IT Solutions

Today, businesses demand global vision, an in-depth understanding of customers and suppliers, demonstrated thought leadership and a consultative partnership approach to offer the highest possible returns on IT investment.

We help businesses achieve these ends. Working closely with our customers as partners, we deliver and implement innovative software and hardware solutions.

We believe that a value-based partnership centered around the internal strengths of an IT organization, our technology experience and expertise, and the innovative solutions from our industry leading technology partners combine to deliver IT solutions that are truly beneficial to organizations.

 

SOPHOS

UTM, next generation endpoint and network protection, MDM, secure WiFi, Encryption, RED, IPS, layer 7 control, Firewall, VPN, URL filter, Antispam, email encryption, DLP, Sandboxing, WAF, Server Hardening, Security synchronization, server lockdown

 

Thycotic

Enterprise password management software for IT Admins and IT Security Pros. Secret Server enables you to store, distribute, change and audit enterprise passwords in a secure environment.

RAPID7

Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations.
Vulnerability management, SIEM, application security, user behavior analytics, penetration testing, managed services.

Gemalto

Authentication & Data Protection. Easy to use technologies and services to businesses and governments, authenticating identities and protecting data.

SentinelOne

Next generation endpoint security solution with an integrated platform that unifies the detection, prevention and remediation of threats.

Alien Vault

AlienVault USM delivers a comprehensive, unified approach to security monitoring, helping security teams detect threats, respond to incidents and support compliance efforts

IBOSS

Entire web stream protection, DUAL behaviour sandboxing, baselining for anomaly detection, threat isolator, post infection detection, MDM

Yubico

2FA, OTP, secure login for Microsoft solutions, HTTP reverse-proxy, SSO, FIDO U2F, OATH

EgoSecure

Data protection, endpoint security and inventorization, MDM

Famoc

Mobile device management, app control, remote wipe, iphone, android, windows phone monitor, locate, secure email.

FOX IT

DataDiode, protection for SCADA, EAL 7+, EAL4+, airgap, RED/BLACK network separation, one-way, hybrid security operation centre, IP-crypto solution for moving vehicles or remote locations

Accelerite

Workstation/POS/server/ATM/kiosk management, app wrapping, visualization, security and compliance, workload encryption, cloud provision

Cososys

DLP for Windows, Mac OS, Linux, MDM, content aware inspection, file shadowing/tracking, screen captures, USB devices, printers, applications, file whitelisting

Clearswift

DLP, adaptive redaction, fingerprinting, 3rd party integration, Antispam, URL filtering

PhishLine

Security awareness training, user training, social engineering, security assesment, phishing, portable media

Centrify

SSO, account provisioning, privileged & shared account management, MFA, privileged user monitoring

SealPath

Shared document remote control, document security everywhere, access control, audit and tracking

Townsend Security

AES for IBM, PGP file encryption, cloud security

Ironkey, Datalocker

Storage encryption, PIN password, ruggedized, FIPS 140-2 Level 3, tamper resistant, centralized  management

Rohde & Schwarz

Layer 2 ethernet encryptors, mobile network hardware encryption, modular encryption (voice, fax, data)
network protection, crypto modules

Tripwire

File integrity management, secure configuration management, remediation, system hardening, vulnerability  management