Solution Providers

Accellion

http://www.accellion.com/

Accellion, Inc. is an award-winning private company that provides mobile solutions to enterprise organizations to enable increased business productivity while ensuring data security and compliance. As the leading provider of private cloud solutions for secure file sharing, Accellion offers enterprise organizations the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them. More than 12 million users and 2,000 of the world’s leading corporations and government agencies use Accellion solutions to increase business productivity, protect intellectual property, ensure compliance and reduce IT costs.

Accenture

http://www.accenture.com/

Accenture is a global management consulting, technology services and outsourcing company, with approximately 236,000 people serving clients in more than 120 countries. Combining unparalleled experience, comprehensive capabilities across all industries and business functions, and extensive research on the world’s most successful companies, Accenture collaborates with clients to help them become high-performance businesses and governments. The company generated net revenues of US$25.5 billion for the fiscal year ended Aug. 31, 2011.

Accenture Security Solutions professionals leverage decades of experience, deep industry knowledge and business-process know-how to help protect against threats, minimize risks and enable the adoption of new technologies that promote growth.

Aconex

http://www.aconex.com/

Aconex Limited provides a leading cloud collaboration platform for the global construction industry. This platform gives owners and contractors in the construction, infrastructure, and energy and resources sectors project-wide visibility and control between the many different organizations collaborating across their projects. With more than 50,000 user organizations and over A$800 billion of project value delivered in more than 70 countries, Aconex is the industry’s most widely adopted and trusted platform. Founded in 2000, Aconex has 41 offices in 22 countries around the world, including headquarters in Melbourne, Australia and San Francisco, California.

Adallom

http://www.adallom.com/

Adallom is a SaaS security company founded in 2012 by alumni of the Israeli Intelligence Corps. We focus on evolving the way enterprises secure information in SaaS by monitoring all activity, detecting unauthorized access, and protecting users in real time. Adallom is the only SaaS security company to have defeated targeted SaaS attacks in the wild by applying advanced machine learning to real time user activity monitoring. We are members of Microsoft’s MAPP (Microsoft Active Protections Program), and would love to work with you on securing your company’s SaaS investment.

If you’re curious about our name, “Adallom” is an abbreviation of the Hebrew saying “Ad Halom” which literally means “up to here” and in game theory lingo means “the last line of defense.” In the context of SaaS we believe that pre-existing defense mechanisms are ineffective at protecting information in SaaS. So we created a solution that extends the boundaries of enterprise security into the cloud. We moved control, visibility, and detection directly into SaaS, away from devices and perimeters. In the SaaS era, security can’t be bounded. Adallom’s charter is Security Without Boundaries.

AEP Networks

http://www.aepnetworks.com/

AEP Networks provides trusted security everywhere and secures data and voice communication regardless of device, environment or location. Delivering proven security architectures to more than 5,000 organizations all over the world including governments, enterprises and carriers and 1,000 blue chip customers.

AEP Networks develops the highest grade security technologies tested and accredited to industry security standards, including CoCo, FIPS 140-2 Level 4 and CAPS. Its extensive portfolio of products and solutions protect the integrity of very sensitive data and are extremely reliable, survivable and resilient.

AEP Networks has also developed the industry’s first remote access Security as a Service offering , CloudProtect, aimed at Managed Service Providers and Cloud Service Providers. The offering secures remote access to the virtual data centers that Service Providers run to host their customers’ applications by securing centralized application access, whether physical or virtualized.

For more information, email us at: [email protected]

Agiliance

http://www.agiliance.com/

Agiliance, founded in late 2005, is the leading independent provider of Security and Operational Risk Management solutions for Governance, Risk, and Compliance (GRC) programs. Agiliance® RiskVision ™ enables Global 2000 companies and government agencies to automate their GRC management processes; and the same platform orchestrates incident, threat, and vulnerability actions in real time. Unlike legacy offerings that take nearly a year to deploy, Agiliance customers demonstrate automation use cases within 30 days on-demand, and within 90 days on-premise, made possible by Agiliance RiskVision’s configurable platform and applications, with a broad library of technology integrations, and GRC content. Agiliance RiskVision scales with businesses, effectively managing data, assets, people and processes to achieve 100 percent risk and compliance coverage. Its real-time risk analysis leads to optimized business performance and better investment decisions.

Agiliance’s Cloud Risk Management Service implements the CSA GRC Stack and Threat Matrix in RiskVision to provide an assessment and risk management toolkit for enterprises, cloud providers, security solution providers and IT auditors. At the heart of this service is Agiliance’s Common Control Framework (CCF) which maps the CSA Cloud Controls Matrix to NIST, ISO, and COBIT frameworks along with PCI and HiTech/HIPAA regulations, to output SAS 70 II and SSAE 16 reports.Customers have a broad set of product delivery options and a comprehensive set of managed and implementation services to address all phases of deployment. Customers can also access the Agiliance Cloud on Demand to provide beta product feedback, test new patches and upgrades, run proof of concepts (POCs), and provide community contributions such as workflows and reports, as well as attend half-yearly Agiliance advisory councils.

athenahealth

http://www.athenahealth.com/

athenahealth is a leading provider of cloud-based practice management, EHR and patient communication services to medical groups, hospitals and health systems.

For athenahealth clients, being on a cloud-based service means benefiting from the collective clinical and payer knowledge of 29,000 providers on our growing network. This includes continuously tracking and updating payer and clinical rules, formulary requirements, and managing pay-for-performance and other quality programs to secure maximum incentives. athenahealth’s suite of integrated, cloud-based services includes:

  • athenaCollector® – a medical billing and practice management solution that reduces administrative red tape and allows medical groups to efficiently assess, plan, and improve practice performance while increasing revenue. It’s easy to use, saves time and dramatically improves the bottom line. Practices are able to track and access information on any claim, create simple, robust reports and get instant data for every business decision.
  • athenaClinicals® – a Stage 1 Meaningful Use-certified electronic health record that delivers greater clinical control and insights to medical practices while boosting efficiency and revenue potential.
  • athenaCommunicator®– automated messaging, live operator services, and a patient web portal that keeps medical groups competitive, compliant and accessible.
  • athenaCooordinator℠ – a care coordination service for order transmission, insurance pre-certification and patient registration among physicians and hospitals, surgical centers and imaging centers.

Being on a cloud-based service in the health care information technology space means we can exercise our comparative advantage to execute client work at scale, processing clinical documents, posting claims, tracking payments, and more. And it means we have constant visibility into every client’s performance, so we can monitor, benchmark and coach our clients toward peak performance.

Battelle

http://www.battelle.org/

Cyber Operations and Security

Battelle works with corporate and government clients to solve some of today’s most perplexing cyber challenges and prepare for the changing cyber landscape of tomorrow. Our innovative solutions challenge conventional problem-solving approaches without sacrificing scientific integrity.

Innovations include:

Battelle’s “Connect & Innovate” model enables real-time collaboration among government agencies, academia and industry to solve real-world operational problems in a learning lab environment and accelerate the education and development of the next-generation cyber workforce. This unique collaborative approach builds resilient, trusted networks of problem solvers that increase our national capacity to execute missions.

Learn more at www.battelle.org, by emailing [email protected] or on Twitter with @Battelle.

Beisen

http://www.beisen.com/index.html

Beisen, the top brand of talent management in China, the pathfinder of talent management software.

Beisen was established in 2002. As the first enterprise of talent management in China, for 10 years, Beisen is committed to the R&D of talent management technology. Beisen has been through the development of talent management in China and makes its due contribution.

In September 2010, iTalent, the first cloud computing platform of talent management in China was constructed by Beisen. The platform seamlessly integrates 6 core products including talent assessment system, recruiting management system, performance management system, succession and planning system, 360 degree evaluation system and employee survey system. With the help of iTalent platform, the fragmental human resource works in the past can be replaced by integrated talent management. And with the assists of cloud computing, the complicated and frustrating enterprise software becomes much more simple, flexible and easy-in-use.

Outstanding products is the basis of Beisen, helps Beisen win the trust of a great amount of customers. By now, Beisen’s market share of talent assessment is over 70% as well as the largest amount of customers of recruiting management system in the whole industry.

Beisen set up its headquarter in Beijing, and have 10 branches, which provide service all over China, including Shanghai, Guangzhou, Shenzhen, Chengdu, Nanjing, Xiamen, Ningbo, Dalian, Shenyang and Qingdao.

Bitglass

http://www.bitglass.com/

Bitglass is a “cloud access security broker” and the leader in total data protection. Bitglass enables enterprises to adopt cloud-based applications without having to sacrifice the security of their data. The company’s data protection suite delivers innovative technologies that transcend the network perimeter to deliver end-to-end data protection for the enterprise – in the cloud, on mobile devices and anywhere on the Internet.

As industries like Healthcare and Finance begin adopting cloud apps, companies within them must comply with strict data protection regulations. Bitglass helps enterprises remain compliant while giving their enterprise IT teams the visibility and control they need and their employees the mobility and privacy they require.

Bitglass was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution. The company is based in Silicon Valley and backed by venture capital from NEA and Norwest.

Blue Coat Systems

http://www.bluecoat.com/

Founded in 1996, Blue Coat provides industry leading web security to more than 15,000 customers worldwide, including 88% of the Fortune® Global 500.

In 2011 Blue Coat introduced the web security module also known as ThreatPulse. ThreatPulse is a cloud-delivered service that gives you all the benefits of real-time security without the need to update appliances, servers or user desktops. This Internet-delivered security service offers complete protection against web-borne threats by leveraging Blue Coat’s proven security technology as well as the WebPulse cloud community of over 75 million users.

With extensive web application controls and granular reporting features, IT administrators can instantly create and apply new policies to all users, including roaming workers using external networks. Just as important, you can identify and categorize new web content in real time with 99+% accuracy. Blue Coat cloud service is backed by our guaranteed 99.999% uptime agreement

Bluedon

http://www.bluedon.com

Bluedon is a trusted provider of network security solution, enables organizations to simplify network security and make their online business reliable. Over 10,000 customers worldwide run systems on Bluedon’s high performance network security solutions, including China’s large state-owned enterprises, Fortune 500 companies, famous education and financial institutions and telecom operators.

Bluedon is headquartered in Guangzhou in China, and has always been providing top-ranking network security products and best practice services, helping customers protect their data and information since founded in 1999. Bluedon’s products cover four categories, Security Gateway, Network Activity Audit, Security Management and Web Security. Specifically, IDS, UTM, BSM, Database Security Audit and Security Operation Center have been highly commended with outstanding performance by customers from different areas. With Bluedon’s cloud security solution, your organization enjoys productivity and flexibility that cloud brings to you.

For more information, please visit http://www.bluedon.com.

Box

http://www.box.com/

Box provides a secure, scalable content sharing and collaboration platform that both users and IT love and adopt, including 92% of the Fortune 500. Box’s dynamic, flexible content management solution empowers users to share and access content from anywhere, while providing IT enterprise-grade security and oversight into how content moves throughout their organizations. Content on Box can be shared internally and externally, accessed through iPad, iPhone, Android and PlayBook applications, and extended to partner applications such as Google Apps, NetSuite and Salesforce. Headquartered in Los Altos, CA, Box is a privately held company and is backed by venture capital firms Andreessen Horowitz, Bessemer Venture Partners, Draper Fisher Jurvetson, Emergence Capital Partners, Meritech Capital Partners, NEA, Scale Venture Partners, and U.S. Venture Partners, and strategic investors salesforce.com and SAP.

Brainloop

http://www.brainloop.com/

Brainloop is the market-leading provider of highly intuitive SaaS solutions that enable our customers to securely manage and collaborate on confidential documents and information, whether inside or outside of their IT environments. When we founded the company in 2000, we saw businesses making major gains in productivity and competitiveness by using the Internet to collaborate with external partners. But the same tools that made collaboration so effective also wreaked havoc on the security and control over information distribution that companies relied on. A lot of companies tried to bring security and collaboration together by using virtual data rooms, but fell short on policy compliance. We saw a need to go beyond that, to create an easy-to-use online platform that companies can use to roll out their confidentiality policies so that users are automatically in compliance, every time they share a document.

Centri

http://www.centritechnology.com/

CENTRI provides next generation data encryption and optimization solutions for the connected world. Our technology helps organizations secure what matters most – their data – by seamlessly integrating into their existing applications and services in the cloud, data centers or mobile devices and the Internet of Things. Enterprises and governments rely on CENTRI to seamlessly protect the full lifecycle of their data – on the endpoint, in transit and in storage. For more information visit http://www.centritechnology.com/.

CEPREI Certification Body

http://www.ceprei.org

CEPREI HQ
No.110 Dongguan Zhuang RD.
Guangzhou, P.R.China
Telephone: +86-20-87236606
[email protected]

As a leading provider of management system certification body in China and the first Executive Member of CSA in Asia, CEPREI Certification Body Provides information security related professional services such as ISO20000 & ISO27001 certification, risk assessment, IT governance, Business Continuity Management etc. Also, newly launched C-STAR assessment scheme is provided to help our client fully understand cloud security issues they’re facing and how to put the appropriate controls in place.

CEPREI Certification Body with unique legal status is a registrar authorized and accredited by national department and/or accreditation bodies home and abroad, to conduct third-party certification. It grew out of Inspection Division of China Electronic Product Reliability and Environmental Research Institute (the Fifth Electronic Institute) established in 1956, which is the first scientific research organization at national level engaged in product quality and reliability research in China.

As early as 1979, CEPREI Certification Body introduced the concept of Certification into China. Ever since then CEPREI has issued more than ten thousand certificates of various types to its clients. It sets foot in all administrative regions in mainland China and other countries and regions including Hongkong Special Administration Region, Taiwan, USA, German, Holland, Denmark, Australia, Japan, Korea, Malaysia, Thailand and Singapore.

As one of the most authoritative accreditation bodies in the world, America National Standard Institute-Registrar Accreditation Board (ANAB) has authorized CEPREI Certification Body to issue ISO9000, ISO14000 and ISO27001 certificates with ANAB logo since 2001. The certificate will be helpful for your products and services in improving reputation and enhancing competitiveness home and abroad.

CipherCloud

http://www.ciphercloud.com/

CipherCloud, the leader in cloud information protection, enables organizations to accelerate their adoption of cloud applications while ensuring visibility and control of their data. CipherCloud delivers data privacy, regulatory compliance, and data residency in the Cloud through an open platform that provides comprehensive data discovery, protection – search strong encryption, tokenization, data loss prevention, key management, and malware detection – and activity and anomaly monitoring services.

CipherCloud has experienced exceptional growth and success with over 2.6 million business users, across 25 countries, and in more than 11 industries.

The CipherCloud product portfolio protects popular cloud applications out-of-the-box such as salesforce.com, Box, and Microsoft Office 365.

CipherCloud, named as SC Magazine’s 2013 Best Product of the Year, is backed by premier venture capital firms Andreessen Horowitz, Index Ventures, and T-Venture, the venture capital arm of Deutsche Telekom. For more information, visit www.ciphercloud.com and follow us on Twitter @ciphercloud

Citrix

http://www.citrix.com/secure

Information security has never been so challenging. Trends such as public and private cloud services, consumerization and workshifting (work anywhere) mean that more people are accessing enterprise data, applications and desktops from more places, over more networks and in more ways than ever before. In the face of more sophisticated threats and a rising burden of data protection, privacy and compliance, IT must take control.

Citrix provides secure-by-design cloud and networking solutions, complemented by industry-leading security partners, that enables organizations to simplify cloud security and accelerate the delivery of applications while protecting them from attack. Data, applications, desktops and services are managed and secured centrally wherever they are—public clouds, private clouds or enterprise datacenters—and delivered securely anywhere, over any kind of connection to any device.

With Citrix, your organization embraces the cloud securely, regains control and manages risk more effectively while providing optimal flexibility to allow your business to do what it needs to do, the way it needs to.

CloudLock

http://www.cloudlock.com/

CloudLock is a leading cloud data security company that provides enterprise class solutions designed to give organizations control over their data in the public cloud, without invasive in-band technology, complicated overhead, or unanswered regulatory risk. Many of the world’s largest companies and institutions trust CloudLock’s approach of directly integrating with their SaaS applications, which makes robust security controls immediately available at a fraction of the cost and complexity of other alternatives.

CloudLock helps organizations:

  • Extend their DLP policies to SaaS applications such as Google Apps and Salesforce
  • Implement a robust discovery/classification/control security framework in the public cloud
  • Enforce the principles of people-centric security, greatly reducing their risk of data exfiltration or breach without driving users into unsanctioned (often called “shadow IT”) systems
  • Apply risk appropriate controls, including selective encryption, across their most sensitive data

For more information, please visit us at cloudlock.com

CloudPassage

http://www.cloudpassage.com/

CloudPassage addresses the number one inhibitor to cloud adoption – security. We provide server security products purpose-built for server environments where servers are cloned, migrated, bursted, and boomeranged. The company’s Halo line of products operate seamlessly across public, private, and hybrid cloud environments and can even be used on physical servers. The products bridge the gap between traditional perimeter-oriented datacenter security and security in dynamic cloud environments.

Courion

http://www.courion.com/

Courion offers a comprehensive Identity and Access Management solution that equips you with visual, real-time identity and access information so you can quickly and confidently provide open and compliant access to applications and data, recognize and reduce risk as it occurs, streamline compliance activity and expedite audits.

CradlePoint

https://cradlepoint.com/

CradlePoint solutions are part of the leading-edge 4G networks in the world. Our complete networking and cloud-management solutions help enterprises deliver better ROI and lower-cost of management. Regardless of the application, CradlePoint is delivering greater network security, better management, and better value than any other available systems on the market.

CradlePoint is the leading provider of cloud-managed 3G/4G LTE networking solutions for distributed enterprises. CradlePoint solutions provide uncompromised mobile broadband performance while delivering proven network system interoperability. CradlePoint’s broad family of high-performance routers are designed for deployment in mission-critical applications that require 24×7 connectivity. With both integrated wireless WAN and non-integrated versions, the solutions are ideal for distributed operations and emerging industries that require either remote connectivity or multi-WAN redundancy.

Founded in 2006, CradlePoint has shipped nearly a million devices and offers products certified and promoted by major worldwide carriers.

Datapipe

http://www.datapipe.com/

Datapipe offers a single provider solution for managing and securing mission-critical IT services, including cloud computing, infrastructure as a service, platform as a service, colocation and data centers. Datapipe delivers those services from the world’s most influential technical and financial markets including New York metro, Silicon Valley, London, Hong Kong and Shanghai.

Datapipe combines extensive Managed Services experience with Amazon Web Services elastic infrastructure, and our own Stratosphere(tm) virtualization offerings to develop industry-leading enterprise cloud computing solutions. When professionally engineered and optimized, cloud computing delivers unprecedented power. Our customized cloud solutions focus on your unique needs to leverage the flexibility, cost savings and processing power of the cloud when you need it, where you need it, how you need it – while freeing up valuable personnel and resources.

For more information about Datapipe visit www.datapipe.com or call 1-877-773-3306.

DBAPPSecurity

http://www.dbappsecurity.com.cn

2007 in Fremont of California, the company now has many branches with its national sales networks in many cities, such as Hongkong and Shanghai, Beijing in China. We provide products and services to 1000 customers across all industries, including many Fortune 500, large and middle-sized organizations. Since 2009, the DBAPPSecurity Ltd., a Leading company focusing on Web Application security and database security technologies. Founded in company’s revenue has being grown more than 50% per year.

DBAPPSecurity focuses its efforts on research and development and has a professional team with years of experience in developing and implementing data security and web application security solutions. The company owns some of the world leading technology patterns, and is dedicated to offer web application security and database security solutions. DBAPPsecurity’s customers include government organizations as well as leading companies from various industries such as finance, energy, education, medical and e-commerce industry.

Digi International

http://www.idigi.com/

Digi International (www.digi.com) is making wireless M2M easy by developing reliable products and solutions to connect and securely manage local or remote electronic devices over the network or utilizing our cloud technology; the iDigi Device Cloud. The iDigi Device Cloud is the intelligent platform choice for today’s and tomorrow’s device application solutions within any industry. Designed by a team with decades of experience in device network solutions, the iDigi Device Cloud provides the reliability, scalability, performance and security your solution needs

For more information, visit the iDigi Web site at www.idigi.com, or call 877-912-3444.

DocuSign

https://www.docusign.com/

DocuSign®, The Global Standard for Digital Transaction Management™,automates manual, paper-based processes with the only open, independent, standards-based DTM platform for managing all aspects of documented business transactions. DocuSign helps companies Keep Business Digital™ with industry-leading identity management, authentication, eSignature, forms/data collection, collaboration, workflow automation, payment collection, and cloud storage. DocuSign accelerates transactions for dramatic ROI, improved security and compliance, and better customer experiences with the easiest, fastest, most secure global network for sending, signing, tracking, and storing documents in the cloud. DocuSign helps companies securely collect information and payments, automate workflows, and transact business anytime, anywhere, on any device.

Dropbox

https://www.dropbox.com/

Millions of people trust Dropbox to easily and reliably store, sync, and share their documents, photos, and videos across devices and platforms. Dropbox for Business helps organizations around the world collaborate effectively and increase productivity. And it brings IT admins the functionality, controls, and visibility they need to ensure the safety of their company data. Dropbox has been designed to keep users’ data safe, employing a sophisticated infrastructure, enterprise-grade security, layers of encryption, and detailed security, privacy, and compliance policies and procedures. To learn more about Dropbox for Business, www.dropbox.com/business.

Elastica

http://elastica.net/

Elastica is the innovator of Data Science Poweredtm Cloud Application Security. Its CloudSOCtm solution empowers the elastic enterprise, and enables companies to confidently leverage cloud applications and services while staying safe, secure and compliant. Elastica Apps on extensible CloudSOCtm platform today offer cloud audit for Shadow IT, granular transaction visibility, threat detection, security controls and post-incident forensic analysis. Elastica is venture-backed by the Mayfield Fund and is headquartered in San Jose, CA. Learn more about Elastica at http://www.elastica.net.

Ericsson

http://www.ericsson.com/

Ericsson is the world’s leading provider of communications technology and services. We are enabling the Networked Society with efficient real-time solutions that allow us all to study, work and live our lives more freely, in sustainable societies around the world.

Our offering comprises services, software and infrastructure within Information and Communications Technology for telecom operators and other industries. Today more than 40 percent of the world’s mobile traffic goes through Ericsson networks and we support customers’ networks servicing more than 2.5 billion subscribers.

We operate in 180 countries and employ more than 100,000 people. Founded in 1876, Ericsson is headquartered in Stockholm, Sweden.

Evident.io

http://evident.io/

Evident.io delivers a Security-as-a-Service platform to simplify the management of risk, compliance, and threat-detection in cloud-computing environments. We democratize the security capabilities of the billion-dollar cloud companies, and make them accessible to the cloud adopters of every size and industry. The Evident platform continuously evaluates your cloud resources to detect changes in risk, compliance, and security posture — delivering the transparency and control you need to defend against today’s pervasive security threats. Our customers range from the very early startup with no dedicated security staff, all the way up to the Fortune 500 businesses with multi-million dollar security budgets. One message has been consistent: cloud security needs a continuous solution — and that solution is Evident.

EY CertifyPoint

http://www.ey.com/certifypoint

EY CertifyPoint HQ

Antonio Vivaldistraat 150
1083 HP  Amsterdam
The Netherlands
[email protected]
http://www.ey.com/certifypoint

International offices

Founded in 2002, EY CertifyPoint is an accredited independent and impartial certification institute with experienced auditors all over the world certifying some of the top international organizations. Being related to the global EY organization, EY CertifyPoint is able to provide you with a local contact person in nearly every country world-wide. For more information, please visit http://www.ey.com/certifypoint.

Feitian Technologies

https://www.cloudentify.com

中文介绍

飞天诚信科技股份有限公司(以下简称飞天诚信,股票代码:300386)是全球领先的智能卡操作系统及数字安全系统整体解决方案的提供商和服务商,成立于1998年,总部设在北京,经过16年的创新发展,公司现已成为中国信息安全领域领导品牌,国内身份认证领域首家上市企业。

飞天诚信在网络身份识别、软件版权保护、智能卡操作系统等三大领域取得了领先地位。同时,飞天诚信紧随信息发展步伐,全力打造的新一代云计算平台“云信”(www.cloudentify.com)于2014年8月正式上线,旨在为企业应用提供安全可靠的服务,也为广大云用户建立可信赖的云端生活。云信是国内首家提供双因素认证服务的云认证平台,为企业级应用提供“云+端”的安全认证解决方案。利用各种类型的终端介质(如手机APP、短信、微信、硬件、IPT等),企业通过几分钟的简单配置即可享受双因素安全认保护,剔除密码安全问题的困扰。下一步,云信将推出以“指纹”、“声波”、“面部”识别为代表的生物识别技术,引领新一代全方位身份识别和认证系统,以满足企业用户不同层次和领域的安全认证需求。

英文介绍

About Feitian

Feitian Technologies (SZSE: FEITIAN, 300386) is a public company incorporated in China. Headquartered in Beijing, it has been the No.1 supplier of user authentication and transaction security for China Online Banking. Globally, Feitian has over 650 employees and more than half of which are focusing on Research and Development. Feitian’s international business served customers in over 100 countries.

Feitian has obtained the leading position in the areas of online identification, software copyright protection and smart card operating system. Following the pace of information development, Feitian built a new cloud computing platform “Cloudentify” (www.cloudentify.com) and formally launched it in August 2014; aiming to provide safe and reliable services for enterprise applications, also establish trustworthy cloud life for the vast number of cloud users. Cloudentity is the first cloud identification platform providing two-factor authentication service in China. It provides “cloud + end” authentication solution for enterprise applications. Using various types of terminal medium (such as mobile APP, SMS, Weichat, hardware, IPT, etc.), the enterprise users can enjoy two-factor protection by a few simple configurations and avoid the password security problems. For the next step, Cloudendify will introduce biometric solutions based on fingerprint, sound and face verification, to lead a new generation of omnibearing authentication system and to satisfy the enterprise users’ requirements on different levels.

FireHost

http://www.firehost.com/

FireHost is the leader in secure cloud hosting, protecting critical data and brand reputations for companies with significant security, compliance, performance and managed services needs. Since 2009, it has made hacker awareness, management, and prevention a standard part of every customer’s secure cloud hosting environment, blocking more than 60 million attacks on behalf of its customers in 2012 alone. The company offers the most comprehensive fully managed cloud infrastructure-as-a-service (IaaS) available today, built specifically for the needs of companies governed by PCI and HIPAA compliance regulations. Some of the largest healthcare, payments, and SaaS companies in the world subscribe to FireHost’s secure cloud to ensure their data is safe and always available. FireHost provides services from Dallas, Phoenix, London and Amsterdam.

Fischer International

http://www.fischerinternational.com/

With a nearly 30 year heritage in shaping the enterprise security industry, Fischer continues its history of technology leadership and innovation by bringing to market a cloud-based Identity Services Platform that truly simplifies Identity Management, scales seamlessly from the SMB to the largest enterprise, and can be implemented either as a traditional software-as-a product deployment or via any outsourced delivery model. Fischer’s solutions provide organizations of all sizes with greater choice in how they derive the benefits of Identity Management, but without risk or compromise. For more information, please visit: www.fischerinternational.com

Five9

http://www.five9.com/

Five9, a provider of cloud contact center software, brings the power of the cloud to thousands of customers worldwide and facilitates more than three billion customer interactions annually. Since 2001, Five9 has helped organizations of every size transition from premise-based software to the cloud. With extensive expertise, technology, and an ecosystem of partners, Five9 helps businesses take advantage of their secure, reliable, scalable cloud contact center software to create exceptional customer experiences, increase agent productivity and deliver tangible business results. The purpose-built, highly scalable and secure Five9 Virtual Contact Center cloud platform delivers a comprehensive suite of easy-to-use applications that enable the breadth of contact center-related customer service, sales and marketing functions. For more information, visit www.five9.com.

Fortinet

http://www.fortinet.com/

Fortinet (NASDAQ: FTNT) is a worldwide provider of network security solutions and a market leader in unified threat management (UTM). Our products and subscription services provide broad, integrated and high-performance protection against dynamic security threatswhile simplifying the IT security infrastructure. We offer both virtual and physical appliances to protect public, private, and hybrid clouds, as well as virtual domain security for multi-tenant environments.

Fortinet has the cloud-ready technologies to help you create a secure cloud. Whether you are a cloud hosting provider, cloud service provider, orlarge enterprise, Fortinet physical and virtual appliances provide the technology you need to help you protect your virtualized environment. You can deploy a fully IPv6-ready, flexible, multi-tenant security platform that can evolve and scale effortlessly along with your user base and business plans.

Our customers include enterprises, service providers and government entities worldwide, including the majority of the 2011 Fortune Global 100. Fortinet is headquartered in Sunnyvale, Calif., with offices around the world.

FTI Technology

http://www.ftitechnology.com/

FTI Technology helps clients manage the risk and cost of e-discovery with confidence. From forensic data collection to fully managed document review services, we collaborate with our clients to deliver strategic solutions tailored to their unique legal requirements. With keen focus on the productivity and defensibility of document review, our clients rely on us to cost-effectively handle matters ranging from internal investigations to large-scale litigation with global e-discovery requirements.

Best known for its market-leading scalability and performance, Ringtail® software equips legal teams with powerful review and analysis capabilities, the ability to search across millions of documents in seconds, and the most flexible production capabilities available. And Ringtail is the only document review platform featuring both linear and visual review tools to dramatically improve the speed and consistency of review teams. Ringtail SaaS is built to deliver the promised efficiency and savings of cloud computing while meeting the unique legal requirements of e-discovery transforming the way e-discovery projects are managed.

Our electronic discovery professionals understand the technical intricacies and legal implications of data preservation and collection as well as the international protection and privacy issues that apply to electronic documents in these contexts. We can help design and implement defensible strategies to preserve, collect and analyze electronically stored information (ESI) regardless of format, language or location.

For more information visit www.FTITechnology.com/saas

Fujitsu

http://www.fujitsu.com

As the world’s third largest IT services provider and Japan’s number one ICT company with over 170,000 employees in more than 100 countries, Fujitsu has the resources and experience needed to ensure a predictable and successful cloud experience for our customers. Our annual revenues, which amounted to ¥4.5 trillion yen (US$55 billion) for the fiscal year ending on March 31, 2012, underpin an R&D program that has produced a flow of innovations and over 34,000 patents.

For over a decade, Fujitsu has been creating the building blocks for cloud computing, investing heavily in cloud-based development on a global scale: from cloud data centers, to cloud interoperability and cloud security. Our cloud offerings have built-in security mechanisms for different types of cloud architectures including public, private, and hybrid clouds, and different cloud layers such as IaaS, PaaS, and SaaS. Fujitsu’s IaaS security approach http://jp.fujitsu.com/solutions/cloud/concept/pdf/cloud-security-wp-us.pdf provides a comprehensive and adaptable set of security controls meeting and exceeding cloud security requirements from BSI http://globalsp.ts.fujitsu.com/dmsp/Publications/public/wp-fraunhofer-security.pdf, and Fujitsu’s White Book of Cloud Security https://www-s.fujitsu.com/uk/contact/white-book-cloud-security.html is frequently cited as an indispensable guide for understanding cloud computing security.

As an active member of the Cloud Security Alliance, the Trusted Computing Group, the Distributed Management Task Force, and other industry and government-led bodies, Fujitsu firmly committed to the cause of furthering cloud and security standards. For more information, please visit: http://www.fujitsu.com/global/solutions/cloud/

Gemalto

http://www.gemalto.com/

Gemalto (Euronext NL0000400653 GTO) is the world leader in digital security with 2010 annual revenues of €1.9 billion and over 10,000 employees operating out of 87 offices and 13 Research & Development centers in 45 countries.

Gemalto is at the heart of our evolving digital society. Billions of people worldwide increasingly want the freedom to communicate, travel, shop, bank, entertain, and work—anytime, anywhere, in ways that are convenient, enjoyable and secure. Gemalto delivers on the growing demands for personal mobile services, identity protection, payment security, authenticated online services, cloud computing access, modern transportation, e-healthcare and e-government services. Gemalto does this by providing secure software, a wide range of secure personal devices, and managed services to wireless operators, banks, enterprises and government agencies.

Gemalto is the world leader for electronic passports and identity cards, two-factor authentication devices for online protection, smart credit/debit and contactless payment cards, as well as subscriber identification modules (SIM) and universal integrated circuit cards (UICC) in mobile phones. Also, in the emerging machine-to-machine applications Gemalto is a leading supplier of wireless modules and machine identification modules (MIM). To operate these solutions and remotely manage the software and confidential data contained in the secure devices Gemalto also provides server platforms, consulting, training, and managed services to help its customers achieve their goals.

As the use of Gemalto’s software and secure devices increases with the number of people interacting in the digital and wireless world, the Company is poised to thrive over the coming years.

For more information visit www.gemalto.com, www.justaskgemalto.com, blog.gemalto.com, or follow @gemalto on Twitter.

Google

http://www.google.com/apps/intl/en/business/infrastructure_security.html

Google’s cloud computing solutions allow you to dramatically lower IT costs, increase productivity and increase security. Google Apps is an enterprise-ready suite of applications that includes Gmail, Google Calendar, Google Docs and Spreadsheets, Google Sites, and Google Video. Google Postini services make on-premise email systems more secure, compliant and productive by blocking spam and other intrusions before they reach email networks, and by providing encryption and archiving to help meet compliance requirements.

For more information, please visit http://www.google.com/apps/intl/en/business/index.html

GreenSQL

http://www.greensql.com

GreenSQL provides unified database security and compliance solutions for enterprises running their databases on premises or in the cloud. The company’s all-in-one approach to database security helps organizations by protecting databases from SQL injection attacks (the most common data breach method today), securing sensitive information from unauthorized database access, enforcing separation-of-duties and meeting regulatory compliance requirements. With more than 150,000 copies downloaded in 198 countries, GreenSQL is the most-used product for eliminating database vulnerabilities in the face of modern day cyber-attacks.

HCL

http://www.hcl.in/

HCL is a $5.2 Bn leading global IT services company with operations in 20 countries. The company has 17 Global delivery centers with 6 near shore centers in US, Poland, Belfast, Finland, Malaysia, and Singapore. HCL caters to 500+ Global Customer across a wide range of focused industry verticals & in the domains of Custom & Package Applications, BPO, Product Engineering, IT Infrastructure Services, IT Hardware, Systems Integration, and distribution of ICT products. HCL’s approach of engagement is based on ‘transformational outsourcing’; underlined by innovation, value creation based on adoption of best practices & standards like ITL, ISO 9000, ISO 27001 etc. HCL has global strategic partnerships with leading IT & Technology firms like Cisco, Oracle, SAP, EMC, Microsoft etc.

HCL has evolved an engagement framework to enable customers leverage the benefits of Cloud Computing while managing the associated risks. HCL’s Cloud Reference Architecture & Assessment Framework helps in mapping Customer IT landscape, Business requirements and Cloud services. HCL also has a strong & mature IT security services practice that offers end to end solutions around Information security, IT – Governance, Risk & Compliance, network & system security, managed security services. HCL helps customers address their security & operational risks while adopting Cloud Computing models to suit their business & IT strategy.

HCL has a detailed stack of IT services around the core concepts of Cloud Computing.

Hewlett Packard

http://www.hp.com/

HP is a technology company that operates in more than 170 countries around the world. At HP, our mission is to invent technologies and services that drive business value, create social benefit and improve the lives of customers — with a focus on affecting the greatest number of people possible.

HP is also an IT education leader with unmatched content expertise in HP products, related processes and topics, and industry-standard technologies, and the first Master Training Partner selected by the Cloud Security Alliance. In addition, HP is a well-established security technology vendor in cloud computing and information security globally, offering vendor-neutral information security training focusing on real-world security processes and implementation, . HP helps clients gain new and unique business benefits.

With 90+ learning centers worldwide, numerous partner facilities and customer’s onsite locations HP offers courses that draw from 35+ years of meeting complex technology training requirements. Visit HP: www.hp.com/learn

Learn what HP’s CEO, Meg Whitman, has to say about HP’s education services – watch video

Hightail

http://www.hightail.com

Hightail helps more than 45 million users worldwide, including professionals at 98% of the Fortune 500, share files easily and with complete control. Founded in 2004, Hightail is headquartered in Campbell, CA, and has offices in San Francisco, London, Paris, Munich, Hong Kong and Melbourne. To make your business more effective without putting your information at risk, learn how Hightail can help at www.hightail.com/enterprise or get in touch at [email protected].

Huawei

http://www.huawei.com/en/

Huawei is a leading global ICT solutions provider. Through our dedication to customer-centric innovation and strong partnerships, we have established end-to-end capabilities and strengths across the carrier networks, enterprise, consumer, and cloud computing fields. We are committed to creating maximum value for telecom carriers, enterprises and consumers by providing competitive ICT solutions and services. Our products and solutions have been deployed in over 170 countries and regions, serving more than one third of the world’s population.

Huawei’s vision is to enrich life through communication. By leveraging our experience and expertise in the ICT sector, we help bridge the digital divide by providing opportunities to enjoy broadband services, regardless of geographic location. Contributing to the sustainable development of society, the economy, and the environment, Huawei creates green solutions that enable customers to reduce power consumption, carbon emissions, and resource costs.

ID Quantique (IDQ)

http://www.idquantique.com/

ID Quantique (IDQ) is the world leader in quantum-safe crypto solutions designed to protect data for the long-term future. The company provides quantum-safe network encryption, secure quantum key generation and quantum key distribution solutions and services to the financial industry, enterprises and government organisations globally.

IDQ also commercializes a quantum random number generator, which is the reference in the gaming and lottery industries.

Additionally, IDQ is a leading provider of optical instrumentation products; most notably photon counters and related electronics. The company’s innovative photonic solutions are used in both commercial and research applications.

Information Services Group

http://www.isg-one.com/

Information Services Group (ISG) (NASDAQ: III) is a leading technology insights, market intelligence and advisory services company, serving more than 500 clients around the world to help them achieve operational excellence. ISG supports private and public sector organizations to transform and optimize their operational environments through research, benchmarking, consulting and managed services, with a focus on information technology, business process transformation, program management services and enterprise resource planning. Clients look to ISG for unique insights and innovative solutions for leveraging technology, the deepest data source in the industry, and more than five decades of experience of global leadership in information and advisory services. Based in Stamford, Conn., the company has more than 700 employees and operates in 21 countries. For additional information, visit www.isg-one.com.

Infosys

http://www.infosys.com/

Infosys is a global leader in consulting, technology and outsourcing solutions with US$8.25 billion in annual revenues and 160,000+ employees. We enable clients, in more than 30 countries, to stay a step ahead of emerging business trends and outperform the competition. We help them transform and thrive in a changing world by co-creating breakthrough solutions that combine strategic insights and execution excellence.

Infosys has a dedicated Enterprise Security & Risk Management (ESRM) unit with strong credentials in Security consulting and implementation services using majority of the industry’s leading products. Infosys’ security services spans across all aspects of Information Security & Compliance for enterprises including Governance, Risk Compliance (SOX/BASEL2/ HIPAA, PCI etc.), Identity & Access Management, Infrastructure security (Endpoint security, Network, Ethical hacking, Penetration testing etc.) and Application and Data security. Infosys has 1000+ consultants in Enterprise Security space.

Infosys Cloud Security service offerings consists of a broad range of services tailored to suit the specific client context. It enable clients adopt Cloud and leverage the benefits of Cloud in a secure manner. Our Cloud Security services caters to private, public or hybrid cloud platforms and provides defense in depth security posture by applying relevant security controls across perimeter, internal network, endpoint devices, applications and data layers. Infosys also offers Managed Security Services through a highly flexible and customizable Security Operations Center (SOC) for managing and monitoring Cloud security.

For further details you can contact [email protected]

Intel & McAfee Cloud Security Solutions

http://cloudsecurity.intel.com

Cloud Security at Intel & McAfee is comprised of a portfolio of client & data center cloud security products that use API Management at the cloud edge and trusted execution technology within the datacenter to provide a secure client to cloud connection. Learn more about Intel & McAfee’s cloud security products at cloudsecurity.intel.com.

KPMG

http://www.kpmg.com

KPMG LLP is an audit, tax and advisory services firm that specializes in delivering business, technical, regulatory/tax, assurance, security, and management guidance to clients considering the cloud.

McKesson

http://www.mckesson.com/en_us/McKesson.com/

McKesson is dedicated to delivering the vital medicines, supplies and information technologies that enable the health care industry to provide patients better, safer care.

McKesson is made up of many businesses, all serving the health care industry. Our businesses fall into one of two primary categories:

Distribution solutions. We are the largest pharmaceutical distributor in North America, distributing one-third of the medicines used every day. We supply more than 40,000 U.S. pharmacy locations, from Wal-Mart to the Department of Veterans Affairs to community pharmacies and hospitals.

Technology solutions. We develop and install health care information technology systems that eliminate the need for paper prescriptions and paper medical records. Our software and hardware are used in more than 70% of the nation’s hospitals with more than 200 beds.

MetricStream

http://www.metricstream.com/

MetricStream is a market leader in enterprise-wide Governance, Risk, Compliance (GRC) and Quality Management Solutions. MetricStream solutions are used by leading global corporations in diverse industries such as Financial Services, Healthcare, Life Sciences, Energy and Utilities, Food, Retail, CPG, Government, Hi-tech and Manufacturing to manage their risk management programs, quality management processes, regulatory and industry-mandated compliance and other corporate governance initiatives. MetricStream’s customers include Procter & Gamble, UBS, Societe Generale, Pfizer, Philips, Cummins, Kellogg’s, Mondelez International, SanDisk, and NetApp. MetricStream also owns and operates www.ComplianceOnline.com portal – the largest GRC advisory network and one of the largest GRC communities. MetricStream is headquartered in Palo Alto, California, USA (www.metricstream.com).

Microsoft

http://www.microsoft.com/cloud

Microsoft provides the most comprehensive approach to cloud computing, so that you can harness the full power of the cloud on your terms. Whether in your datacenter, with a service provider, or from a Microsoft’ datacenter and whether in a private cloud using HyperV™, a public cloud with Windows Azure™, or software as a service environment with Office365 Microsoft provides the flexibility and control to consume IT as a service in a way that best meets your unique business needs.

Visit www.microsoft.com/cloud to find out more.

nCircle

http://www.ncircle.com/

nCircle is the leading provider of IT risk and security performance management solutions. Organizations of all sizes use nCircle solutions to automate compliance, reduce risk and achieve higher levels of security and operational efficiency. nCircle has won numerous awards for growth, innovations, customer satisfaction and technology leadership and has been ranked among the top 100 best places to work in the San Francisco Bay Area. nCircle is headquartered in San Francisco, CA, with regional offices throughout the United States and in London and Toronto. Additional information is available at www.ncircle.com, http://benchmark.ncircle.com, and http://purecloud.ncircle.com.

NetApp

http://www.netapp.com/

NetApp creates innovative storage and data management solutions that accelerate business breakthroughs and deliver outstanding cost efficiency. Our dedication to principles of simplicity, innovation, and customer success has made us one of the fastest-growing storage and data management providers today.

Customers around the world choose us for our “go beyond” approach and broad portfolio of solutions for server-to-storage virtualization, business applications, data protection, and more. Our solutions provide nonstop availability of critical business data and simplify business processes so companies can deploy new capabilities with confidence and get to revenue faster than ever before.

Discover our passion for helping companies around the world go further, faster at www.netapp.com.

Netskope

http://www.netskope.com/

Netskope is the cloud app analytics and policy company. Only Netskope eliminates the catch-22 between being agile and being secure and compliant by providing complete visibility and enforcing sophisticated policies in cloud apps. Netskope performs deep analytics and lets decision-makers create policies in a few clicks that protect corporate data and optimize cloud app usage in real-time and at scale. With Netskope, people get their favorite cloud apps and the business can move fast, with confidence.

Netskope is headquartered in Los Altos, California. Visit us at www.netskope.com and follow us on Twitter @Netskope.

NetWitness

http://www.netwitness.com/

NetWitness helps organizations in over 160 countries dramatically improve their ability to defend against advanced threats. NetWitness NextGen is the only network monitoring product on the market today that allows users to: analyze and model hundreds of terabytes of live network traffic in real-time; generate automated, comprehensive analyses that can be easily understood by both cyber analysts and non-technical personnel, and integrate third party threat feeds and create actionable network intelligence. Based upon a dedicated and extensible full packet capture and session analysis infrastructure that can be used within enterprise cloud and virtual environments, NextGen performs both rules-based and interactive session analysis across the entire network protocol stack, up to the application layer. NetWitness NextGen is designed for organizations to address concurrent problems of insider threat management, data leakage protection, network forensics and incident response, compliance verification, network e-discovery, designer malware and zero-day threat detection. NetWitness customers include Defense, National Law Enforcement and Intelligence Agencies, Top US and European Banks, Critical Infrastructure, and Global 1000 organizations. NetWitness has offices in the U.S. and the U.K., and partners throughout North and South America Europe, the Middle East, and Asia. Download a freeware version of NetWitness and see what you’ve been missing on your network: http://download.netwitness.com.

New World Telecom

http://www.newworldtel.com

New World Telecommunications Limited (NWT), a member of New World Development Company Limited (HK Stock Code: 17), is a pioneering telecom service provider in Hong Kong. Being a customer-focused company, NWT is dedicated to offering top-quality international voice and innovative data services for its customers in Hong Kong and overseas.

NWT’s Cloud Enterprise Solution (CES) is an Infrastructure-as-a-Service (IaaS) to virtualise IT or network resources on a cloud computing platform and perform multiple applications. Our CES is a perfect integration of state-of-the-art facilities and equipments, carrier-grade network and connectivity, professional network supports and monitoring, as well as many ready-to-use or customized features.

Our Cloud Computing Services obtained both ISO/IEC 20000-1:2011 and ISO/IEC 27001:2005 certifications, offering customers high quality services that meet international standards.

For details, please visit http://www.newworldtel.com.

Novell

http://www.novell.com/home/

With over 20 years of experience, Novell is a leader in identity management and security solutions. Novell delivers a web-based identity and access management solution that is based on open standards. Novell’s solution provides out-of-the-box integration with leading enterprise identity stores, comprehensive compliance reporting of all user activity, centralized just-in-time provisioning and much more.

For security specifically, Novell offers an innovative web-based security service for Cloud Providers e.g. Saas applications more secure and manageable for the enterprise. It extends beyond simple sso functionality to provide enterprises the ability to extend their identities, policies, audits and workflow from the enterprise to the cloud infrastructure.

NSFOCUS

http://www.nsfocus.com/

NSFOCUS is a leading provider of vulnerability assessment, Web Application Firewall (WAF), Network Intrusion Prevention System (NIPS), Anti-DoS, content security gateway, and etc. Powered by its 10+ years of security vulnerability research, NSFOCUS has been the major contributor of security vulnerability research at the industry by freely sharing and resolving over tens vulnerabilities from critical applications.In conjunction with security hardware appliances and software, NSFOCUS has been delivering security services through Security As A Service (SaaS), including web reputation service, vulnerability assessment, Anti-DDoS and etc. Its customers come from government, finance, telco operators, ISP, power providers, etc.

NTT I³

http://www.ntti3.com/

NTT Innovation Institute Inc. (NTT I³, pronounced NTT I Cube) is a new R&D center of NTT Group, the global leader of information and communication technology (ICT) services. NTT I³ aims to accelerate the global development of the NTT Group, through open innovation, by leveraging its Silicon Valley location and tapping into the rich talent pool of the valley. Our best practices in North America will be formulated into modular intellectual properties and rolled out globally, to NTT’s Global marketplace.

Currently, NTT I³ focuses on “Global Cloud Services” as the cornerstone of NTT’s business operations. NTT I³ is developing modularized intellectual properties based on a deep understanding and analysis of the latest market needs in the areas of security and cloud computing. These intellectual properties are designed to best satisfy various, ever-evolving market needs in a globally scalable and cost competitive manner.

Carrying on the world renown NTT R&D heritage, NTT I³ strives to set a new global standard of agility, quality, and value creation in pursuit of open service innovation.

Okta

http://www.okta.com/

Okta is an enterprise grade identity management service that is built from the ground up in the cloud and delivered with an unwavering focus on customer success. With Okta enterprises can simply and securely manage access to cloud, mobile and on premises applications across employees, partners and customers.

Accessible via an intuitive, consumer Web interface or a broad set of RESTful web services, Okta provides directory services, single sign-on, strong authentication, provisioning, workflow, and analytics as a complete, integrated solution. Okta offers identity management from the cloud on a secure, reliable, SOC2 Type II audited platform that covers all of the applications, directories, identity systems, devices, organizations and people that are a part of today’s IT reality. Whether it is in the cloud, on a mobile device, or behind your firewall Okta’s got it covered.

Enterprises everywhere including Activision, Allergan, BMC Software, Comcast, Colorox, Groupon, Informatica, LinkedIn, Purolator, Shortel and SAP are using Okta to increase security, improve user productivity, reduce IT costs, and ensure compliance.

The Okta team has built and deployed many of the world’s leading on-demand and enterprise software solutions from companies including Salesforce.com, PeopleSoft, Microsoft, BMC, Arcsight, Sun, and HP. Okta is backed by premiere venture investors Andreessen Horowitz, Greylock Partners, and Khosla Ventures.

OnBase

http://www.onbase.com/OnBaseCloud

For more than 20 years, Hyland has been dedicated to meeting organizations’ needs for document and process management with OnBase, an enterprise content management (ECM) solution. As OnBase has evolved through consistent product innovation, it remains focused on automating business processes that depend on documents, content and people to operate more effectively.

OnBase is the pioneer of ECM in the cloud. Since 2000, the OnBase Cloud has been empowering more than 600 organizations around the world to better manage the content that surrounds their processes. The OnBase Cloud connects people to the content, data and processes they need to make more informed decisions – without additional infrastructure needs. Employee productivity increases as they spend less time searching for paper and dedicate more time to providing quality service to customers.

For more information about OnBase cloud-based and hosted solutions, please visit www.onbase.com/OnBaseCloud

OneLogin

http://www.onelogin.com/

OneLogin is the innovator in enterprise identity management and provides the industry’s most comprehensive solution for managing user identities in the cloud and behind the firewall. Unique capabilities like Federated Cloud Search and OneLogin for iPad extend the genius of single sign-on (SSO), break down SaaS data silos, and increase productivity. OneLogin comes pre-integrated with more applications, authentication methods, directories, VPNs and SAML tools, so you can get up and running in minutes with no professional services required. IT regains control over web application access, LOB owners quickly on- and off-board team members, and end-users enjoy easy access to all their apps. OneLogin has over 700 customers in 35 countries across the globe. Try our free forever plan with three cloud apps and an unlimited number of users. This plan includes single sign-on for web, mobile and iPad, directory integration, and multi-factor authentication. http://www.onelogin.com/signup/

Orange

http://www.orange.com/en_EN/group/index.jsp

Orange Business Services, the France Telecom Orange branch dedicated to B2B services, is a leading global integrator of communications solutions for multinational corporations. Orange Business Services provides a comprehensive portfolio of Infrastructure and software as a service solutions, addressing the needs of entreprises of all sizes, thanks to a choice of cost-effective packaged products based on shared infrastructures as well as highly customized and dedicated solutions for specific security and compliance needs. Combining its IT expertise with its world’s largest, seamless network for voice and data, Orange Business Services can ensure that the security and the performance of its cloud computing solutions are guaranteed end-to-end.

Palerra

https://www.palerra.com/

Palerra designed LORIC to provide continuous compliance, threat visibility, and incident response for an organization’s entire cloud footprint (SaaS, PaaS, and IaaS) in a single platform. It automates all steps of the security lifecycle to enable organizations to keep pace with the rapidly increasing volume of cloud usage as well as the velocity of change in the threat landscape. LORIC does so without any hardware or software, and does not impact the native user experience for cloud usage.

Palerra is a privately held company funded by Norwest Venture Partners and Wing Venture Partners. It is headquartered in Santa Clara, CA. Learn more at https://www.palerra.com/ and continue the conversation on Twitter at @palerrainc

Palo Alto Networks

http://www.paloaltonetworks.com/

Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Unlike fragmented legacy products, our security platform safely enables business operations and delivers protection based on what matters most in today’s dynamic computing environments: applications, users, and content. Find out more at www.paloaltonetworks.com.

Perspecsys

http://www.perspecsys.com/

The Perspecsys Cloud Data Protection Gateway allows organizations to protect their sensitive business data when using popular cloud applications such as Oracle CRM On Demand and salesforce.com. Any information that leaves an enterprise’s environment and enters the cloud can be tokenized or encrypted (using strong FIPS 140-2 encryption modules), ensuring that data remains undecipherable when it is being processed or stored in the cloud. Companies use Perspecsys to ensure compliance with Data Residency regulations or to satisfy requirements associated with sector specific regulations such as PCI DSS, HIPAA, SARBOX, and GLBA. A key benefit of the solution is its ability to preserve end-user functionality, such as the ability to Search or Sort, on data-fields that have been tokenized or encrypted (even when using FIPS 140-2 cloud encryption).

Perspecsys’ solution integrates easily into an enterprise SaaS implementation. Installed inside of an organization or at its IaaS provider (such as Fujitsu or Amazon AWS), Perspecsys’ software resides transparently between the application and its users, intercepting critical data before it is passed to the application in the cloud, and replacing it with a random token or encrypted value that is meaningless when viewed outside the Perspecsys Cloud Data Protection Gateway.

Find out today how Perspecsys can make your organization more secure. Click here to schedule a demo.

PGP

http://www.symantec.com/business/theme.jsp?themeid=pgp

PGP Corporation is a global leader in email and data encryption software for enterprise data protection. Based on a unified key management and policy infrastructure, the PGP® Encryption Platform offers the broadest set of integrated applications for data security. PGP® platform-enabled applications allow organizations to meet current needs and expand as security requirements evolve. From the datacenter, to the endpoint and beyond, PGP® solutions protect data whether it is at rest, in motion or in use.

Ping Identity

https://www.pingidentity.com/

Ping Identity provides cloud identity security solutions to more than 800 of the world’s largest companies, government organizations and cloud businesses. With a 99% customer satisfaction rating, Ping Identity empowers 45 of the Fortune 100 to secure hundreds of millions of employees, customers, consumers and partners using open standards like SAML, OpenID and OAuth. Businesses that depend on the Cloud rely on Ping Identity for simple, proven and secure cloud identity management for customers and employees through single sign-on, federated identity management, mobile identity security, API security, social media integration and centralized access control. Visit pingidentity.com to learn more.

Qihoo 360

http://www.360.cn

Qihoo 360 Technology Co. Ltd. (Qihoo 360) is a leading Internet company in China as measured by its active user base.  Qihoo 360 offers comprehensive Internet and mobile security products and services for free to over 465 million Internet users.  With friendly and interactive user experience and leading cloud-based Internet security technologies, Qihoo 360’s products are trusted by massive and loyal users who enjoy Qihoo 360’s real-time protection for their daily online activities.
 
Recognizing security as a fundamental need of all Internet and mobile users, Qihoo 360 has built the large user base by offering comprehensive, effective and user-friendly Internet and mobile security products and services to protect users’ computers and mobile devices against malware and malicious websites.  Qihoo 360’s products and services are supported by the cloud-based security technology, which Qihoo 360 believes is one of the most advanced and robust technologies in the Internet security industry. Qihoo 360 also provides users with two very important secure access points to Internet: web browsers and app store.  Qihoo 360 currently monetizes the massive user base primarily through offering online advertising and Internet value-added services. 
 
Founded in September 2005, Qihoo 360 is now a big family with more than 4,500 employees. On March 30th 2011, Qihoo 360 was listed on NYSE under the ticker “QIHU” as the first Chinese security company. Today Qihoo 360’s market cap reaches approximately $10 billion. All these incredible achievements have been reached by Qihoo 360’s hard-working and creative team only within 8 years.

Qihoo 360 offers comprehensive Internet and mobile security products and services for free to over 465 million Internet users in China.

Qualys

http://www.qualys.com/

Qualys®, Inc. is the leading provider of on demand IT security risk and compliance management solutions ­ delivered as a service. Qualys Software-as-a-Service solutions are deployed in a matter of hours anywhere in the world, providing customers an immediate and continuous view of their security and compliance postures. The QualysGuard® service is used today by more than 3,500 organizations in 85 countries, including 40 of the Fortune Global 100 and performs more than 200 million IP audits per year. Qualys has the largest vulnerability management deployment in the world at a Fortune Global 50 company. Qualys has established strategic agreements with leading managed service providers and consulting organizations including BT, Etisalat, Fujitsu, IBM, I(TS)2, LAC, NTT, SecureWorks, Symantec, Tata Communications and TELUS.

Rackspace

http://www.rackspace.com/

The Rackspace Cloud provides on-demand and scalable website, application and storage hosting backed by Fanatical Support®. Through an integrated suite of cloud solutions – Cloud Sites™, Cloud Files™ and Cloud Servers™ – The Rackspace Cloud enables astute developers and IT managers to trade the hassles, upfront investments and high costs for a hosting environment that scales easily when traffic fluctuates.

For more information about The Rackspace Cloud, visit www.rackspacecloud.com or call 1-877-934-0409.

Rapid7

http://www.rapid7.com/

Rapid7® is the leading provider of security risk intelligence solutions. Rapid7’s integrated vulnerability management and penetration testing products, NeXpose® and Metasploit®, empower organizations to obtain accurate, actionable and contextual intelligence into their threat and risk posture. Rapid7’s solutions are being used by more than 1,600 enterprises and government agencies, while the Company’s free products are downloaded more than one million times per year and enhanced further by over 125,000 security community users and contributors. Rapid7 has been recognized as one of the fastest growing security companies worldwide by Inc. Magazine and is backed by Bain Capital Ventures. For more information about Rapid7, please visit http://www.rapid7.com.

Raytheon

http://www.raytheon.com/

Raytheon Company, with 2011 sales of $25 billion, is a technology and innovation leader specializing in defense, homeland security and other government markets throughout the world. With a history of innovation spanning 90 years, Raytheon provides state-of-the-art electronics, mission systems integration and other capabilities in the areas of sensing; effects; and command, control, communications and intelligence systems, as well as a broad range of mission support services. With headquarters in Waltham, Mass., Raytheon employs 71,000 people worldwide. For more about Raytheon, visit us at www.raytheon.com and follow us on Twitter at @raytheon.

Ribose

http://www.ribose.com

Ribose helps individuals and organizations worldwide work together effectively and securely through its social collaboration platform. By focusing on the “whole of collaboration”, Ribose has taken online social collaboration to a new level. Whether planning simple events or running complex projects, you will find that Ribose makes it easy, effective and genuinely fun.

Ribose is free to use: http://www.ribose.com.

RSA

http://www.rsasecurity.com/

RSA, The Security Division of EMC, is the expert in information-centric security, enabling the protection of information throughout its lifecycle. RSA enables customers to cost-effectively secure critical information assets and online identities wherever they live and at every step of the way, and manage security information and events to ease the burden of compliance.

RSA offers industry-leading solutions in identity assurance and access management, encryption, security information management and anti-fraud protection, bringing trust to millions of user identities, the transactions that they perform, and the data that is generated. For more information, please visit www.RSA.com and www.EMC.com.

Saba

http://www.saba.com/

Saba is a global leader in next-generation cloud solutions for talent management. The company helps organizations transform the way they work by enabling the continuous learning, engagement and development of everyone in their people network, including employees, partners, and customers. Supporting the new world of work, Saba delivers learning, performance, succession, career development, workforce planning and compensation solutions that incorporate modern technologies such as social, collaboration, mobile and gamification. Saba solutions are based on the Saba Cloud platform, a highly scalable architecture that exceeds industry scalability, performance, and security standards. The company currently supports over 31 million users from 2,200 customers across 195 countries and in 37 languages. For more information, please visit www.saba.com.

Sierra Wireless

http://www.sierrawireless.com/

Sierra Wireless offers industry-leading mobile computing and machine-to-machine (M2M) communications products and solutions that connect people, devices, and applications over cellular networks. Wireless service providers, equipment manufacturers, enterprises and government organizations around the world depend on us for reliable wireless technology. We offer 2G, 3G and 4G wireless modems and gateways as well as a comprehensive suite of software, tools, and cloud services that ensure our customers can successfully bring wireless applications to market. For more information about Sierra Wireless, visit www.sierrawireless.com.

Skyhigh Networks

http://www.skyhighnetworks.com/

Skyhigh Networks’ mission is to help CIOs securely enable productivity and innovation within their businesses. As the “Cloud Visibility and Enablement Company”, we help companies embrace cloud services with appropriate levels of security, compliance, and governance, while lowering risk and cost. Over 100 customers, including BMC Software, Cisco, Creative Artists Agency, Diebold, and DirecTV use Skyhigh’s unparalleled cloud visibility, usage analytics, and policy enforcement to support their “Cloud Adoption Lifecycle” (i.e. Discover – Analyze – Secure) today. Specifically:

  • Skyhigh shines a light on Shadow IT by giving the organization a comprehensive view into its use of all cloud services
  • Skyhigh delivers an objective risk assessment for each identified service to quickly identify data, business and legal risks of these services.
  • Skyhigh analyzes the use of all cloud services to identify opportunities for IT to enable employees by subscribing to specific services, to reduce risk and costs by consolidating and better managing subscriptions, and to highlight anomalous behavior that may indicate a security breach, data leak, or compliance violation.
  • Skyhigh enforces the organization’s policies on the use of specific cloud services by controlling access, encrypting data with customer managed keys, preventing sensitive data from being disclosed (e.g., PII, PHI), and provides a live log of all accesses to specific cloud services.
  • Skyhigh enables secure mobile access to approved cloud services without requiring any agent, footprint, or other friction to the end user.

Spanning

http://spanning.com/

Spanning Cloud Apps, the most trusted provider of SaaS backup and recovery, prevents data loss with automated backup and accurate restores for Google Apps and Salesforce.com. Spanning Backup is a powerful, reliable enterprise-grade solution trusted by thousands of businesses and educational institutions. Visit: www.spanning.com and follow @SpanningBackup.

Swisscom

http://www.swisscom.ch

Swisscom is Switzerland’s leading telecoms provider. Swisscom has a presence throughout Switzerland and offers a full range of products and services for mobile, landline and IP-based voice and data communication. Massive investments in network infrastructure ensure that this will remain the case in the future. Swisscom is active in one of the most attractive broadband markets in Europe via the Italian provider Fastweb. Swisscom also offers services for IT infrastructure outsourcing, cloud services as well as the management of communications infrastructures. Furthermore, Swisscom is a leading security & IAM service provider in Switzerland with a broad range of managed security services. This includes cloud-delivered security & IAM services.

Swisscom fosters close ties with its target groups – shareholders, employees, suppliers, the public and, above all, its customers. As a trustworthy companion to the digital world we help our customers

… feel secure and at ease
… find what they’re looking for quickly and simply
… experience and achieve extraordinary things.

Swisscom – we open up new possibilities.

Symantec

http://www.symantec.com/index.jsp

Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.

TATA Communications

http://www.tatacommunications.com/

Tata Communications is a USD $3.2 billion (FY13) global communications and enterprise IT service provider that owns and operates the world’s most advanced subsea cable network, delivering first-class infrastructure, enterprise solutions and partnerships to carriers and businesses worldwide. Tata Communications’ network is truly global, extending from developed markets to the world’s fastest growing emerging economies. Here are some fast facts around how we are at the centre of driving global connectivity and collaboration:

  • #1 International Wholesale Voice Carrier
  • #1 submarine cable owner by length
  • Only global tier 1 ISP with a top five position in all continents (Renesys)
  • 20% of the world’s internet routes are directly connected to the Tata Communications network

Core to everything Tata Communications does, is its global infrastructure which consists of one of the largest and most sophisticated subsea optic fibre cable networks (including the world’s only wholly owned, complete cable ring around the globe); its Tier 1 IP network; and world-class data centres in key business capitals around the world. On top of this robust backbone, sits Tata Communications’ voice and data businesses and its comprehensive portfolio of managed enterprise services. These include high speed connections and global MPLS virtual private networks, the world’s largest network of Telepresence services, the world’s most extensive DDoS mitigation and detection service, content delivery networks, and cloud enablement solutions.

Telecom Italia

http://www.telecomitalia.com

Telecom Italia is one of the most important telecommunications and ICT operators in Italy as well as being a major telco provider in Latin America.

In the domestic market the Group provides fixed and mobile telecommunications, internet and media services, office systems and solutions for businesses, research and development.

Telecom Italia has an extensive network consisting of the latest transmission technologies ranging from fibre optics to xDSL; it provides fibre optic back-bones in Europe and South America.

Moreover, by leveraging its back-bone and network capacity Telecom Italia it is able to provide cloud computing service platforms to customers ensuring end-to-end security and quality performance.

Tenet Health

https://www.tenethealth.com/

Tenet Healthcare Corporation is a diversified healthcare services company with more than 125,000 employees united around a common mission: to help people live happier, healthier lives. Through its subsidiaries, partnerships and joint ventures, including United Surgical Partners International (USPI), the company operates 80 general acute care hospitals, 18 short-stay surgical hospitals and over 400 outpatient centers in the United States, as well as nine facilities in the United Kingdom. Tenet’s Conifer Health Solutions subsidiary provides technology-enabled performance improvement and health management solutions to hospitals, health systems, integrated delivery networks (IDN), physician groups, self-insured organizations and health plans. Tenet also operates six health plans.

Thales e-Security

http://www.thales-esecurity.com/

Thales e-Security is a leading global provider of information security providing data encryption solutions to the financial services, manufacturing, government and technology sectors. With a 40 year unrivalled track record of protecting corporate and government information, Thales solutions protect our customers most sensitive data and is used by four of the five largest energy and aerospace companies, government networks around the world, and secures more than 80 percent of the worldwide payment transactions. Thales e-Security has offices in Japan, Hong Kong, United Kingdom and the United States and is represented in over 90 countries around the world. For more information, visit www.thales-esecurity.com

ThousandEyes

http://www.thousandeyes.com/

ThousandEyes provides IT performance management for the cloud era. With the adoption of cloud applications, enterprises are becoming heavily reliant on networks outside of their control. This creates new challenges in troubleshooting performance issues, both inside and outside the corporate network. ThousandEyes provides detailed visibility beyond the corporate network perimeter, identifies the root cause of performance problems with cloud applications and enables distributed collaboration to resolve problems quickly.

Trend Micro

http://us.trendmicro.com/us/home/

With over two decades of expertise in Endpoint, Messaging and Web Security, Trend Micro provides individuals, and organizations of all sizes, with smarter security solutions that protect against a wide range of insidious threats and combined attacks including viruses, spam, phishing, spyware, botnets and other Web threats, such as data-stealing malware. Trend Micro develops, delivers, and supports proactive cloud-based solutions designed to safeguard critical information and protect personal and corporate reputations. As an industry leader in security intelligence, Trend Micro’s mission is to secure the exchange of digital information by providing the most flexible and customizable Internet Content Security solutions available.

Trintech

http://www.trintech.com/

Trintech is the leading provider of financial software solutions for the Record-to-Report process. Over 800 clients in 100 countries – including half of the Fortune 50 and the FTSE 100 – rely on our solutions to optimize resources, reduce costs, manage risk and monitor activities across the entire finance organization worldwide. Trintech’s Cloud-based Cadency™ software automates the entire R2R cycle – including account reconciliation, close management, compliance, and financial reporting. Trintech’s offices are located in the United States, the United Kingdom, The Netherlands, Australia, France, Ireland and the Nordics, with partners in South Africa, Latin America and across the Asia Pacific region. www.trintech.com.

Türk Telekomünikasyon A.Ş.

http://www.turktelekom.com.tr

Türk Telekom is Turkey’s leading communication and convergence technologies company with its modern network infrastructure covering the whole country. Offering a wide range of services to residential and commercial customers in fixed lines and broadband Internet, Türk Telekomünikasyon A.Ş has 14.3 million Fixed Access Lines, and 7 million ADSL connections (bulk) as of December 31, 2012. Türk Telekom pioneers in developing and implementing the low-carbon business model in Turkey with its works towards social, economical and environmental sustainability, also transforms its products and services, office practices and work processes according to sustainability principles in order to achieve this purpose and considers including all of its employees, their families, suppliers and customers into this process as a part of its strategy. Türk Telekom is the first telecommunication company calculating and reporting its carbon footprint to CDP (Carbon Disclosure Project) in Turkey.

TÜV Rhineland

http://tuv.com

Headquarters

TÜV Rheinland AG
Am Grauen Stein
51105 Cologne, Germany
TÜV Rheinland Asia Pacific Competence Center for Cloud Solutions

25 International Business Park
#05-105 German Centre
Singapore 609916
Tel: + 65 6562 8750 Ext 3357
Fax: + 65 6562 8759
[email protected]

International offices

TÜV Rheinland Group is a global leader in independent inspection services, founded more than 140 years ago with more than 19,300 employees. TÜV Rheinland provides ICT services for companies and institutions for more than 15 years and supports organizations from the private and public sector with comprehensive consulting and solution expertise in IT, cyber security and telecommunications through digital transformation processes.

To find the office closest to you visit www.tuv.com.

Ultimate Software

http://www.ultimatesoftware.com/

Ultimate Software is a leading cloud provider of people management solutions. The company’s award-winning UltiPro solution provides a comprehensive approach to manage the employee life cycle, from recruitment to retirement, and includes features for talent acquisition and hiring; onboarding; payroll; HR compliance; online benefits enrollment and management; performance management and reviews, succession management; career development; business intelligence; real-time reporting; time and attendance; plus role-based access for executives, managers, administrators, and employees. In 2012, Ultimate Software was ranked #25 on FORTUNE Magazine’s list of the Best Companies to Work For.

Unify

http://www.unify.com/

Unify, formerly Siemens Enterprise Communications, is a global communications software and services company. Our new name reflects perfectly what we do: we unify our customers’ communications systems. By synchronizing technologies, creating an engaging user experience and weaving communications seamlessly into the way businesses operate, we empower an increasingly mobile workforce to work better together. The result is a transformation of how the enterprise communicates and collaborates that amplifies collective efforts, energizes the business and drives better performance.

Born out of the engineering DNA of Siemens, Unify builds on a heritage of product reliability, innovation, open standards and security to provide integrated communications and networking solutions for 75% of the Global 500. With the introduction of Project Ansible, Unify is leading the market with its vision of a dynamic communications and collaboration platform. Unify is a joint venture of the Gores Group and Siemens AG.

Vaultive

http://www.vaultive.com/

Vaultive is a provider of cloud data encryption solutions designed to maintain the control, security and compliance of data processed by cloud-based services. Vaultive has developed a set of advanced encryption techniques to allow for processing of encrypted data residing in the cloud including search, sort and index — while enterprise IT retains control of the encryption keys. Optimized for Microsoft® Office 365 and Hosted Exchange, the Vaultive platform supports best practices for encryption in use, while maintaining the benefits of cloud computing.

Founded in 2009 by a team of information security veterans, Vaultive’s persistent encryption capabilities allow customers to satisfy requirements to encrypt data in transit to the cloud service provider, maintain encryption of data at rest while resident in the cloud, in addition to supporting encryption of data processed by a third-party service.

Vodafone

https://vodafone.com/

Vodafone Cloud & Hosting cover all aspects of data centre, server, security and storage infrastructure; from design and build to management and operation. We help CIOs and IT departments reduce costs, focus their resources and drive business strategy.

Vormetric

http://www.vormetric.com/

Vormetric is the leader in enterprise systems encryption and key management for physical, virtual and cloud environments. The Vormetric Data Security product line provides a single, manageable and scalable solution to encrypt any file, any database, any application, anywhere it reside. Vormetric achieves strong encryption without sacrificing application performance or creating key management complexity. The most security conscious organizations and government agencies in the world, including 7 of the Fortune 10, have standardized on Vormetric to provide strong, easily manageable data security. For more information visit www.vormetric.com.

Workday

http://www.workday.com/

Workday, the on-demand ERP company, provides business solutions that make growing companies more agile, competitive, and successful offering an alternative to outmoded point solutions and costly legacy ERP systems.

Yammer

https://www.yammer.com/

Yammer (www.yammer.com) is the leading provider of enterprise social networks, enabling organizations to make transformative changes quickly by empowering employees to collaborate across departments, geographies, content and business applications. The basic version of Yammer is free, and customers can pay to upgrade their network to receive additional administrative and security controls, priority customer service and a dedicated customer success manager. Companies and organizations from across the globe, including more than 85 percent of the Fortune 500, are using our award-winning Software-as-a-Service (SaaS) solution to improve employee productivity and engagement. Visit our blog to see how our customers are benefiting from Yammer or our IT Security page for detailed descriptions of our security controls and features.

Zendesk

http://www.zendesk.com/

Zendesk builds cloud software for better customer service, bringing companies and their customers closer together. With Zendesk, companies engage directly and openly with customers, building more meaningful customer relationships that last a lifetime. More than 40,000 customers use Zendesk to provide service to more than 300 million people worldwide. Learn more at www.zendesk.com.

ZScaler

http://www.zscaler.com/

Through a multi-tenant, globally-deployed infrastructure, Zscaler enforces business policy, mitigates risk, and provides twice the functionality at a fraction of the cost of current solutions. It enables organizations to provide the right access to the right users, from any place and on any device—while empowering the end-user with a rich Internet experience.