Name | Title | Contact Details |
---|
Eversync is a Salt Lake City, UT-based company in the Computers and Electronics sector.
SBOX is the Converged Appliance Solution for Splunk SBOX Inc was founded by a team of technical and security Splunk experts with years of real-world field experience. We have helped our customers to design and manage hundreds of Splunk environments globally. Our team has extensive experience managing performance, security, and maintenance of big data computing platforms, and delivers successful data-driven infrastructures based on industry best practices, as well as specific customer needs. We have capitalized on this experience to introduce the first Splunk Powered™ appliance designed and built specifically for the Splunk Enterprise platform. The SBOX Appliance dramatically improves Splunk`s performance, provides our customers with a fast time-to-value, and delivers a secure turn-key deployment. The SBOX` converged big data architecture effectively reduces the total cost of ownership of a Splunk deployment and allows customers to focus on operations, not infrastructure management. We are headquartered in San Francisco, California with offices around the world.
SolPass, based in Denver, is the developer of an innovative hardware and software identity verification solution that is designed to build a chain of trust from the individual user to the server. Using biometrics, SolPass assures that only authorized users of the system are given access. SolPass implements a rights management system that prevents further unauthorized access. By focusing on the prevention of cyber crime and data breaches, SolPass has introduced a new perspective on cyber security.
Mikrotik is a Eden Prairie, MN-based company in the Computers and Electronics sector.
lllusive continuously discovers and automatically remediates privileged identity risks that are exploited in all ransomware and other cyberattacks. Despite best-practice investments to protect identities, including deployment of PAM and MFA, 1 in 6 enterprise endpoints holds exploitable identity risks. Illusive makes it easy for security teams to get visibility into the vulnerable identities sprawled across an organization`s endpoints and servers, then eliminate them or deploy deception-based detection techniques as a compensating control to stop attackers. Illusive has participated in over 140 red team exercises and has never lost one! Founded by nation state attackers, Illusive`s technology is trusted by large global financial companies, retailers, services organizations, and pharmaceutical companies.