Sort
Industry leading HSMs, Key Management, Network Encryption, Time Stamping, & other data security solutions that deliver operational efficiency. Training and certification services provide your team with the knowledge and skills they need to design effective security strategies, utilize Thales e-Security products with confidence, and maximize the ROI in data protection solutions. NShield HSMs...
Rank
1
Vote
Sponsor
0.0
The most powerful data-centric security software. Protect your data with cryptographic splitting encryption, provide access controls, and meet compliance. SPxSHARC ll software is the most secure way of storing data-at-rest in all environments through its FIPS 140-2 certified, EAL4+ compliance and AES-256 encryption. Further fortified with 300+ patents on its cryptographic splitting core...
Rank
2
Vote
Sponsor
0.0
HPE Security - Data Security delivers data-centric security software solutions to protect data across enterprise, cloud, mobile devices, and big data environments. HPE Security – Data Security provides best-in-class data encryption and tokenization for structured and unstructured data and enables...
Rank
3
Vote
Sponsor
0.0
Stay one step ahead of threats with Check Point’s industry leading cyber security products for threat prevention, mobile security, data centers, next-generation firewalls, and security management. With Check Point SandBlast, we have gained real-time protection against zero-day attacks using...
Rank
4
Vote
Sponsor
0.0
The CIS Security Benchmarks program provides well-defined, un-biased and consensus-based industry best practices to help organizations assess and improve their security. Resources include secure configuration benchmarks, automated configuration assessment tools and content, security metrics and...
Rank
5
Vote
Sponsor
0.0
Share your knowledge & discuss all aspects of Computer & Internet Security via a worldwide community. Discussion specific to networks and networking. Issues covered include: Internet access, Wireless Networks (Wifi / WLAN's), Routing, Gateways, Internet Sharing, WAPS, WEP, war-driving, SID's and how to setup and secure your WAP and WLAN. For discussions related to the design and dissection of...
Rank
6
Vote
Sponsor
0.0
Last year, on October 21, your digital video recorder ­- or at least a DVR like yours ­- knocked Twitter off the internet. Someone used your DVR, along with millions of insecure webcams, routers, and other connected devices, to launch an attack that started a chain reaction, resulting in Twitter, Reddit, Netflix, and many sites going off the internet. You probably didn't realize that your DVR...
Rank
7
Vote
Sponsor
0.0
SSL Certificates from DigiCert provide the strongest encryption available, using 2048-bit and SHA-2, and are available in a variety of options designed to meet your needs. Whether you need Wildcard SSL for multiple sub-domains, a Multi Domain designed for Microsoft Exchange Server, occasionally referred to as a Multi-Domain Certificate (MDC) or Subject Alternative Name (SAN) Certificate, the...
Rank
8
Vote
Sponsor
0.0
The latest In-depth product reviews, buyerâ s guides, product comparisons, news, market analysis, whitepapers, and other information on IT security. A thorough security audit can be an eye opener for any organization. Does yours need one? Take a look at our whitepapers, features and tools to find out whether you need one and what you need to do. VISIT OUR OTHER SITES: VoIP • Wireless • Network...
Rank
9
Vote
Sponsor
0.0
Vormetric’s comprehensive high performance data security platform helps companies move confidently and quickly. Our seamless and scalable platform is the most effective way to protect data wherever it resides—any file, database, and application in any server environment. Advanced transparent encryption, powerful access controls, and centralized key management lets organizations encrypt everything...
Rank
10
Vote
Sponsor
0.0
Free hard disk and USB Flash drive encryption software by SafeHouse. Make your secret files invisible using a password with just a few clicks. SafeHouse Explorer is just one of several award-winning security products in the trusted family of SafeHouse encryption software. Our primary website is SafeHouseSoftware.com Our SafeHouse Professional Edition is designed for power users and corporate...
Rank
11
Vote
Sponsor
0.0
Cloud-based email security, archiving, encryption, and continuity for managed service providers (MSPs). Explore real-time data on the top malware threats from our award-winning Sophos Labs team. We keep track of all known and emerging malware here. We’ve collected metrics on all the latest malware threats, and we update them as soon as we get new information. See the top threats and where...
Rank
12
Vote
Sponsor
0.0
Free award-winning SafeHouse makes your secret files invisible and completely secure. Advanced AES encryption for any hard disk or USB Flash drive. Inside Fabric is an online fabric store featuring over 100,000 name-brand fabric patterns. If you're looking for upholstery fabric at discounted pricing, including famous brands such as beacon hill fabric, Fabricut fabric and Lee Jofa fabric, then...
Rank
13
Vote
Sponsor
0.0
We're here to provide you with encryption software of premium quality and reliability to ensure ultimate computer privacy and data protection of any valuable information stored on your computer. Leakage of your company-sensitive information to competitors may be not only irritating, but also devastating to business. Imagine what your competitors would do if they are able to retrieve...
Rank
14
Vote
Sponsor
0.0
Concerned about data security & encryption to protect your business? WinMagic's SecureDoc software will ensure that you feel secure & protected. Learn More. For individual users seeking uncompromising data protection for their Windows-based desktops and laptops, keeping sensitive information secure. Security, access and control for the enterprise. One console to manage the security and...
Rank
15
Vote
Sponsor
0.0
Lockbin, the free online email encryption service. Send secure email messages and files that are protected with AES-256 bit encryption. Lockbin protects messages in transit with 256-bit TLS/SSL, while FIPS 140-2 verified AES-256 bit encryption protects messages at rest. Learn more. Conveniently connect Microsoft Outlook directly to Lockbin. Run Lockbin on any device that supports Java....
Rank
16
Vote
Sponsor
0.0
SecureMac - Security News, Advisories, Reviews and Software for Everything Apple and Mac. Mac security is a more serious problem than most people think. It’s true that Macintosh computers have lower security risks than the average PC, but running security software for Macs is every bit as essential. SecureMac has operated at the cutting edge of Apple security for over a decade. We produce some...
Rank
17
Vote
Sponsor
0.0
WinAbility Software: the home of Folder Guard, USBCrypt, AB Commander and other useful Windows utilities and security and encryption software. Do you share your computer with others? Do you want to have your personal folders protected with passwords? Or, how about completely hiding a private folder and making it invisible to any Windows program? Learn how to set up a hidden folder or a...
Rank
18
Vote
Sponsor
0.0
MET, INC is a Mobile Solutions & Encryption Company who focus on Mobile Solutions, Mobile Encryption, Mobile Device Management, and Mobile Encrypt-Cloud Storage. Mobile Encryption Technologies provide a list of different services that will allow our customers to maximize potential profits. Our services include everything from mobile solutions to digital media management. Some of our other...
Rank
19
Vote
Sponsor
0.0
Encryption and privacy in the digital age. Learn how to protect yourself on the Internet. Security and privacy have long been important issues forming the basis of numerous democracies around the world. In the digital age, securing personal information and ensuring privacy pose to be issues of paramount concern. And the post 9/11 era presents an even bigger challenge as the boogeyman of...
Rank
20
Vote
Sponsor
0.0