Solution Providers


 
SECaaS, security, cloud security, security as a service, application security, network security, client security, secure remote access, encryption, key management, software as a service, infrastructure as a service, SSL VPN, VPN gateway, information assurance

AEP Networks

AEP Networks provides trusted security everywhere and secures data and voice communication regardless of device, environment or location. Delivering proven security architectures to more than 5,000 organizations all over the world including governments, enterprises and carriers and 1,000 blue chip customers.

AEP Networks develops the highest grade security technologies tested and accredited to industry security standards, including CoCo, FIPS 140-2 Level 4 and CAPS. Its extensive portfolio of products and solutions protect the integrity of very sensitive data and are extremely reliable, survivable and resilient.

AEP Networks has also developed the industry’s first remote access Security as a Service offering , CloudProtect, aimed at Managed Service Providers and Cloud Service Providers. The offering secures remote access to the virtual data centers that Service Providers run to host their customers’ applications by securing centralized application access, whether physical or virtualized.

For more information, email us at: [email protected]

Agiliance

Agiliance is the leading independent provider of Governance, Risk and Compliance (GRC) solutions. Security threats, business risk management and compliance mandates are an increasing concern for companies in all industries, as regulations are rapidly growing in number and complexity. Agiliance Global 2000 and Public Sector customers use real-time risk analysis to optimize business performance and make better investment decisions. Unlike legacy offerings that can take nearly a year to deploy, Agiliance customers deploying the RiskVision(tm) platform achieve demonstrable value with full automation within the first 90 days, made possible with Agiliance's industry-leading multi-vendor integrations and content libraries. RiskVision scales with your business to manage massive amounts of data, assets, people and processes required to ensure 100 percent risk management and continuous compliance coverage. By leveraging the power of RiskVision, organizations gain value through effective investment decisions, visibility into current and future risk, fewer audit failures and improved use of resources.

Agiliance offers customers a broad set of product delivery options ranging from Agiliance Public Cloud to customer Private Cloud to customer On-Premise, and a comprehensive set of managed and implementation services to address all phases of deployment. Customers are invited to participate in quarterly advisory summits, where they share knowledge and deployment experience with other community members. Customers can also access the Agiliance Cloud on Demand to provide beta product feedback, test new patches and upgrades, run proof of concepts (POCs), and provide community contributions such as workflows and reports.


Bat Blue

Bat Blue is a provider of end-to-end network and security services that deliver Economy, Effectiveness and Efficiency, through consolidation, cost-savings and reduction of burden. Bat Blue's Cloud Services deliver an entire Internet perimeter and off-site backup "in-the-Cloud" without expensive hardware or complicated integrations. The BlueNET IP network with its guaranteed "One-Hop-Out" architecture was purpose-built as a Cloud Services enabler and offers the extreme low-latency performance that Cloud-based computing demands. Bat Blue is proud to be the official Cloud-WiFi provider of ESPN's X Games. Visit Bat Blue at http://www.BatBlue.com.


Damballa

Damballa is a pioneer in the fight against cybercrime. Damballa provides the only network security solution that detects and terminates the remote control communication that criminals use to breach networks to steal personal and intellectual information, and conduct espionage or other fraudulent transactions. 

Damballa protects Enterprise, ISP, Telco and Cloud networks from the devastating effects of botnets, advanced persistent threats, advanced malware, cybercrime, and other cyber threats. Patent-pending solutions from Damballa are platform and system-agnostic, protecting networks with any type of device including PCs, Macs, smart phones, as well as mobile and embedded systems.

Damballa customers include Fortune 1000 companies, leading Internet and telecommunications service providers, government agencies and educational organizations. Privately held, Damballa is headquartered in Atlanta.


XML, SOA, web services, WS-security, SAML, security, XML identity, XML intrusion, XML acceleration, XML transformation, XML firewall, SOA firewall, Web services firewall, XML gateway, SOA gateway, Web services gateway, XML proxy, XML security, SOA security, Web services security

Forum Systems

Forum Systems is the leader in XML and Web Services  Security, providing a comprehensive suite of trust management, threat protection and information assurance solutions for Enterprise  customers. Forum's gateway products make vibrant business  communications possible by actively protecting and accelerating XML exchanges and Web Services across networks and business boundaries.

Forum Systems' flexible gateway platform defends XML and Web  Services running in the cloud by defending against XML-based threat vectors such as XML bombs, XML Malware, SQL injection. In addition, Forum Systems provides content-level data message encryption and signatures to provide confidentiality and authentication as messages pass through cloud services.

Forum Systems gateway supports XML and Web Services security  standards such as WS-Security 1.0 and 1.1, WS-Security Auth (Username  Token, X.509, Kerberos, SAML 1.0, SAML 1.1, and SAML 2.0).


Google

Google's cloud computing solutions allow you to dramatically lower IT costs, increase productivity and increase security. Google Apps is an enterprise-ready suite of applications that includes Gmail, Google Calendar, Google Docs and Spreadsheets, Google Sites, and Google Video. Google Postini services make on-premise email systems more secure, compliant and productive by blocking spam and other intrusions before they reach email networks, and by providing encryption and archiving to help meet compliance requirements.

For more information, please visit http://www.google.com/apps


Cloud architecture services, identity and access management, virtualization, application security and portability services, managed security services, compliance and audit services, data center security services, remote IT infrastructure management, SOA security services, SaaS service delivery platform

HCL Technologies Ltd.

HCL is a $5.2 Bn leading global IT services company with operations in 20 countries. The company has 17 Global delivery centers with 6 near shore centers in US, Poland, Belfast, Finland, Malaysia, and Singapore. HCL caters to 500+ Global Customer across a wide range of focused industry verticals & in the domains of Custom & Package Applications, BPO, Product Engineering, IT Infrastructure Services, IT Hardware, Systems Integration, and distribution of ICT products. HCL’s approach of engagement is based on ‘transformational outsourcing’; underlined by innovation, value creation based on adoption of best practices & standards like ITL, ISO 9000, ISO 27001 etc. HCL has global strategic partnerships with leading IT & Technology firms like Cisco, Oracle, SAP, EMC, Microsoft etc.

HCL has evolved an engagement framework to enable customers leverage the benefits of Cloud Computing while managing the associated risks. HCL’s Cloud Reference Architecture & Assessment Framework helps in mapping Customer IT landscape, Business requirements and Cloud services. HCL also has a strong & mature IT security services practice that offers end to end solutions around Information security, IT – Governance, Risk & Compliance, network & system security, managed security services. HCL helps customers address their security & operational risks while adopting Cloud Computing models to suit their business & IT strategy.

HCL has a detailed stack of IT services around the core concepts of Cloud Computing.


IBM

IBM offers end-to-end solutions that enable you to take a business-driven and holistic approach to securing your cloud computing environment. IBM's capabilities empower you to dynamically monitor and quantify security risks, enabling you to better:

- understand threats and vulnerabilities in terms of business impact

- respond to security events with security controls that optimize business results

- prioritize and balance your security investments.

Through world-class solutions that address risk across all aspects of your business, IBM is able to help you create an intelligent infrastructure that drives down costs, is secure, and is just as dynamic as today's business climate. IBM's cloud security solutions build on the strong foundation of the IBM security framework to extend these benefits from traditional IT environments to cloud computing environments.


Iaas, Saas, PCI, Systrust

Iron Mountain

The newest addition to Iron Mountain Digital’s Storage-as-a-Service portfolio, the Virtual File Store service leverages the security, compliance and scalability of the Storage-as-a-Service framework to manage large volumes of inactive digital data to reduce overall storage expenses. With Iron Mountain Digital’s service model, companies can deploy cost-effective cloud-based storage with enterprise-grade security to reduce the risk, cost and complexity of managing digital information.

Iron Mountain Digital is the world's leading provider of Storage-as-a Service solutions for backup and archiving. The technology arm of Iron Mountain Incorporated offers a comprehensive suite of data protection, archiving and intellectual property management solutions to thousands of companies around the world, directly and through a worldwide network of channel partners. Iron Mountain Digital is based in Southborough, Mass. with European headquarters in Frankfurt, Germany.

Iron Mountain Incorporated (NYSE:IRM) helps organizations around the world reduce the costs and risks associated with information protection and storage. The Company offers comprehensive records management and data protection solutions, along with the expertise and experience to address complex information challenges such as rising storage costs, litigation, regulatory compliance and disaster recovery. Founded in 1951, Iron Mountain is a trusted partner to more than 120,000 corporate clients throughout North America, Europe, Latin America and Asia Pacific.


Privileged Identities, Privileged Identity Management, Privileged Password Management, Security Management, Information Assurance, Information Security, Admin Accounts, Administrative Accounts, Local Accounts, Domain Accounts, Service Accounts, Root Accounts, Compliance, PCI, HIPAA, SOX

Lieberman Software

Lieberman Software provides privileged identity management and security management solutions that protect the multi-platform enterprise. By automating time-intensive IT administration tasks, Lieberman Software increases control over the computing infrastructure, reduces security vulnerabilities, improves productivity and helps ensure regulatory compliance. As Pioneers of Privileged Identity ManagementSM Lieberman Software not only developed the first software solution to address this need, its products continue to lead the market in features and functionality. The company is headquartered in Los Angeles, CA with an office in Austin, TX and channel partners throughout the world. For more information, see www.liebsoft.com or email us at [email protected].


SSO, single sign on, SaaS, cloud, Identity, Security, SAML, OpenID, Oauth, federated identity, management, STS, security token server, application security, access management, traffic, APIs, API Security, API Management, web services, authentication, audit, data privacy, encryption, IaaS, PaaS, XML, SOA, WS-security, SAML, XML identity, XML intrusion, XML acceleration, XML transformation, XML firewall, SOA firewall, Web services firewall, XML gateway, SOA gateway, Web services gateway, XML proxy, XML security, SOA security, Web services security

Layer 7 Technologies

Layer 7 Technologies markets gateways for securing and managing APIs in SOA, Web and Cloud. The Layer 7 CloudSpan Gateways address security and management issues for enterprises integrating to the cloud, and for service providers delivering services from the cloud.

Using the CloudSpan "CloudConnect" Gateway, enterprises can simplify the process of integrating to SaaS and PaaS platforms in both private and public clouds. CloudConnect helps organizations address Single Sign-on, Communication Security, Usage Tracking and Application Integration in a single appliance or VM gateway.

The CloudSpan "CloudControl" gateway helps SaaS, IaaS and PaaS cloud providers securely expose their service APIs to customers and partners while addressing access, abstraction and metering in a simple to configure, high performance hardware, software or VM appliance.

For more information please contact [email protected]


Saas, PaaS, IaaS, cloud, security, monitoring, reporting, reports, alerting, log management, logging, logs, events, incidents, firewalls, ids, correlation, real-time, SIEM, security information and event management, correlation, incident management, managed service provider, managed security service provider, MSP, MSSP, threat management, incident management, risk management, audit, compliance, PCI, HIPAA, SOX, GLBA, FISMA, NERC, FERC, governance, SLA, on-demand

netForensics

For over a decade, netForensics security solutions have helped managed service providers, enterprises, and government agencies around the world to manage risk, protect critical assets, and maintain compliant operations. netForensics’ nFX SIM One software platform and Cinxi appliance products have been designed to address the unique needs of MSPs by providing flexible, on-demand delivery models that automate threat management and incident response in high volume, multi-tenant environments. Many of the world’s leading Service Providers rely on netForensics products and expertise to grow their security services business while gaining economies of scale that reduce the cost of providing security management.

For more information, please email us at: [email protected]


security, network forensics, incident response, intrusion detection, advanced threats, malware detection, e-discovery, application security, virtualization, network visibility

NetWitness Corporation

NetWitness helps organizations in over 160 countries dramatically improve their ability to defend against advanced threats. NetWitness NextGen is the only network monitoring product on the market today that allows users to: analyze and model hundreds of terabytes of live network traffic in real-time; generate automated, comprehensive analyses that can be easily understood by both cyber analysts and non-technical personnel, and integrate third party threat feeds and create actionable network intelligence. Based upon a dedicated and extensible full packet capture and session analysis infrastructure that can be used within enterprise cloud and virtual environments, NextGen performs both rules-based and interactive session analysis across the entire network protocol stack, up to the application layer. NetWitness NextGen is designed for organizations to address concurrent problems of insider threat management, data leakage protection, network forensics and incident response, compliance verification, network e-discovery, designer malware and zero-day threat detection. NetWitness customers include Defense, National Law Enforcement and Intelligence Agencies, Top US and European Banks, Critical Infrastructure, and Global 1000 organizations. NetWitness has offices in the U.S. and the U.K., and partners throughout North and South America Europe, the Middle East, and Asia. Download a freeware version of NetWitness and see what you've been missing on your network: http://download.netwitness.com.


SaaS, SAML, WS Federation, Shibboleth, application security, interoperability, single-sign-on, audits, federation, secure storage access

Novell Inc.

With over 20 years of experience, Novell is a leader in identity management and security solutions. Novell delivers a web-based identity and access management solution that is based on open standards. Novell's solution provides out-of-the-box integration with leading enterprise identity stores, comprehensive compliance reporting of all user activity, centralized just-in-time provisioning and much more.

For security specifically, Novell offers an innovative web-based security service for Cloud Providers e.g. Saas applications more secure and manageable for the enterprise.  It extends beyond simple sso functionality to provide enterprises the ability to extend their identities, policies, audits and workflow from the enterprise to the cloud infrastructure.


cloud, security, SaaS, IPS, WAF, anti-DDoS, SVM, vulnerability, application security, web security, PCI, CSA, CVE

NSFOCUS

NSFOCUS is a leading provider of vulnerability assessment, Web Application Firewall (WAF), Network Intrusion Prevention System (NIPS), Anti-DoS, content security gateway, and etc. Powered by its 10+ years of security vulnerability research, NSFOCUS has been the major contributor of security vulnerability research at the industry by freely sharing and resolving over tens vulnerabilities from critical applications.In conjunction with security hardware appliances and software, NSFOCUS has been delivering security services through Security As A Service (SaaS), including web reputation service, vulnerability assessment, Anti-DDoS and etc. Its customers come from government, finance, telco operators, ISP, power providers, etc.


IaaS, SaaS, cloud, virtualization, cloud security, managed security, security program, application security, identity and access management, compliance network security, IPVPN, network security, secure access, secure remote access, infrastructure as a service, Security as a Service, Software as a Service, Cloud architecture services, managed security services, anti-DDoS, SLA

Orange Business Services

Orange Business Services, the France Telecom Orange branch dedicated to B2B services, is a leading global integrator of communications solutions for multinational corporations. Orange Business Services provides a comprehensive portfolio of Infrastructure and software as a service solutions, addressing the needs of entreprises of all sizes, thanks to a choice of cost-effective packaged products based on shared infrastructures as well as highly customized and dedicated solutions for specific security and compliance needs. Combining its IT expertise with its world's largest, seamless network for voice and data, Orange Business Services can ensure that the security and the performance of its cloud computing solutions are guaranteed end-to-end.


encryption, key management, data protection, application security, DLP

PGP Corp.

PGP Corporation is a global leader in email and data encryption software for enterprise data protection. Based on a unified key management and policy infrastructure, the PGP® Encryption Platform offers the broadest set of integrated applications for data security. PGP® platform-enabled applications allow organizations to meet current needs and expand as security requirements evolve. From the datacenter, to the endpoint and beyond, PGP® solutions protect data whether it is at rest, in motion or in use.


SSO, single sign on, SaaS, cloud, Identity, Security, SAML, OpenID, Oauth, federated identity, management, STS, security token server

Ping Identity

Ping Identity provides Internet and cloud identity security solutions for Internet Single Sign-On (SSO), Identity-Enabled Web Services and Internet User Account Management. More than 400 enterprises, government agencies and SaaS vendors rely on Ping Identity to secure SaaS and cloud-based application access while reducing administrative costs and improving user experience. Visit www.pingidentity.com for additional information.


on demand security, on demand vulnerability and compliance management

Qualys, Inc.

Qualys®, Inc. is the leading provider of on demand IT security risk and compliance management solutions ­ delivered as a service. Qualys Software-as-a-Service solutions are deployed in a matter of hours anywhere in the world, providing customers an immediate and continuous view of their security and compliance postures. The QualysGuard® service is used today by more than 3,500 organizations in 85 countries, including 40 of the Fortune Global 100 and performs more than 200 million IP audits per year. Qualys has the largest vulnerability management deployment in the world at a Fortune Global 50 company. Qualys has established strategic agreements with leading managed service providers and consulting organizations including BT, Etisalat, Fujitsu, IBM, I(TS)2, LAC, NTT, SecureWorks, Symantec, Tata Communications and TELUS.


Rackspace Cloud

The Rackspace Cloud provides on-demand and scalable website, application and storage hosting backed by Fanatical Support®. Through an integrated suite of cloud solutions – Cloud Sites™, Cloud Files™ and Cloud Servers™ – The Rackspace Cloud enables astute developers and IT managers to trade the hassles, upfront investments and high costs for a hosting environment that scales easily when traffic fluctuates.

For more information about The Rackspace Cloud, visit www.rackspacecloud.com or call 1-877-934-0409.


RSA Security

RSA, The Security Division of EMC, is the expert in information-centric security, enabling the protection of information throughout its lifecycle. RSA enables customers to cost-effectively secure critical information assets and online identities wherever they live and at every step of the way, and manage security information and events to ease the burden of compliance.

RSA offers industry-leading solutions in identity assurance and access management, encryption, security information management and anti-fraud protection, bringing trust to millions of user identities, the transactions that they perform, and the data that is generated. For more information, please visit www.RSA.com and www.EMC.com.


compliance, data protection, PCI, IPS, intrusion detection, application security, identity and access management, virtualization, Iaas, audits, advanced threats, DLP, security, cloud security, infrastructure as a service, Database Activity Monitoring, Vulnerability Assessment

Sentrigo

Sentrigo is a recognized innovator in database security solutions, offering a full suite of products for vulnerability assessment, virtual patching and monitoring/auditing of Oracle, Microsoft SQL Server, MySQL, and Sybase systems. The company’s flagship product, Hedgehog Enterprise, provides Database Activity Monitoring (DAM) and real-time Intrusion Prevention, protecting sensitive data from external threats and misuse by privileged insiders. Sentrigo's autonomous sensors protect data from the inside, allowing Hedgehog to detect even the most sophisticated attacks, and to work efficiently in today's modern IT infrastructure, including virtualization and cloud computing environments.

Sentrigo provides full visibility into all database activity and allows enterprises to enforce security policy and comply with regulatory requirements, such as PCI DSS, Sarbanes-Oxley, and HIPAA. The company has won wide acclaim for its technology leadership, and recently received the Cloud Computing World Series Award for 'Best Security Solution' and the 2010 Global Product Excellence Award for Database Security from Info Security Products Guide. For more information, please visit: www.sentrigo.com


application security, access management, traffic ,anagement, SaaS, APIs, web services, authentication, audit, data privacy, encryption

Sonoa Systems

Sonoa provides the visibility, management, and governance required to make Cloud services and APIs as robust, compliant, and scalable as internal on-premise applications. Sonoa ServiceNet is deployed as a proxy between service and consumers, serving as a single point of control over service policy. Sonoa uses a network-router design that supports the high concurrency required by the Cloud with extremely low latency. It is configured and administered without writing code and available as either on-premise software, hardware or as a managed service.


Symantec

Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.


Symplified

Symplified provides the trust fabric of the Cloud by enabling companies to extend and enforce identity and access management policies on cloud applications. Symplified is the market share leader in cloud identity with more than 1 million seats of the Symplified Suite currently deployed by Fortune 500 and small medium businesses. Symplified provides the only complete cloud identity platform that unifies Web access management, federated SSO, auditing and user provisioning. Meanwhile, the Symplified Trust Cloud™ is the only identity and access management solution woven into the fabric of the Amazon Web Services platform and capable of delivering cloud security services on a massively scalable and global basis. It is deployed in 40 data centers worldwide. The company has been recognized by the Wall Street Journal in its 10th Annual Technology Innovation Awards, named Coolest Cloud Security Vendor by CRN, a Start-Up to Watch by Network World, and one of the Top 10 Most Innovative Companies at the RSA 2011 conference. Symplified’s management team has been developing pioneering identity and access management solutions for 15 years, and created Web access management market maker Securant and the ClearTrust product, which was acquired by RSA Security for $140 million. The company has received more than $18M in financing from leading venture capital firms Granite Ventures and Allegis Capital. 


virtualization, virtual security, data protection, application security, PCI, DLP, intrusion detection, malware detection, cloud security, security

Trend Micro

With over two decades of expertise in Endpoint, Messaging and Web Security, Trend Micro provides individuals, and organizations of all sizes, with smarter security solutions that protect against a wide range of insidious threats and combined attacks including viruses, spam, phishing, spyware, botnets and other Web threats, such as data-stealing malware. Trend Micro develops, delivers, and supports proactive cloud-based solutions designed to safeguard critical information and protect personal and corporate reputations. As an industry leader in security intelligence, Trend Micro’s mission is to secure the exchange of digital information by providing the most flexible and customizable Internet Content Security solutions available.


IaaS, cloud, virtualization, cloud security, managed security, security program, application security, forensics, identity and access management, compliance

Verizon Business

Verizon Business, a unit of Verizon Communications, is a global leader in IT and communications solutions. We integrate our professional expertise, security capabilities, data center footprint and the world’s most connected IP network into a leading enterprise-ready and scalable cloud computing solution. Our IT, security and network solutions help securely connect today's extended enterprise of widespread and mobile customers, partners, suppliers and employees - enabling them to increase productivity and efficiency and help preserve the environment. Many of the world's largest businesses and governments - including 96 percent of the Fortune 1000 and thousands of government agencies and educational institutions - rely on our professional and managed services and network technologies to accelerate their business.


Zscaler Inc.

Through a multi-tenant, globally-deployed infrastructure, Zscaler enforces business policy, mitigates risk, and provides twice the functionality at a fraction of the cost of current solutions. It enables organizations to provide the right access to the right users, from any place and on any device—while empowering the end-user with a rich Internet experience.