A10 NetworksA10 Networks
A10 Networks (NYSE: ATEN) is a secure application services company, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in San Jose, Calif., and serves customers globally with offices worldwide.
Array NetworksArray Networks
Array Networks, the network functions platform company, develops purpose-built systems for hosting virtual networking and security functions with guaranteed performance.Proven at over 5000 worldwide customer deployments, Array is recognized by leading enterprises and service providers for next-generation technology that takes the guesswork out of NFV deployment and delivers agility at scale.Host Array application delivery virtual appliances, or host virtual appliances from best-of-breed networking and security vendors; the choice is yours. With Array’s virtualized hardware environment and a growing ecosystem of platform partners, businesses can finally reconcile their desire for agility with their need for performance.
Certes NetworksCertes Networks
Certes Networks is leading the Software-Defined Security revolution. The company’s award-winning CryptoFlow® Solutions enable enterprise applications to be securely extended to any user on any device in any network, Cloud or virtual environment. Companies in 84 countries around the world rely on security solutions from Certes to protect access, accelerate application deployment, simplify network projects, reduce IT costs, contain breach threats, and shrink the enterprise attack surface.
Cisco (NASDAQ: CSCO) is the worldwide technology leader that has been making the Internet work since 1984. Our people, products, and partners help society securely connect and seize tomorrow’s digital opportunity today. Discover more at newsroom.cisco.com and follow us on Twitter at @Cisco.
Cisco, the Cisco logo, Cisco Systems and Cisco IOS are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. This document is Cisco Public Information.
Availability Disclaimer: Many of the products and features described herein remain in varying stages of development and will be offered on a when-and-if-available basis. This products and features are subject to change at the sole discretion of Cisco, and Cisco will have no liability for delay in the delivery or failure to deliver any of the products or features set forth in this document.
Cryptomathic is a global provider of secure server solutions to businesses across a wide range of industry sectors, including banking, government, technology manufacturing, cloud and mobile. With over 30 years’ experience, we provide systems for Authentication & Signing, EMV and Crypto & Key Management through best-of-breed security solutions and services.
We are rewriting the rules on how organizations protect themselves against rapidly evolving adversaries. Today’s threat environment requires understanding the adversary and attack landscape. Since our start in 2012, our technology has stopped the world’s most advanced cyber attacks. And we harbor even greater ambitions.
We instantly tell companies if they are under attack, the attack’s impact and how to immediately stop the threat.
Our platform finds a single component of an attack and connects it to other pieces of information to reveal an entire campaign and shut it down. Even the most talented analysts would struggle with detecting a threat and quickly building a complete attack story. We simplify this process.
Edgecore Networks provides a full range of managed switches to fulfill different deployment requirements, from small/medium business users, enterprises to carrier-level service providers, from simple web smart switches to Layer 2 and Layer 3 switches. Different products come with different port combinations, as well as PoE options, to meet market requirements, with the emphasis on scalability and flexibility. Most importantly, managed switches all come with Edgecore Networks’ in-house developed EdgeCOSTMsoftware, with optional ECView Pro network management system.
ExtraHop makes data-driven IT a reality. By applying real-time analytics and machine learning to all digital interactions, ExtraHop delivers instant and unbiased insights. IT leaders turn to ExtraHop first to help them make faster, better-informed decisions that improve performance, security, and digital experience. Just ask the hundreds of global ExtraHop customers, including Sony, Lockheed Martin, Microsoft, Adobe, and Google. To experience the power of ExtraHop, explore our interactive online demo.
Fortanix Self-Defending Key Management Service (SDKMS) is the world’s first cloud service secured with Intel® SGX. With SDKMS, you can securely generate, store, and use cryptographic keys and certificates, as well as secrets, such as passwords, API keys, tokens, or any blob of data. Your business-critical applications and containers can integrate with SDKMS using legacy cryptographic interfaces or using its native RESTful interface.
Garland TechnologyGarland Technology
Garland Technology network TAPs provide 100% network visibility, while providing anytime network access. A foundation of visibility starts with network TAPs that feed your monitoring and security tools all the data – every bit, byte and packet they need to successfully secure and monitor your network.
Protecting your network with a stack of security and monitoring tools is a significant investment, however they are only as good as the data they receive. Dropped packets and over-subscribed ports leave your network blind to cyber threats. A Garland Technology network TAP will ensure your tools receive all the data for optimum functionality while extending the lifecycle of your network tools.
Gigamon (NYSE: GIMO) provides active visibility into data-in-motion network traffic, enabling organizations to see more and secure more with stronger security and superior performance. Gigamon Visibility Platform and GigaSECURE®, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network, and application performance management solutions in enterprise, government, and service provider networks operate more efficiently and effectively.
As network and service operators and developers, we’ve spent our entire professional lives designing and running large-scale networks and CDNs. With decades of experience, we know the shortcomings of available tools. What we always wanted — but never found — was an infrastructure visibility solution that’s scalable, powerful, easy to use, and affordable. We started Kentik to create that solution.
Packet DesignPacket Design
Packet Design was founded with the goal of closing a critical network service assurance gap. Myriad vendor tools monitor and measure infrastructure health, bandwidth consumption, traffic composition, application response times, etc., but only Packet Design correlates the performance of critical services delivered across the network to routing behavior, in real time. When OSS/NMS dashboards are green but users are complaining of intermittent service outages or poor performance, Packet Design tells you why.
Over the years, our product portfolio has expanded from routing analytics to a service assurance suite that is used in the world’s largest and most complex networks. Today, hundreds of network operators use the Explorer products to improve network availability and performance, deliver new services faster and more economically, and improve customer satisfaction.
But we are just getting started. Packet Design’s vision is to be the premier source of intelligence to optimize the performance and control of physical and virtual networks. We are delivering vendor-agnostic SDN service management and orchestration products, and are working with early adopters to help them achieve first-mover competitive advantages.
Pica8 is breaking barriers to truly customizable application performance through open networking. With its Linux-based PicOS™ network operating system, Pica8 enables custom traffic engineering and empowers white box and brite box switches to integrate easily with existing Layer 2/Layer 3 networks and deliver unlimited SDN scalability through OpenFlow. Since 2009, Pica8 has pioneered new open networking technologies such as Linux-based networking, CrossFlow networking, vASIC® and Table Type Patterns. Through ongoing innovation, Pica8 is a trusted brand that unlocks the potential of made-to-order networking, offering a mainstream alternative to legacy proprietary systems. For more information, visit www.pica8.com or follow us on Twitter @pica8.
Radware® (NASDAQ: RDWR), is a global leader of application delivery and cyber security solutions for virtual, cloud and software defined data centers. Its award-winning solutions portfolio delivers service level assurance for business-critical applications, while maximizing IT efficiency. Radware’s solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down. For more information, please visit www.radware.com.
Radware encourages you to join our community and follow us on: Facebook, Google+, LinkedIn, Radware Blog, SlideShare, Twitter, YouTube, Radware Connect app for iPhone® and our security center DDoSWarriors.com that provides a comprehensive analysis on DDoS attack tools, trends and threats.
RedShield is the world’s first and only shielding-as-a-service security platform featuring a programmable library of shields to dynamically and proactively protect your web applications. Through a combination of vulnerability matching intelligence and development services, the right shields for your application are deployed and all app-destined traffic is rerouted through the RedShield global shield network. Shielding-as-a-service is a faster, fundamentally different approach to application security. With DDoS and syntactic vulnerability protection of most WAF/RASP solutions in place within minutes, existing library business logic flaw mitigation within hours and unique shields created within days, RedShield increases your application up-time and decreases time-to-market. No more endless regression cycles with no hope for launch in sight.
Savvius offers a range of powerful software and appliance products that automate the collection of critical network data for network forensics in security investigations and for network and application visibility and performance diagnostics. Savvius products are trusted by network and security professionals at over 6,000 companies in 60 countries around the world. Visit www.savvius.com for information about Savvius Omnipliance®, Savvius Omnipeek®, Savvius Vigil™, and Savvius Insight™, and to learn about Savvius technology and channel partners.
Thales e-Security + Vormetric have combined to form the leading global data protection and digital trust management company. Together, we enable companies to compete confidently and quickly by securing data at-rest, in-motion, and in-use to effectively deliver secure and compliant solutions with the highest levels of management, speed and trust across physical, virtual and cloud environments. By deploying our leading solutions and services, targeted attacks are thwarted, and sensitive data risk exposure is reduced with the least business disruption and at the lowest life cycle cost. Thales e-Security and Vormetric are part of Thales Group.
Tripwire is a leading provider of security, compliance and IT operations solutions for enterprises, industrial organizations, service providers and government agencies. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business context; together these solutions integrate and automate security and IT operations. Tripwire’s portfolio of enterprise-class solutions includes configuration and policy management, file integrity monitoring, vulnerability management, log management, and reporting and analytics. Learn more at tripwire.com, get security news, trends and insights at tripwire.com/blog or follow us on Twitter @TripwireInc.
Uila’s application-aware infrastructure performance monitoring gives IT infrastructure and operations teams x-ray vision, dependency mapping and an intuitive dashboard with 1-click root cause analysis providing instant full stack visibility into hotspots and bottlenecks. Uila cuts time to resolution from days to minutes for customers like First Tech Federal Credit Union and Lake County EMS. The company was founded in 2013 by Chia-Chee Kuan, Dean Au, and Miles Wu, with offices in Santa Clara, CA and Taiwan.
Ultra ElectronicsUltra Electronics
Ultra Electronics is an internationally successful defence, security, transport and energy company with a long, consistent track record of development and growth. The Group manages a portfolio of specialist capabilities generating innovative solutions to customer needs. Ultra applies electronic and software technologies in demanding and critical environments ranging from military applications, through safety-critical devices in aircraft, to nuclear controls and sensor measurement. These capabilities have seen the Group’s highly differentiated products contributing to a large number of platforms and programmes.
Ultra has world-leading positions in many of its specialist capabilities and, as an independent, non-threatening partner, is able to support all of the main prime contractors in its sectors. As a result of such positioning, Ultra’s systems, equipment or services are often mission or safety-critical to the successful operation of the platform to which they contribute. In turn, this mission-criticality secures Ultra’s positions for the long term which underpins the superior financial performance of the Group.
Ultra offers support to its customers through the design, delivery and support phases of a programme. Ultra businesses have a high degree of operational autonomy where the local management teams are empowered to devise and implement competitive strategies that reflect their expertise in their specific niches. The Group has a small head office and executive team that provide to the individual businesses the same agile, responsive support that they provide to customers as well as formulating Ultra’s overarching, corporate strategy.Across the Group’s three divisions, Ultra operates in the following eight market segments:
For over 30 years now, Utimaco products have been protecting people around the world against terrorism and organized crime and have secured private and sensitive data against theft or abuse. For this Utimaco has been developing hardware-based, high-security appliances (Hardware Security Modules) and compliance solutions for telecommunication provider regulations (lawful interception and data retention).
VMware, a global leader in cloud infrastructure and digital workspace technology, accelerates digital transformation by enabling unprecedented freedom and flexibility in how our customers build and evolve IT environments. With VMware solutions, organizations are improving business agility by modernizing data centers and integrating public clouds, driving innovation with modern apps, creating exceptional experiences by empowering the digital workspace, and safeguarding customer trust by transforming security. VMware is a member of the Dell Technologies family of businesses.