(Page 1 of 9) 1 2 3 4 5 6 Next > Category: System Security Management » Firewall FireMon Added 2006-03-27 FireMon, is an Enterprise Security Management application that provides visibility to and control of network changes, configurations, and performance. Designed as a security tool, FireMon monitors configurations, evaluates configuration effectiveness, and alerts administrators to changes in configurations. FireMon controls devices by implementing intelligent device information processing and combining it with input from technical experts and customer requirements. FireMon meets key needs of security professionals, particularly security managers, auditors, security administrators, and network professionals with security concerns. XNmap Added 2006-03-22 A GUI for nmap, written in Cocoa Tufin SecureTrack Added 2006-02-25 Tufin SecureTrack is a comprehensive auditing, monitoring and compliance solution for Firewall policies. SecureTrack's advanced change management and corporate policy enforcement capabilities mitigate risks associated with Firewall configuration changes, and enable compliance with the strictest regulations and standards. Real-time Monitoring SecureTrack continuously monitors Firewall policies, detecting and reporting any configuration change as soon as it is made. With Real-time monitoring, registered SecureTrack users receive detailed notifications on changes as they are made via email, SysLog and SNMP traps. SecureTrack analyzes the new configuration, and sends out detailed reports on the exact changes that were made, which administrator was responsible and which Firewalls were affected. Organizational Policy Compliance Organizational Policy Compliance enables effective tracking of Firewall policy changes for violations of the corporate policy, and dispatches real-time alerts as soon as such violations occur. In addition, SecureTrack can alert the Security Officer on suspicious and questionable policy changes. You can easily define what types of changes constitute breaches of your corporate policy. The Organizational Policy Compliance is configured through a rich set of audit rules, enabling a detailed policy specification. Graphical side-by-side comparison view SecureTrack provides you with a powerful side-by-side graphical view, highlighting the differences between any pair of policy versions. You can clearly identify which rules and objects were added, deleted or modified. Compliance with Regulations and Standards The past few years have been marked by a rise in government regulations and industry standards. SecureTrack improves security management procedures and processes, which are the fundamental requirements for IT security in the latest regulations and standards, including: > The Sarbanes-Oxley Act > The Basel Capital Accord (Basel II) > ISO 17799 / BS 7799 > HIPAA Increasing Uptime Network downtime is often caused by human error, especially when it comes to networking and security infrastructure. Keeping track of security policy changes will help you correlate network downtime with recent policy changes. The graphical comparison view enables quick identification of configuration errors, increasing your network uptime and delivering a high Return on Investment. Advanced Reporting SecureTrack's advanced reports complete the security management picture. You can use various criteria to query the policy revision database, and generate detailed custom reports. Advanced reports provide a complete accounting of security policy changes, detailing each Save and Install operation and its effects on the security policy. Reports can be scheduled to run periodically or triggered by specific policy change events, and support HTML, MHT or PDF formats. Advanced Rule Base Audit With the advent of SecureTrack, rule base auditing can now be highly automated to identify risks and vulnerabilities, remove un-used and expired rules, investigate historical rule changes and determine whether existing rules are configured according to the corporate policy. Rule Base Optimization SecureTrack monitors each Firewall's traffic logs and correlates the data in real-time with the rule base, to determine which rules were accessed at different points in time. This enables administrators to modify the rule base for optimal firewall performance, based on actual traffic. Enhanced Provisioning SecureTrack's user permissions can now be limited to specific Firewall Management servers or Provider-1 CMA's, enabling global policy monitoring and control for large enterprise customers and Managed Service Providers. Graphical policy view of historical revisions SecureTrack 2.2 enables a graphical view of the rule base and objects at any point in time, for increased visibility, error-correction and historical policy analysis. Full system backup and restore The product's entire database and configuration can backed up to a file and easily restored, for disaster recovery and easy platform migration. Firewall Test Agent Added 2006-01-18 This simple tool can be used to test and log the rules on a firewall. The Firewall Test Agent is able to open up any number of TCP and UDP ports on a windows machine and log any connection attempts. A port scanner or other such tool can then be used to scan through the firewall to find which ports have been allowed through in the firewall rule base. This tool is useful when you don't have access to the firewall rules. This tool could also be used as a port scan monitor if you are interested in the number of scans your networks are receiving. WARNING: Some machines will NOT be able to open thousands of ports. With older, slower and heavily utilized machines you should only open a few thousand ports at a time. I do not recommend any more than 10,000 ports at any one time although 65,535 if theoretically possible. Solsoft Firewall Manager Added 2006-01-09 Solsoft Firewall Manager provides customers with centralized management of security policies across heterogeneous platforms that include leading firewall, router, switch, VPN, and IDS/IPS platforms. Solsoft NetfilterOne Added 2006-01-09 is a graphical interface that will automate the design, deployment and documentation of security rules and policies as they pertain to a networked Netfilter firewall - the packet filtering framework inside the Linux 2.4.x and 2.6.x kernel series AlgoSec Firewall Analyzer Added 2006-01-08 Overview The manual audit of a firewall policy is a very subjective and laborious process which is dependent on the users skill set and experience. The AlgoSec Firewall Analyzer (FA) automatically and non-intrusively analyzes a firewalls policy. Within a matter of minutes, it identifies rules that cause security holes and offers detailed guidance about how to close them. FA flags rule errors that would otherwise go unnoticed and exposes risks hidden deep within the corporate firewall policy. The vulnerabilities that FA reveals allow you to make sure that there are no "hidden" or unknown risks embedded in the corporate firewall policy. FA offers peace of mind to IS managers regarding their firewall policy. XPFiremon Added 2005-12-06 XPFiremon is a system tray monitoring application for the builtin Windows XP Firewall. It will monitor the settings and services and alert if they are stopped or disabled. Windows should also alert you if the firewall is disabled but depending on the circumstances it appears slow to do so. It's also comforting to many users to see something saying that their protection is active and not just inactive. XPFiremon also provides an easy right click interface for managing the firewall(stopping, starting, or configuring). Firestarter Added 2005-01-17 Firestarter is graphical firewall tool for Linux. The program aims to combine ease of use with powerful features, serving both desktop users and administrators. BullDog Firewall Added 2004-10-27 Bulldog is a powerful but lightweight firewall for heavy use systems. With many features, this firewall can be used by anyone who wants to protect his/her systems. This system allow dynamic and static rules sets for maximum protection and has several advance features. This firewall will work for the hobbyist or a military base. Generation 7 is a complete rewrite and redesign from scratch. Be prepared to spend some time setting this up. Browse by category |
|
Privacy Statement |