Results for: 2015 projects for network security

Suggested Categories:

Network Security Software
Network security software is a type of software that helps protect computers, networks, and data from malicious attacks and unauthorized access. It is typically used by businesses to protect their confidential information and keep systems safe. It can also be used by individuals to protect their personal information and devices from potential threats.
Project Management Software
Project management software helps teams plan, organize, and track the progress of projects from initiation to completion. These tools provide features such as task management, resource allocation, timeline scheduling, and collaboration tools, all of which enable project managers to keep projects on track and within scope. Project management software also often includes reporting and analytics features to monitor key performance indicators (KPIs) and ensure deadlines and budgets are met. Many solutions support team communication through integrated messaging, file sharing, and document management. Whether for small teams or large enterprises, these tools help improve productivity and ensure project goals are achieved efficiently.
Project Tracking Software
Project tracking software helps teams plan, organize, and monitor the progress of work across tasks, milestones, and deliverables. It provides real-time visibility into timelines, workloads, dependencies, and project health so teams stay aligned and on schedule. These platforms centralize communication, documentation, and updates, reducing confusion and keeping everyone accountable. Many tools also include dashboards, automation, resource management, and reporting to help managers make data-driven decisions. By streamlining workflows and improving transparency, project tracking software boosts productivity and increases the likelihood of successful project delivery.
IT Project Management Software
IT project management software is designed to help IT and development teams manage their complex projects efficiently. It allows users to create tasks, assign resources, track progress, and allocate budgets with greater visibility and control over the entire project lifespan. This software can also be used to generate reports that provide a comprehensive view of the status, health and impact of the project. Ultimately, it helps stakeholders make informed decisions on how best to move forward with their initiatives.
Project Planning Software
Project planning software helps teams and organizations outline, schedule, and manage projects from start to finish. These tools enable users to define project scope, set deadlines, assign tasks, and allocate resources, ensuring that every aspect of a project is organized and aligned with objectives. Many project planning solutions feature Gantt charts, Kanban boards, and task lists to visually represent project timelines and progress. The software often includes collaboration features, such as file sharing, real-time updates, and team communication tools, making it easier for team members to stay on track. This software is essential for managing complex projects, ensuring that deadlines are met, and resources are used efficiently.
Project Accounting Software
Project accounting software is built to help businesses manage the financial aspects of individual projects, ensuring that budgets, costs, and revenues are tracked accurately throughout the project lifecycle. These platforms provide tools for budgeting, forecasting, cost allocation, and invoicing, offering insights into a project's financial health and profitability. Project accounting software often integrates with other financial systems, enabling real-time reporting and monitoring of project expenses, time tracking, and resource utilization. By using this software, organizations can ensure financial control over projects, minimize cost overruns, and improve decision-making with detailed financial data for each project.
IoT Security Software
IoT (Internet of Things) security software is designed to protect connected devices and networks from cyber threats, ensuring the confidentiality, integrity, and availability of data transmitted between IoT devices. These tools monitor and secure devices, applications, and networks that are part of the IoT ecosystem, which includes sensors, actuators, smart appliances, wearables, and industrial equipment. IoT security software includes features such as threat detection, data encryption, access control, device authentication, and vulnerability management to mitigate risks from cyberattacks, unauthorized access, and data breaches. It is essential for industries like healthcare, manufacturing, transportation, and smart cities, where the IoT devices are widely used and often contain sensitive or critical data.
DeFi Projects
DeFi projects are DeFi (decentralized finance) platforms built on the blockchain that are being actively developed. DeFi projects and DeFi platforms can serve a multitude of purposes, with the aim of making it easy for cryptocurrency investors and DeFi traders to trade, stake, earn, lend, and borrow using DeFi apps on the blockchain.
Data Center Security Software
Data center security software enables IT security professionals and organizations to secure their data center infrastructure including racks, networks, server endpoints, and more. Data center security tools provide all aspects of security for data centers. Data center security software helps protect the physical and virtual infrastructure of data centers from unauthorized access, cyber threats, and data breaches. Data center security software ensures that sensitive information and critical systems are safeguarded from external and internal threats by providing real-time alerts, logging activities, and implementing compliance with security standards.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Network Monitoring Software
Network monitoring software is software that tracks and manages the performance, availability, and health of an organization's network infrastructure. These platforms provide real-time monitoring of network devices such as routers, switches, servers, and firewalls to ensure optimal performance and identify potential issues before they impact operations. Network monitoring software typically includes features like alerting, traffic analysis, bandwidth monitoring, and uptime reporting. It helps IT teams detect bottlenecks, security breaches, or failures, allowing them to take corrective action quickly. By providing detailed insights into network traffic and performance, network monitoring software helps ensure smooth network operations, improve efficiency, and minimize downtime.
Network Mapping Software
Network mapping software is a tool used to visualize, analyze, and document the structure and components of a network. It automatically discovers network devices such as routers, switches, firewalls, and servers, mapping their connections and creating a visual representation of the network topology. These platforms often provide real-time network monitoring, traffic analysis, and troubleshooting features, helping IT teams identify issues, optimize performance, and plan for network expansions or upgrades. By creating clear, detailed maps of network architecture, network mapping software improves network management, enhances security, and ensures better resource allocation and fault detection.
Ad Networks
Ad networks are platforms that connect advertisers with publishers to facilitate the buying and selling of ad inventory. They aggregate ad space from various publishers and offer it to advertisers who want to reach targeted audiences. Ad networks use algorithms to match advertisers’ campaigns with available ad space based on factors like audience demographics, interests, and browsing behavior. They help streamline the ad-buying process by managing inventory, optimizing bids, and ensuring ads are delivered efficiently. Popular ad networks include Google AdSense, Media.net, and Amazon's advertising platform, among others.
Container Security Software
Container security software is software designed to protect containerized applications and environments from security vulnerabilities, threats, and attacks. Containers, which are used to deploy and run applications in isolated environments, present unique security challenges due to their dynamic and ephemeral nature. Container security software helps secure containerized environments by providing capabilities such as vulnerability scanning, runtime protection, access control, and image security. These tools monitor container configurations and activity to detect anomalies, ensure compliance with security policies, and mitigate risks like container escapes or unauthorized access. By enhancing the security of containers and container orchestration platforms (like Kubernetes), these solutions enable organizations to securely deploy and manage applications in cloud-native and microservices environments.
Network Automation Software
Network automation software helps streamline and manage the configuration, operation, and monitoring of computer networks without requiring manual intervention. By automating routine tasks such as device configuration, network monitoring, traffic management, and fault detection, this software reduces human error, increases efficiency, and ensures network reliability. It enables administrators to define policies and protocols that are automatically applied across the network, making it easier to scale and manage complex infrastructure. Many network automation solutions also offer real-time monitoring and troubleshooting tools, helping to optimize network performance and ensure compliance with security standards. This software is commonly used in large enterprises, data centers, and service providers to enhance the scalability and agility of network operations.
Visual Project Management Software
Visual project management software enables teams and project managers to visually plan and track progress of projects.
Social Networking Software
Social networking software enables individuals and organizations to create, manage, and engage in online communities, allowing users to share content, communicate, and collaborate. These platforms typically include features like user profiles, messaging, status updates, content sharing, and group discussions, facilitating both personal and professional connections. Social networking software is used for a wide range of purposes, from personal socialization to business networking and marketing. These tools enable users to build networks, interact with others, and discover relevant content through their connections and interests.
Network Troubleshooting Software
Network troubleshooting software enables the optimization of network issue identification through analysis, testing and functional solution implementation.
Network Configuration Software
Network configuration software is designed to automate, manage, and monitor the setup and maintenance of network devices such as routers, switches, firewalls, and access points. It enables IT teams to define configuration policies, apply them consistently, and track changes across complex network infrastructures. These tools help prevent configuration errors, enforce compliance, and reduce downtime by providing centralized visibility and version control. Many platforms integrate with network monitoring and security systems to ensure optimal performance and alignment with corporate policies. By automating routine network management tasks, network configuration software improves efficiency, reliability, and security across enterprise environments.
Project Portfolio Management Software
Project portfolio management (PPM) software is designed to help organizations oversee multiple projects at once, aligning them with strategic goals and resource capacity. It provides visibility into project pipelines, budgets, timelines, risks, and performance, enabling leaders to prioritize initiatives effectively. These platforms often include tools for resource allocation, scenario planning, financial forecasting, and reporting dashboards. By consolidating project data, PPM software empowers decision-makers to balance workloads, reduce risks, and maximize return on investment. It is widely used in enterprises, government agencies, and large organizations to ensure that projects collectively drive business success.
View more categories (20) for "2015 projects for network security"

245 Products for "2015 projects for network security"

  • 1
    Atera

    Atera

    Atera

    Atera, the first and only Agentic AI platform for IT management, offers IT teams and MSPs a digital workforce of AI agents to preemptively and autonomously manage their entire IT operations. Its all-in-one platform combines RMM, helpdesk, ticketing, and automation to reduce downtime, improve SLAs, and free IT teams to focus on strategic work over mundane tasks. At the core of Atera’s platform are two powerful AI agents built to enhance every layer of IT operations. AI Copilot helps...
    Leader badge
    Starting Price: 30-DAY FREE TRIAL
    View Software
    Visit Website
  • 2
    PathSolutions TotalView
    PathSolutions TotalView network monitoring and troubleshooting software bridges the gap between NETWORK MONITORING and TROUBLESHOOTING RESOLUTION telling you WHEN, WHERE and WHY network errors occur. PathSolutions TotalView continuously monitors and tracks the performance of every device and every link in your entire network, going deeper than other solutions by collecting error counters, performance data, configuration information and connectedness. A built-in heuristics engine analyzes...
    Leader badge
    Starting Price: $5,747 perpetual
    Partner badge
    View Software
    Visit Website
  • 3
    Adept Secure

    Adept Secure

    Adept Technologies

    The rush to be first to market in application development, and the leveraging of open-source technology has created a hacker’s paradise. The Unites States of America and its allies are the target of an unprecedented amount of cyber terror attacks. Hacking, cracking, kill chains, zero-day attacks, ransomware, denial of service and other cyberattacks have reached levels of sophistication surpassing the capabilities of most organizations to defend against. On December 23, 2015, Ukrainian power...
  • 4
    Zeek

    Zeek

    The Zeek Project

    Zeek (formerly Bro) is the world’s leading platform for network security monitoring. Flexible, open source, and powered by defenders. Zeek has a long history in the open source and digital security worlds. Vern Paxson began developing the project in the 1990s under the name “Bro” as a means to understand what was happening on his university and national laboratory networks. Vern and the project’s leadership team renamed Bro to Zeek in late 2018 to celebrate its expansion and continued development. ...
    Starting Price: Free
  • 5
    inwink

    inwink

    inwink

    inwink is the B2B marketing SaaS platform that enables companies to showcase their brands and engage their audiences through: - in-person, online, and hybrid events ; - always-on online communities on dedicated websites ; - centralized, highly-secured data, strictly partitioned by customer. A pioneer in event management technology since 2015, inwink today is a comprehensive, 360° B2B marketing solution, adopted by more than 180 enterprises,...
    Starting Price: €490/month
  • 6
    InfoSum

    InfoSum

    InfoSum

    InfoSum unlocks data’s limitless potential. Using patented, privacy-first technology, InfoSum connects customer records between and amongst companies, without ever sharing data. Customers across financial services, content distribution, connected television, eCommerce, gaming, and entertainment all trust InfoSum to seamlessly and compliantly connect their customer data to other partners through privacy-safe, permissioned, data networks. There are many applications for InfoSum’s...
  • 7
    MyChat

    MyChat

    Network Software Solutions

    Secure instant messaging system with own server that can work in local area network and over the Internet. Providing collaboration tools for employee engagement. Built-in knowledge base, important notifications with return receipts, Bulletin board, broadcast messages, flexible server management, the system for user rights to access MyChat features, voice/video calls, screen sharing calls, Kanban project management, conferences, private dialogues, extended contact list, available for all platforms: Windows, macOS, Linux, Android, iOS, WEB.
    Starting Price: $6/per user/one-time
  • 8
    CloudBacko

    CloudBacko

    CloudBackoGo Backup

    CloudBacko Corporation is a cloud backup software vendor established in 2014, as has become a wholly owned subsidiary of Ahsay Backup Software Development Company Limited [HKEx Stock Code: 8290] in 2015. We are specialized in developing cloud and local backup solution for businesses of any sizes. Our core product, CloudBacko™ backup software, is the next generation online / offsite / remote / local backup software for backing up business servers and desktop computers to the cloud as well as...
    Starting Price: $1 per month
  • 9
    PeerGFS

    PeerGFS

    Peer Software

    One Solution to Simplify File Management and Orchestration Across Edge, Data Center, and Cloud Storage PeerGFS is a software-only solution developed to solve file management/file replication challenges in multi-site, multi-platform, and hybrid multi-cloud environments. With over 25 years of experience in geographically dispersed file replication, we help organizations: - Improve availability through Active-Active data centers (on-premises and/or in the cloud) - Protect data at the...
    Partner badge
    View Software
    Visit Website
  • 10
    SuperNova Proxies

    SuperNova Proxies

    SuperNova Proxies

    ...All proxies support HTTP and SOCKS5 protocols, with a 99%+ connection success rate. The platform integrates easily with third-party tools, and the flexible pay-as-you-go pricing model is suitable for projects of any scale. Looking to buy proxies for AI or scraping? SuperNovaNet.org provides scalable, secure, and high-performance solutions.
    Starting Price: $2.5/GB
  • 11
    UNCX Network

    UNCX Network

    UNCX Network

    UNCX Network is a decentralized finance (DeFi) ecosystem that provides essential tools and services for blockchain-based projects, particularly in the areas of token security and liquidity management. The network is best known for its liquidity locking, token vesting, and decentralized launchpad services, which help ensure transparency, trust, and security for both project developers and investors.
  • 12
    Ettercap

    Ettercap

    Ettercap

    Ettercap is a comprehensive suite for man-in-the-middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis. The Ettercap source code is stored on the Github pages using a GIT repository. Below are the steps to you should follow to ensure you are working off the same code base as everyone else involved in the...
  • 13
    stakefish

    stakefish

    stakefish

    ...We operate validators on these projects. Support the ecosystem by staking with stakefish. We operate validators on these projects. Token holders can stake with us to help secure these networks and earn staking rewards. Join the staking ecosystem today with stakefish.
  • 14
    Sentinel IPS

    Sentinel IPS

    Sentinel IPS

    An affordable suite of network security services, including a Managed Network Detection and Response team, our unique Network Cloaking™ methodology, and CINS Active Threat Intelligence. Comprehensive managed security. Designed to support lean IT teams, and get them back to their other projects. Working with you to deflect outside intrusions, detect malicious threats, and respond quickly to critical events.
  • 15
    Meter

    Meter

    Meter

    Enterprise hardware, intuitive software, and optimized operations to deploy and scale to thousands of networks. Save time and money by focusing more on strategic projects and less on firefighting. Use Meter to experience enterprise networks with higher performance, security, and reliability. Experience robust performance, enhanced observability, and ironclad security on Meter’s cloud-based platform for monitoring, managing, and enforcing policies across your network.
  • 16
    DAISI

    DAISI

    DAISI

    DAISI offers a revolutionary opportunity to make money by processing AI requests on your idle devices. Our globally-distributed and secure network allows you to tap into the power of artificial intelligence while earning passive income. Here are the key features and benefits that make DAISI a must-have for anyone looking to monetize their idle devices and build amazing projects. Features: Earn Passive Income: By processing AI requests on your idle devices, you can generate income without any additional effort Global Network: Our network is distributed globally, ensuring fast and reliable access to AI resources from anywhere in the world Secure Environment: DAISI provides a secure platform for processing AI requests, protecting your data and ensuring privacy Build Amazing Projects: With access to our network, you can unleash your creativity and build innovative projects that leverage the power of AI
  • 17
    Nektar Finance

    Nektar Finance

    Nektar Finance

    Nektar is a decentralized infrastructure marketplace that seamlessly connects operators, networks, and delegators to match their infrastructure and liquidity needs. Operators can maximize the capital efficiency of existing infrastructure by accessing top revenue-generating opportunities. Networks have the opportunity to incentivize liquidity, attract new operators, and boost the loyalty of existing ones. Delegators can increase potential rewards by depositing a wide array of tokens. Nektar...
  • 18
    MixMode

    MixMode

    MixMode

    Unparalleled network visibility, automated threat detection, and comprehensive network investigation powered by Unsupervised Third-wave AI. MixMode's Network Security Monitoring platform provides comprehensive visibility allowing users to easily identify threats in real time with Full Packet Capture and Metadata for longer term storage. Intuitive UI and easy to use query language help any security analyst perform deep investigations and understand the full lifecycle of threats and network anomalies. ...
  • 19
    Suricata

    Suricata

    Suricata

    ...Suricata’s fast paced community driven development focuses on security, usability and efficiency. The Suricata project and code is owned and supported by the Open Information Security Foundation (OISF), a non-profit foundation committed to ensuring Suricata’s development and sustained success as an open source project.
  • 20
    Lumo Flow

    Lumo Flow

    Lumo Research

    Used by thousands of businesses worldwide, Lumoflow combines agile group work, social networking and content management tools into easy-to-use secure service. It’s an ideal solution for cross-organizational projects and large program networks. Today’s employees are demanding more transparency and effective tools for working together. Lumoflow is designed for both internal and external participants to share content and collaborate as a one seamless social network.
    Starting Price: $95 per month
  • 21
    FerrumGate

    FerrumGate

    FerrumGate

    FerrumGate is an Open source Zero Trust Network Access (ZTNA) project, that uses advanced identity and access management technologies to ensure secure access to your network and applications. With multi-factor authentication, continuous monitoring, and granular access controls. You can use it for Secure remote access, Cloud security, Privileged access management, Identity and access management, Endpoint security, IOT connectivity.
  • 22
    OAK Network

    OAK Network

    OAK Network

    OAK is the native token of OAK Network, which is a delegated proof of stake network with the purpose of providing decentralized and trustless cross-chain automation. OAK aims to provide users with easy and affordable tools to schedule and automate payments that can be triggered by time, token price, or other events. Providing these services to millions of users OAK requires a thriving ecosystem that is both secure and incentivizes good faith participation in the network for all stakeholders....
  • 23
    Microsoft Kaizala
    Microsoft Kaizala. A simple and secure work management and mobile messaging app. Engage securely with your networks, including partners, suppliers, customers, citizens, and others. With a simple phone number sign-up, you can connect and coordinate with anyone. Coordinate work more effectively Communicate with multimedia messaging and audio and video calling using Microsoft Kaizala‘s simple chat interface. Manage tasks, collect data, and gather insights with integrated work management...
    Starting Price: $4 per user per month
  • 24
    Nmap

    Nmap

    Nmap

    The Nmap project tries to defy the stereotype of some open source software being poorly documented by providing a comprehensive set of documentation for installing and using Nmap. This page links to official Insecure.Org documentation and generous contributions from other parties. Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open-source utility used by millions of people for network discovery, administration, and security auditing. ...
  • 25
    Callisto Network

    Callisto Network

    Callisto Network

    ...Having completed over 350 smart contract audits, including many major projects, Callisto Network has established itself as the leading independent security expert.
  • 26
    Syncro

    Syncro

    Syncro

    Syncro offers the first Extended Monitoring and Management (XMM) platform purpose-built for midsized MSPs and internal IT teams. The unified platform integrates RMM (endpoint management), professional services automation (PSA), and Microsoft 365 multi-tenant management to help organizations simplify operations, strengthen security, and scale profitably. Syncro delivers powerful automation, native AI capabilities, deep Microsoft 365 integration, and seamless support for 50+ third-party...
    Leader badge
    Starting Price: $129 per user per month
  • 27
    Extenda Networks

    Extenda Networks

    Extenda Networks

    ...Our desktop support services, knowledge and expertise drive efficiencies for our diverse customer base. Our Cisco- certified engineers can help protect your data and lower the cost of virus or intrusion recovery by keeping your network in-step with the latest security measures critical to your routers, switches, firewalls, and virtual private networks.
  • 28
    Project Calico

    Project Calico

    Project Calico

    Calico is an open-source networking and network security solution for containers, virtual machines, and native host-based workloads. Calico supports a broad range of platforms including Kubernetes, OpenShift, Mirantis Kubernetes Engine (MKE), OpenStack, and bare metal services. Whether you opt to use Calico's eBPF data plane or Linux’s standard networking pipeline, Calico delivers blazing-fast performance with true cloud-native scalability. Calico provides developers and cluster operators...
    Starting Price: Free
  • 29
    Spamhaus

    Spamhaus

    The Spamhaus Project

    The Spamhaus Project is an international nonprofit organization that tracks spam and related cyber threats such as phishing, malware and botnets, provides realtime actionable and highly accurate threat intelligence to the Internet's major networks, corporations and security vendors, and works with law enforcement agencies to identify and pursue spam and malware sources worldwide.
  • 30
    Casting Networks

    Casting Networks

    Casting Networks

    ...Share sessions, size sheets, and actor profiles with your clients safely and securely. Our new iOS application for Casting Networks enables actors, models and other performers to access their profile, headshots, and reels, view and submit to the Casting Billboard, and view/respond to media requests, question requests, audition requests, and callback requests from casting.
    Starting Price: Free
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next