- DigiCrime, Inc [IA][Direct] -
A full service criminal computer hacking organization.
- 4COMM.com [IA][Direct] -
Offers hardware and software tools to securely move data and administer the NT LAN infrastructure. Provides specialized services, including network audits.
- A1 Security [IA][Direct] -
UK computer and equipment security specialists.
- ADDSecure.Net, Inc. [IA][Direct] -
Services provided include web site certification and IS/Recon.
- AT&T; Information Security Center [IA][Direct] -
Provides government and corporate customers with design and implementation services in intrusion detection, PKI, and security consulting.
- Authentica, Inc. [IA][Direct] -
Offers PageVault which allows you to control and track documents.
- Az-Tech Software, Inc. [IA][Direct]
- Banzai Institute [IA][Direct] -
A computer and network security database.
- BL Computer Security [IA][Direct] -
Products against piracy, alarms, and data security.
- B.M.L. [IA][Direct] -
Makers of security alarm products featuring the P.C Protector.
- BRAK Systems, Inc. [IA][Direct] -
Communications integrator, specializing in ISDN, frame relay, voice & data integration and Internet access services.
- Centurion Technologies, Inc. [IA][Direct] -
Makers of Centurion Guard(tm) electronic hard drive protection.
- CertifiedTime Inc [IA][Direct] -
Provides secure and auditable time services for online business, allowing companies to provably synchronize their desktops and transaction servers.
- Chrysalis-ITS [IA][Direct] -
Provider of network security processing products for VPN and PKI applications on IP networks carrying voice and data traffic.
- CommNet Plus, Inc. [IA][Direct] -
Offering secured data access solutions.
- Communication Devices Inc. [IA][Direct] -
Manufacturer of data security products for secure remote access using DES tokens and providing full data encryption.
- Computer Security Superstore [IA][Direct] -
One stop shopping for Computer Security products, services and information.
- Computrol Security Systems [IA][Direct] -
Developer and manufacturer of leading edge integrated card access systems for commercial and government accounts.
- Comsec Associates, Inc. [IA][Direct] -
A communications security firm with electronic eavesdropping detection and protection of proprietary information.
- Controlled Access/Data Based Security [IA][Direct]
- CTI Communications [IA][Direct] -
Markets client/server electronic mailbox packages,IBM3780 Fastsync, Syncpack and Firewall.
- CyberArmour [IA][Direct] -
Offers secure and anonymous Internet access, e-mail, chat, and file storage.
- Decros [IA][Direct] -
Encryption and security systems for PCs and LANs.
- Detectit Security Management System [IA][Direct]
- DynaSoft [IA][Direct] -
Supplier of comprehensive computer security solutions for client/server environments. Products include BoKS and Avi-BoKS.
- Enrst & Young [IA][Direct] -
Offers security profiling, architecture, and implemntation services. Site includes information on related events, tools, news, and more.
- Ensure Technologies, Inc. [IA][Direct] -
Makers of the XyLoc wireless PC security system.
- ESCOM Corporation [IA][Direct]
- eSec Limited [IA][Direct] -
Specialises in e-commerce security with products and services for Internet payment, managed network security, and e-commerce middleware.
- Eutron [IA][Direct] -
Hardware keys, access control and encryption security systems for PCs and LANs.
- First Access Ltd. [IA][Direct] -
Providers of Vicinity Authentication smartcards and access control hardware/software solutions for securing Enterprise network information resources.
- Future Security Controls Inc. [IA][Direct]
- Gamma [IA][Direct] -
Experts in security policy, ITSEC, BS7799, and making your business secure in the information age.
- Glenco Engineering Inc. [IA][Direct] -
Hardware and software copy protection solutions to combat software piracy.
- Hackers Catalog [IA][Direct] -
Unique software and hardware tools, files, books, videos, and test chips for cable, satellite, cellular and computer hacking, phreaking and other fields of interest.
- Hackers Home Page [IA][Direct] -
Online catalog designed for the serious computer hacker, phreaker, red boxer, cracker, etc.
- Information Security Policies Made Easy [IA][Direct] -
Already-written information security policies on floppy (IBM or MAC) based on consulting work with organizations worldwide.
- Innovative Security Products [IA][Direct] -
Provides hardware and software security devices for computers, peripherals, and networks.
- Inter Clear Service Ltd. [IA][Direct] -
Issues authenticated digital certificates for use by individuals or organisations in secure data transmission applications.
- IS Security (Consulting) Ltd. [IA][Direct] -
Provides consultancy and recruitment service specialising in commercial IT security and security-related areas.
- J.C. Pole & Associates, Inc. [IA][Direct] -
Services range from planning to installation of firewalls and other information security systems.
- L-3 Network Security [IA][Direct] -
Offers consulting, training, and products that measure and manage network security risk.
- LapJack [IA][Direct] -
Protects laptop/data security.
- Lexent Technologies, Inc. [IA][Direct] -
Offers two-way remote wireless laptop computer security system employing PC Radar proximity and motion sensing technology.
- Medcom [IA][Direct] -
Supplies complete Internet solutions with products and services like firewalls, encryption software and security inspections.
- Merlin Systems [IA][Direct] -
Specializes in computer and network security and secure web development and enhancement services.
- Microcosm Ltd [IA][Direct] -
Copy protection (software and/or hardware based) and software licensing systems. Products include CopyControl and Dinkey Dongle.
- Miros [IA][Direct] -
TrueFace compares a live face image to a stored image to determine if a user is who he claims to be.
- MyCIO.com [IA][Direct] -
Delivers managed, hosted network security and availability services. From Network Associates.
- National Computer Registry [IA][Direct]
- NetworkGuys, Inc. [IA][Direct] -
Enterprise network security consulting and integration
- Neupart & Munkedal [IA][Direct] -
Specializes in doing Internet Security scannings and attacks, penetration tests.
- PC-Webonics [IA][Direct] -
Sells CGI/Perl scripts designed to combat hackers and password traders. Custom scripting available.
- PureEdge [IA][Direct] -
Providing legally binding XML solutions.
- Qualtec Data Products [IA][Direct] -
Manufactures PC and business security products. Included are PC theft deterrants; heavy duty data security; and accessories.
- SafeBIZ [IA][Direct] -
Offering peace of mind to consumers and increased traffic and sales to businesses.
- Safe Data System [IA][Direct] -
Security products that verify the identities of computer systems and network users and prevent unauthorized access to company resources.
- SecureHQ [IA][Direct] -
Specializes in security products and services, such as firewalls, intrusion detection, scanners, and more.
- SecureIT Securing Information Technology Assets [IA][Direct] -
Internet security firm that provides professional services, training and products to deploy enterprise security solutions.
- SecureLogix Corporation [IA][Direct] -
Offering network and telecommunication security products, consulting, and training.
- Secure Net [IA][Direct] -
Offers solutions for internet applications, remote banking, and data critical activities. Experienced with smart card technology and firewalls.
- Secure Network Group, Inc [IA][Direct] -
Security audits and solutions for internet/intranet.
- Security Engineering Services, Inc. [IA][Direct] -
Formed to address the growing demand for Information Security, Communications Security, TEMPEST, EMC, EMP, and other related disciplines.
- Security Portal [IA][Direct] -
Vendor of security hardware and software dedicated to providing security information to IT professionals.
- Shoghi Communications [IA][Direct] -
Caters to the requirements of secure communications for defence forces, government agencies, financial institutions, IT industries, business corporations, and individual users.
- Shufro Security [IA][Direct]
- SmartDisk Corporation [IA][Direct] -
Manufactures adapters for tranferring images, music, voice and data between PCs, the Internet and digital appliances that use flash memory and/or smart cards.
- Software House [IA][Direct] -
Developer and distributer of advanced card access and alarm monitoring systems for commercial, government, banking, and university facilities, world-wide.
- Spectrum Systems, Inc. [IA][Direct] -
Seeks to assist customers with network and information management and protection.
- Spyrus [IA][Direct] -
Manufacturer of PCMCIA crypto cards, security libraries, and secured applications.
- @Stake [IA][Direct] -
Services include infrastructure operations and content security, application security and access control.
- Symbolic [IA][Direct]
- TECSEC [IA][Direct] -
Develops security solutions for customers ranging from consumers to defense contractors.
- Theissen Security Systems Ltd. [IA][Direct] -
IS-Security consultancy, solution design and implementation as well as protection systems.
- TriStrata Security [IA][Direct] -
Provides guaranteed information security management solutions with performance and manageability essential to e-commerce on the Internet.
- Trusted Computer Solutions, Inc. [IA][Direct] -
Specializes in the development of trusted solutions to meet Department of Defense and commercial multilevel security requirements.
- Trusted Information Systems [IA][Direct] -
Developing information systems security solutions through research, consulting, and product development.
- Ubizen [IA][Direct] -
Offering security solutions for e-business which includes products and services for infrastructure and application security.
- USSR Labs [IA][Direct] -
Develops software anti-piracy tools, and offers security services.
- Vasco Data Security [IA][Direct] -
Remote access security.
- VPNcon [IA][Direct] -
Contains information on VPNs including conventions and exhibitions.
- WheelGroup Corporation [IA][Direct] -
Specializes in network-based intrusion detection and a provider of original solutions to complex network security problems.
- Windermere Information Technology Systems [IA][Direct] -
Providing technical support for information assurance.
- Zergo Ltd. [IA][Direct] -
Software, hardware, and consultation services for computer security from applications to networks.
|