The Analysis Console for Intrusion Databases (ACID) is a PHP-based analysis engine to search and process a database of incidents generated by security-related software such as IDSes and firewalls (e.g., Snort or ipchains). It provides a search interface for finding alerts matching practically any criteria. This includes arrival time, signature time, source/dest address/port, flags, payload, etc. ACID also provides the ability to annotate and logically group related events, delete false positives, or archive alerts among databases. Finally, a variety of statistics and graphs can be generated based on time, IP address, ports, alert classification, and sensor.
Advisory Check is a program that reads security advisories for you. It gathers security advisories using RSS, RDF, or XML feeds, compares them against the installed software, and alerts you if you're vulnerable. A wide variety of package managers can be queried to detect installed software. Remote systems can be monitored by using the integrated SSH, Windows-RPC, and Nmap support.
AlarmMon is an alarm monitoring system for TCP/IP networks. It consists of an "alarm" client, an "alarmsvr" server, and several agents that work with a central registration database. It can track the status of verious services, including BIND, Sendmail, and modems, and send notifications by email, SMS, or pager.
Anteater is a log analyser for MTA logfiles (such as those produced by sendmail and postfix). The tool is written in 100% C++ and is very easy to customize. Input, output, and the analysis are modular class objects with a clear interface. Currently, there are modules for reading the syslog format of sendmail and postfix that do up to eight useful analyses and write the result in plain ASCII or HTML, to stdout or to files.
AsItHappens is a real-time network statistics collector and grapher. It collects data from devices over a network via ICMP and SNMP and displays them on a graph, optionally storing collected data in a database for later retrieval. Collection types include network response, bandwidth usage, processor usage, memory usage, Cisco NBAR, and Cisco NetFlow. AsItHappens polls data in regular intervals, which can be in the order of milliseconds, to give immediate feedback on network performance, and it can also graph flow information from packet capture files. AsItHappens includes the Self Defending Network, a horizontal shoot-em-up based on collected graph data.
Astaro Command Center (ACC) is an application for centralized management of Astaros gateway products. With ACC, network administrators can easily manage and control multiple Astaro devices. The two separated Web-Based GUIs (WebAdmin and Gateway Manager) enable the split of ACC-system administration and role-based Gateway monitoring and can be also implemented in existing Active Directory or eDirectory environments. ACC provides an effective overview that details the actual health of each device, swiftly allowing administrators to see which gateways require more attention or immediate action (by reason of e.g. threat level, license, or CPU/memory/disk usage). A VPN configuration feature offers the ability to set up an IPSec tunnel between managed devices very easily from a central point. Over the one-click WebAdmin SSO to each connected gateway, it is possible to react instantly if necessary.
AstroFlow Bandwidth Management is a bandwidth management solution that features reports and many configuration options. With little or no knowledge of bandwidth management and packet shaping, it is possible to manage the traffic on your network, prioritize certain protocols such as POP3, SMTP, or databases, and guarantee that all mission-critical applications will have bandwidth available to them at all times, regardless of what other protocols are doing on your network.
AstroFlowGuard is a Linux-based bandwidth manager, stateful firewall, intrusion detection system, and VPN server. With its user-friendly interface, automatic failover, and smart recovery system, it is the complete tool for anyone wanting to manage bandwidth and network security. It uses a hierarchical class-based system which provides a logical, intuitive view of network classes along with their priorities. It has the ability to manage P2P applications such as Kazaa and the like, manage firewall and bandwidth by time of the day, precedence, strings in any packet, and much more. Diagnose your network by powerful reporting tools that drill down to IP, port, and protocol level with graph and pie charts. It is a self-contained system that offers simple installation by means of a bootable CD and ease of use via a Web based GUI.