Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
Create IT quote templates, automate workflows, add integrations & price catalogs to save time & reduce errors on manual data entry & updates.
ConnectWise CPQ, formerly ConnectWise Sell, is a professional quote and proposal automation software for IT solution providers. ConnectWise CPQ offers a wide range of tools that enables IT solution providers to save time, quote more, and win big. Top features include professional quote or proposal templates, product catalog and sourcing, workflow automation, sales reporting, and integrations with best-in-breed solutions like Cisco, Dell, HP, and Salesforce.
sfick (pronounced as "s-fick") is a two part software system whose function is to assist system administrators with the process of verifying the integrity of critical files. Given a system compromise, system administrators must be able to verify the integ
Shoki is a free, open source network intrusion detection system. The fundamental design goals are simplicity and modularity, and the focus is on traffic analysis rather than content inspection.
Live Security/Forensics Linux Distribution, built from scratch and packed full of tools useful for vulnerability analysis, penetration tests, and forensic analysis.
A Webmin module for maintaining the FreeBSD Firewall.
This module allows the user to configure the FreeBSD firewall via webmin.
Operating systems supported: Freebsd 4.7 and 5.x
This module runs under webmin > 1.070
Tipalti delivers smart payables that elevate modern business.
Our robust pre-built connectors and our no-code, drag-and-drop interface makes it easy and fast to automatically sync vendors, invoices, and invoice payment data between Tipalti and your ERP or accounting software.
P.A.T.H is a collection of tools for inspecting and hijacking network connections written in Perl.
By now it includes a packetgenerator, a rst deamon, a sniffer, an ICMP redirection tool, an ARP redirection tool, an IDS testing tool and an automatic hij
Wellenreiter is a GTK/Perl program that makes the discovery, penetration and auditing of 802.11b wireless networks as easy as possible. All three major wireless cards (Prism2 , Lucent, and Cisco) are supported. Usability is one of the main goal.
This is an attempt to port the CIS Benchmark tool (http://cisecurity.org/index.html) to OS X from its Linux implementation. This project is working on taking the source from the Level 1 Linux implementation, written in Perl, and porting it to OS X. The
The FreePKI project aims to create practical, interoperable & free code and services for Certificate and Registration Authorities based on the X.509 standard, including nearly zero-cost ID verification through a PGP-like web of trust scoring system.
Best-in-class automation, scalability, and single-pane IT management.
Don’t settle when it comes to managing your clients’ IT infrastructure. Exceed their expectations with ConnectWise RMM, our MSP RMM software that provides proactive tools and NOC services—regardless of device environment. With the number of new vulnerabilities rising each year, smart patching procedures have never been more important. We automatically test and deploy patches when they are viable and restrict patches that are harmful. Get better protection for clients while you spend less time managing endpoints and more time growing your business. It’s tough to locate, afford, and retain quality talent. In fact, 81% of IT leaders say it’s hard to find the recruits they need. Add ConnectWise RMM, NOC services and get the expertise and problem resolution you need to become the advisor your clients demand—without adding headcount.
Features of Cyberarmy.com brought direct to your desktop. They don't want it, so this projects kinda dead, wish I hadn't started it so early haha. Any ideas for an alternate purpose (not an IM client): jwinsatt@adelphia.net
IAN (I Am Normal) is used to minimize the chance of an attacker successfully fingerprinting a honeypot. This is accomplished by creating bogus data and history files, alter creation and modification times, add users, patch x number of programs, etc.
An alternative Identification system that is a replacement for Microsoft's Passport and the Liberty Alliance. Its a simple architecture that is setup so anyone can run a server and thereby have control over their online identification.
a linux netfilter/iptables firewall log summarizer with graphical and command line interface that helps the sysadmin in his daily routine. points of interest can be examined closer to gain further information. you can also run it in command line mode and
The Castellan Sentry detects login attempts, and gives the user the ability to block, allow or research the person attempting to connect. It utilizes a GUI front end to allow the user to make their decision quickly and easily.
A fast TCP port scanner with clear port definitions and formated output. Scan is done via randomized ports, configurable to run 1 - 65535 ports or 1 - 1024 (default). Application has the ability to pause for x seconds between each connection. Very fast
The Firewall Configurator for Webmin is a Webmin module written in Perl/CGI. It helps to build rules for common proxy server Squid and common paketfilter Iptables ( linux kernel 2.4.x ).
Pace-ICMP is a utility that can allow X amount of ICMP (ping, etc) packets travel to the host, once X is exceeded, all ICMP traffic is blocked. This allows ping and traceroute functionality, while still protecting you against ICMP attacks.
Perl Secure Conf (PSC) is a suid C program which reads a protected configuration file (containing passwords, secret data, whatever) and then drops its privilege. Now, in unpriviledged mode PSC execs a perl
script, leaving a handle to the protected conf.
pmon is a protocol monitoring tool. It provides Graphical User Interface to track down differen tcp/udp sessions. It also extracts (and analyses) different session information, such as ftp/telnet user ID and password, URL information in WWW session.
The purpose of this project is to develop and maintain a Virtual Reality network interface to provide for network management and security for heterogenous networks of all types.
This interface will allow you to monitor and actively scan your network.
The OpenX509 Project aims at creating an enterprise-scale PKI/Trustcenter software supporting well established infrastructure components like RDBMS and Hardware Security Modules. It is a fork of the OpenCA project, building on the experience gained in it.