sophos logo

Sophos

Sophos - provides a wide range of security solutions

Read more >
Entrust small

Entrust

Entrust has been at the forefront of the identity-based security market for nearly two decades, and their solutions are a great fit for New Zealand organisations.

Read more >
janusNET logo

JanusNET

janusNET - janusNET Data Classification / Protective Markings

Read more >
gemalto logo

Gemalto

Gemalto secures the authenticity of your banking transactions, safeguards your health records and helps organizations to control risk, manage security, and maintain compliance.

Read more >
Accellion logo

Accellion

Accellion provides enterprise-class secure file sharing solutions that provide the ease-of-use employees need, while giving the enterprise organisation the security protection it needs.

Read more >
Lumension logo

Lumension

Lumension offers an award-winning solution set that includes Vulnerability Management, Application Whitelisting Endpoint Protection, Data Protection, Antivirus and Reporting and Compliance.

Read more >
Tripwire logo

Tripwire

Tripwire - security configuration management and logging

Read more >
JATHEON Logo SM

Jatheon

The Jatheon Solution features a first class scalable email archiving appliance & software for compliance, eDiscovery, storage & policy management.

Read more >
actiance logo

Actiance

Actiance is a leader in communication, collaboration, and social media governance for the enterprise.

Read more >
paloalto logo

paloalto networks

Palo Alto Networks has pioneered the next generation of network security with an innovative platform that secures networks and safely enables an increasingly complex and rapidly growing number of applications.

Read more >
StorageCraft logo

StorageCraft

StorageCraft ShadowProtect backup and DR software is trusted by IT professionals worldwide to quickly and reliably back up, restore and migrate Windows desktops, notebooks and servers.

Read more >
clearswift logo

Clearswift

Clearswift IT security software solutions are built on an innovative content-aware inspection engine that will protect your organization and employees.

Read more >
TransVault logo

Transvault

World leaders in email archive migration and PST content management.

Read more >
Archive360

Archive360

Technological brilliance for Archive Migrations - for EAS, Enterprise Vault and Mimosa NearPoint.

Read more >
FSecure purple

F-Secure

F-Secure build security and privacy solutions for today's business needs. Set up your office wherever you go, connect, collaborate, share and rest assured, F-Secure will keep you safe.

Read more >
webroot logo

Webroot

Webroot is the market leader in cloud-based, real-time internet threat detection for consumers, businesses and enterprises.

Read more >
WatchGuard logo

WatchGuard

WatchGuard: Uniquely architected to be the industry's smartest, fastest and most potent network security solution.

Read more >
process logo

Process Software

Process Software - extend your VMS environments functionality, in Messaging and Networking and Security.

Read more >
webspy logo

WebSpy Vantage

Web reporting that automates the process of importing log data from over 200 common network devices, transforming it into useful information, and securely delivering meaningful reports to the right person.

Read more >
Darktrace logo

Darktrace

Darktrace deals with breach identification, breach remediation and insider threats by using machine-based learning to automatically alert you to anomalies within your environment and allowing you to play events back through a threat visualiser.

Read more >
Shearwater PH2 logo

Shearwater Security Training

Phriendly Phishing Awareness Training and KSec5 general security training

Read more >
cyberark logo sm

CyberArk

CyberArk is the trusted expert in privileged account security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry’s most comprehensive Privileged Account Security Solution.

Read more >
Ascertia Logo

Ascertia

Ascertia is a global leader in delivering functionally rich, easy to deploy e-security solutions. The company focuses on digital signature creation, verification, timestamping and secure archiving products as well as eID validation.

Read more >
View DS small

ViewDS

ViewDS Identity Solutions specializes in the development of identity and access management solutions for directory search, identity management and authorization services.

Read more >
zabbix logo

Zabbix

Zabbix is the ultimate open source availability and performance monitoring solution

Read more >
sophos utm logo

Sophos UTM

Sophos UTM - complete perimeter security within a single solution.

Read more >
fortinet logo

Fortinet

Fortinet is a global leader and innovator in Network Security. Their mission is to deliver the most innovative, highest performing network security platform to secure and simplify your IT infrastructure.

Read more >
juniper logo

Juniper

Juniper Networks is in the business of network innovation. Their mission is to connect everything and empower everyone.

Read more >
recallit logo1

RecallIT

Message Retrieval - recall "faulty" messages before they leave your mail gateway

Read more >
secureit logo1

SecureIT

S/MIME Gateway - for transparent and easy to use policy based signing and encryption of email at the gateway. NZ Government SEEMail V3 certified.

Read more >
stripit logo1

StripIT

Active Code Removal - for identifying macros and active code in documents and removing these sources of risk, allowing the "cleaned" documents to be delivered.

Read more >
ldaptit logo1

LDAPtIT

LDAP Client and Directory Interoperability - for managing multiple LDAP servers

Read more >
releaseit logo1

ReleaseIT

Quarantine Area Management - allows authorised users to release selected classes of email stopped by MIMEsweeper for SMTP without assistance from IT staff.

Read more >
stopit logo1

StopIT

Message Traffic Management - allows you to smooth out peaks in mail traffic volume and to protect internal mail systems from volume based denial of service attacks.

Read more >