Skip to search.

B2B > Computers > Security and Encryption

Email this page Suggest a Site Advanced Search

Directory > Business and Economy > Business to Business > Computers > Security and Encryption


CATEGORIES (What's This?)

SPONSOR LISTINGS (What's This?)

  • eMazzanti Technologies
    Computer network solutions firm specializing in network design, security, disaster recovery, remote connectivity, and related services.
    www.emazzanti.net/
SITE LISTINGS  By Popularity   |  Alphabetical    (What's This?)

  • Aladdin Knowledge Systems (Nasdaq:ALDN)
    Supplier of information security solutions for software developers including HASP and ASE. Develops, manufactures, and markets proprietary software security and smartcard products.
    www.ealaddin.com
  • @Stake
    Services include infrastructure operations and content security, application security and access control.
    www.atstake.com
  • A1 Security
    U.K. computer and equipment security specialists.
    www.personal.u-net.com/~compsec
  • Activis
    Offers services for Internet security including managed firewalls, e-mail content filtering, virus protection, and vulnerability scanning.
    www.activis.com
  • ADDSecure.Net, Inc.
    Services provided include website certification and IS/Recon.
    www.ADDSecure.Net
  • Alteus, Inc.
    Offers data security and network infrastructure products and services.
    www.alteus.com
  • AmbironTrustWave
    Provider of information security and compliance management solutions to businesses in the Fortune 2000 and the public sector.
    www.atwcorp.com
  • Andrisoft
    Developers of WANGUARD. Also offers traffic monitoring and DDoS mitigation software.
    www.andrisoft.com
  • Ankari
    Offers authentication, network security software, and IT security solutions.
    www.ankari.com
  • Arbor Networks
    Developers of Peakflow DoS, which helps service providers, hosting providers, and enterprises counter availability threats.
    www.arbornetworks.com
  • Az-Tech Software, Inc.
    www.az-tech.com
  • Baltimore Technologies
    Develops security products and services that enable companies to develop secure systems for e-business, the Internet, and mobile commerce.
    www.baltimore.com
  • BeenVerified
    Marketing and online identity management tool for individuals and organizations to more effectively establish verified identities and credentials.
    www.beenverified.com
  • Black Lotus Communications
    Offers affordable, enterprise grade DDoS protection solutions. Offering hosting, proxies, servers, and co-location.
    www.blacklotus.net
  • Blue Coat Systems (Nasdaq:BCSI)
    Port 80 security solutions built to protect corporate networks against Web-based viruses, unfiltered inbound and outbound Web communication, and inappropriate Web content.
    www.bluecoat.com
  • BRAK Systems, Inc.
    Designs solutions incorporating firewalls, intrustion detection, and authentication based on corporate clients' needs.
    www.brak.com
  • C&A; Security Risk Analysis Group
    Offers risk assessment products.
    www.security-risk-analysis.com
  • CCI Networks, Inc.
    Provider of integrated security products and services.
    www.ccinetworks.com
  • CE-Infosys
    Provider of advanced network and data security systems, offering Internet security, firewall, VPN, access control, secure remote access, and more. Site in English and German.
    www.ce-infosys.com
  • Centurion Technologies, Inc.
    Makers of Centurion Guard(tm) electronic hard drive protection.
    www.centuriontech.com
  • CipherOptics
    Provider of data protection and network encryption appliances to secure network data in motion over IP.
    www.cipheroptics.com
  • Communication Devices Inc.
    Manufacturer of data security products for secure remote access using DES tokens and providing full data encryption.
    www.commdevices.com
  • Computer Security Superstore
    One stop shopping for Computer Security products, services and information.
    www.computer-security.com
  • CounterStrike
    California-based Internet and computer network security monitoring company. Also provides investigations and intelligence and technical security countermeasure services to businesses.
    www.counterstrike.com
  • Crypto-Solutions
    Provider of network security and authentication consulting and services.
    www.crypto-solutions.net
  • Cryptzone
    Offers encryption for hard drives, email, USB, and Sharepoint.
    www.cryptzone.com
  • CTI Communications
    Markets client/server electronic mailbox packages,IBM3780 Fastsync, Syncpack and Firewall.
    www.cticomm.com
  • Cyber Protect
    Offers services for network, Internet, email, data, and computer security. These include anti virus protection, firewalls, encryption, Internet copyright laws, and security audits.
    www.cyberprotect.co.uk
  • CyProtect AG
    Offers 512 bit polymorphic encryption algorithms and ready-to-use disk, file, and mail encryption tools, as well as professional services in IT security.
    www.cyprotect.com
  • Datakey
    Manufactures smart card technology that authenticates users conducting business over online computer networks and secures communications or transactions over these networks.
    www.datakey.com
  • Decros
    Encryption and security systems for PCs and LANs.
    www.decros.cz
  • DefendNet Solutions, Inc.
    Specializes in managed Internet security solutions designed to enable data service providers to provide outsourced managed security services to business customers.
    www.defendnet.com
  • DES Encryption Software Group
    Source of encryption software and cryptography expertise, with emphasis on the DES and RSA algorithms.
    www.des-rsa-encryption-software-cryptography-group.com
  • dotEncrypt
    Offers encryption software, content security, and e-commerce and copyright protection.
    www.dotencrypt.com
  • Dynamic Perimeter
    Intel's industry resource site for security architects and developers on the Intel SOA Expressway Service Gateway. Includes data sheets, white papers, case studies, and related resources.
    www.dynamicperimeter.com
  • e-Security Toolkit
    Offers E-security checklists and audit questionnaires for firewalls, Internet, LAN, networks, and infrastructure.
    www.e-security-e-commerce-security.com
  • eMazzanti Technologies [SPONSOR]
    Computer network solutions firm specializing in network design, security, disaster recovery, remote connectivity, and related services.
    www.emazzanti.net
  • Ensure Technologies, Inc.
    Makers of the XyLoc wireless PC security system.
    www.ensuretech.com
  • Enterprise Security World
    Offers audit and security solutions for the iSeries, Linux, NT, OS/390, and unix platforms.
    www.e-securityworld.com
  • ESCOM Corporation
    www.escom.com:80
  • eSec Limited
    Specialises in e-commerce security with products and services for Internet payment, managed network security, and e-commerce middleware.
    www.esec.com.au
  • Eutron
    Hardware keys, access control and encryption security systems for PCs and LANs.
    www.eutron.it
  • F-Secure Corporation
    Provider of centrally managed security products for the mobile enterprise. Formerly known as Data Fellows.
    www.f-secure.com
  • FireEye
    Offers network security to secure data, intellectual property, and networks against zero-day stealth malware and botnets that cause data breaches.
    www.fireeye.com
  • First Access Ltd.
    Providers of Vicinity Authentication smartcards and access control hardware/software solutions for securing Enterprise network information resources.
    www.access-1.com
  • ForeScout Technologies
    Offers clientless Network Access Control (NAC) to secure enterprise networks from non-compliant endpoints and self propagating malware.
    www.forescout.com
  • Fortefi Corporation
    Offers enterprise provisioning, identity, and access security management solutions for UNIX and Linux.
    www.fortefi.com
  • Future Com
    Service-based reseller (SBR) focusing on security and network management tools.
    www.fcltd.net
  • Future Security Controls Inc.
    www.fsc-als.com
  • Gamma
    Experts in security policy, ITSEC, BS7799, and making your business secure in the information age.
    www.gammassl.co.uk
  • Glenco Engineering Inc.
    Hardware and software copy protection solutions to combat software piracy.
    www.glenco.com
  • Global Information Security
    Provider of security solutions for home, small business, and enterprise-wide environments.
    www.gis-secure.com
  • Guardant
    Offers anti-piracy protection system.
    www.guardant.com
  • Guardian Digital, Inc.
    Open Source security company.
    www.guardiandigital.com
  • Hackademia
    Provides web-based training in information security.
    www.hackademia.com
  • Hackers Catalog
    Offers software and hardware tools, files, books, videos, and test chips for cable, satellite, cellular and computer hacking, phreaking, and other fields of interest.
    www.hackerscatalog.com
  • Hackers Home Page
    Online catalog designed for the serious computer hacker, phreaker, red boxer, cracker, etc.
    www.hackershomepage.com
  • Hifn
    Network security silicon and software for manufacturers of VPNs and other networking equipment.
    www.hifn.com
  • ID Quantique
    Developers of secure communication systems based on quantum photonics.
    www.idquantique.com
  • iDefense
    Provides cyber intelligence and risk and crisis management services for companies' IT infrastructure and web sites against hacker attacks.
    www.idefense.com
  • Infocell
    Offering managed e-security services including email scanning, content filtering, vulnerability testing, managed firewalls, and VPNs.
    www.infocell.co.uk
  • Information Security Policies Made Easy
    Information security policy resource with templates, advice, and instructions based on consulting work with organizations worldwide.
    www.baselinesoft.com
  • Information Security Systems
    Part of Crypto AG. Specialize in developing security hardware and security software for secure data transmission, Internet, and radio communication.
    www.information-security.ws
  • Internet Commerce Corporation
    Provides Internet-based e-commerce services for the business-to-business marketplace.
    www.icc.net
  • Internet Security Sources
    Directory of companies offering Internet security services including blocking, encryption, and virus protection.
    www.internet-security-sources.com
  • Ion Networks
    Provider of infrastructure security and management services for service providers, enterprises, and governments.
    www.ion-networks.com
  • IT Governance Ltd.
    Offers ISO27001 information security management portal for North America. Features information, books, tools, and advice on ISO 27001 registration.
    www.27001.com
  • Karthika Technologies
    Develops advanced encryption systems technology, specializing in information security.
    www.karthika.com
  • Korea Information Security Industry Portal
    Portal promoting the development, improvement, and global marketing of Korean information security.
    www.koreasecurity.or.kr
  • Lexent Technologies
    Offers two-way remote wireless laptop computer security system employing PC Radar proximity and motion sensing technology.
    www.lexent.com
  • Links Business Group LLC
    Offers identity management, digital identity, data security, regulatory compliance, and strategic IT consulting services. Links Business Group provides coverage throughout North America and Europe.
    www.linksbusinessgroup.com
  • LockNET, Inc.
    Full-service provider of IT network security, network management, and compliance services. Serves the business, financial, health care, education, and governent industries.
    www.locknet-inc.com
  • LURHQ
    Offers managed security services including managed firewall, managed security monitoring, and managed intrusion detection, protection, and prevention.
    www.lurhq.com
  • MagiQ Technologies
    Developing quantum cryptography products and services.
    www.magiqtech.com
  • Merlin Systems
    Specializes in computer and network security and secure web development and enhancement services.
    merlinsystems.net
  • Microcosm Ltd
    Copy protection (software and/or hardware based) and software licensing systems. Products include CopyControl and Dinkey Dongle.
    www.microcosm.co.uk
  • Milestone Systems
    Provides F5 training, Ironport email configuration, IT staffing, network security & internet technology consulting.
    www.milestonesystems.com
  • MXINSPECT
    Offers security protection services for email and web threats, viruses, spyware, network attacks, and more.
    www.mxwebinspect.com
  • Myrmidon Networks
    Provides security and disaster recovery consulting services as well as a managed security services for clients of all sizes.
    www.myrmidon.net
  • nCircle
    Provides agentless security risk and compliance management solutions.
    www.ncircle.com
  • Network and IT Security Policies
    Information on policies and how to deliver them.
    www.network-and-it-security-policies.com
  • Network Solutions Website Security
    Network Solutions provides information and solutions for small business owners relating to domain, website, and email security.
    security.networksolutions.com
  • NetworkGuys, Inc.
    Enterprise network security consulting and integration
    www.NetworkGuys.com
  • Neupart & Munkedal
    Specializes in doing Internet Security scannings and attacks, penetration tests.
    www.n-m.com
  • Odyssey Technologies
    Specializes in architecture design, implementation, and management.
    www.odysseytec.com
  • PacketDefense
    Security information and news portal with emphasis on network and BS7799 developments.
    www.packetdefense.com
  • password-find.com
    Offering password recovery service for Excel and Word files.
    www.password-find.com
  • PC Guardian
    Designs and develops data encryption software, access control solutions, and physical security devices. Serves large companies, agencies, and universities worldwide.
    www.pcguardian.com
  • Persay
    Advanced voice and speaker verification and authentication systems for remote services.
    www.persay.com
  • PGP Corporation
    Helps companies secure e-business operations through firewall, encryption, and intrusion detection.
    www.pgp.com
  • Pivot Point Security
    Specializes in information security assessment services.
    www.pivotpointsecurity.com
  • PolyCommerce
    Develops strategic eBusiness solutions for both Fortune 500 companies and electronic start-ups, including information and network security, IT practices, and Internet marketing.
    www.polycommerce.com
  • Psystar Corporation
    Offers open computing products and open gaming systems, as well as communications, surveillance, and network management products and services.
    www.psystar.com
  • Qualtec Data Products
    Manufactures PC and business security products. Included are PC theft deterrants; heavy duty data security; and accessories.
    www.pcsecurity.com
  • Rainbow Technologies
    Provides security technology including SSL-VPN secure remote access, VPN and web security appliances, identity management, authentication tokens, and software protection dongles.
    www.rainbow.com
  • Recourse Technologies, Inc.
    Offers a secure deception system that enables an organization to contain and control attacks upon their networked resources.
    www.mantrap.com
  • Red Bull Technologies
    Reseller of best of breed security solutions and services to address the full threat spectrum to networks, hosts, and wireless devices.
    www.redbulltech.com
  • Red Iron
    A PCI compliant, end-to-end software solution to secure consumer data for retailers with Windows-based systems.
    www.redirontech.com
  • RSA Security
    Develops and markets platform-independent software developer's kits, end-user products, and provides comprehensive consulting services in the cryptographic sciences.
    www.rsasecurity.com
  • RUSecure
    Provides online threat alerts and appropriate responses, linked security policies, and online training.
    www.rusecure.co.uk
  • Safe Data System
    Security products that verify the identities of computer systems and network users and prevent unauthorized access to company resources.
    www.safedata.com
  • SafeBIZ
    Offering peace of mind to consumers and increased traffic and sales to businesses.
    www.safebiz.com
  • SafeNet
    Developer and manufacturer of enterprise network security solutions. SafeNet uses encryption technologies to protect communications, intellectual property, and digital identities, and offers a full spectrum of hardware, software, and chips.
    www.safenet-inc.com
  • SearchSecurity.com
    Directory with a focus on enterprise computing security. Targeted searches, relevant content links, editorial insight, daily industry news, and weekly technology tips delivered via email.
    www.searchsecurity.com
  • Secure Net
    Offers solutions for Internet applications, remote banking, and data critical activities. Experienced with smart card technology and firewalls.
    www.securenet.com.au
  • Secure Works
    Network security monitoring and response service.
    www.secureworks.com
  • SecureHQ
    Specializes in security products and services, such as firewalls, intrusion detection, scanners, and more.
    www.securehq.com
  • SecureLogix Corporation
    Offering network and telecommunication security products, consulting, and training.
    www.securelogix.com
  • SecureMetric Technology
    Manufactures and provides smart card based digital security products, software license and copyright protection, and two-factor authentication.
    www.securemetric.com
  • Security Audit Shop
    Provides checklists, plans, resources, and information for internal audits.
    www.security-audit-internal-audit.com
  • Security Metrics
    Allows users to check their system security over the Internet.
    www.securitymetrics.com
  • Shoghi Communications
    Provides services for defence forces, government agencies, financial institutions, and the IT industry.
    www.shoghi.co.in
  • Shufro Security
    www.shufro.com
  • Software House
    Developer and distributor of advanced card access and alarm monitoring systems for commercial, government, banking, and university facilities, world-wide.
    www.swhouse.com
  • Spectrum Systems, Inc.
    Seeks to assist customers with network and information management and protection.
    www.spectrum-systems.com
  • Sperrin Networks
    Offering security policy consulting in addition to hardware and software firewall solutions.
    www.sperrinnetworks.com
  • Spyrus
    Manufacturer of PCMCIA crypto cards, security libraries, and secured applications.
    www.spyrus.com
  • Surety Technologies
    Surety helps customers detect tampering or inadvertent altering of their electronic data.
    www.surety.com
  • Sxip Identity
    Company hoping to provide the online mechanism for authenticating and managing real-world user-centric identities.
    www.sxip.com
  • Symbolic
    www.symbolic.it
  • TECSEC
    Develops security solutions for customers ranging from consumers to defense contractors.
    www.tecsec.com
  • TriGeo Network Security
    TriGeo offers enterprise security management as well as other services including intrusion prevention, endpoint security, and GLBA compliance.
    www.trigeo.com
  • TruSecure Corporation
    Provides managed security products, services, research, and publications.
    www.trusecure.com
  • Trusted Computer Solutions, Inc.
    Specializes in the development of trusted solutions to meet Department of Defense and commercial multilevel security requirements.
    www.tcs-sec.com
  • USSR Labs
    Develops software anti-piracy tools, and offers security services.
    www.ussrback.com
  • Utimaco Safeguard Systems
    Products include security hardware and software for access control, encryption, and challenge response.
    www.utimaco.com
  • Vasco Data Security
    Remote access security.
    www.vasco.com
  • VPNcon
    Contains information on VPNs including conventions and exhibitions.
    www.vpncon.com
  • WatchGuard Technologies
    Provider of Internet security products and firewalls. Products include the LiveSecurity System, and FireBox.
    www.watchguard.com
  • Watchguard Technologies
    Provides a wide range of security features to fit any organization's budget.
    www.guardsite.com
  • Windermere Information Technology Systems
    Providing technical support for information assurance.
    iw.windermeregroup.com
  • ZipUnlock.com
    Provides information, software reviews, and downloads for recovery of WinZip and Zip passwords
    www.zipunlock.com
 

B2B > Computers > Security and Encryption

Email this page Suggest a Site Advanced Search

Directory > Business and Economy > Business to Business > Computers > Security and Encryption


Web   |   Directory   |   Category



Help us improve the Yahoo! Directory - Share your ideas