Next Generation Virus and Protection – CYLANCE According to the Verizon DBIR report, up to 90% of the malware faced by organizations today are repackaged variants of older versions. So why can’t AV solutions stop them? It’s time to evolve our endpoints. It’s time to raise the bar for the attackers. It’s time for the next generation of AV. Signatures are obsolete. A next generation antivirus needs to leverage artificial intelligence and machine learning instead of virus definition and signatures. CylancePROTECT redefines what antivirus can and should do for your organization by leveraging artificial intelligence to detect AND prevent malware from executing on your endpoints in real time.

Data Loss Prevention at the Endpoint and Network Edge – DIGITAL GUARDIAN/CODE GREEN Digital Guardian is a complete data loss prevention (DLP) solution that allows companies to effectively discover, monitor, control, and secure sensitive data, on the network, as it is used on desktops or , or residing in systems and network servers. If you are looking for a data loss prevention (DLP) solution with a simplified architecture that is easy-to-install and easy-to-manage, then you need to look at Digital Guardian. Unlike other enterprise data loss prevention solutions, Digital Guardian enables the largest global organizations to cost effectively start solving their core data leakage problems in days not months. Digital Guardian protects data-in-motion, data-at-rest, and data-in-use on your servers, endpoints, network and in the cloud.

Smart For All Computing Platforms – PKWARE Your organization is confronted with increasing amounts of sensitive data. Simple encryption solutions just don’t get the job done. In order to maintain control over sensitive data without placing additional pressure on your IT infrastructure, you need a solution that can secure increasing volumes of data, while ensuring your organization remains in control. SecureZIP software brings an intelligent, flexible approach to protecting data. Usability and cost no longer have to be considered a trade-off when securing business information. Smart Encryption from SecureZIP armors data at its core to keep businesses and users safe as they send and store information from just about anywhere. SecureZIP is available on all major computing platforms.

Eliminate the IoT Security Blind Spot – ARMIS Armis is an agentless IoT security solution that lets enterprises see and control any device or network. Discover all the devices in your environment, even before they join the network. Automatically identify and disconnect unmanaged devices from the network. Deploys in minutes. Integrates with existing infrastructure. Armis protects business from unmanaged, compromised or rogue devices and networks. Using an agentless approach, Armis discovers, monitors and provides visibility to all devices – even before they connect with the network, including monitoring and controlling all outside connections from corporate assets.

Privileged Password Security – THYCOTIC Thycotic, a global leader in IT security, is the fastest growing provider of Privilege Management solutions that protect an organization’s most valuable assets from cyber-attacks and insider threats. Thycotic secures privileged account access for more than 7,500 organizations worldwide, including Fortune 500 enterprises. Thycotic’s award winning Privilege Management Security solutions minimize privileged credential risk, limit user privileges, and control applications on endpoints and servers. Thycotic was founded in 1996 with corporate headquarters in Washington, D.C. and global offices in the U.K. and Australia.

Email Management with no Complexity and Less Cost – MIMECAST Mimecast provides email management as a single service in the cloud that helps you slash on-premise email storage requirements, ensure complete email availability, email security and email compliance, while providing services to help you get more from your email. We call it "Unified Email Management". The features include Email Security, Email Archiving, Email Continuity, File Archiving, Large File Send/Receive and Targeted Threat Protection for Outlook and Mimecast for Office 365.

E-Mail: [email protected] Web: www.jcsaainc.com Phone: 800-968-9527 Version 17.06.30

Data Discovery and Classification - SPIRION Understanding your data accurately is the foundation of your sensitive data protection strategy and helps you determine where to apply your controls. But once you understand your data, you need to properly classify it. Without security classification, an organization treats all data as if it were the same: You can't know the level of importance of any data because it hasn't been properly classified. Spirion Data Platform's automated persistent data classification software simplifies what until now has been a costly and resource-intensive exercise.

Data Loss Prevention and Mobile Device Manager - Endpoint Protector – COSOSYS Finally, an out-of-the box solution to secure sensitive data from threats posed by portable storage devices, cloud services and mobile devices. Endpoint Protector for Windows, Mac and Linux provides device control, content aware protection, mobile device management and enforced encryption of removable media, all managed from a single console contained in a physical or virtual environment. Suitable for any size network, EPP can be used by small, medium and enterprise customers.

Protect Email, Personal Data and Your Company – ZIX Email Encryption, Email Data Loss Prevention and Mobile Device Email Management

Encryption, Device Control and Content Inspection on Desktop and PCs and Macs – SAFEND Integrated encryption, device control and Content Inspection. Safend’s DPS includes the following modules: Protector: Guards against data breaches by applying granular security policies over physical/wireless ports and removable storage, allowing encryption of removable media. Encryptor: Protects against data loss by providing PC and laptop hard disk encryption. Inspector: Inspects, classifies and blocks leakage of sensitive data across multiple channels (DLP). Reporter: Provides visibility into removable device usage and policy enforcement. Discoverer: Maps and locates sensitive data stored on organizational endpoints and network shares. These security modules can be deployed as a Data Protection Suite (DPS), or can be licensed individually as your needs dictate. All of these modules are managed using the same integrated management console.

Security Information and Event Management - LOGRHYTHM LogRhythm provides a comprehensive, fully integrated, enterprise-class log management, log analysis and event management solution that empowers organizations to comply with regulations, secure their networks and optimize IT operations. By automating the collection, organization, analysis, archival and recovery of all log data, LogRhythm enables enterprises to easily comply with log data retention regulations while simultaneously gaining valuable, timely and actionable insights into security, availability, performance and audit issues within their infrastructure. LogRhythm solutions are noted for their completeness, useful analytics, ease of use and rapid time to value.

Exchange/Blackberry/Active Synch, Active Directory and SharePoint System Monitoring – ENOW The award-winning ENow Mailscape is a complete systems management solution that provides Exchange monitoring and reporting, plus BlackBerry and ActiveSync management. Mailscape helps companies ensure a smooth migration to Exchange 2010, streamlines daily IT tasks associated with e-mail system administration, and offers over 200 reports, including mobile device usage along with a sleek dashboard view of entire Exchange system. Exchange 2003, 2007 and 2010 are all supported by ENow's Mailscape. Enow also offers monitoring and reporting of Active Directory with their Compass solution and also provides for monitoring and reporting in SharePoint with their ForeSite solution.

Managed Security Solutions – NETWORK BOX Unified Threat Management (UTM+) from Network Box is an all-in-one solution that offers the most effective gateway protection against cyber threats by providing for: Firewall, IDP, VPN, Anti-Malware, Anti-Spam and Content Filtering Technologies, protecting your organization against both known and unknown threats, all deployed in a single appliance at your network edge. Advantages to using the Network Box UTM+ are: Advanced Security, Improved Business Continuity, Lower Total Cost of Ownership and Convenience

Revolutionizing Data Protection and Storage – CTERA CTERA™ Networks revolutionizes storage and data protection for SMBs and branch offices with Cloud Attached Storage, a hybrid solution that combines secure cloud storage services with on-premises storage appliances for a seamless user experience.

E-Mail: [email protected] Web: www.jcsaainc.com Phone: 800-968-9527 Version 17.06.30