FEATURED PARTNERS

Centrify
Fishtech Partner
Centrify is a company that offers an identity management system to manage identities and secure access across computer networks and cloud computing environments. Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise

Chronicle
Google Cloud Security
Chronicle is a global security telemetry platform for investigation and threat hunting within your enterprise network. Chronicle makes security analytics instant, easy, and cost-effective. Chronicle is a specialized, cloud-native security analytics system, built on the core infrastructure that powers Google itself.

ExtraHop
Fishtech Partner
ExtraHop provides cloud-native network detection and response for the hybrid enterprise. Our breakthrough approach analyzes all network interactions and applies cloud-scale machine learning for complete visibility, real-time detection, and intelligent response. With this approach, we help the world's leading enterprises rise above the noise of alerts, organizational silos, and runaway technology.

FireMon
Fishtech Partner
The FireMon Platform allows you to continuously analyze, visualize and improve your existing network security infrastructure and firewall management.
FireMon solutions allow you to monitor and assess your network security, giving you continuous visibility into and control over firewall infrastructure, network security policies and underlying IT risks.

Foresite
Fishtech Venture Partner
Foresite is a global service provider, delivering a range of managed security and consulting solutions designed to help our clients meet their information security and compliance objectives. In the face of increasingly persistent cyber-threats, Foresite’s solutions empower organizations with vigilance and expertise to proactively identify, respond to, and remediate cyber-attacks and breaches where they occur.

Kenna Security
Fishtech Partner
A tidal wave of vulnerabilities, but you can’t fix them all. Rely on real-time threat intel and patented prioritization to cut costs, save time, and keep your teams efficiently focused on reducing the biggest risks to your business. This is Modern Vulnerability Management.

OneIdentity
Fishtech Partner
Eliminate complexities and time-consuming processes; unify identity management across platforms and environments; and simplify and modernize your identity administration and governance, privileged account management and access control.
With One Identity, you can address the most pressing IAM challenges of your on-premises, cloud or hybrid environment. At the same time, your organization can enhance its agility, improve operations, strengthen security, get compliant and be ready for tomorrow.

Prevalent
Fishtech Partner
Prevalent is a leader in third-party risk management. We help global organizations manage and monitor the security threats and risks associated with vendors, suppliers and other third parties. Our solutions help reduce risk and cyber exposure to global organizations of all sizes, across industries.

Puppet Labs
Fishtech Partner
Puppet Enterprise makes it easy to automate the provisioning, configuration and ongoing management of your machines and the software running on them. Make rapid, repeatable changes and automatically enforce the consistency of systems and devices – across physical and virtual machines, on premise or in the cloud.

Recorded Future
Fishtech Partner
Our goal is to empower our customers with contextualized threat intelligence in real time, enabling organizations to proactively defend against threats at the speed and scale of the internet. At the heart of this is our unique technology. Founded in 2009, we're a startup that’s growing fast and headquartered in Somerville, Massachusetts with offices in Virginia, Sweden, and the United Kingdom.

SecureAuth
Fishtech Partner
The SecureAuth® Identity Platform offers multi-factor authentication, risk-based adaptive authentication, single sign-on, and user self-service in a single solution. Whether you deploy hybrid, on-prem, or in the cloud, the identity platform delivers the strongest breach-preventing identity security available to protect everyone and everything that connects to your business

Security Scorecard
Fishtech Partner
Constantly emerging sophisticated cyber attacks jeopardize your business every minute of every day. SecurityScorecard instantly identifies vulnerabilities, active exploits, and advanced threats to help you rigorously protect your business and strengthen your security posture – from an outside-in perspective, enabling you to see what a hacker sees.

Swimlane
Fishtech Partner
Use SOAR to respond to more alerts faster without adding overhead. Swimlane's security orchestration, automation and response (SOAR) platform standardizes and accelerates incident response to improve consistency, decrease mean time to resolution and lower operating costs in your security operations center (SOC).

Tenable
Fishtech Partner
Tenable.io, the world’s first Cyber Exposure platform, arms Security with the visibility to see their entire cyber attack surface at all times (from IT to Cloud to IoT to OT) and arms the CISO, C-suite and Board of Directors with the insight to focus on the issues which matter most and make better strategic decisions.

TITUS
Fishtech Partner
TITUS solutions enable organizations to classify, protect and confidently share information, and meet regulatory compliance requirements by identifying and securing unstructured data. TITUS products enhance data loss prevention by classifying and protecting sensitive information in emails, documents and other file types – on the desktop, on mobile devices, and in the Cloud.

Thycotic
Fishtech Partner
A complete privileged account management (PAM) solution for IT admins: Fastest to deploy. Easiest to use. Most affordable privileged account software. Thycotic prevents cyberattacks by securing passwords, protecting endpoints, and controlling access. Thycotic is the optimum choice in proactive Privileged Password, Account Access, and Endpoint Security.

Trend Micro
Fishtech Partner
For over 30 years, Trend Micro’s unwavering vision has been to make the world safe for exchanging digital information. Security is our entire focus, and it shows. This single-minded passion has inspired our innovations that keep up with the bad guys despite a changing IT landscape, riskier user behavior, and constantly evolving threats.
ALPHABETICAL LISTING

AirWatch
Fishtech Partner
AirWatch® simplifies mobility for organizations, while empowering end users. With VMware AirWatch® Enterprise Mobility Management, organizations can easily deploy, configure, secure, manage and support smartphones, tablets, laptops and other devices across multiple mobile platforms and operating systems.

Anomali
Fishtech Partner
Anomali helps organizations find and respond to cyber threats. That's our mission. We bring to your security team the one thing that's been missing - external context. With Anomali you can now identify suspicious or malicious traffic before it even reaches your network. We turn threat intelligence into your cyber no-fly list, and seamlessly integrate this with your internal security and IT systems.

AppViewX
Fishtech Partner
Advanced automation and orchestration platform providing end-to-end provisioning and self-servicing capabilities across Layer 2 to Layer 7 network components. It offers multi-vendor support and state of the art management capabilities that maps to the evolving needs of application owners, network engineers and network operations.

BeyondTrust
Fishtech Partner
BeyondTrust is a global cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks. Corporate and government organizations rely on BeyondTrust solutions to shrink attack surfaces and identify imminent threats. The company’s integrated risk intelligence platform presents a unique competitive advantage in its ability to reveal critical risks hidden within volumes of user and system data. This unifies IT and security departments, empowering them with the information and control they need to jointly prevent breaches, maintain compliance, and ensure business continuity.

Carbon Black
Fishtech Partner
Carbon Black Inc.’s endpoint security platform defends organizations of all sizes from modern-day attacks with its unique zero-gap protection. Based in Waltham, Massachusetts, Carbon Black develops endpoint security software that detects malicious behavior and prevents malicious files from attacking an organization.

Centrify
Fishtech Partner
Centrify is a company that offers an identity management system to manage identities and secure access across computer networks and cloud computing environments. Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise

Certes Networks
Fishtech Partner
Certes is leading the Software-Defined Security revolution, enabling you to dynamically control your data traffic security without dependence on firewalls or the network infrastructure. Thousands of Certes’ patented solutions are deployed to protect enterprise data traffic in 84 countries around the world.

Chronicle
Google Cloud Security
Chronicle is a global security telemetry platform for investigation and threat hunting within your enterprise network. Chronicle makes security analytics instant, easy, and cost-effective. Chronicle is a specialized, cloud-native security analytics system, built on the core infrastructure that powers Google itself.

CyberArk
Fishtech Partner
CyberArk is the global leader in privileged access security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including more than 50 percent of the Fortune 100, to protect against external attackers and malicious insiders.

Cyberreason
Fishtech Partner
The world's most powerful cybersecurity analytics platform
Built from the ground up, to secure your enterprise. Our full-stack, behavior-based hunting system analyzes more data, more deeply, than anyone else on the market — giving you unprecedented visibility and the power to stay one step ahead of the ever-evolving threat.

Docker
Fishtech Partner
Docker allows you to package an application with all of its dependencies into a standardized unit for software development. Docker containers wrap up a piece of software in a complete filesystem that contains everything it needs to run: code, runtime, system tools, system libraries – anything you can install on a server. This guarantees that it will always run the same, regardless of the environment it is running in.

Demisto
Fishtech Partner
Demisto Enterprise delivers a complete solution that helps Tier-1 through Tier-3 analysts and SOC managers to optimize the entire incident lifecycle while auto-documenting and journaling all the evidence. More than 150 integrations enable security orchestration workflows for incident management and other critical security operation tasks.

ExtraHop
Fishtech Partner
ExtraHop provides cloud-native network detection and response for the hybrid enterprise. Our breakthrough approach analyzes all network interactions and applies cloud-scale machine learning for complete visibility, real-time detection, and intelligent response. With this approach, we help the world's leading enterprises rise above the noise of alerts, organizational silos, and runaway technology.

FireEye
Fishtech Partner
FireEye is on the front lines of cyber attacks every day. Our experts' knowledge of the threat landscape provides insights that enable us to build the best technologies in the industry. Using these technologies first-hand on the front lines further equips our product teams with a constant source of feedback. Through this feedback loop we continuously improve our products at a rate and with sophistication unmatched in the industry, creating a unique innovation cycle.

FireMon
Fishtech Partner
The FireMon Platform allows you to continuously analyze, visualize and improve your existing network security infrastructure and firewall management.
FireMon solutions allow you to monitor and assess your network security, giving you continuous visibility into and control over firewall infrastructure, network security policies and underlying IT risks.

ForeScout
Fishtech Partner
ForeScout offers the unique ability to see devices, including non-traditional devices, the instant they connect to the network. Equally important, ForeScout lets you control these devices and orchestrate information sharing and operation among disparate security tools to accelerate incident response.

Foresite
Fishtech Venture Partner
Foresite is a global service provider, delivering a range of managed security and consulting solutions designed to help our clients meet their information security and compliance objectives. In the face of increasingly persistent cyber-threats, Foresite’s solutions empower organizations with vigilance and expertise to proactively identify, respond to, and remediate cyber-attacks and breaches where they occur.

Fortscale
Fishtech Partner
Detect and Eliminate Threats with User Behavior Analytics. Only Fortscale’s award-winning UBA solutions combine expertise from the Israeli Defense Force’s elite security unit, advanced machine learning, and big data analytics to create a solution that provides rapid detection and response to malicious user behaviors that truly matter—with an eye toward thwarting and preventing headline-grabbing data breaches.

Thales
Fishtech Partner
Businesses and governments rely on Thales to bring trust to the billions of digital interactions they have with people. Our identity management and data protection technologies help banks exchange funds, people cross borders, energy become smarter, and much more. More than 30,000 organizations already rely on Thales solutions to verify the identities of people and things, grant access to digital services, analyze vast quantities of information, and encrypt data.

iBoss
Fishtech Partner
The First Web Gateway Solution Designed for the Distributed World. At iboss, we take a unique approach to gateway security. Only the iboss Distributed Gateway PlatformTM provides the comprehensive protection you need today while delivering the flexibility to scale to the terabit-per-second environment of the future — all while delivering the lowest total cost of ownership.

Illumio
Fishtech Partner
The Illumio Adaptive Security Platform® (ASP) helps you prevent the spread of breaches and achieve regulatory compliance through real-time application dependency mapping and adaptive micro-segmentation that works in any data center and cloud environment (Azure, AWS, Google Compute).

Imperva
Fishtech Partner
Imperva protects you from cybercriminals – be they external actors or malicious insiders. Imperva protects cloud applications, websites and applications, files, SharePoint systems, databases and big data repositories from both theft and ever-evolving extortion attacks like DDoS and ransomware.

Infoblox
Fishtech Partner
Infoblox Actionable Network Intelligence controls and secures your network from the core – One unified platform including DNS, DHCP, and IPAM (DDI). With Infoblox, organizations can protect against the rising flood of malware and cyberattacks that target networks; overcome complexity by creating a single point of control across traditional data centers as well as public and private cloud deployments; establish a single point of enforcement for security and compliance policies; and deliver actionable insights for making networks more reliable, efficient, and effective.

Juniper Networks
Fishtech Partner
Juniper Networks is a multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products include routers, switches, network management software, network security products and software-defined networking technology.

Kenna Security
Fishtech Partner
A tidal wave of vulnerabilities, but you can’t fix them all. Rely on real-time threat intel and patented prioritization to cut costs, save time, and keep your teams efficiently focused on reducing the biggest risks to your business. This is Modern Vulnerability Management.

LogRhythm
Fishtech Partner
LogRhythm, a leader in Threat Lifecycle Management, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyberthreats. The company’s patented award-winning platform unifies next-generation SIEM, log management, network and endpoint monitoring, user entity and behavior analytics (UEBA), security automation and orchestration (SAO) and advanced security analytics.

Nuage Networks
Fishtech Partner
Software defined networking solutions to make Enterprise-grade private cloud networks and efficient service provider datacenters.
Your end users are demanding clouds that rival major public cloud providers’ offerings. But network limitations are hampering IT flexibility. Software Defined Networking from Nuage Networks can give you the best of both worlds – responsiveness and choice.

OneIdentity
Fishtech Partner
Eliminate complexities and time-consuming processes; unify identity management across platforms and environments; and simplify and modernize your identity administration and governance, privileged account management and access control.
With One Identity, you can address the most pressing IAM challenges of your on-premises, cloud or hybrid environment. At the same time, your organization can enhance its agility, improve operations, strengthen security, get compliant and be ready for tomorrow.

Ordr
Fishtech Partner
Ordr Systems Control Engine (SCE) is the only purpose-built solution that fully maps every microscopic device detail and its context – the device flow genome – at massive scale, using machine learning to completely and continuously inspect and baseline the behavior of every device. Ordr detects exposed vulnerabilities and delivers intricate risk scores for priority attention and mitigation. All in real-time, all-the-time, delivered in an elegantly simple UI.

PerimeterX
Fishtech Vendor Partner
Our vision is to liberate people from security concerns so they can unleash the power of web applications to build their digital businesses. Delivered as a service, our Bot Defender, Code Defender and Page Defender solutions detect risks to your web applications and proactively manage them, freeing you to focus on growth and innovation.

Prevalent
Fishtech Partner
Prevalent is a leader in third-party risk management. We help global organizations manage and monitor the security threats and risks associated with vendors, suppliers, and other third parties. Our solutions help reduce risk and cyber exposure to global organizations of all sizes, across industries.

Puppet Labs
Fishtech Partner
Puppet Enterprise makes it easy to automate the provisioning, configuration and ongoing management of your machines and the software running on them. Make rapid, repeatable changes and automatically enforce the consistency of systems and devices – across physical and virtual machines, on premise or in the cloud.

Rapid7
Fishtech Partner
Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. Their solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.

Recorded Future
Fishtech Partner
Our goal is to empower our customers with contextualized threat intelligence in real time, enabling organizations to proactively defend against threats at the speed and scale of the internet. At the heart of this is our unique technology. Founded in 2009, we're a startup that’s growing fast and headquartered in Somerville, Massachusetts with offices in Virginia, Sweden, and the United Kingdom.

ReliaQuest
Fishtech Partner
Maintain full control of your data and technologies, while benefitting from the guidance of an experienced security partner. Starting with the SIEM and extending to various endpoint technologies, we work with your team to continuously manage and develop your security solutions.

RiskIQ
Fishtech Partner
RiskIQ’s machine learning harnesses the power of big data to detect threats with unparalleled accuracy. RiskIQ continuously discovers, indexes and monitors websites, mobile assets and Internet systems from the outside in. We enable organizations to extend their security operations, enable incident responders and protect the enterprise from external threats.

SecureAuth
Fishtech Partner
The SecureAuth® Identity Platform offers multi-factor authentication, risk-based adaptive authentication, single sign-on, and user self-service in a single solution. Whether you deploy hybrid, on-prem, or in the cloud, the identity platform delivers the strongest breach-preventing identity security available to protect everyone and everything that connects to your business

Security Scorecard
Fishtech Partner
Constantly emerging sophisticated cyber attacks jeopardize your business every minute of every day. SecurityScorecard instantly identifies vulnerabilities, active exploits, and advanced threats to help you rigorously protect your business and strengthen your security posture – from an outside-in perspective, enabling you to see what a hacker sees.

Stellar Cyber
Fishtech Partner
Stellar Cyber makes Starlight, the world’s first open detection/response (Open-XDR) platform, which connects the dots throughout the entire security infrastructure and automatically responds to attacks wherever they occur. Starlight integrates dozens of security applications from an App Store and presents results in an intuitive dashboard to supercharge analyst productivity by slashing attack response times to seconds or minutes. Starlight deploys easily on premises, at the edge or in public clouds, and is delivering comprehensive security for enterprises and managed security service providers. Stellar Cyber is based in Silicon Valley and is backed by Valley Capital Partners, Northern Light Venture Capital, Digital Hearts and other investors. For more information, contact https://stellarcyber.ai

SumoLogic
Fishtech Partner
Sumo Logic simplifies how you collect and analyze machine data so that your team gets the insights they need to drive the best customer experience on your application. With the Sumo Logic service, you can accelerate modern application delivery, monitor and troubleshoot in real time and improve your security and compliance posture.

Swimlane
Fishtech Partner
Use SOAR to respond to more alerts faster without adding overhead. Swimlane's security orchestration, automation and response (SOAR) platform standardizes and accelerates incident response to improve consistency, decrease mean time to resolution and lower operating costs in your security operations center (SOC).

Tenable
Fishtech Partner
Tenable.io, the world’s first Cyber Exposure platform, arms Security with the visibility to see their entire cyber attack surface at all times (from IT to Cloud to IoT to OT) and arms the CISO, C-suite and Board of Directors with the insight to focus on the issues which matter most and make better strategic decisions.

Thycotic
Fishtech Partner
A complete privileged account management (PAM) solution for IT admins: Fastest to deploy. Easiest to use. Most affordable privileged account software. Thycotic prevents cyberattacks by securing passwords, protecting endpoints, and controlling access. Thycotic is the optimum choice in proactive Privileged Password, Account Access, and Endpoint Security.

TITUS
Fishtech Partner
TITUS solutions enable organizations to classify, protect and confidently share information, and meet regulatory compliance requirements by identifying and securing unstructured data. TITUS products enhance data loss prevention by classifying and protecting sensitive information in emails, documents and other file types – on the desktop, on mobile devices, and in the Cloud.

TrapX Security
Fishtech Partner
TrapX’s proven solution deceives would-be attackers with turn-key decoys (traps) that “imitate” your true assets. Hundreds or thousands of traps can be deployed with little effort, creating a virtual mine field for cyberattacks, alerting you to any malicious activity with actionable intelligence immediately.

Trend Micro
Fishtech Partner
For over 30 years, Trend Micro’s unwavering vision has been to make the world safe for exchanging digital information. Security is our entire focus, and it shows. This single-minded passion has inspired our innovations that keep up with the bad guys despite a changing IT landscape, riskier user behavior, and constantly evolving threats.

Twistlock
Fishtech Partner
Twistlock is the leading provider of container and cloud-native cybersecurity solutions for the modern enterprise. From precise, actionable vulnerability management to automatically deployed runtime protection and firewalls, Twistlock protects applications across the development lifecycle and into production. Purpose built for containers, serverless, and other leading technologies – Twistlock gives developers the speed they want, and CISOs the control they need.

vArmour
Fishtech Partner
vArmour Distributed Security System is the industry’s first distributed security system that provides insight and control for multi-cloud environments. With its patented software, vArmour micro-segments each application by wrapping protection around every workload – increasing visibility, security, and operational efficiency.

Viptela
Fishtech Partner
Viptela was founded on a mission to simplify networking architectures, and eliminate needless inefficiencies faced by the enterprise. Viptela provides Software-Defined Wide Area Network (SD-WAN) technology that allows global companies to build carrier agnostic, policy-controlled and cost-effective WANs.

VMWare
Fishtech Partner
VMware’s One Cloud, Any Application, Any Device architecture enables customers to rapidly develop, automatically deliver, and safely consume all applications. Built on the foundation of the Software-Defined Data Center—which fully automates the virtualized infrastructure of compute, storage, networking and security—this software-defined approach enables customers to implement unified hybrid cloud and fully realized business mobility.

ZScaler
Fishtech Partner
Zscaler is revolutionizing cloud security with unparalleled protection and performance. Go beyond basic internet security with our 100% cloud solution. Built from the ground up, Zscaler’s multi-tenant cloud architecture lets customers enjoy elastic scale while maintaining security and data privacy.