ThreatSentry is an advanced behavioral system that combines machine and mentored learning capabilities, a knowledge-base of documented exploits, and an analytic model specifically designed for IIS, to continuously collect, analyze and organize server events into an evolving baseline of acceptable activity. Each server connection is compared against this baseline to identify and take action against any activity falling outside of trusted parameters.
Implemented as an IIS ISAPI filter and manifested as a snap-in in to the Microsoft Management Console (MMC), ThreatSentry is designed to protect network weak points created by lapses in patch management, configuration errors, and the use of new and progressive attack techniques. ThreatSentry is exceptionally easy to use, protects even un-patched Microsoft web servers and is an ideal complement to network and application firewalls. ThreatSentry supports Windows 2000/2003 and the IIS 5.0/6.0 platforms.
ThreatSentry Small Business Edition offers the same features and protection for IIS as the standard version, (which supports centralized network installation and policy management, and other features), but is specifically geared and priced for the small enterprise, business, or personal IIS administrator at just $99 per server. A White Paper, Case Study and free trial are available.
PC Activity Monitor Professional (PC Acme Professional) PC Activity Monitor Professional (PC Acme Professional) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for personal and network PCs. It is professional software that captures all users activity on the PC.
Counter Spy CounterSpy detects deletes and protects! CounterSpy has Active Protection. You could call it a "spy-wall." There are "checkpoints" that are monitored in real-time for attempts to install spyware. A very high percentage will be blocked by CounterSpy.
ExploitTracker ExploitTracker is the perfect announcer of computer security vulnerabilities. It's primary duties are:
-to give a detailed description of the vulnerability.
-to show the methods of exploitation.
-to instruct the user how to make his system immune
Previous:
WinForcer Prevent unauthorised users from running any Windows application you specify. Block the desktop, Start button, Control Panel, Hide Drives or block individual folders. Fully user configurable and is suspended by simply entering a password.
SpyMyPC The number one solution if you want to know what others are doing on your own computer while you are not at home (or office). Logs all keystrokes, applications, windows, websites, internet connections, passwords, chat conversations.
Advanced Email Protector Advanced Email Protector transform your emails into JavaScript code,
so any email harvester cannot find any emails on your site. But this is not all - it attacks spammers by generating large lists of fake email addresses.
Version: 1.0 Released: Mar, 9 2004 License: Shareware, $99.00 Expires: Expires after 30 Days
File size: 12,053 K Platforms: Windows 2000 Downloads: 21
ThreatSentry Small Business Edition – Neural Intrusion Detection and Prevention software protects Microsoft Internet Information Services (IIS) from known and unknown attacks - $99, White Paper, Case Study and free trial available.