Product Vendors

The following vendors are good companies to know if you're looking for security-related products. Some of these companies also have security consulting and training available:

Absolute Software Corporation

www.absolute.com

Consulting services

Monitoring and tracking systems

AccessData Corp.

www.accessdata.com

Password recovery

Password control products

ActivCard, Inc.

www.activcard.com

Password and password generation

Smart card/tokens

Web server security

Aladdin Knowledge Systems, Inc.

www.ealaddin.com

Access control

Alternative Computer Technology, Inc.

www.altcomp.com

Biometrics

File encryption

Firewalls

Virus protection/detection

ArcSight

www.arcsight.com

Enterprise security management

Correlation, investigating, and reporting

Argus Systems Group, Inc.

www.argus-systems.com

Access control

Electronic commerce

Policy management

Firewalls

Web security

Astaro Corporation

www.astaro.com

Internet security appliances

Authenex

www.authenex.com

Authentication system

Authentify

www.authentify.com

Internet identity solutions

Aventail Corp.

www.aventail.com

Data access software

Virtual private network

Baltimore Technologies

www.baltimore.com

Application security

Digital signatures and CA authorities

Electronic commerce

Email

Web server security

Bigfix

www.bigfix.com

Patch management

Bindview Development

www.bindview.com

Intrusion/misuse detection

Secure operating systems

Biometric Access Corp.

www.biometricaccess.com

Authentication of users/terminals

Personnel identification systems biometrics

Bioscrypt Inc

www.bioscrypt.com

Authentication

Personnel identification systems biometrics

BLOCKADE Systems Corp.

www.blockade.com

Data access software

Firewalls

Internet filtering and monitoring

Network monitoring

Password and password generation

Web server security

BLUE LANCE

www.bluelance.com

Intrusion/misuse detection

Network monitoring

Risk analysis

BorderWare Technologies Inc.

www.borderware.com

Firewalls

Operating-system security

Secure remote access

BRICKServer™

www.thirdpig.com

Secure Web appliance

The Buddy System®

www.buddysystem.net

Risk analysis and management

Camelot

www.camelot.com

Data access

Policies and procedures

Security software

Captus Networks

www.captusnetworks.com

Firewalls

Intrusion misuse detection

Network monitoring

Certco

www.certco.com

Digital signatures and certification authorities

Electronic commerce

Certicom Corp.

www.certicom.com

Applications

Certification authority

Cryptographic development products

Fax security

Check Point

www.checkpoint.com

Firewalls

Policies and procedures

VPN management

Chrysalis-ITS

www.chrysalis-its.com

Digital signatures and certificate authorities

Smart cards/tokens

Virtual private networks

Cisco Systems, Inc.

www.cisco.com

Consulting services

Firewalls

Intrusion/monitoring detection

Citadel Computer Systems

www.citadel.com

Access control

Security management

File encryption

CMS Technologies

www.cmstech.com

Asset control

Electronic alarms

Intrusion/misuse detection

Codex Data Systems

www.codexdatasystems.com

Intrusion/misuse detection

Monitoring systems

Network monitoring

Cogentric

www.cogentric.com

Policies and procedures

Risk analysis

Security performance assessment

Communication Devices, Inc.

www.commdevices.com

Consulting services

Port protection/screening devices

Security modems

Smart cards/tokens

Computer Associates

www.ca.com

Consulting services

Enterprise security management

Computer Sentry Software

www.sentryinc.com

Laptop theft notification

Computer Sciences Corporation

www.csc.com

Security consulting services

Awareness tools and materials

Digital signatures and certificate authorities

Risk analysis

ComputerCOP Corp

www.computercop.com

Education training

Internet filtering and monitoring

Other firewalls and Internet security

Other intrusion detection

PIN generators

Scanning/testing tools

Computer Security Products, Inc.

www.computersecurity.com

Cables

Data access software

Electronic alarms

Identification marking systems

Monitoring systems

Conclusive

www.conclusive.com

Applications

Data access

Intrusion/misuse detection

Web server security

CONSUL risk

www.consul.com

Auditing and risk management

Counterpane Internet Security, Inc.

www.counterpane.com

Electronic commerce

Intrusion/misuse detection

Network monitoring

Cranite Systems

www.cranite.com

Wireless LAN security

CRYPTOCard

www.cryptocard.com

Password and password-generation systems

PIN generators

Single sign-on

Smart cards/tokens

Web server security

CyberGuard Corporation

www.cyberguard.com

Firewalls

Secure operating system

Cyber-Ark Software

www.cyber-ark.com

Enterprise security solutions

Cyber Safe Corporation

www.cybersafe.com

Consulting services

Data access software

Policies and procedures

Single sign-on

Smart cards/tokens

Web server security

Cyber-SIGN

www.cybersign.com

Authentic electronic signatures

Secure user verification

CyberSoft, Inc.

www.cyber.com

Intrusion/misuse detection

Virus protection/detection

Cylink

www.cylink.com

Digital signatures and CA authorities

Policies and procedures

Smart cards/tokens

Datacard Corp.

www.datacard.com

Identification solutions

DataKey, Inc.

www.datakey.com

Digital signatures and CA authorities

Smart cards/tokens

DataLynx, Inc.

www.dlxguard.com

Applications

Electronic commerce

Firewalls

Intrusion/misuse detection

Password and password generation

Policies and procedures

Web server security

Digital Delivery Inc.

www.digitaldelivery.com

Data encryption

Secure data distribution

DIVERSINET Corp.

www.dvnet.com

Email

Electronic commerce

Secured wireless communication

ENSURE Technologies

www.ensuretech.com

Intrusion/misuse detection

Entrust Technologies

www.entrust.com

Digital signatures and CA authorities

Email

EyeDentify, Inc.

www.eyedentify.com

Personnel identification systems biometrics

eEye Digital Security

www.eeye.com

Communications and network security

Information security review

Network monitoring

Risk analysis

Scanning/testing tools

Security software

Web server security

Entegrity Solutions

www.entegrity.com

Data Access

Single Sign On

Web Server Security

Entercept Security Technologies

www.entercept.com

Intrusion/misuse detection

Secure operating systems

Web server security

eSecurity, Inc.

www.esecurityinc.com

Network monitoring

eSecurityOnline LLC

www.esecurityonline.com

Policies and proceedures

Risk analysis

Scanning/testing tools

FinJan

www.finjan.com

Firewalls

Internet filtering and monitoring tools

Foundstone

www.foundstone.com

Communications and network security

Information security review

Intrusion/misuse detection

Scanning/testing tools

Virus protection/detection

Forescout

www.forescout.com

Perimeter defense and blocking attacks

F-Secure Inc.

www.fsecure.com

Mobile security solutions

Funk Software, Inc.

www.funk.com

Remote access

Authentication

Gemplus Corp

www.gemplus.com

Applications

Smart cards

Gemini Computers, Inc.

www.geminisecure.com

Authentication of users/terminals

Consulting services

Digital signatures and CA authorities

Electronic commerce

Firewalls

Secure operating systems

Web server security

Gilian Technologies Inc.

www.gilian.com

Web content security

Global Technology Associates, Inc.

www.gta.com

Firewalls

Global Technologies Group, Inc.

www.gtgi.com

Antitheft, antiforgery, antitampering

Applications

CD-ROM security

Firewalls

Identification systems

Great Circle Associates

www.greatcircle.com

Consulting service

Firewalls

Seminars/workshops

Guidance Software

www.encase.com

Investigative and forensic solutions

CyberSafe

www.cybersafe.com

Outsourced security solutions

Harris Corporation

www.harris.com

Intrusion/misuse detection

Network monitoring

Hewlett-Packard Corporation

www.hp.com

Applications

Electronic commerce

Firewalls

Web server security

Hifn

www.hifn.com

Encryption processors

IBM

www.ibm.com

Consulting services

Electronic commerce

Firewalls

Digital signatures and CA authorities

Intrusion misuse/detection

Policies and procedures

Secure email

Info Express, Inc.

www.infoexpress.com

Personal firewall

Remote access

Integralis

www.integralis.com

Firewalls

Firewall management

Internet filtering and monitoring tools

Intel Corporation

www.intel.com

Virus protection/detection

Web server security

Intellitactics.com

www.intellitactics.com

Enterprise security management

Intrusion Inc.

www.intrusion.com

Intrusion/misuse detection

Network monitoring

IntruVert

www.intruvert.com

High-speed intrusion-detection systems

Investigative Group International

www.igint.com

Consulting

Forensics tools

ISS

www.iss.net

Intrusion Misuse Detection

Network Auditing

Scanning Testing Tools

Security Management

Training

Web Server Security

Kyberpass Corporation

www.kyberpass.com

Authentication

Digital signatures and CA authorities

Lancope

www.lanscope.com

Intrusion-detection appliance

LJK Software

www.ljk.com

Secure single sign-on

Lucent Technologies

www.lucent.com/security

Access control

Network management

Lumeta Corporation

www.lumeta.com

Network topology visualization tools

MessageLabs

www.messagelabs.com

Email security

McAfee

www.mcafee.com

Virus detection/misuse

nCipher Corporation Ltd.

www.ncipher.com

Cryptographic products

nCircle

www.ncircle.com

Security management

Intrusion detection

Exposure management solutions

NetScreen

www.netscreen.com

Integrated security appliances

Netegrity, Inc.

www.netegrity.com

Access control

Electronic commerce

netForensics

www.netforensics.com

Internet filtering and monitoring

Intrusion/misuse detection

Network monitoring

NetScreen Technologies, Inc.

www.netscreen.com

Firewalls

Internet filtering and monitoring

Virtual private network

Network-1 Security Solutions, Inc.

www.network-1.com

Firewalls

Internet filtering and monitoring

Intrusion/misuse detection

Network Associates

www.nai.com

Access control

Consulting services

Encryption products

Intrusion detection/misuse

Network management

Network monitoring

Secure email

Virus protection

Web server security

Network Engineering Software, Inc.

www.fireants.com

Firewalls

NFR Security

www.nfr.com

Intrusion/misuse detection

Network forensics

Policies and proceedures

netForensics

www.netforensics.com

Security information management solutions

NetIQ Corporation WebTrends Corp.

www.netiqwebtrends.com

Network monitoring

Vulnerability management

Web server security

NIKSUN Inc.

www.nicksun.com

Internet filtering and monitoring

Network monitoring

Nokia Internet Communications

www.nokia.com

Firewalls

Internet filtering and monitoring

Network monitoring

OmniSecure

www.omnisecure.com

Storage encryption solutions

OneSecure

www.onesecure.com

Firewalls

Intrusion/misuse detection

Virtual private network

Palisade Systems

www.palisadesys.com

Network security appliances

PassLogix

www.passlogix.com

Password and password generation

Pelican Security

www.pelicansecurity.com

Internet filtering and monitoring

Other firewalls and Internet security

Virus protection/detection

PentaSafe Security Technologies, Inc.

www.pentasafe.com

Data access control

Intrusion/misuse detection

Network monitoring

Policies and proceedures

Scanning and testing tools

Web server security

Phaos Technology Corporation

www.phaos.com

Encryption products

Electronic commerce

PostX Corporation

www.postx.com

Secure email

Predictive Systems, Inc.

www.predictive.com

Security consulting services

Communications and network security

Disaster recovery

Firewalls

Intrusion/misuse detection

Network monitoring

Promptus

www.promptus.com

Encryption products

Protegrity

www.protegrity.com

Access control

Encryption products

Policy management

Psionic Technologies

www.psionic.com

Intrusion verification and resolution software

Qualys, Inc.

www.qualys.com

Intrusion/misuse detection

Network monitoring

Scanning/testing tools

Rainbow Technologies

www.rainbow.com

Authentication of users/terminals

Smart cards/tokens

Software copy protection

Virtual private network

Recognition Systems Inc.

www.handreader.com

Authentication of users/terminals

Personal identification systems/ biomentrics

Recourse Technologies (acquired by Symantec)

www.recourse.com

Intrusion/misuse detection

Network monitoring

Threat management

HoneyPot technology

Riptech (acquired by Symantec)

www.riptech.com

Real-time managed security services

RiskWatch

www.riskwatch.com

Risk assessment software

RockSoft

www.rocksoft.com

Data integrity

RSA Data Security

www.rsasecurity.com

Applications

Digital signatures and CA authorities

Electronic commerce

Secure email

Encryption products

S4Software, Inc.

www.dli-security.com

Centralized account management

Access control

Safetynet Security

www.safetynet.com

Virus misuse/detection

SAIC

www.saic.com

Consulting services

Security applications

SAINT Corporation

www.saintcorporation.com

Tool kit for detecting network vulnerabilities

Sandstorm Enterprises, Inc.

www.sandstorm.net

Intrusion/misuse detection

Network monitoring

Other telecommunications

Savvydata

www.savvydata.com

Policy violation auditing

Schlumberger

www.schlumberger.com

Secure wireless communications

Smart cards

Secure Computing

www.securecomputing.com

Access control

Firewalls

Internet filtering and monitoring tools

Remote access security

Web security

SecureLogix Corporation

www.securelogix.com

Telecom security

SecureNet Technologies

www.securenet.org

Virus Protection/Detection

ServGate

www.servgate.com

Internet security devices

SecureWorks

www.secureworks.com

Intrusion/misuse detection

Network monitoring

Securify, Inc.

www.securify.com

Consulting services

Digital signatures and certificate authorities

Network monitoring

Smart cards

SecurityFocus (acquired by Symantec)

www.securityfocus.com

Education training

Interactive training

Network monitoring

Notification services

Other intrusion detection

Vulnerability management

Sequel Technology Corp.

www.sequeltech.com

Internet filtering and monitoring

Silanis Technology

www.silanis.com

Authentication

Secure electronic signatures

SilentRunner Inc.

www.silentrunner.com

Network security analysis products

Silicon Defense

www.silicondefense.com

Network intrusion-detection products

SonicWALL

www.sonicwall.com

Internet security appliance

SourceFire

www.sourcefire.com

Network intrusion-detection system

SPI Dynamics

www.spidynamics.com

Web application security assessment products

Stonesoft

www.stonesoft.com

Firewall and VPN

High-availability clustering solutions

Stratum8 Networks

www.stratum8.com

Real-time application protection

SurfControl

www.surfcontrol.com

Internet filtering/monitoring

Network monitoring

Spyrus, Inc.

www.spyrus.com

Digital signatures and CA

Electronic commerce

Smart cards

SSH Communications Security

www.ssh.com

Data access

Data access software

Virtual private network

Stonebridge

www.stonebridgenetworks.com

Communications and network security

Education/training

Sun Microsystems

www.sun.com/security

Consulting services

Firewalls

VPN

Sygate Technologies

www.sygate.com

Distributed security policy management

Symantec

www.symantec.com

Vulnerability management

Integrated gateway security

Firewall VPN

Virus protection and content filtering

Enterprise administration

Intrusion detection

Security management

Tally Systems

www.tallysystems.com

Network monitoring

Policies and procedures

Scanning/testing tools

Security performance assessment

T-NETIX

www.t-netix.com

Authentication of users/terminals

Consulting services

Personal identification systems biometrics

PBX security

Talos Technology Consulting, Inc.

www.talos.com

Authentication of users/terminals

Personnel identification systems biometrics

Technical Communications Corp

www.tccsecure.com

Anti-eavesdropping

Applications

Secure faxes

TenFour U.S. Inc.

www.tenfour.com

Content filtering

Secure email

Secure messaging

Virus scanning

Thawte Certification

www.thawte.com

Digital certificate services

Thrupoint

www.thrupoint.com

Consulting services

Communication and network security

Disaster recovery

TippingPoint Technologies

www.tippingpoint.com

Network defense appliance

Tivoli Software from IBM

www.tivoli.com

Applications

Data access

Electronic commerce.

Intrusion/misuse detection

Secure operating system

Single sign-on

Top Layer

www.toplayer.com

Firewalls

Internet filtering and monitoring

Intrusion/misuse detection

Scanning/testing tools

Web server security

Trend Micro, Inc.

www.antivirus.com

Consulting services

Virus protection/detection

Trintech Group

www.trintech.com

Electronic commerce

Tripwire, Inc.

www.tripwire.com

File integrity assessment

Intrusion detection/prevention

TruSecure

www.trusecure.com

Managed security provider

TrustWorks

www.trustworks.com

Virtual private networks

Tumbleweed Communications Corp

www.tumbleweed.com

Managing secure communications

Ubizen

www.ubizen.com

Applications

Digital signatures and certificate authorities

Internet filtering and monitoring

Network monitoring

Web server security

Unisys

www.unisys.com

Authentication of terminals/users

Single sign-on

Vanguard Integrity Professionals

www.go2vanguard.com

Applications

Security conference

VeriSign

www.verisign.com

Data access

Digital certificates and key management

Single sign-on

Vasco

www.vasco.com

Encryption products

Secure remote access

V-ONE Corporation

www.v-one.com

Firewalls

Secure computer systems/processors

Smart cards/tokens

Personal identification systems

Policies and procedures

WatchGuard Technologies, Inc.

www.watchguard.com

Access control

Firewalls

Internet filtering and monitoring tools

Virtual private network

Web server security

WinMagic Inc.

www.winmagic.com

File encryption products

Zero Knowledge Systems

www.freedom.net

Secure communications

Zone Labs, Inc.

www.zonelabs.com

Firewalls

Internet filtering and monitoring

Policies and proceedures



IT Security. Risking the Corporation
IT Security: Risking the Corporation
ISBN: 013101112X
EAN: 2147483647
Year: 2003
Pages: 73

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net