Technology Partners

Agari

Agari is on a mission to protect leading enterprises and government agencies, their partners, customers and citizens from advanced email phishing attacks.

https://www.agari.com/ 

Akamai

Akamai provides market-leading, cloud-based services for optimizing Web and mobile content and applications, online HD video, and secure e-commerce.  Combining highly-distributed, energy-efficient computing with intelligent software, Akamai's global platform is transforming the cloud into a more viable place to inform, entertain, advertise, transact and collaborate. To learn how the world's leading enterprises are optimizing their business in the cloud, follow @Akamai on Twitter.

www.akamai.com

Anomali

"Anomali helps organizations find and respond to cyber threats. That's our mission. We bring to your security team the one thing that's been missing - external context. With Anomali you can now identify suspicious or malicious traffic before it even reaches your network. We turn threat intelligence into your cyber no-fly list, and seamlessly integrate this with your internal security and IT systems."

www.anomali.com

Arbor Networks

Arbor Networks secures the world's most demanding and complex networks from DDoS attacks and advanced threats.

www.arbornetworks.com

Aternity

Aternity monitors any application on any physical, virtual, or mobile device, providing a user-centric vantage point that closes the visibility gap existing with network- and server-centric application performance management tools.

www.aternity.com

Atlantis Computing

Atlantis Computing is transforming enterprise desktop computing by solving the challenges of desktop virtualization: storage costs, performance, and the impact of security on server density. With Atlantis software, the virtual desktop user experience is better than a physical PC, while at the same time making virtual desktop deployments more affordable to IT organizations by cutting the amount of storage needed, permitting the use of less expensive storage, and increasing performance and densities. Atlantis Computing is privately held and funded by El Dorado Ventures, Partech International and Cisco Systems with U.S. headquarters in Mountain View, California, European headquarters in London, England, and a research and a development center in Bangalore, India.

www.atlantiscomputing.com

Avecto

Avecto is an innovator in endpoint security. Avecto’s philosophy of security + freedom promotes a positive user experience across every software implementation, allowing organizations to strike just the right balance. Its unique software, Defendpoint, makes prevention possible, integrating three proactive technologies to stop malware at the endpoint.

www.avecto.com

Avi Networks

Avi Networks delivers an Elastic Application Services Fabric that provides per-app load balancing, predictive autoscaling, application insights, security, and automation in any data center or cloud.

avinetworks.com

Aviatrix

Aviatrix provides an innovative Cloud Networking software solution that simplifies connectivity to the cloud in a secure and scalable way. At Aviatrix, we believe that networking is a foundational element of cloud computing and, should be as dynamic, scalable, and elastic as compute and  storage.

www.aviatrix.com

BackBox

BackBox is the leading provider for Automated Infrastructure Backup and Recovery solutions. Spanning across the diverse network and security landscape, BackBox will ensure that all supported device configuration files are verified and stored securely in one central location to ensure a speedy recovery, when required. BackBox provides real-time inventory, configuration comparison, and is ideal for any organization, multi-tenant sites and service providers.

www.backbox.co

Bromium

Bromium has developed next-generation security based on virtualization to secure organizations from cyber-attacks. Bromium uses virtualization to transform the endpoint.

www.bromium.com

BUFFERZONE

BUFFERZONE endpoint security solutions protect enterprises from advanced threats including zero-day, drive-by downloads, phishing scams and APTs. With cutting-edge containment, bridging and intelligence, BUFFERZONE gives employees seamless access to internet applications, mail and removable storage – while keeping the enterprise safe.

https://bufferzonesecurity.com/ 

Carbon Black

Carbon Black leads a new era of endpoint security by enabling organizations to disrupt advanced attacks, deploy the best prevention strategies for their business, and leverage the expertise of 10,000 professionals from IR firms, MSSPs, and enterprises to shift the balance of power back to security teams. Only Carbon Black continuously records and centrally retains all endpoint activity, making it easy to track an attacker’s every action, instantly scope every incident, unravel entire attacks and determine root causes. Carbon Black also offers a range of prevention options so organizations can match their endpoint defense to their business needs. Carbon Black has been named #1 in endpoint protection, incident response, and market share. Forward-thinking companies choose Carbon Black to arm their endpoints, enabling security teams to: Disrupt. Defend. Unite.

www.carbonblack.com

CensorNet

From the point of user access to deep granular application transparency and control, Censornet software helps organizations embrace the cloud without compromising security or frustrating users.

www.censornet.com

Check Point

Since 1993, Check Point has been dedicated to providing customers with uncompromised protection against all types of threats, reducing security complexity and lowering total cost of ownership.

www.checkpoint.com

Cirrus Data Solutions

Cirrus Data Solutions specializes in enterprise class software storage and data migration solutions.

www.cdsi.us.com

Cisco

Cisco Systems provides a wide variety of network hardware and software solutions, including routers, switches, wireless, storage networking, VoIP, security, and network management.

www.cisco.com

Citrix

Citrix was founded on a core principle: to make the world’s apps and data secure and easy to access. Anywhere. At any time. And on any device or network.

www.citrix.com

Cohesity

Cohesity makes large organizations productive by consolidating, protecting and sharing your non-mission-critical data assets. Your essential data is instantly available when you need it, where you need it. Our ground-breaking distributed systems technology hyperconverges all secondary storage workloads into an efficient, agile and infinitely scalable resource pool. This greatly simplifies both your infrastructure and the resources to administer it.

www.cohesity.com

Comtrade

Comtrade is a leading IT company specializing in the fields of software solutions, system integration, and hardware distribution. With a proven track record of delivering innovative IT solutions and services, Comtrade is a trusted technology partner to small, medium, and enterprise businesses.

www.comtrade.com

Congruity

Data Storage Experts - Thousands of companies rely on Congruity to maintain their critical IT infrastructures.

www.congruity.com

Cortado (formerly ThinPrint)

Cortado links mobile, web, and virtual desktops to centralized IT resources in a highly efficient, secure and manageable way, seamlessly integrating home offices and mobile employees, including those with tablets and complete branch offices, into the existing IT infrastructure. For the more than 15,000 enterprise customers (whose user numbers range from 5 to 100,000), as well as the hundreds of thousands of private users, Cortado continually creates more robust solutions with innovative features and added value. With internationally patented technology, Cortado is the leading provider of software-based print and mobile business solutions.

www.cortado.com

CrowdStrike

CrowdStrike is a leading provider of next-generation endpoint protection, threat intelligence, and pre and post incident response services. CrowdStrike Falcon is the first true Software as a Service (SaaS) based platform for next-generation endpoint protection that detects, prevents, and responds to attacks, at any stage – even malware-free intrusions.

www.crowdstrike.com

CyberArk

CyberArk provides solutions for connecting enterprises through its patented Vaulting Technology, including security, performance, and accessibility required to protect the most important corporate data assets.

www.cyberark.com

CyberBit

Cyberbit’s battle-hardened cybersecurity solutions detect, analyze and respond to the most advanced, complex and targeted threats.

www.cyberbit.net

Cylance

Cylance is a cybersecurity products and services company focusing on stopping tomorrow’s attacks today. Cylance specializes in next-generation antivirus, penetration testing, malware detection, security assessments, machine learning, advanced threat protection, and artificial intelligence.

www.cylance.com

Darktrace

Without using rules or signatures, Darktrace is uniquely capable of understanding the ‘pattern of life’ of every device, user and network within an organization, and defends against evolving threats that bypass all other systems.

www.darktrace.com

Dell

For more than 28 years, Dell has empowered countries, communities, customers, and people everywhere to use technology to realize their dreams. Customers trust Dell to deliver technology solutions that help them do and achieve more, whether they’re at home, work, school, or anywhere in their world.

www.dell.com

Dell EMC

Dell EMC brings together Dell’s and EMC’s respective strong capabilities and complementary portfolios, sales teams and R&D. They seek to become the technology industry’s most trusted advisor, providing capabilities spanning strategy development, consultative services and solution deployment and support to help our customers and partners drive the digital transformation of their businesses.

www.dellemc.com

Densify

Less cloud cost, less infrastructure with better performing apps. Densify is a predictive analytics service that optimizes your cloud in real-time. It’s not magic, it’s science.

www.densify.com

Digital Guardian

Industry leading DLP plus data-centric Endpoint Detection and Response (EDR) all from a single cloud-delivered, big-data analytics service. See, understand and stop threats to your sensitive data from insiders and outside attackers.

digitalguardian.com

Duo Security

Duo Security protects organizations against data breaches by ensuring only legitimate users and appropriate devices have access to sensitive data and applications - anytime, anywhere.

www.duo.com

eG Innovations

eG Innovations provides intelligent performance management solutions that automate and dramatically accelerate the discovery, diagnosis, and resolution of service performance issues in virtual, cloud, and physical service infrastructures.

www.eginnovations.com

Embotics

Embotics provides cloud management software that empowers businesses to leverage a comprehensive set of multi-hypervisor virtualization and cloud management capabilities. Embotics software allows IT organizations to deliver IT-as-a-Service from a single console while continuously monitoring resources to optimize automation, deployment, and configuration of IT services across private, public, and hybrid clouds.

www.embotics.com

Entrust Datacard

Entrust Datacard offers trusted identity and secure transaction technologies that make making purchases, crossing borders, accessing e-gov services or logging onto corporate networks reliable and secure.

www.entrustdatacard.com

ExaGrid

ExaGrid provides a scalable, cost-effective, disk-based backup and deduplication solution that revolutionizes how organizations back up and protect their data. ExaGrid’s unique landing zone and scale-out architecture provides the fastest backup, resulting in the shortest fixed backup window, the fastest local restores, fastest offsite tape copies and instant VM recoveries, while permanently fixing the backup window length.

www.exagrid.com

ExtraHop

ExtraHop is the leading provider of network-based application performance management (APM) solutions. The ExtraHop Application Delivery Assurance system performs the fastest and deepest analysis in the industry, achieving real-time transaction monitoring at speeds up to a sustained 10Gbps and application-level visibility with no agents, configuration, or overhead. The ExtraHop system quickly auto-discovers and auto-classifies the interdependencies between applications and devices, delivering immediate value within an hour of installation. ExtraHop Networks manages mission-critical, revenue-generating applications across a wide range of industries, including Retail, Healthcare, Financial Services, and Travel/Transportation/Logistics.

www.extrahop.com

FireEye

FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. 

www.fireeye.com

FireMon

FireMon is the industry leader in providing enterprises, governments, and managed services providers with advanced security management solutions that deliver deeper visibility and tighter control over their network security infrastructure. The integrated FireMon solution suite – Security Manager, Policy Planner, and Risk Analyzer – enables customers to identify network risk, proactively prevent access to vulnerable assets, clean up firewall policies, automate compliance, strengthen security throughout the organization, and reduce the cost of security operations.

www.firemon.com

Flexera Software

Flexera Software, formerly Acresso Software, maximizes the value of the software the world develops and uses. The leading provider of FlexNet Manager Suite, FlexNet Producer Suite, InstallShield, and AdminStudio, Flexera Software is trusted by more than 80,000 customers who use their solutions to drive cost and time from the software supply chain.

www.flexerasoftware.com

Forcepoint

Forcepoint™ was created to empower organizations to drive their business forward by safely embracing transformative technologies – cloud, mobility, Internet of Things (IoT), and others – through a unified, cloud-centric platform that safeguards users, networks and data, while eliminating the inefficiencies involved in managing a collection of point security products. 

www.forcepoint.com

ForeScout

ForeScout offers Global 2000 enterprises and government organizations the unique ability to see devices, including non-traditional devices, the instant they connect to the network. Equally important, ForeScout lets you control these devices and orchestrate information sharing and operation among disparate security tools to accelerate incident response. Unlike traditional security alternatives, ForeScout achieves this without requiring software agents or previous device knowledge. The company’s solutions integrate with leading network, security, mobility and IT management products to overcome security silos, automate workflows, and enable significant cost savings.

www.forescout.com

Fortinet

Fortinet provides top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric. 

www.fortinet.com

Gemalto

Gemalto is an international digital security company providing software applications, secure personal devices such as smart cards and tokens, and managed services. Gemalto delivers software and other technologies to businesses and governments that help them authenticate identities and protect data.

www.gemalto.com

Gigamon

Gigamon provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s products deliver advanced intelligence so that security, network and application performance management solutions in enterprise, government, and service provider networks operate more efficiently and effectively.

www.gigamon.com

Globalscape

GlobalSCAPE, Inc. is a worldwide leader in the secure movement and integration of data. Through Globalscape’s powerful yet intuitive technology, organizations can accelerate their digital transformation and maximize their potential by unleashing the power of data.

www.globalscape.com

Google Apps

Google Apps is a suite of cloud computing productivity and collaboration software tools and software offered by Google. It includes Gmail, Google Drive, Google Hangouts, Google Calendar and Google Docs.

www.apps.google.com

Guidance Software

Guidance Software provides a suite of digital investigation products designed for forensic, cyber security, security analytics, and e-discovery use.

www.guidancesoftware.com

HP

Reinventing the way people, machines, and content work together - worldwide.

www.hp.com

HYPR

HYPR decentralizes and encrypts biometric data to enable secure, passwordless authentication across mobile, desktop, and IoT systems. Users can choose from a variety of biometric authentication methods by leveraging existing fingerprint sensors, cameras, and microphones on mobile devices.

www.hypr.com

HyTrust

HyTrust is the Cloud Security Automation (CSA) company. HyTrust delivers the essential real-time control, security, administrative account monitoring, logging and compliance assurance necessary to enable the benefits of cloud adoption and virtualization of critical workloads.

www.hytrust.com

IGEL Technology

A world leader in the delivery of powerful workspace management software, software-defined thin clients, and thin and zero client solutions, IGEL Technology helps organizations improve the agility, efficiency, and security of their virtual desktop and application delivery systems.

www.igel.com

Illumio

Illumio delivers adaptive security for every computing environment and visualizes application traffic, delivering continuous, scalable, and dynamic policy and enforcement to every server, VM, container, and VDI within data centers and public clouds.

www.illumio.com

Imperva

Imperva is a pioneer and leader of a new category of data security solutions for high-value business data in the data center. With more than 1,300 end-user customers and thousands of organizations protected through cloud-based deployments, Imperva's customers include leading enterprises, government organizations, and managed service providers who rely on Imperva to prevent sensitive data theft from hackers and insiders.

www.imperva.com

indeni

indeni proactively troubleshoots your network and security devices to give you real-time, highly relevant information to help you prevent downtime in your network - gone are the days of just relying on SNMP-based monitoring. 

www.indeni.com

Invincea

Invincea is the premier innovator in advanced malware threat detection, end-user threat protection, and pre-breach forensic analysis. Invincea is the only solution on the market that provides enterprise networks with coverage against the largest attack surface for cyber-breach – attacks aimed at users in the form of spear phishing, poisoned search results, and user-initiated infections. The company’s solutions offer a unique ability to protect networks against all types of threats directed at end-users, including zero-days, by seamlessly moving applications that render untrusted content into controlled, secure virtual environments that automatically detect and terminate threats in real time. Invincea’s platform seamlessly moves the browser, PDF reader, Microsoft Office suite, .zip, and .exe file types from the native operating system into fully virtualized and secure environments without changing the user experience. 

www.invincea.com

Ivanti

LANDESK and HEAT Software merged in January 2017 and brought all their various brands (including AppSense) together as Ivanti. Whether you’re looking for systems management, IT asset management solutions, IT service management improvement in the cloud, IT security solutions, or patch management that you can use with or without SCCM, Ivanti stands ready to help. 

https://www.ivanti.com/ 

Juniper Networks

We believe the network is the single greatest vehicle for knowledge, collaboration, and human advancement that the world has ever known. Now more than ever, the world relies on high-performance networks. And now more than ever, the world needs network innovation to unleash our full potential.

www.juniper.net

Lakeside Software

Lakeside Software transforms the way that enterprises deploy, manage, secure, improve, and report on end user experience by coupling the world’s most lightweight agent with a robust data analysis engine to instantly grant complete visibility and control to administrators without impacting end user experience.

www.lakesidesoftware.com

Liquidware Labs

Liquidware Labs is an industry leader in desktop virtualization solutions for next-generation physical and virtual desktops, including VMware View, Citrix XenDesktop, Red Hat and Microsoft Windows.

www.liquidwarelabs.com

LockPath

LockPath is a market leader in corporate governance, risk management, regulatory compliance (GRC), and information security (InfoSec) software. Built on the patented Dynamic Content Framework (DCF), LockPath's flexible, scalable and fully integrated suite of applications is used by organizations to automate business processes, reduce enterprise risk and demonstrate regulatory compliance to achieve audit-ready status. The applications are designed to manage all facets of compliance and information security programs, including policies and procedures, risk assessment and mitigation, incident tracking and remediation, vulnerability management, third-party management, business continuity planning and audit preparation.

www.lockpath.com

Login VSI

Login VSI makes it easy to load test, benchmark, and plan capacity to improve end-user experience and productivity for even the most complex virtualized desktop environments. Login VSI tests performance using virtual users, so real users benefit from consistently great performance. With agentless installation and minimal infrastructure requirements, Login VSI works in any Windows-based virtualized desktop environment including VMware Horizon View, Citrix XenDesktop and XenApp, and Microsoft Remote Desktop Services (Terminal Services).

www.loginvsi.com

LogRhythm

LogRhythm is a leader in security intelligence and analytics, enabling organizations to rapidly detect, respond to, and neutralize damaging cyber threats. LogRhythm also provides innovative compliance automation and assurance, and enhanced IT intelligence.

www.logrhythm.com

Malwarebytes

Malwarebytes detects and removes malware on an infected computer with industry-leading anti-malware, anti-spyware, and anti-rootkit tech, runs continuously in the background to stop infections before they happen, blocks malicious websites, and uses Chameleon technology to prevent malware from terminating Malwarebytes or modifying its processes.

www.malwarebytes.com

McAfee

McAfee is one of the world’s leading independent cybersecurity companies. Inspired by the power of working together, McAfee creates business and consumer solutions that make the world a safer place. By building solutions that work with other companies' products, McAfee helps businesses orchestrate cyber environments that are truly integrated, where protection, detection, and correction of threats happen simultaneously and collaboratively. By protecting consumers across all their devices, McAfee secures their digital lifestyle at home and away. By working with other security players, McAfee is leading the effort to unite against cybercriminals for the benefit of all.

www.mcafee.com

Microsoft

Microsoft's mission: Empower every person and every organization on the planet to achieve more. Microsoft's strategy: Build best-in-class platforms and productivity services for a mobile-first, cloud-first world.

www.microsoft.com

NetApp

NetApp brings together the world's most creative and dedicated people to help you affordably store, manage, protect, and retain one of your most precious assets—your data. NetApp has built a reputation for innovative problem solving by creating products and solutions that deliver efficiency savings and enable breakthrough business capabilities.

www.netapp.com

Nimble Storage

Nimble was founded in 2008 with the core belief that flash, cloud, and big data analytics would disrupt the storage market.

Now a Hewlett Packard Enterprise company.

www.nimblestorage.com

Nutanix

Nutanix delivers an enterprise cloud platform that natively converges compute, virtualization and storage into a resilient, software-defined solution with rich machine intelligence. The world’s most advanced enterprise datacenters rely on Nutanix technology to power their mission-critical workloads at any scale.

www.nutanix.com

NVIDIA

NVIDIA GRID technology offers the ability to offload graphics processing from the CPU to the GPU in virtualized environments, giving the data center manager the freedom to deliver true PC graphics-rich experiences to more virtual users for the first time. 

www.nvidia.com

Nyansa

Voyance by Nyansa is the first and only comprehensive user performance management and network assurance platform that analyzes and correlates data across every layer of the network to ensure the best possible user performance. From client data, to data from access network infrastructure elements, application data to WAN data, no more hunting around to determine where network problems impacting user performance are hiding.

Our SaaS platform includes Voyance campus, Voyance WAN and Voyance Client agents that all work together to give IT staff unprecedented control over and knowledge of every client network transaction. Insights in plain English. No more scouring through volumes of log, Wi-Fi, and network data to improve user productivity on the network.

www.nyansa.com 

ObserveIT

ObserveIT, a leader in privileged user activity monitoring, allows companies to leverage the benefits of cloud-based and increasingly open IT environments without sacrificing the security of a company's most important asset, its data. By auditing, monitoring, and recording privileged user activity, ObserveIT dramatically reduces the cost and time required for compliance and enables companies to monitor third-party vendor relationships. ObserveIT provides real-time and historical, context-aware video monitoring of privileged user activity for physical, virtual, and cloud-based servers.

www.observeit.com

Okta

Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security policies. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications.

www.okta.com

Pivot3

Pivot3, the inventors of software-defined storage and pioneers in hyper-converged infrastructure (HCI) solutions for the data center, offers a range of Enterprise HCI solutions for high performance workloads in data intensive environments. Our patented technology is the result of over a decade of research and development, and continuous optimizations. It is the ideal compute platform for virtual desktop infrastructure (VDI), surveillance, disaster recovery, server virtualization, and more.  

www.pivot3.com

Polycom

Polycom helps organizations unleash the power of human collaboration. More than 400,000 companies and institutions worldwide defy distance with secure video, voice, and content solutions from Polycom to increase productivity, speed time to market, provide better customer service, expand education, and save lives. Polycom and its global partner ecosystem provide flexible collaboration solutions for any environment that delivers the best user experience, the broadest multi-vendor interoperability, and unmatched investment protection.

www.polycom.com

Proofpoint

Proofpoint, Inc. is the leading provider of enterprise-class messaging security solutions that protect organizations from the threats and risks of both inbound and outbound email and other messaging streams. Proofpoint's comprehensive platform enables companies to stop spam, defend against viruses and network attacks, and prevent leaks of confidential or sensitive information.

www.proofpoint.com

Pulse Secure

Pulse Secure is a leading provider of secure access and mobile security solutions to both enterprises and service providers. Pulse Secure enables worker mobility securely and seamlessly by using the company’s VPN, NAC, and mobile security products.

www.pulsesecure.net

Pure Storage

Pure Storage, the all-flash enterprise storage company, enables the broad deployment of flash in the data center. When compared to traditional disk-centric arrays, Pure Storage all-flash enterprise arrays are 10x faster and 10x more space and power efficient. The Pure Storage FlashArray is ideal for high performance workloads, including server virtualization, desktop virtualization, (VDI), database (OLTP, real-time analytics), and cloud computing.

www.purestorage.com

Quantum

Quantum is a leading expert in scale-out tiered storage, archive and data protection, providing intelligent solutions for capturing, sharing and preserving digital assets over the entire data lifecycle. 

www.quantum.com

Quest

Quest builds community-driven software solutions that help you spend less time on IT administration and more time on business innovation.

www.quest.com

Rapid7

Rapid7 transforms data into action, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.

www.rapid7.com

Resilient, an IBM Company

Resilient’s mission is to help organizations thrive in the face of any cyber attack or business crisis. The award-winning Incident Response Platform (IRP) empowers security teams to analyze, respond to and mitigate incidents faster, smarter, and more efficiently. Part of IBM Security, the Resilient IRP also integrates security technologies into a single hub and provides easy workflow customization and process automation. With Resilient, security teams can have best-in-class response capabilities.

www.resilientsystems.com

Riverbed

Riverbed makes applications, websites, networks, data centers, the cloud, and remote offices work better. We bring the promise of digital transformation to life.

www.riverbed.com

RSA

RSA® Business-Driven Security™ solutions uniquely link business context with security incidents to help organizations manage risk and protect what matters most. RSA solutions are designed to effectively detect and respond to advanced attacks; manage user identities and access; and reduce business risk, fraud and cybercrime. RSA protects millions of users worldwide and works with more than 90 percent of the Fortune 500.

www.rsa.com

Rubrik

Rubrik simplifies backup and recovery for virtualized environments. It eliminates backup software by integrating deduplicated storage, catalog management, and data orchestration into a single, scale-out fabric.

www.rubrik.com

Seagate

Seagate provides data storage solutions, enabling businesses to create, share, and preserve critical data.

www.seagate.com

SecuPi

SecuPi provides real-time visibility on sensitive data exfiltration/suspicious activities. SecuPi enforces central access privilege policies, masking, redacting or blocking malicious activity before it occurs, using application-server agents without endpoints, networks, or database changes.

www.secupi.com

SecurityScorecard

SecurityScorecard is a security risk benchmarking platform that provides instant visibility into the security posture of any organization.

www.securityscorecard.com

Siemplify

Transforming the way enterprises perform cyber threat analysis, Siemplify is the first security operations platform to employ the same advanced cybersecurity methodologies used by leading military intelligence organizations. The Siemplify Threat Analysis Platform automatically correlates security alerts, identifies and prioritizes incidents, and graphically depicts the complete threat chain, setting new standards for time-to-insight and time-to-remediate. The platform acts as a central hub linking an organization’s existing security, threat intelligence and risk management tools, including Splunk and popular SIEMs, effectively improving the return on those investments.

www.siemplify.co

Skybox Security

Skybox provides security management solutions that extract insight from security data silos to give visibility of the attack surface, including all Indicators of Exposure (IOEs). With unparalleled visibility and context-aware intelligence of the attack surface, Skybox solutions drive effective vulnerability and threat management, firewall management, and continuous compliance monitoring.

www.skyboxsecurity.com

Skyhigh

Skyhigh enables organizations to accelerate their business by providing total control over data and user activity across cloud services.

www.skyhighnetworks.com

Sophos

Sophos develops products for communication endpoint, encryption, network security, email security, mobile security and unified threat management.

www.sophos.com

Splunk

Splunk is the leading software platform for machine data that enables customers to gain real-time Operational Intelligence. Splunk’s mission is to address the challenges and opportunities of managing massive streams of machine-generated big data. More than three quarters of the Fortune 100 and thousands of enterprises, universities, government agencies and service providers use Splunk software to harness the power of their machine data for application management, IT operations, security, web intelligence, customer and business analytics and more.

www.splunk.com

STEALTHbits

Identify threats. Secure data. Reduce risk. STEALTHbits is a leading provider of data security solutions, protecting your most critical assets against today's greatest threats. Founded in 2001, STEALTHbits has extensive experience and deep expertise in the management of Microsoft technologies like Active Directory and Exchange, and governance solutions for unstructured data. With consistent growth, profitability, and a tenured management team that’s been at it since the start, STEALTHbits has emerged as a favorite solution provider for the world’s largest, most notable organizations, as well as a preferred partner to leaders in technology.

www.stealthbits.com

Symantec

Symantec is committed to helping you manage the integrity of your information by enabling you to maintain the right balance of information security and availability. In doing so, Symantec is uniquely positioned to help keep your business up, running and growing, no matter what happens.

www.symantec.com

Synack

Synack provides ongoing security testing at scale. To do this, Synack pairs vetted security researchers – the Synack Red Team (SRT) – with proprietary technology to create a powerful and proactive security solution that delivers vulnerability intelligence and exploitation discovery.

www.synack.com

Syncsort

Syncsort provides fast, secure, enterprise-grade software spanning big data solutions in Hadoop to big iron applications on mainframes. Syncsort helps customers around the world to collect, process and distribute more data in less time, with fewer resources and lower costs.

www.syncsort.com

Tanium

Tanium delivers a new and innovative approach to endpoint management and security that delivers instant visibility and responsiveness.

www.tanium.com

Tenable

Tenable™, Inc. is the Cyber Exposure company. Over 23,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus®, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into Tenable.io™ to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, large government agencies and mid-sized organizations across the private and public sectors.

www.tenable.com

ThreatConnect, Inc.

ThreatConnect, Inc. provides industry-leading advanced threat intelligence software and services including ThreatConnect®, the most comprehensive Threat Intelligence Platform (TIP) on the market. ThreatConnect delivers a single platform in the cloud and on-premises to effectively aggregate, analyze, and act to counter sophisticated cyber-attacks. Leveraging advanced analytics capabilities, ThreatConnect offers a superior understanding of relevant cyber threats to business operations.

www.threatconnect.com

ThreatQuotient

ThreatQuotient provides ThreatQ, the only Threat Intelligence Platform (TIP) that centrally manages and correlates unlimited external sources with all internal security and analytics solutions for contextual, operationalized intelligence in a single pane of glass. ThreatQ is also the first TIP to provide Indicator Nurturing, which goes beyond enrichment to help customers tailor indicators of compromise (IOCs) specifically to their infrastructure.

www.threatq.com

Thycotic

Thycotic is a complete privileged account management provider, managing and auditing privileged accounts across a company’s entire IT infrastructure. Thycotic also provides end-user password management and self-service AD group management tools.

www.thycotic.com

TierPoint

TierPoint is a data center provider of colocation, cloud computing, backup and business continuity, managed security, and professional services.

www.tierpoint.com

TrapX

TrapX Security is the leader in deception technology. The TrapX solution rapidly detects, analyzes and defeats new zero-day, targeted attacks, and malicious insiders. DeceptionGrid provides automated, highly accurate insight into malicious activities unseen by other types of cyber defenses.

www.trapx.com

Trend Micro

Trend Micro is a global leader in network antivirus and Internet content security software and services. Trend Micro focuses on outbreak prevention and providing customers with a comprehensive approach to managing the outbreak lifecycle and the impact of network worms and virus threats to productivity and information.

www.trendmicro.com

Tricerat

Tricerat's virtualization software helps boost performance and system reliability with a wide range of offerings. Simplify Printing eliminates the need for printer driver management. Simplify Profiles, a single-point of control for registry administration, ensures reliability and consistency of registry keys across the server farm. Simplify Lockdown provides the power of published desktops without complex system policies or registry hacks. triCerat's flagship product, Simplify Suite, provides a number of comprehensive desktop management tools in one product offering.

www.tricerat.com

Tufin

Tufin is the leader in Security Policy Orchestration, enabling enterprises to centrally manage, visualize, and control security policies across hybrid cloud and physical network environments. Tufin serves over 1,700 enterprise customers in industries worldwide, including finance, telecom, energy and utilities, healthcare and pharmaceuticals, retail, education, government, manufacturing, and transportation. The award-winning Tufin Orchestration Suite is a complete solution for automatically designing, provisioning, analyzing, and auditing network security changes from the application layer down to the network layer. By optimizing security policies, Tufin reduces the attack surface and minimizes disruptions to critical applications. Its network security automation provides enterprises with rapid service delivery, continuous compliance, and increased agility.

www.tufin.com

Turbonomic

Turbonomic’s autonomic platform enables heterogeneous environments to self-manage to assure the performance of any application in any cloud. Turbonomic’s patented autonomic decision engine dynamically analyzes application demand and allocates shared resources in real time to maintain a continuous state of application health.

www.turbonomic.com

Unidesk (now part of Citrix)

Unidesk is the management platform for Windows app mobility. Unidesk’s layering technology separates Windows apps from infrastructure so they can be managed once and delivered from any end user computing solution, on any cloud, to any device.

www.unidesk.com

UniPrint

UniPrint pioneered the use of PDF-based universal printer driver technology to streamline and enhance printing in Server-based Computing (SbC) environments. Today, UniPrint is the recognized leader in printing virtualization. The UniPrint Suite offers a comprehensive range of enhanced-printing solutions for all computing environments. UniPrint's latest release, the UniPrint Infinity software, optimizes printing functionality, minimizes printer management, improves security, and reduces bandwidth consumption.

www.uniprint.net

Unitrends

Unitrends delivers award-winning business recovery solutions for any IT environment. The company’s portfolio of virtual, physical, and cloud solutions provides adaptive protection for organizations globally. Unitrends delivers end-to-end protection and instant recovery of all virtual and physical assets as well as automated disaster recovery testing built for virtualization.

www.unitrends.com

Varonis

Varonis is a leading provider of software solutions that protect data from insider threats and cyber attacks. Through an innovative software platform, Varonis allows organizations to analyze, secure, manage, and migrate their volumes of unstructured data. Varonis specializes in file and email systems that store valuable spreadsheets, word processing documents, presentations, audio and video files, emails, and text.

www.varonis.com

Veeam

Veeam® has pioneered a new market of Availability for the Always-On Enterprise™ that helps businesses meet recovery time and point objectives (RTPO™) of less than 15 minutes for all applications and data.

www.veeam.com

Venafi

Venafi protects machine identities for the largest companies on the planet. Leaders in the Global 5000 rely on Venafi to secure the cryptographic keys and digital certificates that authorize and control all machine-to-machine connections and communications. 

https://www.venafi.com/ 

Veracode

Veracode delivers the application security solutions and services today’s software-driven world requires. Veracode’s unified platform assesses and improves the security of applications from inception through production so that businesses can confidently innovate with the web and mobile applications they build, buy and assemble as well as the components they integrate into their environments.

www.veracode.com

VMware

VMware, a global leader in cloud infrastructure and business mobility, accelerates our customers’ digital transformation journey by enabling enterprises to master a software-defined approach to business and IT.

www.vmware.com

Westcon

Weston Comstor (WestconGroup Inc.) is a value-added technology distributor of category-leading solutions in Security, Collaboration, Networking, and Data Center.

www.westconcomstor.com

Zerto

Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments. Zerto’s award winning solution provides enterprises with continuous data replication and recovery designed specifically for virtualized infrastructure and the cloud. Zerto Virtual Replication is the industry’s first hypervisor-based replication solution for tier-one applications, replacing traditional array-based BC/DR solutions that were not built to deal with the virtual paradigm.

www.zerto.com

Ziften

Ziften's groundbreaking solution provides continuous real-time visibility and intelligence, enabling incident Prevention, Detection, and Response. Ziften continuously assesses user and device behaviors and highlights anomalies in real-time, allowing security analysts to hone in on advanced threats faster and minimize Time To Resolution (TTR). Ziften's Endpoint Detection and Response solution allows organizations to rapidly determine the root cause of a breach and decide on the necessary corrective actions. Ziften Open Visibility integrates with and extends existing Security, Network, and Management solutions. Ziften delivers continuous visibility and intelligence of any endpoint, enabling you to run your business in a more efficient, intelligent, and secure manner. 

www.ziften.com

Zscaler

Zscaler security services enable organizations to provide safe, fast Internet access to any user, on any device, from anywhere in the world.

www.zscaler.com