Our Technology Alliance Partners solve customer problems with best of breed solutions for network security, performance monitoring, experience management and compliance. Gigamon and our partners seek to provide the most flexible and efficient joint solutions that allow you to maximize the effectiveness of your investment.
(Click the logo to find out more about our Technology Partners)
Featured: Metadata Empowered Partners
Security and Vulnerability Management
Network Performance Management
Venafi is the cybersecurity leader of machine identity protection, securing machine-to-machine connections and communications. Venafi protects machine identity types by orchestrating keys and certificates for SSL/TLS, code signing, mobile and SSH.
At a time when companies must deal with a multivendor, multicloud and multidevice ecosystem, Viewtinet provides the most advanced cross solution for all the different data sources in real-time within a single panel view.
Securonix is redefining the next generation of cyber-threat detection using the power of entity context, machine learning, and big data. Our purpose-built security analytics platform enriches, analyzes and scores events into actionable intelligence. Using machine learning techniques, Securonix detects insider threat, cyber threat and fraud attacks in real-time.
Nozomi Networks is the leader of industrial cyber security, delivering the best solution for real-time visibility to manage cyber risk and improve resilience for industrial operations. With one solution, customers gain advanced cyber security, improved operational reliability and easy IT/OT integration. Innovating the use of artificial intelligence, the company helps the largest industrial facilities around the world See and Secure™ their critical industrial control networks. Today Nozomi Networks supports over a quarter of a million devices in sectors such as critical infrastructure, energy, manufacturing, mining, transportation and utilities, making it possible to tackle escalating cyber risks to operational networks (OT).
Active Countermeasures is a group of like-minded geeks that believe in giving back to the security community. We do this through free training, thought leadership, and both open source and affordable commercial tools. In addition, we have built this expertise into AI-Hunter, our network threat hunting solution.
Netflow Auditor analyzes, segments and learns from granular flow telemetry already supported by your network infrastructure in real-time using historical big-data for machine learning and threat intelligence correlation to identify cyber-threats and abnormal behavior and context otherwise undetectable.
Ordr delivers actionable artificial intelligence (AI)-based systems control engine for the hyper-connected enterprise, providing complete visibility and exhaustive control over every class of connected device and system. The Ordr Systems Control Engine is purpose-built to fully map the device flow genome at massive scale, to continuously inspect, classify and baseline the behavior of every device.
InQuest offers SaaS, cloud, and on-premise solutions for inspecting application content over the most commonly used network protocols including web and e-mail. Our proprietary Deep File Inspection (DFI) engine is capable of exposing a myriad of additional context to aid in detecting threats and data-loss that bypass traditional security defenses.
Nutanix makes infrastructure invisible, elevating IT to focus on the applications and services that power their business. The Nutanix enterprise cloud platform delivers the agility, pay-as-you-grow economics and operational simplicity of the public cloud, without sacrificing the predictability, security and control of on- premises infrastructure. Nutanix solutions leverage web-scale engineering and consumer-grade design to natively converge compute, virtualization and storage into a resilient, software-defined solution that delivers any application at any scale. Learn more.
Corero Network Security is the leader in real-time, high-performance DDoS defense solutions. Service providers, hosting providers and online enterprises rely on Corero’s award-winning technology to eliminate the DDoS threat to their environment through automatic attack detection and mitigation, coupled with complete network visibility, analytics and reporting. This industry leading technology provides cost-effective, scalable protection capabilities against DDoS attacks in the most complex environments.
Corero Network Security is the leader in real-time, high-performance DDoS defense solutions. Service providers, hosting providers and online enterprises rely on Corero’s award-winning technology to eliminate the DDoS threat to their environment through automatic attack detection and mitigation, coupled with complete network visibility, analytics and reporting. This industry leading technology provides cost-effective, scalable protection capabilities against DDoS attacks in the most complex environments.
Argyle Data is the leader in real-time fraud and security analytics at network speed and Hadoop scale offering solutions for the largest data-driven companies in mobile communications and financial services. Argyle Data offers a real-time fraud and security analytics application built from the ground up on Hadoop using the latest big data, machine learning and anomaly detection technology proven at Facebook and Google. It is able to detect fraud not detected by existing systems, discover fraud in minutes vs. days, discover both new and old fraud attack techniques and dramatically reduce false positives.
ITsMine mission is to remove the data breach risk. ITsMine founded in 2017 by group of cyber security experts, architecture, experienced hackers, entrepreneurs, leaders and builders of global sales divisions from world leading vendors, and experienced software developers from IDF. ITsMine offers a simplified approach to a Data Loss Prevention (DLP) solution.
Blue Hexagon is a deep learning innovator focused on protecting organizations from cyberthreats. The company’s real-time, deep learning platform is proven to detect known and unknown network threats with speed, efficacy, and coverage that set a new standard for cyber defense.
Astellia is a leading provider of network and subscriber intelligence enabling mobile operators to drive business performance and customer experience. Astellia’s vendor-independent real-time monitoring and troubleshooting solution covers end-to-end 2G, 3G and 4G from radio access to core network. Astellia’s scalable products and expert services address the needs of operators’ full value chain: CEM, network performance, customer care, marketing and commercial.
Atigeo Corp. is a compassionate technology company for a wiser planet. The xPatterns platform, Atigeo’s flagship big data analytics product, generates knowledge from all available data to deliver previously unforeseen insights, predict outcomes, and mitigate risks. xPatterns revolutionary analysis is localized, responsive, adaptive and automated, which means organizations can quickly deploy a solution, extend existing technology investments, broadly scale and apply learnings in a timely manner to solve the most complex business problems. Atigeo serves customers across healthcare, cyber, defense, energy, and financial services.
Bivio Networks is dedicated to providing leading networking products that enable government agencies and service providers to control, monitor and secure critical network infrastructure. A leader in cyber intelligence, cyber security and network control solutions, Bivio has deployed its products in a wide range of environments. Bivio’s global customer base includes leading defense department and intelligence agencies, service providers and enterprises. Bivio is privately-held and is headquartered in the San Francisco Bay Area.
BluVector is a revolutionary early warning system that uses a unique form of machine learning to uncover advanced threats at the network edge. We identify advanced threats today before they become a breach tomorrow. For more information visit: www.bluvector.io
CA Technologies is the market-leading provider of enterprise application management solutions
CA Technologies is an IT management software and solutions company with expertise across all IT environments – from mainframe and distributed, to virtual and cloud. CA Technologies manages and secures IT environments and enables customers to deliver more flexible IT services. CA Technologies innovative products and services provide the insight and control essential for IT organizations to power business agility. The majority of the Global Fortune 500 relies on CA Technologies to manage evolving IT ecosystems.
CABLExpress® is a manufacturer of high-performance cabling and data center infrastructure products and structured cabling solutions. The CABLExpress Skinny-Trunk® Solution is a comprehensive, high-density fiber optic product line that saves space and installation time while future-proofing a data center's infrastructure.
Check Point Software Technologies is the largest pure-play security vendor globally, providing industry-leading solutions and protecting customers from cyber-attacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises’ networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.
Cisco customers come first and an integral part of our DNA is creating long-lasting customer partnerships and working with them to identify their needs and provide solutions that support their success.
The concept of solutions being driven to address specific customer challenges has been with Cisco since its inception. Husband and wife Len Bosack and Sandy Lerner, both working for Stanford University, wanted to email each other from their respective offices located in different buildings but were unable to due to technological shortcomings. A technology had to be invented to deal with disparate local area protocols; and as a result of solving their challenge - the multi-protocol router was born.
Since then Cisco has shaped the future of the Internet by creating unprecedented value and opportunity for our customers, employees, investors and ecosystem partners and has become the worldwide leader in networking - transforming how people connect, communicate and collaborate.
Corning Cable Systems offers a broad range of end-to-end fiber optic solutions for customers' telecommunications networks. Our customer-focused solutions include cables, connectors, and related hardware, and network services that include network design, project management, installation and maintenance, equipment rental and training programs.
Corvil is the industry leader for deriving Security, Operational and Business intelligence from network data. As companies adopt faster and smarter machine technology, it becomes critical to tap into richer and more granular machine data sources to safeguard the transparency, performance and security of critical infrastructure and business applications. The Corvil streaming analytics platform captures, decodes and learns from network data on the fly, transforming it into machine-time intelligence for network, IT, security and business teams to operate efficiently and securely in this new machine world. Corvil uses an open architecture to integrate the power of its network data analytics with the overall technology ecosystem providing increased automation and greater operational and business value outcomes for its users. The Corvil solution is trusted by leading financial institutions to safeguard their businesses across the globe involving 354 trillion messages with a daily transaction value in excess of $1 trillion.
Cyphort, Inc. is a network security company providing mid- and large-size enterprise customers with the innovative Adaptive Detection Fabric, a scalable software solution designed to integrate with existing security tools to discover and contain the advanced threats that bypass the first line of security defense in an organization. Based in Santa Clara, California, the company was founded in 2011 and distributes its software through direct sales and channel partners across North America and international markets.
The Datiphy platform fills the gaps that exist between point solution tools and glues various capabilities together to visualize your entire enterprise data lifecycle. The key technology is its Adaptive Data Behavioral Model (also called DataDNA) providing the scientific certainty of analyzing the entire data pool as events occur in real-time. A command portal enables centralized management and natural language queries empowering users to find any data asset within seconds and see the context of every interaction that has occurred among all other assets.
Dynatrace is the new generation of application performance management. Our passion is to enable our 5,700 customers, large and small, to see their applications and digital channels through the lens of end-users. Customers use these insights to master application complexity, gain strategic intelligence, and relentlessly improve their users’ experiences.
Empirix is the recognized leader in end-to-end network performance visibility with the unique ability to analyze customer behaviors by application in real time. Empirix helps service providers, mobile operators, contact centers, and businesses master complexities and optimize business processes to reduce operational costs, maximize customer retention, and grow top-line revenue. Through testing, monitoring, analytics and intelligence, Empirix helps companies around the world realize the full value of their technology investments.
ExtraHop is changing how organizations use their network by transforming data-in-motion into a rich multidimensional data source that delivers the IT and business insights they require. The network is the common element in every aspect of modern business, and ExtraHop makes it easy to derive insights from wire-data with a turnkey analytics platform.
Through universal observation, dynamic discovery and multi-dimensional stream analytics, ExtraHop is revolutionizing the way IT and business operates.
Fidelis Cybersecurity is creating a world where attackers have no place left to hide. Fidelis products reduce the time it takes to detect attacks and resolve security incidents. Fidelis Network and Fidelis Endpoint products look deep inside the traffic and content where attackers hide their exploits. Then, they pursue them out to the endpoints where critical data lives. With Fidelis an organization can know when it’s being attacked, can retrace attackers’ footprints, and prevent data theft at every stage of the attack lifecycle.
FireEye provides the only global, anti-botnet protection system to combat botnets and targeted, stealthy malware. FireEye protects organizations against botnets to prevent customer data, intellectual property, and company resources from being compromised and stolen as a result of unauthorized remote control of PCs and servers. Our solutions bring advanced network security together with state-of-the-art virtualization technology to combat targeted malware as well as its criminal attack vector of choice—botnets.
Flowmon Networks empowers businesses to manage and secure their computer networks confidently. Through its high-performance network monitoring technology and lean-forward behavior analytics, IT pros worldwide benefit from network traffic visibility to enhance network and application performance and deal with modern cyber threats. Driven by a passion for technology, Flowmon is leading the way for high-performing, scalable, and easy-to-use NetFlow/IPFIX network monitoring. Several of the world’s largest businesses, Internet service providers, government entities, and small and midsize companies rely on Flowmon solutions to take and maintain control over their networks and overcome uncertainty.
FlowTraq, Inc. provides software and services for high-performance network monitoring, analytics, security and forensics. FlowTraq detects a range of network behaviors, including Distributed Denial of Service (DDoS), data leakage, botnets, worms, network scans, and other network traffic anomalies.
Forcepoint safeguards users, data and networks against the most determined adversaries, from accidental or malicious insider threats to outside attackers, across the entire threat lifecycle. Forcepoint protects data everywhere – in the cloud, on the road, in the office – simplifying compliance and enabling better decision-making to streamline security. Forcepoint empowers organizations to concentrate on what’s most important to them while automating routine security tasks. More than 22,000 organizations around the world rely on Forcepoint. Based in Austin, Texas, with worldwide sales, service, security laboratories and product development, Forcepoint is a joint venture of the Raytheon Company and Vista Equity Partners.
Forescout enables its customers to unleash the full power of their network through enterprise-class security and control. Forescout’s automated solutions for network access control, mobile security, threat prevention and endpoint compliance empower organizations to gain access agility while preempting risks and eliminating remediation costs. Because Forescout security solutions are easy to deploy, unobtrusive, intelligent and scalable, they have been chosen by more than 1,000 of the world’s most secure enterprises and military installations for global deployments spanning 37 countries. Headquartered in Cupertino, California, Forescout delivers its solutions through its network of authorized partners worldwide.
Fortinet is a worldwide provider of network security appliances and a market leader in Network Security (Datacenter Firewall/NGFW/UTM). Fortinet’s products and subscription services provide broad, integrated and high-performance protection for both on-premise and cloud environments against dynamic security threats while simplifying the IT security infrastructure.
GuardiCore is an innovator in internal data center security, focused on delivering more accurate and effective ways to stop advanced threats through real-time breach detection and response. Developed by the top cyber security experts in their field, GuardiCore is changing the way organizations are fighting cyber attacks in their data centers.
Micro Focus is a global software company with 40 years of experience in delivering and supporting enterprise software solutions that help customers innovate faster with lower risk. Our portfolio enables our 20,000 customers to build, operate and secure the applications and IT systems that meet the challenges of change. We are a global software company, committed to enabling customers to both embrace the latest technologies and maximize the value of their IT investments. Everything we do is based on a simple idea: the fastest way to get results from new technology investments is to build on what you have–in essence, bridging the old and the new.
HoloNet Security is the leading innovator in the data-centric User and Entity Behavior Analytics (UEBA) space by bringing the best value of UEBA, CASB, and DLP together through its patent-pending Network Hologram technology. HoloNet provides real-time visibility and anomaly detection for sensitive business data in motion. HoloNet arms enterprise security teams with the most efficient and effective weapon to fight against malicious outsiders and rogue insiders attempting to compromise the most critical asset of the company – sensitive business data.
IBM QRadar SIEM consolidates log events and network flow data from thousands of devices, endpoints, and applications distributed throughout a network. It helps normalize and correlate raw data to identify security offenses, and uses an advanced Sense Analytics engine to baseline normal behavior, detect anomalies, uncover advanced threats, and remove false positives. Optionally, this software incorporates IBM X-Force Threat Intelligence, which identifies, scores, and categorizes potentially malicious IP addresses, including malware hosts, spam sources, and other threats. IBM QRadar SIEM can also correlate system vulnerabilities with event and network data, helping to better analyze and prioritize security incidents. Integrated with the Gigamon GigaSECURE® Security Delivery Platform, IBM QRadar SIEM can detect threats other solutions often miss in the noise of millions of events, as well as help ensure policy and regulatory compliance and minimize risks to mission-critical services, data, and assets.
More organizations trust Imperva to protect their business applications and databases than any other vendor. Only Imperva delivers innovative technology to give full audit accountability and separation of duties to meet regulatory compliance. The award-winning Imperva SecureSphere is the only solution that delivers full activity monitoring from the database to the accountable application user.
Applying a unique combination of expertise in networking as well as cyber security and machine learning, imVision’s solution is the first and currently only available service-aware, network-based Anomaly Detection Platform (ADP), applicable to NFV, hybrid and legacy network environments. The platform provides an automatic detection and analytics technology to identify and understand anomalies, whether stemming from operational misconfigurations or from cyber security attack cases, either external or internal to the network.
Cybersecurity without Artificial Intelligence (AI) is a losing battle, at JASK we combine AI with Cyber Security to help companies begin to win against the millions of cyber attacks they face every day. JASK offers the first AI-based Network Security Platform which predicts real threats while minimizing false positives.
Kentik offers Kentik Detect, a big data analytics solution delivered via SaaS, purpose built for turning network telemetry such as NetFlow, sFlow, and IPFIX into valuable, actionable visibility and operational intelligence. NetOps, NetEng, and SecOps teams commonly use the platform for network traffic and performance monitoring, DDoS detection, and BGP path and peering analysis. Kentik Detect has certified support of flow telemetry originating from the Gigamon Visibility Fabric™.
Lancope, Inc. is a leading provider of network visibility and security intelligence to defend enterprises against today’s top threats. By collecting and analyzing NetFlow, IPFIX and other types of network telemetry, Lancope’s StealthWatch® System helps organizations quickly detect a wide range of attacks from APTs and DDoS to zero-day malware and insider threats. Through pervasive insight across distributed networks, including mobile, identity and application awareness, Lancope accelerates incident response, improves forensic investigations and reduces enterprise risk. Lancope’s security capabilities are continuously enhanced with threat intelligence from the StealthWatch Labs research team.
Lastline is the leader in Advanced Malware Protection, defeating the advanced malware that can easily evade “next-generation” security products like sandboxes, firewalls and intrusion prevention systems. Lastline provides the threat visibility and context you need to respond quickly and effectively to malicious activity before damaging data breaches occur. Global 5000 organizations, managed security service providers, and leading security technology vendors worldwide rely on Lastline.
LiveAction is award-winning software designed to simplify network management. Initially developed to aid the U.S. Department of Defense in the operation of its networks, LiveAction features an innovative visual display, real-time big data analytics for decision making and deep integration with routers and switches for unparalleled network control. LiveAction accelerates troubleshooting with its QoS control, application-aware, and WAN functionality developed in collaboration with Cisco Systems.
LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s award-winning platform unifies next-generation SIEM, log management, network and endpoint forensics, and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides innovative compliance automation and assurance, and enhanced IT intelligence.
Lumeta’s network situational awareness platform is the authoritative source for enterprise network infrastructure and cybersecurity analytics. Available for both real-time monitoring and point-in-time auditing, Lumeta recursively indexes a network to identify and map every IP connected device, as well as uncover inbound and outbound leak paths. The foundational intelligence provided by Lumeta gives IT management a clear, comprehensive assessment of network vulnerabilities, cyber threat risks and policy violations from network edge to core. Also, Lumeta optimizes other network and security product investments by feeding them accurate and fact-based network intelligence. Headquartered in Somerset, New Jersey, Lumeta has operations throughout the world.
ManagedMethods’ mission is to provide customers with an easy to use, efficient, and effective cloud security solution. They believe in the basics. You cannot secure what you do not know exists. Shadow IT is a real problem, but it does not need to be. With ManagedMethods’ products, companies can easily discover, monitor, and control the use of cloud applications (SaaS) and reduce their cloud risk. Founded in 2013 by industry veterans of the enterprise security and performance software markets, ManagedMethods’ products focus on the growing use of cloud applications and services that are at the core of today’s mission-critical business functions.
Narus is the world leader in cyber security solutions with real-time network behavioral analysis and traffic intelligence software.
Through its patented analytics, Narus’ software detects patterns and anomalies that can predict and identify security issues, misuse of network resources, suspicious or criminal activity, and other events that can compromise the integrity of IP networks. The NarusInsight System is designed to be integrated into a customer’s operational environment, strengthening existing security and monitoring systems, while providing total traffic visibility across the network.
NarusInsight protects and manages the largest IP networks around the world and has been deployed with commercial and government installations on five continents. Narus is a wholly owned subsidiary of The Boeing Company, and is headquartered in Sunnyvale, Calif., with regional offices around the world.
NetFort LANGuardian is software for investigating, monitoring, and reporting on network activity. Organizations of all sizes use LANGuardian for forensics, security, and troubleshooting. Its browser-based interface provides amazing visibility into application, file-share, and web activity on your network. Unlike similar solutions, its ability to integrate with directory services enables LANGuardian to report on the activity of individual users. LANGuardian is quick to install and easy to manage because it gathers information from network traffic and does not require client software.
NetQuest Corporation designs, manufactures and markets innovative monitoring access products for applications in telecommunications service provider, government, and enterprise networks. Founded in 1987 and based in Mount Laurel, New Jersey, NetQuest is an employee-owned company. With more than a 25-year track record of providing cutting edge monitoring access solutions, NetQuest has developed a global customer base, marketing directly and through a network of value-added resellers and representatives.
Niara’s security analytics platform automates the detection of attacks that have bypassed an organization’s perimeter defenses and dramatically reduces the time and skill needed to investigate and respond to security events. The solution applies machine learning algorithms and forensics to data from the network and security infrastructure to detect compromised users, entities, and malicious insiders, speed threat hunting efforts, and reduce the time for incident investigation and response by focusing security teams on the threats that matter.
NIKSUN is the recognized worldwide leader in making the Unknown Known. The company develops a highly scalable array of real time and forensics-based cyber security and performance management solutions for large enterprises, government & intelligence agencies, service providers and financial services companies. NIKSUN’s award winning enterprise solutions deliver unprecedented flexibility and packet capture power. The company’s patented real-time analysis and recording technology is the industry’s most comprehensive solution for secure and reliable network infrastructure and services. NIKSUN, headquartered in Princeton, New Jersey, has sales offices and distributors throughout the US, Europe, the Mid East and Asia-Pacific.
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization’s most valuable assets.
Pindrop Security, headquartered in Atlanta, Ga., is a privately-held company that provides enterprise solutions to secure phone and voice communications. Pindrop solutions reduce fraud losses and authentication expense for some of the largest banks, brokerages and retailers in the world. Pindrop’s patented Phoneprinting technology can identify, locate and authenticate phone devices uniquely just from the call audio thereby detecting fraudulent calls as well as verifying legitimate callers. Named SC Magazine 2013 Rookie Security Company of the Year, a Gartner “Cool Vendor” in Enterprise Unified Communications and Network Services for 2012 and one of the 10 Most Innovative Companies at the 2012 RSA conference, Pindrop Security’s solutions restore enterprises’ confidence in the security of phone-based transactions.
Plixer is a leading threat detection and forensic evidence provider focused at engineering the very best system for uncovering unwanted communication behaviors. Rather than depending on packet signatures, their strategy uncovers unwanted communications by leveraging NetFlow, IPFIX, sFlow and other derivatives. The company was built by network and system engineers who understand the need for scalable distributed collection solutions that meet the dynamic demands of security and network professionals.
R-Scope by Reservoir Labs delivers true, pervasive network visibility for your next generation SOC. Available for deployment on premises, in the cloud, or hybrid, R-Scope delivers to analysts a powerful tool for full context hunting. Leveraging behavioral analytics, R-Scope offers the best of open source and proprietary tools with a solution that easily integrated into any security architecture. R-Scope is a real time resource producing full metadata, file carving for automated dynamic malware analysis, selective packet capture, and serving advanced AI analytics.
Riverbed, at more than $1 billion in annual revenue, is the leader in Application Performance Infrastructure, delivering a complete platform for the hybrid enterprise to help ensure applications perform as expected, data is available when needed, and performance issues can be proactively detected and resolved before impacting business performance. Riverbed helps enable hybrid enterprises to transform application performance into a competitive advantage by maximizing employee productivity and leveraging IT to create new forms of operational agility. Riverbed's 27,000+ customers include 97% of the Fortune 100 and 98% of the Forbes Global 100.
RSA provides more than 30,000 customers around the world with essential security capabilities to protect their most valuable assets from cyber threats. With RSA’s award-winning products, organizations can effectively detect, investigate, and respond to advanced attacks; confirm and manage identities; and ultimately, reduce IP theft, fraud, and cybercrime.
SCADAfence is a pioneer in securing smart manufacturing industries such as chemical, pharmaceutical, food & beverage and automotive. In such industries, traditional security solutions are inadequate due to the unique requirements, technologies and components found in industrial networks. SCADAfence offers a solution designed to help ensure the operational continuity of industrial networks by providing increased visibility and detection of operational and security threats.
SentryWire is the next generation platform for network packet capture that is based on a unique capture and storage architecture which breaks the performance, scalability and expense barriers of existing frameworks. SentryWire supports capture rates from 1Mb to 100Gb, while providing highly scalable real-time capture of your network traffic, with no packet loss, and allowing retention of network traffic for months or years.
Founded in 2005, SevOne is headquartered in Wilmington, Delaware, SevOne provides the world’s most scalable performance monitoring platform to the world’s most connected companies. SevOne’s patented architecture, the SevOne Cluster™ leverages distributed computing to effectively collect millions of key performance indicators and to provide proactive alerts when performance deviates from normal. SevOne’s platform provides a single source of truth for future-ready customers including global enterprises, finance and healthcare companies, CSPs, MSPs and MSOs.
Sinefa is inspiring change in how customers experience the network by enabling service providers to deliver high quality network services. While maintaining pace with data and device explosion. Deployed as software at the network core or as customer premises hardware, Sinefa is architected for multi-tenancy, speed and scale, supporting thousands of subscribers and locations, at multi-gigabit speeds with an ultra-low deployment effort. Through patent pending technologies, cloud-based centralized management and 1 second viewing resolution, Sinefa delivers ground breaking visibility for any fixed, broadband or mobile network.
SolarWinds’ (NYSE: SWI) mission is to provide purpose-built products that are designed to make IT professionals’ jobs easier. We offer value-driven products and tools that solve a broad range of IT management challenges—whether those challenges are related to networks, servers, applications, storage or virtualization. Our company was built by network and systems engineers who know what it takes to manage today’s dynamic IT environments and we strive every day to deliver powerful functionality that is easy to use.
Simply put, we work to: Eliminate the complexity found in traditional enterprise software – making it easier to find, buy, deploy and maintain; connect with our community – using daily interactions with our large, global user community to guide our product development and strategy; and constantly evolve our products – ensuring that our software is on point to meet the most important problems that IT Pros have today, and continues to deliver increasing value over the lifetime of ownership.
Sourcefire, now part of Cisco, is a world leader in intelligent cybersecurity solutions. Together with Cisco, Sourcefire provides a broad portfolio of integrated solutions that deliver unmatched visibility and continuous advanced threat protection across the entire attack continuum, allowing customers to act smarter and more quickly—before, during, and after an attack. Sourcefire’s innovation in open source security, as well as commercial next-generation network security platforms and advanced malware protection solutions has been trusted for more than 10 years. Sourcefire has earned a reputation for innovation, consistent security effectiveness and world-class research all focused on detecting, understanding and stopping threats.
At Spirent Communications we work behind the scenes to help the world communicate and collaborate faster, better and more often. The world’s leading communications companies rely on Spirent to help design, develop and deliver world-class network, devices and services. Spirent’s lab test solutions are used to evaluate performance of the latest technologies. As new communication services and applications are introduced in the market, Spirent provides tools for service management and field test to improve troubleshooting and quality. Spirent also enables enterprises, institutions and government agencies to secure and manage their networks.
Splunk was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone. Machine data is one of the fastest growing and most pervasive segments of "big data"—generated by websites, applications, servers, networks, mobile devices and all the sensors and RFID assets that produce data every second of every day. By monitoring and analyzing everything from customer clickstreams and transactions to network activity and call records—and more—Splunk turns machine data into valuable insights no matter what business you're in. It's what we call Operational Intelligence.
Our mission is to transform application security by consolidating multiple innovative security functions within an open, AI-powered software platform. This intelligence-based software protects our customers’ web, mobile, and API-based applications—and supports today’s cloud-native, container-based application architectures. Customers include F500 organizations across multiple vertical markets, and our solution has earned numerous industry accolades.
Tealeaf is the leading provider of online customer experience management solutions and the unchallenged leader in customer behavior analysis. Tealeaf's CEM solutions include both a customer behavior analysis suite and customer service optimization suite. For organizations that are making customer experience a top priority, these solutions provide unprecedented enterprise-wide visibility into every visitor's unique online interactions for ongoing analysis and web site optimization. Online executive stakeholders from ebusiness and IT to customer service and compliance are leveraging Tealeaf to build a customer experience management competency across the organization.
Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk, ensure compliance and respond to threats. Their family of products includes SecurityCenter Continuous View, which provides the most comprehensive and integrated view of network health, and Nessus®, the global standard in detecting and assessing network data. Tenable is relied upon by many of the world¹s largest corporations, not-for-profit organizations and public sector agencies, including the entire U.S. Department of Defense.
Today’s acquisition also complements the IBM MobileFirst Analytics portfolio, which is designed to enhance the way organizations analyze mobile device usage to provide exceptional customer experiences.
Using The Now Factory’s software, CSPs can gain real-time insights into their customers by analyzing massive quantities of network and business data. With this type of insight, CSPs can provide an enhanced quality of service to their customers by better managing negative experiences and network outages.
Trend Micro Deep Discovery: Your Network Defense against APTs and targeted attacks. The industry's first advanced threat protection solution that enables businesses and government agencies not only to detect and analyze advanced persistent threats (APTs) and targeted attacks, but also to rapidly adapt their protection and respond to these attacks. Network Defense integrates software, global threat intelligence, and specialized tools and services to deliver a customized and comprehensive solution for businesses and government.
Trustwave is a leading provider of on-demand and subscription-based information security and payment card industry compliance management solutions to businesses and government entities throughout the world. For organizations faced with today's challenging data security and compliance environment, Trustwave provides a unique approach with comprehensive solutions that include its flagship TrustKeeper® compliance management software and other proprietary security solutions including SIEM, EV SSL certificates and secure digital certificates. Trustwave has helped hundreds of thousands of organizations-ranging from Fortune 500 businesses and large financial institutions to small and medium-sized retailers-manage compliance and secure their network infrastructures, data communications and critical information assets. Trustwave is headquartered in Chicago with offices throughout North America, South America, Europe, Africa, Asia and Australia.
Vasona Networks, Inc. Works with global mobile network operators to improve RAN performance and deliver better subscriber experiences. The company's pioneering edge application controller, the SmartAIR1000, takes a holistic approach to addressing mobile network data traffic congestion that occurs in each cell, monitoring every application demanding bandwidth. With this visibility, Vasona Networks' RateControl technology allocates bandwidth by precise determination of user needs and experiences. Vasona Networks is based in Santa Clara, California.
Vectra Networks is the leader in real-time detection of in-progress cyber attacks. The company’s automated threat management solution continuously monitors internal network traffic to pinpoint cyber attacks as they happen. It then automatically correlates threats against hosts that are under attack and provides unique context about what attackers are doing so organizations can quickly address and mitigate loss. Vectra prioritizes attacks that pose the greatest business risk, enabling organizations to make rapid decisions on where to focus time and resources. In 2015, Gartner named Vectra a Cool Vendor in Security Intelligence for addressing the challenges of post-breach threat detection.
Velocimetrics delivers comprehensive, real-time business insight to the global financial community. Designed by industry experts to meet the specific monitoring and performance analysis needs of each firm’s complex environments, Velocimetrics provides an independent, transparent and detailed view of the business impact of all activities taking place across each and every system and network as they are happening.
By rapidly detecting potential risks, identifying inefficiencies and exposure to financial loss, Velocimetrics instantly alerts the business to issues that could adversely impact success as a situation is emerging, before it’s too late.
Viavi Solutions deliver 360-degree visibility across physical, virtual, and cloud environments providing insight to deliver optimal service levels, transition to new technologies, and roll out new services, while improving efficiency and ROI. Implement major transformations with greater confidence when armed with historical intelligence to support investment planning, standards-based deployment testing and certification, and performance monitoring to ensure optimum service delivery. Leading solutions and deep technical mastery make Viavi a trusted advisor to top enterprises worldwide.
VMware, the global leader in virtualization and cloud infrastructure, delivers customer-proven solutions that accelerate IT by reducing complexity and enabling more flexible, agile service delivery. VMware enables enterprises to adopt a cloud model that addresses their unique business challenges. VMware’s approach accelerates the transition to cloud computing while preserving existing investments and improving security and control. With more than 300,000 customers and 25,000 partners, VMware solutions help organizations of all sizes lower costs, increase business agility and ensure freedom of choice.
Voipfuture provides a full picture by unifying data from different layers—media plane/Real-time Transport Protocol (RTP) with control plane/Session Initiation Protocol (SIP)—into one combined monitoring platform. This broad view on service quality (24x7, full traffic, all streams, and both directions) detects connections between all types of events on the control and media plane. The technology is exceptionally scalable. It makes the products applicable to a wide range of network environments from enterprise branch sites to major interconnection points and carrier networks. Use cases include troubleshooting, network performance optimization, customer care applications, interconnection monitoring, and customer SLA monitoring.
Wireshark is the world's foremost network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. It is the de facto (and often de jure) standard across many industries and educational institutions.
Wireshark development thrives thanks to the contributions of networking experts across the globe. It is the continuation of a project that started in 1998.
Positive Technologies is a global application security company. We operate Europe's largest appsec research centre, the intelligence from which has helped build smart technology which now allows over 1000 customers globally to manage vulnerabilities, carry out secure DevOps, analyze threats and protect applications. Our WAF is also recognized by Gartner as visionary.
Talaia is a leading network visibility provider for service providers and the enterprise. Talaia’s big data platform delivers intelligence for network operations, security and strategy. It provides insights on how the network is being used, detects DDoS attacks, securely stores metadata for long-term analysis and enables informed peering decisions – all wrapped up in an easy to deploy SaaS solution that offers virtually unlimited scalability.
NexDefense empowers ICS operators with the real-time knowledge needed to improve system and process integrity and ensure cyber resilience. The 2016 Entrepreneurial Award Winner, NexDefense has been recognized by Frost & Sullivan and others as the market-leading IIoT and industrial cybersecurity solution, with deployments across mission-critical networks in utilities, oil and gas, defense, manufacturing, water and wastewater and pharmaceuticals.
For 11 years, Amazon Web Services has been the world's most comprehensive and broadly adopted cloud platform. AWS offers over 90 fully featured services for compute, storage, networking, database, analytics, application services, deployment, management, developer, mobile, Internet of Things (IoT), Artificial Intelligence (AI), security, hybrid, and enterprise applications, from 44 Availability Zones (AZs) across 16 geographic regions in the U.S., Australia, Brazil, Canada, China, Germany, India, Ireland, Japan, Korea, Singapore, and the UK. AWS services are trusted by millions of active customers around the world -- including the fastest growing startups, largest enterprises, and leading government agencies -- to power their infrastructure, make them more agile, and lower costs.
Taking a new approach to conventional threat detection and management, Seceon helps today’s enterprise detect and stop both recognized and never-seen-before threats when they happen, instead of days, weeks or months later. Leveraging intelligent data collection and analysis, the Seceon Open Threat Management platform provides unmatched visibility across the entire network – from users and devices to applications and flows – surfacing only the most relevant threats in real-time and the means necessary to eliminate them immediately.
Virtual Instruments is the leader in application-centric infrastructure performance management. It provides comprehensive infrastructure instrumentation and performance analytics for enterprise data centers. The company’s solutions give IT teams deep workload visibility and actionable insights into their end-to-end systems across the hybrid data center. Virtual Instruments empowers companies to maximize the performance, availability and utilization of their production IT infrastructure. Virtual Instruments has over 500 customers, including enterprise IT, cloud service providers and vendors. The privately held company is headquartered in San Jose, Calif.
Microsoft is the leading platform and productivity company for the mobile-first, cloud-first world, and its mission is to empower every person and every organization on the planet to achieve more.
Microsoft Azure is a comprehensive set of cloud services that developers and IT professionals use to build, deploy, and manage applications through our global network of datacenters. Integrated tools, DevOps, and a marketplace support you in efficiently building anything from simple mobile apps to internet-scale solutions.
RedShift Networks, Inc., provides a UCTM software product suite to global carriers managing VoIP networks that allows carriers to manage VoIP/SIP Security, threat intelligence analytics and fraud detection and prevention. Global carriers urgently need real-time security and analytics solutions that can detect anomalous network traffic as these carriers migrate their edge and core voice networks to SIP, IMS and VoLTE. RedShift patented products provide real-time detection of VoIP and SIP threats via a multi-level and hierarchical threat detection and analytics system to prevent false positives and negatives in core carrier networks. The company has 45 deployments and trials in tier 1 to tier 3 carriers in the cable, fixed line, mobile (VoLTE/IMS), inter-exchange and VoIP cloud enterprise markets.
Sentinel IPS relieves the burden of security for businesses with its active threat management system based on collective intelligence. As a managed service, it's the extra team you need — but one that never sleeps.
Nectar is the global market leader in providing the most comprehensive monitoring and diagnostics software solution for Unified Communication services, enables IT and operation organizations to proactively ensure the end-user experience. Nectar’s flagship offering, the Unified Communications Management Platform (UCMP), improves visibility and service delivery across integrated voice, video and data application solutions by providing unique and critical performance information. Nectar provides monitoring and diagnostics for millions of enterprise endpoints to over 2,100 enterprises in over 86 countries—including some of the largest global banking, search engine, service provider, healthcare, and manufacturing organizations in the world.
At ZingBox, we recognize that to realize the full benefit of IoT devices requires a revolutionary approach to security. Rather than being handcuffed by traditional IT security philosophy, we designed an IoT security solution from the ground up specifically to secure IoT environments. Our solution is non-intrusive, clientless, cloud-based, and out-of-band. These features are not simply the benefits of our solution – they are the underlying principle.
RedShift Networks, Inc. provides a Unified Communications Threat Management (UCTM) software product suite to global carriers managing Voice Over IP (VoIP) networks that allows carriers to manage VoIP/SIP Security, Threat Intelligence Analytics and Fraud Detection / Prevention. Global carriers urgently need Real-time Security and Analytics solutions that can detect Anomalous network traffic as these carriers migrate their edge and core voice networks to SIP / IMS / VoLTE.
ReversingLabs is a leading provider of threat intelligence solutions that dramatically accelerate and broaden an organization’s ability to detect new threats, respond to incidents and gain visibility on attacks. Our solutions implement unique, innovative technologies that perform real-time deep inspection and analysis to detect threats within files. Large enterprises, government agencies and security vendors use these solutions to implement enterprise-scale classification, analysis and hunting.
Endace’s multifunctional Network Analytics Platform can host 3rd-party network analytics applications while simultaneously recording a 100% accurate Network History, providing definitive evidence for investigating cybersecurity threats, quantifying data breaches and analyzing network or application performance problems.
WireX Systems is shifting the paradigm in network forensics and incident response with a solution that engages every security team member to conduct faster, better investigations while reducing data retention costs. The company’s Contextual Capture™ technology provides immediate context into security alerts, delivering months of in-depth visibility to the world’s largest organizations.
Awake Security accelerates an organization’s ability to detect threats that blend with business-justified activity, such as file-less malware, malicious insiders, credential abuse and lateral movement. Its Security Investigation Platform uses artificial intelligence and machine learning to combine data such as network full-packet capture and a security teams’ institutional knowledge, providing analysts with a context data model that correlates, profiles and tracks entities, including devices, users and domains.
Corelight provides the most powerful network visibility solutions for information security professionals. Built on Bro, the open source network security monitoring framework, Corelight Sensors help organizations understand their network traffic to detect and stop cyber attacks. Bro has been in use since 1995 when it was created by Vern Paxson, Corelight's co-founder and chief scientist. Corelight Sensor appliances provide the right type and volume of information organized to help you understand network traffic deeply and take action to stop and prevent cyber attacks. With dozens of specialized logs and over 400 fields of derived data that can be ingested into your SIEM or analytics stack, Corelight will make your log analysis even more powerful.
Today's fast-moving digital environment enables enterprises to operate more efficiently, gain competitive advantage and serve customers better than ever before. It also multiplies the security risks. nCipher Security empowers world-leading organizations by delivering trust, integrity and control to their business critical information and applications.
Our cryptographic solutions secure emerging technologies – cloud, IoT, blockchain, digital payments – and help meet new compliance mandates. Using the same proven technology that our customers depend on today to protect against threats to their sensitive data, network communications and enterprise infrastructure. We deliver trust for your business critical information and applications, ensuring the integrity of your data and putting you in complete control – today, tomorrow, and at all times.
WitFoo exists to mature the craft of Information Security and to stop systemic failure in incident response. Founded in early 2016, WitFoo develops tools that significantly reduce the noise associated with cyber-attacks and builds processes that accelerate incident response.
Bandura pioneered the concept of a Threat Intelligence Gateway (TIG) for the U.S. Department of Defense, and over 50 issued and pending patents later, the company continues to offer the most comprehensive, scalable and granular TIG platform on the market. Organizations worldwide use TIGs for the automation and control needed to operationalize hundreds of millions of threat indicators, blocking known threats before they even reach the network firewall. https://banduracyber.com/
Cynerio provides a unique network based platform that gives security leaders control over the security of their connected medical devices, and enables them to respond rapidly and effectively to incidents to ensure patient safety and data protection.