Ascend proudly partners with the best information security technology companies in the world. We have relationships with more than 400 partners to provide you with better, more effective, more integrated solutions that meet the unique requirements of your specific environment.
The directory of the partners listed below represent the foundation of Ascend’s business where we have long-standing relationships, deep technical expertise and a proven track record to provide our clients with technology-enabled security solutions. Ascend is constantly evaluating and vetting the broad information security landscape to provide our clients with the most effective and innovative security technology. Please contact Ascend about other security technology solutions that you have interest in that may not be listed here.
Arbor Networks
Arbor Networks secures the world's most demanding and complex networks from DDoS attacks and advanced threats. Arbor Networks customers gain a micro view of their own network, through our suite of products, combined with a macro view of global Internet traffic and emerging threats, through our ATLAS threat intelligence infrastructure. See, understand and solve more security threats with Arbor Networks.
Aruba Networks
Aruba, a Hewlett Packard Enterprise company, is a leading provider of next-generation networking solutions for enterprises of all sizes worldwide. The company delivers IT solutions that empower organizations to serve the latest generation of mobile-savvy users who rely on cloud-based business apps for every aspect of their work and personal lives.
BeyondTrust
BeyondTrust is a global information security software company that helps organizations prevent cyber attacks and unauthorized data access due to privilege abuse. Our solutions give you the visibility to confidently reduce risks and the control to take proactive, informed action against data breach threats. And because threats can come from anywhere, we built a platform that unifies the most effective technologies for addressing both internal and external risk: Privileged Access Management and Vulnerability Management. BeyondTrust’s security solutions are trusted by over 4,000 customers worldwide, including half of the Fortune 100.
BitSight
BitSight Technologies is transforming how companies manage information security risk with objective, evidence-based security ratings. The company's Security Rating Platform continuously analyzes vast amounts of external data on security behaviors in order to help organizations manage third party risk, benchmark performance, and assess and negotiate cyber insurance premiums.
Black Duck Software
Organizations worldwide use Black Duck’s industry-leading products to automate the process of securing and managing open source software, eliminating the pain related to security vulnerabilities, compliance and operational risk. Black Duck is headquartered in Burlington, MA, and has offices in San Jose, CA, Vancouver, London, Belfast, Northern Ireland, Frankfurt, Hong Kong, Tokyo, Seoul and Beijing.
CA TechnologiesCA Technologies creates software for the application economy, helping companies plan, develop, manage and secure applications and users across mobile, cloud, distributed and mainframe. CA’s Security solutions provide comprehensive capabilities for managing identities and access for employees, partners, customers and IoT. CA Privileged Access Management protects an organization’s most sensitive information with both network- and host-based controls. Integration with CA Identity Suite applies governance to privileged and business users, addressing regulatory compliance (e.g. GDPR), and protection of sensitive data (e.g. HIPAA and PII). Integration with CA SSO and CA API Management extends and simplifies controls for omni-channel engagement and IoT.
Carbon Black is the leading provider of next-generation endpoint security. Carbon Black’s Next-Generation Antivirus (NGAV) solution, Cb Defense, leverages breakthrough prevention technology, “Streaming Prevention,” to instantly see and stop cyberattacks before they execute. Cb Defense uniquely combines breakthrough prevention with market-leading detection and response into a single, lightweight agent delivered through the cloud. With more than 7 million endpoints under management, Carbon Black has more than 2,500 customers, including 30 of the Fortune 100. These customers use Carbon Black to replace legacy antivirus, lock down critical systems, hunt threats, and protect their endpoints from the most advanced cyber attacks, including non-malware attacks.
Centrify is the leader in securing enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises. The Centrify Identity Platform protects against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts. Centrify delivers stronger security, continuous compliance and enhanced user productivity through single sign-on, multi-factor authentication, mobile and Mac management, privileged access security and session monitoring. Centrify is trusted by over 5000 customers, including more than half of the Fortune 50.
Check Point Software Technologies Ltd. offers a complete security architecture defending enterprises’ networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point Software first pioneered the industry with Firewall-1 and its patented Stateful Inspection technology. The foundation of our success is our customer-driven philosophy, our continuous technological innovation, as well as our relentless and pure focus on providing comprehensive, innovative security. Check Point proudly secures 98% of Fortune 500 companies and 100% of Fortune 100 companies with industry leading security products for Threat Prevention, Mobility, Firewalls, Private/Public Cloud Security, Security Management and more.
Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. At Cisco customers come first and an integral part of our DNA is creating long-lasting customer partnerships and working with them to identify their needs and provide solutions that support their success. Cisco has shaped the future of the Internet by creating unprecedented value and opportunity for our customers, employees, investors and ecosystem partners and has become the worldwide leader in networking - transforming how people connect, communicate and collaborate.·
CloudPassage® Halo® is the world’s leading automated security platform that provides instant visibility and continuous protection for servers in any combination of data centers, private clouds and public clouds. The Halo platform is delivered as a service, so it deploys in minutes and scales on-demand. Halo uses minimal system resources; so layered security can be deployed where it counts, right at every workload – servers, instances and containers. Leading enterprises like Citrix, Salesforce.com and Adobe use CloudPassage today to enhance their security and compliance posture, while at the same time enabling business agility.
CrowdStrike is the leader in next-generation endpoint protection, threat intelligence and response services. CrowdStrike’s core technology, the Falcon platform, stops breaches by preventing and responding to all types of attacks – both malware and malware-free. CrowdStrike has revolutionized endpoint protection by combining three crucial elements: next-generation AV, endpoint detection and response (EDR), and a 24/7 managed hunting service — all powered by intelligence and uniquely delivered via the cloud in a single integrated solution. Falcon uses the patent-pending CrowdStrike Threat Graph™ to analyze and correlate billions of events in real time, providing complete protection and five-second visibility across all endpoints.
CyberArk
CyberArk is the only security company that proactively stops the most advanced cyber threats – those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to lock down privileged accounts and protect against cyber threats before attacks can escalate and do irreparable business damage. CyberArk is trusted by the world’s leading companies – including more than 40 of the Fortune 100 – to protect their highest value information assets, infrastructure and applications, while ensuring tight regulatory compliance and audit requirements.
Cylance® is the only company to offer a preventive cybersecurity solution that stops advanced threats and malware at the most vulnerable point: the endpoint. Applying a revolutionary artificial intelligence approach, the Cylance endpoint security solution, CylancePROTECT®, analyzes the DNA of code prior to its execution on the endpoint to find and prevent threats others can’t, while using a fraction of the system resources associated with endpoint antivirus and detect and respond solutions that are deployed in enterprises today.
Digital Guardian is a next generation data protection platform designed to stop data theft. The Digital Guardian platform performs across the corporate network, traditional endpoints, mobile devices and cloud applications to make it easier to see and stop all threats to sensitive data. For more than 10 years, it has enabled data-rich organizations to protect their most valuable assets with an on premise deployment or an outsourced managed security program (MSP). Digital Guardian’s unique data awareness and transformative endpoint visibility, combined with behavioral threat detection and response, enables you to protect data without slowing the pace of your business.
Evident.io is the pioneer and leader in security and compliance automation for public cloud. The Evident Security Platform (ESP) enables organizations of all sizes to proactively manage public cloud security risk — minimizing attack surface and improving overall security posture, all from a single dashboard. ESP continuously monitors an organization’s entire public cloud footprint, identifying and assessing security risks, providing security staff with expert remediation guidance, and enabling painless security auditing and compliance reporting.
Exabeam is a security intelligence solution that leverages existing log, endpoint, and other data to quickly detect modern cyber attacks and accelerate effective response. Unique among UBA products, Exabeam’s Stateful User Tracking™ automatically creates a complete timeline of every event and anomaly tied to an attack -- across devices, IP addresses, and credentials -- and uses that timeline to assess risk and automate many tasks of incident response. As a result, Exabeam not only improves security, but also transforms SOC efficiency and productivity. By operating on existing data and requiring no agents or network taps, Exabeam delivers value within hours, not weeks.
F5 Networks provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, and software defined networking (SDN) deployments to successfully deliver applications to anyone, anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich partner ecosystem of leading technology and data center orchestration vendors. This approach lets customers pursue the infrastructure model that best fits their needs over time. The world’s largest businesses, service providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility trends.
Fidelis Cybersecurity is creating a world where attackers have no place left to hide. We reduce the time it takes to detect attacks and resolve security incidents. Our Fidelis Network™ and Fidelis Endpoint™ products look deep inside your traffic and content where attackers hide their exploits. Then, we pursue them out to your endpoints where your critical data lives. With Fidelis you’ll know when you’re being attacked, you can retrace attackers’ footprints and prevent data theft at every stage of the attack lifecycle.
FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye has over 4,700 customers across 67 countries, including more than 730 of the Forbes Global 2000.
FireMon solutions deliver continuous visibility into and control over network security infrastructure, policies and risk. Using the FireMon Security Intelligence Platform, today’s enterprise organizations, government agencies and managed services providers dramatically improve effectiveness of network defenses, optimizing investments and speeding response to changing business demands. Built around a massively scalable engine and distributed data architecture, FireMon Security Manager and the Policy Planner, Policy Optimizer and Risk Analyzer modules empower proactive firewall cleanup, policy change workflow, compliance assessment and IT risk mitigation – providing a closed loop approach to network security infrastructure management while reducing related expenses.
Forcepoint safeguards users, data and networks against the most determined adversaries, from accidental or malicious insider threats to outside attackers, across the entire threat lifecycle. Forcepoint protects data everywhere – in the cloud, on the road, in the office – simplifying compliance and enabling better decision-making to streamline security. Forcepoint empowers organizations to concentrate on what’s most important to them while automating routine security tasks. More than 22,000 organizations around the world rely on Forcepoint. Based in Austin, Texas, with worldwide sales, service, security, security laboratories and product development, Forcepoint is a joint venture of the Raytheon Company and Vista Equity Partners.
ForeScout Technologies, Inc. is transforming security through visibility. ForeScout offers Global 2000 enterprises and government organizations the unique ability to see devices, including non-traditional devices, the instant they connect to the network. Equally important, ForeScout lets you control these devices and orchestrate information sharing and operation among disparate security tools to accelerate incident response. Unlike traditional security alternatives, ForeScout achieves this without requiring software agents or previous device knowledge. The company’s solutions integrate with leading network, security, mobility and IT management products to overcome security silos, automate workflows and enable significant cost savings. As of April 2016, more than 2,000 customers in over 60 countries improve their network security and compliance posture with ForeScout solutions.
Fortinet secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network - today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud or mobile environments. More than 270,000 customers worldwide trust Fortinet to protect their businesses.
Gemalto is a global leader in digital security, bringing trust to an increasingly connected world. We deliver a vast range of technologies and services to businesses, governments and other organizations, protecting identities and data so they’re kept safe wherever they’re found: in personal devices, connected objects, the network, the cloud and in between. Our solutions are at the heart of modern digital life, from payments and the cloud to big data and the Internet of Things. They encrypt data and authenticate people and things – enabling our clients to deliver secure, innovative services for billions of individuals and devices.
Gigamon (NYSE: GIMO) provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric™ and GigaSECURE®, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network, and application performance management solutions in enterprise, government, and service provider networks operate more efficiently. As data volumes and network speeds grow and threats become more sophisticated, tools are increasingly overburdened. One hundred percent visibility is imperative. Gigamon is installed in more than three-quarters of the Fortune 100, more than half of the Fortune 500, and seven of the 10 largest service providers.
GuardiCore is an innovator in data center and cloud security focused on delivering more accurate and effective ways to stop advanced threats through real-time breach detection and response. Developed by the top cyber security experts in their field, GuardiCore is changing the way organizations are fighting cyber attacks in their data centers.
Guidance Software provides a foundation of applications and services for companies and governments looking to secure their digital environments from internal and external threats. As the makers of Encase security products, we help legal, law enforcement and security professionals find and neutralize threats and bring digital chaos under control with lightning fast intervention.
For decades, organizations have turned to Hewlett Packard Enterprise for complete enterprise security solutions. HPE discovers and remediates up to 10 times as many vulnerabilities as any other organization in the world. Nine of the world’s ten largest banks trust us to protect more than $9 trillion in daily transactions. All told, we monitor more than 23 billion security events monthly and manage more than 1.5 million security specific devices globally. Hewlett Packard Enterprise advocates an integrated approach to security, one that starts with a single, comprehensive view of risk across the enterprise, and driven by our clients’ enterprise priorities and goals. Although, we know that everything in an organization can never be completely secure, by focusing on your critical digital assets and the interactions between them you can implement a more proactive and effective pan-enterprise approach to security and risk management.
As security threats have grown more sophisticated, invasive and collaborative, traditional practices and point-product security solutions no longer offer enough protection.IBM Security provides a more effective, analytics-based, integrated solution that enables your security program to act like an immune system. With security intelligence at the core, our approach helps you optimize security, stop advanced threats, protect critical assets and deliver digital transformation.
Imperva® (NYSE:IMPV) is a leading provider of cyber security solutions that protect business-critical data and applications. The company’s SecureSphere, CounterBreach, Incapsula and Skyfence product lines enable organizations to discover assets and risks, protect information wherever it lives – in the cloud and on-premises – and comply with regulations. The Imperva Defense Center, a research team comprised of some of the world’s leading experts in data and application security, continually enhances Imperva products with up-to-the minute threat intelligence, and publishes reports that provide insight and guidance on the latest threats and how to mitigate them.
Infoblox
Infoblox delivers Actionable Network Intelligence to enterprise, government, and service provider customers around the world. As the industry leader in DNS, DHCP, and IP address management, the category known as DDI, Infoblox provides control and security from the core—empowering thousands of organizations to increase efficiency and visibility, reduce risk, and improve customer experience.
IntSights intelligence solution automatically detects cyber threats in real time, in open, deep and darknet platforms, aggregates the information and presents it to the customer in one consolidated view. IntSights's data mining algorithm and machine learning capabilities are utilized to analyze, categorize and prioritize this information, and then react by enabling one-click remediation of the identified threat. This actionable information is automatically transferred to the relevant security product (i.e. Firewall) in order to make the necessary adjustments and block any new, impending threats.
Ixia (Nasdaq: XXIA) is a fast–growing global provider of world-class solutions for network visibility, security, and performance validation. Since 1997, Fortune 100 companies, the world’s leading carriers, government agencies and IT manufacturers have relied upon Ixia innovations to maximize network performance and security. Ixia’s ThreatARMOR™, Vision ONE™, and BreakingPoint™ Virtual Edition (VE) offerings leverage cloud-based feeds from the company’s Application and Threat Intelligence (ATI) Research Center to strengthen network security. Companies launching new applications and services and managing IT operations can leverage these and other Ixia solutions to maximize performance and increase their return on investments (ROI) in IT.
Juniper Networks challenges the status quo with innovative and secure products, solutions and services critical to customers -- by transforming the economics of secure networking in the connected world. We create the most scalable, secure and cost-effective networks for unprecedented agility, efficiency and value. Juniper’s new Software-Defined Secure Network (SDSN) secures your entire network—physical and virtual— providing end-to-end visibility leveraging cloud economics to find and stop threats faster.
Deploying Lieberman Software Privileged Identity Management solutions immediately relieves your IT staff from the need to change or manage privileged accounts by hand via auto-discovery and automation. Our automation means quick ROI, reduction of compromised surface area (in minutes) and easy deployment at any scale (up to millions of systems and even billions of identities). The Lieberman Software trained Ascend team provides our methodology and technology to handle your most complex privileged access and identity management challenges with world class expertise to protect you against criminal and nation state threats.
LogRhythm, the leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s patented and award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint forensics, and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence.
McAfee is one of the world’s leading independent cyber security companies. Inspired by the power of working together, McAfee creates business and consumer solutions that make the world a safer place. By building solutions that work with other companies’ products, McAfee helps businesses orchestrate cyber environments that are truly integrated, where protection, detection and correction of threats happen simultaneously and collaboratively. By protecting consumers across all their devices, McAfee secures their digital lifestyle at home and away. By working with other security players, McAfee is leading the effort to unite against cyber criminals for the benefit of all.
NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT) is a market leader in real-time service assurance and cybersecurity solutions for today’s most demanding service provider, enterprise and government networks. NETSCOUT’s Adaptive Service Intelligence (ASI) technology continuously monitors the service delivery environment to identify performance issues and provides insight into network-based security threats, helping teams to quickly resolve issues that can cause business disruptions or impact user experience. NETSCOUT delivers unmatched service visibility and protects the digital infrastructure that supports our connected world.
Netskope™, the leading cloud access security broker (CASB), helps enterprises find, understand and secure sanctioned and unsanctioned cloud apps. Through contextual awareness and a multi-mode architecture, Netskope sees the cloud differently. This results in the deepest visibility and control, the most advanced threat protection and data loss prevention and an unmatched breadth of security policies and work flows. The world’s largest companies choose Netskope, the only CASB that ensures compliant use of cloud apps in real-time, whether accessed on the corporate network, remotely or from a mobile device. With Netskope, enterprises move fast, with confidence. To learn more, visit our website.
Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security protections. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications. Because Okta runs on an integrated platform, organizations can implement the service quickly at large scale and low total cost. Thousands of customers, including Adobe, Allergan, Chiquita, LinkedIn, MGM Resorts International and Western Union, trust Okta to help their organizations work faster, boost revenue, and stay secure.
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization’s most valuable assets.
Phantom is the first community-powered security automation and orchestration platform. It integrates your existing security technologies, providing a layer of connective tissue between them. The Phantom platform helps you work smarter by automating repetitive tasks, effectively force multiplying your team’s efforts and allowing them to focus their attention on mission-critical decisions. It also helps you respond faster and reduce dwell times with automated detection, investigation, and response. Using Phantom helps you strengthen your defenses by integrating your entire security infrastructure together so that each part is actively participating in your defense strategy.
Ping Identity is the leader in Identity Defined Security™ for the borderless enterprise, allowing the right people to access the right things, securely and seamlessly. More than half of the Fortune 100 trusts Ping to accelerate their move to the Cloud, deliver rich customer experiences and onboard partners as part of their digital transformation. Ping provides the freedom to access applications with an enterprise IDaaS solution that includes multi-factor authentication, single sign-on and access security. Together Ping and Ascend lead the Identity Defined Security Alliance, established in 2015, to provide CISOs a complete blueprint, use cases and integrated best of breed solutions for implementing a holistic Identity Defined Security solution for the modern enterprise.
Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media. Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.
Pulse Secure, LLC is a leading provider of access and mobile security solutions to both enterprises and service providers. Enterprises from every vertical and of all sizes utilize the company’s Pulse virtual private network (VPN), network access control and mobile security products to enable end user mobility securely and seamlessly in their organizations. Pulse Secure’s mission is to enable open, integrated enterprise system solutions that empower business productivity through seamless mobility.
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 8,800 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications.
Radware® is a global leader of cyber security and application delivery solutions for virtual, cloud and software defined data centers. Radware’s Hybrid Attack Mitigation System encompasses on-premises DDoS Protection, cloud-based Security Services, Encrypted (SSL/TLS) Attack Protection & Outbound Inspection and Web Application Firewall. We believe that Radware’s continued recognition in Gartner’s Magic Quadrant for Application Delivery Controllers demonstrates our commitment to ensure that mission-critical business applications are available and performing optimally at all times. The combination of Radware’s strong architectural approach, the powerful security integrations, and the advanced customization, automation and programmability of Radware’s offerings are what keep our customers up and running.
Rapid7 is a leading provider of security data and analytics solutions that enable organizations to implement an active, analytics-driven approach to cybersecurity. We combine our extensive experience in security data and analytics and deep insight into attacker behaviors and techniques to make sense of the wealth of data available to organizations about their IT environments and users. Our solutions empower organizations to prevent attacks by providing visibility into vulnerabilities and to rapidly detect compromises, respond to breaches, and correct the underlying causes of attacks.
RSA provides more than 30,000 customers around the world with the essential capabilities to protect their most valuable assets from cyber risks and threats. With RSA’s award-winning products, organizations effectively detect, investigate, and respond to advanced attacks; assure and manage identities; implement governance, risk, and compliance processes; and ultimately, reduce IP theft, fraud, and cybercrime.
As the fastest-growing, independent identity and access management (IAM) provider, SailPoint helps hundreds of global organizations securely and effectively deliver and manage user access from any device to data and applications residing in the datacenter, on mobile devices, and in the cloud. The company’s innovative product portfolio offers customers an integrated set of core services including identity governance, provisioning, and access management delivered on-premises or from the cloud (IAM-as-a-service).
SecureAuth empowers organizations to determine identities with confidence. Whether you are seeking to reduce risk around employee, customer or partner access, SecureAuth’s flexible and adaptive platform makes everything fast, frictionless and pain-free. SecureAuth provides a new approach by combining multi-factor authentication, single sign-on and user self-service tools together, allowing strong identity security without sacrificing the user experience. SecureAuth can protect on-premises, cloud, mobile, and homegrown applications by detecting the use of compromised credentials, enabling security teams to quickly respond to cyber threats.
Securonix radically transforms enterprise security with actionable intelligence. Our purpose-built security analytics platform mines, enriches, analyzes, scores and visualizes data into actionable intelligence on the highest risk threats to organizations. Using signature-less anomaly detection techniques, Securonix detects data security, insider threat and fraud attacks automatically and accurately.
Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address their most critical risks. Our award-winning solutions are used by the world’s most security-conscious enterprises, government agencies and organizations for vulnerability management, threat intelligence management and security policy management. Many of our customers are on Forbes’ Global 2000 List, including six of the top 10 global banks and six of the 10 largest NATO member countries.
Skyhigh Networks, the leading cloud security and enablement company, allows enterprises to safely adopt cloud services while meeting their security, compliance, and governance requirements. Over 500 enterprises including Aetna, DIRECTV, General Mills, HP, and Western Union use Skyhigh to gain visibility, manage threats, ensure compliance and protect corporate data across shadow and sanctioned cloud services. Headquartered in Campbell, Calif., Skyhigh Networks is backed by Greylock Partners, Sequoia, and Salesforce.com.
Splunk Inc. (NASDAQ: SPLK) is the market-leading platform that powers Operational Intelligence. We pioneer innovative, disruptive solutions that make machine data accessible, usable and valuable to everyone. More than 11,000 customers in over 110 countries use Splunk software and cloud services to make business, government and education more efficient, secure and profitable.
STEALTHbits is a data security software company. We protect organizations from malicious access to their information. By defending against credential theft and abuse, and giving customers insight into the access and ownership of their unstructured data, we reduce security risk, fulfill compliance requirements and decrease operations expense.
Sumo Logic is a secure, cloud-native, machine data analytics service, delivering real-time, continuous intelligence from structured, semi-structured and unstructured data across the entire application lifecycle and stack. More than 1,000 customers around the globe rely on Sumo Logic for the analytics and insights to build, run and secure their modern applications and cloud infrastructures. With Sumo Logic, customers gain a multi-tenant, service-model advantage to accelerate their shift to continuous innovation, increasing competitive advantage, business value and growth.
Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton and LifeLock product suites to protect their digital lives at home and across their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats.
Tanium gives the world’s largest enterprises and government organizations the unique power to secure, control, and manage millions of endpoints across the enterprise within seconds. Serving as the “central nervous system” for enterprises, Tanium empowers security and IT operations teams to ask questions about the state of every endpoint across the enterprise in plain English, retrieve data on their current and historical state, and execute change as necessary, all within seconds. With the unprecedented speed, scale, and simplicity of Tanium, organizations now have complete and accurate information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of efficiency in IT operations.
Tenable Network Security transforms security technology for the business needs of tomorrow through comprehensive solutions that provide continuous visibility and critical context, enabling decisive actions to protect your organization. Tenable eliminates blind spots, prioritizes threats, and reduces exposure and loss. With more than one million users and more than 20,000 enterprise customers worldwide, organizations trust Tenable for proven security innovation. Tenable's customers range from Fortune Global 500 companies, to the U.S. Department of Defense, to mid-sized and small businesses in all sectors, including finance, government, healthcare, higher education, retail and energy.
TITUS solutions enable organizations to discover, classify, protect and confidently share information, and meet regulatory compliance requirements by identifying and securing unstructured data. TITUS products enhance data loss prevention by classifying and protecting sensitive information in emails, documents and other file types – on the desktop, on mobile devices, and in the Cloud.
Trend Micro is instrumental in bringing advanced security solutions that address the challenges faced by Ascend’s customers. Their solutions protect end users on any device, optimize security for the modern data center, and secure networks against breaches from targeted attacks. As an early adopter of virtualization and cloud computing, Trend Micro gained a clear understanding of extending threat protection into emerging cloud environments, resulting in product innovations that continue to evolve. As the market leader in cloud security, virtualization security and server security, their solution is the only true cloud security platform optimized for today’s virtualization and cloud environments.
Tripwire solutions are based on asset visibility and deep endpoint intelligence combined with business context; together these integrate and automate security and IT operations. Tripwire’s portfolio includes configuration and policy management; file integrity monitoring, vulnerability and log management, reporting and analytics. Tripwire is the leading expert of continuous compliance and automation, enabling customers to implement a comprehensive security policy while preparing and responding effectively to audits. Tripwire provides trustworthy guidance to achieve and maintain compliance for PCI, NERC, SOX, HIPAA, NIST, and more. Tripwire has developed integrations with over 80 technology alliance partners, working together to make our customers’ entire security infrastructure more resilient.
Varonis is a leading provider of software solutions that protect data from insider threats and cyberattacks. Varonis allows organizations to analyze, secure, manage, and migrate their volumes of unstructured data, which often contain an enterprise’s financial information, product plans, strategic initiatives, intellectual property, and confidential employee, customer or patient records.
Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity—cryptographic keys and digital certificates—so they can’t be misused by bad guys in attacks. Venafi does this by constantly assessing which keys and certificates are trusted, protecting those that should be trusted, and fixing or blocking those that are not. As the market leader in key and certificate management and security, Venafi protects against the misuse of SSL/TLS keys and certificates, SSH keys, and WiFi, VPN, and mobile certificates, eliminating security blind spots from threats hidden in encrypted traffic. Venafi customers include the world’s leading Global 5000 companies.
Veracode, the leading pure-play application security vendor in the Gartner Magic Quadrant, delivers the application security solutions and services today’s software-driven world requires. Veracode’s unified platform assesses and improves the security of applications from their inception through production so that businesses can confidently innovate with the web and mobile applications they build, buy and deploy as well as the components they integrate into their environments. With its powerful combination of automation, process and speed, Veracode seamlessly integrates application security into the software lifecycle, effectively eliminating vulnerabilities during the lowest-cost point in the development/deployment chain, and blocking threats while in production.
Verodin is defining the emerging concept of Instrumented Security. The company’s revolutionary platform empowers customers to measure and continuously validate the cumulative effectiveness of layered security infrastructures – across technologies and people – revealing true security postures. Through automated defense analysis, Verodin customers achieve maximum value from security spending, better leverage existing security investments and measurably improve their cyber prevention, detection and response capabilities.
VMware, a global leader in cloud infrastructure and business mobility, accelerates our customers’ digital transformation journey by enabling enterprises to master a software-defined approach to business and IT. With VMware solutions, organizations are creating exceptional experiences by mobilizing everything, responding faster to opportunities with modern data and apps hosted across hybrid clouds, and safeguarding customer trust with a defense-in-depth approach to cybersecurity.
Vormetric’s comprehensive high-performance data protection platform helps companies move confidently and quickly. Our seamless and scalable platform is the most effective way to protect data wherever it resides—any file, database and application, in any server environment. Advanced transparent encryption, powerful access controls and centralized key management let organizations encrypt everything efficiently, with minimal disruption. Regardless of content, database or application—whether physical, virtual or in the cloud—Vormetric Data Protection enables confidence, speed and trust by encrypting the data that builds business. Vormetric Data Protection was recently acquired by Thales Group and is now a Thales company.
WhiteHat Security is a leader and pioneer in the field of application security. We combine technology and human intelligence to deliver solutions that reduce risk, reduce cost and accelerate the deployment of secure applications and web sites. We provide web application security and risk reduction by combining best-in-class application security technology with the expertise of over 150 security researchers from our Threat Research Center. WhiteHat Security secures applications throughout their entire lifecycle. We do this through our flagship product, the WhiteHat Sentinel™ software-as-a-service (SaaS) application security platform, which enables our customers to quickly deploy a scalable application security program.
Zscaler is revolutionizing Internet security with the industry’s first Security as a Service platform. As a Gartner Magic Quadrant leader for Secure Web Gateways, Zscaler delivers a safe and productive Internet experience for every user, from any device and from any location — 100% in the cloud. With its multi-tenant, distributed cloud security platform, Zscaler effectively moves security into the internet backbone, operating in more than 100 data centers around the world and enabling organizations to fully leverage the promise of cloud and mobile computing with unparalleled and uncompromising protection and performance. Zscaler delivers unified, carrier-grade internet security, next generation firewall, web security, sandboxing/advanced persistent threat (APT) protection, data loss prevention, SSL inspection, traffic shaping, policy management and threat intelligence.