Automated Technologies Incorporated


Firewall / Unified Threat Management (UTM)

Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. 

Check Point Unified Threat Management (UTM) offer the perfect combination of proven security, easy deployment and effective management by consolidating key security applications (firewall, VPN, intrusion prevention, and antivirus and more) into the same single, efficiently managed solution trusted by the Fortune 100. With Check Point you can rest easy knowing your organization is protected at the lowest possible cost of ownership.

Vulnerability Management Nexpose Vulnerability management is considered a security best practice defensive measure to protect against today's threats. Nexpose is the only vulnerability management solution to analyze vulnerabilities, controls, and configurations to find the who, what, and where of IT security risk. It uses RealContext™, RealRisk™, and the attacker's mindset to prioritize and drive risk reduction.
Web Application and Database Firewall Imperva Web Application Security solutions protect Web applications from online attacks. Imperva solutions continuously adapt to evolving threats and enable security professionals, network managers, and application developers to mitigate the risk of a data breach and address compliance requirements such as PCI 6.6
  • SecureSphere Database Firewall (DBF) effectively protects databases from attacks, data loss and theft. With real-time monitoring, alerting and blocking, pre-built security policies and audit rules SecureSphere protects the most valuable database resources and ensures data integrity.
Secure Gateway ProxySG appliances deployed with Blue Coat Web Filter deliver the most comprehensive protection against web-based threats, including malware, phishing and botnet traffic from infected end user systems. Blue Coat Web Pulse collaborative defense and the industry's only Negative Day Defense to block attacks at their source before they launch, protecting 75 million users worldwide.
Single Sign On

Centrify® is the leading provider of solutions for unifying identity management across cloud, mobile and data center IT environments. Centrify software and cloud services let organizations securely leverage their existing infrastructure to centrally manage a wide range of identity-related IT activities-such as authentication, access control, privilege management, policy enforcement and compliance-across both cloud and data center based resources.

Intrusion Prevention System Tipping Point is the industry's leading Intrusion Prevention System (IPS), unrivaled in security, performance, high availability and ease-of-use. The TippingPoint IPS is an in-line device that is inserted seamlessly and transparently into the network. Its switchlike performance characteristics allow it to be placed in-line at the perimeter, on internal network segments, at the core, and at remote site locations. These powerful enforcement points can be centrally controlled to institute and enforce business-wide security policies, allowing the TippingPoint IPS to see all network traffic and protect against external as well as internal attacks
Privileged Identity Management (PIM) /Privileged Session Manager (PSM) Centrify Secure mission-critical servers from identity-related insider risks and outsider attacks. Simplify the implementation of a least privilege access model across Windows, Linux and UNIX systems. Streamline the creation and management of administrative roles and rights with a robust set of tools that automate much of the process.
Privileged Identity Management (PIM) /Privileged Session Manager (PSM) CyberArk is the only security company laser-focused on striking down targeted cyber threats, those that make their way inside to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk is trusted by the world's leading companies -- including 30 of the Fortune 100 -- to protect their highest-value information assets, infrastructure and applications.
Database Encryption Vormetric Transparent Encryption enables data-at-rest encryption, privileged user access control and the collection of security intelligence logs without re-engineering applications, databases or infrastructure. The deployment of our data encryption software is simple, scalable and fast, Vormetric Transparent Encryption Agents are installed above the file system on servers or virtual machines to enforce security and compliance policies.