Cerberus FTP Server
Cerberus FTP Server provides a secure and reliable file transfer solution for the demanding IT professional. Supporting SFTP and SCP, FTP/S, and HTTP/S, Cerberus is able to authenticate against Active Directory and LDAP, run as a Windows service, has native x64 support, includes a robust set of integrity and security features and offers an easy-to-use manager for controlling user access to files and file operations.
Learn more
Curtain LogTrace File Activity Monitoring
In the daily work environment, companies often need to authorize their employees to access and use sensitive company data. However, most companies lack visibility into how their employees are actually utilizing this data, and whether any misuse is occurring. At the same time, companies have to meet internal audit requirements and comply with various data security regulations and policies. This creates a need for the IT department to find ways to effectively monitor and record how employees are accessing and using the company’s data resources.
Curtain LogTrace provides enterprise-wide file activity monitoring. It tracks user actions: create, copy, move, delete, rename, print, open, close, save. Includes source/destination paths and disk type. Perfect for monitoring user file activities.
Key Features:
- File log (create & delete file)
- File log (copy & move file)
- File log (print & rename file)
- App log (save, open & close file)
- Support MySQL & MS SQL
- Watermark for printout
- Central administration
- Integration with Active Directory
- Uninstall password for client
- Password management
- Admin delegation
- Self protection for the software
Learn more
AuthLite
AuthLite provides security for your Windows enterprise network authentication while remaining budget-friendly. Distinct from other multi-factor authentication solutions, its innovative technology enables your Active Directory to natively support two-factor authentication. This means you can continue utilizing your current software seamlessly while integrating additional two-factor security exactly where it is required. Furthermore, AuthLite mitigates the "Pass the Hash" (PtH) attack risk on administrative accounts by restricting user privileges effectively. It mandates two-factor logon prior to granting access to the domain admins group SID. AuthLite is compatible with your existing RDP servers and applications, requiring no modifications to the RDP client software or drivers. Even in offline scenarios, your account remains safeguarded by two-factor authentication. The solution leverages the robust cryptographic HMAC/SHA1 Challenge/response capability of the YubiKey token, ensuring secure cached and offline logon. Thus, AuthLite not only enhances security but also maintains the functionality and convenience that enterprises require.
Learn more
Altered Security
Altered Security provides an immersive educational platform focused on cybersecurity, offering a variety of resources such as Red Team labs, cyber ranges, bootcamps, and certifications tailored for Active Directory, Azure, and enterprise security. Participants can choose between self-paced online labs or live sessions to engage with realistic, well-maintained environments, complete with preconfigured virtual machines, extensive video courses (averaging 11–14+ hours), comprehensive lab manuals, instructional walkthroughs, and dedicated instructor assistance. The curriculum includes advanced courses like Certified Red Team Professional (CRTP), Certified Red Team Expert (CRTE), and AD CS Attacks, which encompass critical subjects such as enumeration, privilege escalation, Kerberos, certificate-based attacks, lateral movement, hybrid Azure-PHF, and cloud persistence. The hands-on labs are designed to mirror enterprise networks with multiple domains and forests, allowing learners to progress from a non-admin level all the way to enterprise admin compromise, and they also provide opportunities to take exam attempts for well-respected industry certifications. This robust approach not only enhances practical skills but also prepares students for real-world cybersecurity challenges they may face in their careers.
Learn more