[Company Logo Image]Anti-Virus Software

 

 

Your one-stop shop for information security products. Network security, cryptography, anti virus, firewalls, intrusion detection, ISO 17799 and much much more!  Downloads are available for evaluation and trial.

 

PC & Network Security
Penetration Testing
Anti Virus
BS7799 / ISO17799
Consultancy Services
Cryptography
Risk Analysis
Firewalls
Contact Us

 

PC & NETWORK SECURITY

iSecurityShop: The one-stop shop for Network security, cryptography, anti virus, firewalls, intrusion detection and much much more! Choose from the following market leaders ...

PENS -  Fully scaleable, transparent, On-The-Fly encryption for the Win32 (95/98/NT/2000) platform. Suitable for data encryption on stand-alone or laptop computers, Remote Access (RAS) links and Corporate network-wide implementations. Now available with 56bit DES, 128bit IDEA and now Triple DES algorithms. Windows 2000 Ready!

Guardian Angel is the ultimate Access Control system. Employing full pre-Operating System authentication mechanisms, boot sector protection, media control, Secure Partitioning, centralised management and full CESG approval, it is ideal for securing laptop PC's or Corporate Workstations.

Dragon IDS is based on the Award-Winning UNIX-based Intrusion Detection System from Enterasys - a Cabletron Company - (Previously Network Security Wizards) in the USA. Dragon Network based IDS is the most scalable, versatile IDS currently available. Unix based, and compatible with many of today's favoured operating systems, Dragon has consistently proved itself to be the most reliable, accurate and robust IDS available.

PUMP - PENS User Management Program: Network roll-out and management of PENS just got easier. A complete corporate solution to centralised management of our Win32 Encryption Solution.

PENS eX-File - a simple, functional and, above all, practical solution to the problem of encrypting and transmitting data without the need for expensive VPN Software and requiring no additional software to return the data to its original form on the client side.
 

INTRUSION DETECTION

Intrusion Detection Systems

Intrusion Detection Systems are like a burglar alarm for your computer network... they detect unauthorized access attempts. They are the first line of defence for your computer systems. This web site provides an excellent introduction to IDS, in the context of the leading Dragon IDS suite.

 

CRYPTOGRAPHY

Portcullis Software can now offer a range of cryptographic solutions for your Enterprise: The CryptiX Range covers everything from implementing DES-based encryption into your applications, protecting your software from theft and simply securing mission critical data on your DOS, Windows, OS/2 or UNIX platforms. If you're a Software Developer or Vendor, or a Network Manager looking to secure your network with the most transparent and cost-effective solution, the CryptiX has you covered.

 

PENETRATION TESTING

Penetration Testing

If your network is connected to the Internet, you are at risk from hostile attack. A vital part of your Network Security are the measures you have in place to protect yourself - but just how good are they? Our Penetration Test Team are qualified under the CESG/DERA CHECK Scheme as "Ethical Hackers" for work within HM Government and, if your network has any weaknesses, they will find them and exploit them. Wouldn't you rather that the Good Guys got there first? See also Penetration Testing World

 

RISK ANALYSIS

Portcullis Security Consulting provide a wide range of services designed to help companies optimise their computer security strategies and IT management. From BS7799 site compliance inspections to full Risk Analysis, the Consultancy Team are dedicated to protecting your company from all aspects of Computer Crime.

security risk assessment, risk analysis

COBRA is a knowledge based risk analysis system designed to make security risk analysis and risk assessment far more straightforward and manageable. It is shipped with a comprehensive risk knowledge base, which can be tailored and changed to suit individual needs. This automated product is now employed by many of the worlds leading organizations.

 

CONSULTANCY SERVICES

Objectivity! Portcullis believes that security specialists such as us should apply scientific principles to achieve a balance between the need to manage risk and the need to control costs. Security is a business opportunity. Properly implemented, computer security solutions can minimise the risks to business, enhance management control and reduce costs. Like all good business strategies, security requires inspired design, careful implementation and consistent maintenance. 

 

BS7799 / ISO17799

Portcullis Security Consulting provide a wide range of services designed to help companies optimise their security strategies and IT management. From BS7799 site compliance inspections to full Risk Analysis, the Consultancy Team are dedicated to protecting your company from all aspects of Computer Crime.

ISO 17799

Managing compliance with BS7799 or ISO17799 is a far from trivial exercise. Assessing compliance levels for information systems, and then deriving and implementing plans to become compliant, can by a very intensive process. However, with the COBRA approach, this effort can be minimized.

 

ANTI-VIRUS

Sophos Anti-Virus is a unique solution to the virus problem, providing true cross-platform protection in a single, fully integrated product. The network-centric design provides a host of benefits for the protection of servers, workstations and portables. Sophos's ground-breaking architecture maximises protection, while minimising performance and administrative overheads. Sophos Anti-Virus is fully scalable, equally at home protecting a single PC, a local network or the entire enterprise.

 

FIREWALLS

Risks which can arise from the world-wide connection of networks onto the Internet can be minimised through using a Firewall. The BigFire Range, the Biodata Firewall, offers the latest in Firewall systems. BIGfire has a clear objective: Protecting sensitive networks from hackers.  BIGfire has its own Secured Operating System (BSOS), making it infinitely more secure than any other Firewall on the market. It features full Packet and Application level filtering, Single IP Resolution and Translation, Secure (112bit and 192bit) VPN tunneling and a host of other features, all wrapped up in one simple to configure and run package.

 

 

network security, cryptography, firewall software, access control, firewalls, anti virus, computer security, access control system, encryption, intrusion detection

 

* ** DOWNLOAD AREA ***

Many of these products are available for evaluation/trial. Why not visit our download area and try them for yourself? 

 

iSecurityShop: Your one-stop shop for information security products. Network security, cryptography, firewalls, intrusion detection, encryption and computer security
Also coming soon:  Information Security Manual and Cryptography Tutorial

 

 

[ Home ] PC & Network Security ] Penetration Testing ] Anti Virus ] BS7799 / ISO17799 ] Consultancy Services ] Cryptography ] Risk Analysis ] Firewalls ] Contact Us ]

Send mail to security ['at'] isecurityship.com with questions or comments about this web site.
Copyright 2005 iSecurityShop.  Crc