Wizlynx mantains a global network with cybersecurity companies - premier technology and service providers that help us protect sensitive information and business assets of our customers. Our strategic business and technology partnerships allows us also to propose enterprise-level and industry-proven technology, best-in-class know-how, and experience that deliver the best resources and performance in the market today.
Certego is a company specialised in providing managed computer security services and to contrast Cyber Crime.
The in-depth competences and extensive experience in Incident Response, Security Intelligence and Malware Analysis merge with the passion and desire of the security analysts to be constantly updated on what is happening in the world of computer threats.
Information, People and the Unique Selling Proposition (USP) are the most valuable assets of a company. Therefore, it is essential that Information Security, Governance Risk and Compliance (GRC) is part of the company’s nature and business processes.
CISS is supporting you to address Information Security and GRC tailored to your company’s need. With the usage of the CISS ISMS SaaS solution and the managed control framework (covering ISO27001, ISO27002, ISO27005, SANS CSC, PCI DSS, GDPR etc.) CISS can apply a pragmatic and flexible approach to design, built or optimize your ISMS or GRC framework.
AlienVault’s mission is to enable organizations with limited resources to accelerate and simplify their ability to detect and respond to the growing landscape of cyber threats. Alienvault’s Unified Security Management (USM) platform provides all of the essential security controls required for complete security visibility, and is designed to enable any IT or security practitioner to benefit from results on day one. Powered by threat intelligence from AlienVault Labs and the AlienVault Open Threat Exchange - the world’s largest crowd-sourced threat data network — AlienVault USM delivers a unified, simple and affordable solution for threat detection, incident response and compliance management.
Barracuda Networks, Inc. offers industry-leading, cloud-connected solutions designed to solve mainstream IT problems – efficiently and cost effectively – while maintaining a level of customer support and satisfaction second to none. Barracuda’s products span three distinct markets, including: 1) content security, 2) networking and application delivery, as well as 3) data storage, protection and disaster recovery, and increased productivity solutions. While Barracuda maintain a strong heritage in email and web security appliances, their award-winning portfolio includes more than a dozen purpose-built solutions that support literally every aspect of the network. Beyond traditional security measures, Barracuda’s best-of-breed security portfolio is designed to protect all threat vectors—email, web, network perimeters, mobile, remote access, and your users; this is known as Total Threat Protection. Barracuda provides organizations of all sizes with true end-to-end protection that can be deployed as physical, virtual, cloud, and hybrid form factors.
Blue Coat Systems, Inc., founded in 1996, (NASDAQ: BCSI) is a publicly-held company based in Sunnyvale, California. Blue Coat secures Web communications and accelerates business applications across the distributed enterprise. Blue Coat's family of appliances and client-based solutions - deployed in branch offices, Internet gateways, end points, and data centers - provide intelligent points of policy-based control enabling IT organizations to optimize security and accelerate performance for all users and applications. Blue Coat delivers an integrated security platform that addresses these evolving network + security + cloud requirements – with six advanced solutions that work equally well across on-premise and cloud-managed environments:
Checkmarx was founded in 2006 with the vision of providing comprehensive solutions for automated security code review. The company pioneered the concept of a query language-based solution for identifying technical and logical code vulnerabilities. Checkmarx CxSAST is a unique source code analysis solution that provides tools for identifying, tracking, and repairing technical and logical flaws in the source code, such as security vulnerabilities, compliance issues, and business logic problems. Without needing to build or compile a software project's source code, CxSAST builds a logical graph of the code's elements and flows. CxSAST then queries this internal code graph. CxSAST comes with an extensive list of hundreds of preconfigured queries for known security vulnerabilities for each programming language.
Cylance® is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware.
CylancePROTECT redefines what antivirus (AV) can and should do for your organization by leveraging artificial intelligence to detect AND prevent malware from executing on your endpoints in real time. By taking a mathematical approach to malware identification utilizing patent-pending, machine learning techniques instead of reactive signatures and sandboxes, CylancePROTECT renders new malware, viruses, bots and unknown future variants useless.
F5 Networks, Inc., is a developer and provider of software defined application services. F5 Networks is engaged in the development, marketing and sale of application delivery networking products that optimize the security, performance and availability of network applications, servers and storage systems. F5's Traffic Management Operating System (TMOS) based offerings include software products for local and global traffic management, network and application security, access management, Web acceleration and various network and application services. These products are available as modules that can run individually or as part of an integrated solution on the Company's purpose-built BIG-IP appliances and VIPRION chassis-based hardware, or as software-only Virtual Editions. F5 Networks also offers distributed denial-of-service (DDoS) protection, application security and other application services by subscription on its cloud-based Silverline platform.
Imperva has a singular purpose: to defend your business-critical data and applications from cyber-attacks and internal threats. Imperva solutions enable you to discover assets and risks, and then protect your most valuable information—such as intellectual property, business plans, trade secrets, customer and employee information, and the day-to-day data that drives your business. Imperva also help you comply with the myriad of increasingly stringent data protection regulations and mandates, as well as enforce policies, entitlements and audit controls. Imperva is the only Leader in Gartner’s 2016 Magic Quadrant for Web Application Firewalls (WAF).
Imperva Incapsula is a cloud-based application delivery service that protects websites and increases their performance, improving the customer experience while safeguarding web applications and data from attack. Incapsula includes a web application firewall to thwart hacking attempts, DDoS mitigation to ensure attacks don’t impact online business assets, a content delivery network to optimize and accelerate web traffic, and a load balancer to maximize the potential of web environments.
Palo Alto Networks is the leading company in a new era of cybersecurity. Palo Alto Networks solutions protect the networks of thousands of large companies, government agencies and service providers against risks. In contrast to fragmented legacy solutions, the Palo Alto Networks security platform is capable of secure business operations. The solutions protect systems based on what is most important in today's dynamic IT environments: applications, users, and content.
The Palo Alto Networks security platform brings network, cloud and endpoint security to a common architecture. It integrates all major network security features, including advanced firewall, IDS / IPS, and URL filtering. Since these functions were integrated into the platform and shared important information across disciplines, Palo Alto Networks’ system ensures a much higher level of security than company-specific firewalls, UTMs, or targeted threat detection systems.
Qualys’ solutions help organizations with globally distributed data centers and IT infrastructures to identify their IT assets, collect and analyze large amounts of IT security data, discover and prioritize vulnerabilities, recommend remediation actions and verify the implementation of such actions. By deploying Qualys’ solutions, organizations can gain actionable security intelligence into potential vulnerabilities and malware in their IT infrastructures and enable their compliance with internal policies and external regulations. Delivered as a multi-tenant cloud platform, the QualysGuard integrated suite of solutions incorporates Qualys’ industry leading vulnerability management service, with a robust IT compliance solution, comprehensive web application scanning and malware detection services.
SyferLock offers an innovative software-based alternative to hard tokens, smart cards and other authentication solutions. SyferLock delivers two-factor and multi-factor authentication utilizing patented software-based grids to convert static passwords/PINs into device-less one-time passwords/PINs (OTPs), without the need for hardware tokens and without any dependency on a cell phone like SMS-based solutions.