For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
Learn More
Wiz: #1 Cloud Security Software for Modern Cloud Protection
Protect Everything You Build and Run in the Cloud
Use the Wiz Cloud Security Platform to build faster in the cloud, enabling security, dev and devops to work together in a self-service model built for the scale and speed of your cloud development.
An alternative Identification system that is a replacement for Microsoft's Passport and the Liberty Alliance. Its a simple architecture that is setup so anyone can run a server and thereby have control over their online identification.
The Secure Remote Log Monitor (SRLM) project provides client and server
utilities that collect application or system log files from multiple systems over an untrusted network onto a central server for analysis and action.
isectd is a middleware daemon that provides many-to-many client-to-server connectivity. Supports multiplexing requests to multiple server processes over IP networks.
Drowning in misplaced IT assets, compliance headaches, and shadow IT? Navigate to clarity with an intuitive IT Asset Management solution.
Experience crisp visibility, effortless control, and unshakable security – all while freeing up your budget with optimized software licenses.
The best part? It’s easy.
LdapEngine, which includes an easy, more natural way to search and manipulate a LDAP tree (especially compared to JNDI). The second part is a graphical LD
Etch is a cross-platform, language- and transport-independent framework for building and consuming network services. With Etch, service development and consumption becomes no more difficult than library development and consumption.