Suppliers.

Add Supplier

Our supplier database tracks 3,358 solution providers in the global enterprise technology ecosystem.
Filters allow you to explore suppliers quickly and efficiently.

Filters
  • (64)
    • (22)
    • (21)
    • (19)
    • (19)
    • (16)
    • (14)
    • (13)
    • (10)
    • (8)
    • (6)
    • View all
  • (39)
    • (21)
    • (15)
    • (10)
    • (9)
    • (5)
    • (2)
    • View all
  • (39)
    • (23)
    • (10)
    • (10)
    • (8)
    • (5)
    • (4)
    • (4)
    • (4)
    • (3)
    • (3)
    • (2)
    • (2)
    • (2)
    • (1)
    • View all
  • (31)
    • (13)
    • (12)
    • (9)
    • (8)
    • (6)
    • (6)
    • (5)
    • (4)
    • (3)
    • (3)
    • View all
  • (31)
    • (12)
    • (11)
    • (8)
    • (7)
    • (5)
    • (3)
    • (1)
    • View all
  • View all 15 Technologies
  • (36)
  • (26)
  • (23)
  • (21)
  • (20)
  • (18)
  • (17)
  • (16)
  • (13)
  • (13)
  • (12)
  • (11)
  • (10)
  • (10)
  • (9)
  • (9)
  • (9)
  • (8)
  • (8)
  • (6)
  • (6)
  • (6)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 37 Industries
  • (22)
  • (14)
  • (12)
  • (11)
  • (9)
  • (9)
  • (6)
  • (5)
  • (5)
  • (4)
  • (4)
  • (2)
  • View all 12 Functional Areas
  • (39)
  • (12)
  • (11)
  • (7)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 53 Use Cases
  • (103)
  • (33)
  • (28)
  • (20)
  • (15)
  • (7)
  • (7)
  • (6)
  • View all 8 Services
  • (52)
  • (9)
  • (7)
  • (6)
  • (6)
  • (4)
  • (4)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 16 HQ Countries
  • (32)
  • (23)
  • (18)
  • (17)
  • (12)
  • View all 5 Revenue
Selected Filters
103 suppliers
Sort by:
Tech Mahindra Logo
Tech Mahindra
Tech Mahindra is an Indian multinational provider of information technology, networking technology solutions and business process outsourcing to the telecommunications industry. It is a specialist in Digital Transformation, consulting and business re-engineering solutions.
Compare
Download PDF
Akamai Technologies Logo
Akamai Technologies
At Akamai, our mission is to make digital experiences fast, intelligent and secure. Our intelligent edge platform surrounds everything, from the enterprise to the cloud. It keeps apps and experiences closer to users — and attacks and threats far away. Top brands globally rely on Akamai as their competitive edge. We help them win in the market through agile solutions that extend the power of their multi-cloud world. Our portfolio of edge security, web and mobile performance, enterprise access and video-delivery solutions is supported by unmatched customer service, analytics, and 24/7/365 monitoring. At Akamai, we see a world of unimagined potential, all enabled through the unique power of the Akamai Edge. It’s this power that creates the agility our customers need to accelerate and secure their multi-cloud world — and own their digital future.
Compare
Download PDF
Belden Logo
Belden
Belden Incorporated is an American manufacturer of networking, connectivity, and cable products. The company designs, manufactures, and markets signal transmission products for demanding applications. These products serve the industrial automation, enterprise, security, transportation, infrastructure, and residential markets. Belden is one of the largest U.S.-based manufacturers of high-speed electronic cables primarily used in industrial, enterprise, and broadcast markets. Year founded: 1902 NYSE:BDC
Compare
Download PDF
ESCRYPT (Bosch) Logo
ESCRYPT (Bosch)
ESCRYPT - Embedded Security is the leading system provider for embedded security world-wide. ESCRYPT offers protection for all kinds of embedded applications, corresponding infrastructure and organizational aspects. ESCRYPT provides its customers with solutions for all issues in IT-Security from one source. With its extensive experience in embedded security, ESCRYPT consists of unique and comprehensive expertise in many different branches. ESCRYPT provides a complete range of security products, consulting services and solutions tailored for specific industries. ESCRYPT services include Security Assessment, Security Strategy & Architecture, Customized Software, Customized Hardware, Certification Support, PKI & Key Management, Application & Code Testing and Training & Awareness. Featured Products: - CycurHSM - CycurKEYS - CycurLIB - CycurTLS
Compare
Download PDF
Fortinet Logo
Fortinet
Fortinet makes possible a digital world that we can always trust through its mission to protect people, devices, and data everywhere. This is why the enterprises, service providers, and government organizations choose Fortinet to securely accelerate their digital journey.
Compare
Download PDF
Hirschmann (Belden) Logo
Hirschmann (Belden)
Hirschmann is the technology and market leader in industrial networking. The Hirschmann portfolio manages virtually every communication connection requirement of your networking infrastructure. Since pioneering the development of Ethernet as a common standard for industry networks. The company has continued to innovate, finding new ways to keep your operation running smoothly. With expertise earned by experience, Hirschmann products deliver high transmission speeds and unmatched reliability in even the harshest industrial settings.
Compare
Download PDF
Imperva Logo
Imperva
Imperva is a cybersecurity leader with a mission to protect data and all paths to it. We protect the data of over 6,000 global customers from cyber attacks through all stages of their Digital Transformation. Our products are informed by the Imperva Research Lab, a global threat intelligence community, that feeds the latest security and compliance expertise into our solutions.
Compare
Download PDF
Raytheon Technologies Logo
Raytheon Technologies
Raytheon Technologies (NYSE: RTX) is an aerospace and defense company that provides advanced systems and services for commercial, military and government customers worldwide. The company was formed in 2020 through the combination of Raytheon Company and the United Technologies Corporation aerospace businesses, and is headquartered in Waltham, Massachusetts.
Compare
Download PDF
Entrust Logo
Entrust
Entrust Corp., formerly Entrust Datacard,[2] provides financial institutions, national governments, corporate enterprises and other organizations with technologies to establish trusted identities and conduct highly secure transactions.
Compare
Download PDF
FireEye Logo
FireEye
FireEye is an intelligence-led security company that protects customers with innovative technology and expertise from the front lines.
Compare
Download PDF
Infoblox Logo
Infoblox
Infoblox helps customers control their networks. Our solutions help businesses automate complex network control functions to reduce costs, increase security and maximize uptime.Our technology enables automatic discovery, real-time configuration and change management and compliance for network infrastructure, as well as critical network control functions such as DNS, DHCP and IP Address Management (IPAM) for applications and Endpoint devices. Leveraging our patented Grid™ technology, Infoblox delivers higher availability, and an authoritative network database for real-time and historical reporting. As the market leader in Automated Network Control, Infoblox provides services and solutions to over 6,700 enterprises and service providers in more than 25 countries. Our integrated hardware and software solutions help businesses control data flow on their networks by making them more automated, more available and more secure; giving customers the ability to see what's connected to the network, configure and change what's there, and prevent Malware from spreading across the enterprise.
Compare
Download PDF
Juniper Networks Logo
Juniper Networks
Juniper Networks is leading the revolution in networking, making it one of the most exciting technology companies in Silicon Valley today. Since being founded by Pradeep Sindhu, Dennis Ferguson, and Bjorn Liencres nearly 20 years ago, Juniper’s sole mission has been to create innovative products and solutions that meet the growing demands of the connected world.
Compare
Download PDF
Keyfactor Logo
Keyfactor
Founded in 2001, Keyfactor empowers enterprises of all sizes to escape the exposure epidemic – when breaches, outages and failed audits from digital certificates and keys impact brand loyalty and the bottom line. Powered by an award-winning PKI as-a-service platform for certificate lifecycle automation and IoT device security, IT and infosec teams can easily manage digital certificates and keys. And product teams can build IoT devices with crypto-agility and at massive scale.
Compare
Download PDF
Palo Alto Networks Logo
Palo Alto Networks
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. The mission is to be the cybersecurity partner of choice, protecting the digital way of life. They help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in Artificial Intelligence, analytics, automation, and Orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, they are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Their vision is a world where each day is safer and more secure than the one before.
Compare
Download PDF
PixelPlex Logo
PixelPlex
PixelPlex is a seasoned IoT development company distributing enhanced business workflow in a data-intensive IoT environment.Founded in 2007, PixelPlex has delivered multiple projects in industrial IoT, personal security & wellness, smart IoT in retail & supply chains, IoT for connected home appliances and more.Our experienced IoT developers are ready to fulfill smart solutions for your business today using strong expertise in diverse IoT technology stack.
Compare
Download PDF
Rapid7 Logo
Rapid7
Organizations around the globe rely on Rapid7 technology, services, and research to securely advance. The visibility, analytics, and automation delivered through our Insight cloud simplifies the complex and helps security teams reduce vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate routine tasks.
Compare
Download PDF
Softeq Logo
Softeq
Softeq Development Corporation was founded in 1997 in Houston, TX, as a full-stack software development services provider. Over the years, we shifted our focus from mobile and web application development to niche solutions — particularly, Machine Learning, immersive technologies and software and hardware for the Internet of Things.
Compare
Download PDF
TÜV Informationstechnik GmbH Logo
TÜV Informationstechnik GmbH
TÜV Informationstechnik (TÜViT) is 100 percent about IT security. It is part of our DNA, and has been since 1995. At TÜViT, IT security is not a trend and it is not hype: it is embedded in virtually everything we do and all of our 120 employees have signed up for. Our experience and skills are totally dedicated to security in information technology. Over 50 per cent of the DAX 30 and many international companies already benefit from TÜViT-tested security.Independence... is our credo. The TÜViT experts are not subject to any conflicting goals, as they have no obligations towards product suppliers, system integrators, shareholders, interest groups or government agencies.In addition, numerous accreditations as well as certificates of national and international organisations prove our independenceTÜViT continues to develop the best available technology in numerous research projects and (standardization) committees.What applies to cars, machines, plants or buildings is also offered by TÜViT as part of the TÜV NORD GROUP for your IT: for hardware, application systems, infrastructure, products, processes or software. The TÜV seal and the certificates indicate to your clients that they can rely on the products and services. And if you have to comply with certain standards and procedures for evaluation authorities, TÜViT shows you how you can best achieve this. TÜViT identifies risks well before they cause any harm, and joins you in guiding your business to success – you can rely on it.At the same time, we protect your most valuable asset, which is becoming more important all the time in the course of digitization: your data. New digital business ideas are based on data: With TÜViT, you have a reliable and experienced partner, which supports you not only with all your data, information and IT security issues, but also with Data Privacy.
Compare
Download PDF
Claroty Logo
Claroty
Claroty is a cybersecurity software company focused on protecting industrial control networks (ICS - A.K.A OT or Operational Technology)Claroty's mission is to protect industrial control networks from cyber-attacks; ensuring safe and continuous operation of the world most critical infrastructures. C
Compare
Download PDF
CrowdStrike Logo
CrowdStrike
CrowdStrike is a cybersecurity technology firm pioneering next-generation Endpoint protection, delivered as a single integrated cloud-based solution. CrowdStrike Falcon platform stops breaches by detecting all attacks types, even malware-free intrusions, providing five-second visibility across all current and past Endpoint activity while reducing cost and complexity for customers. CrowdStrike Falcon platform is delivered via the security industry only 100% native cloud architecture, integrated with 24/7 managed hunting capabilities and in-house threat intelligence and incident response teams. CrowdStrike unique Threat Graph harnesses the cloud to instantly analyze data from billions of Endpoint events across a global crowdsourcing community, allowing detection and prevention of attacks based on patented behavioral pattern recognition technology.
Compare
Download PDF
CyberArk Logo
CyberArk
CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads, and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. For over a decade CyberArk has led the market in securing enterprises against cyber attacks that take cover behind insider privileges and attack critical enterprise assets. Today, only CyberArk is delivering a new category of targeted security solutions that help leaders stop reacting to cyber threats and get ahead of them, preventing attack escalation before irreparable business harm is done. At a time when auditors and regulators are recognizing that privileged accounts are the fast track for cyber attacks and demanding stronger protection, CyberArk’s security solutions master high-stakes compliance and audit requirements while arming businesses to protect what matters most. With offices and authorized partners worldwide, CyberArk is a vital security partner to more than 6,770 global businesses, including More than 50% of the Fortune 500 More than 35% of the Global 2000 CyberArk has offices in the U.S, Israel, U.K., Singapore, Australia, France, Germany, Italy, Japan, Netherlands, and Turkey.
Compare
Download PDF
GrammaTech Logo
GrammaTech
GrammaTech enables organizations to develop software applications more efficiently, on-budget, and on-schedule by helping to eliminate harmful defects that can cause system failures, enable data breaches, and ultimately increase corporate liabilities in today’s connected world.GrammaTech is the developer of CodeSonar, the most powerful source and binary code analysis solution available today. Extraordinarily precise, CodeSonar finds, on average, 2 times more serious defects in software than other static analysis solutions. Designed for organizations with zero tolerance for defects and vulnerabilities in their applications, CodeSonar provides static analysis for applications where reliability and security are paramount - widely used by software developers in avionics, medical, automotive, industrial control, and other mission-critical applications. Some of GrammaTech's customers include Toyota, GE, Hyundai, Kawasaki, LG, Lockheed Martin, NASA, Northrop Grumman, Panasonic, and Samsung.Originally a spin-off of Cornell University, GrammaTech was co-founded by Thomas Reps and Tim Teitelbaum in Ithaca, NY. In addition to its commercial products, GrammaTech has performed cutting-edge research since it was founded for several government agencies, leveraging GrammaTech's engineering-centric staff and 20 PhD static analysis experts, all focused on creating the most innovative and in-depth analysis algorithms.
Compare
Download PDF
Mocana Logo
Mocana
Mocana securely mobilizes enterprise data and protects millions of the smart connected devices that comprise the Internet of Things. The company’s award-winning enterprise mobile app security platform provides organizations with an easy way to deliver business-critical mobile apps, with a high-quality end user experience, tap-and-go simplicity and strong security for internal and external users. Mocana's customers include Fortune 500 enterprises, government agencies and the world’s leading smart device manufacturers.
Compare
Download PDF
Sophos Logo
Sophos
Sophos develops Network Security and threat management products to protect organizations against malicious acts.
Compare
Download PDF
Telstra Logo
Telstra
Telstra is Australia’s leading telecommunications and information services company, offering a full range of communications services and competing in all telecommunications markets. In Australia, Telstra provides 17.2 million mobile services, 7.0 million fixed voice services and 3.4 million retail fixed broadband services. As Australia’s leading telecommunications and information services company, Telstra is proud to be helping their customers improve the ways in which they live and work through connection.
Compare
Download PDF
Wipro Logo
Wipro
Wipro Ltd is a global information technology, consulting and outsourcing company with 170,000+ workforce serving clients in 175+ cities across 6 continents. The company posted revenues of $7.7 Billion for the financial year ended Mar 31, 2016.
Compare
Download PDF
Applied Risk  Logo
Applied Risk
Applied Risk is focussed on critical infrastructure security and combating security breaches that pose a significant threat.
Compare
Download PDF
Argus Cyber Security Logo
Argus Cyber Security
As modern vehicles become more sophisticated, the more vulnerable they are to cyber attacks. Argus works with the automotive industry to address the challenges posed by vehicle connectivity by providing comprehensive cyber security solutions and services to OEMs, Tier 1s, aftermarket solution providers and fleet managers.
Compare
Download PDF
Autosys Industrial Solutions Private Limited Logo
Autosys Industrial Solutions Private Limited
Industrial data analytics and decision science by comprehensive monitoring and management of an industrial shop floor.Autosys Industrial Solutions Pvt. Ltd. was incorporated on February 17th, 2016. A company with expertise on industrial automation and industrial data management. Our solution improves the efficiency, productivity and overall equipment effecitveness while minimizing the cost and environmental impact. Our technologies are used by clients in plants and facilities around the world, giving them a competitive edge by accelerating their processes, improving accuracy, saving time, cutting waste and boosting their safety and sustainability performanceDiscovering an industrial revolution with endless possibilities.
Compare
Download PDF
Bitfidence Logo
Bitfidence
We are a global team of professionals helping our partners to build secure, scalable and cost effective Industrial Internet of Things. We are passionate about software, Network Security and solving business problems by leveraging many years of our R&D expertise. We make extensive use of Linux, Open Source Software and commercial off-the-shelf hardware to make OT networks better secured and accelerate innovation cycles without compromising reliability, which is so important for control networks.
Compare
Download PDF

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that Asia Growth Partners may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from Asia Growth Partners.
Submit

Thank you for your message!
We will contact you soon.