NetBIOS, SNMP and TCP/IP scanner for network administrators. Checks the availability of host computers and displays file types being exchanged on the network. Supports Wake On LAN and remote shutdown of computers in the network.
Unified Threat Management solution for companies to protect their network, web interface and email. Secures the network against denial of service attacks, port scans, worms, trojans, botnets, program exploits and more. Also provides secure remote access via IPsec or SSL VPN clients for members of staff who work out of the office, and filters all email data traffic.
Monitors a computer's total inbound and outbound data traffic (packet filter for TCP/IP protocols) and protects it from attacks through the network e.g. by viruses or hackers, and from unwanted outbound data packets. The tool is the collaborative product of a community of various security experts who are sharing their own security configurations for free.
Rights management for internal security in enterprises, determines who can access what data and why and allows departments to assign rights, also documents changes and requests and makes them accessible; administers VMware VSphere, Active Directory, Microsoft and NetApp file servers, Exchange and SharePoint farms.
This tool acts as an SMTP proxy server and filters all your email traffic before it reaches the actual server. Includes adaptive Bayes recognition, an SPF scan, your own honeypot and RBL (Real-time Blackhole List) check. Can be set up as a service under Windows. Its integrated web server also enables you to configure the server and perform logfile diagnostics via a browser.
Protects mobile web access from the risks posed by the use of wireless networks, such as when unauthorised people attempt to trace private data or eavesdrop on confidential transactions. No longer offered.
This tool enables you to surf the internet anonymously by hiding your actual IP address by connecting to a proxy server; also protects you against attacks from the internet by, among other things, deleting all the cookies.
Tests web applications for security breaches. Uses heuristic methods for automatically detecting vulnerabilities to attacks by cross-site scripting or SQL and XML injection. Creates a report on necessary improvements. Requires Cygwin on Windows.
Comprehensive solution for complete IT documentation, allowing (among others) automatic inventorying of infrastructures and network components, documentation and visualisation of inventoried data, rights analysis of network directories and release information and licence management as well as data and document filing for contracts and the financial services.