|Stormshield has been developing its position as a pioneer in the world of cybersecurity for nearly 20 years now. Active in more than 40 countries around the world, the company is constantly growing, bolstered by a strong network of partners and distributors.|
|Broadcom Inc. is a global infrastructure technology leader built on 50 years of innovation, collaboration and engineering excellence. With roots based in the rich technical heritage of AT&T/Bell Labs, Lucent and Hewlett-Packard/Agilent, Broadcom focuses on technologies that connect our world. Through the combination of industry leaders Broadcom, LSI, Broadcom Corporation, Brocade, CA Technologies and Symantec, the company has the size, scope and engineering talent to lead the industry into the future.|
|Kaspersky is the world's largest privately held vendor of internet security solutions for businesses and consumers. Over 400 million users are protected by Kaspersky technologies and they help over 270,000 corporate clients protect what matters most to them.|
|Enable users to connect quickly and securely to any cloud destination, from anywhere, with iboss cloud
iboss is a cloud security company that provides organizations and their employees fast and secure access to the Internet on any device, from any location, in the cloud. The iboss cloud platform provides network security as a service, delivered in the cloud, as a complete SaaS offering. This eliminates the need for traditional network security appliances, such as firewalls and web gateway proxies, which are ineffective at protecting a cloud-first and mobile world. Leveraging a purpose-built cloud architecture backed by over 190 issued and pending patents and more than 100 points of presence globally, iboss protects more than 4,000 organizations worldwide. Simply put, any security function that you can perform with a network firewall or web proxy appliance, you can perform with the iboss platform – without the appliances.
|C3M, LLC is a San Francisco headquartered Cloud Security solutions provider. C3M’s cloud security platform is a 100% Agent-less, API based, cloud-native security solution that offers organisations complete cloud control through automated security intelligence, giving them actionable insights into the cloud, its security, and infrastructure, while also auto-remediating any security violations it detects. The solution has four (4) key modules: Cloud Security Governance, Cloud Compliance Management, Cloud Identity, and Access Management, and Cloud Query Language.|
|WALLIX is a European publisher of cybersecurity software and expert in Identity and Access solutions. Responding to regulatory developments and cybersecurity challenges that affect all businesses, WALLIX solutions protect against cyberthreats, theft and data leaks linked to stolen credentials and misappropriated privileges.|
|Allot is a leading provider of innovative network intelligence and security solutions that empower communications service providers (CSPs) and enterprises worldwide to enhance the value they bring to their customers. Enterprises worldwide use Allot solutions to get visibility into their networks, aligning network and application performance with business priorities and quickly troubleshooting network issues.|
|SOTI Inc. develops world leading technology that solves the unique challenges involved in managing, securing, supporting & tracking remote mobile & desktop computing devices. Today over 14,000 customers around the world in retail, manufacturing, healthcare, government, logistics & numerous other industries rely on SOTI software products within the mobile device management industry. Companies strive to reduce costs by enabling the central management, security & support of remote mobile field-forces.|
|NIKSUN is the recognized worldwide leader in making the Unknown Known. The company develops a highly scalable array of real-time and forensics-based cyber security and network performance management solutions for government & intelligence agencies, service providers, financial services companies, and large enterprises such as retailers and manufacturers. NIKSUN’s award-winning appliances deliver unprecedented flexibility and packet capture power. The company’s patented real-time analysis and recording technology is the industry’s most comprehensive solution for secure and reliable network infrastructure and services.|
|HID Global is the trusted leader in products, services and solutions related to the creation, management, and use of secure identities for millions of customers worldwide. Recognized for robust quality, innovative designs and industry leadership, HID Global is focused on creating customer value and is the supplier of choice for OEMs, integrators, and developers serving a variety of markets that include physical access control; IT security, including strong authentication/credential management; card personalization; visitor management; government ID; and identification technologies for a range of applications. HID Global is an ASSA ABLOY Group brand.|
|CybSafe is the world’s first intelligent cyber security and data analytics platform that enables you to quantify your human cyber risk and resilience, whilst measuring whether your awareness activities (such as training and phishing simulations) are actually working.|
|The mlytics multi-CDN marketplace gives you access to the world’s leading CDNs in a single, secure, and easy to manage platform. One bill, no locked-in or long term contracts, China access, and above all 100% guarantee that your application will be delivered at all times to anywhere in the world without user intervention. The first true AI-based Multi CDN traffic management platform. mlytics builds a platform that monitors the internet via RUM, and routes web traffic across multiple CDNs to avoid downtime and congestion with full security features built-in.|
|BlueportiQ VAULT is a cloud-hosted software solution that provides global Wi-Fi Roaming throughout multiple business locations over secure Wi-Fi access. VAULT enables a frictionless onboarding Wi-Fi access to multiple user types when visiting these locations.
How does it work?
The user will connect the first time using their unique Wi-Fi key. This process can be automated using a customer loyalty APP, or over a manual process using a unique Wi-Fi key. The key identifies the user itself, its location in the globe and which policies and allowances to apply to the device based on the current location. Once connected the first time the device will reconnect seamlessly on all future occasions that the network becomes visible for that device.
Oil & Gas
If you are interested in cyber security solutions, or would like to find out more, contact our distribution team