Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs Cisco Partner Summit Digital 2020 Lenovo Tech World Newsroom Dell Technologies World Digital Experience 2020 HPE Zone Masergy Zenith Partner Program Newsroom Intel Partner Connect Digital Newsroom Dell Technologies Newsroom Fortinet Secure Network Hub IBM Newsroom Juniper Newsroom The IoT Integrator Lenovo Channel-First NetApp Data Fabric Intel Tech Provider Zone

The 2019 Tech Innovator Awards

The ability to empower solution providers with truly differentiated offerings is the crowning achievement of our Tech Innovator winners and finalists for 2019.

Back 1 ... 33   34   35   36   37   ... 40 Next

Security —Web And Application


WhiteHat Security Essentials Product Line

WhiteHat Security's Sentinel Essentials product line includes automated, high-speed static application security testing (Sentinel Source EE) along with automated software composition analysis (Sentinel SCA EE), which identifies open-source and third-party components used in applications to deliver a software bill of materials. The Essentials products enable development, build and test teams with security throughout the software development life cycle—with automated security testing that leverages built-in AI and comprehensive code coverage. Rapid detection and remediation can be easily integrated into the software development life cycle with WhiteHat offerings, ultimately providing customers with a faster, more-secure way to get to market.


Aqua Security Aqua Cloud-Native Security Platform

With its cloud-native security platform, Aqua Security offers a mature platform for securing container-based and cloud-native applications through the entire process from development to production. The platform provides organizations with end-to-end visibility along with protection for their applications against attacks.

Contrast Security Contrast OSS

Leveraging automation capabilities, Contrast Security's Contrast OSS offering stands out by continuously identifying open-source components that are vulnerable; determining how the application is using the components; and preventing the exploitation of the vulnerable components at runtime.


With its application security behavior analytics platform, TrueFort provides visibility into behavior such as traffic and communication flows and detects behavior that represents a threat. The platform secures business applications whether they're running in a data center, cloud or hybrid infrastructure.

ZeroNorth Platform

The ZeroNorth Platform provides orchestration of all application scanning, reporting, remediation and retesting—both during software development and production. Platform capabilities include integrating numerous application security tools, centralizing the management of tools and enabling a focused effort on high-risk threats.

Back 1 ... 33   34   35   36   37   ... 40 Next

sponsored resources