[go: up one dir, main page]

Results for: red

Suggested Categories:

Red Team Tools Software
Red team tools are tools used by IT security professionals to simulate cyber attacks in order to improve cybersecurity and penetration testing processes. In cybersecurity and penetration testing simulation, the terms "red team" and "blue team" are used, where the red team plays the "attackers" and the blue team plays the "defenders." Red team assessment tools are software tools that are used by IT security professionals who are simulating a cyber attack.

56 Products for "red" with 1 filter applied:

  • 1
    Red Points

    Red Points

    Red Points

    Red Points is the most widely used solution to combat online fraud. Over 1,300 companies rely on our AI-led technology to fight online counterfeits, piracy, and impersonation. They leverage Red Points to recover their digital revenue, maintain control, and improve their brand's value. The solution gives brands full visibility of their online presence.
  • 2
    Red Hat Satellite
    Red Hat Satellite is an infrastructure management product specifically designed to keep Red Hat Enterprise Linux environments and other Red Hat infrastructure running efficiently, with security, and compliant with various standards. Red Hat Satellite helps improve the reliability, availability, security, and compliance of your systems anywhere, across physical, virtual, multi-cloud, and even disconnected environments.
  • 3
    Red Hat Virtualization
    ...Automate, manage, and modernize your virtualization workloads. Whether automating daily operations or managing your VMs in Red Hat OpenShift, Red Hat Virtualization uses the Linux® skills your team knows and will build upon for future business needs. Built on an ecosystem of platform and partner solutions and integrated with Red Hat Enterprise Linux, Red Hat Ansible Automation Platform, Red Hat OpenStack® Platform, and Red Hat OpenShift to improve overall IT productivity and drive a higher return on investment.
  • 4
    Red5 Pro
    Red5 Pro is a real-time video streaming platform tailored for developers, startups, and enterprises that require ultra-low latency of under 250 milliseconds. It supports various streaming protocols including WebRTC, RTMP, RTSP, HLS, SRT, MPEG-TS, and Zixi, ensuring compatibility across diverse use cases. Designed for scalability, Red5 Pro enables clustering to support millions of concurrent viewers and autoscaling on your preferred cloud platform.
    Starting Price: $29.99 per month
  • 5
    RedSwitches

    RedSwitches

    RedSwitches

    RedSwitches is a global leader in high-performance dedicated and bare metal servers, delivering enterprise-grade infrastructure tailored for businesses that demand reliability, security, and flexibility. With a network spanning 20+ data centers worldwide, RedSwitches ensures ultra-low latency and seamless performance across the globe.
    Starting Price: $81.81
  • 6
    Red Pro Host

    Red Pro Host

    Red Pro Host

    RedProHost is a reliable web hosting provider committed to delivering high-performance hosting solutions. We offer fast, secure, and affordable hosting services, including shared, VPS, and dedicated servers, tailored for businesses and individuals. With 24/7 customer support and robust infrastructure, RedProHost ensures maximum uptime and seamless website performance.
    Leader badge">
    Starting Price: $21.99/month
  • 7
    RAD PDF

    RAD PDF

    Red Software

    Add a fully functional PDF editor to your ASP.NET website in minutes! Compatible with 99% of desktop & mobile browsers, from Internet Explorer 6 through the latest iOS Safari release, RAD PDF simply works. No plugins or other software needed. RAD PDF natively supports the most commonly used PDF features. Beyond a PDF reader, RAD PDF equips web applications with a browser-based PDF editor & PDF annotator. Features not even available in Adobe Acrobat Reader can be used to provide...
    Starting Price: $299 per developer
    Partner badge
  • 8
    Red Maple

    Red Maple

    Red Maple Technologies

    Red Maple™ Advanced Credit Card solutions for MS Dynamics, AX 2009/2012 provides comprehensive credit card processing functionality to companies around the world.
  • 9
    iRedMail

    iRedMail

    iRedMail

    ...You have all personal data on your own hard disk, you can control the email security, inspect transaction log. No other organization can see the content of all messages. All components used in iRedMail are open source softwares, and you get the bug fixes and updates from the Linux/BSD venders you trust. iRedMail is the right way to build your mail server with open source softwares.
    Starting Price: Free
  • 10
    RedTrack

    RedTrack

    RedTrack.io

    RedTrack.io - digital advertising data company that enables ad tracking, measurement, and reporting all in one place. Created with focus on performance and usability, RedTrack covers the needs of affiliates, digital agencies, and ad tech companies.
    Starting Price: $49.00/month
  • 11
    YUM

    YUM

    Red Hat

    Installing, patching, and removing software packages on Linux machines is one of the common tasks every sysadmin has to do. Here is how to get started with Linux package management in Linux Red Hat-based distributions (distros). Package management is a method of installing, updating, removing, and keeping track of software updates from specific repositories (repos) in the Linux system. Linux distros often use different package management tools. Red Hat-based distros use RPM (RPM Package Manager) and YUM/DNF (Yellow Dog Updater, Modified/Dandified YUM). ...
    Starting Price: Free
  • 12
    RedPajama

    RedPajama

    RedPajama

    Foundation models such as GPT-4 have driven rapid improvement in AI. However, the most powerful models are closed commercial models or only partially open. RedPajama is a project to create a set of leading, fully open-source models. Today, we are excited to announce the completion of the first step of this project: the reproduction of the LLaMA training dataset of over 1.2 trillion tokens. The most capable foundation models today are closed behind commercial APIs, which limits research, customization, and their use with sensitive data. ...
    Starting Price: Free
  • 13
    Phishing Club

    Phishing Club

    Phishing Club

    Phishing Club - Professional Self-Hosted Phishing Simulation Platform Phishing Club is a self-hosted phishing simulation platform designed for red teams, privacy aware companies, and security service providers. At its core, it's a single binary deployment that gives organizations complete control over their phishing infrastructure and data. What sets Phishing Club apart is its focus on self-hosting, ensuring organizations maintain complete data sovereignty while conducting security awareness training without artificial limits on campaigns, recipients, or domains. ...
    Starting Price: 0
  • 14
    Red Hat OpenShift
    The Kubernetes platform for big ideas. Empower developers to innovate and ship faster with the leading hybrid cloud, enterprise container platform. Red Hat OpenShift offers automated installation, upgrades, and lifecycle management throughout the container stack—the operating system, Kubernetes and cluster services, and applications—on any cloud. Red Hat OpenShift helps teams build with speed, agility, confidence, and choice. Code in production mode anywhere you choose to build. ...
    Starting Price: $50.00/month
  • 15
    SCYTHE

    SCYTHE

    SCYTHE

    SCYTHE is an adversary emulation platform for the enterprise and cybersecurity consulting market. The SCYTHE platform enables Red, Blue, and Purple teams to build and emulate real-world adversarial campaigns in a matter of minutes. SCYTHE allows organizations to continuously assess their risk posture and exposure. SCYTHE moves beyond just assessing vulnerabilities. It facilitates the evolution from Common Vulnerabilities and Exposures (CVE) to Tactics, Techniques, and Procedures (TTPs). ...
  • 16
    Altered Security

    Altered Security

    Altered Security

    ...Courses such as Certified Red Team Professional (CRTP), Certified Red Team Expert (CRTE), and AD CS Attacks cover topics including enumeration, privilege escalation, Kerberos, certificate-based attacks, lateral movement, hybrid Azure-PHF, and cloud persistence. Labs simulate enterprise networks with multiple domains and forests, guiding learners from non‑admin starts to enterprise admin compromise, and include exam attempts for industry-recognized certifications.
  • 17
    Ansible

    Ansible

    Red Hat

    ...Ansible Automation Platform has grown over the past years to provide powerful automation solutions that work for operators, administrators and IT decision makers across a variety of technology domains. It’s a leading enterprise automation solution from Red Hat®, a thriving open source community, and the de facto standard technology of IT automation. Scale automation, manage complex deployments, and speed productivity with an enterprise automation platform that can be used across entire IT teams. Red Hat or partner consulting services help you advance your end-to-end automation journey for faster time to value.
    Starting Price: Free
  • 18
    CentOS

    CentOS

    CentOS

    CentOS Linux is a community-supported distribution derived from sources freely provided to the public on Red Hat or CentOS git for Red Hat Enterprise Linux (RHEL). As such, CentOS Linux aims to be functionally compatible with RHEL. The CentOS Project mainly changes packages to remove upstream vendor branding and artwork. CentOS Linux is no-cost and free to redistribute. Each CentOS version is maintained until the equivalent RHEL version goes out of general support.
  • 19
    Scientific Linux

    Scientific Linux

    Scientific Linux

    ...Our primary user base is within the High Energy and High Intensity Physics community. However, our users come from a wide variety of industries with various use cases all over the globe, and sometimes off of it! Scientific Linux is a rebuild of Red Hat Enterprise Linux (property of Red Hat Inc NYSE:RHT). We informally call them “The Upstream Vendor” or “TUV”. Our references to TUV are intended to make it clear that Scientific Linux is in no way affiliated, supported, or sanctioned by upstream. By not using their name we hope to make this distinction as clear as possible. Provides a stable, scalable, and extensible operating system for scientific computing. ...
  • 20
    Restaurant POS

    Restaurant POS

    Red River POS

    Our POS forum is easy to scale, simple, fast to use, and constantly updated to keep you up to date with the latest software. You will be able to control your menus and access important business reports from anywhere at any time. As you consider the skills your appropriate POS. Our POS forum is easily scalable, simple, fast to use, and constantly updated to keep you up to date with the latest software. You will be able to control your menus and access important business reports anywhere at...
    Starting Price: $2000 one-time payment
  • 21
    JBoss EAP

    JBoss EAP

    Red Hat

    Red Hat® JBoss® Enterprise Application Platform (JBoss EAP) delivers enterprise-grade security, performance, and scalability in any environment. Whether on-premise; virtual; or in private, public, or hybrid clouds, JBoss EAP can help you deliver apps faster, everywhere. JBoss EAP 7 is built to provide simplified deployment and full Jakarta EE performance for applications in any environment.
    Starting Price: $8000
  • 22
    FOUR.me

    FOUR.me

    FOUR.me

    FOUR.me enables you to make any web address (business, social media, JustGiving page etc) represented by a memorable, colourful four letter word. At FOUR.me, you use just 4 characters and each letter is either red, green, blue or yellow. There is no .com, or .me after it. It’s only just 4 characters! Buy a FOUR, decide what web page you want it to and then you just need to display your FOUR instead of a long, unmemorable URL to drive traffic to your web page. Other people can then see it and type it in at FOUR.me using our system to change the color of the text so you can have red, blue, green or yellow characters. ...
    Starting Price: £19.99
  • 23
    Argus

    Argus

    Argus

    ...It will monitor nearly anything you ask it to monitor (TCP + UDP applications, IP connectivity, SNMP OIDS, Programs, Databases, etc). It presents a nice clean, easy to view web interface that will keep both the managers happy (Red Bad. Green Good.) and the techs happy ("Ah! that's what the problem is"). It can send alerts numerous ways (such as via pager) and can automatically escalate if someone falls asleep.
  • 24
    OpenLLaMA

    OpenLLaMA

    OpenLLaMA

    OpenLLaMA is a permissively licensed open source reproduction of Meta AI’s LLaMA 7B trained on the RedPajama dataset. Our model weights can serve as the drop in replacement of LLaMA 7B in existing implementations. We also provide a smaller 3B variant of LLaMA model.
    Starting Price: Free
  • 25
    KVM

    KVM

    Red Hat

    KVM (for Kernel-based Virtual Machine) is a full virtualization solution for Linux on x86 hardware containing virtualization extensions (Intel VT or AMD-V). It consists of a loadable kernel module, kvm.ko, that provides the core virtualization infrastructure and a processor specific module, kvm-intel.ko or kvm-amd.ko. Using KVM, one can run multiple virtual machines running unmodified Linux or Windows images. Each virtual machine has private virtualized hardware: a network card, disk,...
  • 26
    Pulse

    Pulse

    ALLPS

    ...Features: Employees onboarding Time Tracking / Time sheets are generated after Manager Approval Supports multiple time zones Leave Management Technical Features API driven architecture / Can be easily integrated with SAP or Enterprise systems Highly Secured / Field level database encryption Deployable On premise or in the Cloud Single tenancy database system for enhanced isolation and privacy Container driven deployment / AWS, GCP, Azure, RedHat or Kubernetes
    Starting Price: $2/month/user
  • 27
    Prelude

    Prelude

    Prelude

    Organizations of all sizes can use our tools to run continuous security tests against their systems to discover areas of weakness to fix. We do this in a way that's safe, transparent, and integrated with existing defensive tools to allow organizations to get ahead of real incidents, before they happen. Organizations of all sizes use Prelude to continuously test their defensive systems. For enterprises with security teams, Operator Enterprise offers continuous testing infrastructure, team...
    Starting Price: $50 per month
  • 28
    Dog Breeder Pro

    Dog Breeder Pro

    Dog Breeder Pro

    ...Create fully customizable pedigrees with your own color scheme and logo. Choose which data to show, whether to include photos and the number of generations. Show champions in red, and highlight duplicates. Record vaccinations and dewormings, medical conditions, and vet visits. Record heats, matings, pregnancy information, and litter. Automatically calculate upcoming heats, and expected litter dates. Build unlimited pedigrees. Automatically calculates Wright's Coefficient of Inbreeding (COI) and AVK (5 and 10 generation). ...
    Starting Price: $4.99 per month
  • 29
    Synology Virtual Machine Manager
    Virtual Machine Manager opens up abundant possibilities. You can set up and run various virtual machines, including Windows, Linux (Ubuntu, Red Hat, CentOS, Fedora, Debian, Oracle) or Virtual DSM all on one Synology NAS. You can also test a new software version in a sandbox environment, isolate your customers' machines or increase the flexibility of your server. Synology VMM lets you build a cost-effective and easily managed virtualization environment by combining computing, storage and networking resources on a single hardware platform. ...
  • 30
    Cyberwatch

    Cyberwatch

    Cyberwatch

    ...Cyberwatch lets you make the right decisions using dashboards and simple actions (comment, exclude...). Cyberwatch natively embeds a Patch Management module, compatible with your infrastructure (WSUS / RedHat Satellite...). Define your compliance rules and control your information system. Cyberwatch helps you to get a complete and contextualized list of assets and technologies in your Information System. Cyberwatch allows you to define your objectives thanks to an encyclopedia of rules with pre-sets.
  • Previous
  • You're on page 1
  • 2
  • Next