Overview | ||||||
Supplier Slogan | Perfection in Protection, Licensing and Security | We stop breaches. | ||||
HQ Location | United States | Germany | United States | United States | China | France |
Year Founded | 1982 | 1989 | 2001 | 2012 | 1995 | 1893 |
Company Type | Public | Private | Private | Private | Private | Public |
Stock Ticker | NYSE: DELL | CRWD | EPA:HO | |||
Revenue | $100m-1b | $10-100m | $10-100m | $10-100m | $10-100m | $1-10b |
Employees | 1,001 - 10,000 | 51 - 200 | 51 - 200 | 1,001 - 10,000 | 51 - 200 | 10,001 - 50,000 |
Website | Open website | Open website | Open website | Open website | Open website | Open website |
Company Description | RSA Security LLC, formerly RSA Security, Inc. and doing business as RSA, is an American computer and Network Security company. RSA was named after the initials of its co-founders, Ron Rivest, Adi Shamir and Len Adleman, after whom the RSA public key Cryptography algorithm was also named. Among its products include the RSA BSAFE Cryptography libraries and the SecurID Authentication token. RSA is known for allegedly incorporating backdoors developed by the NSA in its products. It also organizes the annual RSA Conference, an information security conference. Founded as an independent company in 1982, RSA Security, Inc. was acquired by EMC Corporation in 2006 for US$2.1 billion and operates as a division within EMC. RSA is based in Bedford, Massachusetts, with regional headquarters in Bracknell (UK) and Singapore, and numerous international offices. Year founded: 1982 Stock ticker: RSA | WIBU-SYSTEMS AG, a privately held company founded by Oliver Winzenried and Marcellus Buchheit in 1989, is an innovative security technology leader in the global software licensing market. In its mission to offer the most secure, unique, and highly versatile technology, Wibu-Systems has developed CodeMeter, a comprehensive, award-winning suite of hardware and software-based solutions for computers, embedded systems, mobile devices, PLCs, and microcontrollers that incorporates internationally patented processes dedicated to protecting the integrity of digital assets. Through its motto “Perfection in Protection, Licensing and Security”, Wibu-Systems safeguards the intellectual property of software publishers and Intelligent Device manufacturers against illicit and fraudulent use, reverse engineering and tampering attacks, sabotage and espionage actions, while generating new digital business models fully integrated with ERP, CRM, and e-commerce platforms. | Founded in 2001, Keyfactor empowers enterprises of all sizes to escape the exposure epidemic – when breaches, outages and failed audits from digital certificates and keys impact brand loyalty and the bottom line. Powered by an award-winning PKI as-a-service platform for certificate lifecycle automation and IoT device security, IT and infosec teams can easily manage digital certificates and keys. And product teams can build IoT devices with crypto-agility and at massive scale. | CrowdStrike is a cybersecurity technology firm pioneering next-generation Endpoint protection, delivered as a single integrated cloud-based solution. CrowdStrike Falcon platform stops breaches by detecting all attacks types, even malware-free intrusions, providing five-second visibility across all current and past Endpoint activity while reducing cost and complexity for customers. CrowdStrike Falcon platform is delivered via the security industry only 100% native cloud architecture, integrated with 24/7 managed hunting capabilities and in-house threat intelligence and incident response teams. CrowdStrike unique Threat Graph harnesses the cloud to instantly analyze data from billions of Endpoint events across a global crowdsourcing community, allowing detection and prevention of attacks based on patented behavioral pattern recognition technology. | Topsec Cloud Solutions is a major provider of managed email and web security solutions in the cloud. For almost two decades we have served a diverse range of customers in Government, Healthcare, Engineering, Information Technology and other industries. Anti-spam, Anti-virus, Email security, Email content filtering, Sandboxing, Email archiving, File sharing, and Domain management are among our services. In summary, we match our clients’ security demands and assist them in securing and managing their corporate information with no upfront costs. | Thales is a global technology leader in the Aerospace, Transportation and Defence & Security markets. In 2013, the company generated revenues of EUR14.2 billion with 65,000 employees in 56 countries. With its 25,000 engineers and researchers, Thales has a unique capability to design, develop and deploy equipment, systems and services that meet the most complex security requirements. Thales has an exceptional international footprint, with operations around the world working with customers and local partners. |
IoT Solutions | Keyfactor, formerly Certified Security Solutions (CSS), is a leading provider of secure digital Identity Management solutions that enables organizations to confirm authenticity, and ensure the right things are interacting in the right ways in our connected world. | Falcon Endpoint Protection Pro Market-leading NGAV proven to stop Malware with integrated threat intelligence and immediate response - with a single lightweight agent that operates without the need for constant signature updates, On-Premises management infrastructure, or complex integrations, making it fast and easy to replace your AV. Falcon Endpoint Protection Enterprise Unifies the technologies required to successfully stop breaches, including true next-gen antivirus and Endpoint detection and response (EDR), managed threat hunting, and threat intelligence automation, delivered via a single lightweight agent. Falcon Endpoint Protection Premium Take breach-stopping power to the next level with extended Endpoint visibility into accounts, assets, and applications usage. Falcon Complete Endpoint protection delivered as a service. The highest level of Endpoint security maturity is delivered immediately, without the burden of building and managing it yourself. | Businesses and governments rely on Thales to bring trust to the billions of digital interactions they have with people.
Our identity management and data protection technologies help banks exchange funds, people cross borders, energy become smarter and much more.
More than 30,000 organisations already rely on Thales solutions to verify the identities of people and things, grant access to digital services, analyse vast quantities of information and encrypt data.
In early 2019, we acquired the international security company, Gemalto and have combined it with our existing digital assets to create a new leader in digital security. Every organisation around the world is in the midst of a digital transformation and stands to benefit from our joint innovations. | |||
Key Customers | Adobe, Ameritas, Berkshire Bank, Shop Direct. | Siemens, Motorola, Rohde & Schwarz, Kodak, ZTE, Toyota, Bosch, Fujitsu, Kontron, ABB, B&R | Goldman Sachs, Credit Suisse, Rackspace, Telstra, ADP, Pokemon, Berkshire Bank, Sega | |||
Subsidiary | ||||||
Parent Company | ||||||
IoT Snapshot | ||||||
Technologies | Cybersecurity & Privacy | Cybersecurity & Privacy | Cybersecurity & PrivacyApplication Infrastructure & MiddlewareAutomation & Control | Cybersecurity & Privacy | Cybersecurity & PrivacyAnalytics & Modeling | Cybersecurity & PrivacyNetworks & Connectivity |
Industries | Healthcare & Hospitals | AutomotiveFinance & InsuranceHealthcare & HospitalsLife Sciences | AutomotiveFinance & InsuranceHealthcare & HospitalsRetail | Finance & InsuranceHealthcare & HospitalsRetailSecurity & Public Safety | Cities & MunicipalitiesEducationFinance & InsuranceHealthcare & HospitalsTransportation | Healthcare & HospitalsNational Security & DefenseUtilities |
Use Cases | Cybersecurity | Cybersecurity | Track & Trace of Assets | |||
Functions | Field Services | Human Resources | ||||
Services | Cloud Planning, Design & Implementation ServicesTraining | Cybersecurity ServicesCloud Planning, Design & Implementation Services | Cybersecurity Services | Cybersecurity Services | ||
Technology Stack | ||||||
Infrastructure as a Service (IaaS) | None | None | None | None | None | None |
Platform as a Service (PaaS) | None | None | None | None | None | None |
Application Infrastructure & Middleware | None | None | Minor | None | None | None |
Analytics & Modeling | None | None | None | None | Minor | None |
Functional Applications | None | None | None | None | None | None |
Cybersecurity & Privacy | Moderate | Moderate | Moderate | Moderate | Moderate | Moderate |
Networks & Connectivity | None | None | None | None | None | Moderate |
Processors & Edge Intelligence | None | None | None | None | None | None |
Sensors | None | None | None | None | None | None |
Automation & Control | None | None | Minor | None | None | None |
Robots | None | None | None | None | None | None |
Drones | None | None | None | None | None | None |
Wearables | None | None | None | None | None | None |
Actuators | None | None | None | None | None | None |
Other | None | None | None | None | None | None |
Similar Suppliers | ||||||
Similar Suppliers | ||||||
Partners | ||||||
Partners | VMware (DELL)VMware TanzuVirtustream (DELL) | IBMInfineonIntelOracleMicrosoftRockwell AutomationWind RiverCodesysDeutsche TelekomQNX Software SystemsTrumpfDell TechnologiesFraunhofer IOSB |
Overview | ||||||
Supplier Slogan | Perfection in Protection, Licensing and Security | We stop breaches. | ||||
HQ Location | United States | Germany | United States | United States | China | France |
Year Founded | 1982 | 1989 | 2001 | 2012 | 1995 | 1893 |
Company Type | Public | Private | Private | Private | Private | Public |
Stock Ticker | NYSE: DELL | CRWD | EPA:HO | |||
Revenue | $100m-1b | $10-100m | $10-100m | $10-100m | $10-100m | $1-10b |
Employees | 1,001 - 10,000 | 51 - 200 | 51 - 200 | 1,001 - 10,000 | 51 - 200 | 10,001 - 50,000 |
Website | Open website | Open website | Open website | Open website | Open website | Open website |
Company Description | RSA Security LLC, formerly RSA Security, Inc. and doing business as RSA, is an American computer and Network Security company. RSA was named after the initials of its co-founders, Ron Rivest, Adi Shamir and Len Adleman, after whom the RSA public key Cryptography algorithm was also named. Among its products include the RSA BSAFE Cryptography libraries and the SecurID Authentication token. RSA is known for allegedly incorporating backdoors developed by the NSA in its products. It also organizes the annual RSA Conference, an information security conference. Founded as an independent company in 1982, RSA Security, Inc. was acquired by EMC Corporation in 2006 for US$2.1 billion and operates as a division within EMC. RSA is based in Bedford, Massachusetts, with regional headquarters in Bracknell (UK) and Singapore, and numerous international offices. Year founded: 1982 Stock ticker: RSA | WIBU-SYSTEMS AG, a privately held company founded by Oliver Winzenried and Marcellus Buchheit in 1989, is an innovative security technology leader in the global software licensing market. In its mission to offer the most secure, unique, and highly versatile technology, Wibu-Systems has developed CodeMeter, a comprehensive, award-winning suite of hardware and software-based solutions for computers, embedded systems, mobile devices, PLCs, and microcontrollers that incorporates internationally patented processes dedicated to protecting the integrity of digital assets. Through its motto “Perfection in Protection, Licensing and Security”, Wibu-Systems safeguards the intellectual property of software publishers and Intelligent Device manufacturers against illicit and fraudulent use, reverse engineering and tampering attacks, sabotage and espionage actions, while generating new digital business models fully integrated with ERP, CRM, and e-commerce platforms. | Founded in 2001, Keyfactor empowers enterprises of all sizes to escape the exposure epidemic – when breaches, outages and failed audits from digital certificates and keys impact brand loyalty and the bottom line. Powered by an award-winning PKI as-a-service platform for certificate lifecycle automation and IoT device security, IT and infosec teams can easily manage digital certificates and keys. And product teams can build IoT devices with crypto-agility and at massive scale. | CrowdStrike is a cybersecurity technology firm pioneering next-generation Endpoint protection, delivered as a single integrated cloud-based solution. CrowdStrike Falcon platform stops breaches by detecting all attacks types, even malware-free intrusions, providing five-second visibility across all current and past Endpoint activity while reducing cost and complexity for customers. CrowdStrike Falcon platform is delivered via the security industry only 100% native cloud architecture, integrated with 24/7 managed hunting capabilities and in-house threat intelligence and incident response teams. CrowdStrike unique Threat Graph harnesses the cloud to instantly analyze data from billions of Endpoint events across a global crowdsourcing community, allowing detection and prevention of attacks based on patented behavioral pattern recognition technology. | Topsec Cloud Solutions is a major provider of managed email and web security solutions in the cloud. For almost two decades we have served a diverse range of customers in Government, Healthcare, Engineering, Information Technology and other industries. Anti-spam, Anti-virus, Email security, Email content filtering, Sandboxing, Email archiving, File sharing, and Domain management are among our services. In summary, we match our clients’ security demands and assist them in securing and managing their corporate information with no upfront costs. | Thales is a global technology leader in the Aerospace, Transportation and Defence & Security markets. In 2013, the company generated revenues of EUR14.2 billion with 65,000 employees in 56 countries. With its 25,000 engineers and researchers, Thales has a unique capability to design, develop and deploy equipment, systems and services that meet the most complex security requirements. Thales has an exceptional international footprint, with operations around the world working with customers and local partners. |
IoT Solutions | Keyfactor, formerly Certified Security Solutions (CSS), is a leading provider of secure digital Identity Management solutions that enables organizations to confirm authenticity, and ensure the right things are interacting in the right ways in our connected world. | Falcon Endpoint Protection Pro Market-leading NGAV proven to stop Malware with integrated threat intelligence and immediate response - with a single lightweight agent that operates without the need for constant signature updates, On-Premises management infrastructure, or complex integrations, making it fast and easy to replace your AV. Falcon Endpoint Protection Enterprise Unifies the technologies required to successfully stop breaches, including true next-gen antivirus and Endpoint detection and response (EDR), managed threat hunting, and threat intelligence automation, delivered via a single lightweight agent. Falcon Endpoint Protection Premium Take breach-stopping power to the next level with extended Endpoint visibility into accounts, assets, and applications usage. Falcon Complete Endpoint protection delivered as a service. The highest level of Endpoint security maturity is delivered immediately, without the burden of building and managing it yourself. | Businesses and governments rely on Thales to bring trust to the billions of digital interactions they have with people.
Our identity management and data protection technologies help banks exchange funds, people cross borders, energy become smarter and much more.
More than 30,000 organisations already rely on Thales solutions to verify the identities of people and things, grant access to digital services, analyse vast quantities of information and encrypt data.
In early 2019, we acquired the international security company, Gemalto and have combined it with our existing digital assets to create a new leader in digital security. Every organisation around the world is in the midst of a digital transformation and stands to benefit from our joint innovations. | |||
Key Customers | Adobe, Ameritas, Berkshire Bank, Shop Direct. | Siemens, Motorola, Rohde & Schwarz, Kodak, ZTE, Toyota, Bosch, Fujitsu, Kontron, ABB, B&R | Goldman Sachs, Credit Suisse, Rackspace, Telstra, ADP, Pokemon, Berkshire Bank, Sega | |||
Subsidiary | ||||||
Parent Company | ||||||
IoT Snapshot | ||||||
Technologies | Cybersecurity & Privacy | Cybersecurity & Privacy | Cybersecurity & PrivacyApplication Infrastructure & MiddlewareAutomation & Control | Cybersecurity & Privacy | Cybersecurity & PrivacyAnalytics & Modeling | Cybersecurity & PrivacyNetworks & Connectivity |
Industries | Healthcare & Hospitals | AutomotiveFinance & InsuranceHealthcare & HospitalsLife Sciences | AutomotiveFinance & InsuranceHealthcare & HospitalsRetail | Finance & InsuranceHealthcare & HospitalsRetailSecurity & Public Safety | Cities & MunicipalitiesEducationFinance & InsuranceHealthcare & HospitalsTransportation | Healthcare & HospitalsNational Security & DefenseUtilities |
Use Cases | Cybersecurity | Cybersecurity | Track & Trace of Assets | |||
Functions | Field Services | Human Resources | ||||
Services | Cloud Planning, Design & Implementation ServicesTraining | Cybersecurity ServicesCloud Planning, Design & Implementation Services | Cybersecurity Services | Cybersecurity Services | ||
Technology Stack | ||||||
Infrastructure as a Service (IaaS) | None | None | None | None | None | None |
Platform as a Service (PaaS) | None | None | None | None | None | None |
Application Infrastructure & Middleware | None | None | Minor | None | None | None |
Analytics & Modeling | None | None | None | None | Minor | None |
Functional Applications | None | None | None | None | None | None |
Cybersecurity & Privacy | Moderate | Moderate | Moderate | Moderate | Moderate | Moderate |
Networks & Connectivity | None | None | None | None | None | Moderate |
Processors & Edge Intelligence | None | None | None | None | None | None |
Sensors | None | None | None | None | None | None |
Automation & Control | None | None | Minor | None | None | None |
Robots | None | None | None | None | None | None |
Drones | None | None | None | None | None | None |
Wearables | None | None | None | None | None | None |
Actuators | None | None | None | None | None | None |
Other | None | None | None | None | None | None |
Similar Suppliers | ||||||
Similar Suppliers | ||||||
Partners | ||||||
Partners | VMware (DELL)VMware TanzuVirtustream (DELL) | IBMInfineonIntelOracleMicrosoftRockwell AutomationWind RiverCodesysDeutsche TelekomQNX Software SystemsTrumpfDell TechnologiesFraunhofer IOSB |