Acalvio Acalvio advanced threat defense (ATD) solutions are anchored on deception and data science to help businesses to detect, engage and respond to malicious activity inside the perimeter.
accelerite-logo Accelerite helps companies accelerate cloud adoption, modern security, industry process platforms, and leverage the data-driven economy of today.
Accellion-new-logo Kiteworks solution prevents data breaches and compliance violations with complete visibility and control over IP, PII, PHI and all sensitive information exchanged with third parties.
Acunetix is an automated web application security testing tool that audits your web applications by checking for vulnerabilities like SQL Injection, Cross-site scripting, and other exploitable vulnerabilities.
Arista Arista Networks delivers software-defined networking solutions for large data centers, cloud computing, high-performance computing, and high-frequency trading environments.
acronis Acronis develops on-premises and cloud software for backup, disaster recovery, and secure file sync and share and data access.
arcon Arcon privileged access management (PAM) solution empowers internal stakeholders to monitor, control, and manage privileged accounts and help with audit & compliance.
ARRAY-200 Array Networks is a leader in application delivery networking with over 5000 worldwide customer deployments addressing secure delivery of applications to end-users.
centrify-200 Centrify redefines the legacy approach to privileged access management by delivering cloud-ready zero trust privilege to secure modern enterprises.
clavister Clavister is a leading provider of network security solutions such as next-generation firewalls, identity, and access management systems designed for virtual and physical environments.
clearswift-200 Clearswift technology supports a straightforward and ‘adaptive’ data loss prevention solution that protects organizations’ critical information by giving them the freedom to securely collaborate.
Conpal Conpal is a manufacturer and provider of solutions in the field of IT security with a focus on encryption, endpoint security, authentication, and secure identities.
CoSoSys data loss prevention solution enables security stakeholders to prevent data loss and manage mobile devices by providing easy-to-use cross-platform.
Cryptshare-200 Cryptshare is a trustful e-communication solution that enables companies to share emails and files of any size in a secure way with a detailed audit trail.
CyberSecurityAcademy_logo Cyber Security Academy (CSA) offers an e-learning platform designed for employees. The platforms help to develop still related to cybersecurity defense necessary in the corporate environment.
logo_datalocker-300x100 DataLocker provides military-grade security for portable storage devices, media systems, and cloud storage accounts that are used by governments, military, and businesses around the world.
HID-Digital-Persona-logo HID DigitalPersona protect cloud, mobile, web, and on-premise applications with advanced authentication (smart cards, biometrics, etc.)
HelpSystems-logo HelpSystems provides a wide range of data protection solutions including data classification (Boldon James and Titus), secure automatic and manual file transfer (Go Anywhere), digital rights management (Vera), as well as secure email gateway (Clearswift) technologies.
ekransystem-200 Ekran System is a comprehensive user activity monitoring solution designed to track and evaluate internal threats related to user behavior within an organization’s network.
famoc-new-logo FAMOC delivers everything IT needs to control every aspect of enterprise mobility by enabling real-time centralized control of smartphones and tablets.
fox_it_logo FOX IT helps to prevent, solve and mitigate cyber threats with the data diode solution designed for government, defense, law enforcement, and other companies with critical infrastructure.
F-Secure-200 F-Secure provides award-winning detection and response solutions, as well as offers world-class cybersecurity services to keep businesses and people safe.
v Genians network access control (NAC) solution provides enterprises with full visibility of all IP-enabled devices and ensures that they conform to security compliance.
Entrust-logo Entrust’s (formed HyTrust) workload security solutions reduce cloud security risks by automating compliance & enforcing security-based policies for private & public clouds.
iboss-cyber-security-logo Iboss game-changing secure web gateway with innovative architecture is backed by over 75 patents and patents pending, and chosen by over 4000 enterprises worldwide.
Keeeper-Security-20-valdomos-kibernetinio-saugumo-paslaugos Keeper Security password management application prevents data breaches and helps to meet compliance standards as it is designed with 256-bit AES encryption and zero-knowledge architecture.
ISTORAGE-200 iStorage is a global leader of PIN authenticated, hardware encrypted data storage devices (USB Flash Drives and Hard Disk Drives) that ensure compliance with regulations.
onelogin-200 OneLogin connects people with technology through a simple and secure login with a unified access management (UAM) platform that seemingly unlocks apps, devices.
PointSharp PointSharp provides a multi-factor authentication that helps you build a modern user experience in a highly regulated enterprise environment.
Rohdea-and-Schwarz Rohde & Schwarz protects companies and public institutions worldwide against espionage and cyber-attacks with solutions designed for network, application, endpoint security, and traffic analytics.
Scale-computing Scale Computing is a leader in edge computing, virtualization, and hyper-converged solutions which eliminates the need for traditional virtualization and disaster recovery software, servers, and shared storage.
senhasegura Senhasegura provides one of the world’s leading PAM solutions which takes traditional complexity away from deploying PAM. Recognized by Forrester and listed on Gartner’s Market Guide.
sophos-200 Sophos secures every endpoint of the organization network, starting with laptops to virtual desktops and servers and finishing with the web and email traffic as well as mobile devices.
tripwire-200 Tripwire enables 9,000 organizations enterprises and governments around the world to detect, prevent and respond to cybersecurity threats as well as meet compliance.
Untangle core products represents NG and IC Control firewalls which are specifically tailored for companies below enterprise-level – home offices, non-profit, schools, government and other small companies.
veriato-logo Veriato develops an intelligent and powerful solution to provide companies with visibility and understanding of human behaviors as well as activities occurring within their firewall.
Yubico-cate Yubico ensures reliable identity and access control through a physical security key used for two-factor authentication (2FA). It also enables companies to exploit passwordless authentication.