Software Alternatives & Reviews

Can someone help me understand this?

Wazuh SecurityOnion Pi-hole
  1. 1
    Open Source Host and Endpoint Security
    Pricing:
    • Open Source
    Active measures may include an intrusion detection system / intrusion prevention systems (IDS/IPS) such as open-source Suricata on the firewall, and installing file system integrity monitoring, such as the open-source Wazuh on the exposed server. These are combined in one open-source solution, Security Onion.

    #Security & Privacy #Security Information And Event Management (SIEM) #Cyber Security 49 social mentions

  2. Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management.
    Active measures may include an intrusion detection system / intrusion prevention systems (IDS/IPS) such as open-source Suricata on the firewall, and installing file system integrity monitoring, such as the open-source Wazuh on the exposed server. These are combined in one open-source solution, Security Onion.

    #Security & Privacy #Monitoring Tools #Security Information And Event Management (SIEM) 23 social mentions

  3. Pi-hole is a multi-platform, network-wide ad blocker.
    Pricing:
    • Open Source
    VPN subnet: I configured a "client" to my VPN service provider directly on pfSense. This creates a network gateway that is the entrance to an encrypted tunnel from my firewall/router to the VPN service provider. The traffic in this tunnel is encrypted from my private network to the VPN provider, and only then exits to the Internet. The VPN subnet in pfSense firewall rules is restricted to use only this network gateway. As a result, all systems connected to (with an IP address on) the VPN subnet exit the local network only through a VPN gateway without any further configuration. There also is a local DNS server, Pi-hole on this subnet. Traffic on the VPN subnet together as defined in firewall rules is isolated from other subnets.

    #Security & Privacy #Ad Blockers #Threat Detection And Prevention 1185 social mentions

Discuss: Can someone help me understand this?

Log in or Post with