Firemon Lumeta

Company Description:

FireMon offers proven network security policy management solutions tailored for your hybrid cloud environment. FireMon enables compliance with regulatory standards such as NERC-CIP, and enhances your hybrid network security with centralized, automated management of your security policies. They deliver real-time visibility and control and optimize your vulnerability management to ensure continuous compliance.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


Great Bay Software

Company Description:

They enable our customers to confidently address security and operational challenges stemming from IoT and connected technology. The Great Bay Network Intelligence PlatformTM provides real-time visibility into all network-connected endpoints. By collecting and modeling real-time and historical, contextual endpoint data, the platform enables IT, Security and Operations teams to identify all devices on the network in real time, determine location, monitor behavior and actively respond to anomalies.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


FlowTraq

Company Description:

FlowTraq was specifically founded to help cyber defenders who are increasingly forced to deal with ever more complex security events while budgets are being squeezed year over year. Our goal is to improve the insight, visibility, protection, and understanding of network infrastructures. FlowTraq is a high-performance network monitoring, security and forensic tool that speeds up incident triage in the Security Operations Center and detects anomalies in network traffic that are typical of hacker behavior.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


CyberX

Company Description:

CyberX is the only industrial cybersecurity platform built by blue-team cyber-experts with a proven track record defending critical national infrastructure. They were the ones who developed the technology solutions – sometimes overnight – in real environments to address real and immediate threats … and were the ones who deployed them in the field and made sure they worked, day in and day out, even when managed by people who had to worry about countless other things – like survival. This continues to be what they do at CyberX — practical enterprise-grade cybersecurity for defending critical infrastructure in any environment.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


CyberProof

Company Description:

CyberProof is a security services company that intelligently manages your organization’s incident detection and response. From intelligence feeds to risk reduction plans, your entire experience with CyberProof is completely customized to your specific company profile. CyberProof manages the monitoring, detection, response, and resolution of any cyber threat you may face, so your company can recover fast and stay safe. CyberProof aims to give complete transparency and dramatically reduces the cost and time needed to respond to security threats and minimize business impact.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


Check Point

Company Description:

Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with their new Gen V advanced threat prevention that protects all networks, cloud and mobile operations of a business against all known attacks combined with the industry’s most comprehensive and intuitive single point of control management system. Check Point protects over 100,000 organizations of all sizes.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


CENTRI

Company Description:

CENTRI provides a complete, advanced security solution for the Internet of Things. Our flexible, software-only platform enables thing makers and developers to quickly get to market with purpose-built IoT security to protect their data from chip to Cloud. CENTRI eliminates your risk of data theft and delivers device integrity with modern, standards-based technologies for the connected world. Using heavyweight industry standard encryption, CENTRI Protected Sessions is optimized for lightweight devices with data compression and a tiny footprint, providing both security and efficiency between the endpoint device and the back of the cloud.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


Aperio Systems

Company Description:

Aperio’s mission is to build solutions ensuring sensor data integrity for critical infrastructures and large-scale industrial facilities. Their data integrity AI engines authenticate the data provided by physical sensors in a plant and validates that it reflects the true state of the system. By leveraging this technology, we also greatly enhance the operator’s state awareness and monitoring capabilities by detecting broken or faulty sensors. This translates to a very strong and unique value proposition for both cyber security, productivity, and safety. For cyber security in particular, Aperio are the only technology with a credible capability of preventing large-scale, destructive cyber attacks against critical infrastructures. There is strong evidence that these types of attacks will increase dramatically in the coming years.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


Webroot

Company Description:

Webroot, a Carbonite company, harnesses the cloud and machine learning to reliably predict and protect against cyberattacks in real time. Webroot secures businesses and consumers worldwide with endpoint and network protection, security awareness training and threat intelligence services. In 2019, Webroot was acquired by Carbonite, an endpoint and server backup and recovery provider serving customers ranging from small businesses to enterprises. Together, they are a leading cybersecurity and data protection company.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


Thales Group

Company Description:

Businesses and governments rely on Thales to bring trust to the billions of digital interactions they have with people. They identity management and data protection technologies help banks exchange funds, people cross borders, energy become smarter and much more. More than 30,000 organizations already rely on Thales solutions to verify the identities of people and things, grant access to digital services, analyze vast quantities of information and encrypt data. In early 2019, they acquired the international security company, Gemalto, and have combined it with our existing digital assets to create a new leader in digital security. Every organization around the world is in the midst of a digital transformation and stand to benefit from their joint innovations.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.