Solution Providers

Solution Providers

Name of Organization Begins With:
Centrify
Centrify

Centrify is redefining the legacy approach to Privileged Access Management (PAM) by delivering cloud-ready Zero Trust Privilege to secure access to Infrastructure, DevOps, Cloud, Containers, Big Data, and other modern enterprise attack surfaces. As traditional network perimeters dissolve, organizations must discard the old model of “trust but verify”, which relied on well-defined boundaries. Zero Trust mandates a “never trust, always verify, enforce least privilege” approach to privileged access, from inside or outside the network. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment. By implementing least privilege access, Centrify minimizes the attack surface, improves audit and compliance visibility, and reduces risk, complexity, and costs for the modern, hybrid enterprise.

Organizations may consider approaching PAM by solely implementing password vaults, leaving gaps that can easily be exploited. Centrify Zero Trust Privilege combines password vaulting with brokering of identities, multi-factor authentication enforcement, and “just enough” privilege, all while securing remote access and monitoring of all privileged sessions.

Centrify’s industry-recognized solution redefines legacy PAM and goes beyond simple password vaulting to converge the core tenets of Zero Trust Privilege. Over half of the Fortune 100, the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies, all trust Centrify to stop the leading cause of breaches – privileged credential abuse. For more information, please visit www.centrify.com.

Visit http://www.centrify.com/

CEPREI Certification Body
CEPREI Certification Body

CEPREI HQ No.110 Dongguan Zhuang RD. Guangzhou, P.R.China Telephone: +86-20-87236606 [email protected] As a leading provider of management system certification body in China and the first Executive Member of CSA in Asia, CEPREI Certification Body Provides information security related professional services such as ISO20000 & ISO27001 certification, risk assessment, IT governance, Business Continuity Management etc. Also, newly launched C-STAR assessment scheme is provided to help our client fully understand cloud security issues they’re facing and how to put the appropriate controls in place. CEPREI Certification Body with unique legal status is a registrar authorized and accredited by national department and/or accreditation bodies home and abroad, to conduct third-party certification. It grew out of Inspection Division of China Electronic Product Reliability and Environmental Research Institute (the Fifth Electronic Institute) established in 1956, which is the first scientific research organization at national level engaged in product quality and reliability research in China. As early as 1979, CEPREI Certification Body introduced the concept of Certification into China. Ever since then CEPREI has issued more than ten thousand certificates of various types to its clients. It sets foot in all administrative regions in mainland China and other countries and regions including Hongkong Special Administration Region, Taiwan, USA, German, Holland, Denmark, Australia, Japan, Korea, Malaysia, Thailand and Singapore. As one of the most authoritative accreditation bodies in the world, America National Standard Institute-Registrar Accreditation Board (ANAB) has authorized CEPREI Certification Body to issue ISO9000, ISO14000 and ISO27001 certificates with ANAB logo since 2001. The certificate will be helpful for your products and services in improving reputation and enhancing competitiveness home and abroad.

Visit http://www.ceprei.org

Check Point
Check Point

Check Point Software Technologies Ltd. is a multinational provider of software and combined hardware and software products for IT security, including network security, endpoint security, mobile security, data security and security management.

Visit https://www.checkpoint.com

Citrix
Citrix

Information security has never been so challenging. Trends such as public and private cloud services, consumerization and workshifting (work anywhere) mean that more people are accessing enterprise data, applications and desktops from more places, over more networks and in more ways than ever before. In the face of more sophisticated threats and a rising burden of data protection, privacy and compliance, IT must take control. Citrix provides secure-by-design cloud and networking solutions, complemented by industry-leading security partners, that enables organizations to simplify cloud security and accelerate the delivery of applications while protecting them from attack. Data, applications, desktops and services are managed and secured centrally wherever they are—public clouds, private clouds or enterprise datacenters—and delivered securely anywhere, over any kind of connection to any device. With Citrix, your organization embraces the cloud securely, regains control and manages risk more effectively while providing optimal flexibility to allow your business to do what it needs to do, the way it needs to.

Visit http://www.citrix.com/secure

CloudPassage
CloudPassage

CloudPassage addresses the number one inhibitor to cloud adoption – security. We provide server security products purpose-built for server environments where servers are cloned, migrated, bursted, and boomeranged. The company's Halo line of products operate seamlessly across public, private, and hybrid cloud environments and can even be used on physical servers. The products bridge the gap between traditional perimeter-oriented datacenter security and security in dynamic cloud environments.

Visit http://www.cloudpassage.com/

Coalfire
Coalfire

Coalfire is the trusted leader in cybersecurity risk management and compliance services. Coalfire integrates advisory and technical assessments and recommendations to the corporate directors, executives, boards, and IT organizations for global brands and organizations in the technology, cloud, healthcare, retail, payments, and financial industries. Coalfire's approach addresses each businesses' specific vulnerability challenges, developing a long-term strategy to prevent security breaches and data theft. Coalfire provides advisory and assessment services for cyber security and compliance in DoD SRG, FISMA/FedRAMP, HIPAA/HITRUST, PCI DSS, PCI PA-DSS, ISO 27001, SOC and technical testing services such as penetration testing, social engineering and forensics. Coalfire has offices throughout the United States and Europe.

Visit http://www.coalfire.com/

Conga
Conga

Conga helps businesses get more value from their CRM by transforming their processes through AI-empowered digital transformation. Conga delivers digital transformation by helping create, manage, collaborate on, negotiate, and eSign business documents and contracts, all via visual process automation. The Conga Suite of products helps to simplify user experiences and increase productivity.

As a Salesforce Platinum Partner, Conga has built a base of more than 700,000 users, in 85+ countries, across all industries. Thousands of organizations rely on Conga daily to manage and simplify critical business processes. The company is based in Colorado with global operations in the UK and Australia. Learn more at www.conga.com or follow Conga on Twitter: @getconga.

Visit http://www.conga.com

Cradlepoint
Cradlepoint

Branch, mobile, and IoT edge networks are undergoing dramatic change — and taking traditional enterprise WANs to their breaking point. Organizations must manage complex branch sites; data-driven vehicle fleets and mobile command centers; a vast array of IoT and M2M use cases; and everything in between. Founded in 2006, Cradlepoint has grown to become the industry leader in cloud-delivered 4G LTE network solutions for business, service providers, and government organizations, and we are committed to extending our leadership into the emerging 5G space. More than 25,000 customers worldwide in retail, financial services, healthcare, transportation, public sector, and other industries rely on Cradlepoint to keep their branch and mobile networks, and IoT devices, always connected and protected. Our Elastic Edge™ vision provides a blueprint for next-generation, software-defined edge networks built on pervasive and reliable 4G/5G wireless services, connecting people, places, and things everywhere with enterprise-class visibility, security, and control.

Cradlepoint is a privately held company headquartered in Boise, Idaho, with a development center in Silicon Valley, California, and international offices in the UK and Australia.

Visit https://cradlepoint.com/

Crowdstrike
Crowdstrike

CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR), and a 24/7 managed hunting service — all delivered via a single lightweight agent. The CrowdStrike Falcon™ platform, certified to replace legacy antivirus, has reinvented how endpoint security is delivered with its industry-leading, cloud native architecture. CrowdStrike Falcon protects customers against advanced cyber attacks, using sophisticated signatureless artificial intelligence/machine learning and Indicator of Attack (IOA) based threat prevention to stop known and unknown threats in real-time. Core to its innovative approach is the CrowdStrike Threat Graph™ which analyzes and correlates over 27 billion events per day from millions of sensors deployed across more than 170 countries, uniquely providing crowdsourced protection for the entire customer community.

Visit https://www.crowdstrike.com/

CyberInt
CyberInt

Recently recognized as one of the 20 most promising enterprise security solution providers for 2018 by CIOReview, CyberInt eliminates potential threats before they become crises by looking at all online activities and digital assets from an attacker’s perspective and provides managed detection and response services to customers worldwide. Leveraging ArgosTM real-time Digital Risk Protection platform with a global cyber expert analyst team, as well as managed SOC, threat hunting, deep dive investigations, real-time incident response and risk and business impact assessment services, CyberInt provides holistic end-to-end protection to digital businesses in retail, ecommerce, gaming and financial industries.

Visit https://www.cyberint.com/

CyQureX Systems Pvt Ltd
CyQureX Systems Pvt Ltd

Based in Bangalore, India, we are a dedicated team of experts with the passion and commitment to secure your business.

CyQureX, along with its partners, provides an array of products and services that will secure your business so you can drive innovation and growth. Our products and services secure your value chain end to end.

SAIFE – A Complete Cyber Security Solution for Connected Devices Increasing complexities of modern businesses have necessitated hosting of data beyond traditional secure perimeters. Data today is hosted in cloud environments and retrieved through mobile devices on the go. Enterprises often find themselves in a situation where they are forced to choose between security and mobility. While breach of security can translate into loss of reputation and legal liabilities, lack of mobility can hinder business growth. SAIFE addresses this challenge through its disruptive innovation – Continuum, a software defined perimeter (SDP) based platform.

Moving Away from ‘Secure Connection’ to ‘Protection before Connection’ The solution rids enterprises of worries pertaining to compromised devices and exploited networks. The platform, Continuum, leaves no footprint of established connectivity negating the possibility of pre-authenticated reuse of assumed connectivity. The connection itself is stateless and transactional, and creates secure data-transfer tunnels devoid of the need for VPNs and firewalls. The result –software defined perimeter that goes beyond the bounds of systems, environments, devices, user profiles, networks, and locations. Only verified users can connect through any end- point device through trusted and pre-negotiated policy-based authentication. Even off-the- shelf iOS and Android mobile devices can be transformed into secure devices.

Visit https://www.cyqurex.com/

Cyxtera
Cyxtera

Cyxtera Technologies combines a worldwide footprint of 50+ best-in-class data centers with a portfolio of modern, cloud- and hybrid-ready security and analytics offerings – providing more than 3,500 enterprises, government agencies and service providers an integrated, secure and cyber-resilient infrastructure platform for critical applications and systems. For more information about Cyxtera visit http://www.cyxtera.com/.

Visit https://www.cyxtera.com/