C Y B E R S E C U R I T Y



Similar documents
C Y B E R S E C U R I T Y

NEXT GENERATION APPLICATION SECURITY

On and off premises technologies Which is best for you?

How To Secure Your Business

McAfee Security Architectures for the Public Sector

IT Security. Muscat 15+ ABOUT US IN A GLANCE

IBM Security Strategy

Cyberoam Perspective BFSI Security Guidelines. Overview

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Symantec IT Management Suite 7.5 powered by Altiris

CYBERSECURITY. Global cybersecurity capabilities for a digital transformation with confidence. Delivering Transformation. Together.

Cybersecurity Health Check At A Glance

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

McAfee - Overview. Anthony Albisser

A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities.

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Advanced Persistent Threats

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

A viable alternative to TMG / UAG Web Application security, acceleration and authentication with DenyAll s DA-WAF

Proven LANDesk Solutions

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Brainloop Cloud Security

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Cyber Essentials Questionnaire

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

How To Achieve Pca Compliance With Redhat Enterprise Linux

Locking down a Hitachi ID Suite server

Devising a Server Protection Strategy with Trend Micro

Security Best Practices for Microsoft Azure Applications

I. Introduction to Privacy: Common Principles and Approaches

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

Emerging Trends in the Network Security Market in India, CY 2013

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Devising a Server Protection Strategy with Trend Micro

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Performanta Pty Ltd. Company Profile. May Trust. Practical. Performanta.

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

The Attacker s Target: The Small Business

Executive Summary P 1. ActivIdentity

74% 96 Action Items. Compliance

IBM Internet Security Systems

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

How To Get A Cloud Service For A Small Business

Unified Threat Management, Managed Security, and the Cloud Services Model

Cyber Essentials Scheme

DenyAll 2014 Newsletter

Protect Breakout: Connected Security for a Connected World

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

View from a European Trust Service Provider Server Signing: Return of experience and certification strategy

Comprehensive real-time protection against Advanced Threats and data theft

Top 10 Reasons Enterprises are Moving Security to the Cloud

Putting Web Threat Protection and Content Filtering in the Cloud

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

End-user Security Analytics Strengthens Protection with ArcSight

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

Security Management. Keeping the IT Security Administrator Busy

REVOLUTIONIZING ADVANCED THREAT PROTECTION

IT Security & Compliance. On Time. On Budget. On Demand.

SANS Top 20 Critical Controls for Effective Cyber Defense

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

Clarizen Security White Paper

Building Your Complete Remote Access Infrastructure on Windows Server 2012

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

BlackRidge Technology Transport Access Control: Overview

How to choose the right NGFW for your organization: Independent 3 rd Party Testing

GlobalSign Malware Monitoring

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise

Did you know your security solution can help with PCI compliance too?

CYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products.

KEY STEPS FOLLOWING A DATA BREACH

Protecting systems and patient privacy

WEBSENSE TRITON SOLUTIONS

Information Security Basic Concepts

Information Blue Valley Schools FEBRUARY 2015

Symantec Mobile Management 7.2

AL RAFEE ENTERPRISES Solutions & Expertise.

Transcription:

I N N O V A T I O N F O R C Y B E R S E C U R I T Y 2 0 1 3 E D I T I O N

Mission of the HexaTrust Club The HexaTrust club was founded by a group of French SMEs that are complementary players with expertise in information security systems, cybersecurity and digital trust. Representative of French excellence in innovative solutions, these software vendors and Integrators have come together to provide a full range of efficient and consistent products and services dedicated to the security of critical infrastructures. This combination meets the needs of enterprises, administrations, public and private organizations of all sizes, keen to receive European and French innovative offers, covering all their IT security needs. Building on their presence on the European market, HexaTrust members also want to accelerate their international development by sharing their experience, their networks and means of access to global markets. HexaTrust will act in close cooperation with professional organizations, users and institutional actors, working to strengthen the chain of Cybersecurity and Digital Trust groups, supporting the development of innovation and growth SMEs, future leaders of information security systems.

I N N O V A T I O N F O R C Y B E R S E C U R I T Y H E X A T R U S T Values & Commitments The core values of the club, based on five founding commitments are: Innovation, Union, Action Commitment #1 To facilitate exchanges and synergies among European and French software vendors and security services companies. Commitment #2 Promote and market a portfolio of innovative products and services, offering broad-spectrum coverage of risks for the protection of critical and vital infrastructures. Commitment #3 Develop and promote the skills and expertise of innovative French SMEs positioned on the information security systems, digital trust and cybersecurity markets to major private and public customers. Commitment #4 Encourage access to foreign markets through the organization of targeted joint marketing and business activities. Commitment # 5 Be the spokesperson for the French SMEs positioned on the markets of information security systems, digital trust and cybersecurity and act in act in coordination with public and private organizations representing users, professionals and governmental institutions.

Bertin HIGH ASSURANCE EAL 5 SECURE VIRTUALIZATION THREAT DETECTION EARLY WARNING Bertin Technologies IT is a leading provider of high performance cyberintelligence and cybersecurity products and solutions. BERTIN PRODUCTS PolyXene based products enable secure PC s, mobile terminals, as well as network equipment. PolyXene is a trusted hypervisor offering a highly secure EAL5+ certified virtualization solution. Mediacentric products offer efficient and easy to use open source media intelligence solutions. Mediacentric Cyber specifically brings to most demanding and risk adverse customers, an entire early warning, intelligence and detection solution against cyber risks and attacks, including threat and vulnerability detection. BERTIN TECHNOLOGIES (HQ) 10 bis, Avenue Ampère - 78180 Montigny-le-Bretonneux FRANCE Tel.: +33 (0)1 39 30 62 59 Email: Bertin.IT@bertin.fr www.bertin.fr

Brainwave ACCOUNTS REVIEW DATA QUALITY SEGREGATION OF DUTIES COMPLIANCE ENTITLEMENTS CATALOG ROLE MODELING Brainwave is a leader in Identity Intelligence solutions. Brainwave has developed an innovative software solution to help organizations manage operational risks and ensure compliance constraints related to users and access rights: Brainwave Identity GRC. Part of the 2012 Gartner s IAG Magic Quadrant, 2013 Gartner s IAM Cool Vendor, Brainwave Identity GRC is distributed through a network of consulting partners across Europe, Africa, Canada and the US. BRAINWAVE PRODUCTS BRAINWAVE Identity GRC Brainwave Identity GRC collects data coming from all application silos and consolidates them for further analyses in an Identity oriented, historised repository. It is a simple and pragmatic answer to the identification of problems with data quality, compliance management and segregation of duties. It streamlines account review campaigns, monitors remediation and exceptions and can even help putting together role models. BRAINWAVE (HQ) 38-42 rue Galliéni 92600 Asnières-sur-seine Tel.: +33 (0)1 84 19 04 10 Fax: +33 (0)1 84 19 05 01 Email: contact@brainwave.fr www.brainwave.fr

DenyAll WEB APPLICATION FIREWALL VULNERABILITY SCANNER VIRTUAL PATCHING APPLIANCES DenyAll innovates to respond to the needs of organizations of all sizes. Its products detect IT vulnerabilities and protect infrastructures against application-layer attacks. DenyAll is an innovative leader in the application security market. The company was one of the pioneers of the Web Application Firewall market in Europe. Building on 15 years of experience securing and accelerating web applications and services. DENYALL PRODUCTS Detect: Vulnerability Scanners in SaaS, Virtual Machine & USB (Edge Tester, Vulnerability Manager, Auditor) Protect: Web Application Firewall (rweb, sproxy, rftp, rxml, Client Shield) Manage: Dashboard and Management Console (DAMC) DENYALL FRANCE (HQ) 63 ter, avenue Edouard Vaillant, 92100 Boulogne-Billancourt FRANCE Tel.: +33(1) 46 20 96 00 Fax: +33(1) 46 20 96 02 Email: sales@denyall.com www.denyall.com

TheGreenBow SECURITY SOFTWARE VPN EMAIL ENCRYPTION CRYPTO IPSEC PRIVATE PRIVACY SECURE REMOTE ACCESS TheGreenBow is a leading developer of Enterprise Security Software for laptop and mobile devices such as VPN software to secure access and communications for the mobile workforce. Their software is designed to be extremely easy to use with the strongest authentication and encryption standards.thegreenbow Security software includes a VPN Client and CryptoMailer secured email. THEGREENBOW PRODUCTS CryptoMailer encrypts in one click the email you send, without having to share secret. CryptoMailer works on PC/iPhone/Android, Thunderbird, Outlook and with any webmail. TheGreenBow VPN Client is a universal VPN Client which supports every Gateway on the market. THEGREENBOW (HQ) 28, rue de Caumartin - 75009 Paris FRANCE Tel.: +33 (0)1 43 12 39 37 Email: sales@thegreenbow.com www.thegreenbow.com

Ilex IAM IDENTITY MANAGEMENT ACCESS MANAGEMENT IDENTITY FEDERATION SINGLE SIGN-ON ROLE MANAGEMENT STRONG AUTHENTICATION CARD MANAGEMENT COMPLIANCE ILEX is a software provider specializing in IAM (Identity & Access Management). Provider to most of the blue chip companies, throughout the past 20 years Ilex has developed proven expertise in data access control and the management of identity and rights repositories. In its last IAM reports, Gartner ranks ILEX as one of the top vendors of this market. ILEX PRODUCTS ILEX s offer is centred around 5 products: Sign&go: Strong Authentication, Access Management, Global SSO (Web Access Management, and Enterprise SSO) and Identity Federation, Meibo: Workflow, Provisioning and Identity Management, Meibo Role Management: Role Management, Meibo People Pack: a turn-key solution for enterprise employee lifecycle management, IDen Park: Card Management System (PKI). ILEX (HQ) 51, boulevard Voltaire - 92600 Asnières-sur-Seine FRANCE Tel.: +33 (0)1 46 88 03 40 Fax: +33 (0)1 46 88 03 41 Email: sales@ilex.fr www.ilex.fr

InWebo 2-FACTOR AUTHENTICATION TRANSACTION SEALING IDENTITY FEDERATION BRING-YOUR-OWN-TOKEN WEB SSO AGENTLESS TOKEN In-Webo provides frictionless 2-factor authentication and online transaction sealing that protects digital identities, thereby protecting your business in a connected world. In-Webo enables easy, massive and on-time rollout with its highly secure tokens. Its unique, patented and certified technology uses dynamic keys. Turn your laptop, tablet, phone or smartphone, TV into a 2-factor authentication and align your security with your business requirements whether you are a business, a service provider or a SaaS vendor! We are your last mile partner for your IT infrastructure security. IN-WEBO PRODUCTS In-Webo offers global online service to make the authentication agile and easy for the user but also for the IT team: HSM based servers, automatic provisioning, flexible management, several flavors of token including mobile, desktop, agentless, in-app tokens, and a password manager. IN-WEBO TECHNOLOGIES (HQ) 3, rue Montyon - 75009 PARIS FRANCE Tel.: +33 (0)1 46 94 68 38 Email: sales@inwebo.com www.inwebo.com

Netheos SECURE SUBSCRIPTION ON MOBILE NEW CUSTUMER ACQUISITION STRONG AUTHENTICATION CERTIFICATE-BASED SIGNATURE T R U S T A N D P R I V A C Y Netheos is the specialist in secure paperless transactions and contracts on smartphone and tablet. Netheos enables financial institutions to innovate quickly in new mobile services while ensuring their technical and legal safety: loan, insurance or credit card subscription. Embedded to the heart of the mobile application, ekeynox ensures identity of existing customers (strong authentication), but also new customers (on-the-fly verification of photographed documents, such as a national ID card), and implements an electronic signature with probative value enforceable against a third party. NETHEOS PRODUCTS ekeynox Mobile SDK ekeynox Management System (SaaS or in-premises) ekeynox Trusted Services (SaaS) NETHEOS FRANCE (HQ) 1025, avenue Henri Becquerel - 34 000 Montpellier FRANCE Tel.: +33 (0)9 72 34 11 80 Email: contact@netheos.net www.netheos.com

Olfeo INTERNET SECURITY URL FILTERING PROXY ANTIVIRUS WEB TRAFFIC OPTIMIZATION VISITORS WEB ACCESS MANAGEMENT Olfeo offers a proxy and content filtering solution which allows organizations to manage their Internet access and use. Thanks to a local culture based approach, the Olfeo solution provides optimal legal protection, unrivalled filtering quality, a high level of information system security and it matches users with the security policy. This innovative strategy has been approved by more than 1500 satisfied customers representing over 2 million users. OLFEO PRODUCTS The Olfeo solution includes 5 products: Proxy Cache QoS and SSL URL filtering Protocol filtering Antivirus Mobility Controller Available in numerous formats: software, appliance, virtualized, SaaS, the solution offers a single and multi-language administration console. OLFEO (HQ) 15, Boulevard Poissonnière 75002 PARIS FRANCE Tel.: +33 (0)969 390 999 Email: contact@olfeo.com www.olfeo.com

Opentrust TRUSTED ID EGOVERNMENT SOLUTIONS STRONG AUTHENTICATION CREDENTIAL MANAGEMENT SYSTEM DIGITAL SIGNATURE SECURE FILE EXCHANGE OpenTrust is a leading provider of trusted identity-based solutions for protecting credentials, data and transactions. We are also an internationally recognized Certificate Authority. Our company offers software and cloud services over two business lines: Trusted Identities: strong authentication based on PKI and Credential Management for all devices Trusted Documents and Transactions: digital signature and encryption software and services that provide legally binding proof, traceability and confidentiality OpenTrust operates in Europe, the Middle East and the USA through a network of local resellers. OPENTRUST PRODUCTS Citizen ID: Citizen identity management Protect & Sign: Digital signature, time stamping Corporate ID: Corporate identity management MFT: Secure file exchange CMS: Credential Management System OPENTRUST (HQ) 11-13, rue René Jacques 92131 Issy-les-Moulineaux cedex FRANCE Tel.: +33 (0)1 55 64 22 00 Fax: +33 (0)1 55 64 22 01 Email: info@opentrust.com www.opentrust.com

Vade Retro ANTI SPAM ANTI MALWARE ANTI PHISHING ANTI BLACKLISTING GRAYMAIL CLASSIFICATION Vade Retro Technology, European leader, protects and classifies several hundred million inboxes worldwide. Thanks to a combination of several technologies including the use of a heuristic and behavioral filter, our solutions allow: Filtering inbound and outbound traffic Blocking 0-day attacks Fully securing SMTP traffic Classifying low-priority e-mails Safely unsubscribing to commercial emails The best filter worldwide for non-english e-mails. VADE RETRO TECHNOLOGY PRODUCTS Corporate & Hosting solutions Vade Retro Cloud Physical or virtual MailCube appliance Hosting, IPS & OEM solutions Vade Retro Cloud Kit SDK Filter Engine Range offering multi-level administration, adaptable to all system environments. VADE RETRO TECHNOLOGY (HQ) 3 av. Antoine Pinay Parc d activité des 4 Vents 59510 Hem FRANCE Tel.: +33 (0)328 328 888 Fax: +33 (0)328 328 889 Email: sales@vade-retro.com www.vade-retro.com

WALLIX TRACEABILITY COMPLIANCE ACCESS CONTROL SESSION RECORDING MITIGATE INSIDER THREAT T R A C E, A U D I T & T R U S T WALLIX is the European leader in priviledged users management, compliance, and traceability solutions. WALLIX have succeeded in combining the three core requirements of managing privileged users, password management, access control and traceability, into a single easy to deploy solution - The Wallix AdminBastion (WAB). WALLIX s solutions are distributed through a network of VARs across Europe, the Middle East, Africa, Russia and Asia. The solutions are designed to meet the compliance and governance needs of organisations across all industry sectors. WALLIX PRODUCTS WALLIX ADMINBASTION - WAB: Controls & traces privileged user activity WAB REPORT MANAGER - WRM: Detailed reporting tool on wab activity WALLIX FRANCE (HQ) 118, rue de Tocqueville - 75017 Paris Tel.: +33 (0)1 53 42 12 90 Fax: +33 (0)1 43 87 68 38 Email: sales@wallix.com www.wallix.com

w w w. h e x a t r u s t. c o m