Technology Partners

Agari

Agari is on a mission to protect leading enterprises and government agencies, their partners, customers and citizens from advanced email phishing attacks.

www.agari.com/ 

Anomali

"Anomali helps organizations find and respond to cyber threats. That's our mission. We bring to your security team the one thing that's been missing - external context. With Anomali you can now identify suspicious or malicious traffic before it even reaches your network. We turn threat intelligence into your cyber no-fly list, and seamlessly integrate this with your internal security and IT systems."

www.anomali.com

Arctic Wolf

Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ engineers and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions, and all the expertise and tools required. 

Aruba Networks

Aruba Networks delivers an enterprise mobility solution that enables secure access to data, voice and video applications across wireless and wireline enterprise networks.

www.arubanetworks.com

Aternity

Aternity monitors any application on any physical, virtual, or mobile device, providing a user-centric vantage point that closes the visibility gap existing with network- and server-centric application performance management tools.

www.aternity.com

Attivo Networks

Attivo Networks provides a comprehensive deception platform that in real-time detects inside-the-network intrusions in networks, public and private data centers, and specialized environments such as Industrial Control System (ICS) SCADA, Internet of Things (IoT), and Point of Sale (POS) environments.

www.attivonetworks.com

Aviatrix

Aviatrix provides an innovative Cloud Networking software solution that simplifies connectivity to the cloud in a secure and scalable way. At Aviatrix, we believe that networking is a foundational element of cloud computing and, should be as dynamic, scalable, and elastic as compute and  storage.

www.aviatrix.com

BackBox

BackBox is the leading provider for Automated Infrastructure Backup and Recovery solutions. Spanning across the diverse network and security landscape, BackBox will ensure that all supported device configuration files are verified and stored securely in one central location to ensure a speedy recovery, when required. BackBox provides real-time inventory, configuration comparison, and is ideal for any organization, multi-tenant sites and service providers.

www.backbox.co

Barracuda Networks

Barracuda was launched to give businesses an email-security solution that didn’t cost a small fortune. With more than 1 million cloud-enabled products delivered since, we continue to disrupt the IT-security market with innovative solutions that every business can afford.

www.barracuda.com

BeyondTrust

BeyondTrust unifies the industry’s broadest set of privileged access capabilities with centralized management, reporting, and analytics, enabling leaders to take decisive and informed actions to defeat attackers. Our holistic platform stands out for its flexible design that simplifies integrations, enhances user productivity, and maximizes IT and security investments.

www.beyondtrust.com

Carbon Black

Carbon Black leads a new era of endpoint security by enabling organizations to disrupt advanced attacks, deploy the best prevention strategies for their business, and leverage the expertise of 10,000 professionals from IR firms, MSSPs, and enterprises to shift the balance of power back to security teams. Only Carbon Black continuously records and centrally retains all endpoint activity, making it easy to track an attacker’s every action, instantly scope every incident, unravel entire attacks and determine root causes. Carbon Black also offers a range of prevention options so organizations can match their endpoint defense to their business needs. Carbon Black has been named #1 in endpoint protection, incident response, and market share. Forward-thinking companies choose Carbon Black to arm their endpoints, enabling security teams to: Disrupt. Defend. Unite.

www.carbonblack.com

Check Point

Since 1993, Check Point has been dedicated to providing customers with uncompromised protection against all types of threats, reducing security complexity and lowering total cost of ownership.

www.checkpoint.com

Cirrus Data Solutions

Cirrus Data Solutions specializes in enterprise class software storage and data migration solutions.

www.cdsi.us.com

Cisco

Cisco Systems provides a wide variety of network hardware and software solutions, including routers, switches, wireless, storage networking, VoIP, security, and network management.

www.cisco.com

Citrix

Citrix was founded on a core principle: to make the world’s apps and data secure and easy to access. Anywhere. At any time. And on any device or network.

www.citrix.com

Cofense

Cofense empowers your people to recognize phishing attacks and stop them in minutes, not days. Our end-to-end phishing defense solution combines cutting-edge technology with collective human intelligence to protect your organization from inbox to SOC.

www.cofense.com

Cohesity

Cohesity makes large organizations productive by consolidating, protecting and sharing your non-mission-critical data assets. Your essential data is instantly available when you need it, where you need it. Our ground-breaking distributed systems technology hyperconverges all secondary storage workloads into an efficient, agile and infinitely scalable resource pool. This greatly simplifies both your infrastructure and the resources to administer it.

www.cohesity.com

Congruity

Data Storage Experts - Thousands of companies rely on Congruity to maintain their critical IT infrastructures.

www.congruity.com

ControlUp

ControlUp is an advanced computer management and monitoring platform for managing a large amount of Windows servers, workstations and user sessions.

www.controlup.com

Cortado (formerly ThinPrint)

Cortado links mobile, web, and virtual desktops to centralized IT resources in a highly efficient, secure and manageable way, seamlessly integrating home offices and mobile employees, including those with tablets and complete branch offices, into the existing IT infrastructure. For the more than 15,000 enterprise customers (whose user numbers range from 5 to 100,000), as well as the hundreds of thousands of private users, Cortado continually creates more robust solutions with innovative features and added value. With internationally patented technology, Cortado is the leading provider of software-based print and mobile business solutions.

www.cortado.com

CrowdStrike

CrowdStrike is a leading provider of next-generation endpoint protection, threat intelligence, and pre and post incident response services. CrowdStrike Falcon is the first true Software as a Service (SaaS) based platform for next-generation endpoint protection that detects, prevents, and responds to attacks, at any stage – even malware-free intrusions.

www.crowdstrike.com

CyberArk

CyberArk provides solutions for connecting enterprises through its patented Vaulting Technology, including security, performance, and accessibility required to protect the most important corporate data assets.

www.cyberark.com

CyberBit

Cyberbit’s battle-hardened cybersecurity solutions detect, analyze and respond to the most advanced, complex and targeted threats.

www.cyberbit.net

Cylance

Cylance is a cybersecurity products and services company focusing on stopping tomorrow’s attacks today. Cylance specializes in next-generation antivirus, penetration testing, malware detection, security assessments, machine learning, advanced threat protection, and artificial intelligence.

www.cylance.com

Darktrace

Without using rules or signatures, Darktrace is uniquely capable of understanding the ‘pattern of life’ of every device, user and network within an organization, and defends against evolving threats that bypass all other systems.

www.darktrace.com

Dell

For more than 28 years, Dell has empowered countries, communities, customers, and people everywhere to use technology to realize their dreams. Customers trust Dell to deliver technology solutions that help them do and achieve more, whether they’re at home, work, school, or anywhere in their world.

www.dell.com

Dell EMC

Dell EMC brings together Dell’s and EMC’s respective strong capabilities and complementary portfolios, sales teams and R&D. They seek to become the technology industry’s most trusted advisor, providing capabilities spanning strategy development, consultative services and solution deployment and support to help our customers and partners drive the digital transformation of their businesses.

www.dellemc.com

Demisto

Demisto is a leading Security Orchestration, Automation, and Response (SOAR) platform that helps security teams accelerate incident response, standardize and scale processes, and learn from each incident while working together.

www.demisto.com

Digital Guardian

Industry leading DLP plus data-centric Endpoint Detection and Response (EDR) all from a single cloud-delivered, big-data analytics service. See, understand and stop threats to your sensitive data from insiders and outside attackers.

digitalguardian.com

DomainTools

DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network, including domains and IPs, and connect them with nearly every active domain on the Internet. Those connections inform risk assessments, help profile attackers, guide online fraud investigations, and map cyber activity to attacker infrastructure.

www.domaintools.com

Dtex Systems

Dtex is committed to helping enterprises run safer and smarter by providing understanding of how their users interact with company data on their work devices. So, we’ve developed Advanced Enterprise User Intelligence that is purpose-built for insider threat management.

www.dtexsystems.com

Duo Security

Duo Security protects organizations against data breaches by ensuring only legitimate users and appropriate devices have access to sensitive data and applications - anytime, anywhere.

www.duo.com

eG Innovations

eG Innovations provides intelligent performance management solutions that automate and dramatically accelerate the discovery, diagnosis, and resolution of service performance issues in virtual, cloud, and physical service infrastructures.

www.eginnovations.com

Embotics

Embotics provides cloud management software that empowers businesses to leverage a comprehensive set of multi-hypervisor virtualization and cloud management capabilities. Embotics software allows IT organizations to deliver IT-as-a-Service from a single console while continuously monitoring resources to optimize automation, deployment, and configuration of IT services across private, public, and hybrid clouds.

www.embotics.com

Entrust Datacard

Entrust Datacard offers trusted identity and secure transaction technologies that make making purchases, crossing borders, accessing e-gov services or logging onto corporate networks reliable and secure.

www.entrustdatacard.com

ExtraHop

ExtraHop provides hybrid security for the cloud-first enterprise, delivering Network Detection and Response (NDR) powered by cloud-scale machine learning. With complete visibility, real-time threat detections, and guided investigation, ExtraHop enables security teams to rise above the noise of alerts, organizational silos, and runaway technology in order to accelerate investigations, unify policies across hybrid environments, and build their security the way they’re building their business: cloud-first. 

www.extrahop.com

F5

At F5, our mission is based on the fact that businesses depend on apps. Whether it’s apps that help connect businesses to their customers or apps that help employees do their jobs—we make sure apps are always available, and secure, anywhere. The world’s largest enterprises, service providers, financial and educational institutions, government entities, and consumer brands rely on F5 to stay ahead of security, cloud, and mobility trends.

www.f5.com

FireEye

FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber-attacks.

www.fireeye.com

FireMon

FireMon is the industry leader in providing enterprises, governments, and managed services providers with advanced security management solutions that deliver deeper visibility and tighter control over their network security infrastructure. The integrated FireMon solution suite – Security Manager, Policy Planner, and Risk Analyzer – enables customers to identify network risk, proactively prevent access to vulnerable assets, clean up firewall policies, automate compliance, strengthen security throughout the organization, and reduce the cost of security operations.

www.firemon.com

Forcepoint

Forcepoint™ was created to empower organizations to drive their business forward by safely embracing transformative technologies – cloud, mobility, Internet of Things (IoT), and others – through a unified, cloud-centric platform that safeguards users, networks and data, while eliminating the inefficiencies involved in managing a collection of point security products. 

www.forcepoint.com

ForeScout

ForeScout offers Global 2000 enterprises and government organizations the unique ability to see devices, including non-traditional devices, the instant they connect to the network. Equally important, ForeScout lets you control these devices and orchestrate information sharing and operation among disparate security tools to accelerate incident response. Unlike traditional security alternatives, ForeScout achieves this without requiring software agents or previous device knowledge. The company’s solutions integrate with leading network, security, mobility and IT management products to overcome security silos, automate workflows, and enable significant cost savings.

www.forescout.com

Fortinet

Fortinet provides top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric. 

www.fortinet.com

Gemalto

Gemalto is an international digital security company providing software applications, secure personal devices such as smart cards and tokens, and managed services. Gemalto delivers software and other technologies to businesses and governments that help them authenticate identities and protect data.

www.gemalto.com

Gigamon

Gigamon provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s products deliver advanced intelligence so that security, network and application performance management solutions in enterprise, government, and service provider networks operate more efficiently and effectively.

www.gigamon.com

Globalscape

GlobalSCAPE, Inc. is a worldwide leader in the secure movement and integration of data. Through Globalscape’s powerful yet intuitive technology, organizations can accelerate their digital transformation and maximize their potential by unleashing the power of data.

www.globalscape.com

Guardicore

Guardicore is a data center and cloud security company that protects your organization’s core assets using flexible, quickly deployed, and easy to understand microsegmentation controls. Our solutions provide a simpler, faster way to guarantee persistent and consistent security — for any application, in any IT environment.

www.guardicore.com

HP

Reinventing the way people, machines, and content work together - worldwide.

www.hp.com

HyTrust

HyTrust is the Cloud Security Automation (CSA) company. HyTrust delivers the essential real-time control, security, administrative account monitoring, logging and compliance assurance necessary to enable the benefits of cloud adoption and virtualization of critical workloads.

www.hytrust.com

IGEL Technology

A world leader in the delivery of powerful workspace management software, software-defined thin clients, and thin and zero client solutions, IGEL Technology helps organizations improve the agility, efficiency, and security of their virtual desktop and application delivery systems.

www.igel.com

Illumio

Illumio delivers adaptive security for every computing environment and visualizes application traffic, delivering continuous, scalable, and dynamic policy and enforcement to every server, VM, container, and VDI within data centers and public clouds.

www.illumio.com

Imperva

Imperva is a pioneer and leader of a new category of data security solutions for high-value business data in the data center. With more than 1,300 end-user customers and thousands of organizations protected through cloud-based deployments, Imperva's customers include leading enterprises, government organizations, and managed service providers who rely on Imperva to prevent sensitive data theft from hackers and insiders.

www.imperva.com

indeni

indeni proactively troubleshoots your network and security devices to give you real-time, highly relevant information to help you prevent downtime in your network - gone are the days of just relying on SNMP-based monitoring. 

www.indeni.com

Infoblox

Infoblox is a leader with 50 percent market share in core network services, which includes Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), and IP address management (IPAM), collectively known as DDI. Building upon this proven foundation, we’re bringing DDI and core network services to the next level with our Secure Cloud-Managed Network Services.

www.infoblox.com

Infocyte

Infocyte is the result of 20+ years of experience hunting adversaries within the largest, most complex, and most targeted defense networks in the world. Infocyte enables organizations large and small to take a proactive approach to cyber security: reducing risk, maintaining strict compliance, and streamlining cybersecurity operations.

www.infocyte.com

Ivanti

LANDESK and HEAT Software merged in January 2017 and brought all their various brands (including AppSense) together as Ivanti. Whether you’re looking for systems management, IT asset management solutions, IT service management improvement in the cloud, IT security solutions, or patch management that you can use with or without SCCM, Ivanti stands ready to help. 

https://www.ivanti.com/ 

Ixia

At Ixia, we deliver a powerful combination of innovative solutions and trusted insight to support your network and security products, from concept to operation. Whether you are preparing your product for launch, deploying an application, or managing a product in operation, we offer an extensive array of solutions in testing, visibility, and security—all in one place.

www.ixiacom.com

Juniper Networks

We believe the network is the single greatest vehicle for knowledge, collaboration, and human advancement that the world has ever known. Now more than ever, the world relies on high-performance networks. And now more than ever, the world needs network innovation to unleash our full potential.

www.juniper.net

Lakeside Software

Lakeside Software transforms the way that enterprises deploy, manage, secure, improve, and report on end user experience by coupling the world’s most lightweight agent with a robust data analysis engine to instantly grant complete visibility and control to administrators without impacting end user experience.

www.lakesidesoftware.com

Liquidware Labs

Liquidware Labs is an industry leader in desktop virtualization solutions for next-generation physical and virtual desktops, including VMware View, Citrix XenDesktop, Red Hat and Microsoft Windows.

www.liquidwarelabs.com

Login VSI

Login VSI makes it easy to load test, benchmark, and plan capacity to improve end-user experience and productivity for even the most complex virtualized desktop environments. Login VSI tests performance using virtual users, so real users benefit from consistently great performance. With agentless installation and minimal infrastructure requirements, Login VSI works in any Windows-based virtualized desktop environment including VMware Horizon View, Citrix XenDesktop and XenApp, and Microsoft Remote Desktop Services (Terminal Services).

www.loginvsi.com

Lookout

Lookout is the recognized leader in enterprise mobile security. Not only did we create the mobile threat defense market, we have introduced several trailblazing solutions, including Lookout Mobile Endpoint Security, Phishing and Content Protection and App Defense—all fueled by the Lookout Security Cloud.

www.lookout.com

McAfee

McAfee is one of the world’s leading independent cybersecurity companies. Inspired by the power of working together, McAfee creates business and consumer solutions that make the world a safer place. By building solutions that work with other companies' products, McAfee helps businesses orchestrate cyber environments that are truly integrated, where protection, detection, and correction of threats happen simultaneously and collaboratively. By protecting consumers across all their devices, McAfee secures their digital lifestyle at home and away. By working with other security players, McAfee is leading the effort to unite against cybercriminals for the benefit of all.

www.mcafee.com

Microsoft

Microsoft's mission: Empower every person and every organization on the planet to achieve more. Microsoft's strategy: Build best-in-class platforms and productivity services for a mobile-first, cloud-first world.

www.microsoft.com

MobileIron

MobileIron has been the leader in mobile enterprise security. Our mobile-centric, zero trust approach goes beyond traditional MDM, identity, and gateway solutions by validating the user, device, applications, networks, and potential threats before granting secure access to the device. We create the intersection between high-grade security, mobile, and the way people want to work — so you can free your people to be productive without limits and passwords.

www.mobileiron.com

NetApp

NetApp brings together the world's most creative and dedicated people to help you affordably store, manage, protect, and retain one of your most precious assets—your data. NetApp has built a reputation for innovative problem solving by creating products and solutions that deliver efficiency savings and enable breakthrough business capabilities.

www.netapp.com

Netskope

The organic adoption of cloud and mobile in the enterprise presents challenges for security teams when it comes to managing risk without slowing down the business. Security has traditionally managed risk by applying heavy-handed controls, but today’s business wants to move fast without having velocity throttled. Netskope is redefining cloud, network, and data security, empowering security teams with the right balance of protection and speed they need to secure their organization’s digital transformation journey.

www.netskope.com

Nutanix

Nutanix delivers an enterprise cloud platform that natively converges compute, virtualization and storage into a resilient, software-defined solution with rich machine intelligence. The world’s most advanced enterprise datacenters rely on Nutanix technology to power their mission-critical workloads at any scale.

www.nutanix.com

NVIDIA

NVIDIA GRID technology offers the ability to offload graphics processing from the CPU to the GPU in virtualized environments, giving the data center manager the freedom to deliver true PC graphics-rich experiences to more virtual users for the first time. 

www.nvidia.com

Okta

Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security policies. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications.

www.okta.com

One Identity

One Identity, a Quest Software business, helps organizations establish an identity-centric security strategy. With a unique identity and access management (IAM) portfolio, our award-winning offering includes identity governance, AD-centered IAM, privileged access management and identity SaaS solutions, One Identity helps organizations secure their enterprise end to end, smoothly make their digital transformation, eliminate identity challenges and reduce their attack surface from internal and external threats. Our unequalled commitment to our customers’ long-term IAM success is evident in our 7,500 customers worldwide that rely on us to manage more than 125 million identities.

www.oneidentity.com

OpenText

OpenText is the leader in Enterprise Information Management. Our EIM products enable businesses to grow faster, lower operational costs, and reduce information governance and security risks by improving business insight, impact and process speed.

www.opentext.com

Paessler

Paessler PRTG is a unified network monitoring solution that enables companies to gain full visibility  of their IT assets. It empowers IT staff to take control and introduce strategic measures to avoid downtime. PRTG helps you plan for the future.

www.paessler.com

Palo Alto Networks

Palo Alto Networks provides a wide suite of enterprise-level next-generation firewalls, with a diverse range of security features for your network.

www.paloaltonetworks.com

Pivot3

Pivot3, the inventors of software-defined storage and pioneers in hyper-converged infrastructure (HCI) solutions for the data center, offers a range of Enterprise HCI solutions for high performance workloads in data intensive environments. Our patented technology is the result of over a decade of research and development, and continuous optimizations. It is the ideal compute platform for virtual desktop infrastructure (VDI), surveillance, disaster recovery, server virtualization, and more.  

www.pivot3.com

Poly

Plantronics and Polycom have merged to become Poly. Poly is the global communications company that powers authentic human connection and collaboration. Face to face, we sift and sort millions of verbal and non-verbal cues to glean meaning. Poly is finding new ways to inject these cues into audio and video communication to replicate the face to face experience. To build intimacy. To break walls and span distance. To nurture the simplicity and beauty of human connection.

www.poly.com

Proofpoint

Proofpoint, Inc. is the leading provider of enterprise-class messaging security solutions that protect organizations from the threats and risks of both inbound and outbound email and other messaging streams. Proofpoint's comprehensive platform enables companies to stop spam, defend against viruses and network attacks, and prevent leaks of confidential or sensitive information.

www.proofpoint.com

Pulse Secure

Pulse Secure is a leading provider of secure access and mobile security solutions to both enterprises and service providers. Pulse Secure enables worker mobility securely and seamlessly by using the company’s VPN, NAC, and mobile security products.

www.pulsesecure.net

Pure Storage

Pure Storage, the all-flash enterprise storage company, enables the broad deployment of flash in the data center. When compared to traditional disk-centric arrays, Pure Storage all-flash enterprise arrays are 10x faster and 10x more space and power efficient. The Pure Storage FlashArray is ideal for high performance workloads, including server virtualization, desktop virtualization, (VDI), database (OLTP, real-time analytics), and cloud computing.

www.purestorage.com

Qualys

Qualys is the leading provider of information security and compliance cloud solutions, with more than 15,700 global businesses in more than 130 countries trusting Qualys to underpin digital transformation for greater agility, better business outcomes, and substantial cost savings.

www.qualys.com

 

Quantum

Quantum is a leading expert in scale-out tiered storage, archive and data protection, providing intelligent solutions for capturing, sharing and preserving digital assets over the entire data lifecycle. 

www.quantum.com

Quest

Quest builds community-driven software solutions that help you spend less time on IT administration and more time on business innovation.

www.quest.com

Radware

Radware is a global leader of cyber security and application delivery solutions for physical, cloud, and software defined data centers. Its award-winning solutions portfolio secures the digital experience by providing infrastructure, application, and corporate IT protection and availability services to enterprises globally. Radware’s solutions empower more than 12,500 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down.

www.radware.com

Rapid7

Rapid7 transforms data into action, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.

www.rapid7.com

Recorded Future

Recorded Future specializes in the collection, processing, analysis, and dissemination of threat intelligence. Recorded Future uses patented machine learning and natural language processing methods to continuously collect and organize data from open web, dark web, and technical sources.

www.recordedfuture.com

Reservoir Labs

Reservoir Labs' team of experts conduct thought-leading research, develop novel technologies, and create highly useful advanced computing and communications products that serve the security and communications needs of Reservoir’s commercial and government customers.

www.reservoir.com/

Riverbed

Riverbed makes applications, websites, networks, data centers, the cloud, and remote offices work better. We bring the promise of digital transformation to life.

www.riverbed.com

RSA

RSA® Business-Driven Security™ solutions uniquely link business context with security incidents to help organizations manage risk and protect what matters most. RSA solutions are designed to effectively detect and respond to advanced attacks; manage user identities and access; and reduce business risk, fraud and cybercrime. RSA protects millions of users worldwide and works with more than 90 percent of the Fortune 500.

www.rsa.com

Rubrik

Rubrik simplifies backup and recovery for virtualized environments. It eliminates backup software by integrating deduplicated storage, catalog management, and data orchestration into a single, scale-out fabric.

www.rubrik.com

SecurityScorecard

SecurityScorecard is a security risk benchmarking platform that provides instant visibility into the security posture of any organization.

www.securityscorecard.com

Skybox Security

Skybox provides security management solutions that extract insight from security data silos to give visibility of the attack surface, including all Indicators of Exposure (IOEs). With unparalleled visibility and context-aware intelligence of the attack surface, Skybox solutions drive effective vulnerability and threat management, firewall management, and continuous compliance monitoring.

www.skyboxsecurity.com

Source Defense

Source Defense is the market leader in Client-side Web Security, providing real time threat protection against vulnerabilities originating in third-party scripts such as Magecart & Formjacking attacks.

www.sourcedefense.com

Spirion

Spirion is the critical first step toward data privacy and security. We build and deliver the most accurate data discovery and classification solutions on the planet to position our customers for unparalleled data privacy, security, and regulatory compliance. Since 2006, Spirion has empowered the data privacy, security, and compliance strategies of thousands of organizations worldwide and across multiple industries.

www.spirion.com

Splunk

Splunk is the leading software platform for machine data that enables customers to gain real-time Operational Intelligence. Splunk’s mission is to address the challenges and opportunities of managing massive streams of machine-generated big data. More than three quarters of the Fortune 100 and thousands of enterprises, universities, government agencies and service providers use Splunk software to harness the power of their machine data for application management, IT operations, security, web intelligence, customer and business analytics and more.

www.splunk.com

STEALTHbits

Identify threats. Secure data. Reduce risk. STEALTHbits is a leading provider of data security solutions, protecting your most critical assets against today's greatest threats. Founded in 2001, STEALTHbits has extensive experience and deep expertise in the management of Microsoft technologies like Active Directory and Exchange, and governance solutions for unstructured data. With consistent growth, profitability, and a tenured management team that’s been at it since the start, STEALTHbits has emerged as a favorite solution provider for the world’s largest, most notable organizations, as well as a preferred partner to leaders in technology.

www.stealthbits.com

Symantec

Symantec is committed to helping you manage the integrity of your information by enabling you to maintain the right balance of information security and availability. In doing so, Symantec is uniquely positioned to help keep your business up, running and growing, no matter what happens.

www.symantec.com

Tanium

Tanium delivers a new and innovative approach to endpoint management and security that delivers instant visibility and responsiveness.

www.tanium.com

Tenable

Tenable™, Inc. is the Cyber Exposure company. Over 23,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus®, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into Tenable.io™ to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, large government agencies and mid-sized organizations across the private and public sectors.

www.tenable.com

ThreatConnect, Inc.

ThreatConnect, Inc. provides industry-leading advanced threat intelligence software and services including ThreatConnect®, the most comprehensive Threat Intelligence Platform (TIP) on the market. ThreatConnect delivers a single platform in the cloud and on-premises to effectively aggregate, analyze, and act to counter sophisticated cyber-attacks. Leveraging advanced analytics capabilities, ThreatConnect offers a superior understanding of relevant cyber threats to business operations.

www.threatconnect.com

Thycotic

Thycotic is a complete privileged account management provider, managing and auditing privileged accounts across a company’s entire IT infrastructure. Thycotic also provides end-user password management and self-service AD group management tools.

www.thycotic.com

Trend Micro

Trend Micro is a global leader in network antivirus and Internet content security software and services. Trend Micro focuses on outbreak prevention and providing customers with a comprehensive approach to managing the outbreak lifecycle and the impact of network worms and virus threats to productivity and information.

www.trendmicro.com

Tricerat

Tricerat's virtualization software helps boost performance and system reliability with a wide range of offerings. Simplify Printing eliminates the need for printer driver management. Simplify Profiles, a single-point of control for registry administration, ensures reliability and consistency of registry keys across the server farm. Simplify Lockdown provides the power of published desktops without complex system policies or registry hacks. triCerat's flagship product, Simplify Suite, provides a number of comprehensive desktop management tools in one product offering.

www.tricerat.com

Tufin

Tufin is the leader in Security Policy Orchestration, enabling enterprises to centrally manage, visualize, and control security policies across hybrid cloud and physical network environments. Tufin serves over 1,700 enterprise customers in industries worldwide, including finance, telecom, energy and utilities, healthcare and pharmaceuticals, retail, education, government, manufacturing, and transportation. The award-winning Tufin Orchestration Suite is a complete solution for automatically designing, provisioning, analyzing, and auditing network security changes from the application layer down to the network layer. By optimizing security policies, Tufin reduces the attack surface and minimizes disruptions to critical applications. Its network security automation provides enterprises with rapid service delivery, continuous compliance, and increased agility.

www.tufin.com

Turbonomic

Turbonomic’s autonomic platform enables heterogeneous environments to self-manage to assure the performance of any application in any cloud. Turbonomic’s patented autonomic decision engine dynamically analyzes application demand and allocates shared resources in real time to maintain a continuous state of application health.

www.turbonomic.com

UniPrint

UniPrint pioneered the use of PDF-based universal printer driver technology to streamline and enhance printing in Server-based Computing (SbC) environments. Today, UniPrint is the recognized leader in printing virtualization. The UniPrint Suite offers a comprehensive range of enhanced-printing solutions for all computing environments. UniPrint's latest release, the UniPrint Infinity software, optimizes printing functionality, minimizes printer management, improves security, and reduces bandwidth consumption.

www.uniprint.net

Unitrends

Unitrends delivers award-winning business recovery solutions for any IT environment. The company’s portfolio of virtual, physical, and cloud solutions provides adaptive protection for organizations globally. Unitrends delivers end-to-end protection and instant recovery of all virtual and physical assets as well as automated disaster recovery testing built for virtualization.

www.unitrends.com

Varonis

Varonis is a leading provider of software solutions that protect data from insider threats and cyber attacks. Through an innovative software platform, Varonis allows organizations to analyze, secure, manage, and migrate their volumes of unstructured data. Varonis specializes in file and email systems that store valuable spreadsheets, word processing documents, presentations, audio and video files, emails, and text.

www.varonis.com

Veeam

Veeam® has pioneered a new market of Availability for the Always-On Enterprise™ that helps businesses meet recovery time and point objectives (RTPO™) of less than 15 minutes for all applications and data.

www.veeam.com

Veracode

Veracode delivers the application security solutions and services today’s software-driven world requires. Veracode’s unified platform assesses and improves the security of applications from inception through production so that businesses can confidently innovate with the web and mobile applications they build, buy and assemble as well as the components they integrate into their environments.

www.veracode.com

Veritas Technologies

Veritas Technologies empowers businesses of all sizes to discover the truth in information—their most important digital asset. Using the Veritas platform, customers can accelerate their digital transformation and solve pressing IT and business challenges including multi-cloud data management, data protection, storage optimization, compliance readiness and workload portability—with no cloud vendor lock-in.

www.veritas.com

VMware

VMware, a global leader in cloud infrastructure and business mobility, accelerates our customers’ digital transformation journey by enabling enterprises to master a software-defined approach to business and IT.

www.vmware.com

Zscaler

Zscaler security services enable organizations to provide safe, fast Internet access to any user, on any device, from anywhere in the world.

www.zscaler.com