Menu
Submit Site
Home
Computer
Security
All sites of Security
Praxiom Research Group
Praxiom Research Group- Plain English descriptions of ISO/IEC 27001, 27002 and other standards, including a list of the controls. ...
Wikipedia: ISO/IEC 27000-series
Wikipedia: ISO/IEC 27000-series- Open encyclopedia entry for the ISO/IEC 27000 family of information security management system standards, with links to pages on several standards in the family. ...
ISO27k Implementers' Forum
ISO27k Implementers' Forum- Google Groups discussion forum for those actively implementing the ISO/IEC 27000-series standards. ...
NERC Reliability Standards
NERC Reliability Standards- Information on the development of cyber and information security standards with emphasis on reliability. ...
The ISO 27000 Directory
The ISO 27000 Directory- Information covering the ISO/IEC 27000 series of standards, including updates and consultants directory ...
Common Criteria
Common Criteria- Provides the Common Criteria for Information Technology Security Evaluation. Also published as ISO/IEC 15408-1. ...
Yahoo! Groups iso-27001
Yahoo! Groups iso-27001- Discussion forum for ISO/IEC 27001 and 27002 ...
Jake Smith Consulting
Jake Smith Consulting- Consultant specialising in helping organisations achieve ISO/IEC 27001 compliance and certification. ...
Shared Assessments
Shared Assessments- Questionnaire and review process used to assess business partners' information security status using ISO/IEC 27002, COBIT, PCI-DSS and others. ...
IT Governance Limited
IT Governance Limited- Information, books and case studies on ISO/IEC 27001 and the other ISO27k standards ...
NIST Special Publication 800-53
NIST Special Publication 800-53- Recommended Security Controls for Federal Information Systems has a similar scope to ISO/IEC 27002 and cross-references the standard. ...
ISO/IEC 27000:2014
ISO/IEC 27000:2014- Introduces the ISO/IEC 27000 series of standards and provides a common glossary of information security terms used in the standards. Free download, 2014 edition. [ZIP file containing PDF] ...
SecuraStar
SecuraStar- An ISO 27001 consulting firm specializing in Information Security Management Systems (ISMS). ...
ISMS Manager Software
ISMS Manager Software- Software supporting an Information Security Management System ...
Information Security & Business Continuity Academy
Information Security & Business Continuity Academy- Training and consultancy support services for those implementing ISO/IEC 27001 and BS 25999-2 ...
ISMS Online
ISMS Online- Cloud service to support implementing, maintaining and improving your ISO/IEC 27001 information security management system. ...
ArticSoft
ArticSoft- PGP-based file and email encryption and digital signature software. ...
Encryption Wizard for Oracle
Encryption Wizard for Oracle- Offering data encryption software for the Oracle RDMBS. The Encryption Wizard can perform DES3 Encryption and obfuscation on a complete schema. ...
PMC Ciphers Inc.
PMC Ciphers Inc.- Company offering "polymorphic cryptography" i.e. variant algorithms and potentially huge keys. ...
Sigaba
Sigaba- Secure e-mail, instant messaging and document transmission. Product details, news, customer portfolio, support options and contact information. ...
DESlock+
DESlock+- Transparent encryption of files, folders and emails with an optional USB token. Supports AES, 3DES and Blowfish algorithms. ...
DISUK Limited
DISUK Limited- Supplier of data encryption devices for tape backup and archive drives. ...
Voltage Security Inc.
Voltage Security Inc.- Identity-based elliptic curve encryption for email, application data, laptops, removable storage devices and network shares. ...
Averina Software
Averina Software- Library for Authenticode signing and verification of executable files, drivers, catalogs and scripts. ...
xyzmo Software GmbH
xyzmo Software GmbH- Software to add digital signatures to electronic documents. Range includes software to generate a digital signature based on the biomentric generated by a handwritten signature. ...
Bloombase Technologies
Bloombase Technologies- Encryption for enterprise storage systems/databases, email and Service Oriented Architecture (SOA). ...
Cryptomathic
Cryptomathic- Encryption and authentication products including EMV card preparation systems. ...
Proofspace
Proofspace- Cryptographic time stamping solution for document verification and authentication. ...
JSignPdf
JSignPdf- Tool which adds digital signatures to PDF files. Written in Java and provided as open source. ...
Futurex
Futurex- Supplier of hardware security modules and key management systems for financial services. ...
Thales e-Security
Thales e-Security- Cryptographic products to secure electronic payments, network connections and SCADA systems, manage identities. ...
Distributed Management Systems Ltd.
Distributed Management Systems Ltd.- Manufacturer of user authentication tokens, including a CESG-certified version for UK Government use. ...
Conostix corporate web site.
Conostix corporate web site.- A security services and software company providing solutions for complex and distributed networked infrastructures. ...
Bodacion Technologies
Bodacion Technologies- Offers a hardware firewall. Description of capabilities and contact information. ...
Cleo Communications
Cleo Communications- Secure document transmission software, integrates with EDI systems. Product details, partner programs, support, FAQ and contact information. ...
Guidance Software
Guidance Software- Supplier of EnCase computer forensics software and hardware, plus training. ...
Digital Intelligence
Digital Intelligence- Hardware and software for the computer forensic community, law enforcement, intelligence organizations, and corporate security professionals. ...
AccessData
AccessData- Supplier of forensics tools for acquisition, decryption, analysis and reporting of digital evidence. ...
Data Security Inc.
Data Security Inc.- Department of Defense approved Degaussers for declassifying or destroying data on computer hard drives, hard disks and all types of magnetic tape formats. ...
Garner Products
Garner Products- Manufacturer of degaussers for erasing data and audio tapes, hard drives and other magnetic media. Also provide a mail-in degaussing service and equipment rentals. ...
The Sleuth Kit
The Sleuth Kit- The Sleuth Kit and Autopsy Browser are UNIX open source digital forensic analysis tools, based on The Coroner's Toolkit, used to examine NTFS, FAT, FFS, EXT2FS and EXT3FS files. ...
Hot Pepper Technology, Inc.
Hot Pepper Technology, Inc.- E-Mail Detective can retrieve AOL email that has been cached or saved on a user's disk drive, complete with embedded pictures. ...
Data Devices International: Degaussers
Data Devices International: Degaussers- Provides information on a complete line of degaussers, including manual units, and related equipment. ...
Data Eliminate Ltd.
Data Eliminate Ltd.- London-based company providing secure disposal of storage media (computer disks, paperwork etc.). ...
Simple Carver Suite
Simple Carver Suite- Software tools for forensic analysis, eDiscovery, data recovery, file identification and classification, and data research. ...
Digital Detective Group Ltd.
Digital Detective Group Ltd.- Provider of digital forensic software capable of analysing forensic images for browser histories, Outlook Express and other files. ...
Logicube Forensics
Logicube Forensics- Suppliers of products for forensic data capture, storage, communications and analysis. ...
H-11 Digital Forensic Services
H-11 Digital Forensic Services- Supplier of forensics hardware, software, training and services, including cellphone forensics. ...
Win-Spy
Win-Spy- Utility to monitor computer activities. ...
Wizard Industries
Wizard Industries- Offers software that removes files saved by websites, a password recovery program, and a key logger. ...
« First
Previous
Page 21 of 42.
Next
Last »
Latest sites from Security
HoneyDrive Desktop
SecureLab
Security Focus
CERT Coordination Center
CR80 News
Heimdal
CyberEvidence, Inc.
JurInnov Ltd.
G-C Partners
Secure Crossing
Privacy Scan
Red Iron
Degausser.co.uk
TSFactory
Nmap
Avatier Corporation
Yoggie Security Systems
Nsauditor.com
Inguama
Sybari Software, Inc.
Declude Virus
Avira
CAcert
Checkpoint
InfoExpress
Send feedback
submit