Resize some images

This commit is contained in:
2023-07-07 22:14:01 +04:00
parent ea4741dda2
commit 6090e97fa2
13 changed files with 26 additions and 28 deletions

Binary file not shown.

After

Width:  |  Height:  |  Size: 871 B

Binary file not shown.

After

Width:  |  Height:  |  Size: 30 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 70 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 126 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 42 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 57 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 110 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 238 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 238 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 164 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 143 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 134 KiB

View File

@@ -587,6 +587,18 @@ INSERT INTO directus_files VALUES('e4db2d94-ac31-4fc9-b24d-0fc685c9f396','local'
INSERT INTO directus_files VALUES('ced475c0-9f76-4934-9622-9da16b48b5a9','local','ced475c0-9f76-4934-9622-9da16b48b5a9.png','iboss-logo.png','iboss logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:31:24',NULL,1688747484240,NULL,17316,900,260,NULL,NULL,NULL,NULL,NULL,'{}'); INSERT INTO directus_files VALUES('ced475c0-9f76-4934-9622-9da16b48b5a9','local','ced475c0-9f76-4934-9622-9da16b48b5a9.png','iboss-logo.png','iboss logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:31:24',NULL,1688747484240,NULL,17316,900,260,NULL,NULL,NULL,NULL,NULL,'{}');
INSERT INTO directus_files VALUES('b966b49c-aeda-4803-9cc1-6daf5e1e6552','local','b966b49c-aeda-4803-9cc1-6daf5e1e6552.png','thecube-logo.png','thecube logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:31:26',NULL,1688747486707,NULL,5954,498,129,NULL,NULL,NULL,NULL,NULL,'{}'); INSERT INTO directus_files VALUES('b966b49c-aeda-4803-9cc1-6daf5e1e6552','local','b966b49c-aeda-4803-9cc1-6daf5e1e6552.png','thecube-logo.png','thecube logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:31:26',NULL,1688747486707,NULL,5954,498,129,NULL,NULL,NULL,NULL,NULL,'{}');
INSERT INTO directus_files VALUES('bbecd12a-8e4c-4c5b-8020-5f63a1dcb96f','local','bbecd12a-8e4c-4c5b-8020-5f63a1dcb96f.jpeg','wolfssl-logo.jpeg','wolfssl logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:31:29',NULL,1688747489560,NULL,47342,1011,782,NULL,NULL,NULL,NULL,NULL,'{}'); INSERT INTO directus_files VALUES('bbecd12a-8e4c-4c5b-8020-5f63a1dcb96f','local','bbecd12a-8e4c-4c5b-8020-5f63a1dcb96f.jpeg','wolfssl-logo.jpeg','wolfssl logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:31:29',NULL,1688747489560,NULL,47342,1011,782,NULL,NULL,NULL,NULL,NULL,'{}');
INSERT INTO directus_files VALUES('e676c76b-b0fe-4ffe-b0d5-5ea1a93ab2dd','local','e676c76b-b0fe-4ffe-b0d5-5ea1a93ab2dd.png','alta-associates-a-part-of-diversified-search-group-logo.png','Alta Associates a Part of Diversified Search Group Logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 17:58:18',NULL,1688752698786,NULL,243159,3123,651,NULL,NULL,NULL,NULL,NULL,'{}');
INSERT INTO directus_files VALUES('0023b5d9-cc11-45e0-8e10-d2d012f03f67','local','0023b5d9-cc11-45e0-8e10-d2d012f03f67.png','Screenshot from 2023-07-07 22-02-14.png','Screenshot From 2023 07 07 22 02 14','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 18:02:29',NULL,1688752949961,NULL,871,365,193,NULL,NULL,NULL,NULL,NULL,'{}');
INSERT INTO directus_files VALUES('f0a5af75-6a76-4981-a0a9-9e4e8de1ab32','local','f0a5af75-6a76-4981-a0a9-9e4e8de1ab32.png','flexxon-pte-ltd-logo.png','Flexxon Pte Ltd Logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 18:03:45',NULL,1688753025839,NULL,146494,2227,1270,NULL,NULL,NULL,NULL,NULL,'{}');
INSERT INTO directus_files VALUES('90d98ffa-962e-4636-8697-71777b40be1d','local','90d98ffa-962e-4636-8697-71777b40be1d.png','glimps-logo.png','Glimps Logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 18:04:35',NULL,1688753075295,NULL,112663,1813,679,NULL,NULL,NULL,NULL,NULL,'{}');
INSERT INTO directus_files VALUES('b3dbdcb8-9b44-4c96-9457-d0a6de259fb2','local','b3dbdcb8-9b44-4c96-9457-d0a6de259fb2.jpg','lepide-logo.jpg','Lepide Logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 18:06:04',NULL,1688753164135,NULL,243495,6314,1824,NULL,NULL,NULL,NULL,NULL,'{}');
INSERT INTO directus_files VALUES('52d566b6-edd6-4264-a75a-242e6eb9ee03','local','52d566b6-edd6-4264-a75a-242e6eb9ee03.jpg','lepide-logo.jpg','Lepide Logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 18:06:32',NULL,1688753192232,NULL,71118,1894,547,NULL,NULL,NULL,NULL,NULL,'{}');
INSERT INTO directus_files VALUES('0a321e46-5d6f-41d4-bc5b-f1c0d5d4c41e','local','0a321e46-5d6f-41d4-bc5b-f1c0d5d4c41e.jpg','nsfocus-logo.jpg','Nsfocus Logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 18:08:09',NULL,1688753289556,NULL,30426,1845,792,NULL,NULL,NULL,NULL,NULL,'{}');
INSERT INTO directus_files VALUES('5bef8ad8-a4e9-4ede-916b-7e23569d161c','local','5bef8ad8-a4e9-4ede-916b-7e23569d161c.png','picus-logo.png','Picus Logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 18:08:53',NULL,1688753333111,NULL,129101,1962,537,NULL,NULL,NULL,NULL,NULL,'{}');
INSERT INTO directus_files VALUES('f78d435f-480b-4a5b-9dca-3d24d9b08fb9','local','f78d435f-480b-4a5b-9dca-3d24d9b08fb9.png','qax-technology-group-inc-logo.png','Qax Technology Group Inc Logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 18:10:23',NULL,1688753423839,NULL,137116,2088,476,NULL,NULL,NULL,NULL,NULL,'{}');
INSERT INTO directus_files VALUES('eedcd947-f394-4efe-8b60-1b35e48843c2','local','eedcd947-f394-4efe-8b60-1b35e48843c2.png','sands-lab-logo.png','Sands Lab Logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 18:11:17',NULL,1688753478021,NULL,168209,6010,1722,NULL,NULL,NULL,NULL,NULL,'{}');
INSERT INTO directus_files VALUES('6a20feae-4472-4023-9bc2-ff211552fc35','local','6a20feae-4472-4023-9bc2-ff211552fc35.png','sands-lab-logo.png','Sands Lab Logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 18:11:42',NULL,1688753502058,NULL,42674,1803,516,NULL,NULL,NULL,NULL,NULL,'{}');
INSERT INTO directus_files VALUES('7c8e8300-be7e-4046-a975-d428e1b74b09','local','7c8e8300-be7e-4046-a975-d428e1b74b09.jpg','skopenow-logo.jpg','Skopenow Logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 18:12:21',NULL,1688753541562,NULL,58484,2310,588,NULL,NULL,NULL,NULL,NULL,'{}');
CREATE TABLE IF NOT EXISTS "directus_permissions" (`id` integer PRIMARY KEY AUTOINCREMENT NOT NULL, `role` char(36), `collection` varchar(64) NOT NULL, `action` varchar(10) NOT NULL, `permissions` json, `validation` json, `presets` json, `fields` text, FOREIGN KEY (`role`) REFERENCES `directus_roles` (`id`) ON DELETE CASCADE); CREATE TABLE IF NOT EXISTS "directus_permissions" (`id` integer PRIMARY KEY AUTOINCREMENT NOT NULL, `role` char(36), `collection` varchar(64) NOT NULL, `action` varchar(10) NOT NULL, `permissions` json, `validation` json, `presets` json, `fields` text, FOREIGN KEY (`role`) REFERENCES `directus_roles` (`id`) ON DELETE CASCADE);
INSERT INTO directus_permissions VALUES(1,NULL,'pages','read','{}','{}',NULL,'*'); INSERT INTO directus_permissions VALUES(1,NULL,'pages','read','{}','{}',NULL,'*');
INSERT INTO directus_permissions VALUES(4,NULL,'categories','read','{}','{}',NULL,'*'); INSERT INTO directus_permissions VALUES(4,NULL,'categories','read','{}','{}',NULL,'*');
@@ -596,23 +608,9 @@ INSERT INTO directus_permissions VALUES(33,NULL,'globals','read','{}','{}',NULL,
INSERT INTO directus_permissions VALUES(34,NULL,'menus','read','{}','{}',NULL,'*'); INSERT INTO directus_permissions VALUES(34,NULL,'menus','read','{}','{}',NULL,'*');
INSERT INTO directus_permissions VALUES(35,NULL,'menus_menu_items','read','{}','{}',NULL,'*'); INSERT INTO directus_permissions VALUES(35,NULL,'menus_menu_items','read','{}','{}',NULL,'*');
INSERT INTO directus_permissions VALUES(36,NULL,'menu_items','read','{}','{}',NULL,'*'); INSERT INTO directus_permissions VALUES(36,NULL,'menu_items','read','{}','{}',NULL,'*');
INSERT INTO directus_permissions VALUES(37,NULL,'categories','create','{}','{}',NULL,'*');
INSERT INTO directus_permissions VALUES(38,NULL,'vendors','create','{}','{}',NULL,'*');
INSERT INTO directus_permissions VALUES(39,NULL,'vendors_categories','create','{}','{}',NULL,'*');
INSERT INTO directus_permissions VALUES(40,NULL,'vendors_files','create','{}','{}',NULL,'*');
INSERT INTO directus_permissions VALUES(41,NULL,'vendors_files_1','create','{}','{}',NULL,'*');
INSERT INTO directus_permissions VALUES(42,NULL,'vendors','update','{}','{}',NULL,'*');
INSERT INTO directus_permissions VALUES(43,NULL,'vendors_categories','update','{}','{}',NULL,'*');
INSERT INTO directus_permissions VALUES(44,NULL,'vendors_files','read','{}','{}',NULL,'*'); INSERT INTO directus_permissions VALUES(44,NULL,'vendors_files','read','{}','{}',NULL,'*');
INSERT INTO directus_permissions VALUES(45,NULL,'vendors_files','update','{}','{}',NULL,'*');
INSERT INTO directus_permissions VALUES(46,NULL,'vendors_files_1','read','{}','{}',NULL,'*'); INSERT INTO directus_permissions VALUES(46,NULL,'vendors_files_1','read','{}','{}',NULL,'*');
INSERT INTO directus_permissions VALUES(47,NULL,'vendors_files_1','update','{}','{}',NULL,'*'); INSERT INTO directus_permissions VALUES(47,NULL,'directus_files','read','{}','{}',NULL,'*');
INSERT INTO directus_permissions VALUES(48,NULL,'directus_folders','create','{}','{}',NULL,'*');
INSERT INTO directus_permissions VALUES(49,NULL,'directus_folders','update','{}','{}',NULL,'*');
INSERT INTO directus_permissions VALUES(50,NULL,'directus_folders','read','{}','{}',NULL,'*');
INSERT INTO directus_permissions VALUES(51,NULL,'directus_files','create','{}','{}',NULL,'*');
INSERT INTO directus_permissions VALUES(52,NULL,'directus_files','update','{}','{}',NULL,'*');
INSERT INTO directus_permissions VALUES(53,NULL,'directus_files','read','{}','{}',NULL,'*');
CREATE TABLE IF NOT EXISTS "directus_webhooks" (`id` integer PRIMARY KEY AUTOINCREMENT NOT NULL, `name` varchar(255) NOT NULL, `method` varchar(10) NOT NULL DEFAULT 'POST', `url` varchar(255) NOT NULL, `status` varchar(10) NOT NULL DEFAULT 'active', `data` boolean NOT NULL DEFAULT '1', `actions` varchar(100) NOT NULL, `collections` varchar(255) NOT NULL, `headers` json); CREATE TABLE IF NOT EXISTS "directus_webhooks" (`id` integer PRIMARY KEY AUTOINCREMENT NOT NULL, `name` varchar(255) NOT NULL, `method` varchar(10) NOT NULL DEFAULT 'POST', `url` varchar(255) NOT NULL, `status` varchar(10) NOT NULL DEFAULT 'active', `data` boolean NOT NULL DEFAULT '1', `actions` varchar(100) NOT NULL, `collections` varchar(255) NOT NULL, `headers` json);
CREATE TABLE IF NOT EXISTS "directus_collections" (`collection` varchar(64) NOT NULL, `icon` varchar(30), `note` text, `display_template` varchar(255), `hidden` boolean NOT NULL DEFAULT '0', `singleton` boolean NOT NULL DEFAULT '0', `translations` json, `archive_field` varchar(64), `archive_app_filter` boolean NOT NULL DEFAULT '1', `archive_value` varchar(255), `unarchive_value` varchar(255), `sort_field` varchar(64), `accountability` varchar(255) DEFAULT 'all', `color` varchar(255) NULL, `item_duplication_fields` json NULL, `sort` integer, `group` varchar(64), `collapse` varchar(255) NOT NULL DEFAULT 'open', `preview_url` varchar(255) null, PRIMARY KEY (`collection`), FOREIGN KEY (`group`) REFERENCES `directus_collections` (`collection`)); CREATE TABLE IF NOT EXISTS "directus_collections" (`collection` varchar(64) NOT NULL, `icon` varchar(30), `note` text, `display_template` varchar(255), `hidden` boolean NOT NULL DEFAULT '0', `singleton` boolean NOT NULL DEFAULT '0', `translations` json, `archive_field` varchar(64), `archive_app_filter` boolean NOT NULL DEFAULT '1', `archive_value` varchar(255), `unarchive_value` varchar(255), `sort_field` varchar(64), `accountability` varchar(255) DEFAULT 'all', `color` varchar(255) NULL, `item_duplication_fields` json NULL, `sort` integer, `group` varchar(64), `collapse` varchar(255) NOT NULL DEFAULT 'open', `preview_url` varchar(255) null, PRIMARY KEY (`collection`), FOREIGN KEY (`group`) REFERENCES `directus_collections` (`collection`));
INSERT INTO directus_collections VALUES('pages','note',NULL,NULL,0,0,NULL,'status',1,'archived','draft',NULL,'all',NULL,NULL,3,NULL,'open',NULL); INSERT INTO directus_collections VALUES('pages','note',NULL,NULL,0,0,NULL,'status',1,'archived','draft',NULL,'all',NULL,NULL,3,NULL,'open',NULL);
@@ -688,7 +686,7 @@ INSERT INTO directus_roles VALUES('067808bd-7c13-40be-8c11-9ba654b79465','Admini
CREATE TABLE `directus_shares` (`id` char(36) not null, `name` varchar(255), `collection` varchar(64), `item` varchar(255), `role` char(36), `password` varchar(255), `user_created` char(36), `date_created` datetime default CURRENT_TIMESTAMP, `date_start` datetime null default null, `date_end` datetime null default null, `times_used` integer default '0', `max_uses` integer, foreign key(`collection`) references `directus_collections`(`collection`) on delete CASCADE, foreign key(`role`) references `directus_roles`(`id`) on delete CASCADE, foreign key(`user_created`) references `directus_users`(`id`) on delete SET NULL, primary key (`id`)); CREATE TABLE `directus_shares` (`id` char(36) not null, `name` varchar(255), `collection` varchar(64), `item` varchar(255), `role` char(36), `password` varchar(255), `user_created` char(36), `date_created` datetime default CURRENT_TIMESTAMP, `date_start` datetime null default null, `date_end` datetime null default null, `times_used` integer default '0', `max_uses` integer, foreign key(`collection`) references `directus_collections`(`collection`) on delete CASCADE, foreign key(`role`) references `directus_roles`(`id`) on delete CASCADE, foreign key(`user_created`) references `directus_users`(`id`) on delete SET NULL, primary key (`id`));
CREATE TABLE IF NOT EXISTS "directus_sessions" (`token` varchar(64) NOT NULL, `user` char(36), `expires` datetime NOT NULL, `ip` varchar(255), `user_agent` varchar(255), `share` char(36), `origin` varchar(255) null, PRIMARY KEY (`token`), FOREIGN KEY (`user`) REFERENCES `directus_users` (`id`) ON DELETE CASCADE, FOREIGN KEY (`share`) REFERENCES `directus_shares` (`id`) ON DELETE CASCADE); CREATE TABLE IF NOT EXISTS "directus_sessions" (`token` varchar(64) NOT NULL, `user` char(36), `expires` datetime NOT NULL, `ip` varchar(255), `user_agent` varchar(255), `share` char(36), `origin` varchar(255) null, PRIMARY KEY (`token`), FOREIGN KEY (`user`) REFERENCES `directus_users` (`id`) ON DELETE CASCADE, FOREIGN KEY (`share`) REFERENCES `directus_shares` (`id`) ON DELETE CASCADE);
CREATE TABLE IF NOT EXISTS "directus_users" (`id` char(36) NOT NULL, `first_name` varchar(50), `last_name` varchar(50), `email` varchar(128), `password` varchar(255), `location` varchar(255), `title` varchar(50), `description` text, `tags` json, `avatar` char(36), `language` varchar(255) DEFAULT null, `theme` varchar(20) DEFAULT 'auto', `tfa_secret` varchar(255), `status` varchar(16) NOT NULL DEFAULT 'active', `role` char(36), `token` varchar(255), `last_access` datetime, `last_page` varchar(255), `provider` varchar(128) NOT NULL DEFAULT 'default', `external_identifier` varchar(255), `auth_data` json, `email_notifications` boolean DEFAULT '1', PRIMARY KEY (`id`), FOREIGN KEY (`role`) REFERENCES `directus_roles` (`id`) ON DELETE SET NULL); CREATE TABLE IF NOT EXISTS "directus_users" (`id` char(36) NOT NULL, `first_name` varchar(50), `last_name` varchar(50), `email` varchar(128), `password` varchar(255), `location` varchar(255), `title` varchar(50), `description` text, `tags` json, `avatar` char(36), `language` varchar(255) DEFAULT null, `theme` varchar(20) DEFAULT 'auto', `tfa_secret` varchar(255), `status` varchar(16) NOT NULL DEFAULT 'active', `role` char(36), `token` varchar(255), `last_access` datetime, `last_page` varchar(255), `provider` varchar(128) NOT NULL DEFAULT 'default', `external_identifier` varchar(255), `auth_data` json, `email_notifications` boolean DEFAULT '1', PRIMARY KEY (`id`), FOREIGN KEY (`role`) REFERENCES `directus_roles` (`id`) ON DELETE SET NULL);
INSERT INTO directus_users VALUES('f9df4549-e9e6-4b67-a0bd-7e4aa657bff6',NULL,NULL,'okram@civokram.com','$argon2id$v=19$m=65536,t=3,p=4$rk0X9HITfk7OIfvEjOrbew$Q4wUp0tjs42ocHPwVPzI3dksy+JKWzQzO5a3gqOwDg8',NULL,NULL,NULL,NULL,NULL,NULL,'auto',NULL,'active','067808bd-7c13-40be-8c11-9ba654b79465',NULL,1688747501153,'/content/vendors/213b7434-09e1-44c8-ac17-242399521ec6','default',NULL,NULL,1); INSERT INTO directus_users VALUES('f9df4549-e9e6-4b67-a0bd-7e4aa657bff6',NULL,NULL,'okram@civokram.com','$argon2id$v=19$m=65536,t=3,p=4$rk0X9HITfk7OIfvEjOrbew$Q4wUp0tjs42ocHPwVPzI3dksy+JKWzQzO5a3gqOwDg8',NULL,NULL,NULL,NULL,NULL,NULL,'auto',NULL,'active','067808bd-7c13-40be-8c11-9ba654b79465',NULL,1688752877079,'/content/vendors','default',NULL,NULL,1);
CREATE TABLE IF NOT EXISTS "directus_panels" (`id` char(36) NOT NULL, `dashboard` char(36) NOT NULL, `name` varchar(255), `icon` varchar(30) DEFAULT null, `color` varchar(10), `show_header` boolean NOT NULL DEFAULT '0', `note` text, `type` varchar(255) NOT NULL, `position_x` integer NOT NULL, `position_y` integer NOT NULL, `width` integer NOT NULL, `height` integer NOT NULL, `options` json, `date_created` datetime DEFAULT CURRENT_TIMESTAMP, `user_created` char(36), FOREIGN KEY (`dashboard`) REFERENCES `directus_dashboards` (`id`) ON DELETE CASCADE, FOREIGN KEY (`user_created`) REFERENCES `directus_users` (`id`) ON DELETE SET NULL, PRIMARY KEY (`id`)); CREATE TABLE IF NOT EXISTS "directus_panels" (`id` char(36) NOT NULL, `dashboard` char(36) NOT NULL, `name` varchar(255), `icon` varchar(30) DEFAULT null, `color` varchar(10), `show_header` boolean NOT NULL DEFAULT '0', `note` text, `type` varchar(255) NOT NULL, `position_x` integer NOT NULL, `position_y` integer NOT NULL, `width` integer NOT NULL, `height` integer NOT NULL, `options` json, `date_created` datetime DEFAULT CURRENT_TIMESTAMP, `user_created` char(36), FOREIGN KEY (`dashboard`) REFERENCES `directus_dashboards` (`id`) ON DELETE CASCADE, FOREIGN KEY (`user_created`) REFERENCES `directus_users` (`id`) ON DELETE SET NULL, PRIMARY KEY (`id`));
CREATE TABLE `directus_flows` (`id` char(36) not null, `name` varchar(255) not null, `icon` varchar(30), `color` varchar(255) null, `description` text, `status` varchar(255) not null default 'active', `trigger` varchar(255), `accountability` varchar(255) default 'all', `options` json, `operation` char(36), `date_created` datetime default CURRENT_TIMESTAMP, `user_created` char(36), foreign key(`user_created`) references `directus_users`(`id`) on delete SET NULL, primary key (`id`)); CREATE TABLE `directus_flows` (`id` char(36) not null, `name` varchar(255) not null, `icon` varchar(30), `color` varchar(255) null, `description` text, `status` varchar(255) not null default 'active', `trigger` varchar(255), `accountability` varchar(255) default 'all', `options` json, `operation` char(36), `date_created` datetime default CURRENT_TIMESTAMP, `user_created` char(36), foreign key(`user_created`) references `directus_users`(`id`) on delete SET NULL, primary key (`id`));
CREATE TABLE `directus_operations` (`id` char(36) not null, `name` varchar(255), `key` varchar(255) not null, `type` varchar(255) not null, `position_x` integer not null, `position_y` integer not null, `options` json, `resolve` char(36), `reject` char(36), `flow` char(36) not null, `date_created` datetime default CURRENT_TIMESTAMP, `user_created` char(36), foreign key(`resolve`) references `directus_operations`(`id`), foreign key(`reject`) references `directus_operations`(`id`), foreign key(`flow`) references `directus_flows`(`id`) on delete CASCADE, foreign key(`user_created`) references `directus_users`(`id`) on delete SET NULL, primary key (`id`)); CREATE TABLE `directus_operations` (`id` char(36) not null, `name` varchar(255), `key` varchar(255) not null, `type` varchar(255) not null, `position_x` integer not null, `position_y` integer not null, `options` json, `resolve` char(36), `reject` char(36), `flow` char(36) not null, `date_created` datetime default CURRENT_TIMESTAMP, `user_created` char(36), foreign key(`resolve`) references `directus_operations`(`id`), foreign key(`reject`) references `directus_operations`(`id`), foreign key(`flow`) references `directus_flows`(`id`) on delete CASCADE, foreign key(`user_created`) references `directus_users`(`id`) on delete SET NULL, primary key (`id`));
@@ -700,11 +698,11 @@ INSERT INTO directus_presets VALUES(2,NULL,'f9df4549-e9e6-4b67-a0bd-7e4aa657bff6
INSERT INTO directus_presets VALUES(3,NULL,'f9df4549-e9e6-4b67-a0bd-7e4aa657bff6',NULL,'directus_users',NULL,'cards','{"cards":{"sort":["email"],"limit":25,"page":1}}','{"cards":{"icon":"account_circle","title":"{{ first_name }} {{ last_name }}","subtitle":"{{ email }}","size":4}}',NULL,NULL,'bookmark',NULL); INSERT INTO directus_presets VALUES(3,NULL,'f9df4549-e9e6-4b67-a0bd-7e4aa657bff6',NULL,'directus_users',NULL,'cards','{"cards":{"sort":["email"],"limit":25,"page":1}}','{"cards":{"icon":"account_circle","title":"{{ first_name }} {{ last_name }}","subtitle":"{{ email }}","size":4}}',NULL,NULL,'bookmark',NULL);
INSERT INTO directus_presets VALUES(4,NULL,'f9df4549-e9e6-4b67-a0bd-7e4aa657bff6',NULL,'directus_presets',NULL,NULL,'{"tabular":{"limit":25}}',NULL,NULL,NULL,'bookmark',NULL); INSERT INTO directus_presets VALUES(4,NULL,'f9df4549-e9e6-4b67-a0bd-7e4aa657bff6',NULL,'directus_presets',NULL,NULL,'{"tabular":{"limit":25}}',NULL,NULL,NULL,'bookmark',NULL);
INSERT INTO directus_presets VALUES(5,NULL,'f9df4549-e9e6-4b67-a0bd-7e4aa657bff6',NULL,'categories','',NULL,'{"tabular":{"limit":50,"page":1,"fields":["name","subcategories","vendors"],"sort":["name"]}}','{"tabular":{"widths":{"name":354,"subcategories":259}}}',NULL,'{"_and":[{"parent_id":{"id":{"_null":true}}}]}','bookmark',NULL); INSERT INTO directus_presets VALUES(5,NULL,'f9df4549-e9e6-4b67-a0bd-7e4aa657bff6',NULL,'categories','',NULL,'{"tabular":{"limit":50,"page":1,"fields":["name","subcategories","vendors"],"sort":["name"]}}','{"tabular":{"widths":{"name":354,"subcategories":259}}}',NULL,'{"_and":[{"parent_id":{"id":{"_null":true}}}]}','bookmark',NULL);
INSERT INTO directus_presets VALUES(6,NULL,'f9df4549-e9e6-4b67-a0bd-7e4aa657bff6',NULL,'vendors',NULL,'tabular','{"tabular":{"page":1,"limit":25,"fields":["status","logo","name","city","state","country","categories"],"sort":["name"]},"cards":{"limit":25},"map":{"limit":1000}}','{"tabular":{"widths":{"status":104,"name":342},"spacing":"compact"},"map":{"cameraOptions":{"center":{"lng":0,"lat":2.842170943040401e-14},"zoom":1.2656150260264665,"bearing":0,"pitch":0,"bbox":[-199.74005157325573,-85.05112900000002,199.74005157325325,85.05112899999992]}}}',NULL,NULL,'bookmark',NULL); INSERT INTO directus_presets VALUES(6,NULL,'f9df4549-e9e6-4b67-a0bd-7e4aa657bff6',NULL,'vendors','skope','tabular','{"tabular":{"page":1,"limit":25,"fields":["status","logo","name","city","state","country","categories"],"sort":["name"]},"cards":{"limit":25},"map":{"limit":1000}}','{"tabular":{"widths":{"status":104,"name":342},"spacing":"compact"},"map":{"cameraOptions":{"center":{"lng":0,"lat":2.842170943040401e-14},"zoom":1.2656150260264665,"bearing":0,"pitch":0,"bbox":[-199.74005157325573,-85.05112900000002,199.74005157325325,85.05112899999992]}}}',NULL,NULL,'bookmark',NULL);
INSERT INTO directus_presets VALUES(8,NULL,'f9df4549-e9e6-4b67-a0bd-7e4aa657bff6',NULL,'menus',NULL,NULL,'{"tabular":{"limit":25,"fields":["id","menus_menu_items.menu_items_id.label"]}}','{"tabular":{"widths":{"menus_menu_items.menu_items_id.label":475}}}',NULL,NULL,'bookmark',NULL); INSERT INTO directus_presets VALUES(8,NULL,'f9df4549-e9e6-4b67-a0bd-7e4aa657bff6',NULL,'menus',NULL,NULL,'{"tabular":{"limit":25,"fields":["id","menus_menu_items.menu_items_id.label"]}}','{"tabular":{"widths":{"menus_menu_items.menu_items_id.label":475}}}',NULL,NULL,'bookmark',NULL);
CREATE TABLE `directus_translations` (`id` char(36) not null, `language` varchar(255) not null, `key` varchar(255) not null, `value` text not null, primary key (`id`)); CREATE TABLE `directus_translations` (`id` char(36) not null, `language` varchar(255) not null, `key` varchar(255) not null, `value` text not null, primary key (`id`));
CREATE TABLE IF NOT EXISTS "directus_settings" (`id` integer PRIMARY KEY AUTOINCREMENT NOT NULL, `project_name` varchar(100) NOT NULL DEFAULT 'Directus', `project_url` varchar(255), `project_color` varchar(50) DEFAULT null, `project_logo` char(36), `public_foreground` char(36), `public_background` char(36), `public_note` text, `auth_login_attempts` integer DEFAULT '25', `auth_password_policy` varchar(100), `storage_asset_transform` varchar(7) DEFAULT 'all', `storage_asset_presets` json, `custom_css` text, `storage_default_folder` char(36), `basemaps` json, `mapbox_key` varchar(255), `module_bar` json, `project_descriptor` varchar(100) NULL, `default_language` varchar(255) NOT NULL DEFAULT 'en-US', `custom_aspect_ratios` json, FOREIGN KEY (`project_logo`) REFERENCES `directus_files` (`id`), FOREIGN KEY (`public_foreground`) REFERENCES `directus_files` (`id`), FOREIGN KEY (`public_background`) REFERENCES `directus_files` (`id`), CONSTRAINT `directus_settings_storage_default_folder_foreign` FOREIGN KEY (`storage_default_folder`) REFERENCES `directus_folders` (`id`) ON DELETE SET NULL); CREATE TABLE IF NOT EXISTS "directus_settings" (`id` integer PRIMARY KEY AUTOINCREMENT NOT NULL, `project_name` varchar(100) NOT NULL DEFAULT 'Directus', `project_url` varchar(255), `project_color` varchar(50) DEFAULT null, `project_logo` char(36), `public_foreground` char(36), `public_background` char(36), `public_note` text, `auth_login_attempts` integer DEFAULT '25', `auth_password_policy` varchar(100), `storage_asset_transform` varchar(7) DEFAULT 'all', `storage_asset_presets` json, `custom_css` text, `storage_default_folder` char(36), `basemaps` json, `mapbox_key` varchar(255), `module_bar` json, `project_descriptor` varchar(100) NULL, `default_language` varchar(255) NOT NULL DEFAULT 'en-US', `custom_aspect_ratios` json, FOREIGN KEY (`project_logo`) REFERENCES `directus_files` (`id`), FOREIGN KEY (`public_foreground`) REFERENCES `directus_files` (`id`), FOREIGN KEY (`public_background`) REFERENCES `directus_files` (`id`), CONSTRAINT `directus_settings_storage_default_folder_foreign` FOREIGN KEY (`storage_default_folder`) REFERENCES `directus_folders` (`id`) ON DELETE SET NULL);
INSERT INTO directus_settings VALUES(1,'Directus',NULL,NULL,NULL,NULL,NULL,NULL,25,NULL,'all',NULL,NULL,NULL,NULL,NULL,'[{"type":"module","id":"content","enabled":true},{"type":"module","id":"users","enabled":true},{"type":"module","id":"files","enabled":true},{"type":"module","id":"insights","enabled":true},{"type":"module","id":"settings","enabled":true,"locked":true}]',NULL,'en-US',NULL); INSERT INTO directus_settings VALUES(1,'Directus',NULL,NULL,NULL,NULL,NULL,NULL,25,NULL,'all','[{"key":"logo-card","fit":"inside","width":250,"height":100,"quality":80,"withoutEnlargement":false,"format":"auto","transforms":[["flatten",{"background":"rgb(255, 255, 255)"}]]}]',NULL,NULL,NULL,NULL,'[{"type":"module","id":"content","enabled":true},{"type":"module","id":"users","enabled":true},{"type":"module","id":"files","enabled":true},{"type":"module","id":"insights","enabled":true},{"type":"module","id":"settings","enabled":true,"locked":true}]',NULL,'en-US',NULL);
CREATE TABLE IF NOT EXISTS "categories" (`id` char(36) NOT NULL, `slug` varchar(255) NULL DEFAULT null, `name` varchar(255) NULL, `parent_id` char(36) NULL, PRIMARY KEY (`id`), CONSTRAINT `categories_parent_id_foreign` FOREIGN KEY (`parent_id`) REFERENCES `categories` (`id`) ON DELETE NO ACTION); CREATE TABLE IF NOT EXISTS "categories" (`id` char(36) NOT NULL, `slug` varchar(255) NULL DEFAULT null, `name` varchar(255) NULL, `parent_id` char(36) NULL, PRIMARY KEY (`id`), CONSTRAINT `categories_parent_id_foreign` FOREIGN KEY (`parent_id`) REFERENCES `categories` (`id`) ON DELETE NO ACTION);
INSERT INTO categories VALUES('0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c','identity-and-access-management','Identity and Access Management',NULL); INSERT INTO categories VALUES('0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c','identity-and-access-management','Identity and Access Management',NULL);
INSERT INTO categories VALUES('b757e288-ff99-4aaa-8597-68ab4e442421','data-security','Data Security',NULL); INSERT INTO categories VALUES('b757e288-ff99-4aaa-8597-68ab4e442421','data-security','Data Security',NULL);
@@ -2768,7 +2766,7 @@ INSERT INTO vendors VALUES('050b155e-e2ef-4ea9-86c6-e0111d2ec8cf','published','g
INSERT INTO vendors VALUES('003d4211-664a-4304-ab75-3feace2aa3b9','published','dryviq','DryvIQ','https://dryviq.com/','DryvIQ enables organizations to intelligently understand and protect their data through advanced A.I. by providing a single platform that unifies three core dimensions of enterprise data management to discover, migrate and govern unstructured data.','30 Parkland Plaza ','Suite B','Ann Arbor','MI','USA','6889a453-5759-4ec5-af59-929ecddadf20',replace('<h5>DryvIQ</h5>\n<p>\nDryvIQ is a A.I.-driven platform that enables organizations to intelligently understand and protect unstructured data, no matter the system or location.\nThe platform eliminates the need for organizations to maintain multiple, siloed applications to universally understand risk profiles, consolidate systems, and support regulatory compliance across an organizations unstructured data ecosystem and business applications.\nMade to support enterprise-scale, the platform leverages modern advances in artificial intelligence to discover, migrate, and govern your unstructured data — providing continual insight to vulnerabilities, while automatically mitigating exposed risks.\nThe DryvIQ platform goes well beyond existing point solutions — Its advanced capabilities support enterprise-wide regulatory compliance by utilizing and automatically executing a common set of governance rules and polices while simultaneously amplifying the capabilities of existing Data Loss Prevention &amp; security systems.<br>\n</p>\n<h5>Why DryvIQ?</h5>\n<p>DryvIQ helps organizations protect sensitive information, reduce operational costs, and increase business efficiency through its powerful unstructured data management platform. Using modern advances in artificial intelligence, DryvIQ discovers, manages, and protects organizations unstructured data. With speeds of over 100 terabytes a day at petabyte scale, weve delivered rapid time to value for over 1,100 organizations of all sizes worldwide including financial services customers World Bank, Mass Mutual, Bain Capital, and Nicolet Bank. For more information, contact us.</p>','\n',char(10)),'https://www.facebook.com/dryviq','https://www.twitter.com/dryviq','https://www.linkedin.com/company/dryviq/',''); INSERT INTO vendors VALUES('003d4211-664a-4304-ab75-3feace2aa3b9','published','dryviq','DryvIQ','https://dryviq.com/','DryvIQ enables organizations to intelligently understand and protect their data through advanced A.I. by providing a single platform that unifies three core dimensions of enterprise data management to discover, migrate and govern unstructured data.','30 Parkland Plaza ','Suite B','Ann Arbor','MI','USA','6889a453-5759-4ec5-af59-929ecddadf20',replace('<h5>DryvIQ</h5>\n<p>\nDryvIQ is a A.I.-driven platform that enables organizations to intelligently understand and protect unstructured data, no matter the system or location.\nThe platform eliminates the need for organizations to maintain multiple, siloed applications to universally understand risk profiles, consolidate systems, and support regulatory compliance across an organizations unstructured data ecosystem and business applications.\nMade to support enterprise-scale, the platform leverages modern advances in artificial intelligence to discover, migrate, and govern your unstructured data — providing continual insight to vulnerabilities, while automatically mitigating exposed risks.\nThe DryvIQ platform goes well beyond existing point solutions — Its advanced capabilities support enterprise-wide regulatory compliance by utilizing and automatically executing a common set of governance rules and polices while simultaneously amplifying the capabilities of existing Data Loss Prevention &amp; security systems.<br>\n</p>\n<h5>Why DryvIQ?</h5>\n<p>DryvIQ helps organizations protect sensitive information, reduce operational costs, and increase business efficiency through its powerful unstructured data management platform. Using modern advances in artificial intelligence, DryvIQ discovers, manages, and protects organizations unstructured data. With speeds of over 100 terabytes a day at petabyte scale, weve delivered rapid time to value for over 1,100 organizations of all sizes worldwide including financial services customers World Bank, Mass Mutual, Bain Capital, and Nicolet Bank. For more information, contact us.</p>','\n',char(10)),'https://www.facebook.com/dryviq','https://www.twitter.com/dryviq','https://www.linkedin.com/company/dryviq/','');
INSERT INTO vendors VALUES('f0aef797-11aa-4abe-899a-cdd4b3824578','published','genians','Genians','www.genians.com','Genians (KOSDAQ: 263860), the industry pioneer in Network Access Control (NAC)-driven Zero Trust Network Access (ZTNA) solutions, delivers seamless and secure access control anywhere—on campus networks, in branch offices, and in the cloud.','3003 North 1st St.','#210','San Jose','CA','USA','02be8a51-ce96-4d3c-807e-1813ffdf6528',replace('<h5>Genians</h5>\n<p>\nGenians (KOSDAQ: 263860), the industry pioneer in Zero Trust Network Access (ZTNA), provides a fundamental cybersecurity platform for building a trusted path to secure access for any connecting devices by leveraging its Device Platform Intelligence (DPI), Network Access Control (NAC), and Endpoint Detection and Response (EDR). Since 2005, the company has served more than 2,400 customers, in organizations of all sizes and industries, including global Fortune 500 companies, the government, the military, critical infrastructure, finance, healthcare, education, and more. Genians is working to build a better security culture in the connected world by teaming up with global communities and industry leaders around the world.<br>\n</p>\n<h5>Why Genians?</h5>\n<p>Genians has consolidated the complexity of all essential Zero Trust features into a single platform, Genian ZTNA. Genian ZTNA can ensure full network observability for all network-enabled devices and provides context-based access control to maintain compliance with IT security policies. It then leverages automation to orchestrate an organizations entire security portfolio in concert with Genian ZTNA to achieve an optimally secure network access environment.</p>','\n',char(10)),'https://www.facebook.com/withgenians','https://www.twitter.com/WithGENIANS','https://www.linkedin.com/company/genians-inc-/',''); INSERT INTO vendors VALUES('f0aef797-11aa-4abe-899a-cdd4b3824578','published','genians','Genians','www.genians.com','Genians (KOSDAQ: 263860), the industry pioneer in Network Access Control (NAC)-driven Zero Trust Network Access (ZTNA) solutions, delivers seamless and secure access control anywhere—on campus networks, in branch offices, and in the cloud.','3003 North 1st St.','#210','San Jose','CA','USA','02be8a51-ce96-4d3c-807e-1813ffdf6528',replace('<h5>Genians</h5>\n<p>\nGenians (KOSDAQ: 263860), the industry pioneer in Zero Trust Network Access (ZTNA), provides a fundamental cybersecurity platform for building a trusted path to secure access for any connecting devices by leveraging its Device Platform Intelligence (DPI), Network Access Control (NAC), and Endpoint Detection and Response (EDR). Since 2005, the company has served more than 2,400 customers, in organizations of all sizes and industries, including global Fortune 500 companies, the government, the military, critical infrastructure, finance, healthcare, education, and more. Genians is working to build a better security culture in the connected world by teaming up with global communities and industry leaders around the world.<br>\n</p>\n<h5>Why Genians?</h5>\n<p>Genians has consolidated the complexity of all essential Zero Trust features into a single platform, Genian ZTNA. Genian ZTNA can ensure full network observability for all network-enabled devices and provides context-based access control to maintain compliance with IT security policies. It then leverages automation to orchestrate an organizations entire security portfolio in concert with Genian ZTNA to achieve an optimally secure network access environment.</p>','\n',char(10)),'https://www.facebook.com/withgenians','https://www.twitter.com/WithGENIANS','https://www.linkedin.com/company/genians-inc-/','');
INSERT INTO vendors VALUES('e003267c-0fb8-4b31-99c1-1a068261abe9','published','deloitte','Deloitte','https://www.deloitte.com/us/MoveForwardFast','Deloitte helps organizations create a cyber-minded culture and become stronger, faster, more innovative, and more resilient in the face of ever-changing cyber threats. Turn challenges into opportunities and confidently move forward fast.','200 Berkeley St',NULL,'Boston','MA','USA','e34f42ea-8d4b-4e12-815c-cd8895ef9947',replace('<h5>Deloitte</h5>\n<p>\nDeloitte Cyber &amp; Strategic Risk offers a unified approach to help you tackle obstacles, build new capabilities, and move forward fast. The stakes are high for addressing increasingly complex cyber and risk challenges, but with Deloitte, you can overcome your greatest hurdles and achieve your strategic goals. Together, well quickly develop a plan and course of action, whether you need help with strategy, design, implementation, or ongoing operations. Navigate your most critical paths, realize salient outcomes, and position your organization to thrive.\nOur solutions include:\nStrategy\nData &amp; Privacy\nApplication Security\nInfrastructure\nIdentity\nCloud\nEmerging Technology\nDetect &amp; Respond\nRisk Management &amp; Transformation\nCrisis Response, Recovery, &amp; Resilience<br>\n</p>\n<h5>Why Deloitte?</h5>\n<p>• Confidently navigate uncertainty, build capabilities that make a transformational impact on security and resilience, and drive exceptional performance at scale by making cyber and risk core to your organization\n• Offerings include: Cyber Strategy, Cloud Security, Identity, Detect &amp; Respond, Application Security, Emerging Technology (IoT, supply chain, 5G, Quantum, Blockchain, Metaverse), Infrastructure, Crisis &amp; Resilience\n• Why Deloitte: Ranked #1 globally in Security Consulting by Gartner; breadth and depth of offerings; proprietary technology; industry and domain experience\n</p>','\n',char(10)),'https://www.facebook.com/DeloitteUS','https://www.twitter.com/DeloitteRiskFin','https://www.linkedin.com/company/deloitte/',''); INSERT INTO vendors VALUES('e003267c-0fb8-4b31-99c1-1a068261abe9','published','deloitte','Deloitte','https://www.deloitte.com/us/MoveForwardFast','Deloitte helps organizations create a cyber-minded culture and become stronger, faster, more innovative, and more resilient in the face of ever-changing cyber threats. Turn challenges into opportunities and confidently move forward fast.','200 Berkeley St',NULL,'Boston','MA','USA','e34f42ea-8d4b-4e12-815c-cd8895ef9947',replace('<h5>Deloitte</h5>\n<p>\nDeloitte Cyber &amp; Strategic Risk offers a unified approach to help you tackle obstacles, build new capabilities, and move forward fast. The stakes are high for addressing increasingly complex cyber and risk challenges, but with Deloitte, you can overcome your greatest hurdles and achieve your strategic goals. Together, well quickly develop a plan and course of action, whether you need help with strategy, design, implementation, or ongoing operations. Navigate your most critical paths, realize salient outcomes, and position your organization to thrive.\nOur solutions include:\nStrategy\nData &amp; Privacy\nApplication Security\nInfrastructure\nIdentity\nCloud\nEmerging Technology\nDetect &amp; Respond\nRisk Management &amp; Transformation\nCrisis Response, Recovery, &amp; Resilience<br>\n</p>\n<h5>Why Deloitte?</h5>\n<p>• Confidently navigate uncertainty, build capabilities that make a transformational impact on security and resilience, and drive exceptional performance at scale by making cyber and risk core to your organization\n• Offerings include: Cyber Strategy, Cloud Security, Identity, Detect &amp; Respond, Application Security, Emerging Technology (IoT, supply chain, 5G, Quantum, Blockchain, Metaverse), Infrastructure, Crisis &amp; Resilience\n• Why Deloitte: Ranked #1 globally in Security Consulting by Gartner; breadth and depth of offerings; proprietary technology; industry and domain experience\n</p>','\n',char(10)),'https://www.facebook.com/DeloitteUS','https://www.twitter.com/DeloitteRiskFin','https://www.linkedin.com/company/deloitte/','');
INSERT INTO vendors VALUES('24ebd19b-7e4c-4248-a513-2642d265932b','published','glimps','GLIMPS','http://www.glimps.fr','We offers a unique Deep Learning technology that is trained to read and understand the elements that make up a binary. It has enabled the development of GLIMPS Malware and GLIMPS Audit : advanced application analysis and malware detection solutions.','500 King St West,',NULL,'Toronto',NULL,'CAN','f88415d5-9385-45eb-8b7d-d172f3b1eafa',replace('<h5>GLIMPS</h5>\n<p>\nGLIMPS is a French cybersecurity software company that offers a unique Deep Learning technology trained to read and understand the elements that make up a binary: code conceptualization. This technology has enabled the development of cybersecurity solutions: GLIMPS Malware and GLIMPS Audit.\nGLIMPS Malware - eXtended Malware Analysis Platform: a file-based investigation solution for the detection, analysis and characterization of threats:\n- Detection of unknown malware\n- Complete threat visibility\n- Automate recursive investigations\n- Reduce response time to alerts\nGLIMPS Audit is an automatic software recognition and reverse engineering tool.<br>\n</p>\n<h5>Why GLIMPS?</h5>\n<p>GLIMPS is a French cybersecurity software company that offers a unique Deep Learning technology trained to read and understand the elements that make up a binary: code conceptualization. This technology has enabled the development of cybersecurity solutions: GLIMPS Malware and GLIMPS Audit.\nGLIMPS Malware - eXtended Malware Analysis Platform: a file-based investigation solution for the detection, analysis and characterization of threats:\n- Detection of unknown malware\n- Complete threat visibility\n- Automate recursive investigations\n- Reduce response time to alerts\nGLIMPS Audit is an automatic software recognition and reverse engineering tool.</p>','\n',char(10)),NULL,'https://www.twitter.com/GlimpsRe','https://www.linkedin.com/company/glimpsre/',''); INSERT INTO vendors VALUES('24ebd19b-7e4c-4248-a513-2642d265932b','published','glimps','GLIMPS','http://www.glimps.fr','We offers a unique Deep Learning technology that is trained to read and understand the elements that make up a binary. It has enabled the development of GLIMPS Malware and GLIMPS Audit : advanced application analysis and malware detection solutions.','500 King St West,',NULL,'Toronto',NULL,'CAN','90d98ffa-962e-4636-8697-71777b40be1d',replace('<h5>GLIMPS</h5>\n<p>\nGLIMPS is a French cybersecurity software company that offers a unique Deep Learning technology trained to read and understand the elements that make up a binary: code conceptualization. This technology has enabled the development of cybersecurity solutions: GLIMPS Malware and GLIMPS Audit.\nGLIMPS Malware - eXtended Malware Analysis Platform: a file-based investigation solution for the detection, analysis and characterization of threats:\n- Detection of unknown malware\n- Complete threat visibility\n- Automate recursive investigations\n- Reduce response time to alerts\nGLIMPS Audit is an automatic software recognition and reverse engineering tool.<br>\n</p>\n<h5>Why GLIMPS?</h5>\n<p>GLIMPS is a French cybersecurity software company that offers a unique Deep Learning technology trained to read and understand the elements that make up a binary: code conceptualization. This technology has enabled the development of cybersecurity solutions: GLIMPS Malware and GLIMPS Audit.\nGLIMPS Malware - eXtended Malware Analysis Platform: a file-based investigation solution for the detection, analysis and characterization of threats:\n- Detection of unknown malware\n- Complete threat visibility\n- Automate recursive investigations\n- Reduce response time to alerts\nGLIMPS Audit is an automatic software recognition and reverse engineering tool.</p>','\n',char(10)),NULL,'https://www.twitter.com/GlimpsRe','https://www.linkedin.com/company/glimpsre/','');
INSERT INTO vendors VALUES('b5657f76-6d64-41e1-b85d-ecabf2df14d4','published','detectify','Detectify','detectify.com','Detectify sets the standard for External Attack Surface Management (EASM), providing 99.7% accurate vulnerability assessments powered by its community of elite ethical hackers. Go hack yourself. detectify.com','Master Samuelsgatan 56',NULL,'Stockholm',NULL,'SWE','759b3b91-2768-4085-9631-fda5b5075d19',replace('<h5>Detectify</h5>\n<p>\nDetectify sets the standard for External Attack Surface Management (EASM), providing 99.7% accurate vulnerability assessments. AppSec and ProdSec teams trust Detectify to expose exactly how attackers will exploit their Internet-facing applications. The Detectify platform automates continuous real-world, payload-based attacks crowdsourced through its global community of elite ethical hackers, exposing critical weaknesses before its too late.\nDetectify is trusted by 1,900+ security-conscious companies including King, Trello, Grammarly, auth0, Visma, Photobox, and Bühler Group.\nVisit us at detectify.com to learn more.<br>\n</p>\n<h5>Why Detectify?</h5>\n<p>We''ve taken DAST as a methodology and reinvented it as a method into External Attack Surface Management (EASM).\nSurface Monitoring runs continuous checks on the domain level and offers added value by discovering unknown assets and scanning those assets for vulnerabilities. AppSec and ProdSec teams can also set, enforce, and scale customizable security policies so they can focus on issues that matter most.\nApplication Scanning goes beyond the capabilities of a “traditional” DAST scanner by leveraging crawling, fuzzing, and authentication to find vulnerabilities in assets that normally cant be reached through stateless testing. We make use of insights from Surface Monitoring to improve application scans and focus on providing our customers with ease of use and automation.\nWe also take DAST another step further by utilizing crowdsource-fueled DAST. Both Surface Monitoring and Application Scanning leverage the same insights from our unique community of ethical hackers.</p>','\n',char(10)),NULL,'https://www.twitter.com/detectify/','https://www.linkedin.com/company/detectify/',''); INSERT INTO vendors VALUES('b5657f76-6d64-41e1-b85d-ecabf2df14d4','published','detectify','Detectify','detectify.com','Detectify sets the standard for External Attack Surface Management (EASM), providing 99.7% accurate vulnerability assessments powered by its community of elite ethical hackers. Go hack yourself. detectify.com','Master Samuelsgatan 56',NULL,'Stockholm',NULL,'SWE','759b3b91-2768-4085-9631-fda5b5075d19',replace('<h5>Detectify</h5>\n<p>\nDetectify sets the standard for External Attack Surface Management (EASM), providing 99.7% accurate vulnerability assessments. AppSec and ProdSec teams trust Detectify to expose exactly how attackers will exploit their Internet-facing applications. The Detectify platform automates continuous real-world, payload-based attacks crowdsourced through its global community of elite ethical hackers, exposing critical weaknesses before its too late.\nDetectify is trusted by 1,900+ security-conscious companies including King, Trello, Grammarly, auth0, Visma, Photobox, and Bühler Group.\nVisit us at detectify.com to learn more.<br>\n</p>\n<h5>Why Detectify?</h5>\n<p>We''ve taken DAST as a methodology and reinvented it as a method into External Attack Surface Management (EASM).\nSurface Monitoring runs continuous checks on the domain level and offers added value by discovering unknown assets and scanning those assets for vulnerabilities. AppSec and ProdSec teams can also set, enforce, and scale customizable security policies so they can focus on issues that matter most.\nApplication Scanning goes beyond the capabilities of a “traditional” DAST scanner by leveraging crawling, fuzzing, and authentication to find vulnerabilities in assets that normally cant be reached through stateless testing. We make use of insights from Surface Monitoring to improve application scans and focus on providing our customers with ease of use and automation.\nWe also take DAST another step further by utilizing crowdsource-fueled DAST. Both Surface Monitoring and Application Scanning leverage the same insights from our unique community of ethical hackers.</p>','\n',char(10)),NULL,'https://www.twitter.com/detectify/','https://www.linkedin.com/company/detectify/','');
INSERT INTO vendors VALUES('6222ccda-59bd-42b5-8d11-43c50b584470','published','dnsfilter','DNSFilter','https://dnsfilter.com','DNSFilter is redefining how organizations secure their largest threat vector: the Internet itself. Over 15K organizations and managed service providers trust DNSFilter to protect millions of end users from phishing, malware, and advanced cyber threats.','80 M Street SE Suite 100',NULL,'Washington','DC','USA','ac540f5a-12a2-445e-84b5-f262f2b93387',replace('<h5>DNSFilter</h5>\n<p>\nDNSFilter is redefining how organizations secure their largest threat vector: the Internet itself. With 70% of attacks involving the Domain Name System (DNS) layer, DNSFilter provides DNS security powered by machine learning that uniquely identifies over 60% of threats in-house. DNSFilter catches more zero-day attacks in process than competitors, identifying compromised domains an average of 7 days before they appear on other external threat feeds. Over 15K organizations and managed service providers trust DNSFilter to protect millions of end users from phishing, malware, and advanced cyber threats.<br>\n</p>\n<h5>Why DNSFilter?</h5>\n<p>Stop threats before they hit your network Looking for a DNS filtering solution to make internet browsing safer and faster? DNSFilter has been ranked the No. 1 DNS filtering product by G2, Capterra, and Cybersecurity Breakthrough. Some benefits include:\n• Granular control over how your network and devices are used\n• Insight into what types of threats might impact your network\n• Increased productivity by blocking time-waster sites\n• User-level reporting on sites and apps used by employees\n• Meet PDNS or CMMC compliance requirements around dns filtering protection</p>','\n',char(10)),'https://fltr.ai/CT0G','https://www.twitter.com/https://fltr.ai/CT0E','https://fltr.ai/CT0B',''); INSERT INTO vendors VALUES('6222ccda-59bd-42b5-8d11-43c50b584470','published','dnsfilter','DNSFilter','https://dnsfilter.com','DNSFilter is redefining how organizations secure their largest threat vector: the Internet itself. Over 15K organizations and managed service providers trust DNSFilter to protect millions of end users from phishing, malware, and advanced cyber threats.','80 M Street SE Suite 100',NULL,'Washington','DC','USA','ac540f5a-12a2-445e-84b5-f262f2b93387',replace('<h5>DNSFilter</h5>\n<p>\nDNSFilter is redefining how organizations secure their largest threat vector: the Internet itself. With 70% of attacks involving the Domain Name System (DNS) layer, DNSFilter provides DNS security powered by machine learning that uniquely identifies over 60% of threats in-house. DNSFilter catches more zero-day attacks in process than competitors, identifying compromised domains an average of 7 days before they appear on other external threat feeds. Over 15K organizations and managed service providers trust DNSFilter to protect millions of end users from phishing, malware, and advanced cyber threats.<br>\n</p>\n<h5>Why DNSFilter?</h5>\n<p>Stop threats before they hit your network Looking for a DNS filtering solution to make internet browsing safer and faster? DNSFilter has been ranked the No. 1 DNS filtering product by G2, Capterra, and Cybersecurity Breakthrough. Some benefits include:\n• Granular control over how your network and devices are used\n• Insight into what types of threats might impact your network\n• Increased productivity by blocking time-waster sites\n• User-level reporting on sites and apps used by employees\n• Meet PDNS or CMMC compliance requirements around dns filtering protection</p>','\n',char(10)),'https://fltr.ai/CT0G','https://www.twitter.com/https://fltr.ai/CT0E','https://fltr.ai/CT0B','');
INSERT INTO vendors VALUES('6c6c5d99-6f56-445e-990e-3e606c1faffa','published','deep-instinct','Deep Instinct','www.deepinstinct.com','Deep Instinct PREVENTS >99% of UNKNOWN threats before they land inside. With or without an agent, we stop attacks in <20ms. We are pioneering the use of deep learning AI in cybersecurity to achieve unprecedented scale with <0.1% false positives.','888 Seventh Ave',NULL,'New York','NY','USA','347b4e7e-513e-4f1c-adf4-898fe4302d2c',replace('<h5>Deep Instinct</h5>\n<p>\nDeep Instinct PREVENTS &gt;99% of UNKNOWN threats (ransomware, zero-days) before they land inside not after. With or without an agent, we stop attacks in &lt;20ms. Deep Instinct is pioneering the use of deep learning AI in cybersecurity to achieve unprecedented scale with &lt;0.1% false positives.<br>\n</p>\n<h5>Why Deep Instinct?</h5>\n<p>Deep Instinct is the only prevention-first cybersecurity company with natively architected deep learning technology. We keep enterprises safe by stopping &gt;99% of threats before other solutions even see them at a speed and scale unprecedented in the industry. Deep Instinct significantly reduces detection noise and false-alert storms to reduce overall risk, improve SOC team productivity, and improve the total cost of ownership of the cybersecurity stack.</p>','\n',char(10)),'https://www.facebook.com/DeepInstinctInc','https://www.twitter.com/DeepInstinctSec','https://www.linkedin.com/company/deep-instinct',''); INSERT INTO vendors VALUES('6c6c5d99-6f56-445e-990e-3e606c1faffa','published','deep-instinct','Deep Instinct','www.deepinstinct.com','Deep Instinct PREVENTS >99% of UNKNOWN threats before they land inside. With or without an agent, we stop attacks in <20ms. We are pioneering the use of deep learning AI in cybersecurity to achieve unprecedented scale with <0.1% false positives.','888 Seventh Ave',NULL,'New York','NY','USA','347b4e7e-513e-4f1c-adf4-898fe4302d2c',replace('<h5>Deep Instinct</h5>\n<p>\nDeep Instinct PREVENTS &gt;99% of UNKNOWN threats (ransomware, zero-days) before they land inside not after. With or without an agent, we stop attacks in &lt;20ms. Deep Instinct is pioneering the use of deep learning AI in cybersecurity to achieve unprecedented scale with &lt;0.1% false positives.<br>\n</p>\n<h5>Why Deep Instinct?</h5>\n<p>Deep Instinct is the only prevention-first cybersecurity company with natively architected deep learning technology. We keep enterprises safe by stopping &gt;99% of threats before other solutions even see them at a speed and scale unprecedented in the industry. Deep Instinct significantly reduces detection noise and false-alert storms to reduce overall risk, improve SOC team productivity, and improve the total cost of ownership of the cybersecurity stack.</p>','\n',char(10)),'https://www.facebook.com/DeepInstinctInc','https://www.twitter.com/DeepInstinctSec','https://www.linkedin.com/company/deep-instinct','');
@@ -2860,7 +2858,7 @@ INSERT INTO vendors VALUES('1b2f1b34-bbf5-4eeb-90fc-154aa38ed5d2','published','f
INSERT INTO vendors VALUES('f30fdfee-523d-474a-bf7b-dcb903c43bd0','published','firemon','FireMon','www.firemon.com',replace('FireMon improves security operations, leading to better security outcomes. FireMon delivers industry-leading security policy management, cloud security operations, and asset management solutions.\n\n','\n',char(10)),'8801 Renner Blvd',' 2nd floor ','Lenexa','KS','USA','f41e23f1-23ae-42c9-b071-114343e9fe4e',replace('<h5>FireMon</h5>\n<p>\nFireMons mission is to improve security operations that will in turn lead to better security outcomes. FireMon delivers industry-leading security policy management, cloud security operations, and asset management solutions to over 1,700 enterprises in nearly 70 countries. Our security policy management platform is the only real-time solution that reduces firewall and cloud security policy-related risks, manages policy changes, and enforces compliance. FireMons Cloud Defense (formerly DisruptOps) offering is the only distributed cloud security operations offering that detects and responds to issues in the fast-paced public cloud environments such as AWS and Azure. Our cloud-based Asset Management solution (formerly Lumeta) can scan an entire enterprise infrastructure, from on-premises networks to the cloud, to identify everything in the environment and provide valuable insights into how its all connected together. Learn more at FireMon.com and the FireMon Blog.<br>\n</p>\n<h5>Why FireMon?</h5>\n<p>FireMon delivers industry-leading security policy management, cloud security operations, and asset management solutions to over 1,700 enterprises in nearly 70 countries. Our security policy management platform is the only real-time solution that reduces firewall and cloud security policy-related risks, manages policy changes, and enforces compliance. FireMons Cloud Defense offering is the only distributed cloud security operations offering that detects and responds to issues in the fast-paced public cloud environments such as AWS and Azure. Our cloud-based Asset Management solution can scan an entire enterprise infrastructure, from on-premises networks to the cloud, to identify everything in the environment and provide valuable insights into how its all connected together. </p>','\n',char(10)),'https://www.facebook.com/FireMon/','https://www.twitter.com/FireMon','https://cc.linkedin.com/company/firemon',''); INSERT INTO vendors VALUES('f30fdfee-523d-474a-bf7b-dcb903c43bd0','published','firemon','FireMon','www.firemon.com',replace('FireMon improves security operations, leading to better security outcomes. FireMon delivers industry-leading security policy management, cloud security operations, and asset management solutions.\n\n','\n',char(10)),'8801 Renner Blvd',' 2nd floor ','Lenexa','KS','USA','f41e23f1-23ae-42c9-b071-114343e9fe4e',replace('<h5>FireMon</h5>\n<p>\nFireMons mission is to improve security operations that will in turn lead to better security outcomes. FireMon delivers industry-leading security policy management, cloud security operations, and asset management solutions to over 1,700 enterprises in nearly 70 countries. Our security policy management platform is the only real-time solution that reduces firewall and cloud security policy-related risks, manages policy changes, and enforces compliance. FireMons Cloud Defense (formerly DisruptOps) offering is the only distributed cloud security operations offering that detects and responds to issues in the fast-paced public cloud environments such as AWS and Azure. Our cloud-based Asset Management solution (formerly Lumeta) can scan an entire enterprise infrastructure, from on-premises networks to the cloud, to identify everything in the environment and provide valuable insights into how its all connected together. Learn more at FireMon.com and the FireMon Blog.<br>\n</p>\n<h5>Why FireMon?</h5>\n<p>FireMon delivers industry-leading security policy management, cloud security operations, and asset management solutions to over 1,700 enterprises in nearly 70 countries. Our security policy management platform is the only real-time solution that reduces firewall and cloud security policy-related risks, manages policy changes, and enforces compliance. FireMons Cloud Defense offering is the only distributed cloud security operations offering that detects and responds to issues in the fast-paced public cloud environments such as AWS and Azure. Our cloud-based Asset Management solution can scan an entire enterprise infrastructure, from on-premises networks to the cloud, to identify everything in the environment and provide valuable insights into how its all connected together. </p>','\n',char(10)),'https://www.facebook.com/FireMon/','https://www.twitter.com/FireMon','https://cc.linkedin.com/company/firemon','');
INSERT INTO vendors VALUES('418ee4c6-b4d1-4c4e-831f-72602e1e950d','published','flashpoint','Flashpoint','www.flashpoint.io','Trusted by governments, commercial & educational institutions worldwide, we help organizations protect their most critical assets, infrastructure & stakeholders from security risks such as cyber threats, ransomware, fraud, physical threats & more','6218 Georgia Ave NW ','Suite #1','Washington','DC','USA','887cb09f-a1d0-4ca7-a8a5-dd581ac1638c',replace('<h5>Flashpoint</h5>\n<p>\nWhen it comes to decisions and mitigating risk, organizations require a solution that provides immediate visibility into real-world threats that have potential to disrupt and harm the enterprise. The best way to get this insight is to harness the relevant information within illicit online communities to track threats and threat actors, where they originate, and where the discussions take place that put sensitive assets at risk. Collecting relevant data to support intelligence functions is an extraordinarily difficult and risky endeavor. Flashpoint Intelligence Platform grants access to our archive of finished intelligence reports, data from illicit communities, chat services platforms, open web and technical data in a single, finished intelligence experience. Whether you are an intel expert or new to assessing risk, our platform delivers relevant intelligence that empowers you to make more informed decisions and to mitigate risk across your organization.\n<br>\n</p>\n<h5>Why Flashpoint?</h5>\n<p>Threat intelligence for every team, Flashpoint is a comprehensive threat intelligence solution that enables security teams to rapidly identify risks, safeguard information, and remediate threats to protect their organizations assets. Our intelligence software delivers the contextual and actionable intelligence teams need to automatically detect, prioritize, and remediate emerging cyber and physical risks. Flashpoint aligns with every step of the intelligence lifecycle. Our technology fused with our industry-leading analysts, empowers us to rapidly tune our intelligence to deliver insights that matter to customers right now. Flashpoints data enrichment pipeline automatically adds critical context to collected data enabling rapid discovery and triaging of potential threats. We measure success by ensuring that we deliver the right intelligence at the right time, with the right context, so that our customers can mitigate risk faster than anyone else.</p>','\n',char(10)),NULL,'https://www.twitter.com/flashpointintel','https://www.linkedin.com/company/flashpoint-intel/',''); INSERT INTO vendors VALUES('418ee4c6-b4d1-4c4e-831f-72602e1e950d','published','flashpoint','Flashpoint','www.flashpoint.io','Trusted by governments, commercial & educational institutions worldwide, we help organizations protect their most critical assets, infrastructure & stakeholders from security risks such as cyber threats, ransomware, fraud, physical threats & more','6218 Georgia Ave NW ','Suite #1','Washington','DC','USA','887cb09f-a1d0-4ca7-a8a5-dd581ac1638c',replace('<h5>Flashpoint</h5>\n<p>\nWhen it comes to decisions and mitigating risk, organizations require a solution that provides immediate visibility into real-world threats that have potential to disrupt and harm the enterprise. The best way to get this insight is to harness the relevant information within illicit online communities to track threats and threat actors, where they originate, and where the discussions take place that put sensitive assets at risk. Collecting relevant data to support intelligence functions is an extraordinarily difficult and risky endeavor. Flashpoint Intelligence Platform grants access to our archive of finished intelligence reports, data from illicit communities, chat services platforms, open web and technical data in a single, finished intelligence experience. Whether you are an intel expert or new to assessing risk, our platform delivers relevant intelligence that empowers you to make more informed decisions and to mitigate risk across your organization.\n<br>\n</p>\n<h5>Why Flashpoint?</h5>\n<p>Threat intelligence for every team, Flashpoint is a comprehensive threat intelligence solution that enables security teams to rapidly identify risks, safeguard information, and remediate threats to protect their organizations assets. Our intelligence software delivers the contextual and actionable intelligence teams need to automatically detect, prioritize, and remediate emerging cyber and physical risks. Flashpoint aligns with every step of the intelligence lifecycle. Our technology fused with our industry-leading analysts, empowers us to rapidly tune our intelligence to deliver insights that matter to customers right now. Flashpoints data enrichment pipeline automatically adds critical context to collected data enabling rapid discovery and triaging of potential threats. We measure success by ensuring that we deliver the right intelligence at the right time, with the right context, so that our customers can mitigate risk faster than anyone else.</p>','\n',char(10)),NULL,'https://www.twitter.com/flashpointintel','https://www.linkedin.com/company/flashpoint-intel/','');
INSERT INTO vendors VALUES('60decb8f-0a62-4467-a94a-248ed4fd7229','published','fastly-inc','Fastly, Inc.','www.fastly.com','Fastly is upgrading the internet experience. With the fastest global edge cloud network and the industrys first and only unified WAF, we help develop, deliver, and secure modern distributed applications and engaging digital experiences.','475 Brannan Street ','#300','San Francisco','CA','USA','483e1d3b-4dd7-484d-9d79-aad296894cfa',replace('<h5>Fastly, Inc.</h5>\n<p>\nFastlys powerful and programmable edge cloud platform helps the worlds top brands deliver the fastest online experiences possible while improving site performance, enhancing security, and empowering innovation at a global scale. With world-class support that achieves 95%+ average annual customer satisfaction ratings, Fastlys suite of edge compute, delivery, and security offerings has been recognized as a leader by industry analysts such as IDC, Forrester, and Gartner. Compared to legacy providers, Fastlys powerful and modern network architecture is the fastest on the planet, empowering developers to deliver secure websites and apps at global scale with rapid time-to-market and industry-leading cost savings. Thousands of the worlds most prominent organizations trust Fastly to help them upgrade the internet experience, including Reddit, Pinterest, Stripe, Neiman Marcus, The New York Times, Epic Games, and GitHub. Learn more about Fastly at https://www.fastly.com/ <br>\n</p>\n<h5>Why Fastly, Inc.?</h5>\n<p>The future of business starts with developers.\nExpectations for websites and apps are at an all-time high. If they arent fast, secure, and highly personalized, users take their business elsewhere. But todays most innovative companies are thriving by meeting this challenge head on: theyre choosing Fastly and an investment in their developers.\nWith Fastlys powerful edge cloud platform, developers get the tools they need to build the most groundbreaking apps — all optimized for speed, security, and scale — so businesses can effectively transform to compete in todays markets. Together, were building the future of the web.\nThe technology behind better business.\nTechnology is the muscle behind user experiences, and it directly relates to your bottom line. By leveraging the right infrastructure, you can scale smarter, improve security, and optimize the user experience. With Fastly powering things in the background, you can get back to focusing on what matters most for your business.</p>','\n',char(10)),'https://www.facebook.com/FastlyEdgeCloud','https://www.twitter.com/fastly','https://www.linkedin.com/company/fastly',''); INSERT INTO vendors VALUES('60decb8f-0a62-4467-a94a-248ed4fd7229','published','fastly-inc','Fastly, Inc.','www.fastly.com','Fastly is upgrading the internet experience. With the fastest global edge cloud network and the industrys first and only unified WAF, we help develop, deliver, and secure modern distributed applications and engaging digital experiences.','475 Brannan Street ','#300','San Francisco','CA','USA','483e1d3b-4dd7-484d-9d79-aad296894cfa',replace('<h5>Fastly, Inc.</h5>\n<p>\nFastlys powerful and programmable edge cloud platform helps the worlds top brands deliver the fastest online experiences possible while improving site performance, enhancing security, and empowering innovation at a global scale. With world-class support that achieves 95%+ average annual customer satisfaction ratings, Fastlys suite of edge compute, delivery, and security offerings has been recognized as a leader by industry analysts such as IDC, Forrester, and Gartner. Compared to legacy providers, Fastlys powerful and modern network architecture is the fastest on the planet, empowering developers to deliver secure websites and apps at global scale with rapid time-to-market and industry-leading cost savings. Thousands of the worlds most prominent organizations trust Fastly to help them upgrade the internet experience, including Reddit, Pinterest, Stripe, Neiman Marcus, The New York Times, Epic Games, and GitHub. Learn more about Fastly at https://www.fastly.com/ <br>\n</p>\n<h5>Why Fastly, Inc.?</h5>\n<p>The future of business starts with developers.\nExpectations for websites and apps are at an all-time high. If they arent fast, secure, and highly personalized, users take their business elsewhere. But todays most innovative companies are thriving by meeting this challenge head on: theyre choosing Fastly and an investment in their developers.\nWith Fastlys powerful edge cloud platform, developers get the tools they need to build the most groundbreaking apps — all optimized for speed, security, and scale — so businesses can effectively transform to compete in todays markets. Together, were building the future of the web.\nThe technology behind better business.\nTechnology is the muscle behind user experiences, and it directly relates to your bottom line. By leveraging the right infrastructure, you can scale smarter, improve security, and optimize the user experience. With Fastly powering things in the background, you can get back to focusing on what matters most for your business.</p>','\n',char(10)),'https://www.facebook.com/FastlyEdgeCloud','https://www.twitter.com/fastly','https://www.linkedin.com/company/fastly','');
INSERT INTO vendors VALUES('f734a600-140d-4af9-918f-4cfbdc2bfae9','published','flexxon-pte-ltd','Flexxon Pte. Ltd.','https://x-phy.com','Flexxon is an international next-generation storage device manufacturer, specializing in hardware-based cybersecurity solutions & industrial NAND flash storage devices with a key focus on Cybersecurity, Industrial, Medical & Automotive applications.','28 Genting Lane','#09-03 Platinum 28','Singapore',NULL,'SGP','024ce8f2-b8d4-4cbd-a682-891457695658',replace('<h5>Flexxon Pte. Ltd.</h5>\n<p>\nFlexxon is a next-generation storage device manufacturer, specializing in industrial NAND flash storage devices and hardware-based cybersecurity solutions. We cater to a broad spectrum of industries with a strong focus on Cybersecurity, Industrial, Medical and Automotive applications. Founded in Singapore in 2007, Flexxon has a global presence in Asia-Pacific, Europe, North America, and the Middle East. Our flagship X-PHY® brand is the world''s first AI-embedded firmware-based cybersecurity solution, providing real-time protection against a broad spectrum of software-based malware, ransomware, and viruses, including hardware and physical attacks. Backed by Heliconia Capital Management, we''re committed to constant innovation to address the evolving cybersecurity needs of today.<br>\n</p>\n<h5>Why Flexxon Pte. Ltd.?</h5>\n<p>X-PHY® addresses the growing concerns of cybersecurity by providing real-time protection against known and unknown threats. With its AI-embedded module and reinforced firmware security, X-PHY® offers a unique hardware-based cybersecurity solution that is easy to implement and use, ensuring the last line of defense for the data protection of businesses.\nX-PHY® is a hardware cybersecurity solution that is distinct from other similar products. With its AI-embedded firmware technology, X-PHY® provides an added layer of security that is standalone and impossible to compromise. By detecting and preventing threats in real-time, X-PHY® offers superior protection against a wide range of cyber threats, giving organizations an added layer of security to mitigate the risk of data breaches.\nX-PHY® provides the peace of mind to organizations in protecting sensitive data against a wide range of cyber threats. It is intuitive, allowing for seamless integration with existing hardware and systems. </p>','\n',char(10)),'https://www.facebook.com/X-PHY-339457977396013','https://www.twitter.com/XphySecure?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor','https://www.linkedin.com/company/x-phy-ai-cybersecurity-solutions',''); INSERT INTO vendors VALUES('f734a600-140d-4af9-918f-4cfbdc2bfae9','published','flexxon-pte-ltd','Flexxon Pte. Ltd.','https://x-phy.com','Flexxon is an international next-generation storage device manufacturer, specializing in hardware-based cybersecurity solutions & industrial NAND flash storage devices with a key focus on Cybersecurity, Industrial, Medical & Automotive applications.','28 Genting Lane','#09-03 Platinum 28','Singapore',NULL,'SGP','f0a5af75-6a76-4981-a0a9-9e4e8de1ab32',replace('<h5>Flexxon Pte. Ltd.</h5>\n<p>\nFlexxon is a next-generation storage device manufacturer, specializing in industrial NAND flash storage devices and hardware-based cybersecurity solutions. We cater to a broad spectrum of industries with a strong focus on Cybersecurity, Industrial, Medical and Automotive applications. Founded in Singapore in 2007, Flexxon has a global presence in Asia-Pacific, Europe, North America, and the Middle East. Our flagship X-PHY® brand is the world''s first AI-embedded firmware-based cybersecurity solution, providing real-time protection against a broad spectrum of software-based malware, ransomware, and viruses, including hardware and physical attacks. Backed by Heliconia Capital Management, we''re committed to constant innovation to address the evolving cybersecurity needs of today.<br>\n</p>\n<h5>Why Flexxon Pte. Ltd.?</h5>\n<p>X-PHY® addresses the growing concerns of cybersecurity by providing real-time protection against known and unknown threats. With its AI-embedded module and reinforced firmware security, X-PHY® offers a unique hardware-based cybersecurity solution that is easy to implement and use, ensuring the last line of defense for the data protection of businesses.\nX-PHY® is a hardware cybersecurity solution that is distinct from other similar products. With its AI-embedded firmware technology, X-PHY® provides an added layer of security that is standalone and impossible to compromise. By detecting and preventing threats in real-time, X-PHY® offers superior protection against a wide range of cyber threats, giving organizations an added layer of security to mitigate the risk of data breaches.\nX-PHY® provides the peace of mind to organizations in protecting sensitive data against a wide range of cyber threats. It is intuitive, allowing for seamless integration with existing hardware and systems. </p>','\n',char(10)),'https://www.facebook.com/X-PHY-339457977396013','https://www.twitter.com/XphySecure?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor','https://www.linkedin.com/company/x-phy-ai-cybersecurity-solutions','');
INSERT INTO vendors VALUES('849d1096-d174-4f57-98d9-6e973dc68b35','published','fastpath','Fastpath','www.gofastpath.com','Fastpath allows businesses to seamlessly orchestrate security, compliance and risk management across multi-site, multi-application environments. It enables complete access control, identity management, and insight across their business applications.','4093 NW Urbandale Dr',NULL,'Des Moines ','IA','USA','35b68ef3-1fd4-49be-b89f-ac8f80b93726',replace('<h5>Fastpath</h5>\n<p>\nFastpath is a cloud-based access orchestration platform. It allows organizations to manage and automate the processes around access governance and security, quickly and efficiently.\nCustomizable, quick to implement and deploy means you get value right away. And it works with all major enterprise software in multi-site, multi-application environments.\nFastpath helps to identify, quantify, and manage data access risk, so you can be confident that the right people are accessing the right information for the right reasons. Make informed strategic business decisions confidently, knowing your organization is secure and compliant.<br>\n</p>\n<h5>Why Fastpath?</h5>\n<p>Fastpath''s intuitive cloud-based platform enables you to manage compliant access control and identity management across multi-site, multi-application environments from one place.\nThe platform achieves this across 4 key products. Identity makes it efficient and cost-effective to discover, manage, and secure identities across an enterprise. From the moment you hire in your HR system, Fastpath enables you to automate access as users join, move within, or leave the organization. Access Control analyzes cross-application risk and allows a company to manage it from a central location. Certification helps businesses keep track of who has access to critical business applications, define owners and reviewers, schedule periodic certification reviews, and sign off for different types of access. Change Tracking is designed to detect and reduce both potential and actual risk, with the option to define changes that are tracked or leverage out-of-the-box templates that focus on high-risk areas.</p>','\n',char(10)),'https://www.facebook.com/gofastpath','https://www.twitter.com/GoFastpath','https://www.linkedin.com/company/fastpath-inc-',''); INSERT INTO vendors VALUES('849d1096-d174-4f57-98d9-6e973dc68b35','published','fastpath','Fastpath','www.gofastpath.com','Fastpath allows businesses to seamlessly orchestrate security, compliance and risk management across multi-site, multi-application environments. It enables complete access control, identity management, and insight across their business applications.','4093 NW Urbandale Dr',NULL,'Des Moines ','IA','USA','35b68ef3-1fd4-49be-b89f-ac8f80b93726',replace('<h5>Fastpath</h5>\n<p>\nFastpath is a cloud-based access orchestration platform. It allows organizations to manage and automate the processes around access governance and security, quickly and efficiently.\nCustomizable, quick to implement and deploy means you get value right away. And it works with all major enterprise software in multi-site, multi-application environments.\nFastpath helps to identify, quantify, and manage data access risk, so you can be confident that the right people are accessing the right information for the right reasons. Make informed strategic business decisions confidently, knowing your organization is secure and compliant.<br>\n</p>\n<h5>Why Fastpath?</h5>\n<p>Fastpath''s intuitive cloud-based platform enables you to manage compliant access control and identity management across multi-site, multi-application environments from one place.\nThe platform achieves this across 4 key products. Identity makes it efficient and cost-effective to discover, manage, and secure identities across an enterprise. From the moment you hire in your HR system, Fastpath enables you to automate access as users join, move within, or leave the organization. Access Control analyzes cross-application risk and allows a company to manage it from a central location. Certification helps businesses keep track of who has access to critical business applications, define owners and reviewers, schedule periodic certification reviews, and sign off for different types of access. Change Tracking is designed to detect and reduce both potential and actual risk, with the option to define changes that are tracked or leverage out-of-the-box templates that focus on high-risk areas.</p>','\n',char(10)),'https://www.facebook.com/gofastpath','https://www.twitter.com/GoFastpath','https://www.linkedin.com/company/fastpath-inc-','');
INSERT INTO vendors VALUES('36732bad-df88-41bc-84b7-290cbf238d4a','published','axis','Axis','axissecurity.com',replace('Axis aims to elevate secure access to power a modern workplace where people, and technology, work in harmony.\n\nAtmos is the first SSE platform to elegantly integrate ZTNA, SWG, CASB and Digital Experience into a single, easy to use, interface.\n','\n',char(10)),'7700 Windrose ave','Suite 300','Plano','TX','USA','56a3c6a3-8e34-4873-a64e-7a67ce0a5c02',replace('<h5>Axis</h5>\n<p>\nAt Axis our mission is to elevate secure access to power a modern workplace where people, and technology, work in harmony.\nAtmos, the cloud-native platform delivered by Axis, artfully extends secure connectivity out to the users location through 350 edge locations running on the global backbone of AWS Global Accelerator, Google Cloud Platform, and Oracle. The security service edge (SSE) platform sits inline to inspect all traffic, seamlessly broker surgical, one-to-one, connections based on identity and policy, and perform end-user experience monitoring.\nThus, IT leaders are empowered to make hybrid work simple, digital experience a competitive advantage, and ensure business data remains protected - even as it moves to the cloud.\n<br>\n</p>\n<h5>Why Axis?</h5>\n<p>Atmos is the first SSE platform to elegantly integrate ZTNA, SWG, CASB and Digital Experience into a single, easy to use, interface.\n100% cloud-delivered with over 350 PoPs running on AWS, Google and Oracle. This ensures less latency, more redundancy and faster disaster recovery than any other SSE platform.\nAtmos provides a single interface to manage all your policies, apps, devices, users, data, and more.\nAtmos inspects all traffic to provide visibility into user access across both internal and external apps so IT can prevent data leakage.\nAtmos is the only service that supports all ports and protocols, even VOIP, ICMP, AS400 apps, and RDP, SSH, Git and DG via agentless web browsing plus common SaaS apps and Internet protocols.\nIntegrations with identity and endpoint security solutions enable context sharing across cloud services. If changes in identity or device health are detected, the Atmos access policies automatically adapt.</p>','\n',char(10)),'https://www.facebook.com/Axis-Security-102823254782459','https://www.twitter.com/AxisSecurityHQ','https://www.linkedin.com/company/axis-security/',''); INSERT INTO vendors VALUES('36732bad-df88-41bc-84b7-290cbf238d4a','published','axis','Axis','axissecurity.com',replace('Axis aims to elevate secure access to power a modern workplace where people, and technology, work in harmony.\n\nAtmos is the first SSE platform to elegantly integrate ZTNA, SWG, CASB and Digital Experience into a single, easy to use, interface.\n','\n',char(10)),'7700 Windrose ave','Suite 300','Plano','TX','USA','56a3c6a3-8e34-4873-a64e-7a67ce0a5c02',replace('<h5>Axis</h5>\n<p>\nAt Axis our mission is to elevate secure access to power a modern workplace where people, and technology, work in harmony.\nAtmos, the cloud-native platform delivered by Axis, artfully extends secure connectivity out to the users location through 350 edge locations running on the global backbone of AWS Global Accelerator, Google Cloud Platform, and Oracle. The security service edge (SSE) platform sits inline to inspect all traffic, seamlessly broker surgical, one-to-one, connections based on identity and policy, and perform end-user experience monitoring.\nThus, IT leaders are empowered to make hybrid work simple, digital experience a competitive advantage, and ensure business data remains protected - even as it moves to the cloud.\n<br>\n</p>\n<h5>Why Axis?</h5>\n<p>Atmos is the first SSE platform to elegantly integrate ZTNA, SWG, CASB and Digital Experience into a single, easy to use, interface.\n100% cloud-delivered with over 350 PoPs running on AWS, Google and Oracle. This ensures less latency, more redundancy and faster disaster recovery than any other SSE platform.\nAtmos provides a single interface to manage all your policies, apps, devices, users, data, and more.\nAtmos inspects all traffic to provide visibility into user access across both internal and external apps so IT can prevent data leakage.\nAtmos is the only service that supports all ports and protocols, even VOIP, ICMP, AS400 apps, and RDP, SSH, Git and DG via agentless web browsing plus common SaaS apps and Internet protocols.\nIntegrations with identity and endpoint security solutions enable context sharing across cloud services. If changes in identity or device health are detected, the Atmos access policies automatically adapt.</p>','\n',char(10)),'https://www.facebook.com/Axis-Security-102823254782459','https://www.twitter.com/AxisSecurityHQ','https://www.linkedin.com/company/axis-security/','');
INSERT INTO vendors VALUES('4eb7ed4f-3ad1-42e4-9a50-1b77cb66d0b3','published','astrix-security','Astrix Security','https://astrix.security/',replace('Astrix lets you safely unleash the power of app-to-app connectivity by securing non-human identities across IaaS, PaaS, and SaaS. It detects and remediates over-privileged or suspicious third-party app connections to your core systems. \n','\n',char(10)),'545 East 14th Street',NULL,'New York','NY','USA','fd743c91-78c1-4de6-9b26-d5a37858a5ce',replace('<h5>Astrix Security </h5>\n<p>\nAt Astrix, we help you extend access management and threat prevention to non-human identities to ensure your core systems are securely connected to third-party cloud services (via API keys, service accounts, issued tokens, webhooks, and other types of integrations).\nFrom Salesforce and Office 365 to GitHub, Snowflake, and Workato, we keep core systems across SaaS, PaaS, and IaaS secure from over-privileged, unnecessary, and malicious connections exposing you to supply chain attacks, data leakage, and compliance violations.\nOur agentless, easy-to-deploy solution provides holistic visibility into all app-to-app connections and instantly detects and mitigates risky connections with automated remediation workflows.\nIn doing so, we enable you to unleash the power of app-to-app integration and automation without compromising security.\n<br>\n</p>\n<h5>Why Astrix Security ?</h5>\n<p>Astrixs agentless, easy-to-deploy solution allows you to extend access management and threat detection and response to non-human identities (API keys, service accounts, issued tokens, webhooks, etc.) ensuring your core systems are securely connected to third-party cloud services.\nFrom Salesforce and Office 365 to GitHub, Snowflake, and Workato, we keep core systems across SaaS, PaaS, and IaaS secure from over-privileged, unnecessary, and malicious connections exposing you to supply chain attacks, data leakage, and compliance violations.\nOur agentless, easy-to-deploy solution provides holistic visibility into all app-to-app connections and instantly detects and mitigates risky connections with automated remediation workflows.\nIn doing so, we enable you to unleash the power of app-to-app integration and automation without compromising security.\n</p>','\n',char(10)),'https://www.facebook.com/AstrixSec','https://www.twitter.com/AstrixSecurity','https://www.linkedin.com/company/astrix-security',''); INSERT INTO vendors VALUES('4eb7ed4f-3ad1-42e4-9a50-1b77cb66d0b3','published','astrix-security','Astrix Security','https://astrix.security/',replace('Astrix lets you safely unleash the power of app-to-app connectivity by securing non-human identities across IaaS, PaaS, and SaaS. It detects and remediates over-privileged or suspicious third-party app connections to your core systems. \n','\n',char(10)),'545 East 14th Street',NULL,'New York','NY','USA','fd743c91-78c1-4de6-9b26-d5a37858a5ce',replace('<h5>Astrix Security </h5>\n<p>\nAt Astrix, we help you extend access management and threat prevention to non-human identities to ensure your core systems are securely connected to third-party cloud services (via API keys, service accounts, issued tokens, webhooks, and other types of integrations).\nFrom Salesforce and Office 365 to GitHub, Snowflake, and Workato, we keep core systems across SaaS, PaaS, and IaaS secure from over-privileged, unnecessary, and malicious connections exposing you to supply chain attacks, data leakage, and compliance violations.\nOur agentless, easy-to-deploy solution provides holistic visibility into all app-to-app connections and instantly detects and mitigates risky connections with automated remediation workflows.\nIn doing so, we enable you to unleash the power of app-to-app integration and automation without compromising security.\n<br>\n</p>\n<h5>Why Astrix Security ?</h5>\n<p>Astrixs agentless, easy-to-deploy solution allows you to extend access management and threat detection and response to non-human identities (API keys, service accounts, issued tokens, webhooks, etc.) ensuring your core systems are securely connected to third-party cloud services.\nFrom Salesforce and Office 365 to GitHub, Snowflake, and Workato, we keep core systems across SaaS, PaaS, and IaaS secure from over-privileged, unnecessary, and malicious connections exposing you to supply chain attacks, data leakage, and compliance violations.\nOur agentless, easy-to-deploy solution provides holistic visibility into all app-to-app connections and instantly detects and mitigates risky connections with automated remediation workflows.\nIn doing so, we enable you to unleash the power of app-to-app integration and automation without compromising security.\n</p>','\n',char(10)),'https://www.facebook.com/AstrixSec','https://www.twitter.com/AstrixSecurity','https://www.linkedin.com/company/astrix-security','');
@@ -2869,7 +2867,7 @@ INSERT INTO vendors VALUES('2f28f781-adbb-42e7-86ee-355a9707a87d','published','a
INSERT INTO vendors VALUES('90822539-d78e-49c9-bf7a-5a52aad7033c','published','aic-inc','AIC Inc.','www.aicipc.com','AIC is a leading provider of standard OTS (off-the-shelf) and OEM/ODM server and storage solutions. AIC''s products are highly flexible and configurable to any form factor, standard or custom. For more information, please visit: https://www.aicipc.com','21808 Garcia Lane',NULL,'City of Industry','CA','USA','e62fc40e-f52a-4d5a-80a2-1f59f20633ad',replace('<h5>AIC Inc.</h5>\n<p>\nAIC is a leading provider of both standard OTS (off-the-shelf) and OEM/ODM server and storage solutions. With expert in-house design, manufacturing and validation capabilities, AIC''s products are highly flexible and configurable to any form factor, standard or custom. AIC leads the industry with over 25 years of experience in mechanical, electronic, system-level engineering as well as a dedication to innovation and customer satisfaction. Headquartered in Taiwan, AIC has offices and operations throughout the United States, Asia, and Europe. For more information, please visit: https://www.aicipc.com<br>\n</p>','\n',char(10)),'https://www.facebook.com/AICinc/',NULL,'https://www.linkedin.com/company/aicinc',''); INSERT INTO vendors VALUES('90822539-d78e-49c9-bf7a-5a52aad7033c','published','aic-inc','AIC Inc.','www.aicipc.com','AIC is a leading provider of standard OTS (off-the-shelf) and OEM/ODM server and storage solutions. AIC''s products are highly flexible and configurable to any form factor, standard or custom. For more information, please visit: https://www.aicipc.com','21808 Garcia Lane',NULL,'City of Industry','CA','USA','e62fc40e-f52a-4d5a-80a2-1f59f20633ad',replace('<h5>AIC Inc.</h5>\n<p>\nAIC is a leading provider of both standard OTS (off-the-shelf) and OEM/ODM server and storage solutions. With expert in-house design, manufacturing and validation capabilities, AIC''s products are highly flexible and configurable to any form factor, standard or custom. AIC leads the industry with over 25 years of experience in mechanical, electronic, system-level engineering as well as a dedication to innovation and customer satisfaction. Headquartered in Taiwan, AIC has offices and operations throughout the United States, Asia, and Europe. For more information, please visit: https://www.aicipc.com<br>\n</p>','\n',char(10)),'https://www.facebook.com/AICinc/',NULL,'https://www.linkedin.com/company/aicinc','');
INSERT INTO vendors VALUES('9b643afd-4b02-4342-a199-f6e626893794','published','authlite','AuthLite','www.authlite.com','AuthLite adds native 2-factor authentication to your Active Directory, protects Administrator accounts and RDP by assigning privileged groups dynamically after login, and eliminates a variety of credential exposure risks like Pass-the-Hash attacks.','1099 Willowbrook Dr.',NULL,'Springfield','IL','USA','b160768a-d8e3-4343-bec6-3df3980e9232',replace('<h5>AuthLite</h5>\n<p>\nAuthLite adds native 2-factor authentication to your Active Directory, protects Administrator accounts and RDP by assigning privileged groups dynamically after login, and eliminates a variety of credential exposure risks like Pass-the-Hash attacks.<br>\n</p>','\n',char(10)),NULL,NULL,NULL,''); INSERT INTO vendors VALUES('9b643afd-4b02-4342-a199-f6e626893794','published','authlite','AuthLite','www.authlite.com','AuthLite adds native 2-factor authentication to your Active Directory, protects Administrator accounts and RDP by assigning privileged groups dynamically after login, and eliminates a variety of credential exposure risks like Pass-the-Hash attacks.','1099 Willowbrook Dr.',NULL,'Springfield','IL','USA','b160768a-d8e3-4343-bec6-3df3980e9232',replace('<h5>AuthLite</h5>\n<p>\nAuthLite adds native 2-factor authentication to your Active Directory, protects Administrator accounts and RDP by assigning privileged groups dynamically after login, and eliminates a variety of credential exposure risks like Pass-the-Hash attacks.<br>\n</p>','\n',char(10)),NULL,NULL,NULL,'');
INSERT INTO vendors VALUES('d0ff5d33-2edc-40ff-8298-d7a0a1d0ab31','published','atandt-cybersecurity','AT&T Cybersecurity','https://cybersecurity.att.com/','AT&T Cybersecurity is one of the worlds leading managed security services providers. Our experienced cybersecurity consultants and SOC analysts help manage your network transformation to reduce cybersecurity risk and overcome skill gaps. Our mission is to be your trusted advisor on your journey to cybersecurity resiliency, making it safer for your business to innovate.','208 S Akard Street','17th floor','Dallas','TX','USA','7d941531-ac96-445d-b2c9-0a56e71d1cca',replace('<h5>AT&amp;T Cybersecurity</h5>\n<p>\nAT&amp;T Cybersecurity helps make your network more resilient. Together, the power of the AT&amp;T network, our SaaS-based solutions with advanced technologies including virtualization and actionable threat intelligence from AT&amp;T Alien Labs and the Open Threat Exchange™, and our relationship with best-of-breed vendors, accelerate your response to cybersecurity threats. Our experienced consultants and SOC analysts help manage your network transformation to reduce cybersecurity risk and overcome the skills gap. Our mission is to be your trusted advisor on your journey to cybersecurity resiliency, making it safer for your business to innovate.<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/attcyber','https://www.linkedin.com/company/attcybersecurity',''); INSERT INTO vendors VALUES('d0ff5d33-2edc-40ff-8298-d7a0a1d0ab31','published','atandt-cybersecurity','AT&T Cybersecurity','https://cybersecurity.att.com/','AT&T Cybersecurity is one of the worlds leading managed security services providers. Our experienced cybersecurity consultants and SOC analysts help manage your network transformation to reduce cybersecurity risk and overcome skill gaps. Our mission is to be your trusted advisor on your journey to cybersecurity resiliency, making it safer for your business to innovate.','208 S Akard Street','17th floor','Dallas','TX','USA','7d941531-ac96-445d-b2c9-0a56e71d1cca',replace('<h5>AT&amp;T Cybersecurity</h5>\n<p>\nAT&amp;T Cybersecurity helps make your network more resilient. Together, the power of the AT&amp;T network, our SaaS-based solutions with advanced technologies including virtualization and actionable threat intelligence from AT&amp;T Alien Labs and the Open Threat Exchange™, and our relationship with best-of-breed vendors, accelerate your response to cybersecurity threats. Our experienced consultants and SOC analysts help manage your network transformation to reduce cybersecurity risk and overcome the skills gap. Our mission is to be your trusted advisor on your journey to cybersecurity resiliency, making it safer for your business to innovate.<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/attcyber','https://www.linkedin.com/company/attcybersecurity','');
INSERT INTO vendors VALUES('ca9965ff-d378-4f34-a701-d944d5597cc8','published','alta-associates-a-part-of-diversified-search-group','Alta Associates, a part of Diversified Search Group','https://diversifiedsearchgroup.com/alta-associates/','Founded in 1986, Alta Associates, a part of Diversified Search Group, is the pioneer and preeminent executive search firm specializing in Cybersecurity, Risk Management, and Technology. Alta Associates has a successful record of placing cyber roles. ','8 Bartles Corner Rd. ','Suite 021','Flemington','NJ','USA','81e1e853-b7a5-4d2e-965d-edf1cdc617d5',replace('<h5>Alta Associates, a part of Diversified Search Group</h5>\n<p>\nWhen Russians hacked into Citibank in 1994, Alta Associates was retained to help build the first-ever information security organization. We have been placing Chief Information Security Officers and the teams that support them ever since. Alta is the go-to specialty search firm for companies that are the targets of sophisticated cyber attacks as well as companies hiring their first-ever CISO or elevating their cybersecurity, IT risk management, governance, compliance, and privacy leadership teams.\nFor over three decades, Alta Associates has helped to define, elevate, and integrate the role of cybersecurity and risk professionals in firms ranging from private equity and venture-backed growth companies to the worlds largest and most complex global and regulated corporations.<br>\n</p>','\n',char(10)),'https://www.facebook.com/DivSearch','https://www.twitter.com/DivSearch','https://www.linkedin.com/company/diversifiedsearchgroup/',''); INSERT INTO vendors VALUES('ca9965ff-d378-4f34-a701-d944d5597cc8','published','alta-associates-a-part-of-diversified-search-group','Alta Associates, a part of Diversified Search Group','https://diversifiedsearchgroup.com/alta-associates/','Founded in 1986, Alta Associates, a part of Diversified Search Group, is the pioneer and preeminent executive search firm specializing in Cybersecurity, Risk Management, and Technology. Alta Associates has a successful record of placing cyber roles. ','8 Bartles Corner Rd. ','Suite 021','Flemington','NJ','USA','e676c76b-b0fe-4ffe-b0d5-5ea1a93ab2dd',replace('<h5>Alta Associates, a part of Diversified Search Group</h5>\n<p>\nWhen Russians hacked into Citibank in 1994, Alta Associates was retained to help build the first-ever information security organization. We have been placing Chief Information Security Officers and the teams that support them ever since. Alta is the go-to specialty search firm for companies that are the targets of sophisticated cyber attacks as well as companies hiring their first-ever CISO or elevating their cybersecurity, IT risk management, governance, compliance, and privacy leadership teams.\nFor over three decades, Alta Associates has helped to define, elevate, and integrate the role of cybersecurity and risk professionals in firms ranging from private equity and venture-backed growth companies to the worlds largest and most complex global and regulated corporations.<br>\n</p>','\n',char(10)),'https://www.facebook.com/DivSearch','https://www.twitter.com/DivSearch','https://www.linkedin.com/company/diversifiedsearchgroup/','');
INSERT INTO vendors VALUES('f5e03c17-e135-4790-bde4-d865621a3400','published','anjuna','Anjuna','www.anjuna.io','Anjuna Security is the leader in data security and privacy. Our breakthrough platform transforms your hybrid-cloud into a high-trust environment where data is always encrypted and code is verified for authenticity. ','380 Portage Avenue',NULL,'Palo Alto','CA','USA','491d3009-7fe7-404e-9d3b-a1f3981f87dc',replace('<h5>Anjuna</h5>\n<p>\nAnjuna Security is the leader in data security and privacy. Our breakthrough platform transforms your hybrid-cloud into a high-trust environment where data is always encrypted and code is verified for authenticity. <br>\n</p>','\n',char(10)),NULL,NULL,NULL,''); INSERT INTO vendors VALUES('f5e03c17-e135-4790-bde4-d865621a3400','published','anjuna','Anjuna','www.anjuna.io','Anjuna Security is the leader in data security and privacy. Our breakthrough platform transforms your hybrid-cloud into a high-trust environment where data is always encrypted and code is verified for authenticity. ','380 Portage Avenue',NULL,'Palo Alto','CA','USA','491d3009-7fe7-404e-9d3b-a1f3981f87dc',replace('<h5>Anjuna</h5>\n<p>\nAnjuna Security is the leader in data security and privacy. Our breakthrough platform transforms your hybrid-cloud into a high-trust environment where data is always encrypted and code is verified for authenticity. <br>\n</p>','\n',char(10)),NULL,NULL,NULL,'');
INSERT INTO vendors VALUES('49c52e04-ccd8-498b-a5b9-4d6db7be2233','published','anitian','Anitian','www.anitian.com','Anitian helps make cloud applications secure and FedRAMP compliant up to 50% faster, at 50% of the cost. Enter federal and defense markets faster while product teams stay focused on adding value to your applications and services. ','8625 SE Cascade Ave ','Suite 500','Beaverton','OR','USA','663b5a53-8cac-49f8-963d-9420fc25d619',replace('<h5>Anitian</h5>\n<p>\nGet FedRAMP audit-ready in half the time for half the cost. Accelerate revenue with Anitian''s advanced, pre-built cloud security and compliance platform for AWS and Azure. Enter new federal markets faster while minimizing cost, resources and risk. <br>\n</p>','\n',char(10)),'https://www.facebook.com/Anitian.Infosec/','https://www.twitter.com/AnitianSecurity','https://www.linkedin.com/company/anitian-enterprise-security',''); INSERT INTO vendors VALUES('49c52e04-ccd8-498b-a5b9-4d6db7be2233','published','anitian','Anitian','www.anitian.com','Anitian helps make cloud applications secure and FedRAMP compliant up to 50% faster, at 50% of the cost. Enter federal and defense markets faster while product teams stay focused on adding value to your applications and services. ','8625 SE Cascade Ave ','Suite 500','Beaverton','OR','USA','663b5a53-8cac-49f8-963d-9420fc25d619',replace('<h5>Anitian</h5>\n<p>\nGet FedRAMP audit-ready in half the time for half the cost. Accelerate revenue with Anitian''s advanced, pre-built cloud security and compliance platform for AWS and Azure. Enter new federal markets faster while minimizing cost, resources and risk. <br>\n</p>','\n',char(10)),'https://www.facebook.com/Anitian.Infosec/','https://www.twitter.com/AnitianSecurity','https://www.linkedin.com/company/anitian-enterprise-security','');
INSERT INTO vendors VALUES('9dce6f07-5ee1-40df-aaa4-9c50fffccff0','published','akeyless','Akeyless','www.akeyless.io','Securely adopt DevOps, Hybrid Multi-cloud Transformation, and Zero-Trust Access initiatives, with Akeyless unified Secrets and Secure Access Management platform','122 Grand St',NULL,'NEW YORK','NY','USA','f63326cd-153f-49f7-a40e-92a1dc3d6704',replace('<h5>Akeyless</h5>\n<p>\nAkeyless is a Secrets Orchestration Platform, protecting and managing credentials, certificates and keys used by machines, applications and DevOps teams, in both hybrid and multi-cloud environments. It offers Secrets Management with extensions that provide Secure Remote Access and Data Protection.\nThe Akeyless SaaS platform is built on top of a unique KMS (Key Management System) patented technology that enables us to provide a true Zero Knowledge solution where even Akeyless cant access the customers secrets and keys. The Akeyless platform is FIPS 140-2 and SOC 2 Type 2 certified.\nTo learn more, or schedule a demo, visit www.akeyless.io<br>\n</p>\n<h5>Why Akeyless?</h5>\n<p>Akeyless is a Secrets Orchestration Platform, protecting and managing credentials, certificates and keys used by machines, applications and DevOps teams, in both hybrid and multi-cloud environments. It offers Secrets Management with extensions that provide Secure Remote Access and Data Protection.\nThe Akeyless SaaS platform is built on top of a unique KMS (Key Management System) patented technology that enables us to provide a true Zero Knowledge solution where even Akeyless cant access the customers secrets and keys. The Akeyless platform is FIPS 140-2 and SOC 2 Type 2 certified.</p>','\n',char(10)),'https://www.facebook.com/Akeylessio/','https://www.twitter.com/akeylessio','https://www.linkedin.com/company/akeyless',''); INSERT INTO vendors VALUES('9dce6f07-5ee1-40df-aaa4-9c50fffccff0','published','akeyless','Akeyless','www.akeyless.io','Securely adopt DevOps, Hybrid Multi-cloud Transformation, and Zero-Trust Access initiatives, with Akeyless unified Secrets and Secure Access Management platform','122 Grand St',NULL,'NEW YORK','NY','USA','f63326cd-153f-49f7-a40e-92a1dc3d6704',replace('<h5>Akeyless</h5>\n<p>\nAkeyless is a Secrets Orchestration Platform, protecting and managing credentials, certificates and keys used by machines, applications and DevOps teams, in both hybrid and multi-cloud environments. It offers Secrets Management with extensions that provide Secure Remote Access and Data Protection.\nThe Akeyless SaaS platform is built on top of a unique KMS (Key Management System) patented technology that enables us to provide a true Zero Knowledge solution where even Akeyless cant access the customers secrets and keys. The Akeyless platform is FIPS 140-2 and SOC 2 Type 2 certified.\nTo learn more, or schedule a demo, visit www.akeyless.io<br>\n</p>\n<h5>Why Akeyless?</h5>\n<p>Akeyless is a Secrets Orchestration Platform, protecting and managing credentials, certificates and keys used by machines, applications and DevOps teams, in both hybrid and multi-cloud environments. It offers Secrets Management with extensions that provide Secure Remote Access and Data Protection.\nThe Akeyless SaaS platform is built on top of a unique KMS (Key Management System) patented technology that enables us to provide a true Zero Knowledge solution where even Akeyless cant access the customers secrets and keys. The Akeyless platform is FIPS 140-2 and SOC 2 Type 2 certified.</p>','\n',char(10)),'https://www.facebook.com/Akeylessio/','https://www.twitter.com/akeylessio','https://www.linkedin.com/company/akeyless','');
@@ -2894,7 +2892,7 @@ INSERT INTO vendors VALUES('2ecc0bcd-1ca8-4032-9b96-22b970d686ba','published','j
INSERT INTO vendors VALUES('c9bb128e-af6e-4b61-acc5-a215e3929f99','published','jfrog','JFrog','www.jfrog.com','JFrog Ltd. and the JFrog Platform enable developers to build, secure, distribute, and connect any source with any production environment. Thousands of customers worldwide, including a majority of the Fortune 100, depend on JFrog to securely manage their software. Learn more at jfrog.com.','270 East Caribbean Drive',NULL,'Sunnyvale','CA','USA','08e5455a-8d2d-40fc-8fe8-0beac5670ddb',replace('<h5>JFrog</h5>\n<p>\nJFrog Ltd. (Nasdaq: FROG), is on a mission to create a world of software delivered without friction from developer to device. Driven by a “Liquid Software” vision, the JFrog Software Supply Chain Platform is a single system of record that powers organizations to build, manage, and distribute software quickly and securely, ensuring it is available, traceable, and tamper-proof. The integrated security features also help identify, protect, and remediate against threats and vulnerabilities. JFrogs platform is available as both self-hosted and SaaS services across major cloud service providers. Millions of users and 7K+ customers worldwide depend on JFrog solutions to securely embrace digital transformation. Once you leap forward, you wont go back! Learn more at jfrog.com and follow us on Twitter: @jfrog.<br>\n</p>\n<h5>Why JFrog?</h5>\n<p>JFrogs universal Software Supply Chain Platform is the database of DevOps that serves as a single system of record for automating and managing software releases at scale. Comprised of JFrog Artifactory, Xray, Advanced Security, Pipelines, and Distribution, it creates, tracks and manages binaries across software development pipelines. JFrog Xray is a software composition analysis (SCA) solution that deeply analyzes open source binaries to detect known security vulnerabilities and also understand their license compliance status. JFrog Advanced Security augments JFrog Xrays SCA capabilities with new in-depth binary security scanning, allowing a new understanding of the security state of your binaries, especially container images. Advanced scanners identify security issues that cant be found via source code analysis alone and include contextual analysis of CVEs, IaC security issues, exposed secrets detection, and the identification of insecure use of OSS libraries and services. </p>','\n',char(10)),'https://www.facebook.com/artifrog','https://www.twitter.com/jfrog','https://www.linkedin.com/company/jfrog-ltd',''); INSERT INTO vendors VALUES('c9bb128e-af6e-4b61-acc5-a215e3929f99','published','jfrog','JFrog','www.jfrog.com','JFrog Ltd. and the JFrog Platform enable developers to build, secure, distribute, and connect any source with any production environment. Thousands of customers worldwide, including a majority of the Fortune 100, depend on JFrog to securely manage their software. Learn more at jfrog.com.','270 East Caribbean Drive',NULL,'Sunnyvale','CA','USA','08e5455a-8d2d-40fc-8fe8-0beac5670ddb',replace('<h5>JFrog</h5>\n<p>\nJFrog Ltd. (Nasdaq: FROG), is on a mission to create a world of software delivered without friction from developer to device. Driven by a “Liquid Software” vision, the JFrog Software Supply Chain Platform is a single system of record that powers organizations to build, manage, and distribute software quickly and securely, ensuring it is available, traceable, and tamper-proof. The integrated security features also help identify, protect, and remediate against threats and vulnerabilities. JFrogs platform is available as both self-hosted and SaaS services across major cloud service providers. Millions of users and 7K+ customers worldwide depend on JFrog solutions to securely embrace digital transformation. Once you leap forward, you wont go back! Learn more at jfrog.com and follow us on Twitter: @jfrog.<br>\n</p>\n<h5>Why JFrog?</h5>\n<p>JFrogs universal Software Supply Chain Platform is the database of DevOps that serves as a single system of record for automating and managing software releases at scale. Comprised of JFrog Artifactory, Xray, Advanced Security, Pipelines, and Distribution, it creates, tracks and manages binaries across software development pipelines. JFrog Xray is a software composition analysis (SCA) solution that deeply analyzes open source binaries to detect known security vulnerabilities and also understand their license compliance status. JFrog Advanced Security augments JFrog Xrays SCA capabilities with new in-depth binary security scanning, allowing a new understanding of the security state of your binaries, especially container images. Advanced scanners identify security issues that cant be found via source code analysis alone and include contextual analysis of CVEs, IaC security issues, exposed secrets detection, and the identification of insecure use of OSS libraries and services. </p>','\n',char(10)),'https://www.facebook.com/artifrog','https://www.twitter.com/jfrog','https://www.linkedin.com/company/jfrog-ltd','');
INSERT INTO vendors VALUES('1aff2f10-648a-40a6-9346-bf01c8bea8f4','published','jupiterone','JupiterOne','www.jupiterone.com?utm_source=event&utm_campaign=rsac2023','JupiterOne gives enterprises full visibility into their attack surface and security posture with continuous asset management. Reduce risk, triage incidents, and prioritize vulnerability findings with greater clarity and 85% fewer SecOps resources.','2701 Aerial Center Parkway ','Suite 120','Morrisville','NC','USA','454223b0-00d7-401f-a3f3-9251b346ac9c',replace('<h5>JupiterOne</h5>\n<p>\nJupiterOne is a cyber asset management and governance solution, providing visibility and security into your entire cyber asset universe. JupiterOne allows enterprises of any size and in any industry to answer the question: are we compliant and secure? JupiterOne helps you know more and fear less.\nJupiterOne reduces security and compliance risks with unparalleled visibility into your entire cyber asset universe. Determine the blast radius for any attack vector and fast-track investigation and response with the ability to query and get results in seconds.<br>\n</p>\n<h5>Why JupiterOne?</h5>\n<p>JupiterOne unifies your fragmented technology stack, giving you visibility and contextual insights into your attack surface.\nJupiterOne ingests assets via API from every tool in your technology stack. It aggregates and normalizes data, giving you a holistic view of your security posture. By mapping the connections between assets, security teams get deeper context and insights, and can uncover their most pressing security issues. Similar tools only look for issues in cloud infrastructure, missing critical information. Others only look at basic information like users and devices and cant provide the same level of context and insights.\nJupiterOne helps enterprise security teams answer critical security questions, uncover threats, close compliance gaps, and prioritize risk. With a connected view of assets, infrastructure, and security information, you can respond faster to incidents, prioritize actions based on business impact, and conduct everyday security operations more efficiently.</p>','\n',char(10)),NULL,'https://www.twitter.com/jupiterone','https://www.linkedin.com/company/jupiterone',''); INSERT INTO vendors VALUES('1aff2f10-648a-40a6-9346-bf01c8bea8f4','published','jupiterone','JupiterOne','www.jupiterone.com?utm_source=event&utm_campaign=rsac2023','JupiterOne gives enterprises full visibility into their attack surface and security posture with continuous asset management. Reduce risk, triage incidents, and prioritize vulnerability findings with greater clarity and 85% fewer SecOps resources.','2701 Aerial Center Parkway ','Suite 120','Morrisville','NC','USA','454223b0-00d7-401f-a3f3-9251b346ac9c',replace('<h5>JupiterOne</h5>\n<p>\nJupiterOne is a cyber asset management and governance solution, providing visibility and security into your entire cyber asset universe. JupiterOne allows enterprises of any size and in any industry to answer the question: are we compliant and secure? JupiterOne helps you know more and fear less.\nJupiterOne reduces security and compliance risks with unparalleled visibility into your entire cyber asset universe. Determine the blast radius for any attack vector and fast-track investigation and response with the ability to query and get results in seconds.<br>\n</p>\n<h5>Why JupiterOne?</h5>\n<p>JupiterOne unifies your fragmented technology stack, giving you visibility and contextual insights into your attack surface.\nJupiterOne ingests assets via API from every tool in your technology stack. It aggregates and normalizes data, giving you a holistic view of your security posture. By mapping the connections between assets, security teams get deeper context and insights, and can uncover their most pressing security issues. Similar tools only look for issues in cloud infrastructure, missing critical information. Others only look at basic information like users and devices and cant provide the same level of context and insights.\nJupiterOne helps enterprise security teams answer critical security questions, uncover threats, close compliance gaps, and prioritize risk. With a connected view of assets, infrastructure, and security information, you can respond faster to incidents, prioritize actions based on business impact, and conduct everyday security operations more efficiently.</p>','\n',char(10)),NULL,'https://www.twitter.com/jupiterone','https://www.linkedin.com/company/jupiterone','');
INSERT INTO vendors VALUES('f19050f3-8406-4c9d-bf11-4d8dd1c88d26','published','jetway-computer-corp','Jetway Computer Corp.','www.jetwaycomputer.com','Jetway, established in 1998, specializing in the development and marketing of industrial motherboards and computer systems in USA. Among our products are embedded motherboards, industrial barebone systems, rackmounts, and panel PC.','8058 Central Ave.',NULL,'Newark','CA','USA','52f6b834-85f1-4d66-b337-bcca27b53d98',replace('<h5>Jetway Computer Corp.</h5>\n<p>\nJetway, established in 1998, specializing in the development and marketing of industrial motherboards and computer systems in USA. Among our products are embedded motherboards, industrial barebone systems, rackmounts, and panel PC.<br>\n</p>','\n',char(10)),'https://www.facebook.com/jetway.usa','https://www.twitter.com/jetwaycomputer','https://www.linkedin.com/company/jetway-usa',''); INSERT INTO vendors VALUES('f19050f3-8406-4c9d-bf11-4d8dd1c88d26','published','jetway-computer-corp','Jetway Computer Corp.','www.jetwaycomputer.com','Jetway, established in 1998, specializing in the development and marketing of industrial motherboards and computer systems in USA. Among our products are embedded motherboards, industrial barebone systems, rackmounts, and panel PC.','8058 Central Ave.',NULL,'Newark','CA','USA','52f6b834-85f1-4d66-b337-bcca27b53d98',replace('<h5>Jetway Computer Corp.</h5>\n<p>\nJetway, established in 1998, specializing in the development and marketing of industrial motherboards and computer systems in USA. Among our products are embedded motherboards, industrial barebone systems, rackmounts, and panel PC.<br>\n</p>','\n',char(10)),'https://www.facebook.com/jetway.usa','https://www.twitter.com/jetwaycomputer','https://www.linkedin.com/company/jetway-usa','');
INSERT INTO vendors VALUES('3a59914e-09b6-40c2-ad14-2e288edf26ad','published','qax-technology-group-inc','QAX Technology Group Inc.','https://en.qianxin.com/','QAX is a leader in cybersecurity industry, providing new generation enterprise-level and national-level cybersecurity solutions. Years of R&D and innovation, QAX has reinforced the strength in big data, AI, and security operation.','QAX Security Center,No.1','26 Xizhimenwai South Road Xicheng District','Beijing',NULL,'CHN','f59f2a10-af16-48bb-b0e2-f67dd7e9c418',replace('<h5>QAX Technology Group Inc.</h5>\n<p>\nQAX is a leader in cybersecurity industry, providing new generation enterprise-level and national-level cybersecurity solutions. Years of R&amp;D and innovation accumulated from cyber offense and defense practice, QAX has reinforced the strength in big data, AI, and security operation. In 2019, QAX also became the official cybersecurity services and anti-virus software sponsor of the Olympic and Paralympic Winter Games Beijing 2022. During years of development, company business has enjoyed high recognition at home and aboard.\nTo dedicate in development of “New Infrastructure Construction” and digitalization, QAX has employed the methodology of system engineering together with the idea of “Built-in security”, in the age of IOE, to build a collective cybersecurity defense system on top of “new generation cybersecurity framework”; to accomplish that, company is using “data-driven security” as technology concept, and “co-operating of human + machine” as method.\n<br>\n</p>','\n',char(10)),NULL,NULL,NULL,''); INSERT INTO vendors VALUES('3a59914e-09b6-40c2-ad14-2e288edf26ad','published','qax-technology-group-inc','QAX Technology Group Inc.','https://en.qianxin.com/','QAX is a leader in cybersecurity industry, providing new generation enterprise-level and national-level cybersecurity solutions. Years of R&D and innovation, QAX has reinforced the strength in big data, AI, and security operation.','QAX Security Center,No.1','26 Xizhimenwai South Road Xicheng District','Beijing',NULL,'CHN','f78d435f-480b-4a5b-9dca-3d24d9b08fb9',replace('<h5>QAX Technology Group Inc.</h5>\n<p>\nQAX is a leader in cybersecurity industry, providing new generation enterprise-level and national-level cybersecurity solutions. Years of R&amp;D and innovation accumulated from cyber offense and defense practice, QAX has reinforced the strength in big data, AI, and security operation. In 2019, QAX also became the official cybersecurity services and anti-virus software sponsor of the Olympic and Paralympic Winter Games Beijing 2022. During years of development, company business has enjoyed high recognition at home and aboard.\nTo dedicate in development of “New Infrastructure Construction” and digitalization, QAX has employed the methodology of system engineering together with the idea of “Built-in security”, in the age of IOE, to build a collective cybersecurity defense system on top of “new generation cybersecurity framework”; to accomplish that, company is using “data-driven security” as technology concept, and “co-operating of human + machine” as method.\n<br>\n</p>','\n',char(10)),NULL,NULL,NULL,'');
INSERT INTO vendors VALUES('3b9eec5d-aa01-4230-8206-d3784a97844d','published','quest-software','Quest Software','https://www.quest.com/solutions/cybersecurity-risk-management-solutions/','Quest solutions work together to protect your hybrid Active Directory environment and manage risk. Quest helps you discover and eliminate potential attack paths, identify risky changes, control group policy chaos, & quickly recover from AD disasters.','4 Polaris Way',NULL,'Aliso Viejo','CA','USA','40fd37d6-0e7e-4e24-8ed2-c9ab88e9ee38',replace('<h5>Quest Software</h5>\n<p>\nQuest solutions work together to protect your hybrid Active Directory environment and manage risk. Quest helps you discover and eliminate potential attack paths, identify risky changes, control group policy chaos, and quickly recover from AD disasters.<br>\n</p>\n<h5>Why Quest Software?</h5>\n<p>Hybrid Active Directory &amp; Microsoft environments are constantly evolving and growing as are the risks &amp; complexities in securing them. Quest Recovery Manager for AD Disaster Recovery Edition can slash AD forest recovery time up to 98% &amp; fuel a quick return to business operations from breaches like ransomware. Attack path management is a vital component of defense in depth for AD &amp; M365 environments. With Quest &amp; SpecterOps BloodHound Enterprise, you can identify IOEs &amp; prioritize the attack paths an attacker could use to own your environment. Youll be able to quickly assess potential risks &amp; establish a plan that eliminates the most vulnerable paths. Quest On Demand Audit Hybrid Suite mitigates risk by allowing you to audit security changes in hybrid AD environments, monitor AD in real-time for active attacks &amp; IOCs, &amp; roll back any unwanted changes. With GPOADmin, you can automate critical Group Policy management &amp; governance tasks to reduce risk &amp; eliminate manual processes.</p>','\n',char(10)),'https://www.facebook.com/questsoftware','https://www.twitter.com/Quest','https://www.linkedin.com/company/quest-software',''); INSERT INTO vendors VALUES('3b9eec5d-aa01-4230-8206-d3784a97844d','published','quest-software','Quest Software','https://www.quest.com/solutions/cybersecurity-risk-management-solutions/','Quest solutions work together to protect your hybrid Active Directory environment and manage risk. Quest helps you discover and eliminate potential attack paths, identify risky changes, control group policy chaos, & quickly recover from AD disasters.','4 Polaris Way',NULL,'Aliso Viejo','CA','USA','40fd37d6-0e7e-4e24-8ed2-c9ab88e9ee38',replace('<h5>Quest Software</h5>\n<p>\nQuest solutions work together to protect your hybrid Active Directory environment and manage risk. Quest helps you discover and eliminate potential attack paths, identify risky changes, control group policy chaos, and quickly recover from AD disasters.<br>\n</p>\n<h5>Why Quest Software?</h5>\n<p>Hybrid Active Directory &amp; Microsoft environments are constantly evolving and growing as are the risks &amp; complexities in securing them. Quest Recovery Manager for AD Disaster Recovery Edition can slash AD forest recovery time up to 98% &amp; fuel a quick return to business operations from breaches like ransomware. Attack path management is a vital component of defense in depth for AD &amp; M365 environments. With Quest &amp; SpecterOps BloodHound Enterprise, you can identify IOEs &amp; prioritize the attack paths an attacker could use to own your environment. Youll be able to quickly assess potential risks &amp; establish a plan that eliminates the most vulnerable paths. Quest On Demand Audit Hybrid Suite mitigates risk by allowing you to audit security changes in hybrid AD environments, monitor AD in real-time for active attacks &amp; IOCs, &amp; roll back any unwanted changes. With GPOADmin, you can automate critical Group Policy management &amp; governance tasks to reduce risk &amp; eliminate manual processes.</p>','\n',char(10)),'https://www.facebook.com/questsoftware','https://www.twitter.com/Quest','https://www.linkedin.com/company/quest-software','');
INSERT INTO vendors VALUES('c8e4317b-4a10-46d4-a126-b310ab50f4c6','published','quintessencelabs','QuintessenceLabs','www.quintessencelabs.com','QuintessenceLabs is a leader in quantum cybersecurity recognized for its quantum-safe data protection capabilities, including the worlds fastest quantum random number generators, crypto-agile key management, and ultra-secure quantum key distribution','175 Bernal Rd. ','Suite 220','San Jose','CA','USA','5fcef6a6-409a-4669-8746-9b6bf0bf5b60',replace('<h5>QuintessenceLabs</h5>\n<p>\nQuintessenceLabs is a global leader in post-quantum cybersecurity. The company offers a suite of crypto-agile solutions and services ranging from qStream, the world''s fastest quantum random number generator to qOptica™ QKD a continuously variable quantum key distribution system which is underpinned by the Trusted Security® (TSF®), the industry''s most secure encryption key and policy management platform. The company is currently working with governments and global enterprise organizations worldwide to build a quantum-resilient future.<br>\n</p>\n<h5>Why QuintessenceLabs?</h5>\n<p>qOptica™ Quantum Key Distribution (QKD) - QuintessenceLabs continuous variable quantum key distribution (CV-QKD) technology is the most secure means of distributing keys, protected by the laws of physics. Our solution integrates a quantum entropy source and distributes keys over existing optic fiber between network nodes offering built-in cost advantages.\nTrusted Security Foundation® | TSF® Enterprise Key and Policy Manager\nThe crypto-agile TSF tackles tough key management challenges by providing highly-capable and fully interoperable centralized key and policy management with outstanding performance, availability, and integrity.\nqStream™ Quantum Random Number Generator (QRNG)\nThe qStream™ QRNG appliance forms the foundational layer of all our security products. It uses patented quantum technology to deliver unpredictable true random numbers at 1Gbit/sec ensuring applications always have sufficient entropy and preventing performance and security issues.</p>','\n',char(10)),NULL,'https://www.twitter.com/QuintessenceLab','https://www.linkedin.com/company/quintessencelabs-pty-ltd',''); INSERT INTO vendors VALUES('c8e4317b-4a10-46d4-a126-b310ab50f4c6','published','quintessencelabs','QuintessenceLabs','www.quintessencelabs.com','QuintessenceLabs is a leader in quantum cybersecurity recognized for its quantum-safe data protection capabilities, including the worlds fastest quantum random number generators, crypto-agile key management, and ultra-secure quantum key distribution','175 Bernal Rd. ','Suite 220','San Jose','CA','USA','5fcef6a6-409a-4669-8746-9b6bf0bf5b60',replace('<h5>QuintessenceLabs</h5>\n<p>\nQuintessenceLabs is a global leader in post-quantum cybersecurity. The company offers a suite of crypto-agile solutions and services ranging from qStream, the world''s fastest quantum random number generator to qOptica™ QKD a continuously variable quantum key distribution system which is underpinned by the Trusted Security® (TSF®), the industry''s most secure encryption key and policy management platform. The company is currently working with governments and global enterprise organizations worldwide to build a quantum-resilient future.<br>\n</p>\n<h5>Why QuintessenceLabs?</h5>\n<p>qOptica™ Quantum Key Distribution (QKD) - QuintessenceLabs continuous variable quantum key distribution (CV-QKD) technology is the most secure means of distributing keys, protected by the laws of physics. Our solution integrates a quantum entropy source and distributes keys over existing optic fiber between network nodes offering built-in cost advantages.\nTrusted Security Foundation® | TSF® Enterprise Key and Policy Manager\nThe crypto-agile TSF tackles tough key management challenges by providing highly-capable and fully interoperable centralized key and policy management with outstanding performance, availability, and integrity.\nqStream™ Quantum Random Number Generator (QRNG)\nThe qStream™ QRNG appliance forms the foundational layer of all our security products. It uses patented quantum technology to deliver unpredictable true random numbers at 1Gbit/sec ensuring applications always have sufficient entropy and preventing performance and security issues.</p>','\n',char(10)),NULL,'https://www.twitter.com/QuintessenceLab','https://www.linkedin.com/company/quintessencelabs-pty-ltd','');
INSERT INTO vendors VALUES('ccb81813-748f-4174-923c-faa280fcd684','published','qohash','Qohash','https://qohash.com','One platform to manage the full sensitive data lifecycle. Qohash makes it faster, easier and more affordable for information security teams to meet data privacy regulations and prevent data breaches.','394 Rue de Sainte-Helene',NULL,'Quebec City','QC','CAN','d978756c-bcf7-40d5-a394-5c8fcca40ebe',replace('<h5>Qohash</h5>\n<p>\nQohash was designed from the CPU up to help information security teams defy legacy data privacy limitations, while giving them back time, money and resources. Manage all sensitive data risk from Qohashs Qostodian platform. Classify and inventory data across every business system 50x faster than alternatives. Slice through false positives with surgically precise, contextualized results that prioritize risk levels. Take action early to prevent insider data breaches with real-time notifications of policy violations. Nailing audits, meeting regulatory requirements and preventing insider threats just got easier, with Qohash.<br>\n</p>\n<h5>Why Qohash?</h5>\n<p>Qohashs QOSTODIAN platform offers the simplest way for information security teams to manage sensitive data risk, while saving time, money and resources. Foundational to sensitive data compliance, information security teams receive a complete inventory of unstructured data at-rest, across every data source, 50x faster than alternatives. As required by regulations, teams quickly and easily regulate access control, fulfill data deletion requests, meet breach notification requirements, and show proof of policy enforcement. QOSTODIAN delivers quantified risk levels by employee and department. Alerts are generated the instant risky behavior occurs, including employee accumulation, deletion or exfiltration of data. Only QOSTODIAN enables reverse search functionality to save valuable remediation time. See the full data lineage of a credit card, bank account number, or other data element, including where data got out of an environment, where it ended up, and every touch point in between.\n</p>','\n',char(10)),NULL,'https://www.twitter.com/Qohash','https://www.linkedin.com/company/qohash/',''); INSERT INTO vendors VALUES('ccb81813-748f-4174-923c-faa280fcd684','published','qohash','Qohash','https://qohash.com','One platform to manage the full sensitive data lifecycle. Qohash makes it faster, easier and more affordable for information security teams to meet data privacy regulations and prevent data breaches.','394 Rue de Sainte-Helene',NULL,'Quebec City','QC','CAN','d978756c-bcf7-40d5-a394-5c8fcca40ebe',replace('<h5>Qohash</h5>\n<p>\nQohash was designed from the CPU up to help information security teams defy legacy data privacy limitations, while giving them back time, money and resources. Manage all sensitive data risk from Qohashs Qostodian platform. Classify and inventory data across every business system 50x faster than alternatives. Slice through false positives with surgically precise, contextualized results that prioritize risk levels. Take action early to prevent insider data breaches with real-time notifications of policy violations. Nailing audits, meeting regulatory requirements and preventing insider threats just got easier, with Qohash.<br>\n</p>\n<h5>Why Qohash?</h5>\n<p>Qohashs QOSTODIAN platform offers the simplest way for information security teams to manage sensitive data risk, while saving time, money and resources. Foundational to sensitive data compliance, information security teams receive a complete inventory of unstructured data at-rest, across every data source, 50x faster than alternatives. As required by regulations, teams quickly and easily regulate access control, fulfill data deletion requests, meet breach notification requirements, and show proof of policy enforcement. QOSTODIAN delivers quantified risk levels by employee and department. Alerts are generated the instant risky behavior occurs, including employee accumulation, deletion or exfiltration of data. Only QOSTODIAN enables reverse search functionality to save valuable remediation time. See the full data lineage of a credit card, bank account number, or other data element, including where data got out of an environment, where it ended up, and every touch point in between.\n</p>','\n',char(10)),NULL,'https://www.twitter.com/Qohash','https://www.linkedin.com/company/qohash/','');
@@ -2939,7 +2937,7 @@ INSERT INTO vendors VALUES('abfd3f46-3959-471a-8a0b-b1d52cb805d6','published','h
INSERT INTO vendors VALUES('51bf7a38-4be1-4bd8-ab47-93aa1a52bafc','published','mondoo','Mondoo','www.mondoo.com','Mondoo is an open and extensible security platform that creates a full asset inventory and prioritizes critical issues to address pressing security challenges. Avoid ransomware attacks, failed audits, and understand your risk profile with Mondoo.','602 Preston Village Way',NULL,'Cary','NC','USA','ad13dabd-32dc-403b-b173-9271556bf68b',replace('<h5>Mondoo</h5>\n<p>\nMondoo is a powerful security, compliance, and asset inventory tool that helps businesses identify vulnerabilities, track lost assets, and ensure policy compliance across their entire infrastructure. Our extensible security posture management (xSPM) platform is built on open-source components like cnquery and cnspec, giving customers complete transparency and control over how their data is processed. With Mondoo, you can easily integrate security into your developer workflows and protect your organization''s assets while minimizing the risk of security incidents.<br>\n</p>\n<h5>Why Mondoo?</h5>\n<p>Mondoo is the ultimate cybersecurity platform that solves critical problems faced by CISOs. It provides unique security automation and seamless integration into the development process, which makes it an innovative and unparalleled product.\nMondoo offers limitless support for any system in your infrastructure, from traditional categories like cloud security, Kubernetes, and containers, to SaaS services, repos, on-premise systems, and embedded devices. Mondoo''s lightweight policy engine makes it fully customizable to fit your unique needs.\nMondoo''s Security Co-pilot reduces false-positives and noise, making it an effective tool for threat and behavior analysis. It also helps establish security baselines, demonstrate progress against goals, and respond effectively in case of emergency.\nMondoo is perfect for both security and development teams, as it uses a common language and toolset to break down silos and improve communication. This leads to better security outcomes.</p>','\n',char(10)),NULL,'https://www.twitter.com/mondoohq','https://www.linkedin.com/company/mondoo/',''); INSERT INTO vendors VALUES('51bf7a38-4be1-4bd8-ab47-93aa1a52bafc','published','mondoo','Mondoo','www.mondoo.com','Mondoo is an open and extensible security platform that creates a full asset inventory and prioritizes critical issues to address pressing security challenges. Avoid ransomware attacks, failed audits, and understand your risk profile with Mondoo.','602 Preston Village Way',NULL,'Cary','NC','USA','ad13dabd-32dc-403b-b173-9271556bf68b',replace('<h5>Mondoo</h5>\n<p>\nMondoo is a powerful security, compliance, and asset inventory tool that helps businesses identify vulnerabilities, track lost assets, and ensure policy compliance across their entire infrastructure. Our extensible security posture management (xSPM) platform is built on open-source components like cnquery and cnspec, giving customers complete transparency and control over how their data is processed. With Mondoo, you can easily integrate security into your developer workflows and protect your organization''s assets while minimizing the risk of security incidents.<br>\n</p>\n<h5>Why Mondoo?</h5>\n<p>Mondoo is the ultimate cybersecurity platform that solves critical problems faced by CISOs. It provides unique security automation and seamless integration into the development process, which makes it an innovative and unparalleled product.\nMondoo offers limitless support for any system in your infrastructure, from traditional categories like cloud security, Kubernetes, and containers, to SaaS services, repos, on-premise systems, and embedded devices. Mondoo''s lightweight policy engine makes it fully customizable to fit your unique needs.\nMondoo''s Security Co-pilot reduces false-positives and noise, making it an effective tool for threat and behavior analysis. It also helps establish security baselines, demonstrate progress against goals, and respond effectively in case of emergency.\nMondoo is perfect for both security and development teams, as it uses a common language and toolset to break down silos and improve communication. This leads to better security outcomes.</p>','\n',char(10)),NULL,'https://www.twitter.com/mondoohq','https://www.linkedin.com/company/mondoo/','');
INSERT INTO vendors VALUES('4d38d28b-5c5f-4d7d-8ba2-bf2b73eae101','published','zenity','Zenity','www.zenity.io','The only security governance platform for no-code/low-code development. Zenity enables enterprises to promote no-code/low-code and citizen development securely- discover shadow app development, detect risks, and enforce security policies.','10 Dubnov street',NULL,'Tel-Aviv',NULL,'ISR','3ca6bc65-f2c3-4994-9c3f-90dcf7de1d82',replace('<h5>Zenity</h5>\n<p>\nZenity is the first and only security governance platform for No-Code/Low-Code applications, automations and integrations.\nNo-Code/Low-Code platforms are sweeping the world, allowing pro and citizen developers to create what they need, when they need it and on their own, but without any security governance and tooling.\nZenity empowers IT and Security professionals to gain complete visibility and control [3][4] over their No-Code/Low-Code estate, enabling them to unblock No-Code/Low-Code development and:\n(1) Gain visibility and discover No-Code/Low-Code shadow app development with a cross-platform inventory\n(2) Get continuous risk assessment to pinpoint vulnerabilities and insecure components\n(3) Mitigate risk with automated remediation actions\n(4) Govern the No-Code/Low-Code lifecycle and enforce security policies with playbooks.<br>\n</p>\n<h5>Why Zenity?</h5>\n<p>Zenity is used by application security professionals who are looking to secure business application development that is taking place with low-code/no-code tools, especially such that takes place in their big SaaS platforms like Microsoft, Salesforce, and ServiceNow.\nZenity''s platform offering is focused on 3 main pillars: (1) Visibility, (2) Risk Assessment, (3) Governance.\n(1) Visibility- Generating a continuous cross-platform inventory of all No-Code/Low-Code apps, automations, connectors, data objects, identities, including their business criticality their relationships and change timeline.\n(2) Risk Assessment- Performing continuous risk assessment to pinpoint vulnerabilities and insecure components in the implemented business logics (such as app impersonation, supply-chain, data exfiltration and other scenarios).\n(3) Governance- Applying security and compliance standards with customized policies, remediation actions and enforcement playbooks.</p>','\n',char(10)),NULL,'https://www.twitter.com/zenitysec','https://www.linkedin.com/company/zenitysec',''); INSERT INTO vendors VALUES('4d38d28b-5c5f-4d7d-8ba2-bf2b73eae101','published','zenity','Zenity','www.zenity.io','The only security governance platform for no-code/low-code development. Zenity enables enterprises to promote no-code/low-code and citizen development securely- discover shadow app development, detect risks, and enforce security policies.','10 Dubnov street',NULL,'Tel-Aviv',NULL,'ISR','3ca6bc65-f2c3-4994-9c3f-90dcf7de1d82',replace('<h5>Zenity</h5>\n<p>\nZenity is the first and only security governance platform for No-Code/Low-Code applications, automations and integrations.\nNo-Code/Low-Code platforms are sweeping the world, allowing pro and citizen developers to create what they need, when they need it and on their own, but without any security governance and tooling.\nZenity empowers IT and Security professionals to gain complete visibility and control [3][4] over their No-Code/Low-Code estate, enabling them to unblock No-Code/Low-Code development and:\n(1) Gain visibility and discover No-Code/Low-Code shadow app development with a cross-platform inventory\n(2) Get continuous risk assessment to pinpoint vulnerabilities and insecure components\n(3) Mitigate risk with automated remediation actions\n(4) Govern the No-Code/Low-Code lifecycle and enforce security policies with playbooks.<br>\n</p>\n<h5>Why Zenity?</h5>\n<p>Zenity is used by application security professionals who are looking to secure business application development that is taking place with low-code/no-code tools, especially such that takes place in their big SaaS platforms like Microsoft, Salesforce, and ServiceNow.\nZenity''s platform offering is focused on 3 main pillars: (1) Visibility, (2) Risk Assessment, (3) Governance.\n(1) Visibility- Generating a continuous cross-platform inventory of all No-Code/Low-Code apps, automations, connectors, data objects, identities, including their business criticality their relationships and change timeline.\n(2) Risk Assessment- Performing continuous risk assessment to pinpoint vulnerabilities and insecure components in the implemented business logics (such as app impersonation, supply-chain, data exfiltration and other scenarios).\n(3) Governance- Applying security and compliance standards with customized policies, remediation actions and enforcement playbooks.</p>','\n',char(10)),NULL,'https://www.twitter.com/zenitysec','https://www.linkedin.com/company/zenitysec','');
INSERT INTO vendors VALUES('94244add-1cc4-40dd-8cf0-ba430660319f','published','huntress','Huntress','www.huntress.com','We protect small and mid-sized businesses from cyber threats. Founded by NSA veterans and backed by a team of 24/7 threat hunters—our managed security platform defends against persistent footholds, ransomware and other attacks. Visit huntress.com.','6021 University Ave. ','Suite 450','Ellicott City','MD','USA','6343016b-73f5-41e6-909c-27689b9250c2',replace('<h5>Huntress</h5>\n<p>\nHackers are constantly evolving, exploiting new vulnerabilities and dwelling in IT environments—until they meet Huntress.\nHuntress protects small and mid-market businesses from modern cyberattackers. Founded by former NSA Cyber Operators—and backed by a team of 24/7 threat hunters—our managed security platform defends businesses from persistent footholds, ransomware and other attacks.\nWere on a mission to secure the 99%. Learn more at www.huntress.com and follow us on social @HuntressLabs.<br>\n</p>\n<h5>Why Huntress?</h5>\n<p>What is Huntress?\nBuilt by offensive security experts, The Huntress Managed Security Platform enables you to find and eliminate threats that lead to breaches, ransomware, and more. We deliver a powerful suite of endpoint detection and response, antivirus, and security awareness training — backed by a team of 24/7 threat hunters—to protect your business from cybercriminals.\nThreatOps fills a critical gap in your security stack, supplying you with a team of cybersecurity professionals. ThreatOps provides 24/7 support and a degree of analysis and expertise software-only solutions cant match.\nManaged Endpoint Detection and Response provides unparalleled visibility and detection of threats within an organization. Managed EDR makes evicting hackers easy with assisted remediation.\nHuntress Security Awareness Training (SAT) delivers a powerful—and fun—combination of episodes, assessments, simulations, and reports to help employees become more cybersavvy in the fight against bad actors.</p>','\n',char(10)),'https://www.facebook.com/huntresslabs','https://www.twitter.com/huntresslabs','https://www.linkedin.com/company/huntress-labs/',''); INSERT INTO vendors VALUES('94244add-1cc4-40dd-8cf0-ba430660319f','published','huntress','Huntress','www.huntress.com','We protect small and mid-sized businesses from cyber threats. Founded by NSA veterans and backed by a team of 24/7 threat hunters—our managed security platform defends against persistent footholds, ransomware and other attacks. Visit huntress.com.','6021 University Ave. ','Suite 450','Ellicott City','MD','USA','6343016b-73f5-41e6-909c-27689b9250c2',replace('<h5>Huntress</h5>\n<p>\nHackers are constantly evolving, exploiting new vulnerabilities and dwelling in IT environments—until they meet Huntress.\nHuntress protects small and mid-market businesses from modern cyberattackers. Founded by former NSA Cyber Operators—and backed by a team of 24/7 threat hunters—our managed security platform defends businesses from persistent footholds, ransomware and other attacks.\nWere on a mission to secure the 99%. Learn more at www.huntress.com and follow us on social @HuntressLabs.<br>\n</p>\n<h5>Why Huntress?</h5>\n<p>What is Huntress?\nBuilt by offensive security experts, The Huntress Managed Security Platform enables you to find and eliminate threats that lead to breaches, ransomware, and more. We deliver a powerful suite of endpoint detection and response, antivirus, and security awareness training — backed by a team of 24/7 threat hunters—to protect your business from cybercriminals.\nThreatOps fills a critical gap in your security stack, supplying you with a team of cybersecurity professionals. ThreatOps provides 24/7 support and a degree of analysis and expertise software-only solutions cant match.\nManaged Endpoint Detection and Response provides unparalleled visibility and detection of threats within an organization. Managed EDR makes evicting hackers easy with assisted remediation.\nHuntress Security Awareness Training (SAT) delivers a powerful—and fun—combination of episodes, assessments, simulations, and reports to help employees become more cybersavvy in the fight against bad actors.</p>','\n',char(10)),'https://www.facebook.com/huntresslabs','https://www.twitter.com/huntresslabs','https://www.linkedin.com/company/huntress-labs/','');
INSERT INTO vendors VALUES('83d9f5c1-e7ba-4cd8-baf2-035212e41bf7','published','picus','PICUS','https://www.picussecurity.com/',replace('Picus Security makes it easy for security teams to validate cyber resilience 24/7. As the pioneer of Breach & Attack Simulation, our Complete Security Validation Platform identifies security gaps and optimizes controls & processes to mitigate them.\n\n\n','\n',char(10)),'160 Spear Street','#1000','San Francisco','CA','USA','29218fc5-be3c-4d97-9fd5-348d6bb3827f',replace('<h5>PICUS</h5>\n<p>\nAt Picus Security, our priority is making it easy for security teams to continuously validate and enhance organizations cyber resilience.\nOur Complete Security Validation Platform simulates real-world threats to automatically measure the effectiveness of security controls, identify high-risk attack paths to critical assets, and optimize threat prevention and detection capabilities.\nAs the pioneer of Breach and Attack Simulation, our people and technology empower customers worldwide to be threat-centric and proactive.\nPicus has been named a Cool Vendor by Gartner and is cited by Frost &amp; Sullivan as one of the most innovative players in the BAS market.<br>\n</p>\n<h5>Why PICUS?</h5>\n<p>At Picus Security, we prioritize making it easy for organizations to validate and enhance their resilience against cyber attacks. By leveraging our technology, security teams can quantify risk, enhance threat readiness, and use automation to increase impact. Trusted by Mastercard and other industry leaders, our Complete Security Validation Platform simulates real-world threats to discover at-risk assets, measure security control effectiveness, manage attack paths, and optimize prevention and detection capabilities.\nAs the pioneer of Breach and Attack Simulation, Picus believes that every organization should perform security validation continuously. Unlike other BAS products, The Picus Platform is quick to deploy and manage. A rich, constantly updated threat library ensures organizations can test their defenses against current and emerging threats. Plus, due to the platforms actionable insights and vendor-specific recommendations, they can address exposures more swiftly than ever.\n</p>','\n',char(10)),NULL,'https://www.twitter.com/PicusSecurity','https://www.linkedin.com/company/picus-security',''); INSERT INTO vendors VALUES('83d9f5c1-e7ba-4cd8-baf2-035212e41bf7','published','picus','PICUS','https://www.picussecurity.com/',replace('Picus Security makes it easy for security teams to validate cyber resilience 24/7. As the pioneer of Breach & Attack Simulation, our Complete Security Validation Platform identifies security gaps and optimizes controls & processes to mitigate them.\n\n\n','\n',char(10)),'160 Spear Street','#1000','San Francisco','CA','USA','5bef8ad8-a4e9-4ede-916b-7e23569d161c',replace('<h5>PICUS</h5>\n<p>\nAt Picus Security, our priority is making it easy for security teams to continuously validate and enhance organizations cyber resilience.\nOur Complete Security Validation Platform simulates real-world threats to automatically measure the effectiveness of security controls, identify high-risk attack paths to critical assets, and optimize threat prevention and detection capabilities.\nAs the pioneer of Breach and Attack Simulation, our people and technology empower customers worldwide to be threat-centric and proactive.\nPicus has been named a Cool Vendor by Gartner and is cited by Frost &amp; Sullivan as one of the most innovative players in the BAS market.<br>\n</p>\n<h5>Why PICUS?</h5>\n<p>At Picus Security, we prioritize making it easy for organizations to validate and enhance their resilience against cyber attacks. By leveraging our technology, security teams can quantify risk, enhance threat readiness, and use automation to increase impact. Trusted by Mastercard and other industry leaders, our Complete Security Validation Platform simulates real-world threats to discover at-risk assets, measure security control effectiveness, manage attack paths, and optimize prevention and detection capabilities.\nAs the pioneer of Breach and Attack Simulation, Picus believes that every organization should perform security validation continuously. Unlike other BAS products, The Picus Platform is quick to deploy and manage. A rich, constantly updated threat library ensures organizations can test their defenses against current and emerging threats. Plus, due to the platforms actionable insights and vendor-specific recommendations, they can address exposures more swiftly than ever.\n</p>','\n',char(10)),NULL,'https://www.twitter.com/PicusSecurity','https://www.linkedin.com/company/picus-security','');
INSERT INTO vendors VALUES('53dedb31-656f-4c5f-bf30-5da075fc0714','published','hillstone-networks','Hillstone Networks','www.hillstonenet.com','Hillstone Networks'' innovative and accessible cybersecurity solutions enable an enterprises cyber resilience by providing visibility, intelligence and protection to see, understand, and act against cyberthreats.','5201 Great America Parkway ','#420','Santa Clara','CA','USA','284e63ba-a07d-445e-87b2-87e26a7253ee',replace('<h5>Hillstone Networks</h5>\n<p>\nHillstone Networks Integrative Cyber Security approach delivers coverage, control, and consolidation to secure digital transformation for more than 26,000 enterprises worldwide. Hillstone Networks is a trusted leader in cyber security, protecting enterprise critical assets and infrastructure, from edge to cloud, regardless of where the workload resides. Recognized as a Visionary in Gartners Magic Quadrant for Network firewalls, Hillstone Networks entire suite of cyber security solutions is relied upon in many of the worlds most challenging technology environments. <br>\n</p>\n<h5>Why Hillstone Networks?</h5>\n<p>An integrative cyber security strategy refers to a holistic approach to cyber security that integrates multiple solutions and technologies into a single, cohesive system, delivered on a centralized platform, with a comprehensive cyber security solution portfolio. The purpose of this strategy is to help CISOs improve their organizations cyber resilience and ensure business continuity despite the challenges they confront.\nHillstone''s Integrative Cyber Security eliminates gaps in protection that put your enterprise at risk and reduces layers of complexity and cost - from technology to solutions, to their delivery and functionality, across vendors and platforms, Hillstones Integrative Cyber Security solutions bring Coverage, Control and Consolidation to secure the digital transformation at global scale.\n</p>','\n',char(10)),'https://www.facebook.com/Hillstone-Networks-230976560386832/','https://www.twitter.com/hillstone_net','https://www.linkedin.com/company/hillstonenet',''); INSERT INTO vendors VALUES('53dedb31-656f-4c5f-bf30-5da075fc0714','published','hillstone-networks','Hillstone Networks','www.hillstonenet.com','Hillstone Networks'' innovative and accessible cybersecurity solutions enable an enterprises cyber resilience by providing visibility, intelligence and protection to see, understand, and act against cyberthreats.','5201 Great America Parkway ','#420','Santa Clara','CA','USA','284e63ba-a07d-445e-87b2-87e26a7253ee',replace('<h5>Hillstone Networks</h5>\n<p>\nHillstone Networks Integrative Cyber Security approach delivers coverage, control, and consolidation to secure digital transformation for more than 26,000 enterprises worldwide. Hillstone Networks is a trusted leader in cyber security, protecting enterprise critical assets and infrastructure, from edge to cloud, regardless of where the workload resides. Recognized as a Visionary in Gartners Magic Quadrant for Network firewalls, Hillstone Networks entire suite of cyber security solutions is relied upon in many of the worlds most challenging technology environments. <br>\n</p>\n<h5>Why Hillstone Networks?</h5>\n<p>An integrative cyber security strategy refers to a holistic approach to cyber security that integrates multiple solutions and technologies into a single, cohesive system, delivered on a centralized platform, with a comprehensive cyber security solution portfolio. The purpose of this strategy is to help CISOs improve their organizations cyber resilience and ensure business continuity despite the challenges they confront.\nHillstone''s Integrative Cyber Security eliminates gaps in protection that put your enterprise at risk and reduces layers of complexity and cost - from technology to solutions, to their delivery and functionality, across vendors and platforms, Hillstones Integrative Cyber Security solutions bring Coverage, Control and Consolidation to secure the digital transformation at global scale.\n</p>','\n',char(10)),'https://www.facebook.com/Hillstone-Networks-230976560386832/','https://www.twitter.com/hillstone_net','https://www.linkedin.com/company/hillstonenet','');
INSERT INTO vendors VALUES('5955be5d-cfce-420d-be5a-6e0f466a0e69','published','haproxy-technologies','HAProxy Technologies','www.haproxy.com',replace('HAProxy Technologies is the company behind HAProxy, the worlds fastest and\nmost widely used software load balancer. Deploy HAProxy products to deliver websites and applications with the utmost performance, observability, and security at any scale.','\n',char(10)),'375 Totten Pond Road','Suite 302','Waltham','MA','USA','01145770-b5c0-4491-b5dc-c6bad2e2eb3b',replace('<h5>HAProxy Technologies</h5>\n<p>\nHAProxy Technologies is the company behind HAProxy, the worlds fastest and most widely-used software load balancer. Organizations deploy HAProxy products to deliver websites and applications with the utmost performance, observability, and security at any scale and in any environment. HAProxy solutions include load balancing, web application and API protection (WAAP), web application firewall (WAF), API gateway, application acceleration, and high availability. Community products include HAProxy load balancer, HAProxy Kubernetes Ingress Controller, and Data Plane API. Enterprise versions add an enterprise suite of advanced security and administration features, third-party integrations, and enterprise support. HAProxy ALOHA hardware or virtual load balancer also provides line-rate DDoS protection. HAProxy Fusion Control Plane adds centralized WAF configuration, Global Profiling Engine, and bot blocking to HAProxy Enterprise. HAProxy Edge is a secure ADN/CDN with a global footprint.<br>\n</p>\n<h5>Why HAProxy Technologies?</h5>\n<p>HAProxy Technologies provides a secure application delivery platform that enables organizations of any size to ensure the high availability, security, and performance of applications in any environment.\nOur customers use HAProxy to keep their website or application online even when disasters or DDoS attacks strike; scale up efficiently and reliably when their traffic and business grow; optimize application performance and improve user experience.\nHAProxy offers market-leading performance and multi-layer security, so you can scale up while protecting against a full spectrum of security threats. Advanced WAF &amp; WAAP capabilities protect against DDoS, bots, OWASP Top 10, and more. Our products support modern architectures (including API gateways and microservices) and deployment environments (cloud, virtual, containers, and appliances).\nHAProxy solutions enable reliable application security at scale with authoritative support, which reduces risk, improves compliance, and powers growth.</p>','\n',char(10)),'https://www.facebook.com/haproxy.technologies','https://www.twitter.com/HAProxy','https://www.linkedin.com/company/haproxy-technologies/',''); INSERT INTO vendors VALUES('5955be5d-cfce-420d-be5a-6e0f466a0e69','published','haproxy-technologies','HAProxy Technologies','www.haproxy.com',replace('HAProxy Technologies is the company behind HAProxy, the worlds fastest and\nmost widely used software load balancer. Deploy HAProxy products to deliver websites and applications with the utmost performance, observability, and security at any scale.','\n',char(10)),'375 Totten Pond Road','Suite 302','Waltham','MA','USA','01145770-b5c0-4491-b5dc-c6bad2e2eb3b',replace('<h5>HAProxy Technologies</h5>\n<p>\nHAProxy Technologies is the company behind HAProxy, the worlds fastest and most widely-used software load balancer. Organizations deploy HAProxy products to deliver websites and applications with the utmost performance, observability, and security at any scale and in any environment. HAProxy solutions include load balancing, web application and API protection (WAAP), web application firewall (WAF), API gateway, application acceleration, and high availability. Community products include HAProxy load balancer, HAProxy Kubernetes Ingress Controller, and Data Plane API. Enterprise versions add an enterprise suite of advanced security and administration features, third-party integrations, and enterprise support. HAProxy ALOHA hardware or virtual load balancer also provides line-rate DDoS protection. HAProxy Fusion Control Plane adds centralized WAF configuration, Global Profiling Engine, and bot blocking to HAProxy Enterprise. HAProxy Edge is a secure ADN/CDN with a global footprint.<br>\n</p>\n<h5>Why HAProxy Technologies?</h5>\n<p>HAProxy Technologies provides a secure application delivery platform that enables organizations of any size to ensure the high availability, security, and performance of applications in any environment.\nOur customers use HAProxy to keep their website or application online even when disasters or DDoS attacks strike; scale up efficiently and reliably when their traffic and business grow; optimize application performance and improve user experience.\nHAProxy offers market-leading performance and multi-layer security, so you can scale up while protecting against a full spectrum of security threats. Advanced WAF &amp; WAAP capabilities protect against DDoS, bots, OWASP Top 10, and more. Our products support modern architectures (including API gateways and microservices) and deployment environments (cloud, virtual, containers, and appliances).\nHAProxy solutions enable reliable application security at scale with authoritative support, which reduces risk, improves compliance, and powers growth.</p>','\n',char(10)),'https://www.facebook.com/haproxy.technologies','https://www.twitter.com/HAProxy','https://www.linkedin.com/company/haproxy-technologies/','');
INSERT INTO vendors VALUES('9a2b18a2-32bc-4627-8799-578d2f1777a9','published','passbolt','Passbolt','https://www.passbolt.com',replace('Passbolt is a security-first, open source password manager for businesses.\n','\n',char(10)),'9 Avenue du Blues',NULL,'Belvaux',NULL,'LUX','79860139-36d6-414c-b892-d2426bc04f26',replace('<h5>Passbolt</h5>\n<p>\nPassbolt is a security-first, open source password manager for businesses.\n<br>\n</p>','\n',char(10)),NULL,NULL,NULL,''); INSERT INTO vendors VALUES('9a2b18a2-32bc-4627-8799-578d2f1777a9','published','passbolt','Passbolt','https://www.passbolt.com',replace('Passbolt is a security-first, open source password manager for businesses.\n','\n',char(10)),'9 Avenue du Blues',NULL,'Belvaux',NULL,'LUX','79860139-36d6-414c-b892-d2426bc04f26',replace('<h5>Passbolt</h5>\n<p>\nPassbolt is a security-first, open source password manager for businesses.\n<br>\n</p>','\n',char(10)),NULL,NULL,NULL,'');
@@ -2980,9 +2978,9 @@ INSERT INTO vendors VALUES('a53d9de4-3c54-4229-b57e-b3ae44de44ae','published','l
INSERT INTO vendors VALUES('507d72ec-bfd5-4964-b9f0-dd6ccec72e04','published','salt-security','Salt Security','https://salt.security','Salt Security protects the APIs that form the core of every modern application. Our patented API Platform is the only API security solution that combines the power of cloud-scale big data and time-tested ML/AI to detect and prevent API attacks. ','3921 Fabian Way ',NULL,'Palo Alto','CA','USA','ee56c873-d7dc-4db5-aabb-112917b2aa01',replace('<h5>Salt Security</h5>\n<p>\nSalt Security protects the APIs that form the core of every modern application. Our patented API Platform is the only API security solution that combines the power of cloud-scale big data and time-tested ML/AI to detect and prevent API attacks. <br>\n</p>','\n',char(10)),'https://www.facebook.com/SaltAPIProtectionInc/','https://www.twitter.com/SaltSecurity','https://www.linkedin.com/company/saltsecurity/mycompany/',''); INSERT INTO vendors VALUES('507d72ec-bfd5-4964-b9f0-dd6ccec72e04','published','salt-security','Salt Security','https://salt.security','Salt Security protects the APIs that form the core of every modern application. Our patented API Platform is the only API security solution that combines the power of cloud-scale big data and time-tested ML/AI to detect and prevent API attacks. ','3921 Fabian Way ',NULL,'Palo Alto','CA','USA','ee56c873-d7dc-4db5-aabb-112917b2aa01',replace('<h5>Salt Security</h5>\n<p>\nSalt Security protects the APIs that form the core of every modern application. Our patented API Platform is the only API security solution that combines the power of cloud-scale big data and time-tested ML/AI to detect and prevent API attacks. <br>\n</p>','\n',char(10)),'https://www.facebook.com/SaltAPIProtectionInc/','https://www.twitter.com/SaltSecurity','https://www.linkedin.com/company/saltsecurity/mycompany/','');
INSERT INTO vendors VALUES('54fd90a2-8b77-43ac-96b8-a528dc759a0d','published','sumo-logic','Sumo Logic','www.sumologic.com','Sumo Logic empowers the people who power modern, digital business through its Continuous Intelligence Platform™ to help practitioners and developers deliver reliable and secure cloud-native applications. For more information, visit www.sumologic.com.','305 Main Street','3rd floor','Redwood City','CA','USA','bc307103-da4c-429a-ae75-37e8ee97f801',replace('<h5>Sumo Logic</h5>\n<p>\nNearly every enterprise undergoing digital transformation is building cloud-native applications to deliver new, digital experiences. The Sumo Logic Continuous Intelligence Platform™ provides real-time analytics and insights to help practitioners and developers ensure application reliability, secure and protect against modern threats, and gain insights into their cloud infrastructures. By delivering a SaaS analytics platform for cloud-native application observability and security solutions, Sumo Logic is empowering the people who power modern, digital business so they, in turn, can deliver reliable and secure digital experiences. Visit www.sumologic.com.<br>\n</p>\n<h5>Why Sumo Logic?</h5>\n<p>Facing increasing complexity, a lack of threat visibility, a lack of experienced staff, and high costs—security teams are overwhelmed. Sumo Logics Cloud Security Analytics solution provides scalable log collection, real-time threat detection, along with compliance reporting and dashboards. Our cloud-native SaaS platform enables SecOps and DevOps teams to use built-in detection, integrated threat intelligence, correlation, and deep search-based investigation to ensure a strong enterprise security posture.\nFor organizations struggling with alert fatigue, our Cloud SIEM automatically uncovers indicators of early stage threats arising from expanded attack surfaces and insider threats and generates actionable insights security analysts can quickly investigate.\nSumo Logic Cloud SOAR boosts collaboration for SOC teams, using orchestration capabilities to automate a wide array of time-consuming tasks while increasing efficiencies during each phase of the incident response process.\n</p>','\n',char(10)),'https://www.facebook.com/Sumo.Logic','https://www.twitter.com/sumologic','https://www.linkedin.com/company/sumo-logic',''); INSERT INTO vendors VALUES('54fd90a2-8b77-43ac-96b8-a528dc759a0d','published','sumo-logic','Sumo Logic','www.sumologic.com','Sumo Logic empowers the people who power modern, digital business through its Continuous Intelligence Platform™ to help practitioners and developers deliver reliable and secure cloud-native applications. For more information, visit www.sumologic.com.','305 Main Street','3rd floor','Redwood City','CA','USA','bc307103-da4c-429a-ae75-37e8ee97f801',replace('<h5>Sumo Logic</h5>\n<p>\nNearly every enterprise undergoing digital transformation is building cloud-native applications to deliver new, digital experiences. The Sumo Logic Continuous Intelligence Platform™ provides real-time analytics and insights to help practitioners and developers ensure application reliability, secure and protect against modern threats, and gain insights into their cloud infrastructures. By delivering a SaaS analytics platform for cloud-native application observability and security solutions, Sumo Logic is empowering the people who power modern, digital business so they, in turn, can deliver reliable and secure digital experiences. Visit www.sumologic.com.<br>\n</p>\n<h5>Why Sumo Logic?</h5>\n<p>Facing increasing complexity, a lack of threat visibility, a lack of experienced staff, and high costs—security teams are overwhelmed. Sumo Logics Cloud Security Analytics solution provides scalable log collection, real-time threat detection, along with compliance reporting and dashboards. Our cloud-native SaaS platform enables SecOps and DevOps teams to use built-in detection, integrated threat intelligence, correlation, and deep search-based investigation to ensure a strong enterprise security posture.\nFor organizations struggling with alert fatigue, our Cloud SIEM automatically uncovers indicators of early stage threats arising from expanded attack surfaces and insider threats and generates actionable insights security analysts can quickly investigate.\nSumo Logic Cloud SOAR boosts collaboration for SOC teams, using orchestration capabilities to automate a wide array of time-consuming tasks while increasing efficiencies during each phase of the incident response process.\n</p>','\n',char(10)),'https://www.facebook.com/Sumo.Logic','https://www.twitter.com/sumologic','https://www.linkedin.com/company/sumo-logic','');
INSERT INTO vendors VALUES('a93d7f1d-3e99-40fd-afa7-14d9f7614806','published','lumen','Lumen','www.lumen.com','Lumen is dedicated to furthering human progress through technology, providing the fastest, most secure platform for applications and data to help businesses, government and communities deliver amazing experiences around the world.','1025 El Dorado Blvd.',NULL,'Broomfield','CO','USA','0641b198-0e5c-431a-ba08-3d29afc14818',replace('<h5>Lumen</h5>\n<p>\nLumen is an American multinational technology company headquartered in Monroe, Louisiana dedicated to furthering human progress through technology, providing the fastest, most secure platform for applications and data to help businesses, government and communities adopt emerging technologies and deliver amazing experiences around the world.\nLumen is guided by the belief that humanity is at its best when technology advances the ways we live and work. The company leverages a vast collection of talent, experience, assets, and capabilities to address the dynamic data and application needs of the 4th Industrial Revolution.<br>\n</p>\n<h5>Why Lumen?</h5>\n<p>Communications: Contact Center &amp; UCC, 911 Services, VoIP\nEdge Computing\nHybrid IT &amp; Cloud: Data Analytics, Data Centers, Cloud Application Manager, Backup Storage\nManaged &amp; IT Services\nNetworking\nSecurity: Black Lotus Labs, Cybersecurity, Analytics and Threat Management, DDoS, Edge Protect</p>','\n',char(10)),'https://www.facebook.com/LumenTechnologies/','https://www.twitter.com/lumentechco','https://www.facebook.com/LumenTechnologies/',''); INSERT INTO vendors VALUES('a93d7f1d-3e99-40fd-afa7-14d9f7614806','published','lumen','Lumen','www.lumen.com','Lumen is dedicated to furthering human progress through technology, providing the fastest, most secure platform for applications and data to help businesses, government and communities deliver amazing experiences around the world.','1025 El Dorado Blvd.',NULL,'Broomfield','CO','USA','0641b198-0e5c-431a-ba08-3d29afc14818',replace('<h5>Lumen</h5>\n<p>\nLumen is an American multinational technology company headquartered in Monroe, Louisiana dedicated to furthering human progress through technology, providing the fastest, most secure platform for applications and data to help businesses, government and communities adopt emerging technologies and deliver amazing experiences around the world.\nLumen is guided by the belief that humanity is at its best when technology advances the ways we live and work. The company leverages a vast collection of talent, experience, assets, and capabilities to address the dynamic data and application needs of the 4th Industrial Revolution.<br>\n</p>\n<h5>Why Lumen?</h5>\n<p>Communications: Contact Center &amp; UCC, 911 Services, VoIP\nEdge Computing\nHybrid IT &amp; Cloud: Data Analytics, Data Centers, Cloud Application Manager, Backup Storage\nManaged &amp; IT Services\nNetworking\nSecurity: Black Lotus Labs, Cybersecurity, Analytics and Threat Management, DDoS, Edge Protect</p>','\n',char(10)),'https://www.facebook.com/LumenTechnologies/','https://www.twitter.com/lumentechco','https://www.facebook.com/LumenTechnologies/','');
INSERT INTO vendors VALUES('5dfda775-9501-4bc4-af67-806eeaae4984','published','lepide','Lepide','https://www.lepide.com/','Lepide is a global provider of data security solutions. We help thousands of organizations, large and small, protect their sensitive data, reduce their threat surface, and meet compliance through our award-winning Lepide Data Security Platform.','600 Congress Avenue',NULL,'Austin','TX','USA','8439268b-1857-42bd-9f72-441c09eb5020',replace('<h5>Lepide</h5>\n<p>\nLepide is a leading company in the field of data security and analytics, taking a unique approach compared to traditional cybersecurity firms. Their focus is on safeguarding enterprise data, including sensitive documents and emails, confidential customer and employee information, financial records, strategic plans, and other proprietary assets. The Lepide Data Security Platform detects potential security threats by analyzing data, user activity, and behavior, both from internal and external sources. It also helps to prevent and mitigate data breaches by securing sensitive information through governance and spotting anomalies with automation and machine learning. Additionally, Lepide''s products offer solutions for data protection, governance, zero trust, compliance, data privacy, classification, and threat detection and response.<br>\n</p>\n<h5>Why Lepide?</h5>\n<p>The majority of security threats originate with Active Directory, and nearly always involve the compromise of sensitive, unstructured data. However, many organizations struggle to find solutions that protect sensitive data and critical infrastructure through the entire attack path. This often leads to siloed solutions and a lack of true visibility.\nWith the Lepide Data Security Platform, you can protect sensitive data and detect threats across Active Directory, Microsoft 365, File Server, and more. All from a single scalable, powerful, and simple solution.\nUsing Lepide, companies can find out where their most sensitive data is, see which users have access to it, see what their users are doing with it, and spot any changes taking place to the surrounding systems. All this in one Platform helps companies to reduce their risk surface area, detect and react to threats in real-time, and achieve compliance with industry regulations. </p>','\n',char(10)),'https://www.facebook.com/Lepide/','https://www.twitter.com/lepideSW','https://www.linkedin.com/company/2630106/',''); INSERT INTO vendors VALUES('5dfda775-9501-4bc4-af67-806eeaae4984','published','lepide','Lepide','https://www.lepide.com/','Lepide is a global provider of data security solutions. We help thousands of organizations, large and small, protect their sensitive data, reduce their threat surface, and meet compliance through our award-winning Lepide Data Security Platform.','600 Congress Avenue',NULL,'Austin','TX','USA','52d566b6-edd6-4264-a75a-242e6eb9ee03',replace('<h5>Lepide</h5>\n<p>\nLepide is a leading company in the field of data security and analytics, taking a unique approach compared to traditional cybersecurity firms. Their focus is on safeguarding enterprise data, including sensitive documents and emails, confidential customer and employee information, financial records, strategic plans, and other proprietary assets. The Lepide Data Security Platform detects potential security threats by analyzing data, user activity, and behavior, both from internal and external sources. It also helps to prevent and mitigate data breaches by securing sensitive information through governance and spotting anomalies with automation and machine learning. Additionally, Lepide''s products offer solutions for data protection, governance, zero trust, compliance, data privacy, classification, and threat detection and response.<br>\n</p>\n<h5>Why Lepide?</h5>\n<p>The majority of security threats originate with Active Directory, and nearly always involve the compromise of sensitive, unstructured data. However, many organizations struggle to find solutions that protect sensitive data and critical infrastructure through the entire attack path. This often leads to siloed solutions and a lack of true visibility.\nWith the Lepide Data Security Platform, you can protect sensitive data and detect threats across Active Directory, Microsoft 365, File Server, and more. All from a single scalable, powerful, and simple solution.\nUsing Lepide, companies can find out where their most sensitive data is, see which users have access to it, see what their users are doing with it, and spot any changes taking place to the surrounding systems. All this in one Platform helps companies to reduce their risk surface area, detect and react to threats in real-time, and achieve compliance with industry regulations. </p>','\n',char(10)),'https://www.facebook.com/Lepide/','https://www.twitter.com/lepideSW','https://www.linkedin.com/company/2630106/','');
INSERT INTO vendors VALUES('1705016d-fd06-46fb-8af0-5db266e27149','published','logrhythm','LogRhythm','www.logrhythm.com','Security made easy: LogRhythm empowers security teams with the most intuitive experience and contextual analytics into cybersecurity threats so they can reduce noise, prioritize work and quickly secure their environment.','385 Interlocken Crescent Suite 1050',NULL,'Broomfield','CO','USA','12a0c626-70c6-410c-ad5d-73923c62253f',replace('<h5>LogRhythm</h5>\n<p>\nLogRhythm helps busy and lean security operations teams save the day — day after day. Theres a lot riding on the shoulders of security professionals — the reputation and success of their company, the safety of citizens and organizations across the globe, the security of critical resources — the weight of protecting the world.\nLogRhythm helps lighten this load. The company is on the frontlines defending against many of the worlds most significant cyberattacks and empowers security teams to navigate an ever-changing threat landscape with confidence. As allies in the fight, LogRhythm combines a comprehensive and flexible security operations platform, technology partnerships, and advisory services to help SOC teams close the gaps. Together, LogRhythm and our customers are ready to defend. Learn more at logrhythm.com. <br>\n</p>','\n',char(10)),'https://www.facebook.com/LogRhythmInc','https://www.twitter.com/LogRhythm','https://www.linkedin.com/company/logrhythm/',''); INSERT INTO vendors VALUES('1705016d-fd06-46fb-8af0-5db266e27149','published','logrhythm','LogRhythm','www.logrhythm.com','Security made easy: LogRhythm empowers security teams with the most intuitive experience and contextual analytics into cybersecurity threats so they can reduce noise, prioritize work and quickly secure their environment.','385 Interlocken Crescent Suite 1050',NULL,'Broomfield','CO','USA','12a0c626-70c6-410c-ad5d-73923c62253f',replace('<h5>LogRhythm</h5>\n<p>\nLogRhythm helps busy and lean security operations teams save the day — day after day. Theres a lot riding on the shoulders of security professionals — the reputation and success of their company, the safety of citizens and organizations across the globe, the security of critical resources — the weight of protecting the world.\nLogRhythm helps lighten this load. The company is on the frontlines defending against many of the worlds most significant cyberattacks and empowers security teams to navigate an ever-changing threat landscape with confidence. As allies in the fight, LogRhythm combines a comprehensive and flexible security operations platform, technology partnerships, and advisory services to help SOC teams close the gaps. Together, LogRhythm and our customers are ready to defend. Learn more at logrhythm.com. <br>\n</p>','\n',char(10)),'https://www.facebook.com/LogRhythmInc','https://www.twitter.com/LogRhythm','https://www.linkedin.com/company/logrhythm/','');
INSERT INTO vendors VALUES('f6767fd6-cc77-43dd-8397-574a2cb8de7f','published','sands-lab','SANDS Lab','https://www.sandslab.io/','For actively responding against cyber security threats, SANDSLab has been putting its best efforts to generate so called “Hyper-Intelligence” and to develop related various base technologies along with AI, big data and cloud technology.','Floor 4, Chosun-Newha Building','Seolleungno 577','Gangnam-gu, Seoul',NULL,'KOR','f4666650-72e5-4fca-9f18-37ef027bafb7',replace('<h5>SANDS Lab</h5>\n<p>\nSANDS Lab provides the unprecedented intelligence service through\na mutual organic ecosystem of Cyber Security, AI, Network and Data.\nFor actively responding against cyber security threats, SANDS Lab has been putting its\nbest efforts to generate so called “Hyper-Intelligence” and to develop related various base\ntechnologies along with AI, big data and cloud technology.<br>\n</p>','\n',char(10)),'https://www.facebook.com/malwarescom',NULL,'https://www.linkedin.com/in/k-secu/',''); INSERT INTO vendors VALUES('f6767fd6-cc77-43dd-8397-574a2cb8de7f','published','sands-lab','SANDS Lab','https://www.sandslab.io/','For actively responding against cyber security threats, SANDSLab has been putting its best efforts to generate so called “Hyper-Intelligence” and to develop related various base technologies along with AI, big data and cloud technology.','Floor 4, Chosun-Newha Building','Seolleungno 577','Gangnam-gu, Seoul',NULL,'KOR','6a20feae-4472-4023-9bc2-ff211552fc35',replace('<h5>SANDS Lab</h5>\n<p>\nSANDS Lab provides the unprecedented intelligence service through\na mutual organic ecosystem of Cyber Security, AI, Network and Data.\nFor actively responding against cyber security threats, SANDS Lab has been putting its\nbest efforts to generate so called “Hyper-Intelligence” and to develop related various base\ntechnologies along with AI, big data and cloud technology.<br>\n</p>','\n',char(10)),'https://www.facebook.com/malwarescom',NULL,'https://www.linkedin.com/in/k-secu/','');
INSERT INTO vendors VALUES('0f8cbdbc-56b2-4591-ba50-a8287913c0c5','published','legit-security','Legit Security','www.legitsecurity.com','Legit Security''s platform protects an organization''s software supply chain from attack and ensures secure application delivery, governance and risk management from code to cloud.','2345 Yale St. ','1st Floor','Palo Alto','CA','USA','d82221a4-e306-4359-acd3-a0d191b5a29b',replace('<h5>Legit Security</h5>\n<p>\nLegit Security protects an organization''s software supply chain from attack and ensures secure application delivery, governance and risk management from code to cloud. The platforms unified application security control plane and automated SDLC discovery and analysis capabilities provide visibility and security control over rapidly changing environments, and allow security issues to be prioritized based on context and business criticality to improve security team efficiency and effectiveness.<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/LegitSecurity1 ','https://www.linkedin.com/company/legitsecurity',''); INSERT INTO vendors VALUES('0f8cbdbc-56b2-4591-ba50-a8287913c0c5','published','legit-security','Legit Security','www.legitsecurity.com','Legit Security''s platform protects an organization''s software supply chain from attack and ensures secure application delivery, governance and risk management from code to cloud.','2345 Yale St. ','1st Floor','Palo Alto','CA','USA','d82221a4-e306-4359-acd3-a0d191b5a29b',replace('<h5>Legit Security</h5>\n<p>\nLegit Security protects an organization''s software supply chain from attack and ensures secure application delivery, governance and risk management from code to cloud. The platforms unified application security control plane and automated SDLC discovery and analysis capabilities provide visibility and security control over rapidly changing environments, and allow security issues to be prioritized based on context and business criticality to improve security team efficiency and effectiveness.<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/LegitSecurity1 ','https://www.linkedin.com/company/legitsecurity','');
INSERT INTO vendors VALUES('28dff223-9741-42a6-8170-3d82b72966c3','published','simeon-cloud','Simeon Cloud','www.simeoncloud.com','Simeon Cloud helps IT teams manage their M365 configurations by providing a purpose-built Configuration as Code platform for Microsoft 365. The platform offers baseline management, lifecycle & change management, drift detection, as well as backups.','2570 N. First Street ','2nd Floor','San Jose','CA','USA','289d2def-2f47-4491-a541-0247f09495b1',replace('<h5>Simeon Cloud</h5>\n<p>\nSimeon Cloud provides enterprise IT teams and managed service providers with the only configuration as code platform purpose-built for Microsoft 365. Backup and restore configurations, establish a baseline or golden tenant for compliance management, implement proper change controls and life cycle management. <br>\n</p>\n<h5>Why Simeon Cloud?</h5>\n<p>Simeon Cloud helps companies:\nBackup and Restore M365 configurations\nEstablish a Baseline or Golden Tenant to ensure compliance adherence, best-practices and monitor drift\nImplement proper change controls, audit history, logging\nEstablish true life cycle management processes with Dev,Test,Prod syncronization</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/simeon-cloud/mycompany/',''); INSERT INTO vendors VALUES('28dff223-9741-42a6-8170-3d82b72966c3','published','simeon-cloud','Simeon Cloud','www.simeoncloud.com','Simeon Cloud helps IT teams manage their M365 configurations by providing a purpose-built Configuration as Code platform for Microsoft 365. The platform offers baseline management, lifecycle & change management, drift detection, as well as backups.','2570 N. First Street ','2nd Floor','San Jose','CA','USA','289d2def-2f47-4491-a541-0247f09495b1',replace('<h5>Simeon Cloud</h5>\n<p>\nSimeon Cloud provides enterprise IT teams and managed service providers with the only configuration as code platform purpose-built for Microsoft 365. Backup and restore configurations, establish a baseline or golden tenant for compliance management, implement proper change controls and life cycle management. <br>\n</p>\n<h5>Why Simeon Cloud?</h5>\n<p>Simeon Cloud helps companies:\nBackup and Restore M365 configurations\nEstablish a Baseline or Golden Tenant to ensure compliance adherence, best-practices and monitor drift\nImplement proper change controls, audit history, logging\nEstablish true life cycle management processes with Dev,Test,Prod syncronization</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/simeon-cloud/mycompany/','');
INSERT INTO vendors VALUES('e96fd72f-e0e3-43b9-9821-139b25299f0d','published','intelligent-ciso','Intelligent CISO','https://www.intelligentciso.com/','Intelligent CISO is a technology brand that encompasses various intelligence platforms aimed at the enterprise sector looking for updates and research driven data about cybersecurity. As part of Lynchpin Media, this digital medium gives unparalleled advice to the EMEA, APAC and North America cybersecurity communities. Spreading our resources across print, digital and events, Intelligent CISO endeavours to guide CISOs within the EMEA, APAC, North America and Latin America regions with thought leadership, industry expertise, knowledge sharing and practical platforms from which to better understand the views of the cybersecurity industry, encompassing the voice of vendors, distributors, resellers and the all-important end-user. With social media supporting all the above, our content is delivered across all platforms and enables industry professionals to discover and read this on their preferred device.','63-66 Hatton Garden',NULL,'London ',NULL,'GBR','40320c5f-d438-4a4d-97c9-ba1b067184f9',replace('<h5>Intelligent CISO</h5>\n<p>\nIntelligent CISO is a technology brand that encompasses various intelligence platforms aimed at the enterprise sector looking for updates and research driven data about cybersecurity. As part of Lynchpin Media, this digital medium gives unparalleled advice to the EMEA, APAC and North America cybersecurity communities.\nSpreading our resources across print, digital and events, Intelligent CISO endeavours to guide CISOs within the EMEA, APAC, North America and Latin America regions with thought leadership, industry expertise, knowledge sharing and practical platforms from which to better understand the views of the cybersecurity industry, encompassing the voice of vendors, distributors, resellers and the all-important end-user. With social media supporting all the above, our content is delivered across all platforms and enables industry professionals to discover and read this on their preferred device.\n<br>\n</p>\n<h5>Why Intelligent CISO?</h5>\n<p>Intelligent CISO provides security officers with the latest information and intelligence to help them make important, informed decisions. Our integrated platforms enable the industry to receive the content they need. It is our unparalleled understanding of this audience which enables us to deliver effective campaigns aimed at ensuring maximum return on investment combined with sustained brand awareness across our digital platforms. Strategic partnerships with regional industry bodies, events and research companies enable us to both manage and grow the audience.\nIntelligent CISO can tailor a partnership to suit your own requirements. This can be across multiple regions, different technology focuses or just a chance to align with a new corporate message. Being a young, nimble, digital company allows us to work closely with partners in developing strategic campaigns bespoke to their needs.\nServices Include:\nLead Generation\nBespoke Surveys\nBrand Awareness\nThought Leadership</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/showcase/intelligent-ciso/',''); INSERT INTO vendors VALUES('e96fd72f-e0e3-43b9-9821-139b25299f0d','published','intelligent-ciso','Intelligent CISO','https://www.intelligentciso.com/','Intelligent CISO is a technology brand that encompasses various intelligence platforms aimed at the enterprise sector looking for updates and research driven data about cybersecurity. As part of Lynchpin Media, this digital medium gives unparalleled advice to the EMEA, APAC and North America cybersecurity communities. Spreading our resources across print, digital and events, Intelligent CISO endeavours to guide CISOs within the EMEA, APAC, North America and Latin America regions with thought leadership, industry expertise, knowledge sharing and practical platforms from which to better understand the views of the cybersecurity industry, encompassing the voice of vendors, distributors, resellers and the all-important end-user. With social media supporting all the above, our content is delivered across all platforms and enables industry professionals to discover and read this on their preferred device.','63-66 Hatton Garden',NULL,'London ',NULL,'GBR','40320c5f-d438-4a4d-97c9-ba1b067184f9',replace('<h5>Intelligent CISO</h5>\n<p>\nIntelligent CISO is a technology brand that encompasses various intelligence platforms aimed at the enterprise sector looking for updates and research driven data about cybersecurity. As part of Lynchpin Media, this digital medium gives unparalleled advice to the EMEA, APAC and North America cybersecurity communities.\nSpreading our resources across print, digital and events, Intelligent CISO endeavours to guide CISOs within the EMEA, APAC, North America and Latin America regions with thought leadership, industry expertise, knowledge sharing and practical platforms from which to better understand the views of the cybersecurity industry, encompassing the voice of vendors, distributors, resellers and the all-important end-user. With social media supporting all the above, our content is delivered across all platforms and enables industry professionals to discover and read this on their preferred device.\n<br>\n</p>\n<h5>Why Intelligent CISO?</h5>\n<p>Intelligent CISO provides security officers with the latest information and intelligence to help them make important, informed decisions. Our integrated platforms enable the industry to receive the content they need. It is our unparalleled understanding of this audience which enables us to deliver effective campaigns aimed at ensuring maximum return on investment combined with sustained brand awareness across our digital platforms. Strategic partnerships with regional industry bodies, events and research companies enable us to both manage and grow the audience.\nIntelligent CISO can tailor a partnership to suit your own requirements. This can be across multiple regions, different technology focuses or just a chance to align with a new corporate message. Being a young, nimble, digital company allows us to work closely with partners in developing strategic campaigns bespoke to their needs.\nServices Include:\nLead Generation\nBespoke Surveys\nBrand Awareness\nThought Leadership</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/showcase/intelligent-ciso/','');
@@ -3103,7 +3101,7 @@ INSERT INTO vendors VALUES('0c864123-2bad-4a81-a0fb-5b24eb96d563','published','z
INSERT INTO vendors VALUES('ba2b018b-5eae-4e22-812c-6995f863a298','published','penn-state-world-campus','Penn State World Campus','worldcampus.psu.edu/rsac','Whether you''re just starting out in the IT field, or ready to advance your career, Penn State''s online degrees can help you gain the expertise you need to succeed. Penn State World Campus has programs that meet all levels of experience.','227 Outreach Building',NULL,'University Park','PA','USA','ed7eed9b-61ad-464f-894d-e0b70866f549',replace('<h5>Penn State World Campus</h5>\n<p>\nWhether you''re just starting out in the IT field, or ready to advance your career, Penn State''s online degrees can help you gain the expertise you need to succeed. Penn State World Campus has programs that meet all levels of experience. <br>\n</p>\n<h5>Why Penn State World Campus?</h5>\n<p>Whether you''re just starting out in the IT field, or ready to advance your career, Penn State''s online degrees can help you gain the expertise you need to succeed. Penn State World Campus has programs that meet all levels of experience. </p>','\n',char(10)),'https://www.facebook.com/psuworldcampus','https://www.twitter.com/PSUWorldcampus','https://www.linkedin.com/school/penn-state-world-campus/mycompany/',''); INSERT INTO vendors VALUES('ba2b018b-5eae-4e22-812c-6995f863a298','published','penn-state-world-campus','Penn State World Campus','worldcampus.psu.edu/rsac','Whether you''re just starting out in the IT field, or ready to advance your career, Penn State''s online degrees can help you gain the expertise you need to succeed. Penn State World Campus has programs that meet all levels of experience.','227 Outreach Building',NULL,'University Park','PA','USA','ed7eed9b-61ad-464f-894d-e0b70866f549',replace('<h5>Penn State World Campus</h5>\n<p>\nWhether you''re just starting out in the IT field, or ready to advance your career, Penn State''s online degrees can help you gain the expertise you need to succeed. Penn State World Campus has programs that meet all levels of experience. <br>\n</p>\n<h5>Why Penn State World Campus?</h5>\n<p>Whether you''re just starting out in the IT field, or ready to advance your career, Penn State''s online degrees can help you gain the expertise you need to succeed. Penn State World Campus has programs that meet all levels of experience. </p>','\n',char(10)),'https://www.facebook.com/psuworldcampus','https://www.twitter.com/PSUWorldcampus','https://www.linkedin.com/school/penn-state-world-campus/mycompany/','');
INSERT INTO vendors VALUES('85c34693-3502-4ffa-8b34-405e964e0355','published','panorays','Panorays','www.panorays.com','Panorays automates, accelerates and scales your third-party security evaluation and management process so you can easily manage and remediate risk','155 East 44th Street ','Suite 701','New York','NY','USA','2e849b2e-d688-4352-a2f6-f796a2191fca',replace('<h5>Panorays</h5>\n<p>\nPanorays is dedicated to eliminating third-party security risk so companies worldwide can quickly and securely do business together. With its solution, users can manage, mitigate and remediate supplier security risks, reduce breaches and improve security across the board. The company is recognized as a strong performer by Forrester, and received the highest rating in the criteria of data accuracy and risk context.<br>\n</p>\n<h5>Why Panorays?</h5>\n<p>Panorays is a rapidly growing provider of third-party security risk management software, offered as a SaaS-based platform. The company serves enterprise and mid-market customers primarily in North America, the UK and the EU, and has been adopted by leading banking, insurance, financial services and healthcare organizations, among others. Headquartered in New York and Israel, with offices around the world, Panorays is funded by numerous international investors, including Aleph VC, Oak HC/FT, Greenfield Partners, BlueRed Partners (Singapore), StepStone Group, Moneta VC, Imperva Co-Founder Amichai Shulman and former CEO of Palo Alto Networks Lane Bess. Visit us at www.panorays.com.</p>','\n',char(10)),'https://www.facebook.com/panorays','https://www.twitter.com/panorays','https://www.linkedin.com/company/panorays',''); INSERT INTO vendors VALUES('85c34693-3502-4ffa-8b34-405e964e0355','published','panorays','Panorays','www.panorays.com','Panorays automates, accelerates and scales your third-party security evaluation and management process so you can easily manage and remediate risk','155 East 44th Street ','Suite 701','New York','NY','USA','2e849b2e-d688-4352-a2f6-f796a2191fca',replace('<h5>Panorays</h5>\n<p>\nPanorays is dedicated to eliminating third-party security risk so companies worldwide can quickly and securely do business together. With its solution, users can manage, mitigate and remediate supplier security risks, reduce breaches and improve security across the board. The company is recognized as a strong performer by Forrester, and received the highest rating in the criteria of data accuracy and risk context.<br>\n</p>\n<h5>Why Panorays?</h5>\n<p>Panorays is a rapidly growing provider of third-party security risk management software, offered as a SaaS-based platform. The company serves enterprise and mid-market customers primarily in North America, the UK and the EU, and has been adopted by leading banking, insurance, financial services and healthcare organizations, among others. Headquartered in New York and Israel, with offices around the world, Panorays is funded by numerous international investors, including Aleph VC, Oak HC/FT, Greenfield Partners, BlueRed Partners (Singapore), StepStone Group, Moneta VC, Imperva Co-Founder Amichai Shulman and former CEO of Palo Alto Networks Lane Bess. Visit us at www.panorays.com.</p>','\n',char(10)),'https://www.facebook.com/panorays','https://www.twitter.com/panorays','https://www.linkedin.com/company/panorays','');
INSERT INTO vendors VALUES('7ee090ae-384d-48a4-a9be-bfcbd8563b6a','published','noname-security','Noname Security','https://nonamesecurity.com/','Noname Security is taking a complete, proactive approach to API Security. Noname works with 20% of the Fortune 500 and covers the entire API security scope across three pillars - Posture Management, Runtime Security, and API Security Testing. ','181 Metro Drive',NULL,'San Jose','CA','USA','f685ad79-f766-451a-a01c-a4334933c862',replace('<h5>Noname Security</h5>\n<p>\nAbout Noname Security\nNoname Security is the leader in API security and the only solution with a complete, proactive, and flexible platform to align development and security teams. The Noname Security platform covers the entire API lifecycle from discovery, posture management, and runtime protection for your live APIs and security testing to ensure new APIs are built with security from the beginning. Noname Security has customers from the Fortune 100 to mid-sized organization, all of whom depend on their APIs for growth. Noname Security is privately held with headquarters in Silicon Valley, California, and offices in Tel Aviv and Amsterdam.<br>\n</p>\n<h5>Why Noname Security?</h5>\n<p>Noname Security is the market leader and defines what API security means. Our platform delivers the most complete API security solution, offers the greatest deployment flexibility, and provides the fastest time to value.\n1. The most effective API posture management solution - Noname delivers the broadest collection of cloud partner and on-premises integrations for visibility into and protection of your entire API ecosystem.\n2. The fastest time-to-value for your API security program - Simplified deployment and the most comprehensive cloud and on-premises partnerships means you can connect and see your APIs with minimal setup or custom configuration.\n3. The most flexible deployment options - Only Noname can deploy to match your business requirements. Whether you have a private cloud, run on a public cloud (including multi-cloud environments), or use a hybrid of both approaches, weve got you covered.</p>','\n',char(10)),'https://www.facebook.com/nonamesec/','https://www.twitter.com/NonameSecurity','https://www.linkedin.com/company/nonamesecurity/',''); INSERT INTO vendors VALUES('7ee090ae-384d-48a4-a9be-bfcbd8563b6a','published','noname-security','Noname Security','https://nonamesecurity.com/','Noname Security is taking a complete, proactive approach to API Security. Noname works with 20% of the Fortune 500 and covers the entire API security scope across three pillars - Posture Management, Runtime Security, and API Security Testing. ','181 Metro Drive',NULL,'San Jose','CA','USA','f685ad79-f766-451a-a01c-a4334933c862',replace('<h5>Noname Security</h5>\n<p>\nAbout Noname Security\nNoname Security is the leader in API security and the only solution with a complete, proactive, and flexible platform to align development and security teams. The Noname Security platform covers the entire API lifecycle from discovery, posture management, and runtime protection for your live APIs and security testing to ensure new APIs are built with security from the beginning. Noname Security has customers from the Fortune 100 to mid-sized organization, all of whom depend on their APIs for growth. Noname Security is privately held with headquarters in Silicon Valley, California, and offices in Tel Aviv and Amsterdam.<br>\n</p>\n<h5>Why Noname Security?</h5>\n<p>Noname Security is the market leader and defines what API security means. Our platform delivers the most complete API security solution, offers the greatest deployment flexibility, and provides the fastest time to value.\n1. The most effective API posture management solution - Noname delivers the broadest collection of cloud partner and on-premises integrations for visibility into and protection of your entire API ecosystem.\n2. The fastest time-to-value for your API security program - Simplified deployment and the most comprehensive cloud and on-premises partnerships means you can connect and see your APIs with minimal setup or custom configuration.\n3. The most flexible deployment options - Only Noname can deploy to match your business requirements. Whether you have a private cloud, run on a public cloud (including multi-cloud environments), or use a hybrid of both approaches, weve got you covered.</p>','\n',char(10)),'https://www.facebook.com/nonamesec/','https://www.twitter.com/NonameSecurity','https://www.linkedin.com/company/nonamesecurity/','');
INSERT INTO vendors VALUES('fa75d639-1a22-494e-9ca3-fc1ce609adef','published','nsfocus','NSFOCUS','www.nsfocusglobal.com','NSFOCUS protects telcos, ISPs, MSSPs & enterprises from advanced cyberattacks. Its Intelligent Hybrid Security strategy utilizes cloud + on-premises products and services with real-time global threat intelligence to provide multi-layered, unified and dynamic cyber defense. ','690 N McCarthy Blvd','Suite 170','Milpitas','CA','USA','160f3cac-ae0c-478d-91fa-599c5bcec5a4',replace('<h5>NSFOCUS</h5>\n<p>\nNSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company''s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against ever-evolving cyber threats.\nNSFOCUS works with Fortune Global 500 companies, including four of the world''s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).\nNSFOCUS Inc. is a wholly owned subsidiary of NSFOCUS Technologies Group Co., Ltd., operating in the Americas, Europe, the Middle East and Asia Pacific.<br>\n</p>','\n',char(10)),'https://www.facebook.com/nsfocus','https://www.twitter.com/NSFOCUS_Intl','www.linkedin.com/company/nsfocus/',''); INSERT INTO vendors VALUES('fa75d639-1a22-494e-9ca3-fc1ce609adef','published','nsfocus','NSFOCUS','www.nsfocusglobal.com','NSFOCUS protects telcos, ISPs, MSSPs & enterprises from advanced cyberattacks. Its Intelligent Hybrid Security strategy utilizes cloud + on-premises products and services with real-time global threat intelligence to provide multi-layered, unified and dynamic cyber defense. ','690 N McCarthy Blvd','Suite 170','Milpitas','CA','USA','0a321e46-5d6f-41d4-bc5b-f1c0d5d4c41e',replace('<h5>NSFOCUS</h5>\n<p>\nNSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company''s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against ever-evolving cyber threats.\nNSFOCUS works with Fortune Global 500 companies, including four of the world''s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).\nNSFOCUS Inc. is a wholly owned subsidiary of NSFOCUS Technologies Group Co., Ltd., operating in the Americas, Europe, the Middle East and Asia Pacific.<br>\n</p>','\n',char(10)),'https://www.facebook.com/nsfocus','https://www.twitter.com/NSFOCUS_Intl','www.linkedin.com/company/nsfocus/','');
INSERT INTO vendors VALUES('5bcca7c1-3650-4193-9de8-ae6ec70f8cff','published','national-security-agency','National Security Agency','www.nsa.gov','The NSA leads the U.S. Government in cryptology that encompasses both signals intelligence insights and cybersecurity products and services and enables computer network operations to gain a decisive advantage for the nation & our allies.','9800 Savage Road',NULL,'Ft. Meade','MD','USA','ae98a449-2d45-4221-a94f-a7fed4e2f8f2',replace('<h5>National Security Agency</h5>\n<p>\nThe National Security Agency/Central Security Service (NSA/CSS) leads the U.S. Government in cryptology that encompasses both signals intelligence (SIGINT) insights and cybersecurity products and services and enables computer network operations to gain a decisive advantage for the nation and our allies. <br>\n</p>','\n',char(10)),'https://www.facebook.com/NSAUSGov/','https://www.twitter.com/NSAGov','https://www.linkedin.com/company/national-security-agency/',''); INSERT INTO vendors VALUES('5bcca7c1-3650-4193-9de8-ae6ec70f8cff','published','national-security-agency','National Security Agency','www.nsa.gov','The NSA leads the U.S. Government in cryptology that encompasses both signals intelligence insights and cybersecurity products and services and enables computer network operations to gain a decisive advantage for the nation & our allies.','9800 Savage Road',NULL,'Ft. Meade','MD','USA','ae98a449-2d45-4221-a94f-a7fed4e2f8f2',replace('<h5>National Security Agency</h5>\n<p>\nThe National Security Agency/Central Security Service (NSA/CSS) leads the U.S. Government in cryptology that encompasses both signals intelligence (SIGINT) insights and cybersecurity products and services and enables computer network operations to gain a decisive advantage for the nation and our allies. <br>\n</p>','\n',char(10)),'https://www.facebook.com/NSAUSGov/','https://www.twitter.com/NSAGov','https://www.linkedin.com/company/national-security-agency/','');
INSERT INTO vendors VALUES('e5dadade-5350-4fbd-a7c5-85c15dd88c2e','published','ninjaone','NinjaOne','https://www.ninjaone.com/','NinjaOne''s Unified IT Management platform enables IT departments to centrally manage, support, patch, and secure any endpoint anywhere within one intuitive platform that improves technician efficiency and device security.','301 Congress Avenue','Suite 400','Austin','TX','USA','e309e9c8-4fb0-4ebb-a10d-02010c2fbb59',replace('<h5>NinjaOne</h5>\n<p>\nNinjaOne''s Unified IT Management platform enables IT departments to centrally manage, support, and secure endpoints within one fast, modern, intuitive platform that improves technician efficiency and device security.\nNinjaOne supports over 9,000 customers around the world, and is consistently ranked #1 for its world-class customer support. NinjaOne has been recognized as the best rated software in its category on G2 and Gartner Digital Markets for the past 3 years.<br>\n</p>\n<h5>Why NinjaOne?</h5>\n<p>With NinjaOne you get a unified tool to centrally monitor, manage, and secure all your servers, workstations, laptops, virtual machines, and networking devices. Our cloud-native solution enables centralized management of any device, on any network, anywhere in the world without the need for on-premises infrastructure or a VPN.\nYou get:\n- Fully-automated cloud-based patch management across Windows, Mac, and Linux endpoints\n- A powerful automation engine that saves you 30%+ time on device hardening &amp; management\n- Device monitoring and alerting to make your IT team far more proactive\n- One-click remote access for quick remote support\n- IT-specific ticketing with in-context device support and management\n- Endpoint backup to protect critical business data from ransomware and loss</p>','\n',char(10)),'https://www.facebook.com/ninjarmm/','https://www.twitter.com/NinjaRMM','https://www.linkedin.com/company/ninjaone/',''); INSERT INTO vendors VALUES('e5dadade-5350-4fbd-a7c5-85c15dd88c2e','published','ninjaone','NinjaOne','https://www.ninjaone.com/','NinjaOne''s Unified IT Management platform enables IT departments to centrally manage, support, patch, and secure any endpoint anywhere within one intuitive platform that improves technician efficiency and device security.','301 Congress Avenue','Suite 400','Austin','TX','USA','e309e9c8-4fb0-4ebb-a10d-02010c2fbb59',replace('<h5>NinjaOne</h5>\n<p>\nNinjaOne''s Unified IT Management platform enables IT departments to centrally manage, support, and secure endpoints within one fast, modern, intuitive platform that improves technician efficiency and device security.\nNinjaOne supports over 9,000 customers around the world, and is consistently ranked #1 for its world-class customer support. NinjaOne has been recognized as the best rated software in its category on G2 and Gartner Digital Markets for the past 3 years.<br>\n</p>\n<h5>Why NinjaOne?</h5>\n<p>With NinjaOne you get a unified tool to centrally monitor, manage, and secure all your servers, workstations, laptops, virtual machines, and networking devices. Our cloud-native solution enables centralized management of any device, on any network, anywhere in the world without the need for on-premises infrastructure or a VPN.\nYou get:\n- Fully-automated cloud-based patch management across Windows, Mac, and Linux endpoints\n- A powerful automation engine that saves you 30%+ time on device hardening &amp; management\n- Device monitoring and alerting to make your IT team far more proactive\n- One-click remote access for quick remote support\n- IT-specific ticketing with in-context device support and management\n- Endpoint backup to protect critical business data from ransomware and loss</p>','\n',char(10)),'https://www.facebook.com/ninjarmm/','https://www.twitter.com/NinjaRMM','https://www.linkedin.com/company/ninjaone/','');
INSERT INTO vendors VALUES('656bf372-f25a-493e-bb80-c837ba8966a9','published','xm-cyber','XM Cyber','www.xmcyber.com','XM Cyber is a hybrid cloud security company changing the way organizations approach cyber risk. By continuously uncovering hidden attack paths to critical assets, it enables security teams to remediate exposures at key junctures and eradicate risk. ','7 Sapir',NULL,'Herzlyia',NULL,'ISR','98500a7f-c368-4fd1-be2d-eada067aeac9',replace('<h5>XM Cyber</h5>\n<p>\nXM Cyber is a leading hybrid cloud security company thats changing the way organizations approach cyber risk. XM Cyber transforms exposure management by demonstrating how attackers leverage and combine misconfigurations, vulnerabilities, identity exposures, and more, across AWS, Azure, GCP and on-prem environments to compromise critical assets. With XM Cyber, you can see all the ways attackers might go, and all the best ways to stop them by remediating exposures, to eradicate risk at a fraction of the effort. Many of the worlds largest, most complex organizations choose XM Cyber to help eradicate risk. Founded by top executives from the Israeli cyber intelligence community, XM Cyber has offices in North America, Europe, and Israel.<br>\n</p>\n<h5>Why XM Cyber?</h5>\n<p>XM Cyber is the go-to solution for security teams looking to prioritize their remediation efforts and reduce risk in the most cost-efficient manner. As security issues continue to mount and hybrid cloud environments become more complex, XM Cyber provides an attacker''s perspective of how these environments can be compromised. By combining toxic exposures such as CVEs, misconfigurations, identity exposures, and security control gaps, XM Cyber maps all possible attack paths onto an attack graph, providing the context security teams need to identify and prioritize remediation efforts accurately.\nWith XM Cyber, you can uncover security control gaps and exploitable exposures in your environment, understand how attackers use them to move through your hybrid and cloud networks, and cut them off at choke points to prioritize what matters most.\nBenefits include continuous &amp; safe risk visibility, cost effective remediation, hybrid cloud attack surface reduction, security posture score &amp; trends.</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/xm/',''); INSERT INTO vendors VALUES('656bf372-f25a-493e-bb80-c837ba8966a9','published','xm-cyber','XM Cyber','www.xmcyber.com','XM Cyber is a hybrid cloud security company changing the way organizations approach cyber risk. By continuously uncovering hidden attack paths to critical assets, it enables security teams to remediate exposures at key junctures and eradicate risk. ','7 Sapir',NULL,'Herzlyia',NULL,'ISR','98500a7f-c368-4fd1-be2d-eada067aeac9',replace('<h5>XM Cyber</h5>\n<p>\nXM Cyber is a leading hybrid cloud security company thats changing the way organizations approach cyber risk. XM Cyber transforms exposure management by demonstrating how attackers leverage and combine misconfigurations, vulnerabilities, identity exposures, and more, across AWS, Azure, GCP and on-prem environments to compromise critical assets. With XM Cyber, you can see all the ways attackers might go, and all the best ways to stop them by remediating exposures, to eradicate risk at a fraction of the effort. Many of the worlds largest, most complex organizations choose XM Cyber to help eradicate risk. Founded by top executives from the Israeli cyber intelligence community, XM Cyber has offices in North America, Europe, and Israel.<br>\n</p>\n<h5>Why XM Cyber?</h5>\n<p>XM Cyber is the go-to solution for security teams looking to prioritize their remediation efforts and reduce risk in the most cost-efficient manner. As security issues continue to mount and hybrid cloud environments become more complex, XM Cyber provides an attacker''s perspective of how these environments can be compromised. By combining toxic exposures such as CVEs, misconfigurations, identity exposures, and security control gaps, XM Cyber maps all possible attack paths onto an attack graph, providing the context security teams need to identify and prioritize remediation efforts accurately.\nWith XM Cyber, you can uncover security control gaps and exploitable exposures in your environment, understand how attackers use them to move through your hybrid and cloud networks, and cut them off at choke points to prioritize what matters most.\nBenefits include continuous &amp; safe risk visibility, cost effective remediation, hybrid cloud attack surface reduction, security posture score &amp; trends.</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/xm/','');
@@ -3117,7 +3115,7 @@ INSERT INTO vendors VALUES('878e86fc-fae3-4866-bb83-3a1be8bcef3d','published','s
INSERT INTO vendors VALUES('02c7860f-709d-4fa2-9c37-ae3b2b69b940','published','soos','SOOS','soos.io','SOOS is an open source vulnerability, monitoring, license, compliance, SBOM, and DAST (Dynamic Application Security Testing) platform that integrates easily into your developer pipelines and repositories. One low price for the whole team - Free Trial','20 Winooski Falls Way ','Suite 302','Winooski','VT','USA','646434df-c18d-425a-a033-e96e697825ae',replace('<h5>SOOS</h5>\n<p>\nSOOS is the affordable, easy to integrate Software Security Platform for your whole team. Scan your open source software for vulnerabilities, control the introduction of new dependencies, exclude unwanted license types, generate SBOMs, and fill out your compliance worksheets with confidence for one low monthly price. SOOS DAST gives your team a no limit dynamic application security test that integrates seamlessly into developer pipelines. Test all build branches automatically, find issues and assign remediation tasks directly into your workflow management systems. Flat fee pricing with no per seat licenses or pricing tiers.<br>\n</p>\n<h5>Why SOOS?</h5>\n<p>SOOS SCA helps you scan your open source software for vulnerabilities, control the introduction of new dependencies, exclude unwanted license types, generate SBOMs, and fill out your compliance worksheets. SOOS DAST gives your team a no limit dynamic application security test that integrates seamlessly into developer pipelines.\nSOOS is the affordable alternative to manage your software security. One click sign up, no sales calls, no seat limits with straightforward flat rate pricing.\nSOOS tools improve your organizations security posture, prepare the business for compliance initiatives, expose open source license usage and provide a full accounting of whats in the software you build (SBOM) so that youre ready for emerging disclosure regulations.\n</p>','\n',char(10)),'https://www.facebook.com/soossoftware','https://www.twitter.com/soostech','https://www.linkedin.com/company/soos',''); INSERT INTO vendors VALUES('02c7860f-709d-4fa2-9c37-ae3b2b69b940','published','soos','SOOS','soos.io','SOOS is an open source vulnerability, monitoring, license, compliance, SBOM, and DAST (Dynamic Application Security Testing) platform that integrates easily into your developer pipelines and repositories. One low price for the whole team - Free Trial','20 Winooski Falls Way ','Suite 302','Winooski','VT','USA','646434df-c18d-425a-a033-e96e697825ae',replace('<h5>SOOS</h5>\n<p>\nSOOS is the affordable, easy to integrate Software Security Platform for your whole team. Scan your open source software for vulnerabilities, control the introduction of new dependencies, exclude unwanted license types, generate SBOMs, and fill out your compliance worksheets with confidence for one low monthly price. SOOS DAST gives your team a no limit dynamic application security test that integrates seamlessly into developer pipelines. Test all build branches automatically, find issues and assign remediation tasks directly into your workflow management systems. Flat fee pricing with no per seat licenses or pricing tiers.<br>\n</p>\n<h5>Why SOOS?</h5>\n<p>SOOS SCA helps you scan your open source software for vulnerabilities, control the introduction of new dependencies, exclude unwanted license types, generate SBOMs, and fill out your compliance worksheets. SOOS DAST gives your team a no limit dynamic application security test that integrates seamlessly into developer pipelines.\nSOOS is the affordable alternative to manage your software security. One click sign up, no sales calls, no seat limits with straightforward flat rate pricing.\nSOOS tools improve your organizations security posture, prepare the business for compliance initiatives, expose open source license usage and provide a full accounting of whats in the software you build (SBOM) so that youre ready for emerging disclosure regulations.\n</p>','\n',char(10)),'https://www.facebook.com/soossoftware','https://www.twitter.com/soostech','https://www.linkedin.com/company/soos','');
INSERT INTO vendors VALUES('2bca2683-b849-4b90-8972-83bec81c41d1','published','coalfire','Coalfire','www.coalfire.com/','The worlds leading organizations trust Coalfire to elevate their cyber programs and secure the future of their business. #1 in compliance and cloud pen testing, Coalfire provides unparalleled technology-enabled professional and managed services.','11000 Westmoor Circle ','Suite 450','Westminster','CO','USA','596dac06-58fe-42c7-aa0a-19abaab37418',replace('<h5>Coalfire</h5>\n<p>\nThe worlds leading organizations including the top five cloud service providers and leaders in financial services, healthcare, and retail trust Coalfire to elevate their cyber programs and secure the future of their business. Number one in compliance, FedRAMP, and cloud penetration testing, Coalfire is the worlds largest firm dedicated to cybersecurity, providing unparalleled technology-enabled professional and managed services. <br>\n</p>','\n',char(10)),'https://www.facebook.com/coalfiresys/','https://www.twitter.com/coalfire','https://www.linkedin.com/company/coalfire/',''); INSERT INTO vendors VALUES('2bca2683-b849-4b90-8972-83bec81c41d1','published','coalfire','Coalfire','www.coalfire.com/','The worlds leading organizations trust Coalfire to elevate their cyber programs and secure the future of their business. #1 in compliance and cloud pen testing, Coalfire provides unparalleled technology-enabled professional and managed services.','11000 Westmoor Circle ','Suite 450','Westminster','CO','USA','596dac06-58fe-42c7-aa0a-19abaab37418',replace('<h5>Coalfire</h5>\n<p>\nThe worlds leading organizations including the top five cloud service providers and leaders in financial services, healthcare, and retail trust Coalfire to elevate their cyber programs and secure the future of their business. Number one in compliance, FedRAMP, and cloud penetration testing, Coalfire is the worlds largest firm dedicated to cybersecurity, providing unparalleled technology-enabled professional and managed services. <br>\n</p>','\n',char(10)),'https://www.facebook.com/coalfiresys/','https://www.twitter.com/coalfire','https://www.linkedin.com/company/coalfire/','');
INSERT INTO vendors VALUES('133a5af6-c6d7-4f8a-8405-bc5a89478e68','published','security-journey','Security Journey','https://www.securityjourney.com/','Security Journey (previously HackEDU), delivers secure code training and AppSec education to the entire SDLC team to help build a security-first development culture, improve efficiency, and reduce vulnerabilities. ','40 24th Street ','4th floor','Pittsburgh','PA','USA','4876981c-66f4-4eb4-b820-2e5c0e70c315',replace('<h5>Security Journey</h5>\n<p>\nSecurity Journey (previously HackEDU) delivers secure code training and AppSec education to the entire SDLC team to help build a security-first development culture, improve efficiency, and reduce vulnerabilities.\n<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/SecurityJourney','https://www.linkedin.com/company/security-journey',''); INSERT INTO vendors VALUES('133a5af6-c6d7-4f8a-8405-bc5a89478e68','published','security-journey','Security Journey','https://www.securityjourney.com/','Security Journey (previously HackEDU), delivers secure code training and AppSec education to the entire SDLC team to help build a security-first development culture, improve efficiency, and reduce vulnerabilities. ','40 24th Street ','4th floor','Pittsburgh','PA','USA','4876981c-66f4-4eb4-b820-2e5c0e70c315',replace('<h5>Security Journey</h5>\n<p>\nSecurity Journey (previously HackEDU) delivers secure code training and AppSec education to the entire SDLC team to help build a security-first development culture, improve efficiency, and reduce vulnerabilities.\n<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/SecurityJourney','https://www.linkedin.com/company/security-journey','');
INSERT INTO vendors VALUES('671084ea-50aa-4a83-9617-f1152e202892','published','skopenow','Skopenow','www.skopenow.com','Skopenow helps ORC investigations by giving investigators the ability to analyze the subject''s online content using keyword & object recognition to flag brand mentions & photos of stolen products across third party listings and social media sites.','12 East 49th Street','11th Floor','New York','NY','USA','93c6309c-54b5-49dc-b3ee-7ed0f3419b71',replace('<h5>Skopenow</h5>\n<p>\nSkopenow is an open-source intelligence platform providing situational awareness, people and business intelligence, and link analysis to help organizations identify, monitor, and mitigate potential threats and risks. With a strong focus on information security, Skopenow enables clients to make informed decisions based on real-time data.\nSkopenows turnkey, AI/ML-powered platform is trusted by more than 1,000 customers, including 20% of the Fortune 500 as well as large government and law enforcement agencies.\nFor more information please visit www.skopenow.com or e-mail us at sales@skopenow.com<br>\n</p>\n<h5>Why Skopenow?</h5>\n<p>Skopenows open-source intelligence platform enables organizations to make informed decisions based on real-time data while reducing manual processes, creating time and cost efficiencies.\nGrid, Skopenows situational awareness solution, delivers real-time information and alerts on critical events and incidents that may impact operations.\nWorkbench, Skopenows investigation product, provides comprehensive reports on individuals and companies, including their social media presence and history.\nAdditionally, Skopenow offers a link analysis module that enables organizations to visualize and analyze complex relationships between entities, helping to identify potential vulnerabilities and threats.\nFused together, these fully integrated solutions replace disjointed OSINT tools and legacy techniques. Over 1,000 customers, including 20% of the Fortune 500, trust Skopenow to help them stay ahead of the ever-evolving threat landscape and unlock the power of OSINT.</p>','\n',char(10)),'https://www.facebook.com/skopenow/','https://www.twitter.com/Skopenow','https://www.linkedin.com/company/skopenow',''); INSERT INTO vendors VALUES('671084ea-50aa-4a83-9617-f1152e202892','published','skopenow','Skopenow','www.skopenow.com','Skopenow helps ORC investigations by giving investigators the ability to analyze the subject''s online content using keyword & object recognition to flag brand mentions & photos of stolen products across third party listings and social media sites.','12 East 49th Street','11th Floor','New York','NY','USA','7c8e8300-be7e-4046-a975-d428e1b74b09',replace('<h5>Skopenow</h5>\n<p>\nSkopenow is an open-source intelligence platform providing situational awareness, people and business intelligence, and link analysis to help organizations identify, monitor, and mitigate potential threats and risks. With a strong focus on information security, Skopenow enables clients to make informed decisions based on real-time data.\nSkopenows turnkey, AI/ML-powered platform is trusted by more than 1,000 customers, including 20% of the Fortune 500 as well as large government and law enforcement agencies.\nFor more information please visit www.skopenow.com or e-mail us at sales@skopenow.com<br>\n</p>\n<h5>Why Skopenow?</h5>\n<p>Skopenows open-source intelligence platform enables organizations to make informed decisions based on real-time data while reducing manual processes, creating time and cost efficiencies.\nGrid, Skopenows situational awareness solution, delivers real-time information and alerts on critical events and incidents that may impact operations.\nWorkbench, Skopenows investigation product, provides comprehensive reports on individuals and companies, including their social media presence and history.\nAdditionally, Skopenow offers a link analysis module that enables organizations to visualize and analyze complex relationships between entities, helping to identify potential vulnerabilities and threats.\nFused together, these fully integrated solutions replace disjointed OSINT tools and legacy techniques. Over 1,000 customers, including 20% of the Fortune 500, trust Skopenow to help them stay ahead of the ever-evolving threat landscape and unlock the power of OSINT.</p>','\n',char(10)),'https://www.facebook.com/skopenow/','https://www.twitter.com/Skopenow','https://www.linkedin.com/company/skopenow','');
INSERT INTO vendors VALUES('3fa60e47-d313-47a9-8961-65452243de52','published','riskrecon-a-mastercard-company','RiskRecon, a Mastercard Company','www.riskrecon.com','RiskRecons cybersecurity ratings and assessments make it easy for you to understand and act on your risks, delivering accurate, risk-prioritized action plans custom-tuned to match your risk priorities. ','5241 S. State Street ','Unit 3','Murray','UT','USA','b3444263-06d0-470e-b8ad-069d21ed2635',replace('<h5>RiskRecon, a Mastercard Company</h5>\n<p>\nRiskRecon, a Mastercard Company, enables you to achieve better risk outcomes for your enterprise and your digital supply chain. RiskRecons cybersecurity ratings and assessments make it easy for you to understand and act on your risks, delivering accurate, risk-prioritized action plans custom-tuned to match your risk priorities. Learn more about RiskRecon and request a demo at www.riskrecon.com.<br>\n</p>','\n',char(10)),'https://www.facebook.com/riskrecon/','https://www.twitter.com/riskrecon','https://www.linkedin.com/company/riskrecon',''); INSERT INTO vendors VALUES('3fa60e47-d313-47a9-8961-65452243de52','published','riskrecon-a-mastercard-company','RiskRecon, a Mastercard Company','www.riskrecon.com','RiskRecons cybersecurity ratings and assessments make it easy for you to understand and act on your risks, delivering accurate, risk-prioritized action plans custom-tuned to match your risk priorities. ','5241 S. State Street ','Unit 3','Murray','UT','USA','b3444263-06d0-470e-b8ad-069d21ed2635',replace('<h5>RiskRecon, a Mastercard Company</h5>\n<p>\nRiskRecon, a Mastercard Company, enables you to achieve better risk outcomes for your enterprise and your digital supply chain. RiskRecons cybersecurity ratings and assessments make it easy for you to understand and act on your risks, delivering accurate, risk-prioritized action plans custom-tuned to match your risk priorities. Learn more about RiskRecon and request a demo at www.riskrecon.com.<br>\n</p>','\n',char(10)),'https://www.facebook.com/riskrecon/','https://www.twitter.com/riskrecon','https://www.linkedin.com/company/riskrecon','');
INSERT INTO vendors VALUES('7b48817a-a32d-48f6-a133-d561a7adf29d','published','mitigant-by-resility','Mitigant by Resility','www.mitigant.io','Mitigant is an enterprise cloud security SaaS solution helping organizations to build security, compliance, and cyber-resilience for their public cloud infrastructures (AWS, Azure, GCP, Kubernetes) with a continuous security verification approach. ','August-Bebel-strasse 89','Haus 7','Potsdam',NULL,'DEU','c575ca41-f794-4e44-9dd7-140aa8db8e34',replace('<h5>Mitigant by Resility</h5>\n<p>\nMitigant is an enterprise cloud security SaaS solution helping organizations to build security, compliance, and cyber-resilience for their public cloud infrastructures (AWS, Azure, GCP, Kubernetes) with a continuous security verification approach. <br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/cyber_mitigant','https://linkedin.com/company/mitigant',''); INSERT INTO vendors VALUES('7b48817a-a32d-48f6-a133-d561a7adf29d','published','mitigant-by-resility','Mitigant by Resility','www.mitigant.io','Mitigant is an enterprise cloud security SaaS solution helping organizations to build security, compliance, and cyber-resilience for their public cloud infrastructures (AWS, Azure, GCP, Kubernetes) with a continuous security verification approach. ','August-Bebel-strasse 89','Haus 7','Potsdam',NULL,'DEU','c575ca41-f794-4e44-9dd7-140aa8db8e34',replace('<h5>Mitigant by Resility</h5>\n<p>\nMitigant is an enterprise cloud security SaaS solution helping organizations to build security, compliance, and cyber-resilience for their public cloud infrastructures (AWS, Azure, GCP, Kubernetes) with a continuous security verification approach. <br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/cyber_mitigant','https://linkedin.com/company/mitigant','');
INSERT INTO vendors VALUES('efd377e6-f00b-41de-a48e-1967a7d757c6','published','checkmarx-inc','Checkmarx, Inc.','www.checkmarx.com','Checkmarx offers the most comprehensive AppSec platform, providing unparalleled accuracy, coverage, visibility and guidance to reduce risk across all components of software—including proprietary code, open source, APIs, and Infrastructure as Code.','7000 Central Parkway ','Suite 1045','Atlanta','GA','USA','d77baa47-2e21-4ea7-9c85-d8cc1b58ac7d',replace('<h5>Checkmarx, Inc.</h5>\n<p>\nCheckmarx is the leading application security provider. We empower enterprises to shift everywhere in order to secure every phase of development for every application while simultaneously balancing the dynamic needs of CISOs, security teams, and development teams. Our comprehensive cloud-native platform — Checkmarx OneTM — and extensive services portfolio, provide unparalleled scan accuracy, coverage, visibility, and guidance to prioritize the most impactful vulnerabilities, reduce risk across all components of modern software, and build for the always-evolving technological landscape. We are honored to serve more than 1,800 customers, including 60 percent of Fortune 100 organizations, and are committed to moving forward with an unwavering dedication to the safety and security of our customers and the applications that power our day-to-day lives.\nCheckmarx. Make Shift Happen.\n<br>\n</p>\n<h5>Why Checkmarx, Inc.?</h5>\n<p>Checkmarx OneTM provides the industrys most comprehensive application security platform, helping you shift everywhere with SAST, DAST, SCA, supply chain security, API security, container security, and IaC security on a single platform. Checkmarx enables you to go deep and wide to secure every part of every application, identify vulnerabilities with the highest accuracy, and manage application security risk over time. With the most software development life cycle (SDLC) integrations and broadest programming language support, Checkmarx One offers a seamless developer experience to make it easier and faster to fix security issues.</p>','\n',char(10)),'https://www.facebook.com/Checkmarx.Source.Code.Analysis','https://www.twitter.com/checkmarx','https://www.linkedin.com/company/checkmarx',''); INSERT INTO vendors VALUES('efd377e6-f00b-41de-a48e-1967a7d757c6','published','checkmarx-inc','Checkmarx, Inc.','www.checkmarx.com','Checkmarx offers the most comprehensive AppSec platform, providing unparalleled accuracy, coverage, visibility and guidance to reduce risk across all components of software—including proprietary code, open source, APIs, and Infrastructure as Code.','7000 Central Parkway ','Suite 1045','Atlanta','GA','USA','d77baa47-2e21-4ea7-9c85-d8cc1b58ac7d',replace('<h5>Checkmarx, Inc.</h5>\n<p>\nCheckmarx is the leading application security provider. We empower enterprises to shift everywhere in order to secure every phase of development for every application while simultaneously balancing the dynamic needs of CISOs, security teams, and development teams. Our comprehensive cloud-native platform — Checkmarx OneTM — and extensive services portfolio, provide unparalleled scan accuracy, coverage, visibility, and guidance to prioritize the most impactful vulnerabilities, reduce risk across all components of modern software, and build for the always-evolving technological landscape. We are honored to serve more than 1,800 customers, including 60 percent of Fortune 100 organizations, and are committed to moving forward with an unwavering dedication to the safety and security of our customers and the applications that power our day-to-day lives.\nCheckmarx. Make Shift Happen.\n<br>\n</p>\n<h5>Why Checkmarx, Inc.?</h5>\n<p>Checkmarx OneTM provides the industrys most comprehensive application security platform, helping you shift everywhere with SAST, DAST, SCA, supply chain security, API security, container security, and IaC security on a single platform. Checkmarx enables you to go deep and wide to secure every part of every application, identify vulnerabilities with the highest accuracy, and manage application security risk over time. With the most software development life cycle (SDLC) integrations and broadest programming language support, Checkmarx One offers a seamless developer experience to make it easier and faster to fix security issues.</p>','\n',char(10)),'https://www.facebook.com/Checkmarx.Source.Code.Analysis','https://www.twitter.com/checkmarx','https://www.linkedin.com/company/checkmarx','');
@@ -3138,7 +3136,7 @@ INSERT INTO vendors VALUES('9ad65660-aa16-41a6-9aa1-78a12faf291a','published','i
INSERT INTO vendors VALUES('58c246f1-55ef-4a2f-9c8a-6c5e7c358984','published','elastic','Elastic','www.elastic.co','Elastic modernizes SecOps by unifying SIEM, endpoint security, and cloud security capabilities so you can protect, detect, and respond to complex attacks. Get a limitless view of your data across cloud and on-prem. Eliminate blindspots, automate threat detection, and streamline investigation and response. All at scale with Elastic Security.','800 W El Camino Real ','Suite 350','Mountain View','CA','USA','2cb9426d-4710-4e87-b2a1-ecddaca9d6b9',replace('<h5>Elastic</h5>\n<p>\nElastic modernizes SecOps by unifying SIEM, endpoint security, and cloud security capabilities so you can protect, detect, and respond to complex attacks. Get a limitless view of your data across cloud and on-prem. Eliminate blindspots, automate threat detection, and streamline investigation and response. All at scale with Elastic Security.<br>\n</p>','\n',char(10)),'https://www.facebook.com/elastic.co/','https://www.twitter.com/elastic','https://www.linkedin.com/elastic',''); INSERT INTO vendors VALUES('58c246f1-55ef-4a2f-9c8a-6c5e7c358984','published','elastic','Elastic','www.elastic.co','Elastic modernizes SecOps by unifying SIEM, endpoint security, and cloud security capabilities so you can protect, detect, and respond to complex attacks. Get a limitless view of your data across cloud and on-prem. Eliminate blindspots, automate threat detection, and streamline investigation and response. All at scale with Elastic Security.','800 W El Camino Real ','Suite 350','Mountain View','CA','USA','2cb9426d-4710-4e87-b2a1-ecddaca9d6b9',replace('<h5>Elastic</h5>\n<p>\nElastic modernizes SecOps by unifying SIEM, endpoint security, and cloud security capabilities so you can protect, detect, and respond to complex attacks. Get a limitless view of your data across cloud and on-prem. Eliminate blindspots, automate threat detection, and streamline investigation and response. All at scale with Elastic Security.<br>\n</p>','\n',char(10)),'https://www.facebook.com/elastic.co/','https://www.twitter.com/elastic','https://www.linkedin.com/elastic','');
INSERT INTO vendors VALUES('4a06a364-3817-4211-a5e2-bb4b0e02d5ed','published','expel','Expel','https://expel.com/','Expel''s security operations platform and people work together to make sense of security signals to detect, understand, and fix issues fast - minimizing risk. We offer managed detection and response (MDR), remediation, phishing, and threat hunting. ','12950 Worldgate Drive','Suite 200','Herndon','VA','USA','45cc82f9-37f6-480c-99c2-e087d3ef5467',replace('<h5>Expel</h5>\n<p>\nExpel helps companies of all shapes and sizes minimize business risk. Our technology and people work together to make sense of security signals — with your business in mind — to detect, understand, and fix issues fast. Expel offers managed detection and response (MDR), phishing, and threat hunting. Our “BYO-tech” approach and API integrations get you up and running within hours. You can choose to protect everything cloud infrastructure, on-prem infrastructure, SaaS apps or just what you need. This unique MDR approach includes extended detection and response (XDR) capabilities to give you a full picture across your security and business applications. With our SOC analysts chasing down your alerts and responding to incidents 24x7, your team can focus on advancing security strategies unique to your business. For more information, visit our&nbsp;website, check out our&nbsp;blog, or follow us on&nbsp;LinkedIn&nbsp;or&nbsp;Twitter.<br>\n</p>\n<h5>Why Expel?</h5>\n<p>Expel helps organizations of all shapes and sizes manage business risk. Our detection and response technology, people, and expertise enable us to provide businesses with security that makes sense.\nWe deliver clear answers and advice to quickly and proactively identify and remediate vulnerabilities and threats. Fueled by Expel Workbench™, our security operations platform, Expels managed security products transparently thwart attackers and breaches. Expel gives organizations the confidence that their businesses are secure, their security investments are working, and their teams are focused on business priorities, instead of alerts.\nWhether youre cloud-native or migrating to the cloud, our technology and people work together each doing what they do best to make security easy to understand, easy to use, and easy to continuously improve. And, we take you along for the ride with full visibility into everything we do.</p>','\n',char(10)),NULL,'https://www.twitter.com/ExpelSecurity','https://www.linkedin.com/company/expel ',''); INSERT INTO vendors VALUES('4a06a364-3817-4211-a5e2-bb4b0e02d5ed','published','expel','Expel','https://expel.com/','Expel''s security operations platform and people work together to make sense of security signals to detect, understand, and fix issues fast - minimizing risk. We offer managed detection and response (MDR), remediation, phishing, and threat hunting. ','12950 Worldgate Drive','Suite 200','Herndon','VA','USA','45cc82f9-37f6-480c-99c2-e087d3ef5467',replace('<h5>Expel</h5>\n<p>\nExpel helps companies of all shapes and sizes minimize business risk. Our technology and people work together to make sense of security signals — with your business in mind — to detect, understand, and fix issues fast. Expel offers managed detection and response (MDR), phishing, and threat hunting. Our “BYO-tech” approach and API integrations get you up and running within hours. You can choose to protect everything cloud infrastructure, on-prem infrastructure, SaaS apps or just what you need. This unique MDR approach includes extended detection and response (XDR) capabilities to give you a full picture across your security and business applications. With our SOC analysts chasing down your alerts and responding to incidents 24x7, your team can focus on advancing security strategies unique to your business. For more information, visit our&nbsp;website, check out our&nbsp;blog, or follow us on&nbsp;LinkedIn&nbsp;or&nbsp;Twitter.<br>\n</p>\n<h5>Why Expel?</h5>\n<p>Expel helps organizations of all shapes and sizes manage business risk. Our detection and response technology, people, and expertise enable us to provide businesses with security that makes sense.\nWe deliver clear answers and advice to quickly and proactively identify and remediate vulnerabilities and threats. Fueled by Expel Workbench™, our security operations platform, Expels managed security products transparently thwart attackers and breaches. Expel gives organizations the confidence that their businesses are secure, their security investments are working, and their teams are focused on business priorities, instead of alerts.\nWhether youre cloud-native or migrating to the cloud, our technology and people work together each doing what they do best to make security easy to understand, easy to use, and easy to continuously improve. And, we take you along for the ride with full visibility into everything we do.</p>','\n',char(10)),NULL,'https://www.twitter.com/ExpelSecurity','https://www.linkedin.com/company/expel ','');
INSERT INTO vendors VALUES('b95e9637-a5c7-4b3c-a16a-778d4164671f','published','esentire','eSentire','www.esentire.com','eSentire is the Authority in Managed Detection and Response. With XDR, 24/7 threat hunting and SOC, we disrupt threats before they impact your business.','451 Phillip St.','Suite 135','Waterloo','ON','CAN','94018011-6d31-40ae-83f7-3b9754b15360',replace('<h5>eSentire</h5>\n<p>\neSentire, Inc. is the Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations in 80+ countries, representing 35 industries from known and unknown cyber threats. Founded in 2001, the company''s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts, Elite Threat Hunters, and industry-leading threat intelligence research from eSentire''s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response services. For more information, visit www.esentire.com and follow @eSentire.<br>\n</p>\n<h5>Why eSentire?</h5>\n<p>Our cybersecurity services portfolio is designed to stop breaches, simplify security and minimize business risk.\n- Exposure Management: Strategic services including Managed Vulnerability Assessments, vCISO and Managed Phishing &amp; Security Awareness Training to identify gaps, build defensive strategies, operationalize risk mitigation and continuously advance your security program.\n- Managed Detection &amp; Response: We deliver Response + Remediation you can trust. By combining our cutting-edge XDR platform, 24/7 SOC support, around the clock threat hunting and security operations leadership, we hunt and stop known &amp; unknown threats before they disrupt your business.\n- Digital Forensics &amp; Incident Response: Battle-tested Incident Commander level expertise, crime scene reconstruction and digital forensics investigations that can bear scrutiny in a court of law. The worlds fastest threat suppression guarantee with a 4-hour SLA available with our IR Retainer.</p>','\n',char(10)),NULL,'https://www.twitter.com/eSentire','https://ca.linkedin.com/company/esentire-inc-',''); INSERT INTO vendors VALUES('b95e9637-a5c7-4b3c-a16a-778d4164671f','published','esentire','eSentire','www.esentire.com','eSentire is the Authority in Managed Detection and Response. With XDR, 24/7 threat hunting and SOC, we disrupt threats before they impact your business.','451 Phillip St.','Suite 135','Waterloo','ON','CAN','94018011-6d31-40ae-83f7-3b9754b15360',replace('<h5>eSentire</h5>\n<p>\neSentire, Inc. is the Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations in 80+ countries, representing 35 industries from known and unknown cyber threats. Founded in 2001, the company''s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts, Elite Threat Hunters, and industry-leading threat intelligence research from eSentire''s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response services. For more information, visit www.esentire.com and follow @eSentire.<br>\n</p>\n<h5>Why eSentire?</h5>\n<p>Our cybersecurity services portfolio is designed to stop breaches, simplify security and minimize business risk.\n- Exposure Management: Strategic services including Managed Vulnerability Assessments, vCISO and Managed Phishing &amp; Security Awareness Training to identify gaps, build defensive strategies, operationalize risk mitigation and continuously advance your security program.\n- Managed Detection &amp; Response: We deliver Response + Remediation you can trust. By combining our cutting-edge XDR platform, 24/7 SOC support, around the clock threat hunting and security operations leadership, we hunt and stop known &amp; unknown threats before they disrupt your business.\n- Digital Forensics &amp; Incident Response: Battle-tested Incident Commander level expertise, crime scene reconstruction and digital forensics investigations that can bear scrutiny in a court of law. The worlds fastest threat suppression guarantee with a 4-hour SLA available with our IR Retainer.</p>','\n',char(10)),NULL,'https://www.twitter.com/eSentire','https://ca.linkedin.com/company/esentire-inc-','');
INSERT INTO vendors VALUES('dd54ba33-5af4-4f8b-80d9-9f9a74ed6a7b','published','eclypsium','Eclypsium','https://www.eclypsium.com','Eclypsiums cloud-based platform provides digital supply chain security for critical hardware, firmware and software. Eclypsium defends enterprises from the deep implants and exploits that have become the vector of choice for modern adversaries.','920 SW 6th Avenue','Suite 375','Portland','OR','USA',NULL,replace('<h5>Eclypsium</h5>\n<p>\nEclypsiums cloud-based platform provides digital supply chain security for critical hardware, firmware and software. Eclypsium defends enterprises and government agencies from the deep implants and exploits that have become the vector of choice for modern adversaries. For more information, visit eclypsium.com.<br>\n</p>','\n',char(10)),'https://www.facebook.com/Eclypsium/','https://www.twitter.com/eclypsium','https://www.linkedin.com/company/eclypsium/',''); INSERT INTO vendors VALUES('dd54ba33-5af4-4f8b-80d9-9f9a74ed6a7b','published','eclypsium','Eclypsium','https://www.eclypsium.com','Eclypsiums cloud-based platform provides digital supply chain security for critical hardware, firmware and software. Eclypsium defends enterprises from the deep implants and exploits that have become the vector of choice for modern adversaries.','920 SW 6th Avenue','Suite 375','Portland','OR','USA','0023b5d9-cc11-45e0-8e10-d2d012f03f67',replace('<h5>Eclypsium</h5>\n<p>\nEclypsiums cloud-based platform provides digital supply chain security for critical hardware, firmware and software. Eclypsium defends enterprises and government agencies from the deep implants and exploits that have become the vector of choice for modern adversaries. For more information, visit eclypsium.com.<br>\n</p>','\n',char(10)),'https://www.facebook.com/Eclypsium/','https://www.twitter.com/eclypsium','https://www.linkedin.com/company/eclypsium/','');
INSERT INTO vendors VALUES('a148d6ee-a39f-45ee-bfbc-62e4c206fbf2','published','think-cyber-security-ltd','Think Cyber Security Ltd.','thinkcyber.co.uk','ThinkCyber deliver secure behaviour change for their customers. Their award-winning Redflags™ software applies behavioural science theory to uniquely deliver real-time, context-aware, on-device security interventions and nudges at the point of risk.','20-22 Wenlock Road',NULL,'London',NULL,'GBR','ad440e2a-f239-48bf-ab39-2fd2a2d8de9d',replace('<h5>Think Cyber Security Ltd.</h5>\n<p>\nThink Cyber Security deliver measurable secure behaviour change for their customers.\nThe companys multi-award winning Redflags™ Real-time Security Awareness product applies behavioural and learning science theory to deliver context-sensitive, just-in-time guidance. For example, when users are about to click links, visit certain web pages, enter their username into a web page, handle attachments, etc.\nRedflags™ offers the toolkit organisations need to: manage operational risk from cyber-attacks directed at staff; meet compliance goals; keep content refreshed and relevant; target specific behaviours and users; all whilst allowing staff to get on with their jobs, to achieve business goals.\n<br>\n</p>\n<h5>Why Think Cyber Security Ltd.?</h5>\n<p>ThinkCyber deliver measurable, secure behaviour change for their customers. When 90% of cyber-attacks start with the human user, and technical controls can never be 100%, organisations need their staff to be the last line of defence. ThinkCyber have applied the theory and evidence of behavioural science in their multi-award winning Redflags® product to uniquely deliver real-time, context aware-guidance at the point the user is at risk. Short, actionable and highly relevant content educates the user. Gentle and timely “nudges” strengthen behaviours, reduce risk and offer security teams visibility.\nFull metrics on and measurement of engagement offer unique insights. Weve seen engagement levels with Redflags® at 80-90%, halved click rates in just three months, doubled phishing reporting rates and allowed our clients to reach people and behaviours other awareness simply cannot reach.\nThinkCyber dont just train staff, they change their behaviours.\n</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/think-cyber-security-ltd',''); INSERT INTO vendors VALUES('a148d6ee-a39f-45ee-bfbc-62e4c206fbf2','published','think-cyber-security-ltd','Think Cyber Security Ltd.','thinkcyber.co.uk','ThinkCyber deliver secure behaviour change for their customers. Their award-winning Redflags™ software applies behavioural science theory to uniquely deliver real-time, context-aware, on-device security interventions and nudges at the point of risk.','20-22 Wenlock Road',NULL,'London',NULL,'GBR','ad440e2a-f239-48bf-ab39-2fd2a2d8de9d',replace('<h5>Think Cyber Security Ltd.</h5>\n<p>\nThink Cyber Security deliver measurable secure behaviour change for their customers.\nThe companys multi-award winning Redflags™ Real-time Security Awareness product applies behavioural and learning science theory to deliver context-sensitive, just-in-time guidance. For example, when users are about to click links, visit certain web pages, enter their username into a web page, handle attachments, etc.\nRedflags™ offers the toolkit organisations need to: manage operational risk from cyber-attacks directed at staff; meet compliance goals; keep content refreshed and relevant; target specific behaviours and users; all whilst allowing staff to get on with their jobs, to achieve business goals.\n<br>\n</p>\n<h5>Why Think Cyber Security Ltd.?</h5>\n<p>ThinkCyber deliver measurable, secure behaviour change for their customers. When 90% of cyber-attacks start with the human user, and technical controls can never be 100%, organisations need their staff to be the last line of defence. ThinkCyber have applied the theory and evidence of behavioural science in their multi-award winning Redflags® product to uniquely deliver real-time, context aware-guidance at the point the user is at risk. Short, actionable and highly relevant content educates the user. Gentle and timely “nudges” strengthen behaviours, reduce risk and offer security teams visibility.\nFull metrics on and measurement of engagement offer unique insights. Weve seen engagement levels with Redflags® at 80-90%, halved click rates in just three months, doubled phishing reporting rates and allowed our clients to reach people and behaviours other awareness simply cannot reach.\nThinkCyber dont just train staff, they change their behaviours.\n</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/think-cyber-security-ltd','');
INSERT INTO vendors VALUES('070691f1-e3fd-44d5-9bb9-92d7875b1731','published','techtarget','TechTarget','https://www.techtarget.com/searchsecurity/',NULL,'275 Grove Street',NULL,'Newton','MA','USA','d6e3eddf-1129-45c3-a37c-76cc5fe9c0c4',replace('<h5>TechTarget</h5>\n<p>\nTechTarget helps tech companies achieve sustainable pipeline impact and operates the worlds largest online enterprise tech communities serving every major enterprise tech market. <br>\n</p>','\n',char(10)),'https://www.facebook.com/techtargetinc/','https://www.twitter.com/techtarget','https://www.linkedin.com/company/techtarget',''); INSERT INTO vendors VALUES('070691f1-e3fd-44d5-9bb9-92d7875b1731','published','techtarget','TechTarget','https://www.techtarget.com/searchsecurity/',NULL,'275 Grove Street',NULL,'Newton','MA','USA','d6e3eddf-1129-45c3-a37c-76cc5fe9c0c4',replace('<h5>TechTarget</h5>\n<p>\nTechTarget helps tech companies achieve sustainable pipeline impact and operates the worlds largest online enterprise tech communities serving every major enterprise tech market. <br>\n</p>','\n',char(10)),'https://www.facebook.com/techtargetinc/','https://www.twitter.com/techtarget','https://www.linkedin.com/company/techtarget','');
INSERT INTO vendors VALUES('1a0bf553-3a5c-434f-b019-550f4c592294','published','threatconnect','ThreatConnect','https://threatconnect.com/','ThreatConnects market leading, cloud-native solutions enables threat intelligence operations, security operations, and cyber risk management teams to work together for more efficient, effective, and collaborative cyber defense and protection.','3865 Wilson Blvd. ','Suite 550','Arlington','VA','USA','fb32ebc2-5b97-4ffb-ba08-63d70daa91ba',replace('<h5>ThreatConnect</h5>\n<p>\nThreatConnect enables threat intelligence operations, security operations, and cyber risk management teams to work together for more effective, efficient, and collaborative cyber defense and protection. With ThreatConnect, organizations infuse ML and AI-powered threat intel and cyber risk quantification into their work, allowing them to orchestrate and automate processes to get the necessary insights, and respond faster and more confidently than ever before. More than 200 enterprises and thousands of security operations professionals rely on ThreatConnect every day to protect their organizations'' most critical assets.<br>\n</p>\n<h5>Why ThreatConnect?</h5>\n<p>ThreatConnects market leading, cloud-native solutions enables threat intelligence operations, security operations, and cyber risk management teams to work together for more efficient, effective, and collaborative cyber defense and protection. With ThreatConnect, organizations infuse threat intelligence and cyber risk quantification into their work, allowing them to orchestrate and automate processes to get the necessary insights, and respond faster and more confidently than ever before.</p>','\n',char(10)),'https://www.facebook.com/ThreatConnect/','https://www.twitter.com/threatconnect','https://www.linkedin.com/company/threatconnect-inc/',''); INSERT INTO vendors VALUES('1a0bf553-3a5c-434f-b019-550f4c592294','published','threatconnect','ThreatConnect','https://threatconnect.com/','ThreatConnects market leading, cloud-native solutions enables threat intelligence operations, security operations, and cyber risk management teams to work together for more efficient, effective, and collaborative cyber defense and protection.','3865 Wilson Blvd. ','Suite 550','Arlington','VA','USA','fb32ebc2-5b97-4ffb-ba08-63d70daa91ba',replace('<h5>ThreatConnect</h5>\n<p>\nThreatConnect enables threat intelligence operations, security operations, and cyber risk management teams to work together for more effective, efficient, and collaborative cyber defense and protection. With ThreatConnect, organizations infuse ML and AI-powered threat intel and cyber risk quantification into their work, allowing them to orchestrate and automate processes to get the necessary insights, and respond faster and more confidently than ever before. More than 200 enterprises and thousands of security operations professionals rely on ThreatConnect every day to protect their organizations'' most critical assets.<br>\n</p>\n<h5>Why ThreatConnect?</h5>\n<p>ThreatConnects market leading, cloud-native solutions enables threat intelligence operations, security operations, and cyber risk management teams to work together for more efficient, effective, and collaborative cyber defense and protection. With ThreatConnect, organizations infuse threat intelligence and cyber risk quantification into their work, allowing them to orchestrate and automate processes to get the necessary insights, and respond faster and more confidently than ever before.</p>','\n',char(10)),'https://www.facebook.com/ThreatConnect/','https://www.twitter.com/threatconnect','https://www.linkedin.com/company/threatconnect-inc/','');