Vendor List

Our firm represents, distributes and resells solutions produced by global technology vendors who we assess.

 

We help them by signing deals with top level decision makers we have trusting relationships with who have authority to create requirements, allocate budgets and approve security deals at prospective enterprise customers such as the government, banks, telecommunications firms, large firms, etc.

 

We build innovation locally when we can make an agreement with partners to do so, and advise customers with our domain knowledge in Sri Lanka. 

Showcase Portfolio

These are interesting cyber security products on offer with our Singapore partner Athena Dynamics (BH Global SGX).

 

Please click on the heading title or brand name and you will find more information, you may also visit the vendor's website to gather more information.

 

We will be happy to schedule a presentation, conduct a test trial demo as a proof of concept and implement these solutions for you.

1.Sasa Software

A world's only detection-less sanitization (CDR) platform with fine-grained file cleansing capability that supports more than 300 file types. The technology has protected more than 350 CIIs since 2009 with no incident.

Features

GateScanner® utilises Content Disarm and Reconstruction (CDR), a detectionless-based process that breaks down and reconstructs every element in a file.

 

The file is then rebuilt to its original vendor specifications – reassembled in a way that disrupts any possibly remaining, undetected malicious code.

 

The end result is a completely new, yet functionally identical copy of the original file, delivered in real time.

Deconstruction

Disassembles complex files to seek deeply hidden threats

Deep Threat Scans

Increases threat detection and prevents file spoofing using multiple True Type scans, verifies files signatures

Ex. Tools Integrations

Integrates with external security soluitions such as sandboxes, Next-Gen AVs

File Reduction

Security for outgoing files via content search and replace, metadata removal, reformatting, and policy enforcement

Content Disarm

Sanitzes potentially malicious elements, scripts, macros, links, while keeping trusted content and restructuring the file 

Reconstruction

Reconstructs into a harmless files, maintaining visability and usability

Step 1: Deconstruction

File deconstruction to elementary components.

Step 2:Scan

Deep threat detection with TrueType identification, Multi-AV scans, AI detection, and file signature verification.

Step 3: Disarm

Proprietary file disarm of components from any potentially harmful components

Step 4: Reconstruction

Advanced file reconstruction, removing all components that do not meet the  security policy.

2. Solar appScreener

 

Solar appScreener performs white-box testing of application with or without source codes for backdoors and vulnerabilities.

3. advenica

 

A 1G high-end cross-domain and data diode solution with Linux based proxies for CII protection with patented segregation technologies

4. Good Hackers Alliance

 

An alliance of hand-picked hacking groups especially from countries at digital wars with world-class track records in Deep Cyber Audit & VAPT

 

5. BUFFERZONE

 

BUFFERZONE is a software-defined virtual container isolation technology that allows users to interact with unsecured applications (not just browsers) and sources of information without risking their business.

 

6. IT Care Center

 

End-to-end management solution for your IT operations, on a single platform. A robust platform, yet an affordable one, with the optimal Total Cost of Ownership (TCO).

7. InsiderSecurity

 

Antivirus and firewalls are no longer sufficient today. It is a question of when, not if, the attacker will get inside your network and gain access to your user accounts. Discover this early, and stop the breach at its bud.

 

8. Invisiron® Cyber Defence

 

We are the First and Last Line of Cyber Defence, providing a Next-Generation Cyber Defence Platform that is proactive, robust and invisible to intruders.

9. ICS2

A SCADA monitoring platform that specializes in real-time behavioural analytics of OPC data passively extracted from control systems.

10. Granite

 

A cost-effective digital GRC management and training platform with importable framework templates (e.g. ISO27001, PCI DSS, GDPR etc) to ease the pain of risk and compliance management.

11. SOPHOS

 

A user-friendly, simple-to-deploy enterprise solution that encompasses endpoint, network, email, mobile and
encryption security with Unified Threat Management (UTM).

12. bluechip

 

A platform-agnostic hardware-isolated computation and storage system with HW root of trust.

Company and Description

1. A10 Networks 

Security Analytics & Management

2. Absolute 

Endpoint Visibility & Control Platform

3. Agari 

Next Generation Secure Email Cloud

4. Aqua Security 

Container Security Platform

5. Arcserve 

Data & Ransomware Protection

6. Arctic Wolf 

Managed Detection & Response

7. Armor 

Threat Prevention & Response

8. Arxan 

Application Protection Solutions

9. Attivo Networks 

Cyber Deception Platform

10. Auth0 

Authentication & Authorization

11. Avanan C

loud Email Security Platform

12. Avast 

Security for Consumers & Business

13. Avira 

Antivirus for Consumers & Business

14. Awake 

Analytics, AI & Machine Learning

15. Barracuda Networks 

Email, App, Data & Cloud Security

16. Berkeley Varitronics 

Wireless Threat Detection Tools

17. BeyondTrust 

Privileged Access Management

18. BigID 

Personal Data Protection & Privacy

19. Bitdefender 

Cybersecurity for Home & Business

20. Bitglass 

Cloud Data & Threat Protection

21. BitSight 

Security Ratings Platform

22. BlackBerry 

End-to-End IoT Security Solutions

23. BlueVoyant 

Managed Security Services

24. Bugcrowd 

Crowdsourced Security Platform

25. Callsign 

Intelligence Driven Authentication

26. Capsule8 

Attack Protection for Linux

27. Cato Networks 

Converged Network & Security

28. Centrify 

Privileged Access Management

29. Cequence Security 

Application Security Platform

30. Check Point Software 

Cybersecurity Solutions & Services

31. Checkmarx 

Software Exposure Platform

32. Cimcor 

IT Integrity, Security & Compliance

33. Claroty 

Cybersecurity for ICS/OT

34. CloudPassage 

Cloud Infrastructure Security

35. Code42 

Insider Threat Protection

36. Contrast Security 

Application Security Platform

37. CrowdStrike 

Endpoint Protection Platform

38. CyberArk 

Privileged Access Security

39. Cyberbit 

Cyber Range Training & Simulation

40. Cybereason 

Cyber Defense & Response Platform

41. Cybrary 

Free Online Cybersecurity Training

42. Darktrace 

Artificial Intelligence for Cybersecurity

43. Deep Instinct 

Deep Learning Cybersecurity

44. Digital Defense 

Vulnerability & Threat Management

45. Digital Guardian 

Enterprise Data Loss Prevention

46. Digital Shadows 

Digital Risk Protection Solutions

47. DomainTools 

Threat Intelligence & Investigation

48. Dragos, Inc. 

Industrial Control Systems Security

49. Entrust Datacard

Trusted Identity Technologies

50. eSentire

Managed Detection & Response

51. ESET

Cybersecurity for Home & Business

52. Expanse

Cloud Asset Discovery & Monitoring

53. Expel

Managed Detection & Response

54. ExtraHop

Cloud-Native Detection & Response

55. F-Secure

Cybersecurity for Home & Business

56. F5

Application & Infrastructure Security

57. FireEye

Cybersecurity Solutions & Services

58. Fishtech Group

Cybersecurity Consulting & Services

59. Forcepoint

Integrated Cloud Security Platform

60. Forescout

Unified Device Visibility for IT & OT

 

61. ForgeRock

Identity & Access Management

 

62. Fortalice

Customized Cyber Defense Services

63. Fortinet

End-to-End Infrastructure Security

64. GM Security

Managed Security Services

65. GreatHorn

Email Threat Protection Platform

 

66. GuardiCore

Data Center & Cloud Security

 

67. GuidePoint Security

Cybersecurity Professional Services

 

68. HackerOne

Bug Bounty Program Management

69. Herjavec Group

Managed Security Services

 

70. HYPR

Secure Authentication Platform

 

71. Hysolate

Software-Defined Endpoints

 

72. iboss

Secure Cloud Gateway

 

73. Illumio

Adaptive Micro-Segmentation

74. Imperva

Data & Application Security

75. Imprivata

Cyberecurity for Healthcare Providers

 

76. IntSights

External Threat Protection Suite

 

77. Ionic

Enterprise Data Protection Engine

78. IronNet

Advanced Cyber Threat Detection

 

79. IronScales

Phishing Response Platform

 

80. JASK

Cloud-Native SIEM Platform

 

81. Karamba Security

Embedded Cybersecurity Solutions

 

82. Kaspersky

Cybersecurity for Home & Business

83. Kenna Security

Risk-Based Vulnerability Management

84. KnowBe4Security

Awareness Training Platform

85. LogRhythm

Next Generation SIEM Platform

86. LookingGlass

Threat Intelligence & Response Platform

87. Lookout

Mobile Endpoint Security

88. McAfee

Device-to-Cloud Cybersecurity

89. Menlo Security

Internet Isolation Platform

90. Mimecast

Email, Data, & Web Security

91. Mitek

Digital Identity Verification

92. MobileIron

Enterprise Mobility Management

93. Mocana

End-to-End Cybersecurity System

94. Morphisec

Unified Threat Prevention Platform

95. NCC Group

Cybersecurity & Risk Mitigation

96. Netskope

Cloud, Network & Data Security

97. Okta

Identity & Access Management Platform

98. OneLogin

Identity & Access Management Platform

99. Palo Alto Networks

Cyber Threat Detection & Prevention

100. Payfone

Digital Trust & Identity Authentication

101. Pindrop Security

Cybersecurity for Call Centers

102. Ping Identity

Intelligent Identity Platform

103. Proofpoint

People-Centric Security & Compliance

104. Qualys

IT Security & Compliance Platform

105. Rapid7

Enterprise Cloud Security Platform

106. Recorded Future

Universal Threat Intelligence Solution

107. Red Canary

Security Operations Management

108. RedSeal

Cyber Risk Modeling & Scoring

109. Respond Software

Security Operations Center Software

110. ReversingLabs

Advanced Malware Analysis Platform

111. RSA

Digital Risk Management Solutions

112. SafeBreach

Data Breach & Attack Simulation

113. SailPoint

Cloud Identity Governance Platform

114. SCADAfence

Cybersecurity for Industrial Networks

115. SecureAuth

Identity & Access Management Platform

116. Secureworks

Cybersecurity Solutions & Services

117. SecurityScorecard

Cybersecurity Ratings Platform

118. SentinelOne

Next-Generation Endpoint Protection

119. Shape Security

Application Security & Fraud Prevention

120. Siemplify

Security Orchestration & Automation

121. Skybox Security

Risk Analytics for Cybersecurity

122. Sonatype

Open Source Security Management

123. SonicWall

Cybersecurity Products & Services

124. Sophos

Cybersecurity for Home & Business

125. Sumo Logic

Cloud Operations & Security Analytics

126. Symantec

Integrated Cyber Defense Platform

127. Synack

Crowdsourced Penetration Testing

128. Tanium

Endpoint Visibility & Control Platform

129. Telos

Cybersecurity Solutions & Services

130. Tempered Networks

Identity Defined Networking

131. Tenable

Cyber Exposure Platform

132. ThetaRay

Big Data Security Analytics

133. ThreatConnect

Threat-Centric Security Operations

134. ThreatQuotient

Threat Intelligence Platform

135. Thycotic

Privileged Account Management

136. Tigera

Kubernetes Network Security

137. Trend Micro

Cybersecurity Products & Solutions

138. Tripwire

Cybersecurity & Compliance Solutions

139. Tufin

Network Security Policy Orchestration

140. ValiMail

Cloud-Based Email Security

141. Varonis

Enterprise Data Security Platform

142. VDOO

End-to-End IoT Security Platform

143. Vectra

Intelligent Threat Detection & Response

144. Venafi

Machine Identity Protection

145. Veracode

Application Security Platform

146. WatchGuard

Cybersecurity Products & Services

147. Webroot

Threat Intelligence for Cybersecurity

148. ZeroFOX

Social Media & Digital Protection

149. ZixCorp

Email Encryption & Security Solutions

150. Zscaler

Enterprise Cloud Security Platform