847.221.0200  Main Office

HALOCK Technology Partners

HALOCK Security Labs is proud to partner with the following technology vendors and others to help our customers protect their valuable information assets and deliver Purpose Driven Security®.

Click on a logo to learn more.

Alert Logic Algosec Barracuda Networks Blue Coat Carbon Black Corero Network Security
CounterTack CyberArk EIQ Fat Pipe FireEye Ixia
Imperva LogRythm  Malwarbytes Palo Alto Phishline Qualys
RSA Security Innovation Sophos Splunk    



 Alert Logic
Security-as-a-Service in the cloud — AlertLogic is a platform of fully managed products and services to keep your data safe and compliant. Whether your IT infrastructure is on-premise, in the cloud or anywhere in between, our portfolio of solutions and deployment options allows unprecedented visibility into your environment, saving your business time, money and worries about data compliance and security.

AlgoSec is the market leader for security policy management, enabling organizations to simplify and automate security operations in evolving data centers and networks. More than 1,000 of the world’s leading organizations, including 15 of the Fortune 50, rely on AlgoSec for faster security provisioning of business applications, streamlined change management, continuous compliance and tighter security.



Barracuda Networks
Barracuda Networks provides Industry-leading solutions designed to solve mainstream IT problems – efficiently and cost effectively – while maintaining a level of customer support and satisfaction second to none. The company’s products span three distinct markets: 1) content security, 2) networking and application delivery, and 3) data storage, protection and disaster recovery.


Blue Coat
Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets.



the industry’s first and only endpoint threat detection and response solution for SOC and IR teams —continuous endpoint recording, customized detection, live response, remediation, and threat banning.


Corero Network Security
Corero's DDoS Defense System (DDS) is your organization’s First Line of Defense against crippling, costly Distributed Denial-of-Service (DDoS) attacks, delivering the most comprehensive DDoS protection available. Purpose-built, on-premises DDS detects and blocks both familiar network-layer flooding attacks, and the newer, difficult to detect, low and slow application-layer attacks



CounterTack puts enterprises back in control of security at the endpoint. Stealth, attacker-developed technology combined with advanced Big Data analytics, CounterTack empowers teams with authoritative visibility into endpoint behavior at scale, with comprehensive attack context.





For over a decade CyberArk has led the market in securing enterprises against cyber attacks that take cover behind insider privileges and attack critical enterprise assets. Today, only CyberArk is delivering a new category of targeted security solutions that help leaders stop reacting to cyber threats and get ahead of them, preventing attack escalation before irreparable business harm is done.






EiQ, a pioneer in hybrid SaaS security services, is transforming how mid-market organizations build enterprise-class security programs, improve their IT security and compliance posture, and protect against cyber threats and vulnerabilities. 



Fat Pipe
FatPipe Networks specializes in solutions for aggregating and combining multiple links from same or different ISPs. Solutions include bidirectional load balancing and failover for dramatically improved bandwidth and reliability.




FireEye is the leader in stopping advanced targeted attacks that use advanced malware, zero-day exploits, and advanced persistent threat (APT) tactics. FireEye solutions supplement traditional and next-generation firewalls, IPS, anti-virus, and gateways, which cannot stop advanced threats, leaving security holes in networks. FireEye offers the industry’s only solution that detects and blocks attacks across both Web and email threat vectors as well as latent malware resident on file shares.


Imperva is the pioneer and leader of a new category of business security solution that protects critical applications and data from theft, insider abuse, and fraud; and also streamlines regulatory compliance. We provide a comprehensive solution for monitoring and controlling all data usage and business transactions across the data center, from storage in a database or on a file server to consumption through applications.


Ixia is a leading provider of comprehensive network test and network visibility products that enable equipment manufacturers, service providers, enterprises, and government agencies to ensure high performance of wired, Wi-Fi, and 3G/4G/LTE networks, devices, services, and applications in pre-deployment labs and production networks.




LogRhythm is the largest and fastest growing independent security intelligence company in the world. The company’s patented and award-winning Security Intelligence Platform, unifying SIEM, log management, file integrity monitoring, network forensics and host forensics, empowers organizations around the globe to detect and respond to breaches and the most sophisticated cyber threats of today, faster and with greater accuracy than ever before. LogRhythm also provides unparalleled compliance automation and assurance as well as IT predictive intelligence to Global 2000 organizations, government agencies and mid-sized businesses worldwide.




Malwarebytes products have been downloaded over 500 million times and have removed over five billion pieces of malware. The Malwarebytes line has expanded to include purpose-built business products that now protect over 50,000 businesses.



Palo Alto Networks, Inc. has pioneered the next generation of network security with our innovative platform that allows you to secure your network and safely enable an increasingly complex and rapidly growing number of applications. At the core of this platform is the next-generation firewall, which delivers visibility and control over applications, users, and content within the firewall using a highly optimized hardware and software architecture.


PhishLine.com® is an enterprise grade Security-as-a-Service that enables authorized professionals to easily create mock phishing campaigns and get the results rolled up in a business friendly dashboard for employee awareness, education and analysis.

It provides targeted security awareness training content and advanced testing through all layers of security controls up to and including the end user "human firewall".


Qualys provides a Cloud Platform and integrated suite of solutions that helps organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. 


RSA Combines business-critical controls in identity assurance, encryption and key management, SIEM, Data Loss Prevention and Fraud Protection with industry-leading eGRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform and the data that is generated.


Security Innovation specializes in software security, an area where traditional “information security” and “business” consultants tend to struggle. They have been analyzing application vulnerabilities and risk for almost a decade and were one of the first providers of software risk solutions to Fortune 500 firms.

Sophos helps organizations keep data safe and block the growing number of complex threats. We protect everywhere and offer complete security with our full range of endpoint, encryption, email, web, network security and UTM products. 

Splunk Enterprise is the leading platform for real-time operational intelligence. It's the easy, fast and secure way to search, analyze and visualize the massive streams of machine data generated by your IT systems and technology infrastructure—physical, virtual and in the cloud.