CA Technologies (NASDAQ:CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business in every industry. From planning, to development, to management and security, CA is working with companies worldwide to change the way we live, transact, and communicate - across mobile, private and public cloud, distributed and mainframe environments.
Coronet is the first company that enables any sized organization to fully secure all SaaS and cloud services without any integration or customization, containers or proxies, or other tools that limit users, impact their experience, or inhibit productivity. Requiring zero operator involvement, Coronet’s patented platform continuously identifies risks and threats to ensure that only trusted users, using trusted devices, connecting through trusted networks to trusted cloud services can access corporate data.
Deep Identity is an innovation leader in providing comprehensive and unique solution to address identity governance and administration (IGA), compliance management and data governance requirements. It offers a layered approach that enables better visibility and controls, ultimately automating compliance management in a cost effective manner. It provides business with the relevant reporting and analytics to improve IT security, maintain compliance and eventually minimize business risk. Deep Identity has been rated consistently very well by leading industry and technology analysts for its innovation and niche solution offering.
Deep Instinct™ is the first company to apply deep learning to cybersecurity. Leveraging deep learning's predictive capabilities, Deep Instinct's on-device, proactive solution protects against zero-day threats and APT attacks with unmatched accuracy. Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization's endpoints, servers, and mobile devices. Deep learning's capabilities of identifying malware from any data source results in comprehensive protection on any device, any platform, and operating system. Deep Instinct is headquartered in Tel Aviv, Israel and has offices in San Francisco, CA.
As one of the world’s fastest growing DDI vendors, EfficientIP helps organizations drive business efficiency through agile, secure and reliable network infrastructures. Our unified management framework for DNS-DHCP-IPAM (DDI) and network configurations ensures end-to-end visibility, consistency control and advanced automation. Additionally, our unique 360° DNS security solution protects data confidentiality and application access from anywhere at any time. Companies rely on us to help control the risks and reduce the complexity of challenges they face with modern key IT initiatives such as cloud applications, virtualization, and mobility.
FireMon is the No.1 provider of Intelligent Security Management solutions worldwide, combining advanced benchmarking, simulation, and analysis to deliver next generation security intelligence. Since creating the first-ever network security management solution 15 years ago, FireMon solutions have continued to deliver visibility into and control over complex network security infrastructure, policies, and risk to over 1,500 customers around the world. Using the FireMon Intelligent Security Management platform, today's leading enterprise organizations, government agencies, and managed security providers have dramatically improved effectiveness of network defenses, accelerating business agility optimizing return on investment.
Kemp powers always-on application experience (AX) for enterprises and service providers. Leveraging an agile per-app consumption model with unlimited throughput, predictive application analytics and automated issue resolution, Kemp is simplifying how customers optimize, analyze and secure their applications across private and multi-cloud environments. With pay-as-you-go metered licensing and centralized multi-cloud visibility into third-party ADC/load balancing infrastructure, customers can easily augment or replace their legacy load balancers to dramatically reduce infrastructure costs. Kemp is trusted to power application experience for more than 25,000 customers and more than 60,000 application deployments in 115 countries. Take control of your application experience at kemp.ax.
NETconsent Ltd is a worldwide leading software vendor of compliance and communications software that automates the policy management life-cycle, delivers e-learning content and promotes user awareness. By making content more visible and enforceable we help public and private sector clients to raise standards of individual accountability and conduct among their employees, contract suppliers and partners. NETconsent Ltd is a UK company based in Fleet.
Network Critical was established in 1997 by Alastair Hartrup to fulfil a market need for a better way to access network data traffic. Today, Network Critical is the leader in Access Technology Solutions, with award-winning, innovative products designed for the compliance era. A global company, Network Critical leads the network monitoring industry with constant innovation and unique modular design. Our technology ensures 100% continuous network visibility and ZERO packet loss. Our products eliminate any concerns of downtime while adapting to the configuration of your network and scaling alongside growth.
Penta Security Systems Inc.
Penta Security Systems Inc. is Korea-based leading provider of application security software and core technology, with more than 1,000 installed customers. Established in July 1997, Penta Security Systems holds the highest level of technology expertise and abundant experience in key areas of information security. Incorporated in 2009, its Japanese subsidiary Penta Security Systems K.K is now focusing its efforts on satisfying the application-level security needs and requirements of organizations throughout Japan and globally.
Founded in 2013, with its sales headquarter in San Francisco, USA and R&D office in Ankara, TR, Picus Security Inc. offers a unique Breach & Attack Simulation (BAS) Platform to enable business driven & agile security operations. Picus’ vision is to build an end-to-end easy-to-deploy BAS to help enterprises enhance their security posture by simulating attacks and tuning existing controls. Picus Security is also one of the representative BAS Vendors featured in several Gartner reports such as BAS Market Report, Market Guide for Vulnerability Assessment and Hype Cycle for Threat Facing Technologies.
ReaQta-Hive is an Endpoint Threat Response platform powered by A.I., capable of detecting new and previously unknown threats, ranging from simple ransomeware to more sophisticated non-malware attacks like file-less and in-memory ones. A unique NanoOS offers an unprecedented level of detail to the analysts and, at the same time, a barrier extremely difficult to overcome for the attackers. Two different sets of engines apply state-of-the-art machine learning to applications’ behaviors, automatically alerting about active or emerging threats without need for prior knowledge of the attacks. This signature-less approach, combined with an A.I. driven behavioral analysis, ensures that threats are detected independently of their delivery techniques and payload types. ReaQta-Hive offers full visibility over the infrastructure, allowing real-time queries to the endpoints, extended searches for both IOCs and behavioral indicators, together with advanced data-mining for discovery of dormant threats. ReaQta-Hive can be configured in detection, protection or hybrid mode to suit the needs of every organization, offering a high level of flexibility while remaining always simple and easy to use.
SSH Communications Security
Founded in 1995, SSH Communications is the company that invented the SSH protocol - the gold standard protocol for data-in-transit security solutions. Today, over 3,000 customers across the globe, including 7 of the "Fortune 10", trust our Information Integrity Platform to secure the path to their information assets. We enable and enhance business for thousands of customers in multiple industries in the private and public sectors around the world. We operate in the Americas, Europe, and APAC regions, with headquarters located in Helsinki, Finland. The company holds 15 patents and its shares are quoted on the NASDAQ OMX Helsinki.
Stratus Technologies is the leading provider of infrastructure based solutions that keep applications running continuously in today’s always-on world. Stratus enables rapid deployment of always-on infrastructures—from enterprise servers to clouds—without any changes to applications. Stratus’ flexible solutions—software, platform and services—prevent downtime before it occurs and ensure uninterrupted performance of essential business operations.
Wedge Networks™ is revolutionizing real-time network security with cutting edge innovation, performance, and scale. Embracing global innovation, Wedge’s Cloud Network Defense™ (WedgeCND™) and Absolute Real-Time Protection (WedgeARP™) Series of products integrate and orchestrate the industry’s highest performance security inspection and mediation engines with best-in-class security technologies developed by Wedge and third parties. Purpose-built as fully virtualized security systems, these products can be deployed in the form of x86 appliances, virtual machines, or cloud application software. Today, these industry-leading solutions block security threats for tens of millions of end users in enterprise, service provider, government agency, and security-as-a-service networks spanning more than 17 countries. Wedge Networks is headquartered in Calgary, Canada with international teams in USA, Asia Pacific, and the Middle East, and Africa regions.