Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Cisco Partner Summit Digital 2020 Lenovo Tech World Newsroom HPE Zone The Business Continuity Center Masergy Zenith Partner Program Newsroom Dell Technologies Newsroom Fortinet Secure Network Hub Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom The IoT Integrator Lenovo Channel-First NetApp Data Fabric Intel Tech Provider Zone

The 2017 Tech Innovator Awards

The ability to translate a future-facing view of technology into reality today is the crowning achievement of this year's Tech Innovator winners. Here's who has provided that spark this year.

Back 1 ... 51   52   53   54   55   ... 62 Next




Illusive Core Solution

In situations where cyberattackers are successful at penetrating an organization's defenses, the Illusive Core Solution can intervene to prevent further damage with deception technology. Illusive's deceptions lure attackers to activate fake objects inside the system, then collect data that can be used to determine the most effective actions to take in response.

IntSights Threat Intelligence

IntSights' advanced threat intelligence platform brings together threats from across the Iiternet, then uses machine learning and artificial intelligence to deliver both tailored and generic threat intelligence to enterprise security analysts. This approach vastly improves the consumption of threat intelligence for businesses, according to the company.

RiskLens Cyber Risk Quantification Suite

With the Cyber Risk Quantification Suite, RiskLens offers a cyber risk analytics platform with capabilities spanning environment modeling, risk scenario development, simulations, and generation of risk analytics reports. The platform brings together features including risk scoping, data input and calibration, and a quantitative analysis engine.

ThreatQuotient ThreatQ 3.1

ThreatQuotient's ThreatQ 3.1 platform aims to serve as a highly relevant source of threat intelligence, thanks to features such as The Threat Library (which automatically prioritizes threat data); The Adaptive Workbench (which enables analysts to erich data); and The Open Exchange (which can export the platform's data to third-party tools).

Back 1 ... 51   52   53   54   55   ... 62 Next

sponsored resources