List Categories and Listings by I

IP-Granite is capable of securing all your information travelling over the Intranet or the Internet. Making use of the widely respected IPSec protocol, IP-Granite authenticates users, servers and gateways to one another, encrypting all communication flowi ...

Category VPN Servers
VendorTrispen Technologies
Pricing ModelCommercial
Modified

InstaGate security gateways are scalable unified threat management (UTM) solutions that combine Anti-Virus, Spyware, Spam, Phishing and Intrusion Prevention and more into a high performance Deep Packet Inspection (DPI) Firewall and IPSec VPN architecture. ...

VendoreSoft Inc.
Pricing ModelCommercial
ModifiedNever

The largest of the Ingate Firewall? series, the Ingate Firewall 1880 provides complete firewall security with minimal effort and risk. The Ingate Firewall 1880 is designed for enterprises requiring the most demanding applications and features high through ...

VendorIngate
Pricing ModelCommercial
ModifiedNever

Invisible Secrets 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files ...

VendorNeoByte Solutions
Pricing ModelCommercial
Modified

Features include: IDA Pro is programmable through a built-in C like language. IDA offers an open Plugin Architecture. Our PE debugger is nothing more than a plugin! Multiple Processor : same interface and features for dozens of processors. 80x86 Windo ...

Category Forensic Tools
VendorDataRescue
Pricing ModelCOMMERCIAL
Modified

Insightix NAC ? Stateful Network Access Control. Insightix NAC delivers stateful network access control, ensuring that only authorized and compliant devices are allowed to access and operate on the enterprise network. Insightix NAC utilizes agentless Sta ...

VendorInsightix
Pricing ModelFreeware, Licensed under GPL
Modified
Interscan VirusWall

Trend Micro InterScan VirusWall provides complete protection against all Internet-borne threats from the leader in gateway antivirus solutions. Consolidate your infrastructure and reduce total cost of ownership through single-vendor support and maintenanc ...

Category Servers
VendorTrend Micro
Pricing ModelCommercial
Modified

Integrated Avast! antivirus engine from Alwil Software is a comprehensive high-performance virus management solution with multi-threaded engine to ensure low latency to traffic. It leverages both heuristic and signature based technologies and scans all co ...

Category Servers
VendorIce Warp Software
Pricing ModelCommercial
Modified
InterScan WebProtect for ISA

Protect your users from viruses and malicious code by blocking them at the Internet gateway—before they reach endpoint devices and slow your network—with Trend Micro InterScan WebProtect for ISA. An easy-to-install addition to Microsoft ISA Server, InterS ...

Category ISA Server
VendorTrendMicro
Pricing ModelCommercial
Modified

InVircible is a security software package to protect personal computers and PC networks from being attacked by virus or other forms of malicious code. InVircible is based on unique and proven generic technology, that provides for its exceptional performa ...

Category Enterprise
VendorNetZ Computing
Pricing ModelCommercial
Modified

Ensures your inbox remains 100% spam-free. Simple to install and use. Starts working immediately on installation. Quick and easy to identify legitimate email in the Quarantine Folder bevause the spam-probability score is displayed. Works alongside any exi ...

VendorSentryBay
Pricing ModelFree Trial
Modified

InBoxer is so effective because, unlike one-size-fits-all antispam products, it uses sophisticated language technology to learn what interests you. Your one-of-a-kind spam filter is based on your Inbox. Customization makes InBoxer tougher for spammers to ...

VendorInBoxer
Pricing ModelCommercial
Modified
iHateSpam

Eliminate annoying spam from your Outlook or Outlook Express inbox with award-winning anti-spam software. iHateSpam is a superior Outlook spam filter for personal PC use delivering reliable email security blocking spam and filtering junkmail. Download and ...

VendorSunbelt Software
Pricing ModelLimited Free Trial
Modified

IceWarp Mail Server delivers a highly integrated solution, including Mail Server with dual Anti-Spam & Anti-Virus protection and available add on options including the IceWarp GroupWare Server, Instant Messaging Server, Text Messaging Server, a unified We ...

VendorIceWarp Software
Pricing ModelCommercial
Modified

IMGate: Enterprise-Grade Mail Firewall Solution * A complete mail firewall with anti-spam and anti-virus in multiple layers * IMGate supports the smallest to the largest mail volumes * IMGate works with any brand of mail server * Sup ...

VendorLen Conrad
Pricing ModelCommercial
Modified

With the widest, most comprehensive range of message interception, handling and monitoring options, M-Switch Anti-Spam is your best defence against spam. A flexible server-based solution that defeats spam before it reaches the user's desktop, M-Switch An ...

VendorIsode
Pricing ModelCommercial
Modified

ISACA (Information Systems Audit and Control Association and Foundation), a recognized global leader in IT governance, control and assurance, is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in ...

VendorISACA
Pricing ModelCommercial
Modified

The main goal of this conference is to promote research on all aspects of network security and cryptology.

VendorCANS
Pricing ModelCommercial
Modified

For many years, Information Hiding has captured the imagination of researchers. Digital watermarking and steganography tools are used to address digital rights management, protect information, and conceal secrets. From an investigators perspective, inform ...

VendorIH
Pricing ModelCommercial
Modified

Information assurance and security has become an important research issue in networked and distributed information sharing environments. Finding effective ways to protect information systems, networks and sensitive data within the critical information inf ...

ModifiedNever

© Computer Network Defence Limited 2021