ObjectSecurity Ltd. Experience Secure Security
Distributed systems security and building of integrated enterprise security solutions.ObjectSecurity provides leading edge secure IT integration and infrastructure services and products including SecureMiddleware CCM Secure MICO CORBA OpenPMF Policy Management ObjectWall IIOP firewall and are particularly suited to highly heterogeneous IT environments with demands for high security robustness performance scalability and availability
Feel free to add your comment or post!
Business Hours
Opening hours for ObjectSecurity Ltd. ($) *Reviews
ObjectSecurity Ltd.
ObjectSecurity Ltd. Review ›
objectsecurity.com/
Statistic generated on
2024-04-19
SiteBook.org Points
(According to Visits for this Profile)
(According to Visits for this Profile)
Address
Website | objectsecurity.com/ |
Name | ObjectSecurity Ltd. |
Street | |
ZIP Code | |
City | |
Region | |
State | |
Phone No. |
Secure Security Integration Services Policy Driven Model Management Openpmf Web Objectsecurity Iiop Air Products Enterprise Projects Security Consultants General And Freelance Europe United Kingdom Authorisation Management Authorization Management Model Driven Model Driven Security Security Entitlement Secure Integration Policy Administration Policy Management Central Policy Administration Central Policy Management Secure Air Traffic Control Secure Air Traffic Management Secure Atc Air Traffic Control Integration Air Traffic Management Integration Simple Policy Administration Simple Policy Management Integration Technology Technologies Products Middleware Secure Middleware Iiop Iiop Firewall Iiop Proxy Iiop Domain Boundary Controller Corba Corba Security Secure Corba Secure Telecom Platforms Telecoms Security Secure Cdm Secure C4i J2ee Security Secure Web Services Mda Model Driven Architecture Secure Ncw Secure Nec Ncw Security Ncw Security Naval Research Lab Deutsche Telekom Secure Data Fusion Web Services Enterprise Web Services Enterprise Web Services Web Services Web Services Secure Web Services Secure Eai Secure Enterprise Application Integration Secure Soa Integration Softw
Reviews and Comments for ObjectSecurity Ltd.
Feel free to add your comment or review!Best entries for Secure and Security
1 Exceed Security Systems LLC - Information Security Services
Provides services
Provides services for reducing and mitigating risk with security consulting services and products. Offers custom IDS with continuously monitored, secure and managed hosting for client data.
Directory Listing Errordirectoryvirtualdenied Deniedthis
Provides services for reducing and mitigating risk with security consulting services and products. Offers custom IDS with continuously monitored, secure and managed hosting for client data.
Directory Listing Errordirectoryvirtualdenied Deniedthis
2 Orion Security Solutions
Specializing in
Specializing in PKI implementation and design, secure software development, PK Enabling, CP/CPS authoring, software security analysis and design, and infrastructure security consulting.
Z Y
Specializing in PKI implementation and design, secure software development, PK Enabling, CP/CPS authoring, software security analysis and design, and infrastructure security consulting.
Z Y
3 Megaprime
Offers ISO/IEC
Offers ISO/IEC 17799 compliant information security policy and management systems, security architectures, secure applications and networks.
Management Information Security Governance Assessment Megaprime Isoiec Strategy Training Spirit Business Capability Australia Risk Systems Ask Continuity Audits
Offers ISO/IEC 17799 compliant information security policy and management systems, security architectures, secure applications and networks.
Management Information Security Governance Assessment Megaprime Isoiec Strategy Training Spirit Business Capability Australia Risk Systems Ask Continuity Audits
4 Hectrix Limited
Provider of
Provider of smart card and biometric authentication Internet Appliances for e-commerce, m-commerce, PC-network security, secure access and secure communication. Hong Kong
Management Solutions Actatek Platform Support Biometric Markets Products Contact Rfid Web Recognition Enterprise News Video Based Education Wide Property
Provider of smart card and biometric authentication Internet Appliances for e-commerce, m-commerce, PC-network security, secure access and secure communication. Hong Kong
Management Solutions Actatek Platform Support Biometric Markets Products Contact Rfid Web Recognition Enterprise News Video Based Education Wide Property
5 iDEX Systems, Inc.
Java-powered iButton
Java-powered iButton based personal identity management security services and digital certificate authentication for secure logon, secure messaging, and digital signatures.
Z Y
Java-powered iButton based personal identity management security services and digital certificate authentication for secure logon, secure messaging, and digital signatures.
Z Y
6 Linux Security HOWTO
General overview
General overview of security issues that face the administrator of Linux systems. It covers general security philosophy and a number of specific examples of how to better secure your Linux system from intruders.
Linux Howto Security Also Please Howto * Kevin Exceptions Securitysecurity They Securitynetwork Redhattm Fenzi Bynum Note
General overview of security issues that face the administrator of Linux systems. It covers general security philosophy and a number of specific examples of how to better secure your Linux system from intruders.
Linux Howto Security Also Please Howto * Kevin Exceptions Securitysecurity They Securitynetwork Redhattm Fenzi Bynum Note
7 Global Security Technologies, Inc.
Provider of
Provider of e-commerce enablement, infrastructure security systems, secure remote access, risk management and architectural integration services.
Security Inc User Technologies Global Solutions Login Changs Confirms Contact Services Heartbleed Pf Under Privacy
Provider of e-commerce enablement, infrastructure security systems, secure remote access, risk management and architectural integration services.
Security Inc User Technologies Global Solutions Login Changs Confirms Contact Services Heartbleed Pf Under Privacy
8 eEye Digital Security
Provides security
Provides security products and services to help secure networks. Products are SecureIIS an application firewall, Retina the network security scanner, Iris network traffic analyzer, and Blink the network availability monitor.
Powerbroker Security Management Retina Securing Cloud Learn Beyondtrust Directory Servers Active Managing Vulnerability Partners Services Privilege Patch Least Vmware
Provides security products and services to help secure networks. Products are SecureIIS an application firewall, Retina the network security scanner, Iris network traffic analyzer, and Blink the network availability monitor.
Powerbroker Security Management Retina Securing Cloud Learn Beyondtrust Directory Servers Active Managing Vulnerability Partners Services Privilege Patch Least Vmware
9 Lan-Secure Network Security
Vendor of
Vendor of 'Security Center' a scan monitor software for real-time intrusion detection and prevention for Microsoft Windows XP and Server 2003.
Network Software Trial Management Support Real Free Security Snmp Tools Learn Windows Lan Wireless Monitor Telnet Switch Server
Vendor of 'Security Center' a scan monitor software for real-time intrusion detection and prevention for Microsoft Windows XP and Server 2003.
Network Software Trial Management Support Real Free Security Snmp Tools Learn Windows Lan Wireless Monitor Telnet Switch Server
10 Innominate Security Technologies AG
Produces embedded
Produces embedded ethernet security devices for industrial applications and secure remote maintenance offering hardware firewall, VPN and virus protection.
Innominate Security Für Cloud Sicherheit Lösungen Bezugsquellen Mguard Support Cyber Secure Services Dienstleistern Fernwartung übersicht Unternehmen Sponsor Industrielle
Produces embedded ethernet security devices for industrial applications and secure remote maintenance offering hardware firewall, VPN and virus protection.
Innominate Security Für Cloud Sicherheit Lösungen Bezugsquellen Mguard Support Cyber Secure Services Dienstleistern Fernwartung übersicht Unternehmen Sponsor Industrielle
11 VeriSign: SSL Certificates
Offer digital
Offer digital certificates and is a secure sockets layer (SSL) Certificate Authority enabling secure e-commerce and communications with a secured seal program for websites and a selection of other trust, PKI and internet security related services.
Ssl Security Learn Norton Symantec Certificates Business Buy Support Endpoint Products Renew Secure Backup Encryption Renewals Protection Free Podcasts
Offer digital certificates and is a secure sockets layer (SSL) Certificate Authority enabling secure e-commerce and communications with a secured seal program for websites and a selection of other trust, PKI and internet security related services.
Ssl Security Learn Norton Symantec Certificates Business Buy Support Endpoint Products Renew Secure Backup Encryption Renewals Protection Free Podcasts
12 VeriSign: SSL Certificates
Offer digital
Offer digital certificates and is a secure sockets layer (SSL) Certificate Authority enabling secure e-commerce and communications with a secured seal program for websites and a selection of other trust, PKI and internet security related services.
Ssl Security Norton Symantec Learn Certificates Business Buy Support Endpoint Products Renew Secure Encryption Backup Contact Partners
Offer digital certificates and is a secure sockets layer (SSL) Certificate Authority enabling secure e-commerce and communications with a secured seal program for websites and a selection of other trust, PKI and internet security related services.
Ssl Security Norton Symantec Learn Certificates Business Buy Support Endpoint Products Renew Secure Encryption Backup Contact Partners
13 SafeBoot Security System
Control Break
Control Break provides encryption and security tools which are both secure, and easy to administer - designed primarily for the large enterprise, they also offer a range of consumer verisons.
Control Break provides encryption and security tools which are both secure, and easy to administer - designed primarily for the large enterprise, they also offer a range of consumer verisons.
14 Solaris Security Toolkit
The Solaris
The Solaris Security Toolkit, informally known as the JumpStart Architecture and Security Scripts (JASS) toolkit, provides a flexible and extensible mechanism to minimize, harden, assess, and secure Solaris Operating Environment systems.
Oracle Cloud Java Learn Mysql Developers Microsystems Solaris Technology Youtube Download Sun Network Support Partner Events Contact Sparc Acquired
The Solaris Security Toolkit, informally known as the JumpStart Architecture and Security Scripts (JASS) toolkit, provides a flexible and extensible mechanism to minimize, harden, assess, and secure Solaris Operating Environment systems.
Oracle Cloud Java Learn Mysql Developers Microsystems Solaris Technology Youtube Download Sun Network Support Partner Events Contact Sparc Acquired
15 Innovative Security Products
Design and
Design and manufacture security and lock down products to secure computers and office equipment.
Laptop Security Lock Cable Locks Chromebook Starting Padlocks Phishing Theft Alert Brass Just Innovative Shop
Design and manufacture security and lock down products to secure computers and office equipment.
Laptop Security Lock Cable Locks Chromebook Starting Padlocks Phishing Theft Alert Brass Just Innovative Shop
16 Trusted Systems Services
A secure
A secure systems consulting, service, and training company specializing in Windows NT security. Provides NT security products and publications.
Ips Contact Accessories Trusted Interface Containers Quote Products Incognito User Tempestsafeguard Request Systems
A secure systems consulting, service, and training company specializing in Windows NT security. Provides NT security products and publications.
Ips Contact Accessories Trusted Interface Containers Quote Products Incognito User Tempestsafeguard Request Systems
17 3W
Provides security
Provides security audits, firewalls, secure VPNs, anti-virus software, security policy and administration, implementation, encryption software, vulnerability scans.
Services Management Anti Network Wireless Statement Networks Patch Filtering Virus Recovery Spam Shaping Packet Consulting Privacy Professional Copyright Checknet
Provides security audits, firewalls, secure VPNs, anti-virus software, security policy and administration, implementation, encryption software, vulnerability scans.
Services Management Anti Network Wireless Statement Networks Patch Filtering Virus Recovery Spam Shaping Packet Consulting Privacy Professional Copyright Checknet
18 Secure your Java apps from end to end
Javaworld article
Javaworld article by Todd Sundsted that examines the foundation of Java security, including virtual machine and byte code security.
Java Security Part Idg Enterprise Learn Application How Source News Open Javaworld Mobile Close App Httpwwwjavaworldcomjavaworldtopicalindexjw Ti Tos Core Much
Javaworld article by Todd Sundsted that examines the foundation of Java security, including virtual machine and byte code security.
Java Security Part Idg Enterprise Learn Application How Source News Open Javaworld Mobile Close App Httpwwwjavaworldcomjavaworldtopicalindexjw Ti Tos Core Much
19 Secure Computing Corporation
Developers of
Developers of such Internet security products as the Sidewinder G2 Firewall/Security Appliance, SafeWord strong authentication products, and SmartFilter and Bess Web filtering.
Mcafee Secure Computing Formerly Firewall Web Network Gateway Number Product Partner Smartfilter Grant Protection User Snapgear Checker
Developers of such Internet security products as the Sidewinder G2 Firewall/Security Appliance, SafeWord strong authentication products, and SmartFilter and Bess Web filtering.
Mcafee Secure Computing Formerly Firewall Web Network Gateway Number Product Partner Smartfilter Grant Protection User Snapgear Checker
20 Secure Computing Corporation
Developers of
Developers of such Internet security products as the Sidewinder G2 Firewall/Security Appliance, SafeWord strong authentication products, and SmartFilter and Bess Web filtering.
Mcafee Secure Computing Formerly Firewall Web Network Gateway Product Number Grant Protection Partner Smartfilter Snapgear
Developers of such Internet security products as the Sidewinder G2 Firewall/Security Appliance, SafeWord strong authentication products, and SmartFilter and Bess Web filtering.
Mcafee Secure Computing Formerly Firewall Web Network Gateway Product Number Grant Protection Partner Smartfilter Snapgear
21 Secure Computing Corporation
Developers of
Developers of such Internet security products as the Sidewinder G2 Firewall/Security Appliance, SafeWord strong authentication products, and SmartFilter and Bess Web filtering.
Mcafee Secure Computing Formerly Firewall Gateway Network Web Partner Grant Protection Smartfilter Product Number Policy Notes
Developers of such Internet security products as the Sidewinder G2 Firewall/Security Appliance, SafeWord strong authentication products, and SmartFilter and Bess Web filtering.
Mcafee Secure Computing Formerly Firewall Gateway Network Web Partner Grant Protection Smartfilter Product Number Policy Notes
22 Secure Programming Techniques
First installment
First installment in multipart series of excerpts from Practical Unix & Internet Security, 3rd Edition, tips and general design principles to code by to avoid security-related bugs. OReilly Media.
Oreilly Unix Security Practical Media Linux $name Articles Alan Simson Garfinkel Gene Programming Spafford Schwartz Avoiding Callfd Techniques Development
First installment in multipart series of excerpts from Practical Unix & Internet Security, 3rd Edition, tips and general design principles to code by to avoid security-related bugs. OReilly Media.
Oreilly Unix Security Practical Media Linux $name Articles Alan Simson Garfinkel Gene Programming Spafford Schwartz Avoiding Callfd Techniques Development
23 Maximum Apache Security
Book by
Book by Sams Publishing details the complex security weaknesses and risks of Apache, and provides hands-on solutions for keeping a Web site secure and buttressed against intruders.
Programming Press Web Data Development Technology Professional Edition Certification Informit Learn Analytics Management Computing Information Addison Wesley Articles Engineering See Location
Book by Sams Publishing details the complex security weaknesses and risks of Apache, and provides hands-on solutions for keeping a Web site secure and buttressed against intruders.
Programming Press Web Data Development Technology Professional Edition Certification Informit Learn Analytics Management Computing Information Addison Wesley Articles Engineering See Location
24 Secure Messaging Server
A secure
A secure messaging server that provides total control and security for your email system plus some additional messaging products.
A secure messaging server that provides total control and security for your email system plus some additional messaging products.
25 Secure Messaging Server
A secure
A secure messaging server that provides total control and security for your email system plus some additional messaging products.
A secure messaging server that provides total control and security for your email system plus some additional messaging products.
26 FileGuard
Integos desktop
Integos desktop security program offers multi-level, multi-user security for files, documents, folders and applications with secure deletion, password protection and time restrictions.
Mac Family Premium Secure Washing Security Bundle Protector Machine Malware Upgrade Renew Internet Policy Contact
Integos desktop security program offers multi-level, multi-user security for files, documents, folders and applications with secure deletion, password protection and time restrictions.
Mac Family Premium Secure Washing Security Bundle Protector Machine Malware Upgrade Renew Internet Policy Contact
27 Network Security Technology Co.
The NST
The NST product family includes complete PKI system operations, security applications and hardware cryptographic devices to secure business conduct over computer networks, whether for Internet, extranet or intranet applications.
ºô¦w¬ì§ÞªÑ¥÷¦³¤½¥q Åwªï¥úÁ{y
The NST product family includes complete PKI system operations, security applications and hardware cryptographic devices to secure business conduct over computer networks, whether for Internet, extranet or intranet applications.
ºô¦w¬ì§ÞªÑ¥÷¦³¤½¥q Åwªï¥úÁ{y
28 Apple Airport Network Security
Practical security
Practical security tips to make Apples Airport wireless network more secure.
Wi Fi Airport Wpa Ipsec Passgen Hhhh Passwords Network Protected Apple Threat Security Wireless Privacy Corporate
Practical security tips to make Apples Airport wireless network more secure.
Wi Fi Airport Wpa Ipsec Passgen Hhhh Passwords Network Protected Apple Threat Security Wireless Privacy Corporate
29 Dionach
Provides network
Provides network security management, network infrastructure security consultancy, secure remote access, intruder detection systems, penetration testing, and antivirus solutions. Locations in the United Kingdom and the United Arab Emirates.
Security Information Dionach Seminar Blog Decoding Dionach’s Session Real Vulnerability Services Codeigniter Penetration News Virtual Technicalconsultants Robins
Provides network security management, network infrastructure security consultancy, secure remote access, intruder detection systems, penetration testing, and antivirus solutions. Locations in the United Kingdom and the United Arab Emirates.
Security Information Dionach Seminar Blog Decoding Dionach’s Session Real Vulnerability Services Codeigniter Penetration News Virtual Technicalconsultants Robins
30 ZipLip
A secure
A secure gateway appliance for encrypting and archiving email and files, secure webmail, and secure file collaboration.
Zl Technologies Archiving Manager Storage Events Unified Records Compliance Conference Corporate News Data Discovery Analyst York
A secure gateway appliance for encrypting and archiving email and files, secure webmail, and secure file collaboration.
Zl Technologies Archiving Manager Storage Events Unified Records Compliance Conference Corporate News Data Discovery Analyst York
31 Paktronix Systems: Network Security
Design, supply
Design, supply, and implement secure networks. Provide secure border Firewall systems for connecting networks to the Internet or each other. Offer Network Address Translation (NAT), Virtual Private Networking (VPN), with IPSec, and custom port translation capabilities.
Paktronix Systems Paksecured Network Security Linux Novell Policy Pakmon Services News Library Routing Support Internet Map Equated Ipsec
Design, supply, and implement secure networks. Provide secure border Firewall systems for connecting networks to the Internet or each other. Offer Network Address Translation (NAT), Virtual Private Networking (VPN), with IPSec, and custom port translation capabilities.
Paktronix Systems Paksecured Network Security Linux Novell Policy Pakmon Services News Library Routing Support Internet Map Equated Ipsec
32 Windows 2000 Security
one-stop gateway
one-stop gateway to news, information and products for Network Security and Windows 2000. IT professionals will find the information in this site fundamental to the setting up and running of secure, flawless networks.
Security Windows Network Email Web Encryption Content Server Authentication Control Access Tutorials Misc Firewalls Services Frasl
one-stop gateway to news, information and products for Network Security and Windows 2000. IT professionals will find the information in this site fundamental to the setting up and running of secure, flawless networks.
Security Windows Network Email Web Encryption Content Server Authentication Control Access Tutorials Misc Firewalls Services Frasl