Menu
Submit Site
Home
Computer
Security
All sites of Security
Secoda Risk Management
Secoda Risk Management- RuleSafe from Secoda enables the people in your organisation to achieve real awareness of policies. Expert content and compliance tracking help organisations implement security (BS7799), privacy a ...
Advent Information Management Ltd
Advent Information Management Ltd- Knowledge based consultancy offering information management advice, training and consultancy. ...
PSS Systems
PSS Systems- Document policy management and enforcement for electronic documents. Enterprise software to protect, track and ensure the destruction of highly mobile, distributed assets. ...
Citicus ONE
Citicus ONE- Offers tools for information risk management to ensure that compliance with security policy can be monitored and enhanced. ...
SecureInfo Corporation
SecureInfo Corporation- Delivers solutions that simplify and automate security compliance for government and financial services. ...
Information Shield, Inc
Information Shield, Inc- A global provider of pre-packaged security policies and customizable implementation guidance. ...
Atsec
Atsec- Atsec offers standards-based IT security testing, evaluation and consulting. The range of standards include Common Criteria, FIPS 140-2, GSA FIPS 201, PCI DSS, PCI PA-DSS, ISO/IEC 27001 and others. ...
Ruskwig Security Portal
Ruskwig Security Portal- Provides security policies, an encryption package, security policy templates, internet and e-mail usage policies ...
BindView Policy Compliance
BindView Policy Compliance- Provides organizations with advanced tools to proactively build and measure security best practices across the enterprise. ...
AMPEG Security Lighthouse
AMPEG Security Lighthouse- Produce information security management software which provides a national and international perspective on your company's security status. ...
CoSoSys SRL
CoSoSys SRL- Provide software to protect PC endpoints and networks. ...
Layton Technology Inc
Layton Technology Inc- Offers a range of Windows based audit, monitoring and access control software solutions. ...
Singular Security
Singular Security- A firm specializing in delivering security configuration management services designed to mitigate both computing and company-wide policy compliance requirements. ...
Delta Risk LLC
Delta Risk LLC- Provides information on a range of policy related services, including risk assessment, awareness and training. ...
Megaprime
Megaprime- Offers ISO/IEC 17799 compliant information security policy and management systems, security architectures, secure applications and networks. ...
Patron Systems
Patron Systems- Provider of email policy management, email archiving, encryption, discovery and mailbox management solutions. ...
Corsec Security
Corsec Security- Provides assistance to commercial vendors in achieving FIPS 140-2 and Common Criteria (CC) government validations. ...
EnLogica Solutions
EnLogica Solutions- Provides IT Security, Information Assurance, IT Architecture, Engineering, Operation and Maintenance services to commercial and Government customers. ...
Minuteman Governance
Minuteman Governance- Develops comprehensive data governance strategies with emphasis on data protection. ...
Sailpoint IdentityIQ Software
Sailpoint IdentityIQ Software- Offers an identity governance solution intended to reduce the cost, complexity and burden of security and compliance initiatives. ...
Secunets Technologies
Secunets Technologies- Offers consultancy services specialising in S.S.L Certificate installation and open source. ...
ProtectMyNet
ProtectMyNet- Provides network security best practices, tips, news, and consulting for businesses, government and educational markets. ...
High-Tech Bridge SA
High-Tech Bridge SA- Offers ethical hacking by penetration testing, website and web application vulnerability scanning, Computer crime investigation and prevention expert services that are vendor and product independent. ...
The Mobile Resource Group
The Mobile Resource Group- Offers CMDSP, a certification in the field of mobile device security. ...
SaaSAssurance
SaaSAssurance- Provides a software solution for implementation and ongoing management of information security standards. ...
Security Ontology
Security Ontology- The security ontology offers innovative software solutions in the areas of IT-security, semantic technologies, and sustainability. ...
FullArmor
FullArmor- Providers of group policy management solutions for Active Directory. ...
SafetySend
SafetySend- HIPAA compliant software solutions such as secure email, secure gateway, and HIPAA compliance information. ...
Department of Health & Human Services - HIPAA
Department of Health & Human Services - HIPAA- The official central governmental hub for all HIPAA issues including rules, standards and implementation guides. ...
HIPAA Full Text
HIPAA Full Text- The complete reference text of HIPAA in direct browsable format. ...
HIPAA Survival Guide
HIPAA Survival Guide- Provides complete cross-linked HITECH Act and HIPAA regulation text with summaries and commentary on pertinent topics. ...
University Information Security Policies
University Information Security Policies- Electronic resource usage and security policies from the University of Pennsylvania. ...
ISO/IEC 27001 Policies
ISO/IEC 27001 Policies- Typical headings for a security policy aligned broadly with the ISO/IEC 27002 standard for information security management systems. ...
Telecommuting/Teleworking Policy
Telecommuting/Teleworking Policy- Sample policy on teleworking covering employment as well as information security issues. ...
Network Security Policy Guide
Network Security Policy Guide- Watchguard's guide to creating an overarching network information security policy, supported by subsidiary policies. ...
Personnel Security Policy
Personnel Security Policy- Example policy covering pre-employment screening, security policy training etc. ...
Internet Acceptable Use Policy
Internet Acceptable Use Policy- One page Acceptable Use Policy example. ...
Disaster Recovery Policy
Disaster Recovery Policy- Basic DR policy in just over one side. ...
University Information Security Policies
University Information Security Policies- A set of information security policies from the University of Louisville. ...
Backup Policy
Backup Policy- Sample policy requires a cycle of daily and weekly backups (although monthly backups are also advisable!). ...
Campus Security Policy
Campus Security Policy- An overarching security policy from Berkeley University includes links to more specific and detailed policies. ...
Campus Security Policy
Campus Security Policy- A high level information security policy from Washington University. ...
FIPS 140-2 Security Policy
FIPS 140-2 Security Policy- Security policy for the OpenSSL FIPS software object module, required for validation against FIPS (Federal Information Processing Standard) 140-2. ...
Information Security Policies
Information Security Policies- Policies from CSPO Tools Inc., some of which are available without charge as PDF files or for an annual subscription as MS Word files, along with additional content. ...
Acceptable Use Policy Template
Acceptable Use Policy Template- A basic acceptable use policy, from the State of California Office of Information Security. [MS Word] ...
Antivirus Policy
Antivirus Policy- From the State of Vermont Agency of Administration. Mandates the use of antivirus software on applicable systems. ...
Incident Response Policy
Incident Response Policy- From the State of Vermont Agency of Administration. Policy defining the essential elements of the process for responding to security incidents. ...
Intrusion Detection and Prevention Policy
Intrusion Detection and Prevention Policy- From the State of Vermont Agency of Administration. Policy on specifying, installing and using IDS/IPS. ...
Physical Security for Computer Protection Policy
Physical Security for Computer Protection Policy- From the State of Vermont Agency of Administration. Covers physical access controls and the secure provision of power etc. to a computer room. ...
Acceptable Use Policy
Acceptable Use Policy- Template policy clarifying the acceptable use of IT devices and networks. [MS Word] ...
« First
Previous
Page 19 of 42.
Next
Last »
Latest sites from Security
HoneyDrive Desktop
SecureLab
Security Focus
CERT Coordination Center
CR80 News
Heimdal
CyberEvidence, Inc.
JurInnov Ltd.
G-C Partners
Secure Crossing
Privacy Scan
Red Iron
Degausser.co.uk
TSFactory
Nmap
Avatier Corporation
Yoggie Security Systems
Nsauditor.com
Inguama
Sybari Software, Inc.
Declude Virus
Avira
CAcert
Checkpoint
InfoExpress
Send feedback
submit