Products

The Consulting Practice re-sells and integrates technology solutions based on demand from our clientele.

 
 

Actifio

ACTIFIO was created to efficiently handle the COPY DATA explosion.  Organizations need to store information, and often this information is duplicated when it simply does not have to be done!  The ACTIFIO product set is designed to drastically reduce the amount of spending on storage technology, and significantly reduce IT administration costs as a result.   Complexity is also reduced allowing you to manage single silo's of information instead of a heterogeneous distributed environment - and restoring data is a snap and can be done in seconds.  Disaster Recovery can also be done quickly and efficiently and becomes part of your everyday capability, instead of an annual fire-drill!

 

AppNeta

Get deep visibility into where application performance problems are occurring and why? AppNeta enables organizations to quickly identify performance bottlenecks and issues. Identify whether it is the application, network or end-user causing the degradation and take action - no finger-pointing or head-scratching! Monitor performance on a regular basis, before bottlenecks arise.

 
asteriondb.png
 
 
 
 
 
 
 
 


asteriondb

AsterionDB Software's modules supercharge databases so that they can provide powerful solutions for enterprise content management (ECM), content delivery and more.

AsterionDB's patented DBstreamer enables its users to stream multimedia, PDFs, and other forms of contents directly to a browser from a database. AsterionDB Vault enables its users to access their content stored in a database through search, lists, and file based applications. Using databases as a core repository for both logic and data eliminates a number of security vulnerabilities - most notably, the tradition hierarchical file syste

 


checkmarx

The industry’s most comprehensive software security platform that unifies with DevOps and provides static and interactive application security testing, software composition analysis and application security training and skills development to reduce and remediate risk from software vulnerabilities.




CodeDX

Code Dx, Inc. was founded on the principle that application vulnerability management should be an integral part of the software development process, and it can only happen if it is convenient and logical. CodeDX’ goal is to help developers and security professionals make their software as secure as possible, using an integrated collection of open-source and commercial tools.

Application security techniques are neither better nor worse than one another, but are actually mutually beneficial, and should be used together. Most application security vulnerabilities won’t be found by any one tool, and every technique for finding them has its advantages and disadvantages.



Contrast security

Every business is a software business. Yet software remains the leading source of data breaches. The stakes are too costly to leave it
unprotected and the old methods just don't work anymore.

Contrast Security makes software self-protecting so it can defend itself from vulnerabilities & attacks.
Contrast eliminates risk to software applications and their data.




CRYPTSHARE

Today, companies are confronted with an ever-increasing volume of electronic communication. Messages and files containing sensitive information need to be exchanged securely and conveniently around the globe.

Consumer platforms and apps, mostly financed through collection of data and advertising, steadily grow and extend their reach.

Meanwhile, organisations see themselves confronted with multiple challenges and threats: Criminals, competitors, and foreign governments want to get hold of their sensitive data.


Inedo

Inedo was founded in 2003 by a team of veteran developers who recognized a need in the software community. There were simply no avenues for managing custom software in an efficient and cost effective fashion. Creating a portfolio of custom software is a major, necessary investment for a business of any size. Managing that portfolio is its own expense, including updating and upgrading software in unwieldy and costly releases. Still, this is a necessary investment, in order to get the full value of the software. The team at Inedo set out to change that.

Initially a custom software development company, Inedo was intimately familiar with these hazards and uniquely qualified to present a solution. That solution is BuildMaster, a software tool specifically designed to answer the problems of managing your application portfolio. BuildMaster allows the consumer to easily customize an automated deployment process that transforms your release from a risk-filled and costly frustration to a fluid and dynamic system that can be applied to your entire portfolio and allows you to realize your software's full value.

 
 
 
 
 
 
 
 

Netwrix

Netwrix Corporation's core competency is in change auditing of critical systems across the entire IT infrastructure. With the broadest platform coverage available in the industry, innovative technology and strategic roadmap aiming to support different platforms, devices and applications.

Change auditing is the essential process of maintaining every organization's security, governance and compliance requirements. Organizations need to keep track of changes to their IT environments and regularly assess current system configuration to detect security violations, troubleshoot issues, prevent downtimes and maintain continuous compliance with security standards and industry regulations. Netwrix meets these needs with simple, efficient and affordable solutions that do not require invasive deployments or extensive maintenance efforts, that impact critical IT infrastructure and are expensive in terms of both time and money.

Netwrix solution provides change and "state-in-time" auditing for critical platforms and applications, including Active Directory, Group Policy, Exchange, file servers, storage appliances (e.g. EMC and NetApp), VMware, Windows Server, SQL Server, SharePoint, and others and help to adhere to increasing security and compliance demands.

Spycloud

Spycloud quickly recovers the most current breached data directly from the criminal underground and make that data truly actionable through our unique data cleansing and password decryption process, resulting in the most plain-text passwords in the industry. This data is highly relevant to your business, with more matches than any other company can provide, and is immediately useful on day one.

 

Stereologic

StereoLOGIC's solution replaces the expensive manual approach to understanding and improvement of business processes with an automated discovery of accurate and up to date processes in real time.  StereoLOGIC enables companies to visualize and compare processes executed by employees, measure them, identify best practices and generate the end-to-end business process documentation.  The fact-based approach to business process improvement and control introduced by StereoLOGIC allows companies to significantly reduce the risk and cost of business operations.

 

Trustwave

Founded in 2001, Application Security, Inc. (AppSecInc), now Trustwave has pioneered database security, risk, and compliance solutions for the enterprise. AppSecInc empowers organizations to assess, monitor and protect their most critical database assets in real time, while simplifying audits, monitoring risk, and automating compliance requirements.

As the leading provider of cross platform solutions for the enterprise, AppSecInc's products – AppDetectivePro for auditors and IT advisors, and DbProtect for the enterprise – deliver the industry's most comprehensive database security solution. With over 1,300 active customers in 130 countries, AppSecInc is headquartered in New York City and has offices throughout North America and the United Kingdom.

 

Turbonomic

Applications are increasingly complex and dynamic: customers can access them any time, anywhere; developers can update them every hour of every day. Resource congestion can happen at any layer of the application stack.

Turbonomic manages the complete application stack by automatically providing specific actions that ensure your applications always get the resources they need to perform.

 
 
 
 

Waratek

Most organizations have apps running on platforms that are no longer supported such as Java, Apache Tomcat and WebLogic. In fact, many companies have built their business on these critical enterprise applications. But determining what to do with these legacy apps is no easy task.

The Waratek ARMR Security Management Platform can modernize your applications by virtually upgrading their platform, making application security available based on your timeframe – not the platform vendor.

Wedge Networks

WEDGE NETWORKS provides organizations with the most comprehensive network security solution today.  Protect against inbound and outbound malware using the WEDGE NETWORKS real-time scanning engine.  DEEP CONTENT INSPECTION allows for content security analysis that supersedes any deep packet technology in place today.  This solution provides organizations, including wireless carriers the ability to protect against spam, malware, and other threats before they occur.