Security Products & Services

Alert Logic – Log Manager™ is able to collect, correlate and alert you about events that are relevant to your organization’s security. When coupled with Alert Logic Threat Manager™, you gain the benefit of Alert Logic’s global sensor grid, enhancing your view of the security landscape through proactive alerts on emerging threats. Another solution is their Web Application Firewall.

Bromium – is solving the endpoint security problem with innovations that focus on protection not detection. They do this by creating a hardware-isolated micro-VM, essentially a secure isolated container, for each task a user performs on an untrusted network or document.

Fortinet – Fortinet solutions were built from the ground up to integrate multiple levels of security protection – including firewall, antivirus, intrusion prevention, VPN, spyware prevention and antispam – providing customers a way to protect against multi-threats as well as blended threats.

FireEye – The FireEye Malware Protection System is the next generation of threat protection focused on combating advanced malware, zero-day and targeted APT attacks. FireEye’s solutions supplement traditional security defenses, such as traditional and next-generation firewalls, IPS, AV and Web gateways, which can’t stop advanced malware, thus leaving significant security holes in the majority of corporate networks.

Google Apps – Google Apps for Enterprises provides high performance, low cost, cloud computing for Email, Calendar, Chat, IM, Video and collaborative Docs, Spreadsheets, and Presentations.

Mobile Iron – Provides a complete security and management platform for mobile apps, mobile documents, and mobile devices that preserves the native experience for end users.

Palo Alto Networks – Provides a next generation firewall that accurately identifies applications, users and content regardless of port, protocol, evasive tactic or SSL encryption.  The firewall can scan content to stop threats and prevent data leakage.

Ping Identity – Standards-base Single Sign-on (SSO) and automated cloud user provisioning and API security

ProofPoint – Backed by the patented MLX Threat Classification Engine, enterprise emails are classified based on the level of email security threat to an organization and managed accordingly, whether it is valid email, nuisance spam, or malicious, low-volume phishing attacks. Real-time email message tracing provide the necessary security tools to triage any attack.

Radiant Logic – features three products designed to solve your toughest integration challenges, combining the best of enterprise, meta, and virtual directories to deliver identity as a federated service.

SailPoint – streamlines compliance, strengthens internal controls, and improves identity governance. Their innovative approach to identity management can help address any of the following challenges:

  • lower the cost of compliance;
  • steer clear of audit deficiencies;
  • streamline the access change and request management processes;
  • effectively manage the user lifecycle; and
  • minimize access risk during a merger, acquisition, divestiture or layoff.

Titus – is a leading provider of security and data governance software that helps organizations share information securely while meeting policy and compliance requirements. Titus helps organizations to classify information and meet regulatory compliance by securing unstructured information. Titus provides solutions for Microsoft Office, Exchange and SharePoint.

Trend Micro – Anti-virus, Anti-Spyware, Phishing and Zero Hour exploit countermeasures within an Enterprise Management Strategy.  Centralized management and reporting across products can be deployed at support security solutions for the desktop, file server and network attached storage, NAC, email & web gateways, and network segments.  These offerings are also offered in a Software-as-a Service model.

  • Mobile Armor – at rest disk file encryption
  • Deep Discovery – zero hour attack alert system
  • SafeSync – cloud backup solution that creates an online file storage environment
  • Deep Security for Virtual Machines– IDS/IPS, Anti-Virus, Integrity Monitoring, and Log Inspection

UnboundID – A state-of-the-art, fully LDAPv3-compliant directory server designed for high performance concurrent processing.

ZixCorp – Email Encryption Services

Zscaler – Provides a secure cloud gateway. Zscaler acts as a check post for all internet traffic in order to enforce policies as users access cloud-based services.