Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Pulled Pork for Snort and Suricata rule management (from Google code)
PulledPork is a Perl-based script that automates the management of Snort and Suricata IDS/IPS rulesets. It streamlines the process of downloading, parsing, and updating rules, ensuring that intrusiondetection systems remain current and effective.
ESSPEE - Extreme Security Scanning Penetration testing & Exploitation Environment
Ubuntu 12.04 LTS (Precise Pangolin) is purposefully selected as the base Operating System to obtain supports from Ubuntu for a long duration (till Apr 2017).
It is packed with featured security tools with very less resource consumption and higher degree of stability.
Thanks to Back Track, Blackbuntu, CAINE and DEFT and many others for inspiration.
Being a sole developer to this distro, I wish it...
...This general-purpose library could be used by any Java applications that are involved in the XML message content filtering. Example application scenarios could be intrusiondetection, selective rule engines, targeted database insertions during the ETL process and various business logic scenarios. The library could also be used in XML routers and various web services for XML content filtering where XML is a common message passing format.
...This general-purpose library could be used by any Java applications that are involved in the XML message content filtering. Example application scenarios could be intrusiondetection, selective rule engines, targeted database insertions during the ETL process and various business logic scenarios. The library could also be used in XML routers and various web services for XML content filtering where XML is a common message passing format.
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
The Realeyes IDS captures and analyzes full sessions. The graphical user interface will display both halves of captured sessions to determine what occurred. The GUI also provides management of application users, sensors, and the database.
SecurityFusion is an open source network intrusiondetection and prevention
system based in Hogwash, capable of performing real-time traffic analysis and packet
logging on IP networks.
The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: IntrusionDetection Systems (sensors), Attacks, and Responses.
Templario is a security event audit and compliance suite which helps you to monitor enterprise security from one central console. Templario automates and consolidates complicated enterprise network security auditing and requires near-zero administration.
The subject of this project is development of the IntrusionDetection System (IDS) with Artificial Neural Network (ANN). This model will allow the implementation of a system capable to analyze and to identify possible intrusions, based on the method of an
Symwire is a Host-based IntrusionDetection System (HIDS) and Integrity Checker written entirely in open c for symbian. It aims to be a complete, free, multiplatform, and open-source solution for detecting modifications and tamperings in files.