Technology partnerships are vital to Quantiq’s ability to deliver world-class solutions to our customers. As the preferred regional security architect, Quantiq collaborates with leading security technology innovators to deliver integrated solutions to our clients to set them ahead of the technology curve.
For 30 years, Boldon James has been a leader in data classification & secure messaging solutions, helping organisations manage sensitive information securely and in compliance with legislation and standards. Boldon James Classifier enables users to apply visual & metadata labels to messages, documents & files to enforce information assurance policies and orchestrate multiple security technologies such as DLP and Digital Rights Management. Boldon James is a wholly-owned subsidiary of QinetiQ plc, a FTSE 250 company, with offices worldwide.
CA Technologies (NASDAQ:CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business in every industry. From planning, to development, to management and security, CA is working with companies worldwide to change the way we live, transact, and communicate – across mobile, private and public cloud, distributed and mainframe environments.
Deep Identity is an innovation leader in providing comprehensive and unique solution to address identity governance and administration (IGA), compliance management and data governance requirements. It offers a layered approach that enables better visibility and controls, ultimately automating compliance management in a cost effective manner. It provides business with the relevant reporting and analytics to improve IT security, maintain compliance and eventually minimize business risk. Deep Identity has been rated consistently very well by leading industry and technology analysts for its innovation and niche solution offering.
FireEye is the leader in stopping advanced targeted attacks that use advanced malware, zero-day exploits, and APT tactics. FireEye’s solutions supplement traditional and next-generation firewalls, IPS, antivirus and gateways, which cannot stop advanced threats, leaving security holes in networks. FireEye offers the industry’s only solution that detects and blocks attacks across both Web and email threat vectors as well as latent malware resident on file shares. It addresses all stages of an attack lifecycle with a signature-less engine utilizing stateful attack analysis to detect zero-day threats. Based in Milpitas, California, FireEye is backed by premier financial partners including Sequoia Capital, Norwest Venture Partners, and Juniper Networks.
FireMon provides enterprises and government with security management software that gives them deeper visibility and tighter control over their network security infrastructure. The FireMon solution set – Security Manager, Policy Planner and Risk Analyser – enables customers to identify network risk, proactively eliminate those vulnerabilities and strengthen security throughout the organization, and reduce the cost of security operations and compliance. Together, they create a highly-effective and consistent solution for efficiently managing security operations.
Forcepoint™ was created to empower organizations to drive their business forward by safely embracing transformative technologies – cloud, mobility, Internet of Things (IoT), and others – through a unified, cloud-centric platform that safeguards users, networks and data while eliminating the inefficiencies involved in managing a collection of point security products.
Gemalto expertise spans the entire process of creating digital security solutions for our clients and their customers. We enable digital services and networks by offering a secure and seamless chain of software, products, platforms and services. This chain of trust helps organizations to protect what matters, where it matters by ensuring strong identities and secure data from the edge to the core. To protect the edge of the network we develop secure software and operating systems which we embed in many kinds of device, like SIM cards, banking cards, tokens, electronic passports and ID cards. Once we’ve personalized them and loaded them with data, we deploy platforms and services to manage and protect them as well as the sensitive data they hold throughout their life-cycle.
Today, a global threat marketplace collaborates and innovates to attack organizations 24/7. It’s time to think like a bad guy. HP draws on decades of enterprise security experience and powers much of the world’s security intelligence to uncover vulnerabilities, identify threats and neutralize them so that, instead of simply reacting, you can proactively counter your adversary.
With Headquarters in Singapore, i-Sprint has expanded rapidly across Asia Pacific. We now have direct presence and active authorized partners across China (Zhuhai, Beijing, Shenzhen, Chengdu), Hong Kong, Taiwan, Malaysia, Thailand, Vietnam, Japan, and the United States. As of 2014, i-Sprint Group has two major strategic investors: ASL/Teamsun Group (which is listed in Hong Kong Stock Exchange and Shanghai Stock Exchange) and Great Ally Investments, a wholly-owned subsidiary of the Peregrine Greater China Capital Appreciation Fund, L.P. i-Sprint’s own unique brand of security products, intellectual properties and patents are designed to exceed global financial services regulatory requirements. In order to capitalize the fast growing Identity, Credential and Access Management (ICAM) market, i-Sprint proactively delivers innovative product features via our product offerings in Identity Protection, Cloud Protection, Mobile Protection and Data Protection.
Network Critical was established in 1997 by Alastair Hartrup to fulfil a market need for a better way to access network data traffic. Today, Network Critical is the leader in Access Technology Solutions, with award-winning, innovative products designed for the compliance era. A global company, Network Critical leads the network monitoring industry with constant innovation and unique modular design. Our technology ensures 100% continuous network visibility and ZERO packet loss. Our products eliminate any concerns of downtime while adapting to the configuration of your network and scaling alongside growth.
NSFOCUS was founded in 2000 to provide enterprise-level network security solutions and services primarily in the Asia/Pacific market. The new NSFOCUS International Business Division (IBD) brings advanced security solutions to the Americas, Europe, the Middle East, and Southeast Asia.
Penta Security Systems Inc. is Korea-based leading provider of application security software and core technology, with more than 1,000 installed customers. Established in July 1997, Penta Security Systems holds the highest level of technology expertise and abundant experience in key areas of information security. Incorporated in 2009, its Japanese subsidiary Penta Security Systems K.K is now focusing its efforts on satisfying the application-level security needs and requirements of organizations throughout Japan and globally.
Founded in 1995, SSH Communications is the company that invented the SSH protocol – the gold standard protocol for data-in-transit security solutions. Today, over 3,000 customers across the globe, including 7 of the Fortune 10, trust our Information Integrity Platform to secure the path to their information assets. We enable and enhance business for thousands of customers in multiple industries in the private and public sectors around the world. We operate in the Americas, Europe, and APAC regions, with headquarters located in Helsinki, Finland. The company holds 15 patents and its shares are quoted on the NASDAQ OMX Helsinki.