1 | 2 | 3

Documents download

The documents and information listed here should be used to infrom, educate and assist in the decision making about a solution and technologies. You may use them to your benefit in choosing the right solution for your organisation. The documents type would be as follow:

Utility download
The utilities you may use to help you manage better your solution or infrastructure. They are made available here for an eassy access. For any help with them, please contact the author. The type of utilities available are:

Partners Download Sites.

Tools and PDF download

The tools and pdf made available on this download page are copyrighted to their respective owners and organisation.

The Nessus® vulnerability scanner is the world-leader in active scanners, featuring high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture.
This lightweight network intrusion detection and prevention system excels at traffic analysis and packet logging on IP networks.
Paros Proxy
A Java based web proxy for assessing web application vulnerability. It supports editing/viewing HTTP/HTTPS messages on-the-fly to change items such as cookies and form fields.
TrueCrypt is an excellent open source disk encryption system. Users can encrypt entire filesystems, which are then on-the-fly encrypted/decrypted as needed without user intervention beyond entering their passphrase intially.
DGard Software Compliance Manager
DGard Software Compliance Manager is the fast and affordable solution to managing software licensing. Protect yourself from software audit issues by knowing exactly where each software product is located.
PCI DSS Requirements version 1.2 Audit Checklist
Establish firewall and router configuration standards
ISO 27001 Internet Banking Security Policy
Download Free Internet Banking Security Policy Templates
FFIEC GUIDANCE Authentication in an Internet Banking Environment
The Federal Financial Institutions Examination Council (FFIEC) has issued the attached guidance, “Authentication in an Internet Banking Environment.”
Vulnerability Assessment Survey
This list is to assist you in identifying weakness within your infrastructure that could be exploited by anybody.
Secure Remote Access Checklist
Determine if the organization authorizes, monitors, and controls remote access to the information system for all allowed methods of remote access to include both establishment of the remote connection and subsequent user actions across that connection.
IT Risk Assessment checklist
Characterize and itemize the system, including hardware (server, router, switch), software (e.g., application, operating system, protocol), system interfaces (e.g., communication link), data, and users to evaluate their vulnerabilty in light of potential security threats.