Palo Alto Networks offers real innovation in the firewall by enabling unprecedented visibility and control of applications and content – by user, not just IP address – with no performance degradation. Based on patent-pending App-ID™ technology, Palo Alto Networks next generation firewalls accurately identify applications – regardless of port, protocol, evasive tactic or SSL encryption.
Palo Alto Networks
Trusted by 100 million users and endorsed by industry analysts as a leader, Sophos provides a full range of endpoint, encryption, email, web and NAC solutions that are simple to deploy, manage and use. SophosLabs, Sophos global network of highly skilled and thoroughly trained analysts, has more than 20 years of experience protecting businesses from known and emerging threats.
Aerohive Networks reduces the cost and complexity of today's networks with cloud-enabled, distributed Wi-Fi and routing solutions for enterprises and medium sized companies. Aerohive’s award-winning cooperative control Wi-Fi architecture, public or private cloud-enabled network management, routing and VPN solutions eliminate costly controllers and single points of failure.
As the original inventors of tokenless authentication, SecurEnvoy's goal is to continue to design innovative solutions that take advantage of the users mobile phones or other personal devices as the “something you own” part of two factor authentication and resolve issues that have prevented their adoption such as SMS delays, no phone signal or soft token synchronisation problems.
Check Point Software Technologies Ltd., the largest pure-play security vendor globally, provides industry-leading solutions, and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises’ networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology.
Druva is a pioneer in secure, non-intrusive endpoint protection and availability solutions for the enterprise. As the volume of corporate data grows exponentially—doubling every 18 months—protecting that data has never been more important or difficult. Druva provides automated laptop backup solutions that protect enterprise users’ data.
IBM QRadar Security Intelligence Platform applies real-time correlation and anomaly detection across a distributed and scalable repository of security information. Big data analytics enable more accurate security monitoring and better visibility, yet are packaged to be used by almost any organization small or large. With flexibility and pre-packaged capabilities, IBM solutions help you achieve value faster and evolve your deployment as business changes.
IBM Q1 Labs
Shavlik, a global leader in simplifying the complexity of IT management, is dedicated to significantly reducing the time-to-value for IT professionals from months to minutes. Shavlik’s Protect, Configure, SCUPdates and Management Intelligence are some of its on-premise and cloud base solutions that enable customers to manage both physical and virtual machines, deploy software, discover assets, simplify configuration, control power usage and ensure endpoint security. By bringing the sophisticated capabilities enjoyed by large companies to organizations of all sizes and types, Shavlik is driving the democratization of IT.
Citrix is the cloud company that enables mobile workstyles—empowering people to work and collaborate from anywhere, securely accessing apps and data on any of the latest devices, as easily as they would in their own office. Citrix solutions help IT and service providers build clouds, leveraging virtualization and networking technologies to deliver high-performance, elastic and cost-effective cloud services.
Centrify is the leader in securing and auditing access to cross-platform systems and applications through Active Directory. From the data center and into the cloud, Centrify's identity consolidation and privilege management solutions are used by over 2500 organizations to reduce IT expenses, strengthen security and meet compliance requirements. Built on a common architecture, the Centrify Suite delivers secure authentication, role-based access control, privileged identity management, user-level auditing, server isolation and encryption of data-in-motion for the industry's broadest set of systems, hypervisors and applications.
Securing the web applications of today’s businesses is perhaps the most overlooked aspect of securing the enterprise. Web application hacking is on the rise with as many as 75% of cyber attacks done at web application level or via the web. The Acunetix development team consists of highly experienced security developers, all with extensive development experience in network security scanning software prior to working on Acunetix WVS. The management team is backed by years of experience in marketing and selling security software.
Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection. Commitment to clients and research has earned Positive Technologies a reputation as one of the foremost authorities on Industrial Control System, Banking, Telecom, Web Application, and ERP security, supported by recognition from the analyst community.
ILANTUS Technologies specializes in the Identity, Governance and Access domain with a unique focus in implementation and Managed Services. Our One-Stop Shop approach helps organizations like yours, reduce operational costs and direct the focus to the business at hand. Gartner calls iLantus a “Next Generation System Integrator” for Identity Management. ILANTUS has been repeatedly positioned in Gartner’s Identity and Access Management as a Service (IDaaS) Magic Quadrant and featured in the top five in Gartner’s Report, Critical Capabilities for Identity and Access Management as a Service, Worldwide.