The Center for Education and Research in Information Assurance and Security, or CERIAS, is the world's foremost University center for multidisciplinary research and education in areas of information security. Our areas of research include computer, network, and communications security as well as information assurance.

This site's design is only visible in a graphical browser that supports web standards, but its content is accessible to any browser or Internet device. (Why?)

Center for Education and Research in Information Assurance and Security

COAST Security Archive Logo Category Index: /pub/doc/commercials

No Pointing!

This WWW page was generated automatically. Link makers should not point their links to this page. If you must, please make a link to the search entry point.

SEAL Consulting Services, Screening External Access Link(SEAL) Introductory Guide
Abstract: Introduction guide to SEAL.SEAL is short for Screening External Access Link, it is a system of computer hardware and software configured to provide a highly serviceable link between a private network and an internet another network that is not necessarily trusted. The SEAL consists of three systems, known as gatekeeper, gate and mailgate.

Roger E. Masse, An Internet Firewall
Abstract: The slide files about Internet, shown a world-wide network of machines that speak TCP/IP, the Internet mail, source of machines, routing policy, SEAL, authentication and logging, etc.

SEAL Consulting Services, Information Technology Consulting Services
Abstract: Service description of SEAL, topics including SEAL orientation, network routing implementation, name-server implementation, system logging, packet screen software implementation, etc.

Raptor Systems Inc, Eagle Network Security Management System
Abstract: TheEagle Network Security Management Systemtmis a suite of software prod- ucts that resides between your local-area-network (LAN) and another network. Theother network can be the outside world (i.e., the Internet) or another of your own LAN's, local or remote. TheEagleis designed to isolate one network from another, allowing only those connections and services that are permitted. TheEaglecan detect suspicious activity (as you define it) and alert you through a fax, pager, electronic mail or audible alarm. TheEaglet Subnet Partitionertmis designed to work with theEagleto compartmen- talize important intranet workgroups or sub-LANS, offering them the same protection that Eagle provides.

Unknown, Enigma Logic
Abstract: This directory contains full-motion video tutorials promoting Enigma Logic products. These can be viewed on any IBM PC that is equipped with VGA (Some require 500K of free RAM or thereabouts).


O Built by Mark Crosbie and Ivan Krsul.

Security Archive Page Security Archive Homepage.

COAST Homepage COAST Project (CERIAS)Page.

Purdue CS Homepage Purdue CS Dept page. (COAST Security Archive)