Connect I.T. constantly evaluates vendors in the networking and security industry. We select partners based upon their ability to deliver the best-in-class solutions and service. We invest a significant amount of time in emerging technology areas that will ultimately affect our customers’ ability to operate effectively. Examples include technologies such as Pre-Post Quantum Cryptography, AI based security, Blockchain, Software Defined Solutions, Containers, Securing Data in Process, IoT and others. If you don't see what you're looking for, give us a call as it may be in our research repository.
802 Secure’s AirShield is an autonomous and non-intrusive wireless monitoring and protection solution that provides immediate visibility and protection across the cyber hysical space. AirShield provides scans across multiple wireless protocols and frequencies to detect wireless devices and networks and protect against misconfigurations, Shadow IoT, unknown and unmanaged IoT devices, and previously undetected wireless attacks.
A10 Networks (NYSE: ATEN) is a secure application services company, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in San Jose, Calif., and serves customers globally with offices worldwide.
Array Networks, the network functions platform company, develops purpose-built systems for hosting virtual networking and security functions with guaranteed performance. Proven at over 5000 worldwide customer deployments, Array is recognized by leading enterprises and service providers for next-generation technology that takes the guesswork out of NFV deployment and delivers agility at scale.
Host Array application delivery virtual appliances, or host virtual appliances from best-of-breed networking and security vendors; the choice is yours. With Array’s virtualized hardware environment and a growing ecosystem of platform partners, businesses can finally reconcile their desire for agility with their need for performance.
Big Switch Networks makes intelligent SDN control software and combines it with industry standard switches to deliver next-generation data center networking fabrics. Big Switch Networks has two data center networking solutions: Big Cloud Fabric, a data center switching fabric for OpenStack clouds or VMware virtualization environments, and Big Monitoring Fabric, a network packet broker that enables pervasive security and security, monitoring data center traffic for inline or out-of-band deployments.
High-performance attack protection for Linux production environments – whether containerized, virtualized, or bare-metal – on-premise or in the cloud. Capsule8 liberates SecOps from managing a high volume of manual tasks, while being safe for even the busiest workloads, on the busiest networks.
Cequence Security is transforming application security with an award-winning AI-powered software platform that protects web, mobile and API-based applications against automated bot attacks and targeted vulnerability exploits – and supports today’s cloud-native, container-based application architectures.
Certes Networks is leading the Software-Defined Security revolution. The company’s award-winning CryptoFlow® Solutions enable enterprise applications to be securely extended to any user on any device in any network, Cloud or virtual environment.
Companies in 84 countries around the world rely on security solutions from Certes to protect access, accelerate application deployment, simplify network projects, reduce IT costs, contain breach threats, and shrink the enterprise attack surface.
Cisco (NASDAQ: CSCO) is the worldwide technology leader that has been making the Internet work since 1984. Our people, products, and partners help society securely connect and seize tomorrow’s digital opportunity today. Discover more at newsroom.cisco.com and follow us on Twitter at @Cisco.
Cisco, the Cisco logo, Cisco Systems and Cisco IOS are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company.
This document is Cisco Public Information. Availability Disclaimer: Many of the products and features described herein remain in varying stages of development and will be offered on a when-and-if-available basis. This products and features are subject to change at the sole discretion of Cisco, and Cisco will have no liability for delay in the delivery or failure to deliver any of the products or features set forth in this document.
Cryptomathic is a global provider of secure server solutions to businesses across a wide range of industry sectors, including banking, government, technology manufacturing, cloud and mobile. With over 30 years’ experience, we provide systems for Authentication & Signing, EMV and Crypto & Key Management through best-of-breed security solutions and services.
We are rewriting the rules on how organizations protect themselves against rapidly evolving adversaries. Today’s threat environment requires understanding the adversary and attack landscape. Since our start in 2012, our technology has stopped the world’s most advanced cyber attacks. And we harbor even greater ambitions.
We instantly tell companies if they are under attack, the attack’s impact and how to immediately stop the threat. Our platform finds a single component of an attack and connects it to other pieces of information to reveal an entire campaign and shut it down. Even the most talented analysts would struggle with detecting a threat and quickly building a complete attack story. We simplify this process.
Deep Instinct’s deep learning endpoint security solution provides full protection based on multiple layers, including a prediction & prevention first approach, followed by detection & response, against known and unknown cyber threats.
Edgecore Networks provides a full range of managed switches to fulfill different deployment requirements, from small/medium business users, enterprises to carrier-level service providers, from simple web smart switches to Layer 2 and Layer 3 switches.
Different products come with different port combinations, as well as PoE options, to meet market requirements, with the emphasis on scalability and flexibility. Most importantly, managed switches all come with Edgecore Networks’ in-house developed EdgeCOSTMsoftware, with optional ECView Pro network management system.
ExtraHop makes data-driven IT a reality. By applying real-time analytics and machine learning to all digital interactions, ExtraHop delivers instant and unbiased insights. IT leaders turn to ExtraHop first to help them make faster, better-informed decisions that improve performance, security, and digital experience.
Fortanix Self-Defending Key Management Service (SDKMS) is the world’s first cloud service secured with Intel® SGX. With SDKMS, you can securely generate, store, and use cryptographic keys and certificates, as well as secrets, such as passwords, API keys, tokens, or any blob of data. Your business-critical applications and containers can integrate with SDKMS using legacy cryptographic interfaces or using its native RESTful interface.
Fortinet delivers high-performance network security solutions that protect your network, users, and data from continually evolving threats. Our broad portfolio of top-rated solutions and centralized management enables security consolidation and delivers a simplified, end-to-end security infrastructure.
Garland Technology network TAPs provide 100% network visibility, while providing anytime network access. A foundation of visibility starts with network TAPs that feed your monitoring and security tools all the data – every bit, byte and packet they need to successfully secure and monitor your network.
Protecting your network with a stack of security and monitoring tools is a significant investment, however they are only as good as the data they receive. Dropped packets and over-subscribed ports leave your network blind to cyber threats. A Garland Technology network TAP will ensure your tools receive all the data for optimum functionality while extending the lifecycle of your network tools.
Gigamon (NYSE: GIMO) provides active visibility into data-in-motion network traffic, enabling organizations to see more and secure more with stronger security and superior performance. Gigamon Visibility Platform and GigaSECURE®, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network, and application performance management solutions in enterprise, government, and service provider networks operate more efficiently and effectively.
IRONSCALES has pioneered an advanced anti-phishing threat protection platform combining human and machine intelligence to automatically analyze, detect and remove malicious emails before and after they land in the inbox using a multi-layered and automated approach.
As network and service operators and developers, we’ve spent our entire professional lives designing and running large-scale networks and CDNs. With decades of experience, we know the shortcomings of available tools. What we always wanted — but never found — was an infrastructure visibility solution that’s scalable, powerful, easy to use, and affordable. We started Kentik to create that solution.
Pica8 is breaking barriers to truly customizable application performance through open networking. With its Linux-based PicOS™ network operating system, Pica8 enables custom traffic engineering and empowers white box and brite box switches to integrate easily with existing Layer 2/Layer 3 networks and deliver unlimited SDN scalability through OpenFlow.
Since 2009, Pica8 has pioneered new open networking technologies such as Linux-based networking, CrossFlow networking, vASIC® and Table Type Patterns. Through ongoing innovation, Pica8 is a trusted brand that unlocks the potential of made-to-order networking, offering a mainstream alternative to legacy proprietary systems. For more information, visit www.pica8.com or follow us on Twitter @pica8.
Radware® (NASDAQ: RDWR), is a global leader of application delivery and cyber security solutions for virtual, cloud and software defined data centers. Its award-winning solutions portfolio delivers service level assurance for business-critical applications, while maximizing IT efficiency.
Radware’s solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down. For more information, please visit www.radware.com.
Radware encourages you to join our community and follow us on: Facebook, Google+, LinkedIn, RadwareBlog, SlideShare, Twitter, YouTube, Radware Connect app for iPhone® and our security center DDoSWarriors.com that provides a comprehensive analysis on DDoS attack tools, trends and threats.
RedShield is the world’s first and only shielding-as-a-service security platform featuring a programmable library of shields to dynamically and proactively protect your web applications. Through a combination of vulnerability matching intelligence and development services, the right shields for your application are deployed and all app-destined traffic is rerouted through the RedShield global shield network.
Shielding-as-a-service is a faster, fundamentally different approach to application security. With DDoS and syntactic vulnerability protection of most WAF/RASP solutions in place within minutes, existing library business logic flaw mitigation within hours and unique shields created within days, RedShield increases your application up-time and decreases time-to-market. No more endless regression cycles with no hope for launch in sight.
Savvius offers a range of powerful software and appliance products that automate the collection of critical network data for network forensics in security investigations and for network and application visibility and performance diagnostics.
Savvius products are trusted by network and security professionals at over 6,000 companies in 60 countries around the world. Visit www.savvius.com for information about Savvius Omnipliance®, Savvius Omnipeek®, Savvius Vigil™, and Savvius Insight™, and to learn about Savvius technology and channel partners.
Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses and governments seeking the freedom to unlock the opportunities technology brings – anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company, operating one of the largest global data-intelligence networks, has provided leading security, backup and availability solutions for where vital information is stored, accessed and shared.
The company’s more than 19,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2015, it recorded revenues of $6.5 billion.
Thales e-Security + Vormetric have combined to form the leading global data protection and digital trust management company. Together, we enable companies to compete confidently and quickly by securing data at-rest, in-motion, and in-use to effectively deliver secure and compliant solutions with the highest levels of management, speed and trust across physical, virtual and cloud environments.
By deploying our leading solutions and services, targeted attacks are thwarted, and sensitive data risk exposure is reduced with the least business disruption and at the lowest life cycle cost. Thales e-Security and Vormetric are part of Thales Group.
Tripwire is a leading provider of security, compliance and IT operations solutions for enterprises, industrial organizations, service providers and government agencies. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business context; together these solutions integrate and automate security and IT operations.
Tripwire’s portfolio of enterprise-class solutions includes configuration and policy management, file integrity monitoring, vulnerability management, log management, and reporting and analytics. Learn more at tripwire.com, get security news, trends and insights at tripwire.com/blog or follow us on Twitter @TripwireInc.
Uila’s application-aware infrastructure performance monitoring gives IT infrastructure and operations teams x-ray vision, dependency mapping and an intuitive dashboard with 1-click root cause analysis providing instant full stack visibility into hotspots and bottlenecks. Uila cuts time to resolution from days to minutes for customers like First Tech Federal Credit Union and Lake County EMS. The company was founded in 2013 by Chia-Chee Kuan, Dean Au, and Miles Wu, with offices in Santa Clara, CA and Taiwan.
Ultra Electronics is an internationally successful defence, security, transport and energy company with a long, consistent track record of development and growth. The Group manages a portfolio of specialist capabilities generating innovative solutions to customer needs. Ultra applies electronic and software technologies in demanding and critical environments ranging from military applications, through safety-critical devices in aircraft, to nuclear controls and sensor measurement.
These capabilities have seen the Group’s highly differentiated products contributing to a large number of platforms and programmes. Ultra has world-leading positions in many of its specialist capabilities and, as an independent, non-threatening partner, is able to support all of the main prime contractors in its sectors. As a result of such positioning, Ultra’s systems, equipment or services are often mission or safety-critical to the successful operation of the platform to which they contribute. In turn, this mission-criticality secures Ultra’s positions for the long term which underpins the superior financial performance of the Group.
Ultra offers support to its customers through the design, delivery and support phases of a programme. Ultra businesses have a high degree of operational autonomy where the local management teams are empowered to devise and implement competitive strategies that reflect their expertise in their specific niches.
The Group has a small head office and executive team that provide to the individual businesses the same agile, responsive support that they provide to customers as well as formulating Ultra’s overarching, corporate strategy.Across the Group’s three divisions, Ultra operates in the following eight market segments:
For over 30 years now, Utimaco products have been protecting people around the world against terrorism and organized crime and have secured private and sensitive data against theft or abuse. For this Utimaco has been developing hardware-based, high-security appliances (Hardware Security Modules) and compliance solutions for telecommunication provider regulations (lawful interception and data retention).
Venafi is the cybersecurity market leader in machine identity protection, securing the cryptographic keys and digital certificates on which every business and government depends to deliver safe machine-to-machine communication. Organizations use Venafi key and certificate security to protect communications, commerce, critical systems and data, and mobile and user access.
VMware, a global leader in cloud infrastructure and digital workspace technology, accelerates digital transformation by enabling unprecedented freedom and flexibility in how our customers build and evolve IT environments.
With VMware solutions, organizations are improving business agility by modernizing data centers and integrating public clouds, driving innovation with modern apps, creating exceptional experiences by empowering the digital workspace, and safeguarding customer trust by transforming security. VMware is a member of the Dell Technologies family of businesses.