| STRATEGY AND GOVERNANCE | APPLICATIONS AND DATA MANAGEMENT | SECURITY | RISK AND COMPLIANCE | INFRASTRUCURE AND OPERATIONS | |
|---|---|---|---|---|---|
| MICROSOFT | MICROSOFT PURVIEW | MICROSOFT INTUNE | MICROSOFT DEFENDER | MICROSOFT PRIVIA | Microsoft Entra Workload Identities |
| Microsoft Entra Identity Governance | Microsoft Purview | MICROSOFT ENTRA | |||
| Microsoft Sentinel | MICROSOFT 365 DEFENDER | ||||
| MICROSOFT SENTINEL | |||||
| FORCEPOINT | FORCEPOINT Sidewinder | FORCEPOINT DLP | WEB PROXY | FORCEPOINT NGFW | |
| FORCEPOINT CASB | FORCEPOINT ONE | FORCEPOINT FLEXEDGE SECURE SD-WAN | |||
| Dynamic User Protection (DUP) | FORCEPOINT DLP | ||||
| EMAIL SECURITY | |||||
| CASB | |||||
| QUEST | QUEST Change Auditor | QUEST Toad Data Point | QUEST QORESTOR | QUEST Database Performance Monitoring | |
| QUEST ERWIN | QUEST erwin Data Intelligence | QUEST NETVAULT PLUS | QUEST Database Replication | ||
| QUEST TOAD MODELER | QUEST KACE Unified Endpoint Manager | QUEST RAPID RECOVERY | QUEST Recovery Manager | ||
| CYBER SAINT | QUEST KACE Systems Management | QUEST One Identity Safeguard | QUEST On Demand Migration | ||
| QUEST KACE Cloud | QUEST Authentication Services | QUEST FOGLIGHT | |||
| Quest ApexSQL | Extended Detection & Response | QUEST FOGLIGHT EVOLVE | |||
| Quest SharePlex | QUEST APEXSQL | ||||
| QUEST SHAREPLEX | |||||
| Quest On Demand Migration | |||||
| KACE Unified Endpoint Manager | |||||
| - KACE Systems Management Appliance | |||||
| - KACE Systems Deployment | |||||
| - KACE Cloud | |||||
| RED HAT | Red Hat OpenShift Service on AWS | Red Hat Satellite | Red Hat OpenShift Automation and Integration | ||
| Red Hat Enterprise Linux for SAP | |||||
| PROOFPOINT | PROOFPOINT Archiving and Compliance | ||||
| PROOFPOINT Intelligent Supervision | |||||
| PALO ALTO | PALO ALTO Visibility, Compliance, & Governance | PALO ALTO Infrastructure as Code (IaC) Security | |||
| PALO ALTO Next-Generation Firewalls | |||||
| ZSCALER | ZSCALER Posture Control | ZSCALER Secure Internet Access (ZIA) | |||
| MICRO FOCUS | MICRO Information Management and Governance | ||||
| LIBRAESVA | Libraesva Email Archiver | ||||
| CYBERSAINT | CYBER SAINT |
| STRATEGY AND GOVERNANCE | APPLICATIONS AND DATA MANAGEMENT | SECURITY | RISK AND COMPLIANCE | INFRASTRUCURE AND OPERATIONS | |
|---|---|---|---|---|---|
| MICROSOFT | MICROSOFT PURVIEW | MICROSOFT INTUNE | MICROSOFT DEFENDER | MICROSOFT PRIVIA | Microsoft Entra Workload Identities |
| Microsoft Entra Identity Governance | Microsoft Purview | MICROSOFT ENTRA | |||
| Microsoft Sentinel | MICROSOFT 365 DEFENDER | ||||
| MICROSOFT SENTINEL | |||||
| FORCEPOINT | FORCEPOINT Sidewinder | FORCEPOINT DLP | WEB PROXY | FORCEPOINT NGFW | |
| FORCEPOINT CASB | FORCEPOINT ONE | FORCEPOINT FLEXEDGE SECURE SD-WAN | |||
| Dynamic User Protection (DUP) | FORCEPOINT DLP | ||||
| EMAIL SECURITY | |||||
| CASB | |||||
| QUEST | QUEST Change Auditor | QUEST Toad Data Point | QUEST QORESTOR | QUEST Database Performance Monitoring | |
| QUEST ERWIN | QUEST erwin Data Intelligence | QUEST NETVAULT PLUS | QUEST Database Replication | ||
| QUEST TOAD MODELER | QUEST KACE Unified Endpoint Manager | QUEST RAPID RECOVERY | QUEST Recovery Manager | ||
| CYBER SAINT | QUEST KACE Systems Management | QUEST One Identity Safeguard | QUEST On Demand Migration | ||
| QUEST KACE Cloud | QUEST Authentication Services | QUEST FOGLIGHT | |||
| Quest ApexSQL | Extended Detection & Response | QUEST FOGLIGHT EVOLVE | |||
| Quest SharePlex | QUEST APEXSQL | ||||
| QUEST SHAREPLEX | |||||
| Quest On Demand Migration | |||||
| KACE Unified Endpoint Manager | |||||
| - KACE Systems Management Appliance | |||||
| - KACE Systems Deployment | |||||
| - KACE Cloud | |||||
| RED HAT | Red Hat OpenShift Service on AWS | Red Hat Satellite | Red Hat OpenShift Automation and Integration | ||
| Red Hat Enterprise Linux for SAP | |||||
| PROOFPOINT | PROOFPOINT Archiving and Compliance | ||||
| PROOFPOINT Intelligent Supervision | |||||
| PALO ALTO | PALO ALTO Visibility, Compliance, & Governance | PALO ALTO Infrastructure as Code (IaC) Security | |||
| PALO ALTO Next-Generation Firewalls | |||||
| ZSCALER | ZSCALER Posture Control | ZSCALER Secure Internet Access (ZIA) | |||
| MICRO FOCUS | MICRO Information Management and Governance | ||||
| LIBRAESVA | Libraesva Email Archiver | ||||
| CYBERSAINT | CYBER SAINT |