Blue Coat Systems is a leading provider of Web security and WAN optimization solutions. Blue Coat offers solutions that provide the visibility, acceleration and security required to optimize and secure the flow of information to any user, on any network, anywhere. Founded in 1996, Blue Coat provides products to more than 15,000 customers worldwide, including 88% of the Fortune Global 500.
Blue Coat CacheFlow
The Blue Coat CacheFlow appliance enables service providers to better manage excessive increases in network traffic and subscriber growth.
Blue Coat Cloud Service
Blue Coat Cloud Service delivers comprehensive web security as a service
Blue Coat Data Loss Prevention
Blue Coat Data Loss Prevention (DLP) enables you to detect and block potential data leaks quickly and accurately, all while achieving industry and regulatory compliance and risk mitigation objectives.
Blue Coat MACH5
Blue Coat MACH5 delivers the flexibility, power and speed you need for today’s business critical applications.
Blue Coat PacketShaper
Blue Coat PacketShaper delivers integrated visibility, control and compression capabilities in a single appliance.
Blue Coat ProxyAV
Blue Coat ProxyAV stops malware at the web gateway
Blue Coat ProxyClient
Blue Coat ProxyClient оptimizes application performance and security for remote workers. ProxyClient is a no-cost addition to your existing Blue Coat ProxySG infrastructure.
Blue Coat ProxySG
Blue Coat Full Proxy Edition of the ProxySG appliance family is part of Blue Coat’s Web security solutions that provides complete Web security and WAN Optimization. ProxySG delivers a scalable proxy platform architecture to secure Web communications and accelerate the delivery of business applications. ProxySG enables flexible, granular, policy controls over content, users, applications, web applications, and protocols.
Blue Coat Reporter
Blue Coat Reporter enables you to see all web-based user activities through dashboards and reports. Reporter supports up to 50 administrators, each with a custom dashboard. Reporter’s web API allows data, such as web usage patterns, bandwidth usage, application access summaries, blocked sites and more, to be exported into management consoles or reviewed by auditors using tools of their choice.
Blue Coat WebFilter
Blue Coat WebFilter Controls web access and stops the latest web threats in real time.
Security Analytics Platform
Security Analytics Platform from Blue Coat is easily deployed anywhere within your network—either as a pre-configured appliance, a virtual appliance, or software on your own hardware.
Integrating directly into the Security Analytics Platform, the Blue Coat ThreatBLADES use a cloud-based threat intelligence infrastructure powered by the Blue Coat WebPulse Collaborative Defense Cloud—leveraging the collaborative ‘network effect’ of more than 75 million users.
Catbird® is a pioneer and leader in Software-Defined Segmentation and Security for the Hybrid IT Infrastructure. Catbird’s software suite of products was designed from the ground up to provide visibility into and protection of private clouds and virtual Data Centers, and is available for both VMware and OpenStack.
Catbird Insight automatically and continuously discovers all assets in your virtual fabric, allows the grouping of these assets into logical Catbird TrustZones® and visualizes asset relationships and the east-west traffic flows between them for improved analytics.
Catbird Secure enables automated enforcement of flexible security policies across Catbird TrustZones. The platform detects and alerts on potential security incidents, initiates corrective enforcement actions and provides instant compliance reporting for major standards and mandates.
Centrify delivers integrated software and cloud-based solutions that centrally control, secure and audit access to cross-platform systems, mobile devices and applications by leveraging the infrastructure organizations already own - Microsoft Active Directory. From the data center and into the cloud, more than 4,000 organizations, including 40 percent of the Fortune 50 and more than 60 Federal agencies, rely on Centrify’s identity consolidation and privilege management solutions to reduce IT expenses, strengthen security and meet compliance requirements.
Centrify Identity Service
Integrated cloud app and mobile management. SSO for cloup apps and automated license management
Centrify Identity Service, Mac Edition
Active Directory-Based Security and Management for Mac and Mobile Devices
Centrify Privilege Service
Access and Password Management for the Modern Enterprise.
Centrify Server Suite
Unified identity management and audit across on-premises and cloud-based Windows, Linux, and UNIX Systems
Flowmon Networks empowers businesses to manage and secure their computer networks confidently. Through its high performance network monitoring technology and lean-forward behavior analytics, IT pros worldwide benefit from absolute network traffic visibility to enhance network & application performance and deal with modern cyber threats. FlowMon is leading the way of NetFlow/IPFIX network monitoring that is high performing, scalable and easy to use. With their solution recognized by Gartner, recommended by Cisco, Check Point and IBM, FlowMon is one of the fastest growing companies in the industry.
Flowmon Anomaly Detection System is a modern detection system of the network attacks,anomalies, advanced persistent threats and undesirable behavior in the network.
FlowMon APM agent-less monitoring of all user transactions. Designed for web-based HTTP/HTTPS, MSSQL, Oracle applications.
Flowmon Collector provides absolute control over the bandwidth utilization, optimization of network/application performance, quick troubleshooting and network protection against modern cyber threats.
FlowMon DDoS Defender
Due to their destructive nature and ability to affect networks with ease DDoS attacks have become especially worrisome to any business running web applications. Flowmon DDoS Defender puts advanced artificial intelligence between your critical systems and criminals. Without any changes in infrastructure, in a matter of minutes, network and security engineers will have up-and-running active DDoS protection.
FlowMon Monitoring Center
Flowmon monitoring center (FMC) is a professional tool for effective NetFlow statistics analysis. It is optimized for storing and processing high amounts of statistical data.
FlowMon Network Solution
A fast, reliable and well secured network is of crucial importance to any organization. Flowmon is the answer to this challenge using leading edge IP flow monitoring technology (NetFlow, IPFIX) to give you the best solution for network visibility.
FlowMon Probe provides a statistical data needed for monitoring and network security, troubleshooting, IP-Billing and accounting, capacity planning, users and application control e.t.c.
FlowMon Traffic Recorder
FlowMon Traffic Recorder extends the functionality provided by the probe in the data stream recording area including a data content.
ForeScout Technologies, Inc. is transforming security through visibility. ForeScout offers Global 2000 enterprises and government organizations the unique ability to see devices, including non-traditional devices, the instant they connect to the network. Equally important, ForeScout lets you control these devices and orchestrate information sharing and operation among disparate security tools to accelerate incident response. Unlike traditional security alternatives, ForeScout achieves this without requiring software agents or previous device knowledge. The company’s solutions integrate with leading network, security, mobility and IT management products to overcome security silos, automate workflows and enable significant cost savings. As of January 2016, more than 2,000 customers in over 60 countries improve their network security and compliance posture with ForeScout solutions.
ForeScout CounterACT allows IT organizations to readily understand and control how all users, systems and devices, including mobile devices and VMs, access network resources and applications.
HEAT Software, Inc., a global leader in operational endpoint security, develops, integrates and markets security software solutions helping companies to protect their vital information and manage critical risk across network and endpoint assets. HEAT Software enables more than 5,100 customers worldwide to achieve optimal security and IT success by delivering a proven and award-winning solution portfolio that includes Vulnerability Management, Endpoint- and Data Protection, Reporting and Compliance offerings.
Lumension AntiVirus provides advanced protection via traditional signature-matching capabilities as well as innovative DNA Matching, SandBox and Exploit Detection technologies which provide proactive protection against zero-day threats.
Lumension Application Control
Lumension Application Control provides complete malware protection and increases IT and end-user productivity by preventing any unknown, un-trusted or malicious applications from executing.
Lumension Device Control
Lumension Device Control is an award-winning leader in preventing data loss / theft via removable devices / media. With Lumension Device Control, organizations can quickly identify all endpoint-connected devices in their environment and flexibly enforce a comprehensive security policy that prevents unauthorized use, limits malware intrusion, and forces encryption of sensitive data.
Lumension Endpoint Management and Security Suite
Lumension Endpoint Management and Security Suite unifies the functions of IT operations and security through a single console, server and agent architecture to seamlessly and more effectively address IT risk and systems management requirements across the enterprise. Lumension Endpoint Management and Security Suite delivers best-in-class, modularly licensed capabilities across patch management, anti-virus, configuration management, power management, application control, device control and asset management.
Lumension Patch and Remediation
Lumension Patch and Remediation streamlines and automates the patch management process in even the most complex, heterogeneous environments. Through proactive alerting on issues, you can address them immediately.
Lumension Scan, a component of Lumension Vulnerability Management, is a complete stand-alone, network-based scanning solution that performs a comprehensive external scan of all devices connected to your network, both managed and unmanaged.
LogPoint is a European SIEM pioneer, having introduced our SIEM Europe are experiencing the LogPoint difference. LogPoint is the most flexible platform available for collecting, analyzing, and monitoring all data – whether they are generated by applications, databases, or infrastructure, or involve sensitive assets, manufacturing systems, or security systems. The scale-as-you-grow principle allows for quick and easy visualization with only a few resources – no matter how vast the IT landscape, no matter how dense the data. With headquarters in Copenhagen, Logpoint sales and support offices are located throughout Europe and their partnerships reach across the globe.product to the market in 2008. Today, over 300 clients throughout
The LogPoint SIEM solution extracts events and incidents from the billions of logs existing in any IT infrastructure of any size
MobileIron was purpose-built to secure and manage mobile apps, data, and devices for global companies. MobileIron was the first to deliver key innovations such as multi-OS mobile device management (MDM), mobile application management (MAM), and BYOD privacy controls. Positioned in the Leaders Quadrant of Gartner, Inc.'s Magic Quadrant for Mobile Device Management Software 2011, MobileIron is solving the problems CIOs face as business data and applications move to smartphones and tablets. The MobileIron Virtual Smartphone Platform and the MobileIron Connected Cloud are the first solutions to give IT and users real-time intelligence and control over mobile content, activity, and apps in order to secure the enterprise, reduce wireless cost, and improve the mobile user experience.
Advanced Mobile Device Management
Advanced Mobile Device Management - solution for multi-OS mobile operations control.
Mobile Activity Intelligence
Mobile Activity Intelligence performs proactive cost control for mobile enterprises.
MobileIron Apps@Work provides an integrated solution to support native mobile apps securely on any mobile device.
MobileIron Connected Cloud
The MobileIron Connected Cloud is a mobile device management solution that can be fully integrated and operational in less than an hour. Once this step is done the IT can begin bringing mobile devices in management and distributing mobile apps using MobileIron’s Enterprise App Storefront, without losing enterprise-grade security. The MobileIron Connected Cloud gives companies around the world a highly scalable infrastructure enabling the IT to support everything from initial pilots to tens of thousands of devices.
The challenge for the Mobile IT team is to provide a great user experience when accessing enterprise content on their mobile device without sacrificing document security.
MobileIron Virtual Smartphone Platform
The MobileIron Virtual Smartphone Platform is the first solution to combine data- driven smartphone and tablet management with real-time wireless cost control.
The Web@Work Enterprise Mobile Browser enables immediate, secure access to internal websites and web applications, while preserving a native and high-fidelity web browsing experience.
Mojo Networks is the global leader in wireless security and compliance solutions. Mojo's patented technology protects enterprises from the growing problem of Wi-Fi security threats, while allowing organizations to better manage their WLAN environment and comply with emerging wireless compliance standards (i.e. PCI). The Company's award-winning SpectraGuard wireless intrusion prevention solution (WIPS) family provides enterprise security and compliance professionals with unparalleled capabilities to accurately detect, classify, block and locate all Wi-Fi security threats, while helping network operations staff to quickly monitor and troubleshoot WLAN performance issues.
AirTight Cloud Services
AirTight Cloud Services are a suite of managed services which adds Wi-Fi access, branded as AirTight Secure WiFiTM, to its unique portfolio of on-demand wireless security and compliance solutions.
AirTight SpectraGuard Enterprise
AirTight’s SpectraGuard Enterprise wireless intrusion prevention system (WIPS) provides enterprises with continuous and the most comprehensive protection against current and emerging wireless threats.
AirTight SpectraGuard SAFE
SpectraGuard SAFE - is wireless security agent for endpoints that protects mobile clients from Wi-Fi threats – 24 x 7, wherever they are.
SpectraGuard Planner is wireless LAN planning instrument for coverage, performance and security.
Proofpoint is a pioneering security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance and secure communications. Organizations around the world depend on Proofpoint’s expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information.
Proofpoint Enterprise Archive
Proofpoint Enterprise Archive is an on-demand archiving solution that addresses three key challenges – legal discovery, regulatory compliance, and email storage management—without the headaches of managing archiving in-house.
Proofpoint Enterprise Governance
Proofpoint Enterprise Governance Suite is an information governance solution that provides organizations the ability to monitor and apply policy to unstructured information—wherever it exists across the enterprise. By proactively governing unstructured information “in-place,” organizations can effectively protect brand and manage regulatory compliance, security, and confi dentiality.
Proofpoint Enterprise Privacy
The Proofpoint Enterprise Privacy suite provides a full lifecycle approach to protecting information of all types.
Proofpoint Enterprise Protection
Proofpoint Enterprise Protection delivers everything needed to keep an organization safe from email threats bytaking a full lifecycle approach to securing email.
Proofpoint Targeted Attack Protection
Proofpoint Targeted Attack Protection provides the tools to keep an organization safe from the malicious nature of targeted spear-phishing attacks and is a natural complement to any existing email security gateway.
protected-networks.com provides Access Governance. The company sees its strengths in the development of a homogenous and integrated solution, which combines several functionalities and changes the way in which Active Directory and file server access rights management is traditionally approached. New ways of presenting information, enabling documentation and allowing administration of access rights differentiate the solution from its competitors.
8MAN is a fully integrated software solution for the management of Active Directory, file server and SharePoint access rights. Limit access rights to a “need to know” basis thereby significantly reducing data security risks. Ensure accountability and compliance with internal policies by knowing who touched which files.
VASCO Data Security International Inc. is a world leader in Strong Authentication and e-Signature solutions, specializing in online accounts, identities, and transactions. As global software company, VASCO serves a customer base of approximately 9,000 companies in over 100 countries, including more than 1,300 international financial institutions. In addition to the financial sector, VASCO technologies secure sensitive information and transactions for the enterprise security, e-commerce, and e-government industries.
aXsGUARD GATEKEEPER offers a firewall, intrusion prevention system, anti-virus and web content filtering, but it incorporates VASCO two-factor authentication as well.
VASCO DIGIPASS provides strong user authentication and e-Signatures and is compatible with more than 50 international vendors for e-commerce, e-banking, e-networking and e-government applications.
VASCO IDENTIKEY Server
IDENTIKEY Server is an authentication software suite for organizations of all sizes that want to address their concerns about secure access with a state-of-the-art solution.
Veriato (formerly known as SpectorSoft) is the recognized leader and pioneer in the computer, mobile device and Internet monitoring and analysis software market. More than 500,000 consumers and 50,000 businesses, government organizations, schools and law enforcement agencies have purchased Veriato products to help keep children and employees safe online, and to prevent Internet abuse, data loss and compliance violations in the workplace.
Veriato 360 is comprehensive user-based Activity Monitoring software that allows IT professionals, Human Resources, Legal Counsel, and General Managers to monitor, replay, and analyze all user, department, and division electronic activity.
Veriato INVESTIGATOR automatically records emails, chats, instant messages, web sites visited, and more on Windows-based servers, PCs, and laptops.
Veriato Recon is User Behavior Analysis Software that provides early warning of suspicious behavior by passively monitoring user behavior and alerting when actions contradict policies or vary from well-defined patterns.
WorksPad is a brand-name, denoting the company MobilityLab LLC and the unique product, providing true-productive all-in-one mobile workplace for enterprises. The company’s mission is to deliver the product, converting tablets and smartphones into the full analogue of PC with the one more degree of freedom – mobility. With WorksPad by MobilityLab LLC you can perform the same daily office tasks as emailing, file managing, document editing, but wherever you like or need in highly productive and secure way.
WorksPad provides mobile workers with an integrated enterprise-grade workplace, including corporate file sync and share, enhanced e-mail client, built-in office tools, corporate address book and calendar, and screen share service. All-in-one paradigm reinforces Data Loss Prevention (DLP) policy and increases productivity by PC-like user experience (UX).
WORKSPAD FOR MOBILEIRON
WorksPad for MobileIron provides mobile workers with an integrated enterprise-grade workplace, including corporate file sync and share, enhanced e-mail client, built-in office tools, corporate address book and calendar, and screen share service. All-in-one paradigm reinforces Data Loss Prevention (DLP) policy and increases productivity by PC-like user experience (UX). WorksPad for MobileIron uses the full power of AppConnect technology by MobileIron for ultimate manageability and security for enterprises.