Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Discover 2019 News Cisco Wi-Fi 6 Newsroom Dell Technologies Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom Lenovo Newsroom Nutanix Newsroom Cisco Live Newsroom HPE Zone Tech Provider Zone

The 2018 Tech Innovator Awards

The ability to help solution providers differentiate themselves and grow their businesses is the crowning achievement of CRN’s Tech Innovator winners and finalists.

Back 1 ... 28   29   30   31   32   ... 37 Next
photo

Security—Web/Application

Winner:

Netskope for Web

A leader in cloud security, Netskope is extending its protection of cloud environments to the web with its unified “one cloud” approach—bringing together cloud and web security into a single architecture. Netskope for Web features capabilities such as advanced threat protection, data loss protection, dynamic web classification, content filtering and real-time web analytics. Meanwhile, Netskope’s CloudXD capability provides an accurate view by identifying activity from actual users. The ability to secure both Infrastructure-as-a-Service and web environments from one security cloud provides major benefits in terms of streamlining security infrastructure, removing the need to juggle multiple disparate products.

Finalists:

Comodo Cybersecurity cWatch Web

Combining a web application firewall with analysis from a fully managed (and 24/7 staffed) Cyber Security Operations Center, Comodo’s Cybersecurity cWatch Web secures websites and applications with services including malware detection, prevention and removal.

Imperva Attack Analytics

By leveraging advanced artificial intelligence and machine-learning technologies, Imperva Attack Analytics takes massive numbers of application security events and distills them into highly readable security narratives—bringing simplicity to security investigations and enabling organizations to respond to threats more quickly.

Nutanix Flow

Nutanix Flow provides application-centric security to protect against internal and external threats that are undetected by traditional perimeter-oriented security products. As enterprises are turning to cloud-based infrastructure for modern business applications, protecting the application requires micro-segmentation capabilities such as those offered by Nutanix Flow.

 
 
Back 1 ... 28   29   30   31   32   ... 37 Next

sponsored resources