View
Sorting
From A to Z
Companies found: 23
(ISC)²
CHN ...
Vendor
0
(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, (ISC)² offers a portfolio of credentials that are part of a holistic, programmatic approach to security. Our membership, over 125,000 strong, is made up of certified cyber, information, software and infrastructure security professionals who are making a difference and helping to advance the industry.
0
Acunetix
GBR ...
Vendor
0
Acunetix is the leading web vulnerability scanner used by serious fortune 500 companies and widely acclaimed to include the most advanced SQL injection and XSS black box scanning technology. It automatically crawls your websites and performs black box AND grey box hacking techniques which finds dangerous vulnerabilities that can compromise your website and data.
Acunetix tests for SQL Injection, XSS, XXE, SSRF, Host Header Injection and over 3000 other web vulnerabilities. It has the most advanced scanning techniques generating the least false positives possible. Inbuilt vulnerability management helps you prioritize and manage vulnerability resolution.
- In depth crawl and analysis – automatically scans all websites
- Highest detection rate of vulnerabilities with low false positives
- Integrated vulnerability management – prioritize & control threats
- Integration with popular WAFs and Issue Trackers
- Free network security scanning and Manual Testing tools
- Available on premise and online
Altium
USA
Vendor
0
Altium Limited is an Australian owned public software company that provides PC-based electronics design software for engineers. Founded in Tasmania, Australia 1985, Altium now has regional headquarters in Australia, China, United States, Europe, and Japan, with resellers in all other major markets. The company was known as "Protel" until 2001.
Source: https://en.wikipedia.org/wiki/Altium
Check Point
AUT ...
Vendor
Check Point Software Technologies Ltd. is an international provider of software and combined hardware and software products for IT security, including network security, endpoint security, data security and security management.
As of 2016 the company has approximately 3,400 employees worldwide. Headquartered in Tel Aviv, Israel, the company has development centers in Israel, California (ZoneAlarm), Sweden (Former Protect Data development centre), and Belarus. The company has main offices in the United States, in San Carlos, California, in Dallas, Texas, in Ottawa, Ontario, Canada, and Sydney Australia.
Check Point competes in the antivirus industry against AVG, Avira, ESET, F-Secure, Kaspersky, McAfee, Panda Security, Sophos and Symantec among others.
Cisco
AUT ...
Supplier, Vendor
Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, Cisco dominates the Internet Protocol (IP) -based network equipment segment, and also manufactures cybersecurity, video conferencing systems, and other network equipment and software. In addition, Cisco offers a number of cloud services. Cisco's primary customers are large enterprises and telecommunications service providers, but the company also sells products aimed at small businesses and the public sector.
Cisco offers products and services in four categories. The company's infrastructure platforms generate more than half of its revenue. This includes switching devices, routing devices, wireless communications, and data processing solutions. Applications that account for over 10% of revenue are primarily software related to networking and data processing platforms.
Applications include collaboration tools (unified communications, Cisco TelePresence video conferencing) as well as AppDynamics and Internet of Things software. The cybersecurity product category generates more than 5% of the company's revenue and includes network security, email security, identity and access, advanced threat protection, and unified exposure management products. In addition, Cisco offers consulting services.
Cisco's total revenue in fiscal 2020 was nearly $ 50 billion. The company is expanding its research and development (R&D) investments in areas such as the cloud platform, remote collaboration platform, analytics and telecommunications technologies.
CyberArk
All countries
Vendor
CyberArk is an information security company offering privileged account security. The company's technology is utilized worldwide, primarily in the financial services, energy, retail and healthcare markets. As of September 2014, CyberArk had nearly 1,600 customers, including over 30 Fortune 100 companies and approximately 15% of the Global 2000. The company has offices in the US, Israel, UK, France, Germany, the Netherlands, and Singapore, with local sales presence in more than 20 countries.
Cyberoam
All countries
Vendor
0
Cyberoam – a Sophos Company, secures organizations with its wide range of product offerings at the network gateway. Cyberoam leverages the power of multi-core processors, offering enterprise-grade performance, in its appliances.
Cyberoam’s product offerings include:
Cyberoam Network Security Appliances – UTM, NGFW
Cyberoam iView –Intelligent Logging and Reporting
Cyberoam Central Console (CCC)
Cyberoam NetGenie
Cyberoam is led by a strong management team with in-depth experience in the security domain. It has 550 employees with offices in USA, Middle East & India and its R&D and Global Support Management Centre in India.
F5 Networks
All countries
Vendor
F5 Networks, Inc. is a multinational American company that specializes in application delivery networking (ADN) technology that optimizes the delivery of network-based applications and the security, performance, availability of servers, data storage devices, and other network resources. F5 is headquartered in Seattle, Washington, and has development, manufacturing, and sales/marketing offices worldwide. F5 originally manufactured and sold some of the industry's first load balancing products. In 2010 and 2011, F5 Networks was on Fortune's list of 100 Fastest-Growing Companies worldwide. The company was also rated one of the top ten best-performing stocks by S&P 500 in 2010.
Source: https://en.wikipedia.org/wiki/F5_Networks
Forcepoint
All countries
Supplier, Vendor
Forcepoint is an American multinational software corporation headquartered in Austin, Texas USA. The company is a subsidiary of Raytheon Technologies, which currently develops computer security and privacy software, CASB, firewalls and cross-domain solutions, the company is also known as Websense, Raytheon | Websense.
Forcepoint solutions protect users, data and computing networks from attacks, as well as accidental and deliberate information leaks throughout the entire life cycle. Forcepoint protects data everywhere - in the office, on the road, in the cloud. This simplifies regulatory compliance and optimizes the cost of security solutions. Forcepoint allows you to focus on prioritization by automating day-to-day operations.
Forcepoint's clients include Fortune 500 and FTSE 100 leaders: AT&T, Deutsche Telecom, Canon, McDonanld's, UPS, Sheraton, Merill Lynch, Bank of America, PepsiCo Inc. and many others.
gemalto
All countries
Vendor
0
Gemalto is an international digital security company providing software applications, secure personal devices such as smart cards and tokens, and managed services. It is the world’s largest manufacturer of SIM cards.
The company was founded in June 2006 when two companies, Axalto and Gemplus International, merged. Gemalto's 2015 revenue was €3.122 billion. It is listed on both Euronext Amsterdam and Euronext Paris under the symbol GTO.
Gemalto N.V. is a public company incorporated in the Netherlands. It is headquartered in Amsterdam, and has subsidiaries and group companies in several countries. Globally, Gemalto has over 14,000 employees, 118 offices; 17 production sites, 45 personalization centers, and 27 R&D centers in 49 countries.
Source: https://en.wikipedia.org/wiki/Gemalto
Hewlett Packard Enterprise
All countries
Supplier, Vendor
026
The Hewlett Packard Enterprise Company (commonly referred to as HPE) is an American multinational enterprise information technology company based in San Jose, California,[2] founded on 1 November 2015 as part of splitting of the Hewlett-Packard company. HPE is a business-focused organization with two divisions: Enterprise Group, which works in servers, storage, networking, consulting and support, and Financial Services. On 4 December HPE reported FY2018 net revenue of $30.9 billion, up 7% from the prior year period.
Imperva
All countries
Supplier, Vendor
Imperva provides cyber security software and services to protect companies’ sensitive data and application software from both external attacks and internal threats, and to ensure regulatory compliance. Headquartered in Redwood Shores, California, Imperva has more than 4,500 customers and 500 partners in over 90 countries.
IronKey
All countries
Vendor
0
IronKey solutions meet the challenge of protecting today’s mobile workforce, featuring secure USB solutions for data transport and mobile workspaces. The IronKey line includes the world’s leading hardware encrypted USB drives, PC on a Stick™ workspaces for Windows To Go, and cloud-based or on-premise centralized secure device management solutions.
0
McAfee
All countries
Vendor
McAfee is a global organization with a 30-year history and a brand known the world over for innovation, collaboration and trust. The company was founded in 1987 as McAfee Associates, named for its founder John McAfee, who resigned from the company in 1994.
As a leading-edge cybersecurity company, McAfee provides advanced security solutions to consumers, small and large businesses, enterprises, and governments. Security technologies from McAfee use a unique, predictive capability that is powered by McAfee Global Threat Intelligence, which enables home users and businesses to stay one step ahead of the next wave of fileless attacks, viruses, malware, and other online threats. McAfee is: ■ 622 million total endpoints
■ 97 million enterprise endpoints
■ 525 million consumer endpoints
■ 69,000 enterprise customers
■ 7,000 employees
■ 189 countries
■ 151 Security Innovation Alliance partners
■ 80% of Fortune 100 firms
■ 75% of Fortune 500 firms
■ 64% of Global 2000 firms
■ 87% of world’s largest banks
■ 54% of Top 50 retailers
■ 1,550+ security patents worldwide
As a leading-edge cybersecurity company, McAfee provides advanced security solutions to consumers, small and large businesses, enterprises, and governments. Security technologies from McAfee use a unique, predictive capability that is powered by McAfee Global Threat Intelligence, which enables home users and businesses to stay one step ahead of the next wave of fileless attacks, viruses, malware, and other online threats. McAfee is: ■ 622 million total endpoints
■ 97 million enterprise endpoints
■ 525 million consumer endpoints
■ 69,000 enterprise customers
■ 7,000 employees
■ 189 countries
■ 151 Security Innovation Alliance partners
■ 80% of Fortune 100 firms
■ 75% of Fortune 500 firms
■ 64% of Global 2000 firms
■ 87% of world’s largest banks
■ 54% of Top 50 retailers
■ 1,550+ security patents worldwide
Microsoft
All countries
Vendor
Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software products are the Microsoft Windows line of operating systems, Microsoft Office office suite, and Internet Explorer and Edge web browsers. Its flagship hardware products are the Xbox video game consoles and the Microsoft Surface tablet lineup. As of 2011, it was the world's largest software maker by revenue, and one of the world's most valuable companies.
Mojo Networks
All countries
Vendor
0
Mojo Networks simplifies cloud managed WiFi services
Massively scalable self-driving WiFi: built on open hardware, powered by the cloud
Overview: We are revolutionizing WiFi through the power of the cloud and open standards. We liberate networks from proprietary hardware and utilize the full power of the cloud to deliver cognitive WiFi: a self-driving network that makes things remarkably simple and reliable at massive scale. Mojo Network’s innovations empower IT with better user experiences, more options, and more velocity, all at much lower costs.
What Does Mojo Deliver?
COGNITIVE WiFi
Cognitive WiFi harnesses the power of cloud, big data analytics, automation, and self-awareness to deliver a pristine experience to your WiFi users – all the time, in every location, regardless of what devices and applications they’re using. Cognitive WiFi visualizes the quality of experience for every one of your users and automates root cause analysis if network problems do occur. It helps you resolve problems rapidly instead of turning them into a wild goose chase. It even proactively fixes WiFi issues before they occur, but if a user does call the helpdesk with a “WiFi problem,” it tells you exactly what's going on – even if it has nothing to do with WiFi. The network becomes the IT assistant and the focus becomes “mean time to resolution” rather than “mean time to innocence.”
ABSOLUTE CLOUD
We have designed and built the world’s first cloud managed WiFi solution specifically for large enterprise networks. Mojo’s cloud architecture can replace your antiquated controllers and simplify the migration of your infrastructure to the cloud. No more on-premise proprietary controllers. No manual software upgrades to each individual controller. Directly manage networks from anywhere, on any device, anytime with much faster and more seamless response to needs for expansion, new services, and security threats. Automate provisioning of new devices, push configuration changes, upgrade S/W, process KPIs and monitor real-time alerts across thousands of sites through Mojo APIs. Our cloud-based system embodies flexibility because it can be deployed in a public or private cloud and the network never goes down if connectivity to the cloud is lost. Simplicity, scalability, extensibility, reliability, performance, security and all the benefits of the cloud. No trade-offs, no compromises.
OPEN STANDARDS DEVOTION
Open Standards is a guiding principle for everything we do. Customers want more speed and less complexity. Proprietary hardware forces vendor lock-in, reduces customer choice, slows innovation, and inflates costs. Open standards foster increased competition and innovation, which directly lead to vendor products that are better targeted at customer needs. At Mojo, we have already eliminated the proprietary control and management hardware from the WiFi equation and we are hell-bent to solve the other half of the equation: access points. Customers want a world where they can buy the best access point for their application…from anywhere…and manage it the way they want to…all at costs that are fair. Customers are craving an open standard where access points all interoperate like light bulbs. The vendors that sell proprietary access points will come up with a million excuses as to why this is a bad idea. And they are just that, excuses. There is no valid technical reason why access points can’t be made to interoperate and we are driving to make this a reality.
0
Rapid7
ARM ...
Supplier, Vendor
Rapid7 specializes in developing solutions for vulnerability management and penetration testing, helping to gain a complete understanding of the security of information infrastructure.
Rapid7 was founded in 2000. Its founders set themselves the goal of developing the most simple, innovative and comprehensive solutions for assessing the level of cybersecurity of corporate IT infrastructures and searching for vulnerabilities of the entire information ecosystem of the company. The most famous products of the company are Metasploit and NeXpose, they are trusted by thousands
users in almost a hundred countries.
The cloud-based Rapid7 Insight solution collects data from all of the customer's IT assets, making it easier for security teams to manage vulnerabilities, track malicious behavior, and investigate and stop attacks. Through automation and orchestration, Rapid7 Insight frees up resources for IT security professionals to focus on strategic priorities, confident that most cyber threats are identified and stopped in the background. Accordingly, team members can concentrate their efforts only on the most complex attacks and the most critical areas of defense.
Rapid7 was founded in 2000. Its founders set themselves the goal of developing the most simple, innovative and comprehensive solutions for assessing the level of cybersecurity of corporate IT infrastructures and searching for vulnerabilities of the entire information ecosystem of the company. The most famous products of the company are Metasploit and NeXpose, they are trusted by thousands
users in almost a hundred countries.
The cloud-based Rapid7 Insight solution collects data from all of the customer's IT assets, making it easier for security teams to manage vulnerabilities, track malicious behavior, and investigate and stop attacks. Through automation and orchestration, Rapid7 Insight frees up resources for IT security professionals to focus on strategic priorities, confident that most cyber threats are identified and stopped in the background. Accordingly, team members can concentrate their efforts only on the most complex attacks and the most critical areas of defense.
RSA Security LLC
All countries
Vendor
0
RSA Security LLC, formerly RSA Security, Inc. and doing business as RSA, is an American computer and network security company with a focus on encryption and encryption standards. RSA was named after the initials of its co-founders, Ron Rivest, Adi Shamir and Leonard Adleman, after whom the RSA public key cryptography algorithm was also named. Among its products are the RSA BSAFE cryptography libraries and the SecurID authentication token. RSA is known for allegedly incorporating backdoors developed by the NSA in its products. It also organizes the annual RSA Conference, an information security conference.
Founded as an independent company in 1982, RSA Security was acquired by EMC Corporation in 2006 for US$2.1 billion and operated as a division within EMC. When EMC was acquired by Dell Technologies in 2016, RSA became part of the Dell Technologies family of brands.
RSA is based in Bedford, Massachusetts, with regional headquarters in Bracknell (UK) and Singapore, and numerous international offices.
Source: https://en.wikipedia.org/wiki/RSA_Security
Founded as an independent company in 1982, RSA Security was acquired by EMC Corporation in 2006 for US$2.1 billion and operated as a division within EMC. When EMC was acquired by Dell Technologies in 2016, RSA became part of the Dell Technologies family of brands.
RSA is based in Bedford, Massachusetts, with regional headquarters in Bracknell (UK) and Singapore, and numerous international offices.
Source: https://en.wikipedia.org/wiki/RSA_Security
SOC Prime
All countries
Vendor
0
Our mission is to enable Cyber Resilience for any organization worldwide by making Cyber Security Management Effective, Simple and Accessible. Our clients and partners use Security Management Assistance Platform to fundamentally transform the support, confidence, operations and reliability of cyber security products and unlock their full value. We fuse Data Science and Practical security expertise with the best technologies to give you actionable unbiased security insight.
Our Predictive Maintenance service dramatically reduces time needed to operationalize SIEM systems that power SOC operations: support response time is decreased from Days to Minutes (5 minutes vs 2 days vendor SLA). We automate the routine processes of SIEM experts to free up their time to actually act on Threats detection, investigation and response instead of spending most of it on the SIEM systems tuning. This enables TCO reduction, secures the investments into existing security technologies and increases their ROI by producing more timely and accurate intelligence.
The second part of Security Management Assistance is Use Case Library (UCL) – a platform for trusted exchange of SIEM Use Cases, analytical content and incident signatures supporting organizations across the globe with most accurate and up to date means to minimize time to Detect and Respond to Security Incidents. Based on the key principles of Collaborative Defense, UCL provides a reasonable level of security to all participants, regardless of SIEM technology used or budget constraints.
0