Security Vendor Directory

We collaborate with the industry’s most trusted IT/Cyber Security companies to provide you with access to the latest technologies and premium technical support. This allows us to provide specialist technology infrastructure solutions that help you accelerate your ambitions. Please contact Sharper Technology about other IT/Cyber security solutions that may not be listed below.



Array Networks

Array Networks, the network functions platform company, develops purpose-built systems for hosting virtual networking and security functions with guaranteed performance. Proven at over 5000 worldwide customer deployments, Array is recognized by leading enterprises and service providers for next-generation technology that takes the guesswork out of NFV deployment and delivers agility at scale.


Carbon Black

Carbon Black was founded by former members of the U.S. government’s elite team of offensive security hackers. Trained by the NSA and CIA, our founders possessed early insights into the tools and techniques of 21st century cyber hackers. For more than 15 years, our leadership and software have outpaced increasingly sophisticated attacks. We’re delivering a new generation of endpoint security, purposely designed to protect your organization from the most advanced cyberattacks. Our pioneering approach to application control, endpoint detection and response (EDR), and next-generation antivirus (NGAV) has been rigorously tested and proven by highly regarded third-party industry analysts.


Check Point Software Technologies

Check Point Software Technologies Ltd., the largest pure-play security vendor globally, provides industry-leading solutions, and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises’ networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology.


Cisco

Change the security equation with Cisco Security. Detect threats faster. Help IT teams be more productive. Block more threats outright and make your security postures more effective overall. How? With security designed to work together across the network, endpoints, and cloud. Get automated security that takes the burden off IT teams for a force multiplier of effectiveness.


Cylance

Cylance® is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Our technology is deployed on over ten million endpoints and protects hundreds of enterprise clients worldwide including Fortune 100 organizations and government institutions.


FireEye

FireEye understands cyber attacks and the threat actors responsible for them better than anyone else. FireEye learned that technology alone isn’t enough to combat cyber attackers, which is why our solution takes a three-pronged approach that combines innovative security technologies, world-renowned expertise, and deep threat intelligence capabilities. Unlike other solutions, we address the entire security operations lifecycle — every critical issue before, during and after an attack.


FireMon

We know that enterprise security teams are under more pressure than ever. Networks are growing more complex as are the compliance regulations keeping them in check. Attacks are increasing in both volume and frequency, creating an avalanche of threat data that’s impossible to keep up with. To stay on top of it all, while also meeting the demands of the business, requires more than just the right tools and people. It requires more intelligent management. Intelligent Security Management from FireMon provides the automation and intelligence tools to help network and security teams analyze policies, changes, compliance, risk and data close the gap.


Forcepoint

Purpose-built and ready to protect, Forcepoint is driven by an understanding of human behavior and intent. Our innovative technology, decades of experience and clear vision help solve critical security issues to protect employees, business data and IP. We offer a systems-oriented approach to insider threat detection and analytics, cloud-based user and application protection, next-gen network protection, data security and systems visibility. It’s a new approach to cybersecurity never seen before. And as technology and users’ needs evolve, we are constantly looking to expand our offerings while staying true to our core in protecting the human point.


ForeScout

ForeScout Technologies is transforming security through visibility. We offer a highly scalable, heterogeneous platform that provides Global 2000 enterprises and government agencies with agentless visibility and control of traditional and non-traditional devices, including physical and virtual infrastructure, PCs, laptops, tablets, smartphones and the latest IoT devices, the instant they connect to the network. Our technology continuously assesses, remediates and monitors devices and works with disparate security tools to help accelerate incident response, break down silos, automate workflows and optimize existing investments.


Fortinet

From the start, the Fortinet vision has been to deliver broad, truly integrated, high-performance security across the IT infrastructure. We provide top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric. Our unique security fabric combines Security Processors, an intuitive operating system, and applied threat intelligence to give you proven security, exceptional performance, and better visibility and control–while providing easier administration.


Imperva

Imperva protects you from cyber criminals – be they external actors or malicious insiders. Imperva protects cloud applications, websites and applications, files, SharePoint systems, databases and big data repositories from both theft and ever-evolving extortion attacks like DDoS and ransomware. Our technology provides granular visibility into how users access data and applications, and uses sophisticated user tracking and classification to detect and block cyberattacks, botnets, unauthorized users and malicious insiders. The Imperva Defense Center research team – comprised of some of the world’s leading experts in data and application security – roots out new attack methods and stops them before they reach you.


McAfee

We believe that no one person, product, or organization can fight cybercrime alone. It’s why we rebuilt McAfee around the idea of working together. People working together. Products working together. Organizations and industries working together. Our goal is to spread this collaborative attitude to our customers, partners, even competitors. All uniting to overcome the greatest challenge of the digital age—cyber crime—and making the connected world more secure.


Mimecast

Mimecast’s security, archiving and continuity cloud services protect business email and deliver comprehensive email risk management in one fully-integrated subscription service. Mimecast reduces the risk, complexity and cost traditionally associated with protecting email. You no longer have to manage an array of disjointed point solutions from multiple vendors. And you mitigate single vendor exposure if you have moved your primary email server to the cloud with services like Microsoft Office 365. Our best-of-breed services protect the email of over 24,900 customers and millions of users worldwide against targeted attacks, data leaks, malware and spam. We give employees fast and secure access to sensitive business information, and ensure email keeps running in the event of a primary service outage.


Palo Alto Networks

Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. With our deep cybersecurity expertise, commitment to innovation, and game-changing Next-Generation Security Platform, customers can confidently pursue a digital-first strategy and embark on new technology initiatives, such as cloud and mobility. This kind of thinking and know-how helps customer organizations grow their business and empower employees all while maintaining complete visibility and the control needed to protect their critical control systems and most valued data assets.


Proofpoint

Your people do business well beyond the bounds of traditional network perimeters and connected endpoints. Email, social media, and mobile devices are the new tools of the trade—and for cyber criminals, the new tools of attack. Proofpoint protects your people, data and brand against advanced threats and compliance risks. Built on the cloud and the world’s most advanced intelligence platform, our solutions help you effectively detect and block targeted attacks and respond quickly to suspected compromises. Our solutions stop 99% of attachment-based attacks. Every day, we detect and block advanced threats and compliance risks in more than 600 million emails, more than 7 million mobile apps, and hundreds of thousands of social-media accounts.


Pulse Secure

Put simply, we are the company that is 100% focused on delivering secure access solutions for people, devices, things and services. For years, enterprises of every size and industry have been trusting our integrated virtual private network, network access control and mobile security solutions to enable secure access seamlessly in their organizations.


Radware

Radware is a global leader of application delivery and cyber security solutions for virtual, cloud and software defined data centers. Its award-winning solutions portfolio delivers service level assurance for business-critical applications, while maximizing IT efficiency. Radware’s solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down.


Rapid7

Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.


RSA

RSA® Business-Driven Security™ solutions uniquely link business context with security incidents to help organizations manage risk and protect what matters most. RSA solutions are designed to effectively detect and respond to advanced attacks; manage user identities and access; and reduce business risk, fraud and cybercrime. RSA protects millions of users worldwide and works with more than 90 percent of the Fortune 500.

Tufin

As the market leader of award-winning Security Policy Orchestration solutions, Tufin provides enterprises with the ability to streamline the management of security policies across complex, heterogeneous environments. With more than 2,000 customers, Tufin automatically designs, provisions, analyzes and audits network security configuration changes – from the application layer down to the network layer – accurately and securely. It assures business continuity with a tight security posture, rapid service delivery and regulatory compliance across physical, private, public and hybrid cloud environments.

Zscaler

Zscaler – Securing the journey to the cloud. Not long ago, you couldn’t find many “cloud-first” organizations — those that primarily use cloud applications and infrastructure and rely on the Internet as their default transport network. But today, according to IDG, 70 percent of organizations have at least one application in the cloud — or at least some of their computing infrastructure — and the other 30 percent are moving quickly in that direction. They’re thriving on the improved speed, agility, productivity, and cost containment enabled by the cloud. And since 2008, Zscaler has provided the security architecture, built 100% in the cloud, needed to secure their IT transformation journeys.

STATEMENT OF POLICY

It shall be the policy of Sharper Technology to provide equitable business opportunities to all of its contractors/consultants and vendors, to increase the competitiveness and qualifications of minority and women-owned business enterprises (M/WBEs). Sharper Technology seeks to encourage and solicit the full participation of minority and women-owned businesses in all phases of its contracting and procurement activities and to afford them full and fair opportunity to compete on Sharper Technology contracts and procurements of equipment, supplies, and services.

SUPPLIER DIVERSITY PROGRAM

Building Relationships – The Sharper Technology Supplier Diversity Program recruits vendors from a wide range of businesses including products, supplies, and services. Product is, of course, highly competitive and managed by buyers in their particular department. Supplies and services make up the day-to-day support needs that help create a professional experience for our customers. Each of these specialized areas offers us numerous opportunities to partner with vendors within your community.