Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
MyEAI is a platform independant EAI architecture based on the environment neutral technologies of Java, XML and SOAP. MyEai uses a distributed implementation to create a resilient domain of integrated applications, databases and information.
Argaut XDBAudit 1.8.3 scans corporate networks for Oracle and Microsoft SQL Server databases, collecting usage statistics and license related inventory audit information, including infrastructural metadata relating to capacity and performance metrics.
A IDS management system that is capable of controlling multiple snort (www.snort.org) sensors per machine and across multiple machines. The Code also supports multiple databases in master slave configuration.
CBMS is designed to relieve the burden on dnsbl operators by providing a management framework for their databases and data. CBMS will co-exist with existing management systems or work just as well if not better as the only management system.
Whale is a project that does pre-filtering for logfiles created by the squid proxy server. The accesslog creates by squid will be put in a SQL databases (currfently PostgreSQL). After that a usercan filter out data you don\'t need and call other progra
ACID is a PHP-based analysis engine to search and process a database of
security incidents generated by security-related software such as IDSes
and firewalls (e.g. Snort, ipchains).
A daemon that runs as a non-privileged user, sending updates of server status to a set of peers, which can keep state with rrdtool databases.
You can specify information elements such as uptime, network counters (pps/bps), diskIO, load, and more.
Monitoring tool with support to Websites, RSS, Webservices and Databases. Has notifications by email and RSS and you can access metrics like availability, latency and load time by a web-based GUI. Runs standalone with an embedded HTTP server.