Vulnerability Assessment & Management – Tenable Network Security (www.tenable.com)

IT Security Services

Managing IT risk is a complex and fragmented process, especially in today’s enterprise networks. Tenable Securi-tyCenter™ brings it all together in a centralised solution for hybrid IPv4/IPv6 asset discovery, vulnerability detection and configuration auditing.

Security Incident & Events Management – LogRhythm (www.logrhythm.com)

LogRhythm uniquely combines enterprise-class SIEM, Log Management, File Integrity Monitoring and Smar-tResponse, with Host and Network Forensics, in a unified Security Intelligence Platform. The LogRhythm solution provides profound visibility into threats and risks to which organizations are otherwise blind. Designed to help pre-vent breaches before they happen, LogRhythm accurately detects an extensive range of early indicators of compro-mise, enabling rapid response and mitigation.

Advanced Persistent Threat Protection – General Dynamics Fidelis Cyber Security (www.fidelis.com)

Today’s targeted threats are hidden deep within the application and content “onion,” where they are invisible to traditional network security systems. Fidelis technology is uniquely able to “peel back the onion” and expose deep-ly embedded threats in real-time, across all ports and protocols. Fidelis XPS’ patented core technology, Deep Ses-sion Inspection®, decodes and analyzes network sessions in real-time (while they are occurring) and can take an action, such as a recording or blocking action, on a network session before the session completes.

Privilege Identity Management – Xceedium (www.xceedium.com)

Privileged identity management isn’t just about privileged identities, though being able to positively identify power-ful users and vault and manage their passwords is a key part of the equation. Xceedium’s Xsuite is the industry’s first and only privileged identity management platform that encompasses the comprehensive controls necessary for protecting critical IT infrastructure and applications across cloud, virtual, or datacenter environments. Only Xsuite protects IT resources across traditional datacenter infrastructure, virtual platforms like VMware, and cloud environments like Amazon Web Services. Xsuite is a modern privileged identity management platform—architected to meet enterprise scalability requirements and the unique demands of highly elastic cloud and virtual environ-ments.

Enterprise Mobility Management – Good Technology (www.good.com)

Mobilizing your people, processes and information is essential to staying competitive and growing your business. Over 6000 customers trust Good to deliver secure mobility solutions that help them deliver business results. Devel-oping the most comprehensive EMM solution wasn’t done overnight. Good has the longest track record of innova-tion with more than 262 patents and recognition as an industry leader. Over 6000 companies of all sizes, including more than half of the FORTUNE 100TM companies rely on Good every day to make mobility work.