Partners

The Market Leader in Network Security Policy Management Founded in 2003, AlgoSec enables security and operations teams to intelligently manage security policies across firewalls, routers, VPNs and related devices, increasing operational efficiency and improving risk mitigation for organizations worldwide. Today, more than 700 enterprises, MSSPs and auditors in over 40 countries and across all industry verticals use AlgoSec solutions. From mid-sized enterprises and Fortune 500 companies to all Big Four auditing firms, organizations choose AlgoSec for its unique combination of superior technology and commitment to customer satisfaction.

Award-Winning Solutions
Comprised of AlgoSec’s Firewall Analyzer (AFA) policy analysis solution and AlgoSec FireFlow change workflow automation solution, the AlgoSec Security Management Suite enables the complete management and control of the network security policy. With support for all major firewall vendors and security devices, the Security Management Suite automates labor- intensive tasks traditionally associated with firewall operations, change management, auditing, compliance a nd risk analysis. The Security Management Suite has received numerous industry accolades, including the only 5/5 rating from SC magazine and Info Security Products Guide’s best policy management finalist.

Innovative Technology
Originally developed by AlgoSec CTO, Prof. Avishai Wool, at Bell Research Labs, AlgoSec solutions are powered by the most comprehensive technology for security policy analysis and management. The company’s patented, Deep Policy Inspection™ technology includes the largest knowledgebase for policy risk analysis and optimization, enabling AlgoSec solutions to provide more actionable results with greater accuracy than ever possible.

Since its inception, AlgoSec has delivered many "industry-first" innovations including:

  • Deep Policy Inspection™ featuring topology-aware analysis.
  • FireFlow, the first commercially available solution for security change workflow automation.
  • Provider Edition to meet the unique needs of managed security service providers (MSSPs).
  • ActiveChange™ technology for automatic execution of firewall changes.

Obsession for Customer Satisfaction
Since its inception, AlgoSec is deeply committed to ensure the satisfaction of each and every customer. AlgoSec’s "obsession" for customer satisfaction has driven the company’s mission, guided its corporate culture and resulted in a strong competitive advantage.

AlgoSec’s obsession for customer satisfaction is expressed through the following corporate mandates:

  • Offering the industry's only money back guarantee to ensure complete satsifaction for every customer.
  • Operating with honesty and integrity, delivering even on the most challenging promises.
  • Contractually committing all employees and channel partners to the assurance of customer satisfaction.

Trustwave is a leading provider of compliance, Web, application, network and data security solutions delivered through the cloud, managed security services, software and appliances. For organizations faced with today's challenging data security and compliance environment, Trustwave provides a unique approach with comprehensive solutions that include its TrustKeeper® portal and other proprietary security solutions. Trustwave has helped hundreds of thousands of organizations--ranging from Fortune 500 businesses and large financial institutions to small and medium-sized retailers--manage compliance and secure their network infrastructures, data communications and critical information assets. In Q1 of 2012, Trustwave acquired M86 Security, the leader in true Internet Web Security, whose products include web content filtering, email encryption & security, and the only true Secure Web Gateway on the market. For more information, give us a call



Today, as enterprises’ network-fabric becomes increasingly complex and dynamic, CIOs and CISOs need to re-examine the assessment of their access control needs.

The conventional LAN security products, like firewalls, focus on securing the external perimeter of your network from external threats. This approach leaves your network unsecured from the inside and vulnerable to internal threats.The fact is that most assaults take place at the network level, far below the radar screen of perimeter security solutions. If an offender plugs an IP device into a network port anywhere in your offices, they are inside your network, completely bypassing all perimeter security.

The promise of traditional NAC solutions, such as those provided by the large networking and software vendors, was optimistic. However, the promise delivery has fallen short of expectations and deployments have been largely unsuccessful. Most NAC products require a homogenous infrastructure, deliver limited network visibility and control, and need infrastructure upgrades and endless version maintenance across the organization.

Moreover, the enterprise network continues to evolve faster than ever, introducing new layers and platforms to manage and control. Through recent years we’ve seen the introduction and growth of wireless, virtualization, cloud and bring-your-own-device (BYOD) trends that repeatedly challenge traditional NAC offerings.

Control is an absolute. You are either in control, or not.

Portnox addresses the evolving, modern-network challenges and delivers a trusted network access management framework, for today’s needs and beyond.

By using Portnox Platform you are able to manage and accelerate your network evolution ensuring 100% network security from the inside and out.

By using Portnox you can maintain tight integration with any existing infrastructure transparently and flexibly with no additional, unnecessary hardware required and no limitations on size and layout.

Portnox is a unique 100% ‘agent-less’ solution that supports heterogeneous environments and provides complete port/device/user coverage with no MAC address management; the 802.1x ‘standard’ is not required and there are no network changes, upgrades or updates.

In the first quarter of this year, TIBCO, Inc. acquired LogLogic, Inc. TIBCO Software Inc. (NASDAQ: TIBX) is a provider of infrastructure software for companies to use on-premise or as part of cloud computing environments. Whether it's efficient claims or trade processing, cross-selling products based on real-time customer behavior, or averting a crisis before it happens, TIBCO provides companies the two-second advantage™ – the ability to capture the right information, at the right time, and act on it preemptively for a competitive advantage. More than 4,000 customers worldwide rely on TIBCO to manage information, decisions, processes, people, and data in real time. LogLogic is the most widely deployed and innovative Log Management solution on the market.

With the growth in regulatory industries and mandates across all industries, compliance has become one of the great challenges facing businesses today. The LogLogic product line ensures your ability to monitor enterprise activity and manage threats, as well as manage and review network policies according to all industry and government rules including PCI, SOX, HIPAA, FISMA, ITIL, ISO, and NERC.

Security concerns, such as hackers, internal or external information theft, fraud, and privacy violations, are a constant threat to your organization's reputation and financial integrity. Preventing a data breach or loss from your networks and databases is of paramount importance. With LogLogic’s suite of products, you can comply with internal and external security policies, be notified of suspicious network activity, perform detailed forensic analysis, and take quick action to prevent future security incidents.

System downtime and performance slowdowns can severely limit network, system, and application productivity. With LogLogic, you are pro-actively alerted to performance degradations or error conditions before they cause expensive and frustrating downtime. We make it easy to: perform immediate root-cause analysis through IT search, identify network inefficiencies and bottlenecks, streamline your hardware allocations, and automate the management of network policies to reduce operating expenses.

Regardless of whether you are trying to solve compliance mandates, improved security, or increasing your operations awareness, LogLogic, now TIBCO, can get you there. Now, combine the business analytics of SpotFire™ with the data accumulated with the LogLogic solution and you will be amazed with the information at your fingertips.

Please contact us for more information or a demonstration of this power at work

Today’s DDoS threats have evolved in both complexity and sophistication. These attacks target the availability of networks, services and applications—often at the same time—through a multi-layered attack strategy. This approach combines high-bandwidth attacks that overwhelm the capacity of Internet pipe, along with low-bandwidth, hard-to-detect attacks aimed at bringing down critical applications.

A recent survey conducted by the SANS Institute, indicates that ‘The most damaging DDoS attacks, which mix brute force (volumetric) attacks with targeted, application-specific attacks, have much of the same frequency (39%) as targeted (42%) and volumetric (41%) alone.’


More Pages: 1 | 2

TO SIEM OR NOT TO SIEM?

Clear

Suggestions for Getting a Handle on Event Logs. More...

Value of Cisco MARS

Clear

Do you need an alternative to replacing Cisco MARS? More...

TO KNOW MORE

Please fill out the form below to know more information. Our representative will call you back.

 Name:


 Company Name:


 Email:


 Comments:


Shipments: We generally ship the product in 2 to 3 business Days from the date of order. For Back order items if any will be informed to the customers.
For Special order and custom manufactured products, the approximate shipment date will be informed while placing the orders.
Design, Developed and Hosted by CBS Systems Corp., USA