Third Brigade Announces Integration with Q1 Labs

Combines host intrusion detection and prevention with next-generation security information management. Ottawa, ON, and Reston, VA (PRWEB) Monday, June 4, 2007 - Third Brigade (www.thirdbrigade.com), a security software company specializing in host intrusion detection and prevention systems, today announced a technology alliance with Q1 Labs, a leading network security management company, in which...

Read More »

Appliances protect network infrastructure and applications.

ThreatWall Web Security Gateways provide URL filtering, web content filtering, malware detection, IM/P2P management, web server/browser protection, and web application protection to organizations of any size. Hardware-based appliances utilize bi-modal scanning technology, which combines proxy-based scanning with real-time packet-based scanning. Featuring policy-based Web monitoring/filtering,...

Read More »

Rust Preventative protects and lubricates.

Rustlick 631 imparts long-term rust protection, up to 2 years, to ferrous metal parts stored indoors. Featuring clear, dark brown color, solution spreads into scratches and pores to displace moisture and leaves light, oily, transparent film. Dilution with any other materials is not necessary or recommended. To clean metal surfaces after storage, operators can use heavy-duty detergent cleaner or...

Read More »
Fall Protection System mitigates suspension trauma.

Fall Protection System mitigates suspension trauma.

As available supplement to shock absorbing lanyards, U-RES-Q helps alleviate suspension trauma caused by fall and allows capable worker to climb back to anchor point. Latter is accomplished by automatically ejecting 16 ft synthetic rescue ladder if even slightest of falls should happen to occur. At this point, suspended worker can attempt to climb back to anchor point or stand on ladder to...

Read More »

i-Safe(TM) Intelligent Safety System

DBI-SALA are pleased to announce the official launch of their NEW i-Safe(TM) Intelligent Safety System, bringing fall protection into the information age. Introducing RFID-equipped personal protective equipment combined with web-enabled information management to log inspections, track inventory and access information. Click Here: http://www.capitalsafety.com/Default.aspx?tabid=131 to view the...

Read More »

Extreme Networks Further Enhances Network Security for the Wired and Wireless Edge

Sentriant security solutions extend policy enforcement to wired and wireless LAN environments; provide threat mitigation and expanded testing of edge devices SANTA CLARA, Calif., May 22 -- Extreme Networks, Inc. (NASDAQ:EXTR), today announced that it is providing enterprise customers with integrated network security functionality for its Sentriant(TM) security solutions that extends to wired and...

Read More »

Network Security Appliance provides multi-gigabit throughput.

Featuring 2 Intel Woodcrest Dual-core CPUs and up to 32 GB memory, BeSecure NDP-2040N provides inline anti-virus, anti-spam, and anti-malware for heterogeneous networks, and offers multi-protocol content scanning, with email, FTP, and HTTP scanning. When deployed with BeSecure engine, appliance protects multi-Gbps networks with message handling capacity of millions/hr. Engine allows it to scan...

Read More »

Hurricane Protection System protects against flying debris.

Designed to fit standard size residential windows (37 x 60 in.), ImpactShield(TM) consists of impact-resistant, high-strength translucent fabric stretched over window to create hurricane-resistant barrier. Fabric is stored in weather-resistant housing compartment located outside just above window, which can be painted any color to match user's house. With ability to attach outside of wall with...

Read More »

Network Services secure clients' technology infrastructure.

SafeNet managed network services provide network security assessment which includes evaluation and recommendations for improvement for network perimeter defense, policies, and overall network security architecture. It also consists of network analysis and design for optimization, security, availability, data traffic profiles, and development network design documents, network maintenance and...

Read More »

All Topics