Click here for AppGuard resources
Click here for CryoServer resources
Click here for CubedMobile resources
Click here for Firescope resources
Click here for Matrix42 resources
Click here for Metomic resources
Click here for Miracl resources
Click here for Parsyfal resources
Click here for Solarwinds resources
Click here for ZecOps resources
Click here for Zimperium resources
AppGuard applies patented technology to protect endpoints, servers, and ATMs against all Zero-Day threats.
AppGuard Enterprise is a centrally managed host-based endpoint protection solution, originally developed for US Defence organisations and prevents malware and all advanced cyber-attacks from harming the system. It blocks attacks from detonating without having to explicitly recognize the attack. It is intended for organisations with high numbers of endpoint devices to protect.
Conquering Zero-Day Threats
Preparing for what’s next,
not what was last
Cryoserver offers businesses the most comprehensive email archiving solutions with incredible performance, functionality and simplicity to meet individual needs. With Cryoserver, you can be confident that your email archive is compliant, every email is securely stored, and users can find the data they need in milliseconds.
Cryoserver Cloud Datasheet
Cryoserver Audited Delete
Cryoserver Departmental Benefits
Cryoserver At a Glance
Cryoserver with Office 365
Cryoserver Appliance Datasheet
Cryoserver Selling Points
Cryoserver Speed of Search
Enhance Office 365
Compliance with Cryoserver
Email Archiving with Cryoserver
Cybersecurity with Cryoserver
Migrations with Cryoserver
Save Time and Money
The Case for Cryoserver
BYOD – Bring Your Own Device: Cubed Mobile transforms one mobile into two, encapsulating an entire business smartphone in a super-app on a personal phone. Delivering a complete workspace combined with a unified communication hub, the self-contained, centrally managed virtual smartphone, can be installed on any device.
Secure Discovery and Dependency Mapping
Discovery that sees everything all the time – Our Persistent Observation is always listening to the network flow traffic and finds every asset that communicates on your network.
Multi-layer Baseline Service Maps – FireScope baseline service maps provide multiple dependency layers of your critical tier1 and tier2 applications across your technology stacks ensuring every asset and dependency is accounted for.
Battling an invisible threat
SDDM The GPS for your IT Landscape
Service centric security strategy
How to safeguard patient data – healthcare sector guide
FireScope’s Multi-layer Dependency Maps
SDDM Root Cause Analysis
SDDM – Building complex service dependency maps
IT Asset & Service Management Landscape Change
SDDM – Configuration ITEM (CI) Compliance
Building a secure and efficient IT workspace – Matrix42 help organisations digitise the workspace environment of their employees. The software for its digital workspace manages devices, applications, processes and services in a simple, secure and compliant way.
Matrix42 Egosecure’s Insight Module collects information on the data security situation of your network to determine the initial deployment of protective measures. It is then used to constantly monitor your organisation’s protection requirements as they change with time. The IntellAct Module analyses the data from Insight and automatically activates protective measures based on pre-defined rules.
– SUEM Case Study
Matrix42 Egosecure DataProtection
– IntellAct and Insight
Matrix42 EgoSecure Data Protection
– One pager
Matrix42 Use Case – Kingston
Discover and control sensitive data in the cloud.
Discover: Accurately identify sensitive data across all of your cloud apps and infrastructure, so you know precisely where it is, and who has access to it.
Control: Precisely control sensitive data across thousands of locations. Block data being uploaded to the wrong place, and automatically delete it when it’s no longer needed.
Say goodbye to passwords. MIRACL secures the people, apps, and things you need to run a digital business. We offer the safest, smoothest, and most intuitive user authentication platform in the world. Our technology is built on the concept of the zero knowledge proof: that means users can verify their identity without revealing their private information.
- fast: authentication in 2 seconds or less
- user friendly: intuitive, unfussy multi-factor authentication
- safe: no passwords means less risk
- deployable: get up and running everywhere, no hardware necessary
- cost effective: straightforward pricing, lower total cost of ownership than passwords
- compliant: our system exceeds PSD2 requirements
Parsyfal is a Data Protection platform that operates across the entirety of your business. It is powered by a.i. that identifies and measures escalating threats to your business as well as vulnerabilities and weaknesses within your operation.
Through a comprehensive dashboard you will see real-time status of vulnerabilities and their locations, each triaged for urgency of response and remediation.
Parsyfal Full Brochure
The Parsyfal Story
IT Service Management without the friction
IT SERVICE MANAGEMENT
IP Monitor Datasheet
Log Analyzer Datasheet
SQL Sentry Datasheet
Mobile attacks are finally visible! ZecOps Mobile EDR empowers security professionals to discover and analyze mobile cyber attacks
ZecOps + MTD
ZecOps for Applications Product Details
ZecOps for Mobile FAQs
ZecOps for Mobile On-Premises Deployment on VMs
ZecOps Mobile EDR
ZecOps Kiosk Generic
ZecOps Managed Services
ZecOps Mobile EDR
ZecOps Price List 2021
ZecOps Sample Tier 4 Digital Forensics Report
ZecOps Market Positioning
ZecOps vs Cellbrite Battlecard
Mobile Endpoint Security: Zimperium empowers enterprises to secure their mobile endpoints, enabling employees to access sensitive data and mission critical systems safely and securely. Our enterprised-focused, advanced mobile security solution integrates with IAM, UEM, XDR platforms and is deployable on any cloud, on-premises, and air-gapped environments.
Mobile Application Protection: Zimperium enables enterprises to build safe and secure mobile apps. Their solution detects and prevents app compromises that disrupt business, damage reputation, and result in regulatory penalties. Zimperium is the only unified solution that combines comprehensive protection with centralized threat visibility.
Zimperium Sample Mobile Threat Risk Report
Zimperium Mitre Att&ck for Mobile Matrix
Zimperium Security into Vision
VMWare + Zimperium at a Glance
Zimperium zConsole API Guide
Zimperium zConsole Configuration Guide
Zimperium zConsole VMWare Workspace Integration Guide
Zimperium Mobile Threat Defence vs MDM
Zimperium Crowdstrike Compete Campaign
Zimperium Corporate Fact Sheet
Zimperium + VMWare CRWD Takeout Play
Zimperium – Why Hackers Love your Mobile Banking App
We’ve all done it. Or should that be we’re all doing it and don’t feel like stopping. What I’m referring to is using our own personal devices, whether that’s a smartphone or tablet, for our employer’s daily work. These devices all have email clients, or a client is...
Podcasts, webinars and videos
Managing Cyber and Compliance Risk
in 3rd party suppliers