ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.
When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
Build a foundation for data security and disaster recovery to fit your clients’ needs no matter the budget.
Whether natural disaster, cyberattack, or plain-old human error, data can disappear in the blink of an eye. ConnectWise BCDR (formerly Recover) delivers reliable and secure backup and disaster recovery backed by powerful automation and a 24/7 NOC to get your clients back to work in minutes, not days.
Apan, Advanced Performance Addon for Nagios, is a tool that is used to store performance-related data from service-checks done by Nagios (www.nagios.org).
Aware is a high performance distributed event processing framework built for systems management/monitoring. See http://www.elegant-software.com for more info.
ILM is a utility for the ISDN Line Monitor, an ISDN line monitoring hardware sold by many dealers in central europe. (e.g. Conrad and EgTel).
It provides functions to:
- retrieve all recorded information
- erase all recorded information
- config
Network monitoring and troubleshooting is hard. TotalView makes it easy.
This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
trafanal monitors your complete network offering realtime statistics who sends/recvs how much packets/bytes from whom
its a really good placed on a router, showing you who takes which bandwidth, and who made how much traffic
UpClient Logs uptime with uptimes.wonko.com.
UpClient sends the time a computer has been running since its last reboot to the Uptimes Project. The server generates individual & aggregate statistics of various operating system & hardware configurations.
Syslog-sec, provides an open secure syslogd implementation based on (RFC) standards, including rfc3164 ("syslog") and the upcoming "syslog-sign" . Other extensions, will/can be added. More tools will be added, too
Tipalti delivers smart payables that elevate modern business.
Our robust pre-built connectors and our no-code, drag-and-drop interface makes it easy and fast to automatically sync vendors, invoices, and invoice payment data between Tipalti and your ERP or accounting software.
ppplog keeps track of your ppp online session costs. It detects online/offline states and automatically calculates costs according to your local phone company. Simplicity and flexibility was key in development.
Benson is an automated monitoring system designed to ease the life of a network, system,
and database administrator. Benson harness the power of Perl for flexibility all while maintaining the low foot print required of a networked monitoring system.
A TTY small utility that sits between the user and their shell to perform logging and other tasks. s1c Flatline also enables a method to "inject" data into a TTY (from other TTY's) as if it were entered via STDIN of the controlling TTY.
pam_eps enables you to authentify users against a machine with a ssh daemon running. If the user exists in the remote server and the password is correct a new user with the expecified password and username will be created in the local machine.
This product sniffs web traffic on a Linux/Unix machine and creates log files for each website in CLF, Accrue, or a Verbose format. It can be configured with any IP address/Port Number combination, or it can be configured with domain names or virtual h
Autocheck is a distributed, extensively configurable, systems monitoring tool for unix'es written in Perl. It includes SMS and email notification and a lot of checks.
KISS is a kernel-side host-oriented security tool, which may bring you file integrity checking, file and process hiding and actions handling on special internal events (using a tiny scripting language).
The PagingMon (Paging Monitor) project aims to provide a *real time* visualization of page-in and page-out activities in a virtual memory system. The name comes from PokeMon, which is a popular Japanese cartoon.
ProSum is a terminal based program that protects your files, sys_call_table and IDT like tripwire way (All in user space, without kernel modules) In addition, database with files etc. could be encrypted with Blowfish algorythm and more.
Ldappassd is a daemon to change the user's password, similar to Eudora poppassd and has the same purpose, but the password database is ldap. The main
feature is a configuration file where can have a filter defined to search the records.
James Bond Log is a daemon log watcher similar to swatch or logcheck , it's completly written in C using PCRE Library and it provides the ability to be chrooted. It's actually at developing stage.