Suppliers.
Add Supplier
Our supplier database tracks 4,125 solution providers in the global enterprise technology ecosystem.
Filters allow you to explore suppliers quickly and efficiently.
Download Excel
Filters
-
(48)
- (48)
- (17)
- (16)
- View all
-
(23)
- (11)
- (10)
- (7)
- View all
-
(21)
- (13)
- (10)
- (8)
- View all
-
(19)
- (7)
- (6)
- (4)
- View all
-
(19)
- (9)
- (9)
- (6)
- View all
- View all 14 Technologies
- (22)
- (20)
- (16)
- (14)
- (13)
- View all 39 Industries
- (13)
- (12)
- (11)
- (9)
- (8)
- View all 13 Functional Areas
- (14)
- (10)
- (9)
- (8)
- (8)
- View all 110 Use Cases
- (19)
- (15)
- (12)
- (11)
- (10)
- View all 8 Services
- (32)
- (6)
- (2)
- (1)
- (1)
- View all 11 HQ Countries
- (16)
- (13)
- (8)
- (6)
- (5)
- View all 5 Revenue
Selected Filters
CenturyLink
CenturyLink is the second largest U.S. communications provider to global enterprise customers. With customers in more than 60 countries and an intense focus on the customer experience, CenturyLink strives to be the world's best networking company by solving customers' increased demand for reliable and secure connections. The company also serves as its customers' trusted partner, helping them manage increased network and IT complexity and providing managed network and cyber security solutions that help protect their business. |
|
|
Check Point
Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to governments and corporate enterprises globally. Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry-leading catch rate of Malware, ransomware, and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprises’ cloud, network, and mobile devices. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point provides services to over 100,000 organizations of all sizes. |
|
|
ChinaNetCenter
Founded in 2000 and among the first listed on the GEM in 2009, Wangsu Science and Technology Co., Ltd (Stock code: 300017) is a world leader in cloud distribution and edge computing conducting business in over 70 counties and regions. Wangsu strives to improve users’ digital experience, satisfying customers who require constant security, reliable data processing and interaction. |
|
|
CyberX (Microsoft)
CyberX helps secure the Industrial Internet by providing complete visibility into the OT Network as well as real-time detection and alerts of operational incidents, cyber threats and system tampering, in order to minimize disruption to operations and downtime. Their flagship product, XSense, acts as an invisible layer that covers the OT Network, modeling it as a state machine. A plug and play solution, XSense is fully agnostic and easily integrates into any operational network, with no requirements for any changes or additional investments to be deployed. It operates in a completely unobtrusive manner, analyzing traffic only. |
|
|
Data Theorem
Data Theorem prevents AppSec data breaches. We provide SAST, DAST, & RASP for API Security, Web Security, Mobile Security, and Cloud Security.Our products provide Inventory (Discovery), Security Testing (SAST/DAST), and Active Protection (RASP) for APIs (RESTful, GraphQL, gRPC, and SOAP), mobile apps (iOS, Android, React Native, Flutter), Web Apps (Web 2.0 & Single Page Apps), & Cloud Apps + CSPM (Serverless Lambda, Google Cloud Functions, Azure Functions).Data Theorem is headquartered in Palo Alto, CA., with offices in New York, Chicago, Boston, Paris, and London. |
|
|
DScifer
Dscifer specializes in Cyber Security, Digital Forensic & E-Discovery, Risk Management, Healthcare, Aerospace and Defense Systems solutions. Our diverse and talented employees are committed to help businesses, governments and educational institutions plan, build and run successful management programs through the right combination of products, services and solutions. Dscifer helps organization reduce risk, manage cyber security, plan digital forensic & e-discovery, achieve threat intelligence. Technology innovation is our commitment in healthcare, aerospace and defense systems. |
|
|
Indegy (Tenable)
Indegy, a leader in industrial cyber security, protects operations (OT) networks from cyber threats, malicious insiders and human error. |
|
|
Independent Security Evaluators
ISE is an independent security consulting firm headquartered in Baltimore, Maryland dedicated to securing high value assets for global enterprises and performing groundbreaking security research. Using an adversary-centric perspective driven by our elite team of analysts and developers, we improve our clients’ overall security posture, protect digital assets, harden existing technologies, secure infrastructures, and work with development teams to ensure product security prior to deployment. |
|
|
Levaux
Levaux’s SenseAgent is a fully integrated sensor to cloud solution with commercial acceptance in the commercial building market for lighting control, environmental monitoring, and real time location of people and assets.SenseAgent delivers in a single product a deployment ready, fully supported product at a price that is lower than the cheapest commercial lighting control systems available affording landlords, developers and tenants real savings with the benefits of control, utilisation and efficiency never before imagined.SenseAgent is truly ‘plug and play’ and can be fully deployed by an electrician in a fraction of the time required to install, commission, program and operate traditional lighting control platforms. With the commercial building market rapidly moving to a ‘connected building’ landscape Levaux’s capability is well positioned to deliver to the lighting control, environment and real time location markets whilst also providing ‘communications backhaul’ for management and operation of core building systems. |
|
|
McAfee
McAfee, a subsidiary of Advent International Corp, is a provider of IT security solutions to various industrial customers. It offers personal data cleanup, free antivirus trial, virtual private network protection, identity monitoring, free antivirus trial, security freeze, free antivirus trial, identity theft coverage and restoration, free antivirus trial password manager, web protection, protection score, and parental controls services. |
|
|
NanoLock Security
NanoLock Security protects the operational integrity of industrial devices, machines and manufacturing lines against cyber events and human errors to maintain business continuity, improve safety and safeguard revenues. NanoLock is the only zero-trust, device-level solution that prevents outsiders as well as insiders and supply chain cyber events and even human errors in legacy and new devices, regardless of attack origin or exploited vulnerability and without affecting functionality and performance.NanoLock fuels Industry 4.0 revolution with a zero-trust protection that is mandatory to critical infrastructures, such as industrial and manufacturing companies as well as utilities. NanoLock secures industrial devices like Smart Meters, RTUs, data cocentrators, EV chargers, industrial machines, PLCs and production lines, against a wide range of external and internal attacks.Trusted by critical infrastructure customers, such as utilities, industrial and manufacturing companies,NanoLock Security protects power generation, water and wastewater plants and food & beverage manufacturing as well as industrial production, while ensuring compliance with international security standards and guidelines.NanoLock Security is the winner of multiple industry awards¸ including the prestigious “2021 Top 10 for Baby Black Unicorns”¸ Tracxn’s “Emerging Startups 2021- minicorn“¸ MWC Barcelona “4YFN Startup of the Year” award and more. the American Cyber Award for “Best Security Company of the Year under 150 staff” and the CyberSecurity breakthrough award for the “Overall IoT Security Solution provider of the Year”.NanoLock is headquartered in Israel with offices in the US, Europe, and Japan. |
|
|
PAS
PAS provides process safety, cybersecurity, and asset reliability solutions for the energy, process, and power industries worldwide. Our ICS cybersecurity, Automation Asset Management, and Operations Management software and services support safe, secure, profitable, and compliant operations across the complex, heterogeneous, and proprietary process automation infrastructure. Why do leading global industrial companies choose PAS over their DCS vendors for their ICS cybersecurity and alarm management? Platform independence. Our independence from automation vendor platforms offers our clients the most seamlessly integrated and unified solution for managing the variety of systems at their sites. With more than 30 automation system brands and models within a typical enterprise, it is untenable to manage and protect the ICS layer from cyber threats and vulnerabilities. It is also expensive, inconsistent, and ineffective to manage the alarms within the different control systems with alarm management software offered by DCS vendors. With PAS alarm management solutions, industrial companies have the Assurance that their alarm systems perform optimally at the console level and deliver consistent KPIs at the management dashboard level. |
|
|
Provectus
Provectus is an Artificial Intelligence consultancy and solutions provider, helping businesses achieve their objectives through AI.Provectus is an AWS Premier Consulting Partner with competencies in Data & Analytics, DevOps, and Machine Learning. The company designs and builds AI solutions for industry-specific use cases, Data and Machine Learning foundation, Cloud transformation, and DevOps adoption. |
|
|
Sentinel IPS
Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep Malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running. |
|
|
Striim
Striim is an end-to-end streaming data integration and operational intelligence platform. The platform specializes in data integration across a wide variety of sources including change data from enterprise databases, log files, message queues, and IoT sensor data. With that difficult piece solved, Striim makes it easy to correlate across streams, detect anomalies, identify and visualize events of interest, and trigger alerts and workflows, all within milliseconds.Year founded: 2012Revenue: $1 to 10 million (2015) |
|
|
The Embedded Kit
The Embedded Kit provides everything equipment manufacturers need to build, connect, test, and secure embedded systems.Its four off-the-shelf products are designed specifically for device-makers, to ease and accelerate their product development while ensuring full source code control. |
|
|
TransUnion
TransUnion is a global information and insights company that makes trust possible between businesses and consumers, by ensuring that each consumer is reliably and safely represented in the marketplace. |
|
|
Zapier
Zapier is on a mission to make automation work for everyone. With Zapier, you can integrate apps like Salesforce, Intuit, Google, and Dropbox, to move data between them automatically, so you can focus on your most important work. |
|