Competences

Working over 20 years in IT and IT security offers us the potential in providing competences in highly diverse areas of the information security business. Having spent about 60000 hours designing and optimizing customer environments as a consultancy firm it is just naming a couple of vendors below we have been intensively working with.


  • A10 Networks

    A10 Networks

    A10 Networks is a provider of advanced application networking technologies. All products are built on the Advanced Core Operating System…

  • Adtran Bluesocket

    Adtran Bluesocket

    Adtran offers a breadth of business-class Wi-Fi and 3G wireless solutions. From the smallest retailer to the largest Fortune 500…

  • Catalogic

    Catalogic

    Catalogic with its DPX solution integrates copy data services such as backup, disaster recovery, and bare metal recovery, to significantly…

  • Check Point

    Check Point

    Check Point Software Technologies is the largest pure-play security vendor globally, provides industry-leading solutions and protects customers from cyber attacks…

  • Cisco

    Cisco

    As one of the largest and most widely used vendor in routing, switching and network security products it is important…

  • Clearswift

    Clearswift

    Clearswift is trusted by organisations globally to protect their critical information, giving them the freedom to securely collaborate and drive…

  • Digital Guardian

    Digital Guardian

    Digital Guardian is a next generation data protection platform designed to stop data theft. The Digital Guardian platform performs across…

  • F-Secure

    F-Secure

    F-Secure has focused on providing software and enterprise class solutions for digital centrally managed and adapting content security such as…

  • F5 Networks

    F5 Networks

    When dealing with terms such as Application Delivery and external facing server security including SSL traffic handling and Web Application…

  • FireEye

    FireEye

    FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against…

  • Forcepoint

    Forcepoint

    Forcepoint is leading in protecting organizations from advanced cyberattacks and data theft. Forcepoint TRITON APX security solutions unify web, email,…

  • Fortinet

    Fortinet

    Complementing our know-how spectrum on the field of firewall technology and network security, we are providing configuration, design and consulting…

  • HID Global

    HID Global

    HID Global offers outstanding solutions in the field of Identity Management, Identity Assurance and Access Control, both physical and virtual…

  • HP Networking

    HP Networking

    We are complementing our focus in enterprise routing, switching and data center server infrastructure by offering extensive know-how with HP's…

  • Infoblox

    Infoblox

    Infoblox delivers critical network services that protect and provide Domain Name System (DNS) infrastructure and increase the reliability of enterprise…

  • Ixia

    Ixia

    Ixia is a provider of application performance and security resilience network test and network visibility solutions. It's physical and virtual…

  • Juniper Networks

    Juniper Networks

    Juniper Networks is one of the world's leading manufacturers of professional high-availability network security solutions. Their innovative scalable NetScreen VPN…

  • Kemp Technologies

    Kemp Technologies

    KEMP Technologies is the #1 price/performance load balancer and application delivery controller, used by thousands of businesses who consider IT,…

  • LogRhythm

    LogRhythm

    Regarding security information and event management (SIEM) including log and event correlation, analysis and aggregation, it is crucial to know…

  • Microsoft

    Microsoft

    Microsoft Corporation, is engaged in developing, licensing and supporting a range of software products and services. The Company also designs…

  • NetApp

    NetApp

    NetApp is engaged in providing software, systems and services to manage and store customer data. The Company offers a portfolio…

  • Palo Alto Networks

    Palo Alto Networks

    Palo Alto Networks is an enterprise security company offering an integrated platform which consists of three elements: its Next-Generation Firewall,…

  • Proofpoint

    Proofpoint

    Proofpoint is a security-as-a-service provider that provides data protection solutions for large and mid-sized organizations around the world. Proofpoint's security-as-a-service…

  • Pulse Secure

    Pulse Secure

    Pulse Secure is a leading provider of access and mobile security solutions to both enterprises and service providers. Enterprises from…

  • Rapid7

    Rapid7

    Analyzing and managing threats, incidents and associated risks is an important matter which has to be performed continuously as being…

  • Raritan

    Raritan

    When dealing with data center management especially regarding power management, environment monitoring and secure serial as well as KVM-over-ip access…

  • Riverbed

    Riverbed

    Riverbed is the leader in application performance infrastructure, providing solutions for end-to-end application visibility, optimization, and control in hybrid IT…

  • Skybox Security

    Skybox Security

    Headquartered in San Jose, California, Skybox Security provides the most powerful risk analytics for cyber security, giving security management and…

  • Tenable Network Security

    Tenable Network Security

    Performing penetration tests, network security audits or different kinds of vulnerability assessments usually brings in automated analysis of systems and…

  • Tufin

    Tufin

    As the market leader of award-winning Security Policy Orchestration solutions, Tufin provides enterprises with the ability to streamline the management…

  • Viprinet

    Viprinet

    Viprinet has been manufacturing innovative network components since 2006; their patented technology makes it possible to aggregate the bandwidths of…

  • VMware

    VMware

    Virtualization as being one of the most central tasks in modern data center and core server environment, is widely associated…

WordPress Cookie Notice by Real Cookie Banner