Automated Technologies Incorporated

SECURITY

Firewall / Unified Threat Management (UTM)

Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. 

Check Point Unified Threat Management (UTM) offer the perfect combination of proven security, easy deployment and effective management by consolidating key security applications (firewall, VPN, intrusion prevention, and antivirus and more) into the same single, efficiently managed solution trusted by the Fortune 100. With Check Point you can rest easy knowing your organization is protected at the lowest possible cost of ownership.

Web Application and Database Firewall Imperva Web Application Security solutions protect Web applications from online attacks. Imperva solutions continuously adapt to evolving threats and enable security professionals, network managers, and application developers to mitigate the risk of a data breach and address compliance requirements such as PCI 6.6
  • SecureSphere Database Firewall (DBF) effectively protects databases from attacks, data loss and theft. With real-time monitoring, alerting and blocking, pre-built security policies and audit rules SecureSphere protects the most valuable database resources and ensures data integrity.
Secure Gateway ProxySG appliances deployed with Blue Coat Web Filter deliver the most comprehensive protection against web-based threats, including malware, phishing and botnet traffic from infected end user systems. Blue Coat Web Pulse collaborative defense and the industry's only Negative Day Defense to block attacks at their source before they launch, protecting 75 million users worldwide.
Single Sign On

Centrify® is the leading provider of solutions for unifying identity management across cloud, mobile and data center IT environments. Centrify software and cloud services let organizations securely leverage their existing infrastructure to centrally manage a wide range of identity-related IT activities-such as authentication, access control, privilege management, policy enforcement and compliance-across both cloud and data center based resources.

Intrusion Prevention System Tipping Point is the industry's leading Intrusion Prevention System (IPS), unrivaled in security, performance, high availability and ease-of-use. The TippingPoint IPS is an in-line device that is inserted seamlessly and transparently into the network. Its switchlike performance characteristics allow it to be placed in-line at the perimeter, on internal network segments, at the core, and at remote site locations. These powerful enforcement points can be centrally controlled to institute and enforce business-wide security policies, allowing the TippingPoint IPS to see all network traffic and protect against external as well as internal attacks
Privileged Identity Management (PIM) /Privileged Session Manager (PSM) Centrify Secure mission-critical servers from identity-related insider risks and outsider attacks. Simplify the implementation of a least privilege access model across Windows, Linux and UNIX systems. Streamline the creation and management of administrative roles and rights with a robust set of tools that automate much of the process.
Privileged Identity Management (PIM) /Privileged Session Manager (PSM) CyberArk is the only security company laser-focused on striking down targeted cyber threats, those that make their way inside to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk is trusted by the world's leading companies -- including 30 of the Fortune 100 -- to protect their highest-value information assets, infrastructure and applications.
Database Encryption Vormetric Transparent Encryption enables data-at-rest encryption, privileged user access control and the collection of security intelligence logs without re-engineering applications, databases or infrastructure. The deployment of our data encryption software is simple, scalable and fast, Vormetric Transparent Encryption Agents are installed above the file system on servers or virtual machines to enforce security and compliance policies.
Endpoint Symantec Endpoint Protection (SEP) delivers superior, multilayer protection to stop threats regardless of how they attack your endpoints. SEP integrates with existing security infrastructure to provide orchestrated responses to address threats quickly. The single, lightweight SEP agent offers high performance without compromising end-user productivity, so that you can focus on your business.
Network Access Control ForeScout CounterACT® sees desktops, laptops, tablets, smartphones, IoT endpoints, peripherals and rogue devices the instant they connect to your network—even if they don’t have security agents installed. It discovers servers, routers and access points, too. CounterACT gathers in-depth insights about device types, users, applications, operating systems and more. Then it continuously monitors the devices. No agents. No excuses. No kidding.
Next Gen AV Cb Defense is the most powerful NGAV platform. With its breakthrough streaming prevention, market-leading detection and response capabilities and single lightweight agent, Cb Defense is the only way to stop all types of attacks and keep endpoints safe .
Data Loss Protection Forcepoint DLP Discover: Understand where critical business IP and personal data exists at rest across your organization to gain visibility into your digital attack surface, and implement data controls to address regulations such as the EU General Data Protection Regulation (GDPR).Forcepoint DLP Endpoint: Protect data in use both on and off the corporate network with PreciseID data fingerprinting on Apple macOS and Microsoft Windows systems. Enable secure data sharing with trusted partners using integrated policy-based file encryption for removable storage devices .
Mobile Device Management The MobileIron EMM platform enables global enterprises to secure and manage modern operating systems in a world of mixed-use mobile devices. It incorporates identity, context, and privacy enforcement to set the appropriate level of access to enterprise data and services. MobileIron secures data-at-rest on the mobile device, in mobile apps, and in cloud storage. The MobileIron EMM platform additionally secures data-in-motion as it moves between the corporate network, devices, and various on-prem and cloud storage repositories. With MobileIron, IT can secure corporate information wherever it lives while preserving employee privacy. With MobileIron, security means enabling the modern enterprise not restricting it. .
Security Information and Event Management (SIEM) The LogRhythm TLM Platform unifies data lake technology, machine learning, security analytics, and security automation and orchestration in a single end-to-end solution. It serves as the foundation for the AI-enabled security operations center (SOC), helping you to secure your cloud, physical, and virtual infrastructures for both IT and OT environments. Modernize your security operations with the powerful and integrated capabilities of the LogRhythm TLM Platform .
Secure Socket Layer Entrust Secure socket layer (SSL) certificates create an encrypted connection between an enterprise web server and a visitor’s web browser. This allows for private information to be transmitted without eavesdropping, tampering or forgery. Without SSL encryption, anything transmitted online — such as credit card numbers and private communications — are highly vulnerable to hackers and others with malicious intent.