Bromium is re-inventing enterprise security with its powerful new technology, micro-virtualization, which was designed to protect businesses from advanced malware by design, while simultaneously empowering users and delivering real-time threat intelligence to IT. Unlike traditional security methods, which rely on complex and ineffective detection techniques, Bromium protects against malware from the Web, email or USB devices, by automatically isolating each user-task at the endpoint in a hardware-isolated micro-VM, preventing theft or damage to any enterprise resource.
Software Licensing Supply Arrangement (SLSA)
The SLSA procurement vehicle addresses the delivery of various commercial software licenses and related commercial software maintenance and support, as required by Canada, in support of its various programs, operational needs and projects. iPSS is pleased to offer the following solutions on the SLSA:
Based on a unique system-analysis technology, Stormshield is the only solution that provides proven protection against targeted attacks and APT even when unknown. Entirely invisible to users and well suited to large-scale deployments, Stormshield federates, in a single agent, all the security services required for the protection of computers and servers, from monitoring peripheral devices to hard disk encryption. Stormshield delivers protection to all risks faced by laptop and desktop computers: vulnerabilities, known and unknown attacks, inappropriate usage of applications, unauthorized connections, theft of critical data. Stormshield distinguishes itself from other solutions by its truly unique HIPS, able to proactively block even the most sophisticated targeted attacks. Even when used in the most demanding environments, Stormshield delivers an unparalleled level of security, whilst remaining completely invisible to users.
Stormshield Data Security allows controlling the confidentiality of sensitive information while enjoying the advantages of cloud-based collaboration in today’s mobile world. This security solution offers end-to-end encrypted security in exchanges and collaboration. The identification of users and verification of their security keys through the solution in the trusted zone guarantees their authentication.
The unique Stormshield Data Security tool’s main features include:
Control over data
- Seamless encryption of local or shared folders
- Automated encryption
- Integration with mail clients for electronic mail signature and confidentiality
- Security of data shared confidentially between internal and external collaborators
- Confidentiality of data contained in a virtual volume
Authentication and destruction
- Sign any type of file
- Help provided for digitizing administrative and sales procedures
- Secure and irreversible deletion of files and folders
- Manage security policies
Nexpose vulnerability management software, proactively scans your environment for misconfigurations, vulnerabilities, and malware and provides guidance for mitigating risks. Experience the power of Nexpose vulnerability management solutions by:
- Knowing the security risk of your entire IT environment including networks, operating systems, web applications and databases.
- Exposing security threats including vulnerabilities, misconfigurations and malware.
- Prioritizing threats and getting specific remediation guidance for each issue.
- Integrating with Metasploit to validate security risk in your environment.
Metasploit penetration testing software gives a clear view as to what vulnerabilities can easily be exploited within your environment so you can focus on the most critical vulnerabilities.
- Safely simulate attacks on your network to uncover pressing security issues.
- Use with Nexpose to assess and validate security risks in your environment.
- Verify your defenses, security controls and mitigation efforts.
- Manage phishing exposure, and audit web applications.
Mobilisafe is the only mobile risk management solution that automatically performs a mobile risk assessment of all the devices in your organization and provides easy-to-use tools to eliminate these risks. The mobile ecosystem is complex and software updates require coordination between handset manufacturers, OS vendors and carriers, and can take months to deploy, creating large windows of risk. If you are looking to gain an overall view of your mobile threat landscape you should perform a mobile risk assessment to get a clear view as to what risks need to be eliminated to maintain company security. In order to achieve this, you need a mobile risk management solution like Mobilisafe.
ControlsInsight is a security solution that centralizes critical controls information to provide a complete picture of how well an organization is protected against the threats most likely to affect them. Supported by leading security experts and industry best practices, Rapid7 has developed and patented an intelligent model relating today’s threat landscape to the effectiveness of compensating controls. Controls Insight applies this model to an organization’s environment to prioritize actions for the greatest progress towards improving endpoint security, with step-by-step guidance for easy implementation.
Only Rapid7 UserInsight provides visibility into user activity across on-premise, cloud and mobile environments. Traditional monitoring tools have focused on monitoring traffic between assets within the firewall but this paradigm is failing as more activity occurs outside the perimeter in cloud services or on user-supplied devices. In addition to tracking activity on traditional sources such as the firewall and web proxy, UserInsight deeply integrates with ActiveSync to monitor mobile devices and key cloud services such as SalesForce and Box. This means that you get visibility when users are accessing corporate resources even if they’re not on a corporate network or are using their own devices.
Manage any Windows desktop, physical or virtual, across multiple devices, locations and delivery mechanisms with AppSense’s DesktopNow Suite. AppSense seamlessly spans physical and virtual desktops managing all aspects of the user, independent of the desktop.
The DesktopNow Suite enables you to deliver the fastest, easiest and lowest cost desktop ever to your users. With user abstraction, operating systems and applications can be seamlessly managed, delivered and upgraded independently of user settings and data. This significantly reduces operational costs, streamlines desktop management and ensures a seamless user experience across all platforms, all without compromising IT security.
AppSense DataNow enables simple, secure access, sync and sharing of files from any device, while also helping you get more out of the storage you already have. Their unique data broker, delivered as a turn-key virtual appliance, integrates simply with your existing Active Directory and on-premises storage locations such as file servers and Microsoft SharePoint. DataNow puts IT teams in complete control over where files are stored and provides granular policy control over how data is accessed.
AppSense is the leading provider of User Environment Management solutions. AppSense user virtualization technology allows IT to deliver unprecedented user productivity while securing and simplifying workspace management at scale across physical, virtual, and cloud-delivered desktops. The AppSense Platform, which includes the Environment Manager, the Application Manager and the Performance Manager, has been deployed to over 7.5 million endpoints.
Elastic is a search company that powers three solutions built on one powerful stack: the Elastic Stack. Deploy them anywhere (from the cloud to bare metal) to instantly find actionable insights from any type of data. As the creators of the Elastic Stack (Elasticsearch, Kibana, Beats, and Logstash), Elastic builds self-managed and SaaS offerings that make data usable in real-time and at scale for use cases like application search, site search, enterprise search, logging, APM, metrics, security, business analytics, and many more.
Some of the world’s largest organizations use the Elastic Stack to stay ahead of threats. Elasticsearch, Kibana, Beats, and Logstash, also known as the ELK Stack, reliably and securely take data from any source, in any format, then search analyze and visualize it in real time.
Secure and streamline your organization with Elastic SIEM and Elastic Endpoint Security. SIEM is now better than ever, with a network of host data integrations, shareable analytics based on Elastic Common Schema (ECS), and an interactive workspace to triage events and perform investigations.
Elastic Endpoint Security
Elastic Endpoint Security is the only endpoint protection product to fully combine prevention, detection, and response into a single, autonomous agent. It’s easy to use, built for speed, and stops threats at the earliest stages of attack. By integrating endpoint security and SIEM, Elastic Security provides prevention, collection, detection, and response capabilities for unified protection across your infrastructure. Built on the Elastic Stack and powered by the open source community, Elastic Security equips security practitioners to protect their organizations.
BlueCat Networks is a leading provider of smart, simple, scalable IP Address Management (IPAM) solutions. With tightly-integrated IP core services, their software solutions give organizations the power to centrally manage “everything IP” in their network from a single pane of glass. The result is a dynamic network that is more resilient, cost effective and easier to manage.
The BlueCat IPAM IPv6-ready platform is the only IPAM solution that delivers a unified approach to mobile security, address management, automation and self-service.
Organisations rely on the Anomali Threat Platform to detect threats, understand the adversary, and respond effectively. Anomali arms security teams with machine learning optimised threat intelligence and identifies hidden threats targeting their environments. Anomali enables organisations to collaborate and share threat information among trusted communities and is the most widely adopted platform for ISACs worldwide.
Anomali ThreatStream aggregates threat intelligence under one platform, providing an integrated set of tools to support fast, efficient investigations, and delivering “operationalized” threat intelligence into security controls at machine speed.
Anomali Match uses all available intelligence and telemetry to deliver comprehensive threat detection at machine speed. You get faster Mean Time to Detection, reduced cost of security incidents, and more efficient security operations.
Anomali Lens uses Natural Language Processing (NLP) to automatically scan and identify threat data in any web-based content, reducing the time required to research and understand threats.
D3 Security’s Security Orchestration, Automation, and Response (SOAR) Platform is the foundation of the world’s most advanced security operations. The automated incident response and case management solution enables full-lifecycle incident management, relieving the pressure on analysts and SOCs, while helping organizations to rapidly remediate incidents and generate a comprehensive log of incidents and actions taken.
D3 integrates with an organization’s entire security infrastructure to intake alerts from SIEM, endpoints, firewalls, and other tools. All alerts are automatically enriched with contextual data from domain, reputation, malware, endpoint, and threat intelligence sources.
D3 excels at automated report capture, which supports the need for compliance and ensures that all actions are documented and will stand up in a court of law. Without a SOAR platform, the reporting and logging necessary to create a proper audit trail of an investigation is nearly impossible.
D3 has been a trusted partner to US manufacturers since 1999, and we will continue to partner with those that demand the best.
The ServiceNow Platform serves as the back bone for Digital Transformation, by providing a single secure common service layer in the enterprise connecting IT, AI , ML , Security, HR, Customer Care and other business units through Intelligent Applications.
Built on the Now Platform, their product portfolio delivers the IT, Employee, and Customer Workflows that matter—with enterprise solutions to help drive every part of your digital transformation. In turn, this allows you to:
- Create the great experiences you want and unlock the productivity you need.
- Transform the IT experience with digital workflows that make everyday work fast, easy, and productive. Deliver high‑performance business services with visibility and AIOps. And respond faster to security incidents, vulnerabilities, and enterprise risk.
- Help employees get what they need, when they need it with Employee Workflows, so work happens smoothly across siloed systems and departments. Start reimagining ways to deliver a next generation employee experience and unlock enterprise‑wide productivity.
- Your business depends on great customer service, so give them the fast, simple, and easy experiences they deserve with Customer Workflows. Now’s the time to delight customers with proactive service from issue to resolution.
- Simplify the complexity of work on a single, enterprise cloud platform.
- The Now Platform is an intelligent and intuitive cloud platform for work.
- Get native platform intelligence, so you can predict, prioritize, and proactively manage the work that matters most. Deliver intuitive experiences, so you can work in ways that work best for you.
- The Now Platform is an ecosystem built for your Digital Transformation Journey.
Alsid is a cybersecurity vendor specializing in defending the common denominator of most attacks we see in the wild: Active Directory (AD) infrastructures. As a fully-automated cloud solution, Alsid for Active Directory (AD) provides users with step-by-step, tailored recommendations for hardening their AD, a real-time attack detection engine, as well as capabilities for investigating AD breaches when they unfortunately occur.
Whether in the cloud or on-prem, Alsid is easy to deploy and operate–no specialized security knowledge required.
Founded by former ANSSI technical experts, Alsid is protecting over 3 million users across 4 continents to help safeguard against advanced attacks. With the numerous recent attacks exploiting Active Directory weaknesses, it’s time to care about your AD security.
The Exabeam Security Intelligence Platform provides organizations of all sizes with end-to-end detection, analytics, and response capabilities from a single security management and operations platform. Exabeam SIP includes Exabeam Log Manager, a modern log management system, built on top of ElasticSearch to provide unlimited data ingestion at a predictable, cost effective price. Exabeam SIP detects complex, multi-stage threats using the analytics capabilities of Exabeam Advanced Analytics; the world’s most deployed User and Entity Behavior Analytics (UEBA) solution. Finally, Exabeam SIP improves incident response efficiency with Exabeam Incident Responder, an API based security orchestration and automation solution.
Tufin simplifies management of some of the largest, most complex networks in the world, consisting of thousands of firewall and network devices and emerging hybrid cloud infrastructures. Enterprises select the company’s Tufin Orchestration Suite™ to increase agility in the face of ever-changing business demands while maintaining a robust security posture. The Suite reduces the attack surface and meets the need for greater visibility into secure and reliable application connectivity. With over 2000 customers since its inception, Tufin’s network security automation enables enterprises to implement changes in minutes instead of days, while improving their security posture and business agility.
ZeroFOX, the global category leader in Digital Risk Protection, safeguards modern organizations from dynamic security risks across the public attack surface including social media, mobile application, surface, deep and dark web, email and domains, and digital collaboration platforms. With complete global coverage and an artificial intelligence-based analysis engine, the ZeroFOX Platform identifies and remediates targeted phishing attacks, credential compromise, data exfiltration, brand hijacking, executive and location threats, and more. The patented ZeroFOX Platform technology processes and protects millions of posts, messages, and accounts daily across the social and digital landscape, spanning LinkedIn, Facebook, Slack, Instagram, Pastebin, YouTube, mobile app stores, domains, cloud-based email, and more.
Informatica is the only Enterprise Data Management leader that accelerates data-driven digital transformation. Informatica enables companies to fuel innovation, become more agile and realize new growth opportunities, resulting in intelligent market disruptions. Informatica has helped more than 9,500 customers over 25 years unleash the power of data.
CyberArk is the global leader in privileged access management, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce the risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including more than 50 percent of the Fortune 500, to protect against external attackers and malicious insiders.
CyberArk Privileged Access Manager enables enterprises to protect both traditional and modern workloads by providing powerful solutions for securing passwords, credentials, and secrets. The solution enables enterprises to consistently enforce privileged access security policies across cloud, on-premises, and hybrid environments.
Snow Software is changing the way organizations understand and manage their technology consumption. Their technology intelligence platform provides comprehensive visibility and contextual insight across software, SaaS, hardware and cloud. With Snow, IT leaders can effectively optimize resources, enhance performance and enable operational agility in a hybrid world.