CA Technologies (NASDAQ:CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business in every industry. From planning, to development, to management and security, CA is working with companies worldwide to change the way we live, transact, and communicate - across mobile, private and public cloud, distributed and mainframe environments.
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment.
Coronet is the first company that enables any sized organization to fully secure all SaaS and cloud services without any integration or customization, containers or proxies, or other tools that limit users, impact their experience, or inhibit productivity. Requiring zero operator involvement, Coronet’s patented platform continuously identifies risks and threats to ensure that only trusted users, using trusted devices, connecting through trusted networks to trusted cloud services can access corporate data.
Deep Identity is an innovation leader in providing comprehensive and unique solution to address identity governance and administration (IGA), compliance management and data governance requirements. It offers a layered approach that enables better visibility and controls, ultimately automating compliance management in a cost effective manner. It provides business with the relevant reporting and analytics to improve IT security, maintain compliance and eventually minimize business risk. Deep Identity has been rated consistently very well by leading industry and technology analysts for its innovation and niche solution offering.
As one of the world’s fastest growing DDI vendors, EfficientIP helps organizations drive business efficiency through agile, secure and reliable network infrastructures. Our unified management framework for DNS-DHCP-IPAM (DDI) and network configurations ensures end-to-end visibility, consistency control and advanced automation. Additionally, our unique 360° DNS security solution protects data confidentiality and application access from anywhere at any time. Companies rely on us to help control the risks and reduce the complexity of challenges they face with modern key IT initiatives such as cloud applications, virtualization, and mobility.
Enzoic is focused on account takeover (ATO) prevention for employees and customers. Through our APIs and Active Directory plugin, we monitor billions of accounts to reduce risk without adding onerous user-friction to authentication or login.
Compromised credentials remain a large risk for most organizations and the attackers are getting more sophisticated each year. Enzoic was created as a streamlined solution to detect compromised credentials with minimal friction for end users.
Enzoic for Active Directory enables real-time password policy enforcement with daily password auditing and automated remediation. With compromised password detection, custom password dictionary, fuzzy matching with common character substitutions, and continuous ongoing monitoring; enterprises can easily adopt NIST password requirements and eliminate vulnerable passwords in Active Directory.
FireMon is the No.1 provider of Intelligent Security Management solutions worldwide, combining advanced benchmarking, simulation, and analysis to deliver next generation security intelligence. Since creating the first-ever network security management solution 15 years ago, FireMon solutions have continued to deliver visibility into and control over complex network security infrastructure, policies, and risk to over 1,500 customers around the world. Using the FireMon Intelligent Security Management platform, today's leading enterprise organizations, government agencies, and managed security providers have dramatically improved effectiveness of network defenses, accelerating business agility optimizing return on investment.
As a leading network security and acceleration solution provider in Asia and Pacific region, Greypanel benefits to public sectors, small and medium business as well as large enterprises with advanced network solutions. By developing intelligent system and partnering with leading IDCs globally, Greypanel provides comprehensive cloud security solutions to protect networks away from attacks and threats while speed up end user accessing websites as well as mobile applications.
Kemp powers always-on application experience (AX) for enterprises and service providers. Leveraging an agile per-app consumption model with unlimited throughput, predictive application analytics and automated issue resolution, Kemp is simplifying how customers optimize, analyze and secure their applications across private and multi-cloud environments. With pay-as-you-go metered licensing and centralized multi-cloud visibility into third-party ADC/load balancing infrastructure, customers can easily augment or replace their legacy load balancers to dramatically reduce infrastructure costs. Kemp is trusted to power application experience for more than 25,000 customers and more than 60,000 application deployments in 115 countries. Take control of your application experience at kemp.ax.
KIQ Cloud is a cloud-based, omni-channel knowledge management solution designed to simplify and centralise the organising and sharing of knowledge. KIQ Cloud makes it easy for teams and individuals to find the right information, exactly when they need it, and provides direction for work flows, processes and compliance. Perfect for businesses that operate customer contact centres, service desks, front-line offices or online self-service channels. KIQ Cloud was built to deliver improved employee productivity and deliver exceptional customer experience. Implement KIQ Cloud across your business to fill knowledge gaps in every department and mitigate errors.
Simplifying how people interact with each other and the world around them to drive meaningful insight, deeper relationships and better outcomes for all has helped LogMeIn grow to become one of the world’s top 10 SaaS companies with a leadership position in every one of our markets.
With a platform that supports tens of millions of daily users, over a billion customer interactions and twenty billion voice minutes per year, we have not only capitalized on but helped invent the modern way of working – flexible, dispersed, mobile, efficient and productive.
Our easy-to-use products are adopted by professionals and leveraged by small to medium-sized businesses the world over who are looking for increased insight into their customers' journeys, simpler internal and external collaboration, and a more empowered workforce.
NETconsent Ltd is a worldwide leading software vendor of compliance and communications software that automates the policy management life-cycle, delivers e-learning content and promotes user awareness. By making content more visible and enforceable we help public and private sector clients to raise standards of individual accountability and conduct among their employees, contract suppliers and partners. NETconsent Ltd is a UK company based in Fleet.
Network Critical was established in 1997 by Alastair Hartrup to fulfil a market need for a better way to access network data traffic. Today, Network Critical is the leader in Access Technology Solutions, with award-winning, innovative products designed for the compliance era. A global company, Network Critical leads the network monitoring industry with constant innovation and unique modular design. Our technology ensures 100% continuous network visibility and ZERO packet loss. Our products eliminate any concerns of downtime while adapting to the configuration of your network and scaling alongside growth.
Penta Security Systems Inc.
Penta Security Systems Inc. is Korea-based leading provider of application security software and core technology, with more than 1,000 installed customers. Established in July 1997, Penta Security Systems holds the highest level of technology expertise and abundant experience in key areas of information security. Incorporated in 2009, its Japanese subsidiary Penta Security Systems K.K is now focusing its efforts on satisfying the application-level security needs and requirements of organizations throughout Japan and globally.
Founded in 2013, with its sales headquarter in San Francisco, USA and R&D office in Ankara, TR, Picus Security Inc. offers a unique Breach & Attack Simulation (BAS) Platform to enable business driven & agile security operations. Picus’ vision is to build an end-to-end easy-to-deploy BAS to help enterprises enhance their security posture by simulating attacks and tuning existing controls. Picus Security is also one of the representative BAS Vendors featured in several Gartner reports such as BAS Market Report, Market Guide for Vulnerability Assessment and Hype Cycle for Threat Facing Technologies.
ReaQta-Hive is an Endpoint Threat Response platform powered by A.I., capable of detecting new and previously unknown threats, ranging from simple ransomeware to more sophisticated non-malware attacks like file-less and in-memory ones. A unique NanoOS offers an unprecedented level of detail to the analysts and, at the same time, a barrier extremely difficult to overcome for the attackers. Two different sets of engines apply state-of-the-art machine learning to applications’ behaviors, automatically alerting about active or emerging threats without need for prior knowledge of the attacks. This signature-less approach, combined with an A.I. driven behavioral analysis, ensures that threats are detected independently of their delivery techniques and payload types. ReaQta-Hive offers full visibility over the infrastructure, allowing real-time queries to the endpoints, extended searches for both IOCs and behavioral indicators, together with advanced data-mining for discovery of dormant threats. ReaQta-Hive can be configured in detection, protection or hybrid mode to suit the needs of every organization, offering a high level of flexibility while remaining always simple and easy to use.
Since 2006, SecureArk’s GovOps and StrikeForce teams have provided Industry Standard Audits, Assessments and Managed Cyber Security Services that gave our clients the security and performance assurances as they transact in the cyber world.
StrikeForce is a suite of elite services performed by a highly skilled global team of certified and licensed cybersecurity experts. The Global StrikeForce Security Assessments evaluate the technical controls associated with people, process and technology to provide visibility into current risk, threat and compliance profiles.
SEQRITE is Quick Heal's Enterprise Security brand. Our enterprise security tools and other state-of-the-art cybersecurity solutions proactively safeguard IT assets of businesses and respond against cyber-attacks, comply with regulatory and compliance frameworks. In addition, SEQRITE’s enterprise security services include governance & risk assessments, Cyber Threat Intelligence, Cyber Incident Response and managed cybersecurity services.
SEQRITE offers a highly advanced range of enterprise security solutions to protect your organisation’s most critical data. We are one of the leading information technology (IT) security companies for Corporates, PSUs, Government and Law Enforcement agencies around the world.
SSH Communications Security
Founded in 1995, SSH Communications is the company that invented the SSH protocol - the gold standard protocol for data-in-transit security solutions. Today, over 3,000 customers across the globe, including 7 of the "Fortune 10", trust our Information Integrity Platform to secure the path to their information assets. We enable and enhance business for thousands of customers in multiple industries in the private and public sectors around the world. We operate in the Americas, Europe, and APAC regions, with headquarters located in Helsinki, Finland. The company holds 15 patents and its shares are quoted on the NASDAQ OMX Helsinki.
Stratus Technologies is the leading provider of infrastructure based solutions that keep applications running continuously in today’s always-on world. Stratus enables rapid deployment of always-on infrastructures—from enterprise servers to clouds—without any changes to applications. Stratus’ flexible solutions—software, platform and services—prevent downtime before it occurs and ensure uninterrupted performance of essential business operations.
Wedge Networks™ is revolutionizing real-time network security with cutting edge innovation, performance, and scale. Embracing global innovation, Wedge’s Cloud Network Defense™ (WedgeCND™) and Absolute Real-Time Protection (WedgeARP™) Series of products integrate and orchestrate the industry’s highest performance security inspection and mediation engines with best-in-class security technologies developed by Wedge and third parties. Purpose-built as fully virtualized security systems, these products can be deployed in the form of x86 appliances, virtual machines, or cloud application software. Today, these industry-leading solutions block security threats for tens of millions of end users in enterprise, service provider, government agency, and security-as-a-service networks spanning more than 17 countries. Wedge Networks is headquartered in Calgary, Canada with international teams in USA, Asia Pacific, and the Middle East, and Africa regions.