Cyber Security Partners
Cyber Security Partners
Our partner product portfolio
At Cyberintelsys, we believe that collaboration and strategic partnerships are fundamental to improving business outcomes and we have partnerships with leaders in cybersecurity industry – one that has a solid foundation and a forward vision. We continue to forge partnerships with leaders across the Cybersecurity Industry to expand our services, create better experiences and give our clients the flexibility, security and strategic partnerships that will become an essential ingredient in maintaining and improving the client’s security posture.
BITSIGHT
PROOFPOINT
SECURONIX
CHRONICLE
INTEL471
RECORDED FUTURE
OPSWAT
BEYOND TRUST
NETSKOPE
CROWDSTRIKE
TENABLE
DIGITAL GUARDIAN
ATTIVO
VARONIS
ANOMOLI
KNOWBE4
OKTA
SNYK
BITSIGHT
Products
- Third-party Risk Management
- Security Performance Management
Features
- Supply Chain Visibility
- Continuous Monitoring
- Attack Surface Analytics
PROOFPOINT
Products
- Email Security and Protection
- Advanced Threat Protection
- Digital Risk Protection
- Security Awareness Training
Features
- Anti Phishing
- Browser Isolation
- Targeted Attack Protection
SECURONIX
Products
- NextGen SIEM
- UEBA
- SOAR
Features
- Cloud Security Monitoring
- Insider Threat Management
- Security Automation
CHRONICLE
Products
- Chronicle Backstory
- VirusTotal Intelligence
- VirusTotal Hunting VirusTotal Graph
- VirusTotal API
Features
- YARA Rules
- Automatic Rule Generation
- Retrohunt
INTEL471
Products
- Adversary Intelligence
- Credential Intelligence
- Malware Intelligence
- Vulnerability Intelligence
Features
- Brand Protection
- Insider Threat
- Threat Hunting
- Security Operations
RECORDED FUTURE
Products
- Adversary Intelligence
- Credential Intelligence
- Malware Intelligence
- Vulnerability Intelligence
Features
- Brand Intelligence
- Secops Intelligence
- Threat Intelligence,
- ThirdParty Intelligence
- Identity Intelligence
OPSWAT
Products
- Meta Access
- Meta Defender
Features
- File Upload Security
- Storage Security
- OT
- Industrial Security
BEYOND TRUST
Products
- Privilege Access Management
- Privilege Identity Management
- Secure Remote Access
- Privileged Password Management
Features
- Password Safe
- Remote Support
- Active Directory Bridge
NETSKOPE
Products
- Next Gen Secure Web Gateway
- Network Private Access
- Cloud Access Security Broker
Features
- Adaptive Access Control
- Cloud Encryption
- Remote Browser Isolation
CROWDSTRIKE
Products
- Endpoint Security Solutions
- Cloud Security Solutions
- Threat Intelligence Solutions
- Managed Services
- Security & IT Operations Solutions
Features
- Discovery, Visibility and Compliance;
- Protect workloads, hosts and containers;
- Fully managed endpoint protection delivered as a service by a CrowdStrike team of experts
TENABLE
Products
- Tenable.io
- Tenable.ap
- Tenable.cs
- Tenable.sc
- Tenable.ad
Features
- Application Security
- Cloud Security
- Compliance
- Vulnerability Assessment Vulnerability Management
DIGITAL GUARDIAN
Products
- Endpoint DLP
- Network DLP
- Managed DLP services
Features
- Compliance
- IP Protection
- Insider Threat Protection
ATTIVO
Products
- ADAssessor
- ADSecure
- Endpoint Detection Net
- BOTsink
Features
- Cloud Identity& Entitlement Visibility
- Active Directory Assessment
- Endpoint Deception
VARONIS
Products
- Dat Advantage
- Dat Edge
- Dat Alert
Features
- Data Protection
- Privacy and Compliance
ANOMOLI
Products
- Anamoli Threatstream
- Anamoli Match
- Anamoli Lens
Features
- Aggregation of intelligence from multiple sources
- Curation
- Normalization
- Enrichment and
- Risk scoring of data
KNOWBE4
Products
- PhishER
- KCM GRC Platform
- Compliance Plus Training
Features
- Phishing Security Awareness
- Automated Security Awareness program
- Breached Password test
- Browser password
- KnowBe4’s Multi-Factor Authentication Security Assessment
OKTA
Products
- Single Sign On
- Multi factor Authentication
- Universal Directory
- Authentication
- User Management
- Advanced Server Access
- Lifecycle Management
Features
- Identity and Access Management Workforce Identity
- Customer Identity
SNYK
Products
- Snyk open source (SCA)
- Snyk Code (SAST)
- Snyk container
- Snyk infrastructure as code
- Snyk cloud
Features
- Secure while you code in your IDE.
- Integrate your source code repositories to secure applications.
- Secure your containers as you build, throughout the SDLC.
- Secure build and deployment pipelines.
BITSIGHT
PROOFPOINT
SECURONIX
ATTACKIQ
CHRONICLE
INTEL471
RECORDED FUTURE
OPSWAT
BITSIGHT
Products
- Third-party Risk Management
- Security Performance Management
Features
- Supply Chain Visibility
- Continuous Monitoring
- Attack Surface Analytics
PROOFPOINT
Products
- Email Security and Protection
- Advanced Threat Protection
- Digital Risk Protection
- Security Awareness Training
Features
- Anti Phishing
- Browser Isolation
- Targeted Attack Protection
SECURONIX
Products
- NextGen SIEM
- UEBA
- SOAR
Features
- Cloud Security Monitoring
- Insider Threat Management
- Security Automation
ATTACKIQ
CHRONICLE
Products
- Chronicle Backstory
- VirusTotal Intelligence
- VirusTotal Hunting VirusTotal Graph
- VirusTotal API
Features
- YARA Rules
- Automatic Rule Generation
- Retrohunt
INTEL471
Products
- Adversary Intelligence
- Credential Intelligence
- Malware Intelligence
- Vulnerability Intelligence
Features
- Brand Protection
- Insider Threat
- Threat Hunting
- Security Operations
RECORDED FUTURE
Products
- Adversary Intelligence
- Credential Intelligence
- Malware Intelligence
- Vulnerability Intelligence
Features
- Brand Intelligence
- Secops Intelligence
- Threat Intelligence,
- ThirdParty Intelligence
- Identity Intelligence
OPSWAT
Products
- Meta Access
- Meta Defender
Features
- File Upload Security
- Storage Security
- OT
- Industrial Security
BEYOND TRUST
NETSKOPE
CROWDSTRIKE
TENABLE
DIGITAL GUARDIAN
ATTIVO
VARONIS
ANOMOLI
BEYOND TRUST
Products
- Privilege Access Management
- Privilege Identity Management
- Secure Remote Access
- Privileged Password Management
Features
- Password Safe
- Remote Support
- Active Directory Bridge
NETSKOPE
Products
- Next Gen Secure Web Gateway
- Network Private Access
- Cloud Access Security Broker
Features
- Adaptive Access Control
- Cloud Encryption
- Remote Browser Isolation
CROWDSTRIKE
Products
- Endpoint Security Solutions
- Cloud Security Solutions
- Threat Intelligence Solutions
- Managed Services
- Security & IT Operations Solutions
Features
- Discovery, Visibility and Compliance;
- Protect workloads, hosts and containers;
- Fully managed endpoint protection delivered as a service by a CrowdStrike team of experts
TENABLE
Products
- Tenable.io
- Tenable.ap
- Tenable.cs
- Tenable.sc
- Tenable.ad
Features
- Application Security
- Cloud Security
- Compliance
- Vulnerability Assessment Vulnerability Management
DIGITAL GUARDIAN
Products
- Endpoint DLP
- Network DLP
- Managed DLP services
Features
- Compliance
- IP Protection
- Insider Threat Protection
ATTIVO
Products
- ADAssessor
- ADSecure
- Endpoint Detection Net
- BOTsink
Features
- Cloud Identity& Entitlement Visibility
- Active Directory Assessment
- Endpoint Deception
VARONIS
Products
- Dat Advantage
- Dat Edge
- Dat Alert
Features
- Data Protection
- Privacy and Compliance
ANOMOLI
Products
- Anamoli Threatstream
- Anamoli Match
- Anamoli Lens
Features
- Aggregation of intelligence from multiple sources
- Curation
- Normalization
- Enrichment and
- Risk scoring of data
KNOWBE4
OKTA
KNOWBE4
Products
- PhishER
- KCM GRC Platform
- Compliance Plus Training
Features
- Phishing Security Awareness
- Automated Security Awareness program
- Breached Password test
- Browser password
- KnowBe4’s Multi-Factor Authentication Security Assessment
OKTA
Products
- Single Sign On
- Multi factor Authentication
- Universal Directory
- Authentication
- User Management
- Advanced Server Access
- Lifecycle Management
Features
- Identity and Access Management Workforce Identity
- Customer Identity