doing at every given moment - and is specially designed to be lightweight and with a small footprint. Behavioural based detection Purely behaviou ...
SentryPC enables you to control, restrict and monitor access and usage of your PC. You can control how long and when users are allowed to use the computer, prevent the use of specific programs, block access to certain websites, restrict access to Windows ...
The Abacus Project suite consists of the following tools right now: Psionic Logcheck/LogSentry - This tool is a clone of a program that ships with the TIS Gauntlet firewall but has been changed in many ways to make it work nicely for normal system auditin ...
Separ offers a Web content filter that is completely self-contained and ready to deploy. With minimum setup and configuration, Separ can be working as your enterprise content filter, blocking damaging sites at the perimeter before they reach your internal ...
The Internet's quickest, most popular, reliable and trusted, free Internet security checkup and information service. And now in its Port Authority Edition, it's also the most powerful and complete. Check your system here, and begin learning about using th ...
ShmooCon is an annual East coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software & hardware solutions, and open discussions of critical infosec issues. The first ...
The SANS SIFT Workstation is a VMware Appliance that is pre-configured with all the necessary tools to perform a detailed digital forensic examination. It is compatible with Expert Witness Format (E01), Advanced Forensic Format (AFF), and raw (dd) evidenc ...
Silverline Web Application Firewall is available as a fully managed service or an express self-service, depending on your needs. It protects web apps and data anywhere and ensures compliance with PCI DSS. App Security and Compliance Protection from laye ...
Simple Carver Suite is a collection of unique tools designed for a number of purposes including but not limited to forensic computing, data recovery and eDiscovery. Simple Carver originally began as a single data recovery tool, a basic file carver which h ...
Simple Log Watcher, or Swatch.pl, started out as the "simple watchdog" for activly monitoring log files produced by UNIX's syslog facility. It has since been evolving into a utility that can monitor just about any type of log. Stephen E. Hansen and Todd A ...
Siproxd is a proxy/masquerading daemon for the SIP protocol. It allows SIP clients (softphones & hardphones) to work behind an IP masquerading firewall or router.
A fully automated, active web application security reconnaissance tool. Key features: * High speed: pure C code, highly optimized HTTP handling, minimal CPU footprint - easily achieving 2000 requests per second with responsive targets. * ...
Analyze Skype chat logs, contact lists, SMS messages with SkypeAlyzer a forensic tool designed to work with both the old Skype database files – found in a series of .dbb files and the newer Skype database files (main.db).
SMART is a software utility that has been designed and optimized to support data forensic practitioners and Information Security personnel in pursuit of their respective duties and goals. The SMART software and methodology have been developed with th ...
The SmartWall family of DDoS protection solutions mitigates a wide range of attacks all while maintaining the availability of applications and services it is protecting and without disrupting the delivery of legitimate traffic. It is designed to handle la ...
Snappy Tick Source Edition(SAST) is a source code review tool, it helps to identify the Vulnerability during static code review. Consider an in-line auditing approaches will identify the largest amount of most significant security issues in your applicati ...
Snare pairs well with any SIEM or Security Analytics platform and is trusted by public and private sector organizations worldwide to meet evolving log management requirements including Zero Trust. Snare helps companies around the world improve their log ...
Feature-rich, reliable, lightweight log collectors. Rock solid log collection is both a compliance and security imperative. Lightweight – Under 5% of CPU and 20 megs of memory Compliance – Gather data needed for PCI DSS, SOX, GDPR, HIPAA. NISPOM, PIPEDA ...
Snare Central will help security teams worldwide meet evolving log management and collection requirements, enhance network security, and combat cyber attacks with richer data and reporting capabilities. Designed to help meet the demands of both public and ...