Alliance Partners

Amazon Web Services

Amazon Web Services provides compute, storage, and network resources for businesses in the cloud, with a highly reliable, scalable, and secure platform that powers hundreds of thousands of enterprise, government, and start-up businesses in more than 190 countries around the world.

Under AWS' shared security model, the company guarantees the security and performance of the underlying cloud infrastructure, while customers are responsible for their AMI virtual appliance (guest OS and application).

Type: 
Cloud

Cisco

Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. For more information: http://thenetwork.cisco.com.
Type: 
Security

Cyber Squared

Cyber Squared Inc. is recognized globally as a leading provider of advanced threat intelligence products and services. Cyber Squared's flagship product, ThreatConnect is an enterprise threat intelligence platform that bridges incident response, defense, and threat analysis. More than 1,500 users and organizations worldwide leverage the power of ThreatConnect both on-premises and in the cloud to increase productivity and deliver dynamic knowledge management, high context indicators, and automated responses to counter sophisticated cyber-attacks.

Type: 
Security

Digital Bond

Digital Bond, a leading ICS security and control system IT information expert, provides consulting services to assess and improve the security of SCADA and DCS that runs an organization’s critical infrastructure. We focus on adding SCADA intelligence into IT security solutions, and the results can be seen today in most network IDS, SCADA honeynets and Nessus plugins.

Type: 
Services

FireEye

FireEye, Inc. is the leader in malware protection systems and next generation network threat prevention solutions that safeguard valuable data and networks against Modern Malware infiltration and theft in commercial enterprises, higher education, and government institutions.

Type: 
Security

Good

Good Technology is transforming how mobile work gets done, through secure app-to-app workflows that include integrated email, communications, document management, business intelligence, social business, wireless printing, and more. Good offers complete enterprise mobility management solutions, including device, app, data, and service management; as well as analytics and reporting. Good is used by 4000+ major organizations worldwide, including 50 of the Fortune 100 as well as more than 4,000 enterprise customers in 90+ countries operating on over 200 carriers.

Type: 
Mobile

IBM SmartCloud

IBM, a globally integrated technology and consulting company with operations in more than 170 countries, develops and sells software and systems hardware and a broad range of infrastructure, cloud and consulting services. IBM SmartCloud is a family of enterprise-class cloud computing technologies and services for securely building public, private and hybrid clouds. Backed by IBM’s deep expertise, open standards and proven infrastructure, SmartCloud enables companies to confidently achieve new levels of innovation and efficiency.

Type: 
Cloud

Immunity

Immunity, a global leader in the assessment and penetration testing space, delivers products and services to Fortune and Global 500 companies and smaller organizations across all vertical markets. Immunity also serves Government departments from all over the world. A concentration on purely offensive techniques and technologies distinguishes Immunity from other professional organizations who attempt to address both offensive and defensive security postures in their service or product lines.

Type: 
Security

NTT Solutionary

NTT Solutionary, the leading pure-play Managed Security Services Provider in North America, protects traditional and virtual IT infrastructures, applications, networks, cloud and mobile environments. Built on the patented, cloud-based ActiveGuard® services platform, global threat intelligence, certified information security experts and the Security Engineering Research Team (SERT), Solutionary services are delivered 24/7 through multiple state-of-the-art Security Operations Centers (SOCs).

Type: 
Services

Oracle

Oracle, a global technology leader, is shifting the complexity from IT, moving it out of the enterprise by engineering hardware and software to work together—in the cloud and in the data center. From servers and storage, to database and middleware, through applications, each layer of the stack comprises best-of-breed products designed, optimized, and engineered to work together.

Type: 
Virtualization

Palo Alto Networks

Palo Alto Networks is the network security company. Its innovative platform allows enterprises, service providers, and government entities to secure their networks and safely enable the increasingly complex and rapidly growing number of applications running on their networks. The core of Palo Alto Networks platform is its Next-Generation Firewall, which delivers application, user, and content visibility and control integrated within the firewall through its proprietary hardware and software architecture.

Type: 
Security

Pwnie Express

Pwnie Express is the leading provider of innovative sensors that assess network security risks in remote and hard to reach locations. Thousands of enterprises and government organizations worldwide rely on Pwnie Express’s products to conduct drop-box penetration testing and provide unprecedented insight into their distributed network infrastructure. Pwnie Express’s smart devices all organizations to see all the things while leveraging open source tools and platforms. The award-winning products are backed by the expertise of Pwnie Express Labs, the company's security research arm.

Type: 
Security

Red Hat

Red Hat is the world's leading provider of open source software solutions, using a community-powered approach to reliable and high-performing cloud, Linux, middleware, storage and virtualization technologies. Red Hat also offers award-winning support, training, and consulting services. As the connective hub in a global network of enterprises, partners, and open source communities, Red Hat helps create relevant, innovative technologies that liberate resources for growth and prepare customers for the future of IT.

Type: 
Virtualization

Risk I/O

Risk I/O is a vulnerability threat management platform that processes external Internet breach and exploit data with an organization's vulnerability scan data to monitor, measure and prioritize vulnerability remediation across their IT environment. As a result, organizations know their likelihood of experiencing a breach and what vulnerabilities pose the greatest risk. Risk I/O processes over a billion vulnerabilities a month against Internet breach data for its users.

Type: 
Security

SourceFire

Sourcefire, Inc. (NASDAQ: FIRE), a world leader in intelligent cybersecurity solutions, is transforming the way global large- to mid-size organizations and government agencies manage and minimize security risks to their dynamic networks, endpoints, mobile devices and virtual environments. With solutions from a next-generation network security platform to advanced malware protection, Sourcefire's threat-centric approach provides customers with Agile Security® that delivers protection before, during and after an attack.

Type: 
Security

ThreatGRID

ThreatGRID is the first unified malware analysis and threat intelligence solution that is revolutionizing how organizations use accurate and context-rich intelligence to defend against advanced cyber attacks. ThreatGRID customers include large organizations across a number of verticals such as financial services, government, healthcare, energy, manufacturing and more. ThreatGRID securely crowdsources large volumes of malware and performs advanced analysis in the cloud, to identify key behavioral indicators enabling near real-time remediation.

Type: 
Security

Thycotic

Thycotic Software deploys smart, reliable, IT security solutions that empower companies to control and monitor privileged account credentials and identity access for administrators and end-users. A member of the Inc. 5000, Thycotic is recognized as the fastest growing, privately held PAM provider in the USA. Trusted by over 2,500 organizations worldwide ­ including members of the Fortune 500, enterprises, government agencies, technology firms, universities, non-profits, and managed service providers. To learn more, please visit www.thycotic.com.

Type: 
Security

VCE

VCE, a leader in converged cloud infrastructure systems, provides systems that transform IT operations to deliver greater business value. To deliver value to the business, IT needs an infrastructure that is flexible, scalable, reliable, secure, and cost-effective. VCE, through Vblock™ Systems, provides an optimized information technology system that accelerates the adoption of converged infrastructure and cloud-based computing models that dramatically reduce the cost of IT while improving time to market for customers.

Type: 
Virtualization

VMware

VMware, the leader in virtualization and cloud infrastructure, delivers customer-proven solutions that accelerate IT by reducing complexity and enabling more flexible, agile service delivery. VMware enables enterprises to adopt a cloud model that addresses their unique business challenges. VMware’s approach accelerates the transition to cloud computing while preserving existing investments and improving security and control. With more than 500,000 customers and 55,000 partners, VMware solutions help organizations of all sizes lower costs and increase business agility.

Type: 
Virtualization