Clarification of Answer by
tutuzdad-ga
on
02 Nov 2004 18:01 PST
Certainly. How's this in exchage for your bonus offer?
Nuke Pirates
http://www.nukepirates.com/
NukePirates is owned and operated by Internet Copyright Enforcement,
company located in California. This is a proactive service that
legally "nukes" pirate sites and gets them offline for it?s customers.
???
Pancho Networks
http://www.panchonetworks.com/
Pancho's FlowPatrol 3.0 and FlowDirector 3.0 application flow control
software run on Windows XP/2000 and can block or throttle all
Peer-to-Peer (P2P) traffic including: - KaZaa, Morpheus, Gnutella
based, and all others
???
Akonix
http://www.akonix.com
Akonix RogueAware is a solution that insures compliance. It is a free
network ?sniffer? that collects information about the use of traffic
that is generated by the major public IM networks including AOL's AIM,
ICQ, MSN, and Yahoo! as well as major P2P File Sharing applications
such as KaZaA, Morpheus and Gnutella, among others.
???
Aladdin Knowledge Systems
http://www.ealaddin.com/
Another compliance oriented company. eSafe, the integrated proactive
content security solution, incorporates AppliFilter? - a new
technology that can block application level threats such as P2P (Peer
to Peer) file-sharing such as KaZaa, iMesh, Gnutella, eDonkey and many
others.
???
DynaComm
http://www.dciseries.com/products/iscan/
Prevent illegal P2P file sharing activity. ?If employees are running
P2P and IM clients, they may well be leaving you wide open to a host
of legal liabilities and opening up your network to outside attack.
Without the ability to track and manage P2P and IM usage, your
security policy could be no security at all.? DynaComm i:scan has the
power to search for, and eliminate, undesirable files across your
network. It can readily seek out, log and remove such items as
peer-to-peer (P2P) file sharing clients, or instant messaging (IM)
software.
???
Telemate
http://www.verso.com/press/prs/pr080.pdf
"Telemate.Net Announces New File Sharing, Instant Messaging and Chat
Content Blocking Features Unique signature-based blocking technology
protects networks against security risks and bandwidth waste from file
sharing, instant messaging and applications that allow spyware and
virus downloads."
???
SCOS Automation
http://www.scos.nl/default.asp?pg=surfcontrol-messagefilter
Helps minimize your exposure to the legal liability resulting from
inadvertent or intentional data leakage, the exchange of offensive
material, and copyright infringement.
???
Procera Networks
http://www.proceranetworks.com/
OptimIP? intelligent network appliance ?rogue warrior? configuration
can block and control instant messenger sessions, P2P traffic for
security and liability purposes.
???
SonicWALL, Inc.
http://www.sonicwall.com/
Content Security Manager 2100 CF is able to manage the use of IM, P2P,
and multimedia applications to reduce security risks and liability.
???
Blue Coat Systems, Inc.
http://www.bluecoat.com/
?Blue Coat's ProxySG line of appliances provide policy-based Web
traffic control for small to large enterprises at the corporate
gateway, including content filtering, IM/P2P control??
???
Mainstream Security Services, LLC
http://www.mainstream.net/security_offering.shtml
Provides a packet-reassembly firewall that can examine streams of data
in-context for possible P2P misuse and protect companies from
liability issues related to potential copyright infringement.
???
sources
GNUTELLA NEWS
?Software Services to Block P2P?
http://www.gnutellanews.com/article/10704
Regards;
tutuzdad-ga