IT Security: Risking the Corporation
| The following vendors are good companies to know if you're looking for security-related products. Some of these companies also have security consulting and training available: Absolute Software Corporation
www.absolute.com Consulting services Monitoring and tracking systems AccessData Corp.
www.accessdata.com Password recovery Password control products ActivCard, Inc.
www.activcard.com Password and password generation Smart card/tokens Web server security Aladdin Knowledge Systems, Inc.
www.ealaddin.com Access control Alternative Computer Technology, Inc.
www.altcomp.com Biometrics File encryption Firewalls Virus protection/detection ArcSight
www.arcsight.com Enterprise security management Correlation, investigating, and reporting Argus Systems Group, Inc.
www.argus-systems.com Access control Electronic commerce Policy management Firewalls Web security Astaro Corporation
www.astaro.com Internet security appliances Authenex
www.authenex.com Authentication system Authentify
www.authentify.com Internet identity solutions Aventail Corp.
www.aventail.com Data access software Virtual private network Baltimore Technologies
www.baltimore.com Application security Digital signatures and CA authorities Electronic commerce Web server security Bigfix
www.bigfix.com Patch management Bindview Development
www.bindview.com Intrusion/misuse detection Secure operating systems Biometric Access Corp.
www.biometricaccess.com Authentication of users/terminals Personnel identification systems biometrics Bioscrypt Inc
www.bioscrypt.com Authentication Personnel identification systems biometrics BLOCKADE Systems Corp.
www.blockade.com Data access software Firewalls Internet filtering and monitoring Network monitoring Password and password generation Web server security BLUE LANCE
www.bluelance.com Intrusion/misuse detection Network monitoring Risk analysis BorderWare Technologies Inc.
www.borderware.com Firewalls Operating-system security Secure remote access BRICKServer™
www.thirdpig.com Secure Web appliance The Buddy System®
www.buddysystem.net Risk analysis and management Camelot
www.camelot.com Data access Policies and procedures Security software Captus Networks
www.captusnetworks.com Firewalls Intrusion misuse detection Network monitoring Certco
www.certco.com Digital signatures and certification authorities Electronic commerce Certicom Corp.
www.certicom.com Applications Certification authority Cryptographic development products Fax security Check Point
www.checkpoint.com Firewalls Policies and procedures VPN management Chrysalis-ITS
www.chrysalis-its.com Digital signatures and certificate authorities Smart cards/tokens Virtual private networks Cisco Systems, Inc.
www.cisco.com Consulting services Firewalls Intrusion/monitoring detection Citadel Computer Systems
www.citadel.com Access control Security management File encryption CMS Technologies
www.cmstech.com Asset control Electronic alarms Intrusion/misuse detection Codex Data Systems
www.codexdatasystems.com Intrusion/misuse detection Monitoring systems Network monitoring Cogentric
www.cogentric.com Policies and procedures Risk analysis Security performance assessment Communication Devices, Inc.
www.commdevices.com Consulting services Port protection/screening devices Security modems Smart cards/tokens Computer Associates
www.ca.com Consulting services Enterprise security management Computer Sentry Software
www.sentryinc.com Laptop theft notification Computer Sciences Corporation
www.csc.com Security consulting services Awareness tools and materials Digital signatures and certificate authorities Risk analysis ComputerCOP Corp
www.computercop.com Education training Internet filtering and monitoring Other firewalls and Internet security Other intrusion detection PIN generators Scanning/testing tools Computer Security Products, Inc.
www.computersecurity.com Cables Data access software Electronic alarms Identification marking systems Monitoring systems Conclusive
www.conclusive.com Applications Data access Intrusion/misuse detection Web server security CONSUL risk
www.consul.com Auditing and risk management Counterpane Internet Security, Inc.
www.counterpane.com Electronic commerce Intrusion/misuse detection Network monitoring Cranite Systems
www.cranite.com Wireless LAN security CRYPTOCard
www.cryptocard.com Password and password-generation systems PIN generators Single sign-on Smart cards/tokens Web server security CyberGuard Corporation
www.cyberguard.com Firewalls Secure operating system Cyber-Ark Software
www.cyber-ark.com Enterprise security solutions Cyber Safe Corporation
www.cybersafe.com Consulting services Data access software Policies and procedures Single sign-on Smart cards/tokens Web server security Cyber-SIGN
www.cybersign.com Authentic electronic signatures Secure user verification CyberSoft, Inc.
www.cyber.com Intrusion/misuse detection Virus protection/detection Cylink
www.cylink.com Digital signatures and CA authorities Policies and procedures Smart cards/tokens Datacard Corp.
www.datacard.com Identification solutions DataKey, Inc.
www.datakey.com Digital signatures and CA authorities Smart cards/tokens DataLynx, Inc.
www.dlxguard.com Applications Electronic commerce Firewalls Intrusion/misuse detection Password and password generation Policies and procedures Web server security Digital Delivery Inc.
www.digitaldelivery.com Data encryption Secure data distribution DIVERSINET Corp.
www.dvnet.com Electronic commerce Secured wireless communication ENSURE Technologies
www.ensuretech.com Intrusion/misuse detection Entrust Technologies
www.entrust.com Digital signatures and CA authorities EyeDentify, Inc.
www.eyedentify.com Personnel identification systems biometrics eEye Digital Security
www.eeye.com Communications and network security Information security review Network monitoring Risk analysis Scanning/testing tools Security software Web server security Entegrity Solutions
www.entegrity.com Data Access Single Sign On Web Server Security Entercept Security Technologies
www.entercept.com Intrusion/misuse detection Secure operating systems Web server security eSecurity, Inc.
www.esecurityinc.com Network monitoring eSecurityOnline LLC
www.esecurityonline.com Policies and proceedures Risk analysis Scanning/testing tools FinJan
www.finjan.com Firewalls Internet filtering and monitoring tools Foundstone
www.foundstone.com Communications and network security Information security review Intrusion/misuse detection Scanning/testing tools Virus protection/detection Forescout
www.forescout.com Perimeter defense and blocking attacks F-Secure Inc.
www.fsecure.com Mobile security solutions Funk Software, Inc.
www.funk.com Remote access Authentication Gemplus Corp
www.gemplus.com Applications Smart cards Gemini Computers, Inc.
www.geminisecure.com Authentication of users/terminals Consulting services Digital signatures and CA authorities Electronic commerce Firewalls Secure operating systems Web server security Gilian Technologies Inc.
www.gilian.com Web content security Global Technology Associates, Inc.
www.gta.com Firewalls Global Technologies Group, Inc.
www.gtgi.com Antitheft, antiforgery, antitampering Applications CD-ROM security Firewalls Identification systems Great Circle Associates
www.greatcircle.com Consulting service Firewalls Seminars/workshops Guidance Software
www.encase.com Investigative and forensic solutions CyberSafe
www.cybersafe.com Outsourced security solutions Harris Corporation
www.harris.com Intrusion/misuse detection Network monitoring Hewlett-Packard Corporation
www.hp.com Applications Electronic commerce Firewalls Web server security Hifn
www.hifn.com Encryption processors IBM
www.ibm.com Consulting services Electronic commerce Firewalls Digital signatures and CA authorities Intrusion misuse/detection Policies and procedures Secure email Info Express, Inc.
www.infoexpress.com Personal firewall Remote access Integralis
www.integralis.com Firewalls Firewall management Internet filtering and monitoring tools Intel Corporation
www.intel.com Virus protection/detection Web server security Intellitactics.com
www.intellitactics.com Enterprise security management Intrusion Inc.
www.intrusion.com Intrusion/misuse detection Network monitoring IntruVert
www.intruvert.com High-speed intrusion-detection systems Investigative Group International
www.igint.com Consulting Forensics tools ISS
www.iss.net Intrusion Misuse Detection Network Auditing Scanning Testing Tools Security Management Training Web Server Security Kyberpass Corporation
www.kyberpass.com Authentication Digital signatures and CA authorities Lancope
www.lanscope.com Intrusion-detection appliance LJK Software
www.ljk.com Secure single sign-on Lucent Technologies
www.lucent.com/security Access control Network management Lumeta Corporation
www.lumeta.com Network topology visualization tools MessageLabs
www.messagelabs.com Email security McAfee
www.mcafee.com Virus detection/misuse nCipher Corporation Ltd.
www.ncipher.com Cryptographic products nCircle
www.ncircle.com Security management Intrusion detection Exposure management solutions NetScreen
www.netscreen.com Integrated security appliances Netegrity, Inc.
www.netegrity.com Access control Electronic commerce netForensics
www.netforensics.com Internet filtering and monitoring Intrusion/misuse detection Network monitoring NetScreen Technologies, Inc.
www.netscreen.com Firewalls Internet filtering and monitoring Virtual private network Network-1 Security Solutions, Inc.
www.network-1.com Firewalls Internet filtering and monitoring Intrusion/misuse detection Network Associates
www.nai.com Access control Consulting services Encryption products Intrusion detection/misuse Network management Network monitoring Secure email Virus protection Web server security Network Engineering Software, Inc.
www.fireants.com Firewalls NFR Security
www.nfr.com Intrusion/misuse detection Network forensics Policies and proceedures netForensics
www.netforensics.com Security information management solutions NetIQ Corporation WebTrends Corp.
www.netiqwebtrends.com Network monitoring Vulnerability management Web server security NIKSUN Inc.
www.nicksun.com Internet filtering and monitoring Network monitoring Nokia Internet Communications
www.nokia.com Firewalls Internet filtering and monitoring Network monitoring OmniSecure
www.omnisecure.com Storage encryption solutions OneSecure
www.onesecure.com Firewalls Intrusion/misuse detection Virtual private network Palisade Systems
www.palisadesys.com Network security appliances PassLogix
www.passlogix.com Password and password generation Pelican Security
www.pelicansecurity.com Internet filtering and monitoring Other firewalls and Internet security Virus protection/detection PentaSafe Security Technologies, Inc.
www.pentasafe.com Data access control Intrusion/misuse detection Network monitoring Policies and proceedures Scanning and testing tools Web server security Phaos Technology Corporation
www.phaos.com Encryption products Electronic commerce PostX Corporation
www.postx.com Secure email Predictive Systems, Inc.
www.predictive.com Security consulting services Communications and network security Disaster recovery Firewalls Intrusion/misuse detection Network monitoring Promptus
www.promptus.com Encryption products Protegrity
www.protegrity.com Access control Encryption products Policy management Psionic Technologies
www.psionic.com Intrusion verification and resolution software Qualys, Inc.
www.qualys.com Intrusion/misuse detection Network monitoring Scanning/testing tools Rainbow Technologies
www.rainbow.com Authentication of users/terminals Smart cards/tokens Software copy protection Virtual private network Recognition Systems Inc.
www.handreader.com Authentication of users/terminals Personal identification systems/ biomentrics Recourse Technologies (acquired by Symantec)
www.recourse.com Intrusion/misuse detection Network monitoring Threat management HoneyPot technology Riptech (acquired by Symantec)
www.riptech.com Real-time managed security services RiskWatch
www.riskwatch.com Risk assessment software RockSoft
www.rocksoft.com Data integrity RSA Data Security
www.rsasecurity.com Applications Digital signatures and CA authorities Electronic commerce Secure email Encryption products S4Software, Inc.
www.dli-security.com Centralized account management Access control Safetynet Security
www.safetynet.com Virus misuse/detection SAIC
www.saic.com Consulting services Security applications SAINT Corporation
www.saintcorporation.com Tool kit for detecting network vulnerabilities Sandstorm Enterprises, Inc.
www.sandstorm.net Intrusion/misuse detection Network monitoring Other telecommunications Savvydata
www.savvydata.com Policy violation auditing Schlumberger
www.schlumberger.com Secure wireless communications Smart cards Secure Computing
www.securecomputing.com Access control Firewalls Internet filtering and monitoring tools Remote access security Web security SecureLogix Corporation
www.securelogix.com Telecom security SecureNet Technologies
www.securenet.org Virus Protection/Detection ServGate
www.servgate.com Internet security devices SecureWorks
www.secureworks.com Intrusion/misuse detection Network monitoring Securify, Inc.
www.securify.com Consulting services Digital signatures and certificate authorities Network monitoring Smart cards SecurityFocus (acquired by Symantec)
www.securityfocus.com Education training Interactive training Network monitoring Notification services Other intrusion detection Vulnerability management Sequel Technology Corp.
www.sequeltech.com Internet filtering and monitoring Silanis Technology
www.silanis.com Authentication Secure electronic signatures SilentRunner Inc.
www.silentrunner.com Network security analysis products Silicon Defense
www.silicondefense.com Network intrusion-detection products SonicWALL
www.sonicwall.com Internet security appliance SourceFire
www.sourcefire.com Network intrusion-detection system SPI Dynamics
www.spidynamics.com Web application security assessment products Stonesoft
www.stonesoft.com Firewall and VPN High-availability clustering solutions Stratum8 Networks
www.stratum8.com Real-time application protection SurfControl
www.surfcontrol.com Internet filtering/monitoring Network monitoring Spyrus, Inc.
www.spyrus.com Digital signatures and CA Electronic commerce Smart cards SSH Communications Security
www.ssh.com Data access Data access software Virtual private network Stonebridge
www.stonebridgenetworks.com Communications and network security Education/training Sun Microsystems
www.sun.com/security Consulting services Firewalls VPN Sygate Technologies
www.sygate.com Distributed security policy management Symantec
www.symantec.com Vulnerability management Integrated gateway security Firewall VPN Virus protection and content filtering Enterprise administration Intrusion detection Security management Tally Systems
www.tallysystems.com Network monitoring Policies and procedures Scanning/testing tools Security performance assessment T-NETIX
www.t-netix.com Authentication of users/terminals Consulting services Personal identification systems biometrics PBX security Talos Technology Consulting, Inc.
www.talos.com Authentication of users/terminals Personnel identification systems biometrics Technical Communications Corp
www.tccsecure.com Anti-eavesdropping Applications Secure faxes TenFour U.S. Inc.
www.tenfour.com Content filtering Secure email Secure messaging Virus scanning Thawte Certification
www.thawte.com Digital certificate services Thrupoint
www.thrupoint.com Consulting services Communication and network security Disaster recovery TippingPoint Technologies
www.tippingpoint.com Network defense appliance Tivoli Software from IBM
www.tivoli.com Applications Data access Electronic commerce. Intrusion/misuse detection Secure operating system Single sign-on Top Layer
www.toplayer.com Firewalls Internet filtering and monitoring Intrusion/misuse detection Scanning/testing tools Web server security Trend Micro, Inc.
www.antivirus.com Consulting services Virus protection/detection Trintech Group
www.trintech.com Electronic commerce Tripwire, Inc.
www.tripwire.com File integrity assessment Intrusion detection/prevention TruSecure
www.trusecure.com Managed security provider TrustWorks
www.trustworks.com Virtual private networks Tumbleweed Communications Corp
www.tumbleweed.com Managing secure communications Ubizen
www.ubizen.com Applications Digital signatures and certificate authorities Internet filtering and monitoring Network monitoring Web server security Unisys
www.unisys.com Authentication of terminals/users Single sign-on Vanguard Integrity Professionals
www.go2vanguard.com Applications Security conference VeriSign
www.verisign.com Data access Digital certificates and key management Single sign-on Vasco
www.vasco.com Encryption products Secure remote access V-ONE Corporation
www.v-one.com Firewalls Secure computer systems/processors Smart cards/tokens Personal identification systems Policies and procedures WatchGuard Technologies, Inc.
www.watchguard.com Access control Firewalls Internet filtering and monitoring tools Virtual private network Web server security WinMagic Inc.
www.winmagic.com File encryption products Zero Knowledge Systems
www.freedom.net Secure communications Zone Labs, Inc.
www.zonelabs.com Firewalls Internet filtering and monitoring Policies and proceedures |