Suppliers
    ANDOR
  • (275)
    • (103)
    • (74)
    • (73)
    • (73)
    • (50)
    • (48)
    • (46)
    • (43)
    • (21)
    • (12)
    • View all
  • (124)
    • (59)
    • (52)
    • (41)
    • (36)
    • (7)
    • (2)
    • View all
  • (116)
    • (61)
    • (44)
    • (42)
    • (30)
    • (22)
    • (17)
    • (14)
    • (12)
    • (10)
    • (8)
    • (8)
    • (7)
    • (5)
    • (2)
    • View all
  • (94)
    • (34)
    • (30)
    • (22)
    • (22)
    • (21)
    • (19)
    • (16)
    • (15)
    • (15)
    • (11)
    • (10)
    • (9)
    • (6)
    • (4)
    • (3)
    • (3)
    • (3)
    • (2)
    • (2)
    • (1)
    • (1)
    • View all
  • (93)
    • (38)
    • (32)
    • (27)
    • (27)
    • (17)
    • (17)
    • (11)
    • (1)
    • View all
  • View all 15 Technologies
    ANDOR
  • (103)
  • (69)
  • (64)
  • (60)
  • (58)
  • (52)
  • (49)
  • (48)
  • (44)
  • (37)
  • (37)
  • (35)
  • (33)
  • (33)
  • (30)
  • (28)
  • (25)
  • (21)
  • (19)
  • (19)
  • (19)
  • (19)
  • (18)
  • (18)
  • (18)
  • (17)
  • (15)
  • (14)
  • (12)
  • (10)
  • (9)
  • (8)
  • (7)
  • (6)
  • (5)
  • (5)
  • (5)
  • (4)
  • (3)
  • (2)
  • (2)
  • (2)
  • View all 42 Industries
    ANDOR
  • (47)
  • (46)
  • (34)
  • (31)
  • (30)
  • (26)
  • (25)
  • (25)
  • (25)
  • (20)
  • (14)
  • (12)
  • (8)
  • View all 13 Functional Areas
    ANDOR
  • (59)
  • (32)
  • (28)
  • (26)
  • (25)
  • (19)
  • (19)
  • (18)
  • (15)
  • (15)
  • (15)
  • (14)
  • (13)
  • (13)
  • (12)
  • (12)
  • (12)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (10)
  • (10)
  • (10)
  • (10)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 119 Use Cases
    ANDOR
  • (74)
  • (67)
  • (47)
  • (41)
  • (40)
  • (32)
  • (21)
  • (20)
  • (1)
  • View all 9 Services
  • (160)
  • (17)
  • (13)
  • (13)
  • (12)
  • (7)
  • (7)
  • (5)
  • (5)
  • (4)
  • (4)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 33 HQ Countries
  • (91)
  • (65)
  • (47)
  • (35)
  • (32)
  • View all 5 Revenue
Connect?
Please feel encouraged to schedule a call with us:
Schedule a Call
Or directly send us an email:
275 suppliers
Supplier missing? Just let us know via Add New Supplier.
275 Suppliers Selected
USD 762.50
Buy This List
Compare
Sort by:
Fusion Connect Logo
Fusion Connect
Autodesk Fusion Connect is an enterprise Internet of Things (IoT) cloud service that helps manufacturers to connect, analyze, and manage their products. It virtualizes machines, links them with reporting devices, and through analytics unlocks the data trapped inside—utilizing the unlimited computing power of a Cloud Native architecture. With smart, connected machines, manufacturers can offer higher service levels, reduce asset downtime, and lower maintenance and material costs.
Download PDF
Imperva Logo
Imperva
Imperva is a cybersecurity leader with a mission to protect data and all paths to it. We protect the data of over 6,000 global customers from cyber attacks through all stages of their Digital Transformation. Our products are informed by the Imperva Research Lab, a global threat intelligence community, that feeds the latest security and compliance expertise into our solutions.
Download PDF
Keysight Logo
Keysight
Keysight Technologies Inc. is the world's leading electronic measurement company, transforming today's measurement experience through innovations in wireless, modular, and software solutions. With its HP and Agilent legacy, Keysight delivers solutions in wireless communications, aerospace and defense and semiconductor markets with world-class platforms, software and consistent measurement science. The company's over 9,500 employees serve customers in more than 100 countries.
Download PDF
Raytheon Technologies Logo
Raytheon Technologies
Raytheon Technologies (NYSE: RTX) is an aerospace and defense company that provides advanced systems and services for commercial, military and government customers worldwide. The company was formed in 2020 through the combination of Raytheon Company and the United Technologies Corporation aerospace businesses, and is headquartered in Waltham, Massachusetts.
Download PDF
Synaptics Logo
Synaptics
Synaptics ignited the human interface revolution. Their touch, display and Biometrics products are built on the company's storied research and development, extensive intellectual property and global partnerships. With solutions designed to optimize the user experiences in the mobile, PC and automotive industries, Synaptics combines ease of use, functionality and aesthetics to enable products that help make users' digital lives more productive, secure and enjoyable.
Download PDF
Zscaler Logo
Zscaler
Zscaler is revolutionizing internet security with the industry’s first Security as a Service platform. As the most innovative firm in the $35 billion security market, Zscaler is used by more than 5,000 leading organizations, including 50 of the Fortune 500. Zscaler ensures that more than 13 million users worldwide are protected against cyber attacks and data breaches while staying fully compliant with corporate and regulatory policies.
Download PDF
Ayla Networks Logo
Ayla Networks
Ayla Networks provides the industry’s first Agile IoT Platform, accelerating development, support, and ongoing enhancements of connected products for the Internet of Things (IoT). Ayla’s software fabric runs across devices, cloud, and apps to create secure connectivity, data analytics, and feature-rich customer experiences. Offered as a platform-as-a-service (PaaS), Ayla’s flexibility and modularity enable rapid changes to practically any type of device, cloud, and app environment. Headquartered in Sunnyvale, California, the company has partnered with major hardware, cloud, and application vendors leading the new era of the Internet of Things.Year founded: 2010
Download PDF
Baidu Logo
Baidu
Baidu is a Chinese website and search engine that enables individuals to obtain information and find what they need and is one of the largest Internet companies in the world.Baidu offers 57 kinds of functional search and community services including Baidu Baike (an online, collaboratively built encyclopedia) and a searchable, keyword-based discussion forum.Its products include Baidu Webpage, Baidu Video, Baidu Map, hao123.com, BaiduPedia, Baidu Input, Baidu Toolbar, TTPlayer, Iqiyi, and Sky Software.
Download PDF
CloudLock (Cisco) Logo
CloudLock (Cisco)
CloudLock was launched in 2011 with one simple goal in mind: to transform cloud security into a business enabler. From that initial goal, they have built out a unified security fabric that helps organizations protect their sensitive data in Public Cloud applications such as Google Apps, Salesforce, Dropbox, Box, ServiceNow, Office 365, Third-party connected and other apps.
Download PDF
CyberGRX Logo
CyberGRX
CyberGRX provides the most comprehensive third-party cyber risk management platform to cost-effectively identify, assess, mitigate and monitor an enterprise's risk exposure across its entire partner ecosystem. Through automation and advanced analytics, the CyberGRX solution enables enterprises to collaboratively mitigate threats presented from their increasing interdependency on vendors, partners and customers. CyberGRX is based in Denver, CO. For more information, visit www.cybergrx.com or follow @CyberGRX on Twitter.
Download PDF
Entrust Logo
Entrust
Entrust Corp., formerly Entrust Datacard,[2] provides financial institutions, national governments, corporate enterprises and other organizations with technologies to establish trusted identities and conduct highly secure transactions.
Download PDF
FireEye Logo
FireEye
FireEye is an intelligence-led security company that protects customers with innovative technology and expertise from the front lines.
Download PDF
Infoblox Logo
Infoblox
Infoblox helps customers control their networks. Our solutions help businesses automate complex network control functions to reduce costs, increase security and maximize uptime.Our technology enables automatic discovery, real-time configuration and change management and compliance for network infrastructure, as well as critical network control functions such as DNS, DHCP and IP Address Management (IPAM) for applications and Endpoint devices. Leveraging our patented Grid™ technology, Infoblox delivers higher availability, and an authoritative network database for real-time and historical reporting. As the market leader in Automated Network Control, Infoblox provides services and solutions to over 6,700 enterprises and service providers in more than 25 countries. Our integrated hardware and software solutions help businesses control data flow on their networks by making them more automated, more available and more secure; giving customers the ability to see what's connected to the network, configure and change what's there, and prevent Malware from spreading across the enterprise.
Download PDF
Juniper Networks Logo
Juniper Networks
Juniper Networks is leading the revolution in networking, making it one of the most exciting technology companies in Silicon Valley today. Since being founded by Pradeep Sindhu, Dennis Ferguson, and Bjorn Liencres nearly 20 years ago, Juniper’s sole mission has been to create innovative products and solutions that meet the growing demands of the connected world.
Download PDF
Keyfactor Logo
Keyfactor
Founded in 2001, Keyfactor empowers enterprises of all sizes to escape the exposure epidemic – when breaches, outages and failed audits from digital certificates and keys impact brand loyalty and the bottom line. Powered by an award-winning PKI as-a-service platform for certificate lifecycle automation and IoT device security, IT and infosec teams can easily manage digital certificates and keys. And product teams can build IoT devices with crypto-agility and at massive scale.
Download PDF
OpenDNS (Cisco) Logo
OpenDNS (Cisco)
OpenDNS has never been afraid to do things differently, and that includes their approach to security. The traditional collect and react model cannot keep up with today’s rapidly evolving threats and ingenious attackers. They have developed a new strategy. Utilizing their global network, which sees 2% of the world’s Internet requests, they have engineered a predictive security solution that anticipates and stops malicious activity before it threatens your network. While the rise of the roaming workforce has eroded the traditional network perimeter, Umbrella by OpenDNS has you covered. It works anywhere, across any port, protocol, or app – and because Umbrella is delivered via the cloud, it is lightning-fast and easily scalable.
Download PDF
Palo Alto Networks Logo
Palo Alto Networks
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. The mission is to be the cybersecurity partner of choice, protecting the digital way of life. They help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in Artificial Intelligence, analytics, automation, and Orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, they are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Their vision is a world where each day is safer and more secure than the one before.
Download PDF
PixelPlex Logo
PixelPlex
PixelPlex is a seasoned IoT development company distributing enhanced business workflow in a data-intensive IoT environment.Founded in 2007, PixelPlex has delivered multiple projects in industrial IoT, personal security & wellness, smart IoT in retail & supply chains, IoT for connected home appliances and more.Our experienced IoT developers are ready to fulfill smart solutions for your business today using strong expertise in diverse IoT technology stack.
Download PDF
Rapid7 Logo
Rapid7
Organizations around the globe rely on Rapid7 technology, services, and research to securely advance. The visibility, analytics, and automation delivered through our Insight cloud simplifies the complex and helps security teams reduce vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate routine tasks.
Download PDF
SevOne Logo
SevOne
SevOne provides the leading digital infrastructure management platform for companies delivering on the "promise of now" for today’s connected, mobile world. Many of the world’s largest enterprises and service providers rely on the SevOne Cluster? technology to monitor, analyze, and optimize their massive, dynamic, and infinitely complex digital infrastructure -- including components such as network, compute, storage, power and cooling. By enabling companies to harness the power of their digital infrastructure, SevOne provides real-time insights for any scale environment.
Download PDF
Softeq Logo
Softeq
Softeq Development Corporation was founded in 1997 in Houston, TX, as a full-stack software development services provider. Over the years, we shifted our focus from mobile and web application development to niche solutions — particularly, Machine Learning, immersive technologies and software and hardware for the Internet of Things.
Download PDF
TÜV Informationstechnik GmbH Logo
TÜV Informationstechnik GmbH
TÜV Informationstechnik (TÜViT) is 100 percent about IT security. It is part of our DNA, and has been since 1995. At TÜViT, IT security is not a trend and it is not hype: it is embedded in virtually everything we do and all of our 120 employees have signed up for. Our experience and skills are totally dedicated to security in information technology. Over 50 per cent of the DAX 30 and many international companies already benefit from TÜViT-tested security.Independence... is our credo. The TÜViT experts are not subject to any conflicting goals, as they have no obligations towards product suppliers, system integrators, shareholders, interest groups or government agencies.In addition, numerous accreditations as well as certificates of national and international organisations prove our independenceTÜViT continues to develop the best available technology in numerous research projects and (standardization) committees.What applies to cars, machines, plants or buildings is also offered by TÜViT as part of the TÜV NORD GROUP for your IT: for hardware, application systems, infrastructure, products, processes or software. The TÜV seal and the certificates indicate to your clients that they can rely on the products and services. And if you have to comply with certain standards and procedures for evaluation authorities, TÜViT shows you how you can best achieve this. TÜViT identifies risks well before they cause any harm, and joins you in guiding your business to success – you can rely on it.At the same time, we protect your most valuable asset, which is becoming more important all the time in the course of digitization: your data. New digital business ideas are based on data: With TÜViT, you have a reliable and experienced partner, which supports you not only with all your data, information and IT security issues, but also with Data Privacy.
Download PDF
Aruba Networks (Hewlett Packard Enterprise (HPE)) Logo
Aruba Networks (Hewlett Packard Enterprise (HPE))
Aruba, a Hewlett Packard Enterprise company, is a leading provider of next-generation network access solutions for the mobile enterprise. The company designs and delivers Mobility-Defined Networks that empower IT departments and GenMobile, a new generation of tech-savvy users who rely on their mobile devices for every aspect of work and personal communication. To create a mobility experience that GenMobile and IT can rely upon, Aruba Mobility-Defined Networks automate infrastructure-wide performance optimization and trigger security actions that used to require manual IT intervention. The results are dramatically improved productivity and lower operational costs.
Download PDF
BAE Systems Logo
BAE Systems
BAE Systems Applied Intelligence helps nations, governments and businesses around the world defend themselves against cyber crime, reduce their risk in the connected world, comply with regulation, and transform their operations.
Download PDF
Bastille Networks Logo
Bastille Networks
Bastille is revolutionizing the way Enterprises approach security. As new threats emerge from the Internet of Things, Bastille is the only solution offering full spectrum scanning of the entire corporate airspace, delivering an unprecedented view of wireless risks before they have a chance to impact networks, people or assets. This visibility, combined with Machine Learning and behavioral analytics, provides a holistic view of wireless environments, complimenting Wi-Fi and traditional security architectures.
Download PDF
Claroty Logo
Claroty
Claroty is a cybersecurity software company focused on protecting industrial control networks (ICS - A.K.A OT or Operational Technology)Claroty's mission is to protect industrial control networks from cyber-attacks; ensuring safe and continuous operation of the world most critical infrastructures. C
Download PDF
Cloudera Logo
Cloudera
Cloudera delivers an Enterprise Data Cloud for any data, anywhere, from the Edge to AI.Cloudera was founded in 2008 by some of the brightest minds at Silicon Valley’s leading companies, including Google (Christophe Bisciglia), Yahoo! (Amr Awadallah), Oracle (Mike Olson), and Facebook (Jeff Hammerbacher). Doug Cutting, co-creator of Hadoop, joined the company in 2009 as Chief Architect and remains in that role. Today, Cloudera has more than 1,600 employees. They have offices in 24 countries around the globe, with their headquarters in Palo Alto, California.
Download PDF
CrowdStrike Logo
CrowdStrike
CrowdStrike is a cybersecurity technology firm pioneering next-generation Endpoint protection, delivered as a single integrated cloud-based solution. CrowdStrike Falcon platform stops breaches by detecting all attacks types, even malware-free intrusions, providing five-second visibility across all current and past Endpoint activity while reducing cost and complexity for customers. CrowdStrike Falcon platform is delivered via the security industry only 100% native cloud architecture, integrated with 24/7 managed hunting capabilities and in-house threat intelligence and incident response teams. CrowdStrike unique Threat Graph harnesses the cloud to instantly analyze data from billions of Endpoint events across a global crowdsourcing community, allowing detection and prevention of attacks based on patented behavioral pattern recognition technology.
Download PDF
Cybera Logo
Cybera
Cybera Inc. is a provider of network and application security services, including Cybera ONE, which is the industry leading secure application platform (SAP). The Cybera One platform securely hosts applications both in Cybera's cloud and at the customer premise. With Cybera's SCA line of plug and play secure server appliances, enterprises are able to quickly and easily deploy remote applications on a single platform that also hosts all of their Network Security and third party embedded applications. The Cybera ONE solution protects many of the world's best known brands at individual business locations to operations spanning tens of thousands of locations. Cybera ONE is in use across a variety of industries including retail, restaurant/hospitality, healthcare, financial services, and manufacturing. For more information about Cybera, please visit www.cybera.net.
Download PDF
CyberArk Logo
CyberArk
CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads, and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. For over a decade CyberArk has led the market in securing enterprises against cyber attacks that take cover behind insider privileges and attack critical enterprise assets. Today, only CyberArk is delivering a new category of targeted security solutions that help leaders stop reacting to cyber threats and get ahead of them, preventing attack escalation before irreparable business harm is done. At a time when auditors and regulators are recognizing that privileged accounts are the fast track for cyber attacks and demanding stronger protection, CyberArk’s security solutions master high-stakes compliance and audit requirements while arming businesses to protect what matters most. With offices and authorized partners worldwide, CyberArk is a vital security partner to more than 6,770 global businesses, including More than 50% of the Fortune 500 More than 35% of the Global 2000 CyberArk has offices in the U.S, Israel, U.K., Singapore, Australia, France, Germany, Italy, Japan, Netherlands, and Turkey.
Download PDF
test test