Gain the confidence to Open, Click, and Trust Everything in your Inbox. Agari Secure Email Cloud detects threats and prevents advanced email attacks that evade legacy email security controls. Visit Agari’s website for more information.
Arcserve provides a comprehensive appliance based solution set for backup and immutable storage. Together with Storage Craft, it offers data protection, recovery and scale-out storage for all IT environments. Visit Arcserve’s website for more information.
Attivo Networks’ ThreatDefend Deception and Response Platform that mimics your network, providing a “hall of mirrors” that misdirects external attackers that make it through your firewall, or internal disgruntled employees, and analyses and responds to the threats. Visit Attivo Networks’ website for more information.
BlackBerry’s software provides a secure environment for file-sharing and content dissemination across entire companies without sacrificing security. With Unified Endpoint Management, this is available even for workplaces with high numbers of personal devices connected to the corporate network. Visit BlackBerry’s website for more information.
BlockAPT provides threat intelligence, SIEM, SOAR, XDR and Incident Response in a single platform. Monitor, Manage, Automate and respond to cyber threats 24 hours a day. BlockAPT is particularly suited to smaller organisations who require a single unified cybersecurity solution. Visit BlockAPT’s website for more information.
Protection of individual machines, such as laptops, PCs, mobile phones, is one of the hardest aspects of cybersecurity; attacks can occur around the clock, and are often unrecognisable as attacks until they are already underway. Check Point’s SandBlast acts to contain malware in a virtual sandbox, and in the event of an infected machine will isolate it from the network. Post-incident management is expedited by SandBlast’s forensic recording and report analysis. Visit Check Point’s website for more information.
With more than 90% of breaches attributed to successful phishing campaigns it’s easy to point to the employee as the root cause, the problem to be solved. Cofense believes employees should be empowered as part of the phishing protection solution and gather real-time attack intelligence to stop attacks in progress. Learn more about Cofense’s Human Phishing Defense Solutions.
ColorTokens offers a platform-agnostic solution that can be deployed on any network or application infrastructure, enabling the enterprise to implement best-in-class secure micro-segmentation, independent of vendor. ColorTokens technology can span subnets, VLANs and firewalls, making it work across multi-vendor hybrid enterprise infrastructures, managed from a central console. Visit ColorToken’s website for more information.
The Crowdstrike Falcon platform combines machine learning, behaviour analytics, and constant monitoring to counter today’s sophisticated cyberattacks, alerting you to threats and providing you with both an incident timeline and real-time adversary analysis. Visit Crowdstrike’s website for more information.
CybSafe’s “Unified Cyber Awareness Platform” instils a culture of security by providing high-quality training in cyber threat awareness and response. The majority of cyber threats rely on the human mistakes, and so are preventable through the structured education with frequently updated modules and engaging content that CybSafe can provide. For more information read our CybSafe Datasheet, or visit the CybSafe website.
CyGlass Network Defense as a Service simply and effectively identifies, detects, and responds to threats to your network without requiring any additional hardware, software, or people. The CyGlass Cloud continuously analyses the billions of conversations happening on your network, learns what is normal, and alerts when suspicious behaviors are detected. Visit CyGlass’s website for more information.
Cynet 360 is the world’s first autonomous breach protection platform that consolidates and automates Monitoring & Control, Attack Prevention & Detection and Response Orchestration across the entire environment. All in a single cybersecurity platform, providing a unified solution to help you protect your organisation. Cynet 360 uses advanced sensors that continuously analyse all activity from the protected environment: user activity, process behavior and network traffic to provide threat protection of unmatched accuracy. It also provides automated remediation for the identified cybersecurity threats. Visit Cynet’s website for more information.
Deep Instinct is an Advanced Endpoint Protection solution that stops ransomware before it has a chance to execute. Based on deep learning, it uses advanced artificial intelligence to detect and prevent malware. Sitting at the start of the attack chain, with a greater than 99% unknown threat accuracy and less than 0.1% false positives, Deep Instinct will reduce the noise to let your teams focus on the real issues and can be used in conjunction with your existing anti-malware/EDR/XDR systems. For Enterprise scale users, Deep Instinct is backed by the industry’s biggest and best ransomware warranty — up to $3M. Click here for more information on Deep Instinct.
Driven by the need to move faster at a global scale while reducing costs, enterprises are experiencing digital transformation. This evolution includes the adoption of new technologies that widen the attack surface, leaving network perimeters vulnerable to advanced threats, resulting in a complex security environment. The Fortinet Security Fabric segments the entire network, from the Internet of Things (IoT) to the cloud, to provide superior protection against sophisticated threats. Visit Fortinet’s website for more information.
Powered by HighSide’s distributed Encryption & Authentication Protocol, the HighSide platform enables businesses and governments to secure their data and communications while engaging securely in a decentralised, remote world. HighSide’s Collaboration Suite provides secure collaboration, text, voice and video; encrypted file sharing and storage; and distributed authentication. For Microsoft Teams users, HighSide’s SecureTeams is the only Microsoft approved encryption module for Teams and enables the secure sharing of sensitive information and data on the Teams platform. Visit Highside’s website for more information.
Hytrust Cloud Security provides advanced privileged user access control, policy enforcement, forensic and automated compliance for private clouds. It provides powerful data-at-rest encryption and integrated key management for workloads running in any cloud environment, encrypting workloads to help ensure data is protected. Visit Hytrust’s website for more information.
IDECSI provides real-time monitoring of your applications such as email, and detects any malicious or irregular access; any employee can see their own security data from their computer or their smartphone, to help them take control of their own security. The software is agentless, taking only two hours to install and requiring no access to confidential data. Visit IDECSI’s website for more information.
Libraesva Email Security Gateway helps you protect your business, detecting all types of cyber threats and attacks spread via email. It offers seamless integration with Office365, Exchange, G-Suite and many others. It is quick to set up and can be used either on-premise or via private cloud. Click here for more information on the Libraesva Email Security Gateway.
Link11’s Cloud Security Platform protects you from cyber threats of any scale – smarter, faster, safer. Fully automated, the system mitigates DDoS and other attacks in real time, without human interaction. Their predictive AI improves with each assault. And your business stays online, no matter what. Visit Link11’s website for more information.
The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security protections. Securing data in the post-perimeter world requires organisations to move critical security capabilities to endpoints, and establish continuous conditional access to data based on risk. Lookout uses their continuous conditional access systems to keep your company data safe, wherever your work is being done. Visit Lookout’s website for more information.
Menlo Security takes a new approach to active security. With the volume of attacks meaning that stopping everything every-time is impossible, Menlo has taken a different stance; with its focus on isolation using cloud based, secure browsers, Menlo prevents attacks from ever reaching your user’s devices. This results in a total elimination of malware infections, 95+% decline in credential loss, and similar reductions in corporate data leakage. All with no change to the user experience. Visit Menlo Security’s website for more information.
minereye employs advanced computer vision and machine learning technologies to offer the most comprehensive vehicle for tracking and protecting your organisation’s sensitive data. Visit minereye’s website for more information.
EnterpriseRed have partnered with Nebula Global Services and are now able to provide a range of technical resources to augment your team. We can offer Professional Services, from simple deployments to complex projects; Managed Services, including remote technical support; NOC/SOC Services, including CISO-as-a-Service and Staff Augmentation, Technical Resource-as-a-Service. These can be provided on a global basis to minimise your overheads. Visit Nebula’s website for more information.
Netwrix’s Auditor Data Discovery & Classification tool lets you see where sensitive files are located and what is inside them, ensure that access controls around sensitive data are risk-appropriate and demonstrate that you can protect data as required by regulations. Visit Netwrix’s website for more information.
OneLogin streamlines identity and access management through a unified directory with a single sign on (SSO) system that covers workplace computers and mobile devices. This presents a simple, intuitive log-in system that reduces the need for multiple usernames and changing passwords. Visit OneLogin’s website for more information.
Preventing privileged access abuse is difficult for any company- the threat of insiders leaking or stealing information can pose huge risks to the profitability or even integrity of a company. Osirium’s privileged access management software acts as a security layer between the person and the server, limiting access to only what is necessary for the person to do their job whilst never revealing credentials. Visit Osirium’s website for more information.
RedSeal’s network modelling creates a usable “map” of your online systems, giving you situational awareness and the ability to understand the connections between devices within your company. Understanding what you’re securing is vital in cybersecurity, and RedSeal provides a score that helps prioritise risks to your most vulnerable assets. Visit RedSeal’s website for more information.
Redstor provides centralised management and on-demand access to all of your data, wherever it is stored, through a single application. It provides Backup and Recovery, Archiving and Disaster Recovery from any cloud environment including Microsoft O365, AWS and Google Cloud. Redstor is SaaS based so there is no hardware installation required. Visit Redstor’s website for more information.
Swimlane’s Security Orchestration, Automation and Response platform standardizes and accelerates incident response processes to improve consistency, decrease mean time to resolution and lower operating costs. Respond to more alerts faster without adding overhead. Visit Swimlane’s website for more information.
CyberScore from XQCYBER is a fully automated, rapid, and scaleable cybersecurity testing and rating service. CyberScore enables users to discover their cybersecurity ‘score’ and generate high quality reports that help communicate and remediate vulnerabilities around the business and throughout the supply chain. Visit XQCYBER’s website for more information.
Cognito™ from Vectra uses artificial intelligence to deliver real-time attack visibility and put attack details at your fingertips to empower immediate action. It automates the hunt for cyber attackers, shows where they’re hiding and tells you what they’re doing. The highest-risk threats are instantly prioritised so security teams can respond more efficiently to stop in-progress attacks and avert data loss. Visit Vectra’s website for more information.
The ZeroFOX Platform identifies and remediates targeted business, brand and security risks using intelligent analysis and diverse data sources. The patented ZeroFOX SaaS technology processes and protects millions of posts, messages and accounts daily across the social and digital landscape. Security, marketing, risk and fraud professionals use ZeroFOX to stop risks where your organisation is most valuable, most visible and most vulnerable. Visit Zerofox’s website for more information.
Zivver’s offering to the security market is a game changer for those companies looking to move their information security to the next level. Combining legal and regulatory compliance with minimal IT infrastructure impact all while maintaining full control and powerful insight tools; the power Zivver provides should never be understated. Visit Zivver’s website for more information.