CyberArk

- Key Contact: Marianne Budnik, Chief Marketing Officer
- Email: Marianne.budnik@cyberark.com
- Direct: 617-965-1544
- Website: www.cyberark.com
Company Description:
CyberArk has teamed with the world’s leading technology providers to create the industry’s only Privileged Access Security Marketplace with hundreds of certified hardened joint solutions and plug-ins. With CyberArk’s Privileged Access Security Solution, you can meet your compliance requirements and reduce your security risk without introducing additional operational complexity.
Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.
Centrify

- Key Contact: Torsten George, Sr. Director of Product Marketing
- Email: torsten.george@centrify.com
- Direct:408-431-3250
- Website: www.centrify.com
Company Description:
Centrify is at the forefront of redefining the legacy approach to Privileged Access Management (PAM) with cloud-ready Zero Trust Privilege to secure access to infrastructure, DevOps, cloud, containers, Big Data and other modern enterprise use cases and stop the leading cause of breaches – privileged access abuse.
Related Topics:
- Identity Access Management and Governance
- Privileged Identity/Access Management
- Privileged Remote Access Solutions
- Zero Trust
Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.
BeyondTrust

- Location: Atlanta, GA
- Key Contact: Liz Shulof, Chief Marketing Officer
- Email: lshulof@bomgar.com
- Direct: 770-407-1800
- Main: 1-877-826-6427
- Website: www.beyondtrust.com
Company Description:
BeyondTrust’s unified solutions offer the industry’s broadest set of privileged access management capabilities with a flexible design that simplifies integrations, enhances user productivity, and maximizes IT and security investments. Their extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. BeyondTrust unifies the industry’s broadest set of privileged access capabilities with centralized management, reporting, and analytics, enabling leaders to take decisive and informed actions to defeat attackers.
Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.
Blue Ridge Networks

- Key Contact: Brandan Lickey, Marketing Manager
- Email: blickey@blueridgenetworks.com
- Direct: 703-633-7346
- Website: www.blueridgenetworks.com
Company Description:
Our easy to deploy and proven solutions have been used within U.S. government agencies, enterprises and industrial organizations to provide 24/7 attack prevention for networks, endpoints and other critical assets for when breaches are simply not an option. AppGuard’s policy enforcement engine prevents viruses, fileless malware, botnets, polymorphic malware, weaponized documents, targeted attacks, in-memory attacks, ransomware, phishing, watering-holes, drive-by-downloads, and other undetectable advanced threats.
Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.
Verve Industrial Protection

- Key Contact: Rick Kaun, Vice President, Solutions
- Email: rkaun@verveindustrial.com
- Direct: 888-756-3251
- Website: verveindustrial.com
Company Description:
Verve brings together 25 years of industrial controls engineering and the only vendor-agnostic, OT security management and orchestration platform to deliver turnkey security results for our clients. Our focus with Verve has been to improve and simplify reliability, security and compliance within the operational enterprise. We provide a single pane of glass for complete end point detection and response in OT. We combined this integration with customized data tools to seamlessly integrate today’s and tomorrow’s state-of-the-art capabilities, ensuring that customers are always protected.
Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.
OSISoft

- Key Contact: John Matranga, Director of Customer Innovation & Academia
- Email: john@OSIsoft.com
- Direct: 510-297-5800
- Website: www.osisoft.com
Company Description:
OSIsoft offers a proven Data Infrastructure to deliver solutions for different industries, businesses and partners. Our real-time data expertise and an extensive ecosystem put our PI System on top of the annual PAC Radar report on Platforms for IoT & AR in Europe.
Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.
Indegy

- Key Contact: Cam Gephart, Sales Development Manager
- Email: marketing@indegy.com
- Direct: 866-801-5394
- Website: www.indegy.com
Company Description:
Indegy patented technology protects industrial organizations from cyber threats, malicious insiders and human error. We maximize safety, reliability and business continuity for your Industrial Control Systems (ICS) environment. The Indegy Industrial Cybersecurity Suite arms security and operations teams with full visibility, security, and control of ICS activity and threats. Unparalleled, patented hybrid technologies combine policy-based monitoring and network anomaly detection with unique device integrity checks. Indegy solutions are installed in automotive, pharmaceutical, energy, water, electric and other industrial organizations worldwide.
Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.
Forcepoint

- Location: Auston, TX (HQ)
- Key Contact: Jonathan Knepher, Senior Director, Corporate Development
- Email: jknepher@forcepoint.com
- Direct: 703-318-7134
- Main: 1-800-723-1166
- Website: www.forcepoint.com
Company Description:
Forcepoint offer a systems-oriented approach to insider threat detection and analytics, cloud-based user and application protection, next-gen network protection, data security and systems visibility. It’s a new approach to cybersecurity never seen before. We provide solutions for: cloud security, network security, data & insider threat security, and global government security.
Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.
Ampex

- Location: Hayward, CA 94545
- Key contact: Jeramie Crabtree, Cyber Security Sales Manager
- Email: jcrabtree@ampex.com,
- Main: 303-868-1954
- Website: www.ampex.com
Company Description:
Ampex primary focus is the success of our customers and partners through the delivery of suitable products, defect-free and on-time, every-time. To this end, their ISO 9001:2015/AS9100D-certified Quality Management System (QMS) challenges them to continually improve their processes, approaches, workmanship and performance. Ampex’s BLUE Lighting product is a high speed, high capacity, rugged compute device that can discover, define, analyze and mitigate cyber threats and vulnerabilities. It offers cyber defense for rugged platforms and critical infrastructure. BLUE Lightning monitors, detects and if necessary, defends air, land, sea, and space platforms and critical infrastructures, in real-time. These proactive capabilities enable the platform to more readily disrupt and neutralize cyberattacks as they happen.
Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.
Sentryo

- Key Contact: Robert Foley, Vice President, North America
- Email: Robert.foley@sentryo.net
- Direct: 317-514-2923
- Website: www.sentryo.net
Company Description:
Sentryo is the pioneer of solutions dedicated to managing the cyber risk of M2M networks and industrial control systems. The ICS CyberVision solution developed by Sentryo gives control engineers complete visibility over all equipment connected to their industrial networks. They can easily identify vulnerabilities and make the right decisions to ensure the integrity of their industrial systems.
Related Topics:
Real-Time Operational Technology Network Analysis and Security
Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.