Name of Organization Begins With:
Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider,
Freshworks Technologies Pvt Ltd
Software that’s easy-to-use doesn’t necessarily mean it's only for small organizations. Large businesses use Freshworks’ customer-for-life suite precisely because time-to-value is so short. The simpler we make things, the more value our customers get. No consultants and no engineers needed. Small businesses grow into big businesses with us. And big businesses choose us for our flexibility, scalability, and extensibility.
FTI Technology helps clients manage the risk and cost of e-discovery with confidence. From forensic data collection to fully managed document review services, we collaborate with our clients to deliver strategic solutions tailored to their unique legal requirements. With keen focus on the productivity and defensibility of document review, our clients rely on us to cost-effectively handle matters ranging from internal investigations to large-scale litigation with global e-discovery requirements. Best known for its market-leading scalability and performance, Ringtail® software equips legal teams with powerful review and analysis capabilities, the ability to search across millions of documents in seconds, and the most flexible production capabilities available. And Ringtail is the only document review platform featuring both linear and visual review tools to dramatically improve the speed and consistency of review teams. Ringtail SaaS is built to deliver the promised efficiency and savings of cloud computing while meeting the unique legal requirements of e-discovery transforming the way e-discovery projects are managed. Our electronic discovery professionals understand the technical intricacies and legal implications of data preservation and collection as well as the international protection and privacy issues that apply to electronic documents in these contexts. We can help design and implement defensible strategies to preserve, collect and analyze electronically stored information (ESI) regardless of format, language or location. For more information visit www.FTITechnology.com/saas
Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies. Our solution identifies cloud infrastructure security risks and compliance violations and ensures that they are never repeated. Fugue provides baseline drift detection and automated remediation to eliminate data breaches, and powerful visualization and reporting tools o easily demonstrate compliance.
Fugue automates compliance audits with out-of-the-box frameworks for HIPAA, GDPR, CIS Benchmark, and NIST 800-53, and supports custom policies. Fugue works with CI/CD pipelines to ensure compliance and prevent unauthorized change. Customers like Sparkpost, PBS, and SAP NS2 rely on Fugue to protect against cloud risks and enforce compliance.
As the world's third largest IT services provider and Japan’s number one ICT company with over 170,000 employees in more than 100 countries, Fujitsu has the resources and experience needed to ensure a predictable and successful cloud experience for our customers. Our annual revenues, which amounted to ¥4.5 trillion yen (US$55 billion) for the fiscal year ending on March 31, 2012, underpin an R&D program that has produced a flow of innovations and over 34,000 patents. For over a decade, Fujitsu has been creating the building blocks for cloud computing, investing heavily in cloud-based development on a global scale: from cloud data centers, to cloud interoperability and cloud security. Our cloud offerings have built-in security mechanisms for different types of cloud architectures including public, private, and hybrid clouds, and different cloud layers such as IaaS, PaaS, and SaaS. Fujitsu's IaaS security approach http://jp.fujitsu.com/solutions/cloud/concept/pdf/cloud-security-wp-us.pdf provides a comprehensive and adaptable set of security controls meeting and exceeding cloud security requirements from BSI http://globalsp.ts.fujitsu.com/dmsp/Publications/public/wp-fraunhofer-security.pdf, and Fujitsu's White Book of Cloud Security https://www-s.fujitsu.com/uk/contact/white-book-cloud-security.html is frequently cited as an indispensable guide for understanding cloud computing security. As an active member of the Cloud Security Alliance, the Trusted Computing Group, the Distributed Management Task Force, and other industry and government-led bodies, Fujitsu firmly committed to the cause of furthering cloud and security standards. For more information, please visit: http://www.fujitsu.com/global/solutions/cloud/
Gemalto is the global leader in digital security, with 2016 annual revenues of €3.1 billion and customers in over 180 countries. We bring trust to an increasingly connected world. Our technologies and services enable businesses and governments to authenticate identities and protect data so they stay safe and enable services in personal devices, connected objects, the cloud and in between. Gemalto’s solutions are at the heart of modern life, from payment to enterprise security and the internet of things. We authenticate people, transactions and objects, encrypt data and create value for software – enabling our clients to deliver secure digital services for billions of individuals and things. For more information, please visit: http://www.gemalto.com
GitHub is how people build software. Millions of individuals and organizations around the world use GitHub to discover, share, and contribute to software—from games and experiments to popular frameworks and leading applications.
GitHub is a Web-based Git version control repository hosting service. Primarily used for computer code, GitHub offers all of the distributed version control and source code management functionality of Git, as well as adding its own features. It provides access control and several collaboration features such as bug tracking, feature requests, task management, and wikis for every project.
Whether you work for a small startup, a university, or a Fortune 500 company, GitHub enables powerful, collaborative workflows. You can use GitHub.com in the cloud or GitHub Enterprise on your server, then integrate your favorite apps and services to customize how you build software.
GitHub offers both plans for private and free repositories on the same account which are commonly used to host open-source software projects.
Playing host to almost 29 million users and 80+ million repositories, GitHub.com is the largest host of source code in the world.
Datang Gohigh Security (Zhejiang) Information Technology Co., Ltd. (hereinafter referred to as " GohighSec ") was established in 2015 with registered capital of 10 million RMB Yuan. Is engaged in trusted computing, trusted cloud computing and information security technology and product research and development, production and sales of professional firms. The main products are universal trusted x86 servers, trusted storage, trusted network equipment, trusted cloud platform software and trusted industry solutions. GohighSec with independent intellectual property rights of trusted computing server and trusted cloud computing technology as the foundation, integration of trusted computing industry chain, leading to provide end-to-end product and solution, in order to realize information security escort.
Gohigh Data Networks Technology Co., Ltd (hereinafter referred to as Gohigh) is a high-tech enterprise which has integrated data industry-related technologies, products and resources from Datang Telecom Technology & Industry Group. Gohigh has been listed on Shenzhen Stock Market in 2003 (Stock Code SZ. 000851), and it is one of the two listed domestic companies of Datang Group.
GohighSec is a subsidiary of Gohigh. With research and development base in Beijing and Yiwu city, Zhejiang province. In Beijing, Shanghai, Nanjing, Jinan, Guangzhou, Chengdu have branch offices and service agencies.
Google's cloud computing solutions allow you to dramatically lower IT costs, increase productivity and increase security. Google Apps is an enterprise-ready suite of applications that includes Gmail, Google Calendar, Google Docs and Spreadsheets, Google Sites, and Google Video. Google Postini services make on-premise email systems more secure, compliant and productive by blocking spam and other intrusions before they reach email networks, and by providing encryption and archiving to help meet compliance requirements. For more information, please visit http://www.google.com/apps/intl/en/business/index.html
Our core competences include IT security consulting, data protection, IT infrastructure architecture, quality assurance and managed services. We work in an interdisciplinary, proactive and expedient way. You can expect autonomy, rock-solid reliability and the ability to think outside the box from us.
Our mission is a reduced workload and business process optimization, so that you, as our client, cut costs, stress and attain your business objectives faster.
Any time you require rapid and competent help with an IT project, we should have a chat. We would be happy to show you how you can gain the maximum benefit from our work and increase your productivity.
GuidePoint Security LLC
GuidePoint Security LLC is a Virginia-based cyber security company that
Founded in 2011 by cyber security industry veterans, GuidePoint is a
HackerOne is the #1 hacker-powered security platform, helping organizations receive and resolve critical vulnerabilities before they can be exploited. More Fortune 500 and Forbes Global 1000 companies trust HackerOne than any other hacker-powered security partner. Organizations, including the U.S. Department of Defense, U.S. General Service Administration, General Motors, Google, Twitter, GitHub, Nintendo, Lufthansa, Goldman Sachs, Qualcomm, Starbucks, Dropbox, Intel, and the CERT Coordination Center trust HackerOne to find critical software vulnerabilities before they can be criminally exploited. HackerOne customers have resolved over 72,000 vulnerabilities and have awarded over $30M in bounty rewards. HackerOne is headquartered in San Francisco with offices in London, New York, and the Netherlands.
HERE Technologies enables people, enterprises and cities around the world to harness the power of location and create innovative solutions that make our lives safer and more efficient. We transform information from devices, vehicles, infrastructure and other sources into real-time location services that play a key role in how we move, live and interact with one another.
Dynamic IT entrepreneur Robert Herjavec founded Herjavec Group in 2003 to provide cybersecurity solutions and services to enterprise organizations. Herjavec Group delivers SOC 2 Type 2 certified managed security services globally supported by a state-of-the-art, PCI compliant, Security Operations Centre (SOC), operated 24/7/365 by certified security professionals. This expertise is coupled with leadership positions across a wide range of functions including consulting, professional services & incident response. Herjavec Group has offices globally including head offices in Toronto (Canada), New York City (USA), Reading (United Kingdom) and Sydney (Australia).
Herjavec Group’s Managed Security Services practice defends enterprise level organizations globally from increasingly sophisticated, targeted cybercrime threats. Core managed services include: Security Information and Event Management, Intrusion Prevention and Detection, Application Security, Next Generation Firewall Management, Endpoint Protection, Data Loss Prevention, Web Proxy and URL Filtering and Vulnerability Management. Herjavec Group’s managed security service practice relies on two custom built technology pillars:
Herjavec Group Threat Framework - The Threat Framework allows dynamic and evolving threat modelling to be applied within any organizational environment. Herjavec Group focuses on meaningful security use cases to proactively identify attacks by applying the Framework to onboarded technologies & threat intelligence products in the customer’s environment. The Threat Framework covers key attack categories including Authentication, Targeted Attacks, Malware, DDOS and Traffic Anomalies.
Herjavec Group’s Analytics Platform - Herjavec Group’s Analytics Platform filters threat intelligence and customer data into actionable, relevant alerts. Alerts enriched using Herjavec Group’s Threat Framework are processed through the Platform, which automatically performs additional enriching functions including IP reputation look up, geo mapping, alert trending & deduplication, prior to preparing a readable output for Herjavec Group’s security analysts to review and action accordingly.
For more additional information or to engage a security specialist please visit www.herjavecgroup.com
Hewlett Packard Enterprise
HP is a technology company that operates in more than 170 countries around the world. At HP, our mission is to invent technologies and services that drive business value, create social benefit and improve the lives of customers — with a focus on affecting the greatest number of people possible. HP is also an IT education leader with unmatched content expertise in HP products, related processes and topics, and industry-standard technologies, and the first Master Training Partner selected by the Cloud Security Alliance. In addition, HP is a well-established security technology vendor in cloud computing and information security globally, offering vendor-neutral information security training focusing on real-world security processes and implementation, . HP helps clients gain new and unique business benefits. With 90+ learning centers worldwide, numerous partner facilities and customer's onsite locations HP offers courses that draw from 35+ years of meeting complex technology training requirements. Visit HP: www.hp.com/learn Learn what HP’s CEO, Meg Whitman, has to say about HP’s education services – watch video
HEXCloud is a professional catering chain system consulting service and related industry software product research and development company. With the long-term accumulation of rich industry management experience and the spirit of innovation, we will create solutions with international management concepts and local user management practices. Company always adhere to the "innovative ideas, innovative architecture" development concept and "with partners and customers win-win" service tenet, and partners for clients to provide professional HEX system implementation and customer service.
HID Global® is the leading provider for innovative products, solutions and services that help organizations create, manage and use secure identities. Trusted by millions of customers around the world, HID Global provides comprehensive solutions to secure facilities, assets, networks and cloud resources.
HID Global will be the market leader for trusted identity solutions by providing seamless access and IP at the door solutions complemented by our Cloud Services. HID Global is dedicated to ensuring that when customers purchase Genuine HID products and solutions, they are purchasing absolute confidence in performance, value and service. HID Global is an ASSA ABLOY Group brand.
HKBN Enterprise Solutions Limited
Who We Are
HKBN is Hong Kong’s largest provider of residential high-speed fibre broadband service (symmetrical 100Mbps to 1000Mbps) by number of subscriptions, and a rapidly growing enterprise solutions provider. We offer a diverse portfolio of premier telecom solutions to personal and enterprise markets, including broadband, mobile, entertainment, voice communications, cloud solutions, data facilities and system integration.
We built and own one of the most extensive fibre optic networks in Hong Kong, which covers over 2.2 million residential homes passed, representing approximately 81% of Hong Kong’s total residential units, and more than 2,200 commercial buildings. In 2004, we successfully built the largest Metro Ethernet network in the world. In 2005, we became the first Internet Service Provider in Hong Kong to offer 1,000Mbps residential Fibre-to-the-Home service. In 2013, we completed our acquisition of Y5ZONE Limited and further extended our Wi-Fi business development. In 2016, we further strengthened our Enterprise Solutions business with the acquisition of New World Telephone Holdings Limited’s telecommunications and online marketing solutions business. For more information, please visit http://hkbnes.net.
Huawei is a leading global ICT solutions provider. Through our dedication to customer-centric innovation and strong partnerships, we have established end-to-end capabilities and strengths across the carrier networks, enterprise, consumer, and cloud computing fields. We are committed to creating maximum value for telecom carriers, enterprises and consumers by providing competitive ICT solutions and services. Our products and solutions have been deployed in over 170 countries and regions, serving more than one third of the world's population. Huawei's vision is to enrich life through communication. By leveraging our experience and expertise in the ICT sector, we help bridge the digital divide by providing opportunities to enjoy broadband services, regardless of geographic location. Contributing to the sustainable development of society, the economy, and the environment, Huawei creates green solutions that enable customers to reduce power consumption, carbon emissions, and resource costs.
For more than 20 years, Hyland has been dedicated to meeting organizations’ needs for document and process management with OnBase, an enterprise content management (ECM) solution. As OnBase has evolved through consistent product innovation, it remains focused on automating business processes that depend on documents, content and people to operate more effectively. OnBase is the pioneer of ECM in the cloud. Since 2000, the OnBase Cloud has been empowering more than 600 organizations around the world to better manage the content that surrounds their processes. The OnBase Cloud connects people to the content, data and processes they need to make more informed decisions – without additional infrastructure needs. Employee productivity increases as they spend less time searching for paper and dedicate more time to providing quality service to customers. For more information about OnBase cloud-based and hosted solutions, please visit https://www.onbase.com/
Hyperproof builds cloud-based software that allows organizations of all sizes to easily navigate their compliance journey. As the first-ever compliance operations solution, Hyperproof makes compliance efforts and audit processes faster, simpler and less expensive. Hyperproof’s leadership team of enterprise software veterans has a combined 150+ years of experience in finding solutions to the most complex enterprise software problems. Hyperproof provides compliance officers with the tools needed to collaborate with stakeholders, both internally and externally, to ensure that risks are mitigated, compliance objectives are met and business objectives achieved. Hyperproof offers technology solutions that help organizations meet their highest aspirations and demonstrate their commitment to protecting their customers, shareholders, partners and suppliers along with the greater community. For more information about Hyperproof and their products, log on to Hyperproof.io or follow Hyperproof on Facebook, Twitter, Instagram and LinkedIn.
IBM offers end-to-end solutions that enable you to take a business-driven and holistic approach to securing your cloud computing environment. IBM's capabilities empower you to dynamically monitor and quantify security risks, enabling you to better: - understand threats and vulnerabilities in terms of business impact - respond to security events with security controls that optimize business results - prioritize and balance your security investments. Through world-class solutions that address risk across all aspects of your business, IBM is able to help you create an intelligent infrastructure that drives down costs, is secure, and is just as dynamic as today's business climate. IBM's cloud security solutions build on the strong foundation of the IBM security framework to extend these benefits from traditional IT environments to cloud computing environments.
iboss is a cloud security company that provides organizations and their employees secure access to the Internet on any device, from any location, in the cloud. This eliminates the need for traditional security appliances, which are ineffective at protecting a cloud-first and mobile world. Leveraging a purpose-built cloud architecture backed by over 100 patents and more than 100 points of presence globally, iboss protects more than 4,000 organizations worldwide. To learn more, visit http://www.iboss.com.
Icertis, the leading provider of enterprise contract management in the cloud, solves the hardest contract management problems on the easiest to use platform. Icertis helps companies transform their commercial foundation ensuring compliance, improving governance, mitigating risk and enhancing user productivity, thereby improving the bottom line. The Icertis Contract Management (ICM) platform is used to manage 5+ million contracts by 2+ million subscribers at companies like 3M, Daimler, Microsoft, Roche and Wipro in 40+ languages across 90+ countries. The AI-powered platform allows customers to increase contract velocity and agility, proactively manage entitlements and obligations as well as surface commercial insights and intelligence.
Next-Gen Access, protecting organizations from data breaches through a zero trust approach. Idaptive secures access to applications and endpoints by verifying every user, validating their devices, and intelligently limiting their access. Idaptive Next-Gen Access is the only industry-recognized solution that uniquely converges single single-on (SSO), adaptive multi-factor authentication (MFA), enterprise mobility management (EMM) and user behavior analytics (UBA). With Idaptive, organizations experience secure access everywhere, reduced complexity and
IDF CONNECT: BRINGING ZERO TRUST ACCESS MANAGEMENT TO THE CLOUD
IDF Connect provides innovative Cloud Access Management solutions and services to enterprises and other large organizations. We specialize in helping our customers achieve SSO and Zero Trust Access Management for both Cloud-deployed and on-premises apps without major new integration or risk. SSO/Rest, our flagship product – either as a stand-alone solution or in tandem with your existing web access management framework – protects your Cloud-deployed apps as if they were still in your own data center.
ID Quantique (IDQ)
ID Quantique (IDQ) is the world leader in quantum-safe crypto solutions designed to protect data for the long-term future. The company provides quantum-safe network encryption, secure quantum key generation and quantum key distribution solutions and services to the financial industry, enterprises and government organisations globally. IDQ also commercializes a quantum random number generator, which is the reference in the gaming and lottery industries. Additionally, IDQ is a leading provider of optical instrumentation products; most notably photon counters and related electronics. The company's innovative photonic solutions are used in both commercial and research applications.
IdRamp is a decentralized identity fabric. We simplify integration across multiple identity providers, cloud, mobile, and legacy applications.
We develop technology that incorporates profound contact center business and operation knowledge gathered during more than 15 years of successful implementations. We also provide consulting and professional services adhering to the best practices in the industry.
This allows us to deliver highly customized solutions, hosted either in your own datacenter or cloud-based, which are specially designed to reduce costs, improve service processes and provide a superior experience to your customers.
InEight is a leading developer of construction project management software, combining proven technology with a unified vision, delivering actionable insights and project certainty to more than 25,000 active users in more than 750 companies. Built on a history of construction and engineering excellence, InEight solutions help companies visualize, estimate, manage, control and connect all aspects of capital and maintenance projects. With configurable, integrated and field-tested solutions, InEight customers have the visibility and control required for on-budget and on-time project completion.
Informatica is a leading independent software provider focused on delivering transformative innovation for the future of all things data. Organizations around the world rely on Informatica to realize their information potential and drive top business imperatives. The Informatica Platform is an intelligent data platform, which includes data integration, data quality, master data management, data archiving and data security capabilities, to empower customers to transform raw, possibly unsafe, data into great data for more accurate insights and more effective decisions. More than 5,800 enterprises depend on Informatica to fully leverage their information assets residing on-premise, in the Cloud and on the internet, including social networks. For more information, call +1 650-385-5000 (1-800-653-3871 in the U.S.), or connect with Informatica at LinkedIn, @Informatica on Twitter and Facebook.
Infosys is a global leader in consulting, technology and outsourcing solutions with US$8.25 billion in annual revenues and 160,000+ employees. We enable clients, in more than 30 countries, to stay a step ahead of emerging business trends and outperform the competition. We help them transform and thrive in a changing world by co-creating breakthrough solutions that combine strategic insights and execution excellence. Infosys has a dedicated Enterprise Security & Risk Management (ESRM) unit with strong credentials in Security consulting and implementation services using majority of the industry’s leading products. Infosys’ security services spans across all aspects of Information Security & Compliance for enterprises including Governance, Risk Compliance (SOX/BASEL2/ HIPAA, PCI etc.), Identity & Access Management, Infrastructure security (Endpoint security, Network, Ethical hacking, Penetration testing etc.) and Application and Data security. Infosys has 1000+ consultants in Enterprise Security space. Infosys Cloud Security service offerings consists of a broad range of services tailored to suit the specific client context. It enable clients adopt Cloud and leverage the benefits of Cloud in a secure manner. Our Cloud Security services caters to private, public or hybrid cloud platforms and provides defense in depth security posture by applying relevant security controls across perimeter, internal network, endpoint devices, applications and data layers. Infosys also offers Managed Security Services through a highly flexible and customizable Security Operations Center (SOC) for managing and monitoring Cloud security. For further details you can contact [email protected]
Complete management of your SaaS usage, compliance and spend. All in one place.
Intello’s SaaS Management platform enables IT leaders to take back control of every SaaS tool in use around the company. The real-time dashboards automatically shine a light on shadow IT, unused licenses, and more through direct integrations like Zoom, Google, Slack and hundreds more.
Intezer Protect™ is a runtime cloud security solution that defends your cloud workloads against modern cyber attacks. Powered by Genetic Malware Analysis technology, Intezer Protect™ continuously identifies the origins of every fragment of code running in your cloud infrastructure—detecting
Intility is a complete, cloud-based platform for Workplace-as-a-Service and digitization. The Intility platform is an enabler for companies to utilize information technology more efficiently, increasing their productivity and reaching their business goals.
The Intility platform is continually upgraded with new functionality and supports an increasing number of integrated cloud services such as Microsoft Azure, Office 365, Amazon Web Services and Salesforce.
Intility is currently utilized by more than 500 companies.
IronOrbit is a leading cloud provider headquartered in Southern California. We currently support a rapidly-growing user base of SMBs, enterprises, and government organizations in over 50 industries and 20+ nations.
We specialize in providing custom-built, fully-integrated cloud solutions that make moving to the cloud easier and more beneficial to your business.
Our flagship product is cloud.ONE, a fully-integrated, all-inclusive cloud infrastructure, with compute, storage, security, management, and support, for just a flat monthly fee.
We also offer cloud-based desktops, servers, and applications, plus a wide range of other fully-customizable cloud solutions and services.
To learn more, visit www.ironorbit.com.
Ivanti is leading the unification of Cloud Service Management (CSM). We empower IT, HR, Facilities, Customer Service and other enterprise functions to simplify and automate their business processes to improve service quality, while managing and securing endpoints to proactively detect and protect against threats to business continuity. Ivanti delivers the world’s most powerful fusion of truly flexible, scalable, secure CSM and UEM solutions.
Since 2011, HEAT Software USA, Inc. (Ivanti), now Ivanti, has provided a Cloud Service Management platform to small and medium sized businesses around the world. With Ivanti, customers can deploy solutions around their internal processes that align with the Information Technology Infrastructure Library (ITIL) framework to streamline and automate their internal and external customer operations.
JNN GROUP, INC
JNN Group is a Data Governance and Analytics Consulting Firm that specializes in Business Analytics, Data Security, Data Privacy & Regulatory Compliance.
We help companies understand the value and the threats embedded in their data by leveraging complementary services nested inside four areas of expertise:
With its knowledge of sophis2cated data mining techniques, data governance, and expertise with predictive algorithms and machine learning, the JNN Group helps clients in regulated sectors counter human bias in decision making to implement more agile business processes, and create asymmetric strategic advantage.
Kaspersky Lab is a global cybersecurity company, which has been operating in the market for over 20 years. Kaspersky Lab’s deep threat intelligence and security expertise is constantly transforming into next generation security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky Lab technologies and we help 270,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com.