Suppliers.

Add Supplier

Our supplier database tracks 3,367 solution providers in the global enterprise technology ecosystem.
Filters allow you to explore suppliers quickly and efficiently.

Filters
  • (40)
    • (40)
    • (18)
    • (13)
    • (12)
    • (12)
    • (10)
    • (8)
    • (6)
    • (3)
    • (2)
    • View all
  • (15)
    • (9)
    • (6)
    • (5)
    • (4)
    • (4)
    • (4)
    • (4)
    • (2)
    • (2)
    • (1)
    • View all
  • (14)
    • (11)
    • (5)
    • (4)
    • (2)
    • (2)
    • (2)
    • (1)
    • (1)
    • (1)
    • (1)
    • (1)
    • View all
  • (13)
    • (7)
    • (6)
    • (4)
    • (1)
    • (1)
    • (1)
    • View all
  • (13)
    • (10)
    • (4)
    • (4)
    • (2)
    • (2)
    • (1)
    • View all
  • View all 12 Technologies
  • (22)
  • (17)
  • (11)
  • (10)
  • (9)
  • (8)
  • (7)
  • (7)
  • (7)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 31 Industries
  • (11)
  • (8)
  • (7)
  • (5)
  • (5)
  • (4)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 13 Functional Areas
  • (20)
  • (9)
  • (5)
  • (4)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 27 Use Cases
  • (19)
  • (13)
  • (9)
  • (8)
  • (7)
  • (6)
  • (1)
  • View all 7 Services
  • (24)
  • (3)
  • (3)
  • (3)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 10 HQ Countries
  • (9)
  • (9)
  • (8)
  • (7)
  • (6)
  • View all 5 Revenue
Selected Filters
40 suppliers
Sort by:
WIBU-SYSTEMS Logo
WIBU-SYSTEMS
WIBU-SYSTEMS AG, a privately held company founded by Oliver Winzenried and Marcellus Buchheit in 1989, is an innovative security technology leader in the global software licensing market. In its mission to offer the most secure, unique, and highly versatile technology, Wibu-Systems has developed CodeMeter, a comprehensive, award-winning suite of hardware and software-based solutions for computers, embedded systems, mobile devices, PLCs, and microcontrollers that incorporates internationally patented processes dedicated to protecting the integrity of digital assets. Through its motto “Perfection in Protection, Licensing and Security”, Wibu-Systems safeguards the intellectual property of software publishers and Intelligent Device manufacturers against illicit and fraudulent use, reverse engineering and tampering attacks, sabotage and espionage actions, while generating new digital business models fully integrated with ERP, CRM, and e-commerce platforms.
Compare
Download PDF
Dell Technologies Logo
Dell Technologies
Dell Technologies is Dell, Dell EMC, Pivotal, RSA, SecureWorks, Virtustream, and VMware. We’re a collective force of innovative capabilities trusted all over the world to provide technology solutions and services that accelerate Digital Transformation.
Compare
Download PDF
Exar (Maxlinear) Logo
Exar (Maxlinear)
Exar Corporation designs, develops and markets high performance, analog mixed-signal integrated circuits and advanced sub-system solutions for the Networking & Storage, Industrial & Embedded Systems, and Communications Infrastructure markets. Exar's product portfolio includes power management and connectivity components, communications products, and Network Security and storage optimization solutions.
Compare
Download PDF
Micron Technology Logo
Micron Technology
Micron offers the industry’s broadest portfolio of silicon-to-semiconductor solutions―starting with foundational DRAM, NAND, and NOR Flash memory, and extending to SSDs, modules, MCPs, HMCs, and other semiconductor systems. This technology powers leading-edge computing, consumer, enterprise server and storage, networking, embedded, automotive, industrial, and mobile products.
Compare
Download PDF
Splunk Logo
Splunk
Splunk turns Machine Data into answers. Regardless of your organization’s size and industry, Splunk can give you the answers you need to solve your toughest IT, security, and business challenges—with the option to deploy On-Premises, in the cloud, or via a hybrid approach.
Compare
Download PDF
Informatica Logo
Informatica
Informatica helps you make data ready for use in any way possible, so you can put truly great data at the center of everything you do. Working with a robust ecosystem of more than 400 global partners—including the leading systems integrators, resellers, and ISVs—Informatica enables you to access, integrate, and Trust your information assets and receive maximum value from your investment.
Compare
Download PDF
Cognizant Logo
Cognizant
Cognizant is a provider of information technology, consulting and business process services. Its customers are primarily corporations from the Forbes Global 2000, and it targets customers in the financial services, health care, manufacturing, retail, and logistics sectors. Year founded: 1988 Revenue: $14.8 billion (2017) NASDAQ:CTSH
Compare
Download PDF
Hitachi Vantara (Hitachi) Logo
Hitachi Vantara (Hitachi)
Hitachi Vantara, a wholly owned subsidiary of Hitachi, Ltd., helps data-driven leaders find and use the value in their data to innovate intelligently and reach outcomes that matter for business and society. They combine technology, intellectual property and industry knowledge to deliver data-managing solutions that help enterprises improve their customers' experiences, develop new revenue streams, and lower business costs. Only Hitachi Vantara elevates your innovation advantage by combining deep information technology (IT), operational technology (OT) and domain expertise. They work with organizations everywhere to drive data to meaningful outcomes.
Compare
Download PDF
Telefonica Logo
Telefonica
Telefónica is a company that is aware of the new challenges posed by today’s society. This is why we offer the means to facilitate communication between people, providing them with the most secure and state of the art technology in order for them to live better, and for them to achieve whatever they resolve. An innovative and attentive spirit with an immense technological potential that multiplies the ability to choose of its more than 327 million clients in 21 countries. Telefónica is a 100% listed company with more than one and a half million shareholders, traded in several of the most important stock markets around the world.
Compare
Download PDF
AT&T Logo
AT&T
AT&T is the second largest provider of mobile telephone and the largest provider of fixed telephone in the United States, and also provides broadband subscription television services. The company's corporate, government, and public sector clients use its conferencing, managed network, and wholesale communications services.
Compare
Download PDF
Atos Logo
Atos
Atos provides services such as facilities management, e-commerce consulting, systems design, implementation, and integration, and managed services. It also offers data and transaction processing services, website hosting, and outsourced services for such functions as customer relationship management and enterprise resource planning.Year founded: 1988Revenue: $17.0 billion (2014)NYSE: ATOS
Compare
Download PDF
HCL Technologies Logo
HCL Technologies
HCL Technologies Limited is a multinational IT services company, headquartered in Noida, Uttar Pradesh, India. It is a subsidiary of HCL Enterprise. Originally the research and development division of HCL Limited, it emerged as an independent company in 1991 when HCL Limited ventured into the software services business. HCL Technologies offers services including IT consulting, enterprise transformation, remote infrastructure management, engineering and R&D, and business process outsourcing.
Compare
Download PDF
RSA (DELL) (Dell Technologies) Logo
RSA (DELL) (Dell Technologies)
RSA Security LLC, formerly RSA Security, Inc. and doing business as RSA, is an American computer and Network Security company. RSA was named after the initials of its co-founders, Ron Rivest, Adi Shamir and Len Adleman, after whom the RSA public key Cryptography algorithm was also named. Among its products include the RSA BSAFE Cryptography libraries and the SecurID Authentication token. RSA is known for allegedly incorporating backdoors developed by the NSA in its products. It also organizes the annual RSA Conference, an information security conference. Founded as an independent company in 1982, RSA Security, Inc. was acquired by EMC Corporation in 2006 for US$2.1 billion and operates as a division within EMC. RSA is based in Bedford, Massachusetts, with regional headquarters in Bracknell (UK) and Singapore, and numerous international offices. Year founded: 1982 Stock ticker: RSA
Compare
Download PDF
GlobalSign Logo
GlobalSign
GlobalSign is the leading provider of trusted identity and security solutions enabling businesses, large enterprises, cloud service providers and IoT innovators around the world to secure online communications, manage millions of verified digital identities and automate Authentication and Encryption. Its high-scale PKI and identity and access management (IAM) solutions support the billions of services, devices, people and things comprising the Internet of Everything (IoE). The company has offices in the Americas, Europe and Asia.
Compare
Download PDF
Hewlett Packard Enterprise (HPE) Logo
Hewlett Packard Enterprise (HPE)
Hewlett Packard Enterprise or HPE (formerly HP) makes IT environments more efficient, productive and secure, enabling fast, flexible responses to a rapidly changing competitive landscape. They enable organizations to act quickly on ideas by delivering infrastructure that can be easily composed and recomposed to meet shifting demands, so they can lead in today’s marketplace of disruptive innovation. Year founded: 2015 (1939) Revenue: $53.0 billion (2014) NYSE: HPE
Compare
Download PDF
HID Global Logo
HID Global
HID Global is the trusted source for innovative products, services, solutions, and know-how related to the creation, management, and use of secure identities for millions of customers around the world. The company’s served markets include physical and logical access control, including strong Authentication and credential management; card printing and personalization; visitor management systems; highly secure government and citizen ID; and identification RFID technologies used in animal ID and industry and logistics applications.
Compare
Download PDF
Hitachi Logo
Hitachi
Hitachi is a highly diversified company that operates eleven business segments: Information & Telecommunication Systems, Social Infrastructure, High Functional Materials & Components, Financial Services, Power Systems, Electronic Systems & Equipment, Automotive Systems, Railway & Urban Systems, Digital Media & Consumer Products, Construction Machinery and Other Components & Systems.Year founded: 1910Revenue: $94.0 billion (2014)TYO: 6501
Compare
Download PDF
Neo4j Logo
Neo4j
Neo4j is the graph company behind the #1 platform for connected data. The Neo4j graph platform helps organizations make sense of their data by revealing how people, processes and digital systems are interrelated. This connections-first approach powers intelligent applications tackling challenges such as Artificial Intelligence, fraud detection, real-time recommendations and master data. The company boasts the world's largest dedicated investment in native graph technology, has amassed more than ten million downloads, and has a huge developer community deploying graph applications around the globe. More than 250 commercial customers, including global enterprises like Walmart, Comcast, Cisco, eBay and UBS use Neo4j to create a competitive advantage from connections in their data. Neo4j is privately held and funded by Eight Roads Ventures (an investment arm of Fidelity International Limited), Sunstone Capital, Conor Venture Partners, Creandum, Dawn Capital and Greenbridge Investment Partners. Headquartered in San Mateo, Calif., Neo4j has regional offices in Sweden, Germany and the UK. For more information, please visit Neo4j.com and @Neo4j. All trademarks and registered trademarks, including Neo4j? are the property of their respective owners.
Compare
Download PDF
Fortinet Logo
Fortinet
Fortinet makes possible a digital world that we can always trust through its mission to protect people, devices, and data everywhere. This is why the enterprises, service providers, and government organizations choose Fortinet to securely accelerate their digital journey.
Compare
Download PDF
CyberGRX Logo
CyberGRX
CyberGRX provides the most comprehensive third-party cyber risk management platform to cost-effectively identify, assess, mitigate and monitor an enterprise's risk exposure across its entire partner ecosystem. Through automation and advanced analytics, the CyberGRX solution enables enterprises to collaboratively mitigate threats presented from their increasing interdependency on vendors, partners and customers. CyberGRX is based in Denver, CO. For more information, visit www.cybergrx.com or follow @CyberGRX on Twitter.
Compare
Download PDF
Keyfactor Logo
Keyfactor
Founded in 2001, Keyfactor empowers enterprises of all sizes to escape the exposure epidemic – when breaches, outages and failed audits from digital certificates and keys impact brand loyalty and the bottom line. Powered by an award-winning PKI as-a-service platform for certificate lifecycle automation and IoT device security, IT and infosec teams can easily manage digital certificates and keys. And product teams can build IoT devices with crypto-agility and at massive scale.
Compare
Download PDF
Rapid7 Logo
Rapid7
Organizations around the globe rely on Rapid7 technology, services, and research to securely advance. The visibility, analytics, and automation delivered through our Insight cloud simplifies the complex and helps security teams reduce vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate routine tasks.
Compare
Download PDF
CrowdStrike Logo
CrowdStrike
CrowdStrike is a cybersecurity technology firm pioneering next-generation Endpoint protection, delivered as a single integrated cloud-based solution. CrowdStrike Falcon platform stops breaches by detecting all attacks types, even malware-free intrusions, providing five-second visibility across all current and past Endpoint activity while reducing cost and complexity for customers. CrowdStrike Falcon platform is delivered via the security industry only 100% native cloud architecture, integrated with 24/7 managed hunting capabilities and in-house threat intelligence and incident response teams. CrowdStrike unique Threat Graph harnesses the cloud to instantly analyze data from billions of Endpoint events across a global crowdsourcing community, allowing detection and prevention of attacks based on patented behavioral pattern recognition technology.
Compare
Download PDF
CyberArk Logo
CyberArk
CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads, and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. For over a decade CyberArk has led the market in securing enterprises against cyber attacks that take cover behind insider privileges and attack critical enterprise assets. Today, only CyberArk is delivering a new category of targeted security solutions that help leaders stop reacting to cyber threats and get ahead of them, preventing attack escalation before irreparable business harm is done. At a time when auditors and regulators are recognizing that privileged accounts are the fast track for cyber attacks and demanding stronger protection, CyberArk’s security solutions master high-stakes compliance and audit requirements while arming businesses to protect what matters most. With offices and authorized partners worldwide, CyberArk is a vital security partner to more than 6,770 global businesses, including More than 50% of the Fortune 500 More than 35% of the Global 2000 CyberArk has offices in the U.S, Israel, U.K., Singapore, Australia, France, Germany, Italy, Japan, Netherlands, and Turkey.
Compare
Download PDF
EdgeConneX Logo
EdgeConneX
As the pioneer in defining and building the Edge, EdgeConneX has built and delivered a full spectrum of data center solutions, from Hyperlocal to Hyperscale. We work with our service provider customers to define, build, and deliver carrier-neutral data center capacity that brings the Edge to our customers and our customers to the Edge — where they need it, when they need it, in the configurations they demand, to optimize the global delivery and access to content, cloud, networks, and applications.
Compare
Download PDF
Airtel Logo
Airtel
Bharti Airtel Limited is a leading global telecommunications company with operations in 20 countries across Asia and Africa. Headquartered in New Delhi, India, the company ranks amongst the top 3 mobile service providers globally in terms of subscribers. In India, the company's product offerings include 2G, 3G and 4G wireless services, mobile commerce, fixed line services, high speed DSL broadband, IPTV, DTH, enterprise services including national & international long distance services to carriers. In the rest of the geographies, it offers 2G, 3G and 4G wireless services and mobile commerce. Bharti Airtel had over 356 million customers across its operations at the end of February 2016.
Compare
Download PDF
Bayshore Networks, Inc. Logo
Bayshore Networks, Inc.
Bayshore Networks, Inc. develops cyber security software for the Industrial Internet of Things (IoT). The company's platform protects operational technology (OT) machines, networks, applications, and workers and provides inspection and filtering of network flows, policy building and enforcement, and detection of segment industrial protocols. Its products include Bayshore IT/OT Gateway, Bayshore IC (Industrial Controls), Bayshore SE (Secure Enterprise), Bayshore SingleView, and Bayshore PallatonIt Policy Engine. The company has strategic partnerships with Cisco Systems, BAE Systems, and VMware. Year founded: 2012
Compare
Download PDF
CENTRI Technology Logo
CENTRI Technology
CENTRI provides advanced security for the Internet of Things. Our technology helps organizations secure what matters most – their data – by seamlessly integrating into their existing applications and services in the cloud, data centers, connected devices and products. CENTRI eliminates the risk of data exfiltration and loss of equipment command by establishing trusted devices and advanced Encryption technology while retaining complete visibility to your data. IoT developers and innovators rely on CENTRI to protect the full lifecycle of their data – in transit, at rest and on the Endpoint.
Compare
Download PDF
Chainvine Logo
Chainvine
Next Enterprise-grade secure Blockchain and Distributed Ledger Technology Our platform supports many major Blockchain or Distributed Ledger Technologies such as Hyperledger Fabric, Corda, Hyperledger Sawtooth, Multichain, Ethereum, EOS etc. Intelligent Commodities Products will for the first time be able to record vital data such as time of day, weekends & holidays, time zones, and geographic borders. Operational chains can, for the first time, be truly intuitive, increasing businesses' financial margins. Intelligent Contracts Every point in a company's operation is therefore fully accountable and by utilising ??òIntelligent Contracts' (or ??òSmart Contracts' as they are sometimes known) products will for the first time be able to record vital data such as time of day, weekends & holidays, time zones. Current live projects Identity, Intelligent Commodities & Sustainable Investment platforms backed by Chainvine platform.
Compare
Download PDF
CYFIRMA Logo
CYFIRMA
CYFIRMA, offers market-leading cyberthreat visibility products and services, powered by artificial intelligence (AI) and machine learning, CYFIRMA’s flagship platform delivers comprehensive, real-time insights into emerging cyberthreats, attack motives and methods—customized to a client’s industry and IT environment. CYFIRMA defends against cyberattacks by supplying organizations with real-time threat visibility and situational awareness to enables them to take a more proactive strategic, management and tactical security management actions. By aggregating, correlating and analyzing information from hundreds of thousands of sources on the open and dark web, CYFIRMA helps clients anticipate what types of attacks are most likely to occur and provide the most effective response.
Compare
Download PDF

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that Asia Growth Partners may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from Asia Growth Partners.
Submit

Thank you for your message!
We will contact you soon.