www.gartner.com Open in urlscan Pro
13.32.27.51  Public Scan

Submitted URL: https://cs3yz04.na1.hubspotlinks.com/Ctc/RF+113/cs3YZ04/VX21-g4LW4FDW70kM2G46P4HlW9fbdmV4ZX63nN8LB07w3lScGV1-WJV7CgHj2W6-ZjmZ70MWsrN1...
Effective URL: https://www.gartner.com/en/conferences/apac/security-risk-management-australia/exhibitors/directory?utm_medium=email&_hs...
Submission: On April 28 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

 * Gartner.com
 * Gartner Conferences

 * Log In
 * Conference Navigator

 * Conference Navigator
   
 * Log In

Gartner Security & Risk Management Summit

28 – 29 March 2023 | Sydney, Australia
Pricing & Registration
 * Pricing & Registration
 * Log In
   
 * Home
   
 * Agenda
   
 * Speakers
   
 * Exhibitors
   
 * Venue
   
 * Conference Navigator
   
 * Pricing & Registration
   
 * Gartner.com
 * Gartner Conferences
   

Gartner Security & Risk Management Summit

28 – 29 March 2023 | Sydney, Australia


Exhibitor Directory


EXPLORE THE SHOWCASE OF LEADING TECHNOLOGY AND SERVICE PROVIDERS.

In a tech-driven world, access is everything — and Gartner Security & Risk
Management Summit gives it to you. Gain access to vendors at the forefront of
technology. Don’t miss out on this unique opportunity to meet your peers,
evaluate solution providers and explore what they can do for you. Our
world-class conferences help you make smarter, faster decisions and deliver on
your organization’s mission critical priorities.


PREMIER

AXONIUS

https://www.axonius.com/gartner

Axonius gives customers the confidence to control complexity by mitigating
threats, navigating risk, automating response actions, and informing
business-level strategy. With solutions for both cyber asset attack surface
management (CAASM) and SaaS management, Axonius is deployed in minutes and
integrates with hundreds of data sources to provide a comprehensive asset
inventory, uncover gaps, and automatically validate and enforce policies. For
more, visit Axonius.com.

CISCO

https://www.cisco.com/go/secure

Cisco Secure is built on the principle of better security, not more. It delivers
a streamlined, customercentric approach to security that ensures it’s easy to
deploy, manage, and use — and it all works together. We help 100 percent of the
Fortune 100 companies secure work — wherever it happens — with the broadest,
most integrated platform. Learn more about how we simplify experiences,
accelerate success, and protect futures at cisco.com/go/secure.

DARKTRACE

https://www.darktrace.com/en/

Darktrace, a global leader in cyber security artificial intelligence, delivers
complete AI-powered solutions in its mission to free the world of cyber
disruption. Breakthrough innovations from its Cyber AI Research Centre have
resulted in over 115 patent applications filed and significant research
published to contribute to the cyber security community. Darktrace is delivering
the first ever Cyber AI Loop, fueling a continuous end-to-end security
capability that can autonomously prevent, detect, and respond to novel,
in-progress threats in real time.

GIGAMON

https://www.gigamon.com/

Gigamon is the leading deep observability company, empowering more than 4,000
enterprise and service provider customers to realise the full transformational
promise of the cloud. Gigamon offers a deep observability pipeline that
harnesses actionable network-level intelligence to amplify the power of
observability tools. This powerful combination enables IT organisations to
assure security and compliance governance, speed root-cause analysis of
performance bottlenecks and lower operational overhead associated with managing
hybrid and multi-cloud IT infrastructures. learn more at www.gigamon.com

LOGRHYTHM

http://www.logrhythm.com

LogRhythm helps busy and lean security operations teams save the day—day after
day. With a potent combination of its comprehensive security operations
platform, technology partnerships, and advisory services, LogRhythm empowers
security teams to navigate a changing threat landscape with confidence.
Together, LogRhythm and our customers are ready to defend. Learn more at
logrhythm.com.

OKTA

https://www.okta.com/au/

Okta is the leading independent identity provider. The Okta Identity Cloud
enables organisations to securely connect the right people to the right
technologies at the right time. With more than 6,500 pre-built integrations to
applications and infrastructure providers, Okta provides simple and secure
access to people and organisations everywhere, giving them the confidence to
reach their full potential. More than 9,400 organisations, including Comcare,
UTS, Baker's Delight, REA Group, Xero and AIA, trust Okta to help protect the
identities of their workforces and customers.

PROOFPOINT

https://www.proofpoint.com/au

Proofpoint is a leading cybersecurity company that protects organisations’
greatest assets and biggest risks: their people. With an integrated suite of
cloud-based solutions, we help companies around the world stop targeted threats,
safeguard their data, and make their users more resilient against cyber attacks.
Leading organisations of all sizes, including more than half of the Fortune
1000, rely on us for people-centric security and compliance solutions that
mitigate their most critical risks across email, the cloud, social media, and
the web.

SERVICENOW

https://www.servicenow.com/au/

ServiceNow makes the world work better for everyone. Our cloud-based platform
and solutions help digitize and unify organizations so that they can find
smarter, faster, better ways to make work flow. So employees and customers can
be more connected, more innovative, and more agile. And we can all create the
future we imagine. The world works with ServiceNow™. For more information, visit
www.servicenow.com.

SNYK

https://snyk.io/

Snyk is a developer-first security company that helps software-driven businesses
develop fast and build secure applications. Only Snyk provides a platform to
secure all of the critical components of today’s application development. With
tight integration into existing developer workflows, source control (including
Bitbucket, GitLab, Github), and CI/CD pipelines, Snyk enables efficient security
workflows and reduces mean-time-to-fix. Snyk is securing industry leaders such
as Google, Salesforce, and BBC. For more information or to get started with Snyk
for free, visit https://snyk.io.

SYGNIA CONSULTING LTD

https://www.sygnia.co

Sygnia is a cyber consulting and incident response company, providing
high-impact services to organizations worldwide. Sygnia’s elite team of
cybersecurity experts partners with organizations to proactively build their
cyber resilience and defeat attacks within their networks. Sygnia offers a range
of services designed to accelerate each step of an organization’s journey to
greater cyber resilience. It is the trusted advisor and service provider of
technology and security teams, management and boards of leading organizations
worldwide, including Fortune 100 companies.


PLATINUM

BEYONDTRUST

https://www.beyondtrust.com/

BeyondTrust is the worldwide leader in intelligent identity and access security,
empowering organisations to protect identities, stop threats, and deliver
dynamic access to empower and secure a work-from-anywhere world. Our integrated
products and platform offer the industry's most advanced privileged access
management (PAM) solution, enabling organisations to quickly shrink their attack
surface across traditional, cloud and hybrid environments. We are trusted by
20,000 customers, including 75 of the Fortune 100, and a global partner network.
Learn more at www.beyondtrust.com.

BIGID

https://bigid.com/

BigID redefines data privacy and protection: helping organizations know their
data for privacy, protection and perspective. BigID uses advanced machine
learning and data intelligence to help enterprises better manage and protect
their customer & sensitive data, meet data privacy and protection regulations,
and leverage unmatched coverage for all data across all data stores.

CLOUDFLARE

https://www.cloudflare.com/

Cloudflare is the leading performance and security company helping to build a
better Internet. Today the company runs one of the world’s largest networks that
powers more than 14 million Internet properties. More than 10 trillion Internet
requests flow through Cloudflare’s network each month.

CROWDSTRIKE

https://www.crowdstrike.com

CrowdStrike® Inc. (Nasdaq: CRWD), a global cybersecurity leader, is redefining
security for the cloud era with an endpoint protection platform built from the
ground up to stop breaches. The CrowdStrike Falcon® platform’s single
lightweight-agent architecture leverages cloud-scale artificial intelligence,
offering real-time protection & visibility across the enterprise, preventing
attacks on endpoints on or off the network. Powered by proprietary CrowdStrike
Threat Graph®, CrowdStrike Falcon correlates over 2.5 trillion endpoint-related
events per week in real time from across the globe.

CYBERARK SOFTWARE

https://www.cyberark.com/

CyberArk (NASDAQ: CYBR) is the global leader in Identity Security. Centered on
Privileged Access Management, CyberArk provides the most comprehensive security
solutions for any identity – human or machine – across business applications,
distributed workforces, hybrid cloud workloads, and throughout DevOps pipelines.
The world’s leading organizations trust CyberArk to help secure their most
critical assets. To learn more about CyberArk, visit www.cyberark.com.

DELINEA

https://www.delinea.com

Delinea is a leading provider of privileged access management (PAM) solutions
that make security seamless for the modern, hybrid enterprise. Our solutions
empower organizations to secure critical data, devices, code, and cloud
infrastructure to help reduce risk, ensure compliance, and simplify security.
Delinea removes complexity and defines the boundaries of access for thousands of
customers worldwide, including over half of the Fortune 100. Our customers range
from small businesses to the world's largest financial institutions,
intelligence agencies, and critical infrastructure companies.

FORTINET

https://www.fortinet.com/

Fortinet secures the largest enterprise, service provider, and government
organizations around the world. Fortinet empowers its customers with
intelligent, seamless protection across the expanding attack surface and the
power to take on ever-increasing performance requirements of the borderless
network—today and into the future. Only the Fortinet Security Fabric
architecture can deliver security without compromise to address the most
critical security challenges, whether in networked, application, cloud, or
mobile environments.

IBM

https://www.ibm.com/au-en/security

IBM Security works with you to help protect your business with an advanced and
integrated portfolio of enterprise security products and services, infused with
AI and a modern approach to your security strategy using zero trust
principles—helping you thrive in the face of uncertainty. By aligning your
security strategy to your business; integrating solutions designed to protect
your digital users, assets, and data; and deploying technology to manage your
defenses against growing threats, we help you to manage and govern risk that
supports today’s hybrid cloud environments.

NETSKOPE

https://www.netskope.com/

Netskope, a global cybersecurity leader, is redefining cloud, data, and network
security to help organisations apply zero trust principles to protect data. Fast
and easy to use, the Netskope platform provides optimised access and zero trust
security for people, devices, and data anywhere they go. Netskope helps
customers reduce risk, accelerate performance, and get unrivalled visibility
into any cloud, web, and private application activity. Learn how Netskope helps
customers be ready for anything on their SASE journey, visit netskope.com.

RECORDED FUTURE

http://www.recordedfuture.com/

Recorded Future is the world’s largest intelligence company. Its Intelligence
Cloud provides complete coverage across adversaries, infrastructure, and
targets. Combining persistent and pervasive automated data collection and
analytics with human analysis, Recorded Future provides visibility into the
digital landscape, empowering countries and organizations to take proactive
action to disrupt adversaries.

SENTINELONE

https://www.sentinelone.com/

SentinelOne is a pioneer in delivering autonomous security for the endpoint,
datacentre and cloud environments to help organisations secure their assets with
speed and simplicity. SentinelOne unifies prevention, detection, response,
remediation and forensics in a single platform powered by artificial
intelligence. Organisations can detect malicious behaviour across multiple
vectors, rapidly eliminate threats with fully-automated integrated response and
to adapt their defenses against the most advanced cyberattacks.

SPLUNK

https://www.splunk.com

Splunk helps make organizations more resilient. Leading organizations use our
unified security and observability platform to keep their digital systems secure
and reliable. Organizations trust Splunk to prevent security, infrastructure,
and application issues from becoming major incidents, absorb shocks from digital
disruptions and accelerate transformation. Splunk helps SecOps, ITOps and DevOps
teams deliver these outcomes with comprehensive visibility, rapid detection and
investigation, and optimized response, all at the scale necessary for the
world's largest digitized organizations

TRELLIX

https://trellix.com.

Trellix is redefining the future of cybersecurity with its open and native
extended detection and response (XDR) platform, helping organizations to gain
confidence in the protection and resilience of their operations. Trellix and its
partner ecosystem, accelerates innovation through machine learning and
automation, empowering over 40,000 customers with living security. Visit
trellix.com to learn more.

ZSCALER

https://www.zscaler.com/

Zscaler accelerates digital transformation so that customers can be more agile,
efficient, resilient, and secure. The Zscaler Zero Trust Exchange protects
thousands of customers from cyberattacks and data loss by securely connecting
users, devices, and applications in any location. Distributed across more than
150 data centres globally, the SSE-based Zero Trust Exchange is the world’s
largest inline cloud security platform. Learn more at zscaler.com


SILVER

ABNORMAL SECURITY

https://abnormalsecurity.com/

Abnormal Security provides the leading cloud-native email security platform that
leverages behavioral data science to stop modern email attacks. Unlike legacy
email security solutions, the Abnormal Security platform uses an innovative
AI-based approach that deeply understands the people, relationships and business
processes to stop the most sophisticated cyber-attacks.

AIRTRACK SOFTWARE

https://airtrack.io

How can you you protect everything when you don't really know what you have to
protect? No defence tooling, or threat protection works when not targeted at the
entire IT landscape. AirTrack helps you to definitively understand every IT
asset requiring protection, understand gaps and anomalies across your security
landscape, and provide actionable and quantifiable pathways to repair and
remediate protection problems. Gartner calls this CAASM (Cyber Asset Attack
Surface Management) and highlights AirTrack -as one of the most important
solutions addressing this essential requirement.

APPOMNI

https://appomni.com/

AppOmni is the leading provider of enterprise level SaaS security. Its patented
technology continuously scans APIs, security controls, and configuration
settings to compare the current state of enterprise SaaS deployments against
best practices and business intent. AppOmni was founded by top security
practitioners and is trusted by many of the world's largest enterprises across
technology, healthcare, banking, and security. For more information, please
visit https://appomni.com.

ARCON

https://arconnet.com/

ARCON is a leading Information Technology company specialized in providing Risk
Control (both risk predictive and preventive) solutions. ARCON believes in
ceaseless technological innovations to mitigate the current and emerging IT
security threats that can wreak havoc on organizations of all sizes, from
various industries and from multiple geographies. ARCON’s product portfolio:
ARCON | Privileged Access Management ARCON | Secure Compliance Management ARCON
| User Behavior Analytics ARCON | Endpoint Privilege Management (EPM) ARCON |
Privileged Access Management - SaaS

ARCTIC WOLF NETWORKS

https://arcticwolf.com/

Arctic Wolf® is the market leader in security operations. Using the cloud-native
Arctic Wolf® Platform, we help organisations end cyber risk by providing
security operations as a concierge service. Highly-trained Concierge Security®
experts work as an extension of internal teams to provide 24x7 monitoring,
detection, and response, as well as ongoing risk management to proactively
protect organisations while continually strengthening their security posture.

AZUL

https://www.azul.com/

Azul, provider of the Java platform for the modern cloud enterprise,is the only
company 100% focused on Java. Millions of Java developers, hundreds of millions
of devices,and the world’s most highly regarded businesses trust Azul to power
their applications with exceptional capabilities, performance, security,
value,and success. Azul’s customers include 27% of the Fortune 100, 50% of
Forbes Top 10 World’s Most Valuable Brands, all 10 of the world’s Top 10
financial trading companies,and leading brands like Avaya, BMW, Credit Suisse,
LG, Mastercard, Mizuho, Priceline, Salesforce, and Workday.

BLUEVOYANT

https://www.bluevoyant.com/

BlueVoyant converges internal and external cyber defense capabilities into an
outcomes-based, cloud-native platform that continuously monitors your network,
endpoints, attack surface, and supply chain as well as the open, deep, and dark
web for vulnerabilities, risks, and threats; and takes action to protect your
business, leveraging both machine learning-driven automation and human-led
expertise. BlueVoyant delivers rock-solid cyber defense capabilities to more
than 700 customers across the globe. Visit www.bluevoyant.com

CLAROTY

https://www.claroty.com/

Claroty empowers organizations to secure cyber-physical systems across
industrial, healthcare, and commercial environments: the Extended Internet of
Things (XIoT). The company’s unified platform integrates with customers’
existing infrastructure to provide a full range of controls for visibility, risk
and vulnerability management, threat detection, and secure remote access. Backed
by the world’s largest investment firms and industrial automation vendors,
Claroty is deployed by hundreds of organizations at thousands of sites globally.

COHESITY

https://www.cohesity.com/

Cohesity radically simplifies data management. We make it easy to protect,
manage, and derive value from data — across the data center, edge and cloud. We
offer a full suite of services consolidated on one multicloud data platform:
backup and recovery, disaster recovery, file and object services, dev/test, and
data compliance, security, and analytics — reducing complexity and eliminating
mass data fragmentation. Cohesity can be delivered as a service, self-managed,
or provided by a Cohesity-powered partner.

DEVO

https://www.devo.com

Devo is the only cloud-native logging and security analytics platform that
releases the full potential of your data to empower bold, confident action. With
an unrivalled scale to collect all of your data without compromise, speed to
give you immediate access and answers, and clarity to focus on the signals that
matter most, Devo is your ally in protecting your organisation today and
tomorrow.

FORGEROCK

https://www.forgerock.com/

ForgeRock®, (NYSE: FORG) is a global leader in digital identity that delivers
modern and comprehensive identity and access management solutions for consumers,
employees, and things to simply and safely access the connected world. Using
ForgeRock, more than 1,300 global customer organisations orchestrate, manage,
and secure the complete lifecycle of identities from dynamic access controls,
governance, APIs, and storing authoritative data – consumable in any cloud or
hybrid environment.

HCL SOFTWARE

https://www.hcltechsw.com/

HCL Software, a division of HCL Technologies, develops, markets, sells, and
supports 30 plus software product families in the areas of Enterprise Security,
Digital Transformation, Data, Analytics & Insights, AI & Automation platforms.
HCL Software is the cloud-native solution factory for enterprise software and
powers millions of applications at more than 20,000 organizations, including
more than half of the Fortune 1000 and Global 2000 companies. HCL Software's
mission is to drive ultimate customer success with its IT investments through
relentless product innovation.

ILLUMIO

https://www.illumio.com/

Illumio, the Zero Trust Segmentation company, stops breaches from spreading
across the hybrid attack surface. The Illumio ZTS Platform visualizes how
workloads and devices are communicating, creates granular segmentation policies
which only allow necessary communication, and automatically isolates ransomware
and breaches. Assume breach. Minimize impact. Increase resilience.

IMPERVA

https://www.imperva.com

Imperva is the comprehensive digital security leader on a mission to help
organizations protect their data and all paths to it. With an integrated
approach combining edge, application security, and data security, customers
around the world trust Imperva to protect their applications, data, and websites
from cyber attacks. Imperva Threat Research and our global intelligence
community keep Imperva ahead of the threat landscape and integrate the latest
security, privacy, and compliance expertise into our solutions.

MANAGEENGINE

https://www.manageengine.com

ManageEngine is the enterprise IT management division of Zoho Corporation.
Established and emerging enterprises – including 9 of every 10 Fortune 100
organizations - rely on our real-time IT management tools to ensure optimal
performance of their IT infrastructure, including networks, servers,
applications, desktops and more. We have offices worldwide, including the United
States, the Netherlands, India, Singapore, Japan, China, and Australia as well
as a network of 200+ global partners to help organizations tightly align their
businesses and IT. Website: www.manageengine.com

MENLO

https://www.menlosecurity.com/

Menlo Security enables organisations to outsmart threats, completely eliminating
attacks and fully protecting productivity with a one-of-a-kind,
isolation-powered cloud security platform. It’s the only solution to deliver on
the promise of cloud security, with the most secure Zero Trust approach to
preventing malicious attacks—making security invisible to end users and removing
the operational burden for security teams.

MIMECAST

http://www.mimecast.com

Mimecast was born in 2003 with a focus on delivering relentless protection. Each
day, we take on cyber disruption for our customers around the globe; always
putting them first. Our intentional and scalable design ideology solves the
number one cyberattack vector – email, and thoughtfully integrates other
essential capabilities such as brand protection, security awareness training,
web security, compliance and others. We continuously invest to protect large and
small organisations from malicious activity, human error and technology failure;
and to build a more resilient world.

ONE IDENTITY

https://www.oneidentity.com/

One Identity delivers unified identity security solutions that help customers
strengthen their overall cybersecurity posture and protect the people,
applications and data essential to business. Our Unified Identity Security
Platform brings together best-in-class Identity Governance and Administration
(IGA), Identity and Access Management (IAM), Privileged Access Management (PAM)
and Active Directory Management and Security (ADMS) capabilities to enable
organizations to shift from a fragmented to a holistic approach to identity
security.

PALO ALTO NETWORKS

https://www.paloaltonetworks.com

Palo Alto Networks is the world’s cybersecurity leader. We innovate to outpace
cyberthreats, so organizations can embrace technology with confidence. Our
best-in-class cybersecurity platforms and services are backed by
industry-leading threat intelligence and strengthened by state-of-the-art
automation. Whether deploying our products to enable the Zero Trust Enterprise,
responding to a security incident, or partnering to deliver beer security
outcomes through a world-class partner ecosystem, we’re committed to helping
ensure each day is safer than the one before.

PENTERA SECURITY

https://www.pentera.io/

Pentera is the category leader for Automated Security Validation, allowing every
organization to test with ease the integrity of all cybersecurity layers,
unfolding true, current security exposures at any moment, at any scale.
Thousands of security professionals and service providers around the world use
Pentera to guide remediation and close security gaps before they are exploited.
For more info visit: pentera.io.

PHRIENDLY PHISHING

https://www.phriendlyphishing.com/

Phriendly Phishing educates and empowers organisations and its people to build a
cyber resilient culture through long-lasting behavioural change. Phriendly
Phishing is a Cyber CX company providing security awareness and phishing
simulation learning solutions that coach employees how to identify and respond
to common, costly security threats. Our solution offers: - Automated system &
local support team to save you time - Easily track employee performance &
reporting - Localised & engaging learning that is relevant to Aussie audiences -
Mitigates against huge financial and reputational risk

PING IDENTITY

https://www.pingidentity.com/en.html

At Ping Identity, we believe in making digital experiences both secure and
seamless for all users, without compromise. That’s digital freedom. We let
enterprises combine our best-in-class identity solutions with third-party
services they already use to remove passwords, prevent fraud, support Zero
Trust, or anything in between. This can be accomplished through a simple
drag-and-drop canvas. That’s why more than half of the Fortune 100 choose Ping
Identity to protect digital interactions from their users while making
experiences frictionless. Learn more at www.pingidentity.com.

PROTEGRITY

https://www.protegrity.com/

Protegrity is the only enterprise data security software platform that leverages
scalable, data-centric encryption, tokenization and masking to secure sensitive
information while maintaining data usability. Protegrity helps companies manage
risk, achieve compliance, and enable business analytics.

QUALYS

http://www.qualys.com

Qualys, Inc. is a pioneer and leading provider of disruptive cloud-based
security, compliance and IT solutions with more than 10,000 subscription
customers worldwide, including a majority of the Forbes Global 100 and Fortune
100. Founded in 1999 Qualys has strategic partnerships and seamlessly integrates
its vulnerability management capabilities into security offerings from cloud
service providers, including Amazon Web Services, the Google Cloud Platform and
Microsoft Azure, along with a number of leading managed service providers and
global consulting organizations.

RAPID 7

http://www.rapid7.com

Rapid7 simplifies cybersecurity. With powerful automation and integrated threat
intelligence from our industry-leading researchers and SOC analysts, our Insight
Platform gives security teams the visibility they need to secure their
environment no matter the size or complexity. Don’t just protect your business,
drive it forward.

RUBRIK

http://www.rubrik.com

Rubrik, the Zero Trust Data Security CompanyTM, delivers data security and
operational resilience for enterprises. Rubrik’s big idea is to provide data
security and data protection on a single platform, including Zero Trust Data
Protection, Ransomware Investigation, Incident Containment, Sensitive Data
Discovery, and Orchestrated Application Recovery. This means data is ready at
all times so you can recover the data you need, and avoid paying a ransom.
Because when you secure your data, you secure your applications, and you secure
your business. Visit www.rubrik.com to find out more

SANS INSTITUTE

https://www.sans.org/

SANS Institute is the world’s leading provider of cybersecurity training. For
more than twenty-five years, SANS has provided cutting edge training to
governments and organizations across the world. Technology may have changed in
that time, but our core mission has remained constant: to protect through
sharing cybersecurity knowledge and skills. SANS offers more than 70
cybersecurity courses, has more than 147,000 learners across 200+ countries and
15 million employees protecting their organization with SANS Security Awareness
Training.

SAVIYNT

https://saviynt.com/

Saviynt’s Enterprise Identity Cloud helps modern enterprises scale cloud
initiatives and solve the toughest security and compliance challenges in record
time. The company brings together identity governance (IGA), granular
application access, cloud security, and privileged access to secure the entire
business ecosystem and provide a frictionless user experience. For more
information, please visit saviynt.com.  

SECUREWORKS

https://www.secureworks.com/

Secureworks is 100% focused on cybersecurity. In fact, it’s all we do. For
nearly two decades, we’ve committed to fighting the adversaries in all their
forms and ensuring that organisations like yours are protected. Secureworks
Taegis™ XDR Solution improves your ability to detect advanced threats,
collaborate on investigations, and automate the right actions. With more than
4,000 customers globally, 20+ years of elite threat intelligence, and more than
300 expert security researchers, Secureworks has unmatched experience to ensure
you are Collectively Smarter, Exponentially Safer.

SERVICE QUALITY

http://www.servicequality.com.au

Founded in 2007, Service Quality survives on a simple but powerful idea: empower
you to do more with your Service Management and Security solutions. With
cutting-edge support and award-winning security and service management
practices, you can be sure that Service Quality will help maximise your
investment with Ivanti's suite of solutions. Today, hundreds of thousands of
users across our 200 customers rely daily on Service Management and Security
solutions designed and implemented by Service Quality to make their work flow.

SILVERFORT

https://www.silverfort.com/

Silverfort pioneers the first Unified Identity Protection platform that enables
enterprises to implement Zero Trust security in the identity control plane for
proactive detection and prevention of attacks that employ compromised
credentials to access targeted resources. Utilizing agentless and proxyless
technology, Silverfort natively integrates with all the Identity Providers in
the protected environment to deliver continuous monitoring, risk analysis and
MFA or access block enforcement across every access attempt, made by any human
or machine user to all on-prem and cloud resources.

SKYHIGH SECURITY

http://www.skyhighsecurity.com

At its heart, security is a data protection problem. Skyhigh Security protects
organizations with cloud-native security solutions that are both data-aware and
simple to use. Its market-leading Security Service Edge (SSE) Portfolio goes
beyond data access and focuses on data use, allowing organizations to
collaborate from any device and from anywhere without sacrificing security. For
more information, visit www.skyhighsecurity.com.

SOPHOS

https://www.sophos.com

Sophos evolves to meet every new challenge, protecting more than 400,000
organizations of all sizes in more than 150 countries from today’s most advanced
cyber threats. Powered by SophosLabs, our cloud-native and AI-enhanced solutions
are able to adapt and evolve to secure endpoints and networks against
never-before-seen cybercriminal tactics and techniques. Managed through our
award-winning, cloud-based platform, Sophos Central, our best-of-breed products
work together through our unique Synchronized Security system to share threat
intelligence and respond to evolving threats.

SWIMLANE

https://www.swimlane.com

Swimlane is the leader in cloud-scale, low-code security automation. Swimlane
unifies security operations in-and-beyond the SOC into a single system of record
that helps overcome process and data fatigue, chronic staffing shortages, and
quantifying business value. The Swimlane Turbine platform combines human and
machine data into actionable intelligence for security leaders.

SYMANTEC, A DIVISION OF BROADCOM

https://www.broadcom.com/products/cyber-security

Symantec, a Division of Broadcom, is uniquely qualified to address complex
cybersecurity challenges, from blocking unauthorized access, to assuring
compliance, and stopping the newest cyberattacks. We support every platform,
from mobile devices to data center servers. We support every deployment model
for our products, from on-premises, cloud, and multi-cloud. Most importantly, we
ensure your organization’s critical data and applications stay safe and secure
no matter where they live. From endpoints, to networks, to e-mail, to the cloud,
Symantec makes the world a safer place.

TANIUM INC.

https://www.tanium.com/

Tanium gives organizations the power to secure & manage endpoints across the
enterprise within seconds no matter where the device exists; in the cloud, on
premise, anywhere. Tanium provides complete and accurate information on
endpoints to defend against threats & improve operational efficiency.

TENABLE

https://www.tenable.com/products/tenable-one

More than two decades ago, we pioneered the IT vulnerability management market
as the creator of Nessus®. Organisations around the world rely on Tenable to
help them understand and reduce cybersecurity risk across their attack
surface—in the cloud or on-premises, from IT to OT and beyond. Now Tenable One,
the world's first Exposure Management Platform, arms your security teams with
the visibility to see your entire attack surface at all times. Tenable arms your
C-suite and board with insight to focus on issues that matter most to your
organisation so you can make better strategic decisions.

TESSERENT

https://www.tesserent.com/

Tesserent is Australia’s #1 ASX-listed cybersecurity provider. With over 400
cybersecurity professionals and with offices across Australia and NZ, we partner
with over 1,200 mid-sized to enterprise, government and critical infrastructure
clients, to deliver comprehensive, tailored solutions to prevent, detect and
mitigate potential cyber-attacks. We have deep expertise in security advisory
(GRC) & consulting, technical assurance & testing, cloud services, 24x7 managed
services & monitoring, critical controls, incident response and
converged/physical security. We start by listening.

TREND MICRO

https://www.trendmicro.com/

Trend Micro, a global cybersecurity leader, helps make the world safe for
exchanging digital information. Fueled by decades of security expertise, global
threat research, and continuous innovation, our unified cybersecurity platform
protects hundreds of thousands of organisations and millions of individuals
across clouds, networks, devices, and endpoints With 7,000 employees across 65
countries, and the world’s most advanced global threat research and
intelligence, Trend Micro enables organisations to simplify and secure their
connected world. TrendMicro.com

VENAFI

https://www.venafi.com/

Venafi is the cybersecurity market leader of machine identity management,
securing machine-to-machine connections and communications. Venafi protects
machine identity types by orchestrating cryptographic keys and digital
certificates for SSL/TLS, code signing, mobile and SSH. Venafi provides global
visibility of machine identities and their associated risks for the extended
enterprise—on premises, mobile, virtual, cloud and IoT. Venafi delivers
innovative solutions for the world's most demanding, security-conscious Global
5000 organizations and government agencies

WATCHGUARD TECHNOLOGIES INC

https://www.watchguard.com/

WatchGuard® Technologies, Inc. is a global leader in network security, endpoint
security, secure Wi-Fi, multi-factor authentication, and network intelligence.
The company’s award-winning products and services are trusted around the world
by over 18,000 security resellers and service providers to protect 250,000
customers. WatchGuard’s mission is to make enterprise-grade security accessible
to companies of all types and sizes through simplicity, making WatchGuard an
ideal solution for midmarket businesses and distributed enterprises.

WIZ

https://www.wiz.io

Wiz is on a mission to help every organization rapidly identify and remove
critical risks in their cloud environments. Purpose-built for the cloud, Wiz
delivers full stack visibility, accurate risk prioritization, and enhanced
business agility. Wiz connects in minutes to scan the full cloud environment
without agents. We perform a deep assessment that goes beyond point solutions
and find the toxic combination of flaws that represent real risk. Security and
cloud teams then proactively remove risk and harden cloud environments with
remediation workflows. For more information, visit www.wiz.io.

ZIMPERIUM

https://www.zimperium.com

As the only mobile security platform purpose-built for enterprise environments,
Zimperium provides security solutions for mobile devices and applications,
ensuring safe and secure access to critical data. Our patented, on-device,
machine learning-based security provides visibility and protection against known
threats and zero-day attacks, and our mobile application protection suite
combines comprehensive in-app protection with centralized threat visibility.


GET THE INSIGHTS AND SOLUTIONS YOU NEED

Register

 * Gartner Conferences
 * Contact Conferences
 * Exhibit
 * Contact Gartner

 * IT Glossary
 * Privacy
 * Policies
 * Terms of Use

 * Site Index
 * Careers
 * Gartner.com
 * Frequently Asked Questions

 * Pricing & Registration
 * Sitemap

 * Gartner Conferences
 * Contact Conferences
 * Exhibit
 * Contact Gartner
 * IT Glossary
 * Privacy
 * Policies

 * Terms of Use
 * Site Index
 * Careers
 * Gartner.com
 * Frequently Asked Questions
 * Pricing & Registration
 * Sitemap



©2023 Gartner, Inc. and/or its affiliates. All rights reserved.


YOUR PRIVACY IS IMPORTANT TO US


By clicking “Accept all,” you agree to the storing of cookies on your device to
enhance site navigation, analyze site usage and assist in our marketing efforts.
To learn more, visit our Privacy Policy and Cookie Notice.

Customize Accept all



PRIVACY PREFERENCE CENTER


By clicking “Accept all,” you agree to the storing of cookies on your device to
enhance site navigation, analyze site usage and assist in our marketing efforts.
To learn more, visit our Privacy Policy and Cookie Notice.
Accept all


SELECT COOKIES

STRICTLY NECESSARY COOKIES

Always Active


These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

View Vendor Details‎

TARGETING COOKIES

Targeting Cookies


These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

View Vendor Details‎

FUNCTIONAL COOKIES

Functional Cookies


These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

View Vendor Details‎

PERFORMANCE COOKIES

Performance Cookies


These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

View Vendor Details‎
Back Button


PERFORMANCE COOKIES



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

 * 
   
   View Cookies
   
    * Name
      cookie name

Select and proceed