Profit from our partners

3CX
3CX

3CX

3CX is an open-standard phone system, operating as a virtual phone system or cloud-based phone system on Windows or Linux, and offering all the advantages of a cutting-edge unified communications and collaboration solution: mobility, presence display, integrated web conferences, contact centre features and much more.

Companies of any size and in any industry benefit from the cost savings of VoIP, simple installation and management, and free choice of a VoIP provider. And all this at the best value for money on the market – a flexible and scalable solution, fully tailored to your needs.

acunetix
acunetix

Acunetix

Acunetix by Invicti Security is an application security testing tool built to help small & mid-size organizations around the world take control of their web security.

We believe in empowering security teams to reduce risk across all types of web applications with fast scanning, comprehensive results and intelligent automation.

We know the proper tools can bridge the gap between security and development to reduce tension, finger pointing, and re-work to create a culture of security.

AIShield Blue Black Logo Web
AIShield Blue Black Logo Web

AI Shield

AIShield, a Bosch corporate startup headquartered in Bengaluru, India, is on a mission to secure AI systems of the world. AIShield offers a full-stack AI AppSec Solution, providing protection and resilience for AI applications in the cloud and at the edge. The expertise encompasses comprehensive AI Security vulnerability assessment reports, deployable defense mechanisms, SaaS-based APIs, SDKs, and enterprise solutions. Operating with a DevOps approach, AIShield reduces vulnerability detection time from months to hours, MTTD (Mean Time to Detect) from months to seconds, and MTTR (Mean Time to Repair) from months to minutes. As a knowledge partner, AIShield assists organizations in ensuring regulatory compliance and security assurance.

apache
apache

Apache (Project)

The Apache HTTP Server Project is an effort to develop and maintain an open-source HTTP server for modern operating systems including UNIX and Windows. The goal of this project is to provide a secure, efficient and extensible server that provides HTTP services in sync with the current HTTP standards.

The Apache HTTP Server (“httpd”) was launched in 1995 and it has been the most popular web server on the Internet since April 1996. It has celebrated its 25th birthday as a project in February 2020.

apache_spam_assassin
apache_spam_assassin

Apache SpamAssassin

Apache SpamAssassin is the #1 Open Source anti-spam platform giving system administrators a filter to classify email and block spam (unsolicited bulk email).

It uses a robust scoring framework and plug-ins to integrate a wide range of advanced heuristic and statistical analysis tests on email headers and body text including text analysis, Bayesian filtering, DNS blocklists, and collaborative filtering databases.

Apache SpamAssassin is a project of the Apache Software Foundation (ASF).

apple
apple

Apple

Apple hardware, software and services work together perfectly to deliver a seamless user experience that just works. Workers can start a project on the Mac and finish it on the iPad, use side-by-side screens to expand the workspace, and even draw with the Apple Pencil on the iPad or use the iPhone for live updates on the Mac. And everything is compatible with Microsoft and Google apps, so the team can simply complete any task with ease.

apsec_partner
apsec_partner

Applied Security GmbH

Applied Security GmbH (known as ‘apsec’ for short) is one of Germany’s top 15 companies in the field of information security. apsec’s proprietary software products and consultancy services ensure all-round protection for your business.

Trust forms the foundation of a successful collaborative relationship. apsec’s professionalism, reliability and transparency has earned the company the trust of all of its clients. These are the qualities that are the basis of its success – qualities embodied by each member of its 60-strong workforce.

ARP-GUARD
ARP-GUARD

ARP-GUARD

In 2003, ISL became one of the first companies worldwide to begin developing and distributing software solutions for Network Access Control (NAC). ISL’s ARP-GUARD software enables renowned companies in trade, industry, banks, authorities, healthcare organisations and research institutions to protect their IT infrastructure against unnoticed intrusion by unauthorised devices or internal attacks. At its Bochum location, the ISL team continues to develop solutions to protect increasingly complex business networks with IT security ‘Made in Germany’.

ARTEC IT Solutions AG
ARTEC IT Solutions AG

ARTEC IT Solutions AG

ARTEC IT Solutions is a leading manufacturer of comprehensive data management, from the acquisition to efficient use and secure storage to legally compliant archiving of relevant company data.

In addition to the modular data management system EMA®, the high-performance mass storage VSTOR® and firegate VPN with ARTEC Trusted Computing technology for the secure connection of cloud services complete the range of services.

Aruba
Aruba

Aruba

Aruba has repeatedly been recognized by third party analysts as a leader in Wi-Fi 6, switching, SD-Branch, and a visionary in Data Center networking. The world’s largest companies rely on us to provide a secure, AI-powered edge services platform that spans across campus, branch, data center, and remote working environments.

AvePoint-Logo-Partner
AvePoint-Logo-Partner

AvePoint

Collaborate with Confidence. AvePoint provides the most advanced platform to optimize SaaS operations and secure collaboration. Over 17,000 customers worldwide rely on our solutions to modernize the digital workplace across Microsoft, Google, Salesforce and other collaboration environments. AvePoint’s global channel partner program includes over 3,500 managed service providers, value added resellers and systems integrators, with our solutions available in more than 100 cloud marketplaces. To learn more, visit www.avepoint.com.

(Quelle: https://www.finanznachrichten.de/nachrichten-2023-11/60626038-avepoint-inc-avepoint-announces-third-quarter-2023-financial-results-399.htm)

Gruppe 2399
Gruppe 2399

Barracuda

Barracuda’s wide range of high-performance network solutions are specifically designed to protect your threat vectors no matter where they reside. Whether it is a website, email, web application or mobile device, Barracuda has the tools necessary for you to secure and optimise your customer’s network perimeter.

Bromium
Bromium

Bromium

Bromium redefines endpoint protection with a new approach focused on micro virtualisation rather than detection. User-initiated processes, such as browser sessions or opening of email attachments, are run in an isolated environment based on the hardware virtualisation features of modern processors. This ensures that attacks do not reach their target and security loopholes – for example, in Adobe Flash, Java or Adobe PDF – cannot be exploited. The users are not constrained by restrictive policies and administrators have access to real-time forensic analysis. Bromium is the state-of-the-art product when it comes to protection from non-trusted zones, such as the internet.

burpsuite
burpsuite

Burp Suit by Portswigger

PortSwigger is a global leader in cybersecurity. We provide solutions that bring productivity, agility, reliability, and excellence to your web application security strategy.

Our products and research help tens of thousands of users worldwide find and remediate vulnerabilities to keep your applications up and running. No matter where you are in your security maturity journey, PortSwigger is here to help you secure the web.

Checkpoint
Checkpoint

Check Point

Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprises’ cloud, network and mobile devices.

CIS Secure Suite
CIS Secure Suite

CIS Secure Suite Service Member

CIS is home to the Multi-State Information Sharing and Analysis Center® (MS-ISAC®), the trusted resource for cyber threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial government entities, and the Elections Infrastructure Information Sharing and Analysis Center® (EI-ISAC®), which supports the rapidly changing cybersecurity needs of U.S. elections offices.

Premier Certified Partner
partner_cisco
partner_cisco

Cisco: Premier Certified Partner

Cisco Systems, Inc. is a leading global technology manufacturer in comprehensive data centre, network and security solutions, with a subsidiary in Switzerland.

As a Preferred Partner, we have worked with Cisco for more than 20 years in fields ranging from data centre (data centre network, rack server, blade server), enterprise networking, WLAN and collaboration to security (endpoint security, DNS security, email security).

Citrix
Citrix

Citrix

Citrix is a digital workspace platform that provides employees with everything they need to be productive, while IT departments benefit from transparency, simplicity and security for comprehensive control. Since 1989, Citrix has provided solutions for easy access to applications and content, so people can obtain the best results – no matter where or when. Today, more than 100 million users across 400,000 organisations – including 99% of the Fortune 500 – trust Citrix to provide a better way to work.

clamav
clamav

ClamAV

ClamAV® is an open source (GPL) anti-virus engine used in a variety of situations including email scanning, web scanning, and end point security. It provides a number of utilities including a flexible and scalable multi-threaded daemon, a command line scanner and an advanced tool for automatic database updates.

Commvault
Commvault

Commvault

Commvault was formed in 1988 as a development group within Bell Labs, and later designated as a strategic business unit of AT&T Network Systems. In 1996, it was incorporated as an independent company. In the 20 years since, it has experienced tremendous growth, pioneered numerous industry-shaping innovations and established itself as a respected leader in data and information management.

corero
corero

Corero

The Corero SmartWall Threat Defense System (TDS) is a family of appliances that eliminate Distributed Denial of Service (DDoS) threats in real-time. These appliances offer comprehensive protection against DDoS attacks in rapidly scalable implementations: for more performance, enhanced connectivity and with more functions than ever before.

cryptware
CyberArk Software
CyberArk Software

CyberArk Software

Today, privileged user accounts, such as administrator accounts, represent one of the biggest security issues for any organisation: whether in the hands of an external hacker or a disgruntled employee, a privileged account gives an attacker full control over all the organisation’s IT assets, allowing them to strike directly at the heart of the business. CyberArk’s modular platform is the industry’s most comprehensive security solution for privileged user accounts, delivering effective and proactive protection against cyber attacks before critical systems and sensitive data are affected.

Cyren
Cyren

Cyren

Cyren provides an array of proprietary technology, ranging from algorithms and behavioural analytics to big data, machine learning and advanced threats research.

By automating advanced analytics within the cloud, Cyren uses its extensive detection capability to identify and block threats faster than any other solution. Cyren is revolutionising internet security by using comprehensive cloud data to provide the fastest protection available. Industry leaders such as Google, Microsoft and Check Point trust Cyren to protect millions of users and billions of internet transactions every day.

Darktrace
Darktrace

Darktrace

Darktrace is a leading force in AI-based cybersecurity. The founding team set out to use its in-depth knowledge of mathematics and machine learning and its operational experience in the protection of critical national infrastructures to enable businesses to protect their systems against malicious cyber threats. Darktrace’s pioneering technology, Enterprise Immune System, applies AI to cybersecurity – a genuine first. The solution detects cyber threats where legacy systems fail.

Dell
Dell

Dell

Dell enables countries, communities, customers and individuals worldwide to use technology to realise their ideas. Customers trust Dell to deliver technology solutions that help them do and achieve more – at home, in the workplace, at school or in any other environment

DigiCert
DigiCert

DigiCert

At DigiCert, finding a better way to secure the internet is a concept that goes all the way back to our roots. That’s why our certificates are trusted everywhere, millions of times every day, by companies across the globe. It’s why our customers consistently award us the most five-star service and support reviews in the industry. And it’s why we’ll continue to lead the industry toward a more innovative and secure future. In SSL, IoT, PKI, and beyond—DigiCert is the uncommon denominator

Gruppe 2461
Gruppe 2461

DocuSign

Since its founding in 2003, DocuSign’s mission has been to accelerate business processes and make life a little easier for companies and people around the world.

efficient iP
efficient iP

efficient iP

In an era of virtualisation, cloud computing, mobility and the Internet of Things, the ability to make rapid network changes is increasingly important. Integrated DNS, DHCP and IP address management increase the availability of the IT infrastructure, help lower operational costs and underpin the agility of the business. efficient iP has developed a unique architecture that simplifies the deployment and administration of network services. efficient iP’s ‘SmartArchitecture’ is compatible with the Microsoft DNS & DHCP Server and automates the deployment of cutting-edge, resilient, robust and secure DNS and DHCP architectures.

emc2
emc2

EMC(neu Dell Technologies)

Whether you’re purchasing your first Dell EMC solution or have data centers around the world, Dell Technologies’ Enterprise Support Services can help you get the most out of your investment.

If you’re looking for immediate 24×7 troubleshooting from a support expert, proactive guidance from someone who knows your business, or a fully customized support experience that spans your global operations, Enterprise Support Services is for you.

Dell Technologies has more than 25 years of experience providing strategic advice and expert recommendations to our customers, as well as artificial intelligence built from over 70 million connected devices. This gives Dell Technologies the right combination of proactive, predictive and reactive capabilities to help you meet today’s and tomorrow’s challenges.

Gruppe 2506
Gruppe 2506

Ergon - Airlock

Airlock Suite deals with the issues of filtering and authentication in one complete and coordinated solution – setting standards for usability and services. Airlock, Ergon’s security product, was launched on the market in 2002 and is now used by 350 customers around the globe.

eset
eset

eset

ESET began life as a pioneer of antivirus protection, creating award-winning threat detection software. Now, the company has a much more ambitious goal: to ensure that everybody can enjoy the breathtaking opportunities offered by technology.

Today, its security solutions allow businesses and consumers in more than 200 countries and territories to make the most of the digital world.

Exagrid
Exagrid

Exagrid

ExaGrid is a recognised visionary, innovator and market leader in the field of secondary storage for backup.

ExaGrid’s Tiered Backup Storage takes a unique backup approach by meeting all requirements for backup performance, data restore performance, backup time window, disaster recovery and cost in advance and over time.

F5 Networks
F5 Networks

F5 Networks

F5 Networks established its reputation through its leading load balancer technology. Today F5 Networks’ BIG-IP platform offers various options to increase the trustworthiness and availability of applications. These include the global BIG-IP DNS load balancing solution for location-based acceleration and protection of IP DNS access, the intelligent application load balancer Local Traffic Manager (LTM), the web application firewall Application Security Manager (ASM), the ‘zero click’ remote access solution Application Access Policy Manager (APM) and WebSafe for access to web applications from non-trusted endpoints.

FAST LTA
FAST LTA

FAST LTA

FAST LTA’s products and services help SME customers to simplify data protection and migration, eliminate regulatory risk and mitigate long-term risk of data loss.

Flexera
Flexera

Flexera (ehemals Secunia)

Flexera gives companies clarity into their technology ‘black hole’, whether on-premise or in the cloud, helping turn valuable IT insight into action. With a portfolio of integrated solutions that deliver unparalleled technology insights, spend optimisation and agility, Flexera helps businesses optimise their technology environment. Enabling them to make full use of their IT potential and boost their business.

ForeScout CounterAct
ForeScout CounterAct

ForeScout CounterAct

ForeScout CounterAct offers real-time identification and permanent monitoring of network users, devices, operating systems and applications – even if you have no security agents installed. When a device has been identified, CounterAct supports the implementation of network access policies. ForeScout CounterAct enables you to coordinate and enhance security across all systems in your network.

Fortinet
Fortinet

Fortinet

Fortinet provides the security behind the world’s largest businesses, service providers and government organisations. Fortinet provides its customers with intelligent, seamless protection across the expanding attack surface and the ability to meet the ever-increasing performance requirements of the borderless network – today and in the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud or mobile environments.

genua
genua

Genua

genua GmbH ensures the IT security of digital infrastructures in complex, critical or regulated environments. In a dynamic and networked world, we make a contribution to the ability of companies and public organizations to act as well as to their sovereignty. We thereby ensure that the opportunities that this world offers can be used.

Hewlett Packard
Hewlett Packard

Hewlett Packard

Hewlett Packard helps businesses to achieve faster results by making optimal use of all their data – wherever they are – with Platform-as-a-Service solutions from Edge to cloud. For decades, we have been creating the future through innovation.

Our vision is to create technology that makes life better for everyone, everywhere – every person, every organisation and every community worldwide.

Huawei
Huawei

Huawei

Cybersecurity is a shared responsibility. Governments must define rules, end users must be able to use technology securely and the industry must take responsibility for bringing secure products to the market. Huawei has been evolving its cybersecurity strategy since 1999 to address this responsibility. We develop, produce and implement technology that systematically integrates security aspects into all business processes, from needs analysis and product definition to delivery and on-site customer service. A particularly important aspect is supply chain management and the control and safeguarding of production processes.

IBM
IBM

IBM

IBM offers a broad portfolio of business and technology services, designed to optimise business experiences.

Gruppe 2501
Gruppe 2501

IPSWITCH Whats UP Gold

Ipswitch is part of the Progress product portfolio. Progress is the leading provider of application development and digital experience technology.

Businesses are facing new challenges, ranging from devices with an internet connection that offer new forms of interaction and communication, to artificial intelligence, large data volumes and serverless data processing. They need to address these challenges and at the same time encourage the productivity of the development team and offer their end users the best experience. Progress is dedicated to providing the tools, services and platforms required by businesses to enable highly productive teams to deliver the very best high-end experiences.

isl
isl

ISL GmbH

ISL is a leading German software manufacturer in the field of IT security with a focus on network access control (NAC). Since 1999, we have been helping our customers arm themselves against the ever-increasing and changing IT security challenges. We have made it our business to protect know-how and resources by IT-Security Made in Germany – secure, reliable and trustworthy! Many years of NAC competence and innovative strength distinguish the team of ISL GmbH and let our company grow continuously. Our customers appreciate our flexibility and creative ideas when it comes to implementing the topic of NAC simply and efficiently.

ivanti
ivanti

Ivanti MobileIron

Ivanti announced the release of Ivanti Neurons™ for Patch Intelligence and Ivanti Neurons™ for Spend Intelligence. These solutions build on the Ivanti Neurons hyper‑automation platform, first announced in July 2020, which empowers organizations to autonomously self‑heal and self‑secure devices and self‑service end users. Ivanti Neurons enables the self‑healing autonomous edge with adaptive security and a contextualized, personalized experience for today’s remote workforce.

jamf
jamf

Jamf

Apple is becoming more and more popular and therefore the need for iPhones, iPads and Macs, which need to be provisioned, set up, configured and secured, is growing. With a Mobile Device Management (MDM) solution you cover the complete lifecycle management and can centrally manage even thousands of devices yourself. Managing Apple devices with Jamf means powerful functionality, configuration options and compatibility with existing tools. With our management solutions you can efficiently manage any number of Apple devices. Your end users will enjoy immediate work with a pre-configured device right out of the box, a personalized user experience and you won’t be overwhelmed with IT tickets anymore. A true win-win situation!

Kaspersky
Kaspersky

Kaspersky

The Kaspersky portfolio encompasses solutions to suit a wide range of customers. It covers all the cybersecurity needs of major organisations with its complete business platform, which helps prevent all types of cyber threats, detects even the most complex attacks, reacts to security incidents and predicts the threat landscape. In recognition of the needs of smaller organisations, it has developed a unique, multi-layer solution that is easy to manage and provides effective protection. Kaspersky also offers home customers a series of products to protect their privacy, money and other valuable assets.

Kemp
Kemp

Kemp

Say goodbye to consolidating multiple apps on a single load balancer. Kemp reduces the application blast radius by giving you a dedicated load balancer/ADC for each app or microservice across cloud and container environments.

Gruppe 2511
Gruppe 2511

Keyon

Keyon AG is a leading provider of solutions and services in the areas of IT security and customer-specific software development. The company, which has been operating since 1999, has implemented first-class references and a large number of strategic projects for the federal government and our customers in the areas of finance, insurance, trade, industry and telecommunications. They support their customers in all phases of the project and like to be measured by the success of their work.

Link
Link

Link11

Link11, based in Frankfurt am Main, is a German IT company with core competences in the fields of DDoS protection and server hosting. In 2011, Link11 successfully established a new and innovative product on the market in its cloud-based DDoS Protection platform. Link11’s patented DDoS solution protects any website or entire IP infrastructure against DDoS attacks. In 2016, Link11’s innovative DDoS protection solutions again earned the company the German Data Centre Award

linux
linux

Linux

The Linux Kernel Organization is a California Public Benefit Corporation established in 2002 to distribute the Linux kernel and other Open Source software to the public without charge. We are recognized by the IRS as a 501(c)3 private operating foundation.

macmon_logo
macmon_logo

macmon secure GmbH

macmon secure develops network security software, focussing on Network Access Control. Founded in 2003 macmon secure has grown form strength to strength, becoming the technology leader in the field of Network Access Control. Based in Berlin the macmon NAC solution is fully engineered in Germany. In 2014 due to ripening market conditions macmon expanded its presence into the European Market, opening up an office in the UK. Interest and demand has been strong with growth of more than 25% year on year.

Mailstore Logo
Mailstore Logo

Mailstore

As pioneers of standard email archiving software, we have been offering our customers a simple, safe, flexible, and scalable technology since 2006 to help them meet the requirements on the long-term storage and utilization of emails as an information resource.

McAfee
McAfee

McAfee

McAfee offers a broad portfolio of security solutions for all sizes of organisation, from SMEs to highly complex international corporations. McAfee Web Gateway provides powerful malware protection through browser code emulation on the gateway, a dual antivirus engine for effective protection against file-based malware, and a rule-based policy engine to cover virtually any business requirement. A hybrid cloud solution guarantees web protection for external employees without a connection to the organisation’s network. The ePolicy Orchestrator (ePO) is one of the industry’s leading solutions for assignment of endpoint security and flexible management of endpoint compliance.

Microsoft
Microsoft

Microsoft

Microsoft is the world’s leading manufacturer of standard software, services and solutions. Microsoft’s mission is to empower every person and every company on the planet to do more. Security and reliability, innovation and integration, and openness and interoperability are central to the development of all Microsoft products.

Gruppe 2499
Gruppe 2499

MOUNT10

MOUNT10 provides a fully automated, standardized data backup – via the internet into the mountain range. Suitable for individuals, small, medium and big businesses. The actual changes of the selected database are transmitted daily with high security into the SWISS FORT KNOX. MOUNT10 is compatible with various operating systems as well as databases and has an encryption of up to 256-bit AES.

Netapp
Netapp

Netapp

NetApp, Inc., previously known as Network Appliance, Inc., operates in the field of data storage and data management.

Netkey
Netkey

Netkey

Swiss software developer DBS AG, based in Wetzikon, has been working in the field of network technology for more than two decades. For years now, the small, friendly team of network development specialists has programmed high quality, efficient client management software for business environments, concentrating on software distribution, hardware and software inventory and help desk.

Its focus is exclusively on the client management segment: NetKey® – the efficient client management solution for SMEs

Nextcloud
Nextcloud

Nextcloud

Nextcloud offers the industry-leading, on-premises content collaboration platform.

Our technology combines the convenience and ease of use of consumer-grade solutions like Dropbox and Google Drive with the security, privacy and control business needs.

One Identity
One Identity

One Identity

One Identity, a Quest Software business, helps organisations with identity and access management (IAM) right. With a unique combination of offerings, including a portfolio of identity governance, access management, privileged management and Identity as a Service solutions, organisations can achieve their full potential – unimpeded by security, yet safeguarded against threats.

OpenText
OpenText

OpenText

OpenText is the leader in Enterprise Information Management, both on-premises and for cloud services. OpenText offers the only complete solution for Enterprise Information Management, with a comprehensive view of all information within an organisation.

openvas
openvas

OpenVAS

OpenVAS is a full-featured vulnerability scanner. Its capabilities include unauthenticated testing, authenticated testing, various high level and low level Internet and industrial protocols, performance tuning for large-scale scans and a powerful internal programming language to implement any type of vulnerability test.

The scanner is accompanied by a vulnerability tests feed with a long history and daily updates. This Greenbone Community Feed includes more than 50,000 vulnerability tests.

oracle
oracle

Oracle

Our mission is to develop a new perspective on data, discover new information, and realize previously unimagined possibilities.

Paessler
Paessler

Paessler

In PRTG, we have developed a monitoring solution that helps IT professionals to monitor their entire infrastructure around the clock. We also sponsor various IT-related events, such as the DevOps Camp and the Digital Festival.

Palo Alto Networks
Palo Alto Networks

Palo Alto Networks

The network security platform from Palo Alto Networks enhances the visibility of applications, users and content, reduces the attack surface and protects networks and systems from known and unknown threats. The platform includes solutions for decentralised organisations, for perimeter protection and for the virtualised data centre – from hardware-based and virtualised firewalls and centralised management to the ‘WildFire’ cloud, which identifies and blocks unknown threats. The unique single-pass architecture with function-specific hardware support guarantees high performance.

proofpoint
proofpoint

proofpoint

Proofpoint offers innovative, cloud-based cybersecurity solutions and protects businesses against highly developed, targeted attacks via different communication channels (email, mobile apps and social media). Proofpoint solutions help businesses to keep their environments free of malware, prevent the theft and loss of data, collect, securely store, manage and locate sensitive data for compliance or legal purposes, and to exchange data securely and communicate and collaborate with customers, partners and suppliers.

Pure Storage
Pure Storage

Pure Storage

Pure Storage helps innovators build a better world with data by providing them with a simple Evergreen platform that enables organisations of all kinds to use data in a meaningful and beneficial manner.

QNAP Systems
QNAP Systems

QNAP Systems

QNAP Systems, Inc., with headquarters in Taipei, Taiwan, offers a wide range of innovative network attached storage (NAS) and video surveillance solutions, based on the principles of ease of use, high security and flexible scalability. QNAP offers quality NAS products for home and business users, providing solutions for data storage, backup/snapshot, virtualisation, teamwork, multimedia and more. QNAP views NAS as more than ‘simple data storage’ and has created many NAS-based innovations to encourage users to host and develop the Internet of Things, artificial intelligence and machine learning solutions on their own QNAP NAS.

Qognify
Qognify

Qognify

Qognify is helping make the world a little safer today, driven by results for customers who place a premium on physical security. As a provider of solutions that make risks manageable, increase security and optimize operations, Qognify works with thousands of customers around the world as a trusted partner.

Qualys
Qualys

Qualys

It is vital to ensure that security loopholes in networks, servers, at the endpoint and in web applications are detected reliably – and to achieve this, it is vital to know how the infrastructure assets are configured. Qualys helps automate vulnerability and configuration assessments. The checks can be configured via a web-based portal and executed manually or automatically. The resulting reports not only list weaknesses but also offer concrete ideas for improvement. Qualys also offers a series of online services and private cloud appliances for SMEs and large organisations.

Gruppe 2497
Gruppe 2497

Quovadis

QuoVadis is a in Switzerland and internationally accredited Certification Service Provider (CSP) with worldwide recognition. The digital certificates from QuoVadis meet the requirements of the Swiss Electronic Signature Act (ZertES), comply with the European standard (ETSI) and meet global standards (WebTrust). QuoVadis is with SuisseID the official provider of the first standardized electronic identification of Switzerland.

Radar Services
Radar Services

Radar Services

Radar Cyber Security is one of Europe’s leading suppliers of detection and response solutions. Its portfolio centres around an in-house technology platform that forms the basis of its various managed security services. With security experts, processes and best practices, Radar Cyber Security also offers Cyber Defence Centre (CDC) or Security Operations Centre (SOC) ‘as a service’.

relution_logo
relution_logo

Relution

Relution by M-WAY Solutions is a vendor for integrated Enterprise Mobility Management software. Our main objective is to mobilize and enable enterprise IT, business units and app developers to easily deal with major tasks around App Lifecycle Management, Mobile Device Management, App Development Orchestration and Mobile Security.

RSA Security
RSA Security

RSA Security

RSA Authentication Manager, available as a hardware or virtual appliance, enables multi-factor authentication with hardware or software token, on-demand authentication via SMS and risk-based authentication – external employees and partners are protected by means of invisible two-factor authentication and behaviour analysis. The entire SecurID environment is administered centrally via a web portal. The solution offers outstanding interoperability: more than 400 tested and documented technology integrations guarantee inclusion in your existing system landscape.

Securepoint
Securepoint

Securepoint

Customers appreciate Securepoint’s combination of reliable concepts, secure products and innovative training programmes. Its multi-layer Unified Security strategy successfully identifies and defends against complex current and future threats. The manufacturer offers German IT security from a single source. Optimal linking of NextGen UTM Firewalls, Antivirus Pro, mobile security and email archiving protects the Unified Security networks and workplaces of small and medium-sized enterprises (SMEs) from threats.

Security Scorecard
Security Scorecard

Security Scorecard

SecurityScorecard was founded in 2013 and helps organisations visualise and manage their own risks and those of third parties. Security monitoring is continuous but non-intrusive, enabling a business to leverage operational control across its entire security ecosystem. It offers a comprehensively broad range of risk categories, including application security, malware, patching cadence and network security, plus knowledge of whether company users and their passwords can be found on the dark web.

SecurityScorecard is not a conventional vulnerability management tool, as it does not show the vulnerability of individual systems. It is a platform for the general rating of a business’ cybersecurity status.

Gruppe 2500
Gruppe 2500

Securosys

Securosys is a technology company dedicated to securing data and communications. It develops, produces, and distributes hardware, software and services that protect and verify data and their transmission. Securosys develops, programs, and builds its products in Switzerland. An important element in their product portfolio are the multi-functional digital key-vaults, the Hardware Security Module (Primus HSM). In addition to the HSM, related solutions such as HSM as a Service, VPN systems for fully encrypted communication as well as mesh/link encryptors belong to the portfolio.

SeeTec Videoüberwachung
SeeTec Videoüberwachung

SeeTec Videoüberwachung

Qognify’s comprehensive portfolio contains video management software and enterprise incident management solutions that optimise outcomes in vertical sectors, including manufacturing, transport, retail, education, finance, logistics, corrections, critical infrastructures and city, state and federal government. In 2018, Qognify acquired the OnSSI Group with its brands OnSSI and SeeTec, making it a leading global player in the physical security market.

SEPPmail & SwissSign
SEPPmail & SwissSign

SEPPmail & SwissSign

The SEPPmail Secure Email Gateway, a Swiss product, enhances data protection in electronic information exchange via email by enabling messages to be signed and encrypted automatically. SEPPmail supports compliance requirements such as EU DPD, SOX, PCI, Basel III, GLBA and HIPAA, reducing the risk of fines. With SEPPmail, trusted SwissSign certificates can be requested and managed automatically. SEPPmail can also be used as a rule engine for secure communication with Swiss Post’s IncaMail solution.

SOCRadar_Logo
SOCRadar_Logo

SOCRadar

Founded in 2019, SOCRadar is one of the fastest-growing SaaS cyber security companies in the world. As the pioneer of the Extended Threat Intelligence concept, SOCRadar brings three different services into a single Cloud-based platform, providing an early warning system against cyber threats and threat intelligence enriched with External Attack Surface Management and Digital Risk Protection. SOCRadar allows organizations to maximize the efficiency of their SOC teams with false-positive, free, actionable, and contextualized threat intelligence. Currently, more than 12,000 users in 190+ countries use the SOCRadar free edition for premium cyber threat intelligence. Learn more at SOCRadar.io

(Quelle: https://www.prnewswire.com/news-releases/socradar-announces-5m-series-a-funding-for-new-extended-threat-intelligence-xti-cybersecurity-platform-301765769.html )

SonicWALL
SonicWALL

SonicWall

The SonicWall Capture Cloud Platform seamlessly integrates security, management, analytics and real-time threat intelligence across the company’s portfolio of network, email, mobile and cloud security products. This approach enables our complete portfolio of high-performance hardware, virtual appliances and clients to harness the power, agility and scalability of the cloud.

Sophos
Sophos

Sophos

Our products enable you to protect all the endpoints in your network – laptops, virtual desktops, servers, internet and email traffic, and mobile devices. Protection is provided by products tailored to your specific needs. In securing your network, we offer what no one else can: simplicity.

Swiss made software
Symantec
Symantec

Symantec

The Symantec (Blue Coat) product portfolio enables tailor-made solutions for secure, fast internet use. Blue Coat PacketShaper optimises WAN and web performance and helps enhance user experience in an increasingly interactive, mobile and content-driven world, and at the same time avoids the additional costs of unnecessarily increased bandwidth. With the secure web gateway Blue Coat ProxySG, next-generation content analysis allows evaluation of users internet access, thus identifying dangerous content at an early stage and protecting sensitive data.

synology
synology

Synology

Synology is trusted by some of the best and brightest in the IT industry, and with over six million installations, we are committed to making enterprise data handling more elegant, simple, secure and reliable than ever. We offer a wide range of innovative and proven solutions and have a long track record of meeting ever-increasing customer expectations and demands.

Tenable
Tenable

Tenable Security

Cybersecurity is one of the existential threats of our time. New types of connected devices and computing platforms – from the cloud to IoT – have led to an explosion in the cyber attack surface. And while even more tools are collecting even more data, that doesn’t mean actionable insights are available to the CISO, senior management and the board. The previous method of simply scanning on-site IT devices for vulnerabilities is no longer sufficient. It’s time for a new approach.

Terra
Terra

Terra

TERRA products have stood for reliable and affordable high quality products from Germany for more than 30 years. The range includes all the devices you need for modern IT. All TERRA products feature a long service life and comprehensive services. Our TERRA service centre and service network of more than 1,000 TERRA service partner companies have been available to you since 1995.

Gruppe 2498
Gruppe 2498

Thales

Thales Cloud Protection & Licensing is a leading global provider of data protection solutions with more than 40 years of experience in protecting sensitive information. Keyon is a Platinum Partner of Gemalto/Thales and supports companies with the planning and integration of security solutions related to the secure creation and management of key materials (SafeNet HSM), encryption of file systems or virtual servers, and the tokenization of data.

tpsoc
tpsoc

The People side of change

We are a Primary Affiliate for Prosci® and offer a number of training programs and advisory services in change management. As a Primary Affiliate our trainers are trained and certified by the Prosci organization. We are skilled instructors and poised facilitators of Prosci’s change management programs.

thycotic
thycotic

thycotic

Do you want powerful, comprehensive privilege access management without missing out on the advantages of the cloud?

Welcome to Thycotic.

Toshiba
Toshiba

Toshiba

With the aid of cutting-edge computing technology and mathematical concepts, Toshiba aims to make data transfer more secure, worldwide. The secure transmission of sensitive data has never been more important than now, when technological advancements have created exponential growth in data volumes.

Gruppe 2502
Gruppe 2502

Totemo

The Swiss software company totemo ag offers under the umbrella of totemomail®, totemodata® and totemomobile® solutions for e-mail encryption, secure data exchange and secure mobile electronic communication for business and government. The enterprise-wide online communication with business partners and customers remains confidential, reliable and efficient – regardless of device or location.

Trend Micro
Trend Micro

Trend Micro

Protection against ever-evolving threats. Using advanced AI learning, Trend Micro stops ransomware so you can enjoy your digital life safely. It also protects against malware, online banking and shopping threats, and much more.

Tufin Technologies
Tufin Technologies

Tufin Technologies

Tufin specialises in simplifying security and compliance and accelerating network changes through automation. In addition to firewalls, it supports switches, load balancers, web proxies, cloud platforms and virtualised functions in the software-defined data centre. Its products include the Tufin Orchestration Suite for organisation-wide implementation of security policy in complex environments, SecureApp for security policy and application connectivity management, and SecureChange for the automation of firewall and router changes.

Ubiquiti
Ubiquiti

Ubiquiti

Ubiquiti, Inc. currently focuses on 3 main technologies: high-capacity distributed Internet access, unified information technology, and next-gen consumer electronics for home and personal use. The majority of the company’s resources consist of entrepreneurial and de-centralized R&D teams. Ubiquiti does not employ a traditional direct sales force, but instead drives brand awareness largely through the company’s user community where customers can interface directly with R&D, marketing, and support. With over 70 million devices shipped in over 200 countries and territories in the world, Ubiquiti aims to connect everyone to everything, everywhere. Ubiquiti was founded by former Apple engineer Robert Pera in 2005.

vectra
vectra

Vectra

Our AI was developed by an award-winning team of data scientists and security experts. We take a holistic view of security, capturing rich network metadata, enriching it with security intelligence gained through machine learning, and using it for all your detection and response application scenarios.

Veeam
Veeam

Veeam

The Veeam Software Group is an IT business that develops backup, disaster recovery and virtualisation management software for virtual VMware vSphere and Microsoft Hyper-V environments. The company’s headquarters are in Baar, Switzerland.

vmware
vmware

vmware

VMware paves the way for digital businesses to deliver a better customer experience and support employees to do their best work. Our software spans computing, cloud, networking and security, and the digital workspace.

Vodafone
Vodafone

Vodafone

As an innovative technology and service group, Vodafone Germany is the ideal partner for business customers. With Vodafone, you can be sure of high quality, cutting-edge solutions – tailored to your business. Looking to improve your business processes and customer relations? And be a competitive and innovative force on the market? Vodafone is happy to help you – with technology solutions designed for the future. Take advantage of its effective Ready Business solutions. Its applications in the fields of cloud and hosting, unified communications, security and Internet of Things ensure you are ideally equipped for the day-to-day challenges of the market – and one step ahead of the competition.

Gruppe 2507
Gruppe 2507

Wortmann

As a distributor and manufacturer, WORTMANN AG and its more than 500 employees serve around 8,000 specialist dealers and system houses throughout Europe. The own brand TERRA, with its PCs, notebooks, servers, storage, ThinClients and LCDs is assembled in Germany and has its own partner service network as well as a central service center at the production site.

Partner Logo_XM Cyber
Partner Logo_XM Cyber

XM Cyber

XM Cyber is the global leader in Attack-Centric Exposure Prioritization that closes gaps in cloud and physical network security. Customers can rapidly identify and respond to cyber risks affecting their business-sensitive systems because the platform continuously calculates every potential attack path.

Zertificon
Zertificon

Zertificon

The Z1 product portfolio includes solutions for server-based email encryption and signature (Z1 SecureMail Gateway) and a client-based variant for end-to-end encryption of emails (Z1 SecureMail End2End). Other products take care of PKI certificate management (Z1 CertServer) and the secure transfer of large files (Z1 SecureHub).

Zimbra
Zimbra

Zimbra

Zimbra is a mail server software that enables permanent availability of emails, contacts and tasks. With Zimbra, you have worldwide access to your data at any time. You can take your office with you, wherever you are. Whether you want to view your emails on your smartphone or manage appointments via the web browser, with Zimbra you’re always in the loop.

Zyxel
Zyxel

Zyxel

Focused on innovation and customer-centricity, Zyxel has been connecting people to the internet for nearly 30 years. It promotes creativity that meets the needs of customers. This spirit has never changed since Zyxel developed the world’s first integrated 3-in-1 data/fax/voice modem in 1992. The company’s ability to adapt and innovate with networking technology places it at the forefront of connectivity for telco/service providers, businesses and home users.

Download

Thank you for your interest!

You can download the product sheet by clicking the button below.