Array Networks improves application availability, performance and security – optimizing traffic from any cloud or data center to any user, anywhere while minimizing cost and complexity. Proven at over 5,000 customers, Array is recognized by leading cloud providers and enterprises for next-generation technology and unmatched price-performance. Products include Application Delivery Controllers (ADCs), secure remote access (SSL VPN), and WAN Optimization Controllers, and solutions include load balancers, SSL offloading, BYOD, and specialized products for IaaS and SaaS providers.
Checkmarx, founded in 2006, developed the first open platform for true Source Code Analysis (SCA) and its marquee application: Static Application Security Testing (SAST). The Checkmarx product family is based on patent-pending technology and provides maximum application security for software developers and security experts throughout the Software development life cycle (SDLC), in both Enterprise and Cloud platform models. Checkmarx has been selected in the Gartner “Cool Vendors in Application Security, 2010” report.
Infrascale delivers the industry's most complete Data Protection platform today. From an easy-to-use dashboard, MSPS can efficiently manage their cloud backup, disaster recovery, data archiving and file sharing solutions. Our flexible platform protects data in multiple environments: the public cloud, private cloud or a hybrid cloud. Deployable across physical or virtual servers, workstations or mobile devices, Infrascale is the only solution MSPs need to deliver complete data protection to businesses of all sizes.
Veracode provides the world's leading Application Risk Management Platform. Veracode's patented and proven cloud-based capabilities allow customers to govern and mitigate software security risk across a single application or an enterprise portfolio with unmatched simplicity. Veracode was founded with one simple mission in mind: to make it simple and cost-effective for organizations to accurately identify and manage application security risk.
Accellion provides enterprise-class mobile file sharing solutions that enable secure anytime, anywhere access to information while ensuring enterprise security and compliance. The world’s leading corporations and government agencies use Accellion to protect intellectual property, ensure compliance, improve business productivity and reduce IT costs. Founded in 1999, Accellion file sharing solutions can be deployed on public, private and hybrid cloud environments and provide the ease-of-use business users need while giving the enterprise organization the flexibility, scalability and protection it needs.
Baroan Technologies is a managed service provider that has been serving business clients since 1997. Located in northern NJ, Baroan Technologies delivers IT consulting, implementation, and tech support to small and medium sized businesses in the area. President Guy Baroan founded the company with a vision of being “One Point of Contact” for every aspect of a business’s technology needs, and that is why Baroan Technologies offers a wide variety of services and solutions. In addition, their diverse client base has allowed them to become adept at many industry-specific technologies.
Celestix is a leading provider of strong authentication, secure remote access and perimeter security - enabling organizations to enforce strong security controls for both user and data centric security. At the core of the portfolio is a comprehensive product suite that provides identity based security. Remote access, two-factor authentication and forward and remote proxy services is the starting point. This is the foundation that allows for provisioning strong authentication to users whose access is then enforced through the market leading application access gateway. Founded in 1999 and headquartered in Fremont California, Celestix has delivered over 25,000 security appliances worldwide and currently offers support to over 5,000 customers. The company maintains regional offices in London, Singapore and Tokyo.
Contrast is revolutionizing the application security industry by bringing continuous application security intelligence to your entire application portfolio. Easy. Effective. Empowering. Simply enable your application servers with the Contrast Agent, and enjoy insight into your applications across your portfolio.
Metafor Software is pioneering a new breed of predictive IT analytics and anomaly detection solutions to help IT operation teams reduce service disruptions and shorten time-to-recovery. Using sophisticated machine learning techniques inspired by how the human brain works, we detect unexpected changes and behavioral anomalies in the underlying software and infrastructure, and alert you when your systems start deviating from the observed norm.
Skyhigh Networks is the cloud visibility and control company. The Skyhigh Networks Cloud Services Manager, delivered as a cloud-based multi-tenant service, enables companies to deploy cloud services with appropriate levels of security and governance, while lowering overall risk and cost. Skyhigh gives employees access to approved cloud services from the corporate network or from mobile devices, without impacting user experience or requiring a local agent. The Skyhigh team consists of experienced technologists and executives who have previously delivered ground-breaking technologies to enterprise customers. The company is venture-backed by Greylock Partners, and is nominated as a finalist for the RSA Conference 2013 Most Innovative Company award.
10ZiG Technology, formerly BOSaNOVA, Inc., is the emerging market leader in development of Thin Clients Technology, with a primary focus in the Desktop Virtualization Marketspace. 10ZiG Thin Clients are energy efficient, easy to manage and offers a low total cost of ownership. The company's products are sold through a worldwide network of IBM, CITRIX, and VMware Business Partners. Industry affiliations include membership in IBM's PartnerWorld for Developers, Citrix Ready Partner Program, VMware Partner Program, Quest vWorkspace Ready Program, and the Microsoft Partner Program to name a few.
Headquartered in Austin since 1999, with an office in Washington, D.C., 21CT provides research-driven, innovative solutions for the most challenging problems in cyber security, intelligence, investigations, and fraud prevention. Based on concepts driven by over ten years of ongoing military and intelligence research, 21CT's LYNXeon™ helps you solve your most difficult analytics problems. LYNXeon streamlines many labor-intensive investigative tasks and gives you deep insights into vast stores of data that were previously unexploitable, simplifying and accelerating your investigations. Decision makers and analysts in government and commercial enterprises use LYNXeon to take swift, decisive action by finding the information they need, when they need it—information that's hidden in a flood of impossibly large data.
2B Advice is an established and recognized group of management consulting companies that specialize in matters related to data privacy and data protection. Our core management consulting services center around providing integrated data privacy and security advice, conducting internal and external audits, selling data privacy management software, performing pre-certification assessments, guiding companies through certification processes (US-EU Safe Harbor and Binding Corporate Rules) and providing any additional research, support and consulting services our clients may need.
2FA Inc. is an Austin, Texas based, veteran-owned, cyber-security company created on the single vision of simplifying strong authentication. 2FA's software suite, 2FA ONE integrates authentication, encryption, and single sign-on into a single solution. Since 2006, 2FA has been at the forefront of technological advances in security and authentication. With over 1,000,000 users around the world using 2FA’s solutions, including deployments in all 50 states, 20 countries, several of the largest US city-based deployments, and leading enterprise and healthcare organizations, 2FA has emerged as a cyber-security leader for authentication, encryption, and single sign-on. In 20013 2FA drastically increased the number of biometric, smart card, RFID, magnetic swipe, and 2d barcode devices supported in 2FA ONE and created industry specific workflow performance enhancements to streamline adoption of line of business applications, increase productivity and convenience.
Qihoo 360 Technology Co. Ltd. (Qihoo 360) is a leading Internet platform company in China as measured by active user base. At the end of June 2014, we had about 496 million monthly active Internet users, according to iResearch.Recognizing security as a fundamental need of all Internet and mobile users, Qihoo 360 built a large user base by offering comprehensive, effective and user-friendly Internet and mobile security products. Qihoo 360 strives to provide services that protect users' computers and mobile devices against malware and malicious websites.Our products and services are supported by our cloud-based security technology, which we believe is one of the most advanced and robust technologies in the Internet security industry.
3LM makes Android enterprise friendly by providing a host of features to protect data on the device and while in transit to the enterprise.Mobile App Management: Deploy and manage corp applications to mobilize your enterprise. Manage all aspects of device security remotely.Seamless access to corporate data: Our technology gives corporate applications on the device access to remote corporate resources that can be accessed seamlessly.Enhanced Device Security: 3LM makes changes to the Android OS to add features that enhance Android security and we work with device manufacturers to include this in their smartphones and tablets.
5nine Software is the leading global Hyper-V virtualization security and management provider. It offers the first and only agentless security and management solutions for Microsoft Hyper-V. 5nine Software provides innovative, powerful and easy-to-use software designed to reduce costs, increase productivity and mitigate security risks. Today, 5nine Software helps almost 80,000 satisfied users around the globe to reach the full potential of their virtual infrastructure. Founded in 2009, 5nine Software is headquartered in Chicago, with offices worldwide. 5nine is a Microsoft Gold Datacenter Partner, Enterprise Cloud Alliance Partner, Azure Pack Partner, and member of the Virus Information Alliance.
Abine provides consumers with online privacy solutions that are innovative, easy to use, and work for everyday web users. With proven tools, Abine enables people to both benefit from the web and retain control over their personal information. More than 4 million consumers have used Abine’s privacy solutions. Abine: online privacy starts here.
Absolute Software Corporation is the global leader in firmware-embedded persistent endpoint security and management solutions. Our solutions - Computrace, Absolute Manage, Absolute Secure Drive, and Computrace LoJack for Laptops - provide organizations with comprehensive visibility and control over all of their endpoints, regardless of user or location. Our customers are able to optimize productivity, reduce operating costs, prove compliance, and remotely secure all of their devices and the corporate data they contain. For individuals, we provide peace-of-mind by physically recovering stolen computers and remotely deleting sensitive files from them.
AccessData Group has pioneered digital investigations and litigation support for more than 25 years and is the maker of the industry-standard computer forensics technology, FTK, as well as the leading legal review technology, Summation. AccessData provides a broad spectrum of stand-alone and enterprise-class solutions that enable digital investigations of any kind, including computer forensics, incident response, e-discovery, legal review, compliance auditing and information assurance. More than 130,000 users in law enforcement, government agencies, corporations, consultancies, and law firms around the world rely on AccessData software solutions, as well as our premier hosted review and digital investigations services. AccessData Group is also a leading provider of digital forensics and litigation support training and certification, with our much sought after AccessData Certified Examiner® (ACE®) program and Summation certification program.
Acunetix was founded to combat the alarming rise in web attacks. Its flagship product, Acunetix Web Vulnerability Scanner (WVS), is the result of several years of work by a team of highly experienced web security developers. Acunetix WVS brings an extensive feature-set of both automated and manual penetration testing tools, enabling security analysts to perform a complete vulnerability assessment, and repair detected threats, with just the one product. Acunetix is a privately held European company.
Founded in 2012 by cyber defense veterans, Adallom is a cloud access security broker delivering visibility, governance and protection for SaaS applications like Salesforce, Google Apps, Office 365 and Box. Our innovative platform is simple to deploy, seamless and extensible, and is available as a SaaS-based or on-prem solution. Powered by Adallom SmartEngine™ advanced heuristics and backed by Adallom Labs, our elite cybersecurity research team, we make it easy to secure corporate data, govern cloud application usage and protect against threats in the cloud.
Founded in 1983, Advantech is a leader in providing trusted, innovative products, services, and solutions. Advantech offers comprehensive system integration, hardware, software, customer-centric design services, embedded systems, automation products, and global logistics support. We cooperate closely with our partners to help provide complete solutions for a wide array of applications across a diverse range of industries. Our mission is to enable an intelligent planet with Automation and Embedded Computing products and solutions that empower the development of smarter working and living. With Advantech, there is no limit to the applications and innovations our products make possib
AEP Networks offers secure, optimised, end-to-end multi-bearer communication solutions. AEPs integrated portfolio of products includes identity-based network and resource access control, SSL VPNs, high assurance IPSec-based VPN encryptors, hardware security modules for key management and a range of products and communication solutions that connect remote locations with centrally-based core services. AEP Networks support a wide range of communications protocols, capable of integrating into a multitude of fixed and mobile network topologies and physical interfaces, enabling access to core voice and data services from the most extreme remote locations, where conventional communications may not be available, or where it is uneconomical to supply fixed telecom infrastructures.
Headquartered in Ottawa, Canada, with operations in the USA and Europe, AFORE focuses on delivering innovative technology to Enterprises and Service Providers that will give them complete control over security of data in virtualized/Cloud environments and increased visibility and performance management of their cloud resources and services. Cloud services can transform enterprise IT departments by reducing costs and complexity. Customers can now only pay for the services they use - when they want to use them. Enterprises want the ability to scale up their services as required. They want to free up their resources to focus on what they do best. However, security, performance and availability are chief concerns for many CIOs looking to move to a cloud networking model. AFORE works with enterprises and IT service providers to provide cloud security and management solutions that address these three fundamental concerns of enterprise CIOs.
Since its inception in 2003, AFORE has been winning industry accolades and awards for its networking, virtualization and cloud infrastructure technology solutions and custom development services. Headquartered in Ottawa, Canada, with operations in the USA and Europe, AFORE focuses on delivering innovative technology to Enterprises and Service Providers that will give them complete control over security of data in virtualized/Cloud environments and increased visibility and performance management of their cloud resources and services. AFORE’s award-winning CloudLink software solution provides a highly differentiated market offering that is designed to enable a wide adoption of Cloud computing services by enterprises interested in moving sensitive and regulated workloads to the Cloud.
Agari ensures email attacks exploiting your brand will never reach your customers. We provide you with the experience, tools and analytics you need to create a trusted email channel to secure your brand and your revenue. The Agari cloud-based SaaS solution aggregates data from 2.5 billion mailboxes hosted by email receivers including Gmail and Yahoo! to help global brands eliminate email threats, protect customers and their personal data, and proactively guard brand reputation. Today, Agari analyzes over 7 billion messages per day, identifies over 2 million malicious URLs per month, and blocks over 200 million malicious emails per month. Founded by the thought leaders behind Cisco’s IronPort solutions, Agari, a recipient of the JPMorgan Chase Hall of Innovation Award and recognized as a Gartner Cool Vendor in Security, is headquartered in Silicon Valley.
Agiliance is the leading independent provider of Integrated Risk Management solutions for Governance and Security programs. The company's customers use real time risk analysis to optimize business performance and make better investment decisions. Agiliance technology has been awarded four patents and dozens of product awards and analyst accolades. Its flexible, yet scalable automation technology lets organizations achieve closed-loop risk management and continuous monitoring. Agiliance is setting the standard in Integrated Risk Management software by servicing world-class Global 2000 companies and government agencies, inspiring talented employees as colleagues, and acquiring strategic partnerships that make the company the best place to land and expand your career.
Aha! is the world's number 1 product roadmap software. Creating great software is invigorating. And product managers should be the happiest people on earth. But most companies never benefit from their product manager’s love of innovation because they are beaten down by soft strategies, weak tools, and squishy communication. We help make agile product managers great by enabling them to set winning product strategies and prioritize the key features that customers want.
AirTight Networks offers enterprises the next generation of intelligent edge, secure, and flexible WLAN solutions. Intelligent Edge Wi-Fi: AirTight's purpose-built, plug-and-play Wi-Fi AP/Sensor devices and its controller-less architecture enable a fully functional and fault-tolerant WLAN operation at the edge, and eliminate the cost, complexity and inefficiencies of legacy thin APs managed with controllers. Top-ranked Security: AirTight offers industry's top-ranked and truly automated wireless intrusion prevention system (WIPS), powered with 25 US and international patents, and certified for FIPS140-2, Common Criteria EAL2 , and DISA UC APL. AirTight WIPS detects all types of wireless threats, eliminates false alarms, and allows its customers to reliably turn on wireless intrusion prevention that can precisely block any Wi-Fi misuse without interfering with legitimate communication.
If you've ever shopped online, downloaded music, watched a web video or connected to work remotely, you've probably used Akamai's cloud platform. Akamai helps businesses connect the hyperconnected, empowering them to transform and reinvent their business online. We remove the complexities of technology, so you can focus on driving your business faster forward. Enabling you to embrace trends like mobile and cloud, while overcoming the challenges presented by security threats and the need to reach users globally. Customers trust our cloud platform to securely deliver high-performing user experiences to any device, anywhere. Reaching globally and delivers locally, The Akamai Intelligent Platform, provides customers with unmatched reliability, security, and visibility into their online businesses.
Alert Logic offers Security-as-a-Service in the cloud — a platform of fully managed products and services to keep your data safe and compliant. Whether your IT infrastructure is on-premise, in the cloud or anywhere in between, our portfolio of solutions and deployment options allows unprecedented visibility into your environment, saving your business time, money and worries about data compliance and security.
AlgoSec is the market leader in network security policy management. AlgoSec enables security and operations teams to intelligently automate the policy management of firewalls, routers, VPNs, proxies and related security devices, improving operational efficiency, ensuring compliance and reducing risk. More than 1000 of the world's leading enterprises, MSSPs, auditors and consultancies rely on AlgoSec Security Management Suite for unmatched automation of firewall operations, auditing and compliance, risk analysis and the security change workflow. AlgoSec is committed to the success of every single customer, and offers the industry's only money-back guarantee.
AlienVault’s mission is to create an open and collaborative security paradigm, a total shift from today’s closed, proprietary and expensive systems. The heart of this is our Unified Security Management platform, which provides unprecedented security visibility and reliable defense by bringing together best-in-breed open source tools and the power of shared intelligence. Behind that collaborative effort is OSSIM, the de facto standard open source SIEM solution in use by tens of thousands of practitioners from over 140 countries.
Allgress provides affordable software and professional services that enhance an organization's ability to see clearly the relationship between IT security and risk to the organization. Our products and services allow CIOs and CISOs to better plan, analyze, manage, and communicate IT security, and to help business managers better understand the business risk inherent in every security decision as well as the security implications in every business decision.
Alpine Consulting, is an award winning IBM Solution Provider specializing in Information Management, e-Business Solutions, Portals, Managed Services and Custom Development for medium-market and larger companies.Alpine's vertical expertise spans manufacturing, wholesale, retail, insurance, distribution, financial services, gaming and transportation.With over 15 years experience architecting and delivering quality solutions for mid-market and enterprise customers' alike, Alpine's expertise ensures our client success
Launched in 2006, Amazon Web Services (AWS) began exposing key infrastructure services to businesses in the form of web services - now widely known as cloud computing. The ultimate benefit of cloud computing, and AWS, is the ability to leverage a new business model and turn capital infrastructure expenses into variable costs. Businesses no longer need to plan and procure servers and other IT resources weeks or months in advance. Using AWS, businesses can take advantage of Amazon's expertise and economies of scale to access resources when their business needs them, delivering results faster and at a lower cost. Today, Amazon Web Services provides a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of businesses in 190 countries around the world. With data center locations in the U.S., Europe, Singapore, and Japan, customers across all industries are taking advantage of our low cost, elastic, open and flexible, secure platform.
Amplidata provides unbreakable storage technology that is ten thousand times more reliable than current RAID based technologies, requires 50-70 percent less storage and power and 90 percent less expensive than current storage solutions. The Amplidata Optimized Object Storage fundamentally changes the way how data is stored and scales up to zettabytes.
Grow beyond today's technology - APCON is a pioneer in the field of flexible network switching technology. APCON products play a key role in ensuring that data networks across the globe remain secure and fully operational – around the clock, without fail – including those that support online banking, stock trades, shopping, video streams, media downloads, and more. APCON is based in Wilsonville, Oregon, with a development center in Plano, Texas. Though many other global companies have recently experienced economic ups and downs, APCON has continued to thrive and grow. We are rapidly expanding our domestic and international teams and looking for talented, committed, motivated people who want to help keep the world's networks humming while also embracing and enjoying our company's values.
AppRiver is a Software-as-a-Service (SaaS) application provider offering award-winning email and Web security solutions to businesses of all sizes. Understanding the need to protect networks from today's increasingly complex IT threats, AppRiver offers businesses a comprehensive, yet affordable subscription-based solution that incorporates the latest spam and virus protection, email encryption and Web security on the market. In addition, the company provides a complete managed service for Microsoft Exchange, as well as a bundled Office 365 solution. Since its inception, AppRiver has sustained an impressive 93 percent customer retention rate while growing its customer base to more than 45,000 companies and over 8 million mailboxes worldwide. The company is led by an Ernst and Young Florida Entrepreneur of the Year award winner, and has been identified as a Top 20 Cloud Security Vendor in 2011 by Everything Channel's CRN magazine.
Appthority - The Authority in App Security™ helps the enterprise identify and manage the risks hidden in mobile apps. The cloud-based Appthority Platform™ automatically identifies and grades risky behavior in mobile apps including known and unknown malware, new malware used in targeted attacks, corporate data exfiltration, and intellectual property exposure. The Appthority Platform integrates with the enterprise's existing mobile solutions, adding app reputation and risk analysis capabilities to Enterprise Mobility Management (EMM), Mobile Device Management (MDM), Mobile App Management (MAM) Enterprise App Catalogs, and Enterprise Mobile App Developer's Software Development Lifecycle (SDLC) process.
Appvigil is an automated cloud based mobile app security scanner that helps companies find security vulnerabilities in their mobile apps in a matter of minutes. Appvigil performs SAST, DAST and Network Analysis of the mobile applications on the cloud and provides a concise vulnerability assessment report on a SaaS platform.
At Arbor, growing, protecting and securing customer networks, businesses, and brands is our passion. And that passion comes from building outstanding relationships that solidify our status as the leading provider of network security and management solutions for enterprise and service provider networks. In fact, Arbor serves the vast majority of the world's Internet service providers and many of the largest enterprise networks in use. Utilizing the ATLAS® Active Threat Level Analysis System, we provide unparalleled insight into and perspective on Internet security and traffic trends. Further underscoring our commitment to building relationships that serve our customers, Arbor represents a unique collaborative effort with 240 network operators across the globe which enables the sharing of real-time security, traffic and routing information that informs numerous business decisions.
Exciting News Arellia has announced that it has merged with Thycotic. Arellia provides solutions to secure administrative rights, accounts, and settings through privilege management, application control, privilege usergroup management, and automated compliance remediation. Arellia helps you lower operational costs and decrease risk through solutions that enable desktop and server lock down, improve privileged account security, and achieve compliance remediation. Arellia solutions address projects to remove end users from the administrators group, secure administrator accounts and groups, whitelist applications, and automate compliance assessment and remediation.
Armorize Technologies delivers end-to-end security solutions safeguarding enterprises from hackers seeking to exploit vulnerable Web applications. Armorize AppSec Suite includes: CodeSecure--Accurate static analysis that can be offered via SaaS HackAlert--Web malware monitoring and mitigation SaaS SmartWAF--Cross-platform, software-based WAF that integrates with CodeSecure and HackAlert
Aruba delivers enterprise networks to users, anywhere they work or roam, at a fraction of the cost of traditional solutions. A global leader in 802.11n wireless LANs, remote networking solutions, identity-based security, and centralized multi-vendor network management, our secure mobility solutions are fundamentally changing how and where we work.
Arxan Technologies is the industry leader of application protection solutions that protect the App Economy. We secure mobile, desktop, embedded and server applications against tampering and reverse engineering for unauthorized use, piracy, and theft of intellectual property. Our advanced software protection solutions secure ISV, digital media providers’, gaming and enterprise applications to proactively defend the integrity of code and business models. We defend, detect, alert and react to attacks through a threat-based, customizable approach. Proven, durable and resilient, Arxan’s offerings support a full range of application protection needs, from commercial software to military grade assurance. Our patent-pending security technology suite, which includes GuardIT®, EnsureIT®, TransformIT®, BindIT®, and Professional Services, provides a unique defense-in-depth approach to application security by protecting code, data and keys.
Aryaka is the world's first cloud-based WAN optimization as-a-Service company solving application and network performance issues faced by the distributed enterprise. Aryaka's Network as-a-Service product provides enterprise-grade connectivity via a reliable core network based on globally distributed Points of Presence (POPs) without the high cost of MPLS in a single, no CAPEX monthly service. Aryaka enhances global collaboration while eliminating expensive and complex appliances as well as long-haul connectivity. It offers significant cost savings, ease-of-use and performance advantages by helping companies achieve dramatic productivity gains and increased visibility into their WAN.
Attachmate Corporation delivers advanced software for: •Fraud Monitoring and Enterprise Fraud Monitoring •Terminal Emulation and Terminal Emulation Software •Managed File Transfer •Unisys Emulation and Integration •Legacy Modernization •PC X Server •Host Access for Airlines and Travel Industries
Attivo Networks harnesses next-generation virtual HoneyNet technology to detect and engage BOTs and APTs as they try to propagate inside a network. The Attivo solution is the most elegant method to detect these threats as it is not inline, does not require changes to the traffic flow or rely on a signature database. The solution is available as an appliance or a VM.
Authentify, Inc. is the leading provider of telephone-based, out-of-band authentication services. These services enable organizations that need strong security to quickly and cost-effectively add 2-factor or 3-factor authentication layers to user logon, transaction verifications or critical changes such as adding a payee to an e-pay or wire account. The company’s patented technology employs service-oriented message architecture to seamlessly integrate into existing security processes. An authentication phone call is requested via a Web service. Authentify customers include financial services firms that need to protect their clients’ online accounts, corporate security professionals managing corporate access control, and e-merchants who want to limit fraud on their sites. Some of the most familiar names on the Internet and online banking use Authentify.
As the world leader in privilege management, organizations rely on Avecto to provide the ultimate in desktop and server security whilst measurably reducing operating expenses across their environments. With a focus on security through innovation, we are proud to have been honored with the Innovation Award by SC Magazine as well as being hailed as the ‘Innovation of the Year’ at the Global Excellence Awards. A McAfee SIA Plus and Microsoft Gold Partner, Avecto continues to build a network of system integrators and channel alliances to support headquarters in Manchester, UK and Boston, USA. Over 300 diverse customers, from leaders in banking and finance to large public sector bodies, have now deployed Avecto Privilege Guard to deliver optimum security and maximum usability across over 5 million endpoints.
AVG Technologies is a global leader in security software, protecting 114 million consumers and small business computer users in 167 countries. Headquartered in Amsterdam, AVG is the fourth largest vendor of anti-virus software and employs close to 700 people worldwide with corporate offices in the US, the UK, the Netherlands, the Czech Republic, and Germany. AVG has nearly two decades of experience in combating cyber crime and operates one of the world's most advanced laboratories for detecting, pre-empting and combating web-borne threats from around the globe for both businesses and home customers. The company boasts one of the most extensive self-help communities on the Internet, having established its technology credentials early on amongst technically savvy consumers. AVG has focused heavily on building communities that help millions of online participants support each other on computer security issues and actively contribute to AVG's research efforts.
Because downtime is never an option, Axcient ensures data, application, and system uptime, all the time, with its market-leading data backup, business continuity, and disaster recovery solution. Axcients innovative technology, including onsite and offsite backup and virtualization, is built from the ground-up for the small and mid-sized business (SMB) market, and delivered through IT resellers. Access Data and Applications, Anytime: - Onsite backup for speed - Offsite cloud replication for disaster recovery - Local and instant cloud failover for continuity - Easy, Web-based management - Reasonably priced Our mission is to provide total data and application uptime and access, all the time. We're going to put an end to downtime for small and midsized businesses so they can focus on business opportunities, not IT risks.
Axway (NYSE Euronext: AXW.PA), the Business Interaction Networks company, is a software company with more than 11,000 customers in 100 countries. For more than a decade, Axway has provided leading organizations around the world with proven technology solutions that integrate, manage, secure and govern the business-critical interactions that accelerate enterprise performance. Our award-winning solutions span business-to-business integration, managed file transfer, business operations monitoring, process management, and email and identity security - offered on premise or in the Cloud with professional and managed services. Axway is registered in France with headquarters in the United States and offices around the globe.
BackupAssist Software delivers a world-class server backup and recovery solution tailored to the needs of businesses, not-for-profit organizations and government entities in over 145 countries globally.With over a decade of software development experience, BackupAssist excels at addressing the complexities inherent in securely protecting mission-critical systems and data, both in physical and virtualized IT environments.BackupAssist Software is wholly committed to ensuring the highest possible levels of customer satisfaction, offering our advanced, reliable backup and recovery solution and a price-point accessible to organizations of all shapes and sizes.BackupAssist also works with a large community of Resellers, Channel Partners and distributors globally to ensure quality backup and recovery solutions are available right around the world.
Bandura Systems helps combat cyber threats in enterprise and government networks by delivering innovative network security solutions. The PoliWall in-line IP filter security appliance is the global leading geo-IP location and IP threat filter appliance, reducing the attack surface at networks throughout the world. Originally developed for the U.S. Military, the PoliWall is both powerful and easy-to-use, enabling network administrators to maintain complete visibility and control over ingress and egress traffic.
Barracuda Networks Inc. offers industry-leading solutions designed to solve mainstream IT problems - efficiently and cost effectively - while maintaining a level of customer support and satisfaction second to none. The company's products span three distinct market:: 1) content security, 2) networking and application delivery, and 3) data storage, protection and disaster recovery. Barracuda Networks' award-winning product portfolio includes more than a dozen purpose-built solutions that support every aspect of the network - providing organizations of all sizes with true end-to-end protection that can be deployed in hardware, virtual, cloud and mixed form factors.
Bay Dynamics™ helps the world’s largest organizations turn enterprise data into actionable security intelligence – ensuring the integrity of sensitive information assets and making certain they are being used in a way that creates business value. Proven among the Fortune 50, Bay Dynamics leverages its unique technology to detect and expose deviations from the norm and provide clear data visualization for risk prioritization, proactive management, and actionable insight into any business. Bay Dynamics has offices in both New York and San Francisco.
BehavioSec offers Behaviometric solutions for Risk Based Authentication of end users and is designed to tackle the security demands of both IT organizations and Online services.Behaviometrics identifies unauthorized users within seconds by detecting anomalies in keyboard/mouse or environment behavior, thereby avoiding fraud, information theft and stopping intrusions while they are happening.Our solution creates digital fingerprint from your behavior. We make sure that you are always protected by verifying your identity continuously while you are using your computer. To make online services sure that you are who you say you are. Think of it like transparently swiping your fingerprint every time you access your bank account, online shopping site or enter your payment details but without the hassle of cumbersome security measures.
BetterCloud is the leading provider of cloud management and security tools for Google Apps. FlashPanel, its flagship product, used by over 20,000 companies and more than 11 million users worldwide, is a directory management and Google Drive security tool that empowers Google Apps administrators by providing added controls, visibility, automation and more. BetterCloud also powers Ask the Gooru, which provides free Google Apps training videos and aims to further the adoption of Google Apps. BetterCloud is headquartered in New York City.
BeyondTrust is the only security solution vendor providing Context-Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting. We empower our customers to protect their infrastructure and data across the entire IT landscape: making every device - whether on a desk or in a data center, in a pocket or a virtual machine, or in the cloud - as secure as possible. Our solutions identify and remediate the vulnerabilities that form the basis for cyber-attacks, and mitigate internal threats that arise from the accidental or intentional misuse of system or device privileges. In short, we protect from both the external and internal threat. BeyondTrust offers consistent policy-driven vulnerability and privilege management, role-based access control, monitoring, logging, auditing and reporting to protect internal assets from the inside out.
Bit9 is the leader in a new generation of endpoint and server security based on real-time visibility and protection. Bit9 is the only solution that continuously monitors and records all activity on endpoints and servers and stops cyber threats that evade traditional defenses. Bit9’s real-time sensor and recorder and cloud-based services provide actionable intelligence within days of implementation, and Bit9’s real-time enforcement engine delivers the most reliable form of endpoint and server security. This combination gives organizations immediate visibility to everything running on their endpoints and servers; real-time signature-less detection of and protection against advanced threats; and a recorded history of all endpoint and server activity to rapidly respond to alerts and incidents. Security teams use Bit9’s real-time integration with FireEye and Palo Alto Networks to accelerate incident response and ensure all files arriving on endpoints and servers are safe.
Bitdefender is the creator of award-winning, internationally certified Internet Security and Antivirus software. Since its inception in 2001, Bitdefender has continued to raise the bar to set new standards in proactive threat prevention and virus removal. Bitdefender made its entrance on the international market when opening offices in the UK, USA, Germany, France and Spain, as well as establishing strategic partnerships and a local presence in over 100 countries globally. By the end of 2009, Bitdefender was protecting millions of users globally and had established trusted use of our technology with household names like IBM and Virgin Media through strategic partnerships.
Your company's move to the cloud delivers flexibility and cost savings, but that doesn't mean you should lose control of your data. Bitglass' Cloud Access Security Broker (CASB) solution enables your enterprise to adopt cloud apps while ensuring data security and regulatory compliance. Bitglass secures your data in the cloud, at access, on any device.Bitglass was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution.
BitSight Technologies is transforming how companies manage information security risk with objective, evidence-based security ratings. Today, organizations have hundreds of business partners with whom they share sensitive data. This exposes them to the risk of a breach through a partner network. BitSight’s global platform helps manage this risk by collecting and analyzing terabytes of data on security behaviors and rating companies for their security effectiveness. Similar to consumer credit scores, BitSight SecurityRatings are automated and derived entirely from externally available data. The result: organizations are empowered to proactively identify, quantify and mitigate security risk throughout their ecosystems.
Black Lotus is the First and Leading in DDoS Protection Services, specializing in defending its customers against large and complex distributed denial of service attacks. Working at Black Lotus is a unique challenge. Our team works as a collective, serving our customers and rapidly tackling difficult, emerging threats in real time, 24 hours a day. We shun time clocks and titles. Every team member is a pioneer and an entrepreneur. We work well under pressure and do whatever it takes to get the job done. A typical day at Black Lotus could involve working in the datacenter in downtown Los Angeles, or perhaps telecommuting. Sometimes we travel to meet with clients or to attend training, conventions, and other events. We design new products and services, conduct R
Blue Coat Systems provides Web security and WAN optimization solutions to 85 percent of FORTUNE Global 500 companies. As the market share leader in the secure web gateway market, Blue Coat sets the standard for enterprise security. Its solutions provide the visibility, protection and control required to optimize and secure the flow of information to any user, on any network, anywhere.
Bluelock provides mid-size and large enterprises flexible IT infrastructure solutions with its Bluelock Virtual Datacenters hosted in the public cloud. Bluelock's unique customer approach leads to innovative solutions that offer unprecedented visibility and control, helping customers make better decisions about risk, agility and operational efficiency. Bluelock, a VMware vCloud Datacenter service provider, facilitates a true hybrid cloud approach for IT departments and business units seeking choice, platform compatibility, and a proven cloud partner that focuses on each customer's unique infrastructure needs.
Business runs better when IT runs at its best. Tens of thousands of IT organizations around the world -- from small and mid-market businesses to the Global 100 -- rely on BMC Software (NASDAQ: BMC) to manage their business services and applications across distributed, mainframe, virtual and cloud environments. BMC helps customers cut costs, reduce risk and achieve business objectives with the broadest choice of IT management solutions, including industry-leading Business Service Management and Cloud Management offerings.
Brainloop is an Enterprise Software and Services company. We provide our customers with end to end electronic document and file security, collaboration and management under the heading of Document Compliance Management. As well as providing our customers with point solutions for managing Board Level Communications, Merger and Acquisition Document security and Financial Information management and regulatory compliance our SaaS platform is able to store, distribute, audit viewing, and manage any confidential document in a company's internal and especially external collaborative processes. Our platform is used for processes as clearly defined as Contract Approval and as general as high security, managed file sharing for high value intellectual property and R and D results, in fact for any type of information that needs to be securely worked on, shared outside the company and truly managed, without internal IT disruption or costly software investment.
Brinqa provides enterprises and government agencies with an integrated risk analytics platform for aggregation of risk data in large complex environments. The solution delivers insightful analysis and intelligent reporting for informed decisions and improved operational effectiveness. Brinqa’s offering is the most comprehensive available on the market today, based on our forward-thinking vision of a centralized, fully automated, and re-usable risk analytics platform combined with targeted solutions to meet program specific risk management needs.
BroadConnect Telecom is pleased to back a game changer in Unified Communications: Microsoft Lync 2013. This feature rich technology combines existing video, conferencing, online presence, IM, Outlook and Voice and serves as the perfect mate to any existing unified communications suite. BroadConnect has obtained Microsoft Lync certification, strengthening their position as the industry’s leading SIP trunking provider.
Bromium is a next-generation virtualization pioneer whose technology transforms the trustworthiness of computer systems, making them dependable, secure and manageable by design. The founders of Bromium have dedicated their careers to the delivery of robust virtual infrastructure that today powers the enterprise datacenter, the largest clouds and the most trustworthy systems. Bromium is developing products that enable IT to safely navigate the challenges of IT consumerization and the transformation of the desktop, helping IT to say yes to work-shifting and mobility, and enabling holistic adoption of cloud hosted services and applications.
CA Technologies (NASDAQ: CA) provides IT management solutions that help customers manage and secure complex IT environments to support agile business services. Organizations of all sizes leverage CA Technologies software and SaaS solutions to accelerate IT innovation through new technologies, transform infrastructure to reduce complexity and free up resources, and secure data and identities to reduce risk. We do this across all environments from the datacenter to the cloud and across the complete service lifecycle. CA Technologies offers a practical approach to help customers transition from maintaining IT systems to delivering new, innovative services and value through IT. CA Technologies delivers Business Service Innovation.
Catbird is the industry leader in comprehensive security and compliance for virtualized, cloud and physical environments, and a winner of three Best of Show Finalist Awards at VMworld 2009 and 2008; Via Catbird vSecurity and the Catbird virtual appliance, Catbird is the only company delivering best-practice security for Hypervisor, Guest VMs and Policy/Regulatory Security Compliance. As companies migrate mainstream servers and desktops to virtual environments, uncertainty over security and compliance can impact deployment plans. Catbirds protection eliminates these worries and keeps virtualization plans on track. Founded in 2000, the companys in-the-cloud architecture protects thousands of customer systems and networks who rely on Catbird and its partners to protect their valuable IT assets from external and internal threats. The private company is based in Silicon Valley, and is currently recruiting new partners and resellers.
Ceedo Technologies develops software tools for the consumer, OEM, and corporate IT markets, which include innovative desktop and application management, and cost-effective portable computing solutions. In the realm of portable computing, Ceedo allows entire computing environments to be run from USB devices. This allows, for instance, call center employees to work from home, and salesmen to work on the road with no need for a laptop, and with full management control. On the side of desktop and end-user environment management, Ceedo allows layers of applications to be deployed from a central storage hub to serve multiple end-points, and also provide users with the ability to install their own applications, without affecting the OS. To date, Ceedo's products have been shipped to over 4,000,000 users worldwide, both in the consumer and business markets, earning Ceedo key partnerships with leading IT market forces such as Citrix, McAfee, Avaya, Imation and others.
Centrify provides unified identity services across data center, cloud and mobile — resulting in one single login for users and one unified identity infrastructure for IT. Centrify’s software and cloud services let organizations securely leverage their existing identity infrastructure to centrally manage authentication, access control, privilege management, policy enforcement and compliance across on-premise and cloud resources. More than 4,500 customers have deployed Centrify across millions of servers, applications and mobile devices to optimize costs and increase agility and security. Centrify is a privately held company backed by top-tier venture capital firms Mayfield, Accel Partners, INVESCO Private Capital, Sigma Partners and Index Ventures. Our partners include Microsoft, Samsung, Apple, Red Hat, Canonical and others. To date the company has over 4,500 customers including nearly half of the Fortune 50.
Certes Networks is the leader in scalable security solutions for high performance networks. Our innovative policy and key management solution,along with our wire-speed encryption appliances, can secure any network without changing the underlying infrastructure or application performance. We provide advanced data protection for:Enterprise Applications, MPLS Networks, Ethernet Encryption, and Financial Networks with solutions that are quick to install, easy to manage, and virtually latency free, we offer the highest level of data protection and performance for the lowest total cost.
CertiVox was founded in 2008 to provide technology and services based on a simple belief: that everyone deserves the right to secure their information exchanges simply and easily. Our leading-edge encryption, key management and identity management solutions are currently in use at hundreds of the world's leading corporations and used by individuals across the globe to protect their privacy. Our passion is to create and share unique, cutting-edge cryptographic innovations for enterprise cloud computing and all things Internet. We are the only company in the global market today that has the technology in place to arm businesses and individuals with easy-to-use certificateless security solutions for any device and platform.
Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. Check Point provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to innovate with the development of the Software Blade architecture. The dynamic Software Blade architecture delivers secure, flexible and simple solutions that can be fully customized to meet the exact security needs of any organization or environment. Check Point customers include tens of thousands of businesses and organizations of all sizes including all Fortune 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers,
Cigital, Inc. is the world’s largest consulting firm specializing in software security and is the global leader in helping organizations design, build, and maintain secure software. Our unique expertise, technologies, and training services are a culmination of over twenty years of research and thousands of successful software security consulting engagements at leading public and private organizations throughout the world. We provide a comprehensive range of software security services including consulting, training in both instructor-led and eLearning, mobile application security, and cloud services aimed at addressing the potential security risks associated with third-party or outsourced software. Whether it’s a simple penetration test or deploying an end-to-end software security program, our expert consultants have both the depth of knowledge and breadth of real-world experience to understand the risks and challenges our clients face each day.
CipherCloud is the market-leading provider of cloud information protection solutions that enable enterprises to securely adopt cloud applications by eliminating concerns about data security, residency and regulatory compliance. CipherCloud's industry acclaimed operations-preserving encryption and tokenization technology secures sensitive information in real time, before it's sent to the cloud, without impacting usability or requiring any change to cloud applications. CipherCloud has been recognized by Gartner as a Cool Vendor in Cloud Security, and a 2013 Excellence Award Winner for Best Emerging Technology by SC Magazine. CipherCloud has groundbreaking technology, strong market traction, marquee customers, a strong management team and stellar investors to continue to expand market presence and industry leadership. The company is in the Cloud Security segment, which has emerged as a must have requirement for organizations worldwide, growing several times the software industry rate.
Ciphertex solutions are the result of multi-disciplinary teams working closely together to assist companies in securing and utilizing all their digital assets. Our products include carefully designed, developed, manufactured and distribute external data storage systems and security management solutions. The Ciphertex family of products and services provides dependable IT security solutions to businesses around the world.
Since our founding in 1995, Circadence has leveraged the power of advanced technologies to pioneer smarter, faster, and more cost-effective solutions for improving IT performance. What started with our innovative platform for making massively multiplayer online games run faster has quickly grown into the most capable suite of optimization solutions available. Circadence MVO WAN optimization solutions are in use today by some of the most sensitive organizations around the world. The company's technology ensures efficient, secure delivery of electronic content. Based on more than ten years of intellectual property and 24 patents, the company has one of the most extensive WAN optimization portfolios including the company's patented Transport Morphing Protocol (TMP), which is built into the Circadence MVO solution. Circadence ensures the efficient use of bandwidth while providing additional data transport speed, reliability and consistency.
A SaaS service from the minds at OmnitTI Labs, engineered to revolutionize monitoring, fault detection and analytics.Circonus was designed from scratch to go beyond legacy monitoring systems, unifying fault detection with trending capabilities. The result is a next-generation performance monitoring platform with business smarts and analytics. Beyond the typical features you'd expect in a modern event detection suite, Circonus adds support for popular third-party collection agents, notifications to popular social networking services, geographic visualization of agents and real-time data streaming.
Citrix makes virtual computing solutions that help people work and play from anywhere on any device. More than 230,000 enterprises rely on Citrix to create better ways for people, IT and business to work through virtual meetings, desktops and datacenters. Citrix virtualization, networking and cloud solutions deliver over 100 million corporate desktops and touch 75 percent of Internet users each day. Over 10,000 companies partner with Citrix in 100 countries. Annual revenue in 2011 was $2.2 billion.
Clavister is a leading provider of mobile and network security solutions for large enterprises, cloud service providers and telecom operators. Our products are designed from the inside out, so not only do they offer the highest levels of protection against the ever changing threats that networks are challenged by, but they look beautiful too. Clavister’s products are designed for ease of installation, management and maintenance on any network. The user interface is easy to use and ensures the highest levels of security are maintained Founded in 1997, we have a long history of providing network security for some of the most mission critical networks in the world with offices throughout the world. Our unique firewall technology is the fastest in the world; at 560 Gbps it ensures business isn’t held up and holds a world record!
Clearswift delivers contextual information management solutions that enable organisations to empower their data and get on with business. A trusted information management and control company with a history of innovation, we understand content and the way people work and communicate. Clearswift's content-aware, policy-based solutions benefit 17,000 organisations globally, enabling them to manage and maintain no-compromise data management and control across all communications channels. Clearswift's track record in innovation includes developing many of the features now considered industry standards, such as image scanning, policy-based encryption and user-level message tracking. Clearswift continues to lead with the deployment of production-ready virtual appliances on the VMware ESX and ESXi platforms. These are built on powerful, effective and tested content-aware policies that protect our customers and their employees.
Cleversafe solves today's growing big data storage problem.Leveraging information dispersal technology, Cleversafe has created a dispersed storage solution that actually gets better as it gets bigger. This highly reliable and secure system scales to the petabyte and beyond level for unstructured data, and costs less than traditional storage methods.Cleversafe's solution drives up to 90 percent of the storage costs out of the business while enabling secure and reliable global access and collaboration.
CloudLock helps enterprises extend their data security practices and data loss prevention (DLP) to the cloud. CloudLock’s suite of security applications give businesses the controls and visibility they need to take advantage of the collaboration benefits of public cloud offerings without sacrificing on security. The Number 1 Enterprise ISV in the Google Apps ecosystem, CloudLock is SSAE 16 Certified and runs on an SSAE 16 Certified environment (Google App Engine). To date, CloudLock has more than 350 enterprise, government, education and nonprofit customers worldwide, representing over 1.5 million end-users under license. Founded in 2007, CloudLock’s co-founders bring a track record of enterprise software experience from EMC Corporation, NetApp, Sun Microsystems and Interwise. The largest Google Apps customers in the world trust CloudLock to secure their data.
CloudPassage is a security SaaS provider focused on defending your virtual servers. Our Halo cloud security solution is unique within the industry in that it is both provider and hypervisor agnostic. This means that it can be leveraged to secure your virtual servers regardless of whether they are located privately, publicly or are highly portable between the two. Halo combines compliance checks, software vulnerability assessment, account auditing and centralized firewall management, all into a single point of control that is portable, elastic and scalable. Halo has been purpose built to handle cloud server bursting, cloning, and migration.
Our vision at Co-Decision Technologies is to become the software industry leader in cognitive, mobile and embedded IT systems. We are committed to building a transatlantic consortium for future embedded cognitive software based on advanced cognitive technologies.Co-Decision Techology SAS was founded in 2003 by Dr. Martine Naillon, CEO and is based in Paris, France. The company is currently developing its R and D activity in the United States, France, and Italy. It is pursuing its international commercial development mainly in Canada and the United States and is building strategic relationships with American companies, as well as in the Emirates, Europe and South Asia. Among its partners in finance in the United States and Europe are Kenetica (US), Exeura (Italy), RavenPack (Spain), Dow-Jones (United Kingdom and United States), AFP (France).
CommonIT develops software solutions and services for web application security and mobility. Our mission is to help companies deliver secure and flexible web access to their employees without constraining the end user. CommonIT flagship product is "Virtual Browser", a browser running in a secured virtual environment.
Comodo is a leading global provider of Digital Security, Identity and Trust Assurance services that include a comprehensive portfolio of High-Assurance Digital Certificates and Managed PKI solutions, eCommerce Acceleration, Authentication (Multi-Factor) and Network Vulnerability Scanning services certified for PCI Compliance reporting. Comodo Security Solutions, with over 15,000,000 endpoint installations of its threat prevention products, offers an extensive suite of security software and support services for businesses and consumers alike. Continual innovation, a core competence in PKI and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internet's ongoing development. With offices in the US, UK, China, India, Romania and the Ukraine, Comodo secures and authenticates the online transactions and communications for over 200,000 business customers and millions of consumers.
CORE Security is the leading provider of predictive security intelligence solutions for enterprises and government organizations. We help more than 1,400 customers worldwide preempt critical security threats throughout their IT environments, and communicate the risk the threats pose to the business. Our patented, proven, award-winning enterprise solutions are backed by more than 15 years of applied expertise from CoreLabs, the company's innovative security research center.
Corero Network Security (LSE: CNS), an organization's First Line of Defense, is an international network security company and a leading provider of Distributed Denial of Service (DDoS) defense and next generation security solutions. As the First Line of Defense, Corero's products and services stop attacks at the perimeter including DDoS, server targeted, and zero day, protecting IT infrastructure and eliminating downtime. Customers include enterprises across industries from banking, to financial services, gaming, education, retail and critical infrastructure as well as service providers and government organizations worldwide. Corero's solutions are dynamic and automatically respond to evolving cyber attacks, known and unknown, allowing existing IT infrastructure -- such as firewalls, which are ineffective at stopping much of today’s unwanted traffic at the perimeter, to perform their intended purposes. Corero’s products are transparent and highly scalable.
Coverity, the development testing leader, is the trusted standard for companies that need to protect their brands and bottom lines from software failures. Customers use Coverity's development testing suite of products to automatically test source code for software defects that could lead to product crashes, unexpected behavior, security breaches, or catastrophic failure. Coverity is a privately held company headquartered in San Francisco with more than 200 employees worldwide. Coverity is funded by Foundation Capital and Benchmark Capital. Coverity invented a fundamentally different way to test complex source code to find hard to spot, yet critical software defects in a solution that was consumable for commercial use. Since its inception in 2003, Coverity has cemented its leadership position in the industry with its flagship offering and has expanded its product portfolio to include a suite of additional capabilities as part of its development testing platform.
Covertix develops solutions to equip enterprise organizations with independent file-level surveillance and control, protecting sensitive data, inside and outside the organization. The company's innovative technology secures and monitors confidential and sensitive documents, by automatically tagging digital assets according to file context and content, continuously tracking and securing files, at any point or method of usage. Covertix solutions enable employees, business partners and third-party vendors to collaborate freely while significantly reducing overall risk and with a minimal interruption to the organization's workflow. SmartCipher, the company's flagship product, is currently used by a wide variety of public and private tier-one enterprise customers around the world. The company is privately held and backed by various bodies in the investment community, among them: The Office of the Chief Scientist of Israel, Maayan Ventures and accredited angel investors.
CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks. Using big data technologies, CrowdStrike's cloud-based next-generation threat protection platform leverages execution profiling and predictive security analytics instead of focusing on malware signatures, indicators of compromise, exploits, and vulnerabilities. The CrowdStrike Falcon Platform enables enterprises to identify unknown malware, detect zero-day threats, pinpoint advanced adversaries and attribution, and prevent damage from targeted attacks in real-time. The core of the Falcon Platform is a global network of host-based detection sensors driven by world-class cyber threat intelligence to provide real-time detection and prevention capabilities to enterprises and governments worldwide.
Cryptomathic is a leading provider of security solutions to businesses across a wide range of industry sectors, including finance, smart card, digital rights management and government. With 25 years’ experience, Cryptomathic has assisted customers by providing systems for e-banking, public key infrastructure (PKI) initiatives, mobile, cloud, ePassport, card issuing, and advanced crypto
CustomerXPs is a Bangalore based IP software Product Company, creates real-time, intelligent products that empower Banking, Retail and Telecom Enterprises with instant insights enabling influenced outcomes of deeper customer engagement and fraud-free transactions. CustomerXPs software identifies and solves, in real-time, complex problems in the areas of customer experience management, contextual right-sell, fraud monitoring and compliance.
Cyber-Ark® Software is a global information security company that specializes in protecting and managing privileged users, applications and highly-sensitive information to improve compliance, productivity and protect organizations against insider threats. With its award-winning Privileged Identity Management (PIM) and Highly-Sensitive Information Management software, organizations can more effectively manage and govern access while demonstrating returns on security investments.
Cyberoam Technologies is a global network security appliances company, offering security solutions for the networks of the future with its innovative technologies. Adding the dimension of User Identity to security, Cyberoam Unified Threat Management (UTM) appliances enhance organizations’ capability to tackle external and internal threats, by integrating features like firewall, VPN, Gateway Anti-Virus and Anti-Spam, Application Visibility and Control, Web Application Firewall, Web Filtering, and more. Cyberoam UTM’s unique on-appliance reporting feature offers real-time visibility over user and network activities to organizations for maintaining strong security as well as quick remediation in case of security breach in networks. Cyberoam leverages the power of multi-core processors offering enterprise-grade performance in its appliances.
CYREN provides the world’s largest service providers and software vendors with the Internet security solutions they need to protect billions of people and transactions. Designed specifically to be easily deployed or private labeled by partners, CYREN’s Web, Email and Anti-Malware products provide relentless protection on any device. CYREN’s proactive analytics and cloud-based malware detection capabilities equip its partners with security solutions that stand out as clear differentiators in the ever-evolving industry. Founded in 1991, CYREN's U.S. headquarters are in McLean, Virginia.
As a global leader in networking, D-Link has over 28 years of expertise developing the highest quality networking solutions to meet the ever-changing connectivity needs for businesses of all sizes. Our Switching, Business Wireless, IP Surveillance, Storage and Network Security solutions, along with our experienced engineering and professional services teams, enable organizations to stay competitive by providing leading-edge solutions with great value. Together, our standards-based technology and excellent quality create highly integrated solutions that are easy to implement. When it comes to innovative solutions that solve real challenges, businesses get more with D-Link.
Daon is a provider of identity assurance software products for governments and commercial organizations worldwide. Daon supports clients in building enterprise solutions requiring the highest level of security, performance, scalability, reliability and privacy. Daons IdentityX is a unique cyber security platform that significantly decreases the risk of unauthorized transactions, protecting businesses and consumers against on-line fraud and hacking. A cost-effective and risk-aware solution, it can easily be added to existing business applications. The platform uses the end users mobile phone and a range of authentication methods including biometrics to confirm identity. Daon's COTS products are proven in challenging real-world environments. The product suite covers every aspect of identity management from pre-enrolment and identity proofing to enrolment, multimodal capture, adjudication, credentialing and provisioning; and provides an open standards based architecture.
Organizations are challenged to make productive use of their enterprise data without compromising sensitive information such as PII, account numbers or personal health information. Dataguise meets this need with an enterprise solution for risk-based sensitive data protection. Dataguise helps organizations understand where their sensitive data resides and implements high performance Masking on Demand to transparently protect data without the overhead of encryption solutions. It provides actionable intelligence enabling information security, compliance and infrastructure managers to work collaboratively to understand shared responsibilities for protecting sensitive data. The results are better data risk management, increased operational efficiencies and reduced regulatory compliance costs.
Datapipe offers a single provider solution for managing and securing mission-critical IT services, including cloud computing, infrastructure as a service, platform as a service, colocation and data centers. We deliver those services from the world's most influential technical and financial markets including New York metro, Silicon Valley, London, Hong Kong and Shanghai.
DataSunrise Database Security Software is a next generation Database and Data Security and Compliance software. DataSunrise secures the databases and data in real-time with high performance and represents a last line of defense against internal or external threats.It can be deployed in cloud, on premises or in hybrid environments.DataSunrise includes:- intelligent database firewall to secure, audit and monitor all requests to database, protects all major database vendors;- real-time dynamic data masking to protect and mask whole or selected data from an unauthorized requests;- detection and prevention of SQL injections.- Supports all major databases and datawarehouses such as Oracle, SQL Server, Netezza, DB2, MySQL, MariaDB, PostgreSQL, Teradata, Amazon Redshift, Amazon Aurora, Vertica, Greenplum among others.
Déjà vu Security is a firm that is focused on helping clients build secure solutions. Déjà vu Security believes in the convergence of an organization’s business and security needs. It works with its customers to rationalize the competing needs of business and security. It provides a full-range of services including strategic insight, proactive advice, tactical assessment and outsourced development.
Delfigo Security offers a zero footprint strong authentication platform to protect against identity theft and reduce fraud. Our context-based, multi-factor, security solution platform also enables compliance with regulatory mandates, all at a fraction of the cost of implementing other solutions.
Denim Group is an IT consultancy specializing in custom software development, systems integration and application security. Denim Group has established a strong national and international client base encompassing Fortune 500, commercial and public sector organizations. The San Antonio Business Journal recognized the Company as the Fastest Growing Company in San Antonio in 2006 and as one of the Best Places to Work in 2007.
DigiCert, Inc. is a leading global Certification Authority specializing in Trusted SSL Certificates and Identity Services. DigiCert provides High Assurance and Extended Validation SSL certificates for very competitive prices. Worldwide customers of DigiCert include large government entities, universities, and small to large businesses.
Founded in 1999, Digital Defense, Inc. (DDI) is the premier provider of managed security risk assessment solutions protecting billions in assets for small businesses to Fortune companies in over 65 countries. DDI’s dedicated team of experts helps organizations establish a culture of security through regular information security assessments, awareness education and decisive security intelligence. This proven method bolsters the capability of organizations to reduce risk and keep information, intellectual property and reputations secure. The combination of DDI’s certified security analysts, patent-pending scanning technology and proprietary cloud-based vulnerability management system, Frontline™ Solutions Platform, delivers the most powerful assessment results and remediation management solutions possible.
We have been providing customized electronic payment processing, equipment, merchant services and support to businesses across the United States and Canada since 1994. Our focused customer service, consistent reliability and fair pricing have made us a respected leader in our industry, and a trusted partner of the customers we serve. We deliver customized payment solutions for all types of businesses including brick-n-mortar retail stores, direct mail and phone order operations, B2B, government contractors, service industries, and software developers; among others. Our credit card processing rates are competitive and our state-of-the art equipment ensures your ability to accept any type of electronic payment.
Dome9 is the leading cloud firewall management service. Our patent-pending security automation creates a strong, front-line defense that stops zero-day vulnerabilities and exploits, secures remote access, and centralizes policy management. Available for the enterprise and hosting providers, Dome9 automates security policy management for cloud, dedicated, and Virtual Private Servers (VPS). Our sophisticated security management platform controls Amazon EC2
Dropcam makes easy-to-use internet IP cameras you use to watch the things you care about. Just plug one in, and it connects to the Internet so you can watch it from anywhere using your laptop, iPhone, iPad, or Android device. Use Dropcam as a baby monitor, pet camera, a monitoring camera for your living room or front door, or easy surveillance for your small business.
Druva offers advanced data protection solutions for enterprise endpoints. Founded in 2008 by a team of industry veterans, Druva is one of the fastest growing backup and storage providers. Druva has over 1000 customers across 42 countries. Organizations are becoming increasingly mobile, and valuable business data continues to make its way from the data center to endpoint devices such as laptops, tablets and smartphones. Data is resident on these devices that travel with employees wherever they they go. Theft of personal and corporate data is rampant and the loss of data resident on these devices can prove devastating. Druva has taken a focused, differentiated, forward-thinking approach to the market's needs and is not encumbered by legacy systems that were not designed for these types of devices in mind.
Duo Security's hosted two-factor authentication service brings strong, scalable security to organizations of any size. Duo's unique, high-availability architecture provides centralized management, self-service enrollment, and interactive secondary login through an intuitive web interface, eliminating the high costs, complexity, and confusion associated with traditional two-factor systems. Every day, over 800 organizations in 80 countries around the world rely on Duo for their security.
Dyn solutions are at the core of Internet Performance. Through traffic management, message management and performance assurance, Dyn is connecting people through the Internet and ensuring information gets where it needs to go, faster and more reliably than ever before. Founded in 2001 at WPI, Dyn’s global presence services more than four million enterprise, small business and personal customers.
eBRP Solutions is the proud winner of the 2013 BCI - North American, Middle East and European "Business Continuity Product Provider of the Year" Awards, as well as the 2012 "Business Continuity Management Software of the Year Award" presented by the Business Continuity Institute (BCI - North America). At eBRP we design, develop and deliver software that helps organizations of all sizes manage the entire Business Continuity Management life cycle. We believe that Business Continuity Management should be an intrinsic part of your risk management program. But to bring value to risk management, BCM must deliver much more than a set of paper Plans. Unlike ‘plan-centric’ BCM software, we understand that Plan development is only one component of BCM – not the goal.
eCert is an email trust authority that ensures trust in, and reduces fraud against, critical email traffic for financial institutions, major brands, and government agencies. eCert works as a trusted intermediary between senders and receivers to accredit domains that send email, certify their traffic to defend against email fraud ("phishing") and provide critical insight, monitoring, and enforcement tools. eCert was founded in 2008 as a collaboration between large financial service companies and major ISPs to improve security against email phishing and is backed by up to $8 million in funding from Warburg Pincus. eCert is the only service of its kind in operation, and was selected to provide this capability for the U.S. financial services sector by financial industry consortiums, the Financial Services-Information Sharing and Analysis Center (FS-ISAC) and BITS, the technology policy division of The Financial Services Roundtable.
eFileCabinet, Inc. offers a suite of document management software (DMS) products and services that help businesses and individuals work quicker, smarter and more collaboratively. With more than 14 years in the document management industry, eFileCabinet is the trusted choice for more than 155,000 users worldwide to store, share and protect their valuable and confidential data.
eFolder is a leading supplier of cloud data protection, business continuity, and cloud security services for MSPs, solution providers, and VARs. Delivered as wholesale services to the channel, eFolder enables its partners to provide branded data protection and security services and to generate highly profitable, recurring revenue. eFolder services complement many of the managed services offerings already deployed by partners and integrate with common PSA systems, making adoption of eFolder services fast and easy. eFolder also empowers cost-effective partner and end-user private clouds, allowing partners to meet the needs of any client, regardless of size or readiness to engage in public cloud services.
eGestalt Technologies is a leading provider Cloud-based software-as-a-service (SaaS) solutions for business IT security monitoring, vulnerability analysis, penetration testing and compliance management. It's innovative and world class leading solution was recognized in June 2012, when SC magazine gave SecureGRC a rating of 4.5 stars out of a maximum 5, with 5 stars for Features, Support and Value for money. SecureGRC is a patent-pending, multiple award-winning, Cloud based software-as-a-service (SaaS) solution for security monitoring, vulnerability analysis, penetration testing and PCI, HIPAA/HITECH based compliance management for small, medium, and large business. SecureGRC is sold primarily through channel partners, through its innovative Managed Security and Compliance Provider (MSCP) program.
Egnyte HybridCloud delivers enterprise caliber file sharing for businesses by combining the speed and security of local storage with the accessibility of the cloud. Users easily store, share, access and backup their files, while IT retains centralized administration and control to enforce business policies.
EiQ Networks, a pioneer in simplified security, risk and compliance solutions, transforms how organizations identify threats, mitigate risks and enable compliance. SecureVue, a unified situational awareness platform, proactively detects threats, minimizes “false positives” and delivers timely and actionable intelligence by simplifying often complex interactions and relationships between security, risk and compliance.
EMC provides the technologies and tools that can help you release the power of your information. We can help you design, build, and manage flexible, scalable, and secure information infrastructures. And with these infrastructures, you'll be able to intelligently and efficiently store, protect, and manage your information so that it can be made accessible, searchable, shareable, and, ultimately, actionable. We believe that information is a business's most important asset. Ideas-and the people who come up with them-are the only real differentiator. Our promise is to help you take that differentiator as far as possible. We will deliver on this promise by helping organizations of all sizes manage more information more effectively than ever before. We will provide solutions that meet and exceed your most demanding business and IT challenges. We will bring your information to life.
Emerging Threats is a world-leading provider of open source and commercial threat and malware intelligence. Founded in 2003 as a cyber security research community, Emerging Threats has become the de facto standard in network-based malware threat detection. The company’s ETOpen Ruleset, ETPro™ Ruleset, and IQRisk™ suite of threat intelligence are platform agnostic for easy integration with Suricata, Snort®, and other network intrusion protection and detection systems. With ETPro Ruleset, organizations can achieve the highest standards of malicious threat detection with world-class support and research for extended vulnerability coverage. ETPro Ruleset is ideal for enterprises, government agencies, financial institutions, SMBs, higher education, and service providers.
Enstratius is a cloud infrastructure management solution for deploying and managing enterprise-class applications in public, private and hybrid clouds. Enstratius has a multi-cloud architecture that provides governance, automation and cloud independence. We deliver governance for the cloud through a patent-pending security architecture and a powerful management console across all leading public and private clouds. Based in Minneapolis, Minnesota, Enstratius serves hundreds of organizations worldwide including Korea's largest telecom provider KT, Accenture, and McGraw-Hill.
Enterasys Networks is one of the fastest growing companies in the networking industry, providing patented and differentiated wired and wireless network infrastructure, as well as security and management solutions. Enterasys OneFabric is the industry's first fabric-based networking solution to extend visibility and control from virtual servers to mobile devices for cloud computing and data center environments. With over 20,000 customers and sales in over 90 countries, Enterasys enables its customers to provision the network from the data center to the mobile edge with consistent performance and enhanced security for business-critical applications, all managed from a single pane of glass.
A Microsoft Gold Certified Partner, Enterhost is the premier customized cloud solutions provider specializing in Windows applications. With focus on cloud desktop and private cloud services, they also offer disaster recovery and colocation for clients worldwide. Founded in 2000, Enterhost is a leading provider of Windows-only hosting with an experienced Microsoft-certified team of professionals.
Entersekt is an innovative pioneer in transaction authentication. The company’s one-of-a-kind approach harnesses the power of electronic certificate technology (PKI) with the convenience of mobile phones to provide financial institutions and their customers with full protection from online banking fraud. With its patented security products authenticating millions of transactions globally, none of Entersekt’s clients have experienced a successful phishing attack on their systems since implementing the company’s technology. Financial institutions worldwide look to Entersekt to strengthen the all-important bond of trust they share with their customers, and to build on those relationships by introducing increasingly innovative mobile and online banking services.
More than ever, Entrust understands your organization’s security pain points. Whether it’s the protection of information, securing online customers, regulatory compliance or large-scale government projects, Entrust provides identity-based security solutions that are not only proven in real-world environments, but cost-effective in today’s uncertain economic climate. A trusted provider of identity-based security solutions, Entrust secures governments, enterprises and financial institutions in more than 5,000 organizations spanning 85 countries. Entrust’s award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain points for cloud and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL.
UBIQUITA provides business phone (VoIP), internet, connectivity failover, URL filtering, caching and unified threat management services to businesses over a customer’s broadband connection providing a more efficient, secure and cost effective communications environment. Customers are supported by a 24/7 system monitoring with response.
Equinix, Inc. (Nasdaq: EQIX) connects businesses with partners and customers around the world through a global platform of high performance data centers, containing dynamic ecosystems and the broadest choice of networks. Platform Equinix connects more than 4,000 enterprises, cloud, digital content and financial companies including more than 900 network service providers to help them grow their businesses, improve application performance and protect their vital digital assets. Equinix operates in 38 strategic markets across the Americas, EMEA and Asia-Pacific and continually invests in expanding its platform to power customer growth.
Erado is the nation's leader in social media compliance, and one of the fastest growing business-tech companies. In addition, Erado provides a suite of SaaS solutions for capture, review, and archiving of electronic communications including, email, instant messaging, and social media content such as LinkedIn, Facebook, Twitter, and more. Erado's growing list of exclusive clients includes Commonwealth Financial, LPL Financial and Transamerica. Founded in 1994, Erado helps organizations manage and enforce cost-effective compliance and records retention policies.
We daily protect over 100 million computers, laptops, smartphones, tablets and servers, no matter the operating system from Windows, through Linux, to Mac OS and Android. Our complex security solutions are protecting your stay in the digital worlds no matter if at your home, or in the work. We are pioneering the digital worlds for over 25 years and leading the industry in proactive threat detection. ESET NOD32 Antivirus, ESET Smart Security and ESET Cybersecurity are among the most recommended security solutions in the world. The unique scanning core that powers all our solutions has become known for its high detection capabilities and low system demands and continues to receive the recognition from independent testing organizations. Sold in more than 160 countries, ESET has worldwide headquarters in Bratislava, Slovakia. ESET also has offices in San Diego (California), Buenos Aires (Argentina), Prague (Czech Republic) and in Singapore.
More than 38,000 midmarket companies rely on EVault® cloud-connected backup and recovery services. Delivered by a team of data recovery experts and using the very best cloud-connected technology, EVault backup solutions seamlessly integrate on-premise and online backup data protection for fast, local data access and ensured cloud disaster recovery. Optimized for distributed environments and backed by an ironclad cloud, EVault technology also powers the offerings of cloud services providers, data centers, telcos, ISVs, and many others. EVault is a Seagate Company.
Expedient is part of a network of eight, inter-connected data centers and offers a wide range of managed services such as virtualization, cloud computing, remote backups, management of equipment, storage area networks, disaster recovery and more. These proven managed services combined with reliable and redundant SSAE-16 audited data centers, are how Expedient delivers premier colocation, network and managed services to enterprise, commercial, education and government entities.
We're here to help you protect the irreplaceable on your PC, mobile and in the cloud. We want to protect our customers a valuable digital content across devices and access now and in the future as our customers' needs and technologies evolve.
F5 Networks, Inc., the global leader in Application Delivery Networking (ADN), helps the world's largest enterprises and service providers realize the full value of virtualization, cloud computing, and on-demand IT. F5 solutions help integrate disparate technologies to provide greater control of the infrastructure, improve application delivery and data management, and give users seamless, secure, and accelerated access to applications from their corporate desktops and smart devices. An open architectural framework enables F5 customers to apply business policies at "strategic points of control" across the IT infrastructure and into the public cloud. F5 products give customers the agility they need to align IT with changing business conditions, deploy scalable solutions on demand, and manage mobile access to data and services. Enterprises, service and cloud providers, and leading online companies worldwide rely on F5 to optimize their IT investments and drive business forward.
Established in 1998, Feitian is dedicated to being the leading innovator of smartcard and chip operating system based security technologies and applications. Feitian's major business covers Software Protection, Strong Authentication, Smartcard COS and Peripherals. Feitian cooperates closely with global leading smartcard chip providers, serves valuable customers with the world's latest technologies via its expanding sales and services network internationally. Feitian's USB interfaced Software Protection Dongle, Strong Authentication USB Key, and Smartcard Reader are CE and FCC certified and RoHS compliant. Today, Feitian High performance and Low cost devices and solutions are widely accepted from personal application to enterprise system globally.
The Trusted Leader in Enterprise Device Management from the Cloud With 20 years of experience in delivering enterprise mobility management solutions, Fiberlink has the in-depth functional and technical expertise necessary to accelerate deployment, reduce risk, increase employee productivity, and simplify mobile device management. Our MaaS360 platform enables IT to manage laptops, desktops and smartphones, such as the Android and iPhone, as well as tablet devices such as the iPad, in one window, one system. The mobility infrastructure and subscription services of MaaS360 have revolutionized how enterprises and business users share and secure information over the Internet. The MaaS360 platform ensures reliable, secure and compliant mobile working for employees, while delivering unprecedented Mobility Intelligence to senior management and IT operations.
FileTrek™ provides full operational transparency to companies who need to effectively track and maintain audit control over how corporate intellectual property is moved, shared, and utilized. The solution provides unprecedented visibility of data in motion by monitoring relationships between people, devices and files. Having this level of actionable insight and the tools to create audit trails, file maps and reports for regulatory compliance enable an enterprise to become IP aware. FileTrek is transparent to users and can be scaled across thousands of desktops. The innovative technology provides complete visibility over sensitive information including the location of a file, who has worked on it, how it has been moved and the genealogy relationships of files and their derivatives.
FireEye is the leader in stopping advanced targeted attacks that use advanced malware, zero-day exploits, and advanced persistent threat (APT) tactics. FireEye solutions supplement traditional and next-generation firewalls, IPS, anti-virus, and gateways, which cannot stop advanced threats, leaving security holes in networks. FireEye offers the industry's only solution that detects and blocks attacks across both Web and email threat vectors as well as latent malware resident on file shares. It addresses all stages of an attack lifecycle with a signature-less engine utilizing stateful attack analysis to detect zero-day threats. Based in Milpitas, California, FireEye is backed by premier financial partners including Sequoia Capital, Norwest Venture Partners, and Juniper Networks.
FireHost is a secure cloud hosting company focused on protecting sensitive data and company's brand reputation with an architecture built for security, scalability and performance. Customers with specific compliance or performance needs subscribe to FireHost's PCI, HIPAA or high traffic solutions, including some of the largest companies in the world, as well as many fast growing eCommerce, SaaS and healthcare IT providers. FireHost provides services from London, Amsterdam, Dallas and Phoenix.
FireMon is Proactive Security through Effective Management. FireMon provides enterprises with security management software that gives them deeper visibility and tighter control over their network security infrastructure. Its integrated solution set--including Security Manager, Policy Planner and Risk Analyzer--enables customers to identify network risk, proactively eliminate those vulnerabilities and strengthen security throughout the organization, and reduce the cost of security operations.
Headquartered in Overland Park, Kansas, FishNet Security is a national leader in Information Security solutions, integration, and professional and managed services. Since its founding in 1996, FishNet Security continues to be a market leader in helping businesses, government, educational institutions and other organizations define the true risks in their environments and deploy the right solutions and technologies to ensure the continued success of day-to-day operations and objectives. With offices spanning coast-to-coast in 30 cities and a 15,000-square-foot Security Operations Center (SOC) located in its headquarters, FishNet Security provides highly certified and industry-leading engineers, consultants, forensic teams, educators and account managers to all facets of businesses and other enterprises.
ForeScout Technologies is a leading provider of automated security control solutions for Fortune 1000 enterprises and government organizations. With ForeScout, organizations can accelerate productivity and connectivity by enabling people to access corporate network resources where, how and when needed without compromising security.
ForgeRock offers the only unified open identity stack to protect enterprise, cloud, social and mobile applications at Internet scale. With a diverse global customer base, ForgeRock is replacing traditional, proprietary identity management suites around the world with an open, agile and integrated solution. ForgeRock Open Identity Stack include: OpenAM (Access Manager) for Authentication, SSO, and Cloud-enabled Federation; OpenIDM (Identity Manager) the ultimately scalable identity lifecycle management and provisioning solution and OpenDJ (Directory Java) the cloud ready identity repository. ForgeRock technology is built on open standards and deployed by a global network of system integrator, consulting and training partners.
Fortinet (NASDAQ: FTNT) is a worldwide provider of network security appliances and the market leader in unified threat management (UTM). Our products and subscription services provide broad, integrated and high-performance protection against dynamic security threats while simplifying the IT security infrastructure. Our customers include enterprises, service providers and government entities worldwide, including the majority of the 2010 Fortune Global 100. Fortinet's flagship FortiGate product delivers ASIC-accelerated performance and integrates multiple layers of security designed to help protect against application and network threats. Fortinet's broad product line goes beyond UTM to help secure the extended enterprise from endpoints, to the perimeter and the core, including databases and applications. Fortinet is headquartered in Sunnyvale, Calif., with offices around the world.
FoxT protects corporate information and privileged accounts with an enterprise access management solution that centrally enforces access across diverse servers and business applications. The ability to centrally administer, authenticate, authorize, and audit across diverse platforms and applications, down to the file level, enables organizations to simplify audits, streamline administration, and mitigate insider fraud.
Fujitsu is the leading Japanese information and communication technology (ICT) company offering a full range of technology products, solutions and services. Over 170,000 Fujitsu people support customers in more than 100 countries. We use our experience and the power of ICT to shape the future of society with our customers. Did You Know? Fujitsu is the world's third-largest IT services provider and No.1 in Japan. Fujitsu is among the world's top five providers of servers. Fujitsu customers include nearly half the Fortune Global 500. Fujitsu innovations have garnered over 34,000 patents. Fujitsu is included in the Dow Jones Sustainability Indexes.
For over 30 years, Futurex has been a globally recognized provider of enterprise-class data encryption solutions. More than 15,000 customers worldwide have trusted Futurex's innovative technology to provide market-leading solutions for the secure encryption, storage, and transmission of sensitive data. Futurex maintains an unyielding commitment to offering advanced, standards-compliant data encryption solutions, including: • Hardware Security Modules for secure, reliable data encryption, information management, and key generation • Remote key management and injection platforms • Certificate Authority issuance and management • Secure, hand-held devices for configuration, management, and compliant key loading • High availability solutions for load balancing, monitoring, and disaster recovery • Secure storage and access of sensitive data.
Garlik are leading technology innovators and digital identity experts set up by the founders of the UK online banks Egg (part of Citi) and First Direct (part of HSBC). With our range of products and services we aim to help individuals stay safe from online crime.
gateprotect AG Germany has been a leading, globally acting provider of IT security solutions in the area of network security for more than ten years. These solutions comprise next generation firewalls with all commonly used UTM functionalities, managed security as well as VPN client systems. To minimize the risk of operator errors in highly complex security functions, gateprotect has developed the eGUI® interface concept. The patented eGUI® technology (ergonomic Graphic User Interface) and the Command Center based thereon for the configuration and administration of firewall systems for managed security service providers (MSSPs) increase the factual security in companies and allow for an efficient ongoing maintenance of the systems. Reputable companies and institutions in more than 80 countries worldwide trust gateprotect as their partner for IT network security. gateprotect products have been repeatedly awarded and certified by reowned analysts.
GFI Software provides web and mail security, archiving and fax, networking and security software and hosted IT solutions for small to medium-sized enterprises (SMB) via an extensive global partner community. GFI products are available either as on-premise solutions, in the cloud or as a hybrid of both delivery models. With award-winning technology, a competitive pricing strategy, and a strong focus on the unique requirements of SMBs, GFI satisfies the IT needs of organizations on a global scale. The company has offices in the United States (North Carolina, California and Florida), UK (London and Dundee), Austria, Australia, Malta, Hong Kong, Philippines and Romania, which together support hundreds of thousands of installations worldwide. GFI is a channel-focused company with thousands of partners throughout the world and is also a Microsoft Gold Certified Partner.
Glimmerglass develops and integrates fast and agile cyber solutions to derive actionable information from optical and electronic signals. These advanced solutions dramatically reduce complexity and enhance analysis. Glimmerglass serves a global customer base in Cyber Security, Defense, and Telecommunications.
Established in 1996 and as a WebTrust accredited public certificate authority, GlobalSign offers publicly trusted SSL Certificates, EV SSL, Managed SSL Services, S/MIME email security and Code Signing for use on all platforms including mobile devices. Its Trusted Root solution uses the widely embedded GlobalSign Root CA certificates to provide immediate PKI trust for Microsoft Certificate Services and internal PKI, eliminating the costs of using untrusted Root Certificates. Its partnership with Adobe to provide Certified Document Services (CDS) enables secure digitally signed PDF documents, certified transcripts and e-invoices.
Globys provides some of the world's leading service providers with solutions that help them leverage their customer data assets to enhance the overall customer experience. A spin off from VeriSign Inc., one of the world's leading providers of infrastructure services, Globys offers a suite of products that have helped meet the needs of service providers for more than 15 years and supports global customer deployments. Globys is headquartered in Seattle, WA and has regional offices around the world. Additional information can be found at www.globys.com. Handling billions of customer data transactions on a daily basis (e.g., CDRs, network data, offer catalogues, content, profile information, etc), Globys has developed unique insights into customer purchase behavior, targeted contextual marketing and one-to-one selling. Our solutions allow service providers to provide individualized customer experiences ranging from utilities that enhance the customer's daily processes and interactions.
GoGrid is a Global Leader in Hybrid and Cloud Infrastructure hosting. GoGrid enables sysadmins, developers, and IT professionals to create, deploy, and control free f5 load balanced cloud infrastructures and complex hosted virtual server networks with full root access/administrative server control. GoGrid physical and virtual server instances maintain industry standard specifications with no requirement to learn proprietary standards. Deploying GoGrid infrastructure takes minutes via a web control panel or GoGrid's API. GoGrid gives users the control of a familiar datacenter environment with the flexibility and immediate scalability of the cloud.
Google Apps is a cloud-based productivity suite that helps you and your team connect and get work done from anywhere on any device. It's simple to setup, use and manage, allowing you to work smarter and focus on what really matters.
GreenSQL delivers Unified Database Security Solutions for the small and medium businesses (SMB) and the enterprise markets. The company is committed to protecting information by making database security affordable and easy to manage for every company. With an all-in-one approach to database security, the GreenSQL software-based platform offers Security, Caching, Auditing and Masking in a single package. Building on its vast experience as the most popular database security solution for MySQL - with over 110,000 copies downloaded in more than 198 countries - GreenSQL brings a novel approach to database security. GreenSQL solutions provide protection from internal and external threats in real time, while improving database performance and demonstrating security compliance. With a single unified management interface, GreenSQL solutions are easy to deploy and maintain.
Guidance Software is recognized globally as a leader in digital forensics, security intelligence, incident response, and e-discovery software solutions. Our EnCase® platform provides the foundation for corporate, government, and law enforcement organizations to conduct thorough digital investigations of any kind, such as responding to security incidents, e-discovery requests, and regulatory inquiries, or performing data and compliance auditing - all while maintaining the integrity of the data.
GuruCul is the leading provider of security and business intelligence solutions. GuruCul products will improve risk, threat, and compliance postures by applying a unique identity centric approach of correlating identity, activity, and access information to provide actionable data and prioritized alerts. GuruCul has developed industry's most advanced patent pending algorithms for risk profiling and analyzing trends, to detect threats and anomalous behavior. GuruCul's intelligent risk platform will help your organization efficiently protect intellectual property and effectively manage risk.
Halon Security is the most prominent and technology leader of e-mail security, load balancers and firewalls. The company was founded in 2002 and known for its award-winning e-mail security solutions, which are used by large hosting providers, cloud and service providers, non-commercial and government organizations, municipalities and companies of all sizes. Protecting millions of users world-wide, Halon is known for its quality and excellence. All product platforms are flexible and easy to integrate, with advanced scripting capabilities and unique open API, therefore Halons platform is obvious solution for hosting providers and cloud service companies. Customers can choose from variety of deployment possibilities: products are available as hardware, software, virtual or hosted solutions. All products supports any type of hypervisor and is VMware Ready certified.
Hexis Cyber Solutions (Hexis), a subsidiary of The KEYW Holding Corporation based in Hanover, Maryland, provides complete cybersecurity solutions for commercial companies, government agencies, and the Intelligence Community (IC). Our mission is to ensure that business IT infrastructure is equipped with tools and capability to detect, engage, and remove both external and internal cyber threats. Cyber terrorists, organized crime, and foreign governments focus tremendous effort on commercial, government, and military interests as their prime target. Hexis Cyber Solutions’ HawkEye family of products offer active, multi-disciplined approaches to achieve a higher standard of cybersecurity that is based on our expertise supporting our nation’s cyber security and cyber warfare missions to ensure that enterprises of any size, within any industries, can operate at maximum potential.
HID Global is the trusted source for innovative products, services, solutions, and know-how related to the creation, use, and management of secure identities for millions of customers around the world. The company’s served markets include physical and logical access control, including strong authentication and credential management; card printing and personalization; visitor management systems; highly secure government and citizen ID; and identification RFID technologies used in animal ID and industry and logistics applications. Primary brands are ActivIdentity®, EasyLobby®, FARGO® and HID®. Headquartered in Austin Texas, HID Global has over 2,000 employees worldwide and operates international offices that support more than 100 countries. HID Global® is an ASSA ABLOY Group brand.
Hillstone Networks is driving innovation in next generation firewalls for the virtualized data center. As a proven leader in high performance network security solutions with ongoing technical innovation and continuous attention to customer needs, Hillstone brings to market a new generation of network security solutions purpose-built for the cloud era. With the latest enterprise security paradigm shift, the network security market has moved from a passive threat-to a proactive risk-based security model, as seen with the proliferation of zero-day attacks, DDOS and Advanced Persistent Threats (APT). The Hillstone approach uses advanced data analytics and proactive monitoring to deliver more effective security solutions to Fortune 500 enterprise and operator customers globally
HStreaming provides solutions and consulting for real-time data streaming and processing on Hadoop. HStreaming technology delivers unprecedented performance and flexibility to companies, academia, and governments with massive data and low-latency requirements
Huawei is a leading telecom solutions provider. Through continuous customer-centric innovation, we have established end-to-end advantages in Telecom Network Infrastructure, Application and Software, Professional Services and Devices. With comprehensive strengths in wireline, wireless and IP technologies, Huawei has gained a leading position in the All-IP convergence age. Our products and solutions have been deployed in over 100 countries and have served 45 of the world's top 50 telecom operators, as well as one third of the world's population.Huawei's vision is to enrich people's lives through communication. By leveraging our experience and expertise in telecom sector, we help bridge the digital divide and give people the opportunity to join the information age, regardless of their geographic origin.
HyTrust(R), headquartered in Mountain View, CA, is leader in control and compliance for virtualization and cloud infrastructure. Solutions enable enterprises to virtualize more more securely, with applications like secure multi-tenancy, self-service, automation of best practices, and compliance monitoring and audit reporting. Fortune 500 enterprises and industry analysts have validated the HyTrust approach to addressing this billion-dollar market. HyTrust recently won overall Best of Show for VMworld 2009 as well as the Gold Award: Security and Virtualization.
iboss Network Security is on the cutting edge of network security, developing innovative solutions designed to scale and address the demands of today’s high demand fiber networks while retaining granular web security for on premise and mobile devices. Our technology provides single pane of glass reporting across on premise and mobile devices, shortening threat response time, enforcing industry compliance, and extending the company policy. We protect what’s leaving your network and block what’s trying to get in, keeping your network safe for users and the company regardless of the technology that’s utilizing your network. The iboss suite of solutions maximizes resources such as bandwidth and manpower by increasing your network efficiency and ensuring critical traffic is prioritized, all so you don’t have to increase your financial outlay.
idappcom is a privately owned business founded in 2004. Since then we have supplied software and hardware that enhances network security, reducing risk and lowering cost of ownership of devices. Our products are constantly evolving in response to the needs of our customers. We have traditionally supplied security vendors and test labs and now supply new versions of our products specifically developed for the end user. Years of expertise and development knowledge are now available to the global market to assist our customers achieving the highest levels of network threat protection. Our organic growth and stability are a direct result of our highly-skilled and certified IT security teams, developing enterprise grade security assessment and enhancement products.
Your number one cloud partner, Identacor aims to make user access to your company’s corporate web applications secure and convenient. With its SAML-based single sign-on authentication, Identacor allows you access to all of your web applications, regardless of where you are in the world, as long as you have internet connectivity. With Identacor, your organization is given control over how your employees access their applications. It gives increased visibility and transparency on how work is being done. Therefore, Identacor makes managing cloud applications for your company safe, secure and easy.
Identity Finder DLP reduces the risk of data leakage and identity theft by discovering and securing sensitive information across your organization. Whether you've suffered a data breach, are taking proactive steps to protect your information, or are building a program to meet regulator and compliance requirements, Identity Finder can help. Identity Finder introduces a new philosophy to address data leakage prevention. Traditional data security approaches try to block unauthorized access. If history has taught us anything, it is that thieves, hackers, viruses, malware, and others will always find a way onto the data from our systems. To solve the data loss problem, Identity Finder DLP goes directly to the source to intelligently discover sensitive data like Social Security Numbers, Payment Card Industry (PCI), Protected Health Information (PHI), and other Personally Identifiable Information (PII). Identity Finder provides remediation capabilities so you can quickly reduce your risks.
IGEL Technology is the world's third largest client vendor by revenue and is market leader in its home country of Germany (2009 IDC). The company produces one of the industry's widest range of thin clients, based on Linux and Microsoft Windows, giving customers access to almost any form of server-based infrastructure and application including virtual desktops from VMware, Citrix Xen or Microsoft, terminal services, legacy applications via Ericom PowerTerm terminal emulation, web, Java, SAP and VoIP. Form factors include traditional desktops, integrated LCD units and quad screens as well as the world's leading software for PC to TC conversion. IGEL Thin Clients come bundled at no extra cost with a remote management suite called UMS that guarantees hassle free and secure remote configuration and administration of thin clients as well as migrated PCs.
ILANTUS Technologies is a leading integrated solution provider in the IAM - identity management, access management, access governance, federation and information security - arena and specializes in the convergence of cloud and enterprise. Building total business solutions that address the complete life cycle of Identity Management through products, system integration and managed services, ILANTUS delivers products and solutions through any mix of cloud, hosted or enterprise deployment modes. ILANTUS excels at protecting customers a existing investments, providing exceptional ROI and offering unique pricing models. ILANTUS delivers innovative identity security products and solutions rapidly and affordably, leveraging best of breed technologies and their 12 years of IAM software integration experience. ILANTUS is the implementation partner of choice, provides hosted/ managed services and 24/7 support for companies deploying IAM software across the globe.
Imperva is a pioneer and leader of a new category of business security solution that protects critical applications and data from theft, insider abuse, and fraud; and also streamlines regulatory compliance. We provide a comprehensive solution for monitoring and controlling all data usage and business transactions across the data center, from storage in a database or on a file server to consumption through applications.
Infoblox (NYSE:BLOX) helps customers control their networks. Our solutions help businesses automate complex network control functions to reduce costs, increase security and maximize uptime. Our technology enables automatic discovery, real-time configuration and change management and compliance for network infrastructure, as well as critical network control functions such as DNS, DHCP and IP Address Management (IPAM) for applications and endpoint devices. Leveraging our patented Grid technology, Infoblox delivers higher availability, and an authoritative network database for real-time and historical reporting. As the market leader in Automated Network Control, Infoblox provides services and solutions to over 6,100 enterprises and service providers in 25 countries.
InfoExpress network security solutions protect enterprise networks and the endpoints connecting to them. The company has provided network access control solutions since 2000. At the core of InfoExpress solution is the award winning Dynamic NAC Software Suite, which ensures endpoints are safe and compliant with security policies by performing real-time audits and quarantining of all network-attached endpoints. InfoExpress products have received numerous awards for innovation. The privately held company is headquartered in Mountain View, California.
InfoGard Laboratories was the first private security laboratory to become accredited by the United States National Institute of Standards and Technology, Payment Card Industry Security Council, and Postal authorities. InfoGard was founded in 1993 with a mission to provide accredited IT security assurance to customers worldwide. InfoGard is the first and only organization offering certifications for Health Information Technology supporting both security and privacy. InfoGard delivers technology vendors and users an integrated combination of Electronic Health Record/Health Information Technology (EHR/HIT) and HIT Security and Privacy services
Information Builders a software and services transform data into business value for game-changing results. Our solutions for business intelligence and analytics, integration, and data integrity empower people to make smarter decisions, strengthen customer relationships, improve employee performance and drive growth. Our dedication to customer success is unmatched in the industry.
Ingate Systems develops firewall technology to enable global SIP-based person-to-person communication such as IP telephony, presence, Instant Messaging, video conferencing, IP-PBX connections and Unified Communications.Ingate offers enterprises, service providers and carriers elegant solutions that make trusted SIP communications possible beyond the LAN. Among the company's award-winning products are the Ingate Firewall® and Enterprise Session Border Controllers (E-SBCs) including the Ingate SIParator® and the Intertex IX78 E-SBC for operator volume SIP trunking deployments. These are widely used to connect service providers a SIP trunks to enterprise IP-PBXs and Unified Communication solutions and to allow remote users outside the LAN. Ingate products are used by retail companies, financial institutions, industrial firms, government agencies and small-to-large enterprises throughout Europe, Asia and North America.
We are Intel Sponsors of Tomorrow, not only through our technical innovation, but through our endless efforts in education, environmental sustainability, healthcare, and much, much more. The range of computing products based on Intel architecture is expanding beyond PCs and servers to netbooks, handhelds, consumer electronics devices, and more. We are the world's largest semiconductor chip maker, based on revenue. We also develop platforms, which we define as integrated suites of digital computing technologies that are designed and configured to work together to provide an optimized user computing solution compared to components that are used separately. Our goal is to be the preeminent provider of semiconductor chips and platforms for the worldwide digital economy.
ISA Intelligent Sensing Anywhere, S.A. is a distinguished technology-based company, headquartered in Portugal, which offers and commercializes all over the world telemetry and remote management products, applications and solutions recognized and implemented internationally. ISA is a specialist and leader in telemetry and remote management solutions in the fields of energy, gas, oil, health and environment. It is internationally recognized and is today present in more than 20 countries across five continents. ISA's strong exportation skills and the quality of its technical and innovative solutions have placed the company in a competitive position of prominence, both nationally and internationally. This company has BES, EDP, BP, Shell, Galp, PT, EPAL, guas do Mondego, guas de Coimbra, Coimbra Hospital Center, ANA - Airports, PRIMAGAZ, Butagaz, Digal, SANASA or the University of Aveiro, as some of its key customers.
IP Technology Labs (IPTL) develops, manufactures, and markets network-leading IP/Ethernet solutions for telecommunications and information technology users. IPTL's products enable access to network resources anywhere, transparently, and with extremely easy-to-use products. IPTL's vision is to see a world where the network serves the productivity of its users. Our mission is to transform the way the network is used, regardless of technology, enabling open, reliable, and frustration-free communications.
ITAC, IT Applications Consulting Security Solutions MFT and SOA of the highest quality; IT Consulting Services Provider and Secure Software Factory valued at CMMI Level 3. ITAC Has experience in various economic sectors, with case studies in more than 8 countries throughout America, working closely with some of the most important companies in the region.
itControl was born out of the frustration and pain from over 20 years of delivering IT service, support and management on a daily basis in an active outsourced IT service provider practice.While managing over 280 independent network systems, this group of highly talented experienced professionals in business process, service delivery, computing technology and sophisticated extreme programming shared the vision to make itControl Suite a reality.After 3 years of intense development and real life day to day testing, the system has matured and proven successful in both corporate IT departments and outsourced IT service providers.
Sold exclusively through the Channel, JetStream is your single source providing everything needed to deliver robust and comprehensive security, compliance and email hosting services. Managed through our single web console CloudCommand, you can provide everything your end users need for security, compliance and email hosting including email filtering, encryption, archiving
Juniper Networks is leading the revolution in networking, making it one of the most exciting technology companies in Silicon Valley today. Since being founded by Pradeep Sindhu, Dennis Ferguson, and Bjorn Liencres more than 14 years ago, Juniper's sole mission has been to create innovative products and solutions that meet the growing demands of the connected world. Juniper is pioneering innovation on the network with the New Network, an architecture that is comprised of network hardware innovations supported by a consistent, unique, single operating system, Junos, as well as client and server-based software products that enhance network performance and user experience.
Kaseya is the leading global provider of IT Systems Management software. Kaseya solutions empower everyone from individual consumers to large corporations and IT service providers to proactively manage and control IT assets remotely, easily and efficiently from one integrated Web-based platform. Kaseya solutions are trusted by IT service providers and a wide variety of industries including: banking, consumer packaged goods, education, financial services, government, healthcare, military, real estate, retail and transportation. The company is privately held and based in Lausanne, Switzerland with over 30 offices in more than 20 countries.
Kaspersky Lab is the world's largest privately-held Internet Security company, providing comprehensive protection against all forms of IT threats such as viruses, spyware, hackers and spam. The company's products provide in-depth computer defense for more than 300 million systems around the globe, including home and mobile users, small and medium sized businesses and large enterprises. Kaspersky technology is also incorporated inside the products and services of nearly 100 of industry leading IT, networking, communications and applications solution vendors.
Kerio Technologies, Inc., a global provider of complete IT infrastructure solutions, allows businesses to connect, communicate, and collaborate securely. Kerio distributes its solutions through a network of more than 6,000 reseller partners. We currently have more than 50,000 customers and millions of users of our technologies. Founded in 1997, Kerio is headquartered in San Jose, California, and has offices in New York, Brazil, Germany, the United Kingdom, the Czech Republic, Australia, and Russia. Kerio is a Microsoft Gold Certified Partner, a member of CalConnect, a calendaring and scheduling consortium, and a member of the Mac Developer Program. Whether you want to securely share files across your organization, communicate with clients or colleagues via voice, email or social media-style messaging, or protect your network with state-of-the-art security appliances, Kerio offers technology to meet your mission-critical business goals and achieve the best possible ROI on investment.
KineticD, an early pioneer of cloud backup technology, has set a new industry standard by providing small and mid-sized businesses (SMBs) with the same level of security and protection for their irreplaceable digital assets as large enterprises rely on. KineticD's patented KineticCloud Backup technology, known for its scalability, advanced data reduction capabilities and ease-of-use, has won prestigious industry awards and has been featured in many key industry publications. Founded in 2002, KineticD technologies and solutions are currently used daily by over 60,000 customers, 1,000 resellers, 100 MSPs and private label partners for online backup and recovery, archiving, disaster readiness, secure file sharing and remote access.
Kovio, a privately held Silicon Valley company with origins in the world renowned MIT Media Lab, designs, develops, and manufactures printed silicon products for Near Field Communication (NFC) and Electronic Article Surveillance (EAS) markets, including Radio Frequency Identification (RFID) tags and RF Barcodes. By combining the power and functionality of high-performance silicon inks and low cost graphics printing technology, Kovio enables its customers and partners to deploy innovative products and solutions in the areas of mobile marketing and advertising, brand authentication, retail operations, and ticketing.
Lancope®, Inc. is a leading provider of flow-based monitoring solutions to ensure high-performing and secure networks for global enterprises. Unifying critical network performance and security information for borderless network visibility, Lancope provides actionable insight that reduces the time between problem identification and resolution. Enterprise customers worldwide, including healthcare, financial services, government and higher education institutions, rely on Lancope to make better network decisions, respond faster to network problem areas and avoid costly outages and downtime at a fraction of the cost of conventional network monitoring solutions. With Lancope, you can know your network and run your business better. Privately held and venture-backed, Lancope is headquartered in Atlanta, Georgia.
Lanner Electronics Inc (TAIEX 6245) is a world leading provider of design, engineering and manufacturing services for advanced network appliances and rugged applied computing platforms for system integrator, service providers and application developers. Founded in 1986, Lanner is an ISO 9001 accredited organization with headquarters in Taipei, Taiwan, and offices in USA, Canada and China. With over 25 years of experience in system and board hardware engineering, Lanner provides high-performance, reliable and cost-effective computing platforms. Lanner is most renowned for its range of x86 and RISC network appliances as it has for many years been the key hardware provider to some of the largest network security companies in the world. In this field Lanner delivers hardware for everything from basic load balancing and firewall appliances to more demanding VPN, bypass, intrusion detection and UTM systems that require deep packet inspection.
National Provider of IT Outsourcing solutions from Colocation to Cloud, with Tier III data centers in Irvine CA, Denver CO, Chicago IL and Ashburn VA. Number 23 out of Top 100 on Forbes' 2011 list of America's Most Promising Companies With state-of-the-art data center facilities across all U.S. time zones Latisys is a leading national provider of colocation, managed hosting, managed services, disaster recovery and private cloud solutions to medium-sized businesses, enterprise customers and government agencies. With a heritage serving business customers since 1994, and multiple high-density, SAS70 Type II compliant data centers across each time zone within the United States, Latisys offers scalable outsourced IT infrastructure management solutions that provide customers what they need, when they need it. As a data center-centric company, Latisys is quickly becoming the hosting and colocation company of choice for companies that demand more from their IT infrastructure partner.
Layered Technologies is a leading global provider of PCI- and HIPAA-compliant hosting, managed dedicated hosting and cloud computing services, including Compliance Guaranteed, which ensures that all Layered Tech compliance services are guaranteed to pass 100 percent of every audit or assessment. By providing high-quality technology, infrastructure and support, Layered Tech enables clients to eliminate capital expenses and save on operating costs so they can focus on core business initiatives. Layered Technologies scalable infrastructure powers millions of sites and Internet-enabled applications including e-commerce and software as a service (SaaS). Clients range from large enterprises with advanced data security, compliance and uptime requirements to leading-edge Web 2.0 startups.
Liaison Technologies delivers cloud-based enterprise application and B2B / EDI integration managed services, strategic consulting, cloud-based master data management, data security and data transformation solutions - reducing business costs and driving operational efficiencies on-premise or in the cloud. Liaison provides tailored and flexible technologies and services to over 7,000 organizations in over 35 countries. Headquartered in Atlanta, Liaison also has offices in the Netherlands, Finland, Sweden and the United Kingdom.
Our enterprise security products help our customers secure their most critical IT assets and achieve regulatory compliance requirements. History The company released its first commercial product in 1994, but traces its roots back to 1978 when it was founded as a software consultancy. For years, Lieberman Software products have been the choice of large organizations concerned with locating and remediating problems occurring within the IT infrastructure, where rapid and comprehensive response is crucial. Innovation Lieberman Software pioneered the privileged identity management space by releasing the first product to this market in 2001. Since then, the company has regularly updated and expanded its privileged password solution set while growing its customer base in this vibrant and emerging market. Lieberman Software now has more than one thousand global customers, including more than 40 percent of the Fortune 50.
Light Cyber is a fast growing provider of Predictive Breach Detection solutions that protects organizations from targeted threats and cyber attacks inside their networks. Light Cyber MAGNA™ appliance combines deep packet inspection with endpoint information and threat intelligence to analyze the behavior of users, devices and applications, detecting and alerting on malicious activity early on in the attack lifecycle, allowing the user to remediate the attack before damage is done. Founded in 2011 and led by world-class cyber security experts and seasoned management team, the company's products have been successfully deployed and sold to top tier customers in the financial, telecom, government, media and technology sectors.
Founded in 1994, Linoma Software provides innovative technologies for protecting sensitive data and automating data movement. Linoma Software has a diverse install base of over 3,000 customers around the world including Fortune 500 companies, non-profit organizations and government entities. Specialties include cross-platform managed file transfer (MFT), data encryption, secure DMZ reverse proxy and other tools.
LockPath speeds and improves organizations’ business and risk decision making. Its purpose-built Keylight platform correlates data, policies, procedures and assets from numerous sources to provide a comprehensive information security management system (ISMS) and IT government, risk and compliance (GRC) reporting across any organization. Forward-thinking product design is recognized by analysts and leading industry publications/awards as the next generation of IT GRC. LockPath is headquartered in Kansas City.
Logicworks provides cloud computing and managed hosting to some of the world's most respected brands including Dow Jones, NBC, Lincoln Center, Orion Health,and 1-800-Flowers.com. Logicworks specializes in Private, Public and Hybrid Cloud Solutions for SaaS, Media, eCommerce, Mobile, Healthcare, and Financial services companies. Logicworks also offers a full suite of Compliance Solutions and Managed Database Services.
LogRhythm is the largest and fastest growing independent Security Information and Event Management (SIEM) provider in the world. The company's patented and award-winning SIEM 2.0 Big Data Security Analytics platform empowers organizations around the globe to detect breaches and the most sophisticated cyber threats of today, faster and with greater accuracy than ever before. LogRhythm also provides unparalleled compliance automation and assurance as well as operational intelligence to Global 2000 organizations, government agencies and mid-sized businesses worldwide.
Protect Your Phone. Lookout is a smartphone security company dedicated to making the mobile experience safe for everyone. Lookout delivers protection from viruses and malware, data backup and recovery, and remote location of lost or stolen phones. Currently available for Android and iOS devices, Lookout's award-winning cross-platform, cloud-connected applications are designed from the ground up to provide advanced protection for smartphones while remaining lightweight and efficient. Lookout is the highest rated security app in major app stores and has been featured in the Wall Street Journal, New York Times and NBC News. With more than 25 million users across 400 mobile networks in 170 countries, Lookout is the world leader in smartphone security.
M-Files enterprise content management (ECM) solutions transform how businesses manage, secure and share information with a unique metadata-driven approach that organizes and processes content based on what it is, rather than where it resides. Thousands of businesses in over 100 countries use M-Files on-premise, in the cloud or in hybrid environments to improve productivity and quality, and to ensure compliance with industry regulations and standards, including companies such as AstraZeneca, Parker Hannifin and EADS.
We're committed to the idea that applying data mining principles to large evidentiary data sources can provide unique intelligence which, combined with powerful analytics, can significantly enhance the process of identifying cybercriminals, prioritizing cybercrime investigations, and protecting consumers, corporations, and governments from online fraud and cyberattacks.
In 2004, Malwarebytes was founded on the belief that you and everyone have a fundamental right to a malware-free existence. Every product we make is built on that premise. Malwarebytes Anti-Malware is designed and coded by folks like you. Folks who have stayed up all night trying to rescue an infected machine. Folks who have dealt with the aftereffects of a hacked email account or a compromised business network. We work around the worldEurope, Asia, and Americaand around the clock. Tweaking our unique blend of heuristic, signature, and behavior-based technologies to protect people like you and businesses like yours. Because malware never sleeps. We believe that brilliant code can make the world a better place for all of us. We hope Malwarebytes Anti-Malware can make it better for you.
Mandiant is the go-to company for the Fortune 500 and government agencies that want to protect their most valuable assets from advanced attack groups. Simply stated, we are the only information security company that can tell an organization when it has been compromised and to what extent its defenses have been violated. The majority of advanced targeted attacks proceed undetected and proliferate undefended. When attacks are successful, Mandiant's unique combination of human intelligence and technology leadership help organizations detect, respond to and contain them before attackers reach their objective. Our engineers and security consultants hold top government security clearances, have written 11 books and are regularly quoted by leading media organizations. Mandiant is headquartered in Alexandria, VA, with offices in New York, Los Angeles and San Francisco.
At Marathon Technologies, we focus on one thing: application availability. With this single-minded focus, we have developed innovative and unique solutions that proactively prevent application downtime with unmatched reliability and simplicity - even in environments where IT resources are limited. Our innovative everRun technology proves that always on IT doesn't have to be expensive or require teams of experts. Our more than 3,000 customers worldwide include innovators and leaders in their respective industries who turn to Marathon to prevent application downtime, eliminate data loss, reduce operational costs and gain a little peace of mind. We're the availability standard for leading ISVs in a range of vertical industries whose users can't afford downtime. And we have strategic partnerships with Microsoft and Citrix to bring always on computing to a much broader audience.
MaxxVault LLC provides software solutions for the management, distribution and control of corporate documents. Benefits of MaxxVault Enterprise include: reduced costs, efficiency improvements, increased customer satisfaction and regulatory compliance. MaxxVault is an open system; it is built using the latest technology which provides enhanced security, dependability and interoperability with existing systems. MaxxVault is quickly adopted by users and administrators. MaxxVault is a Red Herring 2011 Top 100 North America Award winner, a CRN 2011 Top 20 Cloud vendor and a BLI Five Star solution. Simple just got easier.
McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), is the world's largest dedicated security technology company. McAfee delivers proactive and proven solutions and services that help secure systems, networks, and mobile devices around the world, allowing users to safely connect to the Internet, browse and shop the Web more securely. Backed by its unrivaled Global Threat Intelligence, McAfee creates innovative products that empower home users, businesses, the public sector and service providers by enabling them to prove compliance with regulations, protect data, prevent disruptions, identify vulnerabilities, and continuously monitor and improve their security. McAfee is relentlessly focused on constantly finding new ways to keep our customers safe.
Meru's innovative approach to wireless networking uses virtualization technology to create an intelligent and self-monitoring wireless network. With Meru, enterprises can become all wireless, smoothly migrating their business-critical applications from wired to wireless networks. With Wi-Fi from Meru, organizations can: ¢ Deal with increasing capacity demands ¢ Deploy and manage their wireless network easily ¢ Deliver consistent, high-quality mobile services ¢ Manage the network efficiently and cost-effectively ¢ Ensure business applications run reliably over the network ¢ Provide secure access for all users and guests Meru's solutions have been adopted in all major industries, including Fortune 500 enterprises, healthcare, education, retail, manufacturing, and hospitality.. Founded in 2002, Meru is headquartered in Sunnyvale, California, and has operations in the Americas, Europe, the Middle East, and Asia Pacific.
Established in 1983, Micro Strategies Inc. provides IT solutions for commercial businesses of all sizes. These include system analysis, network infrastructure, content management and collaboration, database application development, web/e-commerce development, security, analysis and remediation, remote access and digital voice recording. Our enterprise IT solutions include storage systems, advanced infrastructure configurations, mid-range systems, disaster recovery, server consolidation/virtualization, and hosting services. Our SMB clients enjoy full end-to-end solutions including network infrastructure, application development and implementation, desktop configuration and deployment, system compliance and management. All of our solutions are implemented by experienced, certified staff and include customized training and on-going support services.
Mimecast delivers cloud-based enterprise email management including archiving, discovery, continuity, security and policy. By unifying disparate and fragmented email environments into one holistic solution that is always available from the cloud, Mimecast minimizes risk and reduces cost and complexity, while providing total end-to-end control of email.
Mobile Active Defense (M.A.D.) is the first Enterprise-Grade UTM for iPhones, iPads and other smart phones, bringing Blackberry BES-like security and functionality to billions of mobile endpoints.
Recognized by leading market research advisory firm IDC as the fastest growing mobile enterprise management vendor in the world, MobileIron has been chosen by more than 4,000 organizations that are transforming their businesses through enterprise mobility. Available as an on-premise or a cloud solution, MobileIron was purpose-built to secure and manage mobile apps, documents, and devices for global companies. MobileIron was the first to deliver key innovations such as multi-OS mobile device management (MDM), mobile application management (MAM), BYOD privacy controls, and mobile DLP. MobileIron has been chosen by 7 of the 10 top global pharmaceutical companies, 4 of the 5 top global automotive manufacturers, 3 of the top 5 global retailers, and half of the 10 top global law firms.
Launched in 2004 and recognized by the World Economic Forum as a 2012 Technology Pioneer, Mocana provides the only device-independent security platform that secures all aspects of mobile and smart connected devices, as well as the apps and services that run on them. Mocana's solutions dramatically increase confidence and compliance for the enterprise, OEMs, service providers and their customers. Millions of people use products sold by the more than 200 companies that rely on Mocana's solutions, including Cisco, Honeywell, Dell, GE and General Dynamics, as well as four of the top five Android handset makers.
MokaFive's desktop-management software makes it easy to secure and update desktops and laptops across the enterprise. MokaFive enables you to create a virtual desktop that is centrally managed yet distributed for local execution across thousands of devices, Macs, PCs, and bare metal. Our Mission: To provide a low-cost, scalable solution delivering a truly seamless experience in which users are able to access their corporate data and applications, collaborate and share files, all securely, both online and offline, from any desktop or laptop computer (Mac or PC), tablet or smart phone, from anywhere in the world MokaFive uses client virtualization to create your Windows virtual desktop, called a LivePC. LivePCs can run on any user hardware-Mac, PC or bare metal. We incorporate both the virtual machine and a client hypervisor as part of a single solution.
It's more than a computer. It's your life: When you think about it, all the important information in your life is now stored on a computer. Whether it's photos and music or business documents and financial records, everything is digital. With Mozy, you can be sure your digital life will always be there when you need it. Mozy offers online backup solutions for both the home and business user.
N-able Technologies is the global leader in remote monitoring and management solutions and services for managed service providers (MSPs) and IT departments. N-able's award-winning N-central software and complementary toolsets are proven to reduce IT support costs, improve network performance and increase productivity through the proactive monitoring, management and optimization of IP-enabled devices and IT infrastructure. N-able maintains operations in North America, the U.K., the Netherlands and Australia.
Nalpeiron was founded 20 years ago (in 1991) and has grown to become a leader in the Software License Management and Analytics business. Nalpeiron offers hosted Software analytics and licensing solutions that reduce infrastructure costs, drive user adoption and generate new revenues while providing deep insight into Software usage. Easily retrofit your Software and then Nalpeiron analytics and licensing services capture all the critical elements of a customer’s interaction with your products, control and manage that usage and present the information in real-time in a non-technical, easy to use, dashboards. Reduce business risk with better information, increase revenue by understanding what drives user adoption, and control user interaction and focus your resources with facts on what users want and how they use it. Let Nalpeiron take some of the guesswork out of your business decisions while giving you total control over your Software.
NETASQ is a French company specializing in the manufacture of professional Internet security such as firewalls, intrusion detection, numbering and authentication. The company markets its products in Europe and overseas. It was founded in November 1998 and is based in Villeneuve d'Ascq, France.
NetPilot Internet Security (NIS) is a UK company with fifteen years of experience of developing and manufacturing UTM and SSL VPN security and productivity appliances. The company was formed with the specific intent of focusing on core values of product excellence and conducting business only through close partnership with the channel - principles which the company still follows today. Since 1998 NetPilot security products has given organisations of all shapes and sizes the peace of mind to use the internet in a way that works for them. NIS and its channel, focus on supplying solutions to SME markets with other key verticals being education and supplying into government – notably providing equipment for the RAF. From the Unified Threat Management (UTM) multifunctional security devices for small businesses all the way up to larger network connectivity and security solutions - NetPilot has led the way.
Network Technologies Inc manufactures Digital Signage hardware, Environmental Monitoring System hardware, keyboard-video-mouse (KVM) and audio/video switches, splitters and extenders for computers (PC, MAC, and SUN, including USB) and video sources (DVD player, satellite receiver). By consistently providing environmental monitoring, KVM and audio/video solutions that combine innovation with reliable high-performance, we empower our customers to improve efficiency, reduce equipment and energy costs, and maximize space utilization. We have been rewarded with over 20 consecutive years of dramatic growth.
As IT organizations put more applications on public clouds and as these applications are scaling and growing in their importance to the business managing cloud operations has become extremely complex. This complexity manifests itself in a number of ways: it is more difficult to maintain security and compliance; there are many cost inefficiencies; it is more challenging to maintain high availability and scale up and down in accordance with load requirements and other complexities. Newvem is the only cloud management solution that provides comprehensive analytics of every key operational area of your cloud, including utilization, availability, security, compliance and cost.
Nexthink is the innovator of End-user IT Analytics for security, ITSM and workplace transformation. Nexthink maps all the IT services, how they are being consumed, and how the IT infrastructure is operating, from the only perspective that matters most, the end-users (workers). Nexthink provides essential visibility and insight into IT operations and security for IT Governance. Nexthink’s patented self-learning and artificial intelligence construct meaningful patterns and IT analytics. Patterns are analyzed in real-time (every minute), enterprise-wide. Analytics are calculated across time and endpoints to detect possible security threats (new pattern on one or more endpoints) and system failures (common failure across multiple endpoints).
Nok Nok Labs, Inc., based in Palo Alto, CA, was founded to transform online authentication for modern computing. The company is backed by a team of security industry veterans from PGP, Netscape, PayPal and Phoenix, and have a deep experience in building Internet scale security protocols and products. The company's ambition is to fundamentally transform authentication by enabling end-to-end trust across the web using authentication methods that are natural to end-users and provide strong proof of identity. Our solutions will remediate and unify the authentication silos that exist today, and provide organizations with greater flexibility to utilize strong authentication solutions in adaptable ways. Our technology solutions will allow companies to scale their authentication systems to meet the challenges posed by the rapid growth of users utilizing different Internet-connected devices, performing a wide range of online transactions.
Norse is the leading innovator in the live threat intelligence security market. With the goal of transforming the traditionally reactive IT security industry, Norse offers proactive, intelligence-based security solutions that enable organizations to identify and defend against the advanced cyber threats of today and tomorrow. Norse’s synchronous, global platform is a patent-pending infrastructure-based technology that continuously collects and analyzes real-time, high risk Internet traffic to identify the sources of cyber attacks and fraud. Norse is the only provider of live, actionable, cyber threat intelligence that enables organizations to prevent financial fraud and proactively defend against today’s most advanced cyber threats including zero day and advanced persistent threats. Norse has offices in Silicon Valley, St. Louis, and Atlanta.
Novell, Inc., is a global software provider that designs, builds and innovates technologies that make people more productive and work environments more secure and manageable. Novell supports thousands of organizations around the world with collaboration, endpoint management, and file and networking solutions that work together and with other systems to power your workforce. With products such as Novell GroupWise, Novell ZENworks and Novell Open Enterprise Server, you can reach new levels of productivity while minimizing cost, complexity and risk. Today's Novell is committed to helping our customers get more value from their current investments and to developing new solutions to help them compete in a social, mobile and multiplatform world.
Great enterprise server management software doesn't have to be complicated or limited to Fortune 100 budgets. It shouldn't take a team of lawyers to understand how to license it or 6 months to deploy it either. System Frontier is a solution that brings Operations, Security and business leadership together by making systems management simpler, more secure and easily repeatable. Noxigen LLC was founded in 2012 to build solutions that solve enterprise problems around systems management, compliance and access control. With a laser focus on making your company more efficient, you can expect great customer service and a product that continually improves to meet customer needs.
nPulse Technologies is the performance leader in sustained packet capture and Big Data security analytics. nPulse's flagship Capture Probe eXtreme (CPX) appliance delivers sustained, lossless packet capture at 20Gbps, helping organizations counter rapidly evolving cyber threats that target faster, large enterprise networks. Leading financial institutions, government agencies, telecommunications carriers and other organizations rely on CPX and nPulse's innovative Pivot2Pcap API to enhance security monitoring, shorten incident response times and increase returns on existing security investments.
NSFOCUS Information Technology Co., Ltd is a proven global leader in providing enterprise-level network security solutions and services. Our strategy is to provide the most competitive security solutions and services for customers and to be the world's most reliable network security company.NSFOCUS is dedicated to providing carrier-grade solutions for anti-DDoS, Web security, and enterprise-level network security. For over 10 years, NSFOCUS's research and development teams have been studying DDoS attacks and how to stop them. This long term commitment has helped its customers to maintain high levels of business operations and ensure that their online business systems remain available. The NSFOCUS Anti-DDoS System (ADS) helps customers find and fend off a wide variety of attacks, from simple network layer attacks to more sophisticated and potentially damaging application-layer attacks; all while letting legitimate traffic get through to critical systems.
NTT Communications Corporation is renowned for its diverse information and communication technology, expertise in private networks, cloud, hosting and IP networking services, and industry leadership in IPv6 transit technology. Its extensive global IT infrastructure includes highly reliable low-latency private networks, expansive MPLS IP-VPN coverage, Ethernet VPN, Tier1 global IP backbone networks with one of the highest available transpacific capabilities, and secure data centers in Asia, North America and Europe.
NuData Security Inc. provides advanced web security solutions to enterprises through proprietary behavior analytics and countermeasures. The NuDetect product is a comprehensive early web fraud detection system powered by a multi-dimenssional behavior analytics platform. NuDetect examines users in real time through context aware measures including behavior signatures unique to a customer's business and those common accross the NuData security cloud. The system triggers scores, alerts and enables an array of customizable countermeasures. The NuCaptcha product is an adaptive countermeasures system which delivers Captcha challenges which are both easier to use and more secure than traditional Captcha systems. NuCaptcha uniquely adds behavior analytics to simultaneously decrease human difficulty while significantly increasing security. The Captcha challenge is automatically adjusted based on risk to provide security without frustrating a website's legitimate customers.
Breaking New Ground For SMB Resellers Nuvotera is breaking new ground. As a premier SMB cloud solutions distributor, Nuvotera is focused on combining innovative, margin rich SaaS solutions with unparalleled customer service for managed service providers. With over 12 years of experience in the SMB, Nuvotera was built from the ground up to provide a complete suite of proven, tested, solutions and bring them to market backed by a level of personal attention rarely found in distribution, today.Nuvotera solutions provide centralized cloud management; hand selected and extremely scalable. The Nuvotera portfolio was designed exclusively to meet the needs of the MSP and provide the security coverage necessary for the SMB customer.Nuvotera bridges the gap between enterprise class, intelligent / technology driven solutions and hands-on “Good Old Fashioned” customer service. These sophisticated
OT is a world leader in digital security solutions for the mobility space. OT has always been at the heart of mobility, from the first smart cards to the latest contactless payment technologies which equip millions of smartphones. Present in the Payment, Telecommunications and Identity markets, OT offers end-to-end solutions in the Smart Transactions, Mobile Financial Services, Machine-to-Machine, Digital Identity and Transport
Okta is the market leading on-demand identity and access management service that enables enterprises to accelerate the secure adoption of their web-based applications, both in the cloud and behind the firewall. Okta delivers a complete solution addressing the needs of IT, end-users, and business leaders; no customization required. Okta's initial service is built on a secure, reliable and extensible on-demand, multi-tenant cloud services platform. That platform will be the foundation for a growing set of core Okta and partner services that empower businesses to eliminate cloud adoption barriers and unlock the potential of the cloud for enterprise users everywhere. The Okta team has built, deployed, and supported market leading, on-demand and enterprise software solutions from companies including Salesforce.com, SuccessFactors, PeopleSoft, Microsoft, Sun and HP.
Onapsis Inc. is the leading provider of ERP cyber-security solutions. Our solutions empower information security and audit professionals to understand and efficiently mitigate the cyber security risks affecting their SAP and Oracle business platforms, preventing espionage, sabotage and financial fraud attacks while streamlining compliance with internal and regulatory requirements.As the industry standard, trusted by the leading audit firms and deployed by Global 1000 and military organizations, Onapsis X1 is the most widely-used solution to detect cyber security risks and compliance violations affecting SAP business platforms. Unmatched by generic security monitoring products, Onapsis X1's unique SAP-certified capabilities integrate seamlessly into existing GRC and Risk Management practices, providing unprecedented visibility to protect critical business processes.
OneLogin eliminates passwords for companies that embrace cloud computing. Users sign in once and get secure, one-click access to all their web-based apps in the cloud and behind the firewall. OneLogin reduces administrative overhead, increases productivity and drives adoption of apps within the organization. And OneLogin integrates seamlessly with the existing directory infrastructure and adds extra layers of security using password policies, certificates and one-time passwords.
ONPATH Technologies is the leading provider of scalable connectivity and monitoring solutions for high-performance networks. ONPATH's Universal Connectivity System and HorizON Software deliver an advanced platform that automates and secures data center and test infrastructure to help network managers conserve time, increase utilization, and save money compared to manual patching or complex mesh switching architectures. ONPATH currently has over one million installed ports throughout Fortune 1,000 and Government customers.
OpenDNS is the world's largest Internet-wide security network. Founded in 2005, the company has evolved from a provider of fast, reliable DNS services into a leading network and mobile security innovator that protects two percent of the Internet's active users every day. In 2012, OpenDNS launched Umbrella, a new line of cloud-delivered security services that extend the protection of core network security infrastructure to nomadic workers that roam on and off the corporate network. Umbrella delivers a secure connection from any device, preventing contact with malware, phishing and botnets regardless of application, protocol or port. Unlike Web filtering, firewall and Web gateway appliances and software, Umbrella is built for today's world of ubiquitous connectivity. It is easy to deploy and manage, with no hardware to install or software maintain, no need to reconfigure networks and no new latency.
OPSWAT is a San Francisco based software company that provides solutions to secure and manage IT infrastructure. Founded in 2002, OPSWAT delivers solutions that provide manageability of endpoints and networks, and that help organizations protect against zero day attacks by using multiple antivirus engine scanning and file filtering. OPSWAT’s intuitive applications and comprehensive development kits are deployed by SMB, enterprise and OEM customers to more than 100 million endpoints worldwide. Our VisionTo create a single multi-platform interface to manage all software applicationsTo create a global partnership program, open to all software application vendors, to promote integration with many technology solution vendorsTo create the fastest, most robust multi-scanning solution
Technology Alone Is Not Enough. We unify the business IT experience through the use of our cloud platform and aligned IT services. From the keyboard to your applications hosted in the cloud, OS33 provides IT support and software to help businesses unify IT to deliver the most value. What you might not know, however, is that as far back as 2000 we knew this day was coming. That's when OS33 first went into development. It's the farthest thing from a newly-created, rushed-out-the-door cloud computing startup. OS33 is the most innovative, simplest to migrate to, easiest to manage, yet vastly sophisticated cloud IT unifying technology available on the market today.
Owl Computing Technologies develops and markets one-way data diode information transfer products that move information securely and unidirectionally from one network security domain to another. Owl Computing NIAP EAL-certified products are integrated into the IT infrastructures of every major agency in the US intelligence community, and play a key role in secure network communication Cross Domain Solutions. Owl's DualDiode technology enforces one-way data transfer in hardware, and is impervious to software attack. Owl products provide a one-way trust-nothing controlled interface for any isolated security enclave that requires network communications capability and absolute assurance against data leakage.
The cloud can be a game-changing tool for business. But cloud vendors today are only scratching the surface of what is possible, while forcing customers to make unacceptable tradeoffs. Oxygen harnesses the potent connectivity and elasticity of the cloud to improve access and sharing of content without making customers surrender their data or control. Content is the lifeblood of business today. It must be secured, controlled, and protected, but to be useful, it must also be made available across the company, across the world, on any device. Oxygen uses the cloud to securely direct content across a fabric of different corporate data sources and user devices, all with complete IT visibility. Our unique technology addresses not only the most pressing need of today - secure mobile access to work - but also positions businesses to further consolidate information silos, introduce new content applications, and gain leverage from both the cloud and existing infrastructure.
Palisade Corporation is the maker of the market leading risk and decision analysis software @RISK and the DecisionTools® Suite. Virtually all Palisade software adds in to Microsoft Excel, ensuring flexibility, ease-of-use, and broad appeal across a wide range of industry sectors. Its flagship product, @RISK, debuted in 1987 and performs risk analysis using Monte Carlo simulation. With an estimated 150,000 users, Palisade software can be found in more than 100 countries and has been translated into five languages. Headquartered in Ithaca, New York, Palisade also maintains offices in London, England, and Sydney, Australia, and Rio de Janeiro, Brazil. Products and services: @RISK, DecisionTools Suite, PrecisionTree, TopRank, NeuralTools, StatTools, Evolver, RISKOptimizer, Developer Kits, @RISK for Project, @RISK for Six Sigma, Training, Consulting, Custom Development, Conferences, Books
Palo Alto Networks has pioneered the next generation of network security with our innovative platform that allows you to secure your network and safely enable the increasingly complex and rapidly growing number of applications running on your networks. At the core of this platform is our next-generation firewall which delivers visibility and control over application, users, and content within the firewall using a highly optimized hardware and software architecture. This platform uniquely offers you the ability to identify, control, and safely enable applications while at the same time inspecting all content for all threats all the time. These capabilities are combined with superior performance compared to traditional approaches, including those found in a UTM or software blade approach.
Founded in 1990, Panda Security is the world's leading provider of cloud-based security solutions, with products available in more than 23 languages and millions of users located in 195 countries around the World. Panda Security was the first IT security company to harness the power of cloud computing with its Collective Intelligence technology. This innovative security model can automatically analyze and classify thousands of new malware samples every day, guaranteeing corporate customers and home users the most effective protection against Internet threats with minimum impact on system performance. Panda Security has 61 offices throughout the globe with US headquarters in Florida and European headquarters in Spain. Panda Security collaborates with WWF and Invest for Children as part of its Corporate Social Responsibility policy.
Established in 1999, Paraben Corporation quickly became a leader in handheld forensics with the release of PDA Seizure. After releasing Cell Seizure, the first commercially available tool for cell phone forensics, Paraben combined the two tools to create Device Seizure, a comprehensive handheld forensic solution. Paraben also has many digital forensic software titles for forensic analysis of hard drives
Paragon Software Group (PSG) is an innovative software developer focused on two dynamic growth markets. The company's comprehensive product line for the data storage market addresses the needs of data security and storage management for PCs, servers and networks through a complete line of Disaster Recovery and Server Optimization solutions. A second portfolio of products delivered by the company's Mobility team (Smart Handheld Devices Division and Epocware) offers software for a variety of smartphones (Android, BlackBerry, iPhone, iPod touch, Java, Windows Mobile, Symbian OS) and desktop PCs, including multilingual on-line handwriting recognition, localization, business and productivity applications, games, 120 multilingual dictionaries and encyclopedias.
Respected as a major product innovator, Pelco is a world leader in the design, development and manufacture of video and security systems and equipment ideal for any industry. Pelco produces a large selection of the security industry's most respected offering of discreet camera domes and enclosures, video matrix systems, next-generation digital video recorders, IP solutions and fiber optic transmission systems for video/data, and much more in a never-ending pursuit of achieving exceptional customer service. With a prestigious history of offering high-quality products, innovative technologies, and Guaranteed 100-Percent Customer Satisfaction, Pelco has become the most sought after product supplier in the video and security industry. Pelco has offices in more than 20 countries and protects many of the world's greatest landmarks and treasures, including the Statue of Liberty, Windsor Castle, Niagara Falls, and the pyramids in Egypt.
The PerspecSys Cloud Data Protection Gateway solves three critical issues that are slowing enterprise cloud adoption data Privacy, Residency and Security. With PerspecSys, sensitive data never leaves an enterprise's control, so the risks of data transfer, processing, and storage are eliminated and the benefits of adopting mission-critical cloud computing services can be realized PerspecSys Delivers: Privacy/Residency/Security - No data is shared in the clear outside of the corporate network; data is controlled and secured based on user defined tokenization or encryption options. Preservation of Functionality Across Multiple Applications and Clouds User experience is unchanged, preserving features and functions of their Cloud applications such as searching, reporting, and e-mailing. Enterprise Scalability and Management - The solution is proven to scale to demanding production requirements and it is simple to configuration and deploy.
PhishMe provides organizations the ability to improve their employees' resilience towards spear phishing, malware, and drive-by attacks. The detailed metrics PhishMe provides make it easy to measure the organization's progress in successfully managing employees' security behavior. With over 4 million individuals trained in 160 countries, PhishMe has been proven to reduce the threat of employees falling victim to advanced cyber attacks by up to 80 percent. PhishMe's methodology entails periodically immersing employees in simulated phishing scenarios, and presenting bite-sized, engaging training, instantly to those found susceptible. The solution provides clear and accurate reporting on user behavior, allowing customers to measure improvement over time. PhishMe works with Federal Agencies and Fortune 1000 companies across many industries to include financial services, healthcare, higher education and defense.
Pindrop Security provides enterprise solutions that help prevent phone-based fraud. Its acoustical fingerprinting technology detects fraudulent calls and authenticates legitimate callers, helping customers eliminate financial losses and reduce operational costs. Pindrop's breakthrough technology is the first of its kind to fingerprint individual phone calls, providing verification of caller provenance. Recently named one of the 10 Most Innovative Companies at the 2012 RSA conference and a Gartner "Cool Vendor" in Enterprise Unified Communications and Network Services for 2012, Pindrop's solutions help companies feel more confident in the security of phone-based financial transactions.
The Cloud Identity Security Leader Ping Identity believes secure personal and professional identities underlie human progress in our connected world. Our identity security solutions empower workforce and customer access to any application from any device. More than 900 companies, including 45 of the Fortune 100, rely on our award-winning products. Visit pingidentity.com for more information.
The Piston Cloud executive team includes former NASA Nebula Chief Technical Architect Joshua McKenty, former Rackspace luminary Christopher MacGown and former NASA Communications Director Gretchen Curtis. Our core product, Piston Enterprise OpenStack, is a massively scalable private cloud operating system built on OpenStack, with a focus on ease of use and advanced security features for highly regulated environments. Piston Cloud helps drive OpenStack forward via code contributions, thought leadership through our role on the OpenStack Project Policy Board, and in support of the OpenStack developer community. We willingly share our expertise, leadership, guidance, vision and code with the community and other companies working to make OpenStack the industry standard in cloud. Piston Cloud's goal is to further the natural evolution of the OpenStack project while focusing on meeting the needs of the enterprise.
PortalGuard is A Brandable Hybrid Cloud Portal: promoting secure On-demand Logins, Self-service Password Reset, and Pain-free Navigation to your everyday business or education web apps. Your login portal should never be restricted to a single device. PortalGuard's responsive and custom branded Web Design ensures a consistent, optimal viewing experience for your end users with easy reading and navigation, and minimal re-sizing, panning and scrolling across a wide range of devices.
Portcullis Computer Security Ltd is a leading International specialist in IT Security Services. It caters for both the public and private sectors that are looking for the highest level of I.T. Security Services. Specialties include I.T. Security, Penetration Testing, Code Review and Incident Response. Portcullis' expertise has been honed over three decades, investing in top quality security professionals and delivering I.T. Security Services. Clients are assured that their systems, networks and web sites are secure from threat of attack from unauthorised sources, both externally and from within their organisation. It's core competency lies within Application Security, and is not a one stop tool shop, but rather a major investor in the development of security tools over the years, which include products such as Netsparker, an application vulnerability assessment tool.
Porticor infuses trust into the cloud with secure, easy to use, and scalable solutions for data encryption and key management. Porticor enables companies of all sizes to safeguard their data, comply with regulatory standards, and streamline operations. Porticor's Virtual Private Data system combines state of the art encryption with patented key management to protect critical data in public, private and hybrid cloud environments. Within minutes, customers can encrypt their entire data layer and safely store the encryption keys. With breakthrough homomorphic split-key encryption technology, Porticor Virtual Private Data is the only system available that offers the convenience of cloud-based key management without sacrificing trust. Founded in 2010 by experts in security, cloud computing and cryptography, Porticor is committed to protecting private information stored in public clouds.
Portnox™ Network Access Control Platform traverses across all network layers, whether physical, virtual or in the cloud to illuminate, visualize, analyze and control all connected devices and users. Its unmatched ability to reach every fragment of the network regardless of layer or location results in the most accurate and real-time view of any network, empowering organizations to make smarter, more efficient and more secure decisions.
Prevalent Networks is an IT consulting company that works with the leaders in governance, risk, infrastructure, and compliance to deliver solutions that create "information anywhere, security everywhere" (TM).
PRISYM ID designs and delivers turn-key labeling solutions for organizations that need complete product auto-identification and lifecycle traceability. With the continual tightening of labeling regulations and audits, PRISYM ID empowers its clients to safeguard their reputation by ensuring compliance, and significantly reduce costs by eliminating recalls through labeling errors. For over 30 years, PRISYM ID has been the market leader in world-class label lifecycle management, and is trusted for delivering personalized service excellence to clients in varied sectors including medical device, life sciences, healthcare, automotive, chemical and manufacturing.
Privacy Analytics offers a unique data de-identification and masking tool along with HIPAA de-identification certification services. The Privacy Analytics Risk Assessment Tool (PARAT) is the only commercially available integrated data de-identification and masking tool on the market today. The software allows custodians of health data to quantify, assess and manage risks when disclosing health data for secondary purposes. Using peer-reviewed metrics and de-identification algorithms, PARAT permits the protection and sharing of multiple data sets in support of cross-sectional, longitudinal, and geospatial analysis. Privacy Analytics Inc. was established in 2007 to commercialize privacy risk assessment and de-identification technologies developed by the Electronic Health Information Laboratory (EHIL) at the Children's Hospital of Eastern Ontario Research Institute and the University of Ottawa under the leadership of renowned researcher Dr. Khaled El Emam.
PrivateCore is the private computing company. PrivateCore vCage software validates the integrity of OpenStack servers and secures against persistent malware, malicious hardware devices, and insider threats. PrivateCore was founded in 2011 by security industry veterans from the IDF, VMware and Google. The company is based in Palo Alto, California.
Prolexic is the world's largest, most trusted Distributed Denial of Service (DDoS) mitigation provider. Able to absorb the largest and most complex attacks ever launched, Prolexic restores mission critical Internet facing infrastructures for global enterprises and government agencies within minutes. Ten of the world's largest banks and the leading companies in e-Commerce, SaaS, payment processing, travel/hospitality, gaming and other at-risk industries rely on Prolexic to protect their businesses. Founded in 2003 as the world's first in the cloud DDoS mitigation platform, Prolexic is headquartered in Hollywood, Florida and has scrubbing centers located in the Americas, Europe and Asia.
Proofpoint, Inc. helps the largest and most successful companies in the world protect and govern their most sensitive data. Proofpoint is an innovative security-as-a-service vendor that delivers data protection solutions that help medium- and large-sized organizations protect their data from attack and enable them to effectively meet the complex and evolving regulatory compliance and data governance mandates that have been spawned from highly publicized data breaches. Proofpoint, positioned by Gartner in the Leaders Quadrant in its 2012 Magic Quadrant for Secure Email Gateways, delivers an integrated suite of on-demand data protection solutions spanning threat management, regulatory compliance, data governance and secure communications—all of which are based on a common security-as-a-service platform.
At ProtectCELL, we offer device protection. But we also offer coverage, plans and services that go beyond traditional insurance - mobile services like Digital Leash and Digital Leash Plus mobile security, ID Rescue powered by LifeLock, Device Buyback and our online Rewards Mall. We offer plans to fit every wireless lifestyle and budget, from our unique version of an extended warranty to protection from accidental damage, physical damage, water damage and even a complete protection plan.
Protected Mobility is a provider of secure solutions for the mobile world. From smart phones to laptops and iPads, Protected Mobility solutions are ideal for government and private sector secure communications. With Protected Mobility you gain easy to use, cross platform, cross carrier, military grade security at the touch of a button on mobile devices. Demo applications available from the Protected Mobility web site.
Let’s simplify Access Right ManagementInformation is like currency. As the way we do business is evolving, new threats to information surface. While there’s a lot of buzz about external risks data faces, are you doing enough to ensure the integrity of data internally? Internal data security remains one of the weakest and arguably the most overlooked links in the life of an information asset. Unstructured data, fragmented responsibilities, lack of overview and inaccurately defined permissions are the biggest perils facing businesses today. Sounds familiar? 8MAN can help. Our state-of-the-art solution makes access rights management easy. With unique graphical user interface, it’s designed to save time, cut costs and ensure greater accountability in data-handling.
Protected Trust enables organizations to securely communicate electronic information via a simple user experience today, and is preparing for the emerging digital security needs of tomorrow while complying with the latest, ever-evolving governmental regulatory standards.
Proxmox is a software company that operates worldwide. We are dedicated to develop server solutions that ease the work of people and companies. With our two core products - Proxmox Mail Gateway (PMG) and Proxmox Virtual Environment (PVE) - we offer simple, secure and flexible server solutions which evolve dynamically to the needs of our customers.Proxmox Mail Gateway is the solution to protect your company's email server and minimize your administration time.Proxmox Virtual Environment (PVE) is the number one choice for running virtualized Linux and Windows systems. It's easy installation and maintenance increases the use of your existing resources and thus reduces hardware cost and your work time.Proxmox Server Solutions GmbH is a privately held corporation based in Vienna, Austria and was established in 2004.
Starting in November 2006 as an experimental service providing online security against data sniffers plus targeting regions where internet was censored and access to websites and VOIP was restricted. Pre-launch went successful with people enjoying unblocking websites and VOIP calls. PureVPN started full fledged services in mid 2007 opening it's doors to the world. From the very beginning PureVPN has been about quality, freedom and choice of connectivity offering a spectrum of countries where you can connect without any kind of limitation on how often you switch between locations e.g multiple locations in USA, UK, Canada, Germany, Netherlands, Russia etc and when you do it - 24/7!
Born and raised in the security community, we're on a roll and just getting started. In late 2009, the original team of Pwnies - Dave Porcello, Gabe Koss, and Oliver Weis - placed the Pwn Plug on the original site (Dave's blog) with little expectation of what was to come. The Pwn Plug took off - with orders flowing in from global organizations and Fortune 500 companies. From those humble beginnings, the Power Pwn and Pwn Pad debuted to critically acclaimed success and put the growing Pwnie team on the map with products designed for flexible remote security assessment. Focused on providing real risk insight and visibility into remote locations, Pwnie Express is led by industry veterans with deep security testing and product development experience. With varied backgrounds in security assessment, and guided by CEO Paul Paget and CTO Dave Porcello, the team strives to solve the challenges of security assessment. While many other security assessment products focus on depth of coverage,
Qihoo 360 Technology Co. Ltd. (Qihoo 360) is a leading Internet platform company in China as measured by active user base. At the end of March 2012, we had about 411 million monthly active Internet users, according to iResearch. Recognizing security as a fundamental need of all Internet and mobile users, we have built our large user base by offering comprehensive, effective and user-friendly Internet and mobile security products and services to protect users' computers and mobile devices against malware and malicious websites. Our products and services are supported by our cloud-based security technology, which we believe is one of the most advanced and robust technologies in the Internet security industry. We also provide users with two very important secure access points to Internet: web browsers and app store. We currently monetize our massive user base primarily through offering online advertising and Internet value-added services.We are...A top three Internet Company as measured
Qosmos turns networks into information sources, making them application- and service-aware. The company's award-winning Deep Packet Inspection (DPI) and Layer 7 Network Intelligence (NI) technologies recognize thousands of communication protocols and metadata attributes, creating an essential information layer that gives the most accurate picture of real-time data activity on networks. Market-leading equipment makers, specialized software vendors and cloud service providers embed Qosmos in telco and enterprise solutions where real-time Layer 7 intelligence is critical, such as traffic optimization, policy management, quality of experience, analytics, firewalls, cyber defense and more. Qosmos software development kit and probes can be used in all environments physical, virtualized and in SDN architectures to accelerate time to market and ensure continuous signature updates.
Solutions to empower your business information technologies and provide total customer quality and satisfaction, including: IT Global Management Consulting Quadrix formulates strategic plans and uses operations and information technology to mobilize knowledge and resources and to make major improvements in a company's products and services, relationships or economics. Information technology is recognized as a key driver for revenue growth. The development of new market segments, new products/services, and new customers can be accelerated through IT. In many cases, IT is the innovation - as with digital products, digital features, and digital services. Quadrix works with clients around the world to develop IT strategies and implement innovative IT approaches to drive growth.
Qualys, Inc., is a pioneer and leading provider of cloud security and compliance solutions with over 5,800 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The QualysGuard Cloud Platform and integrated suite of solutions helps organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including BT, Dell SecureWorks, Fujitsu, IBM, NTT, Symantec, Verizon, and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA).
QuintessenceLabs Inc. is a deep technology company incorporated in 2006 to commercialise breakthrough information security systems premised on the practical application of advanced quantum physics. The company comprises world-class scientific talent and has established an international network of commercialisation and technical talent.QuintessenceLabs is the first commercial group in the world to exploit a new generation of quantum cryptographic technology which enables unbreakable, secure communication of sensitive information through the generation of a quantum cryptographic key.We believe that the 21st century will see the leveraging of quantum technologies for novel applications that have major impacts on everyday life, much in the same way as electromagnetic phenomena were harnessed during the 20th century to significantly improve the quality of our lives.
Quotium (NYSE Euronext: QTE) helps businesses protect data and reduce application security risk. We provide automated technologies to make business applications secure and robust while delivering application security that is better, faster and more accurate than other offerings on the market. For organizations that are looking for a way to embed application security testing in the software lifecycle, our expertise and offerings provide efficient and effective vulnerability detection in an easy to use solution. Quotium pioneered IAST (Interactive Application Security Testing) technology. Quotium’s Seeker software has revolutionized the way web applications are being secured. Founded and managed by experienced business people and recognized industry leaders Quotium is dedicated to providing quality in software, customer service and support. Quotium considers that the best return of investment in the acquisition of a software solution is directly linked to the quality of the solution.
Rackspace Hosting (NYSE: RAX) is the open cloud company, delivering open technologies and powering more than 197,000 customers worldwide. Rackspace provides its renowned Fanatical Support across a broad portfolio of IT products, including Public Cloud, Private Cloud, Hybrid Hosting and Dedicated Hosting. The company offers choice, flexibility and freedom from vendor lock in. Rackspace has been recognized by Bloomberg BusinessWeek as a Top 100 Performing Technology Company and is featured on Fortune's list of 100 Best Companies to Work For. Rackspace was positioned in the Leaders Quadrant by Gartner Inc. in the 2011 Magic Quadrant for Managed Hosting. Rackspace is headquartered in San Antonio with offices and data centers around the world.
As the market leader for identity virtualization, Radiant Logic delivers simple, logical, and standards-based access to all identity within an organization. The RadiantOne federated identity service enables customizable identity views built from disparate data silos, federating identity within the enterprise and building a single global identifier. This technology drives critical authentication and authorization decisions for WAM, federation, and cloud deployments. Organizations in a wide range of sectorsincluding government, defense, banking, and manufacturingrely on RadiantOne to deliver quick ROI by reducing administrative effort, simplifying integration tasks, and building a flexible infrastructure to meet changing business demands.
Radware (NASDAQ: RDWR), is a global leader of application delivery and application security solutions for virtual and cloud data centers. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility. Radware's solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down.
Rapid7's IT security solutions deliver visibility and insight that help you make informed decisions, create credible action plans, and monitor progress. They simplify compliance and risk management by uniquely combining contextual threat analysis with fast, comprehensive data collection across your users, assets, services and networks, whether on premise, mobile or cloud-based. Rapid7's simple and innovative solutions are used by more than 2,500 enterprises and government agencies in more than 65 countries, while the Company's free products are downloaded more than one million times per year and enhanced by more than 200,000 members of its open source security community. Rapid7 has been recognized as one of the fastest growing security companies by Inc. Magazine and as a "Top Place to Work" by the Boston Globe. Its products are top rated by Gartner®, Forrester® and SC Magazine.
We solve the three key problems that organisations have around internet access: we help boost productivity, we secure the network from malware and phishing, and we reduce legal risk. Rawstream offers Security as a Service that is Near Zero Touch. Rawstream is the easiest to deploy and maintain, with no hidden hardware or software costs.
RedSeal Networks is the leading provider of proactive security management solutions that enable enterprises to continuously audit and monitor IT compliance and risk to eliminate cyber-attacks. The RedSeal 6 Platform supplements traditional and next generation network infrastructure, SIEM systems, and GRC platforms which are unable to deliver proactive network security. RedSeal delivers the industry's most powerful network and security operational insights using patented network visualization and predictive threat modeling. Backed by Venrock, OVP, Sutter Hill, JAFCO, Leapfrog and In-Q-Tel, RedSeal is used by the world's largest government and commercial organizations to dramatically cut compliance costs and effectively prioritize vulnerability remediation efforts.
Reflex Systems helps organizations accelerate adoption of next generation virtualized data centers by addressing potential challenges, such as monitoring the dynamic environment, maintaining secure configuration, cross-functional management, and regulatory compliance while capitalizing on the virtualization investment; thus enhancing overall data center security. Reflex provides a comprehensive Virtualization Management Solution that dramatically increases the visibility, management and security of an organization's virtual infrastructure, enabling organizations to align virtualization initiatives with overall business objectives.
Reflexion Networks provides hosted services for email and Web security, email archiving and discovery, and business continuity. In addition to providing an effective defense against email and Web-borne malware, Reflexion's in-the-cloud services help companies save money and staff time, reduce bandwidth and energy consumption, and ensure email availability even in the event of a local server or business outage. Reflexion's solutions are sold exclusively through a worldwide network of IT solution providers.
Reservoir Labs, Inc., is a small business. We currently have approximately 20 staff members, of whom 17 are technical; more than half of these employees hold a Ph.D. degree in either engineering or computer science. Our staff is characterized by advanced technical expertise, high output, adaptability, and a dedication to serving our customers.Our offices are located in New York City and Portland, Oregon. We also have several employees telecommuting from within the US and additional partner contractors coming in from overseas. We perform contract research and development services related to the software needed to obtain qualitatively better results from high performance computing systems; these technologies are licensed and distributed in a variety of ways.
RiskIQ™ was built with a purpose in mind: obtaining visibility over the endless landscape that is the great unknown–the Web. Google’s got this covered for search, but we’ll pick up the ball when it comes to security. We view ourselves as an organization that is personally taking on the task of ensuring that the web and mobile landscapes go from being uncharted blobs of unknown risk, to carefully charted maps that ensure complete visibility. At the same time, we’re committed to ensuring that this information is available to everyone. But it’s not enough to just make risk visible. We’re committed to making risk intelligent.
Founded in 1999, Roaring Penguin Software Inc. specializes in e-mail filtering. Since 2000, the company has focused on fighting spam at the mail server, with the acclaimed MIMEDefang and CanIt product lines. Today, Roaring Penguin develops, deploys and supports its spam- and virus-fighting software products for customers that include campuses, ISPs, web hosts, government offices and enterprises. CanIt anti spam solutions are used across North America and Europe, filtering mail servers for organizations that range in size from 5 to 100,000 plus mailboxes.
Rsam is a leading provider of Enterprise Governance, Risk and Compliance (GRC) solutions. Since 2003, hundreds of customers have successfully implemented the Rsam Platform to integrate business criticality, regulatory assessment data, vulnerabilities and findings to enable enterprise wide visibility, oversight and assurance. Rsam's modular solutions enabling organizations to manage risk and compliance initiatives in the areas of: Assessments, Audit, Compliance, Enterprise Risk, Incident Mgmt, Issues and Remediation Mgmt, Policy Management and Exceptions, Threat / Vulnerabilities and Vendor Risk .
Safe-T is a provider of secure data exchange solutions for a wide range of industries including financial, healthcare and manufacturing organizations. Safe-T Box, enables organizations to share data securely between people, applications and businesses and is designed for fast and easy deployment and wide user acceptance. Safe-T’s secure front-end solution RSAccess, eliminates the need to store sensitive data in the DMZ, thereby reducing exposure to data breaches. With offices in North America, Europe and Asia, Safe-T secures millions of files and emails every day. Safe-T Box Safe-T Box enables organizations to control and secure data exchange of any type and size between people, applications and businesses. Built on the industry's widest range of pre-configured application connectors and powered by an automated security policy enforcement engine, Safe-T Box is designed to rapidly add security and control across a wide variety of data exchange scenarios in the enterprise.
Founded in 1983, SafeNet is a global leader in information security. SafeNet protects its customers' most valuable assets, including identities, transactions, communications, data and software licensing, throughout the data lifecycle. More than 25,000 customers across both commercial enterprises and government agencies and in over 100 countries trust their information security needs to SafeNet.
SailPoint, an identity management leader, helps the world's largest organizations to mitigate risk, reduce IT costs and ensure compliance. The company's award-winning software provides superior visibility into and control over user access to sensitive applications and data while streamlining the access request and delivery process. SailPoint's innovative solutions provide compliance management, access request, user provisioning, cloud access management, and identity intelligence all based on an integrated governance and risk model.
Since its establishment in 2000, SANGFOR has had a clear goal: To build high-performance, reliable and absolute secure networks that underpin the growth of our customers a businesses. SANGFOR concentrates on excellence in WAN devices, chiefly for emerging segments, rather than producing good-enough products for all parts of the network. From the start, SANGFOR's products have been designed to offer unparalleled performance, greater choice and greater flexibility while lowering TCO (Total cost of ownership) .
The SANS Institute was established in 1989 as a cooperative research and education organization. Its programs now reach more than 165,000 security professionals around the world. A range of individuals from auditors and network administrators, to chief information security officers are sharing the lessons they learn and are jointly finding solutions to the challenges they face. At the heart of SANS are the many security practitioners in varied global organizations from corporations to universities working together to help the entire information security community.SANS is the most trusted and by far the largest source for information security training and security certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - the Internet Storm Center.
Founded in 1999 by business risk, information systems audit, and security professionals, Seccuris is a provider of information security and information systems risk management solutions for North American organizations. We deliver the capability and expertise required to ensure that your organization is protected. We achieve our focus on information assurance through our deep commitment to education and research, ensuring that we are on the leading edge of technical and governance knowledge in the information security industry.
Seclore is a high growth software product company promoted by IIT Bombay. Seclore's products Seclore FileSecure and Seclore InfoSource help mitigate the risk arising out of information breaches and regulatory non-compliance whilst enhancing collaboration. This is done by providing ubiquitous technology for information control within and outside of the enterprise which seamlessly works with existing infrastructure, is easy to deploy and use and comes with pay-as-you-use pricing.
SecPoint is a Danish IT security company which has developed security solutions, each ahead of it's competitors in their markets:The Protector has features such as Anti-Spam with Grey Listing technology, Anti-Virus, Anti Spyware, Content-Filter, Anti-P2P, Anti Instant Messaging, Anti Phishing and Intrusion Prevention. The Penetrator has features such as Vulnerability Management, Security Assessment, Penetration Testing, Audit any OS, Distributed Audit, Launch Real Exploits, Launch Real DoS Attacks, Reports Branding and comes in Portable and fully standalone appliance versions. The Portable Penetrator has features such as Wireless Wifi security auditing of open networks, WEP , WPA and WPA2 Protected networks. Further more it also incorporates the other features of the Penetrator such as Vulnerability Management, Security Assessment, Penetration Testing, Audit any OS, Distributed Audit, Launch Real Exploits, Launch Real DoS Attacks.
Brainzsquare, since its foundation in 2000 has been providing innovative data security solutions in Korea.In 2006, the launch of the SECUDRIVE product line came into the market with the intention to revolutionize the way personal information and confidential data were being secured in the fast-changing IT environment. SECUDRIVE provides products ranging from secure USB flash drives and data erasure products to copy protection software, device control, and file server security for corporate customers and content publishers. With partners from all over the world, our corporation is thriving in the IT security market.
Seculert is a comprehensive cloud-based solution for protecting organizations from APTs and other types of advanced malware. Only Seculert fully leverages the power of the cloud to keep up with the constantly-changing threat landscape and provide enterprises with a cost-effective solution for detecting, stopping and remediating advanced malware attacks throughout the organization. Seculert combines several key detection and protection technologies in one convenient, easy-to-manage cloud-based solution. Seculert uses botnet interception, an elastic sandbox, and automatic Big Data traffic log analysis to proactively identify new threats as they emerge. Advanced threats demand a new class of defenses. Precisely because they are persistent and ever-changing, it is essential to study their behavior over time – and not just at the moment of entry into the organization. Since they are networked, the only proactive defense is to intercept botnets and learn their secrets.
Secunia is the leading provider of IT security solutions that help businesses and private individuals globally manage and control vulnerability threats and risks across their networks and endpoints. This is enabled by Secunia's award-winning Vulnerability Intelligence, Vulnerability Assessment, and Patch Management solutions that ensure optimal and cost-effective protection of critical information assets. Secunia’s proven, complementary portfolio; renowned for its reliability, usability, and comprehensiveness, aids businesses in their handling of complex IT security risks and compliance requirements across industries and sectors – a key component in corporate risk management assessment, strategy, and implementation.
Secure Islands Technologies develops and markets advanced and innovative Information Protection and Control (IPC) solutions, incorporating intelligent and patent-pending data-centric security technology. Secure Islands delivers powerful classification-based IRM ( AD RMS) and encryption management, along with simple policy generation, application, and enforcement. Based on flexibly-defined parameters, solutions from Secure Islands classify in real-time sensitive data from any source users, applications, file repositories or directories. Then, leveraging existing AD RMS and encryption frameworks, Secure Islands intelligently generates, applies and enforces AD RMS policies enterprise-wide including Mobile. Solutions from Secure Islands protect sensitive data throughout its lifecycle from creation, through collaboration and including storage. This enables smooth assimilation of encryption and IRM practices into business processes - without complex, lengthy, and costly integration.
SecureAuth is a technology leader providing single secured access for mobile devices, cloud applications and networks that serves hundreds of customers and more than 10 million users worldwide. Its SecureAuth IdP products offer Global 5000 companies a uniquely extensible, enterprise-proven method of administering corporate identity governance on cloud-based applications, mobile devices, and networks. These all-in-one solutions provide IT departments with a simplified way of managing and enforcing access, authentication, approval and assertion based on existing user entitlements. SecureAuth IdP works anywhere and is completely scalable. Located in Irvine, Calif., SecureAuth was awarded the Stevie Award for “Fastest-Growing Company” in 2012 by The American Business Awards, won the People’s Choice Stevie Award for Favorite Security Solution, and was selected at “Favorite BYOD Security Solution” by UP-START.
Secure Ninja is a leader in Information Security Services and Training. Specializing in risk and compliance programs, information assurance, and IVV assessments. Secure Ninja's tiger team are world renown information assurance practitioners and award winning instructors who have contributed to national security policy and frequently speak at FISMA, NIST, DHS and industry related events. Secure Ninja's training and certification programs run the gamut from foundation level Security to Advanced Hacking and CISSP courses. In addition we provide Government DoD 8570.1 compliance training on-site at your location or in our publically scheduled classes. Secure Ninja services/consulting specialize in governance, risk and compliance programs for government agencies including information assurance, IVV security assessments, and cyber-security solutions. Secure Ninja has the knowledge and experience to keep your sensitive information safe.
Securonix is a security risk intelligence platform. It consumes identity, activity, and access information from your critical applications or existing security tools and identifies high-risk users, activity, and access for focused, proactive management. The Securonix Engine uses powerful correlation, behavior, and access risk analytics to continuously monitor your environment for threats and provide actionable security intelligence. Our family of products - Securonix IdentityMatcher, Securonix Behavior Profiler and Securonix Event Analyzer provides organizations with an innovative intelligent security engine that detects and prevents anomalous user activities and learns security response to perform automated security policy enforcement.
SEEBURGER is a global provider of business integration and secure managed file transfer (MFT) solutions that streamline business processes, reduce operational costs, facilitate governance and compliance, and provide visibility to the farthest edges of the supply chain to maximize ERP effectiveness and drive new efficiencies. All solutions are delivered on a unified, 100 percent SEEBURGER-engineered platform that lowers the total cost of ownership and reduces implementation time. With more than 25 years in the industry, SEEBURGER today is ranked among the top business integration providers by industry analysts, serves thousands of customers in more than 50 countries and 15 industries, and has offices in Europe, Asia Pacific and North America.
The ShapeShifter offers the first comprehensive defense against major web attacks. Existing security technologies try to detect attacks based on how they appeared or behaved in the past. This is not effective against adversaries who are constantly changing their code and behaviors to avoid detection. It also does nothing against previously unknown attacks.Instead of guessing about the nature of traffic, the ShapeShifter simply disables the capability of malware to interact with your website. This not only protects against the most serious known attacks but also against unknown attacks which use automation.
Shavlik, a global leader in simplifying the complexity of IT management, is dedicated to significantly reducing the time-to-value for IT professionals from months to minutes. Shavlik’s Protect, Patch for Microsoft System Center and Management Intelligence are some of its on-premise and cloud base solutions that enable customers to manage both physical and virtual machines, deploy software, discover assets, simplify configuration, control power usage and ensure endpoint security. By bringing the sophisticated capabilities enjoyed by large companies to organizations of all sizes and types, Shavlik is driving the democratization of IT.
SilverSky is the expert provider of cloud security solutions. SilverSky’s advanced Security-as-a-Service platform provides comprehensive network security and email security services, including advanced DLP, email archiving, and encryption. More than 6,000 organizations around the globe trust SilverSky to protect their most critical information and infrastructure.
SilverSky is the expert provider of cloud security solutions. We deliver the industry’s only advanced Security-as-a-Service platform from the cloud, dramatically simplifying how growth-minded companies secure their most important information. Our network security and Email security services free you up to pursue your business ambitions without security worry. We direct our innovation at delivering a worry-free service that lets our customers sleep easy. By simplifying how our customers secure their critical information, we free them up to spark new business possibilities. Every day we protect $525 billion in customer assets and analyze 425 million security events so our customers don’t have to. This is why we are the partner of choice for growth-minded leaders entrusted with high-value information. Our growing customer base includes 6,000 organizations around the globe in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors.
Silver Tail Systems provides 3rd generation fraud prevention to defend websites against business logic abuse. Business logic abuse is a rising concern as its extremely difficult to detect and stop, but these hijack threats, velocity attacks and gaming schemes are costing companies millions, if not billions in online fraud. Silver Tail Systems is the leading provider of predictive analytics for detection and prevention of fraud and abuse to some of the most prominent websites in the world. We offer the industry's most comprehensive suite of fraud detection and mitigation solutions. Serving some of the world's largest financial institutions and e-commerce companies, Silver Tail Systems a award-winning solutions are made possible by the unmatched expertise of our management and technology teams, who bring deep experience, know-how and personal commitment to protect their customers a businesses against online fraud.
We are convinced that global/broad consulting in all questions of IT security is only possible as a result of detailed competence. Our core expertise in the area of cryptography are fortified with own design and developments. The connection of innovative technologies emanated from latest research results with established standards and systems enables a fast and cost saving implementation of our security systems in existing communication infrastructures.
Securing your employees’ devices is the key to a successful BYOD adoption. At the intersection of app-level protection and network monitoring, Skycure’s device-level security is the only solution for your company’s mobility needs on both iOS and Android devices. Combined with Skycure’s hosted management services, you get a truly seamless mobile security solution for your end-users - as well as for your IT team.
Video Surveillance Built for IT. Smartvue surveillance solutions protect organizations worldwide, including Google, Facebook, US Border Control, and the Masters Golf Tournament. The company has been honored with the Best of Show and Innovations awards at CES, the Mobility Award, MacWorld Innovation, as well as highlighted on the Discovery Channel, Forbes, Fast Company, and Wired Magazine. Board members include David Dorman (Former CEO of ATT), Art Laffer (former economic advisor to President Reagan), and Mike Malone of G4S. Smartvue has more than thirty granted or published patents in the US, China, and Europe. Smartvue is a Delaware Corporation founded and headquartered in Nashville, Tennessee. The company was founded by Martin Renkis, formerly the founder and CEO of Inc. 500 Trainersoft Corporation, which was acquired by OutStart Corporation.
SnapComms is an internal communication software solution, producing results for a wide range of clientele across the globe. Based in Auckland, the company has grown organically to become a global player in the internal communications space and continues to grow every day with offices in the USA, the UK and Australia and a global reseller network. The solution provides a range of products to solve internal communication issues, such as a desktop ticker, desktop alerts, quiz and survey functions and a staff newsletter. These can be readily applied to any industry and the software is currently used for hospital communication, compliance communication, and internal branding to name a few. Get in contact with us today to find out more.
SnoopWall’s mission is to help people “reclaim your privacy” by delivering the world’s most advanced counterveillance technology in the marketplace, protecting consumer and business privacy on personal computing and mobile devices. We're starting with the world’s most advanced security and privacy app for Android! Reclaim your privacy and regain control of your Android device as SnoopWall automatically blocks eavesdropping by bad apps, malicious apps, infected apps, spyware, malware, viruses, trojans, rootkits, zero-day malware, advanced persistent threats, backdoors, hackers, cyber criminals and online predators. SnoopWall is compatible with your existing Antivirus and Firewall and catches what they miss. Without SnoopWall, you will not be able to block advanced attacks against your webcam, microphone and other high risk data leakage ports. You need SnoopWall - the port authority to protect your ports, manage your apps and reclaim your privacy.
The SOFTPRO Group is the worldwide leading vendor of systems for capture and verification of handwritten signatures. The company is based in Boeblingen, Germany with local subsidiaries in North America (Westlake Village, California and Bear, Delaware), the United Kingdom (London), Asia-Pacific (Singapore) and India (Chennai).The group currently employs an international staff of around 70 people, enabling more than 200 companies worldwide to streamline their document and transaction workflows. With its "eSign Workflow" product line, SOFTPRO provides solutions for securing the authenticity and integrity of documents within electronic processes, such as those required for legal contracts. For this purpose, a unique signature technology is used to extract and evaluate both the static and dynamic (biometric) characteristics of handwritten signatures.
Solana Networks is a leading, innovative technology company delivering intelligent network monitoring solutions for small to large enterprises. Solana Networks delivers SparrowIQ, a packet-based traffic analysis and network performance monitoring solution that provides network managers and MSPs with near real-time traffic visibility into network usage.
Solera Networks delivers Big Data Security Intelligence and Analytics solutions for Advanced Threat Protection. The Solera DeepSee platform is the security camera for the networkleveling the battlefield against advanced targeted attacks and zero-day threats, while giving security professionals clear and concise answers to the toughest post-breach security questions. Global 2000 enterprises, cloud service providers and government agencies rely on Solera DeepSee for real-time situational awareness, security incident response, cyber threat protection, data loss monitoring and analysis, organization policy compliance and continuous monitoring. With this solution, organizations can respond quickly and intelligently to advanced threats and attacks, while protecting critical information assets, minimizing exposure and loss, and reducing business liabilities.
Solutionary reduces the information security and compliance burden, delivering flexible managed security services that align with client goals, enhancing organizations’ existing security program, infrastructure and personnel. The company’s services are based on experienced security professionals, actionable threat intelligence and the ActiveGuard service platform that provide expert security and compliance management. Solutionary works as an extension of clients’ internal teams, providing industry-leading customer service, patented technology, thought leadership, years of innovation and proprietary certifications that exceed industry standards. This client focus and dedication to customer service has enabled Solutionary to boast one of the highest client retention rates in the industry.
Solutions Squad provides managed IT support to small and mid size businesses, specializing in proactive maintenance, network security and business continuity.
We help organizations keep data safe and block the growing number of complex threats. We protect everywhere and offer complete security with our full range of endpoint, encryption, email, web, network security and UTM products. And more than 100 million users trust us. We help customers protect their businesses and meet compliance needs. And all our customers benefit from the expertise of our threat analysts located around the world. Their research is at the heart of everything we do. They quickly find the latest threats and update protection for our customers automatically. Plus, our support engineers are experts on all our products, and they're available whenever you need them. Our products are easy to install and use so you spend less time managing security. With Sophos you can focus on the needs of your business because we're securing your entire organization.
Sourcefire, Inc. (Nasdaq:FIRE), a world leader in intelligent cybersecurity solutions, is transforming the way global mid- to large-size organizations and government agencies manage and minimize network security risks. With solutions from the network to the endpoint, Sourcefire provides customers with Agile Security that is as dynamic as the real world it protects and the attackers against which it defends. Trusted for more than 10 years, Sourcefire has been consistently recognized for its innovation and industry leadership with dozens of patents, world-class research, and award-winning technology. Today, the name Sourcefire has grown synonymous with innovation, security intelligence and agile end-to-end security infrastructure.
Spam Soap is a premier messaging service provider. Founded in 2002, Spam Soap pioneered the use of the MX record email filtering model. Today, the company has helped thousands of customers worldwide wash their hands of the ever increasing messaging hazards that threaten their bottom line every day.With award winning technology, and one-of-a-kind personalized customer service, Spam Soap offers a range of highly sophisticated, and integrated hosted messaging services for all your email needs. Whether it's preserving business continuity, protecting confidential information, or ensuring regulatory compliance, Spam Soap provides clean, simple, and easy solutions.
Spambrella is a premier messaging service provider. Founded in 2010, Spambrella has helped thousands of customers worldwide shelter themselves from the ever increasing messaging hazards that threaten their businesses every day. With award winning technology, and one-of-a-kind personalised customer service, Spambrella offers a range of highly sophisticated, and integrated hosted messaging services for all your email needs. Whether it's preserving business continuity, protecting confidential information, or ensuring regulatory compliance, Spambrella provides clean, simple and easy solutions. Spambrella SaaS Email Protection is a cloud-based email scanning solution that eliminates incoming and outgoing message threats such as spam, viruses, phishing scams, directory-harvest, and denial-of-service (DoS) attacks. SaaS Email Protection raises the level of your messaging security, and requires no additional on-premise hardware, software, or IT staff.
Our team knows Big Data, knows security, and we are awesome! The sqrrl team is composed of data scientists with deep expertise working with data at Internet scale. We are the primary creators of, committers, and contributors to Apache Accumulo. Accumulo, based on Google's BigTable design, features a few novel improvements in the form of cell-based access control and a server-side programming mechanism that can modify key/value pairs at various points in the data management process. It is the most secure and scalable Big Data store. sqrrl is based in Cambridge, MA and is backed by Chris Lynch from Atlas Venture and Antonio Rodriguez from Matrix Partners.
At StillSecure, we believe IT executives should be able to focus on driving the success of their company versus being distracted by security and compliance demands. For IT executives facing escalating security threats and evolving compliance requirements, and data centers looking to cement long-term customer relationships, StillSecure designs and delivers managed network security and certified compliance solutions so you can focus on growing your core business. As opposed to vendors with uncertified partial fixes, or worse, self-audited solutions, StillSecure unites our security experts with our certified processes and innovative technologies to provide holistic solutions that eliminate the need for dedicated resources juggling multiple vendors, products and requirements. Headquartered in Superior, Colorado, StillSecure protects some of the most sensitive and important computer networks in the world.
SurfEasy is dedicated to providing easy to use solutions to protect your online privacy, security and freedom. We believe that no matter what computer or network you are using, your online life should be personal and secure. SurfEasy is a unique USB key that you can carry with you anywhere and use on any computer. When you plug SurfEasy into a Mac or PC and enter your personal password, we automatically open your own personal, private and secure web browser. Unlike normal web browsers that store all your personal information (like history, passwords and bookmarks) on the computer, we store everything exclusively on your SurfEasy key. So when you are done browsing the Internet, simply remove SurfEasy and walk away with all your personal information safely with you and not on the computer for others to find. SurfEasy is Plug in Privacy.
Swan Island Networks, Inc. is a cloud services brokerage that enables companies, people and applications to share information in new ways. Our TIES® platform creates flexible, intelligent, high-trust computing environments, in order to give our customers more choice and control over how, and with whom, they exchange information--especially the kind of confidential information that is vital for business and security intelligence. Founded in 2002, Swan Island Networks is a private company led by experienced, successful entrepreneurs. The company was founded to address information sharing weaknesses surrounding national security breaches and extreme weather catastrophes. For the past few years, we have transitioned over to the enterprise market, bringing with us an array of government credentials and recognition. Today, Swan Island Networks is working closely with Fortune 500 and leading security-focused companies to bring innovative, real-world solutions to market.
Sword Achiever is a global leading solution used by Fortune 500 companies and organisations in highly regulated industries across the world to manage their Governance, Risk and Compliance software requirements. Sword Achiever solutions are recognised by leading analysts such as Gartner as being a Global Leader for Governance, Risk and Compliance software. Our solutions enable organisations to minimise the risk of product and plant failures, compliance fines and penalties, executive prison sentences and reduce the costs associated with insurance premiums, process administration, business and process issues, client complaints and many other areas.
SyferLock Technology Corporation is a privately held software company, based in Shelton, Connecticut.SyferLock is an innovative provider of next-generation identity and access management solutions. SyferLock's proprietary, patented authentication, security and single sign-on (SSO) solutions enable enterprises, governments and users to secure every access point, including computers, networks, online access and mobile devices, across a range of applications including proprietary networks, cloud computing and mobile. SyferLock's software-based solutions deliver enhanced single-factor, two-factor and multi-factor authentication through one-time passwords or PINs without the need for any additional hardware or tokens, providing a superior alternative to static passwords along with greatly reduced TCO. SyferLock's flexible methodology is highly scalable, extremely lightweight and allows for rapid mass deployment.
Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Symantec was founded in 1982 by visionary computer scientists. In that spirit, as technology changed so did Symantec. We are focused on providing security, storage and systems management solutions to help businesses and consumers secure and manage their information.
Symplified provides seamless single sign-on, identity and access management services to help businesses around the world safely and securely connect users to cloud, web and mobile applications. The company is headquartered in Boulder, Colorado and backed by Ignition Partners, Allegis Capital and Granite Ventures.
Tango/04 Computing Group is one of the leading developers of monitoring software of Technology, Security/Compliance and Business Service Management (BSM). The group operates throughout the world through its vast network of Business Partners and has more than 2,000 customers, including companies such as: 3M, Alcampo, Arcelor, Banco Itau, Bayer, BBVA, Boehringer Ingelheim, Bridgestone, Citigroup, Capgemini, Cassa di Compensazione e Garanzia (CCandG), Coca-Cola, Danone, DIA, Dolce and Gabbana, Dole Fresh Fruit, EDS, Euronet Worldwide, First Data, Fortis, GE Money, Gucci, Helvetia, Inditex, ING Nationale-Nederlanden, Liberty, L'Oreal, Luxottica, MAPFRE, Manpower, Miele, Nestle, Nike, Nissan, Pierre Fabre, Prada, Random House Mondadori, SEUR Geopost, Shell, Telmex, TNT, Tribunal Regional Do Trabalho, Yves Rocher and Zurich, among others.
Tarmin, Inc is a leading provider of Big Data optimized, cloud storage solutions for enterprise infrastructure, applications and unstructured data. Tarmin software empowers organizations across industries to better store, control and understand their fast growing, geographically dispersed unstructured data repositories. Tarmin GridBank provides a comprehensive solution that blends leading edge infrastructure technologies with familiar enterprise applications to achieve lower costs and improve the total management of vital business data and information. GridBank scales to become a complete, multi-site capable, Big Data ready, high availability, policy-managed, object-based, hybrid private/public Cloud Storage offering capable of supporting Petabytes of data and tens of thousands of users in a single installation.
Teknas is an IT Professional Services company committed to delivering efficient and high quality solutions. We offer a comprehensive suite of cloud solutions- Email Encryption, Email Archiving, Anti-Spam and Web filtering. The principals at Teknas have over 25 years of combined IT experience working with Fortune 1000 companies. Our services are delivered through proven methodologies that focus on customer needs to optimize business processes and maximize return on investment through enabling technologies. Our vision is to partner with our customers from project conceptualization, through implementation and solution deployment while providing the highest level of service.
Telekenex is a business-grade IP service provider with a robust private international IP network and innovative solutions, including: SIP Trunking, Managed Ethernet, Private MPLS Internet, Managed Data Center, and a full suite of IP Telephony solutions. Telekenex has been serving enterprise customers with carrier-grade voice and data solutions for over 16 years. Our root in voice services and our commitment in data services gives us the unique experience and expertise to deliver quality communications solutions.
Every second, of every day, TeleSign protects the world's largest Internet, mobile app, and cloud properties by establishing and verifying Mobile Identity. TeleSign's Mobile Identity platform gives digital businesses the ability to connect a unique identity with every account to verify new registrations and authenticate existing users. TeleSign created Mobile Identity to help businesses preserve their ecosystem by detecting a suspicious user before account creation, and to better protect their existing user base from account compromise. TeleSign is trusted by the world's largest companies and protects 2.5 billion accounts in more than 200 countries and in 87 languages.
Today, modern enterprises face a plethora of technical, political, and business hurdles which make accurate security and compliance monitoring difficult and costly. Tenable has pioneered and continues to innovate a unique Unified Security Monitoring approach that is revolutionizing the way enterprises are monitoring (i.e. gathering, evaluating, communicating, and reporting) security and compliance information. Tenable Network Security is the pioneer and leader of Unified Security Monitoring. Tenable's award-winning products are agentless solutions and architected for the continuous monitoring of vulnerabilities, configurations, data leakage, log analysis and compromise detection and are used by thousands of organizations both large and small around the world.
Thales e-Security is a leading global provider of data encryption and cyber security solutions to the financial services, high technology manufacturing, government and technology sectors. With a 40-year track record of protecting corporate and government information, Thales solutions are used by four of the five largest energy and aerospace companies, 22 NATO countries, and they secure more than 70 percent of worldwide payment transactions. Thales e-Security has offices in Australia, France, Hong Kong, Norway, United Kingdom and States.
Today, The Academy's mission is to provide students with first-class education, actual hands-on experience, and a unique, personalized student experience. Our goal is to ensure that each student obtains the proper tools needed to begin a career in the Information Technology field. We offer certification classes and courses in the following disciplines: Microsoft Certified System Engineer (MCSE) Microsoft MCTS/MCITP (MCTS/MCITP) Microsoft Office User Specialist (MOS) Microsoft Virtualization (Hyper V) Microsoft SharePoint Microsoft Exchange Microsoft SQL Microsoft Forefront Security Technical Boot Camp CompTIA A , Network , Security (A ) Cisco Certified Network Associates Training (CCNA) Cisco Certified Design Associate (CCDA) Cisco Certified Network Professional Training (CCNP) Citrix Presentation Server Certified Ethical Hacker (CEH) Certified Hacking Computer Forensics (CHFI) ISC2 CISSP Certification VMWARE VCP Certification (VCP) Linux
Cloud computing is a way of delivering IT services to users without the need to buy, install or manage any infrastructure. Get your desktops, applications and services over the internet from wherever you are. Get flexible, pay-as-you go IT that suits your business. We provide turnkey infrastructure and a control panel platform that allows IT solution providers, Value Added Resellers and System integrators to become cloud service providers. Create, bill and manage IT services from the cloud in real-time by partnering with ThinkGrid. We support businesses by enabling them to uncover the realities of Cloud Computing, the potential risks and mitigating them as well as the benefits. SMEs can find out how our partners can help deliver, migrate and integrate all manner of cloud based IT services. ThinkGrid operates tier 3 and 4 data centres across the world to house our platform, which delivers real IT services such as Hosted Virtual Desktop, Virtual Server, Voice to our partners.
ThreatMetrix builds trust on the Internet by offering market-leading advanced fraud prevention and frictionless context-based security solutions. These solutions authenticate consumer and workforce access to mission critical applications using real-time identity and access analytics that leverage the world’s largest trusted identity network. ThreatMetrix secures enterprise applications against account takeover, payment fraud, fraudulent account registrations, malware, and data breaches. Underpinning the solution is the ThreatMetrix™ Global Trust Intelligence Network, which analyzes over 500 million monthly transactions and protects more than 160 million active user accounts across 2,500 customers and 10,000 websites. The ThreatMetrix solution is deployed across a variety of industries, including financial services, enterprise, e-commerce, payments, social networks, government and insurance.
ThreatTrack Security specializes in helping organizations identify and stop Advanced Persistent Threats (APTs), targeted attacks and other sophisticated malware designed to evade the traditional cyber-defenses deployed by enterprises and government agencies around the world. The company develops advanced cybersecurity solutions that Expose, Analyze and Eliminate the latest malicious threats, including its ThreatSecure advanced threat detection and remediation platform, ThreatAnalyzer malware behavioral analysis sandbox, ThreatIQ real-time threat intelligence service, and VIPRE business antivirus endpoint protection.
Thycotic Software, Ltd., a Washington DC-based company, is committed to providing password and AD group management solutions to IT administrators worldwide. With over 30,000 IT professionals using our IAM tools, Thycotic helps securely manage all credentials critical to an organization's operations. Thycotic focuses on an in-house software development philosophy as opposed to the typical practice of outsourcing. Our products are written by engineers using a battle-tested Agile software development cycle. Integrating pair programming with fast-release cycles enables us to adapt to the needs of our customers in less time. Following strict Quality Assurance procedures and leveraging tight integration between departments (Sales, Research and Development, and Technical Support), we can quickly respond to the ever-changing IT landscape.
Tier 3 is a complete cloud management platform for mid-tier to large enterprises, as well as SaaS providers. Deploy in one of 8 data centers in the US, Canada, the UK and mainland Europe. SSAE 16 SOC1 Type 2 certified.The company offers: * Infrastructure as a Service. Virtual private cloud compute, storage, and network products. Scalable, elastic, pay as you go. Supports Windows and Linux. * Cloud Management. Manage more servers in less time. Advanced cloud management made easy. Included support for complex hierarchies, account management, billing, and comprehensive APIs. * Platform as a Service. Accelerate enterprise development with Web Fabric. Built on Cloud Foundry
TITUS solutions enable organizations to classify, protect and confidently share their information. With over 2 million users worldwide, our solutions enable enterprises, military and government organizations to classify information and meet regulatory compliance by securing unstructured information. Products include TITUS Classification, the leading message, document and file classification and labeling solutions that enhance data loss prevention by involving end users in identifying sensitive information; and the TITUS family of classification and security solutions for Microsoft SharePoint.
Toshiba, a world leader in high technology, is a diversified manufacturer and marketer of advanced electronic and electrical products, spanning information and communications equipment and systems, Internet-based solutions and services, electronic components and materials, power systems, industrial and social infrastructure systems, and household appliances. Under its mid term business plan, Toshiba is working for enhanced recognition as a highly profitable group of companies, active in both high growth and stable growth businesses.
Total Defense is a global leader in threat detection and prevention and a leading anti-malware solutions provider. With a track record of more than 15 years of success, the Company is ranked as one of the top ten providers of endpoint security solutions. The company's solutions include anti-malware, anti-virus, intrusion prevention and mobile security. With more than 4 million consumers, 60,000 businesses and 20,000 partners, Total Defense helps organizations of all sizes and consumers protect their most critical assets. The company's mission is to go beyond protection by developing industry leading technology delivered with services that ensure our customers are fully protected and proactively supported. Total Defense is also committed to keeping our customers and their families safe and protected on all their devices from the growing threats and criminal activity now occurring online. The Company is a former division of CA Technologies.
TraceSecurity, a leading pioneer in cloud-based security solutions, provides IT governance, risk and compliance (GRC) management solutions. The company’s cloud-based services help organizations achieve maintain and demonstrate security compliance while significantly improving their security posture. With more than 1,400 customers, TraceSecurity supports the security and risk management efforts of organizations in financial services, healthcare, insurance, government and other regulated sectors. The Company's newest product, TraceCSO allows organizations to have visibility into and accountability for their risk and compliance profile. Unique to the market and requiring no third-party software, TraceCSO is a comprehensive, cloud-based solution that fully integrates and seamlessly guides users through the process of evaluating, creating, implementing, and managing a complete risk-based information security program.
As the global leader in cloud security, Trend Micro (TYO: 4704) develops innovative security solutions that make the world safe for businesses and consumers to exchange digital information. As the largest independent security vendor, with 23 plus years of dedicated security expertise, we're recognized as the market leader in server and virtualization security and for delivering top-ranked endpoint, network, and cloud-based solutions. Trend Micro's technology is proven to stop threats faster, provide increased performance, and give the visibility and control required to confidently share and protect data in physical, virtual, cloud and mobile environments. No matter what the security need, or how it may evolve over time, Trend Micro is the smart security choice as people journey to the cloud.
Tresys provides innovative solutions to hard problems in cross domain, deep content inspection, file sanitization, SELinux, mobile devices and OSs, and assured information sharing. Known for years as THE SELinux security experts, Tresys is also the go-to resource for innovative solutions in these areas. Our knowledge of secure design, certification and accreditation, software development on secure OSs, COTS, and custom hardware, sets us apart and enables unique insight into today's complex solutions. Tresys views information assurance as a key mission-enabler, from core-to-edge, and is building game-changing technologies that help customers increase security while lowering TCO. Tresys innovates and applies advanced technologies to quickly solve the needs of customers requiring agile responsiveness to security requirements. By leveraging secure open source software, our products and services support the most sensitive security missions around the world.
If all computer networks were alike, triCerat wouldn't exist to solve the mundane computer tasks that are necessary to keep today's application delivery environments running. Maybe it's the time consuming user profile problems or server instability issues that plague your system administrators or the run-of-the-mill printing or scanning problems in your office that bring user productivity to a halt. What if you could simplify user desktop management for administrators and ensure the time your employees spend at their computer remains constructive? These are the reasons triCerat exists. At triCerat we Keep IT Simple. By listening to our clients, we understand the need for easy-to-use products that not only prevent common yet debilitating system limitations but improve the end user's work experience.
Tripwire is a leading global provider of risk-based security and compliance management solutions, enabling enterprises, government agencies and service providers to effectively connect security to their business. Tripwire provides the broadest set of foundational security controls including security configuration management, vulnerability management, file integrity monitoring, log and event management delivering unprecedented visibility, business context and security business intelligence to protect sensitive data in their extended enterprises from breaches, vulnerabilities, and threats.
Trusteer is the leading provider of endpoint cybercrime prevention solutions that protect organizations against financial fraud and data breach. Hundreds of organizations and millions of end users rely on Trusteer to protect their computers and mobile devices from online threats that are invisible to legacy security solutions. Trusteer's Cybercrime Prevention Architecture combines multi-layer security software and real-time threat intelligence to achieve sustainable protection against malware and phishing attacks on web applications and achieve regulatory compliance. Leading organizations such as HSBC, Santander, The Royal Bank of Scotland, SunTrust and Fifth Third are among Trusteer's clients.
Trustwave is a leading provider of compliance, Web, application, network and data security solutions delivered through the cloud, managed security services, software and appliances. For organizations faced with today's challenging data security and compliance environment, Trustwave provides a unique approach with comprehensive solutions that include its TrustKeeper portal and other proprietary security solutions. Trustwave has helped hundreds of thousands of organizations--ranging from Fortune 500 businesses and large financial institutions to small and medium-sized retailers--manage compliance and secure their network infrastructures, data communications and critical information assets. Trustwave is headquartered in Chicago with offices worldwide.