You are here:

WindowsManagement.com > Web Security Software
ActiveXperts Network Monitor 2019##ComSec

Web Security Software

ActiveXperts Network Monitor 2019

ActiveXperts Network Monitor 2019 is a leading solution for monitoring every aspect of your LAN and WAN network. It proactively manages your network servers, network devices, web servers, databases, etc. It detects and corrects problems before network users start complaining. The product is scalable. It includes a large set of pre-defined, built-in monitoring checks;

When problems are detected, you're immediately notified by network message, e-mail, pager, or SMS message. When a failure is detected, the network monitor tool will try to recover the problem by running a system administrator defined program or by restarting a process.

The product includes build-in monitor rules for: Active Directory, ADO databases, ADSI, Disk Drives, CPU Usage, Disk Spaces, Event Log (with content checking), Exchange, File Existence (with content checking), FTP sites, HTTP(s) (with content checking), ICMP/Ping, MS SQL Databases, Novell NDS, NNTP news servers, NTDS (NT4 compatible DS), NTP time servers, ODBC Databases, Oracle Databases (SQLNet), POP3 Mail servers, Powershell, Printers, Processes, Services, SMTP Mail servers, SNMP, TCP ports (with handshaking), UDP, UNIX Shell Scripts (RSH), VBScript (custom scripts), WMI and more.

ActiveXperts Network Monitor 2015 is a complete solution. Regardless of what you want to monitor, ActiveXperts Network Monitor 2015 supports it all at a cost-effective price.

Acunetix Web Security Scanner

Website security is possibly today's most overlooked aspect of securing the enterprise and should be a priority in any organization. Hackers are concentrating their efforts on web-based applications - shopping carts, forms, login pages, dynamic content, etc. Web applications are accessible 24 hours a day, 7 days a week and control valuable data since they often have direct access to backend data such as customer databases.

Acunetix is a pioneer in the web application security technology: Acunetix Web Vulnerability Scanner includes many innovative features:

  • An automatic Javascript analyzer allowing for security testing of Ajax and Web 2.0 applications
  • Industries' most advanced and in-depth SQL injection and Cross site scripting testing
  • Visual macro recorder makes testing web forms and password protected areas easy
  • Extensive reporting facilities including VISA PCI compliance reports
  • Multi-threaded and lightning fast scanner crawls hundreds of thousands of pages with ease
  • Intelligent crawler detects web server type and application language
  • Acunetix crawls and analyzes websites including flash content, SOAP and AJAX
Company:
Acunetix

GFI WebMonitor for ISA Server

Control your employee’s website browsing habits and monitor downloads in real-time with GFI WebMonitor for ISA Server. Ideal for SMBs needs, GFI WebMonitor is used by thousands of customers and is available at an unbeatable price.

Research by IDC shows that up to 40% of employee internet activity is non-work related! GFI WebMonitor for ISA Server can help boost employee productivity by giving you total control over what your employees can browse and what files they can download in real-time.

GFI WebMonitor also allows you to monitor user downloads in real-time, letting you block file-types such as mp3s. It also scans all files for viruses, spyware and malware using multiple anti-virus engines. This drastically decreases the time to obtain virus signatures, thereby reducing the possibility of infection.

Furthermore, GFI WebMonitor lowers the risk of social engineering by blocking access to phishing websites through the use of an auto-updatable database of phishing URLs.

Company:
GFI

N-Stalker Web Application Security Scanner

N-Stalker Web Application Security Scanner is a web security assessment solution developed by N-Stalker. By incorporating the well-known N-Stealth HTTP Security Scanner and its 35,000 Web Attack Signature database, along with a patent-pending Component-oriented Web Application Security Assessment technology, N-Stalker is capable of sweeping your Web Application for a large number of vulnerabilities common to this environment, including Cross-site Scripting and SQL injection, Buffer Overflow and Parameter Tampering attacks and much more.

Company:
N-Stalker

UserLock

Logins are the first line of defense of your network. UserLock provides and enforces granular rules and policies to control and secure network access.

UserLock allows you to limit or prevent concurrent logins on your Windows network. You can control interactive sessions, RAS sessions, IIS sessions and set limitations per user, user group, organizational unit. UserLock also allows you to define user access rules to your network restricting them to specific workstations, times (business hours for example) or time quotas. You can follow the session activity in real-time, receive alerts for specific events such as denied logins, close or lock user sessions, and shutdown workstations from anywhere. A report engine is included and provides you detailed and graphical reports.

UserLock provides specific features for compliance to major industry regulations, including HIPAA, NIST 800-53, Sarbanes-Oxley, NISPOM Chapter 8, PCI, Bâle II, ICD 503.

Company:
IS Decisions

Vulnerability Management

In an environment with a rapidly growing number of network vulnerabilities and increased sophistication of network attacks, a new proactive approach towards network security is needed. Traditional defense mechanisms, such as firewalls, antivirus software and intrusion detection, need to be complemented as attacks bypass these layers of protection by directly targeting network weaknesses.

Outpost24 provides an easy to deploy and user friendly solution to continuously assess your risk exposure. Using our automated services is like having a highly skilled security team constantly probing your network to discover vulnerabilities. Identified vulnerabilities are rated and reported together with recommended remedy. The process of correcting identified vulnerabilities is supported by workflow tools for delegating remediation tasks to appropriate administrators. The results can also be compared over time, to monitor trends in risk exposure.

Company:
Outpost24 AB
ActiveXperts Network Monitor 2019##ComSec