Based on our record, OPNsense should be more popular than Wazuh. It has been mentiond 94 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
I use Wazuh instead. Greenbone CE is severely limited and requires payment for anything beyond the very basic. Super simple installation more features. Source: 5 months ago
Monitoring & Active Measures - Exporting firewall events to an external time-series database like I describe above is good to see who is touching your firewall or accessing your web site. Using an Intrusion Detection System / Intrusion Prevention System (IDS/IPS) such as open-source Suricata, which is a free package on pfSense, and deploying file system integrity monitoring, such as the open-source Wazuh on the... Source: 6 months ago
Wazuh: An open source security monitoring platform that integrates with popular tools like Elasticsearch and Kibana to provide comprehensive security event analysis and response capabilities. - Source: dev.to / 12 months ago
On another note, as mentioned in my response to the question of this post, we are working on a complete rework of the Vulnerability Detection engine. This rework will provide a sanitized CVEs feed from wazuh.com and a completely new scanner engine. It will also include a new UI for global queries. Source: 12 months ago
Nessus essentials (https://www.tenable.com/products/nessus/nessus-essentials) might do the trick. It can help to check what kind of services you are running are vulnerable to exploits. Also, the general recommendation here would be not to use default ports for all the services you are exposing. Also, you can check something like Wazuh - https://wazuh.com/. Source: 12 months ago
Firmware's like Asuswrt-Merlin or OpenWRT can support dynamic-dns, or you can do like I do and run something like OPNsense in an x86 VM with a NIC passed through, or buy an inexpensive firewall appliance (up to 500mbps/1gbps/10gbps). Source: 5 months ago
The easiest solution is to buy your own router, set it up, disable the router functionality on the Fritzbox 7590 and plug your router into it. It'll be cheaper and easier than a Cisco Firewall, but if you want to go the dedicated firewall route then I would recommenced OPNsense. Source: 5 months ago
BSDs may not have a significant presence on desktops, but they're well known in the networking world for their reliability. They also were the foundation used to build OSes for specific applications. OpnSense and XigmaNAS, for example, are two excellent FreeBSD based applications aimed at firewalling/security and NAS/services. https://opnsense.org/ https://xigmanas.com/xnaswp/. - Source: Hacker News / 10 months ago
For switches? OpenWrt supports a few models toward the lower end, and SONiC support a bunch at the higher-end datacenter ToR market, but none of these options are SME production-ready like Linux servers or OPNsense firewalls. Source: 11 months ago
That’s a stupid policy, and it looks like one of my UDMs is defective. I’m an idiot for not just buying good quality open boxes and putting https://opnsense.org/ on them. 🤦🏻♂️. Source: 11 months ago
Zabbix - Track, record, alert and visualize performance and availability of IT resources
pfSense - pfSense is a free and open source firewall and router that also features unified threat management, load balancing, multi WAN, and more
Fortinet FortiAnalyzer - Fortinet FortiAnalyzer is a powerful product for Security Fabric Analytics and Automation.
MikroTik RouterOS - The main product of MikroTik is a Linux-based operating system known as MikroTik RouterOS.
Beats - Beats is the platform for single-purpose data shippers that is installed as lightweight agents and send data to machines to Logstash or Elasticsearch.
OpenWrt - OpenWrt is an open-source firmware based on Linux for wireless routers