FortiGate NGFW on Azure Enables You to Protect Your Workloads Beyond Basic Azure Security Services
FortiGate NGFW identifies and stops advanced threats with powerful application control, malware protection, web filtering, antivirus, and IPS technology. As the attack surface expands, FortiGate provides integrated and automated protection against emerging and sophisticated threats while securing hybrid or multi-cloud environments. Deploy today in Azure Marketplace.
Software and support solutions to protect your clients’ critical business assets
ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
Cancerbero (the watchdog of the ports) is a portscan frontend based in nmap. Scans the hosts of net ranges every configured interval and it'll store the results in a mysql DB. Detect changes in ports, services and OS and notice you with an email ale
Simple web based cabling system manager. Room/racks/patch panel and devices are managed in a simple test base web interface. Run on xp/windows server (running Apache) or *nix boxes. Based on Perl and sqlite DB Small and simple and light character web
Sarparse is a utility based off of cacti to graph Sar metrics from remote hosts. It require NRPE and SAR to run out-of-the box but could easily be modified for any other transport.
Proactively monitor, manage, and support client networks with ConnectWise Automate
Out-of-the-box scripts. Around-the-clock monitoring. Unmatched automation capabilities. Start doing more with less and exceed service delivery expectations.
Lire is a pluggable log analyzer, supporting HTTP, email, DNS, FTP, firewall and print services. Output generated can be txt, (X)HTML, PDF, RTF, and DocBook. The latter four support graphics. For news/support visit the project homepage.
Network accounting package designed around xt_ACCOUNT, sqlite and webmin. External acl helpers are provided to integrate with squid At it's most basic it can silently monitor a network's usage or accounts can be created to provide metered internet
NaYaBoh is an „Internet Proxy and Gateway“, especially designed to enhance Internet access in developing countries. NaYaBoh tries to be as simple as possible to use. Speed up your Internet, save bandwidth: web/dns caching, advertisement blocking.
For IT service providers and MSPs that need a data platform to manage their processes
BrightGauge, a ConnectWise solution, was started in 2011 to fill a missing need in the small-to-medium IT Services industry: a better way to manage data and provide the value of work to clients. BrightGauge Software allows you to display all of your important business metrics in one place through the use of gauges, dashboards, and client reports. Used by more than 1,800 companies worldwide, BrightGauge integrates with popular business solutions on the market, like ConnectWise, Continuum, Webroot, QuickBooks, Datto, IT Glue, Zendesk, Harvest, Smileback, and so many more. Dig deeper into your data by adding, subtracting, multiplying, and dividing one metric against another. BrightGauge automatically computes these formulas for you. Want to show your prospects how quick you are to respond to tickets? Show off your data with embeddable gauges on public sites.
Peter's Program Development is an effort to release many small and large programs fostered by Peter Willis and associates. As soon as a project is fairly bug-free it is put in development or stable status.
STARCAT (STAtiscic Reporting, Collecting and Analysing Tool) is a toolkit to gather statistics out of several sources (for example, rrd-files, logfiles, DBMS,...) and create nice-looking reports out of them using XML-templates.
A set of tools to generate and build a customized initramfs, for simple mounting tasks, such as setting up a unionfs system. Written for a small footprint and fast execution. Compatible with both glibc and uClibc.
IP accounter is a server-centric IP accounting software package for linux. Traffic can be egathered form any iptables-based router. Configuration utilizes several abstraction layers and supports templates. IPv6 traffic may be mixed with IPv4.
Enables tunneling of network connections through restrictive HTTP proxies. Features: Portmapping, SOCKS4, SOCKS5, web-based admin interface, possibility to use standalone server (perl) or hosted server (PHP), optional authorization from LDAP or MySQL
DAD is a Windows event log and syslog management tool that allows you to aggregate logs from hundreds to thousands of systems in real time. DAD requires no agents on the servers or workstations. Correlation and analysis is driven through a web front end.
PHP, Perl and MySql based web interface for the Nessus security scanner and Nmap port scanner. The system presents scan results via a Email notification, a HTML interface, or exported to a PDF file.
edquotawrap is a wrapper for edquota. It eases handling of quota's under Mac OS X and Solaris. It has been developed initially at ETH Zurich and released to the public under the GPL.
MaxMind GeoIP is a set of APIs for looking up the location of an IP address, including the country, region, city, latitude, and longitude. Free GeoLite databases are available at http://www.maxmind.com/app/geolitecity
Wrapper to Amanda Backup amrecover command using Expect module. A starting point to develop a GPL gui web interface for an Amanda Backup System. It creates a Daemon to support a rpc webservice. Tested on a linux system.
This is a collection of three Perl scripts used to ease IOS switch migrations by tracking connected hosts before and after migration and recommending (or automatically applying) configuration changes based on where the hosts moved.
inundator is a tool used to anonymously inundate intrusion detection logs with false positives to obfuscate a real attack, leaving the IDS analyst feeling completely inundated.