Log Radar centralizes the collection of SYSLOGs and SNMPs from IT network devices within the organization ranging from firewalls, ips/ids, anti spam appliances, ssl vpn appliances, switches as well as servers and PCs. Log Radar does not only analyze and correlate logs, Log Radar alerts users with the essential information required in a real-time graphical display of a web browser. Log Radar is also provides a secure and easy to use platform for forensic analysis and evidence, helping organizations to comply to the standards such as ISO 27001/2, PCI DSS, HIPAA, SOX, etcetera.
Like it? Share with your friends!
Other Windows Software of Developer «Tecforte»:
P2 Commander P2 Commander is a fully automated computer forensic analysis tool designed to forensically analyze computer data. With a focus on email and network e-mail analysis, internet history analysis, chat log analysis, data triage, deleted data recovery, file sort
Lobby Track Free Edition Get started today with the new free edition of Lobby Track, Jolly's industry leading visitor management software.
Register and badge visitors -- Register new visitors or other groups of people. Registration steps are configurable and you define what da
Password Generator 2010 Easily generate millions of unique strong random passwords, numbers, masked codes, pronounceable passwords, usernames, and more. Control character placement, composition, and frequency of occurrence. Allow or disallow duplicate, consecutive, repeating, and
LanSpy LanSpy is a network security scanner, which allows getting different information about computer Domain and NetBios names, MAC address, Server information, Domain and Domain controller information, Remote control, Time, Discs, Transports, Users, Global and
Start-OVER Start-OVER by AutumnTECH is designed to collect and manage ALL incoming e-mail in a 'Start-OVER' mailbox that is attached to the user's existing e-mail client via the IMAP protocol. Once setup, users no longer need to contact the systems administrator to l
SafeInput Control SafeInput Control, is an efficient and reliable Internet Security component Web sites and Windows based online applications. It provides confidentiality and integrity on Client-side. In other words, unauthorized users cannot capture any transmissions from
MING Network Monitor MING Network Monitor is a simple and affordable software solution for users who want to control, monitor, and archive unlimited Internet traffic on the company or home network, including instant messages (AOL, MSN, Yahoo, ICQ, MySpaceIM, FacebookIM, Warcra
WebDAV Vulnerability Tester Detecting if WebDAV is enabled. Testing IIS WebDAV authentication bypass vulnerability (CVE-2009-1676) . Listing directory and files. find a protected folder (/secret/) and then try inserting the %c0%af character.
Windows NT NTLMSSP Privilege Elevation Vulnerability Patch The NTLM Security Support Provider (NTLMSSP) service in Windows NT 4.0 is responsible for handling NTLM authentication requests, and runs by default on all Windows NT 4.0 systems. A flaw in the service's implementation could allow a service request from an
Metasploit A collaboration between the open source community and Rapid7, Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments, providing true security risk in
Supported Operating Systems:
Windows XP |
Comments on Log Radar:
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10