MENU
Accellion Logo3

Accellion

Accellion provides enterprise-class secure file sharing solutions that provide the ease-of-use employees need, while giving the enterprise organisation the security protection it needs.

Read more >
Ascertia Logo

Ascertia

Ascertia is a global leader in delivering functionally rich, easy to deploy e-security solutions. The company focuses on digital signature creation, verification, timestamping and secure archiving products as well as eID validation.

Read more >
ATT Logo5

AT&T Cybersecurity

With the acquisition of AlienVault, AT&T Cybersecurity will continue to deliver on their joint vision to address cyber security issues and uniquely bring together people, process, and technology through a “software defined” unified security management platform.

Read more >
Clearswift Logo

Clearswift

Clearswift IT security software solutions are built on an innovative content-aware inspection engine that will protect your organization and employees.

Read more >
Entrust Logo3

Entrust

Entrust has been at the forefront of the identity-based security market for nearly two decades, and their solutions are a great fit for New Zealand organisations.

Read more >
Forescout Logo2

Forescout Technologies

Forescout Technologies is the leader in device visibility and control. Their unified security platform enables organisations to gain situational awareness of their extended enterprise environment.

Read more >
Greenbone Logo

Greenbone Networks

Greenbone Networks offers an open source solution for vulnerability analysis and management. It identifies security risks, assess risk potential, and recommends actions.

Read more >
Janusnet RGB Landcape 01

Janusnet

Janusnet provides a range of practical, reliable and easy-to-use solutions to control and protect sensitive information in the form of data classification / protective markings

Read more >
Jatheon Logo2

Jatheon

The Jatheon Solution features a first class scalable email archiving appliance & software for compliance, eDiscovery, storage & policy management.

Read more >
ldaptit logo1

LDAPtIT

LDAP Client and Directory Interoperability - for managing multiple LDAP servers

Read more >
Netskope Logo

Netskope

Netskope is recognised as a leader for Cloud Access Security Brokers. Netskope enables security professionals to understand risky activities, protect sensitive data, stop online threats, and respond to incidents in a way that fits how people work.

Read more >
Palo Alto Logo

Palo Alto Networks

Palo Alto Networks helps address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration.

Read more >
Phriendly Phishing Logo4

Shearwater Security Training

Phriendly Phishing Awareness Training and KSec5 general security training

Read more >
PKI Solutions

PKI Solutions

PKI Solutions offers PKI consulting, training, professional services,and assessments to help ensure the security of organisations now and in the future

Read more >
Proofpoint Logo2

Proofpoint gives you protection and visibility for your greatest cyber security risk - your people. They provide the most effective cyber security and compliance solutions to protect people on every channel including email, the web, the cloud, and social media.

Read more >
recallit logo1

RecallIT

Message Retrieval - recall "faulty" messages before they leave your mail gateway

Read more >
releaseit logo1

ReleaseIT

Quarantine Area Management - allows authorised users to release selected classes of email stopped by MIMEsweeper for SMTP without assistance from IT staff.

Read more >
Risk IQ Logo

Risk IQ

RiskIQ offers unparalleled visibility outside the firewall, allowing security teams to discover unknowns in their internet facing attack surface and identify and investigate threats to their organisation and customers.

Read more >
Sailpoint Logo3

Sailpoint

Sailpoint provides identity management and governance for unstructured data access. With the power of the SailPoint Predictive Identity you can see more, do more, and secure more.

Read more >
secureit logo1

SecureIT

S/MIME Gateway - for transparent and easy to use policy based signing and encryption of email at the gateway. NZ Government SEEMail V3 certified.

Read more >
Shearwater Solutions Logo

Shearwater Solutions

Shearwater Solutions (a CyberCX company) is Australia's leading cyber security company. Their purpose is to create a safer connected world by securing the technology and flow of information that enables organisations to transact in the 21st century.

Read more >
SigningHUB logo

SigningHuB

SigningHub provides a complete solution for document approval workflows, advanced digital signatures, and document status tracking.

Read more >
sophos logo

Sophos

Sophos - provides a wide range of security solutions

Read more >
stopit logo1

StopIT

Message Traffic Management - allows you to smooth out peaks in mail traffic volume and to protect internal mail systems from volume based denial of service attacks.

Read more >
StorageCraft Logo

StorageCraft

StorageCraft ShadowProtect backup and DR software is trusted by IT professionals worldwide to quickly and reliably back up, restore and migrate Windows desktops, notebooks and servers.

Read more >
stripit logo1

StripIT

Active Code Removal - for identifying macros and active code in documents and removing these sources of risk, allowing the "cleaned" documents to be delivered.

Read more >
Swimlane Logo

Swimlane

Swimlane is a leader in orchestration, automation, and response (SOAR). They automate and organise your security processes in repeatable ways to get the most out of available resources and accelerate incident response.

Read more >
Thales Logo

Thales

Thales solutions help organisations verify the identities of people and things, grant access to digital services, analyse vast quantities of information, and encrypt data.

Read more >
Thycotic Logo2

Thycotic

Thycotic provides a suite of software solutions to mitigate against risks associated with Privileged Accounts and Passwords.

Read more >
Tripwire logo

Tripwire

Tripwire - security configuration management and logging

Read more >
Varmour Logo1

vArmour Data Center and Cloud Security

Data center and cloud security. Delivering agentless integrated security services to auto-discover application communications, optimise policy modeling, and protect critical applications and workloads across multi-clouds.

Read more >
Venafi Logo

Venafi

Venafi helps businesses secure and protect machine identities against forged or stolen keys and certificates that can be used to break into private, encrypted tunnels to compromise confidential communications and steal data.

Read more >
ZX Security

ZX Security

ZX Security have a wide range of penetration testing services in their catalogue. They do everything from web apps, to mobile through to API and Red Team engagements

Read more >