Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.
Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
Sign Up Free
Build Securely on Azure with Proven Frameworks
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Tool to acquire hard disk drive temperature from the network interface
###### HDDtempNC has now moved to Github ######
###### Please visit the Github project at https://github.com/viharm/HDDtempNC ######
HDDtempNC provides a script to acquire hard disk drive temperature for a target host by querying an existing HDDtemp daemon and then parse the results according to the request.
See project wiki for more details, usage and code.
A complete OpenSource Network Management System Is SNMP-Standard Oriented (tested on Cisco and Linux). It Integrates Syslog, Tacacs, RRDtool (Performance Graphs), Maps, Traps, TFTP, Autodiscovery, Sound Alerts, AAA, Modular and Extensible.
Arlogd provides remote logging. A daemon on a client host watches all fifo's in some directory.
Anything written to a fifo is appended to a corresponding file on the loghost.
It is not necessary to change or reconfigure logging applications ; you can just replace a log by (a symlink to) a fifo.
Ettercap is a multipurpose sniffer/interceptor/logger for switched LAN.
It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis. Development has been moved to GitHub, https://github.com/Ettercap/ettercap
...SarBox helps to analyze this log file and present data in graphical charts or text format.
To collect sar statistics from an environment, use below syntax
[user@host ~]# sar -A 30 2 > sar_linux.log
“30 2” reports for every 30 seconds and total of 2 times, written in sar_linux.log.
The Open Host Monitor provides an open extensible solution to monitoring availability of all aspects of ICT equipment and infrastructure. It makes use of various technologies including SNMP and custom agents running on the target hosts.
Labrador is a Host-based Intrusion Detection System (HIDS) and Integrity Checker written entirely in Perl. It aims to be a complete, free, multiplatform, and open-source solution for detecting modifications and tamperings in files.
The Austria C++ library provides a host of essential C++ tools including but generic factories, smart pointers, logging, unit testing framework and parameters/configuration system. The library will work with both Linux/GCC and win32/MVC++.
What are the packets rejected by your Netfilter based firewall today ? How often this suspicious host try to connect to your box ? What are the most rejected domains ? Who is this strange host which scan your ports ?
The responses are in the iptables log
PyIDS is an intrusion detection system whose aim is to provide concise information to administrators about some parts of the system i.e filesystem checksums, unknown connections to the machine, access control lists of special files, log revision...
IPLog is a simple, easy to use IP logging/management tool. Logging features include host, referrer, first/last dates of visit, pages visited, and more. Includes an effective search system, and displays all active IPs. Uses MySQL.
This is an interface for Modular Syslog or msyslog found at http://sourceforge.net/projects/msyslog/. The interface made to be fast and responsive to string. By just click on host or selecting hosts, admin able to click on text string to zoom in event.
A set of simple shell scripts to query (via SNMP) any router in an enterprise network for a list of active ARP cache entries. These entries are then merged into a host table with timestamp of last seen entry.
KISS is a kernel-side host-oriented security tool, which may bring you file integrity checking, file and process hiding and actions handling on special internal events (using a tiny scripting language).
DPytHOS is a means for administrators of large networks to both
monitor and manage the servers under their control.
DPytHOS is implemented in python and uses a generic database
back-end (with MySQL supported and MS-SQL 2000 supported via
XML)
Free Agents DIDS is a distributed intrusion detection system that you place on each host on your network. Agents intercommunicate with aes encryption, automatically alert you, and secure your network for free!
logconf is a centralised configuration control for logging software. Configurations are included for syslog-ng (multi-host), logrotate, and logwatch; others will be added in future.
Adding a new host is as simple as adding a word to a config file.
Immune Security Architecture For your Enterprise --
Host-Based Intrusion detection for UNIX based systems, at the process level.
Detect changes in the normal behavior of processes, advanced features to detect Buffer Overflows.