Iperius Backup 是一款功能強大的檔案備份與同步工具,提供靈活且豐富的功能來滿足所有備份需求。它可將檔案和資料夾複製到任何大容量儲存裝置,如 NAS、RDX 裝置、外部 USB 磁碟機以及網路上的電腦,且提供 AES 256 位元加密及 Zip 64 壓縮技術,支援增量備份、FTP/SFTP 和雲端備份 (Dropbox、Google Drive、OneDrive、Amazon S3 和 Azure Storage)、磁碟區陰影複製 (VSS)、網路認證及執行外部程式和腳本,且可做鏡像備份、檔案和資料夾同步等等。
更新介紹
New features
Backup to Amazon S3: added support for the "Africa (Cape Town)" region
Exchange Online Backup (Office 365): Mailbox name is now added to the error list
Hyper-V backup: improved the restore procedure with the block-cache mechanism
Several improvements and optimizations
Fixed bugs
Hyper-V backup: fixed a bug that prevented virtual machines from being restored to the correct default folders
Exchange Online Backup (Office 365): Fixed a bug in identifying folder type
Some minor bugs fixed
新的威脅不斷湧現安全組織的資訊系統基礎架構。防火牆和虛擬私有網路(VNPs)不能防止企業內部的所有入侵,也不能阻止對其電腦的攻擊。侵入竊密檢測系統可以確保網路完整性和安全性,網路入侵檢測系統(NIDS)一直被視為最有效的檢測攻擊的手段,不過這些工具也有很大的弱點。
不斷增加的數量和多樣性的合法網路流量造成硬體成本不斷增加以及大量的誤測警告,這大大降低網路分析的有效性。探測未知的資訊攻擊,KFSENSOR不像其他的產品,它是不會依靠已知的攻擊類型數據去探測的,它可以動態得探測其他新型的攻擊。
Honeypot technology
Honeypot將網路系統,他可以探測和攻擊,以便讀取攻擊資訊。這是一種完全不同於其他形式的安全防護,且被越來越多的使用者公認為最有效的檢測資安威脅工具。
Honeypot允許入侵者與其互動,並且從中獲得詳細的資訊和技術工具。由於沒有正當合法使用的Honeypot,導致所接收到的資訊都被歸類成可疑訊息。這產生極少的誤測警告。
KFSensor開發製造的honeypot 系統,專門入侵檢測任務,該系統提供了高度可配置性,並且具有資料記錄、資料分析以及安全預警功能。
How KFSensor works
KFSensor易於安裝和配置,您只需要花幾分鐘就可以安裝使用,沒有特殊的硬體要求,KFSensor的高效設計,即使在低規格的Windows機台都可以運行使用。
直接的Windows介面控制所有的功能,無需複雜的編輯配置檔案及預先配置所有主要系統所需的服務。
KFSensor的運行服務通過模擬系統在最高級別的OSI網絡模型─應用層。這使其能夠充分利用Windows的安全機制和網絡資料庫,降低風險的檢測和妥協,不引入額外的驅動程式和自定義 IP協議。運行在KFSensor的機台可以當作網路上的另外一個伺服器,而無需進行複雜的路由器和防火牆的更換。
KeyFocus KFSensor通過模擬駭客入侵來檢測本地電腦的漏洞,提供詳細的安全報告,此程式還具有入侵監測的功能,可實時的監測本地電腦,一旦出現被入侵的情況會實時發出系統警報;並可以對攻擊或者入侵者進行詳細的分析,並提供詳細的報告。
KFSensor是一種極具成本效益的方式加強網絡安全資訊系統基礎架構。
系統需求
The efficient design of KFSensor allows it to run on even the most modest of machines, if not exposed to much traffic. However its requirements will grow according to the amount of traffic it receives.
Minimum machine specification
Windows XP, Windows 2003 Server, Windows Vista, Windows 2008 Server, WIndows 7, Windows 8, Windows 10
32-bit Windows or 64-bit Windows
Processor 1.5Ghz or greater
2Gb hard disk space
2Gb RAM
1 LAN card or more
Western European language keyboard
更新介紹
Updated to new code signing certificate.
Code re-release with new code signing certificate.
Fixes
Updated to work with the latest npcap 0.9984
New scenario port definitions
LanScope Cat IT資產管理和資料丟失預防軟體
由日本 MOTEX Inc. 公司開發的 LanScope Cat 軟體功能強大,主要功能有 Asset Management 資產管理、Operations Log Management 日誌管理、Web Access Management 訪問管理,及 Device Control。
軟體可以綜合管理IT資產,自動收集 IT 設備內部重要信息,操作日誌管理 Web 訪問管理、設備控制、電子郵件管理、應用程式 ID 監察等主要功能,以及伺服器 Log 訪問日誌管理、文件伺服器容量管理、域名登錄,註銷管理等多個特色功能,針對已知和未知的惡意軟體防護,為企業內部資料洩漏施以對策方案,有效解決資訊安全問題。
軟體工具檢測惡意軟體,追蹤進入通路的隔離。有些不能完全防止惡意軟體的新物種繼續在傳統的反病毒措施成長,某些情況下,不知道感染。這是一個挑戰,即使知道有病毒感染,可能需要很長的時間來確定原因。LanScope Cat 軟體擁有IT網路管理和資料丟失預防工具的強大功能,提供企業防毒及資料洩漏和丟失預防的最佳解決方案。
The actual causes of information leaks are mostly employees or contractors who bring out data in e-mail or recording media or copies of paper materials. As described above, companies suffer great damage due to information leaks. These costs are not only in the form of apologizing to victims and investigation costs, but in the loss of trust in the company and brand image. The effect on a company of just one information leak is immeasurable. And 80% of them are caused from the inside.
Manage IT assets
Monitor asset performance
We automatically collect information to ascertain usage status of IT assets, including PCs and software, and create an environment to render the best performance by setting up the right resources in the right places.
Employee monitoring
Productivity management
By recording computer usage, we can suppress illicit and non-business use. Also, we learn about and analyze usage of IT assets and work status, creating improved operational efficiency and productivity.
USB control, app control
Control of data removal
By visualizing data usage and controlling routes through which information can leak (Web, devices, apps, PCs), we protect personal information and your company's secret information.
(Magnet Axiom Complete原名INTERNET EVIDENCE FINDER)
Magnet Axiom Complete是款用來獲取、恢復和分析網際網路通信痕跡的利器。因其易用性、簡明行和全面性而聞名。其能夠幫助政府執法部門、軍事/情報機構人員、海關/邊境檢查人員、企業安全人員對Windows和Mac電腦以及Android和iOS移動設備進行電子取證調查。詳細介紹請見後面欄位!
IEF 對於企業的益處
The ability to recover digital evidence is becoming business-critical. Magnet Axiom Complete is the secret weapon every organization should have in its forensic toolkit.
IEF can search a hard drive, live RAM, or files for Internet-related data. The software is designed with digital forensics examiners/investigators in mind. IEF is also used by IT security professionals, litigation support personnel, incident response teams, cyber security specialists and corporate investigators.
IEF can recover data from social networking communications, instant messenger chat histories, popular webmail applications, web browsing history, and peer-to-peer sites and other online communications.
IEF 對於司法鑑定人員的益處
INTERNET EVIDENCE FINDER™ (IEF) searches in more places, recovering more data. Its easy to use, and the reporting is flexible.
IEF is forensic software that recovers Internet-related data from a hard drive, live RAM, or files. Because of the advantages it offers over other solutions on the market, IEF is the only choice for many of the world’s top law enforcement agencies.
IEF was designed with digital forensics examiners/investigators in mind, and recovers more digital evidence than any other solution on the market.
IEF 對軍方與政府的益處
In military and government investigations, digital evidence can be a question of national security, and even life or death.
INTERNET EVIDENCE FINDER™ (IEF) is forensic software that searches a hard drive, live RAM, or files for Internet-related data. IEF was designed with digital forensics examiners / investigators in mind. IEF is also used by IT security professionals, litigation support personnel, incident response teams, cyber security specialists and corporate investigators.
IEF recovers content from social networking pages, instant messenger chat histories, popular webmail applications, web browsing history, and peer-to-peer sites and other online communications.
MOBILedit Forensic Express 是一款功能強大且先進的軟體,它使用戶能夠分析其行動設備,生成報告,從電話和雲端服務中提取數據,它是一個包含所有有用和必需工具和功能的一體式軟體平台
MOBILedit是使用物理和邏輯數據採集方法的功能強大的64位應用程式,非常適合其先進的應用程式分析器,刪除的數據恢復,即時更新,支持的電話範圍廣泛(包括大多數功能電話),經過微調的報告,並發電話處理,以及易於使用的用戶界面。使用密碼和PIN密碼鎖,您可以通過GPU加速和多線程操作以最大速度訪問鎖定的ADB或iTunes備份。
Forensic Express提供最大的功能,而價格僅為其他工具的一小部分。它可以用作實驗室中的唯一工具,也可以通過其數據兼容性來增強其他工具的功能。與Camera Ballistics集成後,它將科學地分析相機的照片來源。
Phone extractor with extremely wide range of supported phones
Password breaker with GPU acceleration and multi-threaded operation for maximum speed
iTunes backup analyzer
Android ADB backup analyzer
Applications data analyzer
Photo Recognizer
Deleted data recovery
Cellebrite UFED data analyzer
Cellebrite UFED data generator
Oxygen data analyzer
Report generator
Phone unlocking
Proxmox Mail Gateway 是一套高效將垃圾郵件和病毒過濾的軟體
為了確保有效的電子郵件通信,Proxmox Mail Gateway是一套高效將垃圾郵件和病毒過濾的軟體。Proxmox的郵件網可幫助您保護您的企業免受所有的電子郵件威脅如垃圾郵件、病毒和木馬等等。靈活的架構結合了用戶名單,基於Web管理,使您可以輕鬆控制所有傳入和傳出的電子郵件。保持一個專業的電子郵件的工作流程,可以獲得較高的商業信譽和客戶滿意度。
系統需求
Recommended Hardware
(depending on your email traffic and settings)
Multicore CPU: 64bit (Intel EMT64 or AMD64), for use as virtual machine activate Intel VT/AMD-V CPU flag
4 GB RAM
Bootable CD-ROM-drive or USB boot support
Monitor with a resolution of 1024x768 for the installation
1 Gbps Ethernet network interface card
Storage: at least 8 GB free disk space, best setup with redundancy, use hardware RAID controller with battery backed write cache (“BBU”) or ZFS. ZFS is not compatible with a hardware RAID controller. For best performance use Enterprise class SSD with power loss protection.
Minimum Hardware
CPU: 64bit (Intel EMT64 or AMD64)
2 GB RAM
bootable CD-ROM-drive or USB boot support
Monitor with a resolution of 1024x768 for the installation
Hard disk with at least 8 GB of disk space
Ethernet network interface card
Install as virtual host
For using Proxmox Mail Gateway on a virtualization platform use the same resource settings as you would use on physical hardware. The following platforms are supported:
Proxmox VE
Vmware vSphere™
Hyper-V™
KVM
Virtual box™
Citrix XenServer™
LXC container
...and others supporting Debian Linux as guest OS
版本比較
Annual Subscriptions for Proxmox Mail Gateway
PREMIUM
STANDARD
BASIC
COMMUNITY
Complete feature-set
GNU AGPL, v3 license
Access to Enterprise repository
Support via Customer Portal
Unlimited support tickets
Response time: 2 hours*
within a business day
Remote support (via SSH & HTTPS)
Complete feature-set
GNU AGPL, v3 license
Access to Enterprise repository
Support via Customer Portal
15 support tickets/year
Response time: 4 hours*
within a business day
Remote support (via SSH & HTTPS)
Complete feature-set
GNU AGPL, v3 license
Access to Enterprise repository
Support via Customer Portal
5 support tickets/year
Response time: 1 business day
Complete feature-set
GNU AGPL, v3 license
Access to Enterprise repository
Community support