Partner Ecosystem
Connect I.T. continuously evaluates networking and security vendors, selecting partners based on their ability to deliver best-in-class solutions and service. We invest significant time researching emerging technologies that will impact our customers' operational effectiveness. Our research encompasses pre- and post-quantum cryptography, AI-based security, blockchain, software-defined solutions, containers, data-in-motion and data-at-rest security, IoT, and other cutting-edge technologies. If you don't see the solution you're looking for, contact us—it may already be part of our research portfolio.
A10 Networks (NYSE: ATEN) is a secure application services company, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in San Jose, Calif., and serves customers globally with offices worldwide.

Alkira has reinvented networking for the cloud era by delivering Cloud Area Networking, the first global unified network infrastructure with on-demand hybrid and multi-cloud connectivity, integrated network and security services, end-to-end visibility, controls and governance, all delivered as-a-service.

AppViewX’s PKIaaS combines the convenience of a customized PKI with our powerful certificate lifecycle automation capabilities, and allows you to consume the entire solution as a service. Setting up a secure, scalable, and compliant PKI has never been easier.

Enterprise grade networking and security solutions for on-prem or in the cloud.

Array Networks, the network functions platform company, develops purpose-built systems for hosting virtual networking and security functions with guaranteed performance. Proven at over 5000 worldwide customer deployments, Array is recognized by leading enterprises and service providers for next-generation technology that takes the guesswork out of NFV deployment and delivers agility at scale.
Host Array application delivery virtual appliances, or host virtual appliances from best-of-breed networking and security vendors; the choice is yours. With Array’s virtualized hardware environment and a growing ecosystem of platform partners, businesses can finally reconcile their desire for agility with their need for performance.

Open network enterprise suite, open packet brokers and AI network assistance

Cato is the world’s firs SASE platform. Cato’s cloud-native architecture converges SD-WAN, a global private backbone, a full network security stack, and seamless support for cloud resources and mobile devices.

Certes Networks is leading the Software-Defined Security revolution. The company’s award-winning CryptoFlow® Solutions enable enterprise applications to be securely extended to any user on any device in any network, Cloud or virtual environment.
Companies in 84 countries around the world rely on security solutions from Certes to protect access, accelerate application deployment, simplify network projects, reduce IT costs, contain breach threats, and shrink the enterprise attack surface.

Cisco (NASDAQ: CSCO) is the worldwide technology leader that has been making the Internet work since 1984. Our people, products, and partners help society securely connect and seize tomorrow’s digital opportunity today. Discover more at newsroom.cisco.com and follow us on Twitter at @Cisco.
Cisco, the Cisco logo, Cisco Systems and Cisco IOS are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company.
This document is Cisco Public Information. Availability Disclaimer: Many of the products and features described herein remain in varying stages of development and will be offered on a when-and-if-available basis. This products and features are subject to change at the sole discretion of Cisco, and Cisco will have no liability for delay in the delivery or failure to deliver any of the products or features set forth in this document.

Packet broker delivery, capture and analytics at line rate.

Cryptomathic is a global provider of secure server solutions to businesses across a wide range of industry sectors, including banking, government, technology manufacturing, cloud and mobile. With over 30 years’ experience, we provide systems for Authentication & Signing, EMV and Crypto & Key Management through best-of-breed security solutions and services.

Modernize you network with Dell Technologies Ethernet Switches, Edge Platforms and Network Operating Systems

Public and Private Root Trust, TLS, PKI and Trust Management Solutions

Prevent sophisticated social engineering attacks with user adaptive security awareness training, red team analysis, and adaptive controls.

Edgecore Networks provides a full range of managed switches to fulfill different deployment requirements, from small/medium business users, enterprises to carrier-level service providers, from simple web smart switches to Layer 2 and Layer 3 switches.
Different products come with different port combinations, as well as PoE options, to meet market requirements, with the emphasis on scalability and flexibility. Most importantly, managed switches all come with Edgecore Networks’ in-house developed EdgeCOSTMsoftware, with optional ECView Pro network management system.

Securing a World in Motion Since 1969 - Entrust establishes secure connections across the planet and even into outer space, enable reliable debit and credit card purchases with card printing and issuance technologies, protect international travel with border control solutions, create secure experiences on the internet with SSL technologies and safeguarded networks and devices with suites HSM and other authentication products.

FireMon has been at the forefront of the security management category, delivering first-ever functionality such as firewall behavior testing, workflow integration, traffic flow analysis and rule recertification.

Fortanix Self-Defending Key Management Service (SDKMS) is the world’s first cloud service secured with Intel® SGX. With SDKMS, you can securely generate, store, and use cryptographic keys and certificates, as well as secrets, such as passwords, API keys, tokens, or any blob of data. Your business-critical applications and containers can integrate with SDKMS using legacy cryptographic interfaces or using its native RESTful interface.

Futurex has been a trusted provider of hardened, enterprise-class data security solutions. More than 15,000 organizations worldwide have used our innovative hardware security modules, key management servers, and cloud HSM solutions to address mission-critical data encryption and key management needs.

Gigamon (NYSE: GIMO) provides active visibility into data-in-motion network traffic, enabling organizations to see more and secure more with stronger security and superior performance. Gigamon Visibility Platform and GigaSECURE®, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network, and application performance management solutions in enterprise, government, and service provider networks operate more efficiently and effectively.

NodeZero provides continuous autonomous penetration testing as a true SaaS offering. With NodeZero, autonomous penetration testing solution, cybersecurity teams can proactively find and fix attack vectors before attackers can exploit them.

As network and service operators and developers, we’ve spent our entire professional lives designing and running large-scale networks and CDNs. With decades of experience, we know the shortcomings of available tools. What we always wanted — but never found — was an infrastructure visibility solution that’s scalable, powerful, easy to use, and affordable. We started Kentik to create that solution.

LiveAction offers a range of powerful software and appliance products that automate the collection of critical network data for network forensics in security investigations and for network and application visibility and performance diagnostics.

Microsoft – Enterprise Software, Cloud, Email, and Security Solutions

NetBrain delivers actionable hybrid network-wide observability, automates troubleshooting, and enables safe change management to boost efficiency, reduce MTTR, and mitigate risk, enabling IT organizations to achieve operational excellence.

Palo Alto Networks – Next Generation Firewalls, SD-WAN, SOAR, Access Browser

Real-world, post-quantum hardware and software upgrades – modernizing the vital security systems and components of the world’s technology supply chain.

Cryptographic risk monitoring and management and a quantum-safe key delivery system.

Radware® (NASDAQ: RDWR), is a global leader of application delivery and cyber security solutions for virtual, cloud and software defined data centers. Its award-winning solutions portfolio delivers service level assurance for business-critical applications, while maximizing IT efficiency.
Radware’s solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down. For more information, please visit www.radware.com.
Radware encourages you to join our community and follow us on: Facebook, Google+, LinkedIn, RadwareBlog, SlideShare, Twitter, YouTube, Radware Connect app for iPhone® and our security center DDoSWarriors.com that provides a comprehensive analysis on DDoS attack tools, trends and threats.

RedShield is the world’s first and only shielding-as-a-service security platform featuring a programmable library of shields to dynamically and proactively protect your web applications. Through a combination of vulnerability matching intelligence and development services, the right shields for your application are deployed and all app-destined traffic is rerouted through the RedShield global shield network.
Shielding-as-a-service is a faster, fundamentally different approach to application security. With DDoS and syntactic vulnerability protection of most WAF/RASP solutions in place within minutes, existing library business logic flaw mitigation within hours and unique shields created within days, RedShield increases your application up-time and decreases time-to-market. No more endless regression cycles with no hope for launch in sight.

With runZero discover and manage all of your assets, including unknown subnets and unmanaged devices, to stay ahead of potential security risks and take a proactive approach to your security program.

Only Salt delivers the context you need to protect your APIs across build, deploy, and runtime phases. We combine complete coverage and an ML/AI-driven big data engine to provide that context – to show you all your APIs, stop attackers during the early stages of an attempted attack, and share insights to improve your API security posture.

Savvius offers a range of powerful software and appliance products that automate the collection of critical network data for network forensics in security investigations and for network and application visibility and performance diagnostics.
Savvius products are trusted by network and security professionals at over 6,000 companies in 60 countries around the world. Visit www.savvius.com for information about Savvius Omnipliance®, Savvius Omnipeek®, Savvius Vigil™, and Savvius Insight™, and to learn about Savvius technology and channel partners.

With Secure Code Warrior, development teams learn while they code to prevent security vulnerabilities before they happen with our all-in-one secure coding training platform. Developer can upgrade their skills through coding challenges and validation labs. Custom pathways allow you to tailor training to your software development lifecycle.

High assurance Public Key Infrastructure for high value assets, identities and software. Protected in hardened concrete bunkers with state-of-the-art biometrics defended by armed guards 24x7 behind a man trap on tamper-proof hardware security modules inside a locked safe.

Shardsecure - Microshard™ technology eliminates data sensitivity, providing security, privacy and compliance beyond encryption

SlashNext is the authority on Phishing - SlashNext AI Phishing Defense Technology offers total phishing protection from corporate credential theft, SMishing, BEC/financial fraud, supply chain attacks, ransomware, and data exfiltration across all communication channels.

Thales e-Security + Vormetric have combined to form the leading global data protection and digital trust management company. Together, we enable companies to compete confidently and quickly by securing data at-rest, in-motion, and in-use to effectively deliver secure and compliant solutions with the highest levels of management, speed and trust across physical, virtual and cloud environments.
By deploying our leading solutions and services, targeted attacks are thwarted, and sensitive data risk exposure is reduced with the least business disruption and at the lowest life cycle cost. Thales e-Security and Vormetric are part of Thales Group.

Tripwire is a leading provider of security, compliance and IT operations solutions for enterprises, industrial organizations, service providers and government agencies. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business context; together these solutions integrate and automate security and IT operations.
Tripwire’s portfolio of enterprise-class solutions includes configuration and policy management, file integrity monitoring, vulnerability management, log management, and reporting and analytics. Learn more at tripwire.com, get security news, trends and insights at tripwire.com/blog or follow us on Twitter @TripwireInc.

Uila’s application-aware infrastructure performance monitoring gives IT infrastructure and operations teams x-ray vision, dependency mapping and an intuitive dashboard with 1-click root cause analysis providing instant full stack visibility into hotspots and bottlenecks. Uila cuts time to resolution from days to minutes for customers like First Tech Federal Credit Union and Lake County EMS. The company was founded in 2013 by Chia-Chee Kuan, Dean Au, and Miles Wu, with offices in Santa Clara, CA and Taiwan.

For over 30 years now, Utimaco products have been protecting people around the world against terrorism and organized crime and have secured private and sensitive data against theft or abuse. For this Utimaco has been developing hardware-based, high-security appliances (Hardware Security Modules) and compliance solutions for telecommunication provider regulations (lawful interception and data retention).

Varonis is your all-in-one SaaS platform to automatically find critical data, remediate exposure, and stop threats in the cloud and on-premises.

WireX delivers comprehensive security intelligence presented in a human-readable format, saving you valuable time and effort when doing the triage and responding to security incidents. Utilizing our Contextual Capture™ technology, we provide immediate context into alerts, delivering in-depth network visibility for months on end to the world’s largest organizations.

Zscaler – Cyberthreat Protection, Data Protection, Zero Trust Networking, and Risk Management
