Aligning with other industry innovators and leaders
By working with other industry innovators and leaders, we bring more advanced threat, vulnerability and compliance management to the market to better serve business needs. Our technology partnerships augment the broad portfolio of security services SMSAM delivers to help businesses fight cybercrime, protect data and reduce security risk.
Arbor Networks secures the world’s most demanding and complex networks from DDoS attacks and advanced threats. Arbor Networks customers gain a micro view of their own network, through our suite of products, combined with a macro view of global Internet traffic and emerging threats, through our ATLAS threat intelligence infrastructure. See, understand and solve more security threats with Arbor Networks.
ForeScout has pioneered an agentless approach to network security to address the explosive growth of mobile computing, IoT and cloud computing. We offer a highly scalable, heterogeneous platform that provides Global 2000 enterprises and government agencies with agentless visibility and control of traditional and non-traditional devices, including physical and virtual infrastructure, PCs, laptops, tablets, smartphones and the latest IoT devices, the instant they connect to the network.
GTB Technologies is the only Data Protection / Data Loss Prevention solution (on-premises, off-premises and everywhere in between including the cloud) which can prevent the loss of data from Malware, Frenemies and trusted insiders by blocking sensitive data (structured or unstructured) regardless of file type, port or channel, in real-time with impeccable accuracy thus providing true cyber security and insider threat defense whether it be on premise, off premise, in the cloud or as a managed service.
We provide solutions that protect thousands of enterprises, service providers and government networks against a new age of cyber-threats. Our game-changing Secure Web Gateway Platform with innovative architecture is backed by over 75 patents and patents pending, and chosen by over 4000 enterprises worldwide to increase their security postures. This has made iboss one of the fastest growing cybersecurity companies in the market.
Genians provides the industry’s leading Network Access Control solution, which helps maintain full visibility and control of all your network assets and ensures them to be the highest level of security and compliance. Genians secures millions of various endpoints in organizations of all sizes and industries, including global Fortune 500 companies, the government, the military, energy, finance, healthcare, education, and more.
Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. With our deep cybersecurity expertise, commitment to innovation, and game-changing Next-Generation Security Platform, customers can confidently pursue a digital-first strategy and embark on new technology initiatives, such as cloud and mobility.
At Ixia, we deliver a powerful combination of innovative solutions and trusted insight to support your network and security products, from concept to operation. Whether you are preparing your product for launch, deploying an application, or managing a product in operation, we offer an extensive array of solutions in testing, visibility, and security—all in one place.
AttackIQ started with a simple realization. Organizations invest heavily in security technologies. But no one knows whether or not these systems are actually working. We set out to solve that problem. You’ll gain a clear understanding of your security investments so you can mitigate risk and improve ROI. You can stop making assumptions and start being certain.
Javelin AD|Protect is an agentless, artificial intelligence platform that actively and autonomously monitors, alerts, and stops intruders from penetrating the domain environment. It presents the intruder with a false perception of the internal topology and Active Directory, which masks the real environment and prevent attackers from moving off of that one compromised machine.
DataSunrise is an innovative software company dedicated to delivering data security products. Our company was founded by a talented team with strong background in enterprise security, data protection and database management systems.
Our goal is to make privilege management for cloud and virtual infrastructure downright easy. We want to make it so where an employee of a company does not feel that their access is being protected by any security system – make security near invisible.
With that vision in mind, Avanan cloudified the security tools of the industry’s leading vendors and built a platform that could connect these tools to the most widely used enterprise SaaS applications. With everything virtualized, installing these tools on any SaaS is now as easy as installing an app on a phone.
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR), and a 24/7 managed hunting service — all delivered via a single lightweight agent. The CrowdStrike Falcon™ platform, certified to replace legacy antivirus, has reinvented how endpoint security is delivered with its industry-leading, cloud native architecture.
Silverfort protects enterprises from data breaches, cyber attacks and insider threats, by preventing credential compromise and misuse across the entire corporate network and cloud infrastructure. Silverfort leverages patent-pending technology to seamlessly harden the basic authentication and access mechanisms used by all client devices and services, instantly equipping them with the latest authentication and access protection technology without any change or integration.
Ericom Software is a global leader in securely connecting the unified workspace. Ericom empowers today’s connected workforce and the IT organizations that support them by securing and optimizing desktop, application, and web content delivery to any device, anywhere. Founded in 1993, Ericom provides enterprise-grade secure remote access, desktop virtualization (VDI), and web security solutions to organizations across all industries.
SpyCloud helps businesses of all sizes prevent data breaches and account takeover attacks by alerting when employee or company assets have been compromised. We accomplish this through our early-warning breach detection service powered by a world-class team of intelligence analysts.
In the modern world of cyber threat analysis, investigation and management should be more holistic, intuitive and simple. Technology and data science should serve cyber security experts by providing all the relevant information about the threat in real-time and focus them in rapid decision making.
LogPoint is a global security analytics company founded in Denmark in 2008 and has been growing ever since. Our headquarters is still located in Copenhagen, and we have sales and support offices located across Europe and partnerships that reach across the globe.
The Indegy team combines a unique mix of cyber-security expertise with hands-on industrial control knowledge. Our leadership team and the core of our R&D team consist of veterans of the IDF elite cyber security units. Together we bring decades of real-world experience spanning a wide range of industrial sectors and technologies. This is the foundation on which Indegy builds its innovative technologies and delivers cutting-edge solutions for industrial cyber security.
Seceon is singularly focused on enabling organizations to see and stop cyber threats clearly and quickly. Its Open Threat Management (OTM) Platform turns the traditional perimeter-based, multiple tool approach that has been deployed for years on its head. Powered by advanced data collection and analysis, machine learning and patent-pending predictive and behavioral analytics, Seceon’s OTM provides customers with a proverbial security operations center.
CyBot is a next-generation vulnerability management tool as well as the world’s first Automated pen testing solution, that continuously showcases validated, global, multi-vector, Attack Path Scenarios ™ (APS), so you can focus your time and resources on those vulnerabilities that threaten your critical assets and business processes. CyBot has one core engine: CyBot Pro, plus two additional management consoles. One for Enterprises and one for MSSPs.
Safe-T® protects and secures your data and puts you in complete control of who sees the data and how the data is accessed and exchanged. We make your data completely invisible to the outside and inside world, and only available to the right people, while transparently removing the element of human error and threats.
IntSights’ ground-breaking data-mining algorithms and unique machine learning capabilities continuously monitor an enterprise’s’ external digital profile across the surface, deep and dark web, categorize and analyze tens of thousands of threats, and automate the risk remediation lifecycle — streamlining workflows, maximizing resources and securing business operations.
ExtraHop is a stream analytics platform that provides the fastest, richest, most complete visibility into all activity in your IT infrastructure. The ExtraHop platform turns unstructured network data into structured wire data, and runs real-time analytics on it, so you get critical information the instant you need it.
The detection of undisclosed and zero-day exploits is extremely difficult, if not impossible. Votiro’s goal is to provide solutions to safeguard against undisclosed and zero-day exploits. Based on the company’s patented Advanced Content Disarm and Reconstruction technology, Votiro solutions apply an active cleansing process to all incoming files and email messages, neutralizing undisclosed exploits without having to detect signatures. The process is automatic and therefore does not rely on employees’ assessment of incoming files’ safety.
Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection. Commitment to clients and research has earned Positive Technologies a reputation as one of the foremost authorities on Industrial Control System, Banking, Telecom, Web Application, and ERP security, supported by recognition from the analyst community.
Developed in 2012, DMARC (Domain-based Message Authentication, Reporting & Conformance – RFC 7489) is an email authentication protocol that gives insight into how email is delivered. DMARC gives email senders the ability to not only receive feedback about how receivers treat their email, but also the ability to inform receivers to reject illegitimate messages. DMARC is helping organizations of every size ensure reliability and prevent phishing and domain spoofing.