Solution Providers

Solution Providers

Name of Organization Begins With:
Fugue
Fugue

Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies. Our solution identifies cloud infrastructure security risks and compliance violations and ensures that they are never repeated. Fugue provides baseline drift detection and automated remediation to eliminate data breaches, and powerful visualization and reporting tools o easily demonstrate compliance.

Fugue automates compliance audits with out-of-the-box frameworks for HIPAA, GDPR, CIS Benchmark, and NIST 800-53, and supports custom policies. Fugue works with CI/CD pipelines to ensure compliance and prevent unauthorized change. Customers like Sparkpost, PBS, and SAP NS2 rely on Fugue to protect against cloud risks and enforce compliance.

Visit https://www.fugue.co/

Fujitsu
Fujitsu

As the world's third largest IT services provider and Japan’s number one ICT company with over 170,000 employees in more than 100 countries, Fujitsu has the resources and experience needed to ensure a predictable and successful cloud experience for our customers. Our annual revenues, which amounted to ¥4.5 trillion yen (US$55 billion) for the fiscal year ending on March 31, 2012, underpin an R&D program that has produced a flow of innovations and over 34,000 patents. For over a decade, Fujitsu has been creating the building blocks for cloud computing, investing heavily in cloud-based development on a global scale: from cloud data centers, to cloud interoperability and cloud security. Our cloud offerings have built-in security mechanisms for different types of cloud architectures including public, private, and hybrid clouds, and different cloud layers such as IaaS, PaaS, and SaaS. Fujitsu's IaaS security approach http://jp.fujitsu.com/solutions/cloud/concept/pdf/cloud-security-wp-us.pdf provides a comprehensive and adaptable set of security controls meeting and exceeding cloud security requirements from BSI http://globalsp.ts.fujitsu.com/dmsp/Publications/public/wp-fraunhofer-security.pdf, and Fujitsu's White Book of Cloud Security https://www-s.fujitsu.com/uk/contact/white-book-cloud-security.html is frequently cited as an indispensable guide for understanding cloud computing security. As an active member of the Cloud Security Alliance, the Trusted Computing Group, the Distributed Management Task Force, and other industry and government-led bodies, Fujitsu firmly committed to the cause of furthering cloud and security standards. For more information, please visit: http://www.fujitsu.com/global/solutions/cloud/

Visit http://www.fujitsu.com

Gemalto
Gemalto

Gemalto is the global leader in digital security, with 2016 annual revenues of €3.1 billion and customers in over 180 countries. We bring trust to an increasingly connected world. Our technologies and services enable businesses and governments to authenticate identities and protect data so they stay safe and enable services in personal devices, connected objects, the cloud and in between. Gemalto’s solutions are at the heart of modern life, from payment to enterprise security and the internet of things. We authenticate people, transactions and objects, encrypt data and create value for software – enabling our clients to deliver secure digital services for billions of individuals and things. For more information, please visit: http://www.gemalto.com

Visit http://www.gemalto.com

GitHub
GitHub

GitHub is how people build software. Millions of individuals and organizations around the world use GitHub to discover, share, and contribute to software—from games and experiments to popular frameworks and leading applications.

GitHub is a Web-based Git version control repository hosting service. Primarily used for computer code, GitHub offers all of the distributed version control and source code management functionality of Git, as well as adding its own features. It provides access control and several collaboration features such as bug tracking, feature requests, task management, and wikis for every project.

Whether you work for a small startup, a university, or a Fortune 500 company, GitHub enables powerful, collaborative workflows. You can use GitHub.com in the cloud or GitHub Enterprise on your server, then integrate your favorite apps and services to customize how you build software.

GitHub offers both plans for private and free repositories on the same account which are commonly used to host open-source software projects.

Playing host to almost 29 million users and 80+ million repositories, GitHub.com is the largest host of source code in the world.

Visit https://github.com

GohighSec
GohighSec

Datang Gohigh Security (Zhejiang) Information Technology Co., Ltd. (hereinafter referred to as " GohighSec ") was established in 2015 with registered capital of 10 million RMB Yuan. Is engaged in trusted computing, trusted cloud computing and information security technology and product research and development, production and sales of professional firms. The main products are universal trusted x86 servers, trusted storage, trusted network equipment, trusted cloud platform software and trusted industry solutions. GohighSec with independent intellectual property rights of trusted computing server and trusted cloud computing technology as the foundation, integration of trusted computing industry chain, leading to provide end-to-end product and solution, in order to realize information security escort.

Gohigh Data Networks Technology Co., Ltd (hereinafter referred to as Gohigh) is a high-tech enterprise which has integrated data industry-related technologies, products and resources from Datang Telecom Technology & Industry Group. Gohigh has been listed on Shenzhen Stock Market in 2003 (Stock Code SZ. 000851), and it is one of the two listed domestic companies of Datang Group.

GohighSec is a subsidiary of Gohigh. With research and development base in Beijing and Yiwu city, Zhejiang province. In Beijing, Shanghai, Nanjing, Jinan, Guangzhou, Chengdu have branch offices and service agencies.

Visit http://www.gohigh.com.cn

Google
Google

Google's cloud computing solutions allow you to dramatically lower IT costs, increase productivity and increase security. Google Apps is an enterprise-ready suite of applications that includes Gmail, Google Calendar, Google Docs and Spreadsheets, Google Sites, and Google Video. Google Postini services make on-premise email systems more secure, compliant and productive by blocking spam and other intrusions before they reach email networks, and by providing encryption and archiving to help meet compliance requirements. For more information, please visit http://www.google.com/apps/intl/en/business/index.html

Visit http://www.google.com/apps/intl/en/business/infrastructure_security.html

Gronau IT
Gronau IT

Our core competences include IT security consulting, data protection, IT infrastructure architecture, quality assurance and managed services. We work in an interdisciplinary, proactive and expedient way. You can expect autonomy, rock-solid reliability and the ability to think outside the box from us.

Our mission is a reduced workload and business process optimization, so that you, as our client, cut costs, stress and attain your business objectives faster.

Any time you require rapid and competent help with an IT project, we should have a chat. We would be happy to show you how you can gain the maximum benefit from our work and increase your productivity.

Visit https://www.gronau-it-cloud-computing.de

HackerOne
HackerOne

HackerOne is the #1 hacker-powered security platform, helping organizations receive and resolve critical vulnerabilities before they can be exploited. More Fortune 500 and Forbes Global 1000 companies trust HackerOne than any other hacker-powered security partner. Organizations, including the U.S. Department of Defense, U.S. General Service Administration, General Motors, Google, Twitter, GitHub, Nintendo, Lufthansa, Goldman Sachs, Qualcomm, Starbucks, Dropbox, Intel, and the CERT Coordination Center trust HackerOne to find critical software vulnerabilities before they can be criminally exploited. HackerOne customers have resolved over 72,000 vulnerabilities and have awarded over $30M in bounty rewards. HackerOne is headquartered in San Francisco with offices in London, New York, and the Netherlands.

Visit https://www.hackerone.com/

HERE Technologies
HERE Technologies

HERE Technologies enables people, enterprises and cities around the world to harness the power of location and create innovative solutions that make our lives safer and more efficient. We transform information from devices, vehicles, infrastructure and other sources into real-time location services that play a key role in how we move, live and interact with one another.

Visit https://here.com

Herjavec Group
Herjavec Group

Dynamic IT entrepreneur Robert Herjavec founded Herjavec Group in 2003 to provide cybersecurity solutions and services to enterprise organizations. Herjavec Group delivers SOC 2 Type 2 certified managed security services globally supported by a state-of-the-art, PCI compliant, Security Operations Centre (SOC), operated 24/7/365 by certified security professionals. This expertise is coupled with leadership positions across a wide range of functions including consulting, professional services & incident response. Herjavec Group has offices globally including head offices in Toronto (Canada), New York City (USA), Reading (United Kingdom) and Sydney (Australia).

Herjavec Group’s Managed Security Services practice defends enterprise level organizations globally from increasingly sophisticated, targeted cybercrime threats. Core managed services include: Security Information and Event Management, Intrusion Prevention and Detection, Application Security, Next Generation Firewall Management, Endpoint Protection, Data Loss Prevention, Web Proxy and URL Filtering and Vulnerability Management. Herjavec Group’s managed security service practice relies on two custom built technology pillars:

Herjavec Group Threat Framework - The Threat Framework allows dynamic and evolving threat modelling to be applied within any organizational environment. Herjavec Group focuses on meaningful security use cases to proactively identify attacks by applying the Framework to onboarded technologies & threat intelligence products in the customer’s environment. The Threat Framework covers key attack categories including Authentication, Targeted Attacks, Malware, DDOS and Traffic Anomalies.

Herjavec Group’s Analytics Platform - Herjavec Group’s Analytics Platform filters threat intelligence and customer data into actionable, relevant alerts. Alerts enriched using Herjavec Group’s Threat Framework are processed through the Platform, which automatically performs additional enriching functions including IP reputation look up, geo mapping, alert trending & deduplication, prior to preparing a readable output for Herjavec Group’s security analysts to review and action accordingly.

For more additional information or to engage a security specialist please visit www.herjavecgroup.com

Visit http://www.herjavecgroup.com/

Hewlett Packard Enterprise
Hewlett Packard Enterprise

HP is a technology company that operates in more than 170 countries around the world. At HP, our mission is to invent technologies and services that drive business value, create social benefit and improve the lives of customers — with a focus on affecting the greatest number of people possible. HP is also an IT education leader with unmatched content expertise in HP products, related processes and topics, and industry-standard technologies, and the first Master Training Partner selected by the Cloud Security Alliance. In addition, HP is a well-established security technology vendor in cloud computing and information security globally, offering vendor-neutral information security training focusing on real-world security processes and implementation, . HP helps clients gain new and unique business benefits. With 90+ learning centers worldwide, numerous partner facilities and customer's onsite locations HP offers courses that draw from 35+ years of meeting complex technology training requirements. Visit HP: www.hp.com/learn Learn what HP’s CEO, Meg Whitman, has to say about HP’s education services – watch video

Visit https://www.hpe.com/

HEXCloud
HEXCloud

HEXCloud is a professional catering chain system consulting service and related industry software product research and development company. With the long-term accumulation of rich industry management experience and the spirit of innovation, we will create solutions with international management concepts and local user management practices. Company always adhere to the "innovative ideas, innovative architecture" development concept and "with partners and customers win-win" service tenet, and partners for clients to provide professional HEX system implementation and customer service.

Visit http://www.hexcloud.cn/

HID Global
HID Global

HID Global® is the leading provider for innovative products, solutions and services that help organizations create, manage and use secure identities. Trusted by millions of customers around the world, HID Global provides comprehensive solutions to secure facilities, assets, networks and cloud resources.

HID Global will be the market leader for trusted identity solutions by providing seamless access and IP at the door solutions complemented by our Cloud Services. HID Global is dedicated to ensuring that when customers purchase Genuine HID products and solutions, they are purchasing absolute confidence in performance, value and service. HID Global is an ASSA ABLOY Group brand.

Visit https://www.hidglobal.com/

HKBN Enterprise Solutions Limited
HKBN Enterprise Solutions Limited

Who We Are

HKBN is Hong Kong’s largest provider of residential high-speed fibre broadband service (symmetrical 100Mbps to 1000Mbps) by number of subscriptions, and a rapidly growing enterprise solutions provider. We offer a diverse portfolio of premier telecom solutions to personal and enterprise markets, including broadband, mobile, entertainment, voice communications, cloud solutions, data facilities and system integration.

We built and own one of the most extensive fibre optic networks in Hong Kong, which covers over 2.2 million residential homes passed, representing approximately 81% of Hong Kong’s total residential units, and more than 2,200 commercial buildings. In 2004, we successfully built the largest Metro Ethernet network in the world. In 2005, we became the first Internet Service Provider in Hong Kong to offer 1,000Mbps residential Fibre-to-the-Home service. In 2013, we completed our acquisition of Y5ZONE Limited and further extended our Wi-Fi business development. In 2016, we further strengthened our Enterprise Solutions business with the acquisition of New World Telephone Holdings Limited’s telecommunications and online marketing solutions business. For more information, please visit http://hkbnes.net.

Visit http://hkbnes.net

Huawei
Huawei

Huawei is a leading global ICT solutions provider. Through our dedication to customer-centric innovation and strong partnerships, we have established end-to-end capabilities and strengths across the carrier networks, enterprise, consumer, and cloud computing fields. We are committed to creating maximum value for telecom carriers, enterprises and consumers by providing competitive ICT solutions and services. Our products and solutions have been deployed in over 170 countries and regions, serving more than one third of the world's population. Huawei's vision is to enrich life through communication. By leveraging our experience and expertise in the ICT sector, we help bridge the digital divide by providing opportunities to enjoy broadband services, regardless of geographic location. Contributing to the sustainable development of society, the economy, and the environment, Huawei creates green solutions that enable customers to reduce power consumption, carbon emissions, and resource costs.

Visit http://www.huawei.com/en/

Hyland
Hyland

For more than 20 years, Hyland has been dedicated to meeting organizations’ needs for document and process management with OnBase, an enterprise content management (ECM) solution. As OnBase has evolved through consistent product innovation, it remains focused on automating business processes that depend on documents, content and people to operate more effectively. OnBase is the pioneer of ECM in the cloud. Since 2000, the OnBase Cloud has been empowering more than 600 organizations around the world to better manage the content that surrounds their processes. The OnBase Cloud connects people to the content, data and processes they need to make more informed decisions – without additional infrastructure needs. Employee productivity increases as they spend less time searching for paper and dedicate more time to providing quality service to customers. For more information about OnBase cloud-based and hosted solutions, please visit https://www.onbase.com/

Visit https://www.hyland.com/

hyperproof
hyperproof

Hyperproof builds cloud-based software that allows organizations of all sizes to easily navigate their compliance journey. As the first-ever compliance operations solution, Hyperproof makes compliance efforts and audit processes faster, simpler and less expensive. Hyperproof’s leadership team of enterprise software veterans has a combined 150+ years of experience in finding solutions to the most complex enterprise software problems. Hyperproof provides compliance officers with the tools needed to collaborate with stakeholders, both internally and externally, to ensure that risks are mitigated, compliance objectives are met and business objectives achieved. Hyperproof offers technology solutions that help organizations meet their highest aspirations and demonstrate their commitment to protecting their customers, shareholders, partners and suppliers along with the greater community. For more information about Hyperproof and their products, log on to Hyperproof.io or follow Hyperproof on Facebook, Twitter, Instagram and LinkedIn.

Visit https://hyperproof.io/

IBM
IBM

IBM offers end-to-end solutions that enable you to take a business-driven and holistic approach to securing your cloud computing environment. IBM's capabilities empower you to dynamically monitor and quantify security risks, enabling you to better: - understand threats and vulnerabilities in terms of business impact - respond to security events with security controls that optimize business results - prioritize and balance your security investments. Through world-class solutions that address risk across all aspects of your business, IBM is able to help you create an intelligent infrastructure that drives down costs, is secure, and is just as dynamic as today's business climate. IBM's cloud security solutions build on the strong foundation of the IBM security framework to extend these benefits from traditional IT environments to cloud computing environments.

Visit http://www.ibm.com/security

iboss
iboss

iboss is a cloud security company that provides organizations and their employees secure access to the Internet on any device, from any location, in the cloud. This eliminates the need for traditional security appliances, which are ineffective at protecting a cloud-first and mobile world. Leveraging a purpose-built cloud architecture backed by over 100 patents and more than 100 points of presence globally, iboss protects more than 4,000 organizations worldwide. To learn more, visit http://www.iboss.com.

Visit http://www.iboss.com

Icertis
Icertis

Icertis, the leading provider of enterprise contract management in the cloud, solves the hardest contract management problems on the easiest to use platform. Icertis helps companies transform their commercial foundation ensuring compliance, improving governance, mitigating risk and enhancing user productivity, thereby improving the bottom line. The Icertis Contract Management (ICM) platform is used to manage 5+ million contracts by 2+ million subscribers at companies like 3M, Daimler, Microsoft, Roche and Wipro in 40+ languages across 90+ countries. The AI-powered platform allows customers to increase contract velocity and agility, proactively manage entitlements and obligations as well as surface commercial insights and intelligence.

Visit https://www.icertis.com/

Idaptive
Idaptive

Next-Gen Access, protecting organizations from data breaches through a zero trust approach. Idaptive secures access to applications and endpoints by verifying every user, validating their devices, and intelligently limiting their access. Idaptive Next-Gen Access is the only industry-recognized solution that uniquely converges single single-on (SSO), adaptive multi-factor authentication (MFA), enterprise mobility management (EMM) and user behavior analytics (UBA). With Idaptive, organizations experience secure access everywhere, reduced complexity and
have newfound confidence to drive new business models and deliver kick ass customer experiences. Over 2,000 organizations worldwide trust Idaptive to proactively secure their businesses.

Visit https://www.idaptive.com/

IDF Connect
IDF Connect

IDF CONNECT: BRINGING ZERO TRUST ACCESS MANAGEMENT TO THE CLOUD

IDF Connect provides innovative Cloud Access Management solutions and services to enterprises and other large organizations. We specialize in helping our customers achieve SSO and Zero Trust Access Management for both Cloud-deployed and on-premises apps without major new integration or risk. SSO/Rest, our flagship product – either as a stand-alone solution or in tandem with your existing web access management framework – protects your Cloud-deployed apps as if they were still in your own data center.

Visit https://www.idfconnect.com/

ID Quantique (IDQ)
ID Quantique (IDQ)

ID Quantique (IDQ) is the world leader in quantum-safe crypto solutions designed to protect data for the long-term future. The company provides quantum-safe network encryption, secure quantum key generation and quantum key distribution solutions and services to the financial industry, enterprises and government organisations globally. IDQ also commercializes a quantum random number generator, which is the reference in the gaming and lottery industries. Additionally, IDQ is a leading provider of optical instrumentation products; most notably photon counters and related electronics. The company's innovative photonic solutions are used in both commercial and research applications.

Visit http://www.idquantique.com/

IdRamp
IdRamp

IdRamp is a decentralized identity fabric. We simplify integration across multiple identity providers, cloud, mobile, and legacy applications.

Visit https://www.idramp.com

InConcert
InConcert

We develop technology that incorporates profound contact center business and operation knowledge gathered during more than 15 years of successful implementations. We also provide consulting and professional services adhering to the best practices in the industry.

This allows us to deliver highly customized solutions, hosted either in your own datacenter or cloud-based, which are specially designed to reduce costs, improve service processes and provide a superior experience to your customers.

Visit https://www.inconcertcc.com

Informatica
Informatica

Informatica is a leading independent software provider focused on delivering transformative innovation for the future of all things data. Organizations around the world rely on Informatica to realize their information potential and drive top business imperatives. The Informatica Platform is an intelligent data platform, which includes data integration, data quality, master data management, data archiving and data security capabilities, to empower customers to transform raw, possibly unsafe, data into great data for more accurate insights and more effective decisions. More than 5,800 enterprises depend on Informatica to fully leverage their information assets residing on-premise, in the Cloud and on the internet, including social networks. For more information, call +1 650-385-5000 (1-800-653-3871 in the U.S.), or connect with Informatica at LinkedIn, @Informatica on Twitter and Facebook.

Visit https://www.informatica.com/

Infosys
Infosys

Infosys is a global leader in consulting, technology and outsourcing solutions with US$8.25 billion in annual revenues and 160,000+ employees. We enable clients, in more than 30 countries, to stay a step ahead of emerging business trends and outperform the competition. We help them transform and thrive in a changing world by co-creating breakthrough solutions that combine strategic insights and execution excellence. Infosys has a dedicated Enterprise Security & Risk Management (ESRM) unit with strong credentials in Security consulting and implementation services using majority of the industry’s leading products. Infosys’ security services spans across all aspects of Information Security & Compliance for enterprises including Governance, Risk Compliance (SOX/BASEL2/ HIPAA, PCI etc.), Identity & Access Management, Infrastructure security (Endpoint security, Network, Ethical hacking, Penetration testing etc.) and Application and Data security. Infosys has 1000+ consultants in Enterprise Security space. Infosys Cloud Security service offerings consists of a broad range of services tailored to suit the specific client context. It enable clients adopt Cloud and leverage the benefits of Cloud in a secure manner. Our Cloud Security services caters to private, public or hybrid cloud platforms and provides defense in depth security posture by applying relevant security controls across perimeter, internal network, endpoint devices, applications and data layers. Infosys also offers Managed Security Services through a highly flexible and customizable Security Operations Center (SOC) for managing and monitoring Cloud security. For further details you can contact [email protected]

Visit http://www.infosys.com/

Inspur
Inspur

Visit http://en.inspur.com/

Intello
Intello

Complete management of your SaaS usage, compliance and spend. All in one place.

Intello’s SaaS Management platform enables IT leaders to take back control of every SaaS tool in use around the company. The real-time dashboards automatically shine a light on shadow IT, unused licenses, and more through direct integrations like Zoom, Google, Slack and hundreds more.

Visit https://www.intello.io/

Intility
Intility

Intility is a complete, cloud-based platform for Workplace-as-a-Service and digitization. The Intility platform is an enabler for companies to utilize information technology more efficiently, increasing their productivity and reaching their business goals.

The Intility platform is continually upgraded with new functionality and supports an increasing number of integrated cloud services such as Microsoft Azure, Office 365, Amazon Web Services and Salesforce.

Intility is currently utilized by more than 500 companies.

Visit https://www.intility.no/en/

IronOrbit
IronOrbit

IronOrbit is a leading cloud provider headquartered in Southern California. We currently support a rapidly-growing user base of SMBs, enterprises, and government organizations in over 50 industries and 20+ nations.

We specialize in providing custom-built, fully-integrated cloud solutions that make moving to the cloud easier and more beneficial to your business.

Our flagship product is cloud.ONE, a fully-integrated, all-inclusive cloud infrastructure, with compute, storage, security, management, and support, for just a flat monthly fee.

We also offer cloud-based desktops, servers, and applications, plus a wide range of other fully-customizable cloud solutions and services.

To learn more, visit www.ironorbit.com.

Visit https://www.ironorbit.com

Ivanti
Ivanti

Ivanti is leading the unification of Cloud Service Management (CSM). We empower IT, HR, Facilities, Customer Service and other enterprise functions to simplify and automate their business processes to improve service quality, while managing and securing endpoints to proactively detect and protect against threats to business continuity. Ivanti delivers the world’s most powerful fusion of truly flexible, scalable, secure CSM and UEM solutions.

Since 2011, HEAT Software USA, Inc. (Ivanti), now Ivanti, has provided a Cloud Service Management platform to small and medium sized businesses around the world. With Ivanti, customers can deploy solutions around their internal processes that align with the Information Technology Infrastructure Library (ITIL) framework to streamline and automate their internal and external customer operations.

Visit https://www.ivanti.com/

JNN GROUP, INC
JNN GROUP, INC

JNN Group is a Data Governance and Analytics Consulting Firm that specializes in Business Analytics, Data Security, Data Privacy & Regulatory Compliance.

We help companies understand the value and the threats embedded in their data by leveraging complementary services nested inside four areas of expertise:

  • Capture
  • Preparation
  • Analytics
  • Communication

With its knowledge of sophis2cated data mining techniques, data governance, and expertise with predictive algorithms and machine learning, the JNN Group helps clients in regulated sectors counter human bias in decision making to implement more agile business processes, and create asymmetric strategic advantage.

Visit https://www.jnngroup.com/

Kaspersky Lab
Kaspersky Lab

Kaspersky Lab is a global cybersecurity company, which has been operating in the market for over 20 years. Kaspersky Lab’s deep threat intelligence and security expertise is constantly transforming into next generation security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky Lab technologies and we help 270,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com.

Visit http://www.kaspersky.com

KnowBe4
KnowBe4
KnowBe4, the provider of the world’s largest integrated security awareness training and simulated phishing platform, is used by more than 26,000 organizations worldwide. Founded by data and IT security expert Stu Sjouwerman, KnowBe4 helps organizations address the human element of security by raising awareness of ransomware, CEO fraud and other social engineering tactics through a new-school approach to security awareness training. Kevin Mitnick, internationally recognized computer security expert and KnowBe4’s Chief Hacking Officer, helped design KnowBe4’s training based on his well-documented social engineering tactics. Tens of thousands of organizations worldwide trust KnowBe4 to mobilize their employees as their last line of defense.

Visit https://www.knowbe4.com

KPMG
KPMG

KPMG LLP is an audit, tax and advisory services firm that specializes in delivering business, technical, regulatory/tax, assurance, security, and management guidance to clients considering the cloud.

Visit http://www.kpmg.com

Lacework
Lacework

Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks across cloud workloads and containers. Lacework’s unified cloud security platform provides unprecedented visibility, automates intrusion detection, delivers one-click investigation, and simplifies cloud compliance.

Visit https://www.lacework.com

Legendsec
Legendsec

LEGENDSEC is the sub-company of 360 Enterprise Security Group, 360 Enterprise Security Group is a network security company that focuses on providing enterprise-level network security technologies, products and services to the government, military, enterprises, educational and financial institutions and organizations. The Group now owns more than 4,000 network security technology, product and service personnel. Up to now, the Group has provided network security products and services to 90% of ministries and commissions, 72% of central enterprises, 100% large banks, as well as millions of small medium enterprises.

Facing the new era, 360 Enterprise Security Group takes “providing a securer network to create a better world” as the mission and data as the innovation driving force, aiming to build network security subversive and asymmetric capability and striving to become the global first network security company.

Visit http://www.360.net/

LivePerson
LivePerson

LivePerson makes life easier by transforming how people communicate with brands. LiveEngage, the company's enterprise-class platform, empowers consumers to stop wasting time on hold with 1-800 numbers and, instead, message their favorite brands just as they do with friends and family. More than 18,000 businesses, including HSBC, Orange, GM Financial, and The Home Depot, rely on the unparalleled intelligence, security, and scalability of LiveEngage to reduce costs, increase lifetime value, and create meaningful connections with consumers.

LivePerson has been innovating digital connections between brands and consumers for more than 20 years, starting with the invention of live chat on websites by our founder and CEO, Robert LoCascio, back in 1995. Since then, it’s been driving consumer communication technology through the evolution of predictive intelligence and customer transcript insights.

LivePerson is driving today’s new era of messaging, conversational design, and the integration of bots/AI into the customer care of the world’s largest brands.

Visit https://www.liveperson.com/

Lloyd's Register
Lloyd's Register

When information security systems are not properly managed and maintained, organisations run the risk of sustaining serious financial and reputational losses. Ensuring your organisation has the right controls in place to reduce the risk of serious data security threats and avoid any system weaknesses from being exploited is crucial.

Lloyd’s Register has been at the forefront of standards development and involved in Information Security Management System (ISMS) assessment for many years. Our high-profile clients in the finance, telecoms, software, internet, consultancy, justice and government sectors trust Lloyd’s Register to deliver high quality, consistent and impartial assessments with the full back-up of a highly dedicated support package.

Our assessors are experts qualified in information security and other aspects of IT, whose objective view will give you confidence in your own security measures as judged against best industry practice.

For more information on our wide range of services, or to make an enquiry, visit www.lr.org

Visit https://www.lr.org