Solution Partners

Safeguarding Your Business Intelligence with the Right Security Solutions

Despite the scale of your business or organization, protecting customers’ database as well as the relevant information of business and monetary transactions involved is highly important as it may directly impact your organization’s reputation and corporate image.

Enhanced & Scrutinized Security Access Control

Assigning security access according to job requirements and different levels of management is critical to ensure smooth daily operational and administration processes of an organization or enterprise.

Optimized Security Solutions for Minimized Risks and Losses

Guarding against internal and external security threats and managing risks are some of the inevitable measures to safeguard your organization’s assets to maintain an overall smooth-running operation of your entire organization.

Getting the Right Solution Partners

Therefore, Bright Nexus has made it a priority to continuously engage with the right solution partners who are able to provide premium support and highly credible security solutions to help enterprises and organizations meet the above mentioned needs and security expectations.

Find out more about what our solution partners offer and how their products could benefit your organization in terms of IT security.


A10 Networks

A10 Networks® Thunder® ADC product line of high-performance, next-generation application delivery controllers enable customers’ applications to be highly available, accelerated and secure. Thunder ADC is a premium ADC product line, delivering up to 220 Gbps of throughput in a single appliance or 1.7 Tbps of throughput in a cluster, the broadest range of form factors (physical, virtual, Bare Metal, and hybrid), and with expanded system resources designed to support future feature needs.

Actiance

Actiance (formerly FaceTime Commucations) enables enterprises to resolve their realtime security, management and compliance challenges from inbound malware and data leakage to regulatory and eDiscovery compliance, to the need for a common policy and reporting framework to simplify administration. Actiance ensures the secure and compliant use of unified communications (UC) and Web 2.0 technologies, including social networks, internal and external blogs, and instant messaging networks for the enterprise.

AlgoSec

AlgoSec is a business-driven Security Policy Management solution that intelligently automates and orchestrates network security policy management to make enterprise more agile, more secure and more compliant – all the time. Through a single plane of glass, one organization can auto-discover application connectivity requirements, proactively analyze risk from the business prospective, and rapidly plan and execute network security changes – all with zero-touch, and seamlessly orchestrated across heterogeneous public or private cloud, and on-premise environment.

Barracuda Networks

Barracuda Networks' product portfolio includes: Barracuda Spam & Virus Firewall, Barracuda Web Filter, Barracuda IM Firewall, Barracuda Web Application Firewall (WAF), Barracuda SSL VPN, Barracuda Load Balancer, Barracuda Link Balancer, Barracuda Message Archiver, Barracuda Backup Service, and the BarracudaWare software portfolio. Combining its own award winning technology with powerful open source software, Barracuda Networks solutions deliver easy to use, comprehensive security, networking, and data protection products. Barracuda Central, an advanced 24/7 operations center manages data centers for all service based offerings and works to continuously monitor and block the latest Internet threats.

BlackBerry Solutions

BlackBerry (formerly Good Technology) offers comprehensive, cloud-enabled software that helps companies manage and secure the Enterprise of Things. The totality of the BlackBerry solution is called BlackBerry Secure, and is grounded in the new BlackBerry endpoint security platform. BlackBerry software is the key ingredient that allows you to confidentially and reliably transmit sensitive data between endpoints to keep people, information, and goods safe.

Bomgar

Bomgar simplifies support by letting technicians control remote computers, servers, smartphones and network devices over the internet or network. With Bomgar, a support rep can see what customers see or control their computers for support. Seeing the screen helps you decrease onsite visits, eliminate phone support, and respond effectively to peaks in demand. Resolve more incidents in first tier on the first call with Bomgar.

Check Point

Check Point appliances deliver a powerful turnkey solution for deploying Check Point awardwinning software solutions to address virtually any security need. Based on the new Check Point Software Blade architecture, Check Point appliances provide the highest level of flexibility, scalability, and extensibility in the industry. All Check Point appliances are built around a unified security architecture, enabling organizations to perform all aspects of security management via a single, unified console. With Check Point appliances, organizations of all sizes can tailor their network security infrastructure to meet their functional and performance needs—with centralized management, simple deployment, and full extensibility.

Cisco WSA

Cisco WSA secure and control web traffic by offering multiple layers of malware defense, both horizontally (at the application layer) and vertically (up the protocol stack). Cisco IronPort URL Filters enforce acceptable use policy, while Cisco IronPort Web Reputation Filters and the Cisco IronPort AntiMalware System–with simultaneous signature scanning for greater efficacy – provide protection against web based malware. Additionally, the Layer 4 Traffic Monitor detects and blocks "phonehome" malware activity that attempts to circumvent Port 80 security features.

Cyberark

CyberArk is an information security company offering Privileged Account Security. Cyberark is the first to bring a password vaulting solution to market, the first enterprise-scalable application identity management solution, the first to offer integrated session monitoring with isolation and control and most recently we released privileged threat analytics, the first vendor to release a targeted analytics product aimed at detecting unusual behaviour on privileged accounts.

DELL (KACE)

DELL KACE™ is the leading Systems Management Appliance company. Our appliance based approach to managing desktops, laptops and servers saves time and money for systems management professionals and their organizations. The award winning KBOX™ appliance typically installs in one day, at the lowest total cost compared to software alternatives.

Fidelis Cybersecurity

Fidelis Cybersecurity protects the world's most sensitive data by equipping organizations to detect, investigate and stop advanced cyber attacks. Its products, services and proprietary threat intelligence enable customers to proactively face advanced threats and prevent data theft with immediate detection, monitoring and response capabilities. With Fidelis Network and Fidelis Endpoint Platform, customers can get one step ahead of any attacker before a major breach hits.

FireEye

FireEye protects both large and small organizations committed to stopping advanced cyber threats, data breaches and zero-day attacks. The FireEye Adaptive Defense approach to cyber security enables customer to recognize and apply the right mix of technology, intelligence and expertise to protect against advanced persistent threats (APTs). One security solution must be able to detect, prevent, analyze, and respond to both known and never-before-seen cyber attacks. Only Adaptive Defense lets customer pick the perfect combination of industry-leading FireEye technology, real-time threat intelligence and proven expertise to meet customer needs.

Forcepoint

Forcepoint (formerly Websense) specializing in computer security software. It offers businesses and government institutions services for content security, data protection, cloud security, network security, analytics, webfiltering, and cross domain access and transfer to protect organization's networks from cybercrime, malware, and data theft, as well as prevent users from viewing sexual or other inappropriate content and discourage employees from browsing non-business-related websites. Forcepoint uses a combination of classification engines, filtering categories, data fingerprints, and word filters selected by customers.

ForeScout

ForeScout Technologies, Inc. is a network security company and its products are designed to see devices accessing an organization’s network, control those devices by allowing, denying or limiting network access (NAC), and orchestrate network security by sharing information with and automating workflows amongst leading security, mobility and IT management products.

Fortinet

Fortinet is a worldwide provider of network security appliances and a market leader in unified threat management (UTM). It products and subscription services provide broad, integrated and high performance protection against dynamic security threats while simplifying the IT security infrastructure. Fortinet's flagship FortiGate product delivers ASIC accelerated performance and integrates multiple layers of security designed to help protect against application and network threats. Fortinet's broad product line goes beyond UTM to help secure the extended enterprise from endpoints, to the perimeter and the core, including databases and applications.

GFI

GFI develops right-sized, smartly engineered IT solutions for businesses. GFI solutions enable IT administrators to easily and efficiently discover, manage and secure their business networks, systems, applications and communications wherever they exist. GFI is committed to its customers worldwide to deliver the trusted expertise, right-sized and smartly engineered IT solutions with a strong focus on security excellence e.g. SIEM, Vulnerability Management, and Endpoint Security.

HP ArcSight

HP ArchSight is a cyber security company that provides big data security analytics and intelligence software for security information and event management (SIEM) and log management solutions. ArcSight is designed to help customers identify and prioritize security threats, organize and track incident response activities, and simplify audit and compliance activities.

Infoblox

Infoblox delivers Actionable Network Intelligence to enterprise, government, and service provider customers around the world. Infoblox is the industry leader in DNS, DHCP, and IP address management (IPAM), the category known as DDI. Infoblox empower thousands of organizations to control and secure their networks from the core—enabling them to protect against the rising flood of malware and cyberattacks that target networks; overcome complexity by creating a single point of control across traditional data centers as well as public and private cloud deployments; establish a single point of enforcement for security and compliance policies; and deliver actionable insights for making networks more reliable, efficient, and effective.

Intel Security

McAfee offers all the network security functions you need—intrusion prevention, SIEM, firewall, network access control, antispam, antimalware, web filtering, and outbound content control. We maintain your defenses nonstop and make ownership easy with integrated solutions and centralized management. McAfee block attacks real time and enforce policies to protect network connected devices McAfee network security products combine intrusion prevention, application control, and behavioral detection — and optional Network Access Control (NAC)—to block encrypted attacks, botnets, SYN flood, DDoS, and Trojans and enable regulatory compliance. McAfee ePolicy Orchestrator, build your security risk management strategy on McAfee ePolicy Orchestrator® (ePO™). Single-agent, single-console management integrates your security solutions and data to give you realtime information, so that you make the right security decisions. For the first time ever, this enables an intelligent security and compliance optimization environment.

Mojo Networks

Mojo Networks Networks (formerly AirTight Networks) is leading a revolution in cloud managed WiFi services and products for enterprise wireless. Mojo's cloud WiFi platform is easy to deploy and intuitive to manage while also enabling advanced features like graphical troubleshooting, WiFi user analytics and social engagement. In addition, Mojo also provide industry-leading security capabilities e.g. Wireless Intrusion Prevention System (WIPS) to secure the air and built its cloud designed for a new frontier of prolific connectivity.

Openware

Openware (formerly Mirapoint) Secure Messaging is a proven, appliance base solutions with carrier grade reliability to build a Secure Messaging Infrastructure, centralize control, and simplify management all at a dramatically lower cost. Mirapoints appliances deliver bulletproof security and superior performance with fivenines reliability, while dramatically reducing the cost of enterprise messaging and provide a centrally-managed messaging infrastructure that can meet today’s needs for security, reliability and compliance, and address new requirements like group collaboration, mobile access and instant messaging. Mirapoint technology is proven, with over 100 million mail boxes served and secured worldwide for customers like Ford, STMicroelectronics, RSA Security, British Telecom, China Telecom, and University of Georgia.

Palo Alto

Palo Alto is leading a new era in cyber security by safely enabling all applications and preventing advanced threats from achieving their objectives for thousands of organizations around the world. Palo Alto is the fastest growing security company in the market because of deep expertise, commitment to innovation, and game-changing security platform focused on bringing an end to the era of breaches by uniquely integrating Next-Generation Firewall (NGFW), Advanced Endpoint Protection, and Threat Intelligence Cloud. With Palo Alto's platform, organizations can confidently pursue a digital-first strategy as they implement key technology initiatives within the cloud and increasingly mobile networks, while maintaining complete visibility and control, to protect their most valued data assets and critical control systems.

Procera Networks

Procera Networks develops Evolved DPI solutions that provide the most accurate traffic awareness, control and protection for complex networks. Its PacketLogic™ product suite was purpose built for DPI and leverages the company’s advanced identification engine, DRDL™. As fully integrated solutions, PacketLogic products give network managers access to relevant network traffic intelligence that enables network optimization, creation of services (with the most accurate user and location awareness) and protection against malicious behaviour. PacketLogic is a stateoftheart deep packet inspection (DPI) solution that offers an extensive feature richness in the software modules LiveView, Filtering, Traffic Shaping, Statistics and WebStatistics.

RSA

RSA is a security vendor that focus on business-driven security. RSA enables the three most critical elements of security strategy: cyber threat detection and response, identity and access management, online fraud prevention, and governance, risk and compliance.

SailPoint

SailPoint, the undisputed leader in identity governance, brings the Power of Identity to enterprise customers around the world. SailPoint’s open identity platform gives enterprises the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis–securely and confidently. The company pioneered the identity governance market, and provides an integrated set of cloud-based services, including compliance controls, provisioning, password management, single sign-on and data access governance, all built on the belief that identity is a business enabler.

ScienceLogic

ScienceLogic is a leading solution in information technology (IT) management, IT Operations and Cloud computing. ScienceLogic platform monitors both on-premises and cloud-based IT assets, enabling customers who use public cloud services, such as Amazon Web Services (AWS), Microsoft Azure, and Ajubeo Cloud Agility to migrate workloads to the cloud. It also provides discovery, dependency mapping, monitoring, alerting, ticketing, runbook automation, dashboarding and reporting for networks, compute, storage and applications.

Symantec (Blue Coat)

Symantec (Blue Coat)’s delivers an integrated security platform that addresses these evolving network + security + cloud requirements – with six advanced solutions that work equally well across on-premise and cloud-managed environments: Proxy-based traffic inspection and policy enforcement, Encrypted traffic management, Advanced threat protection, Incident response, analytics & forensics, Web application protection and Network performance optimization.

Tectia

SSH technology secures the infrastructure of digital world - on-premise or in the cloud. It offers centralizes and automates key management and access to critical resources. It provides identity visibility and access of man-to-machine and machine-to-machine communications and controls the provisioning of access.

Tenable Network Security

Tenable Network Security transforms security technology for the business needs of tomorrow through comprehensive solutions that provide continuous visibility and critical context, enabling decisive actions to protect your organization. Tenable provides precision focus and critical context to help you easily discover the vulnerabilities associated with evolving technologies, devices, users, applications and containers. By combining vulnerability data with device log data, network traffic and threat intelligence feeds, we deliver a deeper, real-time, and prioritized picture of what truly matters most to help you reduce your attack surface–and achieve program success.

Trend Micro

Trend Micro solutions protect end users on any device, optimize security for the modern data center, and secure networks against breaches from targeted attacks. Trend Micro deliver top-ranked client-server, network, and cloud-based protection that stops new threats faster, detects breaches better, and protects data in physical, virtual, and cloud environments.

Trend Micro TippingPoint offers a wide range of network security solutions with real-time network protection, visibility, and centralized management and analytics that are easy to use, configure, and install. TippingPoint protects the user’s network from the sophisticated attacks by Threat Protection System (TPS), Next-Generation Intrusion Prevention System (IPS), Advanced Threat Protection (ATP) and Digital Vaccine Labs Threat Intelligence (DVLabs) with integrated security policy, response, and visibility across all TippingPoint network security devices through centralized network security management.

Tripwire

Tripwire, the recognized leader in File Integrity Monitoring and Configuration Compliance with over 6,000 customers worldwide, provides a comprehensive solution that enables you to mitigate risk, automate compliance, and increase operational efficiency. Tripwire is the first company to effectively combine configuration assessment with automated change auditing required for successful configuration audit and control. The result is a complete solution that can proactively assess configurations across your data center to ensure they comply with internal and external policies, as well as identify and validate all changes to ensure your configurations remain in a known and trusted state.

Visual Network Systems

Visual Network Systems (Formerly Fluke Networks Systems) specializes in providing Performance SLAs based, Performance Management (PfM) Solutions, focused mainly on enterprises who have deployed business critical applications, especially like core banking. Headquartered in Everett, Washington, Fluke Networks has over 700 employees worldwide and distributes its products in more than 50 countries and are used by 96 of the Fortune 100 companies. Enterprise Performance Management Solutions help customers manage IT infrastructure with strong Performance SLAs and therefore help IT managers move from a reactive approach to IT management to a more proactive one. IT Management by performance SLAs focused on effective application delivery over the network provides higher availability, reliability, application consistency, improves problem detection and resolution, enable scalable and rapid roll out of new applications.