アライアンス・パートナー

Partner About the Company Integrated to:
                       

A10 Networks is a leader in application networking, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in San Jose, Calif., and serves customers globally with offices worldwide.

A10 Solution Brief

A10 Networks is a leader in application networking, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in San Jose, Calif., and serves customers globally with offices worldwide.

A10 Solution Brief

EX Series
NX Series
The mobile computing and bring your own device (BYOD) revolution has made location and context more important than ever. Here at AirPatrol Corporation we’re dedicated to developing innovative technologies that help enhance and secure these devices by delivering features and functionality that can change based on where they are and who is operating them. Our current product line-up includes a suite of location-based mobile and wireless enterprise security solutions that offer deliver detection, precision locationing (within zones as small as 10 feet) and management for devices on WiFi, 2G, 3G and 4G LTE cellular networks. The mobile computing and bring your own device (BYOD) revolution has made location and context more important than ever. Here at AirPatrol Corporation we’re dedicated to developing innovative technologies that help enhance and secure these devices by delivering features and functionality that can change based on where they are and who is operating them. Our current product line-up includes a suite of location-based mobile and wireless enterprise security solutions that offer deliver detection, precision locationing (within zones as small as 10 feet) and management for devices on WiFi, 2G, 3G and 4G LTE cellular networks. Threat Analytics Platform

AirWatch by VMware is the leader in enterprise mobility management, with more than 16,000 global customers. The AirWatch platform includes industry-leading mobile device, email, application, content and browser management solutions. Organizations can implement these solutions across device types and use cases, including complete EMM for corporate and line of business deployments, and containerized solutions for bring your own device (BYOD) programs. Acquired by VMware in February 2014, AirWatch is based in Atlanta and can be found online at www.air-watch.com. VMware is headquartered in Silicon Valley and can be found online at www.vmware.com.

Airwatch Solution Brief

AirWatch by VMware is the leader in enterprise mobility management, with more than 16,000 global customers. The AirWatch platform includes industry-leading mobile device, email, application, content and browser management solutions. Organizations can implement these solutions across device types and use cases, including complete EMM for corporate and line of business deployments, and containerized solutions for bring your own device (BYOD) programs. Acquired by VMware in February 2014, AirWatch is based in Atlanta and can be found online at www.air-watch.com. VMware is headquartered in Silicon Valley and can be found online at www.vmware.com.

Airwatch Solution Brief

Mobile Threat Prevention

Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.

Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.

FireEye iSIGHT Intelligence
BeyondTrust is a global cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks. Corporate and government organizations rely on BeyondTrust solutions to shrink attack surfaces and identify imminent threats. The company’s integrated risk intelligence platform presents a unique competitive advantage in its ability to reveal critical risks hidden within volumes of user and system data. This unifies IT and security departments, empowering them with the information and control they need to jointly prevent breaches, maintain compliance, and ensure business continuity. BeyondTrust’s privileged account management and vulnerability management solutions are trusted by over 4,000 customers worldwide, including over half of the Fortune 100. BeyondTrust is a global cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks. Corporate and government organizations rely on BeyondTrust solutions to shrink attack surfaces and identify imminent threats. The company’s integrated risk intelligence platform presents a unique competitive advantage in its ability to reveal critical risks hidden within volumes of user and system data. This unifies IT and security departments, empowering them with the information and control they need to jointly prevent breaches, maintain compliance, and ensure business continuity. BeyondTrust’s privileged account management and vulnerability management solutions are trusted by over 4,000 customers worldwide, including over half of the Fortune 100. Threat Analytics Platform

Big Switch Networks is the market leader in bringing hyperscale data center networking technologies to a mainstream datacenter audience. The company is taking three key hyperscale technologies – OEM/ODM bare metal and open Ethernet switch hardware, sophisticated SDN control software, and core-and-pod data center designs – and leveraging them in fit-for-purpose products designed for use in enterprises, cloud providers, and service providers. The company’s Big Tap Monitoring Fabric is a feature-rich solution to monitor existing networks, and Big Cloud Fabric is the industry’s most advanced bare-metal switching fabric intended for new data center pods such as private cloud, big data, and VDI.

Big Switch Solution Brief

Big Switch Networks is the market leader in bringing hyperscale data center networking technologies to a mainstream datacenter audience. The company is taking three key hyperscale technologies – OEM/ODM bare metal and open Ethernet switch hardware, sophisticated SDN control software, and core-and-pod data center designs – and leveraging them in fit-for-purpose products designed for use in enterprises, cloud providers, and service providers. The company’s Big Tap Monitoring Fabric is a feature-rich solution to monitor existing networks, and Big Cloud Fabric is the industry’s most advanced bare-metal switching fabric intended for new data center pods such as private cloud, big data, and VDI.

Big Switch Solution Brief

AX Series
EX Series
FX Series
HX Series
NX Series
PX Series
Email Threat Prevention
Threat Analytics Platform
BMC Software, Inc. is a global leader in innovative software solutions that enable businesses to transform into digital enterprises for the ultimate competitive advantage. Headquartered in Houston, Texas, BMC develops, markets and sells software used for multiple functions, including IT service management, data center automation, performance management, virtualization lifecycle management and cloud computing management. BMC Software, Inc. is a global leader in innovative software solutions that enable businesses to transform into digital enterprises for the ultimate competitive advantage. Headquartered in Houston, Texas, BMC develops, markets and sells software used for multiple functions, including IT service management, data center automation, performance management, virtualization lifecycle management and cloud computing management. FireEye Security Orchestrator (FSO)
Threat Analytics Platform

Bradford Networks is the leading provider of rapid threat response solutions that minimize the risk and impact of cyber threats. The company’s patented Network Sentry solution enables Cyber Security Teams to continuously assess the risk of every user and endpoint on the network, and automatically remove vulnerable and compromised devices that act as backdoors for cyber criminals. Through its SmartEdge Platform, Network Sentry seamlessly integrates with the leading Advanced Threat Detection solutions to correlate high-fidelity security alerts with a threat’s foothold. This unique correlation bridges the silos of security, network, and endpoint information to enable confident, automated threat containment before it has an adverse impact on the business. Bradford Networks’ network security solutions are used by more than 900 enterprise customers worldwide in markets such as healthcare, financial services, retail, government, education and more.

Solution Briefs:
Bradford Networks (MTP Series)
Bradford Networks (NX Series)
Bradford Networks (TAP Series)

Bradford Networks is the leading provider of rapid threat response solutions that minimize the risk and impact of cyber threats. The company’s patented Network Sentry solution enables Cyber Security Teams to continuously assess the risk of every user and endpoint on the network, and automatically remove vulnerable and compromised devices that act as backdoors for cyber criminals. Through its SmartEdge Platform, Network Sentry seamlessly integrates with the leading Advanced Threat Detection solutions to correlate high-fidelity security alerts with a threat’s foothold. This unique correlation bridges the silos of security, network, and endpoint information to enable confident, automated threat containment before it has an adverse impact on the business. Bradford Networks’ network security solutions are used by more than 900 enterprise customers worldwide in markets such as healthcare, financial services, retail, government, education and more.

Solution Briefs:
Bradford Networks (MTP Series)
Bradford Networks (NX Series)
Bradford Networks (TAP Series)

NX Series
Mobile Threat Prevention
Threat Analytics Platform

CA Technologies, is one of the largest publicly held software corporations in the world. Headquartered New York City, our company creates systems software that runs in mainframe, distributed computing, virtual machine, mobility, and cloud computing environments. Our end-to-end portfolio of software solutions gives you the tools you need to better plan, build, manage and secure your applications.

CA Technologies, is one of the largest publicly held software corporations in the world. Headquartered New York City, our company creates systems software that runs in mainframe, distributed computing, virtual machine, mobility, and cloud computing environments. Our end-to-end portfolio of software solutions gives you the tools you need to better plan, build, manage and secure your applications.


FireEye Security Orchestrator (FSO)

Centripetal has invented core-networking technologies that change the way organizations approach cyber security. Centripetal maintains the largest threat intelligence partner ecosystem, providing community based solutions to defeat sophisticated cyber attacks. QuickThreat, Centripetal’s Threat Intelligence Gateway, simplifies cyber intelligence collection, management, and action and makes it easy to identify and stop unwanted network traffic. Centripetal’s customers leveraging the QuickThreat platform both large and small, are among financial services, retail, healthcare, technology, and internet service providers.

Centripetal has invented core-networking technologies that change the way organizations approach cyber security. Centripetal maintains the largest threat intelligence partner ecosystem, providing community based solutions to defeat sophisticated cyber attacks. QuickThreat, Centripetal’s Threat Intelligence Gateway, simplifies cyber intelligence collection, management, and action and makes it easy to identify and stop unwanted network traffic. Centripetal’s customers leveraging the QuickThreat platform both large and small, are among financial services, retail, healthcare, technology, and internet service providers.

FireEye iSIGHT Intelligence

The Corvil platform transforms network data into streaming intelligence to see, understand and act on business as it's happening. Corvil provides the full picture of customers, business and IT infrastructure all interacting together in real-time. It does this by making sense of raw packet data streaming through the network, enriching it with analytics and making it easily searchable and consumable. Proven in the world's most demanding environments, monitoring over 50 petabytes of data and over $170 billion worth of transactions daily, Corvil is trusted to provide real-time analytics that powers decision and action in the Now.

The Corvil platform transforms network data into streaming intelligence to see, understand and act on business as it's happening. Corvil provides the full picture of customers, business and IT infrastructure all interacting together in real-time. It does this by making sense of raw packet data streaming through the network, enriching it with analytics and making it easily searchable and consumable. Proven in the world's most demanding environments, monitoring over 50 petabytes of data and over $170 billion worth of transactions daily, Corvil is trusted to provide real-time analytics that powers decision and action in the Now.

FireEye iSIGHT Intelligence

CyberArk is the only security company that proactively stops the most advanced cyber threats – those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to lock down privileged accounts and protect against cyber threats before attacks can escalate and do irreparable business damage. CyberArk is trusted by the world’s leading companies to protect their highest value information assets, infrastructure and applications, while ensuring tight regulatory compliance and audit requirements.

Solution Briefs:
CyberArk PAS
CyberArk PTA

CyberArk Viewfinity

CyberArk is the only security company that proactively stops the most advanced cyber threats – those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to lock down privileged accounts and protect against cyber threats before attacks can escalate and do irreparable business damage. CyberArk is trusted by the world’s leading companies to protect their highest value information assets, infrastructure and applications, while ensuring tight regulatory compliance and audit requirements.

Solution Briefs:
CyberArk PAS
CyberArk PTA

CyberArk Viewfinity

AX Series
Threat Analytics Platform

At CyberPoint, we work to create a future where individuals and organizations from across the globe can operate safely and securely in cyberspace and benefit from the technological innovations that increasingly connect our world. A rapidly growing cyber security company, CyberPoint integrates and delivers innovative, leading-edge services, solutions, and products to protect what's invaluable to customers worldwide. We discover the threats and vulnerabilities that expose data, systems, and infrastructure to compromise, we quantify risks, and we design defenses that provide critical protection.

At CyberPoint, we work to create a future where individuals and organizations from across the globe can operate safely and securely in cyberspace and benefit from the technological innovations that increasingly connect our world. A rapidly growing cyber security company, CyberPoint integrates and delivers innovative, leading-edge services, solutions, and products to protect what's invaluable to customers worldwide. We discover the threats and vulnerabilities that expose data, systems, and infrastructure to compromise, we quantify risks, and we design defenses that provide critical protection.

Threat Analytics Platform

DEFCON CYBER™ is a business cybersecurity risk management solution that enables you to define and prioritize your mitigation strategy via the NIST Cybersecurity Framework (CSF), or equivalent method. DEFCON CYBER™ is an action partner that aligns your operations to execute the prioritized strategy, identifies gaps and challenges, and measures the organization’s ability to execute its priorities. It assimilates all aspects of a cybersecurity program (all 5 functions of the CSF) including its Asset Value to adversaries, strength of its Risk Mitigation Strategy, and its Ability to Execute – inclusive of its operational effectiveness: indicator responsiveness, threat intelligence responsiveness, vulnerability & patch management effectiveness, network design effectiveness, and the cybersecurity posture of its Supply Chain and business partners, into a continuously updated meaningful measurement. The DEFCON CYBER™ Score effectively communicates the organization’s current cybersecurity posture, posture trend, and what is currently driving its cybersecurity risk, thus enabling informed enterprise risk management decisions.

DEFCON CYBER™ is a business cybersecurity risk management solution that enables you to define and prioritize your mitigation strategy via the NIST Cybersecurity Framework (CSF), or equivalent method. DEFCON CYBER™ is an action partner that aligns your operations to execute the prioritized strategy, identifies gaps and challenges, and measures the organization’s ability to execute its priorities. It assimilates all aspects of a cybersecurity program (all 5 functions of the CSF) including its Asset Value to adversaries, strength of its Risk Mitigation Strategy, and its Ability to Execute – inclusive of its operational effectiveness: indicator responsiveness, threat intelligence responsiveness, vulnerability & patch management effectiveness, network design effectiveness, and the cybersecurity posture of its Supply Chain and business partners, into a continuously updated meaningful measurement. The DEFCON CYBER™ Score effectively communicates the organization’s current cybersecurity posture, posture trend, and what is currently driving its cybersecurity risk, thus enabling informed enterprise risk management decisions.

FireEye iSIGHT Intelligence

ExtraHop is the global leader in real-time wire data analytics. The ExtraHop Operational Intelligence platform analyzes all L2–L7 communications, including full bidirectional transactional payloads. This innovative approach provides the correlated, cross-tier visibility essential for application performance, availability, and security in today's complex and dynamic IT environments. The winner of numerous awards from Interop, TechTarget, and others, the ExtraHop platform scales up to 40 Gbps in a single appliance, deploys without agents, and delivers tangible value immediately upon deployment.

ExtraHop is the global leader in real-time wire data analytics. The ExtraHop Operational Intelligence platform analyzes all L2–L7 communications, including full bidirectional transactional payloads. This innovative approach provides the correlated, cross-tier visibility essential for application performance, availability, and security in today's complex and dynamic IT environments. The winner of numerous awards from Interop, TechTarget, and others, the ExtraHop platform scales up to 40 Gbps in a single appliance, deploys without agents, and delivers tangible value immediately upon deployment.

Threat Analytics Platform

F5 and FireEye provide a complete security solution that combines application delivery infrastructure with advanced content security. It includes F5 BIG-IP products and the FireEye Network Threat Prevention Platform (NX Series) with intrusion prevention system (IPS). The combined solution provides organizations with improved uptime, enables scalability and enhances visibility, including SSL traffic.

Recommended Best Practice Guide
Beyond Advanced Threat Protection Whitepaper

F5 and FireEye provide a complete security solution that combines application delivery infrastructure with advanced content security. It includes F5 BIG-IP products and the FireEye Network Threat Prevention Platform (NX Series) with intrusion prevention system (IPS). The combined solution provides organizations with improved uptime, enables scalability and enhances visibility, including SSL traffic.

Recommended Best Practice Guide
Beyond Advanced Threat Protection Whitepaper

NX Series
Threat Analytics Platform

FairWarning is a leading provider of privacy and information security solutions which expand trust in mission critical applications such as Salesforce, Electronic Health Records and cloud-based applications. Auditing over 300 business applications, FairWarning solutions empower businesses globally to grow their reputation with their customers, increase velocity in their business and comply with complex federal and state privacy laws such as HIPAA, PCI, SOX, FISMA and EU Data Protection Act. FairWarning provides a comprehensive platform and managed services for performing forensic investigations of applications, enforcing access policies, conducting legal investigations, and improving compliance effectiveness. FairWarning catches people stealing your data.

Fairwarning Solution Brief

FairWarning is a leading provider of privacy and information security solutions which expand trust in mission critical applications such as Salesforce, Electronic Health Records and cloud-based applications. Auditing over 300 business applications, FairWarning solutions empower businesses globally to grow their reputation with their customers, increase velocity in their business and comply with complex federal and state privacy laws such as HIPAA, PCI, SOX, FISMA and EU Data Protection Act. FairWarning provides a comprehensive platform and managed services for performing forensic investigations of applications, enforcing access policies, conducting legal investigations, and improving compliance effectiveness. FairWarning catches people stealing your data.

Fairwarning Solution Brief

Threat Analytics Platform

ForeScout Technologies Inc. is transforming security through visibility. ForeScout offers Global 2000 enterprises and government organizations the unique ability to see devices, including non-traditional devices, the instant they connect to the network. Equally important, ForeScout lets you control these devices and orchestrate information sharing and operation among disparate security tools to accelerate incident response. Unlike traditional security alternatives, ForeScout achieves this without requiring software agents or previous device knowledge. The company's solutions integrate with leading network, security, mobility and IT management products to overcome security silos, automate workflows and enable significant cost savings. As of October 2015, more than 2,000 customers in over 60 countries improve their network security and compliance posture with ForeScout solutions.

Solution Briefs:
ForeScout (NX Series)
Forescout (TAP Series)

ForeScout Technologies Inc. is transforming security through visibility. ForeScout offers Global 2000 enterprises and government organizations the unique ability to see devices, including non-traditional devices, the instant they connect to the network. Equally important, ForeScout lets you control these devices and orchestrate information sharing and operation among disparate security tools to accelerate incident response. Unlike traditional security alternatives, ForeScout achieves this without requiring software agents or previous device knowledge. The company's solutions integrate with leading network, security, mobility and IT management products to overcome security silos, automate workflows and enable significant cost savings. As of October 2015, more than 2,000 customers in over 60 countries improve their network security and compliance posture with ForeScout solutions.

Solution Briefs:
ForeScout (NX Series)
Forescout (TAP Series)

NX Series
Threat Analytics Platform

ForgeRock®, one of the fastest growing identity vendors in the world, provides the leading open identity platform for ensuring your customers are at the center of everything digital — whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device or the next great connected innovation. The ForgeRock Identity Platform™ powers solutions for many of the world’s largest companies and government organizations. Founded in 2010, ForgeRock’s leadership team brings decades of experience in the software industry and includes open source icons and innovators, with investors from some of the leading global venture capital firms including Accel Partners, Foundation Capital and Meritech Capital.

ForgeRock Solution Brief

ForgeRock®, one of the fastest growing identity vendors in the world, provides the leading open identity platform for ensuring your customers are at the center of everything digital — whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device or the next great connected innovation. The ForgeRock Identity Platform™ powers solutions for many of the world’s largest companies and government organizations. Founded in 2010, ForgeRock’s leadership team brings decades of experience in the software industry and includes open source icons and innovators, with investors from some of the leading global venture capital firms including Accel Partners, Foundation Capital and Meritech Capital.

ForgeRock Solution Brief

Threat Analytics Platform

Fujitsu is the leading Japanese information and communication technology (ICT) company, offering a full range of technology products, solutions and services. Approximately 159,000 Fujitsu people support customers in more than 100 countries. We use our experience and the power of ICT to shape the future of society with our customers. Fujitsu Limited (TSE: 6702) reported consolidated revenues of 4.8 trillion yen (US$40 billion) for the fiscal year ended March 31, 2015.

Fujitsu is the leading Japanese information and communication technology (ICT) company, offering a full range of technology products, solutions and services. Approximately 159,000 Fujitsu people support customers in more than 100 countries. We use our experience and the power of ICT to shape the future of society with our customers. Fujitsu Limited (TSE: 6702) reported consolidated revenues of 4.8 trillion yen (US$40 billion) for the fiscal year ended March 31, 2015.

FX Series

Gigamon® provides an intelligent Visibility Fabric™ architecture to enable the management of increasingly complex networks. Through patented technologies, centralized management and a portfolio of high availability and high-density fabric nodes, network traffic is intelligently delivered to the appropriate management, monitoring and security systems.

Gigamon Solution Brief
Video: Gigamon Integration

Gigamon® provides an intelligent Visibility Fabric™ architecture to enable the management of increasingly complex networks. Through patented technologies, centralized management and a portfolio of high availability and high-density fabric nodes, network traffic is intelligently delivered to the appropriate management, monitoring and security systems.

Gigamon Solution Brief
Video: Gigamon Integration

AX Series
EX Series
FX Series
HX Series
NX Series
PX Series
Email Threat Prevention
Threat Analytics Platform

HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. With the broadest technology portfolio spanning printing, personal systems, software, services and IT infrastructure, HP delivers solutions for customers' most complex challenges in every region of the world.

HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. With the broadest technology portfolio spanning printing, personal systems, software, services and IT infrastructure, HP delivers solutions for customers' most complex challenges in every region of the world.

AX Series
EX Series
FX Series
HX Series
NX Series
PX Series
FireEye Security Orchestrator (FSO)

Huntsman® is a Defense Grade Security and Threat Intelligence platform that provides organizations with a comprehensive, highly scalable, flexible and real time security solution. Huntsman maintains forensic integrity of all threat information and is proven to deliver unparalleled protection in any environment by minimizing loss through autonomous analysis and resolution of cyber-attacks in seconds.

Huntsman Solution Brief

Huntsman® is a Defense Grade Security and Threat Intelligence platform that provides organizations with a comprehensive, highly scalable, flexible and real time security solution. Huntsman maintains forensic integrity of all threat information and is proven to deliver unparalleled protection in any environment by minimizing loss through autonomous analysis and resolution of cyber-attacks in seconds.

Huntsman Solution Brief

AX Series
EX Series
FX Series
HX Series
NX Series

IBM Security’s portfolio, supported by world-renowned IBM X-Force® research, enables organizations to effectively manage risk and defend against emerging threats. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 20 billion security events per day in more than 130 countries, and holds more than 3,000 security patents. For more information, please visit www.ibm.com/security, follow @IBMSecurity on Twitter or visit the IBM Security Intelligence blog.

 

AX Series
EX Series
FX Series
HX Series
NX Series

Imperva® (NYSE:IMPV), is a leading provider of cyber security solutions that protect business-critical data and applications. The company’s SecureSphere, Incapsula and Skyfence product lines enable organizations to discover assets and risks, protect information wherever it lives – in the cloud and on-premises – and comply with regulations. The Imperva Application Defense Center, a research team comprised of some of the world’s leading experts in data and application security, continually enhances Imperva products with up-to-the minute threat intelligence, and publishes reports that provide insight and guidance on the latest threats and how to mitigate them. Imperva is headquartered in Redwood Shores, California. Learn more: www.imperva.com, our blog, on Twitter.

Imperva Solution Brief
Video: Imperva Integration

Imperva® (NYSE:IMPV), is a leading provider of cyber security solutions that protect business-critical data and applications. The company’s SecureSphere, Incapsula and Skyfence product lines enable organizations to discover assets and risks, protect information wherever it lives – in the cloud and on-premises – and comply with regulations. The Imperva Application Defense Center, a research team comprised of some of the world’s leading experts in data and application security, continually enhances Imperva products with up-to-the minute threat intelligence, and publishes reports that provide insight and guidance on the latest threats and how to mitigate them. Imperva is headquartered in Redwood Shores, California. Learn more: www.imperva.com, our blog, on Twitter.

Imperva Solution Brief
Video: Imperva Integration

NX Series

Infoblox (NYSE:BLOX) delivers critical network services that protect Domain Name System (DNS) infrastructure, automate cloud deployments, and increase the reliability of enterprise and service provider networks around the world. As the industry leader in DNS, DHCP, and IP address management, the category known as DDI, Infoblox (www.infoblox.com) reduces the risk and complexity of networking.

Infoblox Solution Brief
Video: Infoblox Integration

Infoblox (NYSE:BLOX) delivers critical network services that protect Domain Name System (DNS) infrastructure, automate cloud deployments, and increase the reliability of enterprise and service provider networks around the world. As the industry leader in DNS, DHCP, and IP address management, the category known as DDI, Infoblox (www.infoblox.com) reduces the risk and complexity of networking.

Infoblox Solution Brief
Video: Infoblox Integration

NX Series

Ixia (Nasdaq: XXIA) provides application performance and security resilience solutions to validate, secure and optimize businesses’ physical and virtual networks. Enterprises, service providers, network equipment manufacturers and governments worldwide rely on Ixia’s solutions to deploy new technologies and achieve efficient, secure, ongoing operation of their networks. Ixia's powerful and versatile solutions, expert global support and professional services equip organizations to exceed customer expectations and achieve better business outcomes. Learn more at www.ixiacom.com.

Ixia Solution Brief

Ixia (Nasdaq: XXIA) provides application performance and security resilience solutions to validate, secure and optimize businesses’ physical and virtual networks. Enterprises, service providers, network equipment manufacturers and governments worldwide rely on Ixia’s solutions to deploy new technologies and achieve efficient, secure, ongoing operation of their networks. Ixia's powerful and versatile solutions, expert global support and professional services equip organizations to exceed customer expectations and achieve better business outcomes. Learn more at www.ixiacom.com.

Ixia Solution Brief

AX Series
EX Series
FX Series
HX Series
NX Series
PX Series
Email Threat Prevention
Threat Analytics Platform

Lieberman Software provides adaptive privilege management solutions which natively integrate with FireEye’s TAP to provide closed loop integration for Automated Threat Remediation (ATR). Together, we defend against land and expand security exploits. By automatically discovering and managing privileged accounts that appear whenever enterprises deploy and change IT resources, the company's products secure and audit privileged access to systems, network devices, databases and applications.

Solution Briefs:
Liebsoft Solution Brief

Lieberman Software provides adaptive privilege management solutions which natively integrate with FireEye’s TAP to provide closed loop integration for Automated Threat Remediation (ATR). Together, we defend against land and expand security exploits. By automatically discovering and managing privileged accounts that appear whenever enterprises deploy and change IT resources, the company's products secure and audit privileged access to systems, network devices, databases and applications.

Solution Briefs:
Liebsoft Solution Brief

Threat Analytics Platform

LogRhythm is the largest and fastest growing independent security intelligence company in the world. The company’s patented and awardwinning Security Intelligence Platform, unifying SIEM, log management, file integrity monitoring, network forensics and host forensics, empowers organizations around the globe to detect and respond to breaches and the most sophisticated cyber threats of today, faster and with greater accuracy than ever before. LogRhythm also provides unparalleled compliance automation and assurance as well as IT predictive intelligence to Global 2000 organizations, government agencies and mid-sized businesses worldwide. LogRhythm is headquartered in Boulder, Colorado with operations in North and South America, Europe and the Asia Pacific region.

LogRythm Solution Brief

LogRhythm is the largest and fastest growing independent security intelligence company in the world. The company’s patented and awardwinning Security Intelligence Platform, unifying SIEM, log management, file integrity monitoring, network forensics and host forensics, empowers organizations around the globe to detect and respond to breaches and the most sophisticated cyber threats of today, faster and with greater accuracy than ever before. LogRhythm also provides unparalleled compliance automation and assurance as well as IT predictive intelligence to Global 2000 organizations, government agencies and mid-sized businesses worldwide. LogRhythm is headquartered in Boulder, Colorado with operations in North and South America, Europe and the Asia Pacific region.

Logrythm Solution Brief

AX Series
EX Series
FX Series
HX Series
NX Series

MobileIron provides the foundation for companies around the world to transform into mobile-first organizations that embrace mobility as a primary computing platform. Mobile technology is driving a massive shift in the ability of IT to support the way people want to work. Mobile First organizations focus on building superb mobile user experiences that are available anywhere users need them. These companies have to move fast to give employees secure mobile access to critical business applications and content on the devices they want, with a native user experience they love. Gartner has identified MobileIron as Leader for four consecutive years in the Magic Quadrant for Enterprise Mobility Management Suites (previously called the Magic Quadrant for Mobile Device Management Software).

MobileIron Solution Brief

MobileIron provides the foundation for companies around the world to transform into mobile-first organizations that embrace mobility as a primary computing platform. Mobile technology is driving a massive shift in the ability of IT to support the way people want to work. Mobile First organizations focus on building superb mobile user experiences that are available anywhere users need them. These companies have to move fast to give employees secure mobile access to critical business applications and content on the devices they want, with a native user experience they love. Gartner has identified MobileIron as Leader for four consecutive years in the Magic Quadrant for Enterprise Mobility Management Suites (previously called the Magic Quadrant for Mobile Device Management Software).

MobileIron Solution Brief

Mobile Threat Prevention

Our company was established to develop IT security solutions with event log management being the primary focus. Using our products customers can build a secure, flexible and reliable log infrastructure which satisfies the highest IT requirements of any organization and enables them to achieve regulatory compliance, easily identify security risks and policy breaches or analyze operational problems.

Our company was established to develop IT security solutions with event log management being the primary focus. Using our products customers can build a secure, flexible and reliable log infrastructure which satisfies the highest IT requirements of any organization and enables them to achieve regulatory compliance, easily identify security risks and policy breaches or analyze operational problems.

Threat Analytics Platform

OpenDNS provides a cloud-delivered network security service that blocks advanced attacks, as well as malware, botnets, and phishing threats regardless of port, protocol or application. OpenDNS’s predictive intelligence uses machine learning to automate protection against emerging threats before your organization is attacked. OpenDNS covers devices worldwide on or off the network in minutes with no hardware to install, software to maintain, and no admin intervention required. OpenDNS handles more than two percent of the world’s daily Internet requests. OpenDNS’s global network has proven 100 percent uptime, adds no latency, and powers our bigdata analytics for unique visibility of where threats are staged on the Internet.

OpenDNS Solution Brief

OpenDNS provides a cloud-delivered network security service that blocks advanced attacks, as well as malware, botnets, and phishing threats regardless of port, protocol or application. OpenDNS’s predictive intelligence uses machine learning to automate protection against emerging threats before your organization is attacked. OpenDNS covers devices worldwide on or off the network in minutes with no hardware to install, software to maintain, and no admin intervention required. OpenDNS handles more than two percent of the world’s daily Internet requests. OpenDNS’s global network has proven 100 percent uptime, adds no latency, and powers our bigdata analytics for unique visibility of where threats are staged on the Internet.

OpenDNS Solution Brief

NX Series
Threat Analytics Platform

PFU Ltd. is a wholly-owned subsidiary of Fujitsu that designs, develops, manufactures, sells and maintains computer hardware, networking appliance, security products and systems. Founded in 1960, it was named PFU in 1987. As of April 1 2010, PFU Ltd. is wholly-owned subsidiary of Fujitsu.

PFU Ltd. is a wholly-owned subsidiary of Fujitsu that designs, develops, manufactures, sells and maintains computer hardware, networking appliance, security products and systems. Founded in 1960, it was named PFU in 1987. As of April 1 2010, PFU Ltd. is wholly-owned subsidiary of Fujitsu.

NX Series

PhishMe® is the leading provider of human-focused phishing defense solutions for organizations concerned about their susceptibility to today’s top attack vector – spear phishing. PhishMe’s intelligence-driven platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats.

PhishMe® is the leading provider of human-focused phishing defense solutions for organizations concerned about their susceptibility to today’s top attack vector – spear phishing. PhishMe’s intelligence-driven platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats.

Integration in process

Rapid7 is a leading provider of security data and analytics solutions that enable organizations to implement an active, analytics-driven approach to cyber security. We combine our extensive experience in security data and analytics and deep insight into attacker behaviors and techniques to make sense of the wealth of data available to organizations about their IT environments and users. Our solutions empower organizations to prevent attacks by providing visibility into vulnerabilities and to rapidly detect compromises, respond to breaches, and correct the underlying causes of attacks. Rapid7 is trusted by more than 3,900 organizations across 90 countries, including 30% of the Fortune 1000.

Rapid7 Solution Brief

Rapid7 is a leading provider of security data and analytics solutions that enable organizations to implement an active, analytics-driven approach to cyber security. We combine our extensive experience in security data and analytics and deep insight into attacker behaviors and techniques to make sense of the wealth of data available to organizations about their IT environments and users. Our solutions empower organizations to prevent attacks by providing visibility into vulnerabilities and to rapidly detect compromises, respond to breaches, and correct the underlying causes of attacks. Rapid7 is trusted by more than 3,900 organizations across 90 countries, including 30% of the Fortune 1000.

Rapid7 Solution Brief

NX Series
Threat Analytics Platform

Recorded Future arms organizations with real-time threat intelligence so they can proactively defend against cyber attacks. With billions of indexed facts, and more added every day, our patented Web Intelligence Engine continuously analyzes the entire web to give unmatched insight into emerging threats. Four of the top five companies in the world, and more than 10,000 security professionals, rely on us for real-time threat intelligence.

Recorded Future arms organizations with real-time threat intelligence so they can proactively defend against cyber attacks. With billions of indexed facts, and more added every day, our patented Web Intelligence Engine continuously analyzes the entire web to give unmatched insight into emerging threats. Four of the top five companies in the world, and more than 10,000 security professionals, rely on us for real-time threat intelligence.

FireEye iSIGHT Intelligence

RedSeal puts power in decision makers’ hands with the essential cybersecurity analytics platform for building digitally resilient organizations. RedSeal’s Digital Resilience Score, modeled after a creditworthiness score like FICO®, measures how prepared an organization is to respond to an incident and quickly rebound. The company’s platform adds value to existing network devices by working with them and building a network model. With this, customers can understand the state of their networks, measure resilience, verify compliance, and accelerate incident response. RedSeal’s customers are Global 2000 corporations and government agencies that depend on the most sophisticated security. Founded in 2004, RedSeal is headquartered in Sunnyvale, California and serves customers globally through a direct sales and channel partner network.

RedSeal puts power in decision makers’ hands with the essential cybersecurity analytics platform for building digitally resilient organizations. RedSeal’s Digital Resilience Score, modeled after a creditworthiness score like FICO®, measures how prepared an organization is to respond to an incident and quickly rebound. The company’s platform adds value to existing network devices by working with them and building a network model. With this, customers can understand the state of their networks, measure resilience, verify compliance, and accelerate incident response. RedSeal’s customers are Global 2000 corporations and government agencies that depend on the most sophisticated security. Founded in 2004, RedSeal is headquartered in Sunnyvale, California and serves customers globally through a direct sales and channel partner network.

Threat Analytics Platform

Reservoir Labs is a privately held technology and solutions company headquartered in New York City that’s earned the trust and respect of commercial customers, government customers and top-tier researchers around the globe. Our team of experts conducts thought-leading research, develops novel technologies, and creates highly useful advanced computing and communications products that serve the security and communications needs of Reservoir’s commercial and government customers. - See more at: www.reservoir.com

Reservoir Labs is a privately held technology and solutions company headquartered in New York City that’s earned the trust and respect of commercial customers, government customers and top-tier researchers around the globe. Our team of experts conducts thought-leading research, develops novel technologies, and creates highly useful advanced computing and communications products that serve the security and communications needs of Reservoir’s commercial and government customers. - See more at: www.reservoir.com

FireEye iSIGHT Intelligence
Threat Analytics Platform

Funded by Sequoia Capital and investor Shlomo Kramer, SafeBreach is a pioneer in the emerging category of continuous security validation. The company’s groundbreaking platform provides a “hacker's view” of an enterprise’s security posture for total and continuous security assessment, validation and reporting. SafeBreach automatically executes breach methods with an extensive and growing Hacker’s Playbook™ of research and real-world investigative data. For more information, visit www.safebreach.com or follow on Twitter @SafeBreach.

SafeBreach Solution Brief

Funded by Sequoia Capital and investor Shlomo Kramer, SafeBreach is a pioneer in the emerging category of continuous security validation. The company’s groundbreaking platform provides a “hacker's view” of an enterprise’s security posture for total and continuous security assessment, validation and reporting. SafeBreach automatically executes breach methods with an extensive and growing Hacker’s Playbook™ of research and real-world investigative data. For more information, visit www.safebreach.com or follow on Twitter @SafeBreach.

SafeBreach Solution Brief

FireEye iSIGHT Intelligence

Samsung Electronics Co., Ltd. is a global leader in technology, opening new possibilities for people everywhere. Through relentless innovation and discovery, we are transforming the worlds of TVs, smartphones, tablets, PCs, cameras, home appliances, printers, LTE systems, medical devices, semiconductors and LED solutions. We employ 286,000 people across 80 countries with annual sales of US$216.7 billion. To discover more, please visit www.samsung.com

Sumsung Knox Solution Brief
Video: Samsung Integration

Samsung Electronics Co., Ltd. is a global leader in technology, opening new possibilities for people everywhere. Through relentless innovation and discovery, we are transforming the worlds of TVs, smartphones, tablets, PCs, cameras, home appliances, printers, LTE systems, medical devices, semiconductors and LED solutions. We employ 286,000 people across 80 countries with annual sales of US$216.7 billion. To discover more, please visit www.samsung.com

Samsung Knox Solution Brief
Video: Samsung Integration

Mobile Threat Prevention

Splunk Inc. (NASDAQ: SPLK) is the market-leading platform that powers Operational Intelligence. We pioneer innovative, disruptive solutions that make machine data accessible, usable and valuable to everyone. More than 10,000 customers in over 100 countries use Splunk software and cloud services to make business, government and education more efficient, secure and profitable. Join hundreds of thousands of passionate users by trying Splunk solutions for free: http://www.splunk.com/free-trials.

Splunk Inc. Solution Brief
Video: Splunk Integration
Configuration Guide
Intermediate Guide
Intro to Integration Guide

Splunk Inc. (NASDAQ: SPLK) is the market-leading platform that powers Operational Intelligence. We pioneer innovative, disruptive solutions that make machine data accessible, usable and valuable to everyone. More than 10,000 customers in over 100 countries use Splunk software and cloud services to make business, government and education more efficient, secure and profitable. Join hundreds of thousands of passionate users by trying Splunk solutions for free: http://www.splunk.com/free-trials.

Splunk Inc. Solution Brief
Video: Splunk Integration
Configuration Guide
Intermediate Guide
Intro to Integration Guide

AX Series
EX Series
FX Series
HX Series
IA Series
NX Series
PX Series
Email Threat Prevention
FireEye iSIGHT Intelligence
Threat Analytics Platform

Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Our family of products includes SecurityCenter Continuous View™, which provides the most comprehensive and integrated view of network health, and Nessus®, the global standard in detecting and assessing network data. Tenable is relied upon by many of the world’s largest corporations, not-for-profit organizations and public sector agencies, including the entire U.S. Department of Defense. For more information, please visit tenable.com.

Tenable Solution Brief

Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Our family of products includes SecurityCenter Continuous View™, which provides the most comprehensive and integrated view of network health, and Nessus®, the global standard in detecting and assessing network data. Tenable is relied upon by many of the world’s largest corporations, not-for-profit organizations and public sector agencies, including the entire U.S. Department of Defense. For more information, please visit tenable.com.

Tenable Solution Brief

NX Series
Tripwire is a provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence. Tripwire is a provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence. FireEye iSIGHT Intelligence

Varonis is a leading provider of software solutions that protect data from insider threats and cyberattacks. Varonis allows organizations to analyze, secure, manage, and migrate their volumes of unstructured data, which often contain an enterprise’s financial information, product plans, strategic initiatives, intellectual property, and confidential employee, customer or patient records.

Varonis Solution Brief

Varonis is a leading provider of software solutions that protect data from insider threats and cyberattacks. Varonis allows organizations to analyze, secure, manage, and migrate their volumes of unstructured data, which often contain an enterprise’s financial information, product plans, strategic initiatives, intellectual property, and confidential employee, customer or patient records.

Varonis Solution Brief

Threat Analytics Platform

Vormetric is the industry leader in data security solutions that span physical, virtual and cloud environments. Data is the new currency and Vormetric helps over 1700 customers, including 17 of the Fortune 30 and many of the world’s most security conscious organizations, to meet compliance requirements and protect what matters — their sensitive data — from both internal and external threats. The company’s scalable Vormetric Data Security Platform protects any file, any database and any application —anywhere it resides — with a high performance, market- leading data security platform that incorporates application transparent encryption, privileged user access controls, automation and security intelligence. For more information, please visit: www.vormetric.com.

Vormetric Solution Brief

Vormetric is the industry leader in data security solutions that span physical, virtual and cloud environments. Data is the new currency and Vormetric helps over 1700 customers, including 17 of the Fortune 30 and many of the world’s most security conscious organizations, to meet compliance requirements and protect what matters — their sensitive data — from both internal and external threats. The company’s scalable Vormetric Data Security Platform protects any file, any database and any application —anywhere it resides — with a high performance, market- leading data security platform that incorporates application transparent encryption, privileged user access controls, automation and security intelligence. For more information, please visit: www.vormetric.com.

Vormetric Solution Brief

Threat Analytics Platform

ZeroFOX protects organizations from the risks introduced by social communication and collaboration platforms. In an age of constant connectivity and social sharing, users have become the primary target for the adversary. ZeroFOX protects your people where they are most vulnerable by continuously monitoring social platforms for cyber attacks, sensitive information loss, social engineering campaigns, account compromise and fraud. Leveraging cutting edge technology and proven security practices, ZeroFOX provides both targeted protection and global insights into the world of social media threats.

ZeroFOX Solution Brief

ZeroFOX protects organizations from the risks introduced by social communication and collaboration platforms. In an age of constant connectivity and social sharing, users have become the primary target for the adversary. ZeroFOX protects your people where they are most vulnerable by continuously monitoring social platforms for cyber attacks, sensitive information loss, social engineering campaigns, account compromise and fraud. Leveraging cutting edge technology and proven security practices, ZeroFOX provides both targeted protection and global insights into the world of social media threats.

ZeroFOX Solution Brief

Threat Analytics Platform

Global enterprises of all sizes rely on Ziften to enhance their existing security posture, and amplify their limited resources. The Ziften solutions take the complexity, time, and cost out of threat detection with a solution that deploys and can be utilized in minutes, not days. Ziften’s continuous monitoring solution helps organizations quickly detect and stop threats, monitor for vulnerabilities and exposures, and identify abnormalities utilizing context-rich historical data. Ziften’s ZFlow technology extends network telemetry down to the endpoint, providing critical “last mile” network visibility with rich endpoint context. By pairing end-to-end visibility with actionable intelligence, Ziften customers secure their environment and protect their reputation.

Global enterprises of all sizes rely on Ziften to enhance their existing security posture, and amplify their limited resources. The Ziften solutions take the complexity, time, and cost out of threat detection with a solution that deploys and can be utilized in minutes, not days. Ziften’s continuous monitoring solution helps organizations quickly detect and stop threats, monitor for vulnerabilities and exposures, and identify abnormalities utilizing context-rich historical data. Ziften’s ZFlow technology extends network telemetry down to the endpoint, providing critical “last mile” network visibility with rich endpoint context. By pairing end-to-end visibility with actionable intelligence, Ziften customers secure their environment and protect their reputation.

FireEye iSIGHT Intelligence