Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.
Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
From desk booking and visitor management, to space planning and office utilization data, Eptura Workplace helps your entire organization work smarter.
With the world of work changed forever, it’s essential to manage your workplace and assets together to effectively create a high-performing environment. The Eptura experience combines the power of workplace management software with asset management, enabling you to effectively operate your building and facilitate hybrid work.
Insidias is a next-generation intrusiondetection engine, with a focus on speed, efficiency, advanced pattern matching, parallel-processing, modularity, and expandability.
Output spool reader for Snort! This program decouples output overhead from the Snort network intrusiondetection system and allows Snort to run at full speed. It takes input and output plugins and can therefore be used to convert almost any spooled fil
MOTion detectOR is a simple daemon that periodicaly checks for changes in a given file/logfile.
This application will warn you by mail when a change in a monitored file is detected.
It may be used for intrusiondetection or hack investigation for examp
Active IntrusionDetection (AIP)
Provide a barometer of scanning and hacking activity around the Internet that can be used by administrators to help keep their own network(s) safe. Provides automated ACL creation for a variety of platforms.
Free Agents DIDS is a distributed intrusiondetection system that you place on each host on your network. Agents intercommunicate with aes encryption, automatically alert you, and secure your network for free!
Immune Security Architecture For your Enterprise --
Host-Based Intrusiondetection for UNIX based systems, at the process level.
Detect changes in the normal behavior of processes, advanced features to detect Buffer Overflows.