{"id":313,"date":"2011-10-14T18:56:54","date_gmt":"2011-10-14T15:56:54","guid":{"rendered":"http:\/\/saisa.eu\/blogs\/Guidance\/?p=313"},"modified":"2011-10-14T18:56:54","modified_gmt":"2011-10-14T15:56:54","slug":"some-open-source-based-security-offering","status":"publish","type":"post","link":"https:\/\/saisa.eu\/blogs\/Guidance\/?p=313","title":{"rendered":"Some open source based security offering"},"content":{"rendered":"<p>Open source based applications are coming more and more popular.<\/p>\n<p>However, proper considerations and evaluations should be made before any serious usage.<\/p>\n<p>Here are some links to get an idea.<\/p>\n<ul>\n<li><a href=\"http:\/\/itmanagement.earthweb.com\/secu\/article.php\/3673721\">Ten Open Source Security Apps Worth Considering<\/a>\n<ul>\n<li>Nessus<\/li>\n<li>Snort<\/li>\n<li>Nagios<\/li>\n<li>SpamAssasssin<\/li>\n<li>ClamAV<\/li>\n<li>Open SSL<\/li>\n<li>OpenSSH<\/li>\n<li>Nmap<\/li>\n<li>Ossec HIDS<\/li>\n<li>Wireshark<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"http:\/\/www.linuxworld.com\/news\/2007\/031207-top-5-security.html\">Top 5 open source security tools in the enterprise<\/a>\n<ul>\n<li><a href=\"http:\/\/www.ossec.net\/\">OSSEC<\/a> HIDS<\/li>\n<li><a href=\"http:\/\/snort.org\/\">Snort<\/a><\/li>\n<li><a href=\"http:\/\/www.bro-ids.org\/\">Bro<\/a><\/li>\n<li><a href=\"http:\/\/nagios\">Nagios<\/a><\/li>\n<li><a href=\"http:\/\/www.nessus.org\/\">Nessus<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"http:\/\/www.esecurityplanet.com\/features\/article.php\/3798416\/26-Open-Source-Security-Apps-with-Commercial-Support.htm\">26 Open Source Security Apps with Commercial Support<\/a>\n<ul>\n<li>Anti-Spam\n<ul>\n<li>SpamAssassin<\/li>\n<li>Mailwasher<\/li>\n<\/ul>\n<\/li>\n<li>Anti-Virus\n<ul>\n<li>ClamAV<\/li>\n<\/ul>\n<\/li>\n<li>Data Removal\n<ul>\n<li>Eban<\/li>\n<\/ul>\n<\/li>\n<li>Firewall\n<ul>\n<li>IPCop<\/li>\n<li>Smoothwall<\/li>\n<li>Vuurmuur<\/li>\n<li>Vyatta<\/li>\n<li>AppArmor<\/li>\n<li>ModSecurity<\/li>\n<\/ul>\n<\/li>\n<li>Intrusion Detection and Prevention (IDS\/IPS)\n<ul>\n<li>Snort<\/li>\n<li>OSSEC<\/li>\n<\/ul>\n<\/li>\n<li>Inventory Management\n<ul>\n<li>OCS Inventory NG<\/li>\n<\/ul>\n<\/li>\n<li>Messaging\n<ul>\n<li>Zimbra<\/li>\n<\/ul>\n<\/li>\n<li>Network Monitoring\n<ul>\n<li>SNARE<\/li>\n<li>Tripwire<\/li>\n<li>Nagios<\/li>\n<li>Wireshark<\/li>\n<li>ntop<\/li>\n<\/ul>\n<\/li>\n<li>Passwords and Authentication\n<ul>\n<li>WiKID<\/li>\n<\/ul>\n<\/li>\n<li>Unified Threat Management (UTM)\n<ul>\n<li>Endian Firewall<\/li>\n<li>Untangle<\/li>\n<\/ul>\n<\/li>\n<li>Virtual Private Network (VPN)\n<ul>\n<li>OpenVPN<\/li>\n<\/ul>\n<\/li>\n<li>Vulnerability Assessment\n<ul>\n<li>Nessus<\/li>\n<li>Milescan Web Security Auditor<\/li>\n<\/ul>\n<\/li>\n<li>Web Filtering\n<ul>\n<li>iSAK<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"http:\/\/itmanagement.earthweb.com\/article.php\/31771_3707956_1\">10 Commercial Open Source Security Vendors<\/a>\n<ul>\n<li>Untangle<\/li>\n<li>Vyatta<\/li>\n<li>Sourcefire<\/li>\n<li>WiKID<\/li>\n<li>Tri-D Systems<\/li>\n<li>Tenable Network Security<\/li>\n<li>Smoothwall<\/li>\n<li>Total Information Security<\/li>\n<li>OpenTrust<\/li>\n<li>Tripwire<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Other list (not all open source): <a href=\"http:\/\/sectools.org\/index.html\">Top 100 Network Security Tools<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Open source based applications are coming more and more popular. However, proper considerations and evaluations should be made before any serious usage. Here are some links to get an idea. Ten Open Source Security Apps Worth Considering Nessus Snort Nagios &hellip; <a href=\"https:\/\/saisa.eu\/blogs\/Guidance\/?p=313\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[17,33],"tags":[],"_links":{"self":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/313"}],"collection":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=313"}],"version-history":[{"count":0,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/313\/revisions"}],"wp:attachment":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=313"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}