Sophos - provides a wide range of security solutions
Entrust has been at the forefront of the identity-based security market for nearly two decades, and their solutions are a great fit for New Zealand organisations.
Read more >Venafi helps businesses secure and protect machine identities against forged or stolen keys and certificates that can be used to break into private, encrypted tunnels to compromise confidential communications and steal data.
Read more >AlienVault unifies all of your essential security tools in one location and combines them with real-time threat intelligence.
Read more >janusNET - janusNET Data Classification / Protective Markings
Read more >Netskope is recognised as a leader for Cloud Access Security Brokers. Netskope enables security professionals to understand risky activities, protect sensitive data, stop online threats, and respond to incidents in a way that fits how people work.
Read more >Gemalto secures the authenticity of your banking transactions, safeguards your health records and helps organizations to control risk, manage security, and maintain compliance.
Accellion provides enterprise-class secure file sharing solutions that provide the ease-of-use employees need, while giving the enterprise organisation the security protection it needs.
Read more >Ivanti focuses on enabling organisations to gain control of service delivery, simplify processes, acquire real-time visibility, and orchestrate the interactions of people, process, and technology for optimum service performance.
Read more >Lumension offers an award-winning solution set that includes Vulnerability Management, Application Whitelisting Endpoint Protection, Data Protection, Antivirus and Reporting and Compliance.
Read more >Tripwire - security configuration management and logging
Read more >The Jatheon Solution features a first class scalable email archiving appliance & software for compliance, eDiscovery, storage & policy management.
Read more >Actiance is a leader in communication, collaboration, and social media governance for the enterprise.
Read more >Palo Alto Networks has pioneered the next generation of network security with an innovative platform that secures networks and safely enables an increasingly complex and rapidly growing number of applications.
Read more >StorageCraft ShadowProtect backup and DR software is trusted by IT professionals worldwide to quickly and reliably back up, restore and migrate Windows desktops, notebooks and servers.
Read more >Clearswift IT security software solutions are built on an innovative content-aware inspection engine that will protect your organization and employees.
Read more >World leaders in email archive migration and PST content management.
Read more >Technological brilliance for Archive Migrations - for EAS, Enterprise Vault and Mimosa NearPoint.
Read more >F-Secure build security and privacy solutions for today's business needs. Set up your office wherever you go, connect, collaborate, share and rest assured, F-Secure will keep you safe.
Read more >Webroot is the market leader in cloud-based, real-time internet threat detection for consumers, businesses and enterprises.
Read more >Using BlockChain technology, BlockBit Solutions empower their clients to authenticate and transact seamlessly and securely. Combined with SSS, customers will receive end to end solutions that will drive game-changing outcomes.
Read more >WatchGuard: Uniquely architected to be the industry's smartest, fastest and most potent network security solution.
Read more >Process Software - extend your VMS environments functionality, in Messaging and Networking and Security.
Read more >Web reporting that automates the process of importing log data from over 200 common network devices, transforming it into useful information, and securely delivering meaningful reports to the right person.
Read more >Darktrace deals with breach identification, breach remediation and insider threats by using machine-based learning to automatically alert you to anomalies within your environment and allowing you to play events back through a threat visualiser.
Read more >Phriendly Phishing Awareness Training and KSec5 general security training
Read more >Thycotic provides a suite of software solutions to mitigate against risks associated with Privileged Accounts and Passwords.
Read more >CyberArk is the trusted expert in privileged account security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry’s most comprehensive Privileged Account Security Solution.
Read more >Ascertia is a global leader in delivering functionally rich, easy to deploy e-security solutions. The company focuses on digital signature creation, verification, timestamping and secure archiving products as well as eID validation.
Read more >ViewDS Identity Solutions specializes in the development of identity and access management solutions for directory search, identity management and authorization services.
Read more >Zabbix is the ultimate open source availability and performance monitoring solution
Read more >Sophos UTM - complete perimeter security within a single solution.
Read more >Fortinet is a global leader and innovator in Network Security. Their mission is to deliver the most innovative, highest performing network security platform to secure and simplify your IT infrastructure.
Read more >Juniper Networks is in the business of network innovation. Their mission is to connect everything and empower everyone.
Read more >Message Retrieval - recall "faulty" messages before they leave your mail gateway
Read more >S/MIME Gateway - for transparent and easy to use policy based signing and encryption of email at the gateway. NZ Government SEEMail V3 certified.
Read more >Active Code Removal - for identifying macros and active code in documents and removing these sources of risk, allowing the "cleaned" documents to be delivered.
Read more >LDAP Client and Directory Interoperability - for managing multiple LDAP servers
Read more >Quarantine Area Management - allows authorised users to release selected classes of email stopped by MIMEsweeper for SMTP without assistance from IT staff.
Read more >Message Traffic Management - allows you to smooth out peaks in mail traffic volume and to protect internal mail systems from volume based denial of service attacks.
Read more >