|Supplier Slogan||Our mission is to be the cybersecurity partner of choice, protecting our digital way of life.||Bring the IoT to Life.||Empowering Us All.||Practical Application of Mission Critical Technologies.||Relentlessly protecting our customers with innovative technology and expertise from the frontlines of cyber attacks.|
|HQ Location||United States||United States||United States||United States||United States|
|Stock Ticker||NYSE: PANW||NASDAQ: CSCO||NASDAQ: MSFT||NYSE: UIS||NASDAQ: FEYE|
|Revenue||$1-10b||> $10b||> $10b||$1-10b||$100m-1b|
|Employees||1,001 - 10,000||> 50,000||> 50,000||10,001 - 50,000||1,001 - 10,000|
|Website||Open website||Open website||Open website||Open website||Open website|
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. The mission is to be the cybersecurity partner of choice, protecting the digital way of life. They help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in , analytics, automation, and . By delivering an integrated platform and empowering a growing ecosystem of partners, they are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Their vision is a world where each day is safer and more secure than the one before.
Cisco designs and sells broad lines of products, provides services, and delivers integrated solutions to develop and connect networks around the world, building the Internet. Over the last 30 plus years, they have been the world’s leader in connecting people, things, and technologies - to each other and to the Internet - realizing their vision of changing the way the world works, lives, plays, and learns. Today, Cisco has over 70,000 employees in over 400 offices worldwide who design, produce, sell, and deliver integrated products, services, and solutions. Over time, they have expanded to new markets that are a natural extension of their core networking business, as the network has become the platform for automating, orchestrating, integrating, and delivering an ever-increasing array of information technology (IT)–based products and services.
Subsidiaries/ Business Units: - Jasper - OpenDNS - CloudLock
Microsoft develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software products are the Microsoft Windows line of operating systems, Microsoft Office office suite, and Internet Explorer and Edge web browsers. Year Founded: 1975 Revenue: $93.6 billion (2014) NASDAQ: MSFT
Unisys is a global information technology company that works with many of the world's largest companies and government organizations to solve their most pressing IT and business challenges. The company's services unit handles outsourcing, systems integration and consulting, infrastructure services, and core maintenance, while its technology division develops enterprise-class servers and related operating systems and middleware.
FireEye is an intelligence-led security company that protects customers with innovative technology and expertise from the front lines.
End-to-end security solutions, including security operating platform, next-generation firewall, cloud security, protection, threat detection and prevention, and application frameworks.
Globally, countries, cities, industries, and businesses are becoming digital to capitalize on the next wave of the Internet - the (IoE), which we define as the connection of people, processes, data, and things. When people, processes, data, and things are connected, we believe it creates an opportunity to deliver better customer experiences, create new revenue streams and operating models to drive efficiency and produce value. Cisco's goal is to be a strategic partner to our customers by providing the solutions, people, partners, and experience as their customers move from traditional to digital businesses. They believe their customers’ journey to becoming digital businesses requires security, cloud, mobile, social and analytic technologies with a strong foundation of an intelligent network that is agile, simple and that provides real-time business insight. The move to digital is driving many of their customers to adopt entirely new IT architectures and organization structures. In their view, Cisco is delivering the architectural approach and solution-based results to help them reduce complexity, accelerate and grow, and manage risk in a world that is increasingly virtualized application-centric, cloud-based, analytics-driven, and mobile.
The Internet of Things (IoT) does not need to be complicated. It doesn’t have to be about billions or trillions of devices. The Internet of Things is here today, and it’s a practical and applicable technology trend that can generate return on investment (ROI) and drive efficiencies and insights for organizations that know how to use it. The advancements in connectivity, processing power, form factors, operating systems, and applications, among other technology breakthroughs, are key elements to unlocking value from IoT. With the Microsoft Azure Internet of Things Suite, companies can monitor assets to improve efficiencies, drive operational performance to enable innovation, and use advance data analytics to transform the business with new business models and revenue streams. Small changes can have a big impact to companies' bottom line. When a company take advantage of the Microsoft Cloud Platform, they can use the Azure IoT Suit to help them move faster, do more, save money, and capture the benefits of the Internet of Things for their business.
With the growing use of cloud infrastructure services and the advent of fabric-based computing, security professionals will find it increasingly difficult to segregate network traffic using traditional firewall technology. As computing platforms proliferate, data that had previously been split up and partitioned among physical infrastructure will converge in the cloud, making it more difficult for security professionals to isolate and protect their most critical data and systems. Encrypted communities of interest can help address this problem. Unisys work with many of the world's largest companies and government organizations to secure and keep their mission-critical operations running at peak performance; streamline and transform their data centers; enhance support to their end users and constituents; and modernize their enterprise applications. They do this while protecting and building on their legacy IT investments. Unisys's offerings include outsourcing and managed services, systems integration and consulting services, high-end server technology, cybersecurity and cloud management software, and maintenance and support services.
FireEye is the only cyber security company that combines the automation of technology with unparalleled frontline human expertise, including industry-recognized services and nation-state grade threat intelligence. On the front lines of cyber attacks every day, FireEye has unrivaled real-time knowledge of the global threat landscape spanning more than two decades, gathered by hundreds of highly experienced threat researchers, platform engineers, Malware analysts, intelligence analysts, and investigators, as well as a global network of best-in-class business partners.
This unique understanding of how organizations combat cyber attacks guides the products FireEye builds. Working as a seamless, scalable extension of customer security operations, FireEye offers a unified platform called Helix that integrates and analyzes the data from security assets to offer real answers about the threats that matter. With innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant consultants, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, respond to, and remediate cyber attacks.
Dish, HULU, Accenture, Salesforce, and Schlumberger
Barilla Group, Del Papa Distributing, Stanley Black and Decker
KUKA, Rockwell Automation, ThyssenKrupp
Air Canada, Billund Airport, Phicomm, Tratolixo
Amuse, Inc., Bank Gutmann, Luz Technologies, Vodafone
Microsoft_Securing_your_Internet_of_Things_from_the_ground_up_white_paper_2016.pdfMicrosoft_Reimagining-Manufacturing-with-IoT_2016.pdfMicrosoft_get_started_with_the_internet_of_things_2015.pdfMicrosoft_Continuous-Services-Automation-solution-brief_2016.pdfMicrosoft_Cloud_Solutions_And_Platforms_Options_2016.pdfMicrosoft_Azure_Essentials_2015.pdfMicrosoft_Creating the Internet of Your Things_2013.pdf
|Technologies||Cybersecurity & Privacy||Application Infrastructure & MiddlewareCybersecurity & PrivacyInfrastructure as a Service (IaaS)Networks & ConnectivityAnalytics & ModelingAutomation & ControlFunctional ApplicationsPlatform as a Service (PaaS)Sensors||Analytics & ModelingCybersecurity & PrivacyInfrastructure as a Service (IaaS)Application Infrastructure & MiddlewareFunctional ApplicationsNetworks & ConnectivityPlatform as a Service (PaaS)Sensors||Cybersecurity & PrivacyApplication Infrastructure & MiddlewarePlatform as a Service (PaaS)||Cybersecurity & Privacy|
|Industries||EducationElectronicsFinance & InsuranceHealthcare & HospitalsOil & GasRetailSecurity & Public Safety||AutomotiveCities & MunicipalitiesConsumer GoodsEducationElectrical GridsEquipment & MachineryFood & BeverageHealthcare & HospitalsMetalsMiningOil & GasRenewable EnergyRetailTelecommunicationsTransportationUtilities||AutomotiveBuildingsChemicalsCities & MunicipalitiesConstruction & InfrastructureConsumer GoodsElectronicsEquipment & MachineryFinance & InsuranceFood & BeverageHealthcare & HospitalsMetalsMiningOil & GasPharmaceuticalsRenewable EnergyRetailTransportationUtilities|
|Use Cases||Cybersecurity||Advanced Metering Infrastructure (AMI)Building Automation & ControlBuilding Energy ManagementCybersecurityEdge Computing & Edge IntelligenceFactory Operations Visibility & IntelligenceLeakage & Flood MonitoringPerimeter Security & Access ControlPersonnel Tracking & MonitoringPredictive MaintenanceProcess Control & OptimizationReal-Time Location System (RTLS)Remote CollaborationRemote ControlRemote Patient MonitoringSmart City OperationsSupply Chain VisibilityTrack & Trace of AssetsTraffic Monitoring||Advanced Metering Infrastructure (AMI)CybersecurityDigital TwinInventory ManagementMachine Condition MonitoringRemote Asset ManagementRemote Patient MonitoringSmart City OperationsStructural Health MonitoringWater Utility Management||Cybersecurity|
|Functions||Business OperationDiscrete ManufacturingFacility ManagementField ServicesLogistics & TransportationMaintenanceProcess Manufacturing||Business OperationDiscrete ManufacturingFacility ManagementField ServicesLogistics & TransportationMaintenanceProcess ManufacturingSales & MarketingWarehouse & Inventory Management|
|Services||Cybersecurity Services||Software Design & Engineering ServicesCloud Planning, Design & Implementation ServicesSystem IntegrationTraining||Cloud Planning, Design & Implementation Services||Cybersecurity Services|
|Infrastructure as a Service (IaaS)||None||Strong||Strong||None||None|
|Platform as a Service (PaaS)||None||Minor||Strong||Minor||None|
|Application Infrastructure & Middleware||None||Moderate||Strong||Minor||None|
|Analytics & Modeling||None||Moderate||Strong||None||None|
|Cybersecurity & Privacy||Moderate||Strong||Strong||Strong||Moderate|
|Networks & Connectivity||None||Strong||Moderate||None||None|
|Processors & Edge Intelligence||None||None||None||None||None|
|Automation & Control||None||Minor||None||None||None|