Solution Providers

Solution Providers

Name of Organization Begins With:
Checkpoint Software
Checkpoint Software

Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading
provider of cyber security solutions to governments and corporate
enterprises globally. Its solutions protect customers from 5th generation
cyber-attacks with an industry leading catch rate of malware, ransomware
and other types of attacks. Check Point offers multilevel security
architecture, , which defends enterprises’ cloud, network and mobile device
held information. Specifically, Check Point CloudGuard, provides unified
cloud native security for assets and workloads, across multi-cloud
environments to automate security, prevent threats, and manage posture.

Visit https://www.checkpoint.com/

CipherCloud
CipherCloud

CipherCloud introduced the first CASB solution to the market in 2011 and continues to reshape the cloud security market. CipherCloud’s recognized deep data visibility, adaptive controls and data protection expertise forms the foundation for the industry’s only zero-trust CASB solution, providing seamless zero-trust security across all clouds with unified policies, trusted data protection, and automated compliance for the cloud-mobile era. CipherCloud is a winner of the Best Cloud Security Product of the Year by SC Magazine, the only Visionary in Gartner’s 2019 CASB Magic Quadrant, and the Overall Leader in the KuppingerCole CASB Leadership Compass two years in a row. The world’s largest global enterprises and government institutions in over 25 countries protect and secure their cloud information with CipherCloud. CipherCloud is backed by Andreessen Horowitz, Transamerica Ventures, Delta Partners and T-Venture, the venture capital arm of Deutsche Telekom. For more information, visit www.ciphercloud.com and follow us on Twitter @ciphercloud.

Visit https://www.ciphercloud.com/

Citrix
Citrix

Information security has never been so challenging. Trends such as public and private cloud services, consumerization and workshifting (work anywhere) mean that more people are accessing enterprise data, applications and desktops from more places, over more networks and in more ways than ever before. In the face of more sophisticated threats and a rising burden of data protection, privacy and compliance, IT must take control. Citrix provides secure-by-design cloud and networking solutions, complemented by industry-leading security partners, that enables organizations to simplify cloud security and accelerate the delivery of applications while protecting them from attack. Data, applications, desktops and services are managed and secured centrally wherever they are—public clouds, private clouds or enterprise datacenters—and delivered securely anywhere, over any kind of connection to any device. With Citrix, your organization embraces the cloud securely, regains control and manages risk more effectively while providing optimal flexibility to allow your business to do what it needs to do, the way it needs to.

Visit http://www.citrix.com/secure

CloudHealth
CloudHealth

CloudHealth is the most trusted software platform for accelerating global business transformation in the cloud. More than 10,000 organizations globally rely on CloudHealth to optimize, secure, and govern over $11B in combined cloud spend. With CloudHealth, customers spend more time on innovation and improve cross-organizational collaboration. Known for offering the highest levels of data integrity and scalability throughout an organization’s entire multicloud journey, CloudHealth enables enterprises and service providers, such as Intuit, Dow Jones, Xero, EE, Presidio, and SHI, to deliver higher quality products and solutions faster, while keeping costs under control. The company was acquired by VMware in 2018.

Visit https://www.cloudhealthtech.com/

CloudPassage
CloudPassage

CloudPassage addresses the number one inhibitor to cloud adoption – security. We provide server security products purpose-built for server environments where servers are cloned, migrated, bursted, and boomeranged. The company's Halo line of products operate seamlessly across public, private, and hybrid cloud environments and can even be used on physical servers. The products bridge the gap between traditional perimeter-oriented datacenter security and security in dynamic cloud environments.

Visit http://www.cloudpassage.com/

Cloudrise
Cloudrise

Businesses are powered by data, and the exponential growth of that data increases cyber risk exposure. This increased risk to data is no longer just an IT problem to solve - Instead, stakeholders from regulatory, compliance, security, finance, HR, and operations teams all have a stake protecting it. Combining decades of data protection expertise with automation, Cloudrise focuses on securing organizations’ data wherever it resides. We assist organizations by assessing, enabling, automating, and managing their data protection and privacy programs.

Visit https://cloudrise.com/

Cloudtango
Cloudtango

Cloudtango is a Managed Service Provider directory offering an easy way to match business needs with MSP/MSSPs throughout the industry. Our directory contains thousands of Managed Security Service Providers searchable by Service, partnership and location.

Visit https://www.cloudtango.org/

CloudVector
CloudVector

Discover, Monitor, Secure Your APIs


CloudVector enables organizations to go beyond the gateway with the first API Threat Protection solution that operationalizes the observability and security of enterprise APIs. Only CloudVector automates the continuous discovery of APIs, monitors for deviant behavior, and secures data from exfiltration to prevent breaches.

API Inspection Modules (AIM) use fully automated microsensor modules to enable the continuous discovery of all APIs--even shadow APIs. Deep API Risk Trackers (DART) apply AI policies to customer-specific API blueprints to monitor for API risks and real-time detection of reconnaissance attempts. API Response Modules (ARM) enforce targeted policies against API abuse in real-time. CloudVector is the only API Threat Protection solution to entirely address the OWASP API Security Top 10.

CloudVector is purpose-built for modern application architectures, and is deployed with zero impact to inline performance, with no changes required to applications or DevOps processes. In fact, CloudVector eliminates the need for manual API specification registration to deliver immediate time to value.

Visit https://www.cloudvector.com/

CNG Cyber Solutions
CNG Cyber Solutions

CNG’s game changing solutions are designed to combat the ever-evolving cyber security threat environment. CNG Cyber Solutions, LLC three focus areas. Ground Zero, Federal Risk and Authorization Management Program (FedRAMP) FedRAMP Certification and Accreditation, Custom design and building of Sensitive Compartmented Information Facility.

Visit https://www.cngcybersolutions.com

Coalfire Controls
Coalfire Controls

Coalfire is the trusted leader in cybersecurity risk management and compliance services. Coalfire integrates advisory and technical assessments and recommendations to the corporate directors, executives, boards, and IT organizations for global brands and organizations in the technology, cloud, healthcare, retail, payments, and financial industries. Coalfire's approach addresses each businesses' specific vulnerability challenges, developing a long-term strategy to prevent security breaches and data theft. Coalfire provides advisory and assessment services for cyber security and compliance in DoD SRG, FISMA/FedRAMP, HIPAA/HITRUST, PCI DSS, PCI PA-DSS, ISO 27001, SOC and technical testing services such as penetration testing, social engineering and forensics. Coalfire has offices throughout the United States and Europe.

Visit http://www.coalfire.com/

Concourse Labs
Concourse Labs

Concourse Labs Modernizes Enterprise Cloud Governance, Delivering Visibility, and Control. Built by Cloud Pioneers.

Visit https://www.concourselabs.com/

Conga
Conga

Conga helps businesses get more value from their CRM by transforming their processes through AI-empowered digital transformation. Conga delivers digital transformation by helping create, manage, collaborate on, negotiate, and eSign business documents and contracts, all via visual process automation. The Conga Suite of products helps to simplify user experiences and increase productivity.

As a Salesforce Platinum Partner, Conga has built a base of more than 700,000 users, in 85+ countries, across all industries. Thousands of organizations rely on Conga daily to manage and simplify critical business processes. The company is based in Colorado with global operations in the UK and Australia. Learn more at www.conga.com or follow Conga on Twitter: @getconga.

Visit http://www.conga.com

ControlCase
ControlCase

ControlCase is a global provider of certification, cyber security and continuous compliance services. ControlCase is committed to empowering organizations to develop and deploy strategic information security and compliance programs that are simplified, cost effective and comprehensive in both on-premise and cloud environments. ControlCase offers certifications and a broad spectrum of cybersecurity services that meet the needs of companies required to certify to PCI DSS, HITRUST, SOC 2 Type II, ISO 27001, PCI PIN, PCI P2PE, PCI TSP, PA DSS, CSA STAR, HIPAA, GDPR, SWIFT and FedRAMP.

www.controlcase.com

ControlCase
USA +1.703.483.6383
Canada +1.416.900.1272
Europe, Middle East and Africa +44.2035145389
India +91.7506610917
Asia Pacific +66-21056164
Website: https://controlcase.com
Email: [email protected]

Visit http://controlcase.com

ControlMap
ControlMap

ControlMap is the fastest & easiest audit readiness platform for SOC 2, ISO-27001, COBIT, FedRAMP, GDPR, & other cybersecurity certifications. Build a strong cybersecurity compliance baseline by keeping Risks, Controls, Policies, Procedures, & Evidence centrally organized & linked to each other. Reuse & reapply the baseline to one or many certifications. With efficient tracking & monitoring of your team's tasks between audits, there is no more audit time anxiety & surprises. Free 10-day trial!

Visit https://www.controlmap.io

Corelight
Corelight

Corelight delivers powerful network traffic analysis (NTA) solutions that help organizations defend themselves more effectively by transforming network traffic into rich logs, extracted files, and security insights. Corelight Sensors are built on Zeek (formerly called “Bro”), the open-source NTA framework that generates actionable, real-time data for thousands of security teams worldwide. Zeek has become the ‘gold standard’ for incident response, threat hunting, and forensics in large enterprises and government agencies worldwide. Corelight makes a family of physical, cloud and virtual network sensors that take the pain out of deploying open-source Zeek and expand its performance and capabilities.

Visit https://www.corelight.com/

CPG
CPG

CPG is Australian owned and a full-scope International Certification and Training Body. They are recognized by JAS-ANZ (Joint Accreditation System – Australia New Zealand), by Singapore Accreditation Council and by APMG International as an Accredited Certification Body, by SANAS (South African National Accreditation System) and by Exemplar Global as an Accredited Training Organisation. CPG certifies small through to large organisations, businesses, hospitals and government departments to both National and International standards, across a wide array of management systems certifications.

With offices in over 30 countries, CPG (formerly International Standards Global) is a full-scope CB, with accreditations from multiple IAF and National Bodies. Programs offered include ISO2700, ISO9000, HACCP, Food Safety, Occupational Health, Disability, and Business Continuity. https://cpg.global

Visit https://cpg.global

CrowdSec
CrowdSec

CrowdSec is an open-source & free security automation engine designed to protect servers, services, containers, or virtual machines exposed on the internet.

CrowdSec leverages a behavior analysis system based on logs to analyze visitor behavior & provide an adapted response to all kinds of attacks. The solution also brings a collaborative dimension to security by enabling users to protect each other. Each time an IP is blocked, it is shared, after curation, across the network so community members can also block it. The goal is to leverage the crowd power to create an extremely accurate global IP reputation system that benefits us all so we can make the Internet safer, together. Link: https://crowdsec.net/

Visit https://crowdsec.net/

CyberArk
CyberArk

CyberArk (NASDAQ: CYBR) is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security solutions for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads, and throughout DevOps pipelines. The world’s leading organizations trust Cyberark to help secure their most critical assets. To learn more about CyberArk, visit www.cyberark.com.

Visit https://www.cyberark.com/

Cyxtera
Cyxtera

Cyxtera Technologies combines a worldwide footprint of 50+ best-in-class data centers with a portfolio of modern, cloud- and hybrid-ready security and analytics offerings – providing more than 3,500 enterprises, government agencies and service providers an integrated, secure and cyber-resilient infrastructure platform for critical applications and systems. For more information about Cyxtera visit http://www.cyxtera.com/.

Visit https://www.cyxtera.com/

Dell
Dell

Dell Technologies (NYSE:DELL) is a unique family of businesses that helps organizations and individuals build their digital future and transform how they work and live. The company provides customers with the industry’s broadest and most innovative technology and services portfolio spanning from edge to core to cloud. The Dell Technologies family includes Dell, Dell EMC, Pivotal, RSA, Secureworks,Virtustream and VMware.

Visit https://www.dell.com

Digital Asset Custody Company, Inc
Digital Asset Custody Company, Inc

DACC provides institutional quality crypto currency asset custody to institutional investors, HNW individuals, and family offices. DACC’s goal is to custody any crypto asset, including those deemed to be securities by the SEC. Currently, DACC can technologically custody 60+ crypto assets with industry-leading egress times from our network of secure, cold storage (“air-gapped”) facilities. These facilities are built to align with best practices found in the most secure government and private security organizations offering security, redundancy and, most importantly for institutional investors, custody.

DACC’s leadership team is comprised of individuals with careers spent within the most sophisticated financial services firms. This experience provides a unique vantage point and drives the customer service ethos expected by sophisticated crypto currency investors.

The DACC provides:

  • Institutional quality crypto asset custody
  • Segregated asset storage for every customer
  • Emphasis on process transparency, reporting, and service
  • Enterprise cyber security and physical security controls
  • Audited operational procedures

DACC has applied for membership to the Financial Industry Regulatory Authority (FINRA) and upon approval will be a Securities and Exchange Commission (SEC) registered broker-dealer.

Visit https://www.digitalassetcustody.com/

Digiware S.A
Digiware S.A

Digiware S.A. is the expert provider of comprehensive strategies generation in information security for America. With 20 years of experience, it protects organizations against security risks involved technological growth; in turn, aware of the enormous challenge facing the areas of information security today rests on the definition, implementation and maintenance of strategic programs for information security, that integrate with business objectives.

Proactive protection Digiware S.A., under the model of Resources of Security Intelligence - RIS, provides the visibility needed to boards, governing bodies, personal risk, operational, technological and security, to deal with the risks of dynamic information.

Visit http://www.digiware.net/

DivvyCloud
DivvyCloud

DivvyCloud by Rapid 7 protects your cloud and container environments from misconfigurations, policy violations, threats and IAM challenges. With automated, real-time remediation DivvyCloud customers achieve continuous security and compliance, and can fully realize the benefits of cloud and container technology. We protect customers using AWS, Azure, GCP, and Kubernetes.

Visit https://www.divvycloud.com

DocuSign
DocuSign

The DocuSign Agreement Cloud™ digitally transforms how you do business via contracts and other types of agreements. Choose from more than a dozen applications and more than 350 integrations, covering the entire agreement process—from preparing to signing, acting on, and managing agreements. By modernizing your system of agreement with the DocuSign Agreement Cloud, you’ll do business faster with less risk, lower costs, and better experiences for customers and employees.

Visit https://www.docusign.com/

Dropbox
Dropbox

Millions of people trust Dropbox to easily and reliably store, sync, and share their documents, photos, and videos across devices and platforms. Dropbox for Business helps organizations around the world collaborate effectively and increase productivity. And it brings IT admins the functionality, controls, and visibility they need to ensure the safety of their company data. Dropbox has been designed to keep users’ data safe, employing a sophisticated infrastructure, enterprise-grade security, layers of encryption, and detailed security, privacy, and compliance policies and procedures. To learn more about Dropbox for Business, www.dropbox.com/business.

Visit https://www.dropbox.com/

DTCC
DTCC

With more than 40 years of experience, DTCC is the premier post-trade market infrastructure for the global financial services industry. From operating facilities, data centers and offices in 16 countries, DTCC, through its subsidiaries, automates, centralizes and standardizes the processing of financial transactions, mitigating risk, increasing transparency and driving efficiency for thousands of broker/dealers, custodian banks and asset managers. Industry owned and governed, the firm simplifies the complexities of clearing, settlement, asset servicing, data management and information services across asset classes, bringing increased security and soundness to the financial markets. In 2016, DTCC’s subsidiaries processed securities transactions valued at more than U.S. $1.5 quadrillion. Its depository provides custody and asset servicing for securities issues from over 130 countries and territories valued at U.S. $49.2 trillion. DTCC’s Global Trade Repository maintains approximately 40 million open OTC positions per week and processes over one billion messages per month. To learn more, visit us at www.dtcc.com or connect with us on LinkedIn, Twitter, YouTube and Facebook.

Visit http://www.dtcc.com/

Duo Security
Duo Security

Duo Security is a cloud-based trusted access provider protecting the world’s fastest-growing companies and thousands of organizations worldwide, including Dresser-Rand Group, Etsy, NASA, Facebook, K-Swiss, The Men’s Wearhouse, Paramount Pictures, Random House, SuddenLink, Toyota, Twitter, Yelp, Zillow, and more. Duo Security’s innovative and easy-to-use technology can be quickly deployed to protect users, data, and applications from breaches, credential theft and account takeover. Duo Security is backed by Benchmark, Google Ventures, Radar Partners, Redpoint Ventures and True Ventures. Try it for free at www.duo.com.

Visit https://www.duo.com

Effectual
Effectual

We are a team of highly experienced professionals who are passionate about solving business challenges and enabling digital transformation, innovation and scale.

We engage as a CAN DO team of creative, enthusiastic and effective problem solvers, leveraging our expertise to work with enterprises who are transitioning to cloud services, pursuing digital transformation initiatives and/or improving risk management through enhanced security solutions.

Visit https://www.effectual.com

Eigen
Eigen

Eigen is an NLP document intelligence platform that enables clients to

quickly and precisely extract insights from their contracts, so they can

manage risk, scale operations, meet changing regulatory requirements

and automate their previously manual processes. Eigen’s clients include

Goldman Sachs, ING, BlackRock and Allen & Overy.

Visit https://eigentech.com/

ElectroNeek
ElectroNeek

ElectroNeek, a Y Combinator company, is an easy-to-use, fast, and secure Robotic Process Automation platform, the first RPA that comes with an unlimited number of free bot licenses and built-in Orchestrator. It was featured in such publications as Forbes and TechCrunch as the unique platform that lets clients automate hundreds of attended and unattended processes and run them concurrently at no cost, paying only for developer seats. Its patent-pending 'Voodoo Interfaces' enables users to automatically fix bots when the UI of the automated environment changes, significantly decreasing the need for costly maintenance of RPA solutions. It also provides a set of visual tools to make RPA heavy-lifting, like browser automation to OCR, easy for business users (Citizen Automators), and junior IT professionals.

ElectroNeek has been recognized as a leading RPA platform by G2 ("Top performer Winter 2020") and Capterra, and got traction within US Banking, Insurance, Manufacturing and Professional Services industries. To better serve customers of all sizes, ElectroNeek has built a global network of certified implementation partners, consisting of more than 200 companies worldwide. Originally founded in NYC in 2019, it relocated to San Francisco in 2020.

Visit https://electroneek.com/

Entrust Datacard Corporation
Entrust Datacard Corporation

Consumers, citizens and employees increasingly expect anywhere-anytime experiences — whether they are making purchases, crossing borders, accessing e-gov services or logging onto corporate networks. Entrust Datacard offers the trusted identity and secure transaction technologies that make those experiences reliable and secure. Solutions range from the physical world of financial cards, passports and ID cards to the digital realm of authentication, certificates and secure communications. With more than 2,000 Entrust Datacard colleagues around the world, and a network of strong global partners, the company serves customers in 150 countries worldwide. For more information, visit .

Visit http://www.entrustdatacard.com

Ericom Software Inc.
Ericom Software Inc.

Ericom Software is a global leader in securely connecting the unified workspace. Ericom empowers today’s connected workforce and the IT organizations that support them by securing and optimizing desktop, application, and web content delivery to any device, anywhere. Founded in 1993, Ericom provides enterprise-grade secure remote access, desktop virtualization (VDI), and web security solutions to organizations across all industries. With a focus on application delivery, cloud enablement, and secure browsing, Ericom advances secure connectivity—providing end users with a superior work experience and optimizing enterprise productivity.

Visit https://www.ericom.com/

Excis Networks Ltd
Excis Networks Ltd

Excis Networks is a cybersecurity consultancy specialising in cloud privacy and security, data breach and identity.

Visit https://www.excis.co.uk

Exclaimer
Exclaimer

For nearly 20 years, Exclaimer has been the recognized global market leader in on-premises and cloud-based email signature software and solutions for Office 365, Microsoft Exchange, and G Suite. Headquartered just outside of London and with regional offices worldwide, its products are used by over 75 million users in 150+ countries.

Its diverse customer base includes renowned international organizations such as Sony, Mattel, 10 Downing Street, NBC, the Government of Canada, the BBC and many more organizations of all sectors and sizes. The company has been the recipient of multiple industry awards over the years and was the first company of its type to successfully achieve the ISO 27001 Certification for its cloud-based signature management service.

Visit https://www.exclaimer.com/

ExtraHop
ExtraHop

ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out. Our breakthrough approach analyzes all network interactions and applies advanced machine learning for complete visibility, real-time detection, and guided investigation. With this approach, we help the world’s leading enterprises rise above the noise of alerts, organizational silos, and runaway technology. Whether you’re investigating threats, ensuring delivery of critical applications, or securing your investment in cloud, ExtraHop helps you protect and accelerate your business.


Visit https://www.extrahop.com/

EY CertifyPoint
EY CertifyPoint

EY CertifyPoint HQ
Antonio Vivaldistraat 150 1083 HP Amsterdam The Netherlands [email protected]http://www.ey.com/certifypoint

International offices
Founded in 2002, EY CertifyPoint is an accredited independent and impartial certification institute with experienced auditors all over the world certifying some of the top international organizations. Being related to the global EY organization, EY CertifyPoint is able to provide you with a local contact person in nearly every country world-wide. For more information, please visit http://www.ey.com/certifypoint.

Visit http://www.ey.com/certifypoint

F5
F5

F5 makes apps go faster, smarter, safer for the world’s largest businesses, service providers, governments, and consumer brands. F5 delivers cloud and security solutions that enable organizations to embrace the application infrastructure they choose without sacrificing speed and control. For more information, go to f5.com and follow us on twitter @F5Networks.

Visit https://www.f5.com

Fenergo
Fenergo

Fenergo is a leading provider of Client Lifecycle Management, AML/KYC
Compliance and Client Data Management solutions for investment, corporate,
commercial and private banks.

Visit https://www.fenergo.com/

Fischer International
Fischer International

With a nearly 30 year heritage in shaping the enterprise security industry, Fischer continues its history of technology leadership and innovation by bringing to market a cloud-based Identity Services Platform that truly simplifies Identity Management, scales seamlessly from the SMB to the largest enterprise, and can be implemented either as a traditional software-as-a product deployment or via any outsourced delivery model. Fischer's solutions provide organizations of all sizes with greater choice in how they derive the benefits of Identity Management, but without risk or compromise. For more information, please visit: www.fischerinternational.com

Visit http://www.fischerinternational.com/

Five9
Five9

Five9, a provider of cloud contact center software, brings the power of the cloud to thousands of customers worldwide and facilitates more than three billion customer interactions annually. Since 2001, Five9 has helped organizations of every size transition from premise-based software to the cloud. With extensive expertise, technology, and an ecosystem of partners, Five9 helps businesses take advantage of their secure, reliable, scalable cloud contact center software to create exceptional customer experiences, increase agent productivity and deliver tangible business results. The purpose-built, highly scalable and secure Five9 Virtual Contact Center cloud platform delivers a comprehensive suite of easy-to-use applications that enable the breadth of contact center-related customer service, sales and marketing functions. For more information, visit www.five9.com.

Visit http://www.five9.com/