The WiKID Strong Authentication System is a highly scalable, secure two-factor authentication system. It is simple to implement and maintain, allows users to be validated automatically, requires no hardware tokens, has a simple API for application support (via Ruby, PHP, Java, COM, Python, etc.), supports multiple domains, and supports replication for fault tolerance and scalability. It also supports mutual /host and transaction authentication, wireless tokens only domains, locked tokens (to your PC), anti-keystroke logger keypad PIN entry, etc.
Astaro Security Gateway (formerly Astaro Security Linux) is an all-in-one network security gateway that includes a firewall, intrusion protection, antivirus, spam protection, URL filtering, and a VPN gateway. Features include a modern packet filter, intrusion detection and prevention, portscan detection, application control, content filtering, virus detection for email and Web traffic, profile handling, L2TP, IPSec, SSL, and PPTP VPN tunneling, spam blocking, proxies for HTTPS, HTTP, FTP, POP3, SMTP, DNS, VoIP, SOCKS, and Ident, logging, and reporting. It supports Ethernet, VLAN, PPP, PPPoE, PPPoA, Cable Modem, IPv6, QoS, Link Aggregation, and WAN-Uplink-Load balancing in routing, and bridge mode. The WebAdmin GUI, Install Wizard, Change Tracking, Printable Configuration, and Up2Date service make it easy to install, manage, and maintain.
ZABBIX is an enterprise-class distributed monitoring solution designed to monitor and track performance and availability of network servers, devices, and other IT resources. It supports distributed and Web-based monitoring, auto-discovery, real-time monitoring, SLA assurance, trending, and more.
INSERT (the Inside Security Rescue Toolkit) aims to be a multi-functional, multi-purpose disaster recovery and network analysis system. It boots from a credit card-sized CD-ROM and is basically a stripped-down version of Knoppix. It features good hardware detection, fluxbox, emelfm, links-hacked, ssh, tcpdump, nmap, chntpwd, and much more. It provides full read-write support for NTFS partitions (using ntfs-3g), and the ClamAV virus scanner (including a fairly recent signature database and a GUI). It provides partition handling with gParted and also has a network boot facility.
YaCy is a search engine that anyone can use to index the Internet (WWW and FTP) or to create a search portal for others (Internet or intranet). The scale of YaCy is limited only by the number of users. and can index billions of web pages. In P2P mode it is fully decentralized. All users of the search engine network are equal and it is not possible for anyone to censor the content of the distributed index.
Cherokee is a very fast, flexible and easy to configure Web server. It supports widespread technologies including FastCGI, SCGI, uWSGI, PHP, CGI, SSI, TLS and SSL encrypted connections, virtual hosts, authentication, on the fly encoding, load balancing, Apache compatible log files, database balancing, reverse HTTP proxy, traffic shaping, video streaming, and much more. A user friendly interface called cherokee-admin is provided for no-hassle configuration of the server. It allows you to configure the server from top to bottom without editing a text configuration file.
IPplan is a Web-based, multilingual IP address management and tracking tool which simplifies the administration of your IP address space. It can handle a single network or multiple networks with overlapping address spaces. It features DNS administration, internationalization, importing of network definitions from routing tables, importing of definitions from TAB-delimited files and NMAP's XML format, support for multiple administrators with different access profiles (per group, per customer, per network, etc.), definitions of address space authority boundaries per group, finding free address space across a range, display of overlapping address spaces between networks, search capabilities, an audit log, statistics, circuit tracking, and tracking and sending SWIP/registrar information.
i-doit is a Web-based IT documentation and CMDB. It documents IT-systems and their changes, defines emergency plans, displays vital information, and helps to ensure a stable and efficient IT operation. All information can be organized (details flexibly adjusted), stored, and maintained in one place. This allows simple Helpdesk, Support, and Planning functions and provides the basis for quality assurance and certification. i-doit allows services to be documented as a logical grouping of objects placed in relation to each other. This provides the basis for (ITIL) processes such as Change and Problem Management, and helps to control and manage the SLA (Service Level Agreement) or the communication with users. Its interfaces to other ITSM applications (like Nagios, Request Tracker, etc.) allow the entering of data only once in the ITSM environment. i-doit maintains one holistic view of the operational situation.