Access Data Partner

AccessData Corporation – AccessData, the leader in digital forensics investigations software, has pioneered digital investigations for 20+ years, empowering law enforcement, government agencies & corporations to perform computer investigations of any kind. Their Forensic Toolkit®, cyber-security and eDiscovery software solutions allow organizations to preview, search for, forensically preserve, process and analyze electronic evidence. AccessData solutions enable computer forensics investigations, incident response, eDiscovery and information assurance. In addition, they are the leading provider of digital forensics training and certification.



ArcSight – ArcSight is a market leader in Security Information & Event Management (SIEM) for cyber-security and compliance monitoring.  ArcSight helps safeguard your business by giving you complete visibility into activity across the IT infrastructure:  External threats such as malware and hackers, internal threats such as data breaches and fraud, and compliance pressures from failed audits.  ArcSight provides the industry’s leading Cyber-Threat and Risk Monitoring Platform, comprised of integrated products for collecting, processing and assessing security and risk event information. This platform enables rapid identification, prioritization, and response to policy breaches, cyber-security attacks and insider threats, and is in use by the most demanding private and public organizations in the world.


Becrypt – Becrypt provides market leading data security and data protection solutions that can be configured to the individual needs of your organization. Becrypt’s main focus in the United States is the Trusted Client Solution. Trusted Client is a self contained encrypted bootable USB solution that typically resides on a USB flash drive, and allows employees to work securely from an unmanaged internet connected PC. It addresses the risks inherent in using an unmanaged PC, which cannot be trusted, to connect to an organization’s secure network and data. Inserting the Trusted Client device into a USB port and re-booting launches a secure isolated environment, which provides a user interface, a web browser, email access and standalone applications. Trusted Client is fully configurable to each organization’s individual requirements. With Trusted Client, staff members no longer need laptops for home or occasional remote working; instead they can be issued an inexpensive bootable USB flash drive, which is secure, and easier to carry.

Besides remote working, home working, and occasional off-site working from unmanaged PCs, Trusted Client can also be used in Business Continuity scenarios, either as a secure remote access device, or as a standalone secure environment should the corporate network fail.  Trusted Client offers Out-of-the Box integration with standard browsers, Citrix and Microsoft Terminal Services.

Trusted Client uses the FIPS approved Becrypt cryptographic algorithm and has been awarded a Common Criteria certificate.


Blue Coat Systems – Blue Coat Application Delivery Network Infrastructure solutions are designed to help you contain network and bandwidth costs, enhance business productivity and mitigate exposure to evolving web threats, providing you with the flexibility to quickly align network investments with changing business requirements, speed decision making and ensure proactive layers of defense to fuel a sustainable competitive advantage.


Fortinet – Fortinet is a worldwide provider of network security appliances and a market leader in unified threat management (UTM).   Their products and subscription services provide broad, integrated and high-performance protection against dynamic security threats while simplifying the IT security infrastructure.  Fortinet’s customers include enterprises, service providers and government entities worldwide, including the majority of the 2009 Fortune Global 100. Fortinet’s flagship FortiGate product delivers ASIC-accelerated performance and integrates multiple layers of security designed to help protect against application and network threats. Fortinet’s broad product line goes beyond UTM to help secure the extended enterprise – from endpoints, to the perimeter and the core, including databases and applications.


McAfee Security – McAfee Total Protection solutions include anti-virus, anti-spyware, anti-spam, web security, desktop firewall, host intrusion prevention (HIPS), and network access control (NAC) and policy auditing—all integrated and managed with a single web-based console.  McAfee engineered Total Protection from the ground up to be comprehensive and flexible.  Key features include:

  • One integrated management console, one set of security updates, and one point of contact for technical support
  • Comprehensive integrated protection against complex threats—both known and unknown— to block attacks and prevent disruptions
  • Advanced policy auditing and network access control to simplify compliance and improve security
  • Artemis Technology provides real-time security using signature and behavioral-based scanning.  This technology scans quarantines and blocks known and unknown threats in real-time, before the signature is released.


PKWARE – PKWARE, Inc. is the creator and continuing innovator of the ZIP standard, a global market and technology leader providing data-centric, cross-platform data security and compression software. The SecureZIP & PKZIP product families are used by over 30,000 corporate entities and over 200 government agencies to ensure data security, portability, and cross-platform computing exchange – both internally and externally with partners. Organizations in financial services, banking, retail, healthcare, government, and manufacturing use PKWARE products daily for their unmatched scalability, ease of use, and rapid deployment.

SOPHOS – Sophos is a world leader in IT security and data protection, offering organizations complete protection and control – defending against known and unknown malware, spyware, intrusions, unwanted applications, spam, policy abuse and data leakage, and providing comprehensive network access control (NAC).  Their reliably engineered, easy-to-operate products protect over 100 million users in more than 150 countries.

In addition to firewalls, anti-virus and anti-spam, organizations need security across a number of fronts that cover the entire infrastructure.  A comprehensive security strategy requires more than just malware blocking—encryption, email, Web and network access control (NAC) solutions are strategic necessities.  Sophos deploys easily, requires minimal management and is simple to use.  Emerging threats.