Security Software

OS OS

    • More...
  • More...
    • More...
    • More...

Category Category

    • More...
    • More...

License License

    • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...
    • More...

User Interface User Interface

    • More...
  • More...

Database Environment Database Environment

Freshness Freshness

Security Software

  • SolarWinds is #1 in network monitoring. SolarWinds is #1 in network monitoring. Icon
    SolarWinds is #1 in network monitoring. Icon

    Reduce network outages and improve performance with advanced network monitoring software.

    SolarWinds® Network Performance Monitor (NPM) is the ONLY monitoring solution with NetPath™ for hop-by-hop visibility into your critical paths, on-premises and into the cloud. NPM also features PerfStack™, helping you accelerate identification of root cause by dragging-and-dropping network performance metrics on a common timeline for immediate visual correlation across all of your network data. See why we're the leader. Try it free for 30 days!
  • One Backup & Disaster Recovery Solution for Any Need One Backup & Disaster Recovery Solution for Any Need Icon
    One Backup & Disaster Recovery Solution for Any Need Icon

    SherWeb Online Backup Is Your Easy Solution for Cloud & Local Backups. The App Is Free, Pay Only for the Cloud Data Storage.

    With the diversity of IT solutions used, managing backup and disaster recovery can turn very complex for a business. SherWeb Online Backup simplifies everything. You back up servers, desktops, virtual machines and smart devices, plus popular applications and Office 365 data – all from a single web-based console. Active Protection, the embedded anti-ransomware feature, adds a security layer while the Cloud-to-Cloud feature saves network bandwidth.
    Are you an IT professional looking for a great security solution to resell?
    Try it FREE for 30 days!
  • U-Tranz Icon

    U-Tranz

    UDP based secure file transfer application written in JAVA.

    U-Tranz is a free application developed on the characteristics of UDP allows the transmission of unlimited file size. Most of the applications based on UDP restrict file sharing upto 64kb which makes transmission less efficient on large files. Along with the tremendous increase in file size, certain features like implementation of Government Standard Security Algorithms (AES-256*/RSA-2048 and SHA-512) have been added to this application for secure sharing of huge files across different workstations.This tool programmed in JAVA and requires Java Runtime Environment to use this tool. *Unlimited Strength Java Cryptography Extension Policy Files for the Java SE Runtime Environment 7 required to use this feature.

    Downloads: 0 This Week Last Update: See Project
  • Use Yubikey to log in to Phpbb forum

    Use a Yubikey as a strong authentication device to access a public forum avoids spams by anonymous account registration by few malicious users. Thus the forum content quality will be better controlled with minimal content moderation overhead.

    Downloads: 0 This Week Last Update: See Project
  • Utilities 4 Testing

    This library has a package of useful methods to help the development of automated tests for Java applications.

    Downloads: 0 This Week Last Update: See Project
  • ViroFilT Pendrive Security

    ViroFilT Pendrive Security ViroFilt Antivirus Software for Securing Pendrive and Entire Systems Prevent from the Shortcut Virus and Hidden Files/Folders Download Link Windows 8 32/64bit Version : http://goo.gl/Bn10Jq Windows 7 32bit only Click Here : http://goo.gl/EH5jkI Windows 7 64bit only Click Here : http://goo.gl/pfs7i3 Description : * Scan Entire System * Removable Disk Scanning with Automatically Detection * Removing Viruses & Trojans, Worms * Removing Unwanted Shortcuts LNK files in your Pendrive * Neutralize Hidden Folders & Files in Your Computer and Pendrive * Disable & Enable Task Manager Program * Disable & Enable Registry Editor * Disable & Enable Control Panel * Disable & Enable Command Prompt * Show Hidden Files Regards R.Sakthikumar(www.facebook.com/sakthi.kumar.it) Studying in diploma in Information technology 3year(2012-2015) A.D.J Dharmambal Polytechnic College Nagapattinam

  • WS-delegation

    Dynamic, restricted and context-aware delegation service for web-services

    Downloads: 0 This Week Last Update: See Project
  • Locate Sensitive Data across Networks and Workstations Locate Sensitive Data across Networks and Workstations Icon
    Locate Sensitive Data across Networks and Workstations Icon

    Build the Business Case for Effective Security Investments

    Your customers recognize the importance of security, but often don’t realize the urgency until they see something tangible. SolarWinds Risk Intelligence assigns value to your data vulnerability, helping you build a strong business case for data protection and triage the most important problems to tackle. Some powerful features include data risk communicated as financial impact, at-risk data discovery and PCI DSS, PAN & PII scans.
  • Web Application Reliability and Defense

    The Web Application Reliability and Defense (WARD) framework is a two-part security solution composed of a vulnerability detection component, SecureUnit, and a vulnerability protection component, SecureFilter.

  • Web Blocker Icon

    Web Blocker

    Block Web Site

    Block Web site that you want to.

    Downloads: 0 This Week Last Update: See Project
  • WebID-IDP-Client

    An easy to use client and verifier for WebID IDPs

    Downloads: 0 This Week Last Update: See Project
  • WebID-Tomcat-Realm

    WebID Tomcat Realm is an analogy of MemoryUserDatabase in RDF, it provides 1. User 2. Group 3. Role 4. UserDatabase 5. TomcatRealm for use with WebID and RDF.

    Downloads: 0 This Week Last Update: See Project
  • WhitewallManager

    Whitelist manager

    WhitewallManager is a whitelist manager. It aims to be a web based administration tool for administrators using a default-deny approach to the security of the network they are responsible for. Default-deny is a superior model for network security as compared to default-allow, which is how the security model of most local area networks is modeled. Default-deny disallows all but access granted to resources which you specifically allow. The advantage to this is that any new resources which turn out to be bad are blocked by default. Default allow disallows nothing and bad things are blocked as they are discovered. This means that you are exposed to any bad things which you don't know about. The reason most networks are modeled on default-allow is that default-deny is hard to manage. What WhitewallManager aims to accomplish is to make default-deny and whitelists manageable with a sensible and efficient work flow. Currently it's a nightmare to manage a default-deny network.

    Downloads: 0 This Week Last Update: See Project
  • Get the Edge; Toad Edge Get the Edge; Toad Edge Icon
    Get the Edge; Toad Edge Icon

    Your next-gen toolset for MySQL database environments

    If your organization takes advantage of the cost-effective, flexible MySQL open source database platform, then you need a toolset that supports your commitment to open source relational databases.  Toad Edge for MySQL has what you need and helps you ramp up on MySQL quickly, ensuring faster time to value.
  • Win PCA

    MS windows shell script to create simple certificate infrastructure. Handle self signed root certificate (CA), service certificates (https server for example) and user (personal) certificates.

    Downloads: 0 This Week Last Update: See Project
  • Wireless Security

    The wireless security model provides security to different aspects of the attacks.

    Downloads: 0 This Week Last Update: See Project
  • Xanthus - a java implementation of "LID"

    Java servlet implementation of the Lightweight Identity Management (LID), URL Management Software. More information about LID can be found at <a href="http://lid.netmesh.org>http://lid.netmesh.org</a>

    Downloads: 0 This Week Last Update: See Project
  • clark

    scratchpad promject

    Downloads: 0 This Week Last Update: See Project
  • deEncrypt

    deEncrypt is an HTML tool which encrypts arbitrary texts (e.g., password) using AES. It is ideal for use within a business where you have to remember tons of different passwords but not allowed to install any application to help you remember them.

    Downloads: 0 This Week Last Update: See Project
  • eid

    Export Import Directory Tool to help building metadirectory

    Downloads: 0 This Week Last Update: See Project
  • ezAuth

    No More Passwords! How many times have you forgotten your user ID or password, only to have your password reset via email? Why go through the frustration of entering the wrong passwords. Authenticate with email the very first time with ezAuth.

    Downloads: 0 This Week Last Update: See Project
  • ezSecure

    The goal of the project is to develop Role Based Access Control software which can be used in any application. The software can be deployed as a server which can cater to multiple applications. Rules can be written for fine grained access control.

    Downloads: 0 This Week Last Update: See Project
  • faas

    faas is a federated authentication and authority server

    Downloads: 0 This Week Last Update: See Project
  • gaiusIdM

    gaiusIdM is an Identity Management solution. A centralized identities repository that can be used to ditribute and provision identities on heterogeneous systems like RDBMS, ldap, MS AD, etc. It runs on Tomcat and is based on JPA,SDO,XSD,XSL,AJAX and Rest

    Downloads: 0 This Week Last Update: See Project
  • gdghj

    nbbfgyy

  • jOceanus

    Java utility packages

    jOceanus is a set of Java utilities providing a wide range of functionality.

    Downloads: 0 This Week Last Update: See Project
  • jSai :Servlet Authentication

    Please note: not having time to complete jSai myself; I came across the ACEGI project which I now recommend instead. jSai; a Servlet Authentication Implementation. jSai aims to allow easier to use, more powerful authentication for Java Servlets.

    Downloads: 0 This Week Last Update: See Project
  • jauto: XMPP Automated Authentication

    HTTP-Authorization via XMPP (JEP-70): an automatic login solution. Includes both client and server components.

    Downloads: 0 This Week Last Update: See Project
  • java-utilities

    A library if Java utilities including LDAP authentication, Queuing Engine etc.

    Downloads: 0 This Week Last Update: See Project

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you