Security Technologies
Top cyber security vendors & solutions being used by small, medium & large organisations around the globe.
Check Point Software
Check Point is an American-Israeli multinational provider of software and combined hardware and software products for IT security, including network security, endpoint security, cloud security, mobile security, data security and security management.
Palo Alto Networks
Palo Alto Network is an American cyber security organisation with headquarters in Santa Clara, California. Its core products include advanced firewalls and cloud-based offerings that extend those firewalls to cover other aspects of security.
McAfee
McAfee Corp. is an American global computer security software company headquartered in San Jose, CA. The company was purchased by Intel in February 2011 and became part of the Intel Security division.
Symantec (NortonLifeLock Inc./Broadcom)
NortonLifeLock Inc., formerly known as Symantec Corporation, is an American software company headquartered in Tempe, Arizona, United States. The company provides cybersecurity software and services to users all over the world.
Splunk
Splunk Inc. is an American software company based in San Francisco, California, that produces software for searching, monitoring, and analysing machine-generated data via a web-style interface.
ArcSight (Micro Focus)
Micro Focus ArcSight is a cyber security product, first released in 2000, that provides big data security analytics and intelligence software for security information and event management and log
Tenable
Tenable, Inc. is a cyber security company based in Columbia, Maryland. It is known as the creator of the vulnerability scanning software Nessus.
Rapid7
Rapid 7 is a security solution company based in Boston, Massachusetts. It provides services and products to protect, detect and response the security incidents.
LogRhythm
LogRhythm, Inc. is an American security intelligence company that specializes in security information and event management, log management, network and endpoint monitoring and forensics, and security analytics.
Sophos
Sophos Group plc is a British based security software and hardware company. Sophos develops products for communication endpoint, encryption, network security, email security, mobile security and unified threat management.
Trellix (FireEye)
Trellix (formerly FireEye and McAfee Enterprise) is a privately held cyber security company founded in 2004. It has been involved in the detection and prevention of major cyber attacks and provides hardware, software, and services to investigate cyber security attacks, protect against malicious software, and analyse IT security risks.
CrowdStrike
CrowdStrike Holdings, Inc. is an American cyber security technology company based in Austin, Texas. It provides cloud workload and endpoint security, threat intelligence, and cyber attack response services.
Fortinet
Fortinet is an American multinational company headquartered in Sunnyvale, California. It develops and sells cyber security solutions, such as physical firewalls, antivirus software, intrusion prevention systems, and endpoint security components.
Trend Micro
Trend Micro Inc. is an American-Japanese multinational cyber security software company with global headquarters in Tokyo, Japan and Irving, Texas, United States, and global R&D headquarters in Taipei, Taiwan. Other regional headquarters and R&D centers are located around Asia, Europe, and North America.
Proofpoint (Thomas Bravo)
Proofpoint, Inc. is an American enterprise security company based in Sunnyvale, California, that provides software as a service and products for email security, data loss prevention, electronic discovery, and email archiving.
Imperva
Imperva is a cyber security software and services company which provides protection to enterprise data and application software.
Zscaler
Zscaler is a cloud security company and a leader in zero trust, headquartered in San Jose, California.
Okta
Okta, Inc. is a publicly traded identity and access management company based in San Francisco. It provides cloud software that helps companies manage and secure user authentication into applications, and for developers to build identity controls into applications, website web services and devices.
Educational videos available for our WeCyberYou! community
Articles & Tips…
Learn more about this amazing field and how to become a recognised professional in this growing industry.
Ultimate Career Guide Part 2
Cyber Security is in high demand, and there are plenty of job opportunities to choose from in this exciting industry. With salaries often several times higher than most average IT professionals, being a cyber security professional could be a great career of your choice.
Ultimate Career Guide Part 1
Cyber Security is in high demand, and there are plenty of job opportunities to choose from in this exciting industry. With salaries often several times higher than most average IT professionals, being a cyber security professional could be a great career of your choice.
Pathways To Learn Cyber Security
If you aspire to become a cyber security professional or are anxious about what the career can offer you in the future, now is the best time to start researching.
Understanding Cyber Security Part 1
The purpose of this article is to provide to you a comprehensive overview about cyber security and its importance for organisations and society nowadays. We will be also talking about its security domains, current cyber threats risking corporations’ environments, challenges faced by organisations to protect themselves from cyber attacks and cyber security defences and best practices that can be implemented to mitigate their risks.
Further details about how those cyber security defences and best practices are being implemented in the workplace will be discussed at a later time in the portal.
I hope you enjoy the reading and please kindly send your thoughts (either in English or Portuguese) about this article and suggestions of new topics to info@wecyberyou.com if you like.
Understanding Cyber Security Part 2
The purpose of this article is to provide to you a comprehensive overview about cyber security and its importance for organisations and society nowadays. We will be also talking about its security domains, current cyber threats risking corporations’ environments, challenges faced by organisations to protect themselves from cyber attacks and cyber security defences and best practices that can be implemented to mitigate their risks.
Further details about how those cyber security defences and best practices are being implemented in the workplace will be discussed at a later time in the portal.
I hope you enjoy the reading and please kindly send your thoughts (either in English or Portuguese) about this article and suggestions of new topics to info@wecyberyou.com if you like.
Understanding Cyber Security Part 3
The purpose of this article is to provide to you a comprehensive overview about cyber security and its importance for organisations and society nowadays. We will be also talking about its security domains, current cyber threats risking corporations’ environments, challenges faced by organisations to protect themselves from cyber attacks and cyber security defences and best practices that can be implemented to mitigate their risks.
Further details about how those cyber security defences and best practices are being implemented in the workplace will be discussed at a later time in the portal.
I hope you enjoy the reading and please kindly send your thoughts (either in English or Portuguese) about this article and suggestions of new topics to info@wecyberyou.com if you like.
Did you know 55,000 devices are compromised by ransomware each month globally?
With over 20 years’ experience specialising in cyber security, we have developed courses to educate and help you safeguard your privacy and stay safe from cybercrime. Get the latest in cyber security news, educational videos, and updates.