Security Products & Services Portfolio
Endpoint Protection Solutions
Carbon Black – The Cb Predictive Security Cloud is Carbon Black’s consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud. It applies big data analytics across all endpoints, not just those on a single, local network to make predictions about, and provide protection from, current and future unknown attacks.
Trend Micro – You get multiple layers of advanced XGen threat and malware protection with techniques like high fidelity machine learning, behavioral analysis, exploit protection, advanced protection against ransomware variants, file reputation, intrusion protection, command and control blocking, browser exploit protection, application whitelisting, web reputation, sandbox integration and more
Palo Alto Networks – take a unique prevention-oriented approach to addressing advanced attacks on endpoints by identifying and blocking the techniques used by attackers as they attempt to exploit a vulnerability, or deliver malware directly to an endpoint.
Advanced Persistent Threat Solutions
FireEye– – provides the FireEye Malware Protection System is the next generation of threat protection focused on combating advanced malware, zero -day and targeted APT attacks. FireEye’s solutions supplement standard security defenses, such as traditional and next- generation firewalls, IPS, AV and Web gateways. Such defenses can’t stop advanced malware, leaving significant security holes in a majority of corporate networks.
Proofpoint – their Targeted Attack Prevention (TAP) solution provides real time monitoring of urls as well as providing real time analysis of email attachments to insure that the attachments do not contain malicious code. Proofpoint also provides a threat analysis service to help clients understand the proper remediation approach to any specific exploit.
Trend Micro – Deep Discovery provides network-wide visibility, insight, and control to combat APTs and targeted attacks. For advanced threat protection, Deep Discovery uniquely detects and identifies evasive threats in real-time, then provides the in-depth analysis and relevant actionable intelligence to assess, remediate, and defend against targeted attacks in your organization.
Vetra Networks – delivers a new class of advanced persistent threat (APT) defense delivering real–time detection and analysis of active network breaches. Vectra technology picks up where perimeter security leaves off by providing deep, continuous analysis of both internal and Internet- bound network traffic to automatically detect all phases of a breach as attackers attempt to spy, spread, and steal within your network.
Zscaler – provides the Protect-Detect-Remediate defense framework for http/https traffic, which is a best practices approach for defending against APTs. Zscaler can provide a complete, integrated protect-detect-remediate defense for any IP enabled device in your organization.
Next Generation Firewall Solutions
Fortinet – The Fortinet Advanced Threat Protection Framework consists of three integrated elements, working hand-in-hand:
Prevent – Act on known threats and information
Detect – Identify unknown or unrecognizable threats
Mitigate – Respond to potential attacks
This 3-part framework is conceptually simple; however it covers a broad set of both advanced and traditional tools for network, application and endpoint security, threat detection, and mitigation. These tools are powered by strong research and threat intelligence capabilities that transform information into actionable protection.
Palo Alto Networks – provides a next generation firewall that provides application visibility, SSL decryption, content security, a VMWare-based virtualized firewall suite and the TRAPS endpoint to prevent infection.
Regulatory Compliance Solutions
Beyond Trust – provides an integrated Privileged Access Management platform that gives you comprehensive visibility into passwords, endpoints and servers standing between attackers and your critical data.
CyberArk – Ensures that controls are in place to centrally secure, manage and monitor privileged accounts. CyberArk delivers privileged password vaulting and user-access control, session recording and auditing, continuous monitoring, and forensics.
ForgeRock – provides an Identity Management platform for identity administration and automates user provisioning focused on managing relationships across users, devices and things. The platform is designed in response to the pain organizations suffer deploying legacy enterprise provisioning solutions.
Fox Technologies – BoKS ServerControl transforms your multi-vendor Linux and UNIX server environment into one centrally managed security domain. It simplifies your organization’s ability to enforce security policies and control access to critical systems and information.
PlainID – provides a simple and intuitive way for fast-paced organizations to create and managed their authorization policies.
Radiant Logic – Features three products designed to solve your toughest integration challenges, combining the best of enterprise, meta, and virtual directories to deliver identity as a federated service
SailPoint – Streamlines compliance, strengthens internal controls, and improves identity governance. Their innovative approach to identity management can help address any of the following challenges:
lower the cost of compliance
steer clear of audit deficiencies
streamline the access change and request management processes
effectively manage the user life-cycle
minimize access risk during a merger, acquisition, divestiture or layoff
SailPoint’s IdentityIQ provides automated provisioning solutions to handle all user lifecycle events, such as new hires, transfers, moves, and terminations. SailPoint’s automated provisioning can help you minimize the time your IT staff spends on repetitive processes and lower the cost of IT operations, while at the same time improving end user productivity.
Ping Identity’s UnboundID – A state–of–the–art, fully LDAPv3- compliant directory server designed for high performance concurrent processing.
Single Sign-On Solutions
Ping Identity – is recognized as identity leader by the Gartner Group. Ping has multiple product offerings.
PingFederate provides three Identity and Security capabilities.
Cloud Single Sign-On (SSO) using standard identity protocols; PingFederate allows employees, customers or partners access to multiple cloud resources using a single username and password.
Automated Cloud User Provisioning; PingFederate automatically creates user accounts in cloud applications whether you’re an enterprise sending employee attributes to a SaaS vendor or a cloud business creating accounts based on incoming.
Secures Web Services; Using industry standards, PingFederate’s Security Token Service allows applications to add identity information to their API.
PingOne – provides Cloud Access Services to link an organization’s user directory to all of their cloud applications for a simple, proven and secure cloud identity management solution. Ping provides access to all your cloud apps with a single connection to your user directory.
CloudDesktop – With one set of credentials, users log in once to their user directory and gain immediate access to all their cloud applications from this customizable portal.
PingID – you can select from multiple methods and devices to authenticate. An easy one-touch swipe authentication from a mobile device is available, but when users leave their mobile device at home they can still securely sign on using a
range of alternative second factors such as voice, email, desktop application, Yubikey and Apple Watch.
PingAccess – can centrally manage authorization capabilities and secure both your applications and APIs in any domain, for users in any location.
Secure Messaging and Collaboration Solutions
Google Apps and Office 365
CTI Global provides Google Apps and Office 365 as cloud-based messaging and collaboration solutions. We offer migration services to assist clients with the migration to these solutions from existing platforms. In addition, we provide admin and end user training. We have experience migrating clients to these solutions from Exchange, GroupWise, Sun Microsystems/Oracle and Domino.
Both solutions comprise a suite of applications that include email, calendar, instant messaging, video conferencing, and secure document sharing. From an infrastructure perspective, Google and Microsoft manage performance, data backup, patch management and software upgrades. The combination of applications offered and application and platform management makes this solution cost effective while making users more productive.
Proofpoint – email protection stops malware and non-malware threats such as impostor email (also known as business email compromise, or BEC). Deployed as a cloud service or on-premises, it provides granular filtering to control bulk “graymail” and other unwanted email. In addition, business continuity capabilities keep email communications flowing, even when your email server fails.
Zixcorp is the preferred solution for insuring HIPAA compliance. ZixCorp’s Email Encryption Service let healthcare organizations instantly plug into the largest email encryption directory in the world. The ZixDirectory® boasts tens of millions of members. Once connected, users send and receive secure email without having to manage encryption keys. ZixCorp provides automated key management for its customers in a wide variety of industries, including financial services and government.
Zscaler – Provides web security as part of their massively scalable global Security as a Service platform that sits in-line between your company and the Internet, protecting your enterprise from cyber threats, stopping intellectual property leakage and ensuring compliance with corporate policies and statutory regulations. The Zscaler system scans all incoming and outgoing Internet (http/https) traffic irrespective of device or location, thus ensuring comprehensive security and compliance for today’s ‘boundary- less’ enterprises.