Find a Partner

Back Home

Partner Listing

Carbon Black’s partner community offers a new era of endpoint security by enabling organizations to disrupt advanced attacks, deploy the best prevention strategies for their business, and leverage the expertise of 10,000 professionals shifting the balance of power back to security teams.

To locate a Carbon Black Partner, select the options to the right to filter the list. If you don’t find what you are looking for, please contact us.

To learn more about becoming a partner, see our Carbon Black Partner Program.

Results Below

Access IT Group, Inc.

AccessIT Group is a premier provider of IT security and infrastructure technologies ranging from security policy and solution design to security solution installation and implementation. We provide enterprise level products and services for both regional and global companies, and our engineers maintain the highest level of certification for the products and services we provide.

Accordant

Accordant is a rapidly growing IT firm based in Brentwood, TN focused on helping mid-market and enterprise companies provide a 5 star user experience with virtualization, security and cloud hosting. We provide sales and support for best-of-breed products for server and desktop virtualization, work space management, storage and end-point security with a fundamental commitment to customer service.

Active Canopy

Active Canopy Inc.’s managed Cybersecurity as a Service (CyaaS) platform is designed to provide businesses with expert cybersecurity analytic support and active defense against a full spectrum of advanced cyber threats. Cybersecurity threats are evolving in complexity and frequency, leaving companies’ sensitive data and business operations vulnerable to attack and disruption. Active Canopy addresses this security gap with our active cloud-based service, which extends beyond virtual networks into the physical network environment. The Active Canopy CyaaS platform delivers cyber-expert analytics and big-data scalability at an affordable reach.

Adaptive

Adaptive Communications is the Northeast’s leading provider of customized, robust and flexible IT Infrastructure and Information Security solutions.

Advanced Threat Analytics

Advanced Threat Analytics provides a zero infrastructure cloud based security service that virtually eliminates malware while enabling effective detection and response to breaches when prevention fails.  We use a combination of cyber security experts, next generation security tools, and proprietary processes to help organizations measurably improve their security effectiveness without impacting users or adding complexity.  Advanced Threat Analytics continuously monitors your endpoints both ON and OFF your network.  We block access to malware, exploit, and botnet sites across all Internet access points without any hardware or network devices. By using DNS and a virtually invisible 3 MB endpoint client, we leverage the cloud to implement our solution for clients in less than a day.  For organizations with resource constraints, our cyber security analysts can provide tier 1 analysis and incident response retainers.

AE Business Solutions

AE Business Solutions is a leading IT Integration and Consulting Company serving enterprise organizations throughout the Midwest.

Our mission is to provide our clients with the right combination of information technology and people to deliver innovative solutions that create a competitive advantage for their organization.

When you invest in technology or consulting with AE Business Solutions, you gain a partnership with a company that is dedicated to your success and committed to the long-term support and service of your technology investment.

Alien Vault

AlienVault’s mission is to enable organizations with limited resources to accelerate and simplify their ability to detect and respond to the growing landscape of cyber threats. Powered by threat intelligence from AlienVault Labs and the AlienVault Open Threat Exchange—the world’s largest crowd‐sourced threat intelligence network — AlienVault USM delivers a unified, simple and affordable solution for threat detection, incident response and compliance management. For more information, visit: alienvault.com

Allegheny Digital

Operational threats are dynamic and evolving, is your incident response program changing with the times? Allegheny Digital can help. Our team has extensive experience collaboratively assisting clients with rapidly responding to attacks, assessing the impact, and managing when and how to engage regulatory driven notification processes. Our services include Incident Response, IR Plan Development, Reverse Engineering, and Endpoint Threat Monitoring.

Alpine Security

Alpine Security is a computer security company that understands that security is never a turnkey solution. We take a holistic approach,evaluating our clients’ needs to develop a comprehensive solution with quantifiable results. Alpine Security provides services covering every facet of computer and network security, ranging from full assessments to incident response to specialized cyber security training.

Anomali

Anomali delivers earlier detection and identification of adversaries in your organization’s network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.

To learn more, visit www.anomali.com

Apollo Information Systems, Corp.

Apollo Information Systems goes the extra mile to make sure your business is empowered to succeed. That’s more than a nice slogan by the way. We really mean it and our customers know it’s true because we back up that promise every single day

Our specialty is in the world of emerging technologies, focusing on security and networking. We’ve discovered our greatest strength comes from listening to you. We take the time to understand your business needs and then we go above and beyond to help create innovative solutions designed with your business goals in mind.

ASystech

ASysTech Inc., a Microsoft partner for over 20 years, is a full service Managed IT Service provider with service offerings that range from project management, consultation to network and desktop support.

ATB Techsoft Solutions

We are a group of highly trained professional experts offering IT and allied services including consultancy services, with commitment to high standards of value added customer service. Our major strength lies in bringing solutions to every day’s problems encountered in the work place by our clients and deploying our highly resourceful and dynamic team to providing solutions.

Atlantic Data Security

Atlantic is all about security. Since 1993, Atlantic has worked with both large enterprises and SMB companies. Organizations have come to rely on both our years of security knowledge/experience as well as our strong relationships with our vendors and suppliers. Atlantic’s strict focus ensures that our customers receive the highest level of both service and support.

Attivo Networks

Attivo Networks® is the leader in deception for cybersecurity defense, providing real-time detection and forensic analysis of in-network threats and solutions for continuous threat management and incident response. The Attivo ThreatMatrix Deception Platform detects stolen credentials, ransomware, man-in-the-middle, and targeted attacks within user networks, data centers, clouds, SCADA, and IoT environments by deceiving an attacker into revealing themselves. Comprehensive attack analysis, actionable alerts, and 3rd party integrations empower accelerated incident response and staff resource efficiency. 

Find out more at www.attivonetworks.com

Blue Coat Systems

Blue Coat is a leader in enterprise security, providing on-premise, hybrid and cloud-based solutions for protecting web connectivity, combating advanced threats and responding to security breaches. Blue Coat is the global market leader in securing connection to the web and counts nearly 80 percent of the Global Fortune 500 as its customers. For more information, please visit www.bluecoat.com

Blue Turtle Security

As one of South Africa’s leading enterprise technology management companies, you are assured focused IT and Service Management solutions in the areas of  Technology Business Management, Information Management, Application Management, Infrastructure and Operations as well as IT Risk and Security– which will cover your company’s requirements of: Governance; Service and Infrastructure Management; Monitoring; Security; Configuration; Application and Workspace Management.

BrightPoint Security

BrightPoint Security provides a Threat Intelligence Platform that automates the process of collecting, analyzing, correlating and securely sharing structured and unstructured machine‐readable information on current and emerging cyber threats. The BrightPoint Sentinel Platform dramatically increases operational efficiency by reducing the time it takes enterprises to identify and remediate security threats. BrightPoint enables secure and anonymous sharing and ensures control and protection of threat data. BrightPoint reduces discovery time, remediation time, and overall risk to cyber‐threats. For more information, visit: brightpointsecurity.com

BTB Security

BTB Security’s Rapid Advanced Detection And Response (RADAR) service provides a powerful component to the defensible security program, giving clients the ability to quickly detect and respond to threats with agility and expertise with no blind spots. As part of a security infrastructure, RADAR provides a comprehensive alternative to traditional security monitoring infrastructure or services to provide highly actionable, verified threat information. RADAR not only includes the technology required to perform advanced monitoring, detection, and response, but skilled expertise to ensure that only real threats and malicious activity are reported and acted upon. Complete visibility into your environment, providing a cost-effective service that helps you sleep at night. RADAR requires no investment in infrastructure, and is what you’ve been waiting for if you’ve been trying to cobble together an expensive and complicated defense-in-depth infrastructure with tools, resources, and processes.

CDW

CDW is a leading provider of integrated information technology solutions in the U.S. and Canada. CDW helps small, medium and large business, government, education and healthcare customers by delivering critical solutions to their increasingly complex IT needs. A Fortune 500 company, CDW has a broad array of offerings, ranging from discrete hardware and software products to integrated IT solutions such as mobility, security, data center optimization, cloud computing, virtualization and collaboration.

Cerge

Cerge knows that no two businesses are alike, so we refuse to offer a one-size-fits-all technology solution. We work hard to understand our partners’ specific businesses and challenges, and then devise a calculated IT strategy taking into account size, budget, objectives, and vision. At our core, we’re about long-term partnerships over quick fix contracts, reliability over flashiness, integrity over profit, and respect above everything. We are fueled by complex technology challenges and look forward to each and every one.

With 24/7 support, our partners can lean on us whenever they need to so they can focus on what’s really most important to them, (which we ironically somehow don’t think is IT).

Check Point

Check Point Software Technologies is the largest pure‐play security vendor globally, provides industry‐leading solutions, and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises’ networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes. For more information, please visit www.checkpoint.com

Cimation

Cimation is a leading operations consulting company delivering secure technology solutions to the global energy industry. Our experienced team of engineers, consultants, and project managers delivers a wide range of technology solutions that combine Automation, Industrial Information Technology, Enterprise Data Solutions, andCyber Security to improve operational efficiency for clients in all segments of the energy industry.

Headquartered in Houston, TX and with offices throughout North America and Europe, Cimation’s global Cyber Security team focuses solely on protecting industrial control systems (ICS) in the process control domain.Thanks to our in-depth knowledge of industrial processes and technology, we serve as a leading provider of industrial cyber security consulting, network engineering, endpoint remediation, and system hardening for companies in various states of maturity. Our relationships with dozens of product vendors and our extensive project delivery experience empower us to design and implement comprehensive programs that best suit each client’s unique business objectives and technology infrastructure.

Cipher

Founded in 2000, CIPHER is a global information security company that delivers a wide range of proprietary products and services, supported by the best in class security intelligence lab – CIPHER Intelligence.

With offices in North America, Europe and Latin America, partners in 12 countries, 24×7 security operations centers (SOCs) and R&D laboratories in different continents, CIPHER customers consist of world-renowned enterprises and government agencies with countless success cases.

CipherTechs, Inc.

CipherTechs, Inc is a privately held information security services provider. We focus on delivering security solutions for businesses harnessing the power of Internet communications. We audit, design and implement information security solutions in areas of IP networking, firewalls, application security, risk assessment, traffic monitoring, encryption, redundancy and strong authentication.

Our corporate mission is to deliver an unparalleled level of information security expertise. Our experience, strategic partnerships and research allow us to create superior solutions. Deciphering security requires the successful transfer of information, knowledge and technology to enable customers to deploy control and reduce risk.

Cirosec

Cirosec is a leading security consulting and integration company in Germany. Cirosec focuses on innovative security technologies, including data security, IT forensics, vulnerability management and large scale security projects.

 

Click Security

Click Security provides automated security response to amplify your people, processes, and technology with analytical intelligence that rapidly detects, investigates, and resolves advanced cyber threats. For more information, please visit www.clicksecurity.com.

Comm Solutions

Comm Solutions is an end to end technology solutions provider specializing in the design, development, deployment and support of enterprise level solutions in the corporate, education, government and healthcare markets. For the last thirty years we have been in the network services business and have grown our business by listening to the needs of our clients and responding with technical innovation and service excellence.

CompuNet Inc.

CompuNet, Inc. is a leading value-added reseller (VAR) and managed service provider for information technology solutions, with 8 offices in the Northwest and headquartered in Meridian, Idaho.  Our approach is to understand our clients’ business needs, engineer IT solutions that precisely fit those needs, and deploy those solutions on time and on budget. In other words, we strive to create technology solutions that are a perfect fit with what you want to accomplish today and tomorrow.

Content Security

Content Security is Australia’s leading IT security consulting firm. Spanning over 800 customers across Australia, Content Security helps organisations better manage security risks and enables a safe and shielded business environment. We do this by not only delivering the most advanced solutions, but by helping our clients develop a security framework where our consultants provide expert advice in security compliance and engineering.

Context Information Security

Context was launched in 1998 and has a client base including some of the world’s most high profile blue chip companies, alongside government organisations. An exceptional level of technical expertise informs all our work, while a comprehensive approach means we can help clients attain a deeper understanding of security vulnerabilities, threats or incidents. Our strong track record is based above all on the technical skills, professionalism, independence and integrity of our consultants.

Corvil

Corvil safeguards business in a digital world. Corvil Security Analytics is the most granular real-time network threat detection and forensics platform available. All attacks traverse the network at some point. Corvil identifies malicious activity as it is happening and provides organizations with unequaled visibility and context to detect threats faster, to respond faster, and to streamline forensic investigations. Every packet, every microsecond – live and retrospective.

Critical Start

Critical Start is a dedicated security company with the goal to cost effectively improve the security capabilities of our customers.  While focused on security services, we also resell a limited set of security products.  We tend to deeply engage with our clients and seek to understand their long term security strategy.  With an understanding of a client’s current security posture and long term strategy, we are in a great position to help them improve their security capability.  We take a framework approach to security called the Defendable Network that influences everything we do.

Cybersafe Solutions

Cybersafe is a trusted adviser and partner to a wide range of clients including retail, private equity firms, investment firms, publicly traded corporations, and healthcare institutions. We work with our clients to assess their cyber security risks and implement pragmatic solutions.

Cyphort

The Cyphort Advanced Threat Defense Platform detects advanced malware, prioritizes remediation and automates containment. Cyphort customers benefit from early and reliable detection and fast remediation of breaches across their infrastructure. Cyphorts’ unique approach combines best‐in‐class malware detection with the knowledge of threat severity, value of targeted user and assets, and malware lifecycle to prioritize threats that matter to you while suppressing the noise. For more information, please visit www.cyphort.com

Damballa

Damballa is a network security monitoring system that provides evidence of threat‐related activity needed to prevent data theft. They discover criminal operators that have already bypassed perimeter defenses and pose a business risk. Their automated system works in real‐time and over time regardless of the attack vector, device type or OS. Attackers may take time to reveal themselves and when they do, Damballa will expose them and initiate mitigation. Damballa’s patented solutions leverage Big Data from one‐third of the world’s Internet traffic, combined with machine learning, to automatically discover and terminate criminal activity, stop data theft, minimize business disruption, and reduce the time to response and remediation. For more information, visit: www.damballa.com

Datastream

Datastream is a business IT consulting firm oriented to provide solutions on application control, application acceleration, and Web 2.0 enablement within medium and large sized accounts in Mexico.

Dataway

For over 20 years, Dataway has been dedicated to designing, implementing, and supporting customized network security solutions for our customers.  Dataway’s seasoned network engineers engage with our clients as trusted advisors to help develop long-term security strategies.  We use our global reach and international presence to provide our clients with 24x7x365 support and access to top-tier engineering talent.

Datum-System

Datum-System (Connect Your Life), provides world-class solutions and professional services in Jordan and all over the Middle East, including Networking, Network Security, UTM and Infrastructure.

Dell SecureWorks

 

Employing proprietary CTU Endpoint Intelligence technology, the Dell SecureWorks Advanced Endpoint Threat Detection service gives you the earliest possible warning that your endpoints may be hosting an advanced adversary. The fully managed service heightens your security situational awareness by warning you when endpoints may have been compromised and, by accessing extensive intelligence on threat actors and actor tradecraft, accelerates incident response by pinpointing exactly which systems are compromised, how they were compromised, and how you can repair them. The Advanced Endpoint Threat Detection service works by utilizing lightweight sensors across your servers, laptop and desktop devices. The sensors continuously monitor registry, file system, process tables, memory and other areas of operation for signs of compromise. The “always-on” nature of the solution gives you the earliest possible warning when threat indicators are detected.

Demisto

Demisto helps Security Operations Centers scale their human resources, improve incident response times, and capture evidence while working to solve problems collaboratively. Demisto Enterprise is the first comprehensive, Bot-powered Security ChatOps Platform to combine intelligent automation with collaboration. Demisto’s intelligent automation is powered by DBot which works with teams to automate playbooks, correlate artifacts, enable information sharing and auto document the entire incident lifecycle. Demisto is backed by Accel and has offices in Silicon Valley and Tel Aviv.  For more information visit www.demisto.com

Digital Hands

CYPOINT™ from Digital Hands is a fully managed, integrated endpoint threat detection and response solution. CYPOINT™ effectively combines decades of security analytics, global threat intelligence, and world-class detection algorithms to eliminate alert fatigue and enable rapid breach response, containment, and remediation. CYPOINT™ is an integral part of CYGUARD™, Digital Hands’ comprehensive security service for enterprise networks, applications, users, data and endpoints. CYGUARD™ enables the intelligent flow of data across all IT, Security Operations, and Incident Response. Deployed virtually, on premise, or in the cloud – CYGUARD™ protects the networks of some of the world’s largest organizations helping them better detect potential threats while significantly lowering their mean detection and remediation times.

Digits LLC

With offices in Buffalo, NY, Rochester, NY and Cleveland, OH, our core business is designed to help our clients take full advantage of today’s information technologies while guarding against the ever-changing threats posed by those very technologies. DIGITS was founded in 2006 to fill the need in the legal and corporate communities for highly skilled digital forensic services, incident response services, information security services, network security advisory services, and corporate computer investigations.

DirSec Inc.

Established in 2001, as a Network Security Integrator to Enterprise and Small to Medium Business throughout the Central and Rocky Mountain regions of the U.S., DirSec provides comprehensive consulting services, successful core/edge security solutions, assessments, and implementation services to help customers meet today’s IT and business challenges.  As a premier solution provider, we custom tailor systems and solutions to fit current computing needs and your future business goals. By focusing on long-term relationships, DirSec provides critical security technologies and services that protect vital information with the goal of becoming a Trusted Advisor.

Disruptive Solutions

Disruptive Solutions is an employee and Veteran-owned Small Business focused on providing incident response and forensic services to both Government and Commercial customers.

Dubex

Dubex is Denmark’s leading business focused IT security specialist since 1997 We help private and public organisations manage risk, adapt to change and grow more flexibly. We are ISO 27001:2013 certified in the area of information security and have deep industry and technical expertise, a comprehensive product portfolio and a proven track record.

DUO

Duo NZ Ltd is one of the fastest growing VAD’s (Value Added Distributor) in IT Security Solutions in New Zealand. Duo has been servicing the commodity market for 18 years and branched into Security 8 years ago, now represents major brands such as Check Point Technologies, Arbor Networks, AlienVault, InfraScale, & HP Enterprise Security.  Duo is recognised for outstanding customer service, knowledge and delivery of solutions across Tier 1 Partners and the Enterprise/Govt Markets. Co-Founder, Kendra Ross, is also co-founder of 1stTuesday, now NZ’s largest InfoSec Network, with over 400 members across NZ.

DVV Solutions

DVV Solutions, finding answers to today’s complex information centric problems.

DVV Solutions have been working with our customers to reduce information risks since 1999, DVV Solutions pride themselves on having scalable solutions to meet most customers needs.

With a best-of-breed vendor portfolio, highly skilled Security Consultants, Engineers, and a Service Support Desk second to none, we are confident of being able to provide a solution to your problem.

Edvance Technology

Edvance Technology (Hong Kong) Limited is a distributor of leading network and security technologies. By combining diverse expertise in strategy, design and technology, Edvance creates business solutions that enable enterprises to strengthen and protect their competitive advantage. Ultimately, the solutions provide companies with opportunities to increase revenues.

Encode

ENCODE is a premier provider of Advanced Cyber Threat Management and MSSP solutions with expertise across vertical industries and security technology. ENCODE’s clients includes major commercial companies, banks and telecom organizations across the world supporting them throughout their security life-cycle in mitigating e-risks without reducing the agility of their business. ENCODE is certified against ISO-9001, ISO-27001 /BS7799 standards and is a PCI QSA/ASV certified security provider with offices in London, Dubai and Athens.

Enterprise Consulting Group

The Enterprise Consulting Group is a St. Louis-based premier provider of high-end IT Infrastructure solutions. Our strategy of infrastructure-only concentration, allows our team of highly skilled engineers to focus on the computing and network foundation best suited to run your business and mission-critical systems.

eSentire

eSentire® provides managed detection and response services to mid-sized organizations, keeping them safe from constantly evolving cyber attacks that traditional security defenses simply can’t detect. Delivering an unmatched, premium-level service, eSentire protects more than $3.2 trillion in Assets under Management (AuM) and is the award-winning choice for security decision-makers.

Exabeam

Exabeam is a user behavior analytics solution that leverages existing log data to quickly detect modern cyber attacks, prioritize security incidents, and accelerate effective response. Exabeam’s Stateful User Tracking automatically creates a complete timeline of every event and anomaly tied to an attack ‐‐ across devices, IP addresses, and credentials and uses that timeline to assess risk and automate many tasks of incident response. As a result, Exabeam not only improves security, but also transforms SOC efficiency and productivity. By operating on existing data and requiring no agents or network taps, Exabeam delivers value within hours, not weeks. For more information, please visit www.exabeam.com

Exclusive Networks

Exclusive Networks is the ‘go-to’ value-added distributor accelerating market entry and growth for innovative cybersecurity, networking and infrastructure technologies. With value-adding technical and marketing support reseller partners can rely upon Exclusive Networks to boost business opportunities and help achieve new revenues from the changing enterprise technology landscape.

EY

EY is a global leader in assurance, tax, transaction and advisory services. The insights and quality services we deliver help build trust and confidence in the capital markets and in economies the world over. We develop outstanding leaders who team to deliver on our promises to all of our stakeholders. In so doing, we play a critical role in building a better working world for our people, for our clients and for our communities.
EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients. For more information about our organization, please visit.

Facebook ThreatExchange

Learn about threats. Share threat information back. Everyone gets more secure. The Facebook ThreatExchange platform enables participating organizations to share threat data using a convenient, structured, and easy‐to‐use API that provides privacy controls to enable sharing with only desired groups. For more information and apply to join, visit: https://developers.facebook.com/products/threat‐exchange

Fidelis

Research shows that the most advanced threats attacking the enterprise are so well hidden they go unnoticed for months, even years, without detection. Today’s threat actors conduct detailed reconnaissance and develop custom malware in an effort to penetrate networks and ultimately steal valuable data including intellectual property, business plans and personal information. Our experience protecting the world’s most sensitive networks for more than a decade validates that robust network monitoring, not just attempting to find inbound malware, is key to detecting threats before anything is stolen.

Fidelis XPSTM is the only Comprehensive Advanced Threat Defense solution that stops advanced threats with industry‐leading network traffic and payload analysis across all phases of the threat lifecycle. For more information, please visit www.fidelissecurity.com

Forsythe Solutions Group, Inc.

For 43 years, Forsythe has been helping organizations in all industries with their information technology (IT). Using sound strategies and extensive data center expertise, we help companies do more with less. Whether it’s to manage risk, lower costs, secure data or improve performance, we plan, procure, build, migrate and manage IT infrastructure for today and tomorrow. Forsythe creates solutions that make practical business sense from idea to implementation. We help businesses champion innovation and deliver bottom-line results.

Fortinet

Fortinet (NASDAQ: FTNT) protects the most valuable assets of some of the largest enterprise, service provider and government organizations across the globe. They are strengthened by the industry’s highest level of threat research, intelligence and analytics. More than 210,000 customers worldwide, including some of the largest and most complex organizations, trust Fortinet to protect their brands.

FreeDivision

FreeDivision company operating on the Czech market since 1996. In 2005 it was transformed into a limited liability company registration with the Municipal Court in Prague. In August of that year, we entered into a partnership with SafeBoot BV, the sole distributor of security and encryption systems for the Czech and Slovak markets. In the same year we also become a partner of ESET Software and begin to expand in security solutions in the Czech and Slovak markets.

Gateway Security

Founded in 2000, Gateway Security has grown to be one of the leading suppliers of IT Security Solutions in the norwegian market. Gateway Security supply best-of-breed products from well known vendors like Check Point Technologies, RSA/EMC, Trend Micro, Cisco Ironport, BlueCoat, F5, Ipswitch and Webroot.

Gotham Technology Group

Gotham Technology Group specializes in innovative infrastructure solutions. We build agile solutions that enhance the business value of our clients’ technology investments by delivering IT as a service. Our core practices are focused on the secure delivery of applications and data to an increasingly mobile workforce. Our expertise in the areas of infrastructure, virtualization, information security, and application development, supported by highest level vendor partnerships, helps our customers transition services to public and private clouds. Our deep bench of highly skilled engineers and architects is complemented by a technical staff augmentation practice committed to locating the same caliber of resources.

Government Acquisitions

Government Acquisitions is an IT solutions company and a trusted advisor to the Federal Government. Government Acquisitions creatively and competently solves difficult IT challenges for quality-driven, top-level agencies including the Department of Homeland Security, the Department of Treasury, and the US Department of Agriculture.

GuidePoint Security

GuidePoint Security provides customized, innovative and valuable Information Security solutions that enable commercial and federal organizations to more successfully achieve their security and business goals. By embracing new technologies, GuidePoint Security helps our clients recognize the threats, understand the solutions, and mitigate the risks present in their evolving IT environments.

Founded in 2011 by veterans of the Information Security industry, GuidePoint Security aims to be our clients’ trusted advisor for both security technologies and professional services. GuidePoint Security differentiates itself through its organizational structure, ensuring that the resources you deal with before the sale have a vested interest in your success following the sale. Our continued referrals and repeat clients reiterate our focus on providing our clients with the right technologies and professional services that support their organization’s goals.

GuidePoint Security is classified as a Small Business by the Virginia Department of Minority Business Enterprise. More details are available at www.dmbe.virginia.gov.

HelpAG

Help AG is a strategic information security consulting company, founded in Germany in 1995 and has been present in the Middle East since 2004. We provide leading enterprise businesses across the region with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements enabling them to evolve securely with a competitive edge.

HP ArcSight

The HP ArcSight Security Intelligence platform helps safeguard your business by giving you complete visibility into activity across the IT infrastructure-including external threats such as malware and hackers, internal threats such as data breaches and fraud, risks from application flaws and configuration changes, and compliance pressures from failed audits. This solution enables you to collect, analyze, and assess IT security, enterprise security and non-security events for rapid identification, prioritization and response.

HP Enterprise SIEM

The HP Enterprise SIEM helps safeguard your business by giving you complete visibility into activity across the IT infrastructure‐including external threats such as malware and hackers, internal threats such as data breaches and fraud, risks from application flaws and configuration changes, and compliance pressures from failed audits. This solution enables you to collect, analyze, and assess IT security, enterprise security and non‐security events for rapid identification, prioritization and response.

For more information, please visit www.hpe.com

HumanFirewalls

HumanFirewalls is an organization that prides itself on offering top of the line Security Services such as Security Awareness, Threat Intelligence, Network Security Monitoring, Compliance Management, Vulnerability Management, Integrity Controls, and Cloud-based Web and E-mail Security. HumanFirewalls understands that small/mid sized companies rarely have the in-house expertise, the time, or the budget to implement the right security controls that could protect their organizations from threats that are now capable to avoid detection and bypass traditional security controls. Therefore, we have developed different strategies that will fit their budget, reduce the risk of getting compromised and highlight their company’s ROI. We firmly believe that Cyber Security must be addressed proactively with next generation continuous endpoint monitoring in order to identify, respond, contain and recover rapidly from advanced attacks. In addition, we agree that with the implementation of the proper Cyber Security education and high level of awareness, we can establish a powerful form of defense against advanced Cyber Attacks at the primary level.

IBM

IBM’s security platform provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next‐generation intrusion protection and more. IBM operates one of the world’s broadest security research and development, and delivery organizations. For more information, please visit www.ibm.com/security

IBM Security QRadar

IBM Security QRadar® SIEM consolidates log source event data from thousands of devices endpoints and applications distributed throughout a network. It performs immediate normalization and correlation activities on raw data to distinguish real threats from false positives. IBM Security QRadar SIEM can also correlate system vulnerabilities with event and network data, helping to prioritize security incidents.

immixGroup, Inc.

immixGroup helps technology companies do business with the government. Since 1997, we have helped hundreds of large and emerging companies grow and manage their public sector business while providing federal, state, and local agencies with reliable access to leading commercial technologies through the contract vehicles and partners they prefer.

Infinigate

Infinigate, the leading Value-Added Distributor for IT Security in Western Europe, was founded in 1996. Since 2002 Infinigate’s sole focus has been the distribution of professional IT security solutions for the sustainable protection and defence of IT networks, devices, data, applications, as well as the cloud.

Due to Infinigate’s sole focus on the IT security sector, you can take advantage of their specialised know-how and extraordinary network. Infinigate can support you with a solution orientated approach and extensive services to help you generate new projects, implement and run them successfully.

InfoBlox

Infoblox delivers network control solutions, the fundamental technology that connects end users, devices, and networks. These solutions enable more than 8,100 enterprises and service providers to transform, secure, and scale complex networks. Infoblox helps take the burden of complex network control out of human hands, reduce costs, and increase security, accuracy, and uptime. Infoblox is headquartered in Santa Clara, California, and has operations in over 25 countries. For more information, visit www.infoblox.com

INSA Corp

INSA is a service and consulting firm specializing in IT Network Security. We recommend and provide network security solutions with support packages that suit the needs of our client regardless of their business size. INSA operates as a value-added distributor and best-of-breed reseller.

INSA holds National Master Standing Offer (NMSO) for security and storage with the Canadian Federal Government. Over the last five years, INSA has served over one hundred customers including Canadian Federal Government departments, Fortune 500 companies, banks, educational institutions, and large and medium enterprises.

Insec

INSEC Security is the leader of information security and digital forensic in South Korea. INSEC specializes in vulnerability assessments, penetration testing, forensic investigations, incident response, malware analysis for over 10 years.

INSEC provides Korea customers with network security, endpoint and sever security, digital forensic, penetration testing, vulnerability assessment products.

INSEC also provides security and forensic consulting services with training services for customers.

Integral Specialist Services (ISS)

Integral Specialist Services (ISS) consist of a group of highly focused specialists concentrating on delivering flexible, tailored or bespoke IT-based solutions including cost reduction, software and hardware compliance and lifecycle management solutions. We guarantee to provide you with services that meet with both your immediate and future business requirements.  Integral Specialist Services have client organisations of all sizes that operate in the UK, Europe, and Worldwide and we are pleased to have received many testimonials about the quality and effectiveness of the solutions we provide.

Intelligence Services Group, LLC

Experienced global intelligence to address,manage and resolve risks. iSGs team is comprised of experienced and trained security intelligence operatives, multi-disciplined technology practitioners and legal experts.Our unique capability combines intelligence gathering,application of digital forensics technology, positioning of best in breed cybersecurity software and real world experience enabling clients to assess threats and make informed decisions.

Internet Content Management, Inc

Internet Content Management, Inc. (ICM) is an IT security systems integrator focused on providing cost effective security solutions. ICM provides security integration services, penetration testing and security architecture assessments. Web, Email, and Data security are all core competencies as well as delivering risk management and compliance standards for today’s rigorous regulatory environment. ICM partners with today’s technology leaders to deliver robust, real world solutions with a common sense approach. Founded in 2001 ICM is proud to serve over 350 companies, from small businesses to Fortune 500 companies, across the entire business spectrum.

InTrust

Intrust IT is a Cincinnati, OH Managed Security Services Provider (MSSP) with over two decades of industry-leading innovation and service excellence. The company exceeds a 99% satisfaction rating every month. With that kind of support backing you up, your business can compete in today’s technology-driven market. Intrust IT can develop a smart IT strategy for you and then execute that strategy so you can focus on your business instead of worrying about technology. As your trusted managed services provider Intrust IT keeps your data secure, your processes efficient, your employees happy, and your IT strategy on track.

Inuit

Inuit is a software distributor specialized in corporate IT security and system management.

IPS

Founded in 2001, IPS is a national leader in information security, compliance and managed services. We offer a comprehensive portfolio of services and solutions to help protect organizations from today’s advanced security threats. IPS can help assess your information security technology needs and select solutions that best address your functional, operational and integration requirements, as well as business challenges.

Ireo

IREO is one of Spain’s leading Value Add Distributors. Specialized in ITSM and Security solutions, IREO represents a large number of market-leading vendors. We cover all aspects of business development for the vendors we represent: from reseller recruitment and training, to 1st level tech support.

Iron Bow Technologies

Formerly ATS, Iron Bow Technologies forwards a history of over 20 years as a leading full-lifecycle IT solutions provider to government and industry. Leveraging strong technology though a collaborative engagement model, the company designs and builds security, data center, UC, network and client computing solutions that are on-target with customer missions.

ISA

ISA is a security focused technology firm, with over twenty years of experience helping organizations of all sizes solve complex challenges relating to IT security.  We act as trusted advisors to help our clients define, implement and manage their strategies to minimize IT security related risk, and to provide a secure business environment for their employees and customers.

iSECURE

iSECURE is well known within the security community for providing Gartner leading security solutions and services. We provide a full range of security services from risk assessment, vulnerability and penetration testing, to securing your network infrastructure by implementing and managing on-site or cloud-based security solutions.

iSIGHT Partners

Since 2007, iSIGHT Partners has been recognized as the leader in cyber threat intelligence. Through its established intelligence team made up of over 190 different experts in 16 different countries, the iSIGHT Partners team focuses exclusively on analyzing and understanding the global threat ecosystem, to include threat sources and the methodologies they employ, and partners with its customers’ security and intelligence operations to empower an intelligence-led security strategy that connects intelligence directly to their business.

iSOC24

iSOC24 helps organizations to – be in control – of their information security. We support organizations 24/7 by mapping and monitoring risks so these can be mitigated and reduced effectively. Our carefully selected solutions enable customers to address the relevant risks in their environment. Separately, these solutions work perfectly, but combined they create an interactive ecosystem and add even more value.

K logix LLC

K logix provides security consulting, technology solutions, and integration services to enterprise companies. Our experienced team and our established process help enterprise customers make confident security decisions that impact their business goals.

Kalsoft

KalSoft provides deliberate and dynamic technology solutions that attain real business results for businesses in diverse industries including; Government, Financial Sectors, Energy, Oil and Gas, Public safety and national security, Telecommunications, Healthcare, education and many more.

KalSoft believes in following the top practices and processes along with the latest trends of technology. It provides an experience of excellence and prosperity to its clients and is known for providing high quality software solutions and consultancy services to its wide range of clients throughout Europe, Middle East and Africa. With its diverse proficiency and domain knowledge it enables its clients to reach the level of their desired business.

KIS

KIS, short for Keep IT Simple, is a leading multidisciplinary Systems Integrator firm specializing in virtualization solutions, cloud, network, security, management, storage and unified communications. Since 1988, KIS has successfully completed thousands of projects, implementations and mission-critical emergency repairs. KIS provides stability and continuity in the often volatile world of IT.

Konsultek

Since 1994 KONSULTEK has been delivering technology solutions that Connect, Protect, Inform & Manage the information of clients just like you.

Konsultek’s United States headquarters are located just west of Chicago, Illinois in the Elgin, Illinois technology corridor. Konsultek Europe, Ltd. is located in England. Konsultek is truly a client focused company that has earned a reputation for both its technical excellence as well as its extraordinary client service. No client too big, No client too small From Fortune 100 corporations to local businesses, clients of all sizes look to Konsultek to maximize their efficiency and protect their most critical information.

Kroll

Whether your incident is the result of a malicious hacker or a negligent employee, Kroll is prepared to respond quickly to cyber security incidents that may have compromised your confidential information. Leveraging a global network of certified security and computer forensics experts, Kroll can be onsite within hours to help you contain the situation and determine next steps. Kroll’s advanced incident response team will work side-by-side with you to build a comprehensive, compliant, and timely data breach response plan, drawing from their experience helping countless organizations respond to data loss.

L’Arbre Solutions

We offer companies with compelling technology an opportunity to launch their products and services with confidence. Using our network of industry specialists, we are able to bring to market early adoption technologies, as well as helping those with more mature technologies to broaden their approach and appeal.

Lastline

The Lastline Breach Detection Platform provides comprehensive detection of advanced and evasive threats across your entire enterprise — Operating systems (Windows, Mac OS X, and Android), physical and virtual hosts, services, users, network infrastructure and Web, email, file, and mobile applications. The culmination of more than ten years of R&D specifically focused on advanced and evasive breach weaponry and tactics, Lastline’s flexible software‐based platform allows organizations to scale their breach defenses on a predictable basis, from a single location to any number of remote, branch, and mobile offices. For more information, please visit www.lastline.com

Lato Networks

Lato Networks provide enterprise clients with progressive technologies. We work with leading vendors to help our customers deliver secure and optimised computing services to their businesses both on premise and within virtualised cloud environments.

Progressive Technologies take a mature technology industry and revolutionise it through engineering advancements. Lato offer progressive solutions for Security, Storage and Network Infrastructure.

Latus Solutions

LATUS Solutions is a highly specialized technology integrator that is focused on supporting our clients across the entire information security lifecycle. For the better part of a decade, Latus has been reinventing the way integrators approach their customers with one focus – creating long term value through an undying commitment to their success. This simple philosophy has helped us define a new generation of integration services that better aligns to the needs of our customers and the emerging trends in IT. As a testament to the success of our approach, Latus has quickly become a leading provider of innovative technology, consulting, and managed security services to many of the well-known enterprise, healthcare, retail, and technology organizations across the globe.

LogRhythm

LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s award-winning platform unifies next-generation SIEM, log management, network and endpoint forensics, and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides innovative compliance automation and assurance, and enhanced IT intelligence. For more information, please visit www.logrhythm.com

Lumeta

Today’s large enterprises function in an ever-expanding IP space where it can be difficult to have a handle on every network connection, host, and active IP on the network. Because of the constant state of change, the exponentially growing number of connected devices in the enterprise can fall outside of the watchful eye of security management where serious threats can emerge.

M. Tech

M.Tech is a leading cyber security and network performance solutions provider. Established in May 2002, M.Tech is headquartered in Singapore and has a network of 32 offices in 17 countries to provide on-site sales, marketing as well as technical support to our reseller partners.

M.Tech selectively partners with market-leading vendors who are established in their respective domains, covering a broad spectrum of today’s security and network performance requirements, from firewalls, web security, intrusion prevention and security analytics to cloud networking and network virtualization.

MainNerve

MainNerve provides defense grade cybersecurity services to some of the most elite and protected organizations in the world, including the US Department of Defense, the US Government, as well as respected Global Fortune 500 commercial organizations. MainNerve is proud to be the only cybersecurity firm to be awarded the US SOCOM contract, providing cyber security training to the US Military Elite Forces. Leveraging the vast experience of our handpicked subject matter experts, MainNerve now offers Defense Grade Cybersecurity Services to the commercial small and mid-sized markets in the health services, legal, financial, manufacturing, industrial and retail industries across the US from our global headquarters in Colorado Springs, Colorado. Our cybersecurity offerings provide our clients one of the industries’ best administrative and technical security solutions, which compliment a comprehensive information security program. From top of the line MSSP, to Vulnerability Assessments, to Attack and Penetration Testing, to Incident Response, to our proprietary Adaptive Darknet solution… MainNerve is all about keeping your business’ data and information secure.

Mannai

For over 20 years COS has been working closely with businesses helping them to keep in step as technology advances. In l987 the company became the authorised distributor for the Digital Equipment Corporation and subsequently for Compaq. The company is now the authorised dealer for HP and Compaq products, including Intel based hardware and Unix based Enterprise Servers. We have many years experience in Systems Integration and Software Development in the Middle East.

Marcum Technology LLC

Marcum Technology LLC was founded in 2001 and is a proud member of the Marcum Group. We serve global enterprise clients as a trusted information technology solutions provider and value-added reseller. We work with clients and partners by offering solutions based on industry leading knowledge and offer access to qualified experts and advanced technologies. Our team prides itself on delivering unparalleled customer service, technical expertise, and IT business knowledge that results in higher ROI and superior results for our clients.

MARK Enterprises, Inc.

MARK Enterprises is the premier Information Security provider serving Southern California.  Our expert team of consultants and engineers has a singular focus: to exceed every client’s expectations by fully understanding and cost-effectively solving their unique business challenges. Over the past 10 years, MARK Enterprises has helped various organizations from the public and private sectors to design, implement and support world-classEnterprise Security solutions.

Maxis360

Maxis360 combines the best people, processes and technology to deliver innovative solutions to change the way you do business. Our deep roots in Network Security, IT Managed Services, Unified Communication, and Network Infrastructure is unmatched in the industry. A leading provider of IT Solutions in the Southeast and Caribbean, we take a 360 degree approach in offering the highest level of expertise in design, installation, management, and pro-active support available on the market today.

Mediarecovery

Mediarecovery owns one of the biggest Computer Forensics laboratories in Europe, where the search and analysis of the digital evidence is conducted, where the analyses of information security infringement cases, hacking, data leaks, frauds and malpractices are proceed. Our specialists also carry out the analysis at an angle of zero-day threats inside clients’ IT infrastructure. Additionally, the laboratory provides data recovery and data erase services. Mediarecovery is a producer of first EU’s degausser – device to irreversible data erasure – with certification of Military Counterintelligence Service Republic of Poland.

Microsoft

Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide leader in software, services, devices and solutions that help people and businesses realize their full potential.

Mission Critical Systems Inc.

Mission Critical Systems is your best source for information, network, and data security solutions. We are dedicated to providing products from the top security manufacturers. Information security is our only business, allowing us to focus fully on delivering market leading products, consulting and integration services. We have been helping companies find solutions to their unique security challenges since 1997. Our wide range of security products and services gives us the flexibility to help you explore all options to keep your Information safe.

Mnemonic

Mnemonic AS is one of the largest providers of IT information security services within the Nordic Region. We supply products and services to some of the leading private and public sector enterprises. We have 130 specialist staff in our offices in Oslo, Sandnes and Stockholm.

NamTek

Namtek’s Governance, Risk Management & Compliance (GRC) practice solves complex security challenges for some of the most critical assets in the nation. Namtek has carefully prepared a selection of critical security controls and services resulting in our highly effective Assess, Remediate & Monitor (ARM)™ methodology. With this methodology Namtek assesses, architects and implements the technologies, policies and procedures that most effectively protect your sensitive data assets. Namtek is a Service-Disabled Veteran-Owned Small Business, founded in 2006 and headquartered in Bedford, NH.

NCI Secured Intelligence

As the premier Canadian provider of full service Cyber Security we have demonstrated expertise in network and security assessments, PCI Compliancy, cyber social engineering, architecture development, solution deployment, training, and cloud & managed security services. Our team of certified information security experts are relied upon to secure hundreds of public and private sector clients across Canada.

Net Source

Founded in 1996, NET Source is a national leading IT Solutions Provider headquartered in Littleton, Colorado. Our mission is to provide the most reliable and scalable technologies to improve our customers’ IT environments. NET Source’s philosophy is simple; always put the customer first. We provide our customers with the highest standards of independent and customized solutions to address their data management challenges. Simply put… we care about your business!

NET Source is vendor-independent specializing in best-of-breed storage and security solutions to meet your specific IT needs, budget, and objectives. Our experts have planned, designed and implemented a wide variety of solutions to meet availability, backup and disaster recovery, archive and data migration, and security challenges for small to large companies across all horizontal and vertical markets.

Nexum, Inc.

Nexum builds and secures networks for organizations across multiple verticals around the world. Nexum meets its customers’ needs through a holistic approach that includes best-in-breed products, professional services, Nexum-branded manufacturer support, authorized training, and monitored and managed security services. At Nexum, We Mean Security®.

nForce Secure Co., Ltd.

nForce Secure is Thai value-added specialty distributor of IT Security, Information Management, and Network Solutions. Established in 2005, it has more than 10 years of channel and distribution experience with sales resources in Thailand. And offers a diverse portfolio of security technologies through its resellers.

Nixu

We are Nordic’s largest specialist company in information security consulting. We work to improve our clients’ cybersecurity in solution areas of Corporate IT, Digital Business and Industrial Internet. Our clients trust Nixu in projects where developing, implementing or assessing of information security is a must. We ensur​e the confidentiality of our clients’ data, business continuity and ease-of-access to digital services through planning and mitigation of cybersecurity risks.

We employ over 140 experienced information security consultants, technical experts and software developers, who form Nordics’ leading cluster of information security expertise

OCG Systems Pty Ltd

OCG Systems is committed to delivering our customers with best of breed technologies to assist them with their Digital Transformation.

Our aim is to Integrate, Optimise and Secure the environment whilst Accelerating Performance and delivering visibility through Analytics.

We make the Complex Simple.

OMC Systems

OMC Systems is a leader in cyber security advisory services that offers its clients proactive, reactive,and managed services and is based in Florida. We offer solutions such as forensics investigations and eDiscovery services, anti-fraud and employee monitoring solutions, endpoint and server protection and monitoring, managed IT and Security services, as well as vulnerability scanning and penetration testing services. We offer a wide array of security-related products, solutions, and advisory services to help companies of all sizes deal with current and emerging cyber security threats and to help defend against the attackers that want to disrupt your business and steal your data. We have deep expertise in corporate investigations and understand where sensitive data may exist and how it needs to be protected and monitored. We are trusted by our valued clients to assess the overall security stance and health of their corporate networks and systems.

Optiv

Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security programs that achieve business objectives through our depth and breadth of cyber security offerings, extensive capabilities and proven expertise in cyber security strategy, managed security services, incident response, risk and compliance, security consulting, training and support, integration and architecture services, and security technology. Optiv maintains premium partnerships with more than 300 of the leading security technology manufacturers.

Oxman Group

The Oxman Group’s Incident Response Service is part of a comprehensive suite of products and solutions that allow businesses to discover, respond and recover from a security incident. Information security threats impact businesses of all sizes and within every industry, so it’s vital to take action as quickly as possible to prevent further financial and reputation damage. The team of certified incident handlers and licensed investigators of The Oxman Group expertly handle all types of security incidents, from malware collection and analysis to targeted attack mitigation and remediation.

Palo Alto Networks

Palo Alto Networks is the next‐generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game‐changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization’s most valuable assets. For more information, please visit www.paloaltonetworks.com

Paramount

Founded in 1992, transformed in 1999 and re-invented in 2007, Paramount is “Work in Progress” as a company. Paramount is the leading regional provider of Technology and Services for securing the Information Assets of Enterprises. From the development of a Security Policy, Security Awareness Training, to the delivery of end-to-end solutions that encompasses Perimeter Security, Secure Content Management, Identity and Access Management, Vulnerability Assessment, Risk, Policy and Compliance Management; Paramount helps leading organizations in the Arabian Gulf Region, understand, monitor and mitigate the risks in their IT infrastructure.

Phalanx Secure Solutions

Phalanx Secure Solutions is a top provider of expert IT Security Services and Consulting. Phalanx’s leading security operations and threat operations teams have over 50 years of experience serving as IT Security consultants and have a long list of satisfied customers.

Phantom

Phantom, an award-winning company, automates and orchestrates key stages of security operations from prevention to triage and resolution; delivering dramatic increases in productivity and effectiveness. Ranging from simple automation to fully autonomous response, Phantom lets you choose the best balance that fits your organization’s needs while increasing security and accelerating security operations. Focused on closing the security gap by enabling enterprise security operations to be smarter, faster and stronger, Phantom provides the flexibility to connect in-house and third-party systems into one consolidated, integrated and extensible platform.

For more information visit: www.phantom.us.

Polito Inc.

As threats to information security increase exponentially, many believe it is not a matter of if but when they will be breached. The need for robust incident response support is critical for companies of all sizes that are increasingly being targeted. Whether you have already been breached, suspect you might be, or just want to know for sure whether or not there is any malware in your network, Polito’s team of IR professionals can augment and enhance your IT Security team.  Our services include the full scope of incident response process – from policy review and creation, identification, containment, eradiation, and recovery. We also assist your security team with vulnerability remediation and validation to ensure that the attackers do not regain access to your network. At Polito we strive to establish trust with our clients through our acumen, passion, and tenacity – we secure what’s important to you.

POSTEC

Established in 1987, POSTEC has become of the country’s premier independent POS solution providers. Postec creates exceptional customer value by providing custom solutions based on best of breed hardware and software backed by award winning support services.

Presidio Inc.

We help clients unlock the unlimited potential of a completely connected world. We understand that the backbone of this unprecedented level of connection is Information Technology. At Presidio, we think, architect, implement, and support the practical reality of advanced technologies every day.

Priveon, Inc.

Priveon is a leading information security consulting organization that designs and executes truly operational security solutions with an emphasis on efficiency, effectiveness and customer ownership. To accomplish this, Priveon has built a complete suite of InfoSec service offerings that cover the entire lifecycle of security management, including: Consulting, Implementation, Support, Audit and Training.

Prolinx

Prolinx is a trusted IT solutions provider specializing in the development of secure IT as a Service (ITaaS) environments. Prolinx works in partnership with organisations to intelligently provision and manage IT resources reducing costs, enhancing growth and mitigating risk. Prolinx services span desktop, data centre, cloud, cyber security and more.   Privately owned and based in Oxfordshire, UK, Prolinx provides a nationwide capability.

Rapid7

Rapid7’s security data and analytics software and services help organizations reduce the risk of a breach, detect and investigate attacks, and build effective IT security programs. With comprehensive real-time data collection, advanced correlation, and insight into attacker techniques, Rapid7 strengthens an organization’s ability to defend against everything from opportunistic drive-by attacks to advanced threats. Unlike traditional vulnerability management and incident detection technologies, Rapid7 provides visibility, monitoring, and insight across assets and users from the endpoint to the cloud. Dedicated to solving the toughest security challenges, Rapid7 offers proprietary capabilities to spot intruders leveraging today’s #1 attack vector: compromised credentials. Rapid7 is trusted by more than 3,700 organizations across 90 countries, including 30% of the Fortune 1000.

Red Canary

Red Canary continuously monitors customers’ endpoints, reviews suspicious activity, eliminates false positives and provides actionable detections so customers can respond faster.
Red Canary combines best-in-breed technologies and techniques to cover the full kill chain: Carbon Black provides visibility; their Threat Detection Engine delivers unparalleled detection; human analysts provide the intuition and expertise needed to remove false positives. The detailed detections and endpoint visibility with Red Canary assist any team with the essential tools needed for rapid and complete response.

Red Hat

Red Hat is the world’s leading provider of open source software solutions, using a community-powered approach to reliable and high-performing cloud, Linux, middleware, storage and virtualization technologies. Red Hat also offers award-winning support, training, and consulting services. As a connective hub in a global network of enterprises, partners, and open source communities, Red Hat helps create relevant, innovative technologies that liberate resources for growth and prepare customers for the future of IT.

Regents & Park

We partner with organizations to maximize the return on information systems investments, while at the same time minimizing their risks. Using IT governance to ensure alignment with business strategies. We manage and implement governance, risk and compliance software applications.

Rkneal

Rkneal is a full-service engineering firm specializing in design, engineering, and technical services. Our qualified engineers have designed and implemented distributed control systems (DCS) and programmable logic controllers (PLC) from many of the industry leaders. In addition to automation controls, Rkneal possesses experience executing projects pertaining to NERC CIP compliance, network design, training, and real-time historians.

RKON

Founded in 1998 in Chicago, RKON has grown to become one of the nation’s leading IT managed services providers—on Inc. Magazine’s 2014 list of the 500 fastest growing private companies—with an elite team of experts in cloud, emerging and advanced technologies, and professional services for the Fortune 2000. RKON has developed a comprehensive knowledge base, operational methodology and best practices based on our experience working with hundreds of IT departments at enterprise organizations. And we leverage this experience to help our customers achieve operational excellence—and cost efficiencies.

RSA

RSA Security Analytics offers an enterprise software framework that captures all network traffic and reconstructs the network sessions to the application layer for automated alerting and monitoring, and interactive analysis and review. By having all this information immediately accessible, customers have the agility to respond to emerging threats and forensics investigations, identify broken business processes, mitigate intentional data exfiltration and confront tomorrow’s challenges. For more information, please visit www.rsa.com

Safeware, Inc.

Safeware Inc., founded in 1979, is a leader in the Safety Distribution & Security Industry providing safety and security products/services along with turn-key solutions to customers in a broad range of markets, including; government, manufacturing, construction, military, transportation, and public safety. Safeware takes an old school approach to working with customers, by identifying their needs and offering them the best solutions, and becoming a valued partner in the design/build process while helping them fulfill their missions. Even while maintaining this old school approach, Safeware is always looking for the latest advancements in safety and security technology, which will give their customers an advantage.

Satisnet

Founded in 2004, Satisnet Ltd is a leading IT security reseller dedicated to providing the highest level of customer care and technical support.

Secon

Secon’s vision is to create a world where people can live and work without fear of being affected by malware or cyber attacks. Secon proactively manage and monitor your security infrastructure, delivering real-time incident response whilst also taking ownership of the incident. With over 16 years of experience, a proven methodology and a cloud based platform, Secon – the malware management company – takes away the complexity of cyber security and delivers the whole security solution as a simple service to you.

As an award winning company, Secon spends time to clearly understand your specific business needs and how securing your business can make a difference. You can then focus on your business whilst Secon protect it.

Secure Ops

SecureOps takes a holistic view to security. A large number of Managed Services providers offer security solutions and services but are only interested in the perimeter and/or network devices. SecureOps does not stop at the perimeter. Of course, this is a simpler business model but security is not a simple service.

Secure Sense Solutions

Secure Sense Solutions is an IT solution provider specializing in network and security services and product implementation. We offer managed services and professional services, allowing us to deliver optimal custom solutions for our customers.  Our unique best-of-breed approach has made us a trusted advisor to some of Canada’s largest organizations.

Secure Source Distribution

Founded in 2007, Secure Source is specializing in Network Security Technology and Solutions, a Value-Added Distributor (VAD), most dynamic and fastest growing I.T security distributor in I.T market. As the market evolved swiftly and actively, the company has equipped with a team of dedicated, knowledgeable and experience resources to cater and meet the current and also future mission critical business challenges. Secure Source always stay at the fore-front of Security Technologies. With a wise and clear focus of understanding of the ever-changing customer’s requirements, the company has delivered the security products, solutions and expertise that not only fulfill resellers and partners’ needs, but also ultimately the end users’ needs.

Secure Technology Hawaii, Inc.

Secure Technology Hawaii provides expert security and disaster recovery solutions, managed services, hosting, and 365x24x7 technical support to commercial, educational, and government clients in Hawaii, Pacific Rim and CONUS.  Our solutions and managed services are based upon 20 years of real world experience with companies of all sizes in both highly regulated and non-regulated environments.  We offer a wide range of services and solutions  to address comprehensive PCI requirements for our merchant customers.

SecureWare

Established in 2008, SecureWare is one of Australia’s leading providers of information and network security solutions.

As a trusted advisor to some of Australia’s largest organisations, we specialise in enterprise-grade security products and service delivery.

An agile security focused organisation, we work closely with our customers, representing their best interests.

Security Vitals

You’ve got systems with lots of data but no time to translate risk. Security is a big concern for most…so how do you really know if your data is protected? Security Vitals applies process expertise and specialized technology solutions to help you close the gaps.

Contact sales@securityvitals.com to understand more about our offerings.

Sedara

A managed security service provider that takes pride in delivering innovative and flexible approaches to protecting what is most important to businesses. Sedara couples advanced detection and prevention technologies with an experienced team of analysts and advisors to provide businesses the peace of mind that their compliance programs are effective and their data is secure. Sedara offers a suite of security services for businesses of all sizes and are proud to partner with companies that offer cutting edge capabilities for today’s security landscape.

Set Solutions, Inc.

For over 20 years, Set Solutions, Inc.— a full service provider of network security, secure remote access and bandwidth management solutions—has been in the business of increasing business profitability and growth.  If you have network security challenges or just want to improve the health of your network, we can help.

Our secure remote access solutions can drive employee retention and help sustain a happy and healthy mobile workforce, leading to increased profitability and faster growth. We offer a portfolio of leading-edge secure access products and services that focus on delivering customer value and success. We believe that our customers’ needs are first and will not compromise that standard.

Shearwater Solutions

Shearwater is a specialist Information Security service provider delivering Operational Security Management, Application Security and Security Education. We also enable organisations to achieve, prove and maintain Compliance with security standards.

Our purpose is to create a safer connected world. This is reflected in our services, which represent an end-to-end defence system against cyber intrusions.

SHI

SHI is a $3 billion privately-held global provider of information technology products and services located in Somerset, N.J. SHI handles software and hardware procurement to deployment planning, configuration, data center optimization, IT asset management and cloud computing, with a wide-range of solutions across IT environments.

Signal Networks

Signal Networks is one of the UK’s leading IT Security and IT Support providers, administering ongoing guidance and expertise to an array of organisations. Supporting Global and local clients from their offices in the UK, they can provide a variety of security prevention, detection and responsive services. Through Signal Networks Security Operations Centre, their IT Security experts and ethical hackers can perform an assortment of assessments and run analysis reports to help discover potential weaknesses and vulnerabilities. By utilising the latest security repair, protection and prevention tools, Signal Networks can administer an array of managed IT Security solutions tailored to any size of organisation. These tools help to keep your company data secure with ongoing protection in the most suitable and effective means required.

Sirius

Sirius is a national integrator of technology-based business solutions that span the data center and lines of business. Built on products and services from the world’s top technology companies, Sirius solutions are installed, configured and supported by our dedicated teams of highly certified experts. Sirius is focused on helping organizations of all sizes reduce cost and complexity, improve service levels, and minimize risk through the implementation of strategic solutions that include cloud, analytics, mobility, security, IT infrastructure optimization and more.

Software Security Solutions

By researching and testing computer security threats and products, we provide early-adopter insight and best-in-class solutions for Small to Mid-Sized Businesses. With our Layered Security approach we help bring new technologies successfully to the market, saving our customer’s time and money.

Solutions II

Solutions II is nationally recognized for world-class innovation in virtualization, business continuance, data lifecycle management. and information and network security. Solutions II assists Clients every day, to leverage technologies and services that drive the cost out of IT. Solutions II’s commitment of bringing best-of-breed solutions to Clients includes a services practice dedicated to increasing customer service levels and decreasing the time and support required for implementations to keep their Clients “Performing Ahead of the Curve.”

SpearTip

Right now, cyber criminals and terrorists from across the globe are targeting businesses, private organizations and governments. That means you are at riskof losing financial assets, trade secrets, intellectual property, critical data, consumer information and much more. SpearTip employs advanced technologies, investigative techniques and sophisticated tools previously available only to heads of state and at executive levels of government. Our methodologies advance cyber security to national security level cyber counter intelligence. Our record speaks for itself. SpearTip stands alone as your best weapon in the fight against security breaches. Our philosophy is simple: it’s never enough just to identify threats. True cyber protection canonly occur when you out maneuver your adversary. Our client services include Cyber Assessments, ShadowSpearSM (Threat Intelligence), Digital Forensics, Incident Response, Managed Security Services, Penetration Testing, and Zero-Day/Malware Analysis. You don’t engage us to provide findings. You engage us to produce results.

Splunk Enterprise

Splunk Enterprise is the industry‐leading platform for machine data. Splunk Enterprise provides an easy, fast and secure way to analyze the massive streams of machine data generated by your IT systems and technology infrastructure—whether it’s physical, virtual or in the cloud. Use Splunk Enterprise to troubleshoot problems and investigate security incidents in minutes, not hours or days. Monitor your end‐to‐end infrastructure to avoid service degradation or outages. Gain operational intelligence with real‐time visibility and critical insights into customer experience, transactions and other key business metrics. Splunk Enterprise makes your machine data accessible, usable and valuable across the organization. For more information please visit www.splunk.com

Sqrrl

Sqrrl is the security analytics company that enables organizations to target, hunt, and disrupt advanced cyber threats. Sqrrl’s industry-leading threat detection and response platform unites threat hunting, behavioral analytics, and incident investigation capabilities in an integrated solution. Sqrrl’s unique platform approach enables security analysts to discover threats faster and reduces the time and resources required to investigate them.

For more information visit www.sqrrl.com

Stalwart Systems

Stalwart’s responsiveness and precision engineering have led clients to make statements like, “Stalwart is the Navy Seals of its industry.” Stalwart’s talented team of professionals offers a depth of experience and expertise unmatched in the industry. Our ability to identify opportunities for clients to gain competitive advantage and our proven ability to execute has produced 100% customer loyalty over the past several years.

Starlink

StarLink is acclaimed as the largest and fastest growing “True” Value-Added IT Security Distributor across the Middle East, Turkey and Africa regions with on-the-ground presence in 9 countries.

With its innovative Security Framework, StarLink is also recognized as a “Trusted Security Advisor” to over 500 enterprises and government customers that use one or more of StarLink’s best-of-breed and market-leading technologies, sold through its Channel network of over 250 Partners.

The StarLink Solution Lifecycle helps Channel Partners differentiate offerings, and assists customers to identify key risks and define priorities for addressing IT Security gaps relating to compliance and next-generation threat protection.

STI Group

Security Technology Integration Group, Ltd. (STIGroup) is an Information Security Consulting firm which provides a full suite of Information Security Consulting services. STIGroup designs, implements, and maintains the systems and procedures that permit your business to utilize technology productively while maintaining the security, integrity, and confidentiality of your mission-critical information.

Stroz Friedberg

Stroz Friedberg is a global leader in investigations, intelligence and risk management. Companies under attack rely on the firm’s longstanding Incident Response team and its immediate deployment tactics to assist in the containment, investigation, and remediation of breaches across the world. Our technical-elite, on-the-ground responders, malware specialists, and forensic analysts bring rapid execution skills to help contain and mitigate the assault’s threatening impact on your computer systems. But we are not just first-responders. We are tireless investigators, highly trusted advisors, and experts in designing customized preventative programs which can heighten assurance-levels across your organization. Engaging Stroz Friedberg means having the most talented team on your side to assist in defending an attack and minimizing its potentially far reaching negative effects on the enterprise.

Structured

Structured is a leading information technology consultancy and systems integrator that has partnered with hundreds of clients throughout the U.S. to maximize the value of IT. For two decades, Structured consultants have collaborated with CIOs and IT departments to develop and implement technology strategies that drive measureable improvements throughout the organization.

Sylint Cyber Incident Response

Sylint Cyber Incident Response offers 24/7 rapid response to limit damage, terminate access points and identify assailants. Sylint’s response services involve system analysis, malware collection and review, log analysis, traffic inspection and many other critical components. Cyber Incident Response consultants have extensive knowledge of leading edge threats and incident/breach reporting requirements, and they work discretely with clients, law enforcement agencies and numerous government agencies.

Synercomm Inc.

SynerComm is an IT solution provider specializing in security infrastructure, network infrastructure, enterprise mobility, remote access, wireless solutions, audit, penetration testing, and information assurance.

We help our customers make their enterprise networks faster, more dependable, and more secure, so that they can provide their organizations with the best in datacenter performance and enduser experience without putting their data at risk.

Founded in 1989, SynerComm was established to help SMB and enterprise organizations achieve their goals by empathetically listening and working with the organization to meet their initiatives in Application Delivery, and Network and Security Infrastructure.

Tach Tech

Tach Tech is an IT solutions provider and value added reseller. The company provides solutions that address four key IT practice areas: Network, Storage, Security, and Virtualization. Tach Tech maintains a diverse client base in terms of verticals served and client size (small to medium enterprise to large global organizations).

Tevora Business Solutions

Tevora is the nation’s premier security consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations.

Threat Connect

ThreatConnect, Inc. is the leading provider of advanced threat intelligence products and services including ThreatConnect, the most comprehensive Threat Intelligence Platform (TIP) on the market. ThreatConnect delivers a single platform in the cloud and on‐premises to effectively aggregate, analyze, and act to counter sophisticated cyber‐attacks. Leveraging advanced analytics capabilities ThreatConnect offers a superior understanding of relevant cyber threats to business operations. To register for a free ThreatConnect account, or to learn more about our products and services, visit: www.threatconnect.com/

ThreatQuotient

ThreatQuotient provides ThreatQ, a Threat Intelligence Platform (TIP) that automates, manages, and operationalizes critical threat intelligence, enabling security teams to collaborate and make more informed decisions regarding their security posture. ThreatQ is a cornerstone platform for threat intelligence providing security teams with much‐needed contextual information regarding indicators of compromise (IOC), attack tracking and adversary activity. ThreatQ enables cyber security teams to be smarter, quicker and respond faster to adversary activity in minutes, not hours or weeks. For more information, visit: www.threatq.com

Tor

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.

Torus Technologies, Inc.

The leadership team at Torus Technologies has more than 30 years combined experience working with medium and large healthcare facilities, energy and utility companies, manufacturing companies, retail corporations, state and local government and education entities, financial institutions, and other industries in the commercial field.We strive to build long-term collaborative customer relationships to develop and deliver a proactive security strategy as your security needs evolve and change. Our team members are your security partners and trusted advisors. Over the years, we have developed a methodology that has a proven approach that allows our customers to meet their security objectives and protect their confidential information and important data against ongoing security threats.

Toshiba Commerce

Toshiba Global Commerce Solutions is retail’s first choice for integrated in‐store solutions. The leading supplier of point‐of‐sale systems with a worldwide install base larger than any three major competitors combined, Toshiba is committed to delivering innovative commerce solutions that transform checkout, provide seamless consumer interactions and optimize retail operations. Toshiba, along with our global team of dedicated business partners, provides end‐to‐end solutions, service and support that help clients meet virtually any retail technology need. For more information, visit www.toshibacommerce.com

Trustwave

Trustwave helps businesses fight cybercrime, protect data and reduce security risk. With cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, we enable businesses to transform the way they manage their information security and compliance programs.

Unicorp

Unicorp Technology LLC (a part of Almoayed Group, Bahrain) is an Information Technology and Communication Solutions provider based in Abu Dhabi, UAE. Our expertise in IT infrastructure solutions, Unified Communications, Audio Visual solutions, Server & Storage solutions, and Physical & Network Security solutions deployments ensures that our customers get an end-to-end solutions that are cost effective, world class and robust to match the needs of today’s dynamic enterprise.

Vandis

Today’s complex IT requirements demand a flexible process that better addresses your needs. Vandis challenges the assumption that IT acquisition is a push model by developing quality relationships with our clients based on joint problem solving using the most appropriate technologies available. Achieving solutions that offer maximum performance and yield greatest results requires proven expertise, a close working relationship built on trust, and a diverse network of technology partners.

Vectra Networks

Vectra Networks is the leader in real-time detection of in-progress cyber attacks. The company’s automated threat management solution continuously monitors internal network traffic to pinpoint cyber attacks as they happen. It then automatically correlates threats against hosts that are under attack and provides unique context about what attackers are doing so organizations can quickly prevent or mitigate loss. Vectra prioritizes attacks that pose the greatest business risk, enabling organizations to make rapid decisions on where to focus time and resources. Visit us at www.vectranetworks.com.

Viperline Solutions

Viperline Solutions is a privately held company headquartered in Birmingham, Alabama with offices in Tennessee and Mississippi. We specialize in Information technology products and services. We bring tomorrow’s cutting edge technology to today’s business. We work with today’s top partners and products to bring the best products and services to your business needs.

WinMill Software

WinMill Software is a premier Reseller and Services partner of Bit9. Since 1994, WinMill has been delivering technology solutions with unparalleled service. From strategic management consulting to high-end application development, from designing and deploying broadband wireless solutions to securing applications and networks, WinMill has helped thousands of clients use technology to gain strategic advantage over their competitors. Our security engineers are CISSP and CISA certified and are experts on today’s leading security solutions.

Wipro

Wipro helps customers do business better by leveraging our industry-wide experience, deep technology expertise, comprehensive portfolio of services and vertically aligned business model. Our 55+ dedicated emerging technologies ‘Centers of Excellence’ enable us to harness the latest technology for delivering business capability to our clients. Wipro is globally recognized for its innovative approach towards delivering business value and its commitment to sustainability. Wipro champions optimized utilization of natural resources, capital and talent. Today we are a trusted partner of choice for global businesses looking to ‘differentiate at the front’ and ‘standardize at the core’ through technology interventions. In today’s world, organizations will have to rapidly reengineer themselves and be more responsive to changing customer needs. Wipro is well positioned to be a partner and co-innovator to businesses in their transformation journey, identify new growth opportunities and facilitate their foray into new sectors and markets.

Wombat Security Technologies

Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Wombat’s training solutions help Fortune 1000 and Global 2000 reduce successful phishing attacks and malware infections. For more information visit www.wombatsecurity.com

Ymon

Ymon’s business concept combines cutting-edge data communications expertise with proven information security competence in both their services and products. With more than 20 years of experience and insight in the industry, the team at Ymon ensures the continuity of their customer’s business by providing high-quality solutions.

Ymon’s products and services cover all areas of data networks – ranging from targeted single-case troubleshooting to the architectural design of an organization-wide infrastructure.

ZeroDayLab

At ZeroDayLab®, we are Passionate about Total Security Management and are committed to Total Customer Satisfaction.

Over the last five years, we have successfully grown our business year-on-year and expanded our consulting services and complementary security solutions to provide our clients with a real value add and holistic approach to their IT Security posture that is unique in our industry.

Conducting over 200 assignments annually, we are proud to have leading European clients in key vertical markets such as BFSI, Retail, Telco and E-Commerce organisations, Local & Central Government