Automated Technologies Incorporated


Firewall / Unified Threat Management (UTM)

Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. 

Check Point Unified Threat Management (UTM) offer the perfect combination of proven security, easy deployment and effective management by consolidating key security applications (firewall, VPN, intrusion prevention, and antivirus and more) into the same single, efficiently managed solution trusted by the Fortune 100. With Check Point you can rest easy knowing your organization is protected at the lowest possible cost of ownership.

Web Application and Database Firewall Imperva Web Application Security solutions protect Web applications from online attacks. Imperva solutions continuously adapt to evolving threats and enable security professionals, network managers, and application developers to mitigate the risk of a data breach and address compliance requirements such as PCI 6.6
  • SecureSphere Database Firewall (DBF) effectively protects databases from attacks, data loss and theft. With real-time monitoring, alerting and blocking, pre-built security policies and audit rules SecureSphere protects the most valuable database resources and ensures data integrity.
Secure Gateway ProxySG appliances deployed with Blue Coat Web Filter deliver the most comprehensive protection against web-based threats, including malware, phishing and botnet traffic from infected end user systems. Blue Coat Web Pulse collaborative defense and the industry's only Negative Day Defense to block attacks at their source before they launch, protecting 75 million users worldwide.
Intrusion Prevention System Trend Micro User Protection , an XGen security solution, protects your users against today ever-changing threats like fileless malware, targeted attacks, and ransomware variants, including WannaCry. Multiple integrated layers of protection across endpoint, email, web and SaaS applications, protect your users regardless of device, application, network, or location. Powered by XGen security, Trend Micro Network Defense goes beyond next-gen IPS to provide a blend of cross-generational techniques that ap ply the right technology at the right time to deliver integrated detection and prevention of known, unknown and undisclosed threats. Hybrid Cloud Security automates security within your DevOps processes and delivers multiple XGen threat defense techniques for protecting runtime physical, virtual and cloud workloads, and containers, as well as scanning of container images during development phases. Reducing the number of security tools, a single dashboard combines capabilities with full visibility into leading environments like VMware, AWS, and Microsoft Azure. Trend Micro Deep Security platform lowers the cost and complexity of securing workloads across multiple environments, including purchase options aligned to the way you want to buy, automated deployment, extensive API integration and security capabilities that can virtually shield servers from the latest advanced threats like ransomware and network-based vulnerabilities.
Privileged Identity Management (PIM) /Privileged Session Manager (PSM) CyberArk is the only security company laser-focused on striking down targeted cyber threats, those that make their way inside to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk is trusted by the world's leading companies -- including 30 of the Fortune 100 -- to protect their highest-value information assets, infrastructure and applications.
Database Encryption Vormetric Transparent Encryption enables data-at-rest encryption, privileged user access control and the collection of security intelligence logs without re-engineering applications, databases or infrastructure. The deployment of our data encryption software is simple, scalable and fast, Vormetric Transparent Encryption Agents are installed above the file system on servers or virtual machines to enforce security and compliance policies.
Endpoint Symantec Endpoint Protection (SEP) delivers superior, multilayer protection to stop threats regardless of how they attack your endpoints. SEP integrates with existing security infrastructure to provide orchestrated responses to address threats quickly. The single, lightweight SEP agent offers high performance without compromising end-user productivity, so that you can focus on your business.
Network Access Control ForeScout CounterACT® sees desktops, laptops, tablets, smartphones, IoT endpoints, peripherals and rogue devices the instant they connect to your network—even if they don’t have security agents installed. It discovers servers, routers and access points, too. CounterACT gathers in-depth insights about device types, users, applications, operating systems and more. Then it continuously monitors the devices. No agents. No excuses. No kidding.
Next Gen AV Cb Defense is the most powerful NGAV platform. With its breakthrough streaming prevention, market-leading detection and response capabilities and single lightweight agent, Cb Defense is the only way to stop all types of attacks and keep endpoints safe .
Data Loss Protection Forcepoint DLP Discover: Understand where critical business IP and personal data exists at rest across your organization to gain visibility into your digital attack surface, and implement data controls to address regulations such as the EU General Data Protection Regulation (GDPR).Forcepoint DLP Endpoint: Protect data in use both on and off the corporate network with PreciseID data fingerprinting on Apple macOS and Microsoft Windows systems. Enable secure data sharing with trusted partners using integrated policy-based file encryption for removable storage devices .
Security Information and Event Management (SIEM) The LogRhythm TLM Platform unifies data lake technology, machine learning, security analytics, and security automation and orchestration in a single end-to-end solution. It serves as the foundation for the AI-enabled security operations center (SOC), helping you to secure your cloud, physical, and virtual infrastructures for both IT and OT environments. Modernize your security operations with the powerful and integrated capabilities of the LogRhythm TLM Platform .
Secure Socket Layer Entrust Secure socket layer (SSL) certificates create an encrypted connection between an enterprise web server and a visitor’s web browser. This allows for private information to be transmitted without eavesdropping, tampering or forgery. Without SSL encryption, anything transmitted online — such as credit card numbers and private communications — are highly vulnerable to hackers and others with malicious intent.