Bit9 + Carbon Black

Used by IT, desktop operations, server and infrastructure, incident response and security operations teams across more than 1,000 customer organization worldwide to protect endpoints and servers from advanced threats, satisfy audit, compliance and management inquiries, automate and streamline IT and security processes, and reduce operating expenses


Solving the endpoint security problem with innovations that focus on protection not detection. They do this by creating a hardware isolated microVM, essentially a secure isolated container, for each task a user performs on an untrusted network or document.


The leader in application and desktop virtualization, providing a complete, flexible solution that delivers Windows applications and desktops to any user on any device while keeping valuable information locked down in the data center.


CounterACT, their Network Access Control (NAC) solution, dynamically identifies and evaluates network devices and applications the instant they connect to your network. Because CounterACT doesn’t require agents, it works with your devices—managed and unmanaged, known and unknown, PC and mobile, embedded and virtual. CounterACT quickly determines the user, owner, operating system, device configuration, software, services, patch state and the presence of security agents. Next, it provides remediation, control and continuous monitoring of these devices as they come and go from the network.

Trend Micro

Provides Smart Protection Suite™ modern threat protection for anti-malware, packer variants, device control, command and control (C&C) traffic, browser exploits, behavior monitoring, web threats, and more. Both Windows and Mac devices are supported.

© 2018 CTIGlobal