Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Learn More
All-in-one security tool helps you prevent ransomware and breaches.
SIEM + Detection and Response for IT Teams
Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
A full-featured, Java-based back-office suite specifically designed for use in global financial institutions to facilitate straight-through-processing and other much-needed operational efficiencies. Built using best-of-breed, open-source technologies.
A network analyzer designed be an Acceptable Use Policy Infraction Detector (AUPID). It allows Administrators to monitor a user's activies over the network. Supported by www.degreeme.com.
This project provides an interface to Sun's JCE (Java Cryptographic Extensions) as a JSP taglib. It brings strong encryption algorithms such as AES and Blowfish to your JSP applications. It uses the bouncycastle.org cleanroom JCE 1.2.1 implementation as
Martus Solutions provides seamless budgeting, reporting, and forecasting tools that integrate with accounting systems for real-time financial insights
Martus' collaborative and easy-to-use budgeting and reporting platform will save you hundreds of hours each year. It's designed to make the entire budgeting process easier and create unlimited financial transparency.
Aiakos is a suite of software components that together provide a collaborative Single-Signon System across multiple trusted websites. A simple open protocol is provided for collaboration, and working libraries are provided for ASP and Zope.
PACIE (Perl Analysis Console for Intrusion Events) Attempts to be a complete replacement for ACID. Place this cgi script on your internal webserver and receive powerfull reporting on your current snort database.
TLogin is a java login applet for tomcat that uses a database to track login attempts and the source of those attempts. Tlogin provides features for preventing web based password guessing attack by placing temporary locks on the account after every fail
Total Network Visibility for Network Engineers and IT Managers
Network monitoring and troubleshooting is hard. TotalView makes it easy.
This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
intra:Q is a content management system designed for intranet use. The system is modular, and can provide an intranet site, content filtering, and replacements for standard browser widgets.
Kerberos Poppassd is a password changing daemon based upon poppassd version 1.8 by Pawel Krawczyk. The daemon works exactly like the original poppassd. The only difference being that this poppassd changes a users Kerberos 5 password.
AIM Sniff is a network sniffer specifically designed to pick up messages transmitted using the AIM or MSN clients and their derivatives. All information can be sent to STDOUT or a MySQL DB.
Tool to analyse syslog message. It parses log message and alerts the administrator on certain conditions. It can also do some reporting on existing logs.
SWM (Secure WebMail) is an applet that provides confidentiallity and authentication in webmail applications using SHA/RSA algorithms. It can accompany virtually every webmail application, but comes with a plugin for squirrelmail and can run standalone.
The Entitlements Library provides for the enforcement and administration of application software entitlements or permissions. The Administration component permits the creation of roles and is Servlet based.
A distributed Java implementation of the VISA 3-D Secure(tm) Merchant Server Plug-in (MPI) that allows e-commerce web site to perform payment authentication operations for Internet purchases.
The subject of this project is development of the Intrusion Detection System (IDS) with Artificial Neural Network (ANN). This model will allow the implementation of a system capable to analyze and to identify possible intrusions, based on the method of an
Psniff is a packet sniffer and spoofer based on the PF_PACKET protocol family provided in kernel >=2.0 . Some of the protocols initially supported are IPV4,IPV6,TCP,UCP,BGP,ICMP,RIP, NTP.
This small simple secure mail interface allows users to create messages, encrypt them with a password using the Enigma cipher and then send them to anyone with an email account.
AuthServlet is a Java Servlet (and JSPs/TagLibs) which provides a simple pluggable authentication and role-based authorization service. It can be easily incorporated into any Servlet-based web applications.
ThreatMan is an IDMEF compliant threat manager application which makes use of a multi-tier architecture.
It aims in event and vulnerability correlation from alerts sent by IDSs, firewalls and other IDMEF compliant applications.
Stinger is a Java validation engine for HTTP requests. Deploy it as a J2EE filter or integrated into servlets and JSPs. Specify simple regex-based rules in XML-based Security Validation Description Language (SVDL). Flexible logging and error handling.
sntm is a Qt based GUI snort monitor. Currently, it is capable of monitoring
multiple snort sensors in a centralized monitor screen. Each snort sensor
creates a SSL encrypted communication thread to connect to the moniter server.
ReHash is an easy-to-use console-based hash calculation tool written in C++. It supports many algorithms and output formats and it can be fully configured using some of the many command-line arguments which can be passed to the tool.
Web Image Security combines some javascript, php, and htaccess techniques to make it extremely challenging for would-be image- or bandwidth-thieves from violating your image copyrights via bulk download, scripted download, or unethical hyper-linking.