website metrics
Welcome to eSureITy - Partners

 

home

Partners

Worldwide Locations

map

eSureITy Partners:

PowerTech

PowerTech – www.powertech.com

PowerTech is your security expert in managing evolving compliance and data privacy threats with automated security solutions for IBM Midrange Servers. Our ServerProven security solutions are straightforward and save your valuable IT resources, giving you ongoing protection and peace of mind.

Because iSeries and AS400 servers are used to host particularly sensitive corporate data, it is imperative that you practice proactive compliance security. As an IBM Advanced Business Partner with over 800 customers worldwide, PowerTech understands corporate vulnerability and the risks associated with data privacy and access control.

Risk Watch Riskwatch – www.riskwatch.com
pcdynamics

PC Dynamics – www.pcdynamics.com

SafeHouse provides transparent "on-the-fly" encryption for your notebook or desktop personal computer. Using SafeHouse, you can allocate portions of your existing hard drives to be reserved for encrypted data. SafeHouse encrypted volumes appear on your PC as another Windows drive letter. All encryption is performed automatically and transparently on the fly. You can do anything with a SafeHouse virtual drive that you can do with a normal hard drive; only that with SafeHouse, the encrypted volumes require password authentication before the files become accessible.

ACR2 Solutions

ACR2 Solutions – http://www.acr2solutions.com/

Automated Compliance Reporting 2 Solutions, Inc. (aka ACR 2 Solutions pronounced "acer two solutions") is the first truely automated compliance reporting system. This process automates the risk assessment process required for financial institutions regulated under the Gramm Leach Bliley Act (GLBA) or the Health Insurance Portability and Accountability Act (HIPAA).

eEye

eEye –- www.eeye.com

eEye Digital Security®, the leading developer of endpoint security and vulnerability management software solutions, as well as the industry’s foremost contributor to security research and education has a unique approach to enterprise security – eliminate vulnerabilities, rather than just thwart attacks. eEye's integrated suite of vulnerability management solutions enable organizations to manage the entire lifecycle of security threats: before, during, and after attacks.

CII

 

The Critical Infrastructure Institute (CII) – http://www.ci-institute.org/

The Critical Infrastructure Institute (CII) was established in conjunction with United States and Canadian government guidance in order to provide these skills, manage the PCIP (Professional in Critical Infrastructure Protection) certification, and maintain a consolidated security resource that encompasses all facets of the critical infrastructure industries.

Core Security

CoreImpact – www.coresecurity.com

Since 1996, Core Security Technologies has been committed to delivering breakthrough software and services that address the information security (IS) needs of corporations and government organizations worldwide. Our customers seek to protect their information assets from unauthorized access while complying with industry and governmental regulations, both today and as their networks expand in the future.

 

Chief security Officers – www.chiefsecurityofficers.com

CSO is one of the world's leading providers of audit, forensic, security, and compliance services. Our staff are the most technically talented and highly trained in the industry. We offer the most comprehensive line of services in the industry.

 

Learn More