Define: On-premises software?
On-premises software is installed and runs on computers on the premises of the person or organization using the software, rather than at a remote facility such as a server farm or cloud. On-premises software is sometimes referred to as “shrinkwrap” software, and off-premises software is commonly called “software as a service” (“SaaS”) or “cloud computing”.
Top On-Premises Security Companies and Solutions
This article showcases Threat.Technology’s top picks for the best On-Premises Security solutions. We selected these companies for exceptional performance in one of these categories:
- Innovative ideas
- Innovative route to market
- Innovative product
- Exceptional growth
- Exceptional growth strategy
- Societal impact
ESET has set the bar for threat protection, prevention, and security services in over 200 countries for more than 30 years. With award-winning IT security software that has kept customers at the center of its development, ESET has created trust with consumers far surpassing its competitors. As a market-leading vendor in on-premises security and antivirus software, ESET is known for its powerful yet lightweight cybersecurity solutions that enable gamers to be protected while maximizing their gaming experience.
As the world becomes more digital, it’s vital to stay protected. ESET is constantly innovating to be ahead of the curve so that when new security threats arise, users are covered. With the ESET server security included with all on-premises security options, you get advanced protection for your company’s data passing through all general servers. This feature allows your business to operate seamlessly while protecting against ransomware, data breaches and botnets.
The proliferation of digital access has made the world more connected than ever before. Trust is the common thread that connects today’s elastic enterprise–trust that your identity solution will be there when you need it most and trust that your end-users know their information is safe.
The OneLogin Trusted Experience Platform is the identity foundation to build secure, scalable and smart trusted experiences that connect people with technology. With OneLogin, seamlessly manage digital identities for your workforce and customers, so you can focus on what matters most–growing your business.
With OneLogin’s complete solution, you can easily connect all of your applications, leverage our proprietary machine learning to identify and analyze potential threats and act quickly using contextual authentication requirements. Secure: Security is the cornerstone of trust.
It’s the confidence that your identity solution is reliable and always-on, so you can focus on what matters–growing the business. The OneLogin platform protects your organization against threats by securing and centralizing your applications, devices, and end-users all in one, easy-to-access place.
Additionally, through our advanced machine learning capabilities, OneLogin can deliver real-time threat intelligence to help automate the process of keeping your business secure. Scalable: The OneLogin Trusted Experience Platform was built for performance and reliability at scale.
With a wide breadth of extensible functionality, we can expand and retract according to the changing needs of your business. Through our enterprise-grade change management solutions, like our Enterprise Sandbox and API Access, you can quickly test large-scale changes before going live in your production instance.
Expel is a SOC-as-a-service platform that provides security monitoring and response for cloud, hybrid, and on-premises environments. Expel use the security signals its customers already own so organizations can get more value from their existing security investments.
It connects to customer tech remotely through APIs, not agents, so its SOC can start monitoring a customer’s environment in a matter of hours, letting their internal teams get back to focusing on the most strategic security priorities that are unique to their business. The company was founded in 2016 and is headquartered in Herndon, Virginia..
Alert Logic, the leader in security and compliance solutions for the cloud, provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure resides.
Alert Logic partners with the leading cloud platforms and hosting providers to protect over 3,600 organizations worldwide. Built for cloud scale, the Alert Logic patented platform stores petabytes of data, analyses over 400 million events and identifies over 50,000 security incidents each month, which are managed by its 24×7 Security Operations Center.
Alert Logic, founded in 2002, is headquartered in Houston, Texas, with offices in Seattle, Dallas, Cardiff, Belfast and London. The company’s products and services include: o SaaS Solutions -Threat Manager – Intrusion Detection -Log Manager – Log Management & SIEM -Web Security Manager – Web Application Firewall -ScanWatch – Vulnerability Assessment -Amazon Web Services Cloud Security – Intrusion Detection for AWS o Managed Security Services -ActiveWatch & ActiveWatch Premier -LogReview Alert Logic was founded in 2002.
For more information, please visit http://www.alertlogic.com. .
Tigera provides Zero Trust network security and continuous compliance for Kubernetes platforms. Tigera Secure extends enterprise security and compliance controls to Kubernetes environments with support for on-premises, multi-cloud, and legacy environments.
Tigera powers all of the major Hosted Kubernetes environments including Amazon EKS, Azure AKS, Google GKE, and IBM Container Service. Tigera is also integrated with the major on-premises Kubernetes deployments and is shipped “batteries included” in Docker EE and fully integrated with Red Hat OpenShift.
Tigera Secure builds on leading open source projects: Kubernetes, Calico, and Istio, which Tigera engineers maintain and contribute to as active members of the cloud-native community. Our employees are experts in securing Kubernetes and our technology is deployed in the largest SaaS, financial services, gaming, and retail companies where security and compliance are critical to the business..
Stellar Cyber is an automated detection and response (Open-XDR) platform that correlates detections from existing solutions as well as its own security applications to deliver comprehensive protection across the cybersecurity kill chain and present them through one intuitive dashboard. Customers can leverage 20 native applications and a growing list of open ecosystem partners to detect and respond automatically to attacks within seconds wherever they occur on servers, in the network, at endpoints, or in cloud-based applications.
Stellar Cyber deploys easily on premises, in public clouds or with service providers.. .
SecureAuth is the leader in IDaaS and adaptive MFA solutions, empowering organizations to protect identities from cyber threats. SecureAuth provides authentication security, Single Sign-On, and user self-service tools together in a single SaaS platform.
Machine learning-based adaptive authentication workflows can protect on-premises, cloud, mobile, and VPN applications. Currently protecting over 5 million users worldwide including Western Union, Unisys, FBI, Toshiba, Ticketmaster, General Mills, and more..
Digital Guardian provides the industry’s only data protection platform that is purpose-built to stop data theft from both insiders and external adversaries. The Digital Guardian Data Protection Platform performs across the corporate network, traditional endpoints, and cloud applications.
It’s buttressed by the DG Cloud, a big data security analytics backend that sees and blocks all threats to sensitive information. For more than 15 years, it has enabled data-rich organizations to protect their most valuable assets with a choice of on premises, SaaS or managed service deployment.
Digital Guardian’s unique data awareness, combined with threat detection and response, enables organizations to protect data without slowing the pace of their business. It was founded in 2003 and is headquartered in Waltham, Massachusetts, United States..
Preempt secures all workforce identities to accelerate digital transformation. Since 80% of all breaches involve compromised credentials, Preempt unifies security visibility and control for on-premises and cloud identities.
Threats are preempted and IT policy enforced in real-time using identity, behavioral, and risk analytics. Preempt protects 4M+ workforce identities across 400+ enterprises.
Customers have reduced the cost required to stop advanced threats and accelerate Zero Trust and Conditional Access initiatives. Founded in 2014, Preempt is headquartered in Silicon Valley, with R&D in Israel and sales offices worldwide..
Big Switch Networks
Big Switch Networks is the Cloud-First Networking company, bringing public cloud-style networking and hybrid cloud consistency to organizations around the world. The company provides data center switching, monitoring, visibility and security solutions for on-premises enterprise cloud, public cloud and multi-cloud environments that enable companies of all sizes to dramatically increase operational efficiency, increase business agility, and reduce networking costs.
Big Switch was founded in 2010, with roots in the original Stanford research team that invented software-defined networking. Big Switch has strategic partnerships with Dell EMC, HPE and Edgecore, delivering innovative software on industry-standard open networking hardware.
Since its founding the company has been an active member and contributor to multiple open source communities. Big Switch Networks is headquartered in Santa Clara, CA, with a dedicated presence across more than 25 countries.
To learn more: www.bigswitch.com. .
Founded in 2009, Netsparker Ltd develops a leading-edge web application security solution. The combination of dead accurate scanning with proprietary automatic exploitation technology brought Netsparker early success, and the company is now a recognized leading player in the web application security industry.
Netsparker can identify vulnerabilities in all types of modern web applications, regardless of the underlying architecture or platform. Upon identifying an exploitable vulnerability, the Netsparker scanner uses unique Proof-Based Scanning™ technology to generate a proof of exploit that shows the result is not a false positive.
Netsparker is available as desktop software, a managed service, or an on-premises solution. It is trusted and used by world-renowned organizations from all industry verticals, including Samsung, NASA, Microsoft, ING Bank, and Ernst & Young..
AvePoint is a technology company providing infrastructure management software solutions for Microsoft SharePoint products and technologies. The company also focusing on class big data management, governance, and compliance software solutions for next-generation social collaboration platforms.
AvePoint is first to market with a unique solution that centralizes access and control of information assets residing in disparate collaboration and document management systems on-premises and in the cloud. The company’s solutions and services aim to bring together business, IT, as well as compliance and risk officers to serve key business objectives such as big data, cloud integration, compliance, enterprise content management, and mobile data access monitoring.
AvePoint was founded in 2001 and based out of Jersey City, NJ, serves more than 13,000 organizations in five continents across all industry sectors, with focused practices in the energy and utilities; financial services; healthcare and pharmaceuticals; and public sector industries. AvePoint is a Depth Managed Microsoft Gold Certified Application Development Partner and Gold Certified Collaboration and Content Partner, as well as a US Government GSA provider via strategic partnerships..
Dataguise is the leading provider of Big Data security intelligence and protection solutions. Enterprises in the financial services, healthcare, high tech, government and other industries rely on Dataguise for discovery, data masking, encryption, and intelligence for their sensitive data within Hadoop and other Big Data environments.
This allows them to effectively identify information in need of protection and to address regulatory compliance risk. Customers using DgSecure for Hadoop, DG for DBMS, DG for SharePoint and DG for Files are able to enforce the most appropriate remediation policies for data stored on premises or in the cloud.
Dataguise is recognized as a visionary by one of the world’s leading analyst firms for its ability to help its customers to reduce the risk of data breaches and to remain compliant with leading regulations designed to protect personally identifiable information (PII) such as the Health Insurance Portability and Accountability Act (HIPAA), The Health Information Technology for Economic and Clinical Health (HITECH), and the Payment Card Industry (PCI) DSS. For more information visit: http://dataguise.com/..
Concentric’s Semantic Intelligence solution delivers data risk insights across the entire inventory of sensitive documents in the cloud and on-premises. Its deep learning technology examines each document’s content and context for efficient actionable security.
It scans the documents, identifies sensitive or business-critical data, evaluates the risk each document poses and highlights critical concerns that need immediate attention. The company was founded in 2018 and is headquartered in San Jose, California..
BlueTalon is a provider of data-centric security for big data, data lakes, and new data initiatives. The company’s Policy Engine delivers precise, consistent, and dynamic user access controls to data across Hadoop, Spark, Cassandra, and SQL-based data platforms.
The BlueTalon Audit Engine provides a full audit trail at the level of detail required for compliance to regulations: user and data. Fortune 100 have deployed BlueTalon to eliminate security blind spots and gain visibility and control at the data layer across cloud-based and on-premises environments.
BlueTalon was named a 2016 Gartner cool vendor and won numerous security and big data awards.. .
Netwrix Corporation was first to introduce visibility and governance platform for on-premises, hybrid and cloud IT environments. More than 160,000 IT departments worldwide rely on Netwrix to detect insider threats on premises and in the cloud, pass compliance audits with less expense and increase productivity of IT security and operations teams.
Founded in 2006, Netwrix has earned more than 100 industry awards and been named to both the Inc. 5000 and Deloitte Technology Fast 500 lists of the fastest growing companies in the U.S.
For more information, visit www.netwrix.com.. .
Ping Identity provides cloud-based identity management software for companies and government organizations. They help enterprises achieve Zero Trust identity-defined security & more personalized, streamlined user experiences.
The Ping Intelligent Identity Platform provides customers, employees, partners, and, increasingly, IoT, with access to the cloud, mobile, SaaS, and on-premises applications and APIs, while also managing identity and profile data at scale. Ping Identity was founded in 2002 and headquartered in Denver, Colorado..
TIG is a provider of cloud services, unified communications, and infrastructure solutions. TIG leverages the Microsoft Enterprise Mobility Suite to provide a comprehensive suite of identity and data access management solutions with Azure Active Directory (AAD) and AAD Premium to manage users and groups, and help secure access to on-premises and cloud applications.
TIG EMS with Azure AAD Premium allows you to enable self-service features for your employees, such as self-service password change/reset and application access, while still maintaining a high level of security through features like on-premises and Azure-based Multi-Factor Authentication (MFA). TIG was established in 1999 and is based in Watford,, England..
Zentera Systems specializes in secure and agile connectivity solutions for the digitally-transformed enterprise. Its Systems’ flagship CoIP Platform provides award-winning Zero Trust networking, security, and multi-cloud connectivity that overlays on top of any infrastructure in any fragmented environment, allowing customers to be up and running in less than a day.
The CoIP Platform has been deployed by global enterprises to secure employee and third-party network access for compliance, protect sensitive data against leaks, and instantly connect hybrid applications and containers running in the cloud and on-premises. The Silicon Valley-based company has received numerous recognitions, including Cool Vendor for Cloud Security by Gartner..
Storage Made Easy
Storage Made Easy® is the trading name of Vehera LTD, a UK Limited Company with the company registration number of 07079346. Storage Made Easy provides a software solution, the Enterprise File Fabric™, which integrates and unifies a company’s File and Object Storage accessible through a global file system.
The File Fabric unlocks the benefits and cost-efficiency of a companies file and object data assets whilst providing strict controls and governance for legislative compliance and security concerns such as ransomware attacks. Existing file-based storage infrastructures can be transformed into an on-premises private cloud, delivering a storage-as-a-service model to the company.
Object storage can be connected and available alongside file base storage, expertly managed by the File Fabric as a unified hybrid cloud storage platform. The File Fabric is able to provide a unified view of a companies assets that can be dispersed across file and object spread across cloud storage and on-premises storage.
M-Stream, a feature of the File Fabric, can accelerate large file/object data to/from destinations. FIPS certified encryption ensures assets are protected in-flight and at-rest.
Smart indexing and data classifications, with Cloud AI integrations, ensures assets can be easily catalogued and found. The company is backed by Moore Strategic Ventures, LLC, the private investment vehicle of Louis M.
Bacon, in addition to entrepreneurs in the London market insurance industry, who have previously successfully sold their company to a listed peer, and. .
Veracity Industrial Networks
Veracity is a resilient and secure industrial network that provides an on-premises, centralized configuration, control, and monitoring solution that manages all connected devices and their communications. The Veracity platform is a secure-by-design, deny-by-default network that moves beyond the detection and alerting of cyber events into a resilient network that reduces the attack surface.
Veracity massively reduces the complexity of the network by repurposing the switch infrastructure to ensure communication between devices is determined by the system’s design. Veracity provides an innovative and comprehensive platform for critical networks that enables your business mission.
For more information, visit www.veracity.io. .
The UnboundID Platform is enterprise software for identity and preference management, deployed on premises or in the cloud. Enterprises use the UnboundID Platform to modernize workforce Identity and Access Management, and to enable identity-centric customer engagement and personalization across channels.
Enterprise clients use the UnboundID Platform for social login, adaptive authentication, unified customer profiles, preference management, privacy and consent management, self-service account management, and data access governance, all while providing enterprise-grade security and web-scale performance.. .
Armour Communications Limited is a UK based organisation and provides government-grade encryption for secure communications (voice, messaging, video and data) on everyday smartphones and tablets across all popular platforms. Supplying cost-effective, easy to use technology combined with advanced security techniques to deliver cloud-based and on-premises solutions for Governments, Finance and Enterprise markets.
Armour’s technology operates over data-enabled networks including EDGE (2.SG), HSPA, CDMA/EV-DO (3G), LTE (4G), Wi-Fi™ and satellite, and is optimised to run on Android™ and iPhone® devices.. .
ColorTokens is headquartered in Silicon Valley (Santa Clara), California, USA with engineering and business centers in Santa Clara, California, and Bangalore, India. ColorTokens principals are among the most influential leaders in network and security management, with pedigrees that include breakthroughs that are now pervasive industry standards.
The core team comes with deep industry experience across hardware, software and cloud technologies, from Cisco, Juniper, VMware, Oracle, Sun Microsystems, Silicon Graphics, and Microsoft The traditional, static perimeter-based security to protect information is no longer a viable security strategy for a cloud infrastructure world. Today workload and application infrastructures have evolved from on-premises to public and private clouds which have led to a highly distributed IT infrastructure.
In addition, IT infrastructure and users are rapidly changing the technology workflow due to the increased reliance on bring your own device (BYOD) policies. While cloud and mobility make IT infrastructure more distributed, agile, and cost-effective, these trends significantly expand the cyber-attack surface.
Protecting an organization with a cost-effective, robust, compliant security solution with these changes is very challenging. ColorTokens offers a new approach that is simpler to administer than traditional, static layer-centric approaches.
ColorTokens’ Next Generation Software Defined Security is a paradigm shift in cybersecurity, based on a new simplified architecture that augments layered approaches to security. This Next Generation Software Defined Security provides fine granular level software defend users, devices, and applications, to protect enterprise networks from insider and external threats.
ColorTokens solution enforces a zero-trust security model to protect the application flows with access to all network resources but with operational ease.. .
In the era of edge computing, Abloomy developed an innovative smart-edge architecture. Based on this pioneering technology, our products and solutions cover several emerging markets – Cloud Wi-Fi, SDWAN, LBS, and data analytics.
Our resilient architecture fulfills both functional and cost requirements, from single device deployment to large-scale cross-platform and cross-regional network services, making Abloomy a competitive player in SMB, enterprise and ISP markets. Abloomy’s smart-edge based cloud WiFi solution combines the advantages of both on-premises and cloud-managed WLANs, bringing together simplicity, scalability, reliability, performance and security.
In contrast with the traditional cloud WiFi solution, Abloomy pushes all wireless network functions and applications to its smart-edge gateway which is close to or even on-premises with the customers. This not only reduces the dependency on internet connection quality and the performance of the cloud DC, but also enables customers to seamlessly integrate cloud management with their company’s existing on-premises security policies and maintain data privacy, low latency and reliability.
Unlike traditional hard-coded customized hardware and AC-based on-premises WLAN, with its smart-edge technology, Abloomy gives customers the flexibility to add more functions and applications without upgrading hardware. Abloomy’s cloud solution supports both private cloud and hybrid cloud, which makes it easier for multi-site businesses and ISPs to set up large scale networks.
SDWAN efficiently connects the customer to the internet or IDC. End-to-end products and zero-touch deployment offer the best way to set up local distributed networks.
Leveled multi-tenant accounts support the balance of management power between headquarters and each branch, and between ISPs and their end users. Network and application visibility tools based on data analytics and LBS provide IT teams insight into the health of the entire network..
Cydarm is secure by design. They know that cybersecurity is a team sport, and success requires collaboration at different levels of trust.
Cydarm’s attribute-based access control model provides flexible collaboration. The value of a collaborative incident response platform increases with the number of users.
They believe in providing fair and predictable licensing that won’t surprise you with a cost overrun, so they charge per user. Contact an expert to learn how Cydarm can provide value in your SOC.
Cydarm is interoperable with other vendor products. Every organization has a different cybersecurity technology stack and they know you will want to customize your workflows.
Cydarm has an open API, and is easy to integrate with your existing technology stack. Cydarm can be deployed anywhere.
Whether you prefer to maintain your security stack on-premises or in the cloud, Cydarm will meet your requirement. Cydarm is deployed using Docker containers, so all you need is a Docker host environment..
Prot-On allows users and companies to keep control of their files wherever they are. They can protect and track the use of any copy of their documents and change, whenever they want, who can do what with them.
It is free for home users and Freemium for professionals. There is also a corporate service (SaaS or on-premises) for enterprises and organizations.
We are in the cloud and integrated with the main cloud providers.. .
ToothPic provides solutions on technologies for the recognition of photographic devices. ToothPic’s mission is turning every smartphone into a secure and user-friendly key for user authentication.
ToothPic is an official university spin-off of Politecnico di Torino, a major engineering school in Italy and Europe, and is incubated in the university incubator I3P, recently recognized by UBI Global as the best public incubator worldwide. ToothPic was founded by a team of 4 researchers and professors from Politecnico di Torino, and in 2018 received a seed from VV3TT, an Italian Venture Capital fund dedicated to Technology Transfer from public research.
ToothPic technology is protected by 4 patents, and won several prizes in competitions dedicated to startups and twice the Seal of Excellence issued by the European Commission. ToothPic’s target is the market of authentication systems.
Its technology recognizes the unique pattern of invisible imperfections that characterize smartphone cameras to protect cryptographic keys stored on devices, that are commonly used for user authentication, digital signature, blockchain related applications. The additional layer of security represented by this random unclonable feature can be obtained with no additional hardware and related costs.
A Software Development Kit has been developed for Android and iOS. It can be integrated into existing third-party apps and authentication systems, allowing the device possession verification by (de)obfuscating asymmetric cryptographic keys.
Users’ credentials are not stored in a centralized service provider server – representing a single point of failure exploitable by an attacker, but they are distributed on users’ devices. Hence, an adversary willing to violate those credentials should target each single user device, facilitating for service providers the migration from an on premises architecture to the cloud, because they don’t need to manage sensitive users credentials, but only their public key..
Luminate enables IT teams to create Zero Trust Application Access architecture through connecting any user from any device to any corporate application while seamlessly reducing attack surface, increasing visibility into application usage and improving corporate compliance. They secure access to any corporate resource or application, hosted on any datacenter, whether on the cloud or on-premises.
They leverage the Software-Defined Perimeter principles: resources are always cloaked from public discovery, access to specific participants is restricted via trust broker, users are authenticated and authorized prior to accessing any application. Luminate Secure Access Cloud is agentless, it is deployed in less than 5 minutes and, once in place, it provides both full visibility of users’ actions when accessing corporate resources, as well as complete governance and risk mitigation of these resources..
CyberSense is a provider of cloud-based and on-premises cybersecurity solutions. Some of the world’s leading Global 2000 enterprises serving the financial services, national critical infrastructure, retail, healthcare, pharmaceutical and other industries rely on CyberSense to strengthen their IT ecosystems and reduce the risk of costly and disruptive compromises, data breaches and compliance violations.
With the CyberSense360 platform, Global 2000 enterprises are able to detect and analyze zero-day, undetected malware in use by the world’s most destructive Advanced Persistent Threat (APT) organizations, build threat profiles, block attacks and automatically remediate damage inflicted on IT ecosystems. CyberSense360 traps zero-day malware in its virtualized sensor network of honey pots and next-generation malware traps before the malware can inflict significant damage to customers’ data centers or cloud deployments..
Coronet SecureCloud is the only platform that secures the entire SaaS chain. From the user, through the device used, through the network, all the way to the SaaS/Cloud services themselves.
– SecureCloud is an end to end platform, there is no need to buy, integrate and manage multiple platforms, dramatically reducing TCO. – It is the only fully autonomous cloud security platform, detecting and mitigating threats without IT-Sec involvement, dramatically reducing staffing needs.
– SecureCloud is cloud Based: No hardware, nothing to install on premises, up and running in minutes – SecureCloud is the only platform that provides autonomous cross dimension response: Detect a risk in one area (e.g. Malicious network) and mitigate in another (e.g.
block access to Office365). .
Azion’s Edge Platform enables developers to build and run serverless applications, implement a zero trust security model, deliver content from the edge and orchestrate endpoints and applications globally. In addition, Azion helps service providers virtualize their infra edge by running Azion services on-premises.
Azion’s Edge Platform allows both developers and service providers to improve performance and security while saving more than 70% of what they would spend on legacy solutions. Considered by Gartner, Forrester and IDC as one of the top 10 technology trends impacting infrastructure and operations, Edge Computing brings computing power closer to users and devices, resulting in improved application performance and security, reduced cost, and more reliable solutions.
This enables enterprises to deliver the innovative solutions and mission-critical services that will revolutionize the way we live. Move to the Edge with Azion!.
One Identity solutions for Identity and Access Management Identity and access management for the real world. One Identity solutions eliminate the complexities and time-consuming processes often required to govern identities, manage privileged accounts and control access.
Their solutions enhance business agility while addressing your IAM challenges with on-premises, cloud and hybrid environments.. .
Company Description Arbor Networks secures the world’s most demanding and complex networks from DDoS attacks and advanced threats. Solutions Overview Arbor Networks customers gain a micro view of their own network, through their suite of products, combined with a macro view of global Internet traffic and emerging threats, through their ATLAS threat intelligence infrastructure.
See, understand and solve more security threats with Arbor Networks. ATLAS provides a comprehensive, aggregated view of global traffic and threats.
330+ service provider customers contribute 120 Tbps of global traffic intelligence, enabling Arbor’s Security Engineering & Response Team (ASERT) to develop threat protections that are delivered directly into customer products to stop DDoS attacks and malware campaigns. Arbor DDoS Solutions are proven on the world’s most demanding networks.
their portfolio offers complete deployment flexibility to meet the needs of any organization, from virtual solutions, network-embedded solutions within Cisco’s ASR 9000 routers, to appliances for enterprises and carrier-class scrubbing centers. In Arbor Cloud, they offer a best-practice DDoS defense service that tightly integrates on-premises and cloud-based mitigation in a single solution.
Ensure the availability of your critical infrastructure with the world’s most broadly deployed DDoS mitigation technology. Arbor Advanced Threat Solutions leverage integrated Netflow and Packet Capture technology for network-wide situational awareness, broad and deep traffic visibility and security intelligence that transforms threat detection and incident response through real-time and historical insights, stunning visualization and forensics.
Protect your most critical assets from advanced threats that are within your network right now.. .
ThreatWarrior is the premier cloud-native network threat intelligence platform that stops both known and unknown cyber threats in real time. The agentless, deep learning platform analyzes network traffic to eliminate blind spots, determine security vulnerabilities, and stop active threats across on-premises, cloud and hybrid environments.
ThreatWarrior is the first solution to combine unsupervised neural networks, continuous deep packet inspection, behavior monitoring, network intelligence and automated response in a single platform. Leading organizations use ThreatWarrior to see everything happening on their network, learn the behavior of everything communicating across their enterprise, and act efficiently to stop threats other solutions miss..
Xton Technologies LLC
Xton Brings Simple and Unlimited Enterprise PAM to the Mid-Market. XTAM is a privileged access management software which includes Web based password vault with password rotation, discovery, workflow controlled access, high trust login, session and keystroke recording with instant playback, full audit trail, elevated script automation, alerting and extensive analytics.
XTAM integrates with AD/LDAP, SIEM, multi factor authentication providers and ticketing systems. XTAM is an agentless, scalable solution for on premises, hybrid and cloud deployments..
CoSign by ARX is the most widely-used digital signature solution with millions of signers at security-minded businesses, governments and cloud services around the world using it to create efficient signature processes. CoSign was recognized by Forrester Research as “the strongest digital signature solution” in the Forrester Wave: E-Signatures, Q2 2013 report.
CoSign, which is available both on-premises and in the cloud, can be used on any device to easily and securely sign documents in Word, Excel, PDF, and many other file types. The flexible CoSign digital signature engine can also be seamlessly integrated into any document-related workflow, application or service.
Visit us at http://www.arx.com.. .
ATADATA is powering the digital transformation of the enterprise through a borderless automation platform for hybrid IT and cloud environments. ATADATA provides service delivery partners and enterprise customers with a completely seamless way to map, manage, migrate and protect an any-to-any combination of on-premises, hypervisors, private clouds and public clouds.
Built from the ground up on proven, purpose-built solutions, ATADATA is driving the future of the enterprise by enabling simple, cost-effective, scalable and rapid portability of both data and complete application stacks, finally unlocking the ability to drive the growth of topline revenue opportunities. Our encompassing technology platform, ATAsphere, can run as a unified, end-to-end solution or as a module that could integrate with your existing transformation initiative and technologies.
Using ATADATA’s technology, your clients will be able to: • Get line of sight into their IT infrastructure including interdependencies and affinities • Conduct live migrations from any source to any supported target environment • Upgrade OS in-flight • Eliminate manual provisioning of target servers reducing room for human error • Accelerate their project timeline and reduce cost of project engagement • Utilize our proprietary multi-threaded migration engine that enables transfer speed and security We are a company founded and lead by seasoned technologists. Our mission is to simplify complexities in Enterprise Cloud and Data Center Transformation, through automation.
We offer the most comprehensive and fact-based, functional discovery, migration, OS upgrade technology available. ATADATA’s vision is guided by our core values of: Truth / Innovation / Function / Creativity / Courage and Tenacity..
SOFTwarfare provides our customers with the KillerAppz product platform for enterprise security integration. KillerAppz is an iPaaS (integration platform-as-a-service) that acts as a platform for middle-ware and integration welding together the cyber security and network operations infrastructure for the customers who use KillerAppz.
KillerAppz is a platform for cyber security leaders to standardize on which provides them a suite of cloud services enabling development, execution and governance of integration flows connecting any combination of on premises and cloud-based processes within their cyber security architecture. Theses processes, services and applications and data within individual or across multiple organizations become fully integrated for shared intelligence and acceleration of the business processes in a more automated and efficient manner.
SOFTwarfare creates a well thought out equation for pro-active defense and response for your most important platforms to work together in a substantially steadfast approach for enterprise integration.. .
Cortado Mobile Solutions
Cortado Mobile Solutions GmbH is a wholly owned subsidiary of Cortado AG, and is responsible for all operations relating to the enterprise mobility solution Cortado Corporate Server. The unique enterprise mobility solution offers the perfect balance between security for the organization, easy manageability for the IT department and maximum flexibility for users.
Our on-premises software Cortado Corporate Server includes all the tools required for successful enterprise mobility; mobile device management, mobile application management and mobile content management, and can be fully integrated into the Windows backend. IT administrators continue to work with their known systems, Active Directory groups and Windows privileges, and users can access network drives, SharePoint and intranet pages directly from their mobile devices.
Cortado Mobile Solutions follows the philosophy that working natively delivers the highest levels of user acceptance. So Cortado’s enterprise mobility solution fully supports native app management and instead of focusing on separate storage when it comes to file sharing, enables a direct connection to the corporate network.
The result is a significant increase in productivity for mobile employees, improved collaboration among teams as well as convenient management for the IT department.. .
Our mission is to secure email worldwide. We take pride in offering premium solutions that work out of the box, offer full control, and are seamlessly integrated into existing email infrastructures.
We focus on delivering sustainable results and out-performance, in every aspect of our business. We are a privately owned Dutch company, whose shareholders actively serve as CEO (Sam Renkema) and CTO (Dreas van Donselaar).
Founded in 2005, we have rapidly grown into a leading email security provider for Web hosts, ISPs/Telcos and IT Resellers all over the world. Based in Amsterdam, the Netherlands, we have a second main office in Bucharest, Romania and worldwide representation offices located in Russia, United Kingdom, Mexico and New Zealand.
For outstanding leadership and business results, our company has been recognized in the Deloitte Technology Fast 50 and Main Software 50 competitions for the fastest growing technology companies in the entire EMEA region two years in a row, in 2013 and 2014. Our team develops email security solutions deployed in the cloud or on premises with services for incoming (spam and virus) filtering, outgoing filtering, and email archiving.
We have doubled in size nearly every year since its current product range launch in 2008. We are a highly technical and technology focused company, making continuous investments and concentrating on R&D to stay competitive in the industry.
All technologies are developed in-house and are constantly updated with weekly new features and real time engine updates. Currently, we serve clients in over 80 countries..
Today, more than 80% of organizational data is unstructured. This content doubles in size every two years and is spread across geographical locations, located both on-premises and in the cloud.
It is everywhere, and out of control. File shares enable employees and contractors to collaborate and have access to data when and where they need it.
From a risk perspective, the vast amount of data maintained in fle shares makes it a high priority target for any malicious activity. A successful data breach is very likely to result in sensitive data exposure, heavy direct fnancial loss, serious reputation damage and increased audit requirements..
Storegate is a Swedish cloud service for storage. It offers a range of cloud services that make securing, sharing, accessing, and collaboration with digital information possible.
The company has been in the cloud business for more than 10 years. Today, Storegate is divided into two business areas: Storegate Services and Storegate Solutions.
Storegate Services offers Online Backup, File synchronization, Map drive (WebDAV), and Team collaboration in the cloud. All services are available directly through the website Storegate.com.
Storegate services has been nominated several times as one of the best cloud storage solutions for business in the world due to its ease of use- user interface and desktop clients. Storegate Solutions is the leading solution for your customer’s digital life.
With Storegate you get access to one of the broadest service portfolios and can expect high security, reliability and scalability. Storegate’s business models support flexibility over time and the concept supports both Storegate hosted and on-premises installations.
SOSA (Storegate Online Storage Application) gives you full control over your cloud solution and your customers.. .
NEXOG was founded In 2017, Company headquarter is in Israel with offices also in Romania & Spain. NEXOG was founded by Broadband Network Management & Broadcasting experts.
NEXOG Network Management and Orchestration (NMS & MANO) solutions enable Service Providers to manage both physical infrastructure and virtual network functions, maximize network utilization, reduce maintenance costs and achieve higher throughput per subscriber. NEXOG multi-vendor management solution manages any network and every node over multiple-protocols, including SNMP, TEST, MQTT and NETCONF.
Quick to implement and simple to use, NEXOG solutions are available as SaaS, Virtualized or On-premises to fit any size & type of network such as IOT, Satellite, Cellular, Broadband Access, Broadcasting & OTT.. .
MX Guarddog has been a leading provider of anti-spam and anti-virus solutions for email since 2006. Their hosted solution requires no software installation and no changes to your email clients.
Setup takes only a few minutes with any standard SMTP server regardless if located on-premises or with your favorite hosting company.. .
WiKID Systems is a strategic provider of multi-factor authentication. It provides a two-factor authentication system for organizations of all sizes to guard against unauthorized access to sensitive data by verifying the digital identities of trusted users while maintaining control.
WiKID Systems is scalable as well as easy to install, implement, integrate, provision, maintain, and use. It makes strong authentication a better alternative to passwords for on-premises applications and cloud services from any desktop or mobile device.
Founded in 2001 by Nick Owen, WiKID Systems is headquartered in Atlanta, Georgia.. .
SignWise Corporation Limited was founded in 2014 and is one of the world leaders in eSignature and authentication technology. SignWise helps to digitally manage document-based transactions with advanced electronic signing, strong user authentication, electronic signature validation, document delivery, document creation and more; SignWise is fully scalable as either an on-premises solution or as a SaaS hosted in the cloud.
It enables organizations and consumers to manage the entire lifecycle of a digital document, to automate and speed up business processes both, in home country as well as across borders. SignWise’s competitive edge lies in the cross-use of various countries’ e-identities and qualified certificates for authentication and electronic signing.
The service can be used with state-issued electronic identities from Switzerland, Finland, Estonia, Latvia, Lithuania, Portugal, Georgia, Armenia, Belgium, Austria, Iceland, Oman, Luxembourg, Sweden, Denmark, Spain, Azerbaijan and others.. .
Silensec is a technology and service company specialised in the delivery of managed security and managed SOC services as well as the delivery of value-added security system integration and security compliance services. Silensec’s clients include large organisations from the telco, financial and government sectors.
Silensec is ISO27001 certified by the British Standards Institution and is a supporting partner of the United Nations’ International Telecommunication Union (ITU) for the development and delivery on national and regional cyber drills around the world. Silensec’s flagship product is CyberRanges, a leading cyber range platform for the development of cybersecurity competencies and for testing cyber resilience, available on cloud, on premises and portable and scalable to thousands of virtual machines and users.
Silensec is Headquartered in Limassol (Cyprus) with offices in Nairobi (Kenya) and Sheffield (UK). .
At Tenchi Security, we provide consulting services and products to help your organization embrace the benefits of the cloud in a secure and compliant fashion. Our work will help security transition from a blocker to an enabler of the business teams’ pursuit of the increased flexibility, scalability, automation, and savings of the cloud.
Our team of seasoned cloud and security experts will help your IT and security teams to define the right cloud strategy, adopt best practices, implement security automation, avoid common pitfalls and get the most out of your cloud investments. Given the right tools and expertise, we can help your cloud environments achieve a superior level of security at a fraction of the cost when compared to an equivalent on-premises infrastructure..
Generator Payments LLC
Generator Payments LLC is a payment technology and solutions company. The company helps guide investments and options in technology regardless business size, industry, or requirements.
The company assist businesses regardless of size to make solid business decisions with their options for technology no matter what system, cloud, or on-premises. Its virtual CIO service offers smaller size and high growth companies, senior IT expertise to align their business strategies and technologies.
The company also provides technology solutions covering business communications, network security, and product management. Generator Payments LLC was founded by Shaun Donaghey in 2015 and is headquartered in Rolling Hills Estates, California..
ViewDS specializes in cloud identity management solutions, directory services, access and authorization management solutions, and data synchronization tools to enhance the existing product offerings of cloud service providers, systems integrators and value-added resellers. ViewDS Identity Solutions’ ingenious identity and access management software was originally conceived, designed and developed at the Telstra Research Laboratories in Melbourne, Australia.
ViewDS’ products including Cobalt, ViewDS Directory Server, Access Sentinel and Identity Bridge, provide fast, flexible, secure and scalable identity management infrastructure for on-premises and cloud applications. ViewDS’ products are deployed in more than 20 countries across Australasia, Asia, Europe, the Middle East and North America, in partnership with other vendors and integrators.
With a reputation for security and reliability, ViewDS’ IAM products have achieved visible, sustainable results in sectors including local and federal government, defense, aviation and health.. .
This article was written by Benjamin Skute from Threat.Technology. The editor for this article was Tess Page. If your company is featured in this article and you want to have amendments made please contact us on: [email protected].
Alternatively you may write to us at: Threat.Technology/Fupping Ltd, First Floor, 61-63 Rochester Pl, London NW1 9JU.