MatrixSSL is an embedded SSL and TLS implementation designed for small footprint devices and applications requiring low overhead per connection. The library is less than 50Kb on disk with cipher suites. It includes client and server support through TLS 1.2, mutual authentication, session resumption, and implementations of RSA, ECC, AES, 3DES, ARC4, SHA2, SHA1, and MD5. The source is well documented and contains portability layers for additional operating systems, cipher suites, and cryptography providers.
The CyaSSL embedded SSL library is a lightweight SSL library written in ANSI C and targeted for embedded and RTOS environments, primarily because of its small size, speed, and feature set. It is commonly used in standard operating environments and cloud services as well because of its royalty-free pricing and excellent cross platform support. CyaSSL supports industry standards up to the current TLS 1.2 and DTLS 1.2 levels, is up to 20 times smaller than OpenSSL, and offers progressive ciphers such as HC-128, RABBIT, and NTRU.
Cyan Secure Web Proxy Server is a carrier grade, high performance Internet filtering proxy server for Linux. It includes scalable (user/group/host) Web filter and virus scan utilities for blocking malicious applications at the gateway. It has an advanced URL database, authentication support (Active Directory, LDAP, NTLM), SSL Interception, easy deployment, and remote administration.
CloudVPN is a secure decentralized mesh networking tool. It allows applications to use it as a mesh transport layer for packet routing, easily creating mesh ethernet VPN, secured audio/video broadcasting or communication channels, etc. It can create secured networks with special or weird topologies, so it's very easy to create connection schemes with clustered/decentralized servers, topologies with better throughput, ring-like topologies for failover, long-line for passing through many routes, or tree topology for optimizing inter-server bandwidth needs.
sslsweep tests TCP services for the presence of SSL and reports things about the services found, such as the certificate's CN, the certificate's expiration timestamp, what kinds of ciphers the SSL service supports, and what versions of SSL the service supports. It can be used for security testing as well as ongoing monitoring of services. It can produce output in human readable text, HTML, and CSV. It can also run as a Nagios plugin. It can accept input on the command line or on standard input (one host:port pair per line). It can also accept Nmap scan output (in the greppable format) as input, and it will test all open TCP ports found by the Nmap scan.
sessiond allows a cluster of SSL/TLS servers to share their session caches in order to prevent each node of the cluster from negotiating a separate session. SSL/TLS session is basically a set of secret values (symmetric encryption keys, MAC secrets) shared between a client and a server. The use of asymmetric cryptography required to establish new sessions is the main performance bottleneck of the SSL/TLS protocol.
VyperBlog is an all-in-one site template for the Google App Engine. It is meant for small businesses or enterprises that want to get into the Google cloud using a turn-key solution that provides security and safety for the data being stored in the back-end database. VyperBlog provides protection from hackers and crackers who might want to abuse forms and other resources being published by those who are using VyperBlog. VyperBlog employs a unique method for securing sites called Secure-Site.
Pagekite is software to make servers on "localhost" visible to the wider Internet. It can be used by Web developers to show off their works in progress to clients or colleagues, embedded developers who need direct access to devices in the field, or as an alternative to dynamic DNS for individuals/hobbyists who would rather host their own content than rely on 3rd party hosting. It creates and maintains a tunnel between your server on localhost and a remote "front-end" (a reverse proxy). Only the front-end has to have a visible IP address; the server itself can reside on a heavily firewalled computer, a mobile device, or even an anonymous node on the Tor network.