Apps with 'Network Security' feature Page 5 of 7

All apps in Apps with 'Network Security' feature category. Use the filters below to narrow down your search. 
Copy a direct link to this comment to your clipboard
  1. You no longer need to call IT to connect your new iPhone, iPad, or iPod touch with your corporate infrastructure. Using Tangoe Mobile, you can self-authenticate, authorize, and configure your iOS device without help from IT.

    Tangoe Mobile screenshot 1
    Tangoe Mobile screenshot 2
    Tangoe Mobile screenshot 3
    25 alternatives
  2. The Snare Server, from InterSect Alliance, is a proprietary Log Monitoring solution that builds on the open source Snare agents to provide a central audit event collection, analysis, reporting and archival system.

    11 alternatives
  3. Syspeace icon
     1 like

    Syspeace automatically blocks brute force attacks primarily for Windows Servers with good information in the admin mils telling you DNS names, country of origin and username used for the attack.

    • PaidProprietary
    • Windows
    8 alternatives
  4.  Like

    LANwriter is a unique intranet software application for centralized, secure and audited publishing of data to CDs, DVDs, Pen Drives and FTP servers via a single computer on the network that acts as a device server and data gatekeeper and is a powerful data leak prevention tool.

    • FreemiumProprietary
    • Windows
  5. Wake-On-LAN Proxy Server is a network tool that helps network administrators to organize the reception and transmission of magic packets (wakeup signals, which are sent through programs that support the Wake-on-LAN technology) on the network.

    • FreemiumProprietary
    • Windows
    Wake-On-LAN Proxy Server screenshot 1
  6.  Like

    Pypacker is a fast and simple packet creation and parsing library for Python. It lets you create packets manually by defining every aspect of all header data and dissect packets by parsing captured packet bytes.

    • FreeOpen Source
    • Linux
    1 alternatives
  7. Use the MikroTik smartphone app to configure your router in the field, or to apply the most basic initial settings for your MikroTik home access point.

    • FreeProprietary
    • Android
    • iPhone
    MikroTik mobile app screenshot 1
    MikroTik mobile app screenshot 2
  8. Suri Oculus is a high-performance platform for Suricata management, real-time network event processing (via Redis), lightweight visualization, AI-driven anomaly detection, and automated domain-intelligence workflows.

    • PaidProprietary
    • Online
    • Software as a Service (SaaS)
    Alerts map
  9. Nethor icon
     Like

    What is Nethor? A "Device Matrix" layout displaying properties for a node. In addition, the context menu for another node, the search dialog and the Traceroute tool are shown. Above the matrix is the Timeline.

    • FreeProprietary
    • Windows
    Nethor screenshot 1
    3 alternatives
  10. Vyopta icon
     Like

    Vyopta is your all-in-one monitoring and analytics solution for enterprise UC networks. Drive adoption and head off problems with Acano, Cisco, WebEx, Polycom, Pexip and more from one user-friendly dashboard.

    • PaidProprietary
    • Mac
    • Windows
    • Linux
    • Online
    • Self-Hosted
    Vyopta screenshot 1
    1 alternatives
  11. Knocknoc icon
     Like

    Knocknoc removes the attack surface of existing infrastructure by orchestrating network-level access controls, whilst integrating seamlessly with identity platforms. By keeping ports closed and services invisible until centralised authentication has occurred, Knocknoc removes...

    • PaidProprietary
    • Online
    • Software as a Service (SaaS)
    1 alternatives
  12. psad is a collection of three lightweight system daemons (two main daemons and one helper daemon) that run on Linux machines and analyze iptables log messages to detect port scans and other suspicious traffic.

    psad: Port Scan Attack Detector screenshot 1
  13. FerrumGate is an Open source Zero Trust Access (ZTA) project, that uses advanced identity and access management technologies to ensure secure access to your network and applications. With multi-factor authentication, continuous monitoring, and granular access controls.

    • FreeOpen Source
    • Mac
    • Windows
    • Linux
    Dashboard
    20 alternatives
  14. Rapid7 icon
     Like

    Rapid7 is engineering better security to help companies reduce risk of breach, detect and respond to attacks, and build effective cybersecurity programs.

    • PaidProprietary
    • Online
    26 alternatives
  15. Complete, real-time change auditing, in-depth forensics and comprehensive reporting on all key configuration, user and administrator changes for your Windows environment and beyond.

    • PaidProprietary
    • Windows
    • Microsoft Exchange Server
    • Microsoft SQL Server
    • Microsoft Office 365
    • Microsoft Active Directory
  16. ExtremeAI Security utilizes the power of machine learning and artificial intelligence to identify and remediate advanced threats. Extreme revolutionizes the experience for security analysts by providing proactive, automated, remediated capabilities.

    • PaidProprietary
    • Self-Hosted
    ExtremeAI Security screenshot 1
    4 alternatives
  17. Damballa icon
     Like

    Damballa solutions automatically identify and terminate cyber threat activity such as advanced malware, botnets and persistent threats across enterprise and communications service provider networks in real-time, without relying on signatures.

    2 alternatives
  18. AllSecureX helps CISOs and boards translate complex cyber threats into real-time financial impact insights. By combining AI, automation, and quantum-safe modeling, AllSecureX enables smarter, faster, and board-ready security decisions.

    • PaidProprietary
    • Online
    • Software as a Service (SaaS)
    AllSecureX Dashboard
    5 alternatives
  19. Upstream Security is the first cloud-based centralized cybersecurity and analytics platform that protects the technologies and applications of connected and autonomous vehicles fleet.

    • PaidProprietary
    • Windows
    • Software as a Service (SaaS)
    Upstream Security screenshot 1