Showing 16 open source projects for "detection"

View related business solutions
  • Pimberly PIM - the leading enterprise Product Information Management platform. Icon
    Pimberly PIM - the leading enterprise Product Information Management platform.

    Pimberly enables businesses to create amazing online experiences with richer, differentiated product descriptions.

    Drive amazing product experiences with quality product data.
  • Cybersecurity Management Software for MSPs Icon
    Cybersecurity Management Software for MSPs

    Secure your clients from cyber threats.

    Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
  • 1
    DAR - Disk ARchive

    DAR - Disk ARchive

    For full, incremental, compressed and encrypted backups or archives

    DAR is a command-line backup and archiving tool that uses selective compression (not compressing already compressed files), strong encryption, may split an archive in different files of given size and provides on-fly hashing, supports differential backup with or without binary delta, ftp and sftp protocols to remote cloud storage Archive internal's catalog, allows very quick restoration even a single file from a huge, eventually sliced, compressed, encrypted archive eventually located on...
    Leader badge
    Downloads: 140 This Week
    Last Update:
    See Project
  • 2
    Simple Event Correlator (SEC) is a lightweight event correlator for network management, log file monitoring, security management, fraud detection, and other tasks which involve event correlation.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    ( pro ping )pinger network alert monitor

    ( pro ping )pinger network alert monitor

    Pinger alert, STATICTICAL TABLES, send EMAILs or SMS by SMS GATEWAY

    Thank you for your DONATIONS for Pinger alert, STATICTICAL TABLES, send EMAILs or SMS by SMS GATEWAY. Look on the tab files, select and download the version of the operating system that you need of this slight textual code that requires no system update. Network monitoring analyzer, network scanner with ping, traceroute and beeper alert and warning mail sender. Capable of scanning IP INFINIT, automatic detection of the source of network interruptions without GUI interface configurations. More...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Appupdater
    Appupdater provides advanced functionality to Windows, similar to apt-get or yum on Linux. It automates the process of installing and maintaining up to date versions of programs. It is fully customizable for use in a corporate environment.
    Downloads: 5 This Week
    Last Update:
    See Project
  • EBizCharge Payment Platform for Accounts Receivable Icon
    EBizCharge Payment Platform for Accounts Receivable

    Getting paid has never been easier.

    Don’t let unpaid invoices limit your business’s growth. EBizCharge plugs directly into the tools your business already uses to speed up payment collection.
  • 5
    Jidgen is an easy-to-use, but powerful Java-based id generator. It uses templates for automated id generation and optional collision detection to avoid duplicate ids.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    AutoScan-Network is an application designed to explore and to manage your network. Entire subnets can be scanned simultaneously without human intervention. It features OS detection, automatic network discovery, VNC Client, Ssh client
    Downloads: 22 This Week
    Last Update:
    See Project
  • 7
    Simple Intrusion Detection System which monitors failed access (SSH and Dovecot) attempts. If hack attempt is detected above the configurable threshold level then a number of actions are taken to block the IP and alert administrators of the attempts.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    Labrador is a Host-based Intrusion Detection System (HIDS) and Integrity Checker written entirely in Perl. It aims to be a complete, free, multiplatform, and open-source solution for detecting modifications and tamperings in files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Gateway Anti-Virus allows applications across the enterprise to check files for viruses by providing a SOAP-based virus scanning web service. The system uses clamav for virus definitions and detection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Business Continuity Solutions | ConnectWise BCDR Icon
    Business Continuity Solutions | ConnectWise BCDR

    Build a foundation for data security and disaster recovery to fit your clients’ needs no matter the budget.

    Whether natural disaster, cyberattack, or plain-old human error, data can disappear in the blink of an eye. ConnectWise BCDR (formerly Recover) delivers reliable and secure backup and disaster recovery backed by powerful automation and a 24/7 NOC to get your clients back to work in minutes, not days.
  • 10
    rrd-watcher is an intelligent alerting system that detects and alerts on abnormal data found in RRD files. Alerts can be raised by using the rrdtool Holt-Winters forecasting method, or with the rrd-watcher detection algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    serverM is an extremely flexible signature-based host-based intrusion detection system (HIDS). Running as a Perl daemon, it uses little CPU, and is capable of detecting a wide range of intrusions. Signature language is powerful and alarm options varied.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    devialog is a behavior/anomaly-based syslog intrusion detection system which detects unknown attacks via anomalies in syslog. It can generate signatures for ease of management, act upon anomalies in a predefined fashion or perform as a standard log parser
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A perl interface to the Novell NDS. Using Net::LDAP as the backend. Providing an OO interface, with automatic schema detection. Supporting Create, Read, Update and Delete actions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Add on web reporting feature for the Advanced Intrusion Detection Environment (AIDE).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    The purpose of SNX is to have a modular series of components that report back to a central repository and 'AI' for pattern recognition and anomoly detection. This is to help with IDS systems, and to move to the next generation of security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    SnortKonsole is a Java-Frontend for the Open Source Network Intrusion Detection System Snort. It supports all configuration-aspects of Snort. The configuration distribution and activating of sensors is done via scp/ssh.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next