Numbers

  • 14

    international vendor
  • 15 years

    of experience
  • 5000+

    satisfied customers

Categories

Network

If bandwidth and signal strength matter to you, you’re in the right place.

Security

A hacker attack happens every 11 seconds. You can take steps to prevent your company from becoming a victim.

IT management

It is important to you where you store your data, isn’t it? Don’t pile up physical servers in your office. Switch to virtual servers.

Vendors and their main functions

Bitdefender Bitdefender

  • Next-generation endpoint protection
  • EDR / XDR technology
  • Cloud and on-premises based antivirus
  • Protection of endpoints, servers, and mobile devices

Trellix Trellix

  • Protection against APT attacks
  • XDR technology

N-able N-able

  • Remote surveillance and monitoring
  • Backups
  • Password manager
  • Remote desktop access
  • MSP tools

Cybereason Cybereason

  • Next-Generation Endpoint Protection
  • 24/7 monitoring and detection with MDR
  • Forensic knowledge
  • XDR and EDR technology

SecureVisio SecureVisio

  • Next-generation SIEM system
  • SOAR system
  • Log management
  • Vulnerability management
  • Protection of personal data

Mandiant Mandiant

  • Cyber intelligence
  • Incident management
  • Detection and prevention

Altaro Altaro

  • Virtual Machine backup
  • Office 365 backup
  • Windows Server backup
  • Endpoint backup

Ruckus-CommScope Ruckus-CommScope

  • High-end Wi-Fi and Switch technologies
  • Wi-Fi
  • Switch
  • WLAN

GFI GFI

  • Patch management
  • E-mail and file archiving
  • Antispam
  • Mail server
  • Firewall and VPN

Cohesity Cohesity

  • AWS-, MS Azure-, Google Cloud-support
  • Provides up-to-date data set inventory and data classification

CoreView CoreView

  • M365 management in a hybrid environment
  • M365 license management
  • M365 security, detection of configuration errors
  • M365 authorization management
  • Teams management

Octiga Octiga

  • M365 Security Monitoring
  • M365 gap analysis and continuous monitoring tool
  • M365 risk-, threat- and vulnerability analysis
  • M365 configuration monitoring

iStorage iStorage

  • Encrypted flash drives
  • Encrypted hard drives
  • CloudAshur – encrypted cloud accounts

GTB GTB

  • Data Loss Prevention (DLP)

Cofense Cofense

  • simulated attack campaigns with detailed targeting
  • phishing templates
  • detailed statistics
  • automatic reporting

Sign up for newsletter