Solution Providers Arrow to Content

Accenture

http://www.accenture.com/

Accenture is a global management consulting, technology services and outsourcing company, with approximately 236,000 people serving clients in more than 120 countries. Combining unparalleled experience, comprehensive capabilities across all industries and business functions, and extensive research on the world’s most successful companies, Accenture collaborates with clients to help them become high-performance businesses and governments. The company generated net revenues of US$25.5 billion for the fiscal year ended Aug. 31, 2011.

Accenture Security Solutions professionals leverage decades of experience, deep industry knowledge and business-process know-how to help protect against threats, minimize risks and enable the adoption of new technologies that promote growth.

Adallom

http://www.adallom.com/

Adallom is a SaaS security company founded in 2012 by alumni of the Israeli Intelligence Corps. We focus on evolving the way enterprises secure information in SaaS by monitoring all activity, detecting unauthorized access, and protecting users in real time. Adallom is the only SaaS security company to have defeated targeted SaaS attacks in the wild by applying advanced machine learning to real time user activity monitoring. We are members of Microsoft’s MAPP (Microsoft Active Protections Program), and would love to work with you on securing your company’s SaaS investment.

If you’re curious about our name, “Adallom” is an abbreviation of the Hebrew saying “Ad Halom” which literally means “up to here” and in game theory lingo means “the last line of defense.” In the context of SaaS we believe that pre-existing defense mechanisms are ineffective at protecting information in SaaS. So we created a solution that extends the boundaries of enterprise security into the cloud. We moved control, visibility, and detection directly into SaaS, away from devices and perimeters. In the SaaS era, security can’t be bounded. Adallom’s charter is Security Without Boundaries.

AEP Networks

http://www.aepnetworks.com/

AEP Networks provides trusted security everywhere and secures data and voice communication regardless of device, environment or location. Delivering proven security architectures to more than 5,000 organizations all over the world including governments, enterprises and carriers and 1,000 blue chip customers.

AEP Networks develops the highest grade security technologies tested and accredited to industry security standards, including CoCo, FIPS 140-2 Level 4 and CAPS. Its extensive portfolio of products and solutions protect the integrity of very sensitive data and are extremely reliable, survivable and resilient.

AEP Networks has also developed the industry’s first remote access Security as a Service offering , CloudProtect, aimed at Managed Service Providers and Cloud Service Providers. The offering secures remote access to the virtual data centers that Service Providers run to host their customers’ applications by securing centralized application access, whether physical or virtualized.

For more information, email us at: [email protected]

Agiliance

http://www.agiliance.com/

Agiliance, founded in late 2005, is the leading independent provider of Security and Operational Risk Management solutions for Governance, Risk, and Compliance (GRC) programs. Agiliance® RiskVision ™ enables Global 2000 companies and government agencies to automate their GRC management processes; and the same platform orchestrates incident, threat, and vulnerability actions in real time. Unlike legacy offerings that take nearly a year to deploy, Agiliance customers demonstrate automation use cases within 30 days on-demand, and within 90 days on-premise, made possible by Agiliance RiskVision’s configurable platform and applications, with a broad library of technology integrations, and GRC content. Agiliance RiskVision scales with businesses, effectively managing data, assets, people and processes to achieve 100 percent risk and compliance coverage. Its real-time risk analysis leads to optimized business performance and better investment decisions.

Agiliance’s Cloud Risk Management Service implements the CSA GRC Stack and Threat Matrix in RiskVision to provide an assessment and risk management toolkit for enterprises, cloud providers, security solution providers and IT auditors. At the heart of this service is Agiliance’s Common Control Framework (CCF) which maps the CSA Cloud Controls Matrix to NIST, ISO, and COBIT frameworks along with PCI and HiTech/HIPAA regulations, to output SAS 70 II and SSAE 16 reports.Customers have a broad set of product delivery options and a comprehensive set of managed and implementation services to address all phases of deployment. Customers can also access the Agiliance Cloud on Demand to provide beta product feedback, test new patches and upgrades, run proof of concepts (POCs), and provide community contributions such as workflows and reports, as well as attend half-yearly Agiliance advisory councils.

Aliyun

http://www.aliyun.com/

Building the No 1. Internet Data Sharing Platform

Founded on September 10th, 2009, Alibaba Cloud Computing Ltd. (hereinafter referred to as Aliyun) has R&D centers and operational branches in Hangzhou, Beijing, and Silicon Valley. Aliyun’s mission is to become a data-centric Cloud Computing Service Company and build the No 1. Internet Data Sharing Platform.

In the future Internet, cloud computing will become a public service available on demand anywhere, at any time. Efficient green data centers and large-scale distributed storage and computing systems supporting various Internet applications are the essential technologies to build the next-generation Internet service platform.

Aliyun is committed to build a public and open cloud computing services platform. By feat of the creative technology, we will continue to develop our computational ability and economies of scale, we will turn it out to be a real meaning of public service. Mean while, through our website of aliyun.com, we are going to use the way of internet in order to satisfy our customer to get our product and service more convenient.

We hope more and more partners, small and medium-sized enterprises and developer will benefit from cloud computing of its handy and value, in order to promote the healthy development of the eco-system.

athenahealth

http://www.athenahealth.com/

athenahealth is a leading provider of cloud-based practice management, EHR and patient communication services to medical groups, hospitals and health systems.

For athenahealth clients, being on a cloud-based service means benefiting from the collective clinical and payer knowledge of 29,000 providers on our growing network. This includes continuously tracking and updating payer and clinical rules, formulary requirements, and managing pay-for-performance and other quality programs to secure maximum incentives. athenahealth’s suite of integrated, cloud-based services includes:

  • athenaCollector® – a medical billing and practice management solution that reduces administrative red tape and allows medical groups to efficiently assess, plan, and improve practice performance while increasing revenue. It’s easy to use, saves time and dramatically improves the bottom line. Practices are able to track and access information on any claim, create simple, robust reports and get instant data for every business decision.
  • athenaClinicals® – a Stage 1 Meaningful Use-certified electronic health record that delivers greater clinical control and insights to medical practices while boosting efficiency and revenue potential.
  • athenaCommunicator®– automated messaging, live operator services, and a patient web portal that keeps medical groups competitive, compliant and accessible.
  • athenaCooordinator℠ – a care coordination service for order transmission, insurance pre-certification and patient registration among physicians and hospitals, surgical centers and imaging centers.

Being on a cloud-based service in the health care information technology space means we can exercise our comparative advantage to execute client work at scale, processing clinical documents, posting claims, tracking payments, and more. And it means we have constant visibility into every client’s performance, so we can monitor, benchmark and coach our clients toward peak performance.

Backupify

http://backupify.com

Backupify is the leading provider of backup and recovery solutions for Software-as-a-Service (SaaS) applications. As more data, services and organizations migrate from local hard drives to the always-on cloud, Backupify is pioneering the protections and processes that will keep your irreplaceable online information safe, useful and under your control. More than 5,000 businesses and 200,000 users trust us to backup their data — with more signing up every day.

Bat Blue

http://www.batblue.com/home.html

Bat Blue is a provider of end-to-end network and security services that deliver Economy, Effectiveness and Efficiency, through consolidation, cost-savings and reduction of burden. Bat Blue’s Cloud Services deliver an entire Internet perimeter and off-site backup “in-the-Cloud” without expensive hardware or complicated integrations. The BlueNET IP network with its guaranteed “One-Hop-Out” architecture was purpose-built as a Cloud Services enabler and offers the extreme low-latency performance that Cloud-based computing demands. Bat Blue is proud to be the official Cloud-WiFi provider of ESPN’s X Games. Visit Bat Blue at http://www.batblue.com/home.html.

Blue Coat Systems

http://www.bluecoat.com/

Founded in 1996, Blue Coat provides industry leading web security to more than 15,000 customers worldwide, including 88% of the Fortune® Global 500.

In 2011 Blue Coat introduced the web security module also known as ThreatPulse. ThreatPulse is a cloud-delivered service that gives you all the benefits of real-time security without the need to update appliances, servers or user desktops. This Internet-delivered security service offers complete protection against web-borne threats by leveraging Blue Coat’s proven security technology as well as the WebPulse cloud community of over 75 million users.

With extensive web application controls and granular reporting features, IT administrators can instantly create and apply new policies to all users, including roaming workers using external networks. Just as important, you can identify and categorize new web content in real time with 99+% accuracy. Blue Coat cloud service is backed by our guaranteed 99.999% uptime agreement

Box

http://www.box.com/

Box provides a secure, scalable content sharing and collaboration platform that both users and IT love and adopt, including 92% of the Fortune 500. Box’s dynamic, flexible content management solution empowers users to share and access content from anywhere, while providing IT enterprise-grade security and oversight into how content moves throughout their organizations. Content on Box can be shared internally and externally, accessed through iPad, iPhone, Android and PlayBook applications, and extended to partner applications such as Google Apps, NetSuite and Salesforce. Headquartered in Los Altos, CA, Box is a privately held company and is backed by venture capital firms Andreessen Horowitz, Bessemer Venture Partners, Draper Fisher Jurvetson, Emergence Capital Partners, Meritech Capital Partners, NEA, Scale Venture Partners, and U.S. Venture Partners, and strategic investors salesforce.com and SAP.

Certes Networks

http://certesnetworks.com/

Certes Networks is the leader in developing scalable security solutions for high performance networks. We provide advanced encryption and policy and key management solutions for securing wide area networks, and enable secure connectivity to private and public clouds. Certes Networks helps organizations improve security, decrease risk, and reduce the cost of compliance with data privacy regulations while enabling high performance and secure connectivity to critical infrastructures in the branch office, data center or in the cloud.

CipherCloud

http://www.ciphercloud.com/

CipherCloud, the leader in cloud information protection, enables organizations to accelerate their adoption of cloud applications while ensuring visibility and control of their data. CipherCloud delivers data privacy, regulatory compliance, and data residency in the Cloud through an open platform that provides comprehensive data discovery, protection – search strong encryption, tokenization, data loss prevention, key management, and malware detection – and activity and anomaly monitoring services.

CipherCloud has experienced exceptional growth and success with over 2.6 million business users, across 25 countries, and in more than 11 industries.

The CipherCloud product portfolio protects popular cloud applications out-of-the-box such as salesforce.com, Box, and Microsoft Office 365.

CipherCloud, named as SC Magazine’s 2013 Best Product of the Year, is backed by premier venture capital firms Andreessen Horowitz, Index Ventures, and T-Venture, the venture capital arm of Deutsche Telekom. For more information, visit www.ciphercloud.com and follow us on Twitter @ciphercloud

Citrix

http://www.citrix.com/secure

Information security has never been so challenging. Trends such as public and private cloud services, consumerization and workshifting (work anywhere) mean that more people are accessing enterprise data, applications and desktops from more places, over more networks and in more ways than ever before. In the face of more sophisticated threats and a rising burden of data protection, privacy and compliance, IT must take control.

Citrix provides secure-by-design cloud and networking solutions, complemented by industry-leading security partners, that enables organizations to simplify cloud security and accelerate the delivery of applications while protecting them from attack. Data, applications, desktops and services are managed and secured centrally wherever they are—public clouds, private clouds or enterprise datacenters—and delivered securely anywhere, over any kind of connection to any device.

With Citrix, your organization embraces the cloud securely, regains control and manages risk more effectively while providing optimal flexibility to allow your business to do what it needs to do, the way it needs to.

CloudLock

http://www.cloudlock.com/

CloudLock is a leading cloud data security company that provides enterprise class solutions designed to give organizations control over their data in the public cloud, without invasive in-band technology, complicated overhead, or unanswered regulatory risk. Many of the world’s largest companies and institutions trust CloudLock’s approach of directly integrating with their SaaS applications, which makes robust security controls immediately available at a fraction of the cost and complexity of other alternatives.

CloudLock helps organizations:

  • Extend their DLP policies to SaaS applications such as Google Apps and Salesforce
  • Implement a robust discovery/classification/control security framework in the public cloud
  • Enforce the principles of people-centric security, greatly reducing their risk of data exfiltration or breach without driving users into unsanctioned (often called “shadow IT”) systems
  • Apply risk appropriate controls, including selective encryption, across their most sensitive data

For more information, please visit us at cloudlock.com

CloudPassage

http://www.cloudpassage.com/

CloudPassage addresses the number one inhibitor to cloud adoption – security. We provide server security products purpose-built for server environments where servers are cloned, migrated, bursted, and boomeranged. The company’s Halo line of products operate seamlessly across public, private, and hybrid cloud environments and can even be used on physical servers. The products bridge the gap between traditional perimeter-oriented datacenter security and security in dynamic cloud environments.

Courion

http://www.courion.com/

Courion offers a comprehensive Identity and Access Management solution that equips you with visual, real-time identity and access information so you can quickly and confidently provide open and compliant access to applications and data, recognize and reduce risk as it occurs, streamline compliance activity and expedite audits.

Covisint

http://www.covisint.com/

Covisint provides the leading cloud engagement platform for creating and enabling new mission-critical external business processes. Our solutions enable organizations to connect, engage, and collaborate with the critical external audiences that define their success — including customers, business partners, and suppliers. Covisint allows its clients to establish a secure, reliable, integrated presence in the cloud, and offer the kind of engaging information experiences that people everywhere have come to expect.

Covisint’s Cloud Identity Services centralize and automate the process of securing and managing identities throughout their lifecycle, inside and outside of the organization. Specific benefits of our solution include:

  • Reduced cost and complexity associated with managing identities and access privileges across applications and systems
  • Simplified management of identities by using seamless integrations to systems and applications with simplified endpoint connectivity which allows collaboration
  • Easy to use, providing anytime, anywhere access to applications for users across the extended enterprise with improved end-user experience via single sign-on to multiple systems and applications
  • Deployed much faster than in-house or on-premise solutions
  • Compliant with all regulations and enterprise policies—for users inside and outside a firewall eliminating the need to form this expertise “in-house”
  • Longest standing provider of Cloud Identity Services with unparalleled security
  • Provides a high level of customer service and access to a global help desk if needed with guaranteed service level agreements

For more information, email us at [email protected], or call 888-222-1700.

CradlePoint

https://cradlepoint.com/

CradlePoint solutions are part of the leading-edge 4G networks in the world. Our complete networking and cloud-management solutions help enterprises deliver better ROI and lower-cost of management. Regardless of the application, CradlePoint is delivering greater network security, better management, and better value than any other available systems on the market.

CradlePoint is the leading provider of cloud-managed 3G/4G LTE networking solutions for distributed enterprises. CradlePoint solutions provide uncompromised mobile broadband performance while delivering proven network system interoperability. CradlePoint’s broad family of high-performance routers are designed for deployment in mission-critical applications that require 24×7 connectivity. With both integrated wireless WAN and non-integrated versions, the solutions are ideal for distributed operations and emerging industries that require either remote connectivity or multi-WAN redundancy.

Founded in 2006, CradlePoint has shipped nearly a million devices and offers products certified and promoted by major worldwide carriers.

CREDANT Technologies

http://www.credant.com/cloudsecurity/

CREDANT is the Trusted Expert in Data Protection. Founded in 2001, CREDANT’s solutions comprehensively address the leading enterprise security issues of controlling, managing and protecting data located on desktops, laptops, smartphones, removable media or private or public cloud infrastructures. CREDANT Technologies’ flagship product, Enterprise Server, offers the broadest range of integrated enterprise solutions. Protecting sensitive information on more than 7 million endpoints at over 1,000 global customers, CREDANT provides the most comprehensive mobile data protection and management platform.

Datapipe

http://www.datapipe.com/

Datapipe offers a single provider solution for managing and securing mission-critical IT services, including cloud computing, infrastructure as a service, platform as a service, colocation and data centers. Datapipe delivers those services from the world’s most influential technical and financial markets including New York metro, Silicon Valley, London, Hong Kong and Shanghai.

Datapipe combines extensive Managed Services experience with Amazon Web Services elastic infrastructure, and our own Stratosphere(tm) virtualization offerings to develop industry-leading enterprise cloud computing solutions. When professionally engineered and optimized, cloud computing delivers unprecedented power. Our customized cloud solutions focus on your unique needs to leverage the flexibility, cost savings and processing power of the cloud when you need it, where you need it, how you need it – while freeing up valuable personnel and resources.

For more information about Datapipe visit www.datapipe.com or call 1-877-773-3306.

Digi International

http://www.idigi.com/

Digi International (www.digi.com) is making wireless M2M easy by developing reliable products and solutions to connect and securely manage local or remote electronic devices over the network or utilizing our cloud technology; the iDigi Device Cloud. The iDigi Device Cloud is the intelligent platform choice for today’s and tomorrow’s device application solutions within any industry. Designed by a team with decades of experience in device network solutions, the iDigi Device Cloud provides the reliability, scalability, performance and security your solution needs

For more information, visit the iDigi Web site at www.idigi.com, or call 877-912-3444.

Dropbox

https://www.dropbox.com/

Millions of people trust Dropbox to easily and reliably store, sync, and share their documents, photos, and videos across devices and platforms. Dropbox for Business helps organizations around the world collaborate effectively and increase productivity. And it brings IT admins the functionality, controls, and visibility they need to ensure the safety of their company data. Dropbox has been designed to keep users’ data safe, employing a sophisticated infrastructure, enterprise-grade security, layers of encryption, and detailed security, privacy, and compliance policies and procedures. To learn more about Dropbox for Business, www.dropbox.com/business.

Elastica

http://elastica.net/

Elastica is the innovator of Data Science Poweredtm Cloud Application Security. Its CloudSOCtm solution empowers the elastic enterprise, and enables companies to confidently leverage cloud applications and services while staying safe, secure and compliant. Elastica Apps on extensible CloudSOCtm platform today offer cloud audit for Shadow IT, granular transaction visibility, threat detection, security controls and post-incident forensic analysis. Elastica is venture-backed by the Mayfield Fund and is headquartered in San Jose, CA. Learn more about Elastica at http://www.elastica.net.

Ericsson

http://www.ericsson.com/

Ericsson is the world’s leading provider of communications technology and services. We are enabling the Networked Society with efficient real-time solutions that allow us all to study, work and live our lives more freely, in sustainable societies around the world.

Our offering comprises services, software and infrastructure within Information and Communications Technology for telecom operators and other industries. Today more than 40 percent of the world’s mobile traffic goes through Ericsson networks and we support customers’ networks servicing more than 2.5 billion subscribers.

We operate in 180 countries and employ more than 100,000 people. Founded in 1876, Ericsson is headquartered in Stockholm, Sweden.

Evident.io

http://evident.io/

Evident.io delivers a Security-as-a-Service platform to simplify the management of risk, compliance, and threat-detection in cloud-computing environments. We democratize the security capabilities of the billion-dollar cloud companies, and make them accessible to the cloud adopters of every size and industry. The Evident platform continuously evaluates your cloud resources to detect changes in risk, compliance, and security posture — delivering the transparency and control you need to defend against today’s pervasive security threats. Our customers range from the very early startup with no dedicated security staff, all the way up to the Fortune 500 businesses with multi-million dollar security budgets. One message has been consistent: cloud security needs a continuous solution — and that solution is Evident.

FireHost

http://www.firehost.com/

FireHost is the leader in secure cloud hosting, protecting critical data and brand reputations for companies with significant security, compliance, performance and managed services needs. Since 2009, it has made hacker awareness, management, and prevention a standard part of every customer’s secure cloud hosting environment, blocking more than 60 million attacks on behalf of its customers in 2012 alone. The company offers the most comprehensive fully managed cloud infrastructure-as-a-service (IaaS) available today, built specifically for the needs of companies governed by PCI and HIPAA compliance regulations. Some of the largest healthcare, payments, and SaaS companies in the world subscribe to FireHost’s secure cloud to ensure their data is safe and always available. FireHost provides services from Dallas, Phoenix, London and Amsterdam.

Fischer International

http://www.fischerinternational.com/

With a nearly 30 year heritage in shaping the enterprise security industry, Fischer continues its history of technology leadership and innovation by bringing to market a cloud-based Identity Services Platform that truly simplifies Identity Management, scales seamlessly from the SMB to the largest enterprise, and can be implemented either as a traditional software-as-a product deployment or via any outsourced delivery model. Fischer’s solutions provide organizations of all sizes with greater choice in how they derive the benefits of Identity Management, but without risk or compromise. For more information, please visit: www.fischerinternational.com

FishNet Security

http://www.fishnetsecurity.com/

FishNet Security is the No. 1 provider of information security solutions that combine technology, services, support and training. Since 1996, the company has enabled clients to manage risk, meet compliance requirements and reduce costs while maximizing security effectiveness and operational efficiency. FishNet Security is committed to information security excellence and has a track record of delivering quality solutions to over 5,000 clients nationwide.

Fortinet

http://www.fortinet.com/

Fortinet (NASDAQ: FTNT) is a worldwide provider of network security solutions and a market leader in unified threat management (UTM). Our products and subscription services provide broad, integrated and high-performance protection against dynamic security threatswhile simplifying the IT security infrastructure. We offer both virtual and physical appliances to protect public, private, and hybrid clouds, as well as virtual domain security for multi-tenant environments.

Fortinet has the cloud-ready technologies to help you create a secure cloud. Whether you are a cloud hosting provider, cloud service provider, orlarge enterprise, Fortinet physical and virtual appliances provide the technology you need to help you protect your virtualized environment. You can deploy a fully IPv6-ready, flexible, multi-tenant security platform that can evolve and scale effortlessly along with your user base and business plans.

Our customers include enterprises, service providers and government entities worldwide, including the majority of the 2011 Fortune Global 100. Fortinet is headquartered in Sunnyvale, Calif., with offices around the world.

FTI Technology

http://www.ftitechnology.com/

FTI Technology helps clients manage the risk and cost of e-discovery with confidence. From forensic data collection to fully managed document review services, we collaborate with our clients to deliver strategic solutions tailored to their unique legal requirements. With keen focus on the productivity and defensibility of document review, our clients rely on us to cost-effectively handle matters ranging from internal investigations to large-scale litigation with global e-discovery requirements.

Best known for its market-leading scalability and performance, Ringtail® software equips legal teams with powerful review and analysis capabilities, the ability to search across millions of documents in seconds, and the most flexible production capabilities available. And Ringtail is the only document review platform featuring both linear and visual review tools to dramatically improve the speed and consistency of review teams. Ringtail SaaS is built to deliver the promised efficiency and savings of cloud computing while meeting the unique legal requirements of e-discovery transforming the way e-discovery projects are managed.

Our electronic discovery professionals understand the technical intricacies and legal implications of data preservation and collection as well as the international protection and privacy issues that apply to electronic documents in these contexts. We can help design and implement defensible strategies to preserve, collect and analyze electronically stored information (ESI) regardless of format, language or location.

For more information visit www.FTITechnology.com/saas

Fujitsu

http://www.fujitsu.com

As the world’s third largest IT services provider and Japan’s number one ICT company with over 170,000 employees in more than 100 countries, Fujitsu has the resources and experience needed to ensure a predictable and successful cloud experience for our customers. Our annual revenues, which amounted to ¥4.5 trillion yen (US$55 billion) for the fiscal year ending on March 31, 2012, underpin an R&D program that has produced a flow of innovations and over 34,000 patents.

For over a decade, Fujitsu has been creating the building blocks for cloud computing, investing heavily in cloud-based development on a global scale: from cloud data centers, to cloud interoperability and cloud security. Our cloud offerings have built-in security mechanisms for different types of cloud architectures including public, private, and hybrid clouds, and different cloud layers such as IaaS, PaaS, and SaaS. Fujitsu’s IaaS security approach http://jp.fujitsu.com/solutions/cloud/concept/pdf/cloud-security-wp-us.pdf provides a comprehensive and adaptable set of security controls meeting and exceeding cloud security requirements from BSI http://globalsp.ts.fujitsu.com/dmsp/Publications/public/wp-fraunhofer-security.pdf, and Fujitsu’s White Book of Cloud Security https://www-s.fujitsu.com/uk/contact/white-book-cloud-security.html is frequently cited as an indispensable guide for understanding cloud computing security.

As an active member of the Cloud Security Alliance, the Trusted Computing Group, the Distributed Management Task Force, and other industry and government-led bodies, Fujitsu firmly committed to the cause of furthering cloud and security standards. For more information, please visit: http://www.fujitsu.com/global/solutions/cloud/

Gemalto

http://www.gemalto.com/

Gemalto (Euronext NL0000400653 GTO) is the world leader in digital security with 2010 annual revenues of €1.9 billion and over 10,000 employees operating out of 87 offices and 13 Research & Development centers in 45 countries.

Gemalto is at the heart of our evolving digital society. Billions of people worldwide increasingly want the freedom to communicate, travel, shop, bank, entertain, and work—anytime, anywhere, in ways that are convenient, enjoyable and secure. Gemalto delivers on the growing demands for personal mobile services, identity protection, payment security, authenticated online services, cloud computing access, modern transportation, e-healthcare and e-government services. Gemalto does this by providing secure software, a wide range of secure personal devices, and managed services to wireless operators, banks, enterprises and government agencies.

Gemalto is the world leader for electronic passports and identity cards, two-factor authentication devices for online protection, smart credit/debit and contactless payment cards, as well as subscriber identification modules (SIM) and universal integrated circuit cards (UICC) in mobile phones. Also, in the emerging machine-to-machine applications Gemalto is a leading supplier of wireless modules and machine identification modules (MIM). To operate these solutions and remotely manage the software and confidential data contained in the secure devices Gemalto also provides server platforms, consulting, training, and managed services to help its customers achieve their goals.

As the use of Gemalto’s software and secure devices increases with the number of people interacting in the digital and wireless world, the Company is poised to thrive over the coming years.

For more information visit www.gemalto.com, www.justaskgemalto.com, blog.gemalto.com, or follow @gemalto on Twitter.

Genetec

http://www.genetec.com

Genetec is a pioneer in the physical security and public safety industry and a global provider of world-class IP license plate recognition (LPR), video surveillance and access control solutions to markets such as transportation, education, retail, gaming, government and more. With sales offices and partnerships around the world, Genetec has established itself as the leader in innovative networked solutions by employing a high level of flexibility and forward-thinking principles into the development of its core technology and business solutions. Genetec’s corporate culture is an extension of these very same principles, encouraging a dynamic and innovative workforce that is dedicated to the development of cutting-edge solutions and to exceptional customer care. For more information, visit www.genetec.com

Google

http://www.google.com/apps/intl/en/business/infrastructure_security.html

Google’s cloud computing solutions allow you to dramatically lower IT costs, increase productivity and increase security. Google Apps is an enterprise-ready suite of applications that includes Gmail, Google Calendar, Google Docs and Spreadsheets, Google Sites, and Google Video. Google Postini services make on-premise email systems more secure, compliant and productive by blocking spam and other intrusions before they reach email networks, and by providing encryption and archiving to help meet compliance requirements.

For more information, please visit http://www.google.com/apps/intl/en/business/index.html

HCL

http://www.hcl.in/

HCL is a $5.2 Bn leading global IT services company with operations in 20 countries. The company has 17 Global delivery centers with 6 near shore centers in US, Poland, Belfast, Finland, Malaysia, and Singapore. HCL caters to 500+ Global Customer across a wide range of focused industry verticals & in the domains of Custom & Package Applications, BPO, Product Engineering, IT Infrastructure Services, IT Hardware, Systems Integration, and distribution of ICT products. HCL’s approach of engagement is based on ‘transformational outsourcing’; underlined by innovation, value creation based on adoption of best practices & standards like ITL, ISO 9000, ISO 27001 etc. HCL has global strategic partnerships with leading IT & Technology firms like Cisco, Oracle, SAP, EMC, Microsoft etc.

HCL has evolved an engagement framework to enable customers leverage the benefits of Cloud Computing while managing the associated risks. HCL’s Cloud Reference Architecture & Assessment Framework helps in mapping Customer IT landscape, Business requirements and Cloud services. HCL also has a strong & mature IT security services practice that offers end to end solutions around Information security, IT – Governance, Risk & Compliance, network & system security, managed security services. HCL helps customers address their security & operational risks while adopting Cloud Computing models to suit their business & IT strategy.

HCL has a detailed stack of IT services around the core concepts of Cloud Computing.

Hewlett Packard

http://www.hp.com/

HP is a technology company that operates in more than 170 countries around the world. At HP, our mission is to invent technologies and services that drive business value, create social benefit and improve the lives of customers — with a focus on affecting the greatest number of people possible.

HP is also an IT education leader with unmatched content expertise in HP products, related processes and topics, and industry-standard technologies, and the first Master Training Partner selected by the Cloud Security Alliance. In addition, HP is a well-established security technology vendor in cloud computing and information security globally, offering vendor-neutral information security training focusing on real-world security processes and implementation, . HP helps clients gain new and unique business benefits.

With 90+ learning centers worldwide, numerous partner facilities and customer’s onsite locations HP offers courses that draw from 35+ years of meeting complex technology training requirements. Visit HP: www.hp.com/learn

Learn what HP’s CEO, Meg Whitman, has to say about HP’s education services – watch video

Hightail

http://www.hightail.com

Hightail helps more than 45 million users worldwide, including professionals at 98% of the Fortune 500, share files easily and with complete control. Founded in 2004, Hightail is headquartered in Campbell, CA, and has offices in San Francisco, London, Paris, Munich, Hong Kong and Melbourne. To make your business more effective without putting your information at risk, learn how Hightail can help at www.hightail.com/enterprise or get in touch at [email protected].

Information Services Group

http://www.isg-one.com/

Information Services Group (ISG) (NASDAQ: III) is a leading technology insights, market intelligence and advisory services company, serving more than 500 clients around the world to help them achieve operational excellence. ISG supports private and public sector organizations to transform and optimize their operational environments through research, benchmarking, consulting and managed services, with a focus on information technology, business process transformation, program management services and enterprise resource planning. Clients look to ISG for unique insights and innovative solutions for leveraging technology, the deepest data source in the industry, and more than five decades of experience of global leadership in information and advisory services. Based in Stamford, Conn., the company has more than 700 employees and operates in 21 countries. For additional information, visit www.isg-one.com.

Intel & McAfee Cloud Security Solutions

http://cloudsecurity.intel.com

Cloud Security at Intel & McAfee is comprised of a portfolio of client & data center cloud security products that use API Management at the cloud edge and trusted execution technology within the datacenter to provide a secure client to cloud connection. Learn more about Intel & McAfee’s cloud security products at cloudsecurity.intel.com.

Intermedia

http://www.intermedia.net/

Intermedia is the premier provider of cloud services to small and medium-sized businesses (SMBs) and the largest provider of hosted Microsoft Exchange. Intermedia’s cloud offering is business grade and built specifically for the SMB. Delivered from Intermedia’s secure datacenters, the company’s Office in the Cloud™ suite combines Intermedia’s proprietary offerings for complete mobile freedom, backup, security, voice and more with Microsoft tools such as Exchange 2010 email, Lync Secure Instant Messaging, and SharePoint document management. The company’s proprietary cloud infrastructure assures high reliability and a certified support team is available around the clock. All Intermedia services are managed from the company’s proprietary HostPilot® Control Panel, providing customers a single point of communications control. Intermedia also empowers over 10,000 partners – including managed service providers and select Fortune 500 companies – to sell cloud services under their own brand. Founded in 1995, Intermedia was the first to offer hosted Microsoft Exchange business-class cloud email. The company was voted the #1 hosted Exchange provider by MSExchange.org – the leading organization of Exchange administrators.

Iron Mountain

http://www.ironmountain.com/

The newest addition to Iron Mountain Digital’s Storage-as-a-Service portfolio, the Virtual File Store service leverages the security, compliance and scalability of the Storage-as-a-Service framework to manage large volumes of inactive digital data to reduce overall storage expenses. With Iron Mountain Digital’s service model, companies can deploy cost-effective cloud-based storage with enterprise-grade security to reduce the risk, cost and complexity of managing digital information.

Iron Mountain Digital is the world’s leading provider of Storage-as-a Service solutions for backup and archiving. The technology arm of Iron Mountain Incorporated offers a comprehensive suite of data protection, archiving and intellectual property management solutions to thousands of companies around the world, directly and through a worldwide network of channel partners. Iron Mountain Digital is based in Southborough, Mass. with European headquarters in Frankfurt, Germany.

Iron Mountain Incorporated (NYSE:IRM) helps organizations around the world reduce the costs and risks associated with information protection and storage. The Company offers comprehensive records management and data protection solutions, along with the expertise and experience to address complex information challenges such as rising storage costs, litigation, regulatory compliance and disaster recovery. Founded in 1951, Iron Mountain is a trusted partner to more than 120,000 corporate clients throughout North America, Europe, Latin America and Asia Pacific.

KPMG

http://www.kpmg.com

KPMG LLP is an audit, tax and advisory services firm that specializes in delivering business, technical, regulatory/tax, assurance, security, and management guidance to clients considering the cloud.

Kudelski Security

https://www.kudelskisecurity.com/

Kudelski Security, a newly created division of the Kudelski Group, is an innovative independent Swiss provider of tailored cyber security solutions and services to enterprises, financial institutions, government administrations and the media industry.

Its team of cyber security professionals boasts extensive expertise in the delivery of end-to-end digital security solutions built upon real-life experiences in advanced threat detection, security assessments, asset and reputation protection, as well as piracy risk mitigation. Kudelski Security’s global reach and multi-disciplinary incident response are reinforced by strategic international partnerships.

Kudelski Security is headquartered in Cheseaux-sur-Lausanne, Switzerland.

For more information visit: www.kudelskisecurity.com

Specialties: Managed security services and solutions, security incident response, threat monitoring, risk assessment and compliance, penetration testing, device security evaluation, identity and access management, cyber security training, cyber legal support.

Lieberman Software

http://www.liebsoft.com/

Lieberman Software provides privileged identity management and security management solutions that protect the multi-platform enterprise. By automating time-intensive IT administration tasks, Lieberman Software increases control over the computing infrastructure, reduces security vulnerabilities, improves productivity and helps ensure regulatory compliance. As Pioneers of Privileged Identity ManagementSM Lieberman Software not only developed the first software solution to address this need, its products continue to lead the market in features and functionality. The company is headquartered in Los Angeles, CA with an office in Austin, TX and channel partners throughout the world. For more information, see www.liebsoft.com or email us at [email protected].

McKesson

http://www.mckesson.com/en_us/McKesson.com/

McKesson is dedicated to delivering the vital medicines, supplies and information technologies that enable the health care industry to provide patients better, safer care.

McKesson is made up of many businesses, all serving the health care industry. Our businesses fall into one of two primary categories:

Distribution solutions. We are the largest pharmaceutical distributor in North America, distributing one-third of the medicines used every day. We supply more than 40,000 U.S. pharmacy locations, from Wal-Mart to the Department of Veterans Affairs to community pharmacies and hospitals.

Technology solutions. We develop and install health care information technology systems that eliminate the need for paper prescriptions and paper medical records. Our software and hardware are used in more than 70% of the nation’s hospitals with more than 200 beds.

Microsoft

http://www.microsoft.com/cloud

Microsoft provides the most comprehensive approach to cloud computing, so that you can harness the full power of the cloud on your terms. Whether in your datacenter, with a service provider, or from a Microsoft’ datacenter and whether in a private cloud using HyperV™, a public cloud with Windows Azure™, or software as a service environment with Office365 Microsoft provides the flexibility and control to consume IT as a service in a way that best meets your unique business needs.

Visit www.microsoft.com/cloud to find out more.

nCircle

http://www.ncircle.com/

nCircle is the leading provider of IT risk and security performance management solutions. Organizations of all sizes use nCircle solutions to automate compliance, reduce risk and achieve higher levels of security and operational efficiency. nCircle has won numerous awards for growth, innovations, customer satisfaction and technology leadership and has been ranked among the top 100 best places to work in the San Francisco Bay Area. nCircle is headquartered in San Francisco, CA, with regional offices throughout the United States and in London and Toronto. Additional information is available at www.ncircle.com, http://benchmark.ncircle.com, and http://purecloud.ncircle.com.

Neohapsis

http://neohapsis.com

Neohapsis is a trusted provider of mobile and cloud security services. We work with more than 300 global enterprises to address their constantly evolving information security and compliance challenges. Leveraging our security expertise, advanced research and security tools, Neohapsis is at the forefront of securing today’s emerging technologies.

Neohapsis’ customers want to be able to realize the vast opportunities presented by cloud and mobile technologies, while effectively managing information security and compliance requirements. Our service portfolio is designed to support both global enterprise customers and technology and service providers in their efforts to grow their businesses and effectively manage security and risk.

We partner closely with our clients on both long-term, strategic projects and short, focused projects, working to transfer knowledge and understanding throughout the engagement.

Although usually deeply technical in nature, our deliverables also tie technical findings to potential business impact in a way that is immediately actionable. Our recommendations provide significant business value in terms of cost savings, improved performance, risk reduction, and comprehensive compliance.

Neohapsis provides a wide range of standard and custom services in the following broad categories:

  • Application Security
  • Cloud Security
  • Compliance Services
  • IT Risk and Security Strategy
  • Mobile Security
  • Network and Endpoint Security

Netskope

http://www.netskope.com/

Netskope is the cloud app analytics and policy company. Only Netskope eliminates the catch-22 between being agile and being secure and compliant by providing complete visibility and enforcing sophisticated policies in cloud apps. Netskope performs deep analytics and lets decision-makers create policies in a few clicks that protect corporate data and optimize cloud app usage in real-time and at scale. With Netskope, people get their favorite cloud apps and the business can move fast, with confidence.

Netskope is headquartered in Los Altos, California. Visit us at www.netskope.com and follow us on Twitter @Netskope.

NetWitness

http://www.netwitness.com/

NetWitness helps organizations in over 160 countries dramatically improve their ability to defend against advanced threats. NetWitness NextGen is the only network monitoring product on the market today that allows users to: analyze and model hundreds of terabytes of live network traffic in real-time; generate automated, comprehensive analyses that can be easily understood by both cyber analysts and non-technical personnel, and integrate third party threat feeds and create actionable network intelligence. Based upon a dedicated and extensible full packet capture and session analysis infrastructure that can be used within enterprise cloud and virtual environments, NextGen performs both rules-based and interactive session analysis across the entire network protocol stack, up to the application layer. NetWitness NextGen is designed for organizations to address concurrent problems of insider threat management, data leakage protection, network forensics and incident response, compliance verification, network e-discovery, designer malware and zero-day threat detection. NetWitness customers include Defense, National Law Enforcement and Intelligence Agencies, Top US and European Banks, Critical Infrastructure, and Global 1000 organizations. NetWitness has offices in the U.S. and the U.K., and partners throughout North and South America Europe, the Middle East, and Asia. Download a freeware version of NetWitness and see what you’ve been missing on your network: http://download.netwitness.com.

New World Telecom

http://www.newworldtel.com

New World Telecommunications Limited (NWT), a member of New World Development Company Limited (HK Stock Code: 17), is a pioneering telecom service provider in Hong Kong. Being a customer-focused company, NWT is dedicated to offering top-quality international voice and innovative data services for its customers in Hong Kong and overseas.

NWT’s Cloud Enterprise Solution (CES) is an Infrastructure-as-a-Service (IaaS) to virtualise IT or network resources on a cloud computing platform and perform multiple applications. Our CES is a perfect integration of state-of-the-art facilities and equipments, carrier-grade network and connectivity, professional network supports and monitoring, as well as many ready-to-use or customized features.

Our Cloud Computing Services obtained both ISO/IEC 20000-1:2011 and ISO/IEC 27001:2005 certifications, offering customers high quality services that meet international standards.

For details, please visit http://www.newworldtel.com.

Novell

http://www.novell.com/home/

With over 20 years of experience, Novell is a leader in identity management and security solutions. Novell delivers a web-based identity and access management solution that is based on open standards. Novell’s solution provides out-of-the-box integration with leading enterprise identity stores, comprehensive compliance reporting of all user activity, centralized just-in-time provisioning and much more.

For security specifically, Novell offers an innovative web-based security service for Cloud Providers e.g. Saas applications more secure and manageable for the enterprise. It extends beyond simple sso functionality to provide enterprises the ability to extend their identities, policies, audits and workflow from the enterprise to the cloud infrastructure.

NSFOCUS

http://www.nsfocus.com/

NSFOCUS is a leading provider of vulnerability assessment, Web Application Firewall (WAF), Network Intrusion Prevention System (NIPS), Anti-DoS, content security gateway, and etc. Powered by its 10+ years of security vulnerability research, NSFOCUS has been the major contributor of security vulnerability research at the industry by freely sharing and resolving over tens vulnerabilities from critical applications.In conjunction with security hardware appliances and software, NSFOCUS has been delivering security services through Security As A Service (SaaS), including web reputation service, vulnerability assessment, Anti-DDoS and etc. Its customers come from government, finance, telco operators, ISP, power providers, etc.

NTT I³

http://www.ntti3.com/

NTT Innovation Institute Inc. (NTT I³, pronounced NTT I Cube) is a new R&D center of NTT Group, the global leader of information and communication technology (ICT) services. NTT I³ aims to accelerate the global development of the NTT Group, through open innovation, by leveraging its Silicon Valley location and tapping into the rich talent pool of the valley. Our best practices in North America will be formulated into modular intellectual properties and rolled out globally, to NTT’s Global marketplace.

Currently, NTT I³ focuses on “Global Cloud Services” as the cornerstone of NTT’s business operations. NTT I³ is developing modularized intellectual properties based on a deep understanding and analysis of the latest market needs in the areas of security and cloud computing. These intellectual properties are designed to best satisfy various, ever-evolving market needs in a globally scalable and cost competitive manner.

Carrying on the world renown NTT R&D heritage, NTT I³ strives to set a new global standard of agility, quality, and value creation in pursuit of open service innovation.

Okta

http://www.okta.com/

Okta is an enterprise grade identity management service that is built from the ground up in the cloud and delivered with an unwavering focus on customer success. With Okta enterprises can simply and securely manage access to cloud, mobile and on premises applications across employees, partners and customers.

Accessible via an intuitive, consumer Web interface or a broad set of RESTful web services, Okta provides directory services, single sign-on, strong authentication, provisioning, workflow, and analytics as a complete, integrated solution. Okta offers identity management from the cloud on a secure, reliable, SOC2 Type II audited platform that covers all of the applications, directories, identity systems, devices, organizations and people that are a part of today’s IT reality. Whether it is in the cloud, on a mobile device, or behind your firewall Okta’s got it covered.

Enterprises everywhere including Activision, Allergan, BMC Software, Comcast, Colorox, Groupon, Informatica, LinkedIn, Purolator, Shortel and SAP are using Okta to increase security, improve user productivity, reduce IT costs, and ensure compliance.

The Okta team has built and deployed many of the world’s leading on-demand and enterprise software solutions from companies including Salesforce.com, PeopleSoft, Microsoft, BMC, Arcsight, Sun, and HP. Okta is backed by premiere venture investors Andreessen Horowitz, Greylock Partners, and Khosla Ventures.

OneLogin

http://www.onelogin.com/

OneLogin is the innovator in enterprise identity management and provides the industry’s most comprehensive solution for managing user identities in the cloud and behind the firewall. Unique capabilities like Federated Cloud Search and OneLogin for iPad extend the genius of single sign-on (SSO), break down SaaS data silos, and increase productivity. OneLogin comes pre-integrated with more applications, authentication methods, directories, VPNs and SAML tools, so you can get up and running in minutes with no professional services required. IT regains control over web application access, LOB owners quickly on- and off-board team members, and end-users enjoy easy access to all their apps. OneLogin has over 700 customers in 35 countries across the globe. Try our free forever plan with three cloud apps and an unlimited number of users. This plan includes single sign-on for web, mobile and iPad, directory integration, and multi-factor authentication. http://www.onelogin.com/signup/

Orange

http://www.orange.com/en_EN/group/index.jsp

Orange Business Services, the France Telecom Orange branch dedicated to B2B services, is a leading global integrator of communications solutions for multinational corporations. Orange Business Services provides a comprehensive portfolio of Infrastructure and software as a service solutions, addressing the needs of entreprises of all sizes, thanks to a choice of cost-effective packaged products based on shared infrastructures as well as highly customized and dedicated solutions for specific security and compliance needs. Combining its IT expertise with its world’s largest, seamless network for voice and data, Orange Business Services can ensure that the security and the performance of its cloud computing solutions are guaranteed end-to-end.

Palo Alto Networks

http://www.paloaltonetworks.com/

Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Unlike fragmented legacy products, our security platform safely enables business operations and delivers protection based on what matters most in today’s dynamic computing environments: applications, users, and content. Find out more at www.paloaltonetworks.com.

Perspecsys

http://www.perspecsys.com/

The Perspecsys Cloud Data Protection Gateway allows organizations to protect their sensitive business data when using popular cloud applications such as Oracle CRM On Demand and salesforce.com. Any information that leaves an enterprise’s environment and enters the cloud can be tokenized or encrypted (using strong FIPS 140-2 encryption modules), ensuring that data remains undecipherable when it is being processed or stored in the cloud. Companies use Perspecsys to ensure compliance with Data Residency regulations or to satisfy requirements associated with sector specific regulations such as PCI DSS, HIPAA, SARBOX, and GLBA. A key benefit of the solution is its ability to preserve end-user functionality, such as the ability to Search or Sort, on data-fields that have been tokenized or encrypted (even when using FIPS 140-2 cloud encryption).

Perspecsys’ solution integrates easily into an enterprise SaaS implementation. Installed inside of an organization or at its IaaS provider (such as Fujitsu or Amazon AWS), Perspecsys’ software resides transparently between the application and its users, intercepting critical data before it is passed to the application in the cloud, and replacing it with a random token or encrypted value that is meaningless when viewed outside the Perspecsys Cloud Data Protection Gateway.

Find out today how Perspecsys can make your organization more secure. Click here to schedule a demo.

PGP

http://www.symantec.com/business/theme.jsp?themeid=pgp

PGP Corporation is a global leader in email and data encryption software for enterprise data protection. Based on a unified key management and policy infrastructure, the PGP® Encryption Platform offers the broadest set of integrated applications for data security. PGP® platform-enabled applications allow organizations to meet current needs and expand as security requirements evolve. From the datacenter, to the endpoint and beyond, PGP® solutions protect data whether it is at rest, in motion or in use.

Ping Identity

https://www.pingidentity.com/

Ping Identity provides cloud identity security solutions to more than 800 of the world’s largest companies, government organizations and cloud businesses. With a 99% customer satisfaction rating, Ping Identity empowers 45 of the Fortune 100 to secure hundreds of millions of employees, customers, consumers and partners using open standards like SAML, OpenID and OAuth. Businesses that depend on the Cloud rely on Ping Identity for simple, proven and secure cloud identity management for customers and employees through single sign-on, federated identity management, mobile identity security, API security, social media integration and centralized access control. Visit pingidentity.com to learn more.

PROOF

http://www.proof.com.br/

PROOF is a company based in Brazil, founded in 2008 to supply Security and Infrastructure solutions for Brazilian and South American-focused companies.

With offices in Rio de Janeiro, Sao Paulo and Minas Gerais, its business-centric solutions, combined with a strong presence throughout the continental country, made it one of the leading Security and Infrastructure Providers in Brazil.

Its flagship SecaaS solutions, adapted to Brazil and South America niche markets, bring focused Cloud deliverability with a strong emphasys on Security and Availability.

PROS

http://www.pros.com/

PROS Holdings, Inc. (NYSE: PRO) is a big data software company that helps customers outperform in their markets by using big data to sell more effectively. We apply 27 years of data science experience to unlock buying patterns and preferences within transaction data to reveal which opportunities are most likely to close, which offers are most likely to sell and which prices are most likely to win. PROS offers big data solutions to optimize sales, pricing, quoting, rebates and revenue management across more than 30 industries. PROS has implemented more than 600 solutions in more than 55 countries. The PROS team comprises more than 700 people around the world. To learn more, visit www.pros.com.

PwC

http://www.pwc.com/us/en/index.jhtml

Imagine the power of 160,000 people with a common purpose — building relationships that create value for you and your business. This is PwC. Every day, our people work with you to build the value you are looking for.

We bring a global perspective along with in-depth knowledge of local, state and US issues. In 1998, Price Waterhouse and Coopers & Lybrand merged to create PricewaterhouseCoopers. We have a long history of delivering value-added professional services to our clients. Our accounting practice originated in London during the mid-1800′s.

PwC focuses on audit and assurance, tax and advisory services. Additionally, in the US, PwC concentrates on 16 key industries and provides targeted services that include — but are not limited to — human resources, deals, forensics, and consulting services. We help resolve complex issues and identify opportunities.

Our reputation lies in building lasting relationships with our clients and a focus on delivering value in all we do. We share our knowledge and expertise to help you reach the goals you set for your business.

Qualys

http://www.qualys.com/

Qualys®, Inc. is the leading provider of on demand IT security risk and compliance management solutions ­ delivered as a service. Qualys Software-as-a-Service solutions are deployed in a matter of hours anywhere in the world, providing customers an immediate and continuous view of their security and compliance postures. The QualysGuard® service is used today by more than 3,500 organizations in 85 countries, including 40 of the Fortune Global 100 and performs more than 200 million IP audits per year. Qualys has the largest vulnerability management deployment in the world at a Fortune Global 50 company. Qualys has established strategic agreements with leading managed service providers and consulting organizations including BT, Etisalat, Fujitsu, IBM, I(TS)2, LAC, NTT, SecureWorks, Symantec, Tata Communications and TELUS.

Rackspace

http://www.rackspace.com/

The Rackspace Cloud provides on-demand and scalable website, application and storage hosting backed by Fanatical Support®. Through an integrated suite of cloud solutions – Cloud Sites™, Cloud Files™ and Cloud Servers™ – The Rackspace Cloud enables astute developers and IT managers to trade the hassles, upfront investments and high costs for a hosting environment that scales easily when traffic fluctuates.

For more information about The Rackspace Cloud, visit www.rackspacecloud.com or call 1-877-934-0409.

Rapid7

http://www.rapid7.com/

Rapid7® is the leading provider of security risk intelligence solutions. Rapid7′s integrated vulnerability management and penetration testing products, NeXpose® and Metasploit®, empower organizations to obtain accurate, actionable and contextual intelligence into their threat and risk posture. Rapid7′s solutions are being used by more than 1,600 enterprises and government agencies, while the Company’s free products are downloaded more than one million times per year and enhanced further by over 125,000 security community users and contributors. Rapid7 has been recognized as one of the fastest growing security companies worldwide by Inc. Magazine and is backed by Bain Capital Ventures. For more information about Rapid7, please visit http://www.rapid7.com.

Raytheon

http://www.raytheon.com/

Raytheon Company, with 2011 sales of $25 billion, is a technology and innovation leader specializing in defense, homeland security and other government markets throughout the world. With a history of innovation spanning 90 years, Raytheon provides state-of-the-art electronics, mission systems integration and other capabilities in the areas of sensing; effects; and command, control, communications and intelligence systems, as well as a broad range of mission support services. With headquarters in Waltham, Mass., Raytheon employs 71,000 people worldwide. For more about Raytheon, visit us at www.raytheon.com and follow us on Twitter at @raytheon.

RSA

http://www.rsasecurity.com/

RSA, The Security Division of EMC, is the expert in information-centric security, enabling the protection of information throughout its lifecycle. RSA enables customers to cost-effectively secure critical information assets and online identities wherever they live and at every step of the way, and manage security information and events to ease the burden of compliance.

RSA offers industry-leading solutions in identity assurance and access management, encryption, security information management and anti-fraud protection, bringing trust to millions of user identities, the transactions that they perform, and the data that is generated. For more information, please visit www.RSA.com and www.EMC.com.

Saba

http://www.saba.com/

Saba is a global leader in next-generation cloud solutions for talent management. The company helps organizations transform the way they work by enabling the continuous learning, engagement and development of everyone in their people network, including employees, partners, and customers. Supporting the new world of work, Saba delivers learning, performance, succession, career development, workforce planning and compensation solutions that incorporate modern technologies such as social, collaboration, mobile and gamification. Saba solutions are based on the Saba Cloud platform, a highly scalable architecture that exceeds industry scalability, performance, and security standards. The company currently supports over 31 million users from 2,200 customers across 195 countries and in 37 languages. For more information, please visit www.saba.com.

SAIC

http://www.saic.com/cybersecurity

SAIC is a FORTUNE 500® scientific, engineering, and technology applications company that uses its deep domain knowledge to solve problems of vital importance to the nation and the world, in national security, energy and the environment, critical infrastructure, and health. The Company’s approximately 40,000 employees serve customers in the U.S. Department of Defense, the intelligence community, the U.S. Department of Homeland Security, other U.S. Government civil agencies and selected commercial markets. Headquartered in McLean, Va., SAIC had annual revenues of approximately $10.6 billion for its fiscal year ended January 31, 2012. For more information, visit http://www.saic.com/. SAIC: From Science to Solutions®

Sentrigo

http://www.sentrigo.com/

Sentrigo is a recognized innovator in database security solutions, offering a full suite of products for vulnerability assessment, virtual patching and monitoring/auditing of Oracle, Microsoft SQL Server, MySQL, and Sybase systems. The company’s flagship product, Hedgehog Enterprise, provides Database Activity Monitoring (DAM) and real-time Intrusion Prevention, protecting sensitive data from external threats and misuse by privileged insiders. Sentrigo’s autonomous sensors protect data from the inside, allowing Hedgehog to detect even the most sophisticated attacks, and to work efficiently in today’s modern IT infrastructure, including virtualization and cloud computing environments.

Sentrigo provides full visibility into all database activity and allows enterprises to enforce security policy and comply with regulatory requirements, such as PCI DSS, Sarbanes-Oxley, and HIPAA. The company has won wide acclaim for its technology leadership, and recently received the Cloud Computing World Series Award for ‘Best Security Solution’ and the 2010 Global Product Excellence Award for Database Security from Info Security Products Guide. For more information, please visit: www.sentrigo.com

Sierra Wireless

http://www.sierrawireless.com/

Sierra Wireless offers industry-leading mobile computing and machine-to-machine (M2M) communications products and solutions that connect people, devices, and applications over cellular networks. Wireless service providers, equipment manufacturers, enterprises and government organizations around the world depend on us for reliable wireless technology. We offer 2G, 3G and 4G wireless modems and gateways as well as a comprehensive suite of software, tools, and cloud services that ensure our customers can successfully bring wireless applications to market. For more information about Sierra Wireless, visit www.sierrawireless.com.

Spanning

http://spanning.com/

Spanning Cloud Apps, the most trusted provider of SaaS backup and recovery, prevents data loss with automated backup and accurate restores for Google Apps and Salesforce.com. Spanning Backup is a powerful, reliable enterprise-grade solution trusted by thousands of businesses and educational institutions. Visit: www.spanning.com and follow @SpanningBackup.

StarHub

http://www.starhub.com/

StarHub is Singapore’s fully-integrated info-communications company, offering a full range of information, communications and entertainment services for both consumer and corporate markets. StarHub operates a HSPA+ mobile network that delivers up to 42Mbps for downlink to complement its nationwide GSM network, and an LTE network that provides connection speeds of up to 75Mbps in key business areas. It also manages an island-wide HFC network that delivers multi-channel pay TV services (including HDTV, Internet TV and on-demand services) as well as ultra-high speed residential broadband services. StarHub operates an extensive fixed business network that provides a wide range of data, voice and wholesale services. Over Singapore’s fibre-based Next Generation Nationwide Broadband Network, StarHub offers a broad range of home and business broadband plans along with a host of advanced media-rich value-added services.

Launched in 2000, StarHub has become one of Singapore’s most innovative info-communications providers, and the pioneer in ‘hubbing’ – the ability to deliver unique integrated and converged services to all its customers. StarHub, listed on the main board of the Singapore Exchange since October 2004, is a component stock of the Straits Times Index and the MSCI Singapore Free Index.

Swisscom

http://www.swisscom.ch

Swisscom is Switzerland’s leading telecoms provider. Swisscom has a presence throughout Switzerland and offers a full range of products and services for mobile, landline and IP-based voice and data communication. Massive investments in network infrastructure ensure that this will remain the case in the future. Swisscom is active in one of the most attractive broadband markets in Europe via the Italian provider Fastweb. Swisscom also offers services for IT infrastructure outsourcing, cloud services as well as the management of communications infrastructures. Furthermore, Swisscom is a leading security & IAM service provider in Switzerland with a broad range of managed security services. This includes cloud-delivered security & IAM services.

Swisscom fosters close ties with its target groups – shareholders, employees, suppliers, the public and, above all, its customers. As a trustworthy companion to the digital world we help our customers

… feel secure and at ease
… find what they’re looking for quickly and simply
… experience and achieve extraordinary things.

Swisscom – we open up new possibilities.

Symantec

http://www.symantec.com/index.jsp

Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.

Telecom Italia

http://www.telecomitalia.com

Telecom Italia is one of the most important telecommunications and ICT operators in Italy as well as being a major telco provider in Latin America.

In the domestic market the Group provides fixed and mobile telecommunications, internet and media services, office systems and solutions for businesses, research and development.

Telecom Italia has an extensive network consisting of the latest transmission technologies ranging from fibre optics to xDSL; it provides fibre optic back-bones in Europe and South America.

Moreover, by leveraging its back-bone and network capacity Telecom Italia it is able to provide cloud computing service platforms to customers ensuring end-to-end security and quality performance.

Thales e-Security

http://www.thales-esecurity.com/

Thales e-Security is a leading global provider of information security providing data encryption solutions to the financial services, manufacturing, government and technology sectors. With a 40 year unrivalled track record of protecting corporate and government information, Thales solutions protect our customers most sensitive data and is used by four of the five largest energy and aerospace companies, government networks around the world, and secures more than 80 percent of the worldwide payment transactions. Thales e-Security has offices in Japan, Hong Kong, United Kingdom and the United States and is represented in over 90 countries around the world. For more information, visit www.thales-esecurity.com

ThousandEyes

http://www.thousandeyes.com/

ThousandEyes provides IT performance management for the cloud era. With the adoption of cloud applications, enterprises are becoming heavily reliant on networks outside of their control. This creates new challenges in troubleshooting performance issues, both inside and outside the corporate network. ThousandEyes provides detailed visibility beyond the corporate network perimeter, identifies the root cause of performance problems with cloud applications and enables distributed collaboration to resolve problems quickly.

Trend Micro

http://us.trendmicro.com/us/home/

With over two decades of expertise in Endpoint, Messaging and Web Security, Trend Micro provides individuals, and organizations of all sizes, with smarter security solutions that protect against a wide range of insidious threats and combined attacks including viruses, spam, phishing, spyware, botnets and other Web threats, such as data-stealing malware. Trend Micro develops, delivers, and supports proactive cloud-based solutions designed to safeguard critical information and protect personal and corporate reputations. As an industry leader in security intelligence, Trend Micro’s mission is to secure the exchange of digital information by providing the most flexible and customizable Internet Content Security solutions available.

Türk Telekomünikasyon A.Ş.

http://www.turktelekom.com.tr

Türk Telekom is Turkey’s leading communication and convergence technologies company with its modern network infrastructure covering the whole country. Offering a wide range of services to residential and commercial customers in fixed lines and broadband Internet, Türk Telekomünikasyon A.Ş has 14.3 million Fixed Access Lines, and 7 million ADSL connections (bulk) as of December 31, 2012. Türk Telekom pioneers in developing and implementing the low-carbon business model in Turkey with its works towards social, economical and environmental sustainability, also transforms its products and services, office practices and work processes according to sustainability principles in order to achieve this purpose and considers including all of its employees, their families, suppliers and customers into this process as a part of its strategy. Türk Telekom is the first telecommunication company calculating and reporting its carbon footprint to CDP (Carbon Disclosure Project) in Turkey.

Ultimate Software

http://www.ultimatesoftware.com/

Ultimate Software is a leading cloud provider of people management solutions. The company’s award-winning UltiPro solution provides a comprehensive approach to manage the employee life cycle, from recruitment to retirement, and includes features for talent acquisition and hiring; onboarding; payroll; HR compliance; online benefits enrollment and management; performance management and reviews, succession management; career development; business intelligence; real-time reporting; time and attendance; plus role-based access for executives, managers, administrators, and employees. In 2012, Ultimate Software was ranked #25 on FORTUNE Magazine’s list of the Best Companies to Work For.

Unify

http://www.unify.com/

Unify, formerly Siemens Enterprise Communications, is a global communications software and services company. Our new name reflects perfectly what we do: we unify our customers’ communications systems. By synchronizing technologies, creating an engaging user experience and weaving communications seamlessly into the way businesses operate, we empower an increasingly mobile workforce to work better together. The result is a transformation of how the enterprise communicates and collaborates that amplifies collective efforts, energizes the business and drives better performance.

Born out of the engineering DNA of Siemens, Unify builds on a heritage of product reliability, innovation, open standards and security to provide integrated communications and networking solutions for 75% of the Global 500. With the introduction of Project Ansible, Unify is leading the market with its vision of a dynamic communications and collaboration platform. Unify is a joint venture of the Gores Group and Siemens AG.

Vaultive

http://www.vaultive.com/

Vaultive is a provider of cloud data encryption solutions designed to maintain the control, security and compliance of data processed by cloud-based services. Vaultive has developed a set of advanced encryption techniques to allow for processing of encrypted data residing in the cloud including search, sort and index — while enterprise IT retains control of the encryption keys. Optimized for Microsoft® Office 365 and Hosted Exchange, the Vaultive platform supports best practices for encryption in use, while maintaining the benefits of cloud computing.

Founded in 2009 by a team of information security veterans, Vaultive’s persistent encryption capabilities allow customers to satisfy requirements to encrypt data in transit to the cloud service provider, maintain encryption of data at rest while resident in the cloud, in addition to supporting encryption of data processed by a third-party service.

Vormetric

http://www.vormetric.com/

Vormetric is the leader in enterprise systems encryption and key management for physical, virtual and cloud environments. The Vormetric Data Security product line provides a single, manageable and scalable solution to encrypt any file, any database, any application, anywhere it reside. Vormetric achieves strong encryption without sacrificing application performance or creating key management complexity. The most security conscious organizations and government agencies in the world, including 7 of the Fortune 10, have standardized on Vormetric to provide strong, easily manageable data security. For more information visit www.vormetric.com.

Workday

http://www.workday.com/

Workday, the on-demand ERP company, provides business solutions that make growing companies more agile, competitive, and successful offering an alternative to outmoded point solutions and costly legacy ERP systems.

Yammer

https://www.yammer.com/

Yammer (www.yammer.com) is the leading provider of enterprise social networks, enabling organizations to make transformative changes quickly by empowering employees to collaborate across departments, geographies, content and business applications. The basic version of Yammer is free, and customers can pay to upgrade their network to receive additional administrative and security controls, priority customer service and a dedicated customer success manager. Companies and organizations from across the globe, including more than 85 percent of the Fortune 500, are using our award-winning Software-as-a-Service (SaaS) solution to improve employee productivity and engagement. Visit our blog to see how our customers are benefiting from Yammer or our IT Security page for detailed descriptions of our security controls and features.

Zendesk

http://www.zendesk.com/

Zendesk builds cloud software for better customer service, bringing companies and their customers closer together. With Zendesk, companies engage directly and openly with customers, building more meaningful customer relationships that last a lifetime. More than 40,000 customers use Zendesk to provide service to more than 300 million people worldwide. Learn more at www.zendesk.com.

ZScaler

http://www.zscaler.com/

Through a multi-tenant, globally-deployed infrastructure, Zscaler enforces business policy, mitigates risk, and provides twice the functionality at a fraction of the cost of current solutions. It enables organizations to provide the right access to the right users, from any place and on any device—while empowering the end-user with a rich Internet experience.

Page Dividing Line