|Firewall / Unified Threat Management (UTM)||
Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology.
|Vulnerability Management||Nexpose Vulnerability management is considered a security best practice defensive measure to protect against today's threats. Nexpose is the only vulnerability management solution to analyze vulnerabilities, controls, and configurations to find the who, what, and where of IT security risk. It uses RealContext™, RealRisk™, and the attacker's mindset to prioritize and drive risk reduction.|
|Web Application and Database Firewall||Imperva Web Application Security solutions protect Web applications from online attacks. Imperva solutions continuously adapt to evolving threats and enable security professionals, network managers, and application developers to mitigate the risk of a data breach and address compliance requirements such as PCI 6.6
|Secure Gateway||ProxySG appliances deployed with Blue Coat Web Filter deliver the most comprehensive protection against web-based threats, including malware, phishing and botnet traffic from infected end user systems. Blue Coat Web Pulse collaborative defense and the industry's only Negative Day Defense to block attacks at their source before they launch, protecting 75 million users worldwide.|
|Single Sign On||
Centrify® is the leading provider of solutions for unifying identity management across cloud, mobile and data center IT environments. Centrify software and cloud services let organizations securely leverage their existing infrastructure to centrally manage a wide range of identity-related IT activities-such as authentication, access control, privilege management, policy enforcement and compliance-across both cloud and data center based resources.
|Intrusion Prevention System||Tipping Point is the industry's leading Intrusion Prevention System (IPS), unrivaled in security, performance, high availability and ease-of-use. The TippingPoint IPS is an in-line device that is inserted seamlessly and transparently into the network. Its switchlike performance characteristics allow it to be placed in-line at the perimeter, on internal network segments, at the core, and at remote site locations. These powerful enforcement points can be centrally controlled to institute and enforce business-wide security policies, allowing the TippingPoint IPS to see all network traffic and protect against external as well as internal attacks|
|Privileged Identity Management (PIM) /Privileged Session Manager (PSM)||CyberArk is the only security company laser-focused on striking down targeted cyber threats, those that make their way inside to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk is trusted by the world's leading companies -- including 30 of the Fortune 100 -- to protect their highest-value information assets, infrastructure and applications.|
|Database Encryption||Vormetric Transparent Encryption enables data-at-rest encryption, privileged user access control and the collection of security intelligence logs without re-engineering applications, databases or infrastructure. The deployment of our data encryption software is simple, scalable and fast, Vormetric Transparent Encryption Agents are installed above the file system on servers or virtual machines to enforce security and compliance policies.|