top of page

ELITE PARTNERSHIPS

Leverage Our Relationships with Leading Security Product Manufacturers for Better Solutions

STRATEGIC PARTNERSHIPS 

Meridian Cyber Defense partners with industry-leading security product manufacturers and maintains a strong pulse on the newest, emerging players in the space. We have intimate knowledge of best-of-breed technologies and how they integrate and work together.

Partner Directory

A10 Networks

A10 Networks pioneered a new generation of application networking technologies. Our solutions enable enterprises, service providers, Web giants and government organizations to accelerate, secure and optimize the performance of their data center applications and networks. A10 Thunder Series is a family of hardware and software appliances ready to match a wide variety of deployment needs. Each Thunder Series form factor is powered by ACOS software, which brings a unique combination of shared memory accuracy and efficiency, 64-bit scalability and advanced flow processing.

Aerohive Networks

Aerohive delivers Cloud Networking that transforms the Connected Experience. Built on a foundation of the most scalable Wi-Fi, our open mobility platform uses the power of Cloud Networking to simplify operations and deliver customized applications and insights for increased IT and business value. Enterprise Cloud Networking - public or private - reduces the complexity of supporting 100,000’s of devices across multiple locations. Great Wi-Fi enabled with the most scalable connectivity with unique distributed architecture delivers speed, security, and scale. Applications and Insights with customized business and IT apps unlock new information, insights, and engagement. At Aerohive, every access point is a starting point.

Arbor Networks

Arbor Networks secures the world's most demanding and complex networks from DDoS attacks and advanced threats. Arbor Networks customers gain a micro view of their own network, through our suite of products, combined with a macro view of global Internet traffic and emerging threats, through our ATLAS threat intelligence infrastructure. See, understand and solve more security threats with Arbor Networks.

Aruba Networks

Aruba, a Hewlett Packard Enterprise company, is a leading provider of next-generation networking solutions for enterprises of all sizes worldwide. The company delivers IT solutions that empower organizations to serve the latest generation of mobile-savvy users who rely on cloud-based business apps for every aspect of their work and personal lives.

BeyondTrust

BeyondTrust is a global information security software company that helps organizations prevent cyber attacks and unauthorized data access due to privilege abuse. Our solutions give you the visibility to confidently reduce risks and the control to take proactive, informed action against data breach threats. And because threats can come from anywhere, we built a platform that unifies the most effective technologies for addressing both internal and external risk: Privileged Access Management and Vulnerability Management. BeyondTrust’s security solutions are trusted by over 4,000 customers worldwide, including half of the Fortune 100.

BitSight

BitSight Technologies is transforming how companies manage information security risk with objective, evidence-based security ratings. The company's Security Rating Platform continuously analyzes vast amounts of external data on security behaviors in order to help organizations manage third party risk, benchmark performance, and assess and negotiate cyber insurance premiums.

Blue Coat

Blue Coat, Inc. is a leading provider of advanced web security solutions for global enterprises and governments, protecting 15,000 organizations including over 70 percent of the Fortune Global 500. Through the Blue Coat Security Platform, Blue Coat unites network, security and cloud, protecting enterprises and their users from cyber threats – whether they are on the network, on the web, in the cloud or mobile.

Carbon Black

Carbon Black leads a new era of endpoint security by enabling organizations to disrupt advanced attacks, deploy the best prevention strategies for their business, and leverage the expertise of 10,000 professionals to shift the balance of power back to security teams. Carbon Black continuously records and centrally retains all endpoint activity, making it easy to track an attacker’s every action, instantly scope every incident, unravel entire attacks and determine root causes. Carbon Black offers prevention options allowing organizations to match their endpoint defense to their business needs. Carbon Black has been named #1 in endpoint protection, incident response, and market share.

Check Point

Check Point Software Technologies Ltd. offers a complete security architecture defending enterprises’ networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point Software first pioneered the industry with Firewall-1 and its patented Stateful Inspection technology. The foundation of our success is our customer-driven philosophy, our continuous technological innovation, as well as our relentless and pure focus on providing comprehensive, innovative security. Check Point proudly secures 98% of Fortune 500 companies and 100% of Fortune 100 companies with industry leading security products for Threat Prevention, Mobility, Firewalls, Private/Public Cloud Security, Security Management and more.

Cisco

Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. At Cisco customers come first and an integral part of our DNA is creating long-lasting customer partnerships and working with them to identify their needs and provide solutions that support their success.  Cisco has shaped the future of the Internet by creating unprecedented value and opportunity for our customers, employees, investors and ecosystem partners and has become the worldwide leader in networking - transforming how people connect, communicate and collaborate.

CrowStrike

CrowdStrike is the leader in next-generation endpoint protection, threat intelligence and response services. CrowdStrike’s core technology, the Falcon platform, stops breaches by preventing and responding to all types of attacks – both malware and malware-free. CrowdStrike has revolutionized endpoint protection by combining three crucial elements: next-generation AV, endpoint detection and response (EDR), and a 24/7 managed hunting service — all powered by intelligence and uniquely delivered via the cloud in a single integrated solution. Falcon uses the patent-pending CrowdStrike Threat Graph™ to analyze and correlate billions of events in real time, providing complete protection and five-second visibility across all endpoints.

CyberArk

CyberArk is the only security company that proactively stops the most advanced cyber threats – those that exploit insider privileges to attack the heart of the enterprise.  The company has pioneered a new category of targeted security solutions to lock down privileged accounts and protect against cyber threats before attacks can escalate and do irreparable business damage.  CyberArk is trusted by the world’s leading companies – including more than 40 of the Fortune 100 – to protect their highest value information assets, infrastructure and applications, while ensuring tight regulatory compliance and audit requirements.

Cylance

Cylance® is the only company to offer a preventive cybersecurity solution that stops advanced threats and malware at the most vulnerable point: the endpoint. Applying a revolutionary artificial intelligence approach, the Cylance endpoint security solution, CylancePROTECT®, analyzes the DNA of code prior to its execution on the endpoint to find and prevent threats others can’t, while using a fraction of the system resources associated with endpoint antivirus and detect and respond solutions that are deployed in enterprises today.

Cyphort

Cyphort is the next generation APT defense solution for enterprise organizations. Cyphort provides a single view across perimeter and laterally moving threats, correlates threat signals before and after an incident, while eliminating noise from false alerts. Cyphort has leveraged the power of machine learning and data science to build a next generation threat detection engine that evolves ahead of the threats. A virtualized deployment model combined with open API based integration allows customers to address APT security gaps across global locations while leveraging their existing investments in perimeter and endpoint security for threat defense.

Damballa

Damballa is a network security monitoring system that provides evidence of threat-related activity needed to prevent data theft. We discover criminal operators that have already bypassed perimeter defenses and pose a business risk. Our patented solutions leverage Big Data from nearly 15 percent of world’s Internet traffic, combined with machine learning, to automatically discover and terminate criminal activity, stop data theft, minimize business disruption, and reduce the time to response and remediation. Damballa protects over half a billion endpoints globally with sensors on five continents, at enterprises in every major market and for the world’s largest ISP and telecommunications providers.

Digital Guardian

Digital Guardian is a next generation data protection platform designed to stop data theft. The Digital Guardian platform performs across the corporate network, traditional endpoints, mobile devices and cloud applications to make it easier to see and stop all threats to sensitive data. For more than 10 years, it has enabled data-rich organizations to protect their most valuable assets with an on premise deployment or an outsourced managed security program (MSP). Digital Guardian’s unique data awareness and transformative endpoint visibility, combined with behavioral threat detection and response, enables you to protect data without slowing the pace of your business.

ExaBeam

Exabeam is a security intelligence solution that leverages existing log, endpoint, and other data to quickly detect modern cyber attacks and accelerate effective response. Unique among UBA products, Exabeam’s Stateful User Trackingâ„¢ automatically creates a complete timeline of every event and anomaly tied to an attack -- across devices, IP addresses, and credentials -- and uses that timeline to assess risk and automate many tasks of incident response. As a result, Exabeam not only improves security, but also transforms SOC efficiency and productivity. By operating on existing data and requiring no agents or network taps, Exabeam delivers value within hours, not weeks.

ExtraHop

When building an IT Operations Analytics architecture, visibility should be the single most important factor in any tool or platform you invest in. Traditional monitoring tools provide data from a slice of your environment, but they only perform a set of prescribed functions. ExtraHop streaming analytics platform translates all data in flight moving through your network into wire data, which shows you what's happening in your environment in real time, across all tiers, and across the entire application delivery chain. ExtraHop has rapid programmability, easy extensibility, and supports the open integration of data and community-driven innovation.

F5 Networks

F5 Networks provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, and software defined networking (SDN) deployments to successfully deliver applications to anyone, anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich partner ecosystem of leading technology and data center orchestration vendors. This approach lets customers pursue the infrastructure model that best fits their needs over time. The world’s largest businesses, service providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility trends.

Fidelis

Fidelis Cybersecurity is creating a world where attackers have no place left to hide. We reduce the time it takes to detect attacks and resolve security incidents. Our Fidelis Networkâ„¢ and Fidelis Endpointâ„¢ products look deep inside your traffic and content where attackers hide their exploits. Then, we pursue them out to your endpoints where your critical data lives. With Fidelis you’ll know when you’re being attacked, you can retrace attackers’ footprints and prevent data theft at every stage of the attack lifecycle.

FireEye

FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye has over 4,700 customers across 67 countries, including more than 730 of the Forbes Global 2000.

FireMon

FireMon solutions deliver continuous visibility into and control over network security infrastructure, policies and risk. Using the FireMon Security Intelligence Platform, today’s enterprise organizations, government agencies and managed services providers dramatically improve effectiveness of network defenses, optimizing investments and speeding response to changing business demands. Built around a massively scalable engine and distributed data architecture, FireMon Security Manager and the Policy Planner, Policy Optimizer and Risk Analyzer modules empower proactive firewall cleanup, policy change workflow, compliance assessment and IT risk mitigation – providing a closed loop approach to network security infrastructure management while reducing related expenses.

Forcepoint

Forcepoint safeguards users, data and networks against the most determined adversaries, from accidental or malicious insider threats to outside attackers, across the entire threat lifecycle. Forcepoint protects data everywhere – in the cloud, on the road, in the office – simplifying compliance and enabling better decision-making to streamline security. Forcepoint empowers organizations to concentrate on what’s most important to them while automating routine security tasks. More than 22,000 organizations around the world rely on Forcepoint. Based in Austin, Texas, with worldwide sales, service, security, security laboratories and product development, Forcepoint is a joint venture of the Raytheon Company and Vista Equity Partners.

ForceScout

ForeScout Technologies, Inc. is transforming security through visibility. ForeScout offers Global 2000 enterprises and government organizations the unique ability to see devices, including non-traditional devices, the instant they connect to the network. Equally important, ForeScout lets you control these devices and orchestrate information sharing and operation among disparate security tools to accelerate incident response. Unlike traditional security alternatives, ForeScout achieves this without requiring software agents or previous device knowledge. The company’s solutions integrate with leading network, security, mobility and IT management products to overcome security silos, automate workflows and enable significant cost savings. As of April 2016, more than 2,000 customers in over 60 countries improve their network security and compliance posture with ForeScout solutions.

Fortinet

Fortinet secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network - today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud or mobile environments. More than 270,000 customers worldwide trust Fortinet to protect their businesses.

Gemalto

Gemalto is a global leader in digital security, bringing trust to an increasingly connected world. We deliver a vast range of technologies and services to businesses, governments and other organizations, protecting identities and data so they’re kept safe wherever they’re found: in personal devices, connected objects, the network, the cloud and in between. Our solutions are at the heart of modern digital life, from payments and the cloud to big data and the Internet of Things. They encrypt data and authenticate people and things – enabling our clients to deliver secure, innovative services for billions of individuals and devices.

Gigamon

Gigamon (NYSE: GIMO) provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric™ and GigaSECURE®, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network, and application performance management solutions in enterprise, government, and service provider networks operate more efficiently. As data volumes and network speeds grow and threats become more sophisticated, tools are increasingly overburdened. One hundred percent visibility is imperative. Gigamon is installed in more than three-quarters of the Fortune 100, more than half of the Fortune 500, and seven of the 10 largest service providers.

Guidance Software

Guidance Software provides a foundation of applications and services for companies and governments looking to secure their digital environments from internal and external threats. As the makers of Encase security products, we help legal, law enforcement and security professionals find and neutralize threats and bring digital chaos under control with lightning fast intervention.

Hewlett Packard Enterprise

For decades, organizations have turned to Hewlett Packard Enterprise for complete enterprise security solutions. HPE discovers and remediates up to 10 times as many vulnerabilities as any other organization in the world. Nine of the world’s ten largest banks trust us to protect more than $9 trillion in daily transactions. All told, we monitor more than 23 billion security events monthly and manage more than 1.5 million security specific devices globally. Hewlett Packard Enterprise advocates an integrated approach to security, one that starts with a single, comprehensive view of risk across the enterprise, and driven by our clients’ enterprise priorities and goals. Although, we know that everything in an organization can never be completely secure, by focusing on your critical digital assets and the interactions between them you can implement a more proactive and effective pan-enterprise approach to security and risk management.Hew

IBM Security

As security threats have grown more sophisticated, invasive and collaborative, traditional practices and point-product security solutions no longer offer enough protection.IBM Security provides a more effective, analytics-based, integrated solution that enables your security program to act like an immune system. With security intelligence at the core, our approach helps you optimize security, stop advanced threats, protect critical assets and deliver digital transformation.

Imperva

Imperva® (NYSE:IMPV) is a leading provider of cyber security solutions that protect business-critical data and applications. The company’s SecureSphere, CounterBreach, Incapsula and Skyfence product lines enable organizations to discover assets and risks, protect information wherever it lives – in the cloud and on-premises – and comply with regulations. The Imperva Defense Center, a research team comprised of some of the world’s leading experts in data and application security, continually enhances Imperva products with up-to-the minute threat intelligence, and publishes reports that provide insight and guidance on the latest threats and how to mitigate them. 

Intel Security

McAfee is now part of Intel Security. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence, Intel Security is intensely focused on developing proactive, proven security solutions and services that protect systems, networks, and mobile devices for business and personal use around the world. Intel Security combines the experience and expertise of McAfee with the innovation and proven performance of Intel to make security an essential ingredient in every architecture and on every computing platform. Intel Security’s mission is to give everyone the confidence to live and work safely and securely in the digital world.

Ixia

Ixia (Nasdaq: XXIA) is a fast–growing global provider of world-class solutions for network visibility, security, and performance validation. Since 1997, Fortune 100 companies, the world’s leading carriers, government agencies and IT manufacturers have relied upon Ixia innovations to maximize network performance and security. Ixia’s ThreatARMOR™, Vision ONE™, and BreakingPoint™ Virtual Edition (VE) offerings leverage cloud-based feeds from the company’s Application and Threat Intelligence (ATI) Research Center to strengthen network security. Companies launching new applications and services and managing IT operations can leverage these and other Ixia solutions to maximize performance and increase their return on investments (ROI) in IT.

Juniper

Juniper Networks challenges the status quo with innovative and secure products, solutions and services critical to customers -- by transforming the economics of secure networking in the connected world. We create the most scalable, secure and cost-effective networks for unprecedented agility, efficiency and value. Juniper’s new Software-Defined Secure Network (SDSN) secures your entire network—physical and virtual— providing end-to-end visibility leveraging cloud economics to find and stop threats faster.

LockPath

LockPath is a market leader in corporate governance, risk management, regulatory compliance (GRC) and information security (InfoSec) software. The company’s flexible, scalable and fully integrated suite of applications is used by organizations to automate business processes, reduce enterprise risk and demonstrate regulatory compliance to achieve audit-ready status. LockPath serves a client base of global organizations ranging from small and midsize companies to Fortune 10 enterprises in more than 15 industries. 

LogRythm

LogRhythm, the leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats.  The company’s patented and award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint forensics, and advanced security analytics.  In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence.

MobileIron

MobileIron's mission is to enable modern enterprises to secure and manage information as it moves to mobile and to the cloud, while preserving end-user privacy and trust.  MobileIron stands out from other MDM vendors by providing expanded EMM capabilities to IT organizations that need to secure mobile devices, applications and content. The MobileIron Enterprise Mobility Management (EMM) solution is a mobile security platform secures data-at-rest on mobile devices, in applications, and in cloud storage, as well as data-in-motion as it moves between corporate networks, devices, and storage repositories.

NetScout

NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT) is a market leader in real-time service assurance and cybersecurity solutions for today’s most demanding service provider, enterprise and government networks. NETSCOUT’s Adaptive Service Intelligence (ASI) technology continuously monitors the service delivery environment to identify performance issues and provides insight into network-based security threats, helping teams to quickly resolve issues that can cause business disruptions or impact user experience.  NETSCOUT delivers unmatched service visibility and protects the digital infrastructure that supports our connected world.

Netscope

Netskopeâ„¢, the leading cloud access security broker (CASB), helps enterprises find, understand and secure sanctioned and unsanctioned cloud apps. Through contextual awareness and a multi-mode architecture, Netskope sees the cloud differently. This results in the deepest visibility and control, the most advanced threat protection and data loss prevention and an unmatched breadth of security policies and work flows. The world’s largest companies choose Netskope, the only CASB that ensures compliant use of cloud apps in real-time, whether accessed on the corporate network, remotely or from a mobile device. With Netskope, enterprises move fast, with confidence. To learn more, visit our website. 

Okta

Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security protections. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications. Because Okta runs on an integrated platform, organizations can implement the service quickly at large scale and low total cost. Thousands of customers, including Adobe, Allergan, Chiquita, LinkedIn, MGM Resorts International and Western Union, trust Okta to help their organizations work faster, boost revenue, and stay secure.

Onapsis

Onapsis provides the most comprehensive solutions for securing business-critical applications. As the leading experts in SAP cyber-security, Onapsis’ patented solutions deliver preventative vulnerability and compliance controls, real-time detection and incident response capabilities to reduce risks affecting critical business processes and data. Headquartered in Boston, MA., Onapsis serves over 200 global customers and are the standard for leading consulting and audit firms. Experts of the Onapsis Research Labs were the first to lecture on SAP cyber-attacks and have uncovered hundreds of security vulnerabilities to-date including the vulnerability behind the US CERT-Alert published by the Department of Homeland Security in May of 2016.

Palo Alto Networks

Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization’s most valuable assets.

Ping Identity

Ping Identity is the leader in Identity Defined Securityâ„¢ for the borderless enterprise, allowing the right people to access the right things, securely and seamlessly. More than half of the Fortune 100 trusts Ping to accelerate their move to the Cloud, deliver rich customer experiences and onboard partners as part of their digital transformation. Ping provides the freedom to access applications with an enterprise IDaaS solution that includes multi-factor authentication, single sign-on and access security. Together Ping and Optiv lead the Identity Defined Security Alliance, established in 2015, to provide CISOs a complete blueprint, use cases and integrated best of breed solutions for implementing a holistic Identity Defined Security solution for the modern enterprise.

Proofpoint

Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media. Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.

Pulse Secure

Pulse Secure, LLC is a leading provider of access and mobile security solutions to both enterprises and service providers. Enterprises from every vertical and of all sizes utilize the company’s Pulse virtual private network (VPN), network access control and mobile security products to enable end user mobility securely and seamlessly in their organizations. Pulse Secure’s mission is to enable open, integrated enterprise system solutions that empower business productivity through seamless mobility.

Qualsys

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 8,800 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. 

Radient Logic

As the market-leading provider of federated identity systems based on virtualization, Radiant Logic delivers simple, logical, and standards-based access to all identity within an organization. The RadiantOne federated identity service enables customizable identity views built from disparate data silos, driving critical authentication and authorization decisions for WAM, federation, and cloud deployments. Fortune 1000 companies rely on RadiantOne to simplify integration and build a flexible identity infrastructure to meet business demands, delivering quick ROI while reducing administrative effort.

Radware

Radware® is a global leader of cyber security and application delivery solutions for virtual, cloud and software defined data centers. Radware’s Hybrid Attack Mitigation System encompasses on-premises DDoS Protection, cloud-based Security Services, Encrypted (SSL/TLS) Attack Protection & Outbound Inspection and Web Application Firewall. We believe that Radware’s continued recognition in Gartner’s Magic Quadrant for Application Delivery Controllers demonstrates our commitment to ensure that mission-critical business applications are available and performing optimally at all times. The combination of Radware’s strong architectural approach, the powerful security integrations, and the advanced customization, automation and programmability of Radware’s offerings are what keep our customers up and running.

Rapid7

Rapid7 is a leading provider of security data and analytics solutions that enable organizations to implement an active, analytics-driven approach to cybersecurity. We combine our extensive experience in security data and analytics and deep insight into attacker behaviors and techniques to make sense of the wealth of data available to organizations about their IT environments and users. Our solutions empower organizations to prevent attacks by providing visibility into vulnerabilities and to rapidly detect compromises, respond to breaches, and correct the underlying causes of attacks.

Riverbed

Cloud, mobile, big data, and social media advancements are redefining how businesses operate in an evolving digital landscape. But they also create hybrid environments with many complexities, disconnects, and blind spots. Riverbed provides solutions to simplify, unify, optimize, and protect applications and data for seamless delivery and efficient management across the hybrid enterprise, including solutions for SD-WAN, WAN optimization, end-to-end visibility, and software-defined edge IT. These solutions are integrated into a comprehensive platform, the Riverbed Application Performance Platform, designed to simplify and unify today’s complex environments to deliver new levels of agility, visibility, performance, and efficiency for the digital enterprise.

RSA

RSA provides more than 30,000 customers around the world with the essential capabilities to protect their most valuable assets from cyber risks and threats. With RSA’s award-winning products, organizations effectively detect, investigate, and respond to advanced attacks; assure and manage identities; implement governance, risk, and compliance processes; and ultimately, reduce IP theft, fraud, and cybercrime.

SailPoint Technologies

As the fastest-growing, independent identity and access management (IAM) provider, SailPoint helps hundreds of global organizations securely and effectively deliver and manage user access from any device to data and applications residing in the datacenter, on mobile devices, and in the cloud. The company’s innovative product portfolio offers customers an integrated set of core services including identity governance, provisioning, and access management delivered on-premises or from the cloud (IAM-as-a-service).

SecureAuth

SecureAuth empowers organizations to determine identities with confidence. Whether you are seeking to reduce risk around employee, customer or partner access, SecureAuth’s flexible and adaptive platform makes everything fast, frictionless and pain-free. SecureAuth provides a new approach by combining multi-factor authentication, single sign-on and user self-service tools together, allowing strong identity security without sacrificing the user experience. SecureAuth can protect on-premises, cloud, mobile, and homegrown applications by detecting the use of compromised credentials, enabling security teams to quickly respond to cyber threats.

Securonix

Securonix radically transforms enterprise security with actionable intelligence. Our purpose-built security analytics platform mines, enriches, analyzes, scores and visualizes data into actionable intelligence on the highest risk threats to organizations. Using signature-less anomaly detection techniques, Securonix detects data security, insider threat and fraud attacks automatically and accurately.

Skybox Security

Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address their most critical risks. Our award-winning solutions are used by the world’s most security-conscious enterprises, government agencies and organizations for vulnerability management, threat intelligence management and security policy management. Many of our customers are on Forbes’ Global 2000 List, including six of the top 10 global banks and six of the 10 largest NATO member countries.

Skyhigh Networks

Skyhigh Networks, the leading cloud security and enablement company, allows enterprises to safely adopt cloud services while meeting their security, compliance, and governance requirements. Over 500 enterprises including Aetna, DIRECTV, General Mills, HP, and Western Union use Skyhigh to gain visibility, manage threats, ensure compliance and protect corporate data across shadow and sanctioned cloud services. Headquartered in Campbell, Calif., Skyhigh Networks is backed by Greylock Partners, Sequoia, and Salesforce.com.

Splunk

Splunk Inc. (NASDAQ: SPLK) is the market-leading platform that powers Operational Intelligence. We pioneer innovative, disruptive solutions that make machine data accessible, usable and valuable to everyone. More than 11,000 customers in over 110 countries use Splunk software and cloud services to make business, government and education more efficient, secure and profitable.

STEALTHbits

STEALTHbits is a data security software company.  We protect organizations from malicious access to their information. By defending against credential theft and abuse, and giving customers insight into the access and ownership of their unstructured data, we reduce security risk, fulfill compliance requirements and decrease operations expense. 

Symantec

Symantec Corporation (NASDAQ: SYMC) is one of the leaders in cybersecurity. Operating one of the world’s largest cyber intelligence networks, we see a broad landscape of threats, and protect customers from the next generation of attacks. We help companies, governments and individuals secure their most important data wherever it lives.

Tenable Network Security

Tenable Network Security transforms security technology for the business needs of tomorrow through comprehensive solutions that provide continuous visibility and critical context, enabling decisive actions to protect your organization. Tenable eliminates blind spots, prioritizes threats, and reduces exposure and loss. With more than one million users and more than 20,000 enterprise customers worldwide, organizations trust Tenable for proven security innovation. Tenable's customers range from Fortune Global 500 companies, to the U.S. Department of Defense, to mid-sized and small businesses in all sectors, including finance, government, healthcare, higher education, retail and energy.

TITUS

TITUS solutions enable organizations to discover, classify, protect and confidently share information, and meet regulatory compliance requirements by identifying and securing unstructured data. TITUS products enhance data loss prevention by classifying and protecting sensitive information in emails, documents and other file types – on the desktop, on mobile devices, and in the Cloud.

TrendMicro

Trend Micro is instrumental in bringing advanced security solutions that address the challenges faced by Optiv’s customers. Their solutions protect end users on any device, optimize security for the modern data center, and secure networks against breaches from targeted attacks. As an early adopter of virtualization and cloud computing, Trend Micro gained a clear understanding of extending threat protection into emerging cloud environments, resulting in product innovations that continue to evolve. As the market leader in cloud security, virtualization security and server security, their solution is the only true cloud security platform optimized for today’s virtualization and cloud environments.

Tripwire

Tripwire solutions are based on asset visibility and deep endpoint intelligence combined with business context; together these integrate and automate security and IT operations. Tripwire’s portfolio includes configuration and policy management; file integrity monitoring, vulnerability and log management, reporting and analytics. Tripwire is the leading expert of continuous compliance and automation, enabling customers to implement a comprehensive security policy while preparing and responding effectively to audits. Tripwire provides trustworthy guidance to achieve and maintain compliance for PCI, NERC, SOX, HIPAA, NIST, and more. Tripwire has developed integrations with over 80 technology alliance partners, working together to make our customers’ entire security infrastructure more resilient.

Varonis

Varonis is a leading provider of software solutions that protect data from insider threats and cyberattacks.  Varonis allows organizations to analyze, secure, manage, and migrate their volumes of unstructured data, which often contain an enterprise’s financial information, product plans, strategic initiatives, intellectual property, and confidential employee, customer or patient records.

Veracode

Veracode, the leading pure-play application security vendor in the Gartner Magic Quadrant, delivers the application security solutions and services today’s software-driven world requires. Veracode’s unified platform assesses and improves the security of applications from their inception through production so that businesses can confidently innovate with the web and mobile applications they build, buy and deploy as well as the components they integrate into their environments. With its powerful combination of automation, process and speed, Veracode seamlessly integrates application security into the software lifecycle, effectively eliminating vulnerabilities during the lowest-cost point in the development/deployment chain, and blocking threats while in production.

VMware

VMware, a global leader in cloud infrastructure and business mobility, accelerates our customers’ digital transformation journey by enabling enterprises to master a software-defined approach to business and IT. With VMware solutions, organizations are creating exceptional experiences by mobilizing everything, responding faster to opportunities with modern data and apps hosted across hybrid clouds, and safeguarding customer trust with a defense-in-depth approach to cybersecurity.

Vormetric

Vormetric’s comprehensive high-performance data protection platform helps companies move confidently and quickly. Our seamless and scalable platform is the most effective way to protect data wherever it resides—any file, database and application, in any server environment. Advanced transparent encryption, powerful access controls and centralized key management let organizations encrypt everything efficiently, with minimal disruption. Regardless of content, database or application—whether physical, virtual or in the cloud—Vormetric Data Protection enables confidence, speed and trust by encrypting the data that builds business. Vormetric Data Protection was recently acquired by Thales Group and is now a Thales company. 

Whitehat Security

WhiteHat Security is a leader and pioneer in the field of application security. We combine technology and human intelligence to deliver solutions that reduce risk, reduce cost and accelerate the deployment of secure applications and web sites. We provide web application security and risk reduction by combining best-in-class application security technology with the expertise of over 150 security researchers from our Threat Research Center. WhiteHat Security secures applications throughout their entire lifecycle. We do this through our flagship product, the WhiteHat Sentinelâ„¢ software-as-a-service (SaaS) application security platform, which enables our customers to quickly deploy a scalable application security program.

Zscaler

Zscaler is revolutionizing Internet security with the industry’s first Security as a Service platform. As a Gartner Magic Quadrant leader for Secure Web Gateways, Zscaler delivers a safe and productive Internet experience for every user, from any device and from any location — 100% in the cloud. With its multi-tenant, distributed cloud security platform, Zscaler effectively moves security into the internet backbone, operating in more than 100 data centers around the world and enabling organizations to fully leverage the promise of cloud and mobile computing with unparalleled and uncompromising protection and performance. Zscaler delivers unified, carrier-grade internet security, next generation firewall, web security, sandboxing/advanced persistent threat (APT) protection, data loss prevention, SSL inspection, traffic shaping, policy management and threat intelligence.

Please reload

bottom of page