PARTNERS

Cymbel selects its partners based on the following criteria:

  • Proven efficacy, i.e. the ability to reduce the risks of a confidential data breach caused by undetected compromised devices and malicious insiders
  • Minimal risk of interfering with business operations
  • Low deployment costs, i.e. minimal professional services needed for deployment
  • Ability to reduce security operational costs
  • Ability to reduce the costs of meeting compliance requirements
  • Corporate viability
  • Responsiveness to customer feature requests
  • Customer support satisfaction

Here are Cymbel’s partners.

Cloud

ANY CHARACTER HERE

Attivo_Corp_Logo

Honeypots / Honeynets

Attivo Networks detects and identifies BOTs and APTs that have bypassed your perimeter defenses in your datacenter and in your IaaS cloud deployments using its next-generation Honeynet technology. Attivo solutions are a virtualized, self-maintaining honeynet – an information resource that appears to be part of a network. The Attivo solution is a closely monitored virtual environment that appears to contain information and services of value to attackers yet requires very little maintenance from stretched IT resources. Attivo hosts multiple Windows and Linux operating systems and a multitude of applications and services. Attivo honeynets offer deliberate vulnerabilities that are exposed on the network so that an attacker would falsely believe they’re accessing a production network. Attivo generates high-confidence alerts of validated BOT and APT threats with information to take immediate action.

 

Centrify provides a cloud-based Identity Platform that enables you to manage both end users and privileged users with secure access to both cloud-based and on-premises resources. In addition, Centrify integrates mobility management with identity. Centrify’s Identity Service includes (1)  Single Sign-On for cloud-based apps like Office365, Salesforce.com, Box, and on-premises applications like SAP, (2) User Provisioning, (3) Multifactor Authentication, (4) Mobility Management, and (5) Mac Management. Centrify’s Privilege Service combines shared account password management with the ability to securely manage and audit access by internal and outsourced IT. Finally, Centrify continues to provide comprehensive bridging of Linux and Unix systems to Active Directory. Centrify has over 5,000 customers. Learn more at Centrify.

 

 Gigamon enhances the monitoring of your network infrastructure and improving security tool performance. A range of applications are available to optimize the traffic sent from your network to the tools you rely upon to monitor, manage, and secure the network. GigaSMART’s advanced processing engine can be accessed anywhere within the Gigamon Visibility Platform without port- or card-based restrictions. GigaSMART processing engines can be combined to manage higher traffic loads and optimized for specific applications. Applications can be combined or service chained so traffic benefits from multiple functions that can be achieved at once, such as generating NetFlow and other network metadata or decrypting Secure Sockets Layer (SSL)/ Transport Layer Security (TLS) traffic after packet duplicates have been removed, or by stripping VLAN headers before load balancing the traffic and sending it out to the appropriate tools. Learn more at Gigamon.

 

Proofpoint provides a Secure Email Gateway solution that helps over 5,000 companies protect and govern their most sensitive data. Proofpoint, positioned by Gartner in the Leaders Quadrant in its 2015 Magic Quadrant for Secure Email Gateways, delivers an integrated suite of on-demand data protection solutions spanning threat management, regulatory compliance, data governance, and secure communications – all of which are based on a common security-as-a-service platform. Learn more at Proofpoint.

 

SkyHigh logo

Cloud Access Security Broker

SkyHigh is the leading cloud access security broker (CASB) trusted by over 500 enterprises to securely enable over 16,000 cloud services, including shadow IT and sanctioned IT. With Skyhigh, organizations leverage a single cross-cloud platform to (1) gain visibility into cloud usage and risks, (2) meet compliance requirements, (3) enforce security policies, and (4) detect and respond to potential threats. Learn more about SkyHigh.

 

Zscaler is the industry-first multi-tenant security provider. Zscaler services enable any end user, from any place, using any device a rich Internet experience while enforcing security and business policy. We deliver this service using our Global Cloud Infrastructure. Rather than buying appliances, we have a new on-demand business model, whereby customers pay a subscription fee. Our cloud service is built upon ground-breaking, high-performance technology that eliminates latency. Zscaler reduces risk, lowers cost, improves resource utilization and simplifies IT administration. Learn more at Zscaler.

ANY CHARACTER HERE

Network 

Web Application Firewall and Database Security

Imperva provides end-to-end visibility and control that addresses the full Application Data Security lifecycle. The Secure Sphere Data Security Suite delivers a complete lifecycle for Web application and database security in a single platform. The Standard Edition (SE) Web Application Firewall and SE Discovery and Assessment Server deliver accurate data security with the proven performance, ease-of-use and automatic security updates demanded by medium enterprise with limited IT resources. Scuba by Imperva Database Vulnerability Scanner finds hundreds of flaws like unpatched software, unsafe processes, and weak passwords: the high risk security vulnerabilities that expose your databases to attack. Learn more at Imperva.

ANY CHARACTER HERE

Fidelis logo Content-based Malware Detection and Forensics, and Data Loss Prevention

Fidelis Security‘s XPS solution’s key value add is its ability to reassemble network traffic at the session level, then decode hundreds of content types, and detect malware embedded in these files using both static (inspection-based) and dynamic (execution-based) methods. In addition, Fidelis XPS extracts and stores rich metadata from these sessions which are used for incident response forensics analysis.  Learn more at Fidelis Security.

 LightCyber logo
ANY CHARACTER HERE

Palo Alto Networks logo Next Generation Firewalls

Palo Alto Networks Next Generation firewalls enable organizations to re-establish a network-based Positive Control Model, which is the primary purpose of a firewall.  Since the mid-2000s, thousands of applications have been built and deployed that were designed to bypass the traditional port-based stateful inspection firewalls. Because Palo Alto firewalls monitor all ports for all applications all of the time, they can detect and control traffic from the network layer up through the application layer. Based on patent-pending App-ID™ technology, Palo Alto’s next generation firewalls accurately identify applications – regardless of port, protocol, evasive tactic or SSL encryption – and scan content to stop threats and prevent data leakage. Enterprises can for the first time embrace Web 2.0 and maintain complete visibility and control, while significantly reducing total cost of ownership through device consolidation. Learn more at Palo Alto Networks.

ANY CHARACTER HEREvectra-logo
ANY CHARACTER HERE
ANY CHARACTER HERE

Host

ANY CHARACTER HERE
ANY CHARACTER HERE

Palo Alto Networks logoEndpoint Prevention
Palo Alto Networks’ endpoint prevention agent, Traps, addresses the well understood weaknesses of traditional anti-virus products. Traps does NOT rely on signatures, file hashes, or endpoint sandboxing. Traps’ core technology blocks the small number of common exploit methods used by all malware. Security analysts are calling Traps, “EMET on steroids.” The core technology of both focus on the small number of common exploit methods used by all malware. However, Traps has several major advantages: (1) Twice the number of exploit prevention modules, (2) Self-protection mechanisms to prevent users, even with high privileges, from deleting the agent, (3) Can be used on any application including Java, (4) Central management console, and (5) Provides additional anti-malware, forensics, device control, Wildfire integration, and SIEM integration. Learn more about Traps.

ANY CHARACTER HERE

  Deep Security – Enterprise Virtualization Security

Trend Micro Deep Security provides advanced protection for systems in the dynamic datacenter—from virtual desktops to physical, virtual or cloud servers. Deep Security combines intrusion detection and prevention, firewall, integrity monitoring, log inspection, and agentless anti-malware capabilities to helps prevent data breaches and ensure business continuity. This dynamic, centrally managed solution also supports compliance with important standards and regulations such as PCI, FISMA, and HIPAA. Learn more at Trend Micro.

ANY CHARACTER HERE
ANY CHARACTER HERE

Varonis LogoData Governance Solutions

The Varonis  Data Governance suite helps organizations manage and protect their unstructured and semi structured data — the documents, spreadsheets, presentations, media files and other business data in file servers, NAS devices, SharePoint and Exchange. According to industry analysts, (1) 80% of organizational data is unstructured, and (2) unstructured data is growing at close to 100% per year!! Even though these assets are important and growing, critical questions about them cannot be answered without metadata framework technology. The Varonis Data Governance Suite helps answer the following questions: Who has access to them? Who should and should not have access to them? Who uses them? Who abuses their access? Who owns them? Which are sensitive and exposed to risk? Learn more about Varonis.

ANY CHARACTER HERE
ANY CHARACTER HERE

Log

Splunk for Enterprise Security was built in response to the new security challenges facing enterprises today. With a much broader set of possible attack vectors and more innovative and targeted attacks coming from persistent adversaries, the amount and types of data analyzed must be expanded. Splunk’s powerful big data analytics engine can accept IT risk scenario style thinking and support a security intelligence approach to discovering unknown threats. Learn more at Splunk.

ANY CHARACTER HERE
ANY CHARACTER HERE

Incident Response

ANY CHARACTER HERE

Reilient systems CO3 logo-large Incident Response

From privacy breaches, to malware outbreaks, to system intrusions, to DDoS attacks—Resilient Systems automates incident response using a knowledge-base of best practices, industry standard frameworks, and federal and state regulatory requirements. Co3’s Security Module transforms incident response from a manual, chaotic, and stressful process to one that is efficient, compliant, and best of breed. Co3 instantly generates detailed incident response plans and provides a platform for team member investigation, collaboration, and reporting. Co3’s Privacy Module transforms privacy breach response from a lengthy, tedious, expensive, and stressful process to one that is efficient, compliant, and always up-to-date. Learn more at Resilient Systems.

ANY CHARACTER HERE
ANY CHARACTER HERE

Encryption and Authentication

ANY CHARACTER HERE

Encryption and Authentication Solutions

Gemalto provides complete security utilizing its encryption technologies to protect communications, intellectual property and digital identities, and offers a full spectrum of products including hardware, software, and chips. With SafeNet KeySecure ® , organizations can protect critical data from both internal and external threats, ensure compliance with regulatory and legislative mandates for security, and mitigate the risk of data theft. Gemalto’s complete family of network security devices provides the fastest and easiest way to integrate robust FIPS-certified network security to protect mission-critical data for Enterprise and Government organizations. Gemalto provides solutions for strong authentication and internet security. eToken® is the world leader for USB-based authentication, providing strong user authentication and cost-effective password management solutions. eToken can be used to securely generate and store keys, passwords, and digital certificates, so users need only remember a single password and can securely carry their credentials with them wherever they go. eSafe ® enables multi-layer, policy-based management of Internet content traffic, transparently blocking zero-day attacks and suspicious elements. Learn more at Gemalto.

ANY CHARACTER HERE
ANY CHARACTER HERE
ANY CHARACTER HERE
ANY CHARACTER HERE

Firewall Management

ANY CHARACTER HERE

Firewall Management

The AlgoSec solution intelligently automates and orchestrates network security policy management to make your enterprise more agile, more secure and more compliant – all the time. Through a single plane of glass you can auto-discover application connectivity requirements, proactively analyze risk from the business prospective, and rapidly plan and execute network security changes – all with zero-touch, and seamlessly orchestrated across your heterogeneous public or private cloud, and on-premise environment. Learn more at Algosec.

 

Firewall Management

Firemon Security Manager is a web-based firewall management platform that provides continuous visibility into and analysis of your network security policies and underlying IT risks. The platform proactively delivers the intelligence that IT security, network and compliance teams need to address the three biggest challenges of firewall management today. Learn more at Firemon.

 

  Firewall Management

Tufin™ is a leading provider of Security Lifecycle Management solutions that enable companies to cost-effectively manage their network security policies, comply with regulatory standards, and minimize risks. Founded in 2005 by leading firewall and business systems experts, Tufin serves over 800 customers in industries from telecom and financial services to energy, transportation and pharmaceuticals. Learn more at Tufin.

ANY CHARACTER HERE