PARTNERS

Cymbel selects its partners based on the following criteria:

  • Proven efficacy, i.e. the ability to reduce the risks of a confidential data breach caused by undetected compromised devices and malicious insiders
  • Minimal risk of interfering with business operations
  • Low deployment costs, i.e. minimal professional services needed for deployment
  • Ability to reduce security operational costs
  • Ability to reduce the costs of meeting compliance requirements
  • Corporate viability
  • Responsiveness to customer feature requests
  • Customer support satisfaction

Here are Cymbel’s partners.

Cloud

ANY CHARACTER HERE

 Gigamon enhances the monitoring of your network infrastructure and improving security tool performance. A range of applications are available to optimize the traffic sent from your network to the tools you rely upon to monitor, manage, and secure the network. GigaSMART’s advanced processing engine can be accessed anywhere within the Gigamon Visibility Platform without port- or card-based restrictions. GigaSMART processing engines can be combined to manage higher traffic loads and optimized for specific applications. Applications can be combined or service chained so traffic benefits from multiple functions that can be achieved at once, such as generating NetFlow and other network metadata or decrypting Secure Sockets Layer (SSL)/ Transport Layer Security (TLS) traffic after packet duplicates have been removed, or by stripping VLAN headers before load balancing the traffic and sending it out to the appropriate tools. Learn more at Gigamon.

Proofpoint provides a Secure Email Gateway solution that helps over 5,000 companies protect and govern their most sensitive data. Proofpoint, positioned by Gartner in the Leaders Quadrant in its 2015 Magic Quadrant for Secure Email Gateways, delivers an integrated suite of on-demand data protection solutions spanning threat management, regulatory compliance, data governance, and secure communications – all of which are based on a common security-as-a-service platform. Learn more at Proofpoint.

Zscaler is the industry-first multi-tenant security provider. Zscaler services enable any end user, from any place, using any device a rich Internet experience while enforcing security and business policy. We deliver this service using our Global Cloud Infrastructure. Rather than buying appliances, we have a new on-demand business model, whereby customers pay a subscription fee. Our cloud service is built upon ground-breaking, high-performance technology that eliminates latency. Zscaler reduces risk, lowers cost, improves resource utilization and simplifies IT administration. Learn more at Zscaler.

ANY CHARACTER HERE

Network 

Web Application Firewall and Database Security

ANY CHARACTER HERE
 LightCyber logo
ANY CHARACTER HERE

Palo Alto Networks logoNext Generation Firewalls

Palo Alto Networks Next Generation firewalls enable organizations to re-establish a network-based Positive Control Model, which is the primary purpose of a firewall.  Since the mid-2000s, thousands of applications have been built and deployed that were designed to bypass the traditional port-based stateful inspection firewalls. Because Palo Alto firewalls monitor all ports for all applications all of the time, they can detect and control traffic from the network layer up through the application layer. Based on patent-pending App-ID™ technology, Palo Alto’s next generation firewalls accurately identify applications – regardless of port, protocol, evasive tactic or SSL encryption – and scan content to stop threats and prevent data leakage. Enterprises can for the first time embrace Web 2.0 and maintain complete visibility and control, while significantly reducing total cost of ownership through device consolidation. Learn more at Palo Alto Networks.

Microsegmentation

Guardicore’s Centra product is the perfect solution for a zero trust network. It offers visualization to reveal application flows across the infrastructure, micro-segmentation with a powerful policy engine, and fast and simple detection & response.

ANY CHARACTER HERE
ANY CHARACTER HERE

Palo Alto Networks logoEndpoint Prevention
Palo Alto Networks’ endpoint prevention agent, Traps, addresses the well understood weaknesses of traditional anti-virus products. Traps does NOT rely on signatures, file hashes, or endpoint sandboxing. Traps’ core technology blocks the small number of common exploit methods used by all malware. Security analysts are calling Traps, “EMET on steroids.” The core technology of both focus on the small number of common exploit methods used by all malware. However, Traps has several major advantages: (1) Twice the number of exploit prevention modules, (2) Self-protection mechanisms to prevent users, even with high privileges, from deleting the agent, (3) Can be used on any application including Java, (4) Central management console, and (5) Provides additional anti-malware, forensics, device control, Wildfire integration, and SIEM integration. Learn more about Traps.

ANY CHARACTER HERE

  Deep Security – Enterprise Virtualization Security

Trend Micro Deep Security provides advanced protection for systems in the dynamic datacenter—from virtual desktops to physical, virtual or cloud servers. Deep Security combines intrusion detection and prevention, firewall, integrity monitoring, log inspection, and agentless anti-malware capabilities to helps prevent data breaches and ensure business continuity. This dynamic, centrally managed solution also supports compliance with important standards and regulations such as PCI, FISMA, and HIPAA. Learn more at Trend Micro.

Privileged Account Management (PAM)

Thycotic is the PAM Cloud leader, offering powerful and comprehensive privileged access 
management at cloud scale and speed, across the modern enterprise.

ANY CHARACTER HERE
ANY CHARACTER HERE
ANY CHARACTER HERE
ANY CHARACTER HERE

Log

Splunk for Enterprise Security was built in response to the new security challenges facing enterprises today. With a much broader set of possible attack vectors and more innovative and targeted attacks coming from persistent adversaries, the amount and types of data analyzed must be expanded. Splunk’s powerful big data analytics engine can accept IT risk scenario style thinking and support a security intelligence approach to discovering unknown threats. Learn more at Splunk.

ANY CHARACTER HERE
ANY CHARACTER HERE
ANY CHARACTER HERE
ANY CHARACTER HERE
ANY CHARACTER HERE

Encryption and Authentication

ANY CHARACTER HERE

Encryption and Authentication Solutions

Gemalto provides complete security utilizing its encryption technologies to protect communications, intellectual property and digital identities, and offers a full spectrum of products including hardware, software, and chips. With SafeNet KeySecure ® , organizations can protect critical data from both internal and external threats, ensure compliance with regulatory and legislative mandates for security, and mitigate the risk of data theft. Gemalto’s complete family of network security devices provides the fastest and easiest way to integrate robust FIPS-certified network security to protect mission-critical data for Enterprise and Government organizations. Gemalto provides solutions for strong authentication and internet security. eToken® is the world leader for USB-based authentication, providing strong user authentication and cost-effective password management solutions. eToken can be used to securely generate and store keys, passwords, and digital certificates, so users need only remember a single password and can securely carry their credentials with them wherever they go. eSafe ® enables multi-layer, policy-based management of Internet content traffic, transparently blocking zero-day attacks and suspicious elements. Learn more at Gemalto.

ANY CHARACTER HERE
ANY CHARACTER HERE
ANY CHARACTER HERE
ANY CHARACTER HERE

Firewall Management

ANY CHARACTER HERE

Firewall Management

The AlgoSec solution intelligently automates and orchestrates network security policy management to make your enterprise more agile, more secure and more compliant – all the time. Through a single plane of glass you can auto-discover application connectivity requirements, proactively analyze risk from the business prospective, and rapidly plan and execute network security changes – all with zero-touch, and seamlessly orchestrated across your heterogeneous public or private cloud, and on-premise environment. Learn more at Algosec.

Firewall Management

Firemon Security Manager is a web-based firewall management platform that provides continuous visibility into and analysis of your network security policies and underlying IT risks. The platform proactively delivers the intelligence that IT security, network and compliance teams need to address the three biggest challenges of firewall management today. Learn more at Firemon.

ANY CHARACTER HERE