Top 15 Verisys Alternative and Similar Softwares | Apr 2024

The Verisys File Integrity Monitoring system is a powerful software solution for Windows and Linux systems, with cross-industry applications including PCI and SOX compliance and data integrity assurance.

1. SISA Assistant

SISA Assistant SISA Assistant is the First PCI DSS Risk Assessment and Compliance management Tool in the world outcome of 10 years of SISA Information Security expertise in the field of Risk Assessment and Compliance.SISA Assistant Key Features - 1. Boost your productivity and save 80% of your time managing Security and......

2. Snare Server

Snare Server The Snare Server, from InterSect Alliance, is a proprietary Log Monitoring solution that builds on the open source Snare agents to provide a central audit event collection, analysis, reporting and archival system.Full source code and documentation is provided with this product, allowing InterSect Alliance partners, or your internal security team,......

3. ObserveIT Session Recording for Citrix

ObserveIT Session Recording for Citrix ObserveIT’s session recording system captures video of all on-screen activity while users work in Citrix XenApp published applications and on XenDesktop virtual desktops – with the most advanced video search technology available.ObserveIT is the natural replacement for Citrix SmartAuditor. A Citrix Ready® -verified solution, ObserveIT picks up where Citrix SmartAuditor......

4. syschangemon

syschangemon syschangemon - system change monitorPeriodically collects system configuration (eg. conffiles in /etc, binary files in /sbin, etc.) for changes, it can even run external commands and store their stdout and stderr for change monitoring.This can be useful as a HIDS (host based intrusion detection system) as well as in a......

5. SIEMonster

SIEMonster OverviewKustodian’s SIEMonster: SIEM for everyone with no limitsAs a security professional, protecting your company’s assets from internal or external attacks is a never ending complex job. It is crucial that you have visibility across your entire environment. It’s like having a house alarm, there is no point having some rooms......

6. AspDotNetStorefront

AspDotNetStorefront Choose AspDotNetStorefront and join over 10,000 users, hundreds of professional development partners, and a community with over 10 years of e-commerce experience. AspDotNetStorefront MSx 9.3 is a robust and customizable e-commerce platform that can support small and large enterprise online businesses alike. Created, developed and supported by the same company,......

7. Netop Remote Control

Netop Remote Control Netop is a worldwide leader in software solutions for desktop management and classroom management. Key products include Remote Control, School 6, Vision 7, and Live Guide. With a new business model and a broadly innovative product suite, Netop is now focused on three key market segment opportunities: IT Administration, Education......

8. Cloudbric

Cloudbric Cloudbric is a cloud-based web security service by Penta Security Systems, offering an award-winning WAF, DDoS protection, and SSL, all in a full-service package. Utilizing Penta Security Systems’ patented logic analysis engine to filter malicious website traffic with proven precision, Cloudbric delivers lower false positives than any industry competitor. Awarded......

9. ADONIS:Community Edition

ADONIS:Community Edition ADONIS:Community Edition is a free version of the BPM toolkit ADONIS aimed both at users new to the business process management, who need an intuitive tool for documenting processes and publishing them as HTML and Word, as well as BPM practitioners, who want more sophisticated options like process simulation, performance......

10. InterFAX

InterFAX Business-oriented internet fax service, enabling fax transmission and reception via email or API. PCI-DSS and HIPAA compliant.......

11. Ossec

Ossec OSSEC is an Open Source Host-based Intrusion Detection System. It performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.It runs on most operating systems, including Linux, MacOS, Solaris, HP-UX, AIX and Windows.......

12. PCI Utilities

PCI Utilities The PCI Utilities are a collection of programs for inspecting and manipulating configuration of PCI devices, all based on a common portable library libpci which offers access to the PCI configuration space on a variety of operating systems.......

13. Cyberarms Intrusion Detection and Defense System (IDDS)

Cyberarms Intrusion Detection and Defense System (IDDS) Out-of-the-box security for Remote Deskop, Exchange, OWA, SharePoint, CRM, generic IIS applications and many other server systems.......

14. Core Impact Pro

Core Impact Pro Core Impact Pro is the most comprehensive software solution assessing and testing security vulnerabilities throughout your organization. Core Impact Pro tests across a broad spectrum of risk areas including: - endpoint systems - passwords & identities- mobile devices- wireless networks- web applications & web services- network systems......

15. Samhain

Samhain The Samhain host-based intrusion detection system (HIDS) provides file integrity checking and log file monitoring/analysis, as well as rootkit detection, port monitoring, detection of rogue SUID executables, and hidden processes.Samhain been designed to monitor multiple hosts with potentially different operating systems, providing centralized logging and maintenance, although it can also......