SLSA

Software Licensing Supply Arrangement (SLSA)

The SLSA procurement vehicle addresses the delivery of various commercial software licenses and related commercial software maintenance and support, as required by Canada, in support of its various programs, operational needs and projects. iPSS is pleased to offer the following solutions on the SLSA:

Based on a unique system-analysis technology, Stormshield is the only solution that provides proven protection against targeted attacks and APT even when unknown. Entirely invisible to users and well suited to large-scale deployments, Stormshield federates, in a single agent, all the security services required for the protection of computers and servers, from monitoring peripheral devices to hard disk encryption. Stormshield delivers protection to all risks faced by laptop and desktop computers: vulnerabilities, known and unknown attacks, inappropriate usage of applications, unauthorized connections, theft of critical data. Stormshield distinguishes itself from other solutions by its truly unique HIPS, able to proactively block even the most sophisticated targeted attacks. Even when used in the most demanding environments, Stormshield delivers an unparalleled level of security, whilst remaining completely invisible to users.

Stormshield Data Security allows controlling the confidentiality of sensitive information while enjoying the advantages of cloud-based collaboration in today’s mobile world. This security solution o­ffers end-to-end encrypted security in exchanges and collaboration. The identification of users and verification of their security keys through the solution in the trusted zone guarantees their authentication.

The unique Stormshield Data Security tool’s main features include:

Control over data

  • Seamless encryption of local or shared folders
  • Automated encryption
  • Integration with mail clients for electronic mail signature and confidentiality
  • Security of data shared confidentially between internal and external collaborators
  • Confidentiality of data contained in a virtual volume

Authentication and destruction

  • Sign any type of file
  • Help provided for digitizing administrative and sales procedures
  • Secure and irreversible deletion of files and folders

Centralized administration

  • Manage security policies

Nexpose vulnerability management software, proactively scans your environment for misconfigurations, vulnerabilities, and malware and provides guidance for mitigating risks. Experience the power of Nexpose vulnerability management solutions by:

  • Knowing the security risk of your entire IT environment including networks, operating systems, web applications and databases.
  • Exposing security threats including vulnerabilities, misconfigurations and malware.
  • Prioritizing threats and getting specific remediation guidance for each issue.
  • Integrating with Metasploit to validate security risk in your environment.

Metasploit penetration testing software gives  a clear view as to what vulnerabilities can easily be exploited within your environment so you can focus on the most critical vulnerabilities.

  • Safely simulate attacks on your network to uncover pressing security issues.
  • Use with Nexpose to assess and validate security risks in your environment.
  • Verify your defenses, security controls and mitigation efforts.
  • Manage phishing exposure, and audit web applications.

Mobilisafe is the only mobile risk management solution that automatically performs a mobile risk assessment of all the devices in your organization and provides easy-to-use tools to eliminate these risks. The mobile ecosystem is complex and software updates require coordination between handset manufacturers, OS vendors and carriers, and can take months to deploy, creating large windows of risk. If you are looking to gain an overall view of your mobile threat landscape you should perform a mobile risk assessment to get a clear view as to what risks need to be eliminated to maintain company security. In order to achieve this, you need a mobile risk management solution like Mobilisafe.

ControlsInsight is a security solution that centralizes critical controls information to provide a complete picture of how well an organization is protected against the threats most likely to affect them. Supported by leading security experts and industry best practices, Rapid7 has developed and patented an intelligent model relating today’s threat landscape to the effectiveness of compensating controls. Controls Insight applies this model to an organization’s environment to prioritize actions for the greatest progress towards improving endpoint security, with step-by-step guidance for easy implementation.

Only Rapid7 UserInsight provides visibility into user activity across on-premise, cloud and mobile environments. Traditional monitoring tools have focused on monitoring traffic between assets within the firewall but this paradigm is failing as more activity occurs outside the perimeter in cloud services or on user-supplied devices. In addition to tracking activity on traditional sources such as the firewall and web proxy, UserInsight deeply integrates with ActiveSync to monitor mobile devices and key cloud services such as SalesForce and Box. This means that you get visibility when users are accessing corporate resources even if they’re not on a corporate network or are using their own devices.

Elastic is a search company that powers three solutions built on one powerful stack: the Elastic Stack. Deploy them anywhere (from the cloud to bare metal) to instantly find actionable insights from any type of data. As the creators of the Elastic Stack (Elasticsearch, Kibana, Beats, and Logstash), Elastic builds self-managed and SaaS offerings that make data usable in real-time and at scale for use cases like application search, site search, enterprise search, logging, APM, metrics, security, business analytics, and many more.

Elastic Stack

Some of the world’s largest organizations use the Elastic Stack to stay ahead of threats. Elasticsearch, Kibana, Beats, and Logstash, also known as the ELK Stack, reliably and securely take data from any source, in any format, then search analyze and visualize it in real time.

Elastic SIEM

Secure and streamline your organization with Elastic SIEM and Elastic Endpoint Security. SIEM is now better than ever, with a network of host data integrations, shareable analytics based on Elastic Common Schema (ECS), and an interactive workspace to triage events and perform investigations.

Elastic Endpoint Security

Elastic Endpoint Security is the only endpoint protection product to fully combine prevention, detection, and response into a single, autonomous agent. It’s easy to use, built for speed, and stops threats at the earliest stages of attack. By integrating endpoint security and SIEM, Elastic Security provides prevention, collection, detection, and response capabilities for unified protection across your infrastructure. Built on the Elastic Stack and powered by the open source community, Elastic Security equips security practitioners to protect their organizations.

BlueCat Networks is a leading provider of smart, simple, scalable IP Address Management (IPAM) solutions. With tightly-integrated IP core services, their software solutions give organizations the power to centrally manage “everything IP” in their network from a single pane of glass. The result is a dynamic network that is more resilient, cost effective and easier to manage.

The BlueCat IPAM IPv6-ready platform is the only IPAM solution that delivers a unified approach to mobile security, address management, automation and self-service.

Organisations rely on the Anomali Threat Platform to detect threats, understand the adversary, and respond effectively. Anomali arms security teams with machine learning optimised threat intelligence and identifies hidden threats targeting their environments. Anomali enables organisations to collaborate and share threat information among trusted communities and is the most widely adopted platform for ISACs worldwide.

Anomali ThreatStream aggregates threat intelligence under one platform, providing an integrated set of tools to support fast, efficient investigations, and delivering “operationalized” threat intelligence into security controls at machine speed.

Anomali Match uses all available intelligence and telemetry to deliver comprehensive threat detection at machine speed. You get faster Mean Time to Detection, reduced cost of security incidents, and more efficient security operations.

Anomali Lens uses Natural Language Processing (NLP) to automatically scan and identify threat data in any web-based content, reducing the time required to research and understand threats.

The ServiceNow Platform serves as the back bone for Digital Transformation, by providing a single secure common service layer in the enterprise connecting IT, AI , ML , Security, HR, Customer Care and other business units through Intelligent Applications.

Built on the Now Platform, their product portfolio delivers the IT, Employee, and Customer Workflows that matter—with enterprise solutions to help drive every part of your digital transformation. In turn, this allows you to:

  • Create the great experiences you want and unlock the productivity you need.
  • Transform the IT experience with digital workflows that make everyday work fast, easy, and productive. Deliver high‑performance business services with visibility and AIOps. And respond faster to security incidents, vulnerabilities, and enterprise risk.
  • Help employees get what they need, when they need it with Employee Workflows, so work happens smoothly across siloed systems and departments. Start reimagining ways to deliver a next generation employee experience and unlock enterprise‑wide productivity.
  • Your business depends on great customer service, so give them the fast, simple, and easy experiences they deserve with Customer Workflows. Now’s the time to delight customers with proactive service from issue to resolution.
  • Simplify the complexity of work on a single, enterprise cloud platform.
  • The Now Platform is an intelligent and intuitive cloud platform for work.
  • Get native platform intelligence, so you can predict, prioritize, and proactively manage the work that matters most. Deliver intuitive experiences, so you can work in ways that work best for you.
  • The Now Platform is an ecosystem built for your Digital Transformation Journey.

The Exabeam Security Intelligence Platform provides organizations of all sizes with end-to-end detection, analytics, and response capabilities from a single security management and operations platform.  Exabeam SIP includes Exabeam Log Manager, a modern log management system, built on top of ElasticSearch to provide unlimited data ingestion at a predictable, cost effective price. Exabeam SIP detects complex, multi-stage threats using the analytics capabilities of Exabeam Advanced Analytics; the world’s most deployed User and Entity Behavior Analytics (UEBA) solution. Finally, Exabeam SIP improves incident response efficiency with Exabeam Incident Responder, an API based security orchestration and automation solution. 

Tufin simplifies management of some of the largest, most complex networks in the world, consisting of thousands of firewall and network devices and emerging hybrid cloud infrastructures. Enterprises select the company’s Tufin Orchestration Suite™ to increase agility in the face of ever-changing business demands while maintaining a robust security posture. The Suite reduces the attack surface and meets the need for greater visibility into secure and reliable application connectivity. With over 2000 customers since its inception, Tufin’s network security automation enables enterprises to implement changes in minutes instead of days, while improving their security posture and business agility.

Informatica is the only Enterprise Data Management leader that accelerates data-driven digital transformation. Informatica enables companies to fuel innovation, become more agile and realize new growth opportunities, resulting in intelligent market disruptions. Informatica has helped more than 9,500 customers over 25 years unleash the power of data. 

CyberArk is the global leader in privileged access management, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce the risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including more than 50 percent of the Fortune 500, to protect against external attackers and malicious insiders.

CyberArk Privileged Access Manager enables enterprises to protect both traditional and modern workloads by providing powerful solutions for securing passwords, credentials, and secrets. The solution enables enterprises to consistently enforce privileged access security policies across cloud, on-premises, and hybrid environments.

Snow Software is changing the way organizations understand and manage their technology consumption. Their technology intelligence platform provides comprehensive visibility and contextual insight across software, SaaS, hardware and cloud. With Snow, IT leaders can effectively optimize resources, enhance performance and enable operational agility in a hybrid world.

For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures the integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing hybrid Active Directory environments, Semperis’ patented technology protects over 50 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organizations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies. 

Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Built on 26 years of experience, their solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of their solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™ infrastructure, and are supported by over 1,200 threat experts around the globe.

Scroll to Top

eNEWS Signup