Manufacturers & Partners

Manufacturers & Partners

In order to guarantee quality for our clients, we also rely on close partnerships with our suppliers and resellers. We believe that real success can only be achieved in a team. For us, partnership means continuous client and supplier relationships, trust and the resulting win-win situation.

Ergon's Airlock Secure Access Hub combines filtering and authentication in a coordinated overall solution that sets standards in terms of usability and services. Airlock WAF (Web Application Firewall) reliably protects internet applications with systematic control and filtering mechanisms and a wide range of expansion options.

Airlock_Secure Access Hub

C2SEC Inc. provides innovative cloud solutions to improve security posture in the dynamic digital landscape. Specializing in Extended Security Posture Management (XSPM), the SaaS platform integrates external attack surface management, cloud security posture management (multi-cloud providers), Software-as-a-Service (SaaS) - specifically for M365 - and supply chain security management. This integration provides security leaders with unprecedented visibility, context and control over their entire security landscape.

C2SEC Logo

Check Point Software Technologies Ltd. is the world’s leading provider of internet security solutions. The company is the global VPN and firewall market leader. The next generation product line from Check Point provide a wide range of intelligent security solutions for perimeters, internal networks and the web.

Logo Check Point

Cisco’s innovative security solutions deliver highly secure firewall, web and email services while simultaneously providing unrestricted mobility.

Logo Cisco

Cortex SOAR is a comprehensive, Security Operations Platform to combine security orchestration, incident management and interactive investigation. Demisto’s orchestration engine automates security product tasks and weaves in the human analyst tasks and workflows. Demisto enables security teams to reduce MTTR, create consistent incident management process and increase analyst productivity.

Cortex Logo

Cybereason, creator of a Cyber Defense Platform, offers endpoint prevention, detection and response and active monitoring. The solution delivers multi-layered endpoint prevention by leveraging signature and signatureless techniques to prevent threats in conjunction with behavioral and deception techniques to prevent ransomware and fileless attacks. Cybereason is a privately held, international company, HQ in Boston, with customers in more than 30 countries.

Cybereason Logo

Delinea (former Centrify) enhances corporate security by managing user identities and protecting them against cyber-attacks. Its platform of integrated software and cloud-based services lets Delinea provide secure and uniform identity management for end users and privileged users in today’s hybrid IT world of the cloud, mobile devices and data centers.


DomainTools is a globally established provider of Internet intelligence and is the first port of call for security managers who want to know what threats are coming from the network. Experienced security teams use DomainTools solutions to identify external risks, investigate threats and proactively protect their organizations in an ever-evolving threat landscape.

DomainTools Logo

Econis AG is a Swiss technology and service company headquartered in Dietikon and offers highly available and scalable IT solutions and services. Customers benefit from many years of experience and receive everything from individual services to consulting, project management and full outsourcing operations.
As part of the collaboration, companies that already rely on the proven outsourcing services of Econis can also select various services from terreActive's Security Operations Center (SOC). The Econis IT specialists remain the single point of contact for the customer.

Econis Logo

Elasticsearch is the world’s leading free and open search and analytics solution for all types of data, including textual, numerical, geospatial, structured, and unstructured. Commonly referred to as the ELK Stack (after Elasticsearch, Logstash, and Kibana), the Elastic Stack now includes a rich collection of lightweight shipping agents known as Beats for sending data to Elasticsearch. With the integrated SIEM and Endpoint Protection Elastic is covering also all your need is the cybersecurity space.

elastic logo

Fortinet delivers high-performance network security solutions that protect your network, users, and data from continually evolving threats. Our broad portfolio of top-rated solutions and centralized management enables security consolidation and delivers a simplified, end-to-end security infrastructure.

Logo Fortinet

Founded in 2002 and headquartered in Rotkreuz, ITpoint AG is a reliable outsourcing partner for demanding companies. With a comprehensive portfolio of cloud and managed services, integration and consulting solutions, ITpoint offers an all-round carefree package. The focus is on the perfect balance between functionality, availability, performance and cost-effectiveness for the maximum benefit of the customer.
Since 2023, ITpoint AG customers who already rely on outsourcing for infrastructure and applications can also benefit from terreActive's security services. For example, the Security Operations Center (SOC) provides 24/7 IT security services. This collaboration massively increases the protection of valuable customer data and continuously adapts it to new threats.


Kaduu helps you determine your digital footprint. With the help of Kaduu's dark web and deep web monitoring, terreActive can notify its customers when sensitive data appears on the dark web.

Kaduu Logo

Kaspersky is a global cybersecurity company. Kaspersky’s deep threat intelligence and security expertise is constantly transforming into innovative security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats.


Simulated phishing, smishing, malware, ransomware and more: Lucy puts your IT security to the test by simulating realistic internet attacks. As humans are often the weakest point within your total firewall arrangements, Lucy awareness trainings help to minimize the risk and to protect both employees and organizations.

All customer data remains in Switzerland and is not stored abroad.


With Microsoft Security, you can protect your enterprise with integrated security, compliance, and identity solutions. Whether users, data or infrastructure, with Microsoft Defender you have the right solution for different platforms and cloud providers. Correlate the data of your organization with Microsoft Sentinel and benefit from artificial intelligence. So you detect and stop attacks before they cause damage.

Logo Microsoft

One Identity helps organizations get identity and access management (IAM) right. The portfolio includes identity governance, access management, privileged management and identity as a service.

One Identity

Combining the mindset of a CISO and the toolset of a hacker, SafeBreach is the pioneer in breach and attack simulation (BAS) and is the most widely used continuous security control validation platform. SafeBreach continuously executes attacks, correlates results to help visualize security gaps, and leverages contextual insights to highlight remediation efforts.

SafeBreach Logo

Former Attivo Networks, now part of SentinelOne, supports customers in cyber deception and attacker lateral movement detection. Deception and Denial work hand-in-hand to prevent and detect discovery, lateral movement, and privilege escalation attack activities. While deception misdirects attacks and gathers critical adversary intelligence, denial prevents attackers from seeing and exploiting information to progress their attack and compromise sensitive data.

SentinelOne Logo

The multiple award-winning e-mail encryption appliances within the SEPPmail portfolio guarantee professional, cost-effective and fit-for-the-future solutions for secure and user-friendly e-mail communication. SEPPmail applications are the result of more than 10 years of technology design and application experience, as well as the continued implementation of a pioneering and patented systems architecture.


Splunk offers the leading platform for operational intelligence. With Splunk, prospective parties can take a closer look at exactly what others ignore, namely machine data, and thus gain insights that remain hidden from others: You gain insights that make your company more productive, more profitable, more competitive and safer.

Since 2009, terreActive has been a Splunk partner, currently with the highest status as an elite partner.


tacLOM, the monitoring software from terreActive, uses synergies from log management and system monitoring to create a comprehensive image of the IT infrastructure. Pre-defined event packs, threat intelligence and monitoring templates quickly create transparency for those responsible for operations and security and enable them to quickly find the relevant events and directly alert them.

Tenable is the exposure management company. Some 40,000 organizations from around the world rely on Tenable to detect and mitigate cyber risks. As the creator of Nessus, Tenable has extended its vulnerability management expertise to provide the world's first platform to detect and secure any digital asset on any computing platform. terreActive is a Gold Partner and offers Tenable as a solution for audits, as well as within SOC services as Vulnerability Management-as-a-Service.

Tenable Logo

Thales secures business decisive technology for decisive moments. People rely on Thales to safeguard their privacy and to protect cloud, data and software. When it comes to data security, organizations are faced with an increasing amount of decisive moments. Whether the moment is building an encryption strategy, licensing software, trusted access to the cloud, or meeting compliance mandates – you can rely on terreActive and Thales to secure your digital transformation.


Vectra provides continuous, automated security monitoring for entire organizations – from office environments to data centers and the private cloud. Our solutions reliably and proactively detect cyber attacks on your network that would have remained hidden and unknown before.

Vectra Logo