The WiKID Strong Authentication System is a highly scalable, secure two-factor authentication system. It is simple to implement and maintain, allows users to be validated automatically, requires no hardware tokens, has a simple API for application support (via Ruby, PHP, Java, COM, Python, etc.), supports multiple domains, and supports replication for fault tolerance and scalability. It also supports mutual /host and transaction authentication, wireless tokens only domains, locked tokens (to your PC), anti-keystroke logger keypad PIN entry, etc.
Unattended installation of several Linux(kickstart,preseed,autoyast) and Windows(2000,XP,2003,2003R2,Vista,7,8,2008,2012). Features: inventory, software management, dhcp-ldap, dns-ldap, php-ssh, syslog-ng, rsyslog, switch managment, ldap browser, pxe manager, central cron management, license management.
MIB Smithy SDK is a dynamic extension to Tcl/Tk (8.4+) that allows development of custom scripts for controlling SNMP agents, manipulating SMI definitions, doing conversions, and more. It is based on the core of Muonics' MIB Smithy, and the SDK supports SMIv1 and SMIv2, as well as SNMPv1/v2c/v3 with HMAC-SHA-96 and HMAC-MD5-96 authentication and DES/CBC and AES128/CFB privacy. It also provides complete read-write access to all elements of SMI/MIB Module definitions, unlike similar extensions that provide only read access to a limited subset. The SDK allows multiple discrete SMI databases and SNMP sessions, and provides all of the built-in validation and error recovery capabilites of the full product, without the visual MIB development environment.
Endian Firewall is an all-in-on Linux security distribution that turns any system into a full-featured security appliance. It features a stateful packet inspection firewall, application-level proxies for various protocols (HTTP, POP3, SMTP), anti-virus support, virus and spam filtering for email traffic (POP and SMTP), content filtering of Web traffic, and a "hassle free" VPN system based on OpenVPN.
NetOculus is a network monitoring system that provides all the functions of the well-known monitoring system MRTG. It also has a number of its own benefits. It can automatically monitor any kind of detectable alteration in a computer network (and in relatively separated network areas). It can efficiently notify staff about hardware state changes. Analytical information is aggregated. Specific pieces of hardware are associated with the staff members who responsible for them. The solutions for solved problems are reported to the staff for further use.