Manufacturers & Partners
Manufacturers & Partners
In order to guarantee quality for our clients, we also rely on close partnerships with our suppliers and resellers. We believe that real success can only be achieved in a team. For us, partnership means continuous client and supplier relationships, trust and the resulting win-win situation.
Ergon's Airlock Secure Access Hub combines filtering and authentication in a coordinated overall solution that sets standards in terms of usability and services. Airlock WAF (Web Application Firewall) reliably protects internet applications with systematic control and filtering mechanisms and a wide range of expansion options.
Check Point Software Technologies Ltd. is the world’s leading provider of internet security solutions. The company is the global VPN and firewall market leader. The next generation product line from Check Point provide a wide range of intelligent security solutions for perimeters, internal networks and the web.
Cortex SOAR is a comprehensive, Security Operations Platform to combine security orchestration, incident management and interactive investigation. Demisto’s orchestration engine automates security product tasks and weaves in the human analyst tasks and workflows. Demisto enables security teams to reduce MTTR, create consistent incident management process and increase analyst productivity.
Cybereason, creator of a Cyber Defense Platform, offers endpoint prevention, detection and response and active monitoring. The solution delivers multi-layered endpoint prevention by leveraging signature and signatureless techniques to prevent threats in conjunction with behavioral and deception techniques to prevent ransomware and fileless attacks. Cybereason is a privately held, international company, HQ in Boston, with customers in more than 30 countries.
Delinea (former Centrify) enhances corporate security by managing user identities and protecting them against cyber-attacks. Its platform of integrated software and cloud-based services lets Delinea provide secure and uniform identity management for end users and privileged users in today’s hybrid IT world of the cloud, mobile devices and data centers.
Elasticsearch is the world’s leading free and open search and analytics solution for all types of data, including textual, numerical, geospatial, structured, and unstructured. Commonly referred to as the ELK Stack (after Elasticsearch, Logstash, and Kibana), the Elastic Stack now includes a rich collection of lightweight shipping agents known as Beats for sending data to Elasticsearch. With the integrated SIEM and Endpoint Protection Elastic is covering also all your need is the cybersecurity space.
Fortinet delivers high-performance network security solutions that protect your network, users, and data from continually evolving threats. Our broad portfolio of top-rated solutions and centralized management enables security consolidation and delivers a simplified, end-to-end security infrastructure.
Simulated phishing, smishing, malware, ransomware and more: Lucy puts your IT security to the test by simulating realistic internet attacks. As humans are often the weakest point within your total firewall arrangements, Lucy awareness trainings help to minimize the risk and to protect both employees and organizations.
All customer data remains in Switzerland and is not stored abroad.
With Microsoft Security, you can protect your enterprise with integrated security, compliance, and identity solutions. Whether users, data or infrastructure, with Microsoft Defender you have the right solution for different platforms and cloud providers. Correlate the data of your organization with Microsoft Sentinel and benefit from artificial intelligence. So you detect and stop attacks before they cause damage.
One Identity helps organizations get identity and access management (IAM) right. The portfolio includes identity governance, access management, privileged management and identity as a service.
Former Attivo Networks, now part of SentinelOne, supports customers in cyber deception and attacker lateral movement detection. Deception and Denial work hand-in-hand to prevent and detect discovery, lateral movement, and privilege escalation attack activities. While deception misdirects attacks and gathers critical adversary intelligence, denial prevents attackers from seeing and exploiting information to progress their attack and compromise sensitive data.
The multiple award-winning e-mail encryption appliances within the SEPPmail portfolio guarantee professional, cost-effective and fit-for-the-future solutions for secure and user-friendly e-mail communication. SEPPmail applications are the result of more than 10 years of technology design and application experience, as well as the continued implementation of a pioneering and patented systems architecture.
Splunk offers the leading platform for operational intelligence. With Splunk, prospective parties can take a closer look at exactly what others ignore, namely machine data, and thus gain insights that remain hidden from others: You gain insights that make your company more productive, more profitable, more competitive and safer.
Since 2009, terreActive has been a Splunk partner, currently with the highest status as an elite partner.
tacLOM, the monitoring software from terreActive, uses synergies from log management and system monitoring to create a comprehensive image of the IT infrastructure. Pre-defined event packs, threat intelligence and monitoring templates quickly create transparency for those responsible for operations and security and enable them to quickly find the relevant events and directly alert them.
Tenable is the exposure management company. Some 40,000 organizations from around the world rely on Tenable to detect and mitigate cyber risks. As the creator of Nessus, Tenable has extended its vulnerability management expertise to provide the world's first platform to detect and secure any digital asset on any computing platform. terreActive is a Gold Partner and offers Tenable as a solution for audits, as well as within SOC services as Vulnerability Management-as-a-Service.
Thales secures business decisive technology for decisive moments. People rely on Thales to safeguard their privacy and to protect cloud, data and software. When it comes to data security, organizations are faced with an increasing amount of decisive moments. Whether the moment is building an encryption strategy, licensing software, trusted access to the cloud, or meeting compliance mandates – you can rely on terreActive and Thales to secure your digital transformation.
Vectra provides continuous, automated security monitoring for entire organizations – from office environments to data centers and the private cloud. Our solutions reliably and proactively detect cyber attacks on your network that would have remained hidden and unknown before.