Partnership

Technology we use

Axonius is a cybersecurity asset management platform that helps organizations see, manage, and secure all assets — including devices, users, cloud resources, software, and more — across their entire environment.

It connects to hundreds of data sources (like Active Directory, MDMs, EDRs, cloud providers, etc.) to build a complete, up-to-date inventory of everything in your network.

Cloudflare

Cloudflare, Inc. (NYSE: NET) is on a mission to help build a better Internet. Cloudflare is a global cloud services provider that delivers a broad range of services to businesses of all sizes and in all geographies—making them more secure, enhancing the performance of their business-critical applications, and eliminating the cost and complexity of managing individual network hardware.

CrowdStrike

CrowdStrike’s expanded endpoint security solution suite leverages cloud-scale AI and deep link analytics to deliver best-in-class XDR, EDR, next-gen AV, device control, and firewall management. Our endpoint security offerings are truly industry-leading, highly regarded by all three of the top analyst firms: Gartner, Forrester, and IDC.

Cloud security

CrowdStrike’s powerful suite of CNAPP solutions provides an adversary-focused approach to Cloud Security that stops attackers from exploiting modern enterprise cloud environments. By combining agent-based and agentless protection in a single, unified platform experience with integrated threat intelligence, the Falcon platform delivers comprehensive visibility, detection and remediation to secure cloud workloads with coverage from development to runtime.

Threat intelligence

CrowdStrike’s threat intel offerings power an adversary-focused approach to security and takes protection to the next level delivering meaningful context on the who, what, and how behind a security alert. CrowdStrike Falcon® Intelligence threat intelligence is integrated throughout Falcon modules and is presented as part of the incident workflow and ongoing risk scoring that enables prioritization, attack attribution, and tools to dive deeper into the threat via malware search and analysis.

Security and IT operations

CrowdStrike Falcon® delivers security and IT operations capabilities including IT hygiene, vulnerability management, and patching. All of this gets enriched by world-class threat intelligence, including capabilities to conduct malware searching and sandbox analysis that are fully integrated and automated to deliver security teams deep context and predictive capabilities.

CyberArk

CyberArk Privileged Access Management (PAM) manages privileged credentials. It automatically discovers and onboards privileged credentials and secrets used by human and non-human identities. Centralized policy management allows administrators to set policies for password complexity, frequency of password rotations, which users may access which safes, and more. Automated password rotation helps strengthen security while eliminating time-intensive, manual processes for the IT teams.

Cyble is a global cybersecurity company specializing in AI-driven threat intelligence. It empowers organizations to proactively detect, monitor, and respond to cyber threats across the surface web, deep web, and dark web .​

Cyble offers a suite of solutions designed to enhance cybersecurity posture:

  • Cyber Threat Intelligence (CTI): Provides real-time insights into emerging threats, enabling organizations to make informed security decisions.

  • Attack Surface Management (ASM): Identifies and monitors all external-facing assets to detect vulnerabilities and potential entry points for attackers.

  • Dark Web Monitoring: Tracks illicit activities and mentions of the organization’s data or brand on dark web forums and marketplaces.​

  • Brand Intelligence: Detects and mitigates instances of brand impersonation, phishing campaigns, and fraudulent domains.​

  • Vulnerability Management: Assesses and prioritizes vulnerabilities to streamline remediation efforts.​

  • Third-Party Risk Management: Evaluates the cybersecurity posture of vendors and partners to manage supply chain risks.​

  • Takedown Services: Assists in removing malicious content and disrupting cybercriminal infrastructure.​

CYFIRMA is a cybersecurity company specializing in external threat landscape management. Their flagship platform, DeCYFIR, integrates cyber intelligence, attack surface discovery, and digital risk protection to provide organizations with predictive, personalized, and contextual insights into potential cyber threats.

CYFIRMA’s solutions are designed to help organizations proactively identify and mitigate cyber risks by offering:

  • Cyber Intelligence: Provides multi-layered intelligence—strategic, management, and tactical—tailored to an organization’s industry, geography, and technology stack. This helps in understanding the motives, methods, and campaigns of potential cyber adversaries.

  • Attack Surface Discovery: Continuously monitors and identifies an organization’s external-facing assets, such as domains, IP addresses, and software versions, to detect vulnerabilities and potential entry points for attackers.

  • Digital Risk Protection: Monitors the surface, deep, and dark web for mentions of an organization’s data, brand, or executives to detect data leaks, impersonations, and other digital threats.

  • Vulnerability Intelligence: Maps identified vulnerabilities to specific assets and associated exploits, ranking them based on criticality to prioritize remediation efforts.

  • Brand Intelligence: Detects and mitigates instances of brand impersonation, phishing campaigns, and fraudulent domains to protect an organization’s reputation.

  • Situational Awareness: Provides insights into emerging threats, potential attack scenarios, and their impact on the organization, enabling informed decision-making.

  • Third-Party Risk Monitoring: Evaluates the cybersecurity posture of vendors and partners to manage supply chain risks.

 

 

Efficient IP

Efficient IP is a network security and automation company specializing in DNS-DHCP-IPAM (DDI). EfficientIP enables IP-based communication, simplifies network management and enhances operational efficiency thanks to global visibility, consistency control and smart automation of DDI. They secure DNS services to safeguard data confidentiality, protect users and ensure application access in cloud and on-premise. We can help by ensuring your IP infrastructure foundation reliable, agile and secure.

Elastic

Elastic Security combines SIEM threat detection features with endpoint prevention and response capabilities in one solution. These analytical and protection capabilities, leveraged by the speed and extensibility of Elasticsearch, enable analysts to defend their organization from threats before damage and loss occur.

Elastic Security provides the following security benefits and capabilities:

  • A detection engine to identify attacks and system misconfigurations
  • A workspace for event triage and investigations
  • Interactive visualizations to investigate process relationships
  • Inbuilt case management with automated actions
  • Detection of signatureless attacks with prebuilt machine learning anomaly jobs and detection rules

F5

F5’s portfolio of security, performance, automation, and insight capabilities empowers our customers to create, secure, and operate adaptive applications that reduce costs, improve operations, and better protect users. It defends your organization against existing and emergent threats by deploying comprehensive security solutions that protect critical applications from bot attacks, web fraud, unauthorized access, DDoS attacks, DNS attacks, and attacks against APIs. Ensure policy compliance across your entire application portfolio—no matter how your apps are built or where they are deployed.

Forcepoint

Identifying valuable risk insights and turning them into actionable protective measures remains challenging in government environments. Today’s behavior analytics tools can provide various insights into risky and anomalous activity but are powerless to enforce protection policies. Forcepoint’s human-centric cybersecurity approach integrates best-in-class products with analytics and behavioral profiling, bringing agencies near real-time risk insights and automated remediation to better protect government users’ data wherever it resides, including Controlled Unclassified Information (CUI).

Forcepoint Dynamic Data Protection is an industryfirst converged solution for next-generation DLP that delivers risk-adaptive protection. It combines Forcepoint’s industry-leading DLP capabilities with a behavior-centric analytics capability to protect against data exfiltration. Dynamic Data Protection establishes a “normal” baseline of user behavior and applies a range of automated security countermeasures based on fluctuations in a user’s risk score, all without administrator intervention.

Fortinet

The Fortinet Security Fabric continuously assesses the risks and automatically adjusts to provide comprehensive real-time protection across the digital attack surface and cycle. Powered by FortiOS, the Fabric is the industry’s highest-performing integrated cybersecurity mesh platform with the broadest open ecosystem for all cybersecurity mesh architectures (CSMA). The Fabric enables consistent security across the extended digital attack surface and deployments. Seamless interoperability, complete visibility, and granular control are now possible for hybrid deployments including hardware, software, and X-as-a-Service across networks, endpoints, and clouds.

KnowBe4

We are partnered with KnowBe4, the only platform that truly addresses the human element of cybersecurity. The platform includes a comprehensive suite of awareness & compliance training, real-time user coaching, AI-powered simulated social engineering, and crowdsourced anti-phishing defense.

Discover why 65,000+ organizations worldwide use KnowBe4 to empower their workforces to make smarter security decisions every day.

Request a demo to learn more: [+62 21 29858080]

MicroFocus

ArcSight Enterprise Security Manager

Empower your security operations team with ArcSight Enterprise Security Manager (ESM), a powerful, adaptable SIEM that delivers real-time threat detection and native SOAR technology to your SOC. It monitor threats from across your enterprise. You need to see a threat before you can stop it. ArcSight’s scalable data collection framework gives you visibility into every security event across your organization. It makes your data more cost-effective and useful by aggregating, normalizing, and enriching it for security analytics.

Fortify Software Security Center

Fortify Software Security Center enables organizations to automate an application security program. It provides management, development, and security teams a way to work together to triage, track, validate, and manage software security activities. It centrally manage software risk at enterprise scale. It ensures that all software meets compliance goals for internal and external security mandates, including 800+ vulnerability categories for SAST that enable compliance with standards such as OWASP Top 10, CWE/SANS Top 25, DISA STIG, and PCI DSS. Holistic application security platform with a SAST + DAST model that includes our next-generation dynamic application security testing capabilities to automate DAST in your CI/CD process using ScanCentral.

Mimecast is a cloud-based cybersecurity company that provides solutions to protect email, data, and communication tools against cyber threats. It’s widely used by organizations to improve their cyber resilience by combining threat intelligence, AI-based analysis, and human risk management.

Advanced Email Security
  • Protects against phishing, malware, ransomware, and business email compromise (BEC).

  • Uses AI and machine learning to detect advanced threats before they reach end users.

Secure Email Gateway
  • Filters out spam, viruses, and targeted attacks.

  • Offers customizable policies and centralized threat visibility.

Email Archiving
  • Provides secure, long-term cloud storage for emails.

  • Helps with compliance, e-discovery, and quick search.

Email Continuity
  • Keeps email up and running during outages of your primary email system (like Microsoft 365).

  • Users can access email via Outlook, web, or mobile, even if the main service is down.

Security Awareness Training
  • Interactive training to reduce human risk from phishing and other attacks.

  • Helps organizations improve employee cybersecurity behavior.

DMARC Analyzer
  • Helps implement DMARC to prevent email spoofing and improve domain security.

  • Provides clear reporting and actionable insights on email traffic.

Brand Exploit Protect
  • Detects and takes down fake websites and impersonated domains.

  • Protects your company’s brand, customers, and employees from targeted attacks.

OpenText is a global leader in Information Management, offering a comprehensive suite of products designed to help organizations manage, secure, and leverage their data effectively. Here’s an overview of their key product categories.

Content Cloud

    • OpenText™ Content Suite: Enterprise content management system for document control and compliance.
    • OpenText™ Extended ECM: Integrates content management with leading applications like SAP and Microsoft 365.
    • OpenText™ Documentum: Manages complex content lifecycles and compliance requirements.
    • OpenText™ Core Content: Cloud-native content management platform.​

Business Network Cloud

    • OpenText™ Trading Grid: Facilitates secure B2B integration and electronic data interchange (EDI).
    • OpenText™ Active Applications: Streamlines supply chain processes and partner collaboration.​

Experience Cloud

    • OpenText™ Exstream: Enables personalized customer communications across channels.
    • OpenText™ Media Management: Manages digital assets for marketing and branding.
    • OpenText™ TeamSite: Web content management for creating and optimizing digital experiences.​

Cybersecurity Cloud

    • OpenText™ EnCase: Digital investigation and forensic analysis tool.
    • OpenText™ Webroot: Provides endpoint protection and threat intelligence.
    • OpenText™ Carbonite: Offers data backup and disaster recovery solutions.
    • OpenText™ Voltage: Delivers data encryption and privacy solutions.​

DevOps Cloud

    • OpenText™ Fortify: Application security testing for identifying vulnerabilities.
    • OpenText™ LoadRunner: Performance testing for applications under load.
    • OpenText™ ALM/Quality Center: Manages application lifecycle and quality assurance.​

Analytics Cloud

    • OpenText™ Magellan: AI-powered analytics platform for big data insights.
    • OpenText™ Big Data Analytics: Provides predictive analytics and data visualization.​

Observability and Service Management Cloud

    • OpenText™ Operations Bridge: Monitors IT operations and infrastructure.
    • OpenText™ Service Management Automation: Streamlines IT service management processes.​

Digital Workplace Solutions

    • OpenText™ Core Collaboration: Facilitates secure team collaboration and file sharing.
    • OpenText™ Email Archiving: Ensures compliance and easy retrieval of email communications.
    • OpenText™ Unified Endpoint Management: Manages and secures endpoints across the organization.

PaloAlto

Palo Alto Networks offers an enterprise cybersecurity platform which provides network security, cloud security, endpoint protection, and various cloud-delivered security services. Components of the security platform listed on the Palo Alto Networks website include:[55]

  • Next-generation firewalls, running PAN-OS,[56] offered in multiple forms including:[57]

o    As a physical appliance through the PA series, which includes small form-factor firewalls such as the PA-220 for small business and offices, to the PA-7000 series built for large enterprises and service providers.

o    As a virtualized appliance through the VM series, allowing the firewall to be run as a virtual machine to secure virtualized data centers and private clouds. It is also compatible with public cloud environments such as Amazon Web ServicesMicrosoft Azure, and Google Cloud.

o    As a streamlined cloud service provided by Palo Alto Networks through GlobalProtect Cloud Service.

  • Panorama, a network security control center that allows customers to manage a fleet of firewalls at an enterprise scale from a single console.[58]
  • Traps advanced endpoint protection. Unlike a traditional antivirus, Traps does not rely on signatures to detect malware. Instead, it focuses on analyzing the behavior of programs to detect zero-day exploits. Threat intelligence is shared with and obtained from Wildfire.[59]
  • Wildfire, a cloud-based threat-analysis service which uses dynamic analysisstatic analysismachine learning, and bare-metal analysis to discover and prevent unknown threats.[60]

Qualys

Qualys ensures your company complies with internal IT policies and with external regulations gets harder every day. With a user-friendly, guided approach, a simple, intuitive interface, and constant support, Qualys streamlines compliance with PCI DSS (Payment Card Industry Data Security Standard). Qualys’ complete PCI solution, based on the integrated Qualys Cloud Platform, covers 97% of all PCI DSS requirements. As an Approved Scanning Vendor (ASV), Qualys has been authorized by the PCI Security Standards Council to conduct the quarterly scans required to show compliance with PCI DSS.

Rapid7 offers a comprehensive suite of cybersecurity solutions designed to help organizations manage vulnerabilities, detect and respond to threats, secure cloud environments, and automate security operations. Here’s an overview of their key products:​

Vulnerability Management
  • InsightVM: A cloud-based vulnerability management solution that provides real-time visibility into your IT environment, helping prioritize and remediate security risks effectively.

  • Nexpose: An on-premises vulnerability scanner that identifies and assesses vulnerabilities across your network, offering actionable insights for remediation.

Detection & Response
  • InsightIDR: A cloud-native SIEM (Security Information and Event Management) solution that combines user behavior analytics, endpoint detection, and centralized log management to detect and respond to threats efficiently.

  • Threat Command: Provides external threat intelligence to identify, investigate, and remediate threats targeting your organization beyond the network perimeter.

Cloud Security
  • InsightCloudSec: Offers continuous security and compliance for cloud environments by providing visibility, governance, and automated remediation across various cloud platforms.

Application Security
  • InsightAppSec: A dynamic application security testing (DAST) solution that scans web applications for vulnerabilities, helping developers remediate issues before deployment.

  • tCell: Provides runtime application self-protection (RASP) by monitoring and protecting applications in real-time against attacks.

Security Orchestration & Automation
  • InsightConnect: A security orchestration, automation, and response (SOAR) solution that enables teams to automate repetitive tasks and integrate security tools for streamlined operations.

Penetration Testing
  • Metasploit: An open-source penetration testing framework that allows security professionals to test system vulnerabilities and improve security defenses.

Recorded Future offers a comprehensive suite of cybersecurity products within its Intelligence Cloud platform, designed to provide real-time, actionable threat intelligence. Here’s an overview of their key products:​

Recorded Future Intelligence Cloud

The Intelligence Cloud is an AI-driven platform that aggregates data from over a million sources, including the open web, dark web, technical feeds, and customer telemetry. It utilizes the Intelligence Graph® to analyze and map billions of associations in real-time, enabling organizations to detect and respond to emerging threats swiftly.

Modular Product Offerings

Recorded Future’s platform is modular, allowing organizations to tailor their threat intelligence capabilities to specific needs.

Key Platform Features
  • Intelligence Graph®: An AI-powered engine that continuously indexes and analyzes data, revealing emerging risks and enabling proactive defense strategies.

  • Recorded Future AI: Utilizes machine learning to enhance data collection, categorization, and predictive modeling, improving threat detection accuracy.

  • Collective Insights®: Enriches data from security tools with threat intelligence to uncover patterns and improve detection capabilities.

  • Integrations & APIs: Offers seamless integration with existing security tools and workflows through pre-built integrations and flexible APIs.

 

Red Hat

  • Red Hat offers a comprehensive suite of open-source products designed to support enterprise IT infrastructure, application development, automation, cloud computing, and more.

Operating System

  • Red Hat Enterprise Linux (RHEL): A robust, secure, and scalable Linux distribution tailored for enterprise environments.

 

SecurityScoreCard

SecurityScorecard provides instant visibility into enterprise security posture as well as the cyberhealth of all vendors and partners in any organization’s ecosystem. The platform uses trusted commercial and open-source threat feeds, and nonintrusive data collection methods, to quantitatively evaluate and continuously monitor the security posture of thousands of organizations worldwide. SecurityScorecard delivers the most accurate, transparent, and comprehensive security risk ratings available for small to large enterprises in every industry sector.

SecurityScorecard is a security ratings service and ecosystem risk management platform that enables internal security teams, vendor risk managers, procurement and M&A teams, and cyber insurance underwriters to assess their security posture and that of their third-party vendors and partners, M&A targets or potential policyholders to collaboratively reduce ecosystem risk and make better cybersecurity decisions.

Silverfort

offers a comprehensive suite of identity security solutions designed to protect organizations against identity-based threats across all environments—on-premises, cloud, hybrid, and operational technology (OT). Their platform integrates seamlessly with existing Identity and Access Management (IAM) infrastructures without requiring agents or proxies, enabling rapid deployment and minimal disruption.​

Key Products and Capabilities

Universal Multi-Factor Authentication (MFA)
Extends adaptive MFA to all resources, including legacy systems, command-line tools, and industrial control systems that traditionally couldn’t support MFA.

SOCRadar

offers a comprehensive suite of cybersecurity products designed to provide organizations with proactive threat intelligence, digital risk protection, and attack surface management.

Cyber Threat Intelligence (CTI)

SOCRadar’s CTI module delivers real-time insights into cyber threats by monitoring various sources, including the dark web, hacker forums, and social media platforms. Key features include:

  • Threat Actor Monitoring: Profiles and tracks activities of known threat actors and ransomware groups.

  • Vulnerability Intelligence: Prioritizes vulnerabilities based on exploitability and threat context.

  • Threat Hunting: Utilizes an extensive library of threat hunting rules and indicators of compromise (IOCs) to detect potential threats.

  • Malware Analysis Sandbox: Provides a secure environment to analyze suspicious files and URLs.

  • Financial Threat Intelligence: Tracks blockchain transactions and addresses associated with cybercriminal activities.

 

Tenable

offers a comprehensive suite of cybersecurity products focused on vulnerability management, cloud security, identity protection, and exposure management.

Vulnerability Management

  • Tenable Nessus: A widely recognized vulnerability scanner used to identify and assess security vulnerabilities across various systems.

  • Tenable Vulnerability Management: A cloud-based platform that provides continuous visibility into your organization’s assets and vulnerabilities, enabling proactive risk management.

  • Tenable Security Center: An on-premises solution offering advanced analytics and dashboards for comprehensive vulnerability assessment and compliance monitoring.

 

Trellix

is a cybersecurity company that offers a comprehensive suite of products designed to protect organizations across various digital domains.

Endpoint Security

Trellix provides robust solutions to safeguard endpoints against a wide range of threats:

  • Endpoint Security (ENS): A unified agent delivering antivirus, firewall, web control, and advanced threat protection.

  • Endpoint Detection and Response (EDR): Offers real-time threat detection, automated investigations, and rapid response capabilities.

  • Application Control: Restricts unauthorized applications from executing, reducing the attack surface.

  • Device Control: Manages and monitors peripheral devices to prevent data exfiltration.

 

TrendMicro

Trend Micro, a global leader in cybersecurity, helps make the world safe for exchanging digital information. Leveraging over 30 years of security expertise, global threat research, and continuous innovation, Trend Micro enables resilience for businesses, governments, and consumers. Our XGen™ security strategy powers our solutions with a cross-generational blend of threat-defense techniques that are optimized for key environments and leverage shared threat intelligence for better, faster protection. Our connected solutions are optimized for cloud workloads, endpoints, email, IIoT, and networks and deliver central visibility across the enterprise, enabling you to detect and respond to threats faster. With over 6,800 employees in 65 countries, and the world’s most advanced global threat research and intelligence, Trend Micro enables organizations to secure their connected world. Trend Micro’s “Trenders” are passionate about doing the right thing to make the world a safer and better place.

YesWeHack is a Bug Bounty and crowdsourced security platform that connects companies with ethical hackers (also known as white-hat hackers) to find and fix security vulnerabilities in their digital systems.

It’s a trusted platform used by organizations around the world to improve cybersecurity through ethical hacking.

Zscaler is a cloud-based cybersecurity platform that helps organizations secure their internet traffic, users, and data, no matter where employees are working — in the office, at home, or on the go.

It’s one of the leaders in the Zero Trust Security model and Secure Access Service Edge (SASE) architecture.