 |
Acalvio advanced threat defense (ATD) solutions are anchored on deception and data science to help businesses to detect, engage and respond to malicious activity inside the perimeter. |
 |
Accelerite helps companies accelerate cloud adoption, modern security, industry process platforms and leverage of the data-driven economy of today. |
 |
Accellion solution prevents data breaches and compliance violations with complete visibility and control over IP, PII, PHI and all sensitive information exchanged with third parties. |
 |
Acunetix is an automated web application security testing tool that audits your web applications by checking for vulnerabilities like SQL Injection, Cross-site scripting and other exploitable vulnerabilities. |
 |
Arista Networks delivers software-defined networking solutions for large data centers, cloud computing, high-performance computing and high-frequency trading environments. |
 |
Acronis develops on-premises and cloud software for backup, disaster recovery, and secure file sync and share and data access. |
 |
ARCON privileged access management (PAM) solution empowers internal stakeholders to monitor, control and manage privileged accounts and help with audit & compliance. |
 |
Array Networks is a leader in application delivery networking with over 5000 worldwide customer deployments addressing secure delivery of applications to end-users. |
 |
Centrify redefines the legacy approach to privileged access management by delivering cloud-ready zero trust privilege to secure modern enterprises. |
 |
Clavister is a leading provider of network security solutions such as next-generation firewalls, identity, and access management systems designed for virtual and physical environments. |
 |
Clearswift technology supports a straightforward and ‘adaptive’ data loss prevention solution which protects organizations’ critical information by giving them the freedom to securely collaborate. |
 |
conpal is a manufacturer and provider of solutions in the field of IT security with a focus on encryption, endpoint security, authentication and secure identities. |
 |
CoSoSys data loss prevention solution enables security stakeholders to prevent data loss and manage mobile devices by providing easy to use cross-platform. |
 |
Cryptshare is a trustful e-communication solution that enables companies to share emails and files of any size in a secure way with a detailed audit trail. |
 |
Cyber Security Academy (CSA) offers an e-learning platform designed for employees. The platforms help to develop still related to cybersecurity defense necessary in the corporate environment. |
 |
DataLocker provides military-grade security for portable storage devices, media systems, and cloud storage accounts that are used by governments, military, and businesses around the world. |
 |
HID DigitalPersona protect cloud, mobile, web and on-premise applications with advanced authentication (smartcards, biometrics, etc.) |
 |
Devo offers an alternative to SIEM solutions – an advanced analytics platform that combines streaming and historical data in real-time for accurate security incident management. |
 |
Ekran System is a comprehensive user activity monitoring solution designed to track and evaluate internal threats related to user behavior within an organization’s network. |
 |
FAMOC delivers everything IT needs to control every aspect of enterprise mobility by enabling real-time centralized control of smartphones and tablets. |
 |
FOX IT helps to prevent, solve and mitigate cyber threats with the data diode solution designed for government, defense, law enforcement, and other companies with critical infrastructure. |
 |
F-Secure provides award-winning detection and response solutions as well as offers world-class cybersecurity services to keep businesses and people safe. |
 |
Genians network access control (NAC) solution provides enterprises with full visibility of all IP-enabled devices and ensures that they conform to security compliance. |
 |
HyTrust’s workload security solutions reduce cloud security risks by automating compliance & enforcing security-based policies for private & public clouds. |
 |
Iboss game-changing secure web gateway with innovative architecture is backed by over 75 patents and patents pending, and chosen by over 4000 enterprises worldwide. |
 |
idaptive provides a “secure access everywhere” approach that uniquely combines leading capabilities to seamlessly integrate SSO, MFA, EMM and UBA. |
 |
Kingston solutions meet the challenge of protecting today’s mobile workforce, featuring secure USB solutions for data transport and mobile work-spaces. |
 |
Keeper Security password management application prevents data breaches and helps to meet compliance standards as it designed with 256-bit AES encryption and zero-knowledge architecture. |
 |
iStorage is a global leader of PIN authenticated, hardware encrypted data storage devices (USB Flash Drives and Hard Disk Drives) that ensure compliance with regulations. |
 |
OneLogin connects people with technology through a simple and secure login with a unified access management (UAM) platform that seemingly unlocks apps, devices. |
 |
PointSharp provides multi-factor authentication that helps you build a modern user experience in a highly regulated enterprise environment. The company’s headquarters in Stockholm, Sweden. |
 |
Rohde & Schwarz protects companies and public institutions worldwide against espionage and cyber-attacks with solutions designed for network, application, endpoint security and traffic analytics. |
 |
Safexs is a hardware-encrypted USB flash drive protected by a password. It is a convenient way to execute fast data transfers and reduce the risks of sensitive data loss. |
|
Scale Computing is a leader in edge computing, virtualization, and hyper-converged solutions which eliminates the need for traditional virtualization and disaster recovery software, servers and shared storage. |
 |
Senhasegura provides one of the world’s leading PAM solutions which takes traditional complexity away from deploying PAM. Recognized by Forrester and listed on Gartner’s Market Guide. |
 |
Sophos secures every endpoint of the organization network, starting with laptops to virtual desktops and servers and finishing with the web and email traffic as well as mobile devices. |
 |
SPYRUS delivers encryption/authentication solutions from USB drives to the windows to go solutions that offer the strongest protection for data in motion, data at rest and data at work. |
 |
Tripwire enables 9,000 organizations enterprises and governments around the world to detect, prevent and respond to cybersecurity threats as well as meet compliance. |
 |
Untangle core products represents NG and IC Control firewalls which are specifically tailored for companies below enterprise-level – home offices, non-profit, schools, government and other small companies. |
 |
Veriato develops an intelligent and powerful solution to provide companies with visibility and understanding of human behaviors as well as activities occurring within their firewall. |
 |
Yubico ensures reliable identity and access control through a physical security key used for two-factor authentication (2FA). It also enables companies to exploit passwordless authentication. |