Technology Partners

Agari Data

Agari is on a mission to protect leading enterprises and government agencies, their partners, customers and citizens from advanced email phishing attacks.

www.agari.com/ 

Amazon Web Services

Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centers globally.

https://aws.amazon.com/

Anomali

"Anomali helps organizations find and respond to cyber threats. That's our mission. We bring to your security team the one thing that's been missing - external context. With Anomali you can now identify suspicious or malicious traffic before it even reaches your network. We turn threat intelligence into your cyber no-fly list, and seamlessly integrate this with your internal security and IT systems."

www.anomali.com

AppViewX

AppViewX is revolutionizing the manner in which NetOps and SecOps teams deliver services to the rest of Enterprise IT.

https://www.appviewx.com/

Arctic Wolf

Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ engineers and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions, and all the expertise and tools required. 

Area 1 Security

Area 1 is the leading pure-play anti-phishing service. Our customers range from early stage leaders, to  global Fortune 500 enterprises, to U.S. Presidential and Senatorial campaigns; our customer satisfaction consistently measures better than 98 percent.

https://www.area1security.com/

AttackIQ

The world needs a safe, secure, and continuous way to measure and manage cybersecurity effectiveness. AttackIQ builds on the MITRE ATT&CK framework of adversary tactics, techniques, and procedures (TTPs) and emulates those TTPs to exercise security controls in the same way an adversary does, in production.

https://attackiq.com/

Axis Security

Axis Security sees a world where access to business applications is fully managed and secured based on modern architecture, innovative technology and a zero-trust business-centric approach. Our technologies transform open networks and vulnerable applications into fully protected resources that the business can leverage and trust to grow in a myriad of ways they can’t today.

https://www.axissecurity.com/

BeyondTrust

BeyondTrust unifies the industry’s broadest set of privileged access capabilities with centralized management, reporting, and analytics, enabling leaders to take decisive and informed actions to defeat attackers. Our holistic platform stands out for its flexible design that simplifies integrations, enhances user productivity, and maximizes IT and security investments.

www.beyondtrust.com

Bitdefender

Bitdefender delivers robust security you can rely on. With a global security delivery infrastructure protecting half a billion users, visionary solutions, and a wealth of awards, we have been a trusted security provider since 2001.

https://www.bitdefender.com/

BitSight

BitSight pioneered the security ratings market, founding the company with a solitary mission: to transform how organizations evaluate risk and security performance by employing the outside-in model used by credit rating agencies.

https://www.bitsight.com/

BlackBerry

BlackBerry provides organizations with software to secure the IoT devices they use, the products they make, the data they share and their communications.

https://www.blackberry.com/

Capsule8

Purpose-built for Linux systems, Capsule8 will not only detect the simplest commodity malware or rogue developer behavior, but well-resourced attack campaigns using zero-days as well.

https://capsule8.com/

Carbon Black

Carbon Black leads a new era of endpoint security by enabling organizations to disrupt advanced attacks, deploy the best prevention strategies for their business, and leverage the expertise of 10,000 professionals from IR firms, MSSPs, and enterprises to shift the balance of power back to security teams. Only Carbon Black continuously records and centrally retains all endpoint activity, making it easy to track an attacker’s every action, instantly scope every incident, unravel entire attacks and determine root causes. Carbon Black also offers a range of prevention options so organizations can match their endpoint defense to their business needs. Carbon Black has been named #1 in endpoint protection, incident response, and market share. Forward-thinking companies choose Carbon Black to arm their endpoints, enabling security teams to: Disrupt. Defend. Unite.

www.carbonblack.com

Check Point

Since 1993, Check Point has been dedicated to providing customers with uncompromised protection against all types of threats, reducing security complexity and lowering total cost of ownership.

www.checkpoint.com

Cisco

Cisco Systems provides a wide variety of network hardware and software solutions, including routers, switches, wireless, storage networking, VoIP, security, and network management.

www.cisco.com

Citrix

Citrix was founded on a core principle: to make the world’s apps and data secure and easy to access. Anywhere. At any time. And on any device or network.

www.citrix.com

Cloudflare

Trusted by over 26 million Internet properties. Cloudflare provides a scalable, easy-to-use, unified control plane to deliver security, performance, and reliability for on-premises, hybrid, cloud, and SaaS applications

https://www.cloudflare.com/

Cloudian

Cloudian® is a Silicon Valley-based file and object storage company specializing in S3-compatible object storage systems. With technology roots in the large-scale enterprise message space, Cloudian introduced its object-based platform, HyperStore®, in 2011.

https://cloudian.com/

CloudKnox

CloudKnox delivers the only multi-cloud permissions management platform that enables the automated enforcement of least privilege policies at cloud scale.

https://cloudknox.io/

Cofense

Cofense empowers your people to recognize phishing attacks and stop them in minutes, not days. Our end-to-end phishing defense solution combines cutting-edge technology with collective human intelligence to protect your organization from inbox to SOC.

www.cofense.com

Cohesity

Cohesity makes large organizations productive by consolidating, protecting and sharing your non-mission-critical data assets. Your essential data is instantly available when you need it, where you need it. Our ground-breaking distributed systems technology hyperconverges all secondary storage workloads into an efficient, agile and infinitely scalable resource pool. This greatly simplifies both your infrastructure and the resources to administer it.

www.cohesity.com

CrowdStrike

CrowdStrike is a leading provider of next-generation endpoint protection, threat intelligence, and pre and post incident response services. CrowdStrike Falcon is the first true Software as a Service (SaaS) based platform for next-generation endpoint protection that detects, prevents, and responds to attacks, at any stage – even malware-free intrusions.

www.crowdstrike.com

CyberArk

CyberArk (NASDAQ: CYBR) is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads, and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. To learn more about CyberArk, visit https://www.cyberark.com.

CyberBit

Cyberbit’s battle-hardened cybersecurity solutions detect, analyze and respond to the most advanced, complex and targeted threats.

www.cyberbit.net

Cynet

Cynet 360 is the world’s first autonomous breach protection platform. Cynet eliminates the need of complex multi-product stacks, making robust breach protection within reach for any organization.

https://www.cynet.com/

Darktrace

Without using rules or signatures, Darktrace is uniquely capable of understanding the ‘pattern of life’ of every device, user and network within an organization, and defends against evolving threats that bypass all other systems.

www.darktrace.com

Dell

For more than 28 years, Dell has empowered countries, communities, customers, and people everywhere to use technology to realize their dreams. Customers trust Dell to deliver technology solutions that help them do and achieve more, whether they’re at home, work, school, or anywhere in their world.

www.dell.com

Digital Guardian

Industry leading DLP plus data-centric Endpoint Detection and Response (EDR) all from a single cloud-delivered, big-data analytics service. See, understand and stop threats to your sensitive data from insiders and outside attackers.

digitalguardian.com

DomainTools

DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network, including domains and IPs, and connect them with nearly every active domain on the Internet. Those connections inform risk assessments, help profile attackers, guide online fraud investigations, and map cyber activity to attacker infrastructure.

www.domaintools.com

Duo Security

Duo Security protects organizations against data breaches by ensuring only legitimate users and appropriate devices have access to sensitive data and applications - anytime, anywhere.

www.duo.com

eG Innovations

eG Innovations provides intelligent performance management solutions that automate and dramatically accelerate the discovery, diagnosis, and resolution of service performance issues in virtual, cloud, and physical service infrastructures.

www.eginnovations.com

Entrust Datacard

Entrust Datacard offers trusted identity and secure transaction technologies that make making purchases, crossing borders, accessing e-gov services or logging onto corporate networks reliable and secure.

www.entrustdatacard.com

Exabeam

Exabeam helps security teams outsmart the odds by adding intelligence to existing security tools – SIEMs, XDRs, cloud data lakes and hundreds of other Exabeam Technology Alliance Partner products.

https://www.exabeam.com/

ExtraHop

ExtraHop provides hybrid security for the cloud-first enterprise, delivering Network Detection and Response (NDR) powered by cloud-scale machine learning. With complete visibility, real-time threat detections, and guided investigation, ExtraHop enables security teams to rise above the noise of alerts, organizational silos, and runaway technology in order to accelerate investigations, unify policies across hybrid environments, and build their security the way they’re building their business: cloud-first. 

www.extrahop.com

F5

At F5, our mission is based on the fact that businesses depend on apps. Whether it’s apps that help connect businesses to their customers or apps that help employees do their jobs—we make sure apps are always available, and secure, anywhere. The world’s largest enterprises, service providers, financial and educational institutions, government entities, and consumer brands rely on F5 to stay ahead of security, cloud, and mobility trends.

www.f5.com

FireEye

FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber-attacks.

www.fireeye.com

FireMon

FireMon is the industry leader in providing enterprises, governments, and managed services providers with advanced security management solutions that deliver deeper visibility and tighter control over their network security infrastructure. The integrated FireMon solution suite – Security Manager, Policy Planner, and Risk Analyzer – enables customers to identify network risk, proactively prevent access to vulnerable assets, clean up firewall policies, automate compliance, strengthen security throughout the organization, and reduce the cost of security operations.

www.firemon.com

Forcepoint

Forcepoint™ was created to empower organizations to drive their business forward by safely embracing transformative technologies – cloud, mobility, Internet of Things (IoT), and others – through a unified, cloud-centric platform that safeguards users, networks and data, while eliminating the inefficiencies involved in managing a collection of point security products. 

www.forcepoint.com

Forescout

Forescout offers Global 2000 enterprises and government organizations the unique ability to see devices, including non-traditional devices, the instant they connect to the network. Equally important, Forescout lets you control these devices and orchestrate information sharing and operation among disparate security tools to accelerate incident response. Unlike traditional security alternatives, Forescout achieves this without requiring software agents or previous device knowledge. The company’s solutions integrate with leading network, security, mobility and IT management products to overcome security silos, automate workflows, and enable significant cost savings.

www.forescout.com

Fortinet

Fortinet provides top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric. 

www.fortinet.com

Gigamon

Gigamon provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s products deliver advanced intelligence so that security, network and application performance management solutions in enterprise, government, and service provider networks operate more efficiently and effectively.

www.gigamon.com

Guardicore

Guardicore is a data center and cloud security company that protects your organization’s core assets using flexible, quickly deployed, and easy to understand microsegmentation controls. Our solutions provide a simpler, faster way to guarantee persistent and consistent security — for any application, in any IT environment.

www.guardicore.com

HYPR

HYPR decentralizes and encrypts biometric data to enable secure, passwordless authentication across mobile, desktop, and IoT systems. Users can choose from a variety of biometric authentication methods by leveraging existing fingerprint sensors, cameras, and microphones on mobile devices.

www.hypr.com

IBM

For more than a century IBM has been dedicated to every client's success and to creating innovations that matter for the world.

https://www.ibm.com/

iboss

Built on a proprietary containerized architecture designed 100% for the cloud, iboss cloud secures Internet access from anywhere, including in and out of your physical network perimeter.

https://www.iboss.com/

IGEL Technology

A world leader in the delivery of powerful workspace management software, software-defined thin clients, and thin and zero client solutions, IGEL Technology helps organizations improve the agility, efficiency, and security of their virtual desktop and application delivery systems.

www.igel.com

Illumio

Illumio delivers adaptive security for every computing environment and visualizes application traffic, delivering continuous, scalable, and dynamic policy and enforcement to every server, VM, container, and VDI within data centers and public clouds.

www.illumio.com

Imperva

Imperva is a pioneer and leader of a new category of data security solutions for high-value business data in the data center. With more than 1,300 end-user customers and thousands of organizations protected through cloud-based deployments, Imperva's customers include leading enterprises, government organizations, and managed service providers who rely on Imperva to prevent sensitive data theft from hackers and insiders.

www.imperva.com

Indeni

Indeni proactively troubleshoots your network and security devices to give you real-time, highly relevant information to help you prevent downtime in your network - gone are the days of just relying on SNMP-based monitoring. 

www.indeni.com

Infoblox

Infoblox invented network identity appliances, which deliver reliable, scalable, manageable, and secure services including DNS, DHCP, RADIUS, TFTP, and IPAM.  The integrated Infoblox approach combines the power of appliance-based, nonstop local service delivery with the benefits of advanced distributed database technology to provide consolidated management with unparalleled visibility, control and availability.

www.infoblox.com

Infoblox

Infoblox is a leader with 50 percent market share in core network services, which includes Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), and IP address management (IPAM), collectively known as DDI. Building upon this proven foundation, we’re bringing DDI and core network services to the next level with our Secure Cloud-Managed Network Services.

www.infoblox.com

Infocyte

Infocyte is the result of 20+ years of experience hunting adversaries within the largest, most complex, and most targeted defense networks in the world. Infocyte enables organizations large and small to take a proactive approach to cyber security: reducing risk, maintaining strict compliance, and streamlining cybersecurity operations.

www.infocyte.com

Intel

Intel create world-changing technology that enriches the lives of every person on earth.

https://www.intel.com/

Ivanti

LANDESK and HEAT Software merged in January 2017 and brought all their various brands (including AppSense) together as Ivanti. Whether you’re looking for systems management, IT asset management solutions, IT service management improvement in the cloud, IT security solutions, or patch management that you can use with or without SCCM, Ivanti stands ready to help. 

https://www.ivanti.com/ 

Juniper Networks

We believe the network is the single greatest vehicle for knowledge, collaboration, and human advancement that the world has ever known. Now more than ever, the world relies on high-performance networks. And now more than ever, the world needs network innovation to unleash our full potential.

www.juniper.net

KnowBe4

KnowBe4 provides Security Awareness Training to help you manage the IT security problems of social engineering, spear phishing and ransomware attacks.

https://www.knowbe4.com/

Lakeside Software

Lakeside Software transforms the way that enterprises deploy, manage, secure, improve, and report on end user experience by coupling the world’s most lightweight agent with a robust data analysis engine to instantly grant complete visibility and control to administrators without impacting end user experience.

www.lakesidesoftware.com

Liquid Technology

To be a trusted partner in computer equipment liquidation, secure data destruction and e-waste handling services by leveraging our market expertise to provide the highest possible return to our clients.

https://liquidtechnology.net/

Liquidware Labs

Liquidware Labs is an industry leader in desktop virtualization solutions for next-generation physical and virtual desktops, including VMware View, Citrix XenDesktop, Red Hat and Microsoft Windows.

www.liquidwarelabs.com

Liquit

Founded in 2015 in the Netherlands, Liquit is a software vendor that delivers Enterprise-ready Digital Workspace Management and Enterprise Service Catalog solutions.

https://www.liquit.com/

Login VSI

Login VSI makes it easy to load test, benchmark, and plan capacity to improve end-user experience and productivity for even the most complex virtualized desktop environments. Login VSI tests performance using virtual users, so real users benefit from consistently great performance. With agentless installation and minimal infrastructure requirements, Login VSI works in any Windows-based virtualized desktop environment including VMware Horizon View, Citrix XenDesktop and XenApp, and Microsoft Remote Desktop Services (Terminal Services).

www.loginvsi.com

Logitech

Our innovative tools are optimized for user performance and IT success. Designed for every work environment, our intelligent peripherals and advanced video collaboration solutions will give you powerful, easy-to-deploy victories across your organization.

https://www.logitech.com/

LogRhythm

LogRhythm is a leader in security intelligence and analytics, enabling organizations to rapidly detect, respond to, and neutralize damaging cyber threats. LogRhythm also provides innovative compliance automation and assurance, and enhanced IT intelligence.

www.logrhythm.com

Lookout, Inc.

Lookout is the recognized leader in enterprise mobile security. Not only did we create the mobile threat defense market, we have introduced several trailblazing solutions, including Lookout Mobile Endpoint Security, Phishing and Content Protection and App Defense—all fueled by the Lookout Security Cloud.

www.lookout.com

McAfee

McAfee is one of the world’s leading independent cybersecurity companies. Inspired by the power of working together, McAfee creates business and consumer solutions that make the world a safer place. By building solutions that work with other companies' products, McAfee helps businesses orchestrate cyber environments that are truly integrated, where protection, detection, and correction of threats happen simultaneously and collaboratively. By protecting consumers across all their devices, McAfee secures their digital lifestyle at home and away. By working with other security players, McAfee is leading the effort to unite against cybercriminals for the benefit of all.

www.mcafee.com

Microsoft

Microsoft's mission: Empower every person and every organization on the planet to achieve more. Microsoft's strategy: Build best-in-class platforms and productivity services for a mobile-first, cloud-first world.

www.microsoft.com

Nerdio

Nerdio is the definitive Azure deployment, pricing, packaging, management, and optimization solution for MSPs.

https://getnerdio.com/

NetApp

NetApp brings together the world's most creative and dedicated people to help you affordably store, manage, protect, and retain one of your most precious assets—your data. NetApp has built a reputation for innovative problem solving by creating products and solutions that deliver efficiency savings and enable breakthrough business capabilities.

www.netapp.com

Netskope

The organic adoption of cloud and mobile in the enterprise presents challenges for security teams when it comes to managing risk without slowing down the business. Security has traditionally managed risk by applying heavy-handed controls, but today’s business wants to move fast without having velocity throttled. Netskope is redefining cloud, network, and data security, empowering security teams with the right balance of protection and speed they need to secure their organization’s digital transformation journey.

www.netskope.com

NopSec

NopSec operates with one mission: to help people make better decisions to reduce security risks. Our team is passionate about building technology to help customers simplify their work, manage security vulnerability risks effectively, and empower them to make more informed decisions.

https://www.nopsec.com/

Nutanix

Nutanix delivers an enterprise cloud platform that natively converges compute, virtualization and storage into a resilient, software-defined solution with rich machine intelligence. The world’s most advanced enterprise datacenters rely on Nutanix technology to power their mission-critical workloads at any scale.

www.nutanix.com

NVIDIA

NVIDIA GRID technology offers the ability to offload graphics processing from the CPU to the GPU in virtualized environments, giving the data center manager the freedom to deliver true PC graphics-rich experiences to more virtual users for the first time. 

www.nvidia.com

ObserveIT

ObserveIT, a leader in privileged user activity monitoring, allows companies to leverage the benefits of cloud-based and increasingly open IT environments without sacrificing the security of a company's most important asset, its data. By auditing, monitoring, and recording privileged user activity, ObserveIT dramatically reduces the cost and time required for compliance and enables companies to monitor third-party vendor relationships. ObserveIT provides real-time and historical, context-aware video monitoring of privileged user activity for physical, virtual, and cloud-based servers.

www.observeit.com

Okta

Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security policies. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications.

www.okta.com

One Identity

One Identity, a Quest Software business, helps organizations establish an identity-centric security strategy. With a unique identity and access management (IAM) portfolio, our award-winning offering includes identity governance, AD-centered IAM, privileged access management and identity SaaS solutions, One Identity helps organizations secure their enterprise end to end, smoothly make their digital transformation, eliminate identity challenges and reduce their attack surface from internal and external threats. Our unequalled commitment to our customers’ long-term IAM success is evident in our 7,500 customers worldwide that rely on us to manage more than 125 million identities.

www.oneidentity.com

OneLogin

OneLogin's Unified Access Management Platform unifies access to both SaaS and on-premises applications, as well as a wide range of networks and devices. OneLogin makes it simpler and safer for everyone to access the apps and data they need, anytime and everywhere.

www.onelogin.com

OpenText

OpenText is the leader in Enterprise Information Management. Our EIM products enable businesses to grow faster, lower operational costs, and reduce information governance and security risks by improving business insight, impact and process speed.

www.opentext.com

Palo Alto Networks

Palo Alto Networks provides a wide suite of enterprise-level next-generation firewalls, with a diverse range of security features for your network.

www.paloaltonetworks.com

Pivot3

Pivot3, the inventors of software-defined storage and pioneers in hyper-converged infrastructure (HCI) solutions for the data center, offers a range of Enterprise HCI solutions for high performance workloads in data intensive environments. Our patented technology is the result of over a decade of research and development, and continuous optimizations. It is the ideal compute platform for virtual desktop infrastructure (VDI), surveillance, disaster recovery, server virtualization, and more.  

www.pivot3.com

Proofpoint

Proofpoint, Inc. is the leading provider of enterprise-class messaging security solutions that protect organizations from the threats and risks of both inbound and outbound email and other messaging streams. Proofpoint's comprehensive platform enables companies to stop spam, defend against viruses and network attacks, and prevent leaks of confidential or sensitive information.

www.proofpoint.com

Pure Storage

Pure Storage, the all-flash enterprise storage company, enables the broad deployment of flash in the data center. When compared to traditional disk-centric arrays, Pure Storage all-flash enterprise arrays are 10x faster and 10x more space and power efficient. The Pure Storage FlashArray is ideal for high performance workloads, including server virtualization, desktop virtualization, (VDI), database (OLTP, real-time analytics), and cloud computing.

www.purestorage.com

Qualys

Qualys is the leading provider of information security and compliance cloud solutions, with more than 15,700 global businesses in more than 130 countries trusting Qualys to underpin digital transformation for greater agility, better business outcomes, and substantial cost savings.

www.qualys.com

 

Quantum

Quantum is a leading expert in scale-out tiered storage, archive and data protection, providing intelligent solutions for capturing, sharing and preserving digital assets over the entire data lifecycle. 

www.quantum.com

Quest Software

Quest builds community-driven software solutions that help you spend less time on IT administration and more time on business innovation.

www.quest.com

Radware

Radware is a global leader of cyber security and application delivery solutions for physical, cloud, and software defined data centers. Its award-winning solutions portfolio secures the digital experience by providing infrastructure, application, and corporate IT protection and availability services to enterprises globally. Radware’s solutions empower more than 12,500 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down.

www.radware.com

Rapid7

Rapid7 transforms data into action, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.

www.rapid7.com

Recorded Future

Recorded Future specializes in the collection, processing, analysis, and dissemination of threat intelligence. Recorded Future uses patented machine learning and natural language processing methods to continuously collect and organize data from open web, dark web, and technical sources.

www.recordedfuture.com

Remediant

Remediant prevents ransomware and other sophisticated intrusions by removing 24x7 administrator rights from endpoints and adding back only what is needed, Just-in-Time.

https://www.remediant.com/

Reservoir Labs

Reservoir Labs' team of experts conduct thought-leading research, develop novel technologies, and create highly useful advanced computing and communications products that serve the security and communications needs of Reservoir’s commercial and government customers.

www.reservoir.com/

Riverbed

Riverbed makes applications, websites, networks, data centers, the cloud, and remote offices work better. We bring the promise of digital transformation to life.

www.riverbed.com

RSA

RSA® Business-Driven Security™ solutions uniquely link business context with security incidents to help organizations manage risk and protect what matters most. RSA solutions are designed to effectively detect and respond to advanced attacks; manage user identities and access; and reduce business risk, fraud and cybercrime. RSA protects millions of users worldwide and works with more than 90 percent of the Fortune 500.

www.rsa.com

Rubrik

Rubrik simplifies backup and recovery for virtualized environments. It eliminates backup software by integrating deduplicated storage, catalog management, and data orchestration into a single, scale-out fabric.

www.rubrik.com

SailPoint

SailPoint is the leader in identity security for the cloud enterprise. We’re committed to protecting businesses from the inherent risk that comes with providing technology access across today’s diverse and remote workforce.

https://www.sailpoint.com/

SCYTHE

SCYTHE is an adversary emulation platform for the enterprise and cybersecurity consulting market. The SCYTHE platform enables Red, Blue, and Purple teams to build and emulate real-world adversarial campaigns in a matter of minutes.

https://www.scythe.io/

Secure Network Technologies

Secure Network Technologies, Inc is a full service information security consulting firm based out of Syracuse, NY. Secure Network offers the widest range of security and investigative services with a large client base both domestically and internationally.

https://www.securenetworkinc.com/

SecurityScorecard

SecurityScorecard is a security risk benchmarking platform that provides instant visibility into the security posture of any organization.

www.securityscorecard.com

Securonix

The Securonix platform automates security operations while our analytics capabilities reduces noise, fine tunes alerts, and identifies threats both inside and out of the enterprise.

https://www.securonix.com/

SentinelOne

Endpoint security software that defends every endpoint against every type of attack, at every stage in the threat lifecycle.

https://www.sentinelone.com/

Silverfort

Silverfort enables Multi-Factor Authentication (MFA), Risk-Based Authentication (RBA) and Zero Trust policies across all sensitive corporate and cloud assets, including systems that couldn’t be protected until today – without requiring any agents, proxies or code changes.

https://www.silverfort.com/

Sixgill

Sixgill brings agility to threat intelligence by introducing the Continuous Investigation/Continuous Protection™ (CI/CP) approach to security. CI/CP uses automation tools that empower security teams to collect, analyze, research, and respond after each intel development as seamlessly as possible.

https://www.cybersixgill.com/

 

Skybox Security

Skybox provides security management solutions that extract insight from security data silos to give visibility of the attack surface, including all Indicators of Exposure (IOEs). With unparalleled visibility and context-aware intelligence of the attack surface, Skybox solutions drive effective vulnerability and threat management, firewall management, and continuous compliance monitoring.

www.skyboxsecurity.com

Snyk

Snyk’s unique combination of developer-first tooling and best in class security depth enables businesses to easily build security into their continuous development process.

https://snyk.io/

Source Defense

Source Defense is the market leader in Client-side Web Security, providing real time threat protection against vulnerabilities originating in third-party scripts such as Magecart & Formjacking attacks.

www.sourcedefense.com

SPHERE Technology Solutions

Our product combines business intelligence, institutional knowledge  and industry best practices to effectively help you monitor your key risk indicators, ensuring that your environment remains clean and secure.

https://www.sphereco.com/

Spirion

Spirion is the critical first step toward data privacy and security. We build and deliver the most accurate data discovery and classification solutions on the planet to position our customers for unparalleled data privacy, security, and regulatory compliance. Since 2006, Spirion has empowered the data privacy, security, and compliance strategies of thousands of organizations worldwide and across multiple industries.

www.spirion.com

Splunk

Splunk is the leading software platform for machine data that enables customers to gain real-time Operational Intelligence. Splunk’s mission is to address the challenges and opportunities of managing massive streams of machine-generated big data. More than three quarters of the Fortune 100 and thousands of enterprises, universities, government agencies and service providers use Splunk software to harness the power of their machine data for application management, IT operations, security, web intelligence, customer and business analytics and more.

www.splunk.com

Tanium

Tanium delivers a new and innovative approach to endpoint management and security that delivers instant visibility and responsiveness.

www.tanium.com

Tenable

Tenable™, Inc. is the Cyber Exposure company. Over 23,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus®, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into Tenable.io™ to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, large government agencies and mid-sized organizations across the private and public sectors.

www.tenable.com

Tessian

Tessian’s mission is to secure the human layer. Using machine learning technology, Tessian automatically stops data breaches and security threats caused by human error - like data exfiltration, accidental data loss, business email compromise and phishing attacks - with minimal disruption to employees' workflow. As a result, employees are empowered to do their best work, without security getting in their way. Founded in 2013, Tessian is backed by renowned investors like Sequoia, Accel, March Capital, and Balderton and has offices in San Francisco, Boston and London.

https://www.tessian.com/

ThreatConnect, Inc.

ThreatConnect, Inc. provides industry-leading advanced threat intelligence software and services including ThreatConnect®, the most comprehensive Threat Intelligence Platform (TIP) on the market. ThreatConnect delivers a single platform in the cloud and on-premises to effectively aggregate, analyze, and act to counter sophisticated cyber-attacks. Leveraging advanced analytics capabilities, ThreatConnect offers a superior understanding of relevant cyber threats to business operations.

www.threatconnect.com

ThreatQuotient

ThreatQuotient provides ThreatQ, the only Threat Intelligence Platform (TIP) that centrally manages and correlates unlimited external sources with all internal security and analytics solutions for contextual, operationalized intelligence in a single pane of glass. ThreatQ is also the first TIP to provide Indicator Nurturing, which goes beyond enrichment to help customers tailor indicators of compromise (IOCs) specifically to their infrastructure.

www.threatq.com

Thycotic

Thycotic is a complete privileged account management provider, managing and auditing privileged accounts across a company’s entire IT infrastructure. Thycotic also provides end-user password management and self-service AD group management tools.

www.thycotic.com

TierPoint

TierPoint is a data center provider of colocation, cloud computing, backup and business continuity, managed security, and professional services.

www.tierpoint.com

Trend Micro

Trend Micro is a global leader in network antivirus and Internet content security software and services. Trend Micro focuses on outbreak prevention and providing customers with a comprehensive approach to managing the outbreak lifecycle and the impact of network worms and virus threats to productivity and information.

www.trendmicro.com

Tricerat

Tricerat's virtualization software helps boost performance and system reliability with a wide range of offerings. Simplify Printing eliminates the need for printer driver management. Simplify Profiles, a single-point of control for registry administration, ensures reliability and consistency of registry keys across the server farm. Simplify Lockdown provides the power of published desktops without complex system policies or registry hacks. triCerat's flagship product, Simplify Suite, provides a number of comprehensive desktop management tools in one product offering.

www.tricerat.com

Tufin

Tufin is the leader in Security Policy Orchestration, enabling enterprises to centrally manage, visualize, and control security policies across hybrid cloud and physical network environments. Tufin serves over 1,700 enterprise customers in industries worldwide, including finance, telecom, energy and utilities, healthcare and pharmaceuticals, retail, education, government, manufacturing, and transportation. The award-winning Tufin Orchestration Suite is a complete solution for automatically designing, provisioning, analyzing, and auditing network security changes from the application layer down to the network layer. By optimizing security policies, Tufin reduces the attack surface and minimizes disruptions to critical applications. Its network security automation provides enterprises with rapid service delivery, continuous compliance, and increased agility.

www.tufin.com

Turbonomic

Turbonomic’s autonomic platform enables heterogeneous environments to self-manage to assure the performance of any application in any cloud. Turbonomic’s patented autonomic decision engine dynamically analyzes application demand and allocates shared resources in real time to maintain a continuous state of application health.

www.turbonomic.com

UniPrint

UniPrint pioneered the use of PDF-based universal printer driver technology to streamline and enhance printing in Server-based Computing (SbC) environments. Today, UniPrint is the recognized leader in printing virtualization. The UniPrint Suite offers a comprehensive range of enhanced-printing solutions for all computing environments. UniPrint's latest release, the UniPrint Infinity software, optimizes printing functionality, minimizes printer management, improves security, and reduces bandwidth consumption.

www.uniprint.net

Unitrends

Unitrends delivers award-winning business recovery solutions for any IT environment. The company’s portfolio of virtual, physical, and cloud solutions provides adaptive protection for organizations globally. Unitrends delivers end-to-end protection and instant recovery of all virtual and physical assets as well as automated disaster recovery testing built for virtualization.

www.unitrends.com

Varonis

Varonis is a leading provider of software solutions that protect data from insider threats and cyber attacks. Through an innovative software platform, Varonis allows organizations to analyze, secure, manage, and migrate their volumes of unstructured data. Varonis specializes in file and email systems that store valuable spreadsheets, word processing documents, presentations, audio and video files, emails, and text.

www.varonis.com

Veeam

Veeam® has pioneered a new market of Availability for the Always-On Enterprise™ that helps businesses meet recovery time and point objectives (RTPO™) of less than 15 minutes for all applications and data.

www.veeam.com

Veracode

Veracode delivers the application security solutions and services today’s software-driven world requires. Veracode’s unified platform assesses and improves the security of applications from inception through production so that businesses can confidently innovate with the web and mobile applications they build, buy and assemble as well as the components they integrate into their environments.

www.veracode.com

Veritas Technologies

Veritas Technologies empowers businesses of all sizes to discover the truth in information—their most important digital asset. Using the Veritas platform, customers can accelerate their digital transformation and solve pressing IT and business challenges including multi-cloud data management, data protection, storage optimization, compliance readiness and workload portability—with no cloud vendor lock-in.

www.veritas.com

VMware

VMware, a global leader in cloud infrastructure and business mobility, accelerates our customers’ digital transformation journey by enabling enterprises to master a software-defined approach to business and IT.

www.vmware.com

Votiro

The only file security solution that ensures all files coming into your enterprise are completely safe.

https://votiro.com/

ZeroFOX

ZeroFOX provides enterprises protection, intelligence and disruption to dismantle external threats to brands, people, assets and data across the public attack surface in one, comprehensive platform. ZeroFOX combines advanced AI, expert human intelligence services to detect and analyze complex, targeted threats, and automated disruption services to neutralize attacker infrastructure. 

https://www.zerofox.com/

Zerto

Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments. Zerto’s award winning solution provides enterprises with continuous data replication and recovery designed specifically for virtualized infrastructure and the cloud. Zerto Virtual Replication is the industry’s first hypervisor-based replication solution for tier-one applications, replacing traditional array-based BC/DR solutions that were not built to deal with the virtual paradigm.

www.zerto.com

Zscaler

Zscaler security services enable organizations to provide safe, fast Internet access to any user, on any device, from anywhere in the world.

www.zscaler.com