The following vendors are good companies to know if you're looking for security-related products. Some of these companies also have security consulting and training available: Absolute Software Corporationwww.absolute.com Consulting services Monitoring and tracking systems AccessData Corp.www.accessdata.com Password recovery Password control products ActivCard, Inc.www.activcard.com Password and password generation Smart card/tokens Web server security Aladdin Knowledge Systems, Inc.www.ealaddin.com Access control Alternative Computer Technology, Inc.www.altcomp.com Biometrics File encryption Firewalls Virus protection/detection ArcSightwww.arcsight.com Enterprise security management Correlation, investigating, and reporting Argus Systems Group, Inc.www.argus-systems.com Access control Electronic commerce Policy management Firewalls Web security Astaro Corporationwww.astaro.com Internet security appliances Authenexwww.authenex.com Authentication system Authentifywww.authentify.com Internet identity solutions Aventail Corp.www.aventail.com Data access software Virtual private network Baltimore Technologieswww.baltimore.com Application security Digital signatures and CA authorities Electronic commerce Web server security Bigfixwww.bigfix.com Patch management Bindview Developmentwww.bindview.com Intrusion/misuse detection Secure operating systems Biometric Access Corp.www.biometricaccess.com Authentication of users/terminals Personnel identification systems biometrics Bioscrypt Incwww.bioscrypt.com Authentication Personnel identification systems biometrics BLOCKADE Systems Corp.www.blockade.com Data access software Firewalls Internet filtering and monitoring Network monitoring Password and password generation Web server security BLUE LANCEwww.bluelance.com Intrusion/misuse detection Network monitoring Risk analysis BorderWare Technologies Inc.www.borderware.com Firewalls Operating-system security Secure remote access BRICKServer™www.thirdpig.com Secure Web appliance The Buddy System®www.buddysystem.net Risk analysis and management Camelotwww.camelot.com Data access Policies and procedures Security software Captus Networkswww.captusnetworks.com Firewalls Intrusion misuse detection Network monitoring Certcowww.certco.com Digital signatures and certification authorities Electronic commerce Certicom Corp.www.certicom.com Applications Certification authority Cryptographic development products Fax security Check Pointwww.checkpoint.com Firewalls Policies and procedures VPN management Chrysalis-ITSwww.chrysalis-its.com Digital signatures and certificate authorities Smart cards/tokens Virtual private networks Cisco Systems, Inc.www.cisco.com Consulting services Firewalls Intrusion/monitoring detection Citadel Computer Systemswww.citadel.com Access control Security management File encryption CMS Technologieswww.cmstech.com Asset control Electronic alarms Intrusion/misuse detection Codex Data Systemswww.codexdatasystems.com Intrusion/misuse detection Monitoring systems Network monitoring Cogentricwww.cogentric.com Policies and procedures Risk analysis Security performance assessment Communication Devices, Inc.www.commdevices.com Consulting services Port protection/screening devices Security modems Smart cards/tokens Computer Associateswww.ca.com Consulting services Enterprise security management Computer Sentry Softwarewww.sentryinc.com Laptop theft notification Computer Sciences Corporationwww.csc.com Security consulting services Awareness tools and materials Digital signatures and certificate authorities Risk analysis ComputerCOP Corpwww.computercop.com Education training Internet filtering and monitoring Other firewalls and Internet security Other intrusion detection PIN generators Scanning/testing tools Computer Security Products, Inc.www.computersecurity.com Cables Data access software Electronic alarms Identification marking systems Monitoring systems Conclusivewww.conclusive.com Applications Data access Intrusion/misuse detection Web server security CONSUL riskwww.consul.com Auditing and risk management Counterpane Internet Security, Inc.www.counterpane.com Electronic commerce Intrusion/misuse detection Network monitoring Cranite Systemswww.cranite.com Wireless LAN security CRYPTOCardwww.cryptocard.com Password and password-generation systems PIN generators Single sign-on Smart cards/tokens Web server security CyberGuard Corporationwww.cyberguard.com Firewalls Secure operating system Cyber-Ark Softwarewww.cyber-ark.com Enterprise security solutions Cyber Safe Corporationwww.cybersafe.com Consulting services Data access software Policies and procedures Single sign-on Smart cards/tokens Web server security Cyber-SIGNwww.cybersign.com Authentic electronic signatures Secure user verification CyberSoft, Inc.www.cyber.com Intrusion/misuse detection Virus protection/detection Cylinkwww.cylink.com Digital signatures and CA authorities Policies and procedures Smart cards/tokens Datacard Corp.www.datacard.com Identification solutions DataKey, Inc.www.datakey.com Digital signatures and CA authorities Smart cards/tokens DataLynx, Inc.www.dlxguard.com Applications Electronic commerce Firewalls Intrusion/misuse detection Password and password generation Policies and procedures Web server security Digital Delivery Inc.www.digitaldelivery.com Data encryption Secure data distribution DIVERSINET Corp.www.dvnet.com Electronic commerce Secured wireless communication ENSURE Technologieswww.ensuretech.com Intrusion/misuse detection Entrust Technologieswww.entrust.com Digital signatures and CA authorities EyeDentify, Inc.www.eyedentify.com Personnel identification systems biometrics eEye Digital Securitywww.eeye.com Communications and network security Information security review Network monitoring Risk analysis Scanning/testing tools Security software Web server security Entegrity Solutionswww.entegrity.com Data Access Single Sign On Web Server Security Entercept Security Technologieswww.entercept.com Intrusion/misuse detection Secure operating systems Web server security eSecurity, Inc.www.esecurityinc.com Network monitoring eSecurityOnline LLCwww.esecurityonline.com Policies and proceedures Risk analysis Scanning/testing tools FinJanwww.finjan.com Firewalls Internet filtering and monitoring tools Foundstonewww.foundstone.com Communications and network security Information security review Intrusion/misuse detection Scanning/testing tools Virus protection/detection Forescoutwww.forescout.com Perimeter defense and blocking attacks F-Secure Inc.www.fsecure.com Mobile security solutions Funk Software, Inc.www.funk.com Remote access Authentication Gemplus Corpwww.gemplus.com Applications Smart cards Gemini Computers, Inc.www.geminisecure.com Authentication of users/terminals Consulting services Digital signatures and CA authorities Electronic commerce Firewalls Secure operating systems Web server security Gilian Technologies Inc.www.gilian.com Web content security Global Technology Associates, Inc.www.gta.com Firewalls Global Technologies Group, Inc.www.gtgi.com Antitheft, antiforgery, antitampering Applications CD-ROM security Firewalls Identification systems Great Circle Associateswww.greatcircle.com Consulting service Firewalls Seminars/workshops Guidance Softwarewww.encase.com Investigative and forensic solutions CyberSafewww.cybersafe.com Outsourced security solutions Harris Corporationwww.harris.com Intrusion/misuse detection Network monitoring Hewlett-Packard Corporationwww.hp.com Applications Electronic commerce Firewalls Web server security Hifnwww.hifn.com Encryption processors IBMwww.ibm.com Consulting services Electronic commerce Firewalls Digital signatures and CA authorities Intrusion misuse/detection Policies and procedures Secure email Info Express, Inc.www.infoexpress.com Personal firewall Remote access Integraliswww.integralis.com Firewalls Firewall management Internet filtering and monitoring tools Intel Corporationwww.intel.com Virus protection/detection Web server security Intellitactics.comwww.intellitactics.com Enterprise security management Intrusion Inc.www.intrusion.com Intrusion/misuse detection Network monitoring IntruVertwww.intruvert.com High-speed intrusion-detection systems Investigative Group Internationalwww.igint.com Consulting Forensics tools ISSwww.iss.net Intrusion Misuse Detection Network Auditing Scanning Testing Tools Security Management Training Web Server Security Kyberpass Corporationwww.kyberpass.com Authentication Digital signatures and CA authorities Lancopewww.lanscope.com Intrusion-detection appliance LJK Softwarewww.ljk.com Secure single sign-on Lucent Technologieswww.lucent.com/security Access control Network management Lumeta Corporationwww.lumeta.com Network topology visualization tools MessageLabswww.messagelabs.com Email security McAfeewww.mcafee.com Virus detection/misuse nCipher Corporation Ltd.www.ncipher.com Cryptographic products nCirclewww.ncircle.com Security management Intrusion detection Exposure management solutions NetScreenwww.netscreen.com Integrated security appliances Netegrity, Inc.www.netegrity.com Access control Electronic commerce netForensicswww.netforensics.com Internet filtering and monitoring Intrusion/misuse detection Network monitoring NetScreen Technologies, Inc.www.netscreen.com Firewalls Internet filtering and monitoring Virtual private network Network-1 Security Solutions, Inc.www.network-1.com Firewalls Internet filtering and monitoring Intrusion/misuse detection Network Associateswww.nai.com Access control Consulting services Encryption products Intrusion detection/misuse Network management Network monitoring Secure email Virus protection Web server security Network Engineering Software, Inc.www.fireants.com Firewalls NFR Securitywww.nfr.com Intrusion/misuse detection Network forensics Policies and proceedures netForensicswww.netforensics.com Security information management solutions NetIQ Corporation WebTrends Corp.www.netiqwebtrends.com Network monitoring Vulnerability management Web server security NIKSUN Inc.www.nicksun.com Internet filtering and monitoring Network monitoring Nokia Internet Communicationswww.nokia.com Firewalls Internet filtering and monitoring Network monitoring OmniSecurewww.omnisecure.com Storage encryption solutions OneSecurewww.onesecure.com Firewalls Intrusion/misuse detection Virtual private network Palisade Systemswww.palisadesys.com Network security appliances PassLogixwww.passlogix.com Password and password generation Pelican Securitywww.pelicansecurity.com Internet filtering and monitoring Other firewalls and Internet security Virus protection/detection PentaSafe Security Technologies, Inc.www.pentasafe.com Data access control Intrusion/misuse detection Network monitoring Policies and proceedures Scanning and testing tools Web server security Phaos Technology Corporationwww.phaos.com Encryption products Electronic commerce PostX Corporationwww.postx.com Secure email Predictive Systems, Inc.www.predictive.com Security consulting services Communications and network security Disaster recovery Firewalls Intrusion/misuse detection Network monitoring Promptuswww.promptus.com Encryption products Protegritywww.protegrity.com Access control Encryption products Policy management Psionic Technologieswww.psionic.com Intrusion verification and resolution software Qualys, Inc.www.qualys.com Intrusion/misuse detection Network monitoring Scanning/testing tools Rainbow Technologieswww.rainbow.com Authentication of users/terminals Smart cards/tokens Software copy protection Virtual private network Recognition Systems Inc.www.handreader.com Authentication of users/terminals Personal identification systems/ biomentrics Recourse Technologies (acquired by Symantec)www.recourse.com Intrusion/misuse detection Network monitoring Threat management HoneyPot technology Riptech (acquired by Symantec)www.riptech.com Real-time managed security services RiskWatchwww.riskwatch.com Risk assessment software RockSoftwww.rocksoft.com Data integrity RSA Data Securitywww.rsasecurity.com Applications Digital signatures and CA authorities Electronic commerce Secure email Encryption products S4Software, Inc.www.dli-security.com Centralized account management Access control Safetynet Securitywww.safetynet.com Virus misuse/detection SAICwww.saic.com Consulting services Security applications SAINT Corporationwww.saintcorporation.com Tool kit for detecting network vulnerabilities Sandstorm Enterprises, Inc.www.sandstorm.net Intrusion/misuse detection Network monitoring Other telecommunications Savvydatawww.savvydata.com Policy violation auditing Schlumbergerwww.schlumberger.com Secure wireless communications Smart cards Secure Computingwww.securecomputing.com Access control Firewalls Internet filtering and monitoring tools Remote access security Web security SecureLogix Corporationwww.securelogix.com Telecom security SecureNet Technologieswww.securenet.org Virus Protection/Detection ServGatewww.servgate.com Internet security devices SecureWorkswww.secureworks.com Intrusion/misuse detection Network monitoring Securify, Inc.www.securify.com Consulting services Digital signatures and certificate authorities Network monitoring Smart cards SecurityFocus (acquired by Symantec)www.securityfocus.com Education training Interactive training Network monitoring Notification services Other intrusion detection Vulnerability management Sequel Technology Corp.www.sequeltech.com Internet filtering and monitoring Silanis Technologywww.silanis.com Authentication Secure electronic signatures SilentRunner Inc.www.silentrunner.com Network security analysis products Silicon Defensewww.silicondefense.com Network intrusion-detection products SonicWALLwww.sonicwall.com Internet security appliance SourceFirewww.sourcefire.com Network intrusion-detection system SPI Dynamicswww.spidynamics.com Web application security assessment products Stonesoftwww.stonesoft.com Firewall and VPN High-availability clustering solutions Stratum8 Networkswww.stratum8.com Real-time application protection SurfControlwww.surfcontrol.com Internet filtering/monitoring Network monitoring Spyrus, Inc.www.spyrus.com Digital signatures and CA Electronic commerce Smart cards SSH Communications Securitywww.ssh.com Data access Data access software Virtual private network Stonebridgewww.stonebridgenetworks.com Communications and network security Education/training Sun Microsystemswww.sun.com/security Consulting services Firewalls VPN Sygate Technologieswww.sygate.com Distributed security policy management Symantecwww.symantec.com Vulnerability management Integrated gateway security Firewall VPN Virus protection and content filtering Enterprise administration Intrusion detection Security management Tally Systemswww.tallysystems.com Network monitoring Policies and procedures Scanning/testing tools Security performance assessment T-NETIXwww.t-netix.com Authentication of users/terminals Consulting services Personal identification systems biometrics PBX security Talos Technology Consulting, Inc.www.talos.com Authentication of users/terminals Personnel identification systems biometrics Technical Communications Corpwww.tccsecure.com Anti-eavesdropping Applications Secure faxes TenFour U.S. Inc.www.tenfour.com Content filtering Secure email Secure messaging Virus scanning Thawte Certificationwww.thawte.com Digital certificate services Thrupointwww.thrupoint.com Consulting services Communication and network security Disaster recovery TippingPoint Technologieswww.tippingpoint.com Network defense appliance Tivoli Software from IBMwww.tivoli.com Applications Data access Electronic commerce. Intrusion/misuse detection Secure operating system Single sign-on Top Layerwww.toplayer.com Firewalls Internet filtering and monitoring Intrusion/misuse detection Scanning/testing tools Web server security Trend Micro, Inc.www.antivirus.com Consulting services Virus protection/detection Trintech Groupwww.trintech.com Electronic commerce Tripwire, Inc.www.tripwire.com File integrity assessment Intrusion detection/prevention TruSecurewww.trusecure.com Managed security provider TrustWorkswww.trustworks.com Virtual private networks Tumbleweed Communications Corpwww.tumbleweed.com Managing secure communications Ubizenwww.ubizen.com Applications Digital signatures and certificate authorities Internet filtering and monitoring Network monitoring Web server security Unisyswww.unisys.com Authentication of terminals/users Single sign-on Vanguard Integrity Professionalswww.go2vanguard.com Applications Security conference VeriSignwww.verisign.com Data access Digital certificates and key management Single sign-on Vascowww.vasco.com Encryption products Secure remote access V-ONE Corporationwww.v-one.com Firewalls Secure computer systems/processors Smart cards/tokens Personal identification systems Policies and procedures WatchGuard Technologies, Inc.www.watchguard.com Access control Firewalls Internet filtering and monitoring tools Virtual private network Web server security WinMagic Inc.www.winmagic.com File encryption products Zero Knowledge Systemswww.freedom.net Secure communications Zone Labs, Inc.www.zonelabs.com Firewalls Internet filtering and monitoring Policies and proceedures |