Information material

Here you can download product catalogs and brochures as well as find other relevant information.

If you have trouble downloading the file (s), you must first download Acrobat Reader

This page will gradually be developed as we have recieve questions from you about what topics you want information about. If you need guidance regarding our products or security in general, please send an e-mail to

The scope of computer thefts:

  • In a global perspective hardware theft is now one of the most common forms of crime. (AEA)
  • The theft or loss of a computer or storage medium make up 54 percent of all identity theft-related data breaches. (Symantec Corp.)
  • The loss of 1 computer cost an institution 5 times the retail value of the computer itself. (AEA)
  • Computer crimes is raising by over 500% each year in a global perspective.(Computer Economics)

Resources for computer thefts:

Links to other resources:

  • The Network Administrators’ Guide , a must read for network administrators The ICSA Firewall Buyers Guide, read before buying
  • USENET Firewall FAQ Good general Firewall information
  • Linux Security Knowledgebase, a good guide on network security, angled on GNU/Linux GNU Security, a free security software portal