SailPoint
Xton
Philadelphia, PA based Xton Technologies makes it easy and affordable to have high security for your privileged access. Our enterprise grade XT Access Manager (XTAM) is purpose built to protect against malicious or accidental access from both within and beyond your firewall.
i-Sprint
i-Sprint, established in the year 2000, is the leader in Securing Identity and Transactions in the Cyber World for industries that are security sensitive, require channel monitoring and quality data for better user management. We enable individuals, organizations, and societies to build trust and identity assurance for powering.
Master Sam
MasterSAM – proven & trusted since 2004, is the technology leader in Privileged Access Management security solution to help organizations securing and managing privileged access from a complete lifecycle perspective. MasterSAM started with a simple and humble vision.
ObserveIT
LogRhythm
LogRhythm, Inc. is an American security intelligence company that unifies Security Information and Event Management, log management, network and endpoint monitoring and forensics, and security analytics.
ProofPoint
Proofpoint is an enterprise security company based in Sunnyvale, California that provides software as a service and products for inbound email security, outbound data loss prevention, social media, mobile devices, digital risk, email encryption, electronic discovery, and email archiving
Wiki Labs
Wiki Labs is the leading Secured Technology Platform Provider. Partnering with the best of breed technologies such as Red Hat, Dell EMC, MySQL, Citrix, Arista and etc.
Cyber Observer
Cyber Observer continuously monitors security software tools, delivering real-time information about the deployment and optimization of the tools deployed in the enterprise security environment so senior infosec managers can have the awareness and visibility they need to effectively manage their cybersecurity programs.
Muniotech
What makes us different is our holistic approach to managing cyber risk. This means by having the right security solutions in place before an attack happens, a cyber liability insurance policy to keep business operations running during an attack, and the ability to recover your assets after an attack.