Partnering with the Best
We combine high value services with industry-leading products
Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology.
Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point’s award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.
CensorNet, the complete cloud security company, helps organizations effectively manage and control the use of cloud applications in their business. The company provides a unified and multi-layered approach to securing the cloud via its purpose built, multi-functional cloud security platform that delivers integrated web security, email security, CASB and adaptive multi-factor authentication. This provides organizations with security-focused visibility and control over user access, data and assets to allow access while controlling outcomes and allows organizations to address the security, audit, compliance and productivity issues associated with the use of cloud applications and devices. CensorNet enables organizations to control Shadow IT, safely implement BYOD initiatives and protect from cyber threats. With more than 4000 customers and over 1.3 million users worldwide, the company is headquartered in Basingstoke, UK and has further offices in Austin and San Francisco, US; Copenhagen, Denmark and Munich, Germany.
Citrix is a leader in virtualization, networking and cloud infrastructure to enable new ways for people to work better. Citrix solutions help IT and service providers to build, manage and secure virtual and mobile workspaces that seamlessly deliver apps, desktops, data and services to anyone, on any device, over any network or cloud.
As the leading provider of predictive security intelligence solutions, CORE Security answers the call of organizations demanding a proactive approach to eliminating business risk. Our solutions empower customers to think ahead, take control of their security infrastructure, and predict and prevent IT security threats.
Cyphort provides an optimized solution for threat management that utilizes sandboxing to detect malicious payloads within your network. Their multi-method malware detection engine is always evolving. They can detect advanced attacks, encrypted and obfuscated malware, and the myriad of other methods used by attackers to evade traditional defenses. They leverage a cloud-enhanced distributed architecture that provides a cost-effective mechanism to deploy and manage your network’s security across geographies
FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors, including Web, email, and files and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time.
Founded in 1997, Guidance Software is recognized globally as the world leader in e-discovery and other digital investigations.OurEnCase® software solutions provide the foundation for corporate government and law enforcement organizations to conduct thorough and effective computer investigations of any kind, including intellectual property theft, incident response, compliance auditing and responding to e-discovery requests-all while maintaining the forensic integrity of the data.We also offer customized services in e-discovery, incident response, computer forensics, evidence presentation and trial testimony, using a team of former law enforcement professionals, e-discovery and litigation support experts, information assurance specialists and project managers who have front-line, hands-on experience in all areas of digital investigations.
KnowBe4 is the world’s most popular platform for new-school Security Awareness Training and Simulated Phishing. KnowBe4 transforms how organizations manage the weak link in IT security: users. KnowBe4 has the world’s largest library of security awareness training content; including interactive modules, videos, games, posters and newsletters. KnowBe4 provides best-in-class, fully automated simulated phishing attacks, hundreds of templates with unlimited usage, and community phishing templates.
Palerra, Inc. designed LORIC™ to protect an enterprise’s entire cloud footprint from branded applications such as Microsoft Office 365 to infrastructure such as AWS, and everything in between. It combines security configuration management, threat detection, predictive analytics, and automated incident response into a single platform, delivering comprehensive visibility and ensuring continuous compliance. It does so without any hardware or software, and unlike cloud access control solutions, is not inline to critical online activities.
PhishMe is the leading provider of threat management for organizations concerned about human susceptibility to advanced targeted attacks. PhishMe’s intelligence-driven solutions empower employees to be an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. Their open approach ensures that PhishMe integrates easily into the security technology stack, delivering measurable results to help inform and adapt an organization’s security programs.
Pwnie Express addresses the attack surface exposed by BYOD, IoT and connected devices in the enterprise. By continuously discovering, monitoring and assessing all devices on and around a company’s network, Pwnie Express provides security professionals the ability to detect, assess and respond to device based threats, including misconfigured, unauthorized, and malicious devices.
Sumo Logic enables enterprises to build analytical power that transforms daily operations into intelligent business decisions. Unlike traditional, cumbersome and reactive solutions, Sumo Logic offers customers an effortless service with unparalleled scalability, best economics and industry-leading proactive intelligence. Seamless cloud-to-cloud integrations simplify setup and deliver business and operational insights within minutes.
The service is secure by design and employs best-in-class measures to protect customer data such as encryption at rest and in transit and holds various attestations including SOC 2 Type 2, HIPAA, PCI, FIPS-140 and U.S. – E.U. Safe Harbor framework.
Varonis is the leading provider of software solutions for unstructured, human-generated enterprise data. Varonis provides an innovative software platform that allows enterprises to map, analyze, manage and migrate their unstructured data. Varonis specializes in human-generated data, a type of unstructured data that includes an enterprise’s spreadsheets, word processing documents, presentations, audio files, video files, emails, text messages and any other data created by employees. This data often contains an enterprise’s financial information, product plans, strategic initiatives, intellectual property and numerous other forms of vital information. IT and business personnel deploy Varonis software for a variety of use cases, including data governance, data security, archiving, file synchronization, enhanced mobile data accessibility and information collaboration. As of June 30, 2014, Varonis had approximately 2,750 customers, spanning leading firms in the financial services, public, healthcare, industrial, energy & utilities, technology, consumer and retail, education and media & entertainment sectors.