A Quick-Reference Guide to New Vendors and Technology That Can Have a Big Impact on Your Business Start Flipping
Total Page:16
File Type:pdf, Size:1020Kb
THE AMPLIFY VENDOR FLIPBOOK A quick-reference guide to new vendors and technology that can have a big impact on your business Start flipping TABLE OF CONTENTS SECURITY SOFTWARE Forcepoint 3 Nuance 26 RSA 4 Solarwinds 27 FireEye 5 MobileIron 28 Quest 6 Tenable 29 Barracuda 7 Rapid7 30 Eset 8 TechSmith 31 SentinelOne 9 Nitro 32 Cofense 10 LogMeIn 33 Cylance 11 Carbonite 34 SonicWALL 12 Ivanti 35 Mimecast 13 Okta 36 Symantec 14 DATA CENTER HARDWARE APC 37 Jabra 15 Sungard 38 3M 16 C2G 17 Polycom 18 Plantronics 19 Epson 20 Logitech 21 Zebra 22 ViewSonic 23 Axiom 24 Samsung 25 2 FORCEPOINT Reinventing cybersecurity by protecting information where it’s most valuable and most vulnerable. ABOUT US Reinventing cybersecurity by creating uncompromising systems that understand people’s behaviors and motivations as they interact with data and IP everywhere. FEATURED CONTENT Best Practices for Building an Insider Threat Program Rethinking Data Security with a Risk-Adaptive Approach What They Won’t Tell You About Securing Cloud Apps CONTENT Forcepoint’s SD-Wan Security and Connectivity Verified by NSS Labs Vulnerability, Breach, and Patch: Break the Vicious Cycle Dynamic Data Protection: a Customer’s Perspecitve Let’s Make Firewalls More Human-Centric Defend Your Government Agency with CDM Forcepoint Research Dispels the Myths of Workplace Monitoring Forcepoint Channel Momentum Builds on Human-Centric Security How You Can Make Every Day Data Privacy and Protection Day Forcepoint 2018 Security Predictions Securing the Whenever, Wherever Workforce Security Consideration for Office365 Rollout The Human Point Protecting Data Where It’s Most Vulnerable 3 www.forcepoint.com Back to Table of Contents RSA RSA enables organizations to thrive in an uncertain, high-risk world. ABOUT US RSA offers business-driven security solutions that uniquely link business context with security incidents to help organizations manage risk and protect what matters most. RSA solutions are designed to effectively detect and respond to advanced attacks, manage user identities and access, and reduce business risk, fraud, and cybercrime. RSA protects millions of users around the world and helps more than 90% of the Fortune 500 companies thrive in an uncertain, high risk world. FEATURED CONTENT Understanding RSA Business-Driven Security RSA SecurID: Keep Ahead of Growing Threats RSA in Action Infographic CONTENT GDPR: Rethinking How You Think About Personal Data Five Ways to Transform Access How to Build a Better Integrated Identity Strategy 3 Keys for Multi-Factor Authentication for your VPN Foundations of the Intelligent SOC Evolving the Way Businesses Work in a Post-GDPR World Staying Secure Means Staying Relevant 3 Ways Proximity Authentication Is Revolutionizig Access Bridging the Gap of Grief with Business-Driven Security Where Will Fraudsters Go Next? Oh Hello, Access Certification Reviews When Identity Governance Gets Tough Delivering Secure Access to the Modern Workforce 4 Tips for Strengthening the Security of your VPN Access Who Are You Letting Through Your Digital Doors? Reducing the Identity Risk for VPN Access 4 www.rsa.com Back to Table of Contents FIREEYE FireEye is the Intelligence-led security company. ABOUT US FireEye understands cyber attacks and the threat actors responsible for them better than anyone else. FEATURED CONTENT Changes in Email Attack Tactics Email Security: a Buyer’s Guide No Signs of Over-Phishing Yet CONTENT Network Security: a Buyer’s Guide Mandiant Incident Response Services Four Keys to Leveraging Cyber Threat Intelligence Tackling the Cybersecurity Need for Speed with Network Forensics An Anatomy of a Public Cloud Compromise FireEye Email Security Shines at SC Awards Preparing for an Incident Response ReelPhish: a Real-Time Two-Factor Phishing Tool Improve Your Incident Response What You Should Expect from an Effective MDR Provider FireEye Endpoint Security Datasheet Endpoint Security: a Buyer’s Guide Endpoint Security: from Prevention to Remediation Elevate Your Security Operations with FireEye Helix Tomorrow’s Endpoint Protection Platforms 5 www.fireeye.com Back to Table of Contents QUEST Spend less time on IT administration and more time on IT innovation ABOUT US At Quest, our purpose is to solve complex problems with simple solutions. We accomplish this with a philosophy focused on great products, great service and an overall goal of being simple to do business with. Our vision is to deliver technology that eliminates the need to choose between efficiency and effectiveness, which means you and your organization can spend less time on IT administration and more time on business innovation. FEATURED CONTENT 3 Surprising Steps to a Successful Cloud Migration Durham Region Police Case Study Quest Microsoft Platform Management Solution CONTENT Toad for Oracle’s Copy User Settings Feature System Admin Cheat Sheet: Let KACE do the Heavy Lifting 9 Steps to Building a Disaster Recovery Plan GDPR Compliance Implications for US Companies Endpoint Systems Management Datasheet SharePlex Whitepaper 6 www.quest.com Back to Table of Contents BARRACUDA Barracuda Networks offers cloud-enabled solutions that empower customers to protect their email, networks, applications, and data—regardless of where they reside. ABOUT US Barracuda is committed to providing partners with complete, holistic security solutions that enable their customers to protect their networks and business critical data—no matter where their data resides. FEATURED CONTENT Barracuda’s CloudGen Firewall for Your Public Cloud Deployment Technical Moment | Email Threat Scanner for Office 365 Evolution of Spear Phishing CONTENT Cybersecurity AI to Grow to 18B Market Share Within Five Years Cybersecurity Report Commissioned by Trump Finds Much to Be Fixed Getting Started with Email Threat Scan for Office 365 Escalation of Application Integration Creates DevSecOps Challenges Is User Training the Weakest Link in Your Email Security Strategy? Automation of Barracuda Web App Firewall in AWS Does the Channel Have a Blind Spot? Criminals Impersonating Google Docs, Outlook, DocuSign Barracuda Difference: Single Source Solution What Is a Cloud Generation Firewall? Unlocking the Public Cloud Automating Application Security on Microsoft Azure Backup and Archiving for Office 365 7 www.barracuda.com Back to Table of Contents ESET Enjoy Safer Technology ABOUT US For 30 years, ESET has been committed to helping people protect their digital worlds. From a small dynamic company, ESET has grown into a global brand with over 110 million users in 202 countries. With ESET’s multi-layered technology, it allows for the highest detection rates and reacts to threats faster, helping all our customers benefit from stronger and more effective protection. As an industry leader in cybersecurity and malware research, ESET’s core aspirations, philosophy and values remain committed to helping build a more secure digital world where everyone can truly Enjoy Safer Technology. FEATURED CONTENT IoT and Privacy by Design in the Smart Home Cybersecurity Trends 2018 EternalBlue Exploit Still Popular CONTENT Protecting Enterprise Cybersecurity Experts on Your Side Trends 2018: Doing Time for Cybercrime Inside Fake Interac Transfer and Tax Refund SMS Phishing Cryptocurrency Scams on Android Can You Create a Safe Smart Home? Think You Have a Tracker on Your Phone? All HTTP Websites to Soon Be Marked as Not Secure by Google CHhrome Android Ransomware in 2017: Innovative Infiltration and Rougher Extortion Blockchain-Hardened Devices: Can They Restore Privacy With Security by Design? Data Privacy vs. Data Protection The State of SMB Cybersecurity in Canada 2017 How Safe Is Your Business From a Cyberattack? ESET Security: Proven and Trusted How Technology Can Help You Have a Better Start in Business How Technology Can Help You Build a Stable Foundation How Technology Can Help You Stay Energized How Technology Can Help You Go Global 8 www.eset.com Back to Table of Contents SENTINELONE Autonomous Endpoint Protection That Saves You Time ABOUT US SentinelOne is the convergence of EPP and EDR in a single, autonomous agent. We leverage static AI and behavioral AI in tandem with EDR capabilities such as remediation, mitigation, and rollback to protect thousands of customer environments across the globe - all while making them safer and saving them time. FEATURED CONTENT Microsoft Selects SentinelOne to Power Mac and Linux Coverage S.M. Wison & Co. Case Study Automated Endpoint Protection Management CONTENT Alexa Send Me the Daily SentinelOne Report SentinelOne: the Best AV for MacOS SentinelOne Releases Free Linux Tool 8 Visionary Predictions for Infosec in 2018 SentinelOne Security Endpoint Protection: Deep Visibility Solving the AV Problem 9 www.sentinelone.com Back to Table of Contents COFENSE The Power of the Collective ABOUT US Cofense’s award winning solutions reduce the risk and impact of breaches by enabling organization-wide detection and response to active phishing threats. Cofense mobilizes every employee to identify threats so security teams can quickly mitigate attacks in progress. Cofense protects your people, data, and brand against advanced email threats. Designed to anticipate and disrupt the attack kill chain at delivery, Cofense solutions deliver the fastest enterprise-wide detection and security automation and orchestration in response to cyberattacks. With thousands of customers world-wide including more than half the Fortune 1000, Cofense is raising the aptitude of phishing threat detection and mitigation for