Suppliers.

Add Supplier

Our supplier database tracks 3,367 solution providers in the global enterprise technology ecosystem.
Filters allow you to explore suppliers quickly and efficiently.

Filters
  • (51)
    • (22)
    • (21)
    • (20)
    • (17)
    • (15)
    • (14)
    • (11)
    • (11)
    • (11)
    • (6)
    • View all
  • (30)
    • (21)
    • (10)
    • (9)
    • (6)
    • (5)
    • (2)
    • View all
  • (25)
    • (14)
    • (10)
    • (10)
    • (8)
    • (8)
    • (7)
    • (6)
    • (5)
    • (4)
    • (4)
    • View all
  • (25)
    • (15)
    • (10)
    • (9)
    • (8)
    • (8)
    • (4)
    • (4)
    • (4)
    • (4)
    • (4)
    • (4)
    • (3)
    • (1)
    • View all
  • (21)
    • (14)
    • (8)
    • (7)
    • (7)
    • (4)
    • (1)
    • View all
  • View all 12 Technologies
  • (30)
  • (26)
  • (19)
  • (14)
  • (14)
  • (12)
  • (12)
  • (11)
  • (10)
  • (10)
  • (9)
  • (9)
  • (7)
  • (7)
  • (6)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (3)
  • (3)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 34 Industries
  • (21)
  • (11)
  • (10)
  • (9)
  • (8)
  • (8)
  • (8)
  • (5)
  • (4)
  • (4)
  • (3)
  • (2)
  • View all 12 Functional Areas
  • (61)
  • (8)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 45 Use Cases
  • (39)
  • (26)
  • (17)
  • (13)
  • (10)
  • (7)
  • (3)
  • (3)
  • View all 8 Services
  • (42)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (1)
  • (1)
  • (1)
  • View all 9 HQ Countries
  • (17)
  • (15)
  • (13)
  • (9)
  • (7)
  • View all 5 Revenue
Selected Filters
61 suppliers
Sort by:
CyberGRX Logo
CyberGRX
CyberGRX provides the most comprehensive third-party cyber risk management platform to cost-effectively identify, assess, mitigate and monitor an enterprise's risk exposure across its entire partner ecosystem. Through automation and advanced analytics, the CyberGRX solution enables enterprises to collaboratively mitigate threats presented from their increasing interdependency on vendors, partners and customers. CyberGRX is based in Denver, CO. For more information, visit www.cybergrx.com or follow @CyberGRX on Twitter.
Compare
Download PDF
FireEye Logo
FireEye
FireEye is an intelligence-led security company that protects customers with innovative technology and expertise from the front lines.
Compare
Download PDF
Infoblox Logo
Infoblox
Infoblox helps customers control their networks. Our solutions help businesses automate complex network control functions to reduce costs, increase security and maximize uptime.Our technology enables automatic discovery, real-time configuration and change management and compliance for network infrastructure, as well as critical network control functions such as DNS, DHCP and IP Address Management (IPAM) for applications and Endpoint devices. Leveraging our patented Grid™ technology, Infoblox delivers higher availability, and an authoritative network database for real-time and historical reporting. As the market leader in Automated Network Control, Infoblox provides services and solutions to over 6,700 enterprises and service providers in more than 25 countries. Our integrated hardware and software solutions help businesses control data flow on their networks by making them more automated, more available and more secure; giving customers the ability to see what's connected to the network, configure and change what's there, and prevent Malware from spreading across the enterprise.
Compare
Download PDF
Juniper Networks Logo
Juniper Networks
Juniper Networks is leading the revolution in networking, making it one of the most exciting technology companies in Silicon Valley today. Since being founded by Pradeep Sindhu, Dennis Ferguson, and Bjorn Liencres nearly 20 years ago, Juniper’s sole mission has been to create innovative products and solutions that meet the growing demands of the connected world.
Compare
Download PDF
Keyfactor Logo
Keyfactor
Founded in 2001, Keyfactor empowers enterprises of all sizes to escape the exposure epidemic – when breaches, outages and failed audits from digital certificates and keys impact brand loyalty and the bottom line. Powered by an award-winning PKI as-a-service platform for certificate lifecycle automation and IoT device security, IT and infosec teams can easily manage digital certificates and keys. And product teams can build IoT devices with crypto-agility and at massive scale.
Compare
Download PDF
Palo Alto Networks Logo
Palo Alto Networks
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. The mission is to be the cybersecurity partner of choice, protecting the digital way of life. They help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in Artificial Intelligence, analytics, automation, and Orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, they are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Their vision is a world where each day is safer and more secure than the one before.
Compare
Download PDF
PixelPlex Logo
PixelPlex
PixelPlex is a seasoned IoT development company distributing enhanced business workflow in a data-intensive IoT environment.Founded in 2007, PixelPlex has delivered multiple projects in industrial IoT, personal security & wellness, smart IoT in retail & supply chains, IoT for connected home appliances and more.Our experienced IoT developers are ready to fulfill smart solutions for your business today using strong expertise in diverse IoT technology stack.
Compare
Download PDF
Claroty Logo
Claroty
Claroty is a cybersecurity software company focused on protecting industrial control networks (ICS - A.K.A OT or Operational Technology)Claroty's mission is to protect industrial control networks from cyber-attacks; ensuring safe and continuous operation of the world most critical infrastructures. C
Compare
Download PDF
CrowdStrike Logo
CrowdStrike
CrowdStrike is a cybersecurity technology firm pioneering next-generation Endpoint protection, delivered as a single integrated cloud-based solution. CrowdStrike Falcon platform stops breaches by detecting all attacks types, even malware-free intrusions, providing five-second visibility across all current and past Endpoint activity while reducing cost and complexity for customers. CrowdStrike Falcon platform is delivered via the security industry only 100% native cloud architecture, integrated with 24/7 managed hunting capabilities and in-house threat intelligence and incident response teams. CrowdStrike unique Threat Graph harnesses the cloud to instantly analyze data from billions of Endpoint events across a global crowdsourcing community, allowing detection and prevention of attacks based on patented behavioral pattern recognition technology.
Compare
Download PDF
CyberArk Logo
CyberArk
CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads, and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. For over a decade CyberArk has led the market in securing enterprises against cyber attacks that take cover behind insider privileges and attack critical enterprise assets. Today, only CyberArk is delivering a new category of targeted security solutions that help leaders stop reacting to cyber threats and get ahead of them, preventing attack escalation before irreparable business harm is done. At a time when auditors and regulators are recognizing that privileged accounts are the fast track for cyber attacks and demanding stronger protection, CyberArk’s security solutions master high-stakes compliance and audit requirements while arming businesses to protect what matters most. With offices and authorized partners worldwide, CyberArk is a vital security partner to more than 6,770 global businesses, including More than 50% of the Fortune 500 More than 35% of the Global 2000 CyberArk has offices in the U.S, Israel, U.K., Singapore, Australia, France, Germany, Italy, Japan, Netherlands, and Turkey.
Compare
Download PDF
GrammaTech Logo
GrammaTech
GrammaTech enables organizations to develop software applications more efficiently, on-budget, and on-schedule by helping to eliminate harmful defects that can cause system failures, enable data breaches, and ultimately increase corporate liabilities in today’s connected world.GrammaTech is the developer of CodeSonar, the most powerful source and binary code analysis solution available today. Extraordinarily precise, CodeSonar finds, on average, 2 times more serious defects in software than other static analysis solutions. Designed for organizations with zero tolerance for defects and vulnerabilities in their applications, CodeSonar provides static analysis for applications where reliability and security are paramount - widely used by software developers in avionics, medical, automotive, industrial control, and other mission-critical applications. Some of GrammaTech's customers include Toyota, GE, Hyundai, Kawasaki, LG, Lockheed Martin, NASA, Northrop Grumman, Panasonic, and Samsung.Originally a spin-off of Cornell University, GrammaTech was co-founded by Thomas Reps and Tim Teitelbaum in Ithaca, NY. In addition to its commercial products, GrammaTech has performed cutting-edge research since it was founded for several government agencies, leveraging GrammaTech's engineering-centric staff and 20 PhD static analysis experts, all focused on creating the most innovative and in-depth analysis algorithms.
Compare
Download PDF
Heroku Logo
Heroku
Heroku is a cloud application platform – a new way of building and deploying web apps. Their service lets app developers spend their time on their application code, not managing servers, deployment, ongoing operations, or scaling. Heroku was founded in 2007 by Orion Henry, James Lindenbaum, and Adam Wiggins. It was acquired by Salesforce in 2011, and Heroku is now part of the Salesforce App Cloud.
Compare
Download PDF
Sophos Logo
Sophos
Sophos develops Network Security and threat management products to protect organizations against malicious acts.
Compare
Download PDF
Altran Technologies () Logo
Altran Technologies ()
As global leader in innovation and high‐tech engineering consulting, Altran accompanies its clients in the creation and development of their new products and services.Altran has been providing services for around thirty years to key players in the Aerospace, Automotive, Energy, Railway, Finance, Healthcare and Telecoms sectors. Covering every stage of project development from strategic planning through to manufacturing, Altran’s offers capitalise on the Group’s technological know‐how in five key areas: : Intelligent Systems, Innovative Product Development, Lifecycle Experience, Mechanical Engineering, and Information Systems.An international group, Altran operates in over twenty countries throughout Europe, Asia and the Americas. As a strategic partner, Altran offers its clients global project support while guaranteeing a consistent level of service. In order to offer specific support to dedicated local markets, Altran has chosen to keep a local dimension in order to better serve specific dedicated markets.
Compare
Download PDF
Baishan Cloud Logo
Baishan Cloud
Founded in April 2015, BaishanCloud (Baishan) is a leading global cloud data service provider specializing in data life cycle management.
Compare
Download PDF
BugProve Logo
BugProve
BugProve offers a Firmware analysis tool that speeds up security testing processes and supports compliance needs by automating repetitive tasks and detecting 0-day vulnerabilities.
Compare
Download PDF
Check Point Logo
Check Point
Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to governments and corporate enterprises globally. Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry-leading catch rate of Malware, ransomware, and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprises’ cloud, network, and mobile devices. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point provides services to over 100,000 organizations of all sizes.
Compare
Download PDF
CYFIRMA Logo
CYFIRMA
CYFIRMA, offers market-leading cyberthreat visibility products and services, powered by artificial intelligence (AI) and machine learning, CYFIRMA’s flagship platform delivers comprehensive, real-time insights into emerging cyberthreats, attack motives and methods—customized to a client’s industry and IT environment. CYFIRMA defends against cyberattacks by supplying organizations with real-time threat visibility and situational awareness to enables them to take a more proactive strategic, management and tactical security management actions. By aggregating, correlating and analyzing information from hundreds of thousands of sources on the open and dark web, CYFIRMA helps clients anticipate what types of attacks are most likely to occur and provide the most effective response.
Compare
Download PDF
Imperium Logo
Imperium
Imperium is synonymous with Relevant ID / Digital Fingerprinting and has been the standard for stopping fraud and data quality for over 10 years. Over the last few years, Imperium has invested substantially in Machine Learning, NLP, and neural networks to capitalize on its massive data store and domain knowledge to mine behaviors of fraudsters. Imperium has developed a suite of solutions that work real time to stop fraud at its inception with the highest level of precision.
Compare
Download PDF
Karamba Security Logo
Karamba Security
Karamba Security provides industry-leading, award winning, embedded cybersecurity solutions for connected systems. Karamba’s software is designed and implemented to safeguard resource-constrained systems.
Compare
Download PDF
Kinetica Logo
Kinetica
Kinetica helps many of the world’s largest companies solve some of the world’s most complex problems, including Citibank, GSK, OVO, Softbank, and Telkomsel, among others. The Kinetica Streaming Data Warehouse combines historical and streaming data analysis with powerful location intelligence and AI in a single platform, all easily accessible via API and SQL, for instant results. Organizations across automotive, energy, telecommunications, retail, healthcare, financial services, and beyond can load and analyze their entire collection of data simultaneously, delivering instant insight. Kinetica has a rich partner ecosystem, including Dell, HP, IBM, NVIDIA, and Oracle, and is privately held, backed by leading global venture capital firms Canvas Ventures, Citi Ventures, GreatPoint Ventures, and Meritech Capital Partners.
Compare
Download PDF
McAfee Logo
McAfee
McAfee is creating what’s next in online protection. As technologists, creatives, and people who thrive on looking forward, McAfee makes life online safe, so everyone can enjoy it with confidence - in all the ever-shifting forms it will take. Just as life online is full of possibility, life at McAfee is as well. You’ll have the freedom to explore challenges, take smart risks, and reach your potential in one of the fastest-growing industries in the world - backed by a team that supports and inspires you. ​
Compare
Download PDF
MicroSec Logo
MicroSec
Headquartered in Singapore, MicroSec (www.usec.io) is a deep technology cybersecurity company that combines cybersecurity, cryptography, and machine learning for government and industrial organizations to protect their operational technology infrastructure. MicroSec’s focus on enterprise-grade security capabilities for IoT devices along with lifecycle management includes a machine learning-based anomaly detection system that provides intelligent detection of tampering and misuse of devices. With a seamless integration process, MicroSec is revolutionizing cybersecurity for Automotives, Smart City Infrastructures, and Industry 4.0.
Compare
Download PDF
Mphasis Logo
Mphasis
Mphasis’ Service Transformation approach helps ‘shrink the core’ through the application of digital technologies across legacy environments within an enterprise, enabling businesses to stay ahead in a changing world. Mphasis’ core reference architectures and tools, speed and innovation with domain expertise and specialization are key to building strong relationships with marquee clients.
Compare
Download PDF
NanoLock Security Logo
NanoLock Security
NanoLock Security protects the operational integrity of industrial devices, machines and manufacturing lines against cyber events and human errors to maintain business continuity, improve safety and safeguard revenues. NanoLock is the only zero-trust, device-level solution that prevents outsiders as well as insiders and supply chain cyber events and even human errors in legacy and new devices, regardless of attack origin or exploited vulnerability and without affecting functionality and performance.NanoLock fuels Industry 4.0 revolution with a zero-trust protection that is mandatory to critical infrastructures, such as industrial and manufacturing companies as well as utilities. NanoLock secures industrial devices like Smart Meters, RTUs, data cocentrators, EV chargers, industrial machines, PLCs and production lines, against a wide range of external and internal attacks.Trusted by critical infrastructure customers, such as utilities, industrial and manufacturing companies,NanoLock Security protects power generation, water and wastewater plants and food & beverage manufacturing as well as industrial production, while ensuring compliance with international security standards and guidelines.NanoLock Security is the winner of multiple industry awards¸ including the prestigious “2021 Top 10 for Baby Black Unicorns”¸ Tracxn’s “Emerging Startups 2021- minicorn“¸ MWC Barcelona “4YFN Startup of the Year” award and more. the American Cyber Award for “Best Security Company of the Year under 150 staff” and the CyberSecurity breakthrough award for the “Overall IoT Security Solution provider of the Year”.NanoLock is headquartered in Israel with offices in the US, Europe, and Japan.
Compare
Download PDF
Qosmos Logo
Qosmos
Qosmos leads the market for IP traffic classification and network intelligence technology used in physical, SDN and NFV architectures. The company supplies software to vendors who embed real-time application visibility in their products for traffic optimization, service chaining, Quality of Service, analytics, cyber security and more. Qosmos customers benefit from fast time to market and continuous signature updates for their products. As the leading supplier of IP traffic classification and network intelligence software, Qosmos contributes actively to Open Source projects and international standards, and serves 75% of the market.
Compare
Download PDF
RAD Data Communications Logo
RAD Data Communications
RAD is a global Telecom Access solutions and products vendor. A market leader of SDN/NFV network edge virtualization and 5G xHaul solutions for service providers, and secure Industrial IoT for critical infrastructure, RAD is a member of the $1.46 billion RAD Group of companies.
Compare
Download PDF
Sepio Systems Logo
Sepio Systems
Sepio in Latin means watch over and guard. Sepio is a leader in the Rogue Device Mitigation (RDM) market, and the developer of Sepio Prime - a SaaS solution for protecting organizations from hardware based attacks and threats. Sepio Prime provides security teams with full visibility into their hardware assets and their behavior in real time. A comprehensive policy enforcement module allows administrators to easily define granular device usage rules and continuously monitor and protect their infrastructure. Leveraging a combination of physical fingerprinting technology together with device behavior analytics, Sepio's software-only solution offers instant detection and response to any threat or breach attempt coming from a manipulated or infected element.
Compare
Download PDF
SKT Themes Logo
SKT Themes
SKT Themes is one of the best web development and WordPress themes development company. There are many services provided by the company like E-Commerce, web maintenance, online marketing, custom websites, graphic designing, website designing and many more. You can get a wide variety of best themes on the company website. Not only premium themes but you are made available with free themes also. All the themes are loaded with various latest features and functionality. You can opt for free themes or go for premium themes as per your choice. Best support services are also provided.
Compare
Download PDF
Subex Secure Logo
Subex Secure
Subex Secure is today helping businesses globally improve their cyber risk posture. We do this through a robust cybersecurity solution and associated services that address potential cyber risks, detect critical exploits, monitor, identify, and catalog threats in real-time in IoT, OT, and converged environments. Subex operates the world's largest IoT and OT focused honeypot network generating the most relevant and accurate threat intelligence for over 17 verticals.
Compare
Download PDF

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that Asia Growth Partners may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from Asia Growth Partners.
Submit

Thank you for your message!
We will contact you soon.