The Securepoint Unified Threat Management (UTM) security solutions provide all important security applications (firewall, VPN gateway, virus scanner, spam filter, Web filter, IDS, etc.) within a corresponding server environment, to ensure smooth updates of all systems and to make the everyday usage of these systems successful and secure for companies. They are available as UTM hardware appliances, as virtual appliances, and as a pure software solution which can be installed on standard computer systems and may be adjusted according to individual requirements. Securepoint is Windows 7-ready and supports IKEv1 and IKEv2.
Andrisoft WANGUARD is an enterprise-grade traffic monitoring and DDoS detection and protection solution that delivers the functionality NOC, IT, and security teams need to effectively monitor and protect their network through a single, integrated package. WANGUARD Sensor relies on sFlow, NetFlow, IPFIX, or Port Mirroring / SPAN.
firewall_e is a small Web application which allows administrators to create lists of servers, users, and ports and assign them to each other. This allows an administrator to login, create users, and assign ports on servers for them to access. Users can login and their remote IP address will be stored. From this address, they'll then be able to access whatever services the administrator provided them.
Fing is a command line tool for network and service discovery. It provides you a complete view of any network in a very short time. Its smart discovery automatically detects the network type and uses the best technique to scan it. The best results are achieved on Ethernet networks (including Wireless ones), where Fing is able to detect all network hosts, firewalled ones included. The service discovery feature quickly detects active TCP services on a target host or network. Fing is based on Look@LAN.
IPTEditor intends to ease the task of managing/editing iptables rules. It presents an intuitive graphical interface that organizes iptables tables as tabs of a notebook, each of which, in turn, organizes their chains in notebooks tabs. Each rules tab contains a list made up of rows (rules) or item columns ordered according to their occurrence. The items in the rows can be edited by appropriate forms, such as through dialogs for targets and criteria (modules), edit fields for network addresses, and selection boxes for actions and protocols, among others.
SpamBlock counts attempts to establish a connection on port 25/tcp via tcpdump. When a host exceeds the allowed number of attempts per unit of time, it is added to a corresponding ipfw table and email notification is sent. Spamblock currently supports ipfw only, but it can be easily adapted for any firewall and OS. It can also be configured to watch multiple ports to prevent Telnet and SSH attacks in addition to SMTP.
Membrane SOAP Router is a modular SOAP intermediary written in Java. It is fully configurable due to Spring style configuration. You can audit SOAP traffic, route messages through DMZ, and gather performance statistics. The small memory consumption of less than 20 Megabytes makes it possible to run an instance of Membrane SOAP Monitor on any computer that provides or consumes Web services.