Newsletter
CYBERSECURITY & INNOVATIVE INFRASTRUCTURE Value added distribution
Vendors
Acalvio Acalvio advanced threat defense (ATD) solutions are anchored on deception and data science to help businesses to detect, engage and respond to malicious activity inside the perimeter.
accelerite-logo Accelerite helps companies accelerate cloud adoption, modern security, industry process platforms and leverage of the data-driven economy of today.
Accellion-200 Accellion solution prevents data breaches and compliance violations with complete visibility and control over IP, PII, PHI and all sensitive information exchanged with third parties.
Acunetix is an automated web application security testing tool that audits your web applications by checking for vulnerabilities like SQL Injection, Cross-site scripting and other exploitable vulnerabilities.
Arista Arista Networks delivers software-defined networking solutions for large data centers, cloud computing, high-performance computing and high-frequency trading environments.
acronis Acronis develops on-premises and cloud software for backup, disaster recovery, and secure file sync and share and data access.
ARCON privileged access management (PAM) solution empowers internal stakeholders to monitor, control and manage privileged accounts and help with audit & compliance.
ARRAY-200 Array Networks is a leader in application delivery networking with over 5000 worldwide customer deployments addressing secure delivery of applications to end-users.
centrify-200 Centrify redefines the legacy approach to privileged access management by delivering cloud-ready zero trust privilege to secure modern enterprises.
clavister Clavister is a leading provider of network security solutions such as next-generation firewalls, identity, and access management systems designed for virtual and physical environments.
clearswift-200 Clearswift technology supports a straightforward and ‘adaptive’ data loss prevention solution which protects organizations’ critical information by giving them the freedom to securely collaborate.
Conpal conpal is a manufacturer and provider of solutions in the field of IT security with a focus on encryption, endpoint security, authentication and secure identities.
CoSoSys data loss prevention solution enables security stakeholders to prevent data loss and manage mobile devices by providing easy to use cross-platform.
Cryptshare-200 Cryptshare is a trustful e-communication solution that enables companies to share emails and files of any size in a secure way with a detailed audit trail.
CyberSecurityAcademy_logo Cyber Security Academy (CSA) offers an e-learning platform designed for employees. The platforms help to develop still related to cybersecurity defense necessary in the corporate environment.
logo_datalocker-300x100 DataLocker provides military-grade security for portable storage devices, media systems, and cloud storage accounts that are used by governments, military, and businesses around the world.
HID-Digital-Persona-logo HID DigitalPersona protect cloud, mobile, web and on-premise applications with advanced authentication (smartcards, biometrics, etc.)
Devo offers an alternative to SIEM solutions – an advanced analytics platform that combines streaming and historical data in real-time for accurate security incident management.
ekransystem-200 Ekran System is a comprehensive user activity monitoring solution designed to track and evaluate internal threats related to user behavior within an organization’s network.
famoc-new-logo FAMOC delivers everything IT needs to control every aspect of enterprise mobility by enabling real-time centralized control of smartphones and tablets.
fox_it_logo FOX IT helps to prevent, solve and mitigate cyber threats with the data diode solution designed for government, defense, law enforcement, and other companies with critical infrastructure.
F-Secure-200 F-Secure provides award-winning detection and response solutions as well as offers world-class cybersecurity services to keep businesses and people safe.
v Genians network access control (NAC) solution provides enterprises with full visibility of all IP-enabled devices and ensures that they conform to security compliance.
HyTrust-200 HyTrust’s workload security solutions reduce cloud security risks by automating compliance & enforcing security-based policies for private & public clouds.
iboss-cyber-security-logo Iboss game-changing secure web gateway with innovative architecture is backed by over 75 patents and patents pending, and chosen by over 4000 enterprises worldwide.
idaptive-200 idaptive provides a “secure access everywhere” approach that uniquely combines leading capabilities to seamlessly integrate SSO, MFA, EMM and UBA.
Kingston-200 Kingston solutions meet the challenge of protecting today’s mobile workforce, featuring secure USB solutions for data transport and mobile work-spaces.
Keeper-Security Keeper Security password management application prevents data breaches and helps to meet compliance standards as it designed with 256-bit AES encryption and zero-knowledge architecture.
ISTORAGE-200 iStorage is a global leader of PIN authenticated, hardware encrypted data storage devices (USB Flash Drives and Hard Disk Drives) that ensure compliance with regulations.
onelogin-200 OneLogin connects people with technology through a simple and secure login with a unified access management (UAM) platform that seemingly unlocks apps, devices.
PointSharp PointSharp provides multi-factor authentication that helps you build a modern user experience in a highly regulated enterprise environment. The company’s headquarters in Stockholm, Sweden.
Rohdea-and-Schwarz Rohde & Schwarz protects companies and public institutions worldwide against espionage and cyber-attacks with solutions designed for network, application, endpoint security and traffic analytics.
safexs-200 Safexs is a hardware-encrypted USB flash drive protected by a password. It is a convenient way to execute fast data transfers and reduce the risks of sensitive data loss.
Scale-computing Scale Computing is a leader in edge computing, virtualization, and hyper-converged solutions which eliminates the need for traditional virtualization and disaster recovery software, servers and shared storage.
sophos-200 Sophos secures every endpoint of the organization network, starting with laptops to virtual desktops and servers and finishing with the web and email traffic as well as mobile devices.
spyrus-logo SPYRUS delivers encryption/authentication solutions from USB drives to the windows to go solutions that offer the strongest protection for data in motion, data at rest and data at work.
tripwire-200 Tripwire enables 9,000 organizations enterprises and governments around the world to detect, prevent and respond to cybersecurity threats as well as meet compliance.
Untangle core products represents NG and IC Control firewalls which are specifically tailored for companies below enterprise-level – home offices, non-profit, schools, government and other small companies.
veriato-logo Veriato develops an intelligent and powerful solution to provide companies with visibility and understanding of human behaviors as well as activities occurring within their firewall.
Yubico-cate Yubico ensures reliable identity and access control through a physical security key used for two-factor authentication (2FA). It also enables companies to exploit passwordless authentication.