Raima Database Manager is an embedded in-memory database for IoT and Edge devices
Built by Developers, for Developers
Raima Database Manager (RDM) is an embedded relational database optimized to run on resource-constrained IoT edge devices that require real-time response. RDM enables intelligent decisions to be made at the device level within microseconds.
Learn More
Cloud-Based Software Licensing - Zentitle by Nalpeiron
The #1 Software Licensing Solution. Release new Software License Models fast with no engineering. Increase software sales and drive up revenues.
1000’s software companies have used Zentitle to launch new software products fast and control their entitlements easily - many going from startup to IPO on our platform. Our software monetization infrastructure allows you to easily build or
Detect Flooder IPs, Reduce Attack Surface against HTTP Flood Attacks
...You can test module here: http://www.iosec.org/test.php (demo)
Watch the Proof of Concept video: http://goo.gl/dSiAL
Hakin9 IT Security Magazine Article about IOSEC http://goo.gl/aQM4Di (different format -> http://goo.gl/JKMUPN)
IJNSA Article at http://goo.gl/LLxRdX
WP Plugin Page http://goo.gl/nF5nD
CHANGES v.1.8.2
- Iptables Auto Ban BashScript Included
- Token Access via Implicit Deny
- Reverse Proxy Support
- reCAPTCHA Support
Do you want more features? Check for third party addons http://sf.net/projects/iosecaddons
Gökhan Muharremoğlu
chainssh is a shellscript to smplify the ssh login via multiple sshgateways/firewallgateaways. e.g. connect from homehost via sshgateway to a clusternode with one command.
Frankenwall is a bashshellscript intended to create a highly secure IPTables based linux firewall/router with QOS/traffic shaping/bandwidth management. Be certain you know EXACTLY what your network needs before using Frankenwall. Wimps need not apply.
Get real-time visibility into vulnerabilities, leaked data, and threat actor activity targeting your organization.
SOCRadar Extended Threat Intelligence, a natively single platform from its inception that proactively identifies and analyzes cyber threats with contextual and actionable intelligence.