CERIAS Hotlist
Page Content
- @stake, Inc.
@stake has assembled the best minds in digital security to help you understand and mitigate the security risks inherent in your business model, so that you can maximize the opportunity in front of you.
http://www.atstake.com - Added Nov 26, 2001
- A Network Router Security Resource Directory
A directory of web sites providing free information as well as commercial products and services related to Network Router Security and related topics.
http://www.routers-net.com/network_router_security/1.htm - Added Dec 11, 2005
- Able Encryption Software
AES family of data protection programs combines the latest encryption technology with exceptional ease-of-use for both the end-user and the corporate enterprise. The AES data encryption ensures an unprecedented protection against unauthorized data access. The AES programs are easy to install, easy to use and are totally transparent for application programs. The additional special protection completely excludes an opportunity of selection of the password to the encrypted information at use of the generator of the passwords and keys. Comprehensive privacy tools include the compressor, file/folder encryption, e-mail encryption, file/folder shredder. The programs are compact, efficient and user friendly. Required cryptographic procedures are enforced in the convenient graphical user interface.
http://www.abensoft.com - Added Oct 22, 2004
- Access Specialties, Inc
Access Specialties manufactures the finest line of integrated access control and security products
available today.
http://www.access-specialties.com/ - Added Dec 10, 1999
- ADDSecure.Net Inc.
http://www.addsecure.net/ - Added Dec 10, 1999
- Applied Watch
commercial ids
http://www.appliedwatch.com - Added Aug 31, 2003
- Argus Systems Group, Inc.
http://www.argus-systems.com/ - Added Dec 10, 1999
- Audit and e-Security Checklists for LAN/Network, Firewalls, etc
Audit and security review checklists for: firewalls, LAN/networks, internet... essentially for the e-commerce security infrastructure.
http://www.e-security-e-commerce-security.com - Added Nov 21, 2001
- Backbone Security.com
Backbone Security was created to help clients avoid potential losses from Internet security vulnerabilities, teach them more about information assurance and keep them safe from cyber threats.
http://www.backbonesecurity.com - Added Jun 20, 2001
- Baltimore Technologies
http://www.baltimore.ie/ - Added Dec 10, 1999
- Baseline Software
http://www.baselinesoft.com/ - Added Dec 10, 1999
- Bell Security
http://www.bellsec.com/ - Added Dec 10, 1999
- Beyond Security's SecuriTeam.com
SecuriTeam is a group within Beyond Security dedicated to bringing you the latest news and utilities in computer security.
Having experience as Security Specialists, Programmers and System Administrators we appreciate your need for a "Security
http://www.securiteam.com/ - Added Apr 03, 2001
- Big Brother:A Web-based Unix Network Monitoring and Notification System
Big Brother monitors System and Network-delivered services for availability. Your current network status is displayed on a color-coded web page in near-real time. When problems are detected, you're immediately notified by e-mail, pager, or text
http://bb4.com/ - Added Dec 10, 1999
- BitDefender (AVX- Antivirus eXpert) Global Website- Your Security Center
Complete security solutions to protect your network and desktop computer from latest viruses or security loopholes. Free removal Tools for latest viruses, Free ONLINE scan, non-stop LIVE Chat Online. First Response Team in the world to stop
Badtrans
http://www.bitdefender.com - Added May 13, 2002
- Bitform Technology Inc.
Bitform focuses on the field of document security, providing tools that discover and remove potentially sensitive metadata and hidden information from common office file formats. Bitform Discover tool is available free.
http://www.bitform.net - Added Feb 18, 2005
- Blockade Systems Corp.
http://www.blockade.com/ - Added Dec 10, 1999
- Breach Security Inc.
Breach is aleading provider of Deployable Application
Security solutions that protect corporate and commercial applications, databases and the web-presentation layer from attack by automated and human intruders.
http://www.breach.com - Added Jan 03, 2005
- BugNet
Provides Alerts, Databases, and Analysises.
http://bugnet.com/ - Added Dec 10, 1999
- C&A: PKI - digital signature - encryption solutions
C & A is an European company with headquarters in Milan -Italy, specialized in X.509 certification, multiplatform encryption, digital signature, time stamping and PKI technologies.
http://www.com-and.com - Added Jun 07, 2002
- Callio Technologies
Makers of Callio Secura 17799 and Toolkit 7799: BS7799 and ISO 17799 standard for computer security management.
http://www.callio.com - Added Jul 30, 2004
- Callio Technologies ISO 17799/BS7799
Makers of Callio Secura ISO17799 and Toolkit BS7799: BS 7799 and ISO 17799 standard for computer security management.
http://www.callio.com - Added Jan 29, 2005
- Centre for Applied Internet Research
The Centre for Applied Internet Research (CAIR) pages at University of Wales, NEWI, Wrexham. These pages provide information for current and potential academic and industrial partners as well as staff who are research active within the group, or who may be interested in following research initiatives.
http://www.newi.ac.uk/computing/cair - Added Sep 25, 2004
- Checkpoint
Checkpoint
http://www.checkpoint.com - Added Feb 05, 2003
- Cigital, Inc.
Cigital helps commercial and government clients assure software quality and improve software development processes. Our Software Quality Management (SQM) solutions drive down the cost of deploying quality software and ensuring software reliability, security and performance. Cigital\'s expert consultants measure software quality by combining proprietary methodologies, tools and knowledge to perform full-lifecycle testing via a risk management framework. These metrics are used to drive application readiness decisions and identify the most cost-effective areas for software process improvement. Founded in 1992, Cigital (www.cigital.com) is headquartered in Northern Virginia with additional offices in Boston.
http://www.cigital.com - Added Feb 27, 2004
- Compuer Misuse Detction System
Intrusion.com develops, markets and supports a suite of information security software and security appliances.
http://www.cmds.net/ - Added Dec 10, 1999
- Computer Security Cables & Enclosures
Tryten offers a full range of computer security cables and enclosures for your PC, Notebook, Digital Projector or Mac Product.
http://www.tryten.com - Added Jan 22, 2003
- Computer Security Products, Inc
http://www.ComputerSecurity.com/ - Added Dec 10, 1999
- Computer Security Superstore
http://www.computer-security.com/ - Added Dec 10, 1999
- Content Security
http://www.content-security.com/ - Added Dec 10, 1999
- Counterpage Systems, Computer Security and Cryptography Consulting
Provides a full range of dynamic Managed Security Monitoring services taht enable safe e-business.
http://www.counterpane.com/ - Added Dec 10, 1999
- CXL - Security review software for Unix, VMS and AS400
CXL produce AZScan - a PC based, integrated tool to review a wide variety of mid-range systems running most versions of Unix, OpenVMS and OS400.
http://www.cxlsecure.com - Added Nov 09, 2004
- Cybertrace
Our three main areas of strength are network design and implementation, administration and security, and corporate Web and database design and management. Our expertise ranges from the hardware of telephony, bridges, routers, and various computers th
http://www.cybertrace.com/ - Added Dec 10, 1999
- Datalynx Inc.
http://www.dlxguard.com/ - Added Dec 10, 1999
- Directory of Information Security White Papers
Organized and Categorized directory of InfoSec White Papers, no registration or account creation needed.
http://www.securestandard.com/ - Added Dec 31, 2003
- e4gle security development
e4gle concentrates on ELF format, Linux Kernel Hacking, Linux dynamic chain technology, Linux LKM Technology, Linux virus, and stack overflow, format string, heap overflow etc. All attack technology of insecure programming.
http://e4gle.org - Added Feb 04, 2002
- Elite IT Security
Elite IT Security provide free penetration testing of over 2,300 vulnerabilitys to home users with downloads and security related articles. They also have corporate solutions
http://www.elite-it-security.com - Added Oct 28, 2004
- Email Filtering &Spam Blocking Service
Latest tiered anti-virus protection features and proprietary processing rules on our mail servers, youll be assured of virus & spam free e-mails. Over 5,000 e-mail users processed & filtered, over 20,000 e-mails daily on our mail servers.
http://www.mailshield.com.au - Added Jul 19, 2006
- En Garde Systems
http://www.engarde.com/ - Added Dec 10, 1999
- Enterprise Security Management Systems
4FrontSecurity provides details on the 4FrontSecurity Enterprise Information Security Management System (IMS) and other solutions.
http://www.4frontsecurity.com - Added Jan 14, 2003
- Eracom Technologies
Eracom Technologies is a leading developer and global supplier of no-compromise cryptography-based IT security products ensuring Transaction Security and Privacy of Information.
http://www.eracom-tech.com - Added May 19, 2004
- eSafe Technologies
http://www.ealaddin.com/esafe/default.asp - Added Dec 10, 1999
- eSecurity
eSecurity
http://www.esecurityinc.com - Added Feb 05, 2003
- ESTec Systems Corporation
http://www.estec.com/ - Added Dec 10, 1999
- Eutron Computer Security Solutions
Eutron è una delle più importanti aziende europee nella messa a punto di soluzioni di
e-technology, la sinergia cioè tra le tecnologie elettroniche digitali e le tecnologie Internet.
http://www.eutron.it/e-tech/index.htm - Added Dec 10, 1999
- Finjan Safe Surfing, The Java Security Software Provider
First-Strike SecurityTM
A "first strike" is the first time a new
malicious code attack is launched.
http://www.finjan.com/ - Added Dec 10, 1999
- FireMon by Secure Passage
FireMon, is an Enterprise Security Management application that provides visibility to and control of network changes, configurations, and performance. Designed as a security tool, FireMon monitors configurations, evaluates configuration effectiveness, and alerts administrators to changes in configurations. FireMon controls devices by implementing intelligent device information processing and combining it with input from technical experts and customer requirements.
http://www.securepassage.com - Added Jun 19, 2006
- FirmNetworks - Computer Security - Network Security
FirmNetworks specialises in Penetration Testing and Firewall Monitoring. A fully managed security solution for all your Network Secruity needs.
http://www.FirmNetworks.com - Added Jun 16, 2004
- Fortified Networks
Fortified Networks Inc. is the leader in Information Security Consulting and we're blazing a trail for others to follow.
http://www.fortified.com/ - Added Dec 10, 1999
- FusionVM Enterprise Vulnerability Management System
FusionVM from Critical Watch automates the process of proactively managing network vulnerabilities and exposures. It enables a unified corporate process that is enterprise-wide, repeatable and measurable.
http://www.criticalwatch.com - Added May 04, 2005
- Gamma Secure Systems Limited
http://www.gammassl.co.uk/ - Added Dec 10, 1999
- GemiScorp Software Solutions
Provides innovative and quality software solutions for home and corporate users demanding reliable, user friendly and well-supported security and productivity products. Home of award-winning programs like SafeLogon, SafeSystem, SafeCryptor and LaunchIt NOW! Plus.
http://www.gemiscorp.com - Added Jun 05, 2003
- GenuineDoc
GenuineDoc enables you to digitally sign and timestamp your online documents, such as press releases, reports, terms, etc, and assure your customers that these documents are genuine, i.e. that they were indeed authored by you, existed on a specified date, and were not altered since.
http://www.genuinedoc.com - Added Mar 22, 2003
- GFI Security & Messaging Software
GFI is a leading developer of content security, network security and messaging software. Its product range includes GFI MailSecurity email content/exploit checking and anti-virus software; GFI MailEssentials server-based anti-spam software; GFI MailArchiver email archiving solution; GFI FAXmaker fax server software; GFI Network Server Monitor that alerts about and corrects network and server issues; GFI LANguard Network Security Scanner (N.S.S.) that performs network security auditing and patch management; GFI LANguard Security Event Log Monitor (S.E.L.M.) for network-wide event log monitoring and management; and GFI LANguard Portable Storage Control (P.S.C.) for network-wide control of removable media.
http://www.gfi.com/ - Added Apr 08, 2005
- Gilian Technologies
Gilian Technologies, a global leader in Web content security, protects organizations against the devastating effects of Web site vandalism and sabotage.
http://www.gilian.com/ - Added Jan 04, 2002
- Gradient Technologies Inc.
http://www.gradient.com/ - Added Dec 10, 1999
- Hackers Catalog
http://66.40.78.100/ - Added Dec 10, 1999
- Handy Password - secure password manager
Easy to use secure password manager which allows you to save login information and enter it with one click in your browser. Handy Password reliably stores your passwords in a file encrypted with 128-bit encryption algorithm.
http://www.handypassword.com - Added Jan 20, 2005
- Harrier Group PLC
Harrier have been providing Europe's leading organizations with comprehensive security and data management solutions for over a decade.
http://www.harrier.com/ - Added Apr 10, 2001
- HETRA Secure Solutions
http://www.hetrasecure.com/ - Added Dec 10, 1999
- Hideaway.Net
A comprehensive Internet security portal featuring the latest news, alerts, software, tutorials, and original content for computer security, virus
protection, and privacy online. Also offers free encrypted e-mail and
a commercial security analysis
http://www.hideaway.net/index.html - Added Jun 20, 2000
- IBM Security Homepage
http://www-3.ibm.com/security/index.shtml - Added Dec 10, 1999
- India Information Security Solutions,Services & Audit
Shreyan Infotech,an Indian IT Security company,offers a variety of Internet /Networking Security Consultancy, Services & Solutions including Security Auditing, BS7799 Audits,independent security research in application security assessment,Secure Content Management (SCM) solutions,Virtual Private Networking (VPN) Firewalls,Remote Access systems,encryption, authentication,and public key infrastructure Solutions & Services, Security Management Training
http://www.shreyan.com - Added Nov 01, 2004
- Infilsec Systems Security
http://www.infilsec.com/ - Added Dec 10, 1999
- InfoExpress, Inc.
InfoExpress is a leader in secure remote access and extranet solutions. InfoExpress develops and markets the FireWalker VPN Suite?, based on a remote user and extranet VPN with a personal firewall that enables organizations to provide safe access to
http://www.infoexpress.com/ - Added Mar 21, 2000
- Information Security Management Maturity Model
The Information Security Management Maturity Model (ISM3, or ISM-cubed) offers a practical and efficient approach for specifying, implementing and evaluating process-oriented information security management (ISM) systems.
ISM3 aims to:
* Enable the creation of ISM systems that are fully aligned with the business mission.
* Be applicable to any organization regardless of size, context and resources.
* Enable organisations to prioritize and optimize their investment in information security.
* Enable continuous improvement of ISM systems.
* Support the outsourcing of security processes.
ISM3 is compatible with the implementation and use of ITIL, ISO9001, Cobit and ISO27001. This compatibility protects the existing investment in ISM systems when they are enhanced using ISM3. ISM3 based ISM systems are themselves accreditable, giving organisations an objective means of measuring and advertising their progress with information security management.
The management discipline and internal control framework required by ISM3 assists compliance with corporate governance law.
http://www.ism3.com - Added Oct 06, 2006
- Insecure - Top 75 Security Tools
Expanded list of top 75 security tools.
http://www.insecure.org/tools.html - Added May 25, 2006
- Integralis Network Systems
http://www.integralis.com/ - Added Dec 10, 1999
- Internet Security Systems
ISS has focused on sophisticated Internet security solutions and has developed an entire portfolio of
software and services.
http://www.iss.net/ - Added Mar 29, 2000
- INTRINsec Computer Security
http://www.intrinsec.com/ - Added Dec 10, 1999
- IS Decisions
IS Decisions, founded in 2000 and based in Biarritz (France), is a software editor specializing in Security and Change Management solutions for Microsoft® Windows® infrastructures.
http://www.isdecisions.com - Added Feb 28, 2007
- ISAserver.org: ISA Server and Windows 2000 security resource site
ISAserver.org is your only resource for Microsoft's ISA Server, with news, downloads, articles, 3rd party products, tutorials, newsletters, FAQs, message boards and much more. Also has various FAQs and articles on Windows 2000 security.
http://www.isaserver.org - Added Aug 24, 2001
- ISO 17799 & ISO 27001 Security News
Established portal and resource directory dedicated to the ISO 17799 and ISO 27001 security standards.
http://www.computersecuritynow.com - Added Jun 24, 2006
- ISO 17799 and ISO 27000 Information Portal
Information and resources to support ISO 17799 and the ISO 27000 series of standards.
http://17799.denialinfo.com - Added Sep 07, 2005
- ISO 17799 Central
Information, background and resources for the ISO 17799 computer security policies.
http://www.17799central.com - Added Aug 10, 2004
- ISO 17799 Software Directory
Directory of software for ISO 17799 audit, ISO 17799 compliance, ISO 17799 implementation and security risk analysis
http://www.iso17799software.com/ - Added Dec 17, 2000
- ISO IEC 27001 Information Security in Plain English
ISO IEC 27001 is an information security management standard. Use our plain English resource to help you establish and certify your information security management system (ISMS).
http://www.praxiom.com/27001.htm - Added Apr 04, 2007
- Kaba Benzing - Access Control
Access Control and Security Solutions for the protection of enterprises with biometric- or badge-based identification - Access Control and more ...
http://www.kaba-benzing.com/EN/access-control.html - Added Sep 26, 2005
- Leithauser Research
Download software for access control, Internet usage control, and file protection
http://LeithauserResearch.com - Added Apr 22, 2003
- List of vendor security contacts
http://www.molbio.unmc.edu/~cprice/security/vendor_security_... - Added Dec 10, 1999
- LOCKDOWN 2000
A Trojan Virus Detection and Internet Security Software Program
http://lockdown2000.com/ - Added Dec 10, 1999
- Lurhq
LURHQ's Managed Security Services protect an organization's information assets by providing 24x7x365 monitoring and response to malicious activity, degraded performance, and application availability.
http://www.lurhq.com/ - Added Dec 10, 1999
- LV Sales Inc.
http://www.lvsales.com/ - Added Dec 10, 1999
- Meganet: Secure Information is Power
Maganet offers products to secure your documents and computer. Check out their powerful, transparent data security solution.
http://www.meganet.com/ - Added Dec 10, 1999
- Microcomputer Applications, Inc
http://www.keylok.com/ - Added Dec 10, 1999
- Mikko's Shareware
Mikko's Shareware started on the middle of 1998 and partnered with Register Now on August 1998 to enhance services to customers,
making ordering software much easier.
http://mikkoaj.hypermart.net/ - Added Jun 21, 2000
- Miora Systems Consulting, Inc.
http://www.miora.com/ - Added Dec 10, 1999
- Multi-Tech
Multi-Tech is a global manufacturer of ip telephony, voip, modems, Internet security appliances, remote access, and device networking products.
http://www.multitech.com - Added Nov 15, 2005
- My Web and Tech Team Inc. | Network Security Specialists
Specializing in Network Security, Onsite Network Administration, Online Data Backup, Web Development and promotion.
http://www.mywebandtechteam.com - Added May 31, 2004
- nCipher Corporation
The leading developer of high-performance hardware security products specifically designed for e-commerce and Public Key Infrastructure applications.
http://www.ncipher.com/ - Added Dec 10, 1999
- NelliCo
Strategy for Security Technology and Security Policy interdependence
http://pages.sbcglobal.net/nellico/ - Added Mar 05, 2002
- NelliCo
Strategy, Architecture for Security Technology and Security Policy balance
http://pages.sbcglobal.net/nellico/ - Added Mar 08, 2002
- Net-security-training
Net-security-training, offers courses in Internet security, network security and information security. The list of courses include certification (vendor neutral) courses such as CISSP, Penetration testing and ethical hacking, PKI, VPN, Firewalls to name a few.
http://Net-security-training.co.uk - Added Nov 08, 2004
- NetIntelligence
NetIntelligence is advanced end point security software designed to provide complete protection from the threats of internet and network connectivity.
http://www.netintelligence.com - Added Jun 07, 2004
- NetIQ
NetIQ
http://www.netiq.com - Added Feb 05, 2003
- netTracers
netTracers security auditing services provide the best combination of testing: standardized, automated testing augmented by hands-on evaluation, review, and reporting by experts, specifically knowledgeable in IT and network management.
http://www.netTracers.com/ - Added Feb 09, 2003
- Network Gateway Security, Visibility and Control
Network Composer for SMB allows you to easily detect spyware, filter internet content, implement bandwidth limit controls, monitor bandwidth, implement virus protection, block p2p, block im and log im, deliver true application shaping and more.
http://www.cymphonix.com/ - Added Aug 03, 2006
- Network System Security
netsyssec offers computer and network security assessment and analysis, as well as network design and forensic data services.
http://www.netsyssec.com - Added Mar 11, 2005
- Network World
Serves the needs of the Network Leaders with an integrated print, online and event product line. With each new product offered under the Network World brand, Network World has stayed true to its mission of empowering Network Leaders with knowledge
http://www.networkworld.com/ - Added Apr 10, 2001
- NFR Security Inc.
NFR Security provides a comprehensive, integrated intrusion detection system that protects networks and hosts from known/unknown attacks, misuse, abuse and anomalies.
http://www.nfr.com - Added May 04, 2002
- NoticeBored - information security awareness service
NoticeBored delivers creative multi-media materials for use in information security awareness campaigns. New materials are provided every month for end users, general managers and information security managers. NoticeBored campaigns are guaranteed effective.
http://www.noticebored.com/ - Added Jun 02, 2003
- NoticeBored security awareness service
Delivers fresh awareness materials covering a different information security topic each month. Free newsletter and white papers.
http://www.noticebored.com/?ref=CERIAS - Added Mar 11, 2004
- Nsauditor Network Security Auditor
Nsauditor is a network security audit system designed to audit network and detect available security vulnerabilities in the network. It also provides a set of tools performing a real-time traffic and protocol analysis, showing detailed listings of all TCP and UDP endpoints on your system, including the owning process name, loaded modules, kernel objects, memory details, remote address and state of TCP connections, host dns name, country where from, network class type, service associated with connection, possible trojans associated with port and service description for monitoring. The Auditor module of Nsauditor can audit network and automatically detect security vulnerabilities, it can also identify possible security holes in your network, detect potential Trojans installed on users\' workstations as well as make a variety of attack probes, such as stealth port scans, CGI attacks, SMB probes. The NetBios Auditor module is discovering network information, including NetBIOS Names, LANA, Shares, Security Policy and Information, Groups/Users. Tcp / Udp scanner is a tool which scans using all TCP header flags ( syn, fin, ack, null, xmas, bogus ). It also allows protocol scanning and remote OS fingerprint creation.Over 35 network tools in one program.
http://www.nsauditor.com/ - Added Dec 28, 2004
- Okiok Data
http://www.okiok.com/ - Added Dec 10, 1999
- Onlice Security Policies - Free Access
These are a comprehensive and quality set of information security policies, with full navigation and substantial supporting information.
http://www.yourwindow.to/security-policies/ - Added Feb 26, 2002
- Open Source Security Standards
A suite of free to use open information security standards published by Little cat Z Ltd under a liberal open source license. Participation is invited from all interested parties and it is our aim to deliver all the professional security standards anyone could want, free of charge with open document source.
http://www.littlecatZ.com/standards/ - Added May 02, 2003
- OrangeSec Solutions
OrangeSec Solutions offers defense agencies and the private sector a reliable, high quality alternative to in-house resources for IT security assessments, vulnerability assessments, policy development, system security components, secure network design and implementation, and information technology security awareness training. A true alternative to in-house resources, OrangeSec Solutions offers a very high level of practical experience and know-how. OrangeSec Solutions serves two kinds of national markets; providing defense and non defense clients with viable solutions to Office of Management and Budget (OMB) and Executive Directives geared to improving the nation’s IT security posture, and providing corporate clients with expert advice and solutions for securing the IT resources that affect their bottom line.
http://www.orangesec.com - Added Oct 20, 2004
- Paradox Security Systems
http://paradox.ca/ - Added Dec 10, 1999
- passlogix
Passlogix develops software products and services that facilitate and secure e-business by managing the private and reliable exchange of structured information.
http://www.passlogix.com - Added Feb 19, 2002
- Password Crackers, Inc.
Forget your password? Need access to password protected files or systems? Former employees leave
without un-protecting their files? Passwords destroyed? Are you worried that your network or your
encrypted files may not be secure? We can help!
http://www.pwcrack.com/ - Added Jun 08, 2000
- Password Portal
Have you lost or forgotten a password? Do you need help recovering a password? Here you will find
links to Commercial Password Recovery resources.
http://www.passwordportal.net/ - Added Jun 08, 2000
- Passwords recovering, encrypting and Windows security
Here is three security related programs:
1. SAMInside - the fastest program for recovering forgotten users passwords from SAM-files of Windows\'NT/2000/XP, including files, encrypted by Syskey utility.
2. PWLInside - the fastest program for recovering forgotten passwords to PWL-files of Windows\'3.11/95/OSR2/98/ME. Also the program extracts from PWL-files the list of resources with passwords to them.
3. PCResView - the program for retrieving useful information about remote computer in the net, related with his security.
http://www.insidepro.com - Added Mar 30, 2003
- PC Guardian
PC Guardian is your computer security specialist. We've been building award-winning computer anti-theft devices and data encryption software since 1984.
http://www.pcguardian.com/index.html?39d9dfa5c0e72 - Added Dec 10, 1999
- Pointsec Mobile Technologies, Inc.
Pointsec protects more operating systems for PCs, laptops, smart phones and portable storage devices with easy to use encryption solutions.
http://www.pointsec.com - Added Nov 13, 2006
- Portscan your System using Web NMAP
Online portscan utilizing NMAP. Has a quick scan and also a full scan of all ports!
http://www.hagel-it.de/portscan/ - Added May 01, 2006
- Practical Threat Analysis for Securing Software Systems.
PTA is a calculative threat modeling tool by PTA Technologies that assists computer security analysts and software developers in assessing the risks in their systems and building the most cost-effective risk mitigation plan. PTA is free of charge for students, researchers and independent software developers - you are invited to download a free version of the software.
http://www.ptatechnologies.com - Added Jan 19, 2005
- Pretty Good Privacy, Inc.
PGP Security includes
several of the industries most well-known security brands,
including Gauntlet Firewall, PGP Data Security, CyberCop
Scanner and Monitor
http://www.pgp.com/ - Added Dec 10, 1999
- Prime Factors, Inc
http://www.primefactors.com/ - Added Dec 10, 1999
- Protexx
Three Mouse Clicks and Three Minutes That is all it takes to get industrial strength security protection from Protexx. Want to know why both Intel and HP offer the Protexx suite of security products?
http://www.protexx.com/ - Added Sep 21, 2006
- Public-Key Cryptography Standards
The Public-Key Cryptography Standards are specifications produced
by RSA Laboratories in cooperation with secure systems developers
worldwide for the purpose of accelerating the deployment of
http://www.rsasecurity.com/rsalabs/pkcs/ - Added Dec 10, 1999
- RSA Security: enterprise data privacy, identity and access management
RSA Security helps to deliver business value by transforming e-security into an enabler of e-business through secure information access and exchange. Solutions include identity management, access management, secure mobile, remote, and enterprise access, and secure transactions. Many free white papers are available.
http://www.rsasecurity.com/ - Added Nov 24, 2004
- RSA's Security Homepage
RSA Security's homepage. Links to security articles and product.
http://www.rsasecurity.com/ - Added Dec 10, 1999
- RST Reliability Hotlist
Software Assurance Hotlist
http://www.cigitallabs.com/resources/hotlist/ - Added Dec 10, 1999
- RVASI - Ethical Hacking Solutions
RVASI provides expert network, system, and Web application vulnerability assessment services/solutions to organizations around the globe. We specialize in performing comprehensive Web application penetration testing and vulnerability scanning.
http://www.rvasi.com - Added Aug 20, 2005
- Safemark Computer Security & Physical Defence
Safemark are UK based designers and manufacturers of physical security solutions to protect computer equipment and data from the threats of theft, sabotage, espionage, unauthorised access or misuse.
http://www.safemark.co.uk - Added Aug 07, 2001
- SafeNet, Inc.
SafeNet provides complete security using encryption technology to protect communications, intellectual property and digital identities. We also offer other products including hardware, software, and chips.
http://www.safenet-inc.com - Added Nov 13, 2006
- SAFLINK Corporation
SAFLINK is a "middleware" software provider that brings the power of biometric technology to the world's most popular network infrastructures.
http://www.saflink.com/ - Added Dec 10, 1999
- Sandstorm Enterprises
http://www.sandstorm.net/ - Added Dec 10, 1999
- SecureNet PRO IDS
http://www.MimeStar.com/products/index.html - Added Dec 10, 1999
- Securify
Securify provides comprehensive services for conducting business and transactions over private intranets, extranets and the internet.
http://www.securify.com/ - Added Aug 02, 2000
- Security Activities @ San Diego Supercomputer Center & NPACI
Happenings with security at SDSC and NPACI.
http://security.sdsc.edu/activities/ - Added Jan 11, 2001
- Security Clipper
Free searchable archives of Internet security eZines and mailing lists. Set up free, personalized search agents to proactively search all new messages for just those topics or products in which you are specifically interested.
http://www.securityclipper.com - Added Feb 07, 2003
- Security Information Systems, Inc.
http://www.securitysoftware.com/ - Added Dec 10, 1999
- Security Intelligence Services
Managed security services for large and medium sized E-commerce deployment
http://www.semperfiglobal.com - Added Jun 01, 2001
- security links
Welcome to sunWHERE
An index to online resources of interest to SPARC and Solaris users
http://security.dstc.edu.au/links/ - Added Dec 10, 1999
- Security Research at IBM Watson
http://www.research.ibm.com/security/ - Added Dec 10, 1999
- Security Services Center
http://www.ssconline.com/ - Added Dec 10, 1999
- Security-Online
http://www.Security-Online.com/ - Added Dec 10, 1999
- SecurNet Consulting
The Premier Internet Security Auditing Firm Providing Your Organization with Internet Security
Audits, Threat Assessment, Counteroffensive Security Planning and Site Security Certifications.
http://www.securnet.com/ - Added Dec 10, 1999
- SGI: The Information Vault
The purpose of
these pages is to provide an information resource on
computer security for the SGI computing environment
http://www.sgi.com/support/security/index.html - Added Dec 10, 1999
- SiegeSoft
Protect your online privacy with Siegesoft's suite of products. Great way to keep your personal business personal.
http://www.siegesoft.com/ - Added Aug 11, 2000
- Smart Card and Biometric security solutions
We carry smart card and biometric security development kits to help you secure your PC and your applications. We also carry a smart card logon kit to secure your PC.
http://www.Didya.com - Added Mar 11, 2003
- Smesecure.com
Practical Web Security advice for SMEs
http://www.smesecure.com - Added Mar 20, 2006
- Software Piracy Solutions & Antipiracy Software
Antipiracy World: Where to find Software Piracy Solutions & Anti-Piracy Software.
http://www.antipiracyworld.com/ - Added Jan 27, 2001
- SQL and Encryption Resources and Links
Automatic database encryption and column encryption APIs for SQL Server and MSDE.
http://www.netlib.com/resources.htm - Added May 16, 2003
- Sunbelt Software - STAT
STAT does a thorough checkup of all the critical and vulnerable points in your network, and warns you
about the weak links in the chain.
http://www.sunbelt-software.com/product.cfm?id=899 - Added May 08, 2000
- Sunrise Promotions
http://www.heureka.clara.net/sunrise/ - Added Dec 10, 1999
- Syhunt - Web Application Security and Network Security
Syhunt helps organizations to conduct vulnerability assessments and implement appropriate security measures to protect web applications and the web\'s infrastructure
http://www.syhunt.com - Added May 14, 2004
- Symantec Security Response Center
Symantec's Security Response website.
http://securityresponse.symantec.com/ - Added Apr 01, 2005
- Systematrix Pte Ltd
Online security and privacy software; encrypted web surfing, secure e-mail, SSH
http://www.systematrix.net AND http://www.cryptotunnel.com - Added Apr 07, 2003
- TECHNALOCK Computer Security
TECHNALOCK Computer Security is a full line of lockdown devices, security kits, and quality locks designed to protect your computer, keyboard, mouse, internal components, electronic and audiovisual equipment against theft.
http://www.technalock.com - Added Mar 12, 2002
- Terminal Services Over a Virtual Private Network
A demo site for using Terminal Services over a VPN with Windows2000 server and it's advantages.
http://www.microsoft.com/windows2000/guide/autodemos/demos/m... - Added Apr 12, 2001
- The GSR Consulting Group
http://www.gsr.ca/ - Added Dec 10, 1999
- The McAfee AVERT Virus Information Library
The McAfee AVERT Virus Information Library has detailed information on where viruses come from, how they infect your system, and how to remove them.
http://vil.nai.com/vil/default.asp - Added Apr 01, 2005
- The NESSUS Project
The "Nessus" Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security
scanner.
http://www.nessus.org/ - Added Dec 10, 1999
- The NSS Group
http://www.nss.co.uk/ - Added Dec 10, 1999
- The Security Audit and Internal Audit Shop
Checklists, plans and resources for security audit and internal audit
http://www.security-audit-internal-audit.com - Added Nov 25, 2001
- TINY Software
Founded in 1997, Tiny Software has been developing sophisticated, powerful software products that have been offered to customers in small, easy-to-use packages. Products include WinRoute Pro, WinRoute Lite, and Tiny Personal Firewall.
http://www.tinysoftware.com/home/tiny - Added Feb 01, 2001
- Tripwire Data Security Products
http://www.tripwiresecurity.com/ - Added Dec 10, 1999
- Veridion
We are distributor of Proteus information security software which helps comply with the following information security standards: ISO27001, ISO17799, COBIT, ITIL, Mehari, EBIOS, ISO20000, BS15000, JISX5080, JISQ27001, ISO 27001, ISO 17799, ISO 20000, BS 15000, JIS X 5080, JIS Q 27001.
http://www.veridion.net/ - Added May 25, 2006
- Veridyn, Inc.
Veridyn is a top-tier information security consulting firm, specializing in regulated industries. Veridyn provides policy development, risk assessment, security testing, and information security education.
http://www.veridyn.com - Added Oct 15, 2004
- Verisign
http://www.verisign.com/ - Added Dec 10, 1999
- Vigil@nce vulnerability and virus tracking service
Vigil@nce informs users when a vulnerability is found in their environment, and describes appropriated solutions (patches, workarounds). Administrator can then plan and manage every solution.
News database of Vigil@nce informs users about other security threats, such as main viruses and worms.
http://vigilance.aql.fr/accueil_en.php - Added Jul 07, 2006
- Vigilar, Inc.
Vigilar is an information security solution provider dedicated to providing solutions that manage risk and create trust through the delivery of technology controls, education and process development. Vigilar has partnered with the world
http://www.vigilar.com - Added Aug 13, 2003
- Voice Security
http://www.voice-security.com/ - Added Oct 05, 2000
- Wave Systems Corp
http://www.wavesys.com/ - Added Dec 10, 1999
- WebSense
WebSense
http://www.websense.com - Added Feb 05, 2003
- Welcome to CRYPTOGRAPHY.COM
Advancing academic research and providing industry-leading commercial services in cryptography and data security.
http://www.cryptography.com/ - Added Dec 10, 1999
- Welcome To Surety!
http://www.surety.com/ - Added Dec 10, 1999
- \"Identity Theft; Outsmarting the Crooks\"
The U.S. Treasury Department offers a free DVD called \"Identity Theft; Outsmarting the Crooks\" that is available to a wide audience.
http://www.ustreas.gov/offices/domestic-finance/financial-in... - Added Jul 19, 2006