Edit info for I & M Networks

Edit
45% ready
Complete your business profile to get thousands of views with the following free bonuses:
  • Get special highlighting in our catalogue and priority placement at the top of our listings
  • Have your company shown in special blocks, available only for updated business profiles
  • And many more upcoming perks!
Logo
Drag and drop your logo here
Contacts
Business name
14/50 character max
Business division
0/50 character max
ZIP code
Enter street address (correct a point on the map)
11/50 character max
Nearest landmarks
0/150 character max
Area code
Phone number
Phone comment (e.g. "reception")
13/30 character max
Add another phone
Contact name
0/50 character max
Contact title
0/50 character max
Area code
Fax number
Description
0/30 character max
Website
0/30 character max
Your webpage address
Add social
ContactsEdit
Street address: 10 Akron Dr
City / suburb: Greenville, SC
Zip code: 29605
Phone: (415) 901-7000 (Primary Phone)
Contact name:
Contact title:
Nearest landmark:
Fax:
Website:
E-mail:
Social networks:
Business descriptionEdit
Lafayette, Ind. 2010 Private CEO Matt Jonkman, also president of the Open Information Security Foundation (OISF) Suricata, the IDS engine develope

Intrusion detection is a must-have in any layered network defense, and Emerging Threats Pro is weaving its way into the fabric of open source intrusion detection software, with the company's CEO Matt Jonkman as the driving force.The IDS is based on the open source Suricata engine. The open source ruleset that goes along with Suricata comes from the Emerging Threats project. That is different from Emerging Threats Pro, which is a commercial enterprise set up to apply quality assurance to the Emerging Threats ruleset so it is more likely to find its way into commercial products. Jonkman says an open source community alone could not afford the equipment needed to do top-notch QA.That sounds a lot like the relationship between the Snort IDS engine and Sourcefire, and it is. But Emerging Threats Pro touts its multi-threading support that effectively boosts the potential line speed of IDSs that use it. And the Emerging Threats rules are compatible with the Snort IDS engine, so they can be used to augment Snort as well as other IDS rulesets that incorporate Snort.The company has a number of partners including Bridgeway Security, Critical Intelligence, Digital Pathways, Kaspersky Labs and Nitro Security, among others, which use Emerging Threats in various ways. Kaspersky, for instance, partners with Emerging Threats Pro to help expand its ruleset based on new malware it detects in its labs. It also uses the ruleset for its internal research.

Business information
Brief description
150/200 character max
Detailed business description
1457/1500 character max
Category (enter or select one from the list)
Add another category
Estimated number of employees
Annual sales estimate
$
ProductsDescribe or list the products you sell, e.g. Shoes, T-shirts, Accessories
51/500 character max
BrandsDescribe or list the brands you have to offer, e.g. Reebok, Nike
0/500 character max
General informationEdit
Business data
Estimated number of employees: 100 to 249
Annual sales estimate: 0
City / suburb: Greenville, SC
Products

security network, personal safety/security products

Brands
Tell your customers what brands you feature.
Add info
Filling out your business’ information will get it featured
in Whereorg listings so that more people will see it!
Photos A minimum of 3 photos is recommended
Upload another photo
Drag and drop photos here
Hours
Let your customers know when you are available to satisfy their needs, and they will be thankful!
Add hours
Hours
Description
0/200 character max
Is it your business?
Claim it to access more features!
Claim
Captcha

Secure image