The book shows you how architecting a modern security visibility infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security investments, and optimize uptime and availability. See the entire threat landscape, understand security visibility basics, support both inline and out-of-band security systems, explore security visibility use cases and ask the right questions about visibility.Sponsored Listing
- Linux (8)
- Grouping and Descriptive Categories (5)
- Mac (5)
- Windows (5)
- Modern (4)
- BSD (2)
- Android (1)
- Embedded Operating Systems (1)
- Emulation and API Compatibility (1)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
A network security analysis and monitoring toolkit Linux distribution.997 weekly downloads
A useful collection of batch files and scripts for daily purposes (backup, security, system management, etc.) and development
ThousandEyes extends visibility across corporate networks as well as the public Internet, helping to solve issues from the branch through MPLS links and SIP trunks to service provider networks. Simulate pre-deployment capacity, monitor detailed performance metrics and see how QoS settings impact call quality.Sponsored Listing
LIMeTool (pronounced like the fruit), is intended to be a simple and easy interface for managing accounts on an integrated Sendmail/LDAP/Cyrus IMAP installation. It's written in PHP and is realitively easy to configure and expand.
Musaico is a web shell. It is designed to help web application developers glue together existing web applications into custom web environments.
Open Enterprise Search Platform. The project aims to deliver a complete Open Enterprise Search Platform, by packaging several available freely available components together. The core component is Apache SOLR based on Lucene.
It integrates a bundle of functions on a unique platform, permitting to administer as completly as possible the local area networks of a site : discovery, inventory, asset mgmt, teledeploy, logging, reports, graph, security, snmp portmapper, helpdesk, ..
Networkintruder is a script to automate common tasks done by system administrators or pentesters, to discover that crack in the wall that allows compromision, before the bad guys do.
Easily access more than 100,000 products and tools with our robust search engine. Manage your entire IT lifecycle from purchase to renewal all in one place — so you can get more done faster.Sponsored Listing