AKIT
English Eesti

IT security products

infoturbetooted

juhiseid valimiseks
http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-36.pdf

riskihaldus, nõrkuseotsing
http://searchsecurity.techtarget.com/feature/Comparing-the-top-vulnerability-management-tools

http://www.posterus.sk/?p=18519

https://www.scmagazine.com/2013-vulnerability-assessment-tools/slideshow/3435/

https://www.scmagazine.com/vulnerability-assessment-tools/slideshow/3373/

https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools

http://www.esecurityplanet.com/open-source-security/slideshows/10-open-source-vulnerability-assessment-tools.html

https://www.owasp.org/index.php/Software_Security_Assessment_Tool_Review

https://www.techworm.net/2016/07/top-10-vulnerability-scanners-hackers-researchers.html

viirusetõrje
http://www.pcmag.com/article2/0,2817,2372364,00.asp

http://www.pcmag.com/article2/0,2817,2388652,00.asp

https://www.av-comparatives.org/av-vendors/

http://www.toptenreviews.com/software/security/best-antivirus-software/

http://www.tomsguide.com/us/best-antivirus,review-2588.html

https://www.sophos.com/en-us/products/free-tools.aspx

http://www.makeuseof.com/tag/free-linux-antivirus-programs

spämmitõrje
http://www.toptenreviews.com/software/security/best-spam-filter/

https://www.lifewire.com/top-free-spam-filters-windows-1174416

http://www.linuxlinks.com/article/20130407093613870/Anti-SpamTools.html

http://www.av-comparatives.org/wp-content/uploads/2015/05/avc_linux_2015_en.pdf

tulemüürid
http://jafsec.com/Firewall/Firewall-Popular-Vendors.html

https://www.itcentralstation.com/categories/firewalls

http://www.computerworlduk.com/galleries/security/9-best-firewalls-for-business-3630257/

http://www.comparebusinessproducts.com/networking/best-small-business-firewall-vendors

http://www.tecmint.com/open-source-security-firewalls-for-linux-systems/

VPN
http://www.top10bestvpn.com/compare

http://jafsec.com/Remote-Access/Remote-Access-A-B.html

https://www.itcentralstation.com/categories/ssl-vpn

krüpteerimine
http://www.pcmag.com/article/347066/the-best-encryption-software-of-2016

http://searchsecurity.techtarget.com/feature/Readers-2016-top-picks-for-enterprise-encryption-tools

http://www.toptenreviews.com/software/privacy/best-email-encryption-software/

https://techtalk.gfi.com/the-top-24-free-tools-for-data-encryption/

https://www.schneier.com/academic/paperfiles/worldwide-survey-of-encryption-products.pdf

lõppseadmeturve
https://www.technavio.com/blog/top-20-vendors-global-consumer-endpoint-security-market

https://www.g2crowd.com/categories/endpoint-protection

biomeetria
http://www.biometricupdate.com/biometric-companies

http://www.nationalbiometric.org/best-biometric-companies/

https://www.technavio.com/blog/top-10-mobile-biometrics-companies

sissetungituvastus
http://www.healthcareitnews.com/news/ids-and-ips-buyers-guide-3-key-factors-plan-your-budget-intrusion-protection-system

http://searchsecurity.techtarget.com/tip/Evaluating-enterprise-intrusion-detection-system-vendors

http://www.omnisecu.com/security/infrastructure-and-email-security/leading-intrusion-detection-systems-ids-products.php

http://www.tomsitpro.com/articles/intrusion-detection-intrusion-prevention-systems-ids-ips,2-959.html

http://wiki.aanval.com/wiki/Library:How_to_Select_the_Best_IDS/IPS_Solution:_A_Step-By-Step_Guide_and_IDS/IPS_Features_Comparison

kuuldetõrje
http://www.greatsouthernsecurity.com/Page_17x.html