Best-in-class network services for an open, unified platform |
NetScaler for SDN brings onboard best-in-class partners from a wide range of specializations such as network security, network visibility, mobile device management, identity management and web content security. Together, Citrix and its partners jointly deliver consolidated, best-in-class L4-7 networking services on an open, unified platform. |
Palo Alto Networks
|
Aruba Networks
|
WebsenseWebsense unified content security helps organizations take advantage of powerful new communication, collaboration, and Web 2.0 business tools while protecting from advanced persistent threats, preventing the loss of confidential information, and enforcing Internet use and security policies. |
Trend Micro
|
CSECSE SecureMatrix® is a unique, patented, and highly secure token-less matrix authentication solution, which combines patterns and images to form a one-time single use password that can be used for desktops, Windows, VPNs, intranets & extranets, Web servers, ecommerce, and other network resources. It does not require a physical token yet it is as secure as a two-factor security system. Their focus is on enterprise-class security and authentication. |
RSARSA Adaptive Authentication is a comprehensive risk-based authentication and fraud detection platform that balances security, usability and cost. Adaptive Authentication monitors and authenticates user activities based on risk levels, institutional policies and customer segmentation. |
BlueCat NetworksBlueCat Networks provides a smarter way to manage BYOD, mobile devices and cloud. With powerful IT self-service, automation and workflow delegation, BlueCat Networks software solutions give organizations the power to manage “everything IP” in their network including devices, users and IP activity from a single pane of glass. The result is a dynamic network that is more resilient, cost effective and easier to manage. |
![]() | SplunkSplunk is the engine for machine data. It collects indexes and harnesses the machine data generated by all your IT systems and infrastructure—physical, virtual and in the cloud. It stores and indexes the data in real time in a centralized location and protects it with role-based access controls. Splunk lets you search, monitor, report and analyze your real-time and historical data. |
![]() | VenafiVenafi provides enterprise certificate and key management (ECKM) solutions, which automate the provisioning, discovery, monitoring and management of encryption assets across heterogeneous environments. |








