CDSA stands for Common Data Security Architecture. It provides a security framework that includes cryptographically signed modules to present an abstracted unified API to the application developer to perform cryptographic and security related operations. It also includes hardware support for cryptographic tokens and biometric devices, such as thumbprint scanners. Intel has implemented the CDSA 2 specification and released it as open source.
distributed.net is a loosely knit group of computer users from all of the world that is taking up challenges requiring lots of computing power (most notably the RC5, DES, and OGR cracking contests). It is simple to participate in the challenges by downloading and running their client software (which uses idle CPU time to complete its tasks).
P-Synch is a commercial password management toolkit which provides automated password synchronization, password strength enforcement, password self-reset by authenticated users, and streamlined password reset by helpdesk. P-Synch is available for both internal use as well as for Internet-based deployments in B2B and B2C applications.
FTimes is a system baselining and evidence collection tool. Its primary purpose is to gather and/or develop topographical information and attributes about specified directories and files in a manner conducive to intrusion and forensic analysis. It was designed to support the following initiatives: content integrity monitoring, incident response, intrusion analysis, and computer forensics.
Ice is a modern alternative to object middleware such as CORBA or COM/DCOM/COM+. It is easy to learn, yet provides a powerful network infrastructure for demanding technical applications. It features an object-oriented specification language, easy to use C++ and Java mappings, a highly efficient protocol (including protocol compression), asynchronous method invocation and dispatch, dynamic transport plug-ins, TCP/IP and UDP/IP support, SSL-based security, a firewall solution, and much more.
CyberFusion is a system that provides secure file transfer across a LAN, a WAN, and the Internet. It offers encryption and security, reliability and guaranteed delivery, management and automation, audit and control. It offers cost-saving migration from competitor products such as Connect:Direct which is supported with useful tools. It may be used as part of a VPN, ERP, EAI, or ETL software solution for secure file transfers as well as in disaster recovery, data archive, and backup and restore operations.
SFTPPlus is a secure file transfer (SFTP) program that uses the SSH protocol with additional audit and automation capabilities to meet regulatory and corporate compliance requirements. Server and client editions are available. Transfers may be made to and from internal servers or third party external standard SFTP servers/clients. Supported protocols include SFTP, FTPS, and HTTPS. A version that includes a FIPS 140-2 module is available.