Technology Alliances

Featured Technology Alliances

Amazon AWS

Log Source, SOAR

Technology Category: Cloud Access Security Broker (CASB);Cloud Security and Infrastructure

About

For 13 years, Amazon Web Services has been the world’s most comprehensive and broadly adopted cloud platform. AWS offers over 175 fully featured services for compute, storage, databases, networking, analytics, robotics, machine learning and artificial intelligence (AI), Internet of Things (IoT), mobile, security, hybrid, virtual and augmented reality (VR and AR), media, and application development, deployment, and management from 69 Availability Zones (AZs) within 22 geographic regions, with announced plans for 13 more Availability Zones and four more AWS Regions in Indonesia, Italy, South Africa, and Spain. Millions of customers—including the fastest-growing startups, largest enterprises, and leading government agencies—trust AWS to power their infrastructure, become more agile, and lower costs.

Learn more

Armis

Log Source

Technology Category: IoT Security

About

Armis®️ is the leading agentless, enterprise-class device security platform, designed to protect organizations from cyberthreats created by the onslaught of unmanaged and IoT devices. Fortune 1000 companies trust our real-time and continuous protection to see and control all managed, unmanaged, un-agentable and IoT devices – from traditional devices like laptops and smartphones to new smart devices like smart TVs, webcams, printers, HVAC systems, industrial control systems and PLCs, medical devices and more. Armis provides passive and unparalleled asset inventory, risk management, and detection & response. Core to our platform is the Armis Device Knowledgebase. It is the world’s largest cloud-based, crowd-source device behavior knowledgebase tracking 230 millions devices, and growing. Armis tracks device behavior, connections, and history, letting us compare real-time device behavior to “known-good” baseline, identifying policy violations, misconfigurations, or abnormal behavior. When a device acts suspiciously or maliciously, Armis can disconnect or quarantine the device.

Learn more

Partner Solutions and Services

CarbonBlack

Log Source, SOAR

Technology Category: Endpoint Security (EPP/EDR)

About

Carbon Black leads a new era of endpoint security by enabling organizations to disrupt advanced attacks, deploy the best prevention strategies for their business, and leverage the expertise of 10,000 professionals from IR firms, MSSPs and enterprises to shift the balance of power back to security teams. Only Carbon Black continuously records and centrally retains all endpoint activity, making it easy to track an attacker’s every action, instantly scope every incident, unravel entire attacks and determine root causes. Carbon Black also offers a range of prevention options so organizations can match their endpoint defense to their business needs. Carbon Black has been named #1 in endpoint protection, incident response, and market share. Forward-thinking companies choose Carbon Black to arm their endpoints, enabling security teams to: Disrupt. Defend. Unite.

Learn more

Cisco

Log Source

Technology Category: Endpoint Security (EPP/EDR); VPN/ Zero Trust Network Access; Firewalls; Authentication and Access Management; Database Activity Monitoring (DAM); Web Security and Monitoring; Network Access, Analysis and Monitoring; Threat Intelligence Platform

About

Cisco (NASDAQ:CSCO) is the worldwide technology leader that has been making the Internet work since 1984. Our people, products, and partners help society securely connect and seize tomorrow’s digital opportunity today. Discover more at newsroom.cisco.com and follow us on Twitter at @Cisco.

Learn more

Corelight

Log Source

Technology Category: Web Security and Monitoring; Network Access, Analysis and Monitoring

About

Corelight makes powerful network traffic analysis (NTA) solutions that transform network traffic into rich logs, extracted files, and security insights for more effective incident response, threat hunting, and forensics. Corelight Sensors run on Zeek (formerly called “Bro”), the open-source network security monitoring tool used by thousands of organizations. Corelight Sensors simplify Zeek deployment and expand its performance and capabilities. Corelight’s global customers include Fortune 500 companies, major government agencies, and large research universities. Corelight is based in San Francisco, Calif.

Learn more

Crowdstrike

Log Source, SOAR

Technology Category: Endpoint Security (EPP/EDR)

About

CrowdStrike® Inc. (Nasdaq: CRWD), a global cybersecurity leader, is redefining security for the cloud era with an endpoint protection platform built from the ground up to stop breaches. The CrowdStrike Falcon® platform’s single lightweight-agent architecture leverages cloud-scale artificial intelligence (AI) and offers real-time protection and visibility across the enterprise, preventing attacks on endpoints on or off the network. Powered by the proprietary CrowdStrike Threat Graph®, CrowdStrike Falcon correlates over two trillion endpoint-related events per week in real time from across the globe, fueling one of the world’s most advanced data platforms for security.

Learn more

CyberArk

Log Source

Technology Category: Privileged Access Management (PAM)

About

CyberArk (NASDAQ: CYBR) is the global leader in privileged access management, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including more than 50 percent of the Fortune 500, to protect against external attackers and malicious insiders. A global company, CyberArk is headquartered in Petach Tikva, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout the Americas, EMEA, Asia Pacific and Japan.

Learn more

Fireeye

Log Source, SOAR

Technology Category: Email Security and Management; Endpoint Security (EPP/EDR); Network Access, Analysis and Monitoring; Forensics and Malware Analysis

About

FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 8,500 customers across 103 countries, including more than 50 percent of the Forbes Global 2000.

Learn more

Forcepoint

Log Source

Technology Category: Data Loss Prevention (DLP); Cloud Access Security Broker (CASB); Web Security and Monitoring

About

Forcepoint is the global human-centric cybersecurity company transforming the digital enterprise by continuously adapting security response to the dynamic risk posed by the behavior of individual users and machines. Forcepoint solutions deliver risk-adaptive protection to continuously ensure trusted use of data and systems. Based in Austin, Texas, Forcepoint protects users and data for thousands of enterprise and government customers in more than 150 countries.

Learn more

Gigamon

Log Source

About

Gigamon is the first company to deliver complete network visibility and analytics on all information-in-motion, from raw packets to apps, across physical, virtual and cloud infrastructure. They aggregate, transform and analyze network traffic to solve for critical performance and security needs, including rapid threat detection and response, freeing your organization to drive digital innovation. Gigamon has been awarded over 75 technology patents and enjoys industry-leading customer satisfaction with more than 3,000 organizations, including over 80 percent of the Fortune 100. Headquartered in Silicon Valley, Gigamon operates globally.

Learn more

Google

Log Source, SOAR

Technology Category: Cloud Security and Infrastructure; Network Access, Analysis and Monitoring; Email Security and Management; Threat Intelligence Platform

About

Google Cloud is widely recognized as a global leader in delivering a secure, open, intelligent, and transformative enterprise cloud platform. Our technology is built on Google’s private network and is the product of nearly 20 years of innovation in security, network architecture, collaboration, artificial intelligence, and open source software. We offer a simply engineered set of tools and unparalleled technology across Google Cloud Platform and G Suite that help bring people, insights, and ideas together. Customers across more than 150 countries trust Google Cloud to modernize their computing environment for today’s digital world.

Learn more

Lastline

Log Source

Technology Category: Network Access, Analysis and Monitoring

About

Lastline’s Network Detection and Response platform delivers the visibility security professionals need to detect and contain sophisticated cyberthreats before they disrupt your business. They offer the industry’s most accurate detection of threats entering and operating within your network, both on premises and in the cloud. The company’s software protects network, email, cloud, and web infrastructures, minimizing the risk of a damaging and costly breach that results in the loss of data, customers, and reputation. Headquartered in San Mateo, California with offices throughout North America, Europe, and Asia, Lastline’s technology is used by Global 5000 enterprises, is offered directly and through resellers and security service providers, and is integrated into leading third-party security technologies worldwide.

Learn more

Mimecast

Log Source

Technology Category: Email Security and Management

About

Mimecast is a cybersecurity and compliance provider that helps thousands of organizations worldwide make email safer, restore trust, and strengthen cyber resilience. Mimecast’s expanded cloud suite enables organizations to implement a comprehensive cyber resilience strategy. From email and web security, archive and data protection, to awareness training, uptime assurance and more, Mimecast helps organizations stand strong in the face of cyberattacks, compliance risk, human error, and technical failure.

Learn more

Netskope

Log Source, SOAR

Technology Category: Cloud Access Security Broker (CASB)

About

The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Only Netskope understands the cloud and delivers data-centric security from one of the world’s largest and fastest security networks, empowering the largest organizations in the world with the right balance of protection and speed they need to enable business velocity and secure their digital transformation journey. Reimagine your perimeter with Netskope.

Learn more

Okta

Log Source, SOAR

Technology Category: Authentication and Access Management

About

Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time. With over 6,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely use the best technologies for their business. Over 7,400 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio, trust Okta to help protect the identities of their workforces and customers.

Learn more

Onapsis

Log Source

Technology Category: Business Applications Security

About

Onapsis protects the applications that run the global economy. Only Onapsis delivers a next-generation business application platform that provides the actionable insight, change assurance, automated governance and continuous monitoring capabilities required by cross-functional teams to discover risk, optimize workflows, control change and automate reporting. Onapsis’s holistic approach empowers enterprise organizations to embrace and accelerate SAP and Oracle E-Business Suite modernization, cloud and mobility initiatives, while keeping their ERP, CRM, PLM, HCM, SCM, BI and cloud-based business-critical applications protected and compliant.

Learn more

OneLogin

Log Source

Technology Category: Authentication and Access Management

About

OneLogin, the leader in Identity and Access Management, connects people with technology through a simple and secure login, empowering organizations to access the world™. The OneLogin Unified Access Management (UAM) platform is the key to unlocking the apps, devices and data that drive productivity and facilitate collaboration. OneLogin serves businesses and partners across a multitude of industries, with over 2,500 customers worldwide.

Learn more

Palo Alto Networks

Log Source, SOAR

Technology Category: Web Security and Monitoring; Data Loss Prevention (DLP); Privileged Access Management (PAM); Firewalls; Cloud Security and Infrastructure; Network Access, Analysis and Monitoring; VPN/ Zero Trust Network Access; Threat Intelligence Platform; Network Access, Analysis and Monitoring;

About

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Their mission is to be the cybersecurity partner of choice, protecting our digital way of life. They help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, they are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Their vision is a world where each day is safer and more secure than the one before.

Learn more

RecordedFuture

SOAR

Technology Category: Threat Intelligence Platform

About

Recorded Future delivers security intelligence to amplify the effectiveness of security and IT teams in reducing exposure by uncovering unknown threats and informing better, faster decisions. Working to provide a singular view of digital, brand, and third party risk, the Recorded Future platform provides proactive and predictive intelligence, analyzing data from open, proprietary, and aggregated customer-provided sources. Recorded Future arms threat analysts, vulnerability management teams, security operations centers, and incident responders with context-rich, actionable intelligence in real time that’s ready for integration across the security ecosystem.

Learn more

Sailpoint

Log Source

Technology Category: Authentication and Access Management

About

SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world. Leveraging artificial intelligence and machine learning, SailPoint’s predictive identity governance platform delivers adaptive security and continuous compliance while dramatically improving operational efficiency. With SailPoint, organizations of all sizes can embrace innovation, expand their workforce globally and evolve their business, securely and confidently. As both an industry pioneer and market leader in identity governance, SailPoint helps protect some of the world’s most prominent companies in a wide range of industries, including: 9 of the top 15 banks, 4 of the top 6 healthcare insurance and managed care providers, 9 of the top 15 property and casualty insurance providers, 5 of the top 13 pharmaceutical companies, and 11 of the largest 15 federal agencies.

Learn more

SentinelOne

Log Source, SOAR

Technology Category: Endpoint Security (EPP/EDR)

About

SentinelOne delivers autonomous endpoint protection through a single agent that successfully prevents, detects, responds, and hunts attacks across all major vectors. Designed for extreme ease of use, the S1 platform saves customers time by applying AI to automatically eliminate threats in real time for both on premise and cloud environments and is the only solution to provide full visibility across networks directly from the endpoint.

Learn more

VMWare

Log Source

Technology Category: Endpoint Security (EPP/EDR); Authentication and Access Management

About

VMware software powers the world’s complex digital infrastructure. The company’s cloud, networking and security, and digital workspace offerings provide a dynamic and efficient digital foundation to customers globally, aided by an extensive ecosystem of partners. Headquartered in Palo Alto, California, VMware is committed to being a force for good, from its breakthrough innovations to its global impact.

Learn more

Zscaler

Log Source, SOAR

Technology Category: Data Loss Prevention (DLP); Network Access, Analysis and Monitoring; Web Security and Monitoring; Cloud Security and Infrastructure

About

Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud-first world. Its flagship services, Zscaler Internet Access™ and Zscaler Private Access™, create fast, secure connections between users and applications, regardless of device, location, or network. Zscaler services are 100 percent cloud-delivered and offer the simplicity, enhanced security and improved user experience that traditional appliances are unable to match. Used in more than 185 countries, Zscaler operates a multi-tenant distributed cloud security platform, protecting thousands of customers from cyberattacks and data loss.

Learn more
services partners loading