Build a foundation for data security and disaster recovery to fit your clients’ needs no matter the budget.
Whether natural disaster, cyberattack, or plain-old human error, data can disappear in the blink of an eye. ConnectWise BCDR (formerly Recover) delivers reliable and secure backup and disaster recovery backed by powerful automation and a 24/7 NOC to get your clients back to work in minutes, not days.
Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
Various TCP/IP servers, clients and network management tools
IPtools is an all in one package that includes various TCP/IP tools.
Server:
- FTP
- TFTP
- Syslog
- Web
- Remote Command
- General UDP server
- Multicast server
Client utilities:
- Multicast client
- TFTP client
Starting on version 0.2.0, a powerful network connection tools UBridge is added, it can bridge:
- VXLAN (newly released)
- UDP sessions
- NIC card of the PC
- Connections to Cisco Router Simulator "GNS3/dynamips" and H3C Router Simulator...
pmacct is a set of passive network monitoring tools to account, aggregate, classify and export IPv4/v6 traffic; collection methods are libpcap, ULOG, NetFlow, sFlow; backends include MySQL, PostgreSQL, SQLite, memory tables. Native BGP implementation.
JNFA - is a netflow analyzer. It uses MySQL database to store accounting information. Filters, used in the JNFA, allows very flexible classificate any kind of traffic and store it in the differend fields in database.
Your unified business intelligence platform. Self-service. Governed. Embedded.
Chat with your business data with Looker. More than just a modern business intelligence platform, you can turn to Looker for self-service or governed BI, build your own custom applications with trusted metrics, or even bring Looker modeling to your existing BI environment.
CoyoteMonitoring is a Zope-based web interface for managing NetFlow Collectors, data, and graphs. Inspired by Cacti's capabilities with SNMP, CoyoteMonitoring aims to provide rich and useful features for organizations requiring NetFlow management.
YASeMI (Yet Another Security Monitoring Interface) consists of a Web interface that can be of aid to SysAdmins and Security Admins, in detecting possible anomaly or intrusion behaviour in their network, based on Netflow data their routers emit.
Java Netflow Collect/Analyzer uses pure Java to collect netflow v1 v5 v7 v8 v9 UDP packets from cisco routers. It stores both raw data or analyzed contents to DB thru JDBC and can be used in large enterprises or ISPs. JNC beta is ready JNA is underway.
Netflow analyzing tools :
JXColl - collector for Netflow (or XML specified) data
Analyzer - front-end application for providing an user interface and output (graphs, statistics, etc.)
CarrierIn is a module that can be used with FlowScan netflow
analysis tool
(http://www.caida.org/tools/utilities/flowscan/index.xml).
It is based on CampusIO.pm analyser, but more adaptated to
a large ISP or a carrier's needs.
ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.
When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
F.L.A.V.I.O. is a GPL'ed data grapher for netflow data export compatible devices (Cisco and Juniper routers among others, or unix servers running ntop with netflow export plugin). It uses a MySQL backend and has been entirely developed in Perl.