Products

Secure Source’s partnership with our partners provides our clients access to the latest technologies, premier technical support, advanced training and product certification.

 

 

 

Imperva – The Leader In Data Security

“Imperva is a leading provider of cyber security solutions that protect business-critical data and applications in the cloud and on-premises. Our singular purpose is to defend your business critical data and applications from cyber-attacks and internal threats. Our solutions enable you to discover assets and risks, then protect your most valuable information – such as intellectual property, business plans, trade secrets, customer and employee information, and the day-to-day data that drives your business. We also help you comply with the myriad of increasingly stringent data protection regulations and mandates, as well as enforce policies, entitlements and audit controls.

Imperva protects cloud applications, websites, files, SharePoint systems, critical databases, and Big Data repositories from cyber-attacks, theft, and fraud. Through our Imperva SecureSphere, Imperva Incapsula, and Imperva Skyfence product lines, we help you to: Discover your assets and risks, Protect your information, and Comply with regulations.”

p4_proofpoint[1]

Proofpoint – The Leader in SaaS Email Security, Data Loss Prevention and Email Archiving Solutions

Proofpoint secures and improves enterprise email infrastructure with solutions for email security, archiving, encryption and data loss prevention.

 

BT_DiamondIP_logo_2011042816245145[1]

BT Diamond IP – IPAM Address Management

BT Diamond IP delivers powerful, comprehensive IP Address Management (IPAM) solutions encompassing: IP Block and Subnet Management, DHCP management and DNS management including DNSSEC management. BT Diamond IP IPAM solutions enable enterprises and service providers to dramatically improve their overall IT operational efficiencies and service levels by automating IPv4 and IPv6 address management with DHCP and DNS server configurations.

 

portnox_logo

Portnox-Network Access Control (NAC), Access Control, Network Security

Portnox helps to secure connected organizations utilizing its cutting-edge technology that allows CISOs to see, control, react and manage the risk networks face for any user, any device, anywhere. The Portnox platform is a software solution that sees through all network layers – Ethernet, wireless, virtual, VPN and cloud. Portnox’s solutions are rapidly deployed in any environment, regardless of size and scale, as they do not require any appliances, agents or changes to existing infrastructure.

 

AS_Logo_60x160px

AlgoSec Firewall Operations and Security Risk Management Solutions

AlgoSec is the leading provider of Network Security Lifecycle Management and Firewall Operations and Security Risk Management solutions. AlgoSec is the leading enterprise solution for firewall, router and VPN security compliance, audit, change management, risk management, server IP migration and policy optimization.

 

Print

Certes Networks – Network Encryption & Data Protection Solutions

Certes Networks is the leader in developing scalable security solutions for high performance networks. Certes Networks provide advanced multi-layer encryption and policy and key management solutions for securing wide area networks, and enable secure connectivity to private and public clouds. Certes Networks helps organizations improve security, decrease risk, and reduce the cost of compliance with data privacy regulations while enabling high performance and secure connectivity to critical infrastructures in the branch office, data center or in the cloud.

 

Utimaco

Utimaco – Hardware Security Modules (HSM), PKI, CA, Timestamping

Since 1983, Utimaco has been developing hardware-based, high-security appliances (Hardware Security Modules) and compliance solutions for telecommunication provider regulations (lawful interception and data retention). Customers and partners of Utimaco in all parts of the world trust the company’s long-term, proven reliability and investment protection, as well as its many certified IT security standards. Utimaco stands for recognized product quality, user-friendly software, excellent support and trusted high security.

 

Silverpeak_logo

Silver Peak – SD-WAN, Hybrid WANs, WAN Optimization

Silver Peak delivers the true transformational promise of the cloud with its unique business-first networking model. Powered by a self-driving wide area network™ (SD-WAN) platform, companies are liberated from the compromises of router-centric and basic SD-WAN approaches to transform their networks into a business accelerant. The company’s WAN Optimization function also delivers exceptional performance improvements with unprecedented security and scalability across all enterprise applications, including data replication, backup, file transfers, email, web and real-time applications such as Citrix and VoIP.

 

Carbon Black – Disrupt. Defend. Unite:  a new era of endpoint security

Carbon Black leads a new era of endpoint security by enabling organizations to disrupt advanced attacks, deploy the best prevention strategies for their business, and leverage the expertise of 10,000 professionals to shift the balance of power back to security teams. Only Carbon Black continuously records and centrally retains all endpoint activity, making it easy to track an attacker’s every action, instantly scope every incident, unravel entire attacks and determine root causes. Carbon Black also offers a range of prevention options so organizations can match their endpoint defense to their business needs. Carbon Black has been named #1 in endpoint protection, incident response, and market share. Forward-thinking companies choose Carbon Black to arm their endpoints, enabling security teams to: Disrupt. Defend. Unite.
Yubico Logo

Yubico – Multi-factor Authentication Security Key & Hardware Security Modules (HSM)

The company’s core invention, the YubiKey, is a small USB and NFC security key securing access to any number of IT systems and online services. Yubico pioneered the design of the first one-time password authenticator to work with a simple touch and with no client software, and we made it compatible with the open authentication standard OATH. We then further secured and simplified the PIV smart card standard by adding touch-to-sign and built-in attestation. And in close collaboration with Google and Microsoft, we co-created the FIDO Universal 2nd Factor (U2F) and FIDO 2 open authentication standards.
To protect secrets on servers, we also created the YubiHSM, the world’s smallest hardware security module. For easy integration with any IT system, we offer developers open source servers, support and hosted validation services.

LastlineZendeskLogo_transparent_bg

 

 

Lastline – Advanced Persistent Threat & Malware Protection Solutions

Lastline is focused on real-time analysis of advanced malware and knowing the Internet’s malicious infrastructure (the Malscape™). Lastline leverages this threat intelligence to create advanced malware defenses for companies of all sizes.

Pulse Secure Logo

 

 

Pulse Secure – SSL VPN & Cloud Secure Access, Mobile VPN & Virtual Application Delivery

Pulse Secure provides easy, comprehensive software-driven Secure Access solutions for people, devices, things and services that improve visibility, protection and productivity for customers. Our solutions and suites uniquely integrate cloud, mobile, application and network access to enable hybrid IT in a Zero Trust world.
Hillstone logo ???TM

 

 

Hillstone Networks – Intelligent Next-Generation Firewall For The Cloud Era

Based on intelligent data correlation analysis and advanced threat detection, Hillstone Networks Next Generation Firewall Solutions for the Enterprise and Data Center discover abnormal traffic behaviors that identify next generation threats and slash risk before there’s any business damage. Built from the ground up for today’s virtual, cloud-based data centers, our high-performance, fully distributed firewall platform overcomes performance and deployment limitations of legacy firewalls in a virtual environment. 
Infowatch Logo

 

Infowatch Data Loss Prevention (DLP)

InfoWatch has been active in the information security business for more than 14 years and has evolved into a group of companies that protect enterprises against various information security threats. InfoWatch products allow clients to reduce to a minimum the risks associated with the processing, movement and storage of information within the corporate secure area and outside it. InfoWatch’s integrated solutions not only protect information, but automatically collect a body of evidence that can be used in administrative and legal proceedings in the event of a violation of the rules governing corporate information assets by company employees.
DG Logo

 

Digital Guardian Data Loss Prevention (DLP) & Endpoint Detection & Response (EDR)

A data loss prevention software platform, Digital Guardian integrates content, context and location awareness along with encryption and data level controls to reduce the risk of information loss or misuse, and purposeful data theft. Its host-based security technology empowers organizations to monitor, control, audit and prevent data from wrongful disclosure or malicious theft, while automatically enforcing data security policies and procedures. This scalable platform provides multiple, independent layers of protection to enable secure data sharing across physical, virtual, mobile and cloud environments.

 

 

 

Cellopoint – Email Security and Risk Management

Cellopoint is a leading manufacturer of email security and management. We specialize in perimetral defense, anti-spam, anti-virus, anti-APT, auditing, archiving and encryption for emails. The modules are available as Software, Hardware, Virtualization and Cloud Services.

Cellopoint helps business, organizations, financial institutions, universities, government entities, telecommunication and service providers with high scalability solutions for their email servers’ security and management. Our goal is to develop innovative solutions according to user’s requirements in order to create a win-win situation for customers, partners and the vendor itself. For more information visit www.cellopoint.com 
LogRhythm Logo

 

 

 

LogRhythm – Security Information and Event Management (SIEM)

LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s patented award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint monitoring, user entity and behavior analytics (UEBA), security automation and orchestration and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence.
Gurucul Logo

 

 

 

Gurucul – User Entity Behavior Analytic (UEBA)

Gurucul is a global cyber security company that is changing the way organizations protect their most valuable assets, data and information from insider and external threats, both on-premises and in the cloud. Gurucul’s real-time behavior based security analytics and intelligence technology combines machine learning behavior profiling with predictive risk-scoring algorithms to predict, detect and prevent breaches, fraud and insider threats. Gurucul’s Identity Analytics technology reduces the attack surface for accounts and eliminates unnecessary access rights and privileges.
Thycotic Logo

 

Thycotic – Privileged Access Management (PAM) & Password Management

Thycotic’s Secret Server is the only fully featured PAM solution available both on premise and in the cloud. Empower your security and IT ops teams to secure and manage all types of privileged accounts quickly and easily. Thycotic’s Secret Server empowers your security teams with the powerful control needed to proactively protect your infrastructure and network, without the complexity or management burden of legacy PAM solutions. Secret Server makes powerful PAM simple.
Corvil Logo

 

 

 

 

Corvil -Network and Application Performance Management , Packet Capture and Security Analytics

Corvil is the industry leader for deriving IT, Security, and Business intelligence from network data. As companies adopt faster and smarter machine technology, it becomes critical to tap into richer and more granular machine data sources to safeguard the transparency, performance and security of critical infrastructure and business applications. 
Soti Logo

 

 

 

Soti -Mobile Device Management (MDM)

Soti is the world’s most trusted provider of Enterprise Mobility Management (EMM) solutions, with more than 17,000 enterprise customers and millions of devices managed worldwide. Our innovative portfolio of solutions and services provide the tools organizations need to truly mobilize their operations and optimize their mobility investments.
Cubro Logo

 

 

 

Cubro -Network Packet Brokers, Aggregators, Monitoring Switches, TAPs

CUBRO is among the leading vendors of TAPs and Network Packet Brokers and partner of the world’s largest Telco and Enterprises with installations on all continents.

RESOURCES

As the pace of Microsoft SharePoint ad option continues, most organizations are turning to third party add-ons demands for functionality. It’s for these reasons that experts compare SharePoint without add-ons to an iPhone without apps.

EVENTS & PROMOTIONS

Check out the latest events and promotions happening at Secure Source

SOLUTIONS

Secure Source’s partnership with our partners provides our clients access to the latest technologies, premier technical support, advanced training and product certification