Certifications and Partnerships

Certifications

GSNA

GSNA

www.giac.org

GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skills of information security professionals. The purpose of GIAC is to provide assurance that a certified individual has the knowledge and skills necessary for a practitioner in key areas of computer, information and software security. GIAC certifications are trusted by thousands of companies and government agencies, including the United States National Security Agency (NSA).


ISSA

ISSA

www.issa.org

ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.


New York University

New York University

www.nyu.edu

More than 175 years ago, Albert Gallatin, the distinguished statesman who served as secretary of the treasury under Presidents Thomas Jefferson and James Madison, declared his intention to establish "in this immense and fast-growing city ... a system of rational and practical education fitting for all and graciously opened to all." Founded in 1831, New York University is now one of the largest private universities in the United States. Of the more than 3,000 colleges and universities in America, New York University is one of only 60 member institutions of the distinguished Association of American Universities.


Microsoft Small Business Specialist

Microsoft Small Business Specialist

www.microsoft.com

Microsoft Small Business Specialists are partners who recognize that small-business customers have IT needs and who are able to meet those needs with high-quality solutions built on Microsoft technologies. The solutions are configured according to customer requirements and are supported to ensure customer satisfaction.


Partnerships

Astaro

Astaro

www.astaro.com

Astaro Security Gateway provides immediate protection for your network, web access and email traffic. The Astaro solution integrates more security applications than any competitor in one award-winning management device. Over 100,000 IT security experts in 60 countries entrust their network with Astaro\'s Unified Threat Management solutions.


Dell

Dell

www.dell.co.uk

Dell listens to customers and delivers innovative technology and services they trust and value, offering a broad range of product categories, including desktop computer systems, servers and networking products, mobility products, software and peripherals and enhanced services.


HP

HP

www.hp.com

HP delivers technologies and services that are right for you. With HP you get reliable technologies, a portfolio of Total Care services and support, a global ecosystem of partners— and complete confidence that HP and its partners will stand behind your business each and every step of the way.


IBM

IBM

www.ibm.com

IBM (International Business Machines) is one of the world leading Information Technology companies in the world. Their innovation covers both software and hardware. With our alliance with IBM, SSL resells and provides professional services around Business Intelligence-COGNOS, BlueWorks Live, ECM, Business Process Management(BPM) amongst others.


SonicWall

SonicWall

www.sonicwall.com

Dell has successfully completed the acquisition of SonicWALL, Inc., a leader in advanced network security, secure remote access, and data protection. SonicWALL’s industry-leading Next-Generation Firewalls and Unified Threat Management (UTM) Firewalls complement Dell’s security solutions portfolio, enabling it to offer customers a broader range of enterprise offerings.


Storagecraft

Storagecraft

www.storagecraft.com

StorageCraft Technology Corporation is a premier software company focused on helping you backup fast and recover faster. StorageCraft develops innovative disk-based backup, disaster recovery, system migration, data protection and security solutions for servers, desktops and laptops. StorageCraft delivers software products that reduce downtime, improve security and stability for systems and data and lower the total cost of ownership for systems in your computing environment.