Technology Security Solution Partnerships

Partnering with the Best-in-Class

Partner Security Solutions Categories.

Reasonable Security Solution Email Security

EMAIL SECURITY
ABOUT:
This is a technology that inspect incoming and outgoing email from your email provider to identify spam, malware and URL based threats, and phishing campaigns from reaching users and preventing further damage even if the user has received malicious emails.

>PARTNER
Proofpoint Email Security
Proofpoint (Cloud or On-Premise)

Reasonable Cyber Security Solution Endpoint Protection

ENDPOINT PROTECTION
ABOUT:
Agent-based solutions that provide combined malware protection and endpoint response and detection capabilities to prevent the infection and lateral spread of malicious activity as well as incident response capabilities such as endpoint isolation and remote investigation capabilities.

>PARTNERS

VMWare CarbonBlack Endpoint protection
VMWare/CarbonBlack (Cloud)
Malwarebytes Endpoint protection
Malwarebytes (Cloud)

Palo Alto Endpoint protection
Palo Alto (Cloud)

Sophos Endpoint protection
Sophos (Cloud)

Reasonable Security Solution File and Database Encryption

FILE AND DATABASE ENCRYPTION
ABOUT:
These solutions allow for more granular/targeted encryption of structure and unstructured data such as a specific document, folder, or database tables and fields. This is beyond the capabilities of whole disk encryption solutions and allows for advanced access control to the encrypted data.

>PARTNERS
Thales/Gemalto File and Database Encryption
Thales/Gemalto (On-Premise)

Reasonable Security Solution File Integrity Monitoring FIM

FILE INTEGRITY MONITORING (FIM)
ABOUT:
A FIM solution watches for changes to sensitive or business critical files or code base and provides alerts on change activity to be investigated. This is a requirement for PCI DSS.

>PARTNERS
Thales/Gemalto File Integrity Monitoring (FIM)
Tripwire (On-Premise)

Reasonable Security Solution Multifactor Authentication and Access

MULTIFACTOR AUTHENTICATION AND ACCESS (MFA)
ABOUT:
The purpose is to enhance security of authentication across multiple applications by requiring additional factors from the user for successful authentication.

>PARTNERS
Cisco/Duo Security Multi-Factor Authentication and access (MFA)
Cisco/Duo Security (Cloud)

Reasonable Security Solution Network Micro-Segmentation and Asset Discovery

NETWORK MICRO-SEGMENTATION AND ASSET DISCOVERY
ABOUT:
These solutions proactively identify assets on your network and allow for the granular implementation of segmentation via software agents. This eliminates the need to upgrade firewall hardware and software and allows for simpler network segmentation that will not require the re IP of deployed systems and devices.

>PARTNERS
Gardicore Network Micro-Segmentation and Asset Discovery
Gardicore (Cloud)

Reasonable Security Solution Next Gen Firewalls

NEXT GENERATION FIREWALLS
ABOUT:
Next gen firewalls enhance border security by allowing for more granular control of traffic between networking segments. This is accomplished by identifying which applications and users are accessing resources through the firewall and allowing for granular policy to be applied based on applications and users vs. the traditional port and protocol of legacy firewalls. Next gen firewalls also include Intrusion Detection and Prevention, URL Filtering, advanced malware sandboxing and behavior analytics, as well as packet capturing.

>PARTNERS

Palo Alto Next generation firewalls
Palo Alto (On Premise and Cloud)

Sophos Next generation firewalls
Sophos (On Premise)

Reasonable Security Solution Privileged Account Management (PAM)

PRIVILEGED ACCOUNT MANAGEMENT(PAM)
ABOUT:
A PAM solution manages identified privilege account passwords by rotating passwords, forcing check-in and check outs of credentials, and auditing access using administrative accounts. Additionally, they may provide remote access capabilities similar to remote desktop and session recording which can be especially useful for monitoring access from contractors or third parties.

>PARTNERS

Centrify Privileged Account Management (PAM)
Centrify (Cloud)

Cyberark Privileged Account Management (PAM)
Cyber-Ark (On Premise)

Reasonable Security Solution Secure Devops Training

SECURE DEVOPS TRAINING
ABOUT:
Training for developers should always include how to securely code applications that are resilient to the common attack techniques hackers utilize.

>PARTNERS

Security Innovations Secure Devops
Security Innovation (Cloud)

Reasonable Security Solution Sensitive data discovery and management

SENSITIVE DATA RECOVERY AND MANAGEMENT
ABOUT:
These solutions help identify the locations of sensitive data within on premise and cloud-based systems and databases and track movement of the data by tagging and alerting on data security policy violations. Additional capabilities allow for the remediation of the violations through several mechanisms including encryption, redaction, and quarantine.

>PARTNERS

Spirion Sensitive data
Spirion (On Premise)

Reasonable Security Solution Security Information and Event Management SIEM

SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
ABOUT:
These solutions collect system and appliance logs from multiple sources for central query capabilities and storage. Advanced security analytics are applied to the collected logs to identify the presence of unwanted behaviors or threats on the systems or network.

>PARTNERS

AlertLogic SIEM
AlertLogic (Cloud, managed service)

LogRhythm SIEM
LogRhythm (On Premise, unmanaged)

Splunk SIEM
Splunk (Cloud and On Premise, unmanaged)

Reasonable Security Solution Single Sign-on and Federation

SINGLE SIGN-ON AND FEDERATION
ABOUT:
These solutions provide single sign on capabilities between unrelated applications and systems via an authentication proxy. This is typically achieved by a central authentication gateway which then provides access tokens to allowed applications.

>PARTNERS

Idaptive Single Sign-on
Idaptive (Cloud)

Reasonable Security Solution Third Party Vendor Management and Scoring

THIRD PARTY VENDOR MANAGEMENT AND SCORING
ABOUT:
The purpose of the solution is to provide an external view of the threat and security posture of a company. Typically, these types of tools are used as a part of a 3rd party vendor management program but are also utilized for self-assessments. The posture of the target to be managed and scored is tracked over time and the specific reductions and improvements in the target posture are tracked and detailed.

>PARTNERS

Panorays Third Party Vendor
Panorays (Cloud)

Reasonable Security Solution Virtual Machines

VIRTUAL MACHINES
ABOUT:
Widely utilized virtualization software to quickly deploy and scale secure systems and applications for on premise and cloud environments.

>PARTNERS

VMWare Virtual Machine
VMWare (Cloud and On Premise)

Reasonable Security Solution Vulnerability scanning and management

VULNERABILITY SCANNING AND MANAGEMENT
ABOUT:
The purpose is to scan external and internal assets for the presence of known vulnerabilities. This is essential for any vulnerability management and patching program to identify and track vulnerabilities and which system are patched in between scans. Also includes the ability to perform automated web application scanning.

>PARTNERS

Tenable Nessus Vulnerability
Tenable Nessus (Cloud and On Premise)

Qualys Vulnerability
Qualys (Cloud and On Premise)

Reasonable Security Solution Web application firewalls (WAF)

WEB APPLICATION FIREWALLS
ABOUT:
A WAF is a purpose-built solution that protects against web based attacks such as SQL Injection, cross-site scripting, illegal resource access requests, and backdoors that hackers typically utilize to breach systems, introduce malware, and exfiltrate data. Additionally, WAFs may provide DDOS protection, load balancing, and content distribution management capabilities (CDM).

>PARTNERS

Imperva Web Application Firewall WAF
Imperva(Cloud and On Premise)

HALOCK, a trusted cyber security consulting firm headquartered in Schaumburg, IL, near Chicago, advises clients on reasonable information security strategies, risk assessments, third-party risk management (TPRM), penetration testing, security management,  architecture reviews, and HIPAA, Privacy, & PCI compliance throughout the US.

Reasonable Security Sensitive Data Scanning Ransomware

Contact Us