Tags: Monitoring

OSSIM™ - Open Source SIEM

OSSIM provides all of the features that a security professional needs from a SIEM offering – event collection, normalization, and correlation. Established and launched by security engineers out of necessity, OSSIM was created with an understanding of the ...

VendorAlienVault
Pricing ModelOpen Source
Modified

Zabbix is listed here for it's Network Mapping and visualisation capabilities, but it is truly a Monitoring application. Auto discovery * Discovery by IP range, services and SNMP * Automatic monitoring of discovered devices

Category Network Mapping
VendorZabbix, SIA
Pricing ModelOpen Source
Modified
CrowdStrike Falcon Platform

CrowdStrike Falcon is a Big Data Active Defense platform focused on raising the adversaries' costs and giving the strategic advantage back to defenders. Designed to continuously monitor, share, and mitigate the adversary's Tactics, Techniques, and Pr ...

VendorCrowdStrike
Pricing ModelCommercial
Modified
McAfee Vulnerability Manager

McAfee Vulnerability Manager, with its McAfee Asset Manager feature, actively or passively canvases everything on your network. Now you can uncover devices hidden on your network as well as smartphones, tablets, and laptops that come and go between schedu ...

VendorMcAfee
Pricing ModelCommercial
Modified

McAfee Vulnerability Manager for Databases automatically discovers databases on your network, determines if the latest patches have been applied, and tests for common weaknesses such as weak passwords, default accounts, and other common threats. Vulnerabi ...

VendorMcAfee
Pricing ModelCommercial
Modified
McAfee Asset Manager

Unlike traditional discovery approaches, McAfee Asset Manager uses both passive and active scanning techniques to canvass everything on your network in real time. This continuous asset monitoring integrates with vulnerability scanning and incident managem ...

Category Network Scanners
VendorMcAfee
Pricing ModelCommercial
Modified
McAfee Change Reconciliation

McAfee Change Reconciliation creates a comprehensive inventory of changes carried out on all systems, grouping and matching them with change tickets and approvals. It flags ad hoc changes made without approvals, and reports on emergency changes that were ...

VendorMcAfee
Pricing ModelCommercial
Modified

Corporate data is constantly at risk of loss, theft, and exposure. The McAfee Total Protection for Data solution suite protects your data using a combination of powerful encryption, access control, and user-behavior monitoring. It helps you establish and ...

Category Host DLP
VendorMcAfee
Pricing ModelCommercial
Modified
Total Protection for Data Loss Prevention

McAfee Total Protection for Data Loss Prevention (DLP) safeguards intellectual property and ensures compliance by protecting sensitive data wherever it lives — on premise, in the cloud, or at the endpoints. McAfee DLP is delivered through low-maintenance ...

Category DLP Network
VendorMcAfee
Pricing ModelCommercial
Modified
LAVA - Live Attack Visualization & Analysis

LAVA is a centralized security application that works in conjunction with Bromium's vSentry software installed at endpoints throughout the organization. LAVA gathers information from each vSentry endpoint - even mobile laptops not connected to the corpora ...

Category Enterprise
VendorBromium
Pricing ModelCommercial
Modified

TypeWATCH is an eBiometrics solution that needs no hardware, yet continuously monitors for identity data theft attempts, by analyzing free text typing patterns of each user. It provides continuous security post-login (inside the perimeter) and secures th ...

VendorWatchful Software
Pricing ModelCommercial
Modified

About Real time, system wide monitoring Monitoring technology knows what every process on your machine is doing at every given moment - and is specially designed to be lightweight and with a small footprint. Behavioural based detection Purely behaviou ...

VendorSentinel Labs
Pricing ModelCommercial
Modified
RSA Security Analytics

By bringing together security information event management (SIEM) , network security monitoring, and combining them with the advanced analysis capabilities of a data security warehouse and integrated threat intelligence, RSA Security Analytics helps secur ...

VendorEMC Corporation
Pricing ModelCommercial
Modified
RSA: ECAT

RSA ECAT is an endpoint compromise-assessment and monitoring tool that enables organizations to detect and respond to threats.  Using a unique signature-less approach, it identifies previously unknown malware and compromises that other solutions may ...

VendorEMC Corporation
Pricing ModelCommercial
Modified

EtherApe is a graphical network monitor for Unix modeled after etherman. Featuring link layer, IP and TCP modes, it displays network activity graphically. Hosts and links change in size with traffic. Color coded protocols display. It supports Ethernet, F ...

VendorSourceforge
Pricing ModelFreeware
Modified
M@D Security Enhanced for Android

Android Security is a security package, by Mobile Active Defense, that provides on demand IPSec VPN with any IP data traffic so that the device is protected behind a VPN at all times. It is compatible with Android 2.2 and higher, but recommends 4.0 or abo ...

Category Mobile Devices
VendorMobile Active Defense
Pricing ModelCommercial
Modified
Throwing Star LAN Tap Pro

The fully assembled and enclosed brother to the Throwing Star LAN Tap Kit. The pro model sports all of the same 10BASET and 100BASETX monitoring goodness ready to go in your kit bag, no soldering necessary. To a target network this little guy looks just ...

Category Network Taps
VendorHakshop
Pricing ModelCommercial
Modified

© Computer Network Defence Limited 2019