Q1 Labs' Security Intelligence Partner Program accelerates the integration of security events, asset, vulnerability and configuration information to the QRadar Security Intelligence Platform and ensures a higher level of integration, pre-release update of events and joint troubleshooting between partnering vendors.
This partnership creates an engineering, support and product level connection between partnering vendors to share information like never before for the benefit of our joint customers. This means setup documentation that is written and updated by the product vendor, data feeds using the fastest and most efficient methods and joint testing and training between partners. In many cases there is bi-directional integration between products and even multiple integration points between products.
Together with our partners, we are able to deliver more powerful correlation across the data. This is achieved because our Security Intelligence Partner Program community have integrated their products with enhanced formats for data transfer including LEEF (Log Event Enhanced Format), AXIS (Asset Exchange Information Souce) and other Q1 Labs' standard formats. The SIPP program facilitates customer deployments by automating and integrating disparate security products' data.
Applied Security is an information security software and services firm, dedicated to protecting corporate data. We address security and privacy threats for data breach and regulatory challenges internationally through encryption and access controls. Our solutions secure data at rest and in motion from your USB Drive to The Cloud while our services division provides complete coverage for strategic planning, assessments, audits, and custom secure application integrations. Applied Security GmbH is headquartered in Stockstadt, Germany and can be reached at: Tel. +49 (0)6027 4067 0 | Fax. +49 (0)6027 4067 99 | E-Mail: email@example.com
Barracuda Networks Inc. combines premises-based gateways and software, virtual appliances, cloud services, and sophisticated remote support to deliver comprehensive content security, data protection and application delivery solutions. The company's expansive product portfolio includes offerings for protection against email, Web and IM threats as well as products that improve application delivery and network access, message archiving, backup and data protection.
Bit9 is the leader in Advanced Endpoint Protection. The company's award-winning Application Whitelisting solutions provide total visibility and control over all software on endpoints, eliminating the risk caused by malicious, illegal and unauthorized software. Bit9 specializes in protecting organizations against the Advanced Persistent Threat.
Bradford Networks offers the best network security solutions for evolving IT environments. The company's flexible Network Sentry platform is the first network security offering that can automatically identify and profile all devices and all users on a network, providing complete visibility and control. Unlike vendor-specific network security products, Network Sentry provides a view across all brands of equipment and devices so nothing falls through the cracks. Hundreds of customers and millions of users worldwide rely on Bradford to secure their IP networks.
CORE Security is the leading provider of predictive security intelligence solutions for enterprises and government organizations. We help more than 1,400 customers worldwide preempt critical security threats throughout their IT environments, and communicate the risk the threats pose to the business. Our patented, proven, award-winning enterprise solutions are backed by more than 15 years of applied expertise from CoreLabs, the company's innovative security research center.
Cyber-Ark® Software is a global information security company specializing in protecting and managing privileged users, sessions, applications and sensitive information. Its Privileged Identity Management, Sensitive Information Management and Privileged Session Management Suites, enable organizations to effectively manage and govern datacenter access and activities, whether on-premise, off-premise or in the cloud.
Damballa protects businesses from bot-driven targeted attacks used for organized, online crime. Our unique, global approach rapidly isolates the command-and-control needed to launch botnet attacks. These signatureless solutions improve security both inside and outside the network perimeter, stop threats other technologies miss and restore control to legitimate owners. Damballa identifies the severity and intent of these targeted attacks, even when malware can't be detected. Our products and services provide a critical window for orderly remediation and integrate easily into existing infrastructure without requiring additional headcount or complexity.
Enterasys delivers Secure Networks™ that ensure the confidentiality, integrity and availability of IT services to the business users that rely on them - without sacrificing performance. You don't have to choose whether to deploy security at the edge, around the middle or in the core of the data center - it's built-in everywhere with granular, policy-based visibility and control over individual users and applications.
F5 Networks, Inc., the global leader in Application Delivery Networking (ADN), helps the world's largest enterprises and service providers realize the full value of virtualization, cloud computing, and on-demand IT. F5® solutions help integrate disparate technologies to provide greater control of the infrastructure, improve application delivery and data management, and give users seamless, secure, and accelerated access to applications from their corporate desktops and smart devices. An open architectural framework enables F5 customers to apply business policies at "strategic points of control" across the IT infrastructure and into the public cloud. F5 products give customers the agility they need to align IT with changing business conditions, deploy scalable solutions on demand, and manage mobile access to data and services. Enterprises, service and cloud providers, and leading online companies worldwide rely on F5 to optimize their IT investments and drive business forward.
FairWarning® is a global leader in appliance-based software solutions which monitor and protect patient privacy in electronic health records enabling healthcare providers and health information exchanges to confidentially connect physicians, clinics, patients and affiliates. FairWarning®'s turn-key privacy auditing solutions are compatible with healthcare applications from every major vendor including Allscripts, Cerner, Epic, GE, McKesson, MEDITECH, Siemens, and many others. Customers consider FairWarning® privacy auditing solutions essential for compliance with healthcare privacy regulations such as ARRA HITECH privacy and meaningful use criteria, HIPAA, EU Data Protection, UK Data Protection Act, California SB 541 and AB 211, and Canadian provincial healthcare privacy law.
FireEye protects critical data, intellectual property, and resources against 0-day, targeted malware attacks that are costing enterprises, institutions, and governments billions of dollars in losses. Today's sophisticated malware employs such a wide range of evasive and disruptive tactics that it has made traditional network and host-based security obsolete. FireEye's real-time, multi-protocol content analysis within virtual machines is the only integrated defense able to accurately identify these zero-day, targeted attacks. By utilizing inbound and outbound deep packet inspection within virtual machines, FireEye provides accurate, actionable alerts while also eliminating false positives to enhance IT productivity.
ForeScout is the leading provider of automated security control solutions for Fortune 1000 enterprises and government organizations. ForeScout CounterACT platform for network access control, mobile security, endpoint compliance and threat prevention empower organizations to gain access agility while preempting risks and eliminating remediation costs. Because our solutions are easy to deploy, unobtrusive, intelligent and scalable, they have been chosen by over 1300 of the world's most secure enterprises and military installations for global deployments spanning 37 countries. ForeScout provides IT organizations real-time visibility and control over all users and their devices accessing network resources and assures endpoint security policy adherance.
Great Bay Software's Beacon Endpoint Profiler™ is the reference standard for Endpoint Profiling, Network Endpoint Discovery, Rogue Detection and Identity Monitoring of enterprise endpoints. In addition, Great Bay Software's technology enables the rapid and successful deployment and management of 802.1X and Network Admission Control (NAC) systems. By solving critical challenges at the time of deployment and improving the operational efficiency of all endpoint security systems, Great Bay Software's Beacon Endpoint Profiler and Device Sponsorship are critical components of pre-deployment discovery, deployment time risk avoidance, and ongoing operational efficiency of maintaining an authenticated system.
More organizations trust Imperva to protect their business applications and databases than any other vendor. Only Imperva delivers innovative technology to give full audit accountability and separation of duties to meet regulatory compliance. The award-winning Imperva SecureSphere is the only solution that delivers full activity monitoring from the database to the accountable application user.
Invincea is the premier innovator in advanced malware threat detection, end-user threat protection, and pre-breach forensic analysis. Invincea is the only solution on the market that provides enterprise networks with coverage against the largest attack surface for cyber-breach - attacks aimed at users in the form of spear-phishing, poisoned search results, and user-initiated infections.
From devices to data centers, from consumers to the cloud, Juniper Networks delivers innovative software, silicon and systems that transform the experience and economics of networking. The company serves more than 30,000 customers and partners worldwide, and generated more than $3 billion in revenue over the last year.
Lieberman Software released its first commercial product in 1994, but traces its roots back to 1978 when it was founded as a software consultancy. Since its inception, Lieberman Software has been a profitable, management owned firm. It has consistently provided unique solutions that fill the niche of managing local and domain security. For years, Lieberman Software products have been the choice of organizations concerned with locating and remediating problems occurring within the IT infrastructure, where rapid and comprehensive response is crucial.
Founded by security visionary Nir Zuk, Palo Alto Networks offers real innovation in the firewall by enabling unprecedented visibility and control of applications and content - by user, not just IP address - at up to 10Gbps with no performance degradation. Based on patent-pending App-ID™ technology, our next generation firewalls accurately identify applications - regardless of port, protocol, evasive tactic or SSL encryption - and scan content to stop threats and prevent data leakage. Enterprises can for the first time embrace Web 2.0 and maintain complete visibility and control, while significantly reducing total cost of ownership through device consolidation.
Raz-Lee Security is the leading security solution provider for IBM i (iSeries / AS400) servers. iSecurity, Raz-Lee's security, auditing and compliance suite, helps companies protect valuable information assets against insider threat and unauthorized external access. iSecurity's comprehensive coverage includes network security, QAUDJRN monitoring and reporting, all aspects of user and authorities management and full security of critical data in business-critical applications. Raz-Lee's solutions enable enterprises to comply with the requirements of PCI, Sarbanes-Oxley (SOX), HIPAA and site-specific compliance and auditing requirements.
iSecurity's solutions integrate naturally with SIEM products such as Q1Labs via Syslog and SNMP security-related alerts and, in addition, can issue e-mail, SMS, message queue and Twitter messages and execute pre-defined corrective scripts.
Stonesoft Corporation delivers software based, dynamic and customer driven network security solutions that secure information flows and simplify security operations for distributed organizations. Stonesoft customers include enterprises requiring advanced network security and always-on business connectivity. Company's product portfolio consists of standalone next generation firewalls and intrusion prevention systems, SSL VPN products and the industry's first transformable security engine. All of those products send their logs to Stonesoft Log Server that can be configured to forward the logs to QRadar in LEEF format.
Verdasys (Twitter: @Verdasys_Inc) provides Enterprise Information Protection (EIP) solutions that secure proprietary and sensitive data and the integrity of business processes essential for Global 2000 companies to successfully compete in today's highly collaborative and mobile environments. Digital Guardian, recognized as a Leader in Gartner's 2011 Magic Quadrant for Content-Aware Data Loss Prevention, is a proven technology platform that provides complete policy-based data lifecycle monitoring, classification, forensics, and control on endpoints and servers; virtual machines and enterprise applications; mobile devices; and cloud environments. Digital Guardian is offered as an in-house or managed service solution to protect IP and regulated data from compromise by privileged insiders, strategic partners, and targeted cyber attacks. Since 2003, millions of Digital Guardian agents have been deployed to protect critical data for global leaders in financial services, insurance, technology, manufacturing, and healthcare industries.
Matt WardSenior Product Manager781firstname.lastname@example.org