PARTNERS

DRPlogo
SourcetekITlogo

Data Resource Protection and SourcetekIT

Data Resource Protection and SourcetekIT have teamed up to provide a complete MSS solution.

DRP-TS (Total Secure) offers a complete security MSS solution specifically designed for your companies unique security needs managed by SourcetekIT.

DRP-CAAS (compliance as a service). Keeps you compliant with current data security standards like PCI DSS, HIPAA, SOX, GLBA, FISMA, GDPR and many other industry requirements.

SourcetekIT is a Security Engineering firm primarily focused on Professional Services & Managed Security Services (MSS) with 20 years of combined experience. Equipped with the best of breed security tools and Senior Certified Architects in the North America. SourcetekIT protects its clients’ information and secures its data from external threats. Our 24 x 7 security operations center makes your alerts useful to your environment.

Canarylogo
Thinkstlogo

Thinkst Canary

Find the attackers already in your system and those attempting to get in with Thinkst Canary!

Configure and deploy your Canaries throughout your network. Make one a Windows file server, another a router, throw in a few Linux webservers while you're at it. Each one hosts realistic services and look and acts like its namesake.

Then you wait. Your Canaries run in the background, waiting for intruders.

Attackers prowling a target network look for juicy content. They browse Active Directory for file servers and explore file shares looking for documents, try default passwords against network devices and web services, and scan for open services across the network.

When they encounter a Canary, the services on offer are designed to solicit further investigation, at which point your Canary notifies you of the incident.

Untitled

SAFE-T

Safe-T protects your sensitive data by hiding it from both the outside and inside worlds, and making it accessible only to authorized and intended entities. Safe-T protects your entire data access life cycle. After authenticating and verifying the user and device, Safe-T’s patented Reverse Access technology pushes out the requested data only to the authorized user.
 We do this by keeping your perimeter closed to the bad guys.
  • Mitigate malware and hacking attacks by removing inherent vulnerabilities of remote access to servers, services & applications
  • Provide only authorized access to applications
  • Improve business processes by applying policy and controlling file usage for all business entities
  • Safely access and share information in a hybrid cloud environment
  • Aids compliance with industry laws and regulations
Unboundlogo

Unbound

Control in the cloud: Is it an oxymoron? Unbound the Virtual HSM

As companies increase their reliance on cloud infrastructure and services, they inherently cede some control over their business to cloud service providers. But security and privacy of sensitive digital assets in the cloud is one area where companies must maintain full control.

Of all the data elements used in the cloud, cryptographic keys are by far the most sensitive and crucial to protect. Cryptography is the foundation for protecting business data and applications, and its integrity relies on keeping secret keys from unauthorized access, misuse or loss. Key control in the cloud is therefore a crucial requirement for many enterprises making the cloud transition.

Until now, sensitive keys needed to be locked in dedicated hardware, as compromise of a single key may lead to severe business implications, destroying value and eroding trust.

Unbound ensures your keys are never exposed throughout their lifecycle, from edge to cloud and anywhere in between, without any reliance on dedicated hardware – making crypto easy, user-friendly, cost-effective and more secure.

Correloglogo

CorreLog

The CorreLog Approach to SIEM: Cross-platform event log management and correlation.

The CorreLog SIEM Server provides a standards-based method of collecting all the system log messages of your network using industry standard syslog protocol and SNMP traps. These messages are then correlated into understandable threats, alerts, and actions using sophisticated, easily configured rules, which are then reduced to actionable “tickets” that are sent to administrators as a trigger for remediation of incidents.

For regulatory compliance, CorreLog SIEM was architected to facilitate standards set forth by PCI DSS, HIPAA, SOX, GLBA, FISMA,GDPR and many other industry requirements and provides out of the box compliance scorecards. CorreLog SIEM’s archival and storage functionality provides up to 5,000 days of storage and uses encrypted checksums for file integrity. With no additional software required.

cybereason

Cybereason

Get the unfair advantage with Cybereason Total Enterprise Protection, the most effective EDR, next-gen AV and monitoring services available. Cybereason is offense-minded, born and bred to hunt. Cybereason was founded by members of Israel Defense Forces’ 8200 unit, an elite group that specializes in cyber security, giving them extensive experience with hacking operations. They are applying the military’s perspective on cyber security to enterprise security.

Click here to get RansomFree from Cybereason – Free Windows Ransomware Protection

portnox

Portnox

The connected world is evolving. Every day. Every hour. Every minute. More devices join the corporate network. Smartphones and tablets. Internet of Things (IoT) devices of all shapes and sizes, making the network complex to manage and exposed to threats. Portnox sees, controls, reacts to and manages the risk networks face for any user, any device, anywhere.

IBM

IBM

Savvy companies know that in today’s data-driven, highly distributed world, there are serious threats that must be addressed head-on. IBM® Security delivers an integrated system of analytics, real-time defenses and proven experts, so you can make strategic decisions about how to safeguard your business.

techdata

Tech Data

With millions of cyber-attacks happening every year, the need for security is growing at an annual rate of 12%.* From data breaches, to stolen devices and server crashes, the results are devastating, costly, and can ultimately destroy your customers' reputation. Organizations are in dire need of security, which creates incredible growth and earning opportunities for you.

And, that's where Tech Data Security comes in. As the ever-changing threat landscape continues to evolve — whether in the physical network, cloud, mobility or IoT initiatives — our holistic approach to cybersecurity sets you up for success by leveraging our industry experts, extensive vendor portfolio and security-related and reseller enablement services in your favor.