Technology Security Solution Partnerships
Partner Security Solutions Categories.
Proofpoint (Cloud or On-Premise)
Palo Alto (Cloud)
FILE AND DATABASE ENCRYPTION
FILE INTEGRITY MONITORING (FIM)
MULTIFACTOR AUTHENTICATION AND ACCESS (MFA)
Cisco/Duo Security (Cloud)
NETWORK MICRO-SEGMENTATION AND ASSET DISCOVERY
NEXT GENERATION FIREWALLS
Palo Alto (On Premise and Cloud)
PRIVILEGED ACCOUNT MANAGEMENT(PAM)
CyberArk (On Premise)
SECURE DEVOPS TRAINING
Security Innovation (Cloud)
SENSITIVE DATA RECOVERY AND MANAGEMENT
ABOUT: These solutions help identify the locations of sensitive data within on premise and cloud-based systems and databases and track movement of the data by tagging and alerting on data security policy violations. Additional capabilities allow for the remediation of the violations through several mechanisms including encryption, redaction, and quarantine.
Spirion (On Premise and Cloud)
SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
ABOUT: These solutions collect system and appliance logs from multiple sources for central query capabilities and storage. Advanced security analytics are applied to the collected logs to identify the presence of unwanted behaviors or threats on the systems or network.
AlertLogic (Cloud, managed service)
Splunk (Cloud and On Premise, unmanaged)
SINGLE SIGN-ON AND FEDERATION
ABOUT: These solutions provide single sign on capabilities between unrelated applications and systems via an authentication proxy. This is typically achieved by a central authentication gateway which then provides access tokens to allowed applications.
Cyber Ark | Idaptive (Cloud)
THIRD PARTY RISK MANAGEMENT
ABOUT: The purpose of the solution is to provide an external view of the threat and security posture of a company. Typically, these types of tools are used as a part of a 3rd party vendor management program but are also utilized for self-assessments. The posture of the target to be managed and scored is tracked over time and the specific reductions and improvements in the target posture are tracked and detailed.
EXTERNAL ASSET DISCOVERY
ABOUT: This solution can also be utilized to discover internet exposed assets that may not be known or managed by a company.
ABOUT: Widely utilized virtualization software to quickly deploy and scale secure systems and applications for on premise and cloud environments.
VMWare (Cloud and On Premise)
VULNERABILITY SCANNING AND MANAGEMENT
ABOUT: The purpose is to scan external and internal assets for the presence of known vulnerabilities. This is essential for any vulnerability management and patching program to identify and track vulnerabilities and which system are patched in between scans. Also includes the ability to perform automated web application scanning.
Tenable Nessus (Cloud and On Premise)
Qualys (Cloud and On Premise)
WEB APPLICATION FIREWALLS
ABOUT: A WAF is a purpose-built solution that protects against web based attacks such as SQL Injection, cross-site scripting, illegal resource access requests, and backdoors that hackers typically utilize to breach systems, introduce malware, and exfiltrate data. Additionally, WAFs may provide DDOS protection, load balancing, and content distribution management capabilities (CDM).
Imperva (Cloud and On Premise)
DARK AND DEEP WEB THREAT MONITORING
ABOUT: External Risk Protection from Threats Targeting Your People, Brand, and Assets. Continuously monitor thousands of data sources across the public, deep and dark web to gain the insights you need to detect and act on emerging cyber-physical threats before damage occurs.
Constella Intelligence (Cloud)
HALOCK is a trusted cyber security and risk management consulting firm headquartered in Schaumburg, IL, near Chicago. HALOCK advises clients on reasonable information security strategies, risk assessments, third-party risk management (TPRM), penetration testing, security management, architecture reviews, and HIPAA, Privacy, & PCI compliance throughout the US.