Technology Security Solution Partnerships

HALOCK Technology Partners
HALOCK partners with a select few security solutions to help our customer address gaps or enhance capabilities. HALOCK vets each vendor by extensively testing and evaluating the functionality, effectiveness, and security of the solution before adding to our partner roster.
Partner Security Solutions Categories.
GRC SaaS Platform for Risk Management | |||
PARTNER | |||
![]() Reasonable Risk |
EMAIL SECURITY | |||
PARTNER | |||
![]() Proofpoint (Cloud or On-Premise) |
ENDPOINT PROTECTION | |||
PARTNERS | |||
![]() VMWare/CarbonBlack (Cloud) | ![]() Palo Alto (Cloud) | ![]() Sophos (Cloud) |
FILE AND DATABASE ENCRYPTION | |||
PARTNERS | |||
![]() Atakama |
FILE INTEGRITY MONITORING (FIM) | |||
PARTNERS | |||
![]() Tripwire (On-Premise) |
MULTIFACTOR AUTHENTICATION AND ACCESS (MFA) | |||
PARTNERS | |||
![]() Cisco/Duo Security (Cloud) |
NETWORK MICRO-SEGMENTATION AND ASSET DISCOVERY | |||
PARTNERS | |||
![]() Gardicore (Cloud) |
NEXT GENERATION FIREWALLS | |||
PARTNERS | |||
![]() Palo Alto (On Premise and Cloud) |
PRIVILEGED ACCOUNT MANAGEMENT(PAM) | |||
PARTNERS | |||
![]() CyberArk (On Premise) |
SECURE DEVOPS TRAINING | |||
PARTNERS | |||
![]() Security Innovation (Cloud) |
SENSITIVE DATA RECOVERY AND MANAGEMENT ABOUT: These solutions help identify the locations of sensitive data within on premise and cloud-based systems and databases and track movement of the data by tagging and alerting on data security policy violations. Additional capabilities allow for the remediation of the violations through several mechanisms including encryption, redaction, and quarantine. | |||
PARTNERS | |||
![]() Spirion (On Premise and Cloud) |
SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) ABOUT: These solutions collect system and appliance logs from multiple sources for central query capabilities and storage. Advanced security analytics are applied to the collected logs to identify the presence of unwanted behaviors or threats on the systems or network. | |||
PARTNERS | |||
![]() AlertLogic (Cloud, managed service) | |||
![]() Splunk (Cloud and On Premise, unmanaged) |
SINGLE SIGN-ON AND FEDERATION ABOUT: These solutions provide single sign on capabilities between unrelated applications and systems via an authentication proxy. This is typically achieved by a central authentication gateway which then provides access tokens to allowed applications. | |||
PARTNERS | |||
![]() Cyber Ark | Idaptive (Cloud) |
THIRD PARTY RISK MANAGEMENT ABOUT: The purpose of the solution is to provide an external view of the threat and security posture of a company. Typically, these types of tools are used as a part of a 3rd party vendor management program but are also utilized for self-assessments. The posture of the target to be managed and scored is tracked over time and the specific reductions and improvements in the target posture are tracked and detailed. EXTERNAL ASSET DISCOVERY ABOUT: This solution can also be utilized to discover internet exposed assets that may not be known or managed by a company. | |||
PARTNERS | |||
![]() Panorays (Cloud) |
VIRTUAL MACHINES ABOUT: Widely utilized virtualization software to quickly deploy and scale secure systems and applications for on premise and cloud environments. | |||
PARTNERS | |||
![]() VMWare (Cloud and On Premise) |
VULNERABILITY SCANNING AND MANAGEMENT ABOUT: The purpose is to scan external and internal assets for the presence of known vulnerabilities. This is essential for any vulnerability management and patching program to identify and track vulnerabilities and which system are patched in between scans. Also includes the ability to perform automated web application scanning. | |||
PARTNERS | |||
![]() Tenable Nessus (Cloud and On Premise) | |||
![]() Qualys (Cloud and On Premise) |
WEB APPLICATION FIREWALLS ABOUT: A WAF is a purpose-built solution that protects against web based attacks such as SQL Injection, cross-site scripting, illegal resource access requests, and backdoors that hackers typically utilize to breach systems, introduce malware, and exfiltrate data. Additionally, WAFs may provide DDOS protection, load balancing, and content distribution management capabilities (CDM). | |||
PARTNERS | |||
![]() Imperva (Cloud and On Premise) |
DARK AND DEEP WEB THREAT MONITORING ABOUT: External Risk Protection from Threats Targeting Your People, Brand, and Assets. Continuously monitor thousands of data sources across the public, deep and dark web to gain the insights you need to detect and act on emerging cyber-physical threats before damage occurs. | |||
PARTNERS | |||
![]() Constella Intelligence (Cloud) |
2023 Cybersecurity and Regulatory Calendar Compliance requirements and proposed rules that may impact your organization, with resources and references to help you make informed decisions.
HALOCK is a trusted cyber security and risk management consulting firm headquartered in Schaumburg, IL, near Chicago. HALOCK advises clients on reasonable information security strategies, risk assessments, third-party risk management (TPRM), penetration testing, security management, architecture reviews, and HIPAA, Privacy, & PCI compliance throughout the US.
2023 Cybersecurity and Regulatory Calendar Compliance requirements and proposed rules that may impact your organization, with resources and references to help you make informed decisions.