Find a Partner
Bit9 Solution Providers offer the industry’s leading enterprise application whitelisting solutions, delivering unprecedented security and control.
To locate a distributor or reseller, please contact one of our Bit9 Solution Providers listed below. If you don’t find what you are looking for, please contact us. Learn more about becoming a provider.
Select options below to filter the list of solution partners.
Your search returned no results. Please try again or click Show All.
AccessIT Group is a premier provider of IT security and infrastructure technologies ranging from security policy and solution design to security solution installation and implementation. We provide enterprise level products and services for both regional and global companies, and our engineers maintain the highest level of certification for the products and services we provide.
Accuvant is the nation’s premier information security and compliance management consulting firm. Accuvant’s security advisors use industry expertise and proven methodologies to help large enterprises assess their environments, improve their compliance postures, and secure their infrastructures.
Active Canopy Inc.’s managed Cybersecurity as a Service (CyaaS) platform is designed to provide businesses with expert cybersecurity analytic support and active defense against a full spectrum of advanced cyber threats. Cybersecurity threats are evolving in complexity and frequency, leaving companies’ sensitive data and business operations vulnerable to attack and disruption. Active Canopy addresses this security gap with our active cloud-based service, which extends beyond virtual networks into the physical network environment. The Active Canopy CyaaS platform delivers cyber-expert analytics and big-data scalability at an affordable reach.
Adaptive Communications is the Northeast’s leading provider of customized, robust and flexible IT Infrastructure and Information Security solutions.
Advanced Threat Analytics provides a zero infrastructure cloud based security service that virtually eliminates malware while enabling effective detection and response to breaches when prevention fails. We use a combination of cyber security experts, next generation security tools, and proprietary processes to help organizations measurably improve their security effectiveness without impacting users or adding complexity. Advanced Threat Analytics continuously monitors your endpoints both ON and OFF your network. We block access to malware, exploit, and botnet sites across all Internet access points without any hardware or network devices. By using DNS and a virtually invisible 3 MB endpoint client, we leverage the cloud to implement our solution for clients in less than a day. For organizations with resource constraints, our cyber security analysts can provide tier 1 analysis and incident response retainers.
AE Business Solutions is a leading IT Integration and Consulting Company serving enterprise organizations throughout the Midwest.
Our mission is to provide our clients with the right combination of information technology and people to deliver innovative solutions that create a competitive advantage for their organization.
When you invest in technology or consulting with AE Business Solutions, you gain a partnership with a company that is dedicated to your success and committed to the long-term support and service of your technology investment.
Operational threats are dynamic and evolving, is your incident response program changing with the times? Allegheny Digital can help. Our team has extensive experience collaboratively assisting clients with rapidly responding to attacks, assessing the impact, and managing when and how to engage regulatory driven notification processes. Our services include Incident Response, IR Plan Development, Reverse Engineering, and Endpoint Threat Monitoring.
Alpine Security is a computer security company that understands that security is never a turnkey solution. We take a holistic approach,evaluating our clients’ needs to develop a comprehensive solution with quantifiable results. Alpine Security provides services covering every facet of computer and network security, ranging from full assessments to incident response to specialized cyber security training.
ASysTech Inc., a Microsoft partner for over 20 years, is a full service Managed IT Service provider with service offerings that range from project management, consultation to network and desktop support.
We are a group of highly trained professional experts offering IT and allied services including consultancy services, with commitment to high standards of value added customer service. Our major strength lies in bringing solutions to every day’s problems encountered in the work place by our clients and deploying our highly resourceful and dynamic team to providing solutions.
At BRIDGE, our objective is to attain high level of satisfaction for all the stake holders namely
- Channel Partner &
Partners deal with a dedicated point of contact – their ‘Account Manager’ who is well supported by teams from different departments and assists the customer in every step of the process.
In tandem our teams work towards a common objective of attaining the highest level of customer satisfaction and maximize partner benefits.
BTB Security’s Rapid Advanced Detection And Response (RADAR) service provides a powerful component to the defensible security program, giving clients the ability to quickly detect and respond to threats with agility and expertise with no blind spots. As part of a security infrastructure, RADAR provides a comprehensive alternative to traditional security monitoring infrastructure or services to provide highly actionable, verified threat information. RADAR not only includes the technology required to perform advanced monitoring, detection, and response, but skilled expertise to ensure that only real threats and malicious activity are reported and acted upon. Complete visibility into your environment, providing a cost-effective service that helps you sleep at night. RADAR requires no investment in infrastructure, and is what you’ve been waiting for if you’ve been trying to cobble together an expensive and complicated defense-in-depth infrastructure with tools, resources, and processes.
CDW is a leading provider of integrated information technology solutions in the U.S. and Canada. CDW helps small, medium and large business, government, education and healthcare customers by delivering critical solutions to their increasingly complex IT needs. A Fortune 500 company, CDW has a broad array of offerings, ranging from discrete hardware and software products to integrated IT solutions such as mobility, security, data center optimization, cloud computing, virtualization and collaboration.
Founded in 2000, CIPHER is a global information security company that delivers a wide range of proprietary products and services, supported by the best in class security intelligence lab – CIPHER Intelligence.
With offices in North America, Europe and Latin America, partners in 12 countries, 24×7 security operations centers (SOCs) and R&D laboratories in different continents, CIPHER customers consist of world-renowned enterprises and government agencies with countless success cases.
CipherTechs, Inc is a privately held information security services provider. We focus on delivering security solutions for businesses harnessing the power of Internet communications. We audit, design and implement information security solutions in areas of IP networking, firewalls, application security, risk assessment, traffic monitoring, encryption, redundancy and strong authentication.
Our corporate mission is to deliver an unparalleled level of information security expertise. Our experience, strategic partnerships and research allow us to create superior solutions. Deciphering security requires the successful transfer of information, knowledge and technology to enable customers to deploy control and reduce risk
Cirosec is a leading security consulting and integration company in Germany. Cirosec focuses on innovative security technologies, including data security, IT forensics, vulnerability management and large scale security projects.
Comm Solutions is an end to end technology solutions provider specializing in the design, development, deployment and support of enterprise level solutions in the corporate, education, government and healthcare markets. For the last thirty years we have been in the network services business and have grown our business by listening to the needs of our clients and responding with technical innovation and service excellence.
Comm Solutions maintains excellent alliances with best players in the industry and our team of certified specialists understands how to leverage these technologies and shorten deployment cycles. Our expertise allows you to provide fast reliable results as well as having significant purchasing power with the leading manufacturers and software vendors to provide you the best overall value and ROI on your technology deployments.
Based in Malvern, PA; Comm Solutions’ veteran team of engineers, project managers and consultants are field tested, trained and certified in the leading solutions and services from the industry’s top manufacturers.
Critical Start is a dedicated security company with the goal to cost effectively improve the security capabilities of our customers. While focused on security services, we also resell a limited set of security products. We tend to deeply engage with our clients and seek to understand their long term security strategy. With an understanding of a client’s current security posture and long term strategy, we are in a great position to help them improve their security capability. We take a framework approach to security called the Defendable Network that influences everything we do.
Datastream is a business IT consulting firm oriented to provide solutions on application control, application acceleration, and Web 2.0 enablement within medium and large sized accounts in Mexico.
For over 20 years, Dataway has been dedicated to designing, implementing, and supporting customized network security solutions for our customers. Dataway’s seasoned network engineers engage with our clients as trusted advisors to help develop long-term security strategies. We use our global reach and international presence to provide our clients with 24x7x365 support and access to top-tier engineering talent.
Datum-System (Connect Your Life), provides world-class solutions and professional services in Jordan and all over the Middle East, including Networking, Network Security, UTM and Infrastructure.
Employing proprietary CTU Endpoint Intelligence technology, the Dell SecureWorks Advanced Endpoint Threat Detection service gives you the earliest possible warning that your endpoints may be hosting an advanced adversary. The fully managed service heightens your security situational awareness by warning you when endpoints may have been compromised and, by accessing extensive intelligence on threat actors and actor tradecraft, accelerates incident response by pinpointing exactly which systems are compromised, how they were compromised, and how you can repair them. The Advanced Endpoint Threat Detection service works by utilizing lightweight sensors across your servers, laptop and desktop devices. The sensors continuously monitor registry, file system, process tables, memory and other areas of operation for signs of compromise. The “always-on” nature of the solution gives you the earliest possible warning when threat indicators are detected.
With offices in Buffalo, NY, Rochester, NY and Cleveland, OH, our core business is designed to help our clients take full advantage of today’s information technologies while guarding against the ever-changing threats posed by those very technologies. DIGITS was founded in 2006 to fill the need in the legal and corporate communities for highly skilled digital forensic services, incident response services, information security services, network security advisory services, and corporate computer investigations.
CYPOINT™ from Digital Hands is a fully managed, integrated endpoint threat detection and response solution. CYPOINT™ effectively combines decades of security analytics, global threat intelligence, and world-class detection algorithms to eliminate alert fatigue and enable rapid breach response, containment, and remediation. CYPOINT™ is an integral part of CYGUARD™, Digital Hands’ comprehensive security service for enterprise networks, applications, users, data and endpoints. CYGUARD™ enables the intelligent flow of data across all IT, Security Operations, and Incident Response. Deployed virtually, on premise, or in the cloud – CYGUARD™ protects the networks of some of the world’s largest organizations helping them better detect potential threats while significantly lowering their mean detection and remediation times.
Established in 2001, as a Network Security Integrator to Enterprise and Small to Medium Business throughout the Central and Rocky Mountain regions of the U.S., DirSec provides comprehensive consulting services, successful core/edge security solutions, assessments, and implementation services to help customers meet today’s IT and business challenges. As a premier solution provider, we custom tailor systems and solutions to fit current computing needs and your future business goals. By focusing on long-term relationships, DirSec provides critical security technologies and services that protect vital information with the goal of becoming a Trusted Advisor.
ENCODE is a premier provider of Advanced Cyber Threat Management and MSSP solutions with expertise across vertical industries and security technology. ENCODE’s clients includes major commercial companies, banks and telecom organizations across the world supporting them throughout their security life-cycle in mitigating e-risks without reducing the agility of their business. ENCODE is certified against ISO-9001, ISO-27001 /BS7799 standards and is a PCI QSA/ASV certified security provider with offices in London, Dubai and Athens.
The Enterprise Consulting Group is a St. Louis-based premier provider of high-end IT Infrastructure solutions. Our strategy of infrastructure-only concentration, allows our team of highly skilled engineers to focus on the computing and network foundation best suited to run your business and mission-critical systems.
With its unique ‘SuperVAD’ proposition and vision of the ‘Smarter Social Enterprise’, Exclusive Networks Group offers a compelling proposition for vendors looking for faster and more economic market penetration. At the same time, its VARs and reseller partners can gain faster access to these new and emerging technologies, with the additional benefits of competitive differentiation, growth and margin retention.
FishNet Security serves a majority of both Fortune 100 and Fortune 500 companies. It’s among the fastest-growing U.S. information security companies, with annual revenue growth averaging 40 percent during the last three years. The company offers a full suite of information security services and expertise tailored to small, mid-sized and large businesses.
For 43 years, Forsythe has been helping organizations in all industries with their information technology (IT). Using sound strategies and extensive data center expertise, we help companies do more with less. Whether it’s to manage risk, lower costs, secure data or improve performance, we plan, procure, build, migrate and manage IT infrastructure for today and tomorrow. Forsythe creates solutions that make practical business sense from idea to implementation. We help businesses champion innovation and deliver bottom-line results.
Gotham Technology Group specializes in innovative infrastructure solutions. We build agile solutions that enhance the business value of our clients’ technology investments by delivering IT as a service. Our core practices are focused on the secure delivery of applications and data to an increasingly mobile workforce. Our expertise in the areas of infrastructure, virtualization, information security, and application development, supported by highest level vendor partnerships, helps our customers transition services to public and private clouds. Our deep bench of highly skilled engineers and architects is complemented by a technical staff augmentation practice committed to locating the same caliber of resources.
Government Acquisitions is an IT solutions company and a trusted advisor to the Federal Government. Government Acquisitions creatively and competently solves difficult IT challenges for quality-driven, top-level agencies including the Department of Homeland Security, the Department of Treasury, and the US Department of Agriculture.
General Dynamics Fidelis Cybersecurity Solutions’ Breach Response Services are delivered by our Network Defense and Forensics (NDF) team that has extensive experience and expertise responding to sophisticated malware attacks, insider theft of IP and coordinated attacks across the industry spectrum including financial services, retail, manufacturing, healthcare, defense contractors and technology companies. Services include Incident Response, Breach Prevention Assessments, and Litigation Support.
GuidePoint Security provides customized, innovative and valuable Information Security solutions that enable commercial and federal organizations to more successfully achieve their security and business goals. By embracing new technologies, GuidePoint Security helps our clients recognize the threats, understand the solutions, and mitigate the risks present in their evolving IT environments.
Founded in 2011 by veterans of the Information Security industry, GuidePoint Security aims to be our clients’ trusted advisor for both security technologies and professional services. GuidePoint Security differentiates itself through its organizational structure, ensuring that the resources you deal with before the sale have a vested interest in your success following the sale. Our continued referrals and repeat clients reiterate our focus on providing our clients with the right technologies and professional services that support their organization’s goals.
GuidePoint Security is classified as a Small Business by the Virginia Department of Minority Business Enterprise. More details are available at www.dmbe.virginia.gov.
HumanFirewalls is anorganization that prides itself on offering top of the line Security Servicessuch as Security Awareness, Threat Intelligence, Network Security Monitoring,Compliance Management, Vulnerability Management, Integrity Controls, andCloud-based Web and E-mail Security. Humanfirewalls understands thatsmall/midsized companies rarely have the in-house expertise, the time, or thebudget to implement the right security controls that could protect theirorganizations from threats that are now capable to avoid detection and bypasstraditional security controls. Therefore, we have developed differentstrategies that will fit their budget, reduce the risk of getting compromisedand highlight their company’s ROI. We firmly believe that Cyber Security mustbe addressed proactively with next generation continuous endpoint monitoring inorder to identify, respond, contain and recover rapidly from advanced attacks.In addition, we agree that with the implementation of the proper Cyber Security education and high level of awareness, we can establish a powerful form of defense against advanced Cyber Attacks at the primary level.
IT2Trust A/S is one of Scandinavia’s leading distributors of business-critical IT solutions within IT security and networking. We are a different Value-Add Distributor, who does much more than just move products from vendors to resellers and consumers. We focus on our business, innovation, customer needs and last but not least, a long and loyal relationship with both our vendors and resellers.
immixGroup helps technology companies do business with the government. Since 1997, we have helped hundreds of large and emerging companies grow and manage their public sector business while providing federal, state, and local agencies with reliable access to leading commercial technologies through the contract vehicles and partners they prefer.
At Infopath, we deliver projects in a manner that has your best interests in mind. We provide the experience and expertise you expect from the top-tier firms at more affordable rates. For each project, we deploy appropriate oversight and utilize proven, pragmatic methodologies to ensure our teams deliver consistent results. Not only do we help our clients with IT governance, we instill that spirit in everything we do and work with our clients to tailor each project to their specific needs.
INSA is a service and consulting firm specializing in IT Network Security. We recommend and provide network security solutions with support packages that suit the needs of our client regardless of their business size. INSA operates as a value-added distributor and best-of-breed reseller.
INSA holds National Master Standing Offer (NMSO) for security and storage with the Canadian Federal Government. Over the last five years, INSA has served over one hundred customers including Canadian Federal Government departments, Fortune 500 companies, banks, educational institutions, and large and medium enterprises.
Integral Specialist Services (ISS) consist of a group of highly focused specialists concentrating on delivering flexible, tailored or bespoke IT-based solutions including cost reduction, software and hardware compliance and lifecycle management solutions. We guarantee to provide you with services that meet with both your immediate and future business requirements. Integral Specialist Services have client organisations of all sizes that operate in the UK, Europe, and Worldwide and we are pleased to have received many testimonials about the quality and effectiveness of the solutions we provide.
Integralis works with you collaboratively as your trusted information security advisor. Our proactive approach combines a comprehensive portfolio of global security, governance, risk, and compliance solutions that blend expert consulting, managed services, and the most appropriate technologies.
Internet Content Management, Inc. (ICM) is an IT security systems integrator focused on providing cost effective security solutions. ICM provides security integration services, penetration testing and security architecture assessments. Web, Email, and Data security are all core competencies as well as delivering risk management and compliance standards for today’s rigorous regulatory environment. ICM partners with today’s technology leaders to deliver robust, real world solutions with a common sense approach. Founded in 2001 ICM is proud to serve over 350 companies, from small businesses to Fortune 500 companies, across the entire business spectrum.
Intrust IT is a Cincinnati, OH Managed Security Services Provider (MSSP) with over two decades of industry-leading innovation and service excellence. The company exceeds a 99% satisfaction rating every month. With that kind of support backing you up, your business can compete in today’s technology-driven market. Intrust IT can develop a smart IT strategy for you and then execute that strategy so you can focus on your business instead of worrying about technology. As your trusted managed services provider Intrust IT keeps your data secure, your processes efficient, your employees happy, and your IT strategy on track.
Inuit is a software distributor specialized in corporate IT security and system management.
Security Networking Company
Founded in 2001, IPS is a national leader in information security, compliance and managed services. We offer a comprehensive portfolio of services and solutions to help protect organizations from today’s advanced security threats. IPS can help assess your information security technology needs and select solutions that best address your functional, operational and integration requirements, as well as business challenges.
Formerly ATS, Iron Bow Technologies forwards a history of over 20 years as a leading full-lifecycle IT solutions provider to government and industry. Leveraging strong technology though a collaborative engagement model, the company designs and builds security, data center, UC, network and client computing solutions that are on-target with customer missions.
iSECURE is well known within the security community for providing Gartner leading security solutions and services. We provide a full range of security services from risk assessment, vulnerability and penetration testing, to securing your network infrastructure by implementing and managing on-site or cloud-based security solutions.
K logix provides security consulting, technology solutions, and integration services to enterprise companies. Our experienced team and our established process help enterprise customers make confident security decisions that impact their business goals.
Since 1994 KONSULTEK has been delivering technology solutions that Connect, Protect, Inform & Manage the information of clients just like you.
Konsultek’s United States headquarters are located just west of Chicago, Illinois in the Elgin, Illinois technology corridor. Konsultek Europe, Ltd. is located in England. Konsultek is truly a client focused company that has earned a reputation for both its technical excellence as well as its extraordinary client service. No client too big, No client too small From Fortune 100 corporations to local businesses, clients of all sizes look to Konsultek to maximize their efficiency and protect their most critical information.
Whether your incident is the result of a malicious hacker or a negligent employee, Kroll is prepared to respond quickly to cyber security incidents that may have compromised your confidential information. Leveraging a global network of certified security andcomputer forensics experts, Kroll can be onsite within hours to help you contain the situation and determine next steps. Kroll’s advanced incident response team will work side-by-side with you to build a comprehensive, compliant, and timely data breach response plan, drawing from their experience helping countless organizations respond to data loss.
LATUS Solutions is a highly specialized technology integrator that is focused on supporting our clients across the entire information security lifecycle. For the better part of a decade, Latus has been reinventing the way integrators approach their customers with one focus – creating long term value through an undying commitment to their success. This simple philosophy has helped us define a new generation of integration services that better aligns to the needs of our customers and the emerging trends in IT. As a testament to the success of our approach, Latus has quickly become a leading provider of innovative technology, consulting, and managed security services to many of the well-known enterprise, healthcare, retail, and technology organizations across the globe.
Mediarecovery owns one of the biggest Computer Forensics laboratories in Europe, where the search and analysis of the digital evidence is conducted, where the analyses of information security infringement cases, hacking, data leaks, frauds and malpractices are proceed. Our specialists also carry out the analysis at an angle of zero-day threats inside clients’ IT infrastructure. Additionally, the laboratory provides data recovery and data erase services. Mediarecovery is a producer of first EU’s degausser – device to irreversible data erasure – with certification of Military Counterintelligence Service Republic of Poland.
MainNerve provides defense grade cybersecurity services to some of the most elite and protected organizations in the world, including the US Department of Defense, the US Government, as well as respected Global Fortune 500 commercial organizations. MainNerve is proud to be the only cybersecurity firm to be awarded the US SOCOM contract, providing cyber security training to the US Military Elite Forces. Leveraging the vast experience of our handpicked subject matter experts, MainNerve now offers Defense Grade Cybersecurity Services to the commercial small and mid-sized markets in the health services, legal, financial, manufacturing, industrial and retail industries across the US from our global headquarters in Colorado Springs, Colorado. Our cybersecurity offerings provide our clients one of the industries’ best administrative and technical security solutions, which compliment a comprehensive information security program. From top of the line MSSP, to Vulnerability Assessments, to Attack and Penetration Testing, to Incident Response, to our proprietary Adaptive Darknet solution… MainNerve is all about keeping your business’ data and information secure.
Marcum Technology LLC was founded in 2001 and is a proud member of the Marcum Group. We serve global enterprise clients as a trusted information technology solutions provider and value-added reseller. We work with clients and partners by offering solutions based on industry leading knowledge and offer access to qualified experts and advanced technologies. Our team prides itself on delivering unparalleled customer service, technical expertise, and IT business knowledge that results in higher ROI and superior results for our clients.
MARK Enterprises is the premier Information Security provider serving Southern California. Our expert team of consultants and engineers has a singular focus: to exceed every client’s expectations by fully understanding and cost-effectively solving their unique business challenges. Over the past 10 years, MARK Enterprises has helped various organizations from the public and private sectors to design, implement and support world-classEnterprise Security solutions.
Mission Critical Systems is your best source for information, network, and data security solutions. We are dedicated to providing products from the top security manufacturers. Information security is our only business, allowing us to focus fully on delivering market leading products, consulting and integration services. We have been helping companies find solutions to their unique security challenges since 1997. Our wide range of security products and services gives us the flexibility to help you explore all options to keep your Information safe.
Founded in 1996, NET Source is a national leading IT Solutions Provider headquartered in Littleton, Colorado. Our mission is to provide the most reliable and scalable technologies to improve our customers’ IT environments. NET Source’s philosophy is simple; always put the customer first. We provide our customers with the highest standards of independent and customized solutions to address their data management challenges. Simply put… we care about your business!
NET Source is vendor-independent specializing in best-of-breed storage and security solutions to meet your specific IT needs, budget, and objectives. Our experts have planned, designed and implemented a wide variety of solutions to meet availability, backup and disaster recovery, archive and data migration, and security challenges for small to large companies across all horizontal and vertical markets.
NET Source core solutions include:
- Storage and Server Virtualization
- Security and Compliance
- Big Data Analytics
- Archiving / Backup and Recovery
- Unified Computing
- Cloud Infrastructure
Nexum builds and secures networks for organizations across multiple verticals around the world. Nexum meets its customers’ needs through a holistic approach that includes best-in-breed products, professional services, Nexum-branded manufacturer support, authorized training, and monitored and managed security services. At Nexum, We Mean Security®.
The Oxman Group’s Incident Response Service is part of a comprehensive suite of products and solutions that allow businesses to discover, respond and recover from a security incident. Information security threats impact businesses of all sizes and within every industry, so it’s vital to take action as quickly as possible to prevent further financial and reputation damage. The team of certified incident handlers and licensed investigators of The Oxman Group expertly handle all types of security incidents, from malware collection and analysis to targeted attack mitigation and remediation.
As threats to information security increase exponentially, many believe it is not a matter of if but when they will be breached. The need for robust incident response support is critical for companies of all sizes that are increasingly being targeted. Whether you have already been breached, suspect you might be, or just want to know for sure whether or not there is any malware in your network, Polito’s team of IR professionals can augment and enhance your IT Security team. Our services include the full scope of incident response process – from policy review and creation, identification, containment, eradiation, and recovery. We also assist your security team with vulnerability remediation and validation to ensure that the attackers do not regain access to your network. At Polito we strive to establish trust with our clients through our acumen, passion, and tenacity – we secure what’s important to you.
Established in 1987, POSTEC has become of the country’s premier independent POS solution providers. Postec creates exceptional customer value by providing custom solutions based on best of breed hardware and software backed by award winning support services.
Priveon is a leading information security consulting organization that designs and executes truly operational security solutions with an emphasis on efficiency, effectiveness and customer ownership. To accomplish this, Priveon has built a complete suite of InfoSec service offerings that cover the entire lifecycle of security management, including: Consulting, Implementation, Support, Audit and Training.
Prolinx is a trusted IT solutions provider specialising in the development of secure IT as a Service (ITaaS) environments. Prolinx works in partnership with organisations to intelligently provision and manage IT resources reducing costs, enhancing growth and mitigating risk. Prolinx services span desktop, data centre, cloud, cyber security and more. Privately owned and based in Oxfordshire, UK, Prolinx provides a nationwide capability.
Rapid7’s security data and analytics software and services help organizations reduce the risk of a breach, detect and investigate attacks, and build effective IT security programs. With comprehensive real-time datacollection, advanced correlation, and insight into attacker techniques, Rapid7strengthens an organization’s ability to defend against everything fromopportunistic drive-by attacks to advanced threats. Unlike traditionalvulnerability management and incident detection technologies, Rapid7 providesvisibility, monitoring, and insight across assets and users from the endpointto the cloud. Dedicated to solving the toughest security challenges, Rapid7offers proprietary capabilities to spot intruders leveraging today’s #1 attackvector: compromised credentials. Rapid7 is trusted by more than 3,700 organizations across 90 countries, including 30% of the Fortune 1000.
Red Canary continuously monitors customers’ endpoints, reviews suspicious activity, eliminates false positives and provides actionable detections so customers can respond faster.
Red Canary combines best-in-breed technologies and techniques to cover the full kill chain: Carbon Black provides visibility; their Threat Detection Engine delivers unparalleled detection; human analysts provide the intuition and expertise needed to remove false positives. The detailed detections and endpoint visibility with Red Canary assist any team with the essential tools needed for rapid and complete response.
We partner with organizations to maximize the return on information systems investments, while at the same time minimizing their risks. Using IT governance to ensure alignment with business strategies. We manage and implement governance, risk and compliance software applications.
Rkneal is a full-service engineering firm specializing in design, engineering, and technical services. Our qualified engineers have designed and implemented distributed control systems (DCS) and programmable logic controllers (PLC) from many of the industry leaders. In addition to automation controls, Rkneal possesses experience executing projects pertaining to NERC CIP compliance, network design, training, and real-time historians.
SecureOps takes a holistic view to security. A large number of Managed Services providers offer security solutions and services but are only interested in the perimeter and/or network devices. SecureOps does not stop at the perimeter. Of course, this is a simpler business model but security is not a simple service.
Secure Sense Solutions is an IT solution provider specializing in network and security services and product implementation. We offer managed services and professional services, allowing us to deliver optimal custom solutions for our customers. Our unique best-of-breed approach has made us a trusted advisor to some of Canada’s largest organizations.
Secure Technology Hawaii provides expert security and disaster recovery solutions, managed services, hosting, and 365x24x7 technical support to commercial, educational, and government clients in Hawaii, Pacific Rim and CONUS. Our solutions and managed services are based upon 20 years of real world experience with companies of all sizes in both highly regulated and non-regulated environments. We offer a wide range of services and solutions to address comprehensive PCI requirements for our merchant customers.
A managed security service provider that takes pride in delivering innovative and flexible approaches to protecting what is most important to businesses. Sedara couples advanced detection and prevention technologies with an experienced team of analysts and advisors to provide businesses the peace of mind that their compliance programs are effective and their data is secure. Sedara offers a suite of security services for businesses of all sizes and are proud to partner with companies that offer cutting edge capabilities for today’s security landscape.
For over 20 years, Set Solutions, Inc.— a full service provider of network security, secure remote access and bandwidth management solutions—has been in the business of increasing business profitability and growth. If you have network security challenges or just want to improve the health of your network, we can help.
Our secure remote access solutions can drive employee retention and help sustain a happy and healthy mobile workforce, leading to increased profitability and faster growth. We offer a portfolio of leading-edge secure access products and services that focus on delivering customer value and success. We believe that our customers’ needs are first and will not compromise that standard.
We maintain aggressive technical certification and growth with the partners we represent. This allows us to achieve preferred status with those partners and consequently provide significant discounts on maintenance and renewals to our clients. The full line of security products & services we carry enable our clientele to be efficient in their choice of security partners. Providing such a comprehensive set of products also allows us to help our clients avoid disclosing sensitive security designs and configurations to multiple vendors.
Signal Networks is one of the UK’s leading IT Security and IT Support providers, administering ongoing guidance and expertise to an array of organisations. Supporting Global and local clients from their offices in the UK, they can provide a variety of security prevention, detection and responsive services. Through Signal Networks Security Operations Centre, their IT Security experts and ethical hackers can perform an assortment of assessments and run analysis reports to help discover potential weaknesses and vulnerabilities. By utilising the latest security repair, protection and prevention tools, Signal Networks can administer an array of managed IT Security solutions tailored to any size of organisation. These tools help to keep your company data secure with ongoing protection in the most suitable and effective means required.
SHI is a $3 billion privately-held global provider of information technology products and services located in Somerset, N.J. SHI handles software and hardware procurement to deployment planning, configuration, data center optimization, IT asset management and cloud computing, with a wide-range of solutions across IT environments.
By researching and testing computer security threats and products, we provide early-adopter insight and best-in-class solutions for Small to Mid-Sized Businesses. With our Layered Security approach we help bring new technologies successfully to the market, saving our customer’s time and money.
Solutions II is nationally recognized for world-class innovation in virtualization, business continuance, data lifecycle management. and information and network security. Solutions II assists Clients every day, to leverage technologies and services that drive the cost out of IT. Solutions II’s commitment of bringing best-of-breed solutions to Clients includes a services practice dedicated to increasing customer service levels and decreasing the time and support required for implementations to keep their Clients “Performing Ahead of the Curve.”
We are the second largest private solution provider of information security & infrastructure solutions. By combining our unmatched expertise, our delivery of the industry’s best practices, our trusted partners’ cutting-edge solutions, and the resources of Forsythe behind us, we are able to deliver the design to secure your network.
Right now, cyber criminals and terrorists from across the globe are targeting businesses, private organizations and governments. That means you are at riskof losing financial assets, trade secrets, intellectual property, criticaldata, consumer information and much more. SpearTip employs advancedtechnologies, investigative techniques and sophisticated tools previouslyavailable only to heads of state and at executive levels of government. Ourmethodologies advance cyber security to national security level cybercounterintelligence. Our record speaks for itself. SpearTip stands alone asyour best weapon in the fight against security breaches. Our philosophy issimple: it’s never enough just to identify threats. True cyber protection canonly occur when you outmaneuver your adversary. Our client services include Cyber Assessments,ShadowSpearSM (Threat Intelligence), Digital Forensics, IncidentResponse, Managed Security Services, Penetration Testing, and Zero-Day/MalwareAnalysis. You don’t engage us to provide findings. You engage us toproduce results.
Stalwart’s responsiveness and precision engineering have led clients to make statements like, “Stalwart is the Navy Seals of its industry.” Stalwart’s talented team of professionals offers a depth of experience and expertise unmatched in the industry. Our ability to identify opportunities for clients to gain competitive advantage and our proven ability to execute has produced 100% customer loyalty over the past several years.
Security Technology Integration Group, Ltd. (STIGroup) is an Information Security Consulting firm which provides a full suite of Information Security Consulting services. STIGroup designs, implements, and maintains the systems and procedures that permit your business to utilize technology productively while maintaining the security, integrity, and confidentiality of your mission-critical information.
Stroz Friedberg is a global leader in investigations, intelligence and risk management. Companies under attack rely on the firm’s longstanding Incident Response team and its immediate deployment tacticsto assist in the containment, investigation, and remediation of breaches across the world. Our technical-elite, on-the-ground responders, malware specialists, and forensic analysts bring rapid execution skills to help contain and mitigate the assault’s threatening impact on your computer systems. But we are not just first-responders. We are tireless investigators, highly trusted advisors, and experts in designing customized preventative programs which can heighten assurance-levels across your organization. Engaging Stroz Friedberg means having the most talented team on your side to assist in defending an attack and minimizing its potentially far reaching negative effects on the enterprise.
Sylint Cyber Incident Response offers 24/7 rapid response to limit damage, terminate access points and identify assailants. Sylint’s response services involve system analysis, malware collection and review, log analysis, traffic inspection and many other critical components. Cyber Incident Response consultants have extensive knowledge of leading edge threats and incident/breach reporting requirements, and they work discretely with clients, law enforcement agencies and numerous government agencies.
SynerComm is an IT solution provider specializing in security infrastructure, network infrastructure, enterprise mobility, remote access, wireless solutions, audit, penetration testing, and information assurance.
We help our customers make their enterprise networks faster, more dependable, and more secure, so that they can provide their organizations with the best in datacenter performance and enduser experience without putting their data at risk.
Founded in 1989, SynerComm was established to help SMB and enterprise organizations achieve their goals by empathetically listening and working with the organization to meet their initiatives in Application Delivery, and Network and Security Infrastructure.
Tach Tech is an IT solutions provider and value added reseller. The company provides solutions that address four key IT practice areas: Network, Storage, Security, and Virtualization. Tach Tech maintains a diverse client base in terms of verticals served and client size (small to medium enterprise to large global organizations).
Tevora is the nation’s premier security consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations.
The Experts’ Information Assurance and Security deploys best practices to customers in the public and private sector. Whether data is proprietary for financial (banking attacks), medical (health records), or national security reasons, the practices we follow and the sensitivity of our mission is the same. By providing a proactive analysis and response, we are able to allow our customers to minimize disruptions to the organization while mitigating potentially hazardous risks. Be it cyber defense, supply chain/vendor risk management protection, governance, risk management and compliance (GRC), or payment card industry (PCI) security assessments, The Experts’ employs processes and technologies that bring peace of mind to its customers.
The leadership team at Torus Technologies has more than 30 years combined experience working with medium and large healthcare facilities, energy and utility companies, manufacturing companies, retail corporations, state and local government and education entities, financial institutions, and other industries in the commercial field.We strive to build long-term collaborative customer relationships to develop and deliver a proactive security strategy as your security needs evolve and change. Our team members are your security partners and trusted advisors. Over the years, we have developed a methodology that has a proven approach that allows our customers to meet their security objectives and protect their confidential information and important data against ongoing security threats.
Varrow provides world-class technology solutions through advanced consulting, design, and managed services from the industry’s most talented engineers. Our focus includes Cloud, Mobility, and Security solutions. Varrow is known for the quality of our technical talent and the passion of our people. We continually strive to build trusted, caring relationships with our customers, our partners, and each other.
Viperline Solutions is a privately held company headquartered in Birmingham, Alabama with offices in Tennessee and Mississippi. We specialize in Information technology products and services. We bring tomorrow’s cutting edge technology to today’s business. We work with today’s top partners and products to bring the best products and services to your business needs.
WinMill Software is a premier Reseller and Services partner of Bit9. Since 1994, WinMill has been delivering technology solutions with unparalleled service. From strategic management consulting to high-end application development, from designing and deploying broadband wireless solutions to securing applications and networks, WinMill has helped thousands of clients use technology to gain strategic advantage over their competitors. Our security engineers are CISSP and CISA certified and are experts on today’s leading security solutions.