Creates true post-admission network access control by regulating network access to admitted users on an as needed basis. Users cannot escalate privileges between micro-perimeters. Manageable, efficient and scalable for complex security environments.

Project Samples

Project Activity

See All Activity >

Categories

Security, Firewall

License

GNU General Public License version 2.0 (GPLv2)

Follow Security Policy Manager

Security Policy Manager Web Site

Other Useful Business Software
Gemini 3 and 200+ AI Models on One Platform Icon
Gemini 3 and 200+ AI Models on One Platform

Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

Build generative AI apps with Vertex AI. Switch between models without switching platforms.
Start Free
Rate This Project
Login To Rate This Project

User Ratings

★★★★★
★★★★
★★★
★★
1
0
0
0
0
ease 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5
features 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5
design 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5
support 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5

User Reviews

  • Quite to our surprise, there is still nothing else that does what ISCS does
Read more reviews >

Additional Project Details

Operating Systems

BSD, Linux

Languages

English

Intended Audience

Information Technology, System Administrators, Telecommunications Industry

User Interface

KDE, Qt, X Window System (X11)

Programming Language

C++

Database Environment

MySQL, PostgreSQL (pgsql), SQL-based

Related Categories

C++ Security Software, C++ Firewall Software

Registered

2003-01-30