Search
Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs Cisco Partner Summit Digital 2020 Lenovo Tech World Newsroom Dell Technologies World Digital Experience 2020 HPE Zone Masergy Zenith Partner Program Newsroom Intel Partner Connect Digital Newsroom Dell Technologies Newsroom Fortinet Secure Network Hub IBM Newsroom Juniper Newsroom The IoT Integrator Lenovo Channel-First NetApp Data Fabric Intel Tech Provider Zone

The 2019 Tech Innovator Awards

The ability to empower solution providers with truly differentiated offerings is the crowning achievement of our Tech Innovator winners and finalists for 2019.

Back 1 ... 31   32   33   34   35   ... 40 Next
photo

Security—SIEM/Security Analytics

Winner: 

Exabeam SaaS Cloud

As the hosted cloud version of the Exabeam Security Management Platform, Exabeam SaaS Cloud provides a comprehensive offering for attack detection, investigation and response as a cloud-based service. Key benefits include reduced deployment time and operational overhead, with capabilities ranging from automatic software upgrades and capacity management to 24/7 health monitoring. Meanwhile, prebuilt integrations allow for easy data ingestion from cloud services, and the platform provides for behavioral analysis from cloud or on-premise data sources, as well. Exabeam SaaS Cloud ultimately frees up security analysts from managing infrastructure to focus on more-sophisticated work such as threat hunting.

Finalists:

Jask ASOC Platform

The JaskASOC platform, a cloud-based SIEM, pulls together data sources such as network traffic metadata to offer enhanced context during incident analysis. The platform automates numerous repetitive tasks,and is powered by Jask technologies that deploy machine learning to mimic the SOC analyst.

Cymatic UEBA Platform

Cymatic's UEBA (user and entity behavior analytics) platform protects web applications by preventing threats from reaching beyond the browser. The platform works by autonomously verifying the security standing of a user in real time, allowing security risks to be identified and threats to be mitigated.

 
 
Back 1 ... 31   32   33   34   35   ... 40 Next

sponsored resources