Log management solution that improves the performance of SIEM
edit and replay captured network traffic
For full, incremental, compressed and encrypted backups or archives
Secure wiping/shredding of free disk space with many methods
Powerful webdav client and sync tools with client-side AES encryption
A library for secure deleting data on-the-fly
57 Hash Functions In One Program, plus each with HMAC or KMAC
Robust and flexible VPN network tunnelling
A library for hiding the local IP address from applications.
A library for blocking access to network on-the-fly
C++ cryptographic library (modern hash functions, ciphers, KDFs)
Pioneering Private and Public Cloud Management since 2008
Snare Enterprise: bit.ly/Snare-Trial
Another way of user substitution on unixoid systems
Hexadecimal and raw packet injector and sniffer.
Reveal Rootkit detects processes hidden by rootkits on POSIX systems.