Technology/Resell Partners

Partnering with the Best-in-Class

Technology/Resell Partners. We have established deep partnerships with the technology solution providers and resell partners shown below, and we are trained extensively in the use of these best-in-class Security information and event management (SIEM) and cyber security tools:

AlertLogic Logo

Security-as-a-service in the cloud: AlertLogic is a platform of fully managed products and services that keeps your data safe and compliant. Whether your IT infrastructure is on-premise, in the cloud or anywhere in between, AlertLogic’s portfolio of solutions and deployment options allows unprecedented visibility into your environment — saving your business time, money and worries about data compliance and security.


AlgoSec is the market leader for security policy management, enabling organizations to simplify and automate security operations in evolving data centers and networks. More than 1,000 of the world’s leading organizations, including 15 of the Fortune 50, rely on AlgoSec for faster security provisioning of business applications, streamlined change management, continuous compliance and tighter security.

Carbon Black Threat Detection SOC

Carbon Black is the industry’s first and only endpoint threat detection and response solution for security operations center (SOC) and incident response (IR) teams, offering continuous endpoint recording, customized detection, live response, remediation and threat banning.

Centrify Security Cyber Threat

Centrify secures enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises. Centrify helps protect against the point of attack used in data breaches – compromised credentials – by securing an enterprise’s apps and infrastructure for all its users.

Duo Access Protection

Duo Security provides a cloud-based access protection solution for companies and organizations worldwide. Clients use its solution for adaptive authentication, BYOD (bring your own device) security, cloud security, endpoint security, mobile security, and two-factor authentication.

FireEye APT Malware Zero-Day

FireEye is the leader in stopping advanced targeted attacks that use advanced malware, zero-day exploits and advanced persistent threat (APT) tactics. FireEye solutions supplement traditional and next-generation firewalls, IPS, anti-virus software and gateways, which cannot stop advanced threats, leaving security holes in networks. FireEye offers the industry’s only solution that detects and blocks attacks across both web and email threat vectors as well as latent malware Resident on File Shares.

GS OpenText Forensics Endpoint

Guidance Software’s (now Opentext) product line was organized around four markets: digital forensics, endpoint security analytics, cyber security incident response, and e-discovery

Imperva Regulatory Compliance Business Security

Imperva is the pioneer and leader of a new category of business security solutions that protect critical applications and data from theft, insider abuse and fraud; and also streamlines regulatory compliance. Imperva provides a comprehensive solution to monitor and control all data usage and business transactions across the data center, from storage in a database or on a file server to consumption through applications.

Malwarebytes Protect Malware

Malwarebytes products have been downloaded over 500 million times and have removed over 5 billion pieces of malware. The Malwarebytes line has expanded to include purpose-built business products that now protect over 50,000 businesses.

Palo Alto Network Security

Palo Alto Networks, Inc. has pioneered the next generation of network security with its innovative platform that allows you to secure your network and safely enable an increasingly complex and rapidly growing number of applications. At the core of this platform is the next-generation firewall, which delivers visibility and control over applications, users and content within the firewall using a highly optimized hardware and software architecture.

proofpoint cloud-based cyber security

Proofpoint is a leading next-generation cybersecurity company that protects the way people work today. Proofpoint provides comprehensive cloud-based cyber security solutions that protect organizations from advanced threats and attacks that target email, mobile apps, and social media.

Qualys cloud security compliance

Qualys provides a cloud platform and integrated suite of solutions that help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating a full spectrum of auditing, compliance and protection for IT systems and web applications.

RSA identity encryption SIEM protection GRC

RSA combines business-critical controls in identity assurance, encryption and key management, security information and event management (SIEM), data loss prevention and fraud protection with industry-leading enterprise governance, risk and compliance (eGRC) capabilities and robust consulting services. RSA brings visibility and trust to millions of user identities, the transactions that they perform and the data that is generated.

Security Innovation software security

Security Innovation specializes in software security, an area where traditional information security and business consultants tend to struggle. This company has been analyzing application vulnerabilities and risk for almost a decade and was one of the first providers of software risk solutions to Fortune 500 firms.

sophos endpoint encryption threat management

Sophos helps organizations keep data safe and blocks the growing number of complex threats. Sophos protects everywhere and offers complete security with a full range of endpoint, encryption, email, web, network security and unified threat management (UTM) products.nt (UTM) products.

Spirion data management Sensitive Data Scanning

A leading provider of enterprise data management software to help businesses reduce their sensitive data footprint and proactively minimize the risks, costs and reputation damage of successful cyber attacks. Request sensitive data scanning.

splunk operational intelligence

Splunk Enterprise is the leading platform for real-time operational intelligence. It’s the easy, fast and secure way to search, analyze and visualize the massive streams of machine data generated by your IT systems and technology infrastructure — physical, virtual and in the cloud.

tenable cyber exposure

Tenable®, Inc. is the Cyber Exposure company. Over 24,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver®, the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 20 percent of the Global 2000 and large government agencies.

Thales data protection

A leading global provider of digital trust management and data protection solutions that protect the world’s most sensitive applications and information. Thales solutions address identity and privacy related challenges with hardware and software-based encryption, digital signature, and management capabilities.

HALOCK, a trusted cyber security consulting firm headquartered in Schaumburg, IL, near Chicago, advises clients on reasonable information security strategies, risk assessments, third-party risk management (TPRM), penetration testing, security management,  architecture reviews, and HIPAA, Privacy, & PCI compliance throughout the US.

Reasonable Security Sensitive Data Scanning Ransomware

Contact Us