Data Protection and Back-up
Arcserve is a leading provider of data protection and recovery solutions that empowers organisations with the assurance that they can recover their data and applications when needed. Arcserve provides a comprehensive suite of products for cloud, virtual and physical environments, on premise or in the cloud, backed by unsurpassed support and expertise. Arcserve Unified Data Protection (UDP), available on Arcserve’s appliance or your hardware, drives a full range of highly efficient and integrated data protection capabilities through a simple, web-based user console and is the only solution to be secured with Sophos Intercept X Advanced for unmatched defence against malware, exploits, and ransomware.
The Deep Instinct deep learning revolution
Deep Instinct is the first and only company to apply end to end deep learning to cybersecurity. Deep Learning is inspired by the brains ability to learn. Once a brain learns to identify an object, its identification becomes second nature. Similarly, as Deep Instinct’s artificial deep neural network brain learns to prevent any type of cyber threat, its prediction capabilities become instinctive. As a result, any kind of malware, known or new, first-seen malware, zero-days, ransomware and APT attacks of any kind, are predicted and prevented in zero-time with unmatched accuracy and speed anywhere in the enterprise.
Unlike detection and response-based solutions, which wait for the execution of an attack to react, or post-execution which achieves too little too late, our deep learning based prevention approach keeps our customers protected, while dramatically reducing costs.
Gurucul is a global cyber security and fraud analytics company that is changing the way organizations protect their most valuable assets, data and information from insider and external threats both on-premises and in the cloud. Gurucul’s real-time Unified Security and Risk Analytics Platform combines machine learning behaviour profiling with predictive risk-scoring algorithms to predict, prevent and detect breaches. Gurucul technology is used by Global 1000 companies and government agencies to fight cyber fraud, IP theft, insider threat and account compromise as well as for log aggregation, compliance and risk based security orchestration and automation for real-time extended detection and response.
Multi-Cloud Self-Service and DevOps Orchestration
Morpheus is a 100% agnostic cloud management platform (CMP) designed from the ground up to unify management of multi-cloud and hybrid IT while empowering DevOps teams with self-service provisioning of bare metal, VM, and container-based application services.
With more built-in third-party integrations and faster time-to-value than any other, it’s a foundation to bridge the gap between teams, tools, and processes independent of where and how applications are deployed.
Morpheus is a single platform that unifies the tools you already have and standardizes processes across multiple clouds with complete application lifecycle management – provisioning, backup, logging, monitoring, reporting, and access control.
Storage made easy
The Storage Made Easy Enterprise File Fabric™ enables IT to regain control of “cloud data sprawl” to unify on-premises and on-cloud files into a single easily managed converged infrastructure with policy-based controls for governance, audit and security.
The File Fabric solution provides a “blanket” enterprises wrap around all their data: on premises, within public and private clouds, as well as on third-party software vendor clouds (SharePoint Online and Salesforce for example). Customers use the SME File Fabric product to unify corporate data to enable workgroup collaboration with universal controls for security, encryption, audit, and data access.
Companies will have access to a greater understanding of where and how sensitive data is stored, transferred, and accessible with particular focus on how companies are able to police and audit data to ensure enforcement of the General Data Protection Regulations (GDPR) in addition to other regional data legislation.
Bamboo Systems’ is disrupting the $80B server market with next generation Arm-based servers based on the company’s revolutionary Parallel Arm Node Designed Architecture (PANDA). PANDA was designed to meet the needs of modern software architecture by maximizing throughput, while minimizing space and energy consumption. Bamboo servers run all open-source Linux applications, and can optimize workloads such as Kubernetes, AI/ML, Edge computing and IoT, and Platform-as-a-service. Bamboo PANDA-based servers save up to 50% of the acquisition cost, 75% of the energy consumption, and 80% of the rack space, compared to a traditional x86-based server.
Diamanti’s fully integrated Kubernetes platform gives platform architects, IT operations, and application owners the performance, simplicity, efficiency, and enterprise features they need to get cloud-native applications to market fast.
Deploying a Kubernetes environment yourself can mean investing money and time—weeks or even months of installation, integration, and testing. Even then, you’ll lack the performance and reliability you need. But with Diamanti, you can deploy a complete enterprise-class container stack in 15 minutes—with compute, networking, storage, Docker, and Kubernetes fully integrated and supported.
Komprise is a software company which allows for file based data (unstructured) to be analysed, understood and optimized relative to need. Independent of source (i.e. NetApps, Isilon, Pure Flashblade, etc) and target, data can be moved non-disruptively with zero impact to the end user experience – this could be a secondary NAS, an object store (i.e. Cloudian, etc), a cloud environment (AWS, Azure, etc) or any combination. Komprise is The simple, smart way to manage data.
The Approachable Cloud Company
Whether you’re new to the cloud or a veteran, RSTOR is here to help you overcome cloud challenges and find a better way!
RSTOR Space and RSTOR Transporter are two flagship products that are changing the way organisations can leverage cloud.
RSTOR gives you the Space to run your business with an object storage system that works the way you want – turbo charged speed, data protection you can trust and packed with innovative new features.
Why is moving data to, across and within the cloud so hard? RSTOR Transporter makes it easy to move data into the cloud, between different clouds or even regions of the same cloud. With RSTOR Transporter its as easy as 1, 2, 3
Continuous Cloud Optimisation (Public Cloud)
spot gives your workloads the cloud infrastructure they deserve always available, always scalable and always at the lowest possible cost.
End-to-End visibility provides insights into cloud usage and costs across your organisation, from infrastructure to workloads and application. Actionable guidance shows you where and how you can increase efficiency and reduce costs for the greatest impact .Real-time optimization uses proven advanced analytics and machine learning to continuously optimise your purchase and utilisation of Cloud resources.
Enterprise Object Storage
Cloudian HyperStore object storage solves your biggest storage challenges. Deploy HyperStore nodes wherever you need capacity storage, then scale seamlessly. Simplicity is built in. Nodes form a global data fabric that you manage within a single framework. With the industry’s most compatible S3 API and a proven, hyperscale architecture, Cloudian HyperStore is the antidote to storage complexity.
Integrated DNS, DHCP & IP Address Management
EfficientIP enables IP-based communication, simplifies network management and enhances operational efficiency thanks to global visibility, consistency control and smart automation of DDI (DNS-DHCP-IPAM). They secure DNS services to safeguard data confidentiality, protect users and ensure application access in cloud and on-premise.
Mitigate Cyber is one of the leading cyber security companies in the UK and work with organisations to detect and mitigate internal and external threats, to help prevent cyber-attacks and breaches. Based at Security Lancaster, a Centre of Excellence in Cyber Security Research, Cyber Essentials Certification Body and CREST Certified, Mitigate Cyber is at the forefront of providing cyber security services worldwide.
Mitigate Cyber, security services keep business’ data safe and secure, through the one-stop-shop for all cyber security requirements:
- Mitilearn – Cyber Security Awareness Training
- Mitihack – Simulated Hacking
- Miticert – Cyber Essentials Certification
- Miticomply – Cyber Security Compliance and Consultancy
- Mitisure – Cyber Liability Insurance
- Mitiintel – Managed Threat Detection and Response.
The secure identity Company.
You no longer have to choose between sophisticated security and user convenience.
SecureAuth have pioneered smart authentication for companies with complex environments, achieving one goal: Transform security into a business-enabler as opposed to a source of friction. Invisible security means that your users won’t need passwords. Plus, SecureAuth’s multiple risk-layer checks—the most in the marketplace—run quietly in the background, not making their presence known… unless something suspicious is detected.
All Flash Storage
Vast Data is an innovative storage company who have broken 30 years of price versus performance trade-offs with All-Flash performance, write at 3D XPoint speeds, read at NVMe speeds, scale to millions of IOPS and terabytes per second.
Along with their ability to archive cost efficiency and engineered at every level to deliver unrivalled system efficiency. With exabyte scale-file and object storage scale to meet any application or capacity agenda, enabling them to meet the needs of the more demanding workloads.