Technology Security Solution Partnerships

Partnering with the Best-in-Class

Partner Security Solutions Categories.


EMAIL SECURITY
ABOUT:
This is a technology that inspect incoming and outgoing email from your email provider to identify spam, malware and URL based threats, and phishing campaigns from reaching users and preventing further damage even if the user has received malicious emails.

PARTNER
Proofpoint Email Security

Proofpoint (Cloud or On-Premise)


ENDPOINT PROTECTION
ABOUT:
Agent-based solutions that provide combined malware protection and endpoint response and detection capabilities to prevent the infection and lateral spread of malicious activity as well as incident response capabilities such as endpoint isolation and remote investigation capabilities.

PARTNERS

VMWare CarbonBlack Endpoint protection


VMWare/CarbonBlack (Cloud)

Palo Alto Endpoint protection

Palo Alto (Cloud)

Sophos Endpoint protection

Sophos (Cloud)




FILE AND DATABASE ENCRYPTION
ABOUT:
These solutions allow for more granular/targeted encryption of structure and unstructured data such as a specific document, folder, or database tables and fields. This is beyond the capabilities of whole disk encryption solutions and allows for advanced access control to the encrypted data.

PARTNERS

Atakama
Atakama




FILE INTEGRITY MONITORING (FIM)
ABOUT:
A FIM solution watches for changes to sensitive or business critical files or code base and provides alerts on change activity to be investigated. This is a requirement for PCI DSS.

PARTNERS
Tripwire Partner

Tripwire (On-Premise)



Reasonable Security Solution Multifactor Authentication and Access

MULTIFACTOR AUTHENTICATION AND ACCESS (MFA)
ABOUT:
The purpose is to enhance security of authentication across multiple applications by requiring additional factors from the user for successful authentication.

PARTNERS
Cisco/Duo Security Multi-Factor Authentication and access (MFA)

Cisco/Duo Security (Cloud)




NETWORK MICRO-SEGMENTATION AND ASSET DISCOVERY
ABOUT:
These solutions proactively identify assets on your network and allow for the granular implementation of segmentation via software agents. This eliminates the need to upgrade firewall hardware and software and allows for simpler network segmentation that will not require the re IP of deployed systems and devices.

PARTNERS
Gardicore Network Micro-Segmentation and Asset Discovery

Gardicore (Cloud)






NEXT GENERATION FIREWALLS
ABOUT:
Next gen firewalls enhance border security by allowing for more granular control of traffic between networking segments. This is accomplished by identifying which applications and users are accessing resources through the firewall and allowing for granular policy to be applied based on applications and users vs. the traditional port and protocol of legacy firewalls. Next gen firewalls also include Intrusion Detection and Prevention, URL Filtering, advanced malware sandboxing and behavior analytics, as well as packet capturing.

PARTNERS

Palo Alto Next generation firewalls


Palo Alto (On Premise and Cloud)




PRIVILEGED ACCOUNT MANAGEMENT(PAM)
ABOUT:
A PAM solution manages identified privilege account passwords by rotating passwords, forcing check-in and check outs of credentials, and auditing access using administrative accounts. Additionally, they may provide remote access capabilities similar to remote desktop and session recording which can be especially useful for monitoring access from contractors or third parties.

PARTNERS

Cyberark Privileged Account Management (PAM)

CyberArk (On Premise)





SECURE DEVOPS TRAINING
ABOUT:
Training for developers should always include how to securely code applications that are resilient to the common attack techniques hackers utilize.

PARTNERS

Security Innovations Secure Devops

Security Innovation (Cloud)





SENSITIVE DATA RECOVERY AND MANAGEMENT
ABOUT:
These solutions help identify the locations of sensitive data within on premise and cloud-based systems and databases and track movement of the data by tagging and alerting on data security policy violations. Additional capabilities allow for the remediation of the violations through several mechanisms including encryption, redaction, and quarantine.

PARTNERS

Spirion Sensitive data


Spirion (On Premise and Cloud)





SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
ABOUT:
These solutions collect system and appliance logs from multiple sources for central query capabilities and storage. Advanced security analytics are applied to the collected logs to identify the presence of unwanted behaviors or threats on the systems or network.

PARTNERS

AlertLogic SIEM


AlertLogic (Cloud, managed service)

Splunk SIEM

Splunk (Cloud and On Premise, unmanaged)




SINGLE SIGN-ON AND FEDERATION
ABOUT:
These solutions provide single sign on capabilities between unrelated applications and systems via an authentication proxy. This is typically achieved by a central authentication gateway which then provides access tokens to allowed applications.

PARTNERS

Cyber Ark Idaptive
Cyber Ark | Idaptive (Cloud)





THIRD PARTY RISK MANAGEMENT
ABOUT:
The purpose of the solution is to provide an external view of the threat and security posture of a company. Typically, these types of tools are used as a part of a 3rd party vendor management program but are also utilized for self-assessments. The posture of the target to be managed and scored is tracked over time and the specific reductions and improvements in the target posture are tracked and detailed.

EXTERNAL ASSET DISCOVERY
ABOUT:
This solution can also be utilized to discover internet exposed assets that may not be known or managed by a company.

PARTNERS

Panorays Third Party Vendor


Panorays (Cloud)




VIRTUAL MACHINES
ABOUT:
Widely utilized virtualization software to quickly deploy and scale secure systems and applications for on premise and cloud environments.

PARTNERS

VMWare Virtual Machine

VMWare (Cloud and On Premise)






VULNERABILITY SCANNING AND MANAGEMENT
ABOUT:
The purpose is to scan external and internal assets for the presence of known vulnerabilities. This is essential for any vulnerability management and patching program to identify and track vulnerabilities and which system are patched in between scans. Also includes the ability to perform automated web application scanning.

PARTNERS

Tenable Nessus Vulnerability


Tenable Nessus (Cloud and On Premise)

Qualys Vulnerability


Qualys (Cloud and On Premise)




WEB APPLICATION FIREWALLS
ABOUT:
A WAF is a purpose-built solution that protects against web based attacks such as SQL Injection, cross-site scripting, illegal resource access requests, and backdoors that hackers typically utilize to breach systems, introduce malware, and exfiltrate data. Additionally, WAFs may provide DDOS protection, load balancing, and content distribution management capabilities (CDM).

PARTNERS

Imperva Web Application Firewall WAF

Imperva (Cloud and On Premise)




DARK AND DEEP WEB THREAT MONITORING
ABOUT:
External Risk Protection from Threats Targeting Your People, Brand, and Assets. Continuously monitor thousands of data sources across the public, deep and dark web to gain the insights you need to detect and act on emerging cyber-physical threats before damage occurs.

PARTNERS

Constella

Constella Intelligence (Cloud)



HALOCK is a trusted cyber security and risk management consulting firm headquartered in Schaumburg, IL, near Chicago. HALOCK advises clients on reasonable information security strategies, risk assessments, third-party risk management (TPRM), penetration testing, security management,  architecture reviews, and HIPAA, Privacy, & PCI compliance throughout the US.

Contact Us