ServerFiles.com is a server software & hardware directory for Network administrators & IT professionals, listing networking & server software for Windows 2003, Windows 2000, NT and Linux; and now also listing networking hardware solutions focused on server based computing.
NetIQ Secure Configuration Manager enables you to easily detect mis-configured systems that could lead to expensive breaches or failure to meet compliance goals. The ability to define policy in a simple, easy-to-understand manner, then manage and enforce that policy across your entire enterprise is an essential foundation upon which to build your security and compliance program.
NetIQ Secure Configuration Manager enables you to: Assess configurations against compliance mandates such as PCI DSS, HIPAA, SOX, NERC, FDCC and more, Report on systems out of configuration, and easily manage exceptions to compliance, Apply industry best practices to your systems to help ensure good security, Identify and report on user entitlements to systems - an essential part of managing access.
The Nessus® vulnerability scanner is the world-leader in active scanners with more than five million downloads to date. Nessus features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs and across physically separate networks.
MaxPatrol is a network security scanner optimized for effective use by companies of any size (serving from a few to tens of thousands of nodes). It supports vulnerability testing for servers with non-standard configurations, intelligent recognition of vulnerabilities in known (and custom) web-server scripts, identification of RPC services and more. The program uses inspection methods to minimize false detections. MaxPatrol has at its disposal a protection analyzer developed for web servers and web applications (e.g. internet shops). Although MaxPatrol operates within Microsoft Windows, it can test for possible vulnerabilities in any software or hardware platform: from Windows workstations to Cisco networks (*nix, Solaris, Novell, AS400, etc.). Additional features include scheduled scans, custom level vulnerabilities, full scan history and more.
SARA is a network security scanner that discovers, analyzes, and reports on security vulnerabilities of network-based computers, server, routers,and firewalls. It performs over 1,000 tests on each network node that it discovers. It is built to support the large scale enterprise model that contains over 25,000 nodes. It is approved for operation in the SANS Top Ten and Top 20 environments.
The Enterprise Security Reporter platform features agent-less, fast, comprehensive discovery and reporting solutions for file security, group memberships, Active Directory, printers, file shares and other security settings on Windows and SharePoint servers. Enterprise Security Reporter is essential for administrators burdened with compliance reporting and security audits, automating reporting and simplifying analysis.
Enterprise Security Reporter provides a reporting and auditing solution for corporate data stored on a file share, or in a SharePoint site. Easily discover necessary security information, run reports, create custom reports and conduct ad-hoc queries across the entire organization.
Infiltrator is a network security scanner that can quickly audit your network computers for possible vulnerabilities, exploits, and information enumerations. It comes with a built-in database of known vulnerabilities, that can be updated online and allows you to select the items to scan for or to add custom entries to be included. Infiltrator can reveal and catalog a variety of information, including installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports and much more. It can also audit password and security policies, perform HTTP/CGI server auditing, registry auditing In addition, Infiltrator also comes with 18 network utilities for footprinting, scanning, enumerating and gaining access to machines (ping sweep, whois lookups, email tracing, share scanning and more). The program can be run from the commandline, allowing for external scheduling and automated scanning.
Metasploit Express enables IT professionals to easily verify whether vulnerabilities are exploitable, prioritize their mitigation and conduct basic penetration testing. It adds a graphical user interface to the Metasploit Framework, the de-facto leader in pentesting tools, and automates many of the tasks that otherwise require custom scripting, such as smart brute forcing, evidence collection, and reporting.
Metasploit Pro enables IT professionals to easily verify whether vulnerabilities are exploitable, prioritize their mitigation and conduct basic penetration testing. It adds a graphical user interface to the Metasploit Framework, the de-facto leader in pentesting tools, and automates many of the tasks that otherwise require custom scripting, such as smart brute forcing, evidence collection, and reporting.
Portable Penetrator is a complete solution for securing your wireless network and identifying any security flaws before hackers have a chance to do so. This wifi security software provides detailed reports, exposing security issues before it is too late. It allows you to fully secure all of the wireless networks in your business so that no one can break into the network and steal important, confidential information.