The book shows you how architecting a modern security visibility infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security investments, and optimize uptime and availability. See the entire threat landscape, understand security visibility basics, support both inline and out-of-band security systems, explore security visibility use cases and ask the right questions about visibility.Sponsored Listing
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
No-agent discovery & inventory. Apps,software,system,network monitor,IT asset configuration management,correlation,reporting. Use snmp,wbem,wmi,ssh,sftp,smb,nfs,http,ftp,nmap,ldap,dns,dhcp,sql,jdbc,groovy,rest on linux,unix,windows. XML,XPath,XQuery,URI1 weekly downloads
Script to import maildir mail into gmail with metadata.1 weekly downloads
python enteprise integration framework project. Powerfull class library based on EAI patterns and a modeling and simulation tool.1 weekly downloads
Easily access more than 100,000 products and tools with our robust search engine. Manage your entire IT lifecycle from purchase to renewal all in one place — so you can get more done faster.Sponsored Listing
This is a program that watches your system log files, looking for hack attempts. It instanty reacts to potential security breaches by (for instance) adding firewall rules to cut off the attacker.
It is a daemon that fits between an e-mail server and an e-mail client in order to simulate one another. This way clients can send e-mails, through the server, from anywhere in the world with no need of a relay agent.
A python-written network latency monitor, much like Smokeping, but a more extensible API as well as a better configuration interface.