Products

ViewDS Identity Solutions is a suite of Identity and Access Management solutions designed for directory and discovery search, Identity Management, Authorisation Services and Meta Data Integration. It provides organisations with a fast, scalable and flexible identity management infrastructure that is optimised to support very high speed searches on hierarchically structured data as well as providing Attribute Based Access control, Role Based Access Control and fine grained authorisation services. More Info...


DELL

Dome 9 SecOps is a network security solution built specifically to support public and hybrid cloud infrastructure. SecOps is designed to ensure consistent policies across regions, accounts and clouds, educe threat exposure of ‘internal’ cloud servers and ensure servers are always in a secure and compliant state. More Info...


Telos is a leading provider of advanced technology solutions that secure the vital assets of the world’s most demanding enterprises. Telos customers include military, intelligence, and civilian agencies of the federal government and NATO allies around the world. More Info...


Opswat

Cyber threats affect both businesses and consumers, cyber incidents are becoming so widespread that some of the associated costs are fairly well anticipated, and are increasingly accepted as part of the risk of doing business. More Info...


netskope

Organizations have recognized that they must adapt their existing apps to mobile devices, and create applications for the employees and/or customers. As workers demand more effective tools to do their jobs, More Info...


osirium

Osirium is an award winning privileged access management and cybersecurity specialist. Every IT infrastructure is managed by privileged users – users granted elevated control through accessing privileged accounts to ensure that the uptime, performance, resources and security of the computers meet the needs of the business. Osirium's Privileged Access Management solution addresses both security and compliance requirements by defining who gets access to what and when.  More Info...

 

Additional information