IP-Granite is capable of securing all your information travelling over the Intranet or the Internet. Making use of the widely respected IPSec protocol, IP-Granite authenticates users, servers and gateways to one another, encrypting all communication flowi ...
InstaGate security gateways are scalable unified threat management (UTM) solutions that combine Anti-Virus, Spyware, Spam, Phishing and Intrusion Prevention and more into a high performance Deep Packet Inspection (DPI) Firewall and IPSec VPN architecture. ...
The largest of the Ingate Firewall? series, the Ingate Firewall 1880 provides complete firewall security with minimal effort and risk. The Ingate Firewall 1880 is designed for enterprises requiring the most demanding applications and features high through ...
Invisible Secrets 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files ...
Features include: IDA Pro is programmable through a built-in C like language. IDA offers an open Plugin Architecture. Our PE debugger is nothing more than a plugin! Multiple Processor : same interface and features for dozens of processors. 80x86 Windo ...
Insightix NAC ? Stateful Network Access Control. Insightix NAC delivers stateful network access control, ensuring that only authorized and compliant devices are allowed to access and operate on the enterprise network. Insightix NAC utilizes agentless Sta ...
Trend Micro InterScan VirusWall provides complete protection against all Internet-borne threats from the leader in gateway antivirus solutions. Consolidate your infrastructure and reduce total cost of ownership through single-vendor support and maintenanc ...
Integrated Avast! antivirus engine from Alwil Software is a comprehensive high-performance virus management solution with multi-threaded engine to ensure low latency to traffic. It leverages both heuristic and signature based technologies and scans all co ...
Protect your users from viruses and malicious code by blocking them at the Internet gateway—before they reach endpoint devices and slow your network—with Trend Micro InterScan WebProtect for ISA. An easy-to-install addition to Microsoft ISA Server, InterS ...
InVircible is a security software package to protect personal computers and PC networks from being attacked by virus or other forms of malicious code. InVircible is based on unique and proven generic technology, that provides for its exceptional performa ...
Ensures your inbox remains 100% spam-free. Simple to install and use. Starts working immediately on installation. Quick and easy to identify legitimate email in the Quarantine Folder bevause the spam-probability score is displayed. Works alongside any exi ...
InBoxer is so effective because, unlike one-size-fits-all antispam products, it uses sophisticated language technology to learn what interests you. Your one-of-a-kind spam filter is based on your Inbox. Customization makes InBoxer tougher for spammers to ...
Eliminate annoying spam from your Outlook or Outlook Express inbox with award-winning anti-spam software. iHateSpam is a superior Outlook spam filter for personal PC use delivering reliable email security blocking spam and filtering junkmail. Download and ...
IceWarp Mail Server delivers a highly integrated solution, including Mail Server with dual Anti-Spam & Anti-Virus protection and available add on options including the IceWarp GroupWare Server, Instant Messaging Server, Text Messaging Server, a unified We ...
IMGate: Enterprise-Grade Mail Firewall Solution * A complete mail firewall with anti-spam and anti-virus in multiple layers * IMGate supports the smallest to the largest mail volumes * IMGate works with any brand of mail server * Sup ...
With the widest, most comprehensive range of message interception, handling and monitoring options, M-Switch Anti-Spam is your best defence against spam. A flexible server-based solution that defeats spam before it reaches the user's desktop, M-Switch An ...
ISACA (Information Systems Audit and Control Association and Foundation), a recognized global leader in IT governance, control and assurance, is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in ...
The main goal of this conference is to promote research on all aspects of network security and cryptology.
For many years, Information Hiding has captured the imagination of researchers. Digital watermarking and steganography tools are used to address digital rights management, protect information, and conceal secrets. From an investigators perspective, inform ...
Information assurance and security has become an important research issue in networked and distributed information sharing environments. Finding effective ways to protect information systems, networks and sensitive data within the critical information inf ...