2271 lines
1.2 MiB
2271 lines
1.2 MiB
PRAGMA foreign_keys=OFF;
|
||
BEGIN TRANSACTION;
|
||
CREATE TABLE `directus_migrations` (`version` varchar(255) not null, `name` varchar(255) not null, `timestamp` datetime default CURRENT_TIMESTAMP, primary key (`version`));
|
||
INSERT INTO directus_migrations VALUES('20201028A','Remove Collection Foreign Keys','2023-06-09 14:51:48');
|
||
INSERT INTO directus_migrations VALUES('20201029A','Remove System Relations','2023-06-09 14:51:48');
|
||
INSERT INTO directus_migrations VALUES('20201029B','Remove System Collections','2023-06-09 14:51:48');
|
||
INSERT INTO directus_migrations VALUES('20201029C','Remove System Fields','2023-06-09 14:51:48');
|
||
INSERT INTO directus_migrations VALUES('20201105A','Add Cascade System Relations','2023-06-09 14:51:49');
|
||
INSERT INTO directus_migrations VALUES('20201105B','Change Webhook URL Type','2023-06-09 14:51:49');
|
||
INSERT INTO directus_migrations VALUES('20210225A','Add Relations Sort Field','2023-06-09 14:51:49');
|
||
INSERT INTO directus_migrations VALUES('20210304A','Remove Locked Fields','2023-06-09 14:51:49');
|
||
INSERT INTO directus_migrations VALUES('20210312A','Webhooks Collections Text','2023-06-09 14:51:49');
|
||
INSERT INTO directus_migrations VALUES('20210331A','Add Refresh Interval','2023-06-09 14:51:49');
|
||
INSERT INTO directus_migrations VALUES('20210415A','Make Filesize Nullable','2023-06-09 14:51:49');
|
||
INSERT INTO directus_migrations VALUES('20210416A','Add Collections Accountability','2023-06-09 14:51:49');
|
||
INSERT INTO directus_migrations VALUES('20210422A','Remove Files Interface','2023-06-09 14:51:49');
|
||
INSERT INTO directus_migrations VALUES('20210506A','Rename Interfaces','2023-06-09 14:51:49');
|
||
INSERT INTO directus_migrations VALUES('20210510A','Restructure Relations','2023-06-09 14:51:49');
|
||
INSERT INTO directus_migrations VALUES('20210518A','Add Foreign Key Constraints','2023-06-09 14:51:49');
|
||
INSERT INTO directus_migrations VALUES('20210519A','Add System Fk Triggers','2023-06-09 14:51:49');
|
||
INSERT INTO directus_migrations VALUES('20210521A','Add Collections Icon Color','2023-06-09 14:51:49');
|
||
INSERT INTO directus_migrations VALUES('20210525A','Add Insights','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20210608A','Add Deep Clone Config','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20210626A','Change Filesize Bigint','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20210716A','Add Conditions to Fields','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20210721A','Add Default Folder','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20210802A','Replace Groups','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20210803A','Add Required to Fields','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20210805A','Update Groups','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20210805B','Change Image Metadata Structure','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20210811A','Add Geometry Config','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20210831A','Remove Limit Column','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20210903A','Add Auth Provider','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20210907A','Webhooks Collections Not Null','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20210910A','Move Module Setup','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20210920A','Webhooks URL Not Null','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20210924A','Add Collection Organization','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20210927A','Replace Fields Group','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20210927B','Replace M2M Interface','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20210929A','Rename Login Action','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20211007A','Update Presets','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20211009A','Add Auth Data','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20211016A','Add Webhook Headers','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20211103A','Set Unique to User Token','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20211103B','Update Special Geometry','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20211104A','Remove Collections Listing','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20211118A','Add Notifications','2023-06-09 14:51:50');
|
||
INSERT INTO directus_migrations VALUES('20211211A','Add Shares','2023-06-09 14:51:51');
|
||
INSERT INTO directus_migrations VALUES('20211230A','Add Project Descriptor','2023-06-09 14:51:51');
|
||
INSERT INTO directus_migrations VALUES('20220303A','Remove Default Project Color','2023-06-09 14:51:51');
|
||
INSERT INTO directus_migrations VALUES('20220308A','Add Bookmark Icon and Color','2023-06-09 14:51:51');
|
||
INSERT INTO directus_migrations VALUES('20220314A','Add Translation Strings','2023-06-09 14:51:51');
|
||
INSERT INTO directus_migrations VALUES('20220322A','Rename Field Typecast Flags','2023-06-09 14:51:51');
|
||
INSERT INTO directus_migrations VALUES('20220323A','Add Field Validation','2023-06-09 14:51:51');
|
||
INSERT INTO directus_migrations VALUES('20220325A','Fix Typecast Flags','2023-06-09 14:51:51');
|
||
INSERT INTO directus_migrations VALUES('20220325B','Add Default Language','2023-06-09 14:51:51');
|
||
INSERT INTO directus_migrations VALUES('20220402A','Remove Default Value Panel Icon','2023-06-09 14:51:51');
|
||
INSERT INTO directus_migrations VALUES('20220429A','Add Flows','2023-06-09 14:51:51');
|
||
INSERT INTO directus_migrations VALUES('20220429B','Add Color to Insights Icon','2023-06-09 14:51:51');
|
||
INSERT INTO directus_migrations VALUES('20220429C','Drop Non Null From IP of Activity','2023-06-09 14:51:51');
|
||
INSERT INTO directus_migrations VALUES('20220429D','Drop Non Null From Sender of Notifications','2023-06-09 14:51:51');
|
||
INSERT INTO directus_migrations VALUES('20220614A','Rename Hook Trigger to Event','2023-06-09 14:51:51');
|
||
INSERT INTO directus_migrations VALUES('20220801A','Update Notifications Timestamp Column','2023-06-09 14:51:51');
|
||
INSERT INTO directus_migrations VALUES('20220802A','Add Custom Aspect Ratios','2023-06-09 14:51:51');
|
||
INSERT INTO directus_migrations VALUES('20220826A','Add Origin to Accountability','2023-06-09 14:51:51');
|
||
INSERT INTO directus_migrations VALUES('20230401A','Update Material Icons','2023-06-09 14:51:51');
|
||
INSERT INTO directus_migrations VALUES('20230525A','Add Preview Settings','2023-06-09 14:51:51');
|
||
INSERT INTO directus_migrations VALUES('20230526A','Migrate Translation Strings','2023-06-09 14:51:51');
|
||
CREATE TABLE IF NOT EXISTS "directus_folders" (`id` char(36) NOT NULL, `name` varchar(255) NOT NULL, `parent` char(36), PRIMARY KEY (`id`), FOREIGN KEY (`parent`) REFERENCES `directus_folders` (`id`));
|
||
INSERT INTO directus_folders VALUES('4fe3c63a-cbec-4e7a-af2d-2ba454720476','pages',NULL);
|
||
INSERT INTO directus_folders VALUES('7c256639-be0b-4aac-9b41-e0d65635d92d','vendors',NULL);
|
||
CREATE TABLE IF NOT EXISTS "directus_relations" (`id` integer PRIMARY KEY AUTOINCREMENT NOT NULL, `many_collection` varchar(64) NOT NULL, `many_field` varchar(64) NOT NULL, `one_collection` varchar(64), `one_field` varchar(64), `one_collection_field` varchar(64), `one_allowed_collections` text, `junction_field` varchar(64), `sort_field` varchar(64), `one_deselect_action` varchar(255) NOT NULL DEFAULT 'nullify');
|
||
INSERT INTO directus_relations VALUES(1,'categories','parent_id','categories','subcategories',NULL,NULL,NULL,NULL,'nullify');
|
||
INSERT INTO directus_relations VALUES(8,'vendors_categories','categories_id','categories','vendors',NULL,NULL,'vendors_id',NULL,'nullify');
|
||
INSERT INTO directus_relations VALUES(9,'vendors_categories','vendors_id','vendors','categories',NULL,NULL,'categories_id',NULL,'nullify');
|
||
INSERT INTO directus_relations VALUES(10,'menus_menu_items','menu_items_id','menu_items',NULL,NULL,NULL,'menus_id',NULL,'nullify');
|
||
INSERT INTO directus_relations VALUES(11,'menus_menu_items','menus_id','menus','menus_menu_items',NULL,NULL,'menu_items_id','sort','nullify');
|
||
INSERT INTO directus_relations VALUES(12,'vendors','logo','directus_files',NULL,NULL,NULL,NULL,NULL,'nullify');
|
||
INSERT INTO directus_relations VALUES(13,'vendors_files','directus_files_id','directus_files',NULL,NULL,NULL,'vendors_id',NULL,'nullify');
|
||
INSERT INTO directus_relations VALUES(14,'vendors_files','vendors_id','vendors','files',NULL,NULL,'directus_files_id',NULL,'nullify');
|
||
INSERT INTO directus_relations VALUES(15,'vendors_files_1','directus_files_id','directus_files',NULL,NULL,NULL,'vendors_id',NULL,'nullify');
|
||
INSERT INTO directus_relations VALUES(16,'vendors_files_1','vendors_id','vendors','videos',NULL,NULL,'directus_files_id',NULL,'nullify');
|
||
CREATE TABLE IF NOT EXISTS "directus_revisions" (`id` integer PRIMARY KEY AUTOINCREMENT NOT NULL, `activity` integer NOT NULL, `collection` varchar(64) NOT NULL, `item` varchar(255) NOT NULL, `data` json, `delta` json, `parent` integer, FOREIGN KEY (`parent`) REFERENCES `directus_revisions` (`id`), FOREIGN KEY (`activity`) REFERENCES `directus_activity` (`id`) ON DELETE CASCADE);
|
||
CREATE TABLE `directus_dashboards` (`id` char(36) not null, `name` varchar(255) not null, `icon` varchar(30) not null default 'dashboard', `note` text, `date_created` datetime default CURRENT_TIMESTAMP, `user_created` char(36), `color` varchar(255) null, foreign key(`user_created`) references `directus_users`(`id`) on delete SET NULL, primary key (`id`));
|
||
CREATE TABLE IF NOT EXISTS "directus_files" (`id` char(36) NOT NULL, `storage` varchar(255) NOT NULL, `filename_disk` varchar(255), `filename_download` varchar(255) NOT NULL, `title` varchar(255), `type` varchar(255), `folder` char(36), `uploaded_by` char(36), `uploaded_on` datetime NOT NULL DEFAULT CURRENT_TIMESTAMP, `modified_by` char(36), `modified_on` datetime NOT NULL DEFAULT CURRENT_TIMESTAMP, `charset` varchar(50), `filesize` bigint DEFAULT null, `width` integer, `height` integer, `duration` integer, `embed` varchar(200), `description` text, `location` text, `tags` text, `metadata` json, PRIMARY KEY (`id`), FOREIGN KEY (`uploaded_by`) REFERENCES `directus_users` (`id`), FOREIGN KEY (`modified_by`) REFERENCES `directus_users` (`id`), FOREIGN KEY (`folder`) REFERENCES `directus_folders` (`id`) ON DELETE SET NULL);
|
||
INSERT INTO directus_files VALUES('df412b65-c97e-474b-a46a-fe7bc2b85223','local','df412b65-c97e-474b-a46a-fe7bc2b85223.png','0pass-logo.png','0pass logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:47:42',NULL,1688744862624,NULL,12346,760,282,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('0277a8ea-45bc-4841-b852-ab5196b85ddf','local','0277a8ea-45bc-4841-b852-ab5196b85ddf.png','1password-logo.png','1password logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:47:45',NULL,1688744865755,NULL,15892,908,174,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('811d6581-e1f5-44f6-a8d2-569a840aa3c5','local','811d6581-e1f5-44f6-a8d2-569a840aa3c5.png','abacode-cybersecurity-and-compliance-logo.png','abacode-cybersecurity-and-compliance logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:47:48',NULL,1688744868338,NULL,95138,3004,958,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f4d0842e-82ad-42de-b9fa-bbbf04792b01','local','f4d0842e-82ad-42de-b9fa-bbbf04792b01.png','abnormal-security-logo.png','abnormal-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:47:54',NULL,1688744874083,NULL,5370,400,200,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('20efe404-f3dd-4340-be5b-1861e5e52308','local','20efe404-f3dd-4340-be5b-1861e5e52308.JPG','accedian-logo.JPG','accedian logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:47:56',NULL,1688744876525,NULL,19852,616,134,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d61d5e04-f735-4a53-8cac-0d6cc48eb4f6','local','d61d5e04-f735-4a53-8cac-0d6cc48eb4f6.png','aci-learning-logo.png','aci-learning logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:48:13',NULL,1688744893949,NULL,6876,254,252,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('c2a30a42-96ea-426f-aa01-ace4115f550a','local','c2a30a42-96ea-426f-aa01-ace4115f550a.jpg','acronis-logo.jpg','acronis logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:48:16',NULL,1688744896700,NULL,684948,1001,372,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('0a6ac87e-dfc8-4e3c-bc03-1772da1bbd01','local','0a6ac87e-dfc8-4e3c-bc03-1772da1bbd01.jpg','adaptiva-logo.jpg','adaptiva logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:48:19',NULL,1688744899267,NULL,45819,1561,364,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('a5c32044-e573-45b6-8718-24f9df5c43ba','local','a5c32044-e573-45b6-8718-24f9df5c43ba.png','adaptive-shield-logo.png','adaptive-shield logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:48:21',NULL,1688744901938,NULL,21527,1435,555,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('df8b80d7-399f-4081-9b48-3bb6d3754b54','local','df8b80d7-399f-4081-9b48-3bb6d3754b54.jpg','adlumin-inc-logo.jpg','adlumin-inc logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:48:30',NULL,1688744910343,NULL,44554,500,91,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('845342d3-6ead-477c-8d35-c8054040a7d7','local','845342d3-6ead-477c-8d35-c8054040a7d7.png','aewin-tech-inc-logo.png','aewin-tech-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:48:33',NULL,1688744913193,NULL,5438,363,139,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('e64273e1-5ae3-4a7f-badd-2fc35754b2cd','local','e64273e1-5ae3-4a7f-badd-2fc35754b2cd.png','afero-logo.png','afero logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:48:36',NULL,1688744916482,NULL,3964,353,143,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('e62fc40e-f52a-4d5a-80a2-1f59f20633ad','local','e62fc40e-f52a-4d5a-80a2-1f59f20633ad.png','aic-inc-logo.png','aic-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:48:41',NULL,1688744921729,NULL,8781,500,271,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('5b1b2890-48a1-43a4-973a-8fbf31f1e810','local','5b1b2890-48a1-43a4-973a-8fbf31f1e810.png','aioncloud-logo.png','aioncloud logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:48:44',NULL,1688744924626,NULL,5558,500,107,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('2d0396b0-f531-4fe4-8591-0d5a0804bce6','local','2d0396b0-f531-4fe4-8591-0d5a0804bce6.png','akamai-logo.png','akamai logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:48:47',NULL,1688744927531,NULL,4929,352,143,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f63326cd-153f-49f7-a40e-92a1dc3d6704','local','f63326cd-153f-49f7-a40e-92a1dc3d6704.png','akeyless-logo.png','akeyless logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:48:58',NULL,1688744939000,NULL,6431,600,82,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('ce8b35f9-88b6-4aa1-8912-142a0f845afb','local','ce8b35f9-88b6-4aa1-8912-142a0f845afb.png','algosec-logo.png','algosec logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:49:00',NULL,1688744940634,NULL,21046,1340,272,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('5a50adde-5b55-443a-bd56-fb6ec0233e27','local','5a50adde-5b55-443a-bd56-fb6ec0233e27.png','alixpartners-logo.png','alixpartners logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:49:08',NULL,1688744948217,NULL,27028,2084,311,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f0b23a91-0685-4adb-88df-0d6aa3010dc8','local','f0b23a91-0685-4adb-88df-0d6aa3010dc8.png','allegro-software-logo.png','allegro-software logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:49:11',NULL,1688744951684,NULL,21417,500,262,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('81e1e853-b7a5-4d2e-965d-edf1cdc617d5','local','81e1e853-b7a5-4d2e-965d-edf1cdc617d5.png','alta-associates-a-part-of-diversified-search-group-logo.png','alta-associates-a-part-of-diversified-search-group logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:49:13',NULL,1688744953457,NULL,316401,10410,2173,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('2d6e33de-c3c2-49b9-8017-73f2361ba8cd','local','2d6e33de-c3c2-49b9-8017-73f2361ba8cd.jpg','amax-logo.jpg','amax logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:49:14',NULL,1688744955026,NULL,967148,2686,724,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('663b5a53-8cac-49f8-963d-9420fc25d619','local','663b5a53-8cac-49f8-963d-9420fc25d619.png','anitian-logo.png','anitian logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:49:18',NULL,1688744958065,NULL,3786,529,62,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('491d3009-7fe7-404e-9d3b-a1f3981f87dc','local','491d3009-7fe7-404e-9d3b-a1f3981f87dc.png','anjuna-logo.png','anjuna logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:49:20',NULL,1688744960886,NULL,4082,495,102,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('1d6cb867-f04c-477b-b6a3-ff00f98d17c0','local','1d6cb867-f04c-477b-b6a3-ff00f98d17c0.jpg','isc2-logo.jpg','isc2 logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:49:40',NULL,1688744980805,NULL,23635,240,240,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('2726dd91-e659-4ff8-af86-152b82e7dc0c','local','2726dd91-e659-4ff8-af86-152b82e7dc0c.png','arcon-logo.png','arcon logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:49:51',NULL,1688744991236,NULL,6617,463,109,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('7409c07e-6e3c-4308-a543-d9ad502ca6a9','local','7409c07e-6e3c-4308-a543-d9ad502ca6a9.png','asrock-rack-inc-logo.png','asrock-rack-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:49:53',NULL,1688744993881,NULL,18531,1150,500,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('7d941531-ac96-445d-b2c9-0a56e71d1cca','local','7d941531-ac96-445d-b2c9-0a56e71d1cca.png','atandt-cybersecurity-logo.png','atandt-cybersecurity logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:49:56',NULL,1688744996622,NULL,7124,395,95,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('b0908e03-67ad-45fc-aed0-86bae6d6f5e7','local','b0908e03-67ad-45fc-aed0-86bae6d6f5e7.jpg','automox-logo.jpg','automox logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:49:59',NULL,1688744999224,NULL,23601,420,237,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('1a8c60b0-c3bd-4495-90fe-5b0ab77d949a','local','1a8c60b0-c3bd-4495-90fe-5b0ab77d949a.png','anvilogic-logo.png','anvilogic logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:50:01',NULL,1688745001866,NULL,62454,2062,867,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('8f56d3fa-3f99-47b6-ad57-69dbbfbb6f71','local','8f56d3fa-3f99-47b6-ad57-69dbbfbb6f71.jpg','apiiro-logo.jpg','apiiro logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:50:04',NULL,1688745004301,NULL,34993,501,144,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('7f75a981-9885-41bd-8c4f-b99f358368d1','local','7f75a981-9885-41bd-8c4f-b99f358368d1.png','appsealing-logo.png','appsealing logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:51:41',NULL,1688745101218,NULL,89053,1220,269,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('53cf5158-452f-41f9-95dc-85f64c055dee','local','53cf5158-452f-41f9-95dc-85f64c055dee.png','appviewx-logo.png','appviewx logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:51:44',NULL,1688745104474,NULL,9609,500,184,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('2e00f314-aa57-4d08-a685-a97b8f3cf270','local','2e00f314-aa57-4d08-a685-a97b8f3cf270.png','appgate-logo.png','appgate logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:51:46',NULL,1688745106422,NULL,12891,930,234,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('dc1aa4ed-269d-4106-83eb-5251800c7041','local','dc1aa4ed-269d-4106-83eb-5251800c7041.jpeg','apricorn-logo.jpeg','apricorn logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:51:50',NULL,1688745110573,NULL,4841,435,116,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('db12e33f-d2df-4f64-abc6-9ad5764fb196','local','db12e33f-d2df-4f64-abc6-9ad5764fb196.jpg','aqua-logo.jpg','aqua logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:51:53',NULL,1688745113299,NULL,166414,2501,751,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('8a2f7da9-ff67-4e54-9275-f9dba85efdb3','local','8a2f7da9-ff67-4e54-9275-f9dba85efdb3.png','arctic-wolf-networks-inc-logo.png','arctic-wolf-networks-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:51:56',NULL,1688745116324,NULL,4734,318,159,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('a4bf1e20-bb88-4b47-9440-64b81d9fefe9','local','a4bf1e20-bb88-4b47-9440-64b81d9fefe9.jpg','arista-networks-logo.jpg','arista-networks logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:51:57',NULL,1688745117762,NULL,217955,2657,415,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('80fc6e86-552e-4584-9ffd-2319a580c20e','local','80fc6e86-552e-4584-9ffd-2319a580c20e.png','armis-logo.png','armis logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:00',NULL,1688745120448,NULL,13357,400,162,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('84dcf9a7-dd2a-42a1-a655-ce436f8985bb','local','84dcf9a7-dd2a-42a1-a655-ce436f8985bb.png','armorblox-logo.png','armorblox logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:03',NULL,1688745123114,NULL,3131,300,110,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('c7269da6-ed8d-44b4-87b3-1fd8436d63f3','local','c7269da6-ed8d-44b4-87b3-1fd8436d63f3.png','arqit-logo.png','arqit logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:05',NULL,1688745125781,NULL,4110,433,116,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('b6bde633-acb6-4304-b7c5-1468e58190dd','local','b6bde633-acb6-4304-b7c5-1468e58190dd.png','arxan-technologies-inc-now-digital-ai-software-inc-logo.png','arxan-technologies-inc-now-digital-ai-software-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:08',NULL,1688745128239,NULL,11463,882,283,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('dfb58751-c09b-4519-87a6-daf165fe14bb','local','dfb58751-c09b-4519-87a6-daf165fe14bb.png','asimily-logo.png','asimily logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:10',NULL,1688745130896,NULL,2003,500,203,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('fd743c91-78c1-4de6-9b26-d5a37858a5ce','local','fd743c91-78c1-4de6-9b26-d5a37858a5ce.png','astrix-security-logo.png','astrix-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:13',NULL,1688745133589,NULL,244439,5104,1368,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('9a0cc6d8-7f17-4935-8444-6f0e7dd447a6','local','9a0cc6d8-7f17-4935-8444-6f0e7dd447a6.png','attackiq-logo.png','attackiq logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:16',NULL,1688745136217,NULL,28296,1200,130,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('204032ce-ee74-44e4-87f0-4284e81ac2e5','local','204032ce-ee74-44e4-87f0-4284e81ac2e5.png','auditboard-logo.png','auditboard logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:18',NULL,1688745138890,NULL,7993,500,52,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('b160768a-d8e3-4343-bec6-3df3980e9232','local','b160768a-d8e3-4343-bec6-3df3980e9232.png','authlite-logo.png','authlite logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:21',NULL,1688745141531,NULL,7529,192,43,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('56a3c6a3-8e34-4873-a64e-7a67ce0a5c02','local','56a3c6a3-8e34-4873-a64e-7a67ce0a5c02.png','axis-logo.png','axis logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:24',NULL,1688745144206,NULL,11808,700,300,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('3d16251a-f758-4a58-b1f5-38aec59d9dd1','local','3d16251a-f758-4a58-b1f5-38aec59d9dd1.png','axonius-logo.png','axonius logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:25',NULL,1688745145587,NULL,9836,200,104,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('6126684d-e1b3-4546-a47e-257039b99a62','local','6126684d-e1b3-4546-a47e-257039b99a62.jpeg','bsi-group-america-inc-logo.jpeg','bsi-group-america-inc logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:26',NULL,1688745147036,NULL,20439,1158,709,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('c126a41f-a938-4996-8dbc-e5b5a4cf4a50','local','c126a41f-a938-4996-8dbc-e5b5a4cf4a50.png','beyond-identity-logo.png','beyond-identity logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:29',NULL,1688745149301,NULL,23293,1628,569,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('3730a8eb-ceed-4e64-8ae3-6212022a1851','local','3730a8eb-ceed-4e64-8ae3-6212022a1851.png','beyondtrust-logo.png','beyondtrust logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:30',NULL,1688745150715,NULL,7931,768,179,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('80b8dba5-0a3b-49ca-b427-7c9d1ceca10f','local','80b8dba5-0a3b-49ca-b427-7c9d1ceca10f.png','bigid-inc-logo.png','bigid-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:32',NULL,1688745152802,NULL,3748,318,159,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('161e78af-7ea9-428d-98af-6ce1729be3d4','local','161e78af-7ea9-428d-98af-6ce1729be3d4.png','binary-defense-logo.png','binary-defense logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:34',NULL,1688745154309,NULL,86925,6000,816,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('9dc79546-40f9-416c-a63e-3ebc43d37495','local','9dc79546-40f9-416c-a63e-3ebc43d37495.png','bionic-logo.png','bionic logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:35',NULL,1688745155739,NULL,20307,1920,384,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('bf0f9d8b-3c6b-49be-b732-a786e8aa847e','local','bf0f9d8b-3c6b-49be-b732-a786e8aa847e.png','bitsight-technologies-logo.png','bitsight-technologies logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:37',NULL,1688745157184,NULL,24614,2442,462,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('69bf01e4-3d7b-418b-bd2f-3844171c7be0','local','69bf01e4-3d7b-418b-bd2f-3844171c7be0.png','bitdefender-logo.png','bitdefender logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:40',NULL,1688745160361,NULL,4260,310,162,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('6dbf0afa-cca8-4d95-95e2-d19e974b0fc3','local','6dbf0afa-cca8-4d95-95e2-d19e974b0fc3.png','blackberry-logo.png','blackberry logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:42',NULL,1688745162378,NULL,6395,520,95,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d36ec22e-2eb1-46b4-9eb3-2b93119f5d36','local','d36ec22e-2eb1-46b4-9eb3-2b93119f5d36.png','bloombase-logo.png','bloombase logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:43',NULL,1688745163688,NULL,12536,500,180,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('fc8dd003-a836-456b-ac18-1f30106117eb','local','fc8dd003-a836-456b-ac18-1f30106117eb.png','blumira-logo.png','blumira logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:44',NULL,1688745165036,NULL,11677,1201,269,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('5f308cd9-00e4-4284-b7b5-b2499f9dc434','local','5f308cd9-00e4-4284-b7b5-b2499f9dc434.png','bolster-inc-logo.png','bolster-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:46',NULL,1688745166376,NULL,3696,580,87,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('56fd94d1-b29c-4b5a-99bc-62e4d2d76a92','local','56fd94d1-b29c-4b5a-99bc-62e4d2d76a92.png','brandshield-ltd-logo.png','brandshield-ltd logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:47',NULL,1688745167812,NULL,6803,520,218,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('7c14458c-8e0a-4464-be0b-162c4536c7f5','local','7c14458c-8e0a-4464-be0b-162c4536c7f5.png','bright-data-logo.png','bright-data logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:49',NULL,1688745169192,NULL,12693,655,155,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('73a12f66-f2dd-479b-9bed-0451274e5106','local','73a12f66-f2dd-479b-9bed-0451274e5106.png','brinqa-logo.png','brinqa logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:50',NULL,1688745170689,NULL,13617,1295,404,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d2eab1b7-bdcd-456b-9173-2c74f194925d','local','d2eab1b7-bdcd-456b-9173-2c74f194925d.png','brivo-logo.png','brivo logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:52',NULL,1688745172236,NULL,38901,1730,543,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('e90a429b-f5d3-41f1-a027-1d4614bb9010','local','e90a429b-f5d3-41f1-a027-1d4614bb9010.png','bugcrowd-logo.png','bugcrowd logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:53',NULL,1688745173439,NULL,49384,3369,836,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('a1924ef6-1962-4e51-aa97-bd004d1621f5','local','a1924ef6-1962-4e51-aa97-bd004d1621f5.png','ctm360-logo.png','ctm360 logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:55',NULL,1688745175660,NULL,53467,2275,677,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('c5d0ad8f-ac7e-4ddc-a033-66229d253670','local','c5d0ad8f-ac7e-4ddc-a033-66229d253670.png','cyberint-logo.png','cyberint logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:57',NULL,1688745177178,NULL,5411,442,114,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('699b2d11-1ef0-4ef4-8fa0-3ae3f5f17502','local','699b2d11-1ef0-4ef4-8fa0-3ae3f5f17502.png','cado-security-logo.png','cado-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:52:58',NULL,1688745178596,NULL,28531,1929,379,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('948987a4-0644-4688-88db-053a2a59a133','local','948987a4-0644-4688-88db-053a2a59a133.png','cardinalops-logo.png','cardinalops logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:53:01',NULL,1688745181533,NULL,24205,1800,558,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('b69ecf83-09ec-4f83-9c6f-e6cf34eed37c','local','b69ecf83-09ec-4f83-9c6f-e6cf34eed37c.png','cato-networks-logo.png','cato-networks logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:53:04',NULL,1688745184765,NULL,11404,640,266,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('e2543f37-07f8-4e86-8690-a6aba00db137','local','e2543f37-07f8-4e86-8690-a6aba00db137.png','caveonix-logo.png','caveonix logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:53:04',NULL,1688745184775,NULL,5168,436,115,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('21e6bc8d-e614-4ace-97c8-d28dd8e2d94e','local','21e6bc8d-e614-4ace-97c8-d28dd8e2d94e.png','center-for-internet-security-logo.png','center-for-internet-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:53:05',NULL,1688745185381,NULL,80397,2049,1067,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('df6e98c8-789c-4c7f-89bf-93e651548516','local','df6e98c8-789c-4c7f-89bf-93e651548516.png','censys-logo.png','censys logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:53:23',NULL,1688745204015,NULL,55506,2310,501,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('c47af136-462a-45cf-8783-9301e04f248e','local','c47af136-462a-45cf-8783-9301e04f248e.png','cequence-security-logo.png','cequence-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:53:26',NULL,1688745206875,NULL,2794,318,159,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('af4cb774-372a-45a6-a949-599fadaa0945','local','af4cb774-372a-45a6-a949-599fadaa0945.jpg','check-point-logo.jpg','check-point logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:53:28',NULL,1688745208919,NULL,42786,626,149,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d77baa47-2e21-4ea7-9c85-d8cc1b58ac7d','local','d77baa47-2e21-4ea7-9c85-d8cc1b58ac7d.png','checkmarx-inc-logo.png','checkmarx-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:53:31',NULL,1688745211653,NULL,19586,373,48,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('23bf22ee-4d16-48e2-98aa-4381c5cd3dee','local','23bf22ee-4d16-48e2-98aa-4381c5cd3dee.png','cigent-logo.png','cigent logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:53:34',NULL,1688745214045,NULL,4280,500,161,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d0f8a973-e5f3-4989-9513-dcdd233ab3cd','local','d0f8a973-e5f3-4989-9513-dcdd233ab3cd.png','cisco-logo.png','cisco logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:53:36',NULL,1688745216588,NULL,13538,912,482,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f790a7f4-3162-40e6-8ad9-f3c934c1df53','local','f790a7f4-3162-40e6-8ad9-f3c934c1df53.png','cloud-native-computing-foundation-cncf-logo.png','cloud-native-computing-foundation-cncf logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:53:38',NULL,1688745218958,NULL,5925,514,98,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d5732ce6-e3f1-4911-a384-b7e030bae999','local','d5732ce6-e3f1-4911-a384-b7e030bae999.png','cloud-security-alliance-logo.png','cloud-security-alliance logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:53:41',NULL,1688745221625,NULL,28074,1280,669,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('3223f725-a14d-4130-8089-eac8c2af1941','local','3223f725-a14d-4130-8089-eac8c2af1941.png','cloudflare-logo.png','cloudflare logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:53:44',NULL,1688745224589,NULL,3515,500,75,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('596dac06-58fe-42c7-aa0a-19abaab37418','local','596dac06-58fe-42c7-aa0a-19abaab37418.png','coalfire-logo.png','coalfire logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:53:47',NULL,1688745227148,NULL,8113,1053,119,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('03d4a55d-72ca-438f-8c7c-04aa6e1f44ff','local','03d4a55d-72ca-438f-8c7c-04aa6e1f44ff.png','cobalt-logo.png','cobalt logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:53:49',NULL,1688745229617,NULL,55835,2286,705,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('7a0f0ee2-4b81-43fb-9f3c-bd556ea3cc4f','local','7a0f0ee2-4b81-43fb-9f3c-bd556ea3cc4f.png','code42-logo.png','code42 logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:53:52',NULL,1688745232072,NULL,34215,1800,419,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('0b2485b3-4153-4011-9fec-8d5922044fc2','local','0b2485b3-4153-4011-9fec-8d5922044fc2.png','cohesity-logo.png','cohesity logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:53:54',NULL,1688745234606,NULL,59989,3238,475,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('7ac440d0-a031-4160-90a0-0a886efa108b','local','7ac440d0-a031-4160-90a0-0a886efa108b.png','colortokens-logo.png','colortokens logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:53:57',NULL,1688745237188,NULL,3221,311,162,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('df5811d0-c43b-484c-b72b-a6a4c4418f83','local','df5811d0-c43b-484c-b72b-a6a4c4418f83.png','comcast-business-logo.png','comcast-business logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:53:59',NULL,1688745239612,NULL,69324,2500,866,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('04525548-d30e-4b4c-b41d-9775a7e92e00','local','04525548-d30e-4b4c-b41d-9775a7e92e00.png','common-vulnerabilities-and-exposures-cve-program-logo.png','common-vulnerabilities-and-exposures-cve-program logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:54:02',NULL,1688745242667,NULL,18911,1337,392,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f8ff4592-2cfd-4a5d-9cd1-9ddad85aac52','local','f8ff4592-2cfd-4a5d-9cd1-9ddad85aac52.png','comptia-logo.png','comptia logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:54:05',NULL,1688745245352,NULL,19560,541,117,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('fafdea11-1125-446e-b91d-e6ee839efdf3','local','fafdea11-1125-446e-b91d-e6ee839efdf3.png','concentric-ai-logo.png','concentric-ai logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:54:07',NULL,1688745247883,NULL,184134,3294,872,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('37f4c2e3-3bc8-4397-a9d6-c5b854e0b3fd','local','37f4c2e3-3bc8-4397-a9d6-c5b854e0b3fd.jpg','constella-intelligence-logo.jpg','constella-intelligence logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:54:10',NULL,1688745250427,NULL,202879,3286,609,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d8b932e2-176d-472c-9e01-adeede165e7d','local','d8b932e2-176d-472c-9e01-adeede165e7d.png','contrast-security-logo.png','contrast-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:58:21',NULL,1688745502410,NULL,180746,3342,784,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('26034204-f261-4d72-9492-d49a1fa94418','local','26034204-f261-4d72-9492-d49a1fa94418.png','corelight-logo.png','corelight logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:58:26',NULL,1688745506226,NULL,12034,600,171,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('b7153a7c-43f6-42fb-9430-cba1a840633c','local','b7153a7c-43f6-42fb-9430-cba1a840633c.png','cribl-logo.png','cribl logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:58:29',NULL,1688745509646,NULL,17380,1200,480,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('7b1337ef-d161-4ca2-b0b0-ee98fe45053c','local','7b1337ef-d161-4ca2-b0b0-ee98fe45053c.png','critical-start-logo.png','critical-start logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:58:32',NULL,1688745512262,NULL,19763,1242,235,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('59afe39a-17de-4f25-8e97-aef54e92325e','local','59afe39a-17de-4f25-8e97-aef54e92325e.png','crowdstrike-logo.png','crowdstrike logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:58:34',NULL,1688745514841,NULL,32772,2046,1068,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('bb2d61f1-01fd-468e-b8ef-940b43e25241','local','bb2d61f1-01fd-468e-b8ef-940b43e25241.jpeg','cybelangel-logo.jpeg','cybelangel logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:58:37',NULL,1688745517306,NULL,6624,447,113,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('260216c3-b94b-47a1-8d26-40ba9fc2c2e1','local','260216c3-b94b-47a1-8d26-40ba9fc2c2e1.jpg','cyber-defense-magazine-logo.jpg','cyber-defense-magazine logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:58:39',NULL,1688745519767,NULL,54270,672,202,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('da427843-8edf-4aaf-b38e-8dc8d0f2f3bd','local','da427843-8edf-4aaf-b38e-8dc8d0f2f3bd.png','cyberark-logo.png','cyberark logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:58:42',NULL,1688745522971,NULL,91871,3165,710,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('cfee51a6-d79c-4b26-9248-7cb88f96a6d1','local','cfee51a6-d79c-4b26-9248-7cb88f96a6d1.png','cybergrx-logo.png','cybergrx logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:58:45',NULL,1688745525358,NULL,16737,500,135,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('c902fa4a-69dd-40b7-b7b4-9908052511aa','local','c902fa4a-69dd-40b7-b7b4-9908052511aa.png','cybervista-logo.png','cybervista logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:58:48',NULL,1688745528057,NULL,10668,750,132,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('c5679973-1a39-49b1-a581-219b2d8f7a3d','local','c5679973-1a39-49b1-a581-219b2d8f7a3d.png','cybereason-logo.png','cybereason logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:58:50',NULL,1688745530732,NULL,4663,492,100,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('5e0176d9-55e2-4b38-bb07-90b2ebc2000a','local','5e0176d9-55e2-4b38-bb07-90b2ebc2000a.png','cyberhaven-logo.png','cyberhaven logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:58:52',NULL,1688745532172,NULL,76281,2000,353,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('4baf963b-6176-4595-99f9-e4dd79034a39','local','4baf963b-6176-4595-99f9-e4dd79034a39.png','cybersecurity-ventures-logo.png','cybersecurity-ventures logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:58:54',NULL,1688745535049,NULL,20934,500,117,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('1f8be747-0db2-486e-b2f4-df557c038dba','local','1f8be747-0db2-486e-b2f4-df557c038dba.jpg','cybersecurity-and-infrastructure-security-agency-cisa-logo.jpg','cybersecurity-and-infrastructure-security-agency-cisa logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:58:57',NULL,1688745537789,NULL,8329,274,115,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('c1b7b650-f23c-4849-97e2-0365dac8633d','local','c1b7b650-f23c-4849-97e2-0365dac8633d.jpeg','cybersixgill-logo.jpeg','cybersixgill logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:59:00',NULL,1688745540432,NULL,6799,411,123,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('59130a73-e01e-4f37-86cb-a7013faf92d8','local','59130a73-e01e-4f37-86cb-a7013faf92d8.png','cyble-logo.png','cyble logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 15:59:01',NULL,1688745541849,NULL,134152,3335,921,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('5e91e3da-2b5c-464b-8c18-ae8c9cc9ff12','local','5e91e3da-2b5c-464b-8c18-ae8c9cc9ff12.png','cybrary-logo.png','cybrary logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:00:51',NULL,1688745651607,NULL,5871,784,104,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('ce2db507-30b8-4660-9992-7e0a2b260ac5','local','ce2db507-30b8-4660-9992-7e0a2b260ac5.png','cycode-logo.png','cycode logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:00:54',NULL,1688745654099,NULL,16167,1200,400,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('abd68097-6918-497d-8232-211cde0ec553','local','abd68097-6918-497d-8232-211cde0ec553.png','cyderes-logo.png','cyderes logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:00:56',NULL,1688745656456,NULL,12575,600,238,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('c1cd25d3-bb42-40e9-a8b7-b028cccb12ab','local','c1cd25d3-bb42-40e9-a8b7-b028cccb12ab.png','cyera-logo.png','cyera logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:00:58',NULL,1688745658809,NULL,3921,243,70,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('57fa4959-1da8-43d1-a2f7-2b0e4111075d','local','57fa4959-1da8-43d1-a2f7-2b0e4111075d.png','cynet-logo.png','cynet logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:01:01',NULL,1688745661492,NULL,182690,3636,909,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('97f6c021-a57b-4459-bf1e-7f2d72110924','local','97f6c021-a57b-4459-bf1e-7f2d72110924.png','adlink-logo.png','adlink logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 16:01:39','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6',1688745841638,NULL,34208,1658,465,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('73e4f1c9-234f-4d5f-a879-f98586c0eb5d','local','73e4f1c9-234f-4d5f-a879-f98586c0eb5d.jpg','cyral-logo.jpg','cyral logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:04:17',NULL,1688745857877,NULL,11171,341,129,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('e3246dc8-606b-4594-93a0-efed60bee99d','local','e3246dc8-606b-4594-93a0-efed60bee99d.png','d3-security-logo.png','d3-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:04:20',NULL,1688745860436,NULL,26346,1920,547,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('91703e85-3d50-466f-971e-ac37ca5e8aa0','local','91703e85-3d50-466f-971e-ac37ca5e8aa0.png','dart-consulting-and-training-red-alpha-logo.png','dart-consulting-and-training-red-alpha logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:04:22',NULL,1688745863000,NULL,51460,1000,500,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('ac540f5a-12a2-445e-84b5-f262f2b93387','local','ac540f5a-12a2-445e-84b5-f262f2b93387.png','dnsfilter-logo.png','dnsfilter logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:04:25',NULL,1688745865555,NULL,5679,310,163,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('7defe755-8313-4e4a-8f9f-0d455ba6576d','local','7defe755-8313-4e4a-8f9f-0d455ba6576d.jpg','dark-reading-logo.jpg','dark-reading logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:04:28',NULL,1688745869009,NULL,587371,254,125,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('0bb352f0-02e9-4693-a60e-72be012a4809','local','0bb352f0-02e9-4693-a60e-72be012a4809.jpg','darkowl-llc-logo.jpg','darkowl-llc logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:04:31',NULL,1688745871597,NULL,43288,1306,246,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('33af4248-b0ab-4457-bcba-93b8303cd1a4','local','33af4248-b0ab-4457-bcba-93b8303cd1a4.png','datadome-logo.png','datadome logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:04:34',NULL,1688745874266,NULL,21694,1500,231,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('0bdde198-3663-4340-8ae8-4d887a1a05fb','local','0bdde198-3663-4340-8ae8-4d887a1a05fb.jpg','datasunrise-data-and-database-security-logo.jpg','datasunrise-data-and-database-security logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:04:35',NULL,1688745875833,NULL,93597,500,500,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('3649c5d6-9911-47f9-b473-80404866deae','local','3649c5d6-9911-47f9-b473-80404866deae.png','datadog-logo.png','datadog logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:04:40',NULL,1688745880180,NULL,11002,920,234,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('e4c06c67-5e97-4f33-8eb5-6b78f1bc54e1','local','e4c06c67-5e97-4f33-8eb5-6b78f1bc54e1.png','datagrail-logo.png','datagrail logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:04:45',NULL,1688745885699,NULL,25200,452,80,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('c46204de-c050-4c4a-a714-35791b45c30d','local','c46204de-c050-4c4a-a714-35791b45c30d.png','dazz-logo.png','dazz logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:04:48',NULL,1688745888995,NULL,8769,900,213,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('347b4e7e-513e-4f1c-adf4-898fe4302d2c','local','347b4e7e-513e-4f1c-adf4-898fe4302d2c.png','deep-instinct-logo.png','deep-instinct logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:04:51',NULL,1688745891323,NULL,88415,4168,1980,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('3dfbfa7a-e91b-4e36-a87e-b771e4f770e9','local','3dfbfa7a-e91b-4e36-a87e-b771e4f770e9.png','deepfence-logo.png','deepfence logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:04:53',NULL,1688745893926,NULL,27326,1603,317,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('fd0ce540-71e1-4011-b98f-c9aace3f8ac1','local','fd0ce540-71e1-4011-b98f-c9aace3f8ac1.jpg','deleteme-logo.jpg','deleteme logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:04:56',NULL,1688745896372,NULL,27411,1600,300,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('3d31cdac-4019-4e7a-bb2a-8001ddc648e1','local','3d31cdac-4019-4e7a-bb2a-8001ddc648e1.jpg','delinea-logo.jpg','delinea logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:04:57',NULL,1688745897796,NULL,345445,4913,1117,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('e34f42ea-8d4b-4e12-815c-cd8895ef9947','local','e34f42ea-8d4b-4e12-815c-cd8895ef9947.png','deloitte-logo.png','deloitte logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:05:37',NULL,1688745937558,NULL,16076,1614,656,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('759b3b91-2768-4085-9631-fda5b5075d19','local','759b3b91-2768-4085-9631-fda5b5075d19.png','detectify-logo.png','detectify logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:05:40',NULL,1688745940206,NULL,26441,2000,519,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('82d9a7ee-ca22-483e-9a4e-7fc329c6671e','local','82d9a7ee-ca22-483e-9a4e-7fc329c6671e.png','devo-logo.png','devo logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:05:42',NULL,1688745942685,NULL,28975,500,250,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('08534930-b5f7-458b-b0d5-a9021c20e599','local','08534930-b5f7-458b-b0d5-a9021c20e599.png','dig-security-logo.png','dig-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:05:45',NULL,1688745945317,NULL,105385,2857,1922,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f1ddcbb0-5c28-4fb0-8b81-91d4872812ff','local','f1ddcbb0-5c28-4fb0-8b81-91d4872812ff.png','diligent-logo.png','diligent logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:05:47',NULL,1688745947788,NULL,32140,2084,558,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('0f42acd6-4648-4240-92c7-643f097dd127','local','0f42acd6-4648-4240-92c7-643f097dd127.png','docontrol-logo.png','docontrol logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:05:50',NULL,1688745950417,NULL,6434,379,99,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('58a2cd31-b497-4480-b75a-8d9637952d40','local','58a2cd31-b497-4480-b75a-8d9637952d40.png','domaintools-logo.png','domaintools logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:05:52',NULL,1688745952932,NULL,184488,5706,984,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f5760f39-a494-4c25-9667-335e7a516b63','local','f5760f39-a494-4c25-9667-335e7a516b63.png','dragos-inc-logo.png','dragos-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:05:55',NULL,1688745955162,NULL,40099,499,115,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('2e978c6a-407e-46e9-9d9a-a50a3ad2e3a1','local','2e978c6a-407e-46e9-9d9a-a50a3ad2e3a1.png','drata-logo.png','drata logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:05:57',NULL,1688745957824,NULL,4190,535,94,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('6889a453-5759-4ec5-af59-929ecddadf20','local','6889a453-5759-4ec5-af59-929ecddadf20.png','dryviq-logo.png','dryviq logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:05:59',NULL,1688745959239,NULL,13412,1000,300,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('448d0c7c-0b9e-4138-ab80-683247a9e95b','local','448d0c7c-0b9e-4138-ab80-683247a9e95b.png','dynatrace-logo.png','dynatrace logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:06:02',NULL,1688745962940,NULL,5578,535,94,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('155266b1-976e-44f3-887f-6b8eb3981dbb','local','155266b1-976e-44f3-887f-6b8eb3981dbb.png','eset-logo.png','eset logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:06:05',NULL,1688745966012,NULL,14509,957,485,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('a4c17c0f-297d-4e05-b1f7-edbb8a8310cd','local','a4c17c0f-297d-4e05-b1f7-edbb8a8310cd.png','edgescan-logo.png','edgescan logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:06:12',NULL,1688745972976,NULL,3591,402,125,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('5f0c8bd2-e681-4a3d-ba21-590c994a00a7','local','5f0c8bd2-e681-4a3d-ba21-590c994a00a7.png','edgio-logo.png','edgio logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:06:15',NULL,1688745976045,NULL,150014,1859,771,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f87d1ffa-acc6-493f-afdf-437a85d4099b','local','f87d1ffa-acc6-493f-afdf-437a85d4099b.png','egress-logo.png','egress logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:06:46',NULL,1688746006956,NULL,17569,520,123,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('2cb9426d-4710-4e87-b2a1-ecddaca9d6b9','local','2cb9426d-4710-4e87-b2a1-ecddaca9d6b9.png','elastic-logo.png','elastic logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:06:49',NULL,1688746009597,NULL,10056,500,170,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('1be6b2a3-94b9-4c4d-86ad-0b957c3d66e5','local','1be6b2a3-94b9-4c4d-86ad-0b957c3d66e5.png','emagine-it-logo.png','emagine-it logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:06:52',NULL,1688746012287,NULL,70240,5974,1813,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('00fb6a3e-f393-4b85-a7a0-221e8a9024d1','local','00fb6a3e-f393-4b85-a7a0-221e8a9024d1.png','encore-logo.png','encore logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:06:54',NULL,1688746014738,NULL,7345,501,100,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f44b4edf-7712-4060-8650-b1efc6703dc5','local','f44b4edf-7712-4060-8650-b1efc6703dc5.jpeg','endpoint-protector-by-cososys-logo.jpeg','endpoint-protector-by-cososys logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:06:57',NULL,1688746017200,NULL,7516,514,98,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('87b37fec-6fda-4234-a6f7-265b64e72266','local','87b37fec-6fda-4234-a6f7-265b64e72266.jpg','enea-qosmos-logo.jpg','enea-qosmos logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:07:00',NULL,1688746020289,NULL,38074,325,84,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d110df9c-6ad3-45ca-aa6c-2ecaec5a8d3c','local','d110df9c-6ad3-45ca-aa6c-2ecaec5a8d3c.png','entrust-logo.png','entrust logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:07:02',NULL,1688746022697,NULL,24333,1033,733,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('a57aa715-3634-49b5-b19b-e589e5525c12','local','a57aa715-3634-49b5-b19b-e589e5525c12.jpg','ermetic-logo.jpg','ermetic logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:07:05',NULL,1688746025184,NULL,3207,247,90,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('455bd0e1-4629-4767-b767-8744d182ea40','local','455bd0e1-4629-4767-b767-8744d182ea40.png','exabeam-logo.png','exabeam logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:07:07',NULL,1688746027849,NULL,54070,3543,627,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('45cc82f9-37f6-480c-99c2-e087d3ef5467','local','45cc82f9-37f6-480c-99c2-e087d3ef5467.jpg','expel-logo.jpg','expel logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:07:09',NULL,1688746029259,NULL,53819,628,202,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('a1061f85-4a2d-43cc-82de-9afa8eef7e4b','local','a1061f85-4a2d-43cc-82de-9afa8eef7e4b.png','extrahop-logo.png','extrahop logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:07:13',NULL,1688746033182,NULL,3721,541,93,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('7ad9971f-9c4c-4964-8dec-938e05aeb0db','local','7ad9971f-9c4c-4964-8dec-938e05aeb0db.png','f5-logo.png','f5 logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:07:15',NULL,1688746035698,NULL,23759,360,151,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('eeab596d-32df-4139-b807-d5334e6384e6','local','eeab596d-32df-4139-b807-d5334e6384e6.png','fbi-logo.png','fbi logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:07:18',NULL,1688746038409,NULL,6819,300,168,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('da24ccd5-7771-47da-a879-02dfc2cf6b01','local','da24ccd5-7771-47da-a879-02dfc2cf6b01.png','feitian-technologies-logo.png','feitian-technologies logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:07:20',NULL,1688746040957,NULL,21001,1024,1025,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('18b42233-3219-4539-b663-6216398f9926','local','18b42233-3219-4539-b663-6216398f9926.jpg','fido-alliance-logo.jpg','fido-alliance logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:07:23',NULL,1688746043509,NULL,3723,136,100,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('483e1d3b-4dd7-484d-9d79-aad296894cfa','local','483e1d3b-4dd7-484d-9d79-aad296894cfa.png','fastly-inc-logo.png','fastly-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:07:26',NULL,1688746046285,NULL,2748,200,126,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('35b68ef3-1fd4-49be-b89f-ac8f80b93726','local','35b68ef3-1fd4-49be-b89f-ac8f80b93726.png','fastpath-logo.png','fastpath logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:07:28',NULL,1688746048938,NULL,12675,500,165,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('af046135-e4df-47ba-8a5e-c0c131f33ae3','local','af046135-e4df-47ba-8a5e-c0c131f33ae3.png','filecloud-logo.png','filecloud logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:07:31',NULL,1688746051518,NULL,28668,1500,365,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f41e23f1-23ae-42c9-b071-114343e9fe4e','local','f41e23f1-23ae-42c9-b071-114343e9fe4e.png','firemon-logo.png','firemon logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:07:34',NULL,1688746054076,NULL,26531,1993,392,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('991e99ed-06d0-4f06-b4c7-9e93f9ffbf24','local','991e99ed-06d0-4f06-b4c7-9e93f9ffbf24.jpg','flanders-investment-and-trade-logo.jpg','flanders-investment-and-trade logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:07:36',NULL,1688746056642,NULL,115559,1008,402,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('887cb09f-a1d0-4ca7-a8a5-dd581ac1638c','local','887cb09f-a1d0-4ca7-a8a5-dd581ac1638c.jpg','flashpoint-logo.jpg','flashpoint logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:07:39',NULL,1688746059086,NULL,11289,283,68,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('024ce8f2-b8d4-4cbd-a682-891457695658','local','024ce8f2-b8d4-4cbd-a682-891457695658.png','flexxon-pte-ltd-logo.png','flexxon-pte-ltd logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:07:41',NULL,1688746062437,NULL,261511,7424,4236,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('31bfe926-e889-4469-b3ac-811eea92e7a7','local','31bfe926-e889-4469-b3ac-811eea92e7a7.png','flow-security-logo.png','flow-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:07:43',NULL,1688746063475,NULL,6508,500,160,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('7ca525f4-3df1-4fc2-a95f-c52f3d7217e0','local','7ca525f4-3df1-4fc2-a95f-c52f3d7217e0.png','flow-security-logo.png','flow-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:07:44',NULL,1688746064468,NULL,6508,500,160,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d7a48eca-eef4-407c-9b92-dc761ee9806c','local','d7a48eca-eef4-407c-9b92-dc761ee9806c.jpg','fluid-attacks-logo.jpg','fluid-attacks logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:07:47',NULL,1688746068412,NULL,165835,1798,940,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('cd91f2c2-b2ee-460d-bdb5-14007ac02846','local','cd91f2c2-b2ee-460d-bdb5-14007ac02846.png','forescout-technologies-inc-logo.png','forescout-technologies-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:07:50',NULL,1688746070863,NULL,8599,400,54,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('8111791d-a533-4936-9e6b-00213a3e0c05','local','8111791d-a533-4936-9e6b-00213a3e0c05.png','forgerock-logo.png','forgerock logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:07:53',NULL,1688746073434,NULL,16230,1076,241,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f032bd85-9efe-4d88-b32f-622c5abf2bfe','local','f032bd85-9efe-4d88-b32f-622c5abf2bfe.png','fortanix-logo.png','fortanix logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:07:56',NULL,1688746076151,NULL,4686,511,99,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('26e028a6-eb66-4fcb-a8c6-fcf7a5096261','local','26e028a6-eb66-4fcb-a8c6-fcf7a5096261.png','fortifydata-logo.png','fortifydata logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:07:58',NULL,1688746078649,NULL,24704,624,173,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('29e4a4c3-80b9-4a28-8b47-8c727f03df08','local','29e4a4c3-80b9-4a28-8b47-8c727f03df08.jpg','fortinet-logo.jpg','fortinet logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:08:02',NULL,1688746082123,NULL,13145,500,109,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('0b99a4bf-4608-43ac-8c1d-cca5314bfba9','local','0b99a4bf-4608-43ac-8c1d-cca5314bfba9.png','fortra-logo.png','fortra logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:08:04',NULL,1688746084579,NULL,3495,429,73,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('52024855-9b1c-4234-8f0d-990ec3aa4fae','local','52024855-9b1c-4234-8f0d-990ec3aa4fae.png','forward-networks-logo.png','forward-networks logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:08:07',NULL,1688746087036,NULL,16269,500,400,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('523134e8-b75c-45e9-9ee3-4250fae80323','local','523134e8-b75c-45e9-9ee3-4250fae80323.png','futurex-logo.png','futurex logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:08:09',NULL,1688746089498,NULL,8516,864,122,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f88415d5-9385-45eb-8b7d-d172f3b1eafa','local','f88415d5-9385-45eb-8b7d-d172f3b1eafa.png','glimps-logo.png','glimps logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:08:11',NULL,1688746091951,NULL,216035,6044,2265,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('679b26cb-bc2b-423c-8dce-7f5f9dbf9b98','local','679b26cb-bc2b-423c-8dce-7f5f9dbf9b98.png','gmi-logo.png','gmi logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:08:14',NULL,1688746094346,NULL,14707,500,179,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('53e5a38f-8964-4b1b-b277-544a1dc30c83','local','53e5a38f-8964-4b1b-b277-544a1dc30c83.jpg','gtb-data-security-logo.jpg','gtb-data-security logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:08:16',NULL,1688746096872,NULL,13651,500,184,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('6b0191c3-8e4f-4022-a033-379b83c8f06e','local','6b0191c3-8e4f-4022-a033-379b83c8f06e.jpg','garner-products-inc-logo.jpg','garner-products-inc logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:08:18',NULL,1688746098267,NULL,7432,352,201,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('65330b9c-a2a4-474a-a501-7a62fd22e9db','local','65330b9c-a2a4-474a-a501-7a62fd22e9db.png','garrison-logo.png','garrison logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:08:20',NULL,1688746100934,NULL,14628,1000,180,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('02be8a51-ce96-4d3c-807e-1813ffdf6528','local','02be8a51-ce96-4d3c-807e-1813ffdf6528.png','genians-logo.png','genians logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:08:22',NULL,1688746102430,NULL,3641,389,129,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('83e97ef3-143a-411e-a37f-460f89697818','local','83e97ef3-143a-411e-a37f-460f89697818.png','german-pavilion-teletrust-it-security-association-germany-logo.png','german-pavilion-teletrust-it-security-association-germany logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:08:27',NULL,1688746107726,NULL,67618,696,382,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('7e95989d-6dac-4f0c-a306-7db60da302cd','local','7e95989d-6dac-4f0c-a306-7db60da302cd.png','gigamon-logo.png','gigamon logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:08:30',NULL,1688746110242,NULL,26093,500,86,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('6ce35222-7424-46a0-9702-be27f0e76f3e','local','6ce35222-7424-46a0-9702-be27f0e76f3e.png','gitguardian-logo.png','gitguardian logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:08:32',NULL,1688746112604,NULL,57835,2238,735,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('a6934e77-fa94-44d0-9af5-86ea310e2d43','local','a6934e77-fa94-44d0-9af5-86ea310e2d43.jpg','gitlab-logo.jpg','gitlab logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:08:35',NULL,1688746115667,NULL,63151,990,380,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('53968f75-a965-4015-96f3-119970263ab6','local','53968f75-a965-4015-96f3-119970263ab6.png','globalsign-logo.png','globalsign logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:08:37',NULL,1688746117313,NULL,45325,1000,219,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('6cdd9a7e-a347-407a-a56b-c9f9a918e5b7','local','6cdd9a7e-a347-407a-a56b-c9f9a918e5b7.jpg','gold-comet-logo.jpg','gold-comet logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:08:40',NULL,1688746120925,NULL,141885,1835,468,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('0fc6ebd3-a1ad-46f2-a60c-4cffcc292fc2','local','0fc6ebd3-a1ad-46f2-a60c-4cffcc292fc2.jpg','grammatech-logo.jpg','grammatech logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:08:43',NULL,1688746123475,NULL,905161,4582,675,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('652ebef3-3c68-4a9e-848a-c4fa568838ef','local','652ebef3-3c68-4a9e-848a-c4fa568838ef.png','graphus-logo.png','graphus logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:08:45',NULL,1688746125315,NULL,14923,500,137,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('a5fb10c9-436a-4cf9-8dc7-cc5cfa74dfda','local','a5fb10c9-436a-4cf9-8dc7-cc5cfa74dfda.png','gravwell-logo.png','gravwell logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:08:47',NULL,1688746127799,NULL,7372,360,114,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('4f564128-b4c1-4a47-b15b-499b5058e7d4','local','4f564128-b4c1-4a47-b15b-499b5058e7d4.png','graylog-logo.png','graylog logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:08:50',NULL,1688746130257,NULL,5638,396,127,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f9878ce1-cf17-4c27-8983-9d25a9d6cc32','local','f9878ce1-cf17-4c27-8983-9d25a9d6cc32.png','gurucul-logo.png','gurucul logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:08:51',NULL,1688746131677,NULL,9513,400,100,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('01145770-b5c0-4491-b5dc-c6bad2e2eb3b','local','01145770-b5c0-4491-b5dc-c6bad2e2eb3b.png','haproxy-technologies-logo.png','haproxy-technologies logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:09:02',NULL,1688746142935,NULL,13252,500,150,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('898883bf-7688-4fb8-bd4f-d17e74ba9370','local','898883bf-7688-4fb8-bd4f-d17e74ba9370.png','heroic-com-logo.png','heroic-com logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:11:43',NULL,1688746303537,NULL,4173,250,250,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('b6e2693f-87bc-478c-86e6-14fbad71a160','local','b6e2693f-87bc-478c-86e6-14fbad71a160.png','hub-security-logo.png','hub-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:11:45',NULL,1688746305425,NULL,17573,2418,551,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('88720595-5191-479d-8326-21a291869668','local','88720595-5191-479d-8326-21a291869668.jpg','human-logo.jpg','human logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:11:58',NULL,1688746318625,NULL,38485,500,121,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('eb52d1fd-218a-489b-8a69-efa687a8884c','local','eb52d1fd-218a-489b-8a69-efa687a8884c.png','hackerone-logo.png','hackerone logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:12:02',NULL,1688746322986,NULL,3388,250,49,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('41405e3c-ab0e-4d3a-90fe-d90fb9a5ee69','local','41405e3c-ab0e-4d3a-90fe-d90fb9a5ee69.png','halcyon-logo.png','halcyon logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:12:05',NULL,1688746325622,NULL,76811,2750,625,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('02327553-f752-4545-97e3-65ea292fa5ea','local','02327553-f752-4545-97e3-65ea292fa5ea.png','harness-logo.png','harness logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:12:08',NULL,1688746328311,NULL,7881,447,99,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('4e270928-bc85-418e-8f0b-8183d176e561','local','4e270928-bc85-418e-8f0b-8183d176e561.png','hashicorp-inc-logo.png','hashicorp-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:12:10',NULL,1688746330360,NULL,21000,1897,571,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('284e63ba-a07d-445e-87b2-87e26a7253ee','local','284e63ba-a07d-445e-87b2-87e26a7253ee.jpg','hillstone-networks-logo.jpg','hillstone-networks logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:12:12',NULL,1688746332958,NULL,134856,1667,427,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('aae6d505-4dae-4b34-9c65-0a541695fec2','local','aae6d505-4dae-4b34-9c65-0a541695fec2.jpg','hive-pro-logo.jpg','hive-pro logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:12:15',NULL,1688746335658,NULL,21252,500,102,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('b9d7a9e7-07df-4852-ab2c-958e40f596c2','local','b9d7a9e7-07df-4852-ab2c-958e40f596c2.png','horizon3-ai-logo.png','horizon3-ai logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:12:18',NULL,1688746338151,NULL,10414,500,132,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('aff602b4-42a1-4095-bbf0-71b539ba5c35','local','aff602b4-42a1-4095-bbf0-71b539ba5c35.png','hoxhunt-logo.png','hoxhunt logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:12:20',NULL,1688746340801,NULL,3734,485,104,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('1cf8195b-b939-43db-85a2-a4c50bd04d48','local','1cf8195b-b939-43db-85a2-a4c50bd04d48.jpg','hughes-an-echostar-company-logo.jpg','hughes-an-echostar-company logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:12:23',NULL,1688746343231,NULL,10480,400,229,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('de24ecc1-c5ed-4c83-9ff1-19c5f7473a70','local','de24ecc1-c5ed-4c83-9ff1-19c5f7473a70.jpg','hunters-logo.jpg','hunters logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:12:25',NULL,1688746345664,NULL,226691,4326,648,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('6343016b-73f5-41e6-909c-27689b9250c2','local','6343016b-73f5-41e6-909c-27689b9250c2.png','huntress-logo.png','huntress logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:12:28',NULL,1688746348146,NULL,16343,500,123,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('a2994ac9-6413-4cd8-a74b-f60c77513ef6','local','a2994ac9-6413-4cd8-a74b-f60c77513ef6.png','iapp-logo.png','iapp logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:12:30',NULL,1688746350837,NULL,17958,500,300,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('42ece35d-ff8f-4b9e-8ac5-ecb41b588bd3','local','42ece35d-ff8f-4b9e-8ac5-ecb41b588bd3.png','ibm-security-logo.png','ibm-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:12:33',NULL,1688746353290,NULL,6232,390,193,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('7dc74318-e574-421b-905d-46353d9d8d44','local','7dc74318-e574-421b-905d-46353d9d8d44.png','iei-technology-usa-corp-logo.png','iei-technology-usa-corp logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:12:35',NULL,1688746355960,NULL,32950,703,355,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('10aab815-3c54-4d66-af4d-7ad76b999d5d','local','10aab815-3c54-4d66-af4d-7ad76b999d5d.png','ine-logo.png','ine logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:12:38',NULL,1688746358583,NULL,8503,600,183,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('4b4b94bb-b8d3-452d-ba85-da3041184e28','local','4b4b94bb-b8d3-452d-ba85-da3041184e28.png','ionix-logo.png','ionix logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:12:41',NULL,1688746361090,NULL,6765,500,144,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d93fc03a-d3aa-4ac7-a7eb-584d29fa9bde','local','d93fc03a-d3aa-4ac7-a7eb-584d29fa9bde.png','ironscales-logo.png','ironscales logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:12:44',NULL,1688746364359,NULL,5279,318,159,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('0885bed2-d4da-4f55-a275-624810277cfe','local','0885bed2-d4da-4f55-a275-624810277cfe.png','ismg-logo.png','ismg logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:12:46',NULL,1688746366827,NULL,46069,1340,586,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('83764fa3-f817-4b1e-be25-196f08b45c33','local','83764fa3-f817-4b1e-be25-196f08b45c33.png','issa-logo.png','issa logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:12:49',NULL,1688746369477,NULL,9023,421,120,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('59ab1aec-5dd9-479e-9858-7dd2995275c4','local','59ab1aec-5dd9-479e-9858-7dd2995275c4.png','it-glue-logo.png','it-glue logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:12:52',NULL,1688746372141,NULL,16944,1000,337,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('fdcbdf80-887d-4730-a9b1-e732a2c49413','local','fdcbdf80-887d-4730-a9b1-e732a2c49413.png','it-security-association-germany-teletrust-logo.png','it-security-association-germany-teletrust logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:12:54',NULL,1688746375272,NULL,67618,696,382,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d64e6b32-49f3-4fa5-8aa8-17cef8598629','local','d64e6b32-49f3-4fa5-8aa8-17cef8598629.png','itsp-magazine-logo.png','itsp-magazine logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:12:57',NULL,1688746377684,NULL,130322,4267,3200,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('c58fe301-a8ea-4214-93b1-17a2f55401ee','local','c58fe301-a8ea-4214-93b1-17a2f55401ee.png','illumio-logo.png','illumio logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:13:00',NULL,1688746380134,NULL,2947,450,112,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('912c37e6-2f82-4078-937e-d942e1c49999','local','912c37e6-2f82-4078-937e-d942e1c49999.png','immersive-labs-logo.png','immersive-labs logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:13:03',NULL,1688746383398,NULL,3430,488,103,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('3906efa5-b111-44c5-903c-32cb4c133dac','local','3906efa5-b111-44c5-903c-32cb4c133dac.png','immuta-logo.png','immuta logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:13:05',NULL,1688746385871,NULL,7744,1000,240,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('c3f5ebd7-27c2-4e1e-9bbb-a6e2cd3a4f1e','local','c3f5ebd7-27c2-4e1e-9bbb-a6e2cd3a4f1e.png','imperva-logo.png','imperva logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:13:08',NULL,1688746388414,NULL,18862,500,169,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('81f10498-e387-4098-a3e0-cdab8808115d','local','81f10498-e387-4098-a3e0-cdab8808115d.png','infoblox-logo.png','infoblox logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:13:09',NULL,1688746389986,NULL,18657,1042,287,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('663c9c6e-c4cf-4187-a0cd-5a3e61713e8e','local','663c9c6e-c4cf-4187-a0cd-5a3e61713e8e.png','infosec-institute-logo.png','infosec-institute logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:13:13',NULL,1688746393623,NULL,4745,516,98,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('e0a3ec5e-62c4-471e-a967-23abecac7e9d','local','e0a3ec5e-62c4-471e-a967-23abecac7e9d.png','infosecurity-magazine-logo.png','infosecurity-magazine logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:13:16',NULL,1688746396102,NULL,30519,500,300,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('42c74894-49c2-4632-bdf1-7d904f661a8f','local','42c74894-49c2-4632-bdf1-7d904f661a8f.png','inspired-elearning-llc-logo.png','inspired-elearning-llc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:13:22',NULL,1688746402673,NULL,17202,333,172,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('0679441f-3e49-411c-9d86-7f02a5f4eeea','local','0679441f-3e49-411c-9d86-7f02a5f4eeea.png','intel-logo.png','intel logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:13:25',NULL,1688746405303,NULL,12530,520,520,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('114a2301-ea0b-4040-be0e-e3f88119613c','local','114a2301-ea0b-4040-be0e-e3f88119613c.png','intel-471-logo.png','intel-471 logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:14:33',NULL,1688746473312,NULL,16515,500,154,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('40320c5f-d438-4a4d-97c9-ba1b067184f9','local','40320c5f-d438-4a4d-97c9-ba1b067184f9.png','intelligent-ciso-logo.png','intelligent-ciso logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:14:35',NULL,1688746475988,NULL,58430,1171,1182,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('0d7df842-279d-4cfe-8185-9c52e6841c2e','local','0d7df842-279d-4cfe-8185-9c52e6841c2e.png','intercast-staffing-logo.png','intercast-staffing logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:14:38',NULL,1688746478534,NULL,19147,296,67,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('53cea816-56bd-4544-84af-760f7624cfa8','local','53cea816-56bd-4544-84af-760f7624cfa8.png','invicti-logo.png','invicti logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:14:41',NULL,1688746481095,NULL,34035,2777,830,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('8e3e13c4-c445-4f2a-8906-dfc45ef4100c','local','8e3e13c4-c445-4f2a-8906-dfc45ef4100c.png','ionate-inc-logo.png','ionate-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:14:43',NULL,1688746483623,NULL,22026,1920,1120,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('81e2459e-55c3-4b42-b5d8-bd3bf460bcc3','local','81e2459e-55c3-4b42-b5d8-bd3bf460bcc3.png','island-logo.png','island logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:14:46',NULL,1688746486581,NULL,108211,3181,1029,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('08e5455a-8d2d-40fc-8fe8-0beac5670ddb','local','08e5455a-8d2d-40fc-8fe8-0beac5670ddb.png','jfrog-logo.png','jfrog logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:14:49',NULL,1688746489280,NULL,5979,414,122,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('96459d2a-c48b-4b4e-8682-e6c65ec8ba9f','local','96459d2a-c48b-4b4e-8682-e6c65ec8ba9f.jpg','jscrambler-logo.jpg','jscrambler logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:14:51',NULL,1688746491756,NULL,64243,628,159,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f8db85d5-52a8-4d7f-be67-860401a0f9b2','local','f8db85d5-52a8-4d7f-be67-860401a0f9b2.png','jamf-logo.png','jamf logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:14:54',NULL,1688746494811,NULL,13795,300,104,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('52f6b834-85f1-4d66-b337-bcca27b53d98','local','52f6b834-85f1-4d66-b337-bcca27b53d98.jpg','jetway-computer-corp-logo.jpg','jetway-computer-corp logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:14:57',NULL,1688746497270,NULL,120386,591,576,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('51419d78-1722-4076-b200-121ca58ed64e','local','51419d78-1722-4076-b200-121ca58ed64e.png','juniper-networks-logo.png','juniper-networks logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:14:59',NULL,1688746499847,NULL,29938,1800,600,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('454223b0-00d7-401f-a3f3-9251b346ac9c','local','454223b0-00d7-401f-a3f3-9251b346ac9c.png','jupiterone-logo.png','jupiterone logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:15:02',NULL,1688746502397,NULL,22526,1200,600,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('5798c4b4-d98c-4d93-bb16-fbdff3387b0d','local','5798c4b4-d98c-4d93-bb16-fbdff3387b0d.png','kandji-logo.png','kandji logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:15:52',NULL,1688746552162,NULL,3441,367,137,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('b747a36e-24a2-49a5-837b-f1ba2c95b5f8','local','b747a36e-24a2-49a5-837b-f1ba2c95b5f8.png','keeper-security-inc-logo.png','keeper-security-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:15:54',NULL,1688746555032,NULL,16432,824,192,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('7d8b82b1-1016-4e27-98f6-f1c9f5fa6064','local','7d8b82b1-1016-4e27-98f6-f1c9f5fa6064.png','keyfactor-logo.png','keyfactor logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:15:57',NULL,1688746557895,NULL,10746,500,72,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('4889a4c6-c006-4a63-a209-bcd417ac090f','local','4889a4c6-c006-4a63-a209-bcd417ac090f.png','keysight-technologies-logo.png','keysight-technologies logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:16:00',NULL,1688746560356,NULL,13526,1238,373,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('a90a1f9e-9029-4cd2-9e76-478cedf0ecbc','local','a90a1f9e-9029-4cd2-9e76-478cedf0ecbc.png','kingston-technology-logo.png','kingston-technology logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:16:02',NULL,1688746562802,NULL,44440,1280,260,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('140a626e-f40c-474f-b010-5f96a890069a','local','140a626e-f40c-474f-b010-5f96a890069a.jpg','knowbe4-logo.jpg','knowbe4 logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:16:05',NULL,1688746565329,NULL,22723,1090,199,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('7f97a2eb-5af8-412b-8aaf-f3a4ae69a073','local','7f97a2eb-5af8-412b-8aaf-f3a4ae69a073.jpg','korea-trade-investment-promotion-agency-logo.jpg','korea-trade-investment-promotion-agency logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:16:07',NULL,1688746567965,NULL,157029,1625,700,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('ba1ea41d-dff5-4843-86c8-407ccd8012c3','local','ba1ea41d-dff5-4843-86c8-407ccd8012c3.png','kroll-logo.png','kroll logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:16:10',NULL,1688746570483,NULL,12978,1265,295,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('336cd646-9c67-4579-93c2-a389b2196414','local','336cd646-9c67-4579-93c2-a389b2196414.jpg','kyndryl-logo.jpg','kyndryl logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:16:12',NULL,1688746572056,NULL,216989,2293,730,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d4586f71-05c8-424b-bd8a-8203d3015f92','local','d4586f71-05c8-424b-bd8a-8203d3015f92.png','lacework-logo.png','lacework logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:16:14',NULL,1688746574662,NULL,101086,1900,315,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('c397e991-0689-4c5c-869c-194e1ab5b4e1','local','c397e991-0689-4c5c-869c-194e1ab5b4e1.jpg','laminar-logo.jpg','laminar logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:16:17',NULL,1688746577328,NULL,13263,400,70,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('114974a8-a9db-4952-83f0-8540e0e6eddf','local','114974a8-a9db-4952-83f0-8540e0e6eddf.png','lanner-electronic-inc-logo.png','lanner-electronic-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:16:19',NULL,1688746579609,NULL,24505,500,200,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('34b49074-53ba-4728-8a40-bc1e8021fb6c','local','34b49074-53ba-4728-8a40-bc1e8021fb6c.png','lansweeper-logo.png','lansweeper logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:16:22',NULL,1688746582274,NULL,9661,958,370,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('98da3535-5b27-4e02-9591-a94716f4af59','local','98da3535-5b27-4e02-9591-a94716f4af59.png','lastpass-logo.png','lastpass logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:16:24',NULL,1688746584929,NULL,9413,861,291,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d82221a4-e306-4359-acd3-a0d191b5a29b','local','d82221a4-e306-4359-acd3-a0d191b5a29b.jpeg','legit-security-logo.jpeg','legit-security logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:16:27',NULL,1688746587604,NULL,131572,1920,900,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('8439268b-1857-42bd-9f72-441c09eb5020','local','8439268b-1857-42bd-9f72-441c09eb5020.jpg','lepide-logo.jpg','lepide logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:16:30',NULL,1688746590153,NULL,1213156,21047,6081,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('8448c7ce-0ab8-4a59-8b21-80d5f80de379','local','8448c7ce-0ab8-4a59-8b21-80d5f80de379.png','liveaction-logo.png','liveaction logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:16:32',NULL,1688746592308,NULL,13714,1281,199,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('12a0c626-70c6-410c-ad5d-73923c62253f','local','12a0c626-70c6-410c-ad5d-73923c62253f.png','logrhythm-logo.png','logrhythm logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:16:34',NULL,1688746594970,NULL,6701,500,73,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('02a21d05-404f-429b-99ca-669b7d1ac02b','local','02a21d05-404f-429b-99ca-669b7d1ac02b.png','logicgate-logo.png','logicgate logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:16:37',NULL,1688746597993,NULL,35837,2795,480,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('8fe1d3ee-e5ba-45a2-b3b9-1d51190783cd','local','8fe1d3ee-e5ba-45a2-b3b9-1d51190783cd.png','lookingglass-cyber-solutions-logo.png','lookingglass-cyber-solutions logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:16:40',NULL,1688746600305,NULL,7435,569,88,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('c9e0fdd9-606a-4102-824f-b479d7c9a3f3','local','c9e0fdd9-606a-4102-824f-b479d7c9a3f3.png','lookout-logo.png','lookout logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:16:43',NULL,1688746603321,NULL,46303,1476,838,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('0641b198-0e5c-431a-ba08-3d29afc14818','local','0641b198-0e5c-431a-ba08-3d29afc14818.png','lumen-logo.png','lumen logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:16:45',NULL,1688746605306,NULL,2732,492,131,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('6d6ccf61-5104-4f42-b68c-07f395d3b291','local','6d6ccf61-5104-4f42-b68c-07f395d3b291.png','lumu-technologies-logo.png','lumu-technologies logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:16:47',NULL,1688746607048,NULL,26182,1500,562,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('7473714f-56cd-4234-8cd0-e8824f679d8a','local','7473714f-56cd-4234-8cd0-e8824f679d8a.png','lydsec-digital-technology-logo.png','lydsec-digital-technology logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:16:53',NULL,1688746613487,NULL,70579,2659,1064,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('a24531a4-2c50-4ae7-9443-0a1f5cc1215b','local','a24531a4-2c50-4ae7-9443-0a1f5cc1215b.jpg','mitre-logo.jpg','mitre logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:16:55',NULL,1688746615248,NULL,53967,480,185,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('3eec9074-0d70-4010-b5d3-e471e7fb1d2a','local','3eec9074-0d70-4010-b5d3-e471e7fb1d2a.png','malwarebytes-for-business-logo.png','malwarebytes-for-business logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:16:59',NULL,1688746619339,NULL,9602,520,100,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('b7fbc0a5-f31b-4cee-baa2-21d6d8c1118f','local','b7fbc0a5-f31b-4cee-baa2-21d6d8c1118f.png','manageengine-logo.png','manageengine logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:17:01',NULL,1688746621998,NULL,6075,495,102,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('1f0e6384-82db-4ad4-832a-da6f107cf600','local','1f0e6384-82db-4ad4-832a-da6f107cf600.png','mandiant-google-cloud-logo.png','mandiant-google-cloud logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:17:04',NULL,1688746624740,NULL,4725,582,86,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('b84b4739-5407-4497-8cb0-927d5d65f8e5','local','b84b4739-5407-4497-8cb0-927d5d65f8e5.png','mazebolt-logo.png','mazebolt logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:17:06',NULL,1688746627035,NULL,7923,653,142,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d9e09045-2e41-46d4-8468-724a8f2c86f9','local','d9e09045-2e41-46d4-8468-724a8f2c86f9.png','mend-logo.png','mend logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:17:10',NULL,1688746630190,NULL,3660,361,140,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d4373fb3-e7f7-4b6b-8310-6cb80a4cb9ff','local','d4373fb3-e7f7-4b6b-8310-6cb80a4cb9ff.png','meritalk-logo.png','meritalk logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:17:12',NULL,1688746632240,NULL,98102,3300,2550,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('4a4ac6cb-3978-47c1-81ec-397ca672c479','local','4a4ac6cb-3978-47c1-81ec-397ca672c479.png','meritalk-logo.png','meritalk logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:17:12',NULL,1688746632486,NULL,98102,3300,2550,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('05f53d58-4095-40a3-ad3e-cc69e208c071','local','05f53d58-4095-40a3-ad3e-cc69e208c071.png','mezmo-logo.png','mezmo logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:17:15',NULL,1688746635108,NULL,2578,364,138,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('3999e4e8-fe10-420c-b4ac-a7682b7d3929','local','3999e4e8-fe10-420c-b4ac-a7682b7d3929.png','microsoft-logo.png','microsoft logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:17:17',NULL,1688746637637,NULL,3854,309,163,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('a087d329-0e00-4efc-b552-961136fffa8a','local','a087d329-0e00-4efc-b552-961136fffa8a.png','mimecast-logo.png','mimecast logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:17:20',NULL,1688746640131,NULL,53367,5334,1551,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f2b0c494-63a3-46b8-83aa-6cfd34829d7c','local','f2b0c494-63a3-46b8-83aa-6cfd34829d7c.png','mira-security-logo.png','mira-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:17:23',NULL,1688746643066,NULL,16951,500,255,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('7a9fbfc4-370d-447c-844a-7d54bf13b8ac','local','7a9fbfc4-370d-447c-844a-7d54bf13b8ac.png','mitiga-logo.png','mitiga logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:17:25',NULL,1688746645592,NULL,3310,400,87,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('c575ca41-f794-4e44-9dd7-140aa8db8e34','local','c575ca41-f794-4e44-9dd7-140aa8db8e34.png','mitigant-by-resility-logo.png','mitigant-by-resility logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:17:28',NULL,1688746648215,NULL,4790,507,99,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('ad13dabd-32dc-403b-b173-9271556bf68b','local','ad13dabd-32dc-403b-b173-9271556bf68b.png','mondoo-logo.png','mondoo logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:17:29',NULL,1688746649836,NULL,16253,1082,196,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('17872cea-9276-4fcd-a5ae-1553384ffd33','local','17872cea-9276-4fcd-a5ae-1553384ffd33.png','morphisec-logo.png','morphisec logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:17:34',NULL,1688746654139,NULL,36943,1928,379,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('fb4e3416-eca8-4b33-aa1c-e156bbea3de1','local','fb4e3416-eca8-4b33-aa1c-e156bbea3de1.png','mutare-inc-logo.png','mutare-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:17:36',NULL,1688746656715,NULL,5527,500,73,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('6b29c33b-44f7-496a-aa8d-e22f9f6d8d79','local','6b29c33b-44f7-496a-aa8d-e22f9f6d8d79.jpeg','nasa-sewp-logo.jpeg','nasa-sewp logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:17:39',NULL,1688746659282,NULL,8756,497,101,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('eccb0569-6d98-4519-a8a0-23d268c52fad','local','eccb0569-6d98-4519-a8a0-23d268c52fad.png','ncp-engineering-inc-logo.png','ncp-engineering-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:17:42',NULL,1688746662139,NULL,11167,400,153,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('1f0f28c8-4a95-40f5-94c4-5393102f8a6d','local','1f0f28c8-4a95-40f5-94c4-5393102f8a6d.png','netscout-logo.png','netscout logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:17:46',NULL,1688746666447,NULL,17948,500,73,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('a7482bf4-6202-4e8e-8ebc-14eacd13434f','local','a7482bf4-6202-4e8e-8ebc-14eacd13434f.png','ninjio-cybersecurity-awareness-training-logo.png','ninjio-cybersecurity-awareness-training logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:17:49',NULL,1688746669103,NULL,21727,1920,506,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('3e2d64f6-3035-4214-9655-77b989be80aa','local','3e2d64f6-3035-4214-9655-77b989be80aa.jpg','nri-secure-logo.jpg','nri-secure logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:17:51',NULL,1688746672796,NULL,658374,3336,896,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('160f3cac-ae0c-478d-91fa-599c5bcec5a4','local','160f3cac-ae0c-478d-91fa-599c5bcec5a4.jpg','nsfocus-logo.jpg','nsfocus logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:17:54',NULL,1688746675106,NULL,535638,6150,2642,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('11ad6397-3737-42eb-bb87-affff3b05d75','local','11ad6397-3737-42eb-bb87-affff3b05d75.jpg','nanitor-logo.jpg','nanitor logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:17:58',NULL,1688746678119,NULL,23070,500,142,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('0681d503-305d-44e0-9af9-3db3cd7c5528','local','0681d503-305d-44e0-9af9-3db3cd7c5528.png','napatech-logo.png','napatech logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:18:00',NULL,1688746680792,NULL,19848,500,111,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('ae98a449-2d45-4221-a94f-a7fed4e2f8f2','local','ae98a449-2d45-4221-a94f-a7fed4e2f8f2.png','national-security-agency-logo.png','national-security-agency logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:18:03',NULL,1688746683477,NULL,302586,1201,1201,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('95db0c05-a1c5-4be1-8e79-bc5301a39216','local','95db0c05-a1c5-4be1-8e79-bc5301a39216.png','neosec-logo.png','neosec logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:18:06',NULL,1688746686098,NULL,32838,1000,245,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('244cd577-9423-4f46-ac95-0de6f345ea5e','local','244cd577-9423-4f46-ac95-0de6f345ea5e.jpg','netally-logo.jpg','netally logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:18:09',NULL,1688746689400,NULL,34902,296,67,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('5ff97a8d-3def-45a2-a2e2-0fdc16a48ec6','local','5ff97a8d-3def-45a2-a2e2-0fdc16a48ec6.png','netquest-corporation-logo.png','netquest-corporation logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:18:11',NULL,1688746691841,NULL,7490,279,91,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('2ef80b3e-779f-496b-9cdf-bfa19560c57a','local','2ef80b3e-779f-496b-9cdf-bfa19560c57a.png','netspi-logo.png','netspi logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:18:14',NULL,1688746694703,NULL,13104,1153,278,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('ac27e7e5-7481-4ef1-999e-8b7cb0a6450d','local','ac27e7e5-7481-4ef1-999e-8b7cb0a6450d.png','netacea-logo.png','netacea logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:18:17',NULL,1688746697584,NULL,12541,500,197,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('62562798-a5c1-4656-80cc-c8722c5afc33','local','62562798-a5c1-4656-80cc-c8722c5afc33.png','netenrich-logo.png','netenrich logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:18:20',NULL,1688746700238,NULL,13379,3735,550,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('671f302e-0629-4d4b-8dd2-fa15bb9c113c','local','671f302e-0629-4d4b-8dd2-fa15bb9c113c.png','netography-logo.png','netography logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:18:22',NULL,1688746702896,NULL,15511,1801,362,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('3778b1bd-0ab2-4ea9-9032-8bd0cc258300','local','3778b1bd-0ab2-4ea9-9032-8bd0cc258300.jpg','netskope-logo.jpg','netskope logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:18:24',NULL,1688746704593,NULL,895372,2593,406,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('83348013-9145-4154-9c51-1f6e231ecfa2','local','83348013-9145-4154-9c51-1f6e231ecfa2.png','netwrix-logo.png','netwrix logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:18:27',NULL,1688746707610,NULL,7358,500,103,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('c8aa455f-d65a-4cdc-bfce-78e91394b1ed','local','c8aa455f-d65a-4cdc-bfce-78e91394b1ed.jpg','next-dlp-logo.jpg','next-dlp logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:18:30',NULL,1688746710061,NULL,12087,500,193,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('e309e9c8-4fb0-4ebb-a10d-02010c2fbb59','local','e309e9c8-4fb0-4ebb-a10d-02010c2fbb59.png','ninjaone-logo.png','ninjaone logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:18:32',NULL,1688746712696,NULL,9937,500,108,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('6acdddf1-e37b-438f-9435-c34604ec3571','local','6acdddf1-e37b-438f-9435-c34604ec3571.png','nokia-logo.png','nokia logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:18:35',NULL,1688746715385,NULL,35091,2400,542,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f685ad79-f766-451a-a01c-a4334933c862','local','f685ad79-f766-451a-a01c-a4334933c862.png','noname-security-logo.png','noname-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:18:38',NULL,1688746718058,NULL,6404,500,122,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d01f5fc2-a791-49c9-91ec-268497749009','local','d01f5fc2-a791-49c9-91ec-268497749009.png','nord-security-logo.png','nord-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:18:39',NULL,1688746719435,NULL,5577,500,180,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('9b0cfa62-ce43-490a-a2a7-1d46457ef773','local','9b0cfa62-ce43-490a-a2a7-1d46457ef773.png','normalyze-logo.png','normalyze logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:18:42',NULL,1688746722149,NULL,4658,181,133,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('12102fb4-1732-4cae-9fa7-1ae6eb7a889a','local','12102fb4-1732-4cae-9fa7-1ae6eb7a889a.png','nozomi-networks-logo.png','nozomi-networks logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:18:44',NULL,1688746724406,NULL,18286,1191,378,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('72a0f8cf-4a23-4062-9eb8-e41de8508790','local','72a0f8cf-4a23-4062-9eb8-e41de8508790.png','nucleus-security-logo.png','nucleus-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:18:47',NULL,1688746727045,NULL,8527,197,50,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('47a17e90-1ef4-45d0-a991-95c67ee5d8ff','local','47a17e90-1ef4-45d0-a991-95c67ee5d8ff.png','owasp-foundation-inc-logo.png','owasp-foundation-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:18:49',NULL,1688746729695,NULL,11091,1000,348,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('e5698024-305e-4646-90fe-ef91584a3c1e','local','e5698024-305e-4646-90fe-ef91584a3c1e.png','obsidian-security-logo.png','obsidian-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:18:52',NULL,1688746732189,NULL,95731,4448,948,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('ac60f76a-822e-4636-872e-9e23fe5f86e1','local','ac60f76a-822e-4636-872e-9e23fe5f86e1.png','okta-logo.png','okta logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:18:54',NULL,1688746734612,NULL,13428,1025,538,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('87a96c54-264c-46ee-95ec-a738df474554','local','87a96c54-264c-46ee-95ec-a738df474554.jpeg','oloid-inc-logo.jpeg','oloid-inc logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:18:57',NULL,1688746737295,NULL,3991,250,103,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('669a0a58-6329-4810-aa4a-d457bf0bdfba','local','669a0a58-6329-4810-aa4a-d457bf0bdfba.png','onapsis-logo.png','onapsis logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:18:59',NULL,1688746739770,NULL,12221,900,191,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('209df123-174c-468f-ae15-d6648206de3c','local','209df123-174c-468f-ae15-d6648206de3c.png','onetrust-logo.png','onetrust logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:19:02',NULL,1688746742421,NULL,5130,534,94,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('042b909d-bb08-4a73-b6de-4aed39af508a','local','042b909d-bb08-4a73-b6de-4aed39af508a.png','ontinue-the-mdr-division-of-open-systems-logo.png','ontinue-the-mdr-division-of-open-systems logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:19:05',NULL,1688746745118,NULL,225308,1892,616,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('fad2dac6-c568-49a9-9cec-4ad4bc77dda1','local','fad2dac6-c568-49a9-9cec-4ad4bc77dda1.png','oomnitza-logo.png','oomnitza logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:19:07',NULL,1688746747761,NULL,8954,646,106,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('96445656-574b-4db1-9725-3a1b8a531b8d','local','96445656-574b-4db1-9725-3a1b8a531b8d.png','open-raven-logo.png','open-raven logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:19:10',NULL,1688746750510,NULL,10007,500,217,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('b575ca09-07d3-42aa-8f6a-f5a7f4905555','local','b575ca09-07d3-42aa-8f6a-f5a7f4905555.png','opentext-cybersecurity-logo.png','opentext-cybersecurity logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:19:12',NULL,1688746752874,NULL,4275,518,97,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('46fed92e-6704-4889-9d80-c06f05fcd981','local','46fed92e-6704-4889-9d80-c06f05fcd981.png','optimal-idm-logo.png','optimal-idm logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:19:15',NULL,1688746755642,NULL,25149,500,64,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('2cd1ce6e-f042-46c3-b993-fdb38f552ec4','local','2cd1ce6e-f042-46c3-b993-fdb38f552ec4.png','optiv-logo.png','optiv logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:19:18',NULL,1688746759011,NULL,5022,200,100,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('c44ad4bb-fa93-4548-a7a2-86dfb41b5027','local','c44ad4bb-fa93-4548-a7a2-86dfb41b5027.png','orca-security-logo.png','orca-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:19:21',NULL,1688746761689,NULL,131227,4001,1839,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('6633d7dc-00fd-4385-b762-d35d5b85fd4d','local','6633d7dc-00fd-4385-b762-d35d5b85fd4d.png','ordr-logo.png','ordr logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:19:24',NULL,1688746764959,NULL,55004,1400,541,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('c13a5b6c-81b8-4f64-a395-63310c1e5e16','local','c13a5b6c-81b8-4f64-a395-63310c1e5e16.png','ox-security-logo.png','ox-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:19:27',NULL,1688746767816,NULL,4533,399,126,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('29218fc5-be3c-4d97-9fd5-348d6bb3827f','local','29218fc5-be3c-4d97-9fd5-348d6bb3827f.png','picus-logo.png','picus logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:19:33',NULL,1688746773063,NULL,144012,6542,1790,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('5c801e28-5f58-4228-b9cf-a06ec9b2085a','local','5c801e28-5f58-4228-b9cf-a06ec9b2085a.png','pkware-logo.png','pkware logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:19:35',NULL,1688746775598,NULL,5338,520,192,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('36ebf4e0-bbca-40c0-80ab-3c0098e6bb74','local','36ebf4e0-bbca-40c0-80ab-3c0098e6bb74.png','pqshield-logo.png','pqshield logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:19:38',NULL,1688746778058,NULL,32491,500,232,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f76605ff-b191-4cda-be51-0df272ea13c9','local','f76605ff-b191-4cda-be51-0df272ea13c9.jpg','palo-alto-networks-logo.jpg','palo-alto-networks logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:19:39',NULL,1688746779685,NULL,16455,446,156,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('2e849b2e-d688-4352-a2f6-f796a2191fca','local','2e849b2e-d688-4352-a2f6-f796a2191fca.png','panorays-logo.png','panorays logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:19:42',NULL,1688746782365,NULL,16049,512,175,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f559fa21-63f0-4708-8316-696618e2c876','local','f559fa21-63f0-4708-8316-696618e2c876.jpg','panther-logo.jpg','panther logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:19:44',NULL,1688746785033,NULL,43802,500,131,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('7ec5dc68-9c12-4131-9cc7-e36b3c942e56','local','7ec5dc68-9c12-4131-9cc7-e36b3c942e56.png','partner-with-finland-logo.png','partner-with-finland logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:19:47',NULL,1688746787687,NULL,3134,368,137,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('79860139-36d6-414c-b892-d2426bc04f26','local','79860139-36d6-414c-b892-d2426bc04f26.png','passbolt-logo.png','passbolt logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:19:49',NULL,1688746789047,NULL,2423,318,159,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('c1e58b8e-bd3b-41a8-9431-813ab4a3a366','local','c1e58b8e-bd3b-41a8-9431-813ab4a3a366.png','pavilion-of-spain-logo.png','pavilion-of-spain logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:19:52',NULL,1688746792357,NULL,7528,600,83,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('ed7eed9b-61ad-464f-894d-e0b70866f549','local','ed7eed9b-61ad-464f-894d-e0b70866f549.jpeg','penn-state-world-campus-logo.jpeg','penn-state-world-campus logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:19:54',NULL,1688746794849,NULL,9166,392,128,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('9cf9b08f-a964-4fc5-9b78-5dd0584add53','local','9cf9b08f-a964-4fc5-9b78-5dd0584add53.png','pentera-logo.png','pentera logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:19:57',NULL,1688746797511,NULL,8144,500,127,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('0ce70074-9c5a-4d96-8b12-fe72bd9060a9','local','0ce70074-9c5a-4d96-8b12-fe72bd9060a9.png','phishfirewall-logo.png','phishfirewall logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:20:00',NULL,1688746800399,NULL,7493,200,98,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('c72281d6-d121-41c8-bb5a-7b0f008eefff','local','c72281d6-d121-41c8-bb5a-7b0f008eefff.png','plextrac-inc-logo.png','plextrac-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:20:02',NULL,1688746802841,NULL,11668,500,103,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('0d047f71-dfee-45b7-9992-3f5771ee9648','local','0d047f71-dfee-45b7-9992-3f5771ee9648.jpeg','pluralsight-logo.jpeg','pluralsight logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:20:05',NULL,1688746805513,NULL,36873,504,86,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d1bf5e96-63d5-42a7-8dc2-730726b961dc','local','d1bf5e96-63d5-42a7-8dc2-730726b961dc.png','pradeo-logo.png','pradeo logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:20:08',NULL,1688746808173,NULL,32860,1563,235,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('4de7e25e-d9fa-4525-9fd7-2a1b0ae1bbaf','local','4de7e25e-d9fa-4525-9fd7-2a1b0ae1bbaf.png','privacera-logo.png','privacera logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:20:10',NULL,1688746811415,NULL,37966,500,113,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('687746e8-b386-4079-b8dd-a244e6e195fd','local','687746e8-b386-4079-b8dd-a244e6e195fd.png','probely-logo.png','probely logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:20:13',NULL,1688746813668,NULL,18769,500,218,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('55b98a60-095d-4029-8ea1-344409a0f491','local','55b98a60-095d-4029-8ea1-344409a0f491.png','processunity-logo.png','processunity logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:20:16',NULL,1688746816181,NULL,67733,400,75,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('058a6c45-802d-4adb-bb49-3dbfded98164','local','058a6c45-802d-4adb-bb49-3dbfded98164.png','promon-logo.png','promon logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:20:17',NULL,1688746817639,NULL,67508,4192,672,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('2cd2444c-6a34-49ac-a611-0fff178e4f80','local','2cd2444c-6a34-49ac-a611-0fff178e4f80.png','proofpoint-logo.png','proofpoint logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:20:20',NULL,1688746820245,NULL,9107,520,180,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f59f2a10-af16-48bb-b0e2-f67dd7e9c418','local','f59f2a10-af16-48bb-b0e2-f67dd7e9c418.png','qax-technology-group-inc-logo.png','qax-technology-group-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:20:23',NULL,1688746823561,NULL,188134,6960,1587,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d978756c-bcf7-40d5-a394-5c8fcca40ebe','local','d978756c-bcf7-40d5-a394-5c8fcca40ebe.png','qohash-logo.png','qohash logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:20:26',NULL,1688746826196,NULL,48746,3662,1150,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f0c242c8-f471-44fa-a879-593e123f14f1','local','f0c242c8-f471-44fa-a879-593e123f14f1.png','quantinuum-logo.png','quantinuum logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:20:28',NULL,1688746828867,NULL,7384,300,191,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('bbd55995-86b0-488c-89ff-1acc8ed2da94','local','bbd55995-86b0-488c-89ff-1acc8ed2da94.jpeg','quantropi-inc-logo.jpeg','quantropi-inc logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:20:31',NULL,1688746831331,NULL,155004,2500,821,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('40fd37d6-0e7e-4e24-8ed2-c9ab88e9ee38','local','40fd37d6-0e7e-4e24-8ed2-c9ab88e9ee38.jpg','quest-software-logo.jpg','quest-software logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:20:33',NULL,1688746833780,NULL,54658,1800,487,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('5fcef6a6-409a-4669-8746-9b6bf0bf5b60','local','5fcef6a6-409a-4669-8746-9b6bf0bf5b60.png','quintessencelabs-logo.png','quintessencelabs logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:20:36',NULL,1688746836845,NULL,12263,1197,567,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('177bf6dd-1b3e-4ae7-9a5a-31461d45f5d7','local','177bf6dd-1b3e-4ae7-9a5a-31461d45f5d7.png','qwiet-ai-logo.png','qwiet-ai logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:20:39',NULL,1688746839505,NULL,31832,2000,1000,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('ed678556-ff29-422b-8cb2-7f4821c20a79','local','ed678556-ff29-422b-8cb2-7f4821c20a79.png','rsa-logo.png','rsa logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:20:42',NULL,1688746842380,NULL,20689,461,200,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('2f88ca57-61d3-4ae8-b773-83f40fab96b4','local','2f88ca57-61d3-4ae8-b773-83f40fab96b4.png','runecast-solutions-logo.png','runecast-solutions logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:20:44',NULL,1688746844936,NULL,2483,383,90,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('ab4b94c6-905c-40c7-920a-ef28ec59b8b3','local','ab4b94c6-905c-40c7-920a-ef28ec59b8b3.jpg','rackmount-it-logo.jpg','rackmount-it logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:20:47',NULL,1688746847906,NULL,34885,1000,104,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('df34e4be-3612-415f-8f5c-dae1088ceceb','local','df34e4be-3612-415f-8f5c-dae1088ceceb.png','rackspace-technology-government-solutions-logo.png','rackspace-technology-government-solutions logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:20:50',NULL,1688746850346,NULL,57888,2000,401,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('e6f6f1a9-6052-4b1e-b318-63e6411c12a0','local','e6f6f1a9-6052-4b1e-b318-63e6411c12a0.png','radiant-logic-logo.png','radiant-logic logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:20:53',NULL,1688746853221,NULL,17746,680,200,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('32e05464-403c-4848-ab67-580a4f342578','local','32e05464-403c-4848-ab67-580a4f342578.jpg','radware-inc-logo.jpg','radware-inc logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:20:55',NULL,1688746855288,NULL,21122,513,86,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('b6f92b19-6cf6-41f2-9f76-55a581b485b9','local','b6f92b19-6cf6-41f2-9f76-55a581b485b9.jpg','rangeforce-logo.jpg','rangeforce logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:20:57',NULL,1688746857316,NULL,9933,500,206,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('48817320-dcc2-44d3-9737-ad8ed5240e32','local','48817320-dcc2-44d3-9737-ad8ed5240e32.png','rapidfort-logo.png','rapidfort logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:21:00',NULL,1688746860425,NULL,217383,5682,2084,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('b47965e6-ffb5-4c85-aae7-bfb46751ef4f','local','b47965e6-ffb5-4c85-aae7-bfb46751ef4f.png','recorded-future-logo.png','recorded-future logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:21:03',NULL,1688746863051,NULL,16936,989,272,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('6f5c2f55-1a5b-4282-9964-d6742df69d92','local','6f5c2f55-1a5b-4282-9964-d6742df69d92.jpg','radware-inc-logo.jpg','radware-inc logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:21:04',NULL,1688746864493,NULL,21122,513,86,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('520a5cc5-68e0-4d8f-ac5a-c458fa690214','local','520a5cc5-68e0-4d8f-ac5a-c458fa690214.png','red-canary-logo.png','red-canary logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:21:07',NULL,1688746867824,NULL,25734,1000,298,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('b5f175e7-7a1a-4677-8187-769315a24d57','local','b5f175e7-7a1a-4677-8187-769315a24d57.png','redseal-logo.png','redseal logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:21:09',NULL,1688746869404,NULL,133294,2400,505,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('fa67d20b-ce12-4bd2-b0aa-278eb1016287','local','fa67d20b-ce12-4bd2-b0aa-278eb1016287.png','reliaquest-logo.png','reliaquest logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:21:12',NULL,1688746872269,NULL,59710,4592,1034,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('0a564f50-b51e-4abd-9b57-3d662277e4e5','local','0a564f50-b51e-4abd-9b57-3d662277e4e5.png','relyance-ai-logo.png','relyance-ai logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:21:14',NULL,1688746875040,NULL,3881,571,88,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('6d027283-9e89-4403-a877-e3916c162c84','local','6d027283-9e89-4403-a877-e3916c162c84.png','resecurity-inc-logo.png','resecurity-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:21:17',NULL,1688746877599,NULL,30519,1500,388,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('a56daabf-4afa-4006-bf11-4d697e730bee','local','a56daabf-4afa-4006-bf11-4d697e730bee.png','revealsecurity-logo.png','revealsecurity logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:21:20',NULL,1688746880265,NULL,18056,1389,324,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('00e72a4a-3aed-4f53-bf28-75197dbead88','local','00e72a4a-3aed-4f53-bf28-75197dbead88.png','reversinglabs-logo.png','reversinglabs logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:21:22',NULL,1688746882930,NULL,13876,528,297,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('577f2a18-aa45-406e-87dc-72f86d59351a','local','577f2a18-aa45-406e-87dc-72f86d59351a.png','ridge-security-technology-inc-logo.png','ridge-security-technology-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:21:25',NULL,1688746885595,NULL,29235,553,910,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('34eb3198-f7ff-4eed-a6b7-4d6b33414bca','local','34eb3198-f7ff-4eed-a6b7-4d6b33414bca.png','riskoptics-logo.png','riskoptics logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:21:27',NULL,1688746887244,NULL,50299,3334,810,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('b3444263-06d0-470e-b8ad-069d21ed2635','local','b3444263-06d0-470e-b8ad-069d21ed2635.png','riskrecon-a-mastercard-company-logo.png','riskrecon-a-mastercard-company logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:21:29',NULL,1688746889898,NULL,24769,500,216,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('8d9e7664-91ef-4d51-8d8c-b88e041fc7d5','local','8d9e7664-91ef-4d51-8d8c-b88e041fc7d5.png','rockwell-automation-logo.png','rockwell-automation logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:21:32',NULL,1688746892317,NULL,19887,1043,355,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('bf62e12d-eead-42da-8a56-3255edd277db','local','bf62e12d-eead-42da-8a56-3255edd277db.png','rubrik-logo.png','rubrik logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:21:34',NULL,1688746894820,NULL,28917,901,260,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('7510d4fc-220b-4818-b061-c290620ec2cd','local','7510d4fc-220b-4818-b061-c290620ec2cd.png','s3m-security-logo.png','s3m-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:21:38',NULL,1688746898070,NULL,58757,1899,900,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f4666650-72e5-4fca-9f18-37ef027bafb7','local','f4666650-72e5-4fca-9f18-37ef027bafb7.png','sands-lab-logo.png','sands-lab logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:21:40',NULL,1688746900711,NULL,620457,20036,5740,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('015b68a2-c4b2-45e3-9c90-4202d135c49b','local','015b68a2-c4b2-45e3-9c90-4202d135c49b.png','sans-institute-logo.png','sans-institute logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:21:43',NULL,1688746903760,NULL,47674,500,300,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('1f9b9f14-8eb8-4836-9ce7-1f58ae4d9ec9','local','1f9b9f14-8eb8-4836-9ce7-1f58ae4d9ec9.png','sgs-north-america-logo.png','sgs-north-america logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:21:46',NULL,1688746906269,NULL,3376,325,155,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('9419e46b-e81b-4681-af55-bda17193c645','local','9419e46b-e81b-4681-af55-bda17193c645.png','sisa-logo.png','sisa logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:21:48',NULL,1688746908728,NULL,74565,1264,651,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('6f5a515e-dde2-4d74-90d9-a1ca839ee6ac','local','6f5a515e-dde2-4d74-90d9-a1ca839ee6ac.png','softwarfare-logo.png','softwarfare logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:21:51',NULL,1688746911397,NULL,84803,1906,686,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('646434df-c18d-425a-a033-e96e697825ae','local','646434df-c18d-425a-a033-e96e697825ae.png','soos-logo.png','soos logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:21:54',NULL,1688746914058,NULL,76058,1000,326,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('080b7f6b-1d1f-42d8-8670-cb0138a400b4','local','080b7f6b-1d1f-42d8-8670-cb0138a400b4.png','sphere-logo.png','sphere logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:21:56',NULL,1688746916486,NULL,32141,863,276,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d7b889c4-9b7d-49b9-8b63-2744d3ee3f84','local','d7b889c4-9b7d-49b9-8b63-2744d3ee3f84.png','ssh-communications-security-logo.png','ssh-communications-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:21:59',NULL,1688746919158,NULL,7923,500,214,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('bef8f78d-94bd-40c7-88df-b62a86f14479','local','bef8f78d-94bd-40c7-88df-b62a86f14479.png','stellar-cyber-logo.png','stellar-cyber logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:22:01',NULL,1688746921896,NULL,412062,3232,1024,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('ac5e16c8-fb3d-417c-9f25-01a2ffde1fc0','local','ac5e16c8-fb3d-417c-9f25-01a2ffde1fc0.png','safe-security-logo.png','safe-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:22:03',NULL,1688746923891,NULL,5371,500,131,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('abf67036-48dc-42ac-bf07-73fa4869c264','local','abf67036-48dc-42ac-bf07-73fa4869c264.png','safebase-logo.png','safebase logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:22:06',NULL,1688746926297,NULL,14708,500,197,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('5e0e45a2-71d0-4fe0-aade-15b7f4ccc45d','local','5e0e45a2-71d0-4fe0-aade-15b7f4ccc45d.jpg','safebreach-logo.jpg','safebreach logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:22:09',NULL,1688746929121,NULL,9406,500,63,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('4a48c9c5-d56a-4990-a16c-70c46356c9e8','local','4a48c9c5-d56a-4990-a16c-70c46356c9e8.png','sailpoint-logo.png','sailpoint logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:22:11',NULL,1688746931870,NULL,7073,588,210,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('ee56c873-d7dc-4db5-aabb-112917b2aa01','local','ee56c873-d7dc-4db5-aabb-112917b2aa01.png','salt-security-logo.png','salt-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:22:14',NULL,1688746934533,NULL,4209,417,121,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('e7a4dcdb-86d2-4535-89c4-de2b6d64f28e','local','e7a4dcdb-86d2-4535-89c4-de2b6d64f28e.png','sasa-software-logo.png','sasa-software logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:22:17',NULL,1688746937201,NULL,44193,859,189,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('fac45a7d-7d54-46b7-b736-1ff0185cc721','local','fac45a7d-7d54-46b7-b736-1ff0185cc721.png','saviynt-logo.png','saviynt logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:22:19',NULL,1688746939649,NULL,2820,425,119,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('653ab14d-8760-46ea-92a8-12c416b191a1','local','653ab14d-8760-46ea-92a8-12c416b191a1.png','searchlight-cyber-logo.png','searchlight-cyber logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:22:22',NULL,1688746942301,NULL,25132,500,177,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('b02b8642-36ca-42a5-9db8-23f03d1cce4e','local','b02b8642-36ca-42a5-9db8-23f03d1cce4e.png','secpod-technologies-logo.png','secpod-technologies logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:22:24',NULL,1688746944989,NULL,48778,2048,683,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('da3e4736-cd7a-4ef5-981e-e1be73830dde','local','da3e4736-cd7a-4ef5-981e-e1be73830dde.png','sectigo-logo.png','sectigo logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:22:28',NULL,1688746948253,NULL,31680,2146,410,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('7c45413d-232f-4ddf-85d2-6b25a61738d9','local','7c45413d-232f-4ddf-85d2-6b25a61738d9.png','secutech-logo.png','secutech logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:22:29',NULL,1688746949595,NULL,2277,354,148,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('89406ef5-155f-4a96-ba1e-2644ff5fbf29','local','89406ef5-155f-4a96-ba1e-2644ff5fbf29.png','secureauth-logo.png','secureauth logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:22:34',NULL,1688746954126,NULL,116129,5669,969,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('022d7552-10e8-4212-9d90-a61f61ceb3fb','local','022d7552-10e8-4212-9d90-a61f61ceb3fb.jpg','security-compass-logo.jpg','security-compass logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:22:36',NULL,1688746956129,NULL,8232,500,62,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('9d404daf-2fa9-4d56-a90d-a3400fc156ba','local','9d404daf-2fa9-4d56-a90d-a3400fc156ba.jpg','security-compass-logo.jpg','security-compass logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:22:36',NULL,1688746956504,NULL,8232,500,62,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('4876981c-66f4-4eb4-b820-2e5c0e70c315','local','4876981c-66f4-4eb4-b820-2e5c0e70c315.png','security-journey-logo.png','security-journey logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:22:39',NULL,1688746959524,NULL,22095,1397,253,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('5680f46b-d0d4-4d57-934b-c3df73e63e97','local','5680f46b-d0d4-4d57-934b-c3df73e63e97.png','securitymetrics-logo.png','securitymetrics logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:22:42',NULL,1688746962188,NULL,5756,500,120,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('b0f9412d-8f02-40f7-aad1-132c5ffd914c','local','b0f9412d-8f02-40f7-aad1-132c5ffd914c.png','securityscorecard-logo.png','securityscorecard logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:22:45',NULL,1688746965250,NULL,42275,640,166,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('92167223-9c16-459e-b910-303676c45172','local','92167223-9c16-459e-b910-303676c45172.png','securonix-logo.png','securonix logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:22:47',NULL,1688746967716,NULL,6790,601,100,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('9191788e-c863-4adc-aa96-3215f4b711f1','local','9191788e-c863-4adc-aa96-3215f4b711f1.png','senseon-logo.png','senseon logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:22:50',NULL,1688746970902,NULL,116278,5556,2000,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('17bf8a5e-8f29-44cf-8df4-7ed9522e3937','local','17bf8a5e-8f29-44cf-8df4-7ed9522e3937.png','sentinelone-logo.png','sentinelone logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:22:53',NULL,1688746973558,NULL,25597,1702,288,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('58d46086-703f-4103-9537-52c2fbac7102','local','58d46086-703f-4103-9537-52c2fbac7102.png','sentra-logo.png','sentra logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:22:56',NULL,1688746976744,NULL,5345,558,122,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('962d648f-858f-4cc0-bbee-eff6aaf4957f','local','962d648f-858f-4cc0-bbee-eff6aaf4957f.jpg','sepio-logo.jpg','sepio logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:22:59',NULL,1688746979179,NULL,50641,1260,378,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('6d085443-e8f0-4ef5-b057-7dd43dfa9308','local','6d085443-e8f0-4ef5-b057-7dd43dfa9308.png','servadus-logo.png','servadus logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:23:01',NULL,1688746981839,NULL,5429,250,47,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('b1c09c27-6690-4726-a638-03d484e669bb','local','b1c09c27-6690-4726-a638-03d484e669bb.png','silobreaker-logo.png','silobreaker logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:23:03',NULL,1688746983428,NULL,6957,506,99,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('cd383217-61bc-4ef1-ab7f-76f87264bab8','local','cd383217-61bc-4ef1-ab7f-76f87264bab8.png','silverfort-logo.png','silverfort logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:23:06',NULL,1688746986110,NULL,16015,1468,322,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('6066146d-ad59-40ed-a4d2-f161934a20e4','local','6066146d-ad59-40ed-a4d2-f161934a20e4.png','simspace-logo.png','simspace logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:23:07',NULL,1688746987414,NULL,5766,1312,147,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('289d2def-2f47-4491-a541-0247f09495b1','local','289d2def-2f47-4491-a541-0247f09495b1.jpg','simeon-cloud-logo.jpg','simeon-cloud logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:23:10',NULL,1688746990561,NULL,89997,848,578,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('93c6309c-54b5-49dc-b3ee-7ed0f3419b71','local','93c6309c-54b5-49dc-b3ee-7ed0f3419b71.jpg','skopenow-logo.jpg','skopenow logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:23:13',NULL,1688746993411,NULL,1017582,7700,1960,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('32ab5ce4-a8d3-4515-92a8-88399e6519a0','local','32ab5ce4-a8d3-4515-92a8-88399e6519a0.png','skyhigh-security-logo.png','skyhigh-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:23:16',NULL,1688746996068,NULL,18754,994,311,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('dd2af02a-01ad-4f79-a976-57787f3a37c1','local','dd2af02a-01ad-4f79-a976-57787f3a37c1.png','slashnext-logo.png','slashnext logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:23:19',NULL,1688746999146,NULL,59949,3105,894,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('6852cd1f-21a1-4280-96a3-27f820d62797','local','6852cd1f-21a1-4280-96a3-27f820d62797.png','snapattack-logo.png','snapattack logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:23:22',NULL,1688747002311,NULL,2878,355,142,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('e9549820-7a59-409a-b97e-7c16794611d6','local','e9549820-7a59-409a-b97e-7c16794611d6.png','snyk-logo.png','snyk logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:23:25',NULL,1688747006011,NULL,25999,602,342,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('164f59d8-de1f-40d4-b740-cf448209ca86','local','164f59d8-de1f-40d4-b740-cf448209ca86.jpeg','software-engineering-institute-at-carnegie-mellon-university-logo.jpeg','software-engineering-institute-at-carnegie-mellon-university logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:23:28',NULL,1688747008681,NULL,9406,542,93,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('38ac352f-92e0-495e-9ad7-2035ecded708','local','38ac352f-92e0-495e-9ad7-2035ecded708.jpg','solarwinds-logo.jpg','solarwinds logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:23:31',NULL,1688747011303,NULL,79067,1375,500,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('65f4eb12-b34e-4619-b8f9-8420840c8e1d','local','65f4eb12-b34e-4619-b8f9-8420840c8e1d.png','sonatype-logo.png','sonatype logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:23:33',NULL,1688747013174,NULL,3784,361,140,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d169e532-678a-4315-abc2-9afdeb257197','local','d169e532-678a-4315-abc2-9afdeb257197.jpg','sonicwall-logo.jpg','sonicwall logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:23:35',NULL,1688747015875,NULL,128836,1796,298,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('ddc5de9b-55b5-4444-aeef-5aacf0b20b84','local','ddc5de9b-55b5-4444-aeef-5aacf0b20b84.png','spanning-logo.png','spanning logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:23:38',NULL,1688747018283,NULL,4875,433,116,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('32832546-589d-4188-8f50-db9d43143193','local','32832546-589d-4188-8f50-db9d43143193.png','specterops-logo.png','specterops logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:23:40',NULL,1688747020957,NULL,10069,790,187,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('258d1bc6-7dce-4f6f-8b95-948102a12b34','local','258d1bc6-7dce-4f6f-8b95-948102a12b34.png','spin-ai-logo.png','spin-ai logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:23:42',NULL,1688747022517,NULL,28001,700,350,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('fdd57a35-f7e5-4f98-a5d8-3f2e274f0e8e','local','fdd57a35-f7e5-4f98-a5d8-3f2e274f0e8e.jpg','spirion-logo.jpg','spirion logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:23:44',NULL,1688747024516,NULL,164759,2000,511,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('58ed512a-72c6-4193-ae9e-0ad0e77b5276','local','58ed512a-72c6-4193-ae9e-0ad0e77b5276.png','splunk-logo.png','splunk logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:23:53',NULL,1688747033138,NULL,57648,3762,1117,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d05fcaaf-2915-486e-bfb7-07cbf8dfc253','local','d05fcaaf-2915-486e-bfb7-07cbf8dfc253.jpg','spycloud-logo.jpg','spycloud logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:23:55',NULL,1688747035840,NULL,187989,3230,1043,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('ca1c3955-7ce3-4d83-afc3-f0d4659b33dc','local','ca1c3955-7ce3-4d83-afc3-f0d4659b33dc.png','spyderbat-logo.png','spyderbat logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:23:58',NULL,1688747038609,NULL,21791,500,93,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('1e3758b3-bc76-4b71-91d1-331531d328af','local','1e3758b3-bc76-4b71-91d1-331531d328af.png','stackhawk-logo.png','stackhawk logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:24:01',NULL,1688747041239,NULL,4109,389,129,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('e94eb257-c1fb-4660-8d19-6dc8b4c9f214','local','e94eb257-c1fb-4660-8d19-6dc8b4c9f214.jpg','strider-logo.jpg','strider logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:24:04',NULL,1688747044475,NULL,92001,1254,369,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('7ab4ac56-5a51-4edd-a694-25f9f3e0568d','local','7ab4ac56-5a51-4edd-a694-25f9f3e0568d.png','strike-graph-logo.png','strike-graph logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:24:06',NULL,1688747046977,NULL,4888,431,117,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('649d8da5-c105-441d-b553-b2a76e85e184','local','649d8da5-c105-441d-b553-b2a76e85e184.png','stytch-logo.png','stytch logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:24:08',NULL,1688747048512,NULL,5376,500,94,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('bc307103-da4c-429a-ae75-37e8ee97f801','local','bc307103-da4c-429a-ae75-37e8ee97f801.png','sumo-logic-logo.png','sumo-logic logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:24:11',NULL,1688747051283,NULL,4374,521,97,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d7bda256-7619-4365-8708-a60223d59213','local','d7bda256-7619-4365-8708-a60223d59213.png','swimlane-logo.png','swimlane logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:24:13',NULL,1688747053949,NULL,24594,912,190,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d1422fb4-c90e-4823-bf24-6fe501e1be0e','local','d1422fb4-c90e-4823-bf24-6fe501e1be0e.jpg','synopsys-logo.jpg','synopsys logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:24:16',NULL,1688747056705,NULL,15887,383,132,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('af2c9d7d-8c1b-4e54-b6c4-747e1f3ae9ef','local','af2c9d7d-8c1b-4e54-b6c4-747e1f3ae9ef.png','sysdig-logo.png','sysdig logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:24:19',NULL,1688747059262,NULL,49689,1921,691,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('5a4e88f2-0c6d-4977-87a1-f2e9b11564ac','local','5a4e88f2-0c6d-4977-87a1-f2e9b11564ac.png','syxsense-logo.png','syxsense logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:24:21',NULL,1688747061923,NULL,4522,500,91,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('81cddd7b-3a9c-4a0d-b113-efb8d041ed08','local','81cddd7b-3a9c-4a0d-b113-efb8d041ed08.jpg','tehtris-logo.jpg','tehtris logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:24:30',NULL,1688747070631,NULL,978021,2922,1035,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('42978b9f-093d-4156-8015-abf07d2223be','local','42978b9f-093d-4156-8015-abf07d2223be.png','teksystems-risk-and-security-services-logo.png','teksystems-risk-and-security-services logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:24:33',NULL,1688747073613,NULL,43471,1958,636,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('ac22e068-08dc-4449-9662-be4d513457ca','local','ac22e068-08dc-4449-9662-be4d513457ca.jpg','txone-networks-logo.jpg','txone-networks logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:24:38',NULL,1688747078319,NULL,10621,500,174,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('0dd827d5-d627-4460-8d4e-c16ab7c7ad0a','local','0dd827d5-d627-4460-8d4e-c16ab7c7ad0a.png','tailscale-logo.png','tailscale logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:24:40',NULL,1688747080975,NULL,8306,500,92,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('9cf3a052-8af7-4756-a78d-6c75c049e574','local','9cf3a052-8af7-4756-a78d-6c75c049e574.jpg','tamnoon-logo.jpg','tamnoon logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:24:43',NULL,1688747083435,NULL,79075,500,431,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('4fc1fb5c-e62f-4103-be38-db6b1c6dea10','local','4fc1fb5c-e62f-4103-be38-db6b1c6dea10.jpg','team-cymru-logo.jpg','team-cymru logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:24:45',NULL,1688747085081,NULL,21410,289,76,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('5e615cd4-3fad-4519-b153-971e91f8efce','local','5e615cd4-3fad-4519-b153-971e91f8efce.jpg','team-cymru-logo.jpg','team-cymru logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:24:45',NULL,1688747085498,NULL,21410,289,76,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('682f3a2d-fa0c-4c60-9bbd-97459936942c','local','682f3a2d-fa0c-4c60-9bbd-97459936942c.png','techguard-logo.png','techguard logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:24:47',NULL,1688747087839,NULL,31608,2080,484,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d6e3eddf-1129-45c3-a37c-76cc5fe9c0c4','local','d6e3eddf-1129-45c3-a37c-76cc5fe9c0c4.png','techtarget-logo.png','techtarget logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:24:50',NULL,1688747090599,NULL,13764,838,334,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('66506982-867d-4160-a528-59eb1f7bac5a','local','66506982-867d-4160-a528-59eb1f7bac5a.jpg','technology-record-logo.jpg','technology-record logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:24:53',NULL,1688747093340,NULL,1005055,1727,505,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('e9fdfbb6-6619-4d0f-a2bf-dd70b2f652de','local','e9fdfbb6-6619-4d0f-a2bf-dd70b2f652de.png','techstrong-group-logo.png','techstrong-group logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:24:55',NULL,1688747095837,NULL,27766,2084,446,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('19bba364-71a0-410c-b9a5-69b38c133d43','local','19bba364-71a0-410c-b9a5-69b38c133d43.png','teleport-logo.png','teleport logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:24:59',NULL,1688747099525,NULL,5720,310,163,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('a2322709-ca62-4a41-af8d-daa34df1ec7c','local','a2322709-ca62-4a41-af8d-daa34df1ec7c.jpg','telesign-logo.jpg','telesign logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:25:02',NULL,1688747102170,NULL,702437,5392,1118,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('a92caff5-4d81-4aca-a23a-f7beea40db35','local','a92caff5-4d81-4aca-a23a-f7beea40db35.png','tenable-logo.png','tenable logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:25:04',NULL,1688747104719,NULL,36746,520,146,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('6f41397c-9cb7-4b61-907d-63e5f077cbf6','local','6f41397c-9cb7-4b61-907d-63e5f077cbf6.png','teramind-inc-logo.png','teramind-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:25:06',NULL,1688747106744,NULL,25909,2396,534,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('8df5225c-e106-4ffa-a058-cc18f810251a','local','8df5225c-e106-4ffa-a058-cc18f810251a.png','tessian-logo.png','tessian logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:25:09',NULL,1688747109447,NULL,2191,395,127,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('bdb13445-a54c-4d8d-97e4-bc7c1643df45','local','bdb13445-a54c-4d8d-97e4-bc7c1643df45.png','thales-logo.png','thales logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:25:11',NULL,1688747112009,NULL,5633,476,106,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('8fe897ac-0ac9-4933-8ed5-35e62e17fbfc','local','8fe897ac-0ac9-4933-8ed5-35e62e17fbfc.png','the-cyberwire-logo.png','the-cyberwire logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:25:14',NULL,1688747114834,NULL,53087,3200,687,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('a155d578-df93-44b9-a0b2-57f99b1cac45','local','a155d578-df93-44b9-a0b2-57f99b1cac45.png','theom-logo.png','theom logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:25:16',NULL,1688747116610,NULL,42280,500,204,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('173a3fd8-bd17-4c77-98ea-336b8811828e','local','173a3fd8-bd17-4c77-98ea-336b8811828e.png','theom-logo.png','theom logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:25:16',NULL,1688747116733,NULL,42280,500,204,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('ad440e2a-f239-48bf-ab39-2fd2a2d8de9d','local','ad440e2a-f239-48bf-ab39-2fd2a2d8de9d.png','think-cyber-security-ltd-logo.png','think-cyber-security-ltd logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:25:19',NULL,1688747119641,NULL,22426,500,118,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('6e98f030-7c15-40a3-a3e2-aaa8faca0bf7','local','6e98f030-7c15-40a3-a3e2-aaa8faca0bf7.png','thinkst-canary-logo.png','thinkst-canary logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:25:22',NULL,1688747122148,NULL,11733,519,86,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('0aa66fd9-7aa0-42c1-8e0d-279619ad9f03','local','0aa66fd9-7aa0-42c1-8e0d-279619ad9f03.png','threatbook-logo.png','threatbook logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:25:24',NULL,1688747124810,NULL,14761,500,135,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('fb32ebc2-5b97-4ffb-ba08-63d70daa91ba','local','fb32ebc2-5b97-4ffb-ba08-63d70daa91ba.png','threatconnect-logo.png','threatconnect logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:25:27',NULL,1688747128021,NULL,29283,1252,159,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('5f6fe45b-6296-46b0-88be-a6d11f157ab8','local','5f6fe45b-6296-46b0-88be-a6d11f157ab8.png','threatlocker-logo.png','threatlocker logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:25:30',NULL,1688747130586,NULL,3654,500,114,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('830437d7-9777-4359-b21e-a16152647b14','local','830437d7-9777-4359-b21e-a16152647b14.png','threatx-logo.png','threatx logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:25:33',NULL,1688747133722,NULL,4784,577,91,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('7fdd30be-0d6c-4c71-888a-f37997be0e62','local','7fdd30be-0d6c-4c71-888a-f37997be0e62.png','threatdefence-logo.png','threatdefence logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:25:36',NULL,1688747136383,NULL,7334,500,60,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('5f577a11-1234-40b7-ac06-607526758487','local','5f577a11-1234-40b7-ac06-607526758487.png','tidelift-logo.png','tidelift logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:25:38',NULL,1688747138932,NULL,12018,500,74,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('341500f8-6c6a-47b1-ae5d-947cc09e37f2','local','341500f8-6c6a-47b1-ae5d-947cc09e37f2.png','tines-logo.png','tines logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:25:41',NULL,1688747141594,NULL,39951,1986,616,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('fe509ae6-fee0-4fcb-a368-e6c39376361a','local','fe509ae6-fee0-4fcb-a368-e6c39376361a.png','torq-logo.png','torq logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:25:44',NULL,1688747144782,NULL,3537,466,154,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('addf3281-6665-4c14-aea0-26793bbab03b','local','addf3281-6665-4c14-aea0-26793bbab03b.png','traceable-logo.png','traceable logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:25:54',NULL,1688747154598,NULL,14397,1055,220,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('34868524-865e-4ae4-891f-2bc74d958dce','local','34868524-865e-4ae4-891f-2bc74d958dce.png','trellix-logo.png','trellix logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:29:45',NULL,1688747385830,NULL,14050,500,125,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('6b072a23-f689-41ce-849f-192ba7610672','local','6b072a23-f689-41ce-849f-192ba7610672.jpg','tresorit-logo.jpg','tresorit logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:29:48',NULL,1688747388456,NULL,506016,3800,1480,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('326df957-4d81-4e67-a1b4-b984bc4c469a','local','326df957-4d81-4e67-a1b4-b984bc4c469a.png','truefort-logo.png','truefort logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:29:51',NULL,1688747391273,NULL,31078,2360,652,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('170edd81-7ac5-41dc-baeb-763f636c8768','local','170edd81-7ac5-41dc-baeb-763f636c8768.JPG','trustwave-logo.JPG','trustwave logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:29:53',NULL,1688747393940,NULL,36437,1280,226,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('0947d18b-1437-4ee8-a693-e113217d6ca8','local','0947d18b-1437-4ee8-a693-e113217d6ca8.png','tufin-logo.png','tufin logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:29:56',NULL,1688747396735,NULL,26632,1135,437,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('47014879-fc5c-4cb3-9871-0862426e44c4','local','47014879-fc5c-4cb3-9871-0862426e44c4.png','twingate-logo.png','twingate logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:29:59',NULL,1688747399210,NULL,15059,1000,224,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('8dae9e16-7b64-411b-a4d0-d4ed00a261f0','local','8dae9e16-7b64-411b-a4d0-d4ed00a261f0.png','utimaco-inc-logo.png','utimaco-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:30:01',NULL,1688747401067,NULL,14921,1182,265,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('4275b659-7a11-4db2-a6c9-708f4f120843','local','4275b659-7a11-4db2-a6c9-708f4f120843.png','utimaco-inc-logo.png','utimaco-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:30:01',NULL,1688747401108,NULL,14921,1182,265,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('2c86325b-555b-480b-a1da-4b92fa64d419','local','2c86325b-555b-480b-a1da-4b92fa64d419.png','uptycs-logo.png','uptycs logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:30:03',NULL,1688747403743,NULL,12197,801,238,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('4862788f-7b21-4abc-9a1b-79c39b4079a3','local','4862788f-7b21-4abc-9a1b-79c39b4079a3.png','vmware-logo.png','vmware logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:30:06',NULL,1688747406208,NULL,7931,360,116,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('092272d5-e088-4967-a6be-d7f5d42c310b','local','092272d5-e088-4967-a6be-d7f5d42c310b.png','varonis-logo.png','varonis logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:30:09',NULL,1688747409704,NULL,35319,2167,362,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('ea178e22-c1bd-4a55-920e-d80915f69b31','local','ea178e22-c1bd-4a55-920e-d80915f69b31.png','veeam-logo.png','veeam logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:30:12',NULL,1688747412352,NULL,16075,1031,387,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('0515a136-5b87-42b6-becc-229a9b079057','local','0515a136-5b87-42b6-becc-229a9b079057.png','vehere-logo.png','vehere logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:30:14',NULL,1688747415019,NULL,7115,500,179,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('c31df147-c7aa-44ca-bded-afa805dc95d7','local','c31df147-c7aa-44ca-bded-afa805dc95d7.png','venafi-logo.png','venafi logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:30:17',NULL,1688747417366,NULL,3170,366,138,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('bb7feb17-e4d6-4a80-b111-c18eea5e9dc9','local','bb7feb17-e4d6-4a80-b111-c18eea5e9dc9.png','veracode-logo.png','veracode logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:30:20',NULL,1688747420137,NULL,3929,360,54,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('96580221-d19d-4bb8-8952-cd0626d83f65','local','96580221-d19d-4bb8-8952-cd0626d83f65.jpg','verimatrix-inc-logo.jpg','verimatrix-inc logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:30:22',NULL,1688747422805,NULL,5117,298,124,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('c5b31125-955b-4834-8d50-f3267f5502fc','local','c5b31125-955b-4834-8d50-f3267f5502fc.png','veriti-logo.png','veriti logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:30:25',NULL,1688747425474,NULL,3918,406,124,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('7dfc1cb2-0d73-48ce-8779-8cb113528406','local','7dfc1cb2-0d73-48ce-8779-8cb113528406.png','verizon-logo.png','verizon logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:30:28',NULL,1688747428150,NULL,78015,3392,1261,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f73fb4de-6bc9-492b-a635-102bf89c7a58','local','f73fb4de-6bc9-492b-a635-102bf89c7a58.png','versa-networks-logo.png','versa-networks logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:30:30',NULL,1688747430988,NULL,9089,261,106,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('6b8cf852-547a-487c-a6a4-0833cf07bc07','local','6b8cf852-547a-487c-a6a4-0833cf07bc07.png','virtue-security-logo.png','virtue-security logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:30:33',NULL,1688747434015,NULL,25246,200,150,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('fa08f530-5a51-4903-9c17-4f915a290d65','local','fa08f530-5a51-4903-9c17-4f915a290d65.jpg','votiro-logo.jpg','votiro logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:30:36',NULL,1688747436696,NULL,710602,5149,1019,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('360eff57-3a4f-465f-8d62-fe88716ec1d7','local','360eff57-3a4f-465f-8d62-fe88716ec1d7.png','vulcan-cyber-logo.png','vulcan-cyber logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:30:39',NULL,1688747439157,NULL,21011,1200,627,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('db32979e-9203-4d3e-8323-924e8b4ef66b','local','db32979e-9203-4d3e-8323-924e8b4ef66b.png','wallarm-logo.png','wallarm logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:30:42',NULL,1688747442042,NULL,4036,321,157,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('eafbf450-c3de-4bf8-82d6-dc812c863ba5','local','eafbf450-c3de-4bf8-82d6-dc812c863ba5.png','waratek-logo.png','waratek logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:30:44',NULL,1688747444715,NULL,5512,392,128,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('25ed5455-ec75-43df-932f-4c2f52111871','local','25ed5455-ec75-43df-932f-4c2f52111871.png','whistic-logo.png','whistic logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:30:47',NULL,1688747447367,NULL,8724,400,116,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('0649c0a2-f138-4fd0-9949-66f8479a024e','local','0649c0a2-f138-4fd0-9949-66f8479a024e.png','wib-logo.png','wib logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:30:49',NULL,1688747449837,NULL,125832,2782,1028,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('66f92336-d38a-4936-a190-58c6131ee1fd','local','66f92336-d38a-4936-a190-58c6131ee1fd.jpg','withsecure-logo.jpg','withsecure logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:30:52',NULL,1688747452496,NULL,6342,500,158,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d8f3f181-2263-451f-8727-dbcadf2c239a','local','d8f3f181-2263-451f-8727-dbcadf2c239a.png','wiz-logo.png','wiz logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:30:55',NULL,1688747455180,NULL,22761,1418,681,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('98500a7f-c368-4fd1-be2d-eada067aeac9','local','98500a7f-c368-4fd1-be2d-eada067aeac9.png','xm-cyber-logo.png','xm-cyber logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:30:58',NULL,1688747458252,NULL,147001,4187,1321,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('d815d0e1-bb97-47f8-bfd5-adfce00cc596','local','d815d0e1-bb97-47f8-bfd5-adfce00cc596.png','yubico-logo.png','yubico logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:31:00',NULL,1688747460886,NULL,6236,521,521,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f5480cd1-1f97-46ac-b53f-6820cbfda5d1','local','f5480cd1-1f97-46ac-b53f-6820cbfda5d1.png','zpe-systems-logo.png','zpe-systems logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:31:03',NULL,1688747463567,NULL,17506,499,225,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('3ca6bc65-f2c3-4994-9c3f-90dcf7de1d82','local','3ca6bc65-f2c3-4994-9c3f-90dcf7de1d82.png','zenity-logo.png','zenity logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:31:06',NULL,1688747466219,NULL,58274,2000,1000,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('a89bd34c-7690-45f5-917b-aefb90b9971b','local','a89bd34c-7690-45f5-917b-aefb90b9971b.png','zerofox-logo.png','zerofox logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:31:08',NULL,1688747468849,NULL,28868,500,106,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('9ca15fda-a1b9-4d6a-9238-eda4055a6f02','local','9ca15fda-a1b9-4d6a-9238-eda4055a6f02.png','zimperium-logo.png','zimperium logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:31:11',NULL,1688747471340,NULL,47158,2200,327,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('4967c59b-b80e-4919-beb1-70a3fddd06f6','local','4967c59b-b80e-4919-beb1-70a3fddd06f6.png','zscaler-logo.png','zscaler logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:31:14',NULL,1688747474098,NULL,31112,1920,449,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('8baa433f-1b04-475b-ad6d-2a972b78d437','local','8baa433f-1b04-475b-ad6d-2a972b78d437.png','baramundi-software-usa-inc-logo.png','baramundi-software-usa-inc logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:31:16',NULL,1688747476658,NULL,6770,500,98,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('94018011-6d31-40ae-83f7-3b9754b15360','local','94018011-6d31-40ae-83f7-3b9754b15360.png','esentire-logo.png','esentire logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:31:19',NULL,1688747479323,NULL,5400,500,72,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('e4db2d94-ac31-4fc9-b24d-0fc685c9f396','local','e4db2d94-ac31-4fc9-b24d-0fc685c9f396.jpg','eshard-logo.jpg','eshard logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:31:21',NULL,1688747481789,NULL,24604,1162,390,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('ced475c0-9f76-4934-9622-9da16b48b5a9','local','ced475c0-9f76-4934-9622-9da16b48b5a9.png','iboss-logo.png','iboss logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:31:24',NULL,1688747484240,NULL,17316,900,260,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('b966b49c-aeda-4803-9cc1-6daf5e1e6552','local','b966b49c-aeda-4803-9cc1-6daf5e1e6552.png','thecube-logo.png','thecube logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:31:26',NULL,1688747486707,NULL,5954,498,129,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('bbecd12a-8e4c-4c5b-8020-5f63a1dcb96f','local','bbecd12a-8e4c-4c5b-8020-5f63a1dcb96f.jpeg','wolfssl-logo.jpeg','wolfssl logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d',NULL,'2023-07-07 16:31:29',NULL,1688747489560,NULL,47342,1011,782,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('e676c76b-b0fe-4ffe-b0d5-5ea1a93ab2dd','local','e676c76b-b0fe-4ffe-b0d5-5ea1a93ab2dd.png','alta-associates-a-part-of-diversified-search-group-logo.png','Alta Associates a Part of Diversified Search Group Logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 17:58:18',NULL,1688752698786,NULL,243159,3123,651,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('0023b5d9-cc11-45e0-8e10-d2d012f03f67','local','0023b5d9-cc11-45e0-8e10-d2d012f03f67.png','Screenshot from 2023-07-07 22-02-14.png','Screenshot From 2023 07 07 22 02 14','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 18:02:29',NULL,1688752949961,NULL,871,365,193,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f0a5af75-6a76-4981-a0a9-9e4e8de1ab32','local','f0a5af75-6a76-4981-a0a9-9e4e8de1ab32.png','flexxon-pte-ltd-logo.png','Flexxon Pte Ltd Logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 18:03:45',NULL,1688753025839,NULL,146494,2227,1270,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('90d98ffa-962e-4636-8697-71777b40be1d','local','90d98ffa-962e-4636-8697-71777b40be1d.png','glimps-logo.png','Glimps Logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 18:04:35',NULL,1688753075295,NULL,112663,1813,679,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('b3dbdcb8-9b44-4c96-9457-d0a6de259fb2','local','b3dbdcb8-9b44-4c96-9457-d0a6de259fb2.jpg','lepide-logo.jpg','Lepide Logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 18:06:04',NULL,1688753164135,NULL,243495,6314,1824,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('52d566b6-edd6-4264-a75a-242e6eb9ee03','local','52d566b6-edd6-4264-a75a-242e6eb9ee03.jpg','lepide-logo.jpg','Lepide Logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 18:06:32',NULL,1688753192232,NULL,71118,1894,547,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('0a321e46-5d6f-41d4-bc5b-f1c0d5d4c41e','local','0a321e46-5d6f-41d4-bc5b-f1c0d5d4c41e.jpg','nsfocus-logo.jpg','Nsfocus Logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 18:08:09',NULL,1688753289556,NULL,30426,1845,792,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('5bef8ad8-a4e9-4ede-916b-7e23569d161c','local','5bef8ad8-a4e9-4ede-916b-7e23569d161c.png','picus-logo.png','Picus Logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 18:08:53',NULL,1688753333111,NULL,129101,1962,537,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('f78d435f-480b-4a5b-9dca-3d24d9b08fb9','local','f78d435f-480b-4a5b-9dca-3d24d9b08fb9.png','qax-technology-group-inc-logo.png','Qax Technology Group Inc Logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 18:10:23',NULL,1688753423839,NULL,137116,2088,476,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('eedcd947-f394-4efe-8b60-1b35e48843c2','local','eedcd947-f394-4efe-8b60-1b35e48843c2.png','sands-lab-logo.png','Sands Lab Logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 18:11:17',NULL,1688753478021,NULL,168209,6010,1722,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('6a20feae-4472-4023-9bc2-ff211552fc35','local','6a20feae-4472-4023-9bc2-ff211552fc35.png','sands-lab-logo.png','Sands Lab Logo','image/png','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 18:11:42',NULL,1688753502058,NULL,42674,1803,516,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
INSERT INTO directus_files VALUES('7c8e8300-be7e-4046-a975-d428e1b74b09','local','7c8e8300-be7e-4046-a975-d428e1b74b09.jpg','skopenow-logo.jpg','Skopenow Logo','image/jpeg','7c256639-be0b-4aac-9b41-e0d65635d92d','f9df4549-e9e6-4b67-a0bd-7e4aa657bff6','2023-07-07 18:12:21',NULL,1688753541562,NULL,58484,2310,588,NULL,NULL,NULL,NULL,NULL,'{}');
|
||
CREATE TABLE IF NOT EXISTS "directus_permissions" (`id` integer PRIMARY KEY AUTOINCREMENT NOT NULL, `role` char(36), `collection` varchar(64) NOT NULL, `action` varchar(10) NOT NULL, `permissions` json, `validation` json, `presets` json, `fields` text, FOREIGN KEY (`role`) REFERENCES `directus_roles` (`id`) ON DELETE CASCADE);
|
||
INSERT INTO directus_permissions VALUES(1,NULL,'pages','read','{}','{}',NULL,'*');
|
||
INSERT INTO directus_permissions VALUES(4,NULL,'categories','read','{}','{}',NULL,'*');
|
||
INSERT INTO directus_permissions VALUES(9,NULL,'vendors','read','{}','{}',NULL,'*');
|
||
INSERT INTO directus_permissions VALUES(31,NULL,'vendors_categories','read','{}','{}',NULL,'*');
|
||
INSERT INTO directus_permissions VALUES(33,NULL,'globals','read','{}','{}',NULL,'*');
|
||
INSERT INTO directus_permissions VALUES(34,NULL,'menus','read','{}','{}',NULL,'*');
|
||
INSERT INTO directus_permissions VALUES(35,NULL,'menus_menu_items','read','{}','{}',NULL,'*');
|
||
INSERT INTO directus_permissions VALUES(36,NULL,'menu_items','read','{}','{}',NULL,'*');
|
||
INSERT INTO directus_permissions VALUES(44,NULL,'vendors_files','read','{}','{}',NULL,'*');
|
||
INSERT INTO directus_permissions VALUES(46,NULL,'vendors_files_1','read','{}','{}',NULL,'*');
|
||
INSERT INTO directus_permissions VALUES(47,NULL,'directus_files','read','{}','{}',NULL,'*');
|
||
CREATE TABLE IF NOT EXISTS "directus_webhooks" (`id` integer PRIMARY KEY AUTOINCREMENT NOT NULL, `name` varchar(255) NOT NULL, `method` varchar(10) NOT NULL DEFAULT 'POST', `url` varchar(255) NOT NULL, `status` varchar(10) NOT NULL DEFAULT 'active', `data` boolean NOT NULL DEFAULT '1', `actions` varchar(100) NOT NULL, `collections` varchar(255) NOT NULL, `headers` json);
|
||
CREATE TABLE IF NOT EXISTS "directus_collections" (`collection` varchar(64) NOT NULL, `icon` varchar(30), `note` text, `display_template` varchar(255), `hidden` boolean NOT NULL DEFAULT '0', `singleton` boolean NOT NULL DEFAULT '0', `translations` json, `archive_field` varchar(64), `archive_app_filter` boolean NOT NULL DEFAULT '1', `archive_value` varchar(255), `unarchive_value` varchar(255), `sort_field` varchar(64), `accountability` varchar(255) DEFAULT 'all', `color` varchar(255) NULL, `item_duplication_fields` json NULL, `sort` integer, `group` varchar(64), `collapse` varchar(255) NOT NULL DEFAULT 'open', `preview_url` varchar(255) null, PRIMARY KEY (`collection`), FOREIGN KEY (`group`) REFERENCES `directus_collections` (`collection`));
|
||
INSERT INTO directus_collections VALUES('pages','note',NULL,NULL,0,0,NULL,'status',1,'archived','draft',NULL,'all',NULL,NULL,3,NULL,'open',NULL);
|
||
INSERT INTO directus_collections VALUES('categories','category',NULL,'{{name}}',0,0,NULL,NULL,0,NULL,NULL,NULL,'all',NULL,NULL,4,NULL,'open',NULL);
|
||
INSERT INTO directus_collections VALUES('vendors','factory',NULL,'{{name}}',0,0,NULL,'status',1,'archived','draft',NULL,'all',NULL,NULL,5,NULL,'open',NULL);
|
||
INSERT INTO directus_collections VALUES('vendors_categories','import_export',NULL,NULL,1,0,NULL,NULL,1,NULL,NULL,NULL,'all',NULL,NULL,6,NULL,'open',NULL);
|
||
INSERT INTO directus_collections VALUES('globals','globe_uk',NULL,NULL,0,1,NULL,NULL,0,NULL,NULL,NULL,'all',NULL,NULL,1,NULL,'open',NULL);
|
||
INSERT INTO directus_collections VALUES('menus','restaurant_menu',NULL,NULL,0,0,NULL,NULL,1,NULL,NULL,NULL,'all',NULL,NULL,2,NULL,'open',NULL);
|
||
INSERT INTO directus_collections VALUES('menu_items','link',NULL,'{{label}} : {{url}}',1,0,NULL,NULL,1,NULL,NULL,'sort','all',NULL,NULL,1,'menus','open',NULL);
|
||
INSERT INTO directus_collections VALUES('menus_menu_items','import_export',NULL,NULL,1,0,NULL,NULL,1,NULL,NULL,NULL,'all',NULL,NULL,7,NULL,'open',NULL);
|
||
INSERT INTO directus_collections VALUES('vendors_files','import_export',NULL,NULL,1,0,NULL,NULL,1,NULL,NULL,NULL,'all',NULL,NULL,NULL,NULL,'open',NULL);
|
||
INSERT INTO directus_collections VALUES('vendors_files_1','import_export',NULL,NULL,1,0,NULL,NULL,1,NULL,NULL,NULL,'all',NULL,NULL,NULL,NULL,'open',NULL);
|
||
CREATE TABLE IF NOT EXISTS "directus_fields" (`id` integer PRIMARY KEY AUTOINCREMENT NOT NULL, `collection` varchar(64) NOT NULL, `field` varchar(64) NOT NULL, `special` varchar(64), `interface` varchar(64), `options` json, `display` varchar(64), `display_options` json, `readonly` boolean NOT NULL DEFAULT '0', `hidden` boolean NOT NULL DEFAULT '0', `sort` integer, `width` varchar(30) DEFAULT 'full', `translations` json, `note` text, `conditions` json, `required` boolean DEFAULT '0', `group` varchar(64), `validation` json, `validation_message` text);
|
||
INSERT INTO directus_fields VALUES(1,'pages','slug',NULL,'input',NULL,NULL,NULL,0,0,2,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(2,'pages','status',NULL,'select-dropdown','{"choices":[{"text":"$t:published","value":"published"},{"text":"$t:draft","value":"draft"},{"text":"$t:archived","value":"archived"}]}','labels','{"showAsDot":true,"choices":[{"text":"$t:published","value":"published","foreground":"#FFFFFF","background":"var(--primary)"},{"text":"$t:draft","value":"draft","foreground":"#18222F","background":"#D3DAE4"},{"text":"$t:archived","value":"archived","foreground":"#FFFFFF","background":"var(--warning)"}]}',0,0,3,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(3,'pages','title',NULL,'input',NULL,NULL,NULL,0,0,4,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(4,'pages','content',NULL,'input-rich-text-html','{"toolbar":["undo","redo","bold","italic","underline","strikethrough","subscript","superscript","fontfamily","fontsize","h1","h2","h3","h4","h5","h6","alignleft","aligncenter","alignright","alignjustify","alignnone","indent","outdent","numlist","bullist","forecolor","backcolor","removeformat","cut","copy","paste","remove","selectall","blockquote","customLink","unlink","customImage","customMedia","table","hr","code","fullscreen","visualaid"],"folder":"4fe3c63a-cbec-4e7a-af2d-2ba454720476"}',NULL,NULL,0,0,5,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(5,'categories','id','uuid','input',NULL,NULL,NULL,1,1,1,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(6,'categories','slug',NULL,'input','{"font":"monospace","trim":true,"slug":true}',NULL,NULL,0,0,2,'full',NULL,NULL,NULL,1,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(7,'categories','name',NULL,'input',NULL,NULL,NULL,0,0,3,'full',NULL,NULL,NULL,1,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(8,'categories','subcategories','o2m','list-o2m',NULL,'related-values','{"template":"{{name}}"}',0,0,5,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(9,'categories','parent_id',NULL,'select-dropdown-m2o',NULL,'related-values','{"template":"{{name}}"}',0,1,4,'full','[{"language":"en-US","translation":"Parent category"}]',NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(10,'vendors','id','uuid','input',NULL,NULL,NULL,1,1,1,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(11,'vendors','status',NULL,'select-dropdown','{"choices":[{"text":"$t:published","value":"published"},{"text":"$t:draft","value":"draft"},{"text":"$t:archived","value":"archived"}]}','labels','{"showAsDot":true,"choices":[{"text":"$t:published","value":"published","foreground":"#FFFFFF","background":"var(--primary)"},{"text":"$t:draft","value":"draft","foreground":"#18222F","background":"#D3DAE4"},{"text":"$t:archived","value":"archived","foreground":"#FFFFFF","background":"var(--warning)"}]}',0,0,3,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(12,'vendors','slug',NULL,'input','{"font":"monospace","trim":true,"slug":true}',NULL,NULL,0,0,4,'full',NULL,NULL,NULL,1,NULL,'{"_and":[{"slug":{"_regex":"/[0-9a-z\\-_]+/"}}]}',NULL);
|
||
INSERT INTO directus_fields VALUES(13,'vendors','name',NULL,'input',NULL,NULL,NULL,0,0,5,'full',NULL,NULL,NULL,1,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(17,'vendors','website',NULL,'input',NULL,NULL,NULL,0,0,1,'full',NULL,NULL,NULL,0,'social',NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(18,'vendors','description',NULL,'input-multiline','{"trim":true}',NULL,NULL,0,0,7,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(19,'vendors','address','alias,no-data,group','group-detail',NULL,NULL,NULL,0,0,10,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(20,'vendors','address_line_1',NULL,'input',NULL,NULL,NULL,0,0,1,'full',NULL,NULL,NULL,0,'address',NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(21,'vendors','address_line_2',NULL,'input',NULL,NULL,NULL,0,0,2,'full',NULL,NULL,NULL,0,'address',NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(22,'vendors','city',NULL,'input',NULL,NULL,NULL,0,0,3,'full',NULL,NULL,NULL,0,'address',NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(23,'vendors','state',NULL,'input',NULL,NULL,NULL,0,0,4,'full',NULL,NULL,NULL,0,'address',NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(24,'vendors','country',NULL,'input',NULL,NULL,NULL,0,0,5,'full',NULL,NULL,NULL,0,'address',NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(40,'vendors','categories','m2m','list-m2m','{"enableCreate":false,"template":"{{categories_id.name}}"}','related-values','{"template":"{{categories_id.name}}"}',0,0,11,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(41,'vendors_categories','id',NULL,NULL,NULL,NULL,NULL,0,1,NULL,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(42,'categories','vendors','m2m','list-m2m','{"template":"{{vendors_id.name}}"}','related-values','{"template":"{{vendors_id.name}}"}',0,0,NULL,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(43,'vendors_categories','vendors_id',NULL,NULL,NULL,NULL,NULL,0,1,NULL,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(44,'vendors_categories','categories_id',NULL,NULL,NULL,NULL,NULL,0,1,NULL,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(45,'globals','id','uuid','input',NULL,NULL,NULL,1,1,NULL,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(46,'globals','site_name',NULL,'input',NULL,NULL,NULL,0,0,NULL,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(47,'globals','meta_title',NULL,'input',NULL,NULL,NULL,0,0,NULL,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(48,'globals','meta_description',NULL,'input',NULL,NULL,NULL,0,0,NULL,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(51,'globals','copyright',NULL,'input',NULL,NULL,NULL,0,0,NULL,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(52,'menus','id',NULL,'input',NULL,NULL,NULL,0,0,NULL,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(53,'menu_items','id','uuid','input',NULL,NULL,NULL,1,1,1,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(54,'menu_items','sort',NULL,'input',NULL,NULL,NULL,0,1,2,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(55,'menu_items','url',NULL,'input',NULL,NULL,NULL,0,0,4,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(56,'menu_items','label',NULL,'input',NULL,NULL,NULL,0,0,3,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(57,'menus','menus_menu_items','m2m','list-m2m','{"template":"{{menu_items_id.label}} : {{menu_items_id.url}}"}',NULL,NULL,0,0,NULL,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(58,'menus_menu_items','id',NULL,NULL,NULL,NULL,NULL,0,1,NULL,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(59,'menus_menu_items','menus_id',NULL,NULL,NULL,NULL,NULL,0,1,NULL,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(60,'menus_menu_items','menu_items_id',NULL,NULL,NULL,NULL,NULL,0,1,NULL,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(61,'menus_menu_items','sort',NULL,NULL,NULL,NULL,NULL,0,1,NULL,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(62,'vendors','logo','file','file-image','{"crop":false,"folder":"7c256639-be0b-4aac-9b41-e0d65635d92d"}','image','{}',0,0,6,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(63,'vendors','long_description',NULL,'input-rich-text-html','{"trim":true,"folder":"7c256639-be0b-4aac-9b41-e0d65635d92d"}',NULL,NULL,0,0,8,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(64,'vendors','files','files','files','{"folder":"7c256639-be0b-4aac-9b41-e0d65635d92d"}',NULL,NULL,0,0,12,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(65,'vendors_files','id',NULL,NULL,NULL,NULL,NULL,0,1,1,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(66,'vendors_files','vendors_id',NULL,NULL,NULL,NULL,NULL,0,1,2,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(67,'vendors_files','directus_files_id',NULL,NULL,NULL,NULL,NULL,0,1,3,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(68,'vendors','videos','files','files','{"folder":"7c256639-be0b-4aac-9b41-e0d65635d92d"}',NULL,NULL,0,0,13,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(69,'vendors_files_1','id',NULL,NULL,NULL,NULL,NULL,0,1,1,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(70,'vendors_files_1','vendors_id',NULL,NULL,NULL,NULL,NULL,0,1,2,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(71,'vendors_files_1','directus_files_id',NULL,NULL,NULL,NULL,NULL,0,1,3,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(72,'vendors','social','alias,no-data,group','group-detail',NULL,NULL,NULL,0,0,9,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(73,'vendors','facebook',NULL,'input',NULL,NULL,NULL,0,0,2,'full',NULL,NULL,NULL,0,'social',NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(74,'vendors','twitter',NULL,'input',NULL,NULL,NULL,0,0,3,'full',NULL,NULL,NULL,0,'social',NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(75,'vendors','linkedin',NULL,'input',NULL,NULL,NULL,0,0,4,'full',NULL,NULL,NULL,0,'social',NULL,NULL);
|
||
INSERT INTO directus_fields VALUES(76,'vendors','external_id',NULL,'input',NULL,NULL,NULL,0,1,2,'full',NULL,NULL,NULL,0,NULL,NULL,NULL);
|
||
CREATE TABLE IF NOT EXISTS "directus_roles" (`id` char(36) NOT NULL, `name` varchar(100) NOT NULL, `icon` varchar(30) NOT NULL DEFAULT 'supervised_user_circle', `description` text, `ip_access` text, `enforce_tfa` boolean NOT NULL DEFAULT '0', `admin_access` boolean NOT NULL DEFAULT '0', `app_access` boolean NOT NULL DEFAULT '1', PRIMARY KEY (`id`));
|
||
INSERT INTO directus_roles VALUES('067808bd-7c13-40be-8c11-9ba654b79465','Administrator','verified','$t:admin_description',NULL,0,1,1);
|
||
CREATE TABLE `directus_shares` (`id` char(36) not null, `name` varchar(255), `collection` varchar(64), `item` varchar(255), `role` char(36), `password` varchar(255), `user_created` char(36), `date_created` datetime default CURRENT_TIMESTAMP, `date_start` datetime null default null, `date_end` datetime null default null, `times_used` integer default '0', `max_uses` integer, foreign key(`collection`) references `directus_collections`(`collection`) on delete CASCADE, foreign key(`role`) references `directus_roles`(`id`) on delete CASCADE, foreign key(`user_created`) references `directus_users`(`id`) on delete SET NULL, primary key (`id`));
|
||
CREATE TABLE IF NOT EXISTS "directus_sessions" (`token` varchar(64) NOT NULL, `user` char(36), `expires` datetime NOT NULL, `ip` varchar(255), `user_agent` varchar(255), `share` char(36), `origin` varchar(255) null, PRIMARY KEY (`token`), FOREIGN KEY (`user`) REFERENCES `directus_users` (`id`) ON DELETE CASCADE, FOREIGN KEY (`share`) REFERENCES `directus_shares` (`id`) ON DELETE CASCADE);
|
||
CREATE TABLE IF NOT EXISTS "directus_users" (`id` char(36) NOT NULL, `first_name` varchar(50), `last_name` varchar(50), `email` varchar(128), `password` varchar(255), `location` varchar(255), `title` varchar(50), `description` text, `tags` json, `avatar` char(36), `language` varchar(255) DEFAULT null, `theme` varchar(20) DEFAULT 'auto', `tfa_secret` varchar(255), `status` varchar(16) NOT NULL DEFAULT 'active', `role` char(36), `token` varchar(255), `last_access` datetime, `last_page` varchar(255), `provider` varchar(128) NOT NULL DEFAULT 'default', `external_identifier` varchar(255), `auth_data` json, `email_notifications` boolean DEFAULT '1', PRIMARY KEY (`id`), FOREIGN KEY (`role`) REFERENCES `directus_roles` (`id`) ON DELETE SET NULL);
|
||
INSERT INTO directus_users VALUES('f9df4549-e9e6-4b67-a0bd-7e4aa657bff6',NULL,NULL,'okram@civokram.com','$argon2id$v=19$m=65536,t=3,p=4$rk0X9HITfk7OIfvEjOrbew$Q4wUp0tjs42ocHPwVPzI3dksy+JKWzQzO5a3gqOwDg8',NULL,NULL,NULL,NULL,NULL,NULL,'auto',NULL,'active','067808bd-7c13-40be-8c11-9ba654b79465',NULL,1688921891473,'/content/pages','default',NULL,NULL,1);
|
||
CREATE TABLE IF NOT EXISTS "directus_panels" (`id` char(36) NOT NULL, `dashboard` char(36) NOT NULL, `name` varchar(255), `icon` varchar(30) DEFAULT null, `color` varchar(10), `show_header` boolean NOT NULL DEFAULT '0', `note` text, `type` varchar(255) NOT NULL, `position_x` integer NOT NULL, `position_y` integer NOT NULL, `width` integer NOT NULL, `height` integer NOT NULL, `options` json, `date_created` datetime DEFAULT CURRENT_TIMESTAMP, `user_created` char(36), FOREIGN KEY (`dashboard`) REFERENCES `directus_dashboards` (`id`) ON DELETE CASCADE, FOREIGN KEY (`user_created`) REFERENCES `directus_users` (`id`) ON DELETE SET NULL, PRIMARY KEY (`id`));
|
||
CREATE TABLE `directus_flows` (`id` char(36) not null, `name` varchar(255) not null, `icon` varchar(30), `color` varchar(255) null, `description` text, `status` varchar(255) not null default 'active', `trigger` varchar(255), `accountability` varchar(255) default 'all', `options` json, `operation` char(36), `date_created` datetime default CURRENT_TIMESTAMP, `user_created` char(36), foreign key(`user_created`) references `directus_users`(`id`) on delete SET NULL, primary key (`id`));
|
||
CREATE TABLE `directus_operations` (`id` char(36) not null, `name` varchar(255), `key` varchar(255) not null, `type` varchar(255) not null, `position_x` integer not null, `position_y` integer not null, `options` json, `resolve` char(36), `reject` char(36), `flow` char(36) not null, `date_created` datetime default CURRENT_TIMESTAMP, `user_created` char(36), foreign key(`resolve`) references `directus_operations`(`id`), foreign key(`reject`) references `directus_operations`(`id`), foreign key(`flow`) references `directus_flows`(`id`) on delete CASCADE, foreign key(`user_created`) references `directus_users`(`id`) on delete SET NULL, primary key (`id`));
|
||
CREATE TABLE IF NOT EXISTS "directus_activity" (`id` integer PRIMARY KEY AUTOINCREMENT NOT NULL, `action` varchar(45) NOT NULL, `user` char(36), `timestamp` datetime NOT NULL DEFAULT CURRENT_TIMESTAMP, `ip` varchar(50), `user_agent` varchar(255), `collection` varchar(64) NOT NULL, `item` varchar(255) NOT NULL, `comment` text, `origin` varchar(255) null);
|
||
CREATE TABLE IF NOT EXISTS "directus_notifications" (`id` integer PRIMARY KEY AUTOINCREMENT NOT NULL, `timestamp` datetime DEFAULT CURRENT_TIMESTAMP, `status` varchar(255) DEFAULT 'inbox', `recipient` char(36) NOT NULL, `sender` char(36), `subject` varchar(255) NOT NULL, `message` text, `collection` varchar(64), `item` varchar(255), FOREIGN KEY (`recipient`) REFERENCES `directus_users` (`id`) ON DELETE CASCADE, FOREIGN KEY (`sender`) REFERENCES `directus_users` (`id`));
|
||
CREATE TABLE IF NOT EXISTS "directus_presets" (`id` integer PRIMARY KEY AUTOINCREMENT NOT NULL, `bookmark` varchar(255), `user` char(36), `role` char(36), `collection` varchar(64), `search` varchar(100), `layout` varchar(100) DEFAULT 'tabular', `layout_query` json, `layout_options` json, `refresh_interval` integer, `filter` json, `icon` varchar(30) DEFAULT 'bookmark', `color` varchar(255) NULL, FOREIGN KEY (`user`) REFERENCES `directus_users` (`id`) ON DELETE CASCADE, FOREIGN KEY (`role`) REFERENCES `directus_roles` (`id`) ON DELETE CASCADE);
|
||
INSERT INTO directus_presets VALUES(1,NULL,'f9df4549-e9e6-4b67-a0bd-7e4aa657bff6',NULL,'directus_files','','tabular','{"cards":{"sort":["-uploaded_on"],"limit":25,"page":1},"tabular":{"limit":25,"fields":["title","filename_download"],"page":1,"sort":["title"]}}','{"cards":{"icon":"insert_drive_file","title":"{{ title }}","subtitle":"{{ type }} • {{ filesize }}","size":3,"imageFit":"crop"},"tabular":{"spacing":"compact","widths":{"title":524,"filename_download":735}}}',NULL,NULL,'bookmark',NULL);
|
||
INSERT INTO directus_presets VALUES(2,NULL,'f9df4549-e9e6-4b67-a0bd-7e4aa657bff6',NULL,'pages',NULL,'tabular','{"tabular":{"page":1,"fields":["status","slug","title","content"],"limit":25}}','{"tabular":{"widths":{"status":105,"content":350}}}',NULL,NULL,'bookmark',NULL);
|
||
INSERT INTO directus_presets VALUES(3,NULL,'f9df4549-e9e6-4b67-a0bd-7e4aa657bff6',NULL,'directus_users',NULL,'cards','{"cards":{"sort":["email"],"limit":25,"page":1}}','{"cards":{"icon":"account_circle","title":"{{ first_name }} {{ last_name }}","subtitle":"{{ email }}","size":4}}',NULL,NULL,'bookmark',NULL);
|
||
INSERT INTO directus_presets VALUES(4,NULL,'f9df4549-e9e6-4b67-a0bd-7e4aa657bff6',NULL,'directus_presets',NULL,NULL,'{"tabular":{"limit":25}}',NULL,NULL,NULL,'bookmark',NULL);
|
||
INSERT INTO directus_presets VALUES(5,NULL,'f9df4549-e9e6-4b67-a0bd-7e4aa657bff6',NULL,'categories','',NULL,'{"tabular":{"limit":50,"page":1,"fields":["name","subcategories","vendors"],"sort":["name"]}}','{"tabular":{"widths":{"name":354,"subcategories":259}}}',NULL,'{"_and":[{"parent_id":{"_null":true}}]}','bookmark',NULL);
|
||
INSERT INTO directus_presets VALUES(6,NULL,'f9df4549-e9e6-4b67-a0bd-7e4aa657bff6',NULL,'vendors',NULL,'tabular','{"tabular":{"page":1,"limit":25,"fields":["status","logo","name","city","state","country","categories"],"sort":["name"]},"cards":{"limit":25},"map":{"limit":1000}}','{"tabular":{"widths":{"status":104,"name":342},"spacing":"compact"},"map":{"cameraOptions":{"center":{"lng":0,"lat":2.842170943040401e-14},"zoom":1.2656150260264665,"bearing":0,"pitch":0,"bbox":[-199.74005157325573,-85.05112900000002,199.74005157325325,85.05112899999992]}}}',NULL,NULL,'bookmark',NULL);
|
||
INSERT INTO directus_presets VALUES(8,NULL,'f9df4549-e9e6-4b67-a0bd-7e4aa657bff6',NULL,'menus',NULL,NULL,'{"tabular":{"limit":25,"fields":["id","menus_menu_items.menu_items_id.label"],"page":1}}','{"tabular":{"widths":{"menus_menu_items.menu_items_id.label":475}}}',NULL,NULL,'bookmark',NULL);
|
||
INSERT INTO directus_presets VALUES(9,NULL,'f9df4549-e9e6-4b67-a0bd-7e4aa657bff6',NULL,'directus_activity',NULL,'tabular','{"tabular":{"sort":["-timestamp"],"fields":["action","collection","timestamp","user"],"limit":25}}','{"tabular":{"widths":{"action":100,"collection":210,"timestamp":240,"user":240}}}',NULL,NULL,'bookmark',NULL);
|
||
CREATE TABLE `directus_translations` (`id` char(36) not null, `language` varchar(255) not null, `key` varchar(255) not null, `value` text not null, primary key (`id`));
|
||
CREATE TABLE IF NOT EXISTS "directus_settings" (`id` integer PRIMARY KEY AUTOINCREMENT NOT NULL, `project_name` varchar(100) NOT NULL DEFAULT 'Directus', `project_url` varchar(255), `project_color` varchar(50) DEFAULT null, `project_logo` char(36), `public_foreground` char(36), `public_background` char(36), `public_note` text, `auth_login_attempts` integer DEFAULT '25', `auth_password_policy` varchar(100), `storage_asset_transform` varchar(7) DEFAULT 'all', `storage_asset_presets` json, `custom_css` text, `storage_default_folder` char(36), `basemaps` json, `mapbox_key` varchar(255), `module_bar` json, `project_descriptor` varchar(100) NULL, `default_language` varchar(255) NOT NULL DEFAULT 'en-US', `custom_aspect_ratios` json, FOREIGN KEY (`project_logo`) REFERENCES `directus_files` (`id`), FOREIGN KEY (`public_foreground`) REFERENCES `directus_files` (`id`), FOREIGN KEY (`public_background`) REFERENCES `directus_files` (`id`), CONSTRAINT `directus_settings_storage_default_folder_foreign` FOREIGN KEY (`storage_default_folder`) REFERENCES `directus_folders` (`id`) ON DELETE SET NULL);
|
||
INSERT INTO directus_settings VALUES(1,'Directus',NULL,NULL,NULL,NULL,NULL,NULL,25,NULL,'all','[{"key":"logo-card","fit":"inside","width":250,"height":100,"quality":80,"withoutEnlargement":false,"format":"auto","transforms":[["flatten",{"background":"rgb(255, 255, 255)"}]]},{"key":"logo-page","fit":"inside","width":400,"height":150,"quality":80,"withoutEnlargement":false,"format":"auto","transforms":[["flatten",{"background":"rgb(255, 255, 255)"}]]}]',NULL,NULL,NULL,NULL,'[{"type":"module","id":"content","enabled":true},{"type":"module","id":"users","enabled":true},{"type":"module","id":"files","enabled":true},{"type":"module","id":"insights","enabled":true},{"type":"module","id":"settings","enabled":true,"locked":true}]',NULL,'en-US',NULL);
|
||
CREATE TABLE IF NOT EXISTS "categories" (`id` char(36) NOT NULL, `slug` varchar(255) NULL DEFAULT null, `name` varchar(255) NULL, `parent_id` char(36) NULL, PRIMARY KEY (`id`), CONSTRAINT `categories_parent_id_foreign` FOREIGN KEY (`parent_id`) REFERENCES `categories` (`id`) ON DELETE NO ACTION);
|
||
INSERT INTO categories VALUES('0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c','identity-and-access-management','Identity and Access Management',NULL);
|
||
INSERT INTO categories VALUES('b757e288-ff99-4aaa-8597-68ab4e442421','data-security','Data Security',NULL);
|
||
INSERT INTO categories VALUES('b3af12b9-6d74-4892-b6b2-d6be6973b754','network-infrastructure-security','Network / Infrastructure Security',NULL);
|
||
INSERT INTO categories VALUES('339c8711-b225-4884-8151-18604277d725','sase-zero-trust','SASE / Zero Trust','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO categories VALUES('1289bd9f-a0c1-4444-a1c0-b6ad89edcf02','application-security-and-devsecops','Application Security and DevSecOps',NULL);
|
||
INSERT INTO categories VALUES('72796e85-1867-4cfc-88a0-df793f73d5b9','security-operations-and-incident-response','Security Operations and Incident Response',NULL);
|
||
INSERT INTO categories VALUES('cdf3c28b-66d2-4930-9b73-5ceee80c6c02','threat-intelligence','Threat Intelligence',NULL);
|
||
INSERT INTO categories VALUES('a75af97a-d43c-45bb-83e6-0ab861279c7f','cloud-security','Cloud Security',NULL);
|
||
INSERT INTO categories VALUES('cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21','device-security','Device Security',NULL);
|
||
INSERT INTO categories VALUES('c32ea502-42ae-47f1-b3aa-807c40cd974d','risk-management','Risk Management',NULL);
|
||
INSERT INTO categories VALUES('3c0181df-2f73-4f72-ab22-faf8126ef214','managed-security-services','Managed Security Services',NULL);
|
||
INSERT INTO categories VALUES('6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca','security-services','Security Services',NULL);
|
||
INSERT INTO categories VALUES('1f9756d5-6bd9-446b-8e66-cdd2906cf6cf','customer-security-software-b2c','Customer Security Software (B2C)',NULL);
|
||
INSERT INTO categories VALUES('4136df20-f9e6-4fa5-93a8-71d418f0331a','fraud-prevention-transaction-security','Fraud Prevention / Transaction Security',NULL);
|
||
INSERT INTO categories VALUES('7fee8eb7-7491-45af-aa09-620c11976b6f','network-access-control','Network Access Control','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO categories VALUES('f47b6d5d-dc39-423b-9c43-30e96661cc06','application-security','Application Security','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO categories VALUES('4130e61a-694a-40cb-ac1c-d8d078e0ac40','casb','CASB','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO categories VALUES('a64f910b-b878-414e-97c5-400867ebe952','cloud-infrastructure','Cloud Infrastructure','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO categories VALUES('c4fba126-33c1-4c58-86a4-ff801e679d07','saas-software-as-a-service','SaaS (Software as a Service)','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO categories VALUES('24fca2fd-bfd2-4854-a4b2-625e6936f7c4','sdn','SDN','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO categories VALUES('7a8edbd2-f606-4f85-a078-7b7cb877b572','security-ratings','Security Ratings','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO categories VALUES('622aed7d-8edc-42a3-ae23-ede848602459','threat-vulnerability-assessment','Threat / Vulnerability Assessment','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO categories VALUES('c7f23cf1-9064-4abc-9c81-e95f250e7496','security-analytics','Security Analytics','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO categories VALUES('6059c529-cc92-4263-ae8a-4b53b65e8963','security-incident-response','Security Incident Response','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO categories VALUES('174c09eb-9c62-40bc-bfef-0cfcbc663c4a','siem-soar','SIEM / SOAR','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO categories VALUES('047c2b96-278f-443a-804f-d86298e9cac0','threat-hunting','Threat Hunting','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO categories VALUES('96095c63-abe6-4758-baeb-ec348c566ccb','threat-intelligence-platform','Threat Intelligence Platform','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO categories VALUES('b91445d6-574a-40ca-8e81-aa83f7ac9a34','validating-source-code','Validating Source Code','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO categories VALUES('b4e088bf-19e8-4c57-b8b7-2daef201bdce','authentication','Authentication','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO categories VALUES('047f17e2-9588-4a87-8df2-ff57e3857d7a','identity-governance-and-administration','Identity Governance and Administration','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO categories VALUES('aec947a8-40e4-463f-ae04-984763e78c3b','endpoint-detection','Endpoint Detection',NULL);
|
||
INSERT INTO categories VALUES('e4d935a4-3982-42ad-8fab-b816eee22c3d','response','Response',NULL);
|
||
INSERT INTO categories VALUES('2223532d-739a-49cd-a12c-204e81b728e1','security-awareness-training','Security Awareness / Training','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO categories VALUES('88bedc80-0a8c-46c5-8479-8d277879c749','firewalls','Firewalls','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO categories VALUES('c42e5b77-0405-4da1-8147-6e9d0489545d','data-centric-security','Data Centric Security','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO categories VALUES('e941a8e9-6387-47be-98e2-38f9be660dac','endpoint-protection','Endpoint Protection','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO categories VALUES('b0276343-5b41-4d27-b5b8-3e9b48d6b494','ics-ot-security','ICS / OT Security','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO categories VALUES('d5994839-8983-4c91-9b91-93c1dd24ee8e','internet-of-things','Internet of Things','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO categories VALUES('5b76e06d-1a2d-4f82-aab7-6776c0e0e79c','mobile-security','Mobile Security','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO categories VALUES('bf407b55-a427-4092-b2cd-72311583ba31','advanced-mss-mdr','Advanced MSS / MDR','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO categories VALUES('90b26851-1abf-48ff-8050-1e8a462509ef','dlp','DLP','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO categories VALUES('366452bc-5f78-409a-9780-3909b33723cf','consulting-professional-services','Consulting / Professional Services','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO categories VALUES('fff3f08c-1f3a-4b5d-bc63-026df25bd841','implementation','Implementation','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO categories VALUES('337653e2-99ef-4672-b3a3-d264086fd5dd','messaging-security','Messaging Security','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO categories VALUES('e833b6c0-2722-4386-8157-4c2af4767b9f','threat-intelligence-services-feed','Threat Intelligence Services / Feed','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO categories VALUES('445e1042-717c-4003-9a44-ac114405a0f7','data-privacy','Data Privacy','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO categories VALUES('2519db46-bf97-4e54-824d-46458c4759b3','api-security','API Security','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO categories VALUES('ec1b36b8-1bc3-4b2c-ae51-bc1bb6d03e04','application-security-testing','Application Security Testing','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO categories VALUES('d03db319-fa4d-4748-a4ee-b5a001e780d3','pen-testing-breach-simulation','Pen Testing / Breach Simulation','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO categories VALUES('20fc1d69-e0e0-4a25-abb3-d8e8feb6feff','governance-and-compliance','Governance and Compliance','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO categories VALUES('939ca439-6594-4417-b750-64d6a54bcf13','intrusion-detection-prevention','Intrusion Detection / Prevention','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO categories VALUES('68a82a0d-6327-4dae-9e02-9474f8f9b9e6','network-analysis-forensics','Network Analysis / Forensics','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO categories VALUES('da6932b9-45a5-4830-a60d-5725b3dd0164','web-dns-security','Web / DNS Security','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO categories VALUES('9fb42eba-046d-4822-a5cd-d632e8512581','traditional-mssp','Traditional MSSP','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO categories VALUES('0f98612e-b9d7-4ff2-a05b-a8bc8a40d8df','it-outsourcing','IT Outsourcing','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO categories VALUES('c1e8999b-f3e7-436e-9273-d9651320b5a9','consumer-identity','Consumer Identity','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO categories VALUES('be2ca4e5-7cd9-445f-9e63-4084c91622c8','idaas','IDaas','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO categories VALUES('4111cb56-5cc3-4700-9cda-805a8c33d2db','privileged-management','Privileged Management','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO categories VALUES('75e8a681-0e17-4dfe-b781-af5777991b4e','privacy-compliance','Privacy Compliance','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO categories VALUES('0bdefad1-30a5-4943-ab43-ac872e93fdf1','incident-response','Incident Response','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO categories VALUES('45af701c-2dd0-49ad-80ee-e583f59d9b86','encryption','Encryption','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO categories VALUES('14e5a1ab-279c-48f2-a8c2-305cd38fae0a','grc','GRC','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO categories VALUES('70df9c46-dc74-4569-97d9-b2e664999bba','vpn','VPN','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO categories VALUES('7bb941f2-ebe3-4f17-b0c0-ecb95119f92d','advanced-threat-protection','Advanced Threat Protection','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO categories VALUES('b5b238a6-b7c8-432f-88fe-7bc9f84b1f71','software-integrity','Software Integrity','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO categories VALUES('d5fcd483-998d-4afa-807b-3d7ba898f793','web-application-firewall','Web Application Firewall','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO categories VALUES('749ba3fe-bcc1-4bb6-a83a-283fe1641054','virtualization-containerization-segmentation','Virtualization / Containerization / Segmentation','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO categories VALUES('a4108a75-fb2d-4d8d-a9db-65b2c7edf6cd','denial-of-service','Denial of Service','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO categories VALUES('d5c1ffa4-0757-454d-97d2-cf9c44dc8a5d','deception-based-security','Deception-Based Security','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO categories VALUES('d41b7df9-2629-462c-b2c5-d0c482dc749b','hardware-support','Hardware Support','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
CREATE TABLE IF NOT EXISTS "vendors_categories" (`id` integer PRIMARY KEY AUTOINCREMENT NOT NULL, `vendors_id` char(36) NULL, `categories_id` char(36) NULL, CONSTRAINT `vendors_categories_categories_id_foreign` FOREIGN KEY (`categories_id`) REFERENCES `categories` (`id`) ON DELETE SET NULL, CONSTRAINT `vendors_categories_vendors_id_foreign` FOREIGN KEY (`vendors_id`) REFERENCES `vendors` (`id`) ON DELETE SET NULL);
|
||
INSERT INTO vendors_categories VALUES(12433,'b8b4902f-5f81-4e32-8178-9399b046a836','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12434,'b8b4902f-5f81-4e32-8178-9399b046a836','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12435,'b8b4902f-5f81-4e32-8178-9399b046a836','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12436,'b8b4902f-5f81-4e32-8178-9399b046a836','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12437,'4d2170be-cd10-4bfa-a676-5bff626de6f7','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12438,'ab5df402-9f1d-4e69-b5fd-28319895e67c','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12439,'ab5df402-9f1d-4e69-b5fd-28319895e67c','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12440,'36faefb8-015c-4af0-b202-5fec62536ea9','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12441,'36faefb8-015c-4af0-b202-5fec62536ea9','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12442,'4e246a6d-253e-4d1d-8f5e-f30f58d930cd','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12443,'4e246a6d-253e-4d1d-8f5e-f30f58d930cd','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12444,'ae17a255-0455-4e34-9416-bde50359b1c1','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12445,'ae17a255-0455-4e34-9416-bde50359b1c1','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12446,'9d42c6c3-8916-485a-b2a8-c5e8ee0aca36','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12447,'9d42c6c3-8916-485a-b2a8-c5e8ee0aca36','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12448,'9d42c6c3-8916-485a-b2a8-c5e8ee0aca36','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12449,'9d42c6c3-8916-485a-b2a8-c5e8ee0aca36','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12450,'9d42c6c3-8916-485a-b2a8-c5e8ee0aca36','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12451,'9d42c6c3-8916-485a-b2a8-c5e8ee0aca36','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12452,'9d42c6c3-8916-485a-b2a8-c5e8ee0aca36','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12453,'9d42c6c3-8916-485a-b2a8-c5e8ee0aca36','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12454,'d6ad7044-c46b-4fcf-b299-cc0b9a687fbf','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12455,'6a181935-649b-4824-975f-ae7c5a1b6b1d','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12456,'caf4a95f-27ba-4459-ad82-198c0bba0b3a','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12457,'caf4a95f-27ba-4459-ad82-198c0bba0b3a','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12458,'ff946759-ac4b-4e84-a0c1-c533628853e7','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12459,'ff946759-ac4b-4e84-a0c1-c533628853e7','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12460,'eb4efa04-2af1-487e-a47f-60a62f49823c','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12461,'eb4efa04-2af1-487e-a47f-60a62f49823c','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12462,'6178dde1-c4fe-42de-8c98-e3a02fb02df8','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12463,'e67819a8-5041-4162-986f-ee42d5a6d8fa','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12464,'e67819a8-5041-4162-986f-ee42d5a6d8fa','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12465,'59dae7ae-67f3-4d35-add3-fae8c8c7f688','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12466,'59dae7ae-67f3-4d35-add3-fae8c8c7f688','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12467,'a763b4b2-68ef-4232-8a3f-224c3692fdbf','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12468,'a763b4b2-68ef-4232-8a3f-224c3692fdbf','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12469,'a763b4b2-68ef-4232-8a3f-224c3692fdbf','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12470,'a763b4b2-68ef-4232-8a3f-224c3692fdbf','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12471,'5d7445c0-b645-4eb0-8336-85aae48e466c','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12472,'47e240b7-aed5-4fc8-ab07-eb8f29d7e30f','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12473,'47e240b7-aed5-4fc8-ab07-eb8f29d7e30f','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12474,'f9947450-6e05-44fe-8f26-03b819620989','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12475,'f9947450-6e05-44fe-8f26-03b819620989','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12476,'3602364d-db04-434e-9b08-77b89f5799fa','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12477,'3602364d-db04-434e-9b08-77b89f5799fa','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12478,'443b0455-e8ea-4b7a-bd9f-f58f89e1302c','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12479,'443b0455-e8ea-4b7a-bd9f-f58f89e1302c','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12480,'ec7395de-ece0-41e3-b8c1-651ecd6f32ad','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12481,'ec7395de-ece0-41e3-b8c1-651ecd6f32ad','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12482,'bd563865-36b0-4272-92a4-e37885122bb9','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12483,'bd563865-36b0-4272-92a4-e37885122bb9','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12484,'050b155e-e2ef-4ea9-86c6-e0111d2ec8cf','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12485,'003d4211-664a-4304-ab75-3feace2aa3b9','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12486,'003d4211-664a-4304-ab75-3feace2aa3b9','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12487,'f0aef797-11aa-4abe-899a-cdd4b3824578','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12488,'f0aef797-11aa-4abe-899a-cdd4b3824578','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12489,'558a553c-a669-47cb-9137-62e598ab7446','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12490,'cd751024-8d47-40b8-a59f-5e82cf591351','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12491,'cd751024-8d47-40b8-a59f-5e82cf591351','1f9756d5-6bd9-446b-8e66-cdd2906cf6cf');
|
||
INSERT INTO vendors_categories VALUES(12492,'e003267c-0fb8-4b31-99c1-1a068261abe9','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12493,'e003267c-0fb8-4b31-99c1-1a068261abe9','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12494,'24ebd19b-7e4c-4248-a513-2642d265932b','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12495,'24ebd19b-7e4c-4248-a513-2642d265932b','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12496,'b5657f76-6d64-41e1-b85d-ecabf2df14d4','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12497,'b5657f76-6d64-41e1-b85d-ecabf2df14d4','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12498,'6222ccda-59bd-42b5-8d11-43c50b584470','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12499,'6222ccda-59bd-42b5-8d11-43c50b584470','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12500,'6222ccda-59bd-42b5-8d11-43c50b584470','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12501,'6222ccda-59bd-42b5-8d11-43c50b584470','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12502,'6c6c5d99-6f56-445e-990e-3e606c1faffa','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12503,'6c6c5d99-6f56-445e-990e-3e606c1faffa','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12504,'1aec2bce-5e7a-4aa3-92ca-0dfa91384973','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12505,'7e8255ad-6673-4625-bd68-5d2cbfd77f89','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12506,'7e8255ad-6673-4625-bd68-5d2cbfd77f89','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12507,'3d0da24b-4906-4083-899b-8ec30fe63777','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12508,'3d0da24b-4906-4083-899b-8ec30fe63777','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12509,'598ab25d-0561-40d0-8096-8dfb1835350b','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12510,'598ab25d-0561-40d0-8096-8dfb1835350b','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12511,'9ef5cd29-c351-42b7-9305-e5babc9bb0ba','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12512,'e1298e57-c834-4452-8c51-ffdbef9ae112','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12513,'e1298e57-c834-4452-8c51-ffdbef9ae112','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12514,'558a553c-a669-47cb-9137-62e598ab7446','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12515,'43788a0b-f831-43b6-a277-df91eda495be','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12516,'43788a0b-f831-43b6-a277-df91eda495be','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12517,'43788a0b-f831-43b6-a277-df91eda495be','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12518,'43788a0b-f831-43b6-a277-df91eda495be','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12519,'1abbed5d-8d55-43aa-b41e-dbfd835281af','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12520,'1abbed5d-8d55-43aa-b41e-dbfd835281af','4136df20-f9e6-4fa5-93a8-71d418f0331a');
|
||
INSERT INTO vendors_categories VALUES(12521,'696186b1-d357-4840-a823-9917df735e64','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12522,'696186b1-d357-4840-a823-9917df735e64','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12523,'7fd265b7-fe77-4b21-9674-d572f83497cd','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12524,'7fd265b7-fe77-4b21-9674-d572f83497cd','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12525,'5edfe136-0e2c-467c-816a-a06cbf208e92','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12526,'6fe0ae60-4315-4d1a-8716-87efd5418e35','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12527,'6fe0ae60-4315-4d1a-8716-87efd5418e35','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12528,'79be293e-bc2e-4b38-9f73-86c5c872cb20','4136df20-f9e6-4fa5-93a8-71d418f0331a');
|
||
INSERT INTO vendors_categories VALUES(12529,'79be293e-bc2e-4b38-9f73-86c5c872cb20','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12530,'5d4ce363-36d9-4848-be9c-485eaf0bc4a3','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12531,'5d4ce363-36d9-4848-be9c-485eaf0bc4a3','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12532,'8abe7bfb-3494-4e4d-b388-eb3bbccc305c','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12533,'8abe7bfb-3494-4e4d-b388-eb3bbccc305c','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12534,'3096512e-7ec0-4ad4-8c4b-e49503e4b060','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12535,'3096512e-7ec0-4ad4-8c4b-e49503e4b060','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12536,'d3a3708e-805a-403e-a97a-ea64a3df2800','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12537,'d3a3708e-805a-403e-a97a-ea64a3df2800','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12538,'6b837494-f699-47fe-a3ec-6db58e41c4fc','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12539,'6b837494-f699-47fe-a3ec-6db58e41c4fc','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12540,'6b837494-f699-47fe-a3ec-6db58e41c4fc','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12541,'6b837494-f699-47fe-a3ec-6db58e41c4fc','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12542,'6b837494-f699-47fe-a3ec-6db58e41c4fc','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12543,'6b837494-f699-47fe-a3ec-6db58e41c4fc','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12544,'6b837494-f699-47fe-a3ec-6db58e41c4fc','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12545,'99cda9a7-6b32-48f9-b781-bfd5c3db02e0','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12546,'99cda9a7-6b32-48f9-b781-bfd5c3db02e0','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12547,'63ecc6e3-ef26-4308-b9c0-13b6db6c6fa6','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12548,'63ecc6e3-ef26-4308-b9c0-13b6db6c6fa6','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12549,'63ecc6e3-ef26-4308-b9c0-13b6db6c6fa6','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12550,'63ecc6e3-ef26-4308-b9c0-13b6db6c6fa6','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12551,'63ecc6e3-ef26-4308-b9c0-13b6db6c6fa6','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12552,'63ecc6e3-ef26-4308-b9c0-13b6db6c6fa6','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12553,'63ecc6e3-ef26-4308-b9c0-13b6db6c6fa6','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12554,'2eb804d1-d103-4bf4-bbe8-02e55a31e64c','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12555,'2eb804d1-d103-4bf4-bbe8-02e55a31e64c','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12556,'2eb804d1-d103-4bf4-bbe8-02e55a31e64c','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12557,'2eb804d1-d103-4bf4-bbe8-02e55a31e64c','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12558,'2eb804d1-d103-4bf4-bbe8-02e55a31e64c','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12559,'2eb804d1-d103-4bf4-bbe8-02e55a31e64c','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12560,'248a5ba6-3161-425c-97e7-5987eb529b36','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12561,'46213444-1c1b-40ef-9be3-36d7729b6fe7','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12562,'46213444-1c1b-40ef-9be3-36d7729b6fe7','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12563,'85aa70d1-4ffb-4b90-b78a-3b5dfdc2b56b','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12564,'8d7371af-ad3b-43a2-b9d0-c12937c92c75','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12565,'8d7371af-ad3b-43a2-b9d0-c12937c92c75','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12566,'c8012131-321e-4756-82b7-62a9060d363a','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12567,'c8012131-321e-4756-82b7-62a9060d363a','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12568,'17cc3e57-5b47-4ad0-9672-eb023560cb79','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12569,'7bddfb3f-8a89-4cac-afb6-5f655afad252','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12570,'7bddfb3f-8a89-4cac-afb6-5f655afad252','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12571,'f954a23a-9b9c-407b-aa86-b01fc1b8334b','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12572,'229c5a4f-38ef-4e21-bfd0-6ce13aa02dce','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12573,'bdd8d69c-4bd9-4bde-aa98-cc7936af89db','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12574,'bdd8d69c-4bd9-4bde-aa98-cc7936af89db','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12575,'5f8d7d0c-72c0-4777-8f6c-8bc52376b62c','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12576,'5f8d7d0c-72c0-4777-8f6c-8bc52376b62c','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12577,'5f8d7d0c-72c0-4777-8f6c-8bc52376b62c','4136df20-f9e6-4fa5-93a8-71d418f0331a');
|
||
INSERT INTO vendors_categories VALUES(12578,'5f8d7d0c-72c0-4777-8f6c-8bc52376b62c','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12579,'5f8d7d0c-72c0-4777-8f6c-8bc52376b62c','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12580,'5f8d7d0c-72c0-4777-8f6c-8bc52376b62c','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12581,'5f8d7d0c-72c0-4777-8f6c-8bc52376b62c','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12582,'5f8d7d0c-72c0-4777-8f6c-8bc52376b62c','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12583,'73cf37c5-d743-4c70-9a3b-4fbeb2cabe05','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12584,'73cf37c5-d743-4c70-9a3b-4fbeb2cabe05','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12585,'0875c165-8779-46a3-876b-5f21ec44ad8f','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12586,'0875c165-8779-46a3-876b-5f21ec44ad8f','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12587,'110036fe-6652-4799-a42c-850eaaea75a6','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12588,'110036fe-6652-4799-a42c-850eaaea75a6','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12589,'970f657d-9602-4652-a867-0f7ab1efb36b','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12590,'970f657d-9602-4652-a867-0f7ab1efb36b','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12591,'c1432b94-59ec-479c-b340-db59ed32ddd7','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12592,'c1432b94-59ec-479c-b340-db59ed32ddd7','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12593,'ddf3cfd0-9978-43bb-af5e-997da392fa5a','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12594,'ddf3cfd0-9978-43bb-af5e-997da392fa5a','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12595,'b69996cc-0c87-4040-8085-529cb63c1cad','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12596,'b69996cc-0c87-4040-8085-529cb63c1cad','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12597,'b69996cc-0c87-4040-8085-529cb63c1cad','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12598,'b69996cc-0c87-4040-8085-529cb63c1cad','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12599,'b69996cc-0c87-4040-8085-529cb63c1cad','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12600,'b69996cc-0c87-4040-8085-529cb63c1cad','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12601,'54bb69da-9dbe-45c1-bdb2-3380f84eca64','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12602,'54bb69da-9dbe-45c1-bdb2-3380f84eca64','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12603,'a41415cf-c10c-43c5-b113-8f9f3dab423e','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12604,'a41415cf-c10c-43c5-b113-8f9f3dab423e','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12605,'a41415cf-c10c-43c5-b113-8f9f3dab423e','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12606,'af62f682-3d87-4764-91d3-21918f332704','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12607,'af62f682-3d87-4764-91d3-21918f332704','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12608,'af62f682-3d87-4764-91d3-21918f332704','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12609,'af62f682-3d87-4764-91d3-21918f332704','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12610,'520056b8-8cc0-49d7-973c-d579b5ccc951','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12611,'520056b8-8cc0-49d7-973c-d579b5ccc951','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12612,'520056b8-8cc0-49d7-973c-d579b5ccc951','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12613,'520056b8-8cc0-49d7-973c-d579b5ccc951','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12614,'f98f4cd9-ac53-4b1c-8259-034f889ded33','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12615,'1c79c889-5c48-4e93-a538-02b56ca8c406','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12616,'1c79c889-5c48-4e93-a538-02b56ca8c406','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12617,'bd3e3366-4761-41cf-88d6-115ce7271abe','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12618,'991cac91-fb21-4cd8-b6b6-018e196730a9','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12619,'991cac91-fb21-4cd8-b6b6-018e196730a9','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12620,'e26fd976-0180-4de1-a0bd-2873f9319a18','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12621,'e26fd976-0180-4de1-a0bd-2873f9319a18','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12622,'f7a11ba5-d0ad-4520-9201-8ec661362f82','4136df20-f9e6-4fa5-93a8-71d418f0331a');
|
||
INSERT INTO vendors_categories VALUES(12623,'f7a11ba5-d0ad-4520-9201-8ec661362f82','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12624,'ea95f932-0380-412b-ae8e-620541641e46','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12625,'ea95f932-0380-412b-ae8e-620541641e46','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12626,'9eb25d0b-4e03-485e-9d07-b05a50d4ec3c','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12627,'9eb25d0b-4e03-485e-9d07-b05a50d4ec3c','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12628,'9eb25d0b-4e03-485e-9d07-b05a50d4ec3c','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12629,'41ffe0c3-aa32-44c2-8142-3074d8572ed8','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12630,'41ffe0c3-aa32-44c2-8142-3074d8572ed8','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12631,'705c5144-ae1a-4c82-a460-343ef1bef40b','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12632,'705c5144-ae1a-4c82-a460-343ef1bef40b','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12633,'4a5ea041-9e0c-4db6-98b6-96dd766d1129','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12634,'4a5ea041-9e0c-4db6-98b6-96dd766d1129','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12635,'480fe730-ad35-4676-a880-b6dd6d5d33e3','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12636,'dcdbcad5-6c5e-459a-9fa5-c96ea96ff3f2','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12637,'dcdbcad5-6c5e-459a-9fa5-c96ea96ff3f2','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12638,'bb6e2564-eff8-4368-ab96-101b457cbd9c','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12639,'f77f9f98-5605-4bd0-8fdd-881e842eb58b','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12640,'f77f9f98-5605-4bd0-8fdd-881e842eb58b','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12641,'62dd10e0-6c87-4533-9a27-ade6daceaf89','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12642,'62dd10e0-6c87-4533-9a27-ade6daceaf89','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12643,'3d9ad291-1e9e-468b-af51-c7b25beb7b41','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12644,'3d9ad291-1e9e-468b-af51-c7b25beb7b41','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12645,'3d9ad291-1e9e-468b-af51-c7b25beb7b41','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12646,'3d9ad291-1e9e-468b-af51-c7b25beb7b41','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12647,'3d9ad291-1e9e-468b-af51-c7b25beb7b41','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12648,'3d9ad291-1e9e-468b-af51-c7b25beb7b41','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12649,'3d9ad291-1e9e-468b-af51-c7b25beb7b41','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12650,'3d9ad291-1e9e-468b-af51-c7b25beb7b41','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12651,'f2b0ef98-c81b-40f8-a25b-86da0e33943a','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12652,'f2b0ef98-c81b-40f8-a25b-86da0e33943a','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12653,'f2b0ef98-c81b-40f8-a25b-86da0e33943a','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12654,'94df73fc-ca4a-458d-a418-319d3e6f0057','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12655,'4c9f19bb-a566-4bd4-97b4-4fa99c3c7862','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12656,'4c9f19bb-a566-4bd4-97b4-4fa99c3c7862','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12657,'5d10e403-2165-4886-88ef-3243896aed53','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12658,'5d10e403-2165-4886-88ef-3243896aed53','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12659,'5d10e403-2165-4886-88ef-3243896aed53','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12660,'5d10e403-2165-4886-88ef-3243896aed53','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12661,'5d10e403-2165-4886-88ef-3243896aed53','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12662,'5d10e403-2165-4886-88ef-3243896aed53','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12663,'5d10e403-2165-4886-88ef-3243896aed53','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12664,'41b1e167-518d-43b6-8d27-026766c41201','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12665,'97d60918-ce65-4e97-a24a-d5f3ba2b8d83','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12666,'97d60918-ce65-4e97-a24a-d5f3ba2b8d83','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12667,'97d60918-ce65-4e97-a24a-d5f3ba2b8d83','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12668,'57918d2d-519c-41fb-807c-87b04f5059d6','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12669,'e29da918-2bce-43a7-a68c-9255ad2af294','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12670,'7152b318-0ed6-4e05-8bee-43e05e5e006f','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12671,'3fbcbebb-38bf-403d-990a-5a7ac8d66b9f','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12672,'3fbcbebb-38bf-403d-990a-5a7ac8d66b9f','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12673,'ab70b584-7603-4d21-bc40-cfa89123ca93','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12674,'fa4dcf58-1fd6-49a6-8e21-4734c921ef17','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12675,'fa4dcf58-1fd6-49a6-8e21-4734c921ef17','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12676,'7926a6c3-3326-4c69-9f21-c1a5a654a8e8','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12677,'08f61151-7b6b-4a1c-b9e4-bb6bc4ba06e0','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12678,'08f61151-7b6b-4a1c-b9e4-bb6bc4ba06e0','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12679,'5904f23f-a597-42cd-b118-4002fe476a73','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12680,'5904f23f-a597-42cd-b118-4002fe476a73','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12681,'8c090bd3-230a-4add-9464-5980be552dea','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12682,'8c090bd3-230a-4add-9464-5980be552dea','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12683,'1b2f1b34-bbf5-4eeb-90fc-154aa38ed5d2','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12684,'f30fdfee-523d-474a-bf7b-dcb903c43bd0','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12685,'f30fdfee-523d-474a-bf7b-dcb903c43bd0','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12686,'f30fdfee-523d-474a-bf7b-dcb903c43bd0','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12687,'f30fdfee-523d-474a-bf7b-dcb903c43bd0','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12688,'418ee4c6-b4d1-4c4e-831f-72602e1e950d','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12689,'60decb8f-0a62-4467-a94a-248ed4fd7229','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12690,'f734a600-140d-4af9-918f-4cfbdc2bfae9','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12691,'f734a600-140d-4af9-918f-4cfbdc2bfae9','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12692,'849d1096-d174-4f57-98d9-6e973dc68b35','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12693,'849d1096-d174-4f57-98d9-6e973dc68b35','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12694,'36732bad-df88-41bc-84b7-290cbf238d4a','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12695,'4eb7ed4f-3ad1-42e4-9a50-1b77cb66d0b3','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12696,'4eb7ed4f-3ad1-42e4-9a50-1b77cb66d0b3','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12697,'2f28f781-adbb-42e7-86ee-355a9707a87d','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12698,'2f28f781-adbb-42e7-86ee-355a9707a87d','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12699,'90822539-d78e-49c9-bf7a-5a52aad7033c','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12700,'90822539-d78e-49c9-bf7a-5a52aad7033c','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12701,'9b643afd-4b02-4342-a199-f6e626893794','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12702,'9b643afd-4b02-4342-a199-f6e626893794','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12703,'d0ff5d33-2edc-40ff-8298-d7a0a1d0ab31','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12704,'d0ff5d33-2edc-40ff-8298-d7a0a1d0ab31','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12705,'d0ff5d33-2edc-40ff-8298-d7a0a1d0ab31','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12706,'d0ff5d33-2edc-40ff-8298-d7a0a1d0ab31','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12707,'d0ff5d33-2edc-40ff-8298-d7a0a1d0ab31','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12708,'d0ff5d33-2edc-40ff-8298-d7a0a1d0ab31','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12709,'d0ff5d33-2edc-40ff-8298-d7a0a1d0ab31','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12710,'ca9965ff-d378-4f34-a701-d944d5597cc8','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12711,'49c52e04-ccd8-498b-a5b9-4d6db7be2233','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12712,'49c52e04-ccd8-498b-a5b9-4d6db7be2233','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12713,'9dce6f07-5ee1-40df-aaa4-9c50fffccff0','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12714,'9dce6f07-5ee1-40df-aaa4-9c50fffccff0','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12715,'23ba3650-273c-4951-82e6-a6c9c7db79ce','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12716,'23ba3650-273c-4951-82e6-a6c9c7db79ce','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12717,'1de28966-fca5-4a2d-9874-172d244d9145','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12718,'1de28966-fca5-4a2d-9874-172d244d9145','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12719,'608071c0-d754-4190-9b42-3adce4938649','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12720,'608071c0-d754-4190-9b42-3adce4938649','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12721,'20851a87-a42e-4207-86c6-2c40fdbf32bc','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12722,'20851a87-a42e-4207-86c6-2c40fdbf32bc','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12723,'20851a87-a42e-4207-86c6-2c40fdbf32bc','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12724,'4b3a3585-c814-4817-8808-de50d1927356','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12725,'4b3a3585-c814-4817-8808-de50d1927356','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12726,'a22f0696-0e60-4446-93e0-89b0f402c653','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12727,'a22f0696-0e60-4446-93e0-89b0f402c653','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12728,'7a253448-e1a3-4ab2-90be-dfded4a21fbb','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12729,'7a253448-e1a3-4ab2-90be-dfded4a21fbb','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12730,'5baad229-3625-4b81-bfd2-72833d6d42f2','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12731,'5baad229-3625-4b81-bfd2-72833d6d42f2','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12732,'9c528c8b-8737-412f-a1d8-3a46641dccaf','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12733,'d0756373-50de-443a-aa70-368a26372918','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12734,'8b595c55-5208-44ee-8ffd-b2dc63a13216','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12735,'8b595c55-5208-44ee-8ffd-b2dc63a13216','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12736,'536769d1-d170-4e46-86c3-a971983daf00','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12737,'536769d1-d170-4e46-86c3-a971983daf00','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12738,'213b7434-09e1-44c8-ac17-242399521ec6','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12739,'7fbff625-1859-47d9-b42a-1d0df3253c97','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12740,'7fbff625-1859-47d9-b42a-1d0df3253c97','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12741,'8357d78c-17bc-4e0b-9c19-569e65ed937e','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12742,'8357d78c-17bc-4e0b-9c19-569e65ed937e','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12743,'8723e145-f285-4538-9dc9-7cc4c9d8cd01','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12744,'8723e145-f285-4538-9dc9-7cc4c9d8cd01','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12745,'eaa43f60-2c3c-4d6a-8205-79522e847978','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12746,'eaa43f60-2c3c-4d6a-8205-79522e847978','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12747,'eaa43f60-2c3c-4d6a-8205-79522e847978','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12748,'eaa43f60-2c3c-4d6a-8205-79522e847978','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12749,'eaa43f60-2c3c-4d6a-8205-79522e847978','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12750,'eaa43f60-2c3c-4d6a-8205-79522e847978','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12751,'eaa43f60-2c3c-4d6a-8205-79522e847978','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12752,'2ecc0bcd-1ca8-4032-9b96-22b970d686ba','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12753,'c9bb128e-af6e-4b61-acc5-a215e3929f99','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12754,'c9bb128e-af6e-4b61-acc5-a215e3929f99','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12755,'c9bb128e-af6e-4b61-acc5-a215e3929f99','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12756,'c9bb128e-af6e-4b61-acc5-a215e3929f99','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12757,'1aff2f10-648a-40a6-9346-bf01c8bea8f4','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12758,'1aff2f10-648a-40a6-9346-bf01c8bea8f4','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12759,'3a59914e-09b6-40c2-ad14-2e288edf26ad','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12760,'3b9eec5d-aa01-4230-8206-d3784a97844d','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12761,'3b9eec5d-aa01-4230-8206-d3784a97844d','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12762,'c8e4317b-4a10-46d4-a126-b310ab50f4c6','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12763,'ccb81813-748f-4174-923c-faa280fcd684','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12764,'ccb81813-748f-4174-923c-faa280fcd684','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12765,'3572ec2a-9e0a-43c9-a652-35e5e15715f5','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12766,'3572ec2a-9e0a-43c9-a652-35e5e15715f5','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12767,'43f5640d-8ec0-464d-8f37-91f0dddfb6cb','4136df20-f9e6-4fa5-93a8-71d418f0331a');
|
||
INSERT INTO vendors_categories VALUES(12768,'43f5640d-8ec0-464d-8f37-91f0dddfb6cb','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12769,'c81f7a65-0636-4dbd-b300-f4f0e190f0f5','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12770,'c81f7a65-0636-4dbd-b300-f4f0e190f0f5','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12771,'c81f7a65-0636-4dbd-b300-f4f0e190f0f5','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12772,'c81f7a65-0636-4dbd-b300-f4f0e190f0f5','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12773,'c81f7a65-0636-4dbd-b300-f4f0e190f0f5','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12774,'c81f7a65-0636-4dbd-b300-f4f0e190f0f5','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12775,'ac3a122e-9148-4669-86db-c62efe4d41ca','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12776,'ac3a122e-9148-4669-86db-c62efe4d41ca','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12777,'ac3a122e-9148-4669-86db-c62efe4d41ca','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12778,'ac3a122e-9148-4669-86db-c62efe4d41ca','4136df20-f9e6-4fa5-93a8-71d418f0331a');
|
||
INSERT INTO vendors_categories VALUES(12779,'ac3a122e-9148-4669-86db-c62efe4d41ca','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12780,'ac3a122e-9148-4669-86db-c62efe4d41ca','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12781,'ac3a122e-9148-4669-86db-c62efe4d41ca','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12782,'ac3a122e-9148-4669-86db-c62efe4d41ca','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12783,'ac3a122e-9148-4669-86db-c62efe4d41ca','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12784,'ac3a122e-9148-4669-86db-c62efe4d41ca','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12785,'e0b7f9ff-2b8e-4bca-b773-f2c62f764591','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12786,'e0b7f9ff-2b8e-4bca-b773-f2c62f764591','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12787,'e0b7f9ff-2b8e-4bca-b773-f2c62f764591','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12788,'e0b7f9ff-2b8e-4bca-b773-f2c62f764591','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12789,'e0b7f9ff-2b8e-4bca-b773-f2c62f764591','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12790,'e0b7f9ff-2b8e-4bca-b773-f2c62f764591','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12791,'e0b7f9ff-2b8e-4bca-b773-f2c62f764591','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12792,'c2f9166c-8f60-4cc3-b3ad-7b562e1c295c','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12793,'d2c4ea8e-4aae-4d90-9c7c-dc6cc3e88e59','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12794,'51bf7a38-4be1-4bd8-ab47-93aa1a52bafc','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12795,'51bf7a38-4be1-4bd8-ab47-93aa1a52bafc','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12796,'4767ab32-f493-4767-9c8c-fe33a85b0a30','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12797,'4767ab32-f493-4767-9c8c-fe33a85b0a30','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12798,'4767ab32-f493-4767-9c8c-fe33a85b0a30','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12799,'4767ab32-f493-4767-9c8c-fe33a85b0a30','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12800,'4767ab32-f493-4767-9c8c-fe33a85b0a30','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12801,'4767ab32-f493-4767-9c8c-fe33a85b0a30','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12802,'a97b02bf-695b-4523-ae07-439b16139097','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12803,'2b8b774d-82f4-4193-bcbc-4c9fef007642','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12804,'2b8b774d-82f4-4193-bcbc-4c9fef007642','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12805,'0f12203d-51d8-4146-8a07-765be3df473f','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12806,'e7c86628-70b1-468b-980f-21748036484e','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12807,'e7c86628-70b1-468b-980f-21748036484e','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12808,'7bc409da-b0ed-4d05-bc1a-fe4d90b25132','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12809,'63a2357d-37fe-4994-85e2-4696265edd08','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12810,'63a2357d-37fe-4994-85e2-4696265edd08','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12811,'86a8e4db-7e4b-4e72-802a-045b75c38744','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12812,'a49a0028-030c-4b63-bb7d-907aa4defdfb','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12813,'a49a0028-030c-4b63-bb7d-907aa4defdfb','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12814,'35e76880-df42-44fb-be84-87062f6f8c4e','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12815,'35e76880-df42-44fb-be84-87062f6f8c4e','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12816,'c29cf602-d580-44c4-a5ee-bc317b3fce53','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12817,'28f22ad5-4484-4c6f-b3c8-3cc3ffdb8e22','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12818,'28f22ad5-4484-4c6f-b3c8-3cc3ffdb8e22','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12819,'28f22ad5-4484-4c6f-b3c8-3cc3ffdb8e22','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12820,'0de4c055-f8d9-4ddd-97cc-e49b2779cab9','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12821,'0de4c055-f8d9-4ddd-97cc-e49b2779cab9','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12822,'0de4c055-f8d9-4ddd-97cc-e49b2779cab9','4136df20-f9e6-4fa5-93a8-71d418f0331a');
|
||
INSERT INTO vendors_categories VALUES(12823,'0de4c055-f8d9-4ddd-97cc-e49b2779cab9','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12824,'0de4c055-f8d9-4ddd-97cc-e49b2779cab9','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12825,'0de4c055-f8d9-4ddd-97cc-e49b2779cab9','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12826,'2b9852e2-3b38-452b-b47c-5f110f12dd74','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12827,'2b9852e2-3b38-452b-b47c-5f110f12dd74','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12828,'0eed45fe-7252-432f-b467-c46e0a967c72','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12829,'0eed45fe-7252-432f-b467-c46e0a967c72','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12830,'968cd68d-051f-4c08-bcfa-131cc39cb8bb','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12831,'968cd68d-051f-4c08-bcfa-131cc39cb8bb','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12832,'754e25e6-13c6-4289-be85-2ce12b39e4af','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12833,'35e3def6-0097-48d1-b1ff-038a9119bc77','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12834,'35e3def6-0097-48d1-b1ff-038a9119bc77','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12835,'247510fe-5fc0-4128-9d49-63b2c568280a','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12836,'10033bc5-ab60-4422-891e-c230a5f7b963','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12837,'10033bc5-ab60-4422-891e-c230a5f7b963','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12838,'eb81f801-1484-4ffa-ac9c-20cc57651ff0','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12839,'eb81f801-1484-4ffa-ac9c-20cc57651ff0','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12840,'c25b4a9b-49e2-4bbb-900a-a9e5ef857833','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12841,'c25b4a9b-49e2-4bbb-900a-a9e5ef857833','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12842,'c98294ee-50a4-4e53-9caa-5a349098f870','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12843,'c98294ee-50a4-4e53-9caa-5a349098f870','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12844,'7dda3615-f753-45b2-b9f5-bb3f966eb6cd','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12845,'7dda3615-f753-45b2-b9f5-bb3f966eb6cd','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12846,'74efea53-5cde-4c31-80a4-a9b9e9593ac7','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12847,'abfd3f46-3959-471a-8a0b-b1d52cb805d6','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12848,'abfd3f46-3959-471a-8a0b-b1d52cb805d6','4136df20-f9e6-4fa5-93a8-71d418f0331a');
|
||
INSERT INTO vendors_categories VALUES(12849,'4d38d28b-5c5f-4d7d-8ba2-bf2b73eae101','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12850,'4d38d28b-5c5f-4d7d-8ba2-bf2b73eae101','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12851,'94244add-1cc4-40dd-8cf0-ba430660319f','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12852,'94244add-1cc4-40dd-8cf0-ba430660319f','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12853,'83d9f5c1-e7ba-4cd8-baf2-035212e41bf7','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12854,'53dedb31-656f-4c5f-bf30-5da075fc0714','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12855,'53dedb31-656f-4c5f-bf30-5da075fc0714','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12856,'5955be5d-cfce-420d-be5a-6e0f466a0e69','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12857,'5955be5d-cfce-420d-be5a-6e0f466a0e69','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12858,'19a113bb-33ea-4f35-b64a-fffe94315fa9','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12859,'19a113bb-33ea-4f35-b64a-fffe94315fa9','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12860,'9675aec7-70a9-4962-9769-7102163f77bd','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12861,'bd34ade0-c0fd-4be4-9fc0-fbcff4414c8c','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12862,'bd34ade0-c0fd-4be4-9fc0-fbcff4414c8c','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12863,'9043c1c7-116e-4a3d-8229-6232933f83ae','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12864,'7d6bf96d-aa18-4553-a9d7-2eb430e7f223','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12865,'c2fdcd62-a7b3-4b9f-8444-ab0aa2ba44e3','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12866,'c2fdcd62-a7b3-4b9f-8444-ab0aa2ba44e3','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12867,'9d7edf03-61ea-4645-ad05-a17f714146b2','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12868,'9d7edf03-61ea-4645-ad05-a17f714146b2','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12869,'f9e5e942-0791-41d8-aecd-1054d7255d72','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12870,'f9e5e942-0791-41d8-aecd-1054d7255d72','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12871,'f9e5e942-0791-41d8-aecd-1054d7255d72','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12872,'f9e5e942-0791-41d8-aecd-1054d7255d72','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12873,'db1961c6-28d8-41a2-b39c-c871de5fe578','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12874,'db1961c6-28d8-41a2-b39c-c871de5fe578','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12875,'7a131fb0-db44-41fa-84e5-c13099ab34f0','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12876,'7a131fb0-db44-41fa-84e5-c13099ab34f0','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12877,'a2101b5f-e945-4439-96fa-423b4dc8786f','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12878,'a2101b5f-e945-4439-96fa-423b4dc8786f','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12879,'5544151c-0c5e-4583-8c11-2fe0a5d57a72','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12880,'5544151c-0c5e-4583-8c11-2fe0a5d57a72','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12881,'5544151c-0c5e-4583-8c11-2fe0a5d57a72','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12882,'5544151c-0c5e-4583-8c11-2fe0a5d57a72','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12883,'5544151c-0c5e-4583-8c11-2fe0a5d57a72','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12884,'21a9a3b0-4f2f-41dd-8656-e5e958fb14a1','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12885,'21a9a3b0-4f2f-41dd-8656-e5e958fb14a1','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12886,'21a9a3b0-4f2f-41dd-8656-e5e958fb14a1','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12887,'21a9a3b0-4f2f-41dd-8656-e5e958fb14a1','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12888,'21a9a3b0-4f2f-41dd-8656-e5e958fb14a1','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12889,'fb72e40b-f38b-4184-a22b-0c7995db8b79','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12890,'fb72e40b-f38b-4184-a22b-0c7995db8b79','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12891,'9da90769-a26f-4ff8-941d-b96c8bd5a111','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12892,'392d7967-3e17-4f12-89a2-58f972fcdf1c','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12893,'392d7967-3e17-4f12-89a2-58f972fcdf1c','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12894,'3958d2e5-55dd-49e4-8a3a-b1330206e512','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12895,'3958d2e5-55dd-49e4-8a3a-b1330206e512','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12896,'440cbd9f-9d74-400d-b6d9-303e8e43b827','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12897,'16785462-8c28-4c8b-bd1d-ebdfeb19d29a','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12898,'16785462-8c28-4c8b-bd1d-ebdfeb19d29a','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12899,'5901c0f8-1f72-464c-9b83-32aa2c28c08c','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12900,'3d6c955b-e54f-4d37-9c09-0a105ba113ef','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12901,'3d6c955b-e54f-4d37-9c09-0a105ba113ef','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12902,'ed3f6696-3fcf-4670-9dc9-d7fba52a69c5','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12903,'46edf4f5-8a61-4ace-938d-931023aa45e5','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12904,'b23d68d1-697c-4f3d-a742-dc36010d8781','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12905,'b23d68d1-697c-4f3d-a742-dc36010d8781','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12906,'8df94254-44bc-4abb-830d-da7c5e7ad7c5','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12907,'0d439e0f-0740-4615-8ec4-0a5f62b85a0c','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12908,'b09f9ba6-0625-4025-8f73-1486e6729b8b','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12909,'b09f9ba6-0625-4025-8f73-1486e6729b8b','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12910,'bfe65122-84a0-48bf-85d3-6800e922a9e6','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12911,'bfe65122-84a0-48bf-85d3-6800e922a9e6','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12912,'cd63f212-3c56-43e3-b418-105ea6d236d2','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12913,'cd63f212-3c56-43e3-b418-105ea6d236d2','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12914,'d023c509-05d0-4bd1-ab24-c1bfe1a5a420','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12915,'d023c509-05d0-4bd1-ab24-c1bfe1a5a420','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12916,'a53d9de4-3c54-4229-b57e-b3ae44de44ae','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12917,'a53d9de4-3c54-4229-b57e-b3ae44de44ae','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12918,'54fd90a2-8b77-43ac-96b8-a528dc759a0d','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12919,'54fd90a2-8b77-43ac-96b8-a528dc759a0d','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12920,'54fd90a2-8b77-43ac-96b8-a528dc759a0d','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12921,'54fd90a2-8b77-43ac-96b8-a528dc759a0d','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12922,'54fd90a2-8b77-43ac-96b8-a528dc759a0d','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12923,'a93d7f1d-3e99-40fd-afa7-14d9f7614806','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12924,'a93d7f1d-3e99-40fd-afa7-14d9f7614806','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12925,'5dfda775-9501-4bc4-af67-806eeaae4984','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12926,'5dfda775-9501-4bc4-af67-806eeaae4984','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12927,'1705016d-fd06-46fb-8af0-5db266e27149','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12928,'f6767fd6-cc77-43dd-8397-574a2cb8de7f','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12929,'f6767fd6-cc77-43dd-8397-574a2cb8de7f','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12930,'0f8cbdbc-56b2-4591-ba50-a8287913c0c5','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12931,'28dff223-9741-42a6-8170-3d82b72966c3','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12932,'28dff223-9741-42a6-8170-3d82b72966c3','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12933,'e96fd72f-e0e3-43b9-9821-139b25299f0d','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12934,'e96fd72f-e0e3-43b9-9821-139b25299f0d','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12935,'e96fd72f-e0e3-43b9-9821-139b25299f0d','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12936,'e96fd72f-e0e3-43b9-9821-139b25299f0d','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12937,'ff90b75c-ad34-4036-96f2-f466e3af6e0f','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12938,'ff90b75c-ad34-4036-96f2-f466e3af6e0f','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12939,'0a030489-d2b7-41fd-a486-5ae84866745f','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12940,'5e991e2b-05ff-419a-9fdb-f85f16dd9b68','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12941,'5e991e2b-05ff-419a-9fdb-f85f16dd9b68','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12942,'5e991e2b-05ff-419a-9fdb-f85f16dd9b68','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12943,'31d1bb08-411b-4dcc-97c7-8900713191c0','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12944,'31d1bb08-411b-4dcc-97c7-8900713191c0','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12945,'175437d4-83f0-4d15-b3b9-341b7d423554','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12946,'175437d4-83f0-4d15-b3b9-341b7d423554','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12947,'47656855-f4de-49c0-8d83-d5ccfe2c2546','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12948,'47656855-f4de-49c0-8d83-d5ccfe2c2546','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12949,'d3aa812d-3fc3-416e-90a7-5da801303907','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12950,'d3aa812d-3fc3-416e-90a7-5da801303907','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12951,'b187f9e9-0c3a-403b-8964-e97b6d9e7b78','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12952,'37eab928-6e72-48bf-99da-9c8407c87bc6','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12953,'37eab928-6e72-48bf-99da-9c8407c87bc6','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12954,'37eab928-6e72-48bf-99da-9c8407c87bc6','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12955,'37eab928-6e72-48bf-99da-9c8407c87bc6','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12956,'37eab928-6e72-48bf-99da-9c8407c87bc6','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12957,'4ca96409-991c-4f5c-9fb7-4d425aedfb66','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12958,'4ca96409-991c-4f5c-9fb7-4d425aedfb66','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12959,'4ca96409-991c-4f5c-9fb7-4d425aedfb66','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12960,'4ca96409-991c-4f5c-9fb7-4d425aedfb66','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12961,'4ca96409-991c-4f5c-9fb7-4d425aedfb66','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(12962,'4ca96409-991c-4f5c-9fb7-4d425aedfb66','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12963,'4ca96409-991c-4f5c-9fb7-4d425aedfb66','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12964,'4ca96409-991c-4f5c-9fb7-4d425aedfb66','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12965,'669e0f16-6617-4252-ba80-4002df4d7335','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12966,'669e0f16-6617-4252-ba80-4002df4d7335','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12967,'46edf4f5-8a61-4ace-938d-931023aa45e5','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12968,'e86dddba-0e0d-472f-9fa8-6a99e3c22529','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12969,'e86dddba-0e0d-472f-9fa8-6a99e3c22529','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12970,'26f9ff65-4cc0-4662-8d9b-24c67ab6193a','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12971,'56df3791-be8b-485e-8474-bc7244a6625c','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12972,'e448ad58-41c3-4cce-b8a7-a36aa1705c33','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12973,'e448ad58-41c3-4cce-b8a7-a36aa1705c33','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12974,'eb007bbf-5bf5-4893-ac2e-970578887974','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(12975,'a7d2485e-a3a8-4eac-a014-b828961daf60','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12976,'a7d2485e-a3a8-4eac-a014-b828961daf60','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12977,'5f15d14a-2e3d-4044-89d7-153293634247','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12978,'5f15d14a-2e3d-4044-89d7-153293634247','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12979,'6337e623-72a0-4538-bf2d-c0afaa137d99','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12980,'6337e623-72a0-4538-bf2d-c0afaa137d99','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(12981,'f25630b5-c950-4aff-a575-32f768e0dc13','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(12982,'f25630b5-c950-4aff-a575-32f768e0dc13','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(12983,'1fcd6aff-99da-4bda-b4e3-8cd006f723a8','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12984,'1fcd6aff-99da-4bda-b4e3-8cd006f723a8','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12985,'c1b609db-447a-44f8-9275-edaac7608d2b','4136df20-f9e6-4fa5-93a8-71d418f0331a');
|
||
INSERT INTO vendors_categories VALUES(12986,'c1b609db-447a-44f8-9275-edaac7608d2b','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12987,'df7eac3a-6c99-49c8-ad58-d87bb973979d','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12988,'df7eac3a-6c99-49c8-ad58-d87bb973979d','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12989,'71a480cc-c856-4d91-a4cb-fffa6ae94c84','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12990,'71a480cc-c856-4d91-a4cb-fffa6ae94c84','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12991,'c82ae98a-7a46-4a4b-9910-8db0f116c264','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(12992,'c82ae98a-7a46-4a4b-9910-8db0f116c264','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(12993,'bfd6edc8-541f-4fd1-ba10-2d11d476bd1d','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(12994,'bfd6edc8-541f-4fd1-ba10-2d11d476bd1d','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12995,'44121d10-96fa-4683-96fc-98a45ee8fecc','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(12996,'44121d10-96fa-4683-96fc-98a45ee8fecc','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(12997,'3c8063b8-2761-407b-af79-15e95513877a','4136df20-f9e6-4fa5-93a8-71d418f0331a');
|
||
INSERT INTO vendors_categories VALUES(12998,'3c8063b8-2761-407b-af79-15e95513877a','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(12999,'eea362dc-15ab-47a2-b73e-6a6cb8a7afca','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(13000,'eea362dc-15ab-47a2-b73e-6a6cb8a7afca','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13001,'b2c1efc1-c9a2-4b76-9a2a-e90543e9e9a9','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13002,'b2c1efc1-c9a2-4b76-9a2a-e90543e9e9a9','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13003,'b4e3d18b-18c4-4730-a760-0eaa47eb1803','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13004,'3f457e62-c3b0-466f-9391-0de7847a3451','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13005,'3f457e62-c3b0-466f-9391-0de7847a3451','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13006,'829a8a57-28bc-40d0-ac8a-744f9da60d33','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(13007,'829a8a57-28bc-40d0-ac8a-744f9da60d33','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13008,'1affbf07-6a89-4d2d-b94b-b24ff3c186b4','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13009,'1affbf07-6a89-4d2d-b94b-b24ff3c186b4','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13010,'df9dbbca-bc02-4062-8ff4-2090946cec61','4136df20-f9e6-4fa5-93a8-71d418f0331a');
|
||
INSERT INTO vendors_categories VALUES(13011,'df9dbbca-bc02-4062-8ff4-2090946cec61','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13012,'30a3086e-4dc9-4db8-994f-3d4c28bb1491','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13013,'b676fd3a-1c3a-4788-b5cf-4d2e566701e8','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(13014,'b676fd3a-1c3a-4788-b5cf-4d2e566701e8','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13015,'c02e32ec-3fd2-44a5-a46f-cf14667828ae','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13016,'078653be-6a92-4a89-ac47-1847e65efa2a','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13017,'078653be-6a92-4a89-ac47-1847e65efa2a','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13018,'3d74bb30-7c6e-4dae-bed9-4e1e919d97ad','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13019,'aeec60fd-aeba-466b-b47b-1f9cffd78b5e','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13020,'aeec60fd-aeba-466b-b47b-1f9cffd78b5e','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13021,'662eb53f-cd39-4bdc-ba5b-de0b9edafd60','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13022,'662eb53f-cd39-4bdc-ba5b-de0b9edafd60','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13023,'a9be2545-f169-478c-9b0d-a8c8bc58353d','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(13024,'a9be2545-f169-478c-9b0d-a8c8bc58353d','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(13025,'74147345-b83d-40d4-b000-c06dc2f529b5','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(13026,'74147345-b83d-40d4-b000-c06dc2f529b5','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13027,'cad6bcd1-04e9-46c1-bffc-9ef75dac5d7f','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13028,'cad6bcd1-04e9-46c1-bffc-9ef75dac5d7f','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13029,'cad6bcd1-04e9-46c1-bffc-9ef75dac5d7f','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13030,'cad6bcd1-04e9-46c1-bffc-9ef75dac5d7f','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13031,'65c9b2a9-acfe-4988-9e06-b48790d88aef','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(13032,'65c9b2a9-acfe-4988-9e06-b48790d88aef','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13033,'e58e3d1f-9ffa-403b-8d77-b9eed353d65c','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(13034,'beb2144f-3b17-4dfb-92dc-40bc2178b0dc','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13035,'beb2144f-3b17-4dfb-92dc-40bc2178b0dc','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13036,'beb2144f-3b17-4dfb-92dc-40bc2178b0dc','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(13037,'beb2144f-3b17-4dfb-92dc-40bc2178b0dc','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(13038,'beb2144f-3b17-4dfb-92dc-40bc2178b0dc','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13039,'beb2144f-3b17-4dfb-92dc-40bc2178b0dc','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13040,'beb2144f-3b17-4dfb-92dc-40bc2178b0dc','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13041,'53186b3b-5cd7-482f-8887-3bd8d0eae7d7','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13042,'53186b3b-5cd7-482f-8887-3bd8d0eae7d7','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13043,'0c00d01e-e340-4dea-8bab-771abd50b4b0','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13044,'0c00d01e-e340-4dea-8bab-771abd50b4b0','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(13045,'4b1b45d1-a45c-48a5-b776-f94d7f344415','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13046,'4b1b45d1-a45c-48a5-b776-f94d7f344415','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13047,'3218d75a-3839-4848-926b-c97c542489bd','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(13048,'3218d75a-3839-4848-926b-c97c542489bd','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13049,'688058d3-4c3c-46ca-ab1e-d5b6340860ef','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13050,'e84be716-0bce-4cc6-bce4-aa718786a995','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(13051,'e84be716-0bce-4cc6-bce4-aa718786a995','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13052,'847d9358-4ff8-420b-9ee4-e2b4a6e345a9','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13053,'847d9358-4ff8-420b-9ee4-e2b4a6e345a9','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13054,'3d74bb30-7c6e-4dae-bed9-4e1e919d97ad','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13055,'dcb8b53f-92da-4026-8bd3-1fbc6ba93361','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13056,'31be7484-533f-4f6f-bcb0-45733eee44ab','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13057,'31be7484-533f-4f6f-bcb0-45733eee44ab','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13058,'892f5955-572d-4cdf-aff7-ced84bed8eb7','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13059,'892f5955-572d-4cdf-aff7-ced84bed8eb7','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13060,'fdf4a9b9-8d34-4ebd-a371-76ab01deee41','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(13061,'fdf4a9b9-8d34-4ebd-a371-76ab01deee41','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13062,'31296221-5bd7-495f-a6d6-3a224eb29c25','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13063,'8477a943-d174-408a-badc-99f73270df3d','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13064,'eec6ed64-bd67-4de8-b207-e07f20317521','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13065,'eec6ed64-bd67-4de8-b207-e07f20317521','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13066,'2bca2683-b849-4b90-8972-83bec81c41d1','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13067,'2bca2683-b849-4b90-8972-83bec81c41d1','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13068,'57c46619-df18-461b-a1be-74c153ebe70e','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13069,'57c46619-df18-461b-a1be-74c153ebe70e','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13070,'69a939a8-5b30-42c1-b710-e6436455a4a4','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(13071,'69a939a8-5b30-42c1-b710-e6436455a4a4','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13072,'06a7de0b-7754-4b19-8b7d-97c97b394b34','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13073,'9d66370c-da05-4e8d-ab77-3b7c77f70cb1','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13074,'db15c021-4896-4c34-bd7f-ff12a5ed2ae2','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13075,'db15c021-4896-4c34-bd7f-ff12a5ed2ae2','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(13076,'db15c021-4896-4c34-bd7f-ff12a5ed2ae2','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(13077,'db15c021-4896-4c34-bd7f-ff12a5ed2ae2','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13078,'db15c021-4896-4c34-bd7f-ff12a5ed2ae2','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13079,'db15c021-4896-4c34-bd7f-ff12a5ed2ae2','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(13080,'dbe52e54-c494-4ab2-9f35-f716bb65e044','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13081,'29ec6fd2-6df2-4ff1-8a71-606f72d8a074','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13082,'29ec6fd2-6df2-4ff1-8a71-606f72d8a074','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13083,'6d60bceb-4cfc-4a99-978b-20448001649f','4136df20-f9e6-4fa5-93a8-71d418f0331a');
|
||
INSERT INTO vendors_categories VALUES(13084,'6d60bceb-4cfc-4a99-978b-20448001649f','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13085,'ed64ecac-510f-4fb2-9e05-c77e8e385e24','4136df20-f9e6-4fa5-93a8-71d418f0331a');
|
||
INSERT INTO vendors_categories VALUES(13086,'ed64ecac-510f-4fb2-9e05-c77e8e385e24','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13087,'99c58572-d859-4e54-926b-42c7a10af4ed','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(13088,'25973a96-414b-4a29-8555-bbaf23c32711','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13089,'54aa1d38-72eb-4f5f-8c5c-084662caceda','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13090,'54aa1d38-72eb-4f5f-8c5c-084662caceda','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13091,'a80c508c-5c94-473a-871b-20251b40f166','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13092,'a80c508c-5c94-473a-871b-20251b40f166','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13093,'6532ee85-8dfa-4d98-b50e-ea143dcf49eb','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13094,'22654128-9fc3-43f6-a3e7-964b14764637','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13095,'22654128-9fc3-43f6-a3e7-964b14764637','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13096,'9ff97561-c9ab-4169-bc43-479ba26a13b2','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13097,'9ff97561-c9ab-4169-bc43-479ba26a13b2','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13098,'c4f0ed9e-3a99-4752-8f93-51600119e234','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(13099,'c4f0ed9e-3a99-4752-8f93-51600119e234','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13100,'cf123055-e0f9-4ab4-a944-d59cfa121f93','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13101,'1506ea49-dd1d-4072-a8ff-c7e2902904ce','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13102,'1506ea49-dd1d-4072-a8ff-c7e2902904ce','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13103,'2658e2ad-6f9c-4512-a81b-b31b8c209b45','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13104,'1e4bda69-464f-440e-9e86-8ba71d4829ea','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13105,'1e4bda69-464f-440e-9e86-8ba71d4829ea','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13106,'67a96cce-f212-4c3f-8522-a6a5eb484d7e','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13107,'67a96cce-f212-4c3f-8522-a6a5eb484d7e','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13108,'860ed79b-2939-420e-9f7e-a9a64ef0102a','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13109,'01f7f78f-473b-44e3-98d5-9f8aeb3387bb','4136df20-f9e6-4fa5-93a8-71d418f0331a');
|
||
INSERT INTO vendors_categories VALUES(13110,'01f7f78f-473b-44e3-98d5-9f8aeb3387bb','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(13111,'871d79e3-76d3-4d00-8869-7ee1cbbff8c3','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13112,'871d79e3-76d3-4d00-8869-7ee1cbbff8c3','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13113,'6fc321c2-4ce3-405c-bae6-fc7839cee800','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13114,'6fc321c2-4ce3-405c-bae6-fc7839cee800','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(13115,'6fc321c2-4ce3-405c-bae6-fc7839cee800','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(13116,'6fc321c2-4ce3-405c-bae6-fc7839cee800','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13117,'6fc321c2-4ce3-405c-bae6-fc7839cee800','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13118,'6fc321c2-4ce3-405c-bae6-fc7839cee800','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13119,'aaec8a0b-2c43-426a-838c-d1b54b2d8c31','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13120,'aaec8a0b-2c43-426a-838c-d1b54b2d8c31','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(13121,'45e0f1c7-d5b5-4367-a736-264af634c8d7','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13122,'45e0f1c7-d5b5-4367-a736-264af634c8d7','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13123,'d458318e-5cca-47d4-9571-d39288f6dabf','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13124,'d458318e-5cca-47d4-9571-d39288f6dabf','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13125,'2f95eeab-f064-4330-bf3a-3e72bf154947','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(13126,'2f95eeab-f064-4330-bf3a-3e72bf154947','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(13127,'e618ce8c-c27a-4d10-8eb6-37060a353b8b','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13128,'e618ce8c-c27a-4d10-8eb6-37060a353b8b','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13129,'f5a8cfb4-0fa0-4c37-8245-50fea76e1303','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13130,'f5a8cfb4-0fa0-4c37-8245-50fea76e1303','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13131,'65c121bd-fa65-416e-902f-1f5bbb7fed1d','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13132,'5fee1578-740c-4911-86cc-1f2eef6ae5c0','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13133,'5fee1578-740c-4911-86cc-1f2eef6ae5c0','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13134,'1ab61476-e2ae-413e-8128-c890f9161361','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(13135,'0d90814a-204d-4825-8b64-dd610d99287a','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13136,'0d90814a-204d-4825-8b64-dd610d99287a','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13137,'0d90814a-204d-4825-8b64-dd610d99287a','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13138,'0d90814a-204d-4825-8b64-dd610d99287a','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13139,'09055303-fa56-47ff-b270-dc4786cae6a6','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13140,'0c864123-2bad-4a81-a0fb-5b24eb96d563','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13141,'0c864123-2bad-4a81-a0fb-5b24eb96d563','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13142,'85c34693-3502-4ffa-8b34-405e964e0355','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13143,'85c34693-3502-4ffa-8b34-405e964e0355','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13144,'7ee090ae-384d-48a4-a9be-bfcbd8563b6a','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13145,'7ee090ae-384d-48a4-a9be-bfcbd8563b6a','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13146,'fa75d639-1a22-494e-9ca3-fc1ce609adef','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13147,'fa75d639-1a22-494e-9ca3-fc1ce609adef','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(13148,'fa75d639-1a22-494e-9ca3-fc1ce609adef','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(13149,'e5dadade-5350-4fbd-a7c5-85c15dd88c2e','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(13150,'e5dadade-5350-4fbd-a7c5-85c15dd88c2e','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13151,'656bf372-f25a-493e-bb80-c837ba8966a9','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13152,'656bf372-f25a-493e-bb80-c837ba8966a9','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13153,'344fa12a-c3c4-42a0-90be-f291453fbfd4','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13154,'344fa12a-c3c4-42a0-90be-f291453fbfd4','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13155,'34cb920e-32e7-42c5-828e-c6b35d741ba7','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13156,'34cb920e-32e7-42c5-828e-c6b35d741ba7','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13157,'1514740a-9c8a-40c3-aade-61df96ccb625','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13158,'1514740a-9c8a-40c3-aade-61df96ccb625','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(13159,'86f34b08-738b-4b18-a7ce-3c011b3ecf3e','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13160,'86f34b08-738b-4b18-a7ce-3c011b3ecf3e','1f9756d5-6bd9-446b-8e66-cdd2906cf6cf');
|
||
INSERT INTO vendors_categories VALUES(13161,'86f34b08-738b-4b18-a7ce-3c011b3ecf3e','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13162,'86f34b08-738b-4b18-a7ce-3c011b3ecf3e','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13163,'f0ee04c0-f741-46c4-bff7-d3c829a3dcc9','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13164,'f0ee04c0-f741-46c4-bff7-d3c829a3dcc9','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(13165,'133a5af6-c6d7-4f8a-8405-bc5a89478e68','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13166,'133a5af6-c6d7-4f8a-8405-bc5a89478e68','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13167,'671084ea-50aa-4a83-9617-f1152e202892','4136df20-f9e6-4fa5-93a8-71d418f0331a');
|
||
INSERT INTO vendors_categories VALUES(13168,'671084ea-50aa-4a83-9617-f1152e202892','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13169,'3fa60e47-d313-47a9-8961-65452243de52','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13170,'7b48817a-a32d-48f6-a133-d561a7adf29d','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13171,'efd377e6-f00b-41de-a48e-1967a7d757c6','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13172,'efd377e6-f00b-41de-a48e-1967a7d757c6','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13173,'abd22f92-8559-49a6-8f4d-e4b01e447c76','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13174,'5a53bb14-922c-4b41-b770-a56d320a5b14','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13175,'5a53bb14-922c-4b41-b770-a56d320a5b14','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13176,'08e5d43f-ab71-43dd-af3f-be30c6c1ad89','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13177,'08e5d43f-ab71-43dd-af3f-be30c6c1ad89','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13178,'de94e1cd-dc1f-4c71-bdd3-a09c12838d0b','4136df20-f9e6-4fa5-93a8-71d418f0331a');
|
||
INSERT INTO vendors_categories VALUES(13179,'de94e1cd-dc1f-4c71-bdd3-a09c12838d0b','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13180,'3ddcd47b-96e1-472b-8ee9-8fd9adf285ef','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(13181,'3ddcd47b-96e1-472b-8ee9-8fd9adf285ef','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(13182,'b29e3afe-dee3-43e9-88ec-e60d56b72d98','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13183,'b29e3afe-dee3-43e9-88ec-e60d56b72d98','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13184,'7cb00547-703c-4998-90ee-6b6b67600c96','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13185,'88f38404-3ba4-4841-a182-0a7cbb09f751','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13186,'88f38404-3ba4-4841-a182-0a7cbb09f751','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13187,'b7a7c9ec-0441-47c8-be1c-7e14a80b90bc','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13188,'b7a7c9ec-0441-47c8-be1c-7e14a80b90bc','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(13189,'780f0738-8930-421f-b198-96112f5c30a7','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13190,'780f0738-8930-421f-b198-96112f5c30a7','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13191,'d6cd02c8-4a7e-43d8-99dc-abe6a2c05b2c','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13192,'d6cd02c8-4a7e-43d8-99dc-abe6a2c05b2c','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(13193,'75234542-206f-45c3-96cf-783a4af678f7','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13194,'75234542-206f-45c3-96cf-783a4af678f7','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(13195,'9b91f8d5-cac4-49d5-8396-3c1b4179ab15','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13196,'9b91f8d5-cac4-49d5-8396-3c1b4179ab15','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13197,'f3761ea8-667c-4e16-8af4-83f95e5f2049','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13198,'f3761ea8-667c-4e16-8af4-83f95e5f2049','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13199,'f3761ea8-667c-4e16-8af4-83f95e5f2049','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(13200,'f3761ea8-667c-4e16-8af4-83f95e5f2049','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13201,'f3761ea8-667c-4e16-8af4-83f95e5f2049','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13202,'9ad65660-aa16-41a6-9aa1-78a12faf291a','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13203,'9ad65660-aa16-41a6-9aa1-78a12faf291a','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13204,'02c7860f-709d-4fa2-9c37-ae3b2b69b940','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13205,'16b4addf-82df-443f-ab82-8a2985a521a5','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13206,'16b4addf-82df-443f-ab82-8a2985a521a5','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13207,'16b4addf-82df-443f-ab82-8a2985a521a5','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13208,'58c246f1-55ef-4a2f-9c8a-6c5e7c358984','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13209,'58c246f1-55ef-4a2f-9c8a-6c5e7c358984','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13210,'58c246f1-55ef-4a2f-9c8a-6c5e7c358984','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13211,'4a06a364-3817-4211-a5e2-bb4b0e02d5ed','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(13212,'4a06a364-3817-4211-a5e2-bb4b0e02d5ed','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13213,'b95e9637-a5c7-4b3c-a16a-778d4164671f','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(13214,'b95e9637-a5c7-4b3c-a16a-778d4164671f','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13215,'dd54ba33-5af4-4f8b-80d9-9f9a74ed6a7b','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(13216,'a148d6ee-a39f-45ee-bfbc-62e4c206fbf2','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13217,'a148d6ee-a39f-45ee-bfbc-62e4c206fbf2','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13218,'070691f1-e3fd-44d5-9bb9-92d7875b1731','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13219,'070691f1-e3fd-44d5-9bb9-92d7875b1731','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(13220,'070691f1-e3fd-44d5-9bb9-92d7875b1731','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13221,'1a0bf553-3a5c-434f-b019-550f4c592294','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13222,'1a0bf553-3a5c-434f-b019-550f4c592294','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13223,'1a0bf553-3a5c-434f-b019-550f4c592294','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13224,'756cac53-0c93-434a-92c4-80666dbcd4bf','4136df20-f9e6-4fa5-93a8-71d418f0331a');
|
||
INSERT INTO vendors_categories VALUES(13225,'756cac53-0c93-434a-92c4-80666dbcd4bf','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13226,'0cb0c2b7-f863-4a62-a2f4-a3714dd6a5fc','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13227,'a1ff1973-fcc4-4124-a0bc-68d63f438b6b','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13228,'a1ff1973-fcc4-4124-a0bc-68d63f438b6b','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13229,'a1ff1973-fcc4-4124-a0bc-68d63f438b6b','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13230,'a1ff1973-fcc4-4124-a0bc-68d63f438b6b','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(13231,'0b2db12d-49e2-4802-a279-0d58ce3ea3e4','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13232,'0b2db12d-49e2-4802-a279-0d58ce3ea3e4','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13233,'0b2db12d-49e2-4802-a279-0d58ce3ea3e4','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13234,'42e27601-dfba-47cb-af11-7f832ce9cafa','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13235,'42e27601-dfba-47cb-af11-7f832ce9cafa','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(13236,'42e27601-dfba-47cb-af11-7f832ce9cafa','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(13237,'42e27601-dfba-47cb-af11-7f832ce9cafa','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13238,'42e27601-dfba-47cb-af11-7f832ce9cafa','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13239,'42e27601-dfba-47cb-af11-7f832ce9cafa','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13240,'42e27601-dfba-47cb-af11-7f832ce9cafa','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13241,'5464e61d-a452-4384-b6d3-8f8e29e2266d','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13242,'5464e61d-a452-4384-b6d3-8f8e29e2266d','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13243,'5464e61d-a452-4384-b6d3-8f8e29e2266d','4136df20-f9e6-4fa5-93a8-71d418f0331a');
|
||
INSERT INTO vendors_categories VALUES(13244,'5464e61d-a452-4384-b6d3-8f8e29e2266d','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(13245,'5464e61d-a452-4384-b6d3-8f8e29e2266d','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(13246,'5464e61d-a452-4384-b6d3-8f8e29e2266d','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13247,'5464e61d-a452-4384-b6d3-8f8e29e2266d','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(13248,'5464e61d-a452-4384-b6d3-8f8e29e2266d','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13249,'bcc384ce-e1d8-496b-93b7-daeea628742d','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13250,'bcc384ce-e1d8-496b-93b7-daeea628742d','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13251,'aa659a84-c08a-49e3-929d-aa2aaa987239','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13252,'091e7a49-ed37-4d89-b690-7479a403052a','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13253,'091e7a49-ed37-4d89-b690-7479a403052a','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(13254,'cd1089e2-fb6e-4f85-8afe-cefa4cbfcb23','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13255,'cd1089e2-fb6e-4f85-8afe-cefa4cbfcb23','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13256,'f65961b4-572d-41a8-bb10-e596ed8f614f','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13257,'f65961b4-572d-41a8-bb10-e596ed8f614f','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13258,'33cc7d24-02f8-4838-8da7-10a7fbe69d09','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13259,'33cc7d24-02f8-4838-8da7-10a7fbe69d09','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13260,'5b332c9d-6598-4e6b-aa77-1c183408178b','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13261,'9d5b11f4-2109-4d1b-9f19-f9990947cdbe','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(13262,'9d5b11f4-2109-4d1b-9f19-f9990947cdbe','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13263,'a8c64c7c-939c-4169-96aa-45a311d2999e','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13264,'b58822ad-dccb-4d3e-99c6-60ba7bc5efa9','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(13265,'128fe68c-d5d9-4738-808f-39715ddc6b4a','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13266,'128fe68c-d5d9-4738-808f-39715ddc6b4a','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13267,'4d1d52cf-47db-4d75-9cc7-24732b777e38','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(13268,'4d1d52cf-47db-4d75-9cc7-24732b777e38','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13269,'1ea4335d-8b69-401f-97b3-73afc481766f','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13270,'1ea4335d-8b69-401f-97b3-73afc481766f','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13271,'0e2d49ba-f349-458f-bada-4a8760f99ea4','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13272,'0e2d49ba-f349-458f-bada-4a8760f99ea4','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13273,'0e2d49ba-f349-458f-bada-4a8760f99ea4','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(13274,'0e2d49ba-f349-458f-bada-4a8760f99ea4','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(13275,'f0930e62-e7e2-4938-9356-f7e5cb4c00e6','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13276,'85580ca9-ba16-479e-965d-8ddc25eff49a','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(13277,'85580ca9-ba16-479e-965d-8ddc25eff49a','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(13278,'f7464f22-058c-4951-974b-4b933be79084','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13279,'f7464f22-058c-4951-974b-4b933be79084','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13280,'684c867e-8eb8-4be1-a2d5-3a1d7a6b9460','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13281,'684c867e-8eb8-4be1-a2d5-3a1d7a6b9460','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(13282,'5af677e5-bc23-4c62-a91e-2957a4755730','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13283,'f870c2e6-377b-4c3a-a254-2f7b3348039b','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13284,'f870c2e6-377b-4c3a-a254-2f7b3348039b','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13285,'be3c2f26-ef82-4c6b-8a8c-b9222bd2acbf','1f9756d5-6bd9-446b-8e66-cdd2906cf6cf');
|
||
INSERT INTO vendors_categories VALUES(13286,'be3c2f26-ef82-4c6b-8a8c-b9222bd2acbf','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(13287,'2d67c8a3-6352-4b45-ab33-06898db799f4','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13288,'2d67c8a3-6352-4b45-ab33-06898db799f4','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13289,'fa3fd7d9-4d76-4c00-80b1-3fd82aed31db','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(13290,'fa3fd7d9-4d76-4c00-80b1-3fd82aed31db','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13291,'184af8eb-5f69-4b07-ba4c-0af5263d0447','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(13292,'184af8eb-5f69-4b07-ba4c-0af5263d0447','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13293,'8f045312-44db-4e4b-a61c-a8b2db910472','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13294,'2cce11bc-e02c-464f-9355-1fa7ea990a69','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13295,'2cce11bc-e02c-464f-9355-1fa7ea990a69','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13296,'65224dc9-1b4c-4bc7-8a99-7ed2e0e89477','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13297,'65224dc9-1b4c-4bc7-8a99-7ed2e0e89477','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(13298,'76676f39-1fef-41fa-8714-f37bc7a74f9b','4136df20-f9e6-4fa5-93a8-71d418f0331a');
|
||
INSERT INTO vendors_categories VALUES(13299,'817a3077-34a2-4ffb-937c-32900c253a5e','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13300,'817a3077-34a2-4ffb-937c-32900c253a5e','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13301,'4871a36a-4d9f-443d-85fa-ee74af9671ee','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13302,'4871a36a-4d9f-443d-85fa-ee74af9671ee','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(13303,'e5ec3b80-d66f-4cf0-bb9a-9d73e7504997','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13304,'e5ec3b80-d66f-4cf0-bb9a-9d73e7504997','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13305,'c6c1abfb-06d2-4fe5-b93a-20e5c6b311bb','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13306,'c6c1abfb-06d2-4fe5-b93a-20e5c6b311bb','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13307,'5bf486d6-d777-4326-9871-c334914b9ec8','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13308,'5bf486d6-d777-4326-9871-c334914b9ec8','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13309,'a4eb5cfb-3553-467f-80d9-dc498140f1f1','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13310,'a4eb5cfb-3553-467f-80d9-dc498140f1f1','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13311,'a4eb5cfb-3553-467f-80d9-dc498140f1f1','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13312,'df029554-2a3a-4bf3-b6da-22cb556110be','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13313,'df029554-2a3a-4bf3-b6da-22cb556110be','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13314,'e300a0e0-4591-4fed-a0c1-eb945482fd61','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13315,'e300a0e0-4591-4fed-a0c1-eb945482fd61','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13316,'9ad512a4-f997-41c7-8a41-7d3d86c23d30','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13317,'9ad512a4-f997-41c7-8a41-7d3d86c23d30','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(13318,'01a4cf87-2fdd-40b4-b996-c13f7bc3f825','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13319,'01a4cf87-2fdd-40b4-b996-c13f7bc3f825','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13320,'d5514e4e-ac44-4549-a591-6db2c4c560f3','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(13321,'010499c4-342e-4fb8-945e-fd87ac1d0fbe','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(13322,'010499c4-342e-4fb8-945e-fd87ac1d0fbe','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(13323,'0b5eed03-0da4-4c48-8dbc-05dfbf527938','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13324,'0b5eed03-0da4-4c48-8dbc-05dfbf527938','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(13325,'d49116e1-2257-4cfd-ace8-93d774fe5100','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13326,'af9ee6ef-f706-41bd-b865-7d4f09e5263c','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13327,'af9ee6ef-f706-41bd-b865-7d4f09e5263c','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(13328,'feafd1cd-02dc-473f-b4bb-fa508a40a611','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13329,'feafd1cd-02dc-473f-b4bb-fa508a40a611','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13330,'cff25be7-12bc-4652-839c-aed36274f71f','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13331,'cff25be7-12bc-4652-839c-aed36274f71f','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13332,'cff25be7-12bc-4652-839c-aed36274f71f','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(13333,'cff25be7-12bc-4652-839c-aed36274f71f','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(13334,'cff25be7-12bc-4652-839c-aed36274f71f','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13335,'cff25be7-12bc-4652-839c-aed36274f71f','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(13336,'b1e2c092-c9f8-40ef-b0d3-66da953c5801','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13337,'db967400-cad1-4a44-8075-69596c6e1b2a','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(13338,'0a265d0f-3888-4d3f-b7b8-302c822c50f1','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13339,'0a265d0f-3888-4d3f-b7b8-302c822c50f1','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(13340,'f9a5e53b-d0aa-4ad9-a268-41b17fb7fbe7','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13341,'f9a5e53b-d0aa-4ad9-a268-41b17fb7fbe7','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13342,'8a94213b-6148-41a7-8ec2-db90175a1028','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13343,'8a94213b-6148-41a7-8ec2-db90175a1028','1f9756d5-6bd9-446b-8e66-cdd2906cf6cf');
|
||
INSERT INTO vendors_categories VALUES(13344,'8a94213b-6148-41a7-8ec2-db90175a1028','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13345,'8a94213b-6148-41a7-8ec2-db90175a1028','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13346,'a31e5d6d-20c7-49d3-b500-b256599d7950','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13347,'a31e5d6d-20c7-49d3-b500-b256599d7950','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13348,'dcc6e133-c555-4e11-b69d-1ab373263550','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13349,'32e0798b-aaa7-4129-8f66-1b2c4005e40a','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13350,'a618b8bf-f4b3-4ab9-b45d-45421f395092','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13351,'a618b8bf-f4b3-4ab9-b45d-45421f395092','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13352,'a618b8bf-f4b3-4ab9-b45d-45421f395092','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13353,'a618b8bf-f4b3-4ab9-b45d-45421f395092','4136df20-f9e6-4fa5-93a8-71d418f0331a');
|
||
INSERT INTO vendors_categories VALUES(13354,'a618b8bf-f4b3-4ab9-b45d-45421f395092','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13355,'a618b8bf-f4b3-4ab9-b45d-45421f395092','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13356,'a618b8bf-f4b3-4ab9-b45d-45421f395092','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13357,'9f35a2db-98e7-429d-97ef-02da080b9d37','3c0181df-2f73-4f72-ab22-faf8126ef214');
|
||
INSERT INTO vendors_categories VALUES(13358,'9f35a2db-98e7-429d-97ef-02da080b9d37','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13359,'0195e54e-699c-43f2-9ff7-b333e7ea2300','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13360,'0195e54e-699c-43f2-9ff7-b333e7ea2300','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(13361,'52113eb1-803d-45dd-9652-e8b5016f0097','cfa8cbe1-9ae3-49ca-9429-d7dc411d8c21');
|
||
INSERT INTO vendors_categories VALUES(13362,'52113eb1-803d-45dd-9652-e8b5016f0097','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13363,'7abeec21-487e-4178-ba32-fadc32b10cae','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13364,'7abeec21-487e-4178-ba32-fadc32b10cae','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13365,'554b7040-2dbc-4a37-9f13-bd2dfc8f80e2','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13366,'554b7040-2dbc-4a37-9f13-bd2dfc8f80e2','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13367,'728c89bf-9803-4bd2-ae62-1e58d129b257','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13368,'728c89bf-9803-4bd2-ae62-1e58d129b257','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13369,'bd2f4ab3-abf8-470f-820f-e8abf181ae1e','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13370,'bd2f4ab3-abf8-470f-820f-e8abf181ae1e','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13371,'bb5852fc-dbc2-4228-959c-c1a4e989a59a','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13372,'bb5852fc-dbc2-4228-959c-c1a4e989a59a','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13373,'bb5852fc-dbc2-4228-959c-c1a4e989a59a','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13374,'a14698f1-ca1c-45fd-bd4f-77d57dc57fbc','b3af12b9-6d74-4892-b6b2-d6be6973b754');
|
||
INSERT INTO vendors_categories VALUES(13375,'a14698f1-ca1c-45fd-bd4f-77d57dc57fbc','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13376,'00e124ba-3481-4e20-99bf-20cbd02c3f96','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13377,'00e124ba-3481-4e20-99bf-20cbd02c3f96','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(13378,'6c150cf8-bf45-4f40-b935-57e10cc7eea4','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13379,'d119e40d-c6eb-4ef8-a339-591086bd8d4f','72796e85-1867-4cfc-88a0-df793f73d5b9');
|
||
INSERT INTO vendors_categories VALUES(13380,'d119e40d-c6eb-4ef8-a339-591086bd8d4f','cdf3c28b-66d2-4930-9b73-5ceee80c6c02');
|
||
INSERT INTO vendors_categories VALUES(13381,'090bd8bc-ef55-4303-8a1c-9af365b56f95','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13382,'090bd8bc-ef55-4303-8a1c-9af365b56f95','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(13383,'c6434536-96b8-44e3-b0f5-18d3fa48b43e','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13384,'c6434536-96b8-44e3-b0f5-18d3fa48b43e','6c2c1fdb-6fc7-4eba-84db-3f2a409b87ca');
|
||
INSERT INTO vendors_categories VALUES(13385,'0a53c20c-882c-492d-94a6-e695025f41e6','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13386,'4b805bb4-b4fe-4f69-85fb-4eccdf1afa24','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
INSERT INTO vendors_categories VALUES(13387,'4b805bb4-b4fe-4f69-85fb-4eccdf1afa24','0e0bef5f-fd6d-4073-94b9-c78ba2a51a0c');
|
||
INSERT INTO vendors_categories VALUES(13397,'09720abc-e5a5-4471-84e7-09cbccd2b35b','c32ea502-42ae-47f1-b3aa-807c40cd974d');
|
||
INSERT INTO vendors_categories VALUES(13398,'7b5e7d1a-9464-476c-acb0-5d630a2baab3','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13399,'7b5e7d1a-9464-476c-acb0-5d630a2baab3','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13400,'1a55773c-6140-4ba8-96ab-7b8fb21cb26b','a75af97a-d43c-45bb-83e6-0ab861279c7f');
|
||
INSERT INTO vendors_categories VALUES(13401,'1a55773c-6140-4ba8-96ab-7b8fb21cb26b','b757e288-ff99-4aaa-8597-68ab4e442421');
|
||
INSERT INTO vendors_categories VALUES(13402,'76676f39-1fef-41fa-8714-f37bc7a74f9b','1289bd9f-a0c1-4444-a1c0-b6ad89edcf02');
|
||
CREATE TABLE `globals` (`id` char(36) not null, `site_name` varchar(255) null, `meta_title` varchar(255) null, `meta_description` varchar(255) null, `copyright` varchar(255) null, primary key (`id`));
|
||
INSERT INTO globals VALUES('4f8d9e66-ec95-4bdd-a5e7-34df8ea68a45','PCA Pijac','PCA Pijac','Tha bEST pijac evar majkemi!','© 2003 PCA Pijac. All Rights Reversed');
|
||
CREATE TABLE `menus` (`id` varchar(255) not null, primary key (`id`));
|
||
INSERT INTO menus VALUES('MAIN_MENU');
|
||
INSERT INTO menus VALUES('FOOTER_MENU');
|
||
CREATE TABLE `menu_items` (`id` char(36) not null, `sort` integer null, `url` varchar(255) null, `label` varchar(255) null, primary key (`id`));
|
||
INSERT INTO menu_items VALUES('35ce29b2-bf57-49ec-9f44-4d978f9cb832',NULL,'/','Home');
|
||
INSERT INTO menu_items VALUES('95634276-8332-49c7-a794-4f1d92400a1b',NULL,'/vendors','Vendors');
|
||
INSERT INTO menu_items VALUES('ec47e07a-6442-4e94-bbc4-d6432634f5c3',NULL,'/about-us','About Us');
|
||
INSERT INTO menu_items VALUES('bd58efd2-caa9-42d9-b967-ca1a951e630b',NULL,'/privacy-policy','Privacy Policy');
|
||
CREATE TABLE IF NOT EXISTS "menus_menu_items" (`id` integer PRIMARY KEY AUTOINCREMENT NOT NULL, `menus_id` varchar(255) NULL, `menu_items_id` char(36) NULL, `sort` integer NULL, CONSTRAINT `menus_menu_items_menu_items_id_foreign` FOREIGN KEY (`menu_items_id`) REFERENCES `menu_items` (`id`) ON DELETE SET NULL, CONSTRAINT `menus_menu_items_menus_id_foreign` FOREIGN KEY (`menus_id`) REFERENCES `menus` (`id`) ON DELETE SET NULL);
|
||
INSERT INTO menus_menu_items VALUES(1,'MAIN_MENU','35ce29b2-bf57-49ec-9f44-4d978f9cb832',1);
|
||
INSERT INTO menus_menu_items VALUES(2,'MAIN_MENU','95634276-8332-49c7-a794-4f1d92400a1b',2);
|
||
INSERT INTO menus_menu_items VALUES(3,'MAIN_MENU','ec47e07a-6442-4e94-bbc4-d6432634f5c3',3);
|
||
INSERT INTO menus_menu_items VALUES(4,'FOOTER_MENU','35ce29b2-bf57-49ec-9f44-4d978f9cb832',1);
|
||
INSERT INTO menus_menu_items VALUES(5,'FOOTER_MENU','95634276-8332-49c7-a794-4f1d92400a1b',2);
|
||
INSERT INTO menus_menu_items VALUES(6,'FOOTER_MENU','bd58efd2-caa9-42d9-b967-ca1a951e630b',3);
|
||
CREATE TABLE IF NOT EXISTS "vendors" (`id` char(36) NOT NULL, `status` varchar(255) NOT NULL DEFAULT 'draft', `slug` varchar(255) NULL DEFAULT null, `name` varchar(255) NULL, `website` varchar(255) NULL, `description` text NULL, `address_line_1` varchar(255) NULL, `address_line_2` varchar(255) NULL, `city` varchar(255) NULL, `state` varchar(255) NULL, `country` varchar(255) NULL, `logo` char(36) NULL, `long_description` text null default null, `facebook` varchar(255) null, `twitter` varchar(255) null, `linkedin` varchar(255) null, `external_id` varchar(255) null, PRIMARY KEY (`id`), CONSTRAINT `vendors_logo_foreign` FOREIGN KEY (`logo`) REFERENCES `directus_files` (`id`) ON DELETE SET NULL);
|
||
INSERT INTO vendors VALUES('b8b4902f-5f81-4e32-8178-9399b046a836','published','check-point','Check Point','https://www.checkpoint.com/','Check Point is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity´s portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. ','959 Skyway Road','Suite 300','San Carlos','CA','USA','af4cb774-372a-45a6-a949-599fadaa0945',replace('<h5>Check Point</h5>\n<p>\nCheck Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. <br>\n</p>\n<h5>Why Check Point?</h5>\n<p>Check Point Infinity´s portfolio of solutions protects enterprises and public organisations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management; Check Point Horizon, a prevention-first security operations suite.</p>','\n',char(10)),'https://www.facebook.com/checkpointsoftware','https://www.twitter.com/checkpointsw','https://www.linkedin.com/company/check-point-software-technologies','');
|
||
INSERT INTO vendors VALUES('4d2170be-cd10-4bfa-a676-5bff626de6f7','published','safe-security','Safe Security','https://www.safe.security/','SAFE aggregates signals across your enterprises attack surfaces in real-time, and using our proprietary algorithms, we empower security leaders to make data-driven decisions, justify cybersecurity ROI, and discuss cyber risk precisely with the Board.','3000 El Camino Real ','Building 4','Palo Alto','CA','USA','ac5e16c8-fb3d-417c-9f25-01a2ffde1fc0',replace('<h5>Safe Security</h5>\n<p>\nSafe Security is a leader in cyber risk quantification. Headquartered in Palo Alto and established in 2012, Safe launched its cyber risk quantification and management (CRQM) platform in 2018, designed as joint research with MIT. Safe has enabled multiple Fortune 500 to measure, manage, and transfer their cyber risks in real time.\nSafe’s mission is to become the global de-facto choice for cyber risk quantification by 2025, and create a safer digital future for everyone. Using the SAFE Platform, businesses gain dynamic risk visibility across the enterprise – workforce, processes, policies, technologies, and supply chains. It enables effective cyber risk communication between lines of defense by establishing a consistent metric: the potential financial impact of the business’ current cyber risk and exposures. It empowers security and risk management leadership to build an objective, risk-informed, end-to-end cybersecurity strategy and promotes accountable cyber risk reporting.<br>\n</p>\n<h5>Why Safe Security?</h5>\n<p>SAFE\nSAFE is a cyber risk quantification and management (CRQM) platform. Using its AI-powered data science-backed engine (co-developed with MIT) it automatically collects API telemetry from cybersecurity services and products and generates a SAFE Score, that gives the potential financial impact of successful breaches, and prioritized remediation plans on how to manage or transfer the risk. SAFE enables cybersecurity leaders to comply with global guidelines while maintaining a state-of-the-art cyber value-at-risk framework.\nSafe Inside\nLeveraging SAFE’s CRQ capabilities, Safe Inside Insurance enables next-gen underwriting. Using Safe Inside, brokers and agents can advocate exactly what a business needs to change to secure a lower premium rate. At the same time, real-time cyber risk exposure visibility converted into the potential financial impact enables a better-informed decision making process for insurers and businesses.</p>','\n',char(10)),NULL,'https://www.twitter.com/SafeCRQ','https://www.linkedin.com/company/safecrq','');
|
||
INSERT INTO vendors VALUES('ab5df402-9f1d-4e69-b5fd-28319895e67c','published','cyble','Cyble','https://cyble.com/','Cyble (YC W21) is a leading global cyber intelligence firm that helps organizations manage cyber risks by utilizing patent-pending AI-powered threat intelligence with a focus on gathering intelligence from the deep, dark, and surface web.','11175 Cicero Drive ','Suite 100','Alpharetta','GA','USA','59130a73-e01e-4f37-86cb-a7013faf92d8',replace('<h5>Cyble</h5>\n<p>\nCyble is an Atlanta-based, Y Combinator backed, Cyber Threat Intelligence (CTI) and Digital Risk Protection and Mitigation firm providing intelligence-driven visibility & remediation across the surface, deep, and dark web. Cyble''s unified and intuitive dashboard offers 6 capabilities, namely Darkweb and Cybercrime Monitoring, Cyber Threat Intelligence, Attack Surface Management, Third-party Risk scoring, Brand Monitoring, and Social Media Monitoring.\nCyble’s flagship SaaS platform – CYBLE VISION. The platform equips businesses with early-warning actionable threat intelligence to understand their attack surface and digital risks and prioritize their mitigation before they cause an impact.\nCyble has also been recognized by Forbes as one of the top 20 Best Cybersecurity Start-ups To Watch In 2020. Headquartered in Alpharetta, Georgia, Cyble now has a global presence, with offices in Australia, Singapore, Dubai, and India.<br>\n</p>\n<h5>Why Cyble?</h5>\n<p>STAY AHEAD OF CYBER THREATS WITH CYBLE\nEarly Warning System: Identify Before They Strike Your first line of defense against the unknown.\nGain a single pane of truth and end-to-end visibility across the external threat landscape by using our proprietary Cyble Vision platform. Our platform offers Dark Web Monitoring, Cybercrime Monitoring, Attack Surface Exposure, Brand Monitoring, Threat Intelligence, and Third-Party (Supply Chain) Risk Monitoring.\nOur world-class data engineering capabilities enable us to quickly ingest, normalize, and enrich data\nusing AI/ML and NLP technologies. We can disseminate the data via the web and API, all within two minutes.\n- 6 Unique Use cases\n- >40 + Alert types across 6 use cases\n- > 5000 + Darknet Marketplaces & Apps Monitored\n- 200+ Sensors Deployed Across 35 Countries - AI/ ML - Our NLP models currently support the English and Russian languages and will soon include Arabic and Mandarin.\n- 15Bn+ Web Pages Analyzed Daily\n</p>','\n',char(10)),'https://www.facebook.com/cybleau/','https://www.twitter.com/AuCyble','https://www.linkedin.com/company/cyble-global/','');
|
||
INSERT INTO vendors VALUES('36faefb8-015c-4af0-b202-5fec62536ea9','published','beyond-identity','Beyond Identity','www.beyondidentity.com','Beyond Identity is the only zero trust authentication FIDO2-certified technology providing multi-factor, continuous authentication, delivering a passwordless, frictionless user experience that prevents security breaches and delights users.','3 Park Avenue ','41st Floor ','New York ','NY','USA','c126a41f-a938-4996-8dbc-e5b5a4cf4a50',replace('<h5>Beyond Identity </h5>\n<p>\nBeyond Identity is revolutionizing digital access for organizations looking to improve protection against cyber attacks and deliver the highest levels of security for their workforces, customers and developers. Its suite of passwordless, phishing-resistant, and zero trust authentication solutions improves security and user experience. The platform delivers continuous risk-based authentication incorporating signals from the zero trust ecosystem to ensure only valid users and secure devices gain or maintain access to critical resources. Companies like Snowflake, Unqork, and Roblox rely on Beyond Identity’s highly available cloud-native platform to thwart attacks and advance their zero trust strategies. To learn more about Beyond Identity’s FIDO-2 certified multi-factor authentication (MFA) solutions, visit beyondidentity.com and stay connected with us on Twitter, LinkedIn, and YouTube.<br>\n</p>\n<h5>Why Beyond Identity ?</h5>\n<p>Secure Workforce:\nBeyond Identity prevents credential-based breaches by eliminating the single largest sources of cyber attacks and ransomware – passwords and first generation MFA bypass. By incorporating technology based on the principles of zero trust, we deliver robust MFA that eliminates passwords, ensures continuous device integrity, and delivers secure and efficient authentication for your extended workforce, contractors, consultants, agents and 3rd parties.\nSecure Customer:\nBeyond Identity provides frictionless and secure user experience for your customers and prevents account takeover fraud by eliminating passwords that stifle registration and transaction efficiency. With a Universal Passkey Architecture, we enable you to deliver phishing resistant MFA with no extra steps for customers and enforce risk-based access controls across any application, device, and platform. Leaders like Intuit, Snowflake, and Roblox rely on Beyond Identity to automate secure access.</p>','\n',char(10)),NULL,'https://www.twitter.com/beyondidentity','https://www.linkedin.com/company/beyond-identity-inc','');
|
||
INSERT INTO vendors VALUES('4e246a6d-253e-4d1d-8f5e-f30f58d930cd','published','blumira','Blumira','blumira.com','Blumira''s SIEM + Detection and Response helps stop breaches and ransomware, making cybersecurity easy and effective for small and medium teams. Meet compliance, save time on security tasks, and focus on real threats. Try it free at www.blumira.com','206 E Huron Street ','Suite 106','Ann Arbor','MI','USA','fc8dd003-a836-456b-ac18-1f30106117eb',replace('<h5>Blumira</h5>\n<p>\nBlumira makes security easy and effective for SMBs and mid-market companies, helping them detect and respond to cybersecurity threats faster to stop breaches and ransomware with our SIEM + Detection and Response. Meet compliance, save time on security tasks, and focus on real threats with Blumira. Try it free at blumira.com<br>\n</p>\n<h5>Why Blumira?</h5>\n<p>Blumira’s cloud SIEM + Detection and Response platform offers both automated threat detection and response, enabling small to midmarket companies to more efficiently defend against cybersecurity threats in near real-time. It eases the burden of alert fatigue, complexity of log management and lack of IT visibility.\nBlumira''s platform can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Azure, Office 365, G Suite, Crowdstrike, Okta, Palo Alto, Cisco FTD and currently over 70 others.</p>','\n',char(10)),'https://www.facebook.com/blumira/','https://www.twitter.com/blumirasec','https://www.linkedin.com/company/blumira/','');
|
||
INSERT INTO vendors VALUES('ae17a255-0455-4e34-9416-bde50359b1c1','published','brinqa','Brinqa','www.brinqa.com','Brinqa provides the only attack surface intelligence platform that orchestrates the entire cyber-risk lifecycle by understanding the attack surface, prioritizing vulnerabilities, automating remediation, and monitoring cyber hygiene across platforms. ','3700 N Capital of TX Hwy','Suite 350','Austin','TX','USA','73a12f66-f2dd-479b-9bed-0451274e5106',replace('<h5>Brinqa</h5>\n<p>\nBrinqa provides the only attack surface intelligence platform that orchestrates the entire cyber-risk lifecycle — understanding the attack surface, prioritizing vulnerabilities, automating remediation, and continuously monitoring cyber hygiene — across all security programs. Brinqa Attack Surface Intelligence Platform is your single source of truth for cyber risk. It empowers organizations to elevate the security conversation across the business, hold risk owners accountable for fixing critical issues, and to manage and track all vulnerabilities in a single platform.<br>\n</p>\n<h5>Why Brinqa?</h5>\n<p>Brinqa Attack Surface Intelligence Platform is a SaaS-based solution for orchestrating the entire cyber risk lifecycle that is the single source of truth for understanding your cyber assets and their vulnerabilities; quantifying, prioritizing, and communicating the risk they pose to your business; automating the reduction of threats across all your security programs - vulnerability management, AppSec, cloud security.\nOrchestrates the entire cyber risk lifecycle- asset inventory, risk prioritization, automated remediation, and security hygiene\ncreates a living model of your entire attack surface\nDeliver a configurable risk-scoring model that understands your organization through comprehensive context\nAutomatically assigns tickets to the right owners in their own tools, groups vulnerabilities in tickets to increase efficiency, and validates fixes\ncommunicate risk and security gaps in business terms via comprehensive cyber-hygiene dashboards and reports that span all security programs</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/brinqa/','');
|
||
INSERT INTO vendors VALUES('9d42c6c3-8916-485a-b2a8-c5e8ee0aca36','published','blackberry','BlackBerry','https://www.blackberry.com/us/en','BlackBerry is a global leader in endpoint security, endpoint management, encryption and embedded systems. With our Cylance® AI and ML technology, we defend your business against current and future cyberthreats by combining network and endpoint telemetry and by delivering innovative solutions in the areas of cybersecurity, safety, and data privacy.','3001 Bishop Drive',NULL,'San Ramon','CA','USA','6dbf0afa-cca8-4d95-95e2-d19e974b0fc3',replace('<h5>BlackBerry</h5>\n<p>\nBlackBerry provides intelligent security software and services to enterprises and governments around the world. The company secures more than 500M endpoints including over 215M vehicles. Based in Waterloo, Ontario, the company leverages AI and machine learning to deliver innovative solutions in the areas of cybersecurity, safety, and data privacy solutions, and is a leader in the areas of endpoint security, endpoint management, encryption, and embedded systems. BlackBerry''s vision is clear - to secure a connected future you can trust.\n<br>\n</p>\n<h5>Why BlackBerry?</h5>\n<p>Protect your organization with modern endpoint and network security by BlackBerry. Our end-to-end approach is deeply rooted in Cylance® AI and machine learning, providing enhanced visibility and protection against current and future cyberthreats. The Cylance® Endpoint Security portfolio includes:\n• CylancePROTECT® AI-based EPP – Prevents breaches and provides added controls to ward off sophisticated cyberthreats even without human intervention.\n• CylanceOPTICS® AI-driven EDR – Works with CylancePROTECT to stay ahead of cyberattacks and keep organizations secure.\n• CylanceGATEWAY™ AI-driven ZTNA – Protects systems and data while providing easy access to SaaS and on-premises apps for hybrid workforces.\n• CylanceGUARD® subscription-based MDR cybersecurity service – Leverages AI and 24x7x365 support by world-class incident response and prevention experts.</p>','\n',char(10)),'https://www.facebook.com/BlackBerry/','https://www.twitter.com/blackberry','https://www.linkedin.com/company/blackberry','');
|
||
INSERT INTO vendors VALUES('d6ad7044-c46b-4fcf-b299-cc0b9a687fbf','published','bigid-inc','BigID, Inc.','bigid.com','BigID is a leader in data security, privacy, compliance, and governance: enabling organizations to proactively discover, manage, protect, and get more value from their data in a single platform for data visibility and control. ','641 6th Avenue ','5th Floor','New York','NY','USA','80b8dba5-0a3b-49ca-b427-7c9d1ceca10f',replace('<h5>BigID, Inc.</h5>\n<p>\nBigID is a leader in data security, privacy, compliance, and governance: enabling organizations to proactively discover, manage, protect, and get more value from their data in a single platform for data visibility and control. <br>\n</p>\n<h5>Why BigID, Inc.?</h5>\n<p>BigID’s data intelligence platform consists of a discovery-in-depth foundation and an extensible app framework with a series of apps to take action.\n*Data Discovery Foundation. The core foundation of data discovery that combines the best of modern ML-based cataloging, classification, cluster analysis and correlation. Discover, identify, and classify all of your data, everywhere - with BigID’s patented Discovery-in-Depth technology.\n*Privacy Apps: DSR Automation; RoPA Data Mapping; Consent Governance App; Privacy Portal; PIA\n*Security Apps: Remediation; Access Intelligence App; Labelling; Breach Data; Data Risk; Data Retention\n*Governance Apps: Data Quality; Data Stewardship; Retention Management; Metadata Exchange Apps\n</p>','\n',char(10)),'https://www.linkedin.com/company/bigid','https://www.twitter.com/bigidsecure','https://www.facebook.com/bigidsecure','');
|
||
INSERT INTO vendors VALUES('6a181935-649b-4824-975f-ae7c5a1b6b1d','published','bionic','Bionic','https://bionic.ai/','Bionic is an Application Security Posture Management (ASPM) company that provides unique visibility into the security, data privacy, and operational risk of applications running in production at scale.','2345 Yale Street',NULL,'Palo Alto','CA','USA','9dc79546-40f9-416c-a63e-3ebc43d37495',replace('<h5>Bionic</h5>\n<p>\nBionic is an Application Security Posture Management (ASPM) company that provides security, DevOps, and engineering teams with unique visibility into the security, data privacy, and operational risk of applications running in production at scale. The Bionic platform operates continuously and in real-time at the speed of CI/CD so that no application change, drift, or risk goes unnoticed. Bionic is the only solution that provides customers – including Aston Martin, Chipotle, Freddie Mac, JLL, and Inspire Brands – with a complete security posture of their applications, services, dependencies, APIs, and data flows within hybrid cloud environments.\nFounded in 2019, Bionic has raised $83 million in funding from Insight Partners, Cyberstarts, and Battery Ventures. The company is headquartered in Palo Alto, California. <br>\n</p>\n<h5>Why Bionic?</h5>\n<p>Bionic proactively reduces security, data privacy, and operational risk by continuously analyzing the entire architecture of applications as they evolve and change in production. Unlike cloud security posture offerings, Bionic provides deep visibility into the application layer to help organizations manage the risk of their services, APIs, dependencies, and data flows in production. Bionic is uniquely differentiated with: • Real-Time Application Architecture Maps • Contextualized Threat Detection • Comprehensive Business Risk Scoring • Automated DevSecOps Workflows</p>','\n',char(10)),'https://www.facebook.com/bionicai/','https://www.twitter.com/bionicai','https://www.linkedin.com/company/bionicai/','');
|
||
INSERT INTO vendors VALUES('946a9d67-f007-4dee-98af-8e3a21ea0337','published','brivo','Brivo','https://resources.brivo.com/','Brivo, Inc., is the global leader in mobile, cloud-based access management and smart spaces platforms for commercial real estate, multifamily residential and large distributed enterprises. Learn more at www.Brivo.com ','7700 Old Georgetown Road ','Suite 300','Bethesda','MD','USA','d2eab1b7-bdcd-456b-9173-2c74f194925d',replace('<h5>Brivo</h5>\n<p>\nBrivo, Inc., created the cloud-based access control and smart spaces technology category over 20 years ago and remains the global leader serving commercial real estate, multifamily residential and large distributed enterprises. The company''s comprehensive product ecosystem and open API provide businesses with powerful digital tools to increase security automation, elevate employee and tenant experience, and improve the safety of all people and assets in the built environment. Brivo''s building access platform is now the digital foundation for the largest collection of customer facilities in the world, protecting over 450 million square feet of real estate across 60 countries. Learn more at www.Brivo.com <br>\n</p>','\n',char(10)),'https://www.facebook.com/BrivoInc/','https://www.twitter.com/brivoinc','https://www.linkedin.com/company/brivo-inc','');
|
||
INSERT INTO vendors VALUES('caf4a95f-27ba-4459-ad82-198c0bba0b3a','published','binary-defense','Binary Defense','https://www.binarydefense.com/','Binary Defense is a managed detection and response provider and software developer with a Managed Open XDR model covering endpoint, network, cloud, and other log sources to supply high-fidelity threat detections. ','600 Alpha Pkwy',NULL,'Stow','OH','USA','161e78af-7ea9-428d-98af-6ce1729be3d4',replace('<h5>Binary Defense</h5>\n<p>\nBinary Defense is a managed detection and response provider and software developer with a Managed Open XDR model covering endpoint, network, cloud, and other log sources to supply high-fidelity threat detections. When paired with its advanced Threat Hunting, Digital Risk Protection, and Incident Response services, the company offers a comprehensive enterprise defense portfolio. Binary Defense demonstrates conclusive proof of superior capabilities in detecting intruder activity and this rapid detection combined with expert analysis and response decreases cyber risk for businesses.<br>\n</p>','\n',char(10)),'https://www.facebook.com/binarydefensesystems','https://www.twitter.com/Binary_Defense','https://www.linkedin.com/company/binary-defense/','');
|
||
INSERT INTO vendors VALUES('ff946759-ac4b-4e84-a0c1-c533628853e7','published','bugcrowd','Bugcrowd','www.bugcrowd.com','Bugcrowd is the leading provider of crowdsourced cybersecurity solutions purpose-built to secure the digitally connected world. See Security Differently™ at Bugcrowd.com','921 Front Street','First Floor','San Francisco','CA','USA','e90a429b-f5d3-41f1-a027-1d4614bb9010',replace('<h5>Bugcrowd</h5>\n<p>\nBugcrowd is the leading provider of crowdsourced cybersecurity solutions purpose-built to secure the digitally connected world. Today’s enterprise demands a proactive approach to cybersecurity—and Bugcrowd offers the only solution that orchestrates data, technology, and human intelligence to expose blind spots.\nThe Bugcrowd Security Knowledge Platform™ enables businesses to do everything proactively possible to protect their organization, reputation, and customers with products like Bug Bounty, Pen Testing-as-a-Service, and more.\nBased in San Francisco, Bugcrowd is backed by Blackbird Ventures, Costanoa Ventures, Industry Ventures, Paladin Capital Group, Rally Ventures, Salesforce Ventures, and Triangle Peak Partners. See Security Differently™ at Bugcrowd.com\n<br>\n</p>\n<h5>Why Bugcrowd?</h5>\n<p>Bugcrowd is the leading provider of crowdsourced cybersecurity solutions purpose-built to secure the digitally connected world. Today’s enterprise demands an offensive approach to cybersecurity—and Bugcrowd offers the only solution that orchestrates data, technology, and human intelligence to expose blind spots. The Bugcrowd Security Knowledge Platform™ enables businesses to do everything proactively possible to protect their organization, reputation, and customers with products like Bug Bounty, Penetration Testing-as-a-Service, and more. Trusted by organizations across the globe, Bugcrowd uncovers and remediates vulnerabilities before they interrupt business by leveraging expert ingenuity and the knowledge of world-class security researchers.</p>','\n',char(10)),'https://www.facebook.com/Bugcrowd','https://www.twitter.com/Bugcrowd','https://www.linkedin.com/company/bugcrowd','');
|
||
INSERT INTO vendors VALUES('eb4efa04-2af1-487e-a47f-60a62f49823c','published','bitsight-technologies','BitSight Technologies','www.bitsight.com','BitSight transforms how companies manage cyber risk, performance, and exposure. Global enterprises rely on Bitsight’s actionable insights to protect their business, communicate with business leaders, and engage confidently in the digital economy.','111 Huntington Ave ','Ste 2010','Boston','MA','USA','bf0f9d8b-3c6b-49be-b732-a786e8aa847e',replace('<h5>BitSight Technologies</h5>\n<p>\nBitSight, a global cyber risk leader, transforms how companies manage cyber risk, performance, and exposure for themselves and their third parties. Global enterprises rely on BitSight to protect their organization by making it possible to set standards, manage to those standards, and report on the results across their company and with business partners.\nBitSight’s applications are built on over a decade of technological innovation and trusted, high-quality data. With the largest ecosystem of users and information globally, BitSight delivers a patented, universal risk standard that provides actionable insights to manage internal security performance, mitigate third-party risk, underwrite cyber insurance, and conduct cyber due diligence.\nBitSight is on a mission to free the global economy from the material impact of cyber incidents, empowering companies to make better cyber risk decisions and grow confidently in the digital economy. For more information, please visit www.BitSight.com.<br>\n</p>\n<h5>Why BitSight Technologies?</h5>\n<p>BitSight, a global cyber risk leader, transforms how companies manage cyber risk, performance, and exposure. Global enterprises rely on BitSight to protect their organization by making it possible to set and manage to standards for their company and external third parties, as well as report on the results across their enterprise.\nBitSight’s applications are built on over a decade of technological innovation and trusted, high-quality data. With the largest ecosystem of users and information globally, BitSight delivers a patented, universal risk standard that provides actionable insights to manage internal security performance, mitigate third-party risk, underwrite cyber insurance, and conduct cyber due diligence.\nBitSight is on a mission to free the global economy from the material impact of cyber incidents, empowering companies to make better cyber risk decisions and grow confidently in the digital economy. </p>','\n',char(10)),'https://www.facebook.com/BitSight','https://www.twitter.com/BitSight','https://www.linkedin.com/company/3138753/admin/','');
|
||
INSERT INTO vendors VALUES('6178dde1-c4fe-42de-8c98-e3a02fb02df8','published','gitlab','GitLab','http://www.about.gitlab.com','GitLab is the most comprehensive DevSecOps platform for software innovation. GitLab empowers customers and users to innovate faster, scale more easily, and serve and retain customers more effectively. ','268 Bush Street #350',NULL,'San Francisco ','CA','USA','a6934e77-fa94-44d0-9af5-86ea310e2d43',replace('<h5>GitLab</h5>\n<p>\nGitLab is the most comprehensive DevSecOps platform for software innovation. As the DevSecOps Platform, GitLab provides one interface, one data store, one permissions model, one value stream, one set of reports, one spot to secure your code, one location to deploy to any cloud, and one place for everyone to contribute. The platform is the only true cloud-agnostic end-to-end DevOps platform that brings together all DevOps capabilities in one place.\nWith GitLab, organizations can create, deliver, and manage code quickly and continuously to translate business vision into reality. GitLab empowers customers and users to innovate faster, scale more easily, and serve and retain customers more effectively. Built on Open Source, GitLab works alongside its growing community, which is composed of thousands of developers and millions of users, to continuously deliver new DevOps innovations.<br>\n</p>\n<h5>Why GitLab?</h5>\n<p>GitLab is a DevSecOps platform designed to help create secure code throughout the entire software development lifecycle, not just a single point within that lifecycle. GitLab starts with securing the software supply chain through software composition analysis, SBOM generation, and license compliance scanning. GitLab helps developers create more secure code by quickly identifying security issues and by giving guidance on how to fix those issues. GitLab includes a wide breadth of tools to identify vulnerabilities including SAST, DAST, IaC scanning, dependency scanning, container scanning, fuzz testing, secret detection, and API security analyzers. GitLab provides governance to software development by enforcing compliance with policy management and compliant workflow automation. Finally, GitLab provides end-to-end visibility for management reporting and to simplify audits. GitLab can do all of this while easily integrating with other tools within an organization''s toolchain.</p>','\n',char(10)),'https://www.facebook.com/gitlab/','https://www.twitter.com/gitlab/','https://www.linkedin.com/company/gitlab-com/','');
|
||
INSERT INTO vendors VALUES('e67819a8-5041-4162-986f-ee42d5a6d8fa','published','gigamon','Gigamon','www.gigamon.com','Gigamon, the leading deep observability company, extends the value of cloud, security, and observability tools by harnessing actionable network-level intelligence to shift users to a proactive security/compliance posture and lower their risk profile.','3300 Olcott Street',NULL,'Santa Clara','CA','USA','7e95989d-6dac-4f0c-a306-7db60da302cd',replace('<h5>Gigamon</h5>\n<p>\nGigamon offers a deep observability pipeline that harnesses actionable real-time network-level intelligence to amplify the power of metric, event, log and trace-based monitoring and observability tools – mitigating security risk, delivering a superior user experience, and reducing operational complexity. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures. The result: modern enterprises realize the full transformational promise of the cloud while creating a proactive security and compliance posture. Gigamon serves more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, nine of the 10 largest mobile network providers, and hundreds of governments and educational organizations worldwide. To learn more, please visit gigamon.com. <br>\n</p>\n<h5>Why Gigamon?</h5>\n<p>It’s not easy to monitor and secure a hybrid infrastructure that is constantly changing. Installing tool agents to bring back data becomes a never-ending, often manual task.\nWith Gigamon, you can:\n• Give your tools visibility to all data-in-motion, from datacenters, public clouds, and even containers.\n• Decrypt encrypted traffic while staying compliant.\n• Eliminate irrelevant data that’s overloading monitoring and security tools to reduce traffic by over 50 percent, without losing data fidelity.\n• Avoid new tools spend and extend the life of your current tools by streamlining traffic and making slow old tools work on today’s faster networks.\n• Identify 3,500+ applications and filter application traffic to reduce load on tools.\n• Extend your security stack to cloud workloads.\n• Detect crypto mining in your cloud by leveraging your observability/APM tools to find them, whether on managed or unmanaged hosts.\nTo see more, please visit https://www.gigamon.com/lp/gigamon-tour.html.</p>','\n',char(10)),'https://www.facebook.com/gigamon/','https://www.twitter.com/gigamon','https://www.linkedin.com/company/gigamon/','');
|
||
INSERT INTO vendors VALUES('59dae7ae-67f3-4d35-add3-fae8c8c7f688','published','gmi','GMI','www.gmi.com','GMI delivers secure technology services. Our specialized team improves posture through professional and secure end-to-end lifecycle management services. Experts in security, wireless, UC, Azure and MS 365, help desk, XDR, and more.','4657 E. Cotton Gin Loop ','Suite 101','Phoenix','AZ','USA','679b26cb-bc2b-423c-8dce-7f5f9dbf9b98',replace('<h5>GMI</h5>\n<p>\nGMI delivers secure technology services. Our specialized team improves posture through professional and secure end-to-end lifecycle management services. Experts in security, wireless, UC, Azure and MS 365, help desk, XDR, and more.\nGMI is also the OG pioneer of the Secure MSP™. This game-changing solution offers IT management with fully integrated security service in a single, comprehensive package.\nA minority and woman-owned business, GMI is proud to be a certified diversity supplier.\nLearn more at https://gmi.com/<br>\n</p>\n<h5>Why GMI?</h5>\n<p>SECURE TECHNOLOGY SOLUTIONS\nNow more than ever, technology must be secure. Yet rarely is it approached this way. We’re changing that. Not just technology or security experts, we’re both. Savvy in security, network, collaboration, and cloud, we uniquely integrate technology smarts with security best practice, so customers thrive without taking on unnecessary or inadvertent risk. From managed and professional services to procurement to technology optimization, we’re the ally organizations seek to be not just more productive, but secure.\n"Working with GMI has greatly improved our security posture. Their approach was focused on us, not a particular cybersecurity solution. Their recommendations were spot-on and their partnership in reconfiguring our systems and processes elevated not only our information security, but also our team."\nChris Armstrong, CISO</p>','\n',char(10)),NULL,'https://www.twitter.com/GMITechnology','https://www.linkedin.com/company/globalmarketinnovators','');
|
||
INSERT INTO vendors VALUES('a763b4b2-68ef-4232-8a3f-224c3692fdbf','published','yubico','Yubico','www.yubico.com',replace('As the inventor of the YubiKey, Yubico makes secure login easy with phishing-resistant MFA. Yubico is setting global standards for secure access to computers, mobile devices, and more, and is a creator and core contributor to the FIDO2, WebAuthn, and FIDO U2F, and open authentication standards. \n','\n',char(10)),'5201 Great America Parkway ','#122','Santa Clara','CA','USA','d815d0e1-bb97-47f8-bfd5-adfce00cc596',replace('<h5>Yubico</h5>\n<p>\nAs the inventor of the YubiKey, Yubico makes secure login easy and available for everyone. The company has been a leader in setting global standards for secure access to computers, mobile devices, and more. Yubico is a creator and core contributor to the FIDO2, WebAuthn, and FIDO Universal 2nd Factor (U2F), and open authentication standards.\nYubiKeys are the gold standard for phishing-resistant multi-factor authentication (MFA), enabling a single device to work across hundreds of consumer and enterprise applications and services.\nYubico is privately held, with a presence around the globe. For more information, please visit: www.yubico.com.<br>\n</p>\n<h5>Why Yubico?</h5>\n<p>YubiEnterprise Subscription program offers enterprise customers lower cost and value to entry, flexibility, faster rollout and seamless distribution. As cyberattacks continue to escalate at an alarming rate, Yubico strives to offer the most impactful way to up-level enterprise security. By equipping organizations with the gold-standard of phishing-resistant, hardware-based authentication with the YubiKey, companies can better protect themselves, employees, and customers against malicious hackers.\nSuited for organizations with 500 users or more, enterprises can choose from two subscription plans: Plus and Standard. Moving to a subscription-first model is a natural progression to ensure that companies are adopting easy to use and modern, phishing-resistant MFA at scale. </p>','\n',char(10)),'https://www.facebook.com/Yubikey','https://www.twitter.com/Yubico','https://www.linkedin.com/company/Yubico','');
|
||
INSERT INTO vendors VALUES('909fad59-867d-40c3-a955-5b8bd7c70966','published','graylog','Graylog','www.graylog.com',replace('Graylog is log management and Security Information Event Management (SIEM) done right. Graylog unlocks answers from data for thousands of IT and security professionals.\n\nFor more information, visit https://graylog.org\n','\n',char(10)),'1301 Fannin St.','Suite 2140','Houston','TX','USA','4f564128-b4c1-4a47-b15b-499b5058e7d4',replace('<h5>Graylog</h5>\n<p>\nGraylog is a leader in log management and Security Information Event Management (SIEM), making the world and its data more efficient and secure. Built by practitioners with the practitioner in mind, Graylog unlocks answers from data for thousands of IT and security professionals who solve security, compliance, operational, and DevOps issues every day. Deployed in more than 60,000 installations worldwide, Graylog is an award-winning platform built for speed and scale in capturing, storing, and enabling real-time analysis of terabytes of machine data. Graylog eliminates the noise and delivers an exceptional user experience by making data analysis, threat hunting, detection, and incident investigation fast and efficient using a more cost-effective and flexible architecture.<br>\n</p>','\n',char(10)),'https://www.facebook.com/graylog','https://www.twitter.com/graylog2','https://www.linkedin.com/company/graylog','');
|
||
INSERT INTO vendors VALUES('5d7445c0-b645-4eb0-8336-85aae48e466c','published','garner-products-inc','Garner Products, Inc.','www.garner-products.com','At Garner, we design, manufacture, and sell equipment that delivers complete, permanent, and verifiable data elimination. We provide solutions for permanent data security of working and nonworking hard drives, magnetic tape, and solid-state media','10620 Industrial Avenue ','Suite 100','Roseville','CA','USA','6b0191c3-8e4f-4022-a033-379b83c8f06e',replace('<h5>Garner Products, Inc.</h5>\n<p>\nAt Garner, we design, manufacture, and sell equipment that delivers complete, permanent, and verifiable data elimination. We provide solutions for permanent data security of working and nonworking hard drives, magnetic tape, and solid-state media<br>\n</p>','\n',char(10)),'https://www.facebook.com/GarnerProducts/',NULL,'https://www.linkedin.com/company/garner-products','');
|
||
INSERT INTO vendors VALUES('47e240b7-aed5-4fc8-ab07-eb8f29d7e30f','published','bsi-group-america-inc','BSI Group America Inc.','www.bsigroup.com/en-us','At BSI, we support organizations in improving resilience in the operations, supply chain, and information security domains. Our exclusive blend of consulting, knowledge, and assurance enables us to bring the optimum approach to our clients.','12950 Worldgate Dr.','Suite 800','Herndon','VA','USA','6126684d-e1b3-4546-a47e-257039b99a62',replace('<h5>BSI Group America Inc.</h5>\n<p>\nBSI is your business improvement partner. We have shaped best practices for over 100 years, helping organizations around the world embed excellence, build competence and capability for sustainable growth.<br>\n</p>\n<h5>Why BSI Group America Inc.?</h5>\n<p>BSI is your business improvement partner. We have shaped best practices for over 100 years, helping organizations around the world embed excellence, build competence, and capability for sustainable growth.</p>','\n',char(10)),'https://www.facebook.com/bsiamerica/','https://www.twitter.com/BSI_America','https://www.linkedin.com/company/bsi','');
|
||
INSERT INTO vendors VALUES('4f87709d-4dec-4569-bc3d-32bf06886d8e','published','it-security-association-germany-teletrust','IT Security Association Germany / TeleTrusT','https://www.teletrust.de/en/startseite/',replace('German Federal Ministry for Economic Affairs and Climate Action in cooperation with AUMA_Association of the German Trade Fair Industry and TeleTrusT – IT Security Association Germany.<br /><br />\nGermany participates with a German Pavilion offering a professional brokerage service to help to establish contacts with German companies and comprehensive information on Germany as an important business location. <br /><br />\nExplore abt. 25 companies from Germany!<br />\nasvin GmbH<br />\nAuconet Solutions GmbH<br />\nAWARE7 GmbH<br />\nBeta Systems Software AG<br />\nBundesdruckerei GmbH<br />\nDeutsche Gesellschaft für Cybersicherheit mbH & Co. KG<br />\nEBRAND AG<br />\nEnclaive GmbH<br />\nHornetsecurity GmbH<br />\nINFODAS GmbH<br />\nitWatch GmbH<br />\nLocateRisk GmbH<br />\nMaltego Technologies GmbH<br />\nMitigant by Resility<br />\nMTRIX GmbH<br />\neCom Service IT GmbH<br />\nONEKEY GmbH<br />\nROHDE & SCHWARZ GmbH & Co. KG<br />\nsecunet Security Networks AG<br />\nSoSafe GmbH<br />\nTenzir GmbH<br />\nTÜV Informationstechnik Gmbh<br />\nTWINSOFT biometrics GmbH & Co. KG<br /><br />\n\nFor more information visit: www.rsac.german-pavilion.com ','\n',char(10)),'Chausseestrasse 17',NULL,'Berlin',NULL,'DEU','fdcbdf80-887d-4730-a9b1-e732a2c49413',replace('<h5>IT Security Association Germany / TeleTrusT</h5>\n<p>\nGerman Federal Ministry for Economic Affairs and Climate Action in cooperation with AUMA_Association of the German Trade Fair Industry and TeleTrusT – IT Security Association Germany.<br><br>\nGermany participates with a German Pavilion offering a professional brokerage service to help to establish contacts with German companies and comprehensive information on Germany as an important business location. <br><br>\nExplore abt. 25 companies from Germany!<br>\nasvin GmbH<br>\nAuconet Solutions GmbH<br>\nAWARE7 GmbH<br>\nBeta Systems Software AG<br>\nBundesdruckerei GmbH<br>\nDeutsche Gesellschaft für Cybersicherheit mbH & Co. KG<br>\nEBRAND AG<br>\nEnclaive GmbH<br>\nHornetsecurity GmbH<br>\nINFODAS GmbH<br>\nitWatch GmbH<br>\nLocateRisk GmbH<br>\nMaltego Technologies GmbH<br>\nMitigant by Resility<br>\nMTRIX GmbH<br>\neCom Service IT GmbH<br>\nONEKEY GmbH<br>\nROHDE & SCHWARZ GmbH & Co. KG<br>\nsecunet Security Networks AG<br>\nSoSafe GmbH<br>\nTenzir GmbH<br>\nTÜV Informationstechnik Gmbh<br>\nTWINSOFT biometrics GmbH & Co. KG<br><br>\nFor more information visit: www.rsac.german-pavilion.com <br>\n</p>','\n',char(10)),NULL,NULL,NULL,'');
|
||
INSERT INTO vendors VALUES('f9947450-6e05-44fe-8f26-03b819620989','published','garrison','Garrison','www.garrison.com/en',replace('Garrison provides both Remote Browser Isolation & Cross-Domain Solutions to commercial enterprises and governments around the world. Using a form of RBI known as Pixel-Pushing, Garrison allows users to browse the web without the threat of attacks. \n\n','\n',char(10)),'117 Waterloo Rd.',NULL,'London',NULL,'GBR','65330b9c-a2a4-474a-a501-7a62fd22e9db',replace('<h5>Garrison</h5>\n<p>\nGarrison is a cybersecurity company that provides protection against advanced cyber threats, specifically focusing on stopping web-borne attacks. The company''s patented hardware accelerated technology allows for the safe execution of web content by isolating it from the user''s device and network, preventing any potential malware from causing damage.\nGarrison''s Browser Isolation Solution is designed to be transparent to end-users, allowing them to continue their online activities without any noticeable difference in their browsing experience.\nThe company''s clients include governments, financial institutions, and large enterprises that require high levels of security. Garrison''s solution has been independently tested and validated, receiving industry recognition for its effectiveness in preventing web-borne attacks.\n<br>\n</p>\n<h5>Why Garrison?</h5>\n<p>Garrison''s Remote Browser Isolation (RBI) platform isolates web content from users'' devices and networks, preventing potential malware from causing damage. Unlike other RBI products, Garrison ULTRA® offers web protection rather than detecting threats after they’ve already happened. Garrison ULTRA® ensures safe browsing with a transparent user experience, uninterrupted browsing, and hardware-accelerated Pixel-Pushing technology. All whist providing significant benefits such as protection against cyber attacks, ransomware, data breaches, financial loss, and reputational damage. Seamless integration with existing security infrastructures provides an additional layer of protection without workflow disruption. Garrison ULTRA® offers comprehensive RBI and advanced features for comprehensive protection and online activity integrity.</p>','\n',char(10)),NULL,'https://www.twitter.com/garrison_tech','https://www.linkedin.com/company/garrisontechnology/','');
|
||
INSERT INTO vendors VALUES('3602364d-db04-434e-9b08-77b89f5799fa','published','gurucul','Gurucul','https://gurucul.com/','Gurucul’s real-time Cloud-Native Security Analytics and Operations Platform provides customers with Next Generation SIEM, Open XDR, UEBA, and Identity and Access Analytics in one unified platform. ','222 N Pacific Coast Highway','Suite 1322','El Segundo','CA','USA','f9878ce1-cf17-4c27-8983-9d25a9d6cc32',replace('<h5>Gurucul</h5>\n<p>\nGurucul is a global cyber security company that is changing the way organizations protect their most valuable assets, data and information from insider and external threats both on-premises and in the cloud. Gurucul’s real-time Cloud-Native Security Analytics and Operations Platform provides customers with Next Generation SIEM, Open XDR, UEBA, and Identity and Access Analytics in one unified platform. It combines machine learning behavior profiling with predictive risk-scoring algorithms to predict, prevent, and detect breaches. Gurucul technology is used by Global 1000 companies and government agencies to fight cybercrimes, IP theft, insider threat and account compromise as well as for log aggregation, compliance and risk-based security orchestration and automation for real-time extended detection and response. The company is based in Los Angeles. To learn more, visit Gurucul and follow us on LinkedIn and Twitter.<br>\n</p>\n<h5>Why Gurucul?</h5>\n<p>Gurucul Next Generation Cloud-Native SIEM unburdens security teams from floods of alerts and false positives, while optimizing and prioritizing their ability to find threats and manage day-to-day security operations more effectively. It provides the necessary capabilities to achieve compliance requirements and strongly maps to the MITRE ATT&CK Framework.\n• Maximum Data Ingestion: Ingest & interpret data from any source OOTB with no ingestion fees with predictable, asset-based pricing\n• Real-time Threat Detection: Included OOTB threat content immediately identifies threats upon deployment\n• Most Comprehensive Set of Analytics: Supports 2500+ open and customizable ML models for detecting threats, meeting compliance needs, accelerating investigations, and automating responses\n• Consolidated Management: Unified visibility through a single console with all necessary context to speed investigation times and help analysts through entire SOC lifecycle\n</p>','\n',char(10)),'https://www.facebook.com/gurucul','https://www.twitter.com/gurucul','https://www.linkedin.com/company/gurucul','');
|
||
INSERT INTO vendors VALUES('443b0455-e8ea-4b7a-bd9f-f58f89e1302c','published','gravwell','Gravwell','https://www.gravwell.io','Gravwell is a data platform with security lake features that enables teams to search, visualize, and analyze data on-demand from any source — all with unlimited data collection and retention without being locked into a consumption-based pricing model','P.O. Box 51534',NULL,'Idaho Falls','ID','USA','a5fb10c9-436a-4cf9-8dc7-cc5cfa74dfda',replace('<h5>Gravwell</h5>\n<p>\nIngest all logs and raw data — without being locked into a consumption-based pricing model.\nGravwell is a data platform with security lake features that enables teams to investigate, collaborate, and analyze data on-demand from any source — all with unlimited data collection and retention. Search, visualize, and analyze all your raw data and ask any question you want.\nUse Gravwell dashboards to Threat Hunt, or for Enterprise Log Management, as a SIEM Extension, or a Security Data Lake. Gravwell is a built from a scratch solution capable of truly scaling to the demands of power users and ingesting 100+ TBs a day while simultaneously providing a core competency of locating a singular IP address across all of your logs. <br>\n</p>\n<h5>Why Gravwell?</h5>\n<p>Ingest all logs and raw data — without being locked into a consumption-based pricing model.\nGravwell is a data platform with security lake features that enables teams to investigate, collaborate, and analyze data on-demand from any source — all with unlimited data collection and retention. Search, visualize, and analyze all your raw data and ask any question you want.\nUse Gravwell dashboards to Threat Hunt, or for Enterprise Log Management, as a SIEM Extension, or a Security Data Lake. Gravwell is a built from a scratch solution capable of truly scaling to the demands of power users and ingesting 100+ TBs a day while simultaneously providing a core competency of locating a singular IP address across all of your logs.\n</p>','\n',char(10)),'https://www.facebook.com/gravwell/','https://www.twitter.com/gravwell_io','https://www.linkedin.com/company/gravwell/','');
|
||
INSERT INTO vendors VALUES('ec7395de-ece0-41e3-b8c1-651ecd6f32ad','published','arxan-technologies-inc-now-digital-ai-software-inc','Arxan Technologies, Inc (now Digital.ai Software, Inc.)','digital.ai',NULL,'285 Summer Street','Suite 200','Boston','MA','USA','b6bde633-acb6-4304-b7c5-1468e58190dd',replace('<h5>Arxan Technologies, Inc (now Digital.ai Software, Inc.)</h5>\n<p>\nDigital.ai Application Security (formerly Arxan Technologies, Inc.) has been the leading provider of security for mobile, web, and desktop applications for over 20 years. Enterprises depend on Digital.ai to help them build secure software by obfuscating code and providing anti-tamper techniques. Applications built using Digital.ai Application Security are thus protected from reverse-engineering, piracy, and app-cloning. Digital.ai also provides a means to monitor the applications that enterprises create and a means to react to attacks on apps with Runtime Application Self Protection (RASP).<br>\n</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/digitaldotai/','');
|
||
INSERT INTO vendors VALUES('bd563865-36b0-4272-92a4-e37885122bb9','published','dragos-inc','Dragos, Inc','https://dragos.com','Dragos is an industrial (ICS/OT/IIoT) cybersecurity company on a mission to safeguard civilization. Dragos provides cybersecurity solutions for hundreds of industrial organizations with platform technology, unprecedented knowledge, and expertise.','1745 Dorsey Rd. ','Suite R','Hanover','MD','USA','f5760f39-a494-4c25-9667-335e7a516b63',replace('<h5>Dragos, Inc</h5>\n<p>\nDragos has a global mission to safeguard civilization from those trying to disrupt the industrial infrastructure we depend on every day. The Dragos Platform offers the most effective industrial cybersecurity technology, giving customers visibility into their ICS/OT assets, vulnerabilities, threats, and response actions. The strength behind the Dragos Platform comes from our ability to codify Dragos''s industry-leading OT threat intelligence, and insights from the Dragos services team, into the software. Our community-focused approach gives you access to the largest array of industrial organizations participating in collective defense, with the broadest visibility available. Dragos solutions protect organizations across a range of industries, including electric, oil & gas, manufacturing, building automation systems, chemical, government, water, food & beverage, mining, transportation, and pharmaceutical.<br>\n</p>\n<h5>Why Dragos, Inc?</h5>\n<p>Dragos is the largest, most experienced ICS/OT cybersecurity company in the industry and we are committed to your success in protecting critical assets and staying ahead of adversaries. Dragos was built by practitioners for practitioners. All our offerings, including products and services, fully leverage that expertise.\nThe Dragos Platform is the most effective ICS/OT cybersecurity technology, providing comprehensive visibility of your assets and the threats you face, with expert-authored guidance to respond before a significant compromise.\nOur service offerings provide you with visibility and insight into your OT environments, identification of vulnerabilities and threats, education for practitioners, and overall risk mitigation.\nIn addition to our technology and service offerings, Dragos offers world-class threat intelligence to arm your organization with in-depth visibility of threats targeting industrial environments globally and the defensive recommendations to combat them. </p>','\n',char(10)),'https://m.facebook.com/dragos.incorporated/','https://www.twitter.com/DragosInc','https://www.linkedin.com/company/dragos-inc./','');
|
||
INSERT INTO vendors VALUES('050b155e-e2ef-4ea9-86c6-e0111d2ec8cf','published','gold-comet','Gold Comet','https://www.goldcomet.com','Formed in April 2018, BAIMMT, LLC, dba Gold Comet, provides Quantum secure messaging, file storage/sharing systems. We provide next-generation solutions for high level information security and protection of business and personal communications.','5845 Richmond Highway','Suite 700','Alexandria','VA','USA','6cdd9a7e-a347-407a-a56b-c9f9a918e5b7',replace('<h5>Gold Comet</h5>\n<p>\nWith the expanded communication capabilities that today’s technology provides, businesses and private consumers are now more vulnerable than ever to intrusions on their security and privacy and need to be protected from new and continuing threats. BAI, Inc., and BAI MMT LLC, DBA Gold Comet, have embarked on a joint mission to provide innovative next-generation solutions for high level information security and protection for business and personal communications, handling of proprietary and intellectual property, and storage, transmission, and sharing of other sensitive and confidential information.<br>\n</p>\n<h5>Why Gold Comet?</h5>\n<p>Gold Comet’s flagship messaging product was designed as an ultra-secure, browser-based email/messaging system for users who demand privacy, security, integrity, and ease of use. Gold Comet Secure Messaging is based on a novel, patented process that includes multi-factor authentication and assigns each individual message its own unique key, a significant differentiator from other email products on the market today, virtually guaranteeing account integrity and impenetrability.\nUsing the secure Gold Comet Quantum Secure File Storage solution, all files stored are contained within our Quantum Secure encrypted servers and can be viewed only from your device. Only you have access to your Quantum secure Gold Comet stored file. Gold Comet Secure File Storage is based on our patented Object Level Encryption process which assigns each encrypted file its own unique key, ensuring the highest level of security for your stored files. </p>','\n',char(10)),'https://www.facebook.com/GoldCometSecure','https://www.twitter.com/GoldCometSecure','https://www.linkedin.com/company/gold-comet-messaging/?original_referer=','');
|
||
INSERT INTO vendors VALUES('003d4211-664a-4304-ab75-3feace2aa3b9','published','dryviq','DryvIQ','https://dryviq.com/','DryvIQ enables organizations to intelligently understand and protect their data through advanced A.I. by providing a single platform that unifies three core dimensions of enterprise data management to discover, migrate and govern unstructured data.','30 Parkland Plaza ','Suite B','Ann Arbor','MI','USA','6889a453-5759-4ec5-af59-929ecddadf20',replace('<h5>DryvIQ</h5>\n<p>\nDryvIQ is a A.I.-driven platform that enables organizations to intelligently understand and protect unstructured data, no matter the system or location.\nThe platform eliminates the need for organizations to maintain multiple, siloed applications to universally understand risk profiles, consolidate systems, and support regulatory compliance across an organization’s unstructured data ecosystem and business applications.\nMade to support enterprise-scale, the platform leverages modern advances in artificial intelligence to discover, migrate, and govern your unstructured data — providing continual insight to vulnerabilities, while automatically mitigating exposed risks.\nThe DryvIQ platform goes well beyond existing point solutions — Its advanced capabilities support enterprise-wide regulatory compliance by utilizing and automatically executing a common set of governance rules and polices while simultaneously amplifying the capabilities of existing Data Loss Prevention & security systems.<br>\n</p>\n<h5>Why DryvIQ?</h5>\n<p>DryvIQ helps organizations protect sensitive information, reduce operational costs, and increase business efficiency through its powerful unstructured data management platform. Using modern advances in artificial intelligence, DryvIQ discovers, manages, and protects organizations’ unstructured data. With speeds of over 100 terabytes a day at petabyte scale, we’ve delivered rapid time to value for over 1,100 organizations of all sizes worldwide – including financial services customers World Bank, Mass Mutual, Bain Capital, and Nicolet Bank. For more information, contact us.</p>','\n',char(10)),'https://www.facebook.com/dryviq','https://www.twitter.com/dryviq','https://www.linkedin.com/company/dryviq/','');
|
||
INSERT INTO vendors VALUES('f0aef797-11aa-4abe-899a-cdd4b3824578','published','genians','Genians','www.genians.com','Genians (KOSDAQ: 263860), the industry pioneer in Network Access Control (NAC)-driven Zero Trust Network Access (ZTNA) solutions, delivers seamless and secure access control anywhere—on campus networks, in branch offices, and in the cloud.','3003 North 1st St.','#210','San Jose','CA','USA','02be8a51-ce96-4d3c-807e-1813ffdf6528',replace('<h5>Genians</h5>\n<p>\nGenians (KOSDAQ: 263860), the industry pioneer in Zero Trust Network Access (ZTNA), provides a fundamental cybersecurity platform for building a trusted path to secure access for any connecting devices by leveraging its Device Platform Intelligence (DPI), Network Access Control (NAC), and Endpoint Detection and Response (EDR). Since 2005, the company has served more than 2,400 customers, in organizations of all sizes and industries, including global Fortune 500 companies, the government, the military, critical infrastructure, finance, healthcare, education, and more. Genians is working to build a better security culture in the connected world by teaming up with global communities and industry leaders around the world.<br>\n</p>\n<h5>Why Genians?</h5>\n<p>Genians has consolidated the complexity of all essential Zero Trust features into a single platform, Genian ZTNA. Genian ZTNA can ensure full network observability for all network-enabled devices and provides context-based access control to maintain compliance with IT security policies. It then leverages automation to orchestrate an organization’s entire security portfolio in concert with Genian ZTNA to achieve an optimally secure network access environment.</p>','\n',char(10)),'https://www.facebook.com/withgenians','https://www.twitter.com/WithGENIANS','https://www.linkedin.com/company/genians-inc-/','');
|
||
INSERT INTO vendors VALUES('e003267c-0fb8-4b31-99c1-1a068261abe9','published','deloitte','Deloitte','https://www.deloitte.com/us/MoveForwardFast','Deloitte helps organizations create a cyber-minded culture and become stronger, faster, more innovative, and more resilient in the face of ever-changing cyber threats. Turn challenges into opportunities and confidently move forward fast.','200 Berkeley St',NULL,'Boston','MA','USA','e34f42ea-8d4b-4e12-815c-cd8895ef9947',replace('<h5>Deloitte</h5>\n<p>\nDeloitte Cyber & Strategic Risk offers a unified approach to help you tackle obstacles, build new capabilities, and move forward fast. The stakes are high for addressing increasingly complex cyber and risk challenges, but with Deloitte, you can overcome your greatest hurdles and achieve your strategic goals. Together, we’ll quickly develop a plan and course of action, whether you need help with strategy, design, implementation, or ongoing operations. Navigate your most critical paths, realize salient outcomes, and position your organization to thrive.\nOur solutions include:\nStrategy\nData & Privacy\nApplication Security\nInfrastructure\nIdentity\nCloud\nEmerging Technology\nDetect & Respond\nRisk Management & Transformation\nCrisis Response, Recovery, & Resilience<br>\n</p>\n<h5>Why Deloitte?</h5>\n<p>• Confidently navigate uncertainty, build capabilities that make a transformational impact on security and resilience, and drive exceptional performance at scale by making cyber and risk core to your organization\n• Offerings include: Cyber Strategy, Cloud Security, Identity, Detect & Respond, Application Security, Emerging Technology (IoT, supply chain, 5G, Quantum, Blockchain, Metaverse), Infrastructure, Crisis & Resilience\n• Why Deloitte: Ranked #1 globally in Security Consulting by Gartner; breadth and depth of offerings; proprietary technology; industry and domain experience\n</p>','\n',char(10)),'https://www.facebook.com/DeloitteUS','https://www.twitter.com/DeloitteRiskFin','https://www.linkedin.com/company/deloitte/','');
|
||
INSERT INTO vendors VALUES('24ebd19b-7e4c-4248-a513-2642d265932b','published','glimps','GLIMPS','http://www.glimps.fr','We offers a unique Deep Learning technology that is trained to read and understand the elements that make up a binary. It has enabled the development of GLIMPS Malware and GLIMPS Audit : advanced application analysis and malware detection solutions.','500 King St West,',NULL,'Toronto',NULL,'CAN','90d98ffa-962e-4636-8697-71777b40be1d',replace('<h5>GLIMPS</h5>\n<p>\nGLIMPS is a French cybersecurity software company that offers a unique Deep Learning technology trained to read and understand the elements that make up a binary: code conceptualization. This technology has enabled the development of cybersecurity solutions: GLIMPS Malware and GLIMPS Audit.\nGLIMPS Malware - eXtended Malware Analysis Platform: a file-based investigation solution for the detection, analysis and characterization of threats:\n- Detection of unknown malware\n- Complete threat visibility\n- Automate recursive investigations\n- Reduce response time to alerts\nGLIMPS Audit is an automatic software recognition and reverse engineering tool.<br>\n</p>\n<h5>Why GLIMPS?</h5>\n<p>GLIMPS is a French cybersecurity software company that offers a unique Deep Learning technology trained to read and understand the elements that make up a binary: code conceptualization. This technology has enabled the development of cybersecurity solutions: GLIMPS Malware and GLIMPS Audit.\nGLIMPS Malware - eXtended Malware Analysis Platform: a file-based investigation solution for the detection, analysis and characterization of threats:\n- Detection of unknown malware\n- Complete threat visibility\n- Automate recursive investigations\n- Reduce response time to alerts\nGLIMPS Audit is an automatic software recognition and reverse engineering tool.</p>','\n',char(10)),NULL,'https://www.twitter.com/GlimpsRe','https://www.linkedin.com/company/glimpsre/','');
|
||
INSERT INTO vendors VALUES('b5657f76-6d64-41e1-b85d-ecabf2df14d4','published','detectify','Detectify','detectify.com','Detectify sets the standard for External Attack Surface Management (EASM), providing 99.7% accurate vulnerability assessments powered by its community of elite ethical hackers. Go hack yourself. detectify.com','Master Samuelsgatan 56',NULL,'Stockholm',NULL,'SWE','759b3b91-2768-4085-9631-fda5b5075d19',replace('<h5>Detectify</h5>\n<p>\nDetectify sets the standard for External Attack Surface Management (EASM), providing 99.7% accurate vulnerability assessments. AppSec and ProdSec teams trust Detectify to expose exactly how attackers will exploit their Internet-facing applications. The Detectify platform automates continuous real-world, payload-based attacks crowdsourced through its global community of elite ethical hackers, exposing critical weaknesses before it’s too late.\nDetectify is trusted by 1,900+ security-conscious companies including King, Trello, Grammarly, auth0, Visma, Photobox, and Bühler Group.\nVisit us at detectify.com to learn more.<br>\n</p>\n<h5>Why Detectify?</h5>\n<p>We''ve taken DAST as a methodology and reinvented it as a method into External Attack Surface Management (EASM).\nSurface Monitoring runs continuous checks on the domain level and offers added value by discovering unknown assets and scanning those assets for vulnerabilities. AppSec and ProdSec teams can also set, enforce, and scale customizable security policies so they can focus on issues that matter most.\nApplication Scanning goes beyond the capabilities of a “traditional” DAST scanner by leveraging crawling, fuzzing, and authentication to find vulnerabilities in assets that normally can’t be reached through stateless testing. We make use of insights from Surface Monitoring to improve application scans and focus on providing our customers with ease of use and automation.\nWe also take DAST another step further by utilizing crowdsource-fueled DAST. Both Surface Monitoring and Application Scanning leverage the same insights from our unique community of ethical hackers.</p>','\n',char(10)),NULL,'https://www.twitter.com/detectify/','https://www.linkedin.com/company/detectify/','');
|
||
INSERT INTO vendors VALUES('6222ccda-59bd-42b5-8d11-43c50b584470','published','dnsfilter','DNSFilter','https://dnsfilter.com','DNSFilter is redefining how organizations secure their largest threat vector: the Internet itself. Over 15K organizations and managed service providers trust DNSFilter to protect millions of end users from phishing, malware, and advanced cyber threats.','80 M Street SE Suite 100',NULL,'Washington','DC','USA','ac540f5a-12a2-445e-84b5-f262f2b93387',replace('<h5>DNSFilter</h5>\n<p>\nDNSFilter is redefining how organizations secure their largest threat vector: the Internet itself. With 70% of attacks involving the Domain Name System (DNS) layer, DNSFilter provides DNS security powered by machine learning that uniquely identifies over 60% of threats in-house. DNSFilter catches more zero-day attacks in process than competitors, identifying compromised domains an average of 7 days before they appear on other external threat feeds. Over 15K organizations and managed service providers trust DNSFilter to protect millions of end users from phishing, malware, and advanced cyber threats.<br>\n</p>\n<h5>Why DNSFilter?</h5>\n<p>Stop threats before they hit your network Looking for a DNS filtering solution to make internet browsing safer and faster? DNSFilter has been ranked the No. 1 DNS filtering product by G2, Capterra, and Cybersecurity Breakthrough. Some benefits include:\n• Granular control over how your network and devices are used\n• Insight into what types of threats might impact your network\n• Increased productivity by blocking time-waster sites\n• User-level reporting on sites and apps used by employees\n• Meet PDNS or CMMC compliance requirements around dns filtering protection</p>','\n',char(10)),'https://fltr.ai/CT0G','https://www.twitter.com/https://fltr.ai/CT0E','https://fltr.ai/CT0B','');
|
||
INSERT INTO vendors VALUES('6c6c5d99-6f56-445e-990e-3e606c1faffa','published','deep-instinct','Deep Instinct','www.deepinstinct.com','Deep Instinct PREVENTS >99% of UNKNOWN threats before they land inside. With or without an agent, we stop attacks in <20ms. We are pioneering the use of deep learning AI in cybersecurity to achieve unprecedented scale with <0.1% false positives.','888 Seventh Ave',NULL,'New York','NY','USA','347b4e7e-513e-4f1c-adf4-898fe4302d2c',replace('<h5>Deep Instinct</h5>\n<p>\nDeep Instinct PREVENTS >99% of UNKNOWN threats (ransomware, zero-days) before they land inside – not after. With or without an agent, we stop attacks in <20ms. Deep Instinct is pioneering the use of deep learning AI in cybersecurity to achieve unprecedented scale with <0.1% false positives.<br>\n</p>\n<h5>Why Deep Instinct?</h5>\n<p>Deep Instinct is the only prevention-first cybersecurity company with natively architected deep learning technology. We keep enterprises safe by stopping >99% of threats before other solutions even see them – at a speed and scale unprecedented in the industry. Deep Instinct significantly reduces detection noise and false-alert storms to reduce overall risk, improve SOC team productivity, and improve the total cost of ownership of the cybersecurity stack.</p>','\n',char(10)),'https://www.facebook.com/DeepInstinctInc','https://www.twitter.com/DeepInstinctSec','https://www.linkedin.com/company/deep-instinct','');
|
||
INSERT INTO vendors VALUES('1aec2bce-5e7a-4aa3-92ca-0dfa91384973','published','0pass','0pass','www.0pass.com','0pass is the authentication platform that removes the number one cybersecurity risk facing organizations today: passwords. Say hello to hardware-based authentication that is connected to identity, unstealable, and seamless to roll out.','2261 Market Street #5084',NULL,'San Francisco ','CA','USA','df412b65-c97e-474b-a46a-fe7bc2b85223',replace('<h5>0pass</h5>\n<p>\n0pass is an authentication platform that powers logins which can’t be breached. 0pass delivers identity-centric management for security-key and biometric based authentication which stops credential theft—the biggest cybersecurity risk for every business.\nWith 0pass, organizations can rule out passwords, and roll out hardware-based authentication that is connected to user identity and seamlessly integrates across the organization. Passwords and MFA codes are replayable and can be stolen or spoofed, 0pass eliminates these vulnerabilities, delivering DoD level security to every organization.<br>\n</p>\n<h5>Why 0pass?</h5>\n<p>This is a strategic tool and the biggest way to reduce business risk.\nStop credential theft\nMake employee credentials impossible to steal and stop attackers from gaining access to accounts by only authenticating with credentials that are stored in the secure element of a YubiKey. It cannot be accessed remotely and can never leave the device.\nPrevent privilege escalation\nUse certificate-based authentication bound to a YubiKey so attackers are not able to use employee credentials or SSH keys to move to other systems.\nProtect mission-critical resources\nMake the most sensitive services at your company, like password vaults, customer data, compliance environments impervious to remote attacks.\nA better user experience\nEmployees do not need to remember a password or pull out their phone. Users simply use a short PIN to unlock their local security key for every login, everywhere.\n</p>','\n',char(10)),NULL,'https://www.twitter.com/0passInc','https://www.linkedin.com/company/0pass','');
|
||
INSERT INTO vendors VALUES('7e8255ad-6673-4625-bd68-5d2cbfd77f89','published','deepfence','Deepfence','www.deepfence.io','Deepfence is a security observability and cloud-native protection platform for cloud environments. Deepfence measures, maps, and visualizes your runtime attack surfaces, and provides full-stack protection from known and unknown threats.','3101 Park Blvd. ',NULL,'Palo Alto','CA','USA','3dfbfa7a-e91b-4e36-a87e-b771e4f770e9',replace('<h5>Deepfence</h5>\n<p>\nDeepfence is a security observability and cloud-native protection platform for cloud environments. Deepfence measures, maps, and visualizes your runtime attack surfaces, and provides full-stack protection from known and unknown threats. Deepfence ThreatMapper is our open-source platform that helps protect the increasingly vulnerable software supply chain by automatically scanning, mapping, and ranking application vulnerabilities and sensitive secrets in running containers, images, hosts, and repositories — from development through production. Our enterprise version, Deepfence ThreatStryker, uses industry attack heuristics to interpret ThreatMapper intelligence and telemetry, identifying attacks-in-progress and deploying mitigating firewall and quarantine measures. To learn more, visit deepfence.io.<br>\n</p>\n<h5>Why Deepfence?</h5>\n<p>Deepfence protects the most critical workloads with end-to-end cloud and application security for DevSecOps, SecOps, Security, and DevOps operators. In a single unified platform, our cloud-native application protection platform provides quicker detection and remediation of security threats and reduces dwell time along with a 90% reduction in non-critical security alerts. With deeper insights into your environment, we don’t just tell you what could go wrong, we enable you to act on the alerts that matter. </p>','\n',char(10)),NULL,'https://www.twitter.com/deepfence','https://www.linkedin.com/company/deepfence-inc/','');
|
||
INSERT INTO vendors VALUES('3d0da24b-4906-4083-899b-8ec30fe63777','published','dazz','Dazz','www.dazz.io','Dazz accelerates secure cloud software delivery for modern security and development teams. The Dazz Remediation Cloud maps your code-to-production pipelines; performs smart root cause analysis, prioritizes risk, and identifies code owners.','2345 Yale St',NULL,'Palo Alto','CA','USA','c46204de-c050-4c4a-a714-35791b45c30d',replace('<h5>Dazz</h5>\n<p>\nDazz accelerates cloud remediation for security and engineering teams. The Dazz Remediation Cloud maps your code-to-cloud pipelines, reduces your security alerts to their key root causes, and remediates issues right in the developer’s workflow. With Dazz, you gain full pipeline visibility, cut through alert noise, increase the value of existing tools, and shrink your risk window by reducing time to remediate. Visit us at dazz.io.<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/dazz_io','https://www.linkedin.com/company/dazz-io/','');
|
||
INSERT INTO vendors VALUES('598ab25d-0561-40d0-8096-8dfb1835350b','published','drata','Drata','https://drata.com/','Drata is a security and compliance automation platform that continuously monitors and collects evidence of a company’s security controls, while streamlining compliance workflows end-to-end to ensure audit readiness.','4445 Eastgate Mall ','Suite 200','San Diego','CA','USA','2e978c6a-407e-46e9-9d9a-a50a3ad2e3a1',replace('<h5>Drata</h5>\n<p>\nDrata automates your compliance journey from start to audit-ready and beyond and provides support from the security and compliance experts who built it.<br>\n</p>\n<h5>Why Drata?</h5>\n<p>Drata is the simplest way to achieve continuous SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & CCPA compliance. With the Drata platform you receive: Continuous Control Monitoring: Our 24 hour continuous control monitoring takes the manual work out of compliance. Automated Evidence Collection: Drata is continually automating the evidence collection process with our suite of 60+ integrations including AWS, Github, Cloudflare and more. Cross-Mapped Controls: Enjoy cross-mapped controls across multiple frameworks to streamline your workflows and customize policies where needed. Seamless Audit Process: With our separate auditor view, auditors can download all of the necessary evidence in one simple zip file, making your audit seamless. 22+ Template Policies: Drata provides Information Security policy templates available to edit and update directly in the platform. Whether you are brand new to security and compliance or an expert, Drata streamlines your security and compliance monitoring.</p>','\n',char(10)),NULL,'https://www.twitter.com/dratahq','https://www.linkedin.com/company/drata/','');
|
||
INSERT INTO vendors VALUES('9ef5cd29-c351-42b7-9305-e5babc9bb0ba','published','datagrail','Datagrail','http://www.datagrail.io',replace('We help businesses build customer trust and reduce business risk. Our Privacy Control Center powers the world''s most trusted companies, upholds people''s right to privacy, and keeps businesses compliant with regulations like GDPR and CPRA. \n','\n',char(10)),'164 Townsend St','Suite 12','San Francisco','CA','USA','e4c06c67-5e97-4f33-8eb5-6b78f1bc54e1',replace('<h5>Datagrail</h5>\n<p>\nDataGrail is the Privacy Control Center modern brands rely on to build customer trust and reduce business risk. Security, legal, and executive teams use DataGrail to automate privacy workflows and support compliance with regulations like GDPR, CCPA, and CPRA. With 1,800+ pre-built connections for popular apps and infrastructure, DataGrail offers continuous system detection, responsible data discovery, guided privacy assessments, and automated data subject request (DSR) fulfillment to power the world''s most trusted businesses. DataGrail services millions of consumers through companies like Amazon, Overstock, Instacart, and New Balance, and is a G2 leader. DataGrail is backed by leading VCs and strategic investors, including Third Point Ventures, Felicis Ventures, Next47, Cloud Apps Capital Partners, Operator Collective, HubSpot, Okta Ventures, and American Express Ventures. Visit www.datagrail.io or follow DataGrail on LinkedIn and Twitter to learn more.<br>\n</p>\n<h5>Why Datagrail?</h5>\n<p>DataGrail is the Privacy Control Center modern brands rely on to build customer trust and outsmart business risk. Security, legal, and executive teams use DataGrail to automate privacy workflows and support compliance with regulations like GDPR, CCPA, and CPRA. With 1,900+ pre-built connections for popular apps and infrastructure, DataGrail offers continuous system detection, responsible data discovery, guided privacy assessments, and automated data subject request (DSR) fulfillment to power the world''s most trusted businesses. DataGrail services millions of consumers through companies like Amazon, Salesforce, Overstock, Instacart, and New Balance, and is a G2 leader. DataGrail is backed by leading VCs and strategic investors, including Third Point Ventures, Felicis Ventures, Next47, Cloud Apps Capital Partners, Operator Collective, HubSpot, Okta Ventures, and American Express Ventures. Visit www.datagrail.io or follow DataGrail on LinkedIn and Twitter to learn more.</p>','\n',char(10)),NULL,'https://www.twitter.com/DataGrail','https://www.linkedin.com/company/datagrail/','');
|
||
INSERT INTO vendors VALUES('e1298e57-c834-4452-8c51-ffdbef9ae112','published','dynatrace','Dynatrace','www.dynatrace.com','Dynatrace provides software intelligence to simplify cloud complexity and secure cloud-native applications. Our platform combines observability, continuous runtime application security, and advanced AIOps to provide answers and intelligent automation','1601 Trapelo Road ','#116','Waltham','MA','USA','448d0c7c-0b9e-4138-ab80-683247a9e95b',replace('<h5>Dynatrace</h5>\n<p>\nDynatrace delivers intelligent automation of DevSecOps with a unique approach to securing cloud-native applications at runtime. With Dynatrace, DevSecOps teams can effortlessly detect, prioritize, and remediate application vulnerabilities by: • Identifying vulnerabilities in production code: Complete real-time observability into application vulnerabilities in a runtime / production context • Finding the vulnerabilities that really matter: AI-assisted prioritization of the most critical vulnerabilities using integrated security and observability context • Remediating with intelligent automation: Integrate with tools like ServiceNow or Jira, open tickets with intelligence and context • Detecting and blocking attacks in real-time: Runtime self-protection for key threats like SQL injections and command injections • Dynatrace Application Security is a part of the Dynatrace platform, offering unparalleled observability, automation, and intelligence.<br>\n</p>','\n',char(10)),'https://Facebook.com/dynatrace','https://www.twitter.com/https:// Twitter.com/dynatrace ','https://linkedin.com/company/dynatrace ','');
|
||
INSERT INTO vendors VALUES('1abbed5d-8d55-43aa-b41e-dbfd835281af','published','datadome','DataDome','http://www.datadome.co','DataDome’s bot and online fraud protection detects and mitigates attacks on mobile apps, websites, and APIs with unparalleled accuracy and zero compromise.','524 Broadway',NULL,'New York','NY','USA','33af4248-b0ab-4457-bcba-93b8303cd1a4',replace('<h5>DataDome</h5>\n<p>\nDataDome’s bot and online fraud protection detects and mitigates attacks with unparalleled accuracy and zero compromise. The machine learning solution analyzes 3 trillion signals per day to adapt to new threats in real time. DataDome defends mobile apps, websites, and APIs against ATO, scraping, carding, DDoS, credential stuffing, and more. The 24/7 SOC experts protect hundreds of high-profile brands worldwide, including Reddit, Rakuten, and AngelList. A force multiplier for IT and security teams, DataDome is fully transparent, easy to deploy, and frictionless for consumers. In 2022, DataDome was named a Strong Performer in the Forrester Wave: Bot Management and ranked the top G2 Leader in Bot Detection & Mitigation for Fall 2022.<br>\n</p>\n<h5>Why DataDome?</h5>\n<p>DataDome’s bot and online fraud protection detects and mitigates attacks with unparalleled accuracy and zero compromise. The machine learning solution analyzes 3 trillion signals per day to adapt to new threats in real time. Leading enterprises worldwide—including Reddit, Patreon, and AngelList—trust DataDome’s solution and 24/7 SOC experts to protect their mobile apps, websites, and APIs against fraud, ATO, carding, scraping, layer 7 DDoS, and more.\nA force multiplier for IT and security teams, DataDome is fully transparent, easy to deploy, and frictionless for consumers, offering the only secure, user-friendly, and privacy compliant CAPTCHA. With 25 regional PoPs and autoscaling technology, DataDome responds to requests with zero latency and no impact on the speed of protected platforms.\nDataDome is ranked the top G2 Leader in Bot Detection & Mitigation for Fall 2022 and Winter 2023, a Strong Performer in the Forrester Wave: Bot Management, and 21st in cybersecurity on the Inc. 5000.</p>','\n',char(10)),NULL,'https://www.twitter.com/data_dome','https://www.linkedin.com/company/datadome/','');
|
||
INSERT INTO vendors VALUES('696186b1-d357-4840-a823-9917df735e64','published','dart-consulting-and-training-red-alpha','DART Consulting and Training / Red Alpha','https://www.redalphacyber.com/rsac2023','Red Alpha is a cybersecurity talent development company that offers a comprehensive solution for companies seeking cyber professionals. Partnering with us provides you with a diversity matching program which can be tailored to your specific needs.','83 Clemenceau Ave, #10-04',NULL,NULL,NULL,'SGP','91703e85-3d50-466f-971e-ac37ca5e8aa0',replace('<h5>DART Consulting and Training / Red Alpha</h5>\n<p>\nDART is a leading cybersecurity training and consultancy company. We build and enhance our clients’ cyber capabilities by growing and strengthening their frontline defense – the cyber teams. All our courses, capacity building programs and cyber ranges are tailor-made for our clients. Whether you are interested in bringing your cyber teams to the next level or creating a cyber unit from scratch, we are the ones to hire for the mission.\nRed Alpha is a cybersecurity talent development and placement company that offers a comprehensive solution for companies seeking highly skilled cyber professionals. Our proprietary assessment platform allows us to identify and recruit high-aptitude candidates, who then undergo our rigorous 17-week training program, equipping them with the real-world experience necessary to succeed in the field.\n<br>\n</p>\n<h5>Why DART Consulting and Training / Red Alpha?</h5>\n<p>DART specializes in customized capacity building and training, to give you an edge in mitigating advanced cyber threats. Our services include capacity building, cyber skills training, aptitude assessment and talent development to deliver complete, ready-to-go teams for your organization across various cyber domains. Our end-to-end capacity building programs include assessment, development of SOPs/TTPs and joint operations. With our combat-proven approach to training, we prepare you for the most sophisticated threats.\nPartnering with Red Alpha provides you with access to our customized training program, which can be tailored to your specific needs, as well as early access to our job-ready trainees. We also offer a diversity matching program and continued upskilling for candidates post-placement. Our business model is flexible and adaptable to meet the unique requirements of your organization.</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/redalphacyber/','');
|
||
INSERT INTO vendors VALUES('7fd265b7-fe77-4b21-9674-d572f83497cd','published','docontrol','DoControl','docontrol.io',' Founded by former Google Cloud Cybersecurity members, DoControl provides organizations with the automated, self-service tools they require for SaaS application data access monitoring, orchestration, and remediation. ','333 W 39th St.','Rm 403','New York City','NY','USA','0f42acd6-4648-4240-92c7-643f097dd127',replace('<h5>DoControl</h5>\n<p>\nDoControl provides a unified, automated and risk-aware SaaS Security Platform that secures business-critical applications and data, drives operational efficiencies, and enables business productivity. DoControl’s core competency is focused on protecting business-critical SaaS applications and data through automated remediation.\nThis is achieved through preventive data access controls, SaaS service misconfiguration detection, service mesh discovery, and shadow application governance. The DoControl Platform is built upon three foundational tenants which include: Discovery and Visibility, Monitor and Control, and Automated Remediation. DoControl provides SaaS data protection that works for the modern business, so they can drive their business forward in a secure way.<br>\n</p>\n<h5>Why DoControl?</h5>\n<p>DoControl helps mitigate the threat of SaaS data overexposure and exfiltration. SaaS applications are ubiquitous within technology stacks across the business landscape, exposing companies of all sizes to security risks stemming from undetected data exfiltration. DoControl provides a combination of preventive controls and detective measures to secure business-critical applications and data, drive operational efficiencies, and enable business productivity.\nDoControl provides a unique “push/pull” architecture that is completely agentless and event-driven. The solution pushes events from apps (i.e. GDrive, Slack) and pulls from the existing technology stack (i.e. IdP, HRIS); and is powered by APIs and webhooks to deliver comprehensive protection across the SaaS estate. Our core differentiation is powered by this architecture, and enables IT and Security teams to create granular, SaaS security policies to protect business-critical applications and data.\n</p>','\n',char(10)),'https://www.facebook.com/docontrol.io/','https://www.twitter.com/do_control','https://www.linkedin.com/company/do-control','');
|
||
INSERT INTO vendors VALUES('5edfe136-0e2c-467c-816a-a06cbf208e92','published','diligent','Diligent','diligent.com','Diligent is the leading governance, risk and compliance (GRC) SaaS provider, serving more than one million users from over 25,000 organizations around the globe. ','111 W 33rd Street ','16th Floor','New York','NY','USA','f1ddcbb0-5c28-4fb0-8b81-91d4872812ff',replace('<h5>Diligent</h5>\n<p>\nAt Diligent, we believe in a world where transformational leaders can build more successful, equitable and sustainable organizations.\nOne million users and more than 700,000 board members and leaders rely on Diligent software to connect insights across governance, risk, compliance, audit and ESG to drive greater impact and lead with purpose.<br>\n</p>\n<h5>Why Diligent?</h5>\n<p>Diligent''s Integrated Risk Management Approach is Unique:\nEnterprise Risk Management system that unifies data into customizable reports and real-time alerts; IT Risk Management to effectively monitor, assess and remediate risk to your IT infrastructure; Third-party Risk Management to monitor and manage your third-party vendor landscape; IT Compliance platform ensures IT Compliance while saving time and resources.</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/showcase/diligent-risk/','');
|
||
INSERT INTO vendors VALUES('6fe0ae60-4315-4d1a-8716-87efd5418e35','published','datadog','Datadog','datadoghq.com','Datadog is the monitoring and security platform for infrastructure, applications, logs, and more. Through its unified SaaS platform, Datadog provides comprehensive and deep visibility into the performance of modern applications.','620 8th Avenue ','Floor 45','New York','NY','USA','3649c5d6-9911-47f9-b473-80404866deae',replace('<h5>Datadog</h5>\n<p>\nDatadog is the SaaS monitoring and security platform that unifies metrics, traces, logs, and security signals in a single pane of glass, providing both comprehensive and deep visibility into the performance of modern applications. Datadog reduces the time needed to detect and resolve issues by reducing the number of tools needed to troubleshoot performance problems across teams. With vendor-backed integrations for 600+ technologies, a world-class enterprise customer base, and razor-sharp focus on ease of use, Datadog is the leading choice for infrastructure, security, and software engineering teams to improve cross-team collaboration, accelerate development cycles, and reduce operational and development costs.<br>\n</p>','\n',char(10)),'N/A','https://www.twitter.com/datadoghq','https://www.linkedin.com/company/datadog','');
|
||
INSERT INTO vendors VALUES('79be293e-bc2e-4b38-9f73-86c5c872cb20','published','darkowl-llc','DarkOwl, LLC','www.darkowl.com','DarkOwl is the leading provider of darknet data. Our suite of data products helps businesses quantify risk precisely with tools that uncover darknet data. DarkOwl Vision UI & API products inform sophisticated cybersecurity programs and decisions.','216 16th Street ','Suite 700','Denver','CO','USA','0bb352f0-02e9-4693-a60e-72be012a4809',replace('<h5>DarkOwl, LLC</h5>\n<p>\nDarkOwl uses machine learning and human analysts to collect automatically, continuously, and anonymously, index and rank darknet, deep web, and high-risk surface net data that allows for simplicity in searching.\nOur platform collects and stores data in near real-time, allowing darknet sites that frequently change location and availability, be queried in a safe and secure manner without having to access the darknet itself.\nDarkOwl is unique not only in the depth and breadth of its darknet data, but also in the relevance and searchability of its data, its investigation tools, and its passionate customer service. As importantly, DarkOwl data is ethically and safely collected from the darknet, allowing users secure and anonymous access to information and threats relevant to their mission. Our passion, our focus, and our expertise is the darknet.<br>\n</p>\n<h5>Why DarkOwl, LLC?</h5>\n<p>We are the darknet experts. Our database is the largest commercially available darknet database in the industry. We collect data from Tor, I2P, IRC, Telegram, Zeronet, as well as high value paste sites, deep web criminal forums, and other high-value sites. Our platform uses natural language processing to categorize data in 49 different languages, and we tokenize data for easy access and parsing.\nDarkOwl Vision UI is our platform for users to simply, safely, and comprehensively search this darknet database. The interface provides users with powerful querying capabilities to search, monitor, and create alerts for critical information. A range of API and data feed products are also available for clients who wish to ingest data into their own environment.</p>','\n',char(10)),NULL,'https://www.twitter.com/darkowlcyber','https://www.linkedin.com/company/one-world-labs/','');
|
||
INSERT INTO vendors VALUES('5d4ce363-36d9-4848-be9c-485eaf0bc4a3','published','dig-security','Dig Security','https://www.dig.security/','Dig Security is a cloud data security platform that helps organizations discover, classify, protect & govern their cloud data, by uniquely combining Data Security Posture Management (DSPM) and Data Detection and Response (DDR) into a single solution.','250 Greenwich St.',NULL,'New York ','NY','USA','08534930-b5f7-458b-b0d5-a9021c20e599',replace('<h5>Dig Security </h5>\n<p>\nDig is an agentless multi-cloud data security platform that discovers, classifies, and protects sensitive data. Using Dig''s data security posture management (DSPM) capabilities, you can quickly locate your most crucial data and organizational "crown jewels" in both structured and unstructured data assets. In addition and most importantly, Dig provides real-time data detection and response (DDR) to ensure an immediate handling of newly discovered data-related incidents by integrating with your existing security solutions. <br>\n</p>\n<h5>Why Dig Security ?</h5>\n<p>Dig Security helps organizations discover, classify, protect and govern their cloud data. With organizations shifting to complex environments with dozens of database types across clouds, monitoring and detecting data exfiltration and policy violations has become a complex problem with limited fragmented solutions. The Dig Data Security Platform is the only cloud-native and completely agentless solution that combines data security posture management (DSPM), cloud data loss prevention (DLP), and data detection and response (DDR) for real-time governance and protection of cloud data assets. Dig is founded by three cyber security veterans from Microsoft and Google, and is backed by Team8, SignalFire, Felicis, CrowdStrike, Okta Ventures, CyberArk Ventures, and Merlin Ventures.\n</p>','\n',char(10)),'https://www.facebook.com/Dig.Cyber/','https://www.twitter.com/dig_security','https://www.linkedin.com/company/dig-security/','');
|
||
INSERT INTO vendors VALUES('558a553c-a669-47cb-9137-62e598ab7446','published','nord-security','Nord Security','nordsecurity.com/business',replace('As a leading cybersecurity solutions provider, Nord Security combines products that businesses already love, all in one suite:\nNordLayer – network access management\nNordPass – business password manager\nNordLocker – end-to-end encrypted cloud','\n',char(10)),'16192 Coastal Highway',NULL,'Lewes','DE','USA','d01f5fc2-a791-49c9-91ec-268497749009',replace('<h5>Nord Security</h5>\n<p>\nNord Security is the world''s leading cybersecurity solutions provider. Created to meet the needs of a digital workforce, Nord Security business suite brings together business versions of NordLayer, NordPass, and NordLocker. Modernize your business security with a cybersecurity suite trusted by 8000+ businesses and developed by the standard of NordVPN.<br>\n</p>\n<h5>Why Nord Security?</h5>\n<p>\nNord Security brings together products that businesses already love, all in one suite:<br><br>\n<b>NordLayer</b><br>\nNordLayer offers network access security that’s easy to deploy and scale. The solution provides an all-rounded, caring and attentive cybersecurity service, providing your colleagues with safe and reliable remote access. Helping organizations to adopt ZTNA principles, NordLayer is focused on the Security Service Edge of cybersecurity services.<br><br>\n<b>NordPass</b><b> NordPass is a password manager that secures access to corporate accounts, helping companies comply with the strictest global cybersecurity standards. NordPass’ end-to-end encryption and zero-knowledge architecture ensure the highest standard of privacy and security for your business. The solution is user-friendly, and thus easily adopted by any non-technical team.<br><br>\n<b>NordLocker</b><br>\nNordLocker is an end-to-end encrypted cloud. It offers a multilayer protection for your most confidential data and secure storage.\n</b></p>','\n',char(10)),'https://www.facebook.com/Nord-Security','https://www.twitter.com/https://www.instagram.com/nord_security/','https://www.linkedin.com/company/nordsecurity','');
|
||
INSERT INTO vendors VALUES('8abe7bfb-3494-4e4d-b388-eb3bbccc305c','published','ionate-inc','Ionate, Inc','www.ionate.io',replace('Ionate is helping the end-to-end cloud migration journey for enterprises while increasing the security of the legacy. \nWe identify vulnerabilities in the business logic & rules and show how the applications and software work together as a whole. ','\n',char(10)),'2 Embarcadero Ctr','Suite 410','San Francisco','CA','USA','8e3e13c4-c445-4f2a-8906-dfc45ef4100c',replace('<h5>Ionate, Inc</h5>\n<p>\nAt Ionate, we enable companies to modernize their legacy systems using AI / ML, setting them up for accelerated digital transformation and future readiness.\nFaster. Cheaper. Safer.<br>\n</p>\n<h5>Why Ionate, Inc?</h5>\n<p>At Ionate, we enable companies to modernize their legacy systems using AI / ML, setting them up for accelerated digital transformation and future readiness.\nFaster. Cheaper. Safer.</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/ionate','');
|
||
INSERT INTO vendors VALUES('e3b346d3-dd3c-49fb-a9cc-b66fd9e3dd02','published','intercast-staffing','Intercast Staffing','https://intercastglobal.com/','Founded in 2009, Intercast is a Global Leader in Cybersecurity Staffing, Consulting and Recruitment. We provide Enterprise organization''s with vetted, world class talent so that you can mitigate your organization''s business risk.','360 Bay Street ','Suite 1010','Toronto','ON','CAN','0d7df842-279d-4cfe-8185-9c52e6841c2e',replace('<h5>Intercast Staffing</h5>\n<p>\nIntercast is a global leader in the Staffing and Recruitment industry, with a dedicated focus on Cybersecurity. We help our Enterprise clients across North America grow their Security teams and foster Resilience.<br>\n</p>\n<h5>Why Intercast Staffing?</h5>\n<p>Intercast is a niche staffing and recruitment firm, dedicated to the Cybersecurity Industry. We work with enterprise clients across North America, helping them staff for their various Cybersecurity initiatives. Some key areas we focus on include AppSec, IAM, Cloud Security, Networking, GRC, Incident Response, Offensive Security and SecOps.\nOur unique focus on Cybersecurity allows us to help you build out a more resilient Cyber team!</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/intercast-staffing/mycompany/','');
|
||
INSERT INTO vendors VALUES('3096512e-7ec0-4ad4-8c4b-e49503e4b060','published','inspired-elearning-llc','Inspired eLearning, LLC','www.inspiredelearning.com','Inspired eLearning by VIPRE is a leading provider of internet security solutions purpose-built to protect businesses, solution providers, and home users from costly and malicious cyber threats. ','114 5th Ave','15th Floor','New York','NY','USA','42c74894-49c2-4632-bdf1-7d904f661a8f',replace('<h5>Inspired eLearning, LLC</h5>\n<p>\nAt VIPRE, we believe that Prevention & Awareness should go hand-in-hand. Most DLP solutions, by their very nature, stop at prevention. The unique combination of VIPRE SafeSend and Inspired eLearning Powered by VIPRE goes beyond just preventing data leakage and addresses the cause of the leak with educational training to reinforce good cyber behavior. Our solutions enable businesses to educate employees and build awareness to close the loop and prevent future data loss.<br>\n</p>\n<h5>Why Inspired eLearning, LLC?</h5>\n<p>Email Security - defend your organization from email threats with layers of protection including email security cloud, advances threat protection, and VIPRE SafeSend.\nEndpoint Security - Simplified Endpoint Security in a single platform. Next generation AV security capabilities that scale with your business from Endpoint security cloud, Endpoint Detection & Response to Encrypt.team\nUser Protection - Enterprise training solutions powered by Inspired eLearning. Turn-key training programs for Security Awareness Training, Compliance Training, HR Training, and more.\nThreat Intelligence - detect, analyze and destroy persistent threats</p>','\n',char(10)),'https://www.facebook.com/VIPREAntivirusBusiness','https://www.twitter.com/VIPRESecurity','https://www.linkedin.com/company/vipresecurity/mycompany/','');
|
||
INSERT INTO vendors VALUES('d3a3708e-805a-403e-a97a-ea64a3df2800','published','immuta','Immuta','www.immuta.com','Immuta is the leader in data security, automating data discovery, security, and monitoring from one centralized platform. Organizations trust Immuta to safely share data, while mitigating risks. Founded in 2015, Immuta is headquartered in Boston, MA.','25 Thomson Pl. ','4th floor','Boston','MA','USA','3906efa5-b111-44c5-903c-32cb4c133dac',replace('<h5>Immuta</h5>\n<p>\nImmuta is the market leader in data security and access, providing data teams one universal platform to control access to analytical data sets in the cloud. Only Immuta can automate access to data by discovering, securing, and monitoring data. Data-driven organizations around the world trust Immuta to speed time to data, safely share more data with more users, and mitigate the risk of data leaks and breaches. Founded in 2015, Immuta is headquartered in Boston, MA.<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/immuta','https://www.linkedin.com/company/immuta/','');
|
||
INSERT INTO vendors VALUES('6b837494-f699-47fe-a3ec-6db58e41c4fc','published','illumio','Illumio','www.illumio.com','Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface to help organizations reduce risk and build resilience.','920 DeGuigne Dr',NULL,'Sunnyvale','CA','USA','c58fe301-a8ea-4214-93b1-17a2f55401ee',replace('<h5>Illumio</h5>\n<p>\nIllumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface.\nThe Illumio ZTS Platform visualizes all communication and traffic between workflows, devices, and the internet in one console, automatically sets granular segmentation policies to control unnecessary and unwanted communications, and isolates high-value assets and compromised systems to proactively or reactively stop the spread of a breach.\nZTS is proven to help organizations of all sizes, from Fortune 100 to small business, stop breaches and ransomware in minutes, save millions in application downtime, and accelerate digital transformation projects.\nAssume breach. Minimize impact. Increase resilience.<br>\n</p>\n<h5>Why Illumio?</h5>\n<p>Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes all traffic flows between workloads, devices, and the internet, automatically sets granular segmentation policies to control communications, and isolates high-value assets and compromised systems proactively or in response to active attacks. Illumio protects organizations of all sizes, from Fortune 100 to small business, by stopping breaches and ransomware in minutes, saving millions of dollars in application downtime,\nand accelerating cloud and digital transformation projects.</p>','\n',char(10)),'https://www.facebook.com/illumio','https://www.twitter.com/illumio','https://www.linkedin.com/company/illumio','');
|
||
INSERT INTO vendors VALUES('99cda9a7-6b32-48f9-b781-bfd5c3db02e0','published','imperva','Imperva','www.imperva.com','Imperva is the comprehensive digital security leader on a mission to help organizations protect their data and all paths to it. Combining edge, application, and data security, customers trust Imperva to protect their applications, data, and websites.','One Curiosity Way',NULL,'San Mateo','CA','USA','c3f5ebd7-27c2-4e1e-9bbb-a6e2cd3a4f1e',replace('<h5>Imperva</h5>\n<p>\nmperva is the comprehensive digital security leader on a mission to help organizations protect their data and all paths to it. Imperva protects all digital experiences, from business logic to APIs, microservices, and the data layer. With an integrated approach combining edge, application security, and data security, customers around the world -- ranging from cloud-native start-ups to global multinationals -- trust Imperva to protect their applications, data, and websites from cyber attacks. Imperva Threat Research and our global intelligence community keep Imperva ahead of the threat landscape and seamlessly integrate the latest security, privacy, and compliance expertise into our solutions.\n<br>\n</p>\n<h5>Why Imperva?</h5>\n<p>Imperva provides unmatched end-to-end application and data security that protects critical Apps, APIs, and Data, anywhere, at scale, and with the highest ROI. From a single vendor, Imperva secures organization’s workloads and data through all stages of their digital transformation with the fastest detection and protection across enterprises, hybrid, and multicloud environments, with no hidden costs. Imperva Research Labs and our global intelligence community enable Imperva to stay ahead of the threat landscape and seamlessly integrate the latest security, privacy, and compliance expertise into our solutions. While Imperva’s services and support teams help organizations gain visibility, governance, actionable insights, and automated actions to improve their security posture and operational excellence.\n</p>','\n',char(10)),'https://facebook.com/imperva/','https://www.twitter.com/imperva','https://www.linkedin.com/company/imperva/','');
|
||
INSERT INTO vendors VALUES('63ecc6e3-ef26-4308-b9c0-13b6db6c6fa6','published','intel','Intel','https://www.intel.com/content/www/us/en/homepage.html','We are an industry leader, creating world-changing technology that enables global progress and enriches lives. We stand at the brink of several technology inflections—artificial intelligence (AI), 5G network transformation, and the rise of the intelligent edge—that together will shape the future of technology. ','2200 Mission College Blvd.',NULL,'Santa Clara','CA','USA','0679441f-3e49-411c-9d86-7f02a5f4eeea',replace('<h5>Intel</h5>\n<p>\nWe are an industry leader, creating world-changing technology that enables global progress and enriches lives. We stand at the brink of several technology inflections—artificial intelligence (AI), 5G network transformation, and the rise of the intelligent edge—that together will shape the future of technology. <br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/IntelSecurity ',NULL,'');
|
||
INSERT INTO vendors VALUES('e1afc80f-e4d6-4199-9bb1-58101808c9ce','published','itsp-magazine','ITSP Magazine','https://www.itspmagazine.com/',replace('Covering the cybersecurity field is a decades-old tradition, marked by ITSPmagazine''s 8th year as an official media partner with RSAC USA and APJ. And we couldn’t be more excited! This year is going to be filled podcasts, webcasts, and live-streaming conversations with organizers, keynotes, speakers, panelists, and many friends that we are looking forward to reconnecting with!<br />We will have our traditional ITSPmagazine Chats On The Road and a lot of surprises, including the return of Broadcast Alley where we will host 8 hours of on-location conversations - on camera - with a multitude of interesting guests. Plus, many of the ITSPmagazine Podcast Network Hosts are going to be in the Broadcast Alley and on the conference show floor at Moscone Center in San Francisco for this year’s coverage. \n\nJump on board and join us for a event full of incredible people, events, podcasts, webcasts, and all sorts of conversations—all At The Intersection Of Technology, Cybersecurity, and Society.\n','\n',char(10)),NULL,NULL,NULL,NULL,NULL,'d64e6b32-49f3-4fa5-8aa8-17cef8598629',replace('<h5>ITSP Magazine</h5>\n<p>\nCovering the cybersecurity field is a decades-old tradition, marked by ITSPmagazine''s 8th year as an official media partner with RSAC USA and APJ. And we couldn’t be more excited! This year is going to be filled podcasts, webcasts, and live-streaming conversations with organizers, keynotes, speakers, panelists, and many friends that we are looking forward to reconnecting with!\nWe will have our traditional ITSPmagazine Chats On The Road and a lot of surprises, including the return of Broadcast Alley where we will host 8 hours of on-location conversations - on camera - with a multitude of interesting guests. Plus, many of the ITSPmagazine Podcast Network Hosts are going to be in the Broadcast Alley and on the conference show floor at Moscone Center in San Francisco for this year’s coverage.\nJump on board and join us for a event full of incredible people, events, podcasts, webcasts, and all sorts of conversations—all At The Intersection Of Technology, Cybersecurity, and Society.<br>\n</p>\n<h5>Why ITSP Magazine?</h5>\n<p>There Are Many Ways To Promote Your Brand On ITSPmagazine. From Sponsoring Our Stories To Sharing Yours, We Are Confident We Can Help You Promote Your Brand.\nOur job and passion are to create quality content—we’re all about telling good stories that educate businesses, consumers, policymakers, citizens, leaders, parents, educators, students, and the whole of society in a way that makes them think. Our audience is interested in the future of humanity, the role of technology within it, and how we can all contribute to building a better society — and we are sure that they are also interested in learning about your company and your products.\nWe strongly believe that every company has many captivating stories to tell, and we cannot wait to help you tell and share yours with our audience.\nExplore advertising: https://www.itspmagazine.com/advertise\nExplore sponsorship: https://www.itspmagazine.com/sponsor\nNewsletter: https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</p>','\n',char(10)),'https://www.facebook.com/ITSPMagazine/','https://www.twitter.com/ITSPmagazine','https://www.linkedin.com/company/6635023/','');
|
||
INSERT INTO vendors VALUES('2eb804d1-d103-4bf4-bbe8-02e55a31e64c','published','ibm-security','IBM Security','https://www.ibm.com/security','IBM is a leading global hybrid cloud and AI, and business services provider, helping clients in more than 175 countries capitalize on insights from their data, streamline business processes, reduce costs and gain the competitive edge in their industries. All of this is backed by IBM’s legendary commitment to trust, transparency, responsibility, inclusivity, and service. ','1 New Orchard Road ',NULL,'Armonk','NY','USA','42ece35d-ff8f-4b9e-8ac5-ecb41b588bd3',replace('<h5>IBM Security</h5>\n<p>\nIBM is a leading global hybrid cloud and AI, and consulting services provider, helping clients in more than 175 countries capitalize on insights from their data, streamline business processes, reduce costs and gain the competitive edge in their industries. Nearly 3,800 government and corporate entities in critical infrastructure areas such as financial services, telecommunications and healthcare rely on IBM’s hybrid cloud platform and Red Hat OpenShift to affect their digital transformations quickly, efficiently, and securely. IBM’s breakthrough innovations in AI, quantum computing, industry-specific cloud solutions and business services deliver open and flexible options to our clients. All of this is backed by IBM’s legendary commitment to trust, transparency, responsibility, inclusivity, and service.<br>\n</p>','\n',char(10)),'N/A','https://www.twitter.com/IBMSecurity','https://www.linkedin.com/showcase/ibm-security ','');
|
||
INSERT INTO vendors VALUES('248a5ba6-3161-425c-97e7-5987eb529b36','published','invicti','Invicti','www.invicti.com','Invicti is on a mission: application security with zero noise. We provide the most accurate, evidence-based DAST for DevSecOps teams. Attacking like a hacker would, we help teams identify and prioritize vulnerabilities in the web applications that run their organizations.','1000 N Lamar Blvd.','Suite 300','Austin','TX','USA','53cea816-56bd-4544-84af-760f7624cfa8',replace('<h5>Invicti</h5>\n<p>\nInvicti is on a mission: application security with zero noise. We provide the most accurate, evidence-based DAST for DevSecOps teams. Attacking like a hacker would, we help teams identify and prioritize vulnerabilities in the web applications that run their organizations.<br>\n</p>\n<h5>Why Invicti?</h5>\n<p>Invicti delivers appsec with zero noise as it automatically and continuously discovers web assets and scans for vulnerabilities everywhere an organization could be attacked: every website, application, API, and web service – even the virtual servers in their AWS cloud environment. Invicti’s accuracy with verified findings, extensive automation capabilities and faster scanning enable application security testing scale across development and production environments, while alleviating DevOps disruption and greatly reducing risk.</p>','\n',char(10)),'https://www.facebook.com/InvictiSec/','https://www.twitter.com/InvictiSecurity','https://www.linkedin.com/company/invicti-security/','');
|
||
INSERT INTO vendors VALUES('46213444-1c1b-40ef-9be3-36d7729b6fe7','published','infosec-institute','Infosec Institute','www.infosecinstitute.com','Infosec puts people at the center of cybersecurity through role-guided training that’s accessible and engaging. Learn more at infosecinstitute.com.','311 W Washington Ave.',NULL,'Madison','WI','USA','663c9c6e-c4cf-4187-a0cd-5a3e61713e8e',replace('<h5>Infosec Institute</h5>\n<p>\nInfosec’s mission is to put people at the center of cybersecurity. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. More than 70% of the Fortune 500 have relied on Infosec Skills to develop their security talent, and more than 5 million learners worldwide are more cyber-resilient from Infosec IQ’s security awareness training. Learn more at infosecinstitute.com.<br>\n</p>\n<h5>Why Infosec Institute?</h5>\n<p>Infosec’s mission is to put people at the center of cybersecurity. Through role-guided security training, our platforms — Infosec IQ, Infosec Skills and Infosec Skills Live Boot Camps — help individuals and organizations protect their data, mitigate risk and empower employees. From security awareness for your accounting team to secure coding training for your developers, we’ll help you deliver the right security education to protect your employees and organization. </p>','\n',char(10)),'https://www.facebook.com/infosecedu/','https://www.twitter.com/infosecedu','https://www.linkedin.com/company/infosec-institute/mycompany/','');
|
||
INSERT INTO vendors VALUES('85aa70d1-4ffb-4b90-b78a-3b5dfdc2b56b','published','immersive-labs','Immersive Labs','www.immersivelabs.com','Immersive Labs is the leader in people-centric cyber resilience. We help organizations continuously assess, build, and prove their cyber workforce resilience for teams across the entire organization.','200 Berkeley Street ','23rd Floor','Boston','MA','USA','912c37e6-2f82-4078-937e-d942e1c49999',replace('<h5>Immersive Labs</h5>\n<p>\nImmersive Labs is the leader in people-centric cyber resilience. We help organizations continuously assess, build, and prove their cyber workforce resilience for teams across the entire organization, from front-line cybersecurity and development teams to Board-level executives. We provide realistic simulations and hands-on cybersecurity labs to evaluate individual and team capabilities and decision-making against the latest threats. Organizations can now prove their cyber resilience by measuring their readiness compared to industry benchmarks, building team capabilities, and demonstrating risk reduction and compliance with data-backed evidence.\nImmersive Labs is trusted by the world’s largest organizations and governments, including Citi, Pfizer, Daimler, Humana, HSBC, and the UK National Health Service. We are backed by Goldman Sachs Asset Management, Summit Partners, Insight Partners, Citi Ventures, and Menlo Ventures.\nBook a demo: https://www.immersivelabs.com/demo/<br>\n</p>\n<h5>Why Immersive Labs?</h5>\n<p>Organizational Exercises: Stress test crisis decision-making with out-of-the-box scenarios that deliver severe but plausible exercises for your executives, crisis management teams, and the entire workforce. Leverage simulations that reflect how real-life crises unfold, while removing the logistical burdens of in-person exercises - ideal for globally-dispersed teams.\nTechnical Exercises: Exercise your cyber teams'' technical capabilities with task-based simulations that include the full cycle of an attack. Replicate your own environment and use your own tools using custom cyber ranges.\nHands-on Labs: Learn from highly-technical labs that cover all aspects of cybersecurity, including offensive, defensive, cloud, and application security, along with governance, risk, and compliance. Use the latest gamified techniques and master topics from security fundamentals to malware reverse engineering and advanced threat hunting.</p>','\n',char(10)),'https://www.facebook.com/immersivelabsuk/','https://www.twitter.com/immersivelabs','https://www.linkedin.com/company/immersive-labs-limited/','');
|
||
INSERT INTO vendors VALUES('d9ef467a-a1b7-4f15-a008-310786f4c050','published','it-glue','IT Glue','www.itglue.com','IT Glue is your all-in-one IT documentation platform. Document assets, SOPs, passwords, vendors, users, network diagrams and more in one place. Add our robust search and watch your team''s consistency and productivity skyrocket. ','700-128 W Pender Street',NULL,'Vancouver','BC','CAN','59ab1aec-5dd9-479e-9858-7dd2995275c4',replace('<h5>IT Glue</h5>\n<p>\nIT Glue\nIT Glue, a Kaseya company, is the leading provider of simple and secure IT documentation for IT professionals around the globe. Our award-winning, mature documentation solution empowers IT professionals to document applications, devices, passwords and other IT assets centrally and in a standardized manner. This enables critical information to be stored securely and accessed easily by those who need it, whenever they need it. Based in Vancouver, Canada, IT Glue currently has over 13,000 partners in 70+ countries, serving more than 350,000 IT pros daily. For more information, visit itglue.com.\n<br>\n</p>\n<h5>Why IT Glue?</h5>\n<p>Find, track and know everything. Enjoy unmatched efficiencies, transparency and consistency throughout your organization with our award-winning, SOC 2-compliant documentation management platform. IT Glue is the gold standard for IT documentation, because we bring all of your documentation under one roof - assets, passwords, SOPs, photos, network diagrams, users, vendors and more. Everything an IT tech need to do their job more easily in a single pane of glass.\nIT Glue allows you to create links between related assets, so that the information you need is always at your fingertips when you need it. With an array of built-in templates, and tools for importing your existing documentation, we make documentation easy. We love documentation, and you will, too!</p>','\n',char(10)),'https://www.facebook.com/itglue','https://www.twitter.com/itglue','https://www.linkedin.com/company/it-glue/','');
|
||
INSERT INTO vendors VALUES('8d7371af-ad3b-43a2-b9d0-c12937c92c75','published','isc2','(ISC)²','https://www.isc2.org/','ISC2 is an international nonprofit membership association focused on inspiring a safe and secure cyber world. (ISC)2 is best known for the acclaimed CISSP.','1650 King Street','Suite 200','Alexandria','VA','USA','1d6cb867-f04c-477b-b6a3-ff00f98d17c0',replace('<h5>(ISC)²</h5>\n<p>\nISC²\n(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)² offers a portfolio of credentials that are part of a holistic, pragmatic approach to security. Our association of candidates, associates and members, more than 330,000 strong, is made up of certified cyber, information, software and infrastructure security professionals who are making a difference and helping to advance the industry. Our vision is supported by our commitment to educate and reach the general public through our charitable foundation – The Center for Cyber Safety and Education™. For more information on (ISC)², visit www.isc2.org, follow us on Twitter or connect with us on Facebook and LinkedIn.<br>\n</p>\n<h5>Why (ISC)²?</h5>\n<p>ISC² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)² offers a portfolio of credentials that are part of a holistic, pragmatic approach to security. Our association of candidates, associates and members, more than 330,000 strong, is made up of certified cyber, information, software and infrastructure security professionals who are making a difference and helping to advance the industry. Our vision is supported by our commitment to educate and reach the general public through our charitable foundation – The Center for Cyber Safety and Education™.</p>','\n',char(10)),'https://www.facebook.com/isc2fb/','https://www.twitter.com/ISC2','https://www.linkedin.com/company/isc2/','');
|
||
INSERT INTO vendors VALUES('c8012131-321e-4756-82b7-62a9060d363a','published','edgio','Edgio','www.edg.io','Edgio helps companies deliver online experiences and content faster, safer, and with more control. Edgio Security is a complete WAAP solution designed to protect businesses from threats against web applications, user data, and infrastructure. ','1475 N. Scottsdale Rd. ',NULL,'Scottsdale','AZ','USA','5f0c8bd2-e681-4a3d-ba21-590c994a00a7',replace('<h5>Edgio</h5>\n<p>\nEdgio helps companies deliver online experiences and content faster, safer, and with more control. Its global edge network, combined with fully integrated application and media solutions, provide a single platform for the delivery of high-performing, secure web properties and streaming content. Edgio Security is a complete Web Application and API Protection (WAAP) solution designed to protect businesses from the latest threats targeting web applications: user data, and infrastructure. The company’s advanced bot solution shields web properties and APIs from credit card stuffing attacks, account takeovers, web scraping and other automated threats. Backed by one of the world’s largest edge networks, Edgio Security provides a massive defense surface to absorb threats. With Edgio, organizations can defend against even the largest DDoS attacks and safeguard their digital assets. <br>\n</p>\n<h5>Why Edgio?</h5>\n<p>Edgio Security is a complete Web Application and API Protection (WAAP) solution designed to protect businesses from the latest threats targeting web applications, user data, and infrastructure. The company’s advanced bot solution shields web properties and APIs from credit card stuffing attacks, account takeovers, web scraping and other automated threats. Backed by one of the world’s largest edge networks, Edgio Security provides a massive defense surface to absorb threats. With Edgio, organizations can defend against even the largest DDoS attacks and safeguard their digital assets. </p>','\n',char(10)),'https://www.facebook.com/Edgioinc','https://www.twitter.com/edgioinc','https://www.linkedin.com/company/edgio/','');
|
||
INSERT INTO vendors VALUES('17cc3e57-5b47-4ad0-9672-eb023560cb79','published','issa','ISSA','http://www.issa.org','ISSA is the choice for cybersecurity professionals, dedicated to connecting professionals, guiding your career path, managing technology risk, and protecting critical information. Members span all levels of the security field across many industries. ','1964 Gallows Road','Suite 210','Vienna','VA','USA','83764fa3-f817-4b1e-be25-196f08b45c33',replace('<h5>ISSA</h5>\n<p>\nThe Information Systems Security Association (ISSA) is the community of choice for international cyber security professionals dedicated to advancing individual growth, managing technology risk, and protecting critical information and infrastructure. ISSA is dedicated to developing and connecting the global cybersecurity community. ISSA members and award winners include many of the industry’s notable luminaries and represent a broad range of industries – from communications, education, healthcare, manufacturing, financial and consulting to IT – as well as federal, state and local government departments and agencies. Through regional chapter meetings, conferences, networking events and content, members tap into a wealth of shared knowledge and expertise.\nJoin the premier global cyber security professional association today. www.issa.org/join.\nFollow us on Twitter at @ISSAINTL\n<br>\n</p>','\n',char(10)),'https://www.facebook.com/search/top?q=information%20systems%20security%20association%20international...','https://www.twitter.com/ISSAINTL','https://www.linkedin.com/company/information-systems-security-association-issa-/mycompany/','');
|
||
INSERT INTO vendors VALUES('7bddfb3f-8a89-4cac-afb6-5f655afad252','published','ironscales','IRONSCALES','www.ironscales.com','Phishing attacks are the biggest threat your company faces today. Our powerfully simple anti-phishing service is fast to deploy, easy to use and protects you against today’s most dangerous phishing threats','6 Concourse Pkwy.','Suite 1600','Atlanta','GA','USA','d93fc03a-d3aa-4ac7-a7eb-584d29fa9bde',replace('<h5>IRONSCALES</h5>\n<p>\nIRONSCALES is the only complete solution for protecting your enterprise from advanced phishing attacks. Our platform combines AI and human insights to effectively stop attacks like BEC, ATO, and VIP impersonation and incorporates crowdsourced threat intelligence data to continuously improve accuracy. Plus, our platform is simple to use, with integration taking just minutes and no security expertise required for ongoing management. And with its adaptability to both email and emerging collaboration and messaging-based threats, IRONSCALES is the only solution you need to truly address the entirety of the phishing problem.<br>\n</p>\n<h5>Why IRONSCALES?</h5>\n<p>IRONSCALES is the only email security solution that integrates AI and human insights to address 100% of phishing threats, including advanced phishing attacks like BEC, ATO, and VIP impersonation. Our solution is powerful, simple, and adaptable, making it easy to implement, integrate into your tech stack and manage without requiring security expertise. Protect your enterprise with the only solution that truly addresses the entirety of the phishing problem.\n</p>','\n',char(10)),'https://www.facebook.com/ironscalesltd','https://www.twitter.com/IRONSCALES','https://www.linkedin.com/company/ironscales','');
|
||
INSERT INTO vendors VALUES('f954a23a-9b9c-407b-aa86-b01fc1b8334b','published','island','Island','www.island.io','The Island Enterprise Browser, an ideal enterprise workplace, where work flows freely while remaining secure. With the needs of the enterprise embedded in the browser, Island gives organizations control, visibility, and governance over the last mile.','3501 Olympus Blvd. ','Suite 350','Dallas','TX','USA','81e2459e-55c3-4b42-b5d8-bd3bf460bcc3',replace('<h5>Island</h5>\n<p>\nThe modern web browser is the single most commonly used application by enterprises worldwide. Its power, simplicity, and usability makes\nit an essential tool at work. And yet, the browser is not an enterprise application. It lacks the fundamental controls enterprises require to\nensure proper security, visibility, and governance over critical apps and data.\nAs a result, we surround the browser with a massive security ecosystem in an attempt to manage the intersection between users, web\napplications, and the underlying data. In the process, our technology stack becomes complex, expensive, and fragile to maintain, while end\nusers are left with a frustrating experience. All because the consumer browser was not designed with enterprise needs in mind. The\nquestion is: What if there was a browser designed exclusively for the enterprise?<br>\n</p>\n<h5>Why Island?</h5>\n<p>The application enterprises use the most is the browser. In fact, it has become our primary work environment, but the browser we most often use was built for consumers. So, we have surrounded it with an endless, complex and expensive stack that overwhelms your security teams and interrupts end users. But what if the browser was designed for the enterprise? What could that do for security, productivity and work itself? Discover how an enterprise browser can:\n• Protect critical SaaS and internal web applications\n• Streamline and secure third-party contractor access and BYOD strategies\n• Free you from the cost and poor user experience of VDI and DaaS solutions\n• Give you last-mile control to protect users’ activity with critical applications and underlying data\n• Deliver it all in a familiar, Chromium-based application that doesn’t require user training to operate</p>','\n',char(10)),NULL,'https://www.twitter.com/island_io','https://www.linkedin.com/company/island-io/','');
|
||
INSERT INTO vendors VALUES('d419d459-b630-4776-a5d9-9b5b3dd56b1a','published','iapp','IAPP','iapp.org','As the largest and most comprehensive global information privacy community and resource, the International Association of Privacy Professionals helps define, promote and improve the privacy profession globally.','75 Rochester Ave.',NULL,'Portsmouth','NH','USA','a2994ac9-6413-4cd8-a74b-f60c77513ef6',replace('<h5>IAPP</h5>\n<p>\nThe International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. Founded in 2000, the IAPP is a not-for-profit organization that helps define, support and improve the privacy profession globally.<br>\n</p>\n<h5>Why IAPP?</h5>\n<p>The International Association of Privacy Professionals (IAPP) is responsible for developing and launching the only globally recognized credentialing programs in information privacy: the Certified Information Privacy Professional (CIPP), the Certified Information Privacy Manager (CIPM) and the Certified Information Privacy Technologist (CIPT). The CIPP, CIPM and CIPT are the leading privacy certifications for thousands of professionals around the world who serve the data protection, information auditing, information security, legal compliance and/or risk management needs of their organizations. In addition, the IAPP offers a full suite of educational and professional development services and holds annual conferences that are recognized internationally as the leading forums for the discussion and debate of issues related to privacy policy and practice.</p>','\n',char(10)),'https://www.facebook.com/IAPPprivacypros','https://www.twitter.com/PrivacyPros','https://www.linkedin.com/company/iapp---international-association-of-privacy-professionals/','');
|
||
INSERT INTO vendors VALUES('43788a0b-f831-43b6-a277-df91eda495be','published','dark-reading','Dark Reading','https://www.darkreading.com/',NULL,'5 Howick Place',NULL,'London',NULL,NULL,'7defe755-8313-4e4a-8f9f-0d455ba6576d',replace('<h5>Dark Reading</h5>\n<p>\nDark Reading is the most trusted online community for cybersecurity professionals. Our community members include thought-leading security researchers, CISOs, and technology specialists, along with thousands of other security professionals.<br>\n</p>\n<h5>Why Dark Reading?</h5>\n<p>Dark Reading is where enterprise cybersecurity staffers and decision-makers come to learn about new cyber threats, vulnerabilities, and technology trends. It''s where they learn about potential defenses against the latest attacks, and key technologies and practices that may help protect their most sensitive data in the future. It''s where they come to read breaking news, deep-dive news analysis, feature articles, and special reports, as well as attend virtual events and webinars - all to help them embrace new (and big) ideas, find answers to their IT security questions, and solve their most pressing problems.</p>','\n',char(10)),'https://www.facebook.com/darkreadingcom','https://www.twitter.com/DarkReading','https://www.linkedin.com/company/dark-reading/','');
|
||
INSERT INTO vendors VALUES('bdd8d69c-4bd9-4bde-aa98-cc7936af89db','published','edgescan','Edgescan','http://www.edgescan.com','Edgescan is an integrated platform that unifies all required security solutions into a single platform: pen testing as a service (PTAs), vulnerability management, application security testing, attack surface management & API security testing. ','33 West 60th ','Floor 2','New York','NY','USA','a4c17c0f-297d-4e05-b1f7-edbb8a8310cd',replace('<h5>Edgescan</h5>\n<p>\nEdgescan simplifies Vulnerability Management (VM) by delivering a single full-stack solution (SaaS) integrated with world-class security professionals. Instead of managing a plethora of point scanning tools for each layer of the attack surface and squandering precious staff resources tasked with manually removing false positives, Edgescan offers automated and accurate contextualised alerts across the entire attack surface on one single dashboard of truth. A team of experienced pen testers is available on-demand to validate all results and support your Operations team to ensure timely remediation. We call this Smart VM.<br>\n</p>\n<h5>Why Edgescan?</h5>\n<p>Edgescan is the first integrated full-stack cybersecurity platform that unifies all required security solutions into one single combative platform. \nEdgescan’s integrated platform reduces the complexity and overhead associated with tool proliferation, speeds up remediation, cuts operational costs, while reducing risk associated with digital transformation and cloud deployments. \nThe platform provides five full-featured cybersecurity solutions that: \nPrevents tool sprawl and associated costs by integrating with existing tools and workflows.\nProvides unique intelligence only offered by a hybrid solution (automation/analytics + human intellect).\nExposes weaknesses and risk across your entire attack surface and ecosystem.\nEliminates the noise of false positives to allow developers to focus on what matters.\nReduces costs and overhead for pen testing and vulnerability management by 60%.\nImproves cybersecurity posture and resilience by reducing red team success speed by 400% </p>','\n',char(10)),NULL,'https://www.twitter.com/edgescan','https://www.linkedin.com/company/edgescan','');
|
||
INSERT INTO vendors VALUES('5f8d7d0c-72c0-4777-8f6c-8bc52376b62c','published','extrahop','ExtraHop','https://www.extrahop.com/','ExtraHop is the cybersecurity partner enterprises trust to reveal the unknown and unmask the truth. The company’s Reveal (x) 360 platform is the only network detection and response platform that delivers the 360-degree visibility needed to uncover the cybertruth. With full network transparency with ExtraHop, organizations see more, know more and stop more cyber attacks.','520 Pike Street ','Suite 1600','Seattle','WA','USA','a1061f85-4a2d-43cc-82de-9afa8eef7e4b',replace('<h5>ExtraHop</h5>\n<p>\nExtraHop is on a mission to stop advanced threats with security that can’t be undermined, outsmarted, or compromised. Our dynamic cyber defense platform, Reveal(x) 360, helps organizations detect and respond to advanced threats––before they compromise your business. We apply cloud-scale AI to petabytes of traffic per day, performing line-rate decryption and behavioral analysis across all infrastructure, workloads, and data-in-flight. With complete visibility from ExtraHop, organizations can detect malicious behavior, hunt advanced threats, and forensically investigate incidents with confidence. When you don’t have to choose between protecting your business and moving it forward, that’s security uncompromised.<br>\n</p>\n<h5>Why ExtraHop?</h5>\n<p>ExtraHop Reveal(x) 360\nUnify your hybrid and multicloud security with ExtraHop Reveal(x) 360, SaaS-based network detection and response. Eliminate the complexity and friction of deploying agents. Gain a full understanding of your hybrid estate with automatic asset discovery, classification, and mapping. Identify advanced threats other tools miss with AI-powered detections that evolve with your environment. Go from high-fidelity alerts to actionable information with investigations that can be completed in clicks, so you can respond quickly to stop attacks before they become breaches.\nExtraHop Reveal(x) 360 enables:\nAdvanced Threat Detection\nAutomated Retroactive Detection\nIntrusion Detection (IDS)\nAccess to 90-Day Cloud Record Store\nForensic investigation\nSecure Cloud Migration\nFor more information, visit Booth 6155 during RSAC or go to extrahop.com/products/cloud.\n</p>','\n',char(10)),'https://www.facebook.com/extrahop/','https://www.twitter.com/extrahop','https://www.linkedin.com/company/extrahop-networks/','');
|
||
INSERT INTO vendors VALUES('73cf37c5-d743-4c70-9a3b-4fbeb2cabe05','published','emagine-it','Emagine IT','http://www.eit2.com/',replace('Emagine IT is an automation-obsessed third-party assessment organization (3PAO) focused on eliminating our client’s cybersecurity obstacles and turning their compliance into a competitive advantage. Ask us about FedRAMP, HITRUST, SOC, and more.\n','\n',char(10)),'909 Rose Avenue','Suite 900','North Bethesda','MD','USA','1be6b2a3-94b9-4c4d-86ad-0b957c3d66e5',replace('<h5>Emagine IT</h5>\n<p>\nFounded in 2002, Emagine IT (EIT) provides cybersecurity, management consulting, and enterprise IT services to commercial organizations and government agencies to securely modernize their IT assets. As a A2LA-accredited FedRAMP 3PAO, EIT is authorized to conduct independent security risk assessments for Cloud Service Providers (CSP) and deliver FedRAMP consulting services to strengthen our customers'' risk posture and mitigate risk to their federal and commercial partners. EIT''s 3PAO services provide multiple levels of security services to CSP''s seeking FedRAMP, StateRAMP, HITRUST, CMMC, SOC, and CMMC compliance. As security and compliance standards continue to expand in scope and significance, EIT is positioned as an automation-obsessed industry leader to advise and support your compliance needs with our various engagement models including FedRAMP Assessments, Readiness Assessments, Gap Assessments, Strategic Workshops, Advisory Services, Penetration Testing, and Threat Emulation. <br>\n</p>\n<h5>Why Emagine IT?</h5>\n<p>Have your customers been asking you for security and compliance certifications such as FedRAMP, HITRUST, ISO, or SOC? EIT provides end-to-end advisory and assessment services to organizations positioning themselves to remain competitive in whatever market they serve. Our team sets ourselves apart by adopting automation to make preparing and assessing your organization and systems faster, better, and less costly than the alternative. </p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/emagine-it-inc-/','');
|
||
INSERT INTO vendors VALUES('0875c165-8779-46a3-876b-5f21ec44ad8f','published','encore','Encore','www.encore.io','Encore provides visibility of your entire attack surface by giving both an INTERNAL AND EXTERNAL view of risk.','St Cloud Gate','Saint-Cloud Way','Maidenhead',NULL,'GBR','00fb6a3e-f393-4b85-a7a0-221e8a9024d1',replace('<h5>Encore</h5>\n<p>\nWith more than 25 years experience providing professional services and cyber security consulting for the largest companies in the world, we brought this knowledge to Encore, leader in CAASM and EASM. Our team is comprised of offensive security experts and security engineers and consultants that know the mindset and tooling of the attackers, the internal operational obstacles, challenges faced by security management and how to get the most out of security tooling.\nEncore visualises information that can be confusing and often overwhelming, providing accurate and action-based reporting and visibility across numerous security controls, through one secure portal.<br>\nFor more information, or to get in touch, visit our website: https://www.encore.io<br>\n</p>\n<h5>Why Encore?</h5>\n<p>Encore provides a comprehensive Attack Surface Management (ASM) solution that helps organisations to manage their cybersecurity risks. Our ASM solution uniquely includes both External Attack Surface Management (EASM) and Cyber Asset Attack Surface Management (CAASM) to provide a holistic view of a company’s security posture. Our ASM solution helps organisations to identify, prioritise and remediate security risks across their entire attack surface, externally and internally, providing a more comprehensive and complete picture than having two separate solutions. As IT environments have grown more complex, while at the same time attackers have become more sophisticated, it has become increasingly difficult for security teams identify all the potential gaps across their attack surface. With Encore, security teams to proactively eliminate gaps before they are ever exploited, which greatly reduces the risk of a successful cyber attack and helps them protect their critical assets and data.</p>','\n',char(10)),NULL,'https://www.twitter.com/encore_security','https://www.linkedin.com/company/cyberlumeneer-encore','');
|
||
INSERT INTO vendors VALUES('110036fe-6652-4799-a42c-850eaaea75a6','published','ermetic','Ermetic','ermetic.com','Ermetic is a unified, identity-first cloud infrastructure security platform that automates asset discovery, risk analysis, runtime threat detection and compliance, and drives remediation and least privilege at scale, greatly reducing risk.','144 Menachem Begin St.','EY building, 7th floor','Tel Aviv',NULL,'ISR','a57aa715-3634-49b5-b19b-e589e5525c12',replace('<h5>Ermetic</h5>\n<p>\nErmetic is a unified, identity-first cloud infrastructure security platform that automates asset discovery, risk analysis, runtime threat detection and compliance, and drives remediation and least privilege at scale, greatly reducing risk.<br>\n</p>','\n',char(10)),'https://www.facebook.com/ermeticsec','https://www.twitter.com/ErmeticSec','https://www.linkedin.com/company/ermetic','');
|
||
INSERT INTO vendors VALUES('970f657d-9602-4652-a867-0f7ab1efb36b','published','eshard','eShard','www.eshard.com','We are an IT Security company with a strong expertise in Security Testing hands-on : IC Security (cryptography, side-channel, fault injection), Mobile Application Security Testing, and System security (Linux & Windows) with Timeless dynamic analysis.','11 Avenue de Canteranne ','Immeuble Gienah','Pessac',NULL,'FRA','e4db2d94-ac31-4fc9-b24d-0fc685c9f396',replace('<h5>eShard</h5>\n<p>\nWith a strong expertise in mobile and embedded software security, cryptography, and hardware fault injection, eShard offers innovative solutions to scale security testing for connected and mobile devices.\nDedicated to promote a more secure world in a growing connected and mobile environment, eShard provides cutting-edge security tools, security/technical consultancy services and mobile application security enhancement:\nesDynamic: Built to increase your efficiency and magnify your expertise, esDynamic is a system designed to provide experts with an efficient and flexible data science platform.\nesReven: Our Reverse Engineering engine allows Timeless dynamic analysis for Vulnerability and Malware Analysis to empower your experts for getting ahead of security analyses.\nesChecker: Relying on on a unique “record and replay” technology, our MAST tool performs testing in real conditions on Android/iOS mobile apps’ binary to watch out for both code vulnerabilities AND resiliency to attacks. <br>\n</p>\n<h5>Why eShard?</h5>\n<p>Cyber testing solution for chips :\nAllows to evaluate and improve the resistance of chips (military, payment, connected objects or IoT) to physical attacks. This concerns the most critical layers of the systems (cryptographic algorithms or the bootloader).\nCyber testing solution for mobile applications :\nDynamic SaaS tool for analyzing the binary code of mobile applications. Allows to test an Android or iOS application. The mobile application is automatically executed by the platform on malicious phones. The objective is to validate that the application reacts well in case of attacks. The "Record and Replay" functionality is unique. This product brings confidence in the digitalization of services.\nCyber testing solution for Windows or Linux systems :\nThis is a vulnerability analysis solution for Windows / Linux systems. It is a state-of-the-art tool for digital trust deep inside systems. It is aimed at government agencies or large technology players. </p>','\n',char(10)),'https://www.facebook.com/eshard.solutions','https://www.twitter.com/eshard?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor','https://www.linkedin.com/company/eshard/mycompany/','');
|
||
INSERT INTO vendors VALUES('c1432b94-59ec-479c-b340-db59ed32ddd7','published','eset','ESET','http://www.eset.com/us/','Prevent breaches with ESET. Protect your endpoints, business data and users with ESET''s multilayered technology. ESET PROTECT platform offers customizable security solutions, managed easily from a cloud or on‑prem console.','610 West Ash Street','Suite 1700','San Diego','CA','USA','155266b1-976e-44f3-887f-6b8eb3981dbb',replace('<h5>ESET</h5>\n<p>\nFor more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure and consumers worldwide from increasingly sophisticated digital threats. From endpoint and mobile security to endpoint detection and response, as well as encryption and multifactor authentication, ESET’s high-performing, easy-to-use solutions unobtrusively protect and monitor 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company that enables the safe use of technology. This is backed by ESET’s R&D centers worldwide, working in support of our shared future. For more information, visit www.eset.com or follow us on LinkedIn, Facebook, and Twitter.<br>\n</p>\n<h5>Why ESET?</h5>\n<p>ESET PROTECT Platform is a modern, balanced security ecosystem. It is based on the technological superiority of LiveSense, ESET’s multilayered technologies built on 30 years of human expertise, cybersecurity-focused machine learning and ESET LiveGrid, our global, cloud-based reputation tool.\nESET PROTECT Platform integrates balanced breach prevention, detection and response capabilities, complemented by ESET managed & professional services, and threat intelligence. It is simple, modular, adaptable, and continuously innovated – always with the benefit of ESET customers in mind.\nESET PROTECT Platform protects all your business environment - endpoints, servers, mobiles, cloud applications, mail and SharePoint environments - across all operating systems, with trademark uniquely balanced protection, robust and simple-to-use architecture, and freedom of choice for cloud or on-prem deployment according to your choice.</p>','\n',char(10)),'https://www.facebook.com/eset','https://www.twitter.com/ESET','https://www.linkedin.com/company/esetnorthamerica/','');
|
||
INSERT INTO vendors VALUES('ddf3cfd0-9978-43bb-af5e-997da392fa5a','published','exabeam','Exabeam','www.exabeam.com','Exabeam is a global cybersecurity leader that created New-Scale SIEMTM for advancing security operations. Learn more at www.exabeam.com.','1051 E. Hillsdale Blvd. ','4th Floor','Foster City','CA','USA','455bd0e1-4629-4767-b767-8744d182ea40',replace('<h5>Exabeam</h5>\n<p>\nExabeam is a global cybersecurity leader that created New-Scale SIEMTM for advancing security operations. Built for security people by security people, we reduce business risk and elevate human performance. The powerful combination of our cloud-scale security log management, behavioral analytics, and automated investigation experience gives security operations an unprecedented advantage over adversaries including insider threats, nation states, and other cyber criminals. We Detect the UndetectableTM by understanding normal behavior, even as normal keeps changing – giving security operations teams a holistic view of incidents for faster, more complete response. Learn more at www.exabeam.com.\n<br>\n</p>\n<h5>Why Exabeam?</h5>\n<p>How does this product(s) solve a specific problem?\nToday’s breaches are rooted in compromised credentials, and legacy SIEMs cannot keep up. Exabeam addresses these challenges with cloud-scale security log management, behavioral analytics, and automated investigation experience, allowing security operations to detect credential-based attacks.\nWhy is this product(s) better than other similar products?\nAs a SIEM Gartner MQ leader, Exabeam continues to innovate with the launch of New-Scale SIEM. Exabeam provides an advanced cloud-native solution to ingest, parse, store, and search log data at scale.\nWith over 750+ behavioral models, powerful behavioral analytics allow analysts to baseline normal behavior and identify abnormal activity across users and devices.\nWhat benefit does it offer to potential customers?\n- Speed & Scale, Context and Enrichment and an Open and Extensible Platform. </p>','\n',char(10)),NULL,'https://www.twitter.com/exabeam','https://www.linkedin.com/company/exabeam/','');
|
||
INSERT INTO vendors VALUES('b69996cc-0c87-4040-8085-529cb63c1cad','published','entrust','Entrust','www.entrust.com','Entrust keeps the world moving safely by enabling trusted experiences for identities, payments, and digital infrastructure. We offer an unmatched breadth of solutions that are critical to enabling trust for multi-cloud deployments, mobile identities, hybrid work, machine identity, electronic signatures, encryption, and more. ','1187 Park Pl',NULL,'Minneapolis','MN','USA','d110df9c-6ad3-45ca-aa6c-2ecaec5a8d3c',replace('<h5>Entrust</h5>\n<p>\nEntrust keeps the world moving safely by enabling trusted experiences for identities, payments, and digital infrastructure. We offer an unmatched breadth of solutions that are critical to enabling trust for multi-cloud deployments, mobile identities, hybrid work, machine identity, electronic signatures, encryption, and more. With more than 2,800 colleagues, a network of global partners, and customers in over 150 countries, it’s no wonder the world’s most entrusted organizations trust us. <br>\n</p>\n<h5>Why Entrust?</h5>\n<p>Entrust helps organizations look at their IT security practices through a zero trust lens, securing on-premises and multi-cloud environments – from data and machines, to users and communications – ensuring trusted identities and secure transactions, creating confidence in their security posture today, but also in a Post Quantum future. With over 26 years of deep cryptographic expertise, a broad portfolio of certified products, services and solutions, flexible delivery models, and out of the box integrations with leading solution providers, Entrust delivers end-to-end digital security solutions to meet every customer requirement.</p>','\n',char(10)),'https://www.facebook.com/DiscoverEntrust','https://www.twitter.com/Entrust_Corp','https://www.linkedin.com/company/entrust','');
|
||
INSERT INTO vendors VALUES('54bb69da-9dbe-45c1-bdb2-3380f84eca64','published','txone-networks','TXOne Networks','https://www.txone.com','ICS vulnerabilities are highly targeted & cyber-attacks spread fast - disrupting production, damaging assets & putting lives at risk. TXOne provides OT-focused cybersecurity solutions to protect environments at both the endpoint and network levels.','225 E. John Carpenter Fwy ','Suite 450 ','Irving','TX','USA','ac22e068-08dc-4449-9662-be4d513457ca',replace('<h5>TXOne Networks</h5>\n<p>\nTXOne Networks is singularly devoted to maintaining the reliability, availability, and safety of Operational Technology (OT) environments. By integrating with existing business processes, TXOne delivers outstanding security without interrupting operations. To achieve this, TXOne leverages its deep domain knowledge and strong industry partnerships to understand the nuances of OT/ICS devices. Working directly with semiconductor fabricators and device manufacturers, TXOne’s solutions operate as integrated parts of OT environments.\nFounded with OT priorities front of mind, TXOne operates as a business outcome enabler. With solutions that streamline regulatory compliance tasks, remove legacy software risks, reinforce operational stability, and protect systems from interference and security incidents, TXOne becomes a partner in OT business process optimization. <br>\n</p>\n<h5>Why TXOne Networks?</h5>\n<p>Network Defense: TXOne Networks'' Edge Series introduces greater stability and resilience across OT networks. Segment the network into productivity-based zones and shield vulnerable assets at the network level to improve defenses, streamline oversight, and prevent cyber incidents.\nTXOne Networks'' Stellar endpoint protection integrates with individual devices, becoming a native extension to its base functionalities. With incredible performance and accuracy, Stellar defends modern and legacy devices by actively preventing unauthorized changes to its baseline operations at an application and process level without interrupting normal operations.\nSecurity Inspection: TXOne Networks'' Element delivers a portable, software-free, USB security scanner that can inspect new equipment before moving it to production, perform regular audit and inventory management functions, and provide advanced security for air-gapped and isolated devices. </p>','\n',char(10)),NULL,'https://www.twitter.com/TXOneNetworks','https://www.linkedin.com/company/txone-networks','');
|
||
INSERT INTO vendors VALUES('a41415cf-c10c-43c5-b113-8f9f3dab423e','published','egress','Egress','www.egress.com','Egress makes digital communication safer for everyone. As advanced and persistent cybersecurity threats continue to evolve, Egress''s Intelligent Cloud Email Security suite uses patented self-learning technology to detect sophisticated inbound and outbound threats.','148 Lafayette Street','Floor 4,','New York','NY','USA','f87d1ffa-acc6-493f-afdf-437a85d4099b',replace('<h5>Egress</h5>\n<p>\nEgress makes digital communication safer for everyone. As advanced and persistent cybersecurity threats continue to evolve, Egress''s Intelligent Cloud Email Security suite uses patented self-learning technology to detect sophisticated inbound and outbound threats.<br>\n</p>\n<h5>Why Egress?</h5>\n<p>Egress’s Intelligent Cloud Email Security suite uses patented self-learning technology to detect both sophisticated inbound threats and outbound data loss.\nEgress Defend detects and defends against advanced phishing attacks.\nEgress Prevent prevents human error and data exfiltration.\nEgress Protect sends and receives encrypted email.\nEgress'' contextual machine learning detects advanced inbound and outbound threats that Microsoft and secure email gateways (SEGs) miss, while also transforming employee education using real-time teachable moments. Interactive heat-based warning banners and prompts offer a clear explanation of risk at the exact moment people need it most, sustainably reducing risk and correcting risky behaviors before security incidents occur.\nEgress provides a single holistic view of data and trends for both inbound and outbound email security, delivering immediate time to value when protecting against human activated risk.</p>','\n',char(10)),'https://www.facebook.com/EgressSoftware/','https://www.twitter.com/EgressSoftware','https://www.linkedin.com/company/egress-software','');
|
||
INSERT INTO vendors VALUES('af62f682-3d87-4764-91d3-21918f332704','published','thales','Thales','https://cpl.thalesgroup.com/','As the global leader in data security, Thales helps the most trusted brands and organizations around the world protect their most sensitive data and software, secure the cloud, provide seamless digital experiences, and achieve compliance through our industry-leading data encryption, identity and access management, and software licensing solutions.','Arboretum Plaza II, 9442 Capital of Texas Highway North','Suite 400','Austin','TX','USA','bdb13445-a54c-4d8d-97e4-bc7c1643df45',replace('<h5>Thales</h5>\n<p>\nToday’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across network. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day. We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Security professionals rely on Thales Cloud Protection & Licensing to confidently accelerate their organization’s digital transformation.<br>\n</p>','\n',char(10)),'https://www.facebook.com/ThalesCloudSec','https://www.twitter.com/ThalesCloudSec','https://www.linkedin.com/company/thalescloudsec/','');
|
||
INSERT INTO vendors VALUES('520056b8-8cc0-49d7-973c-d579b5ccc951','published','tenable','Tenable','https://www.tenable.com/','Tenable® is the Exposure Management company. Approximately 40,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Learn more at tenable.com.','6100 Merriweather Drive','12th Floor','Columbia','MD','USA','a92caff5-4d81-4aca-a23a-f7beea40db35',replace('<h5>Tenable</h5>\n<p>\nTenable® is the Exposure Management company. Approximately 40,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include approximately 60 percent of the Fortune 500, approximately 40 percent of the Global 2000, and large government agencies. Learn more at tenable.com.<br>\n</p>','\n',char(10)),'https://www.facebook.com/Tenable.Inc/','https://www.twitter.com/@TenableSecurity','https://www.linkedin.com/company/tenableinc','');
|
||
INSERT INTO vendors VALUES('f98f4cd9-ac53-4b1c-8259-034f889ded33','published','threatlocker','ThreatLocker','www.ThreatLocker.com','ThreatLocker® improves enterprise-level server and endpoint security with zero trust controls, including Allowlisting, Ringfencing™, Elevation, Storage, Network Control, Configuration Management, and Operational Alert solutions. ','1950 Maitland Summit Boulevard','4th Floor','Orlando','FL','USA','5f6fe45b-6296-46b0-88be-a6d11f157ab8',replace('<h5>ThreatLocker</h5>\n<p>\nThreatLocker® improves enterprise-level server and endpoint security improves enterprise-level server and endpoint security by blocking exploits of known and unknown application vulnerabilities with zero trust controls.\nThe platform includes Allowlisting, Ringfencing™, Elevation Control, Storage Control, Network Control, Configuration Management, and Operational Alert solutions, to give you kernel level granular control over what is allowed to run, interact, or be accessed in your environments.<br>\n</p>\n<h5>Why ThreatLocker?</h5>\n<p>Stop ransomware with zero trust endpoint security controls. ThreatLocker offers kernel level, granular controls through Allowlisting, Ringfencing, Elevation Control, Storage Control, Network Control, Configuration Management, ThreatLocker Ops and Community solutions. Our Cyber Hero Team is available 24/7/365 from our Orlando, Florida headquarters to provide support needed to make a zero trust posture possible and successful for your organization.</p>','\n',char(10)),'https://www.facebook.com/thethreatlocker','https://www.twitter.com/ThreatLocker','https://www.linkedin.com/company/threatlockerinc/','');
|
||
INSERT INTO vendors VALUES('1c79c889-5c48-4e93-a538-02b56ca8c406','published','tehtris','TEHTRIS','https://tehtris.com','TEHTRIS is a global leader in the automatic neutralization of known and unknown digital attacks in real time, without human action, thanks to TEHTRIS XDR Platform, a "Security & Ethics by design" engineering and holistic solution.','13-15 Rue Taitbout ','Batiment SIRAH','Paris',NULL,'FRA','81cddd7b-3a9c-4a0d-b113-efb8d041ed08',replace('<h5>TEHTRIS</h5>\n<p>\nTEHTRIS, founded in 2010, is the publisher of the TEHTRIS XDR Platform, a global leader in the automatic neutralization of cyber attacks without human action. Deployed in 120 countries, this hyperautomated anti-missile protects companies, from small businesses to large corporations, as well as government agencies, from ransomware-type cyber threats. TEHTRIS'' ambition is to become a world leader in the publishing of cybersecurity solutions and to build a true digital autonomy thanks to its technology, in the service of a cyber peace in the world. After an initial fundraising of €20 million in late 2020, TEHTRIS raised €44 million in October 2022 to support this ambition and accelerate its international deployment. <br>\n</p>\n<h5>Why TEHTRIS?</h5>\n<p>Companies count with an average of 46 security products so, how to unify and coordinate the information for an efficient cyber security management? First, adopt a solution like TEHTRIS XDR Platform with a strong interoperability to integrate it easily in your system, it''s plug and play.\nThen, get a global vision of your IS with a unified console, close collaboration between your teams and hyperautomate your responses to neutralize attacks 24/7 for an exhaustive coverage.\nTEHTRIS XDR Platform unifies your cybersecurity solutions and your access control and identity management tools. A 360° vision in one automated console. A library of available APIs and connectors links your solutions to the XDR Platform. All metrics, alerts and events go back into the XDR for a holistic view of your IT assets.\nHow important is the confidentiality of your data? Our singularity is to design our products to not have access to your files and to protect your company from industrial espionage.\n</p>','\n',char(10)),NULL,'https://www.twitter.com/tehtris','https://www.linkedin.com/company/tehtris/mycompany/verification/','');
|
||
INSERT INTO vendors VALUES('bd3e3366-4761-41cf-88d6-115ce7271abe','published','tines','Tines','https://www.tines.com',replace('The best companies trust Tines to manage their mission-critical workflows, automatically responding and remediating alerts. Tines integrates with any REST API or web application to fuse data from multiple locations into a single workflow.\n','\n',char(10)),'1 Lincoln Street',NULL,'Boston','MA','USA','341500f8-6c6a-47b1-ae5d-947cc09e37f2',replace('<h5>Tines</h5>\n<p>\nTines is no-code automation for security teams. The world''s best companies — from startups to the Fortune 10 – trust Tines to powerfully manage their mission-critical workflows, automatically responding to and remediating alerts in real time. Securely built by security practitioners, Tines integrates with any REST API or web application to fuse data from multiple locations into a single workflow. The company first launched in 2018, and its current customers include Coinbase, Databricks, Canva, McKesson, and OpenTable.\n<br>\n</p>\n<h5>Why Tines?</h5>\n<p>Built by security practitioners frustrated with the state of play, Tines enables teams to create workflows that automate these processes without scripts or code. This no-code approach means they don’t need coding skills to integrate their tech stack or customize their automation.\nUsing a familiar formula language, they can easily manipulate data flowing through the seven Action types to facilitate highly complex workflows in a straightforward, frictionless UI. Tines reduces the burden on teams to manage alerts, internal requests, external reports, and regularly scheduled events.</p>','\n',char(10)),NULL,'https://www.twitter.com/tines_io','https://www.linkedin.com/company/tines-io/','');
|
||
INSERT INTO vendors VALUES('991cac91-fb21-4cd8-b6b6-018e196730a9','published','teleport','Teleport','goteleport.com','Identity-Native Infrastructure Access for engineers and machines.','1611 Telegraph Ave.','14th Floor','Oakland','CA','USA','19bba364-71a0-410c-b9a5-69b38c133d43',replace('<h5>Teleport</h5>\n<p>\nTeleport is the first identity-native infrastructure access platform for engineers and machines. By replacing insecure secrets like passwords, keys and tokens with true identity based on biometrics and security modules, Teleport delivers phishing-proof zero trust for every engineer and service connected to your global infrastructure. The open-source Teleport Access Platform consolidates connectivity, authentication, authorization and audit into a single source of truth for access policy across your entire infrastructure while delivering a frictionless developer experience. Teleport replaces VPNs, shared credentials, secrets vaults and legacy PAM solutions, improving security and engineering productivity.<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/goteleport','https://www.linkedin.com/company/go-teleport/mycompany/','');
|
||
INSERT INTO vendors VALUES('e26fd976-0180-4de1-a0bd-2873f9319a18','published','threatbook','ThreatBook','www.threatbook.cn','ThreatBook, founded in 2015, is an innovative cybersecurity provider in the digital era, continually delivering precise, efficient and intelligent solutions of cyberthreat detection and response. ','4F Yingzhi Plaza','No.49-3 Suzhoujie St, Haidain District','Beijing',NULL,'CHN','0aa66fd9-7aa0-42c1-8e0d-279619ad9f03',replace('<h5>ThreatBook</h5>\n<p>\nThreatBook, leading provider of threat detection and response. With the capabilities of leading threat intelligence, powerful vulnerability intelligence and comprehensive detection engines, ThreatBook provides full-stack threat detection, response and protection products and services on cloud, traffic and endpoints to help enterprises resolve attack-defense challenges and secure digital development. ThreatBook, secure the digital world. For more information, visit www.threatbook.cn.\nThreatBook has been named on the Cybersecurity 500 list from 2017 to 2019, is the only Chinese vendor listed in Gartner''s Market Guide for Security Threat Intelligence Products and Services 4 consecutive times. With ThreatBook, customers in industries such as energy, finance, intelligent manufacturing and internet, benefit from the next generation of security solutions.<br>\n</p>\n<h5>Why ThreatBook?</h5>\n<p>ThreatBook CTI, provides an open intelligence search and intelligence cloud API services dedicated to helping the security operations team to work more efficiently. Using ThreaBook''s 99.9% high-fidelity threat intelligence to help enterprises do compromise detection, alarm noise reduction, and focus on finding the real threat.\nThreat Detection Platform (TDP) is a network detection and response platform with TI inside which can automatically detect, analyze, de-noise and response to the most complex threats. Delivering an all-in-one network security solution to SecOps team.</p>','\n',char(10)),'https://www.facebook.com/Threatbooklabs','https://www.twitter.com/ThreatBookLabs','https://www.linkedin.com/company/threatbook/','');
|
||
INSERT INTO vendors VALUES('f7a11ba5-d0ad-4520-9201-8ec661362f82','published','telesign','Telesign','www.TeleSign.com','Telesign connects, protects, and defends companies, customers, and the digital interactions between them. With powerful AI that delivers identity with speed, accuracy, and global reach, we enable Continuous Trust. Learn more at www.telesign.com','13724 Fiji Way ','Suite 600','Marina Del Rey','CA','USA','a2322709-ca62-4a41-af8d-daa34df1ec7c',replace('<h5>Telesign</h5>\n<p>\nTelesign provides continuous trust to leading global enterprises by connecting, protecting, and defending their customers'' digital identities. Telesign verifies over five billion unique phone numbers a month, representing half of the world’s mobile users, and provides critical insight into the remaining billions. The company’s powerful AI and extensive data science deliver identity with a unique combination of speed, accuracy, and global reach. Telesign solutions prevent fraud, secure communications, and enable the digital economy by allowing companies and customers to engage with confidence. Learn more at www.telesign.com and follow us on Twitter at @Telesign.<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/Telesign','https://www.linkedin.com/company/telesign','');
|
||
INSERT INTO vendors VALUES('ea95f932-0380-412b-ae8e-620541641e46','published','teksystems-risk-and-security-services','TEKsystems | Risk & Security Services','https://www.teksystems.com/en/cyber-risk-security','You’ve got big plans. Let’s protect them. TEKsystems brings strategic advisory and custom solutions to help you protect your data and cultivate resiliency—without disrupting operations or stunting innovation.','7437 Race Road',NULL,'Hanover','MD','USA','42978b9f-093d-4156-8015-abf07d2223be',replace('<h5>TEKsystems | Risk & Security Services</h5>\n<p>\nTEKsystems brings tactical security services in identity, cybersecurity operations, privacy and compliance to enable, transform and evolve your business. Rooted in a security-first mindset, holistic approach and deep understanding of your unique business challenges, our tailored solutions unlock real, sustainable results today and keep you poised to adapt for the future. Leverage our experience in public and private sectors to fuel digital transformation while safeguarding your data, people, product, brand and ability to deliver to customers.<br>\n</p>\n<h5>Why TEKsystems | Risk & Security Services?</h5>\n<p>Identity: We make sure the right people in your company have secure access to the right data at the right time by managing access to privileged information and intellectual property. From advising on strategy to implementation, we help you carry out application onboarding and certification, privileged access management, and support and operations. Cybersecurity Operations: We help you build a strong defense by securing and monitoring your cloud and infrastructure to prevent, detect, monitor, and respond to threats. From Tier 1-3 security incident resolution to threat analysis and tool optimization—we’ve got you covered. Privacy & Compliance: We keep your data secure by proactively integrating identity and zero trust capabilities into compliance and security standards across infrastructure, cloud and data sources. From risk assessments and privacy programs to compliance management and third-party risk, we uplift your security posture to help you reduce risk and protect your brand.</p>','\n',char(10)),'https://www.facebook.com/teksystems/','https://www.twitter.com/TEKsystems','https://www.linkedin.com/company/teksystems/','');
|
||
INSERT INTO vendors VALUES('9eb25d0b-4e03-485e-9d07-b05a50d4ec3c','published','the-cyberwire','The CyberWire','https://thecyberwire.com/',NULL,'8110 Maple Lawn Blvd. ','Suite 200','Fulton','MD','USA','8fe897ac-0ac9-4933-8ed5-35e62e17fbfc',replace('<h5>The CyberWire</h5>\n<p>\nThe CyberWire, part of N2K Networks, gets people up to speed quickly on cybersecurity, and helps keep them a step ahead in a continually changing world. Situational awareness, continuing education, and professional development are the cornerstones of our programs. The CyberWire has long been trusted by many of the most influential leaders and professionals in both the public and private sectors, around the world. We separate the signal from the noise. Learn more about our podcasts and newsletter at https://thecyberwire.com/.<br>\n</p>\n<h5>Why The CyberWire?</h5>\n<p>The CyberWire podcast network delivers are clear and concise summaries of the news and offer commentary from industry experts and partners. Our network includes the following shows: CyberWire Daily, Hacking Humans, Caveat, Career Notes, Word Notes, CISA Cybersecurity Alerts, CSO Perspectives, Research Saturday, SpyCast, The Retail & Hospitality ISAC Podcast, & more.\nOur briefings distill the cybersecurity news of the day to meet the needs of our busy, influential audience. Our briefings include the following: Daily Briefing, Week that Was, Business Briefing, Policy Briefing, Disinformation Briefing, Creating Connections, Signals & Space, & more!</p>','\n',char(10)),'https://www.facebook.com/thecyberwire','https://www.twitter.com/thecyberwire','https://www.linkedin.com/company/the-cyberwire/','');
|
||
INSERT INTO vendors VALUES('41ffe0c3-aa32-44c2-8142-3074d8572ed8','published','theom','Theom','www.theom.ai','Theom secures Saas/PaaS data lakes, warehouses, cloud object stores, and databases (including Snowflake, Databricks, Azure, and AWS). Theom detects active threats by applying the MITRE ATT&CK framework and stops attacks using existing security.','355 Bryant Street ','Suite 403','San Francisco','CA','USA','173a3fd8-bd17-4c77-98ea-336b8811828e',replace('<h5>Theom</h5>\n<p>\nTheom is the first security product that detects active threats to data and prevents breaches from SaaS/PaaS data lakes, warehouses, and stores. Data lakes/warehouses are the new security blindspots–attackers bypass existing egress controls and exfiltrate data. The risk and impact increase as more data moves to data lakes/warehouses. Theom is for cloud security teams and security operations center teams who need visibility into SaaS/PaaS data lakes/warehouses and need to detect and prevent data breaches. With Theom, these teams gain visibility into sensitive data, can identify and prioritize the risks to data, trim over-provisioned access, detect active threats (TTPs) to data, and stop an active threat in its tracks. Theom maps active threats to the MITRE ATT&CK framework and reports incidents into customers’ SIEM. Theom is the only security product that lives inside customers’ data lakes and warehouses, delivering the best protection against data breaches without agents.<br>\n</p>\n<h5>Why Theom?</h5>\n<p>SaaS/PaaS data lakes, warehouses, and object stores (e.g., Snowflake, Databricks, AWS, Azure) are at risk from data breaches, malicious insiders, and ransomware. Attackers can bypass even the best EDR, CASB, NGFaaS, CSPM, CIEM, and CNAPP and exfiltrate data. None of these controls detect, let alone prevent, data breaches or ransomware because they sit outside the data lake/warehouse and are blind to sensitive data and malicious access. Theom is the first and only security product that runs inside the data lakes and warehouses. With this unique vantage point, customers can prevent breaches proactively and detect active attacks. Customers gain visibility into sensitive data, can identify and prioritize the risks to data, trim over-provisioned access, detect active threats (TTPs) to data, and stop an active threat in its tracks. Theom maps active threats to the MITRE ATT&CK framework and reports incidents into customers'' SIEM for timely resolution.</p>','\n',char(10)),NULL,'https://www.twitter.com/TheomSecurity','https://www.linkedin.com/company/theom-security','');
|
||
INSERT INTO vendors VALUES('d4a4c71a-34c1-43fa-9305-b2d75d61c287','published','thecube','theCUBE','thecube.net','SiliconANGLE Media Inc. reports on the often overlooked global impact of enterprise and emerging technologies, covering topics such as semiconductors, computer and networking systems, cybersecurity, AI and machine learning, blockchain, and more. Led by experienced entrepreneurs John Furrier and Dave Vellante, our media properties offer unmatched depth and immediacy, combining publishing on SiliconANGLE.com, live video from theCUBE, and analysis from market researcher Wikibon. Our mission is to provide valuable insights to decision-makers in the tech industry, as well as to developers and laypeople curious about the technologies powering their devices. Our commitment to expanding our reporting, analysis, and thought leadership has enabled us to evolve a sustainable business model, untethered from the volatility of traditional online advertising.','5 Mount Royal Rd',NULL,'Marlborough','MA','USA','b966b49c-aeda-4803-9cc1-6daf5e1e6552',replace('<h5>theCUBE</h5>\n<p>\nSiliconANGLE Media Inc. reports on the often overlooked global impact of enterprise and emerging technologies, covering topics such as semiconductors, computer and networking systems, cybersecurity, AI and machine learning, blockchain, and more. Led by experienced entrepreneurs John Furrier and Dave Vellante, our media properties offer unmatched depth and immediacy, combining publishing on SiliconANGLE.com, live video from theCUBE, and analysis from market researcher Wikibon. Our mission is to provide valuable insights to decision-makers in the tech industry, as well as to developers and laypeople curious about the technologies powering their devices. Our commitment to expanding our reporting, analysis, and thought leadership has enabled us to evolve a sustainable business model, untethered from the volatility of traditional online advertising.<br>\n</p>','\n',char(10)),'https://www.facebook.com/theCUBE.SiliconANGLE/','https://www.twitter.com/theCUBE','https://www.linkedin.com/company/siliconangle/mycompany/','');
|
||
INSERT INTO vendors VALUES('705c5144-ae1a-4c82-a460-343ef1bef40b','published','tamnoon','Tamnoon','https://www.tamnoon.io/','Tamnoon is a Managed Cloud Protection service that leverages existing cloud security tools for optimized security. Our team of experts and proprietary technology work together to ensure effective protection of your cloud environment.',' 704 228h Ave NE# 874',NULL,'Sammamish','WA','USA','9cf3a052-8af7-4756-a78d-6c75c049e574',replace('<h5>Tamnoon</h5>\n<p>\nTamnoon is a Managed Cloud Protection Service that enhances cloud security by utilizing your existing security tools. With the combination of human expertise and proprietary technology, Tamnoon prioritizes critical security tasks, optimizes processes, and provides tailored prevention and automation solutions to boost the productivity of your security team and ensure comprehensive protection of your cloud.<br>\n</p>\n<h5>Why Tamnoon?</h5>\n<p>Tamnoon - Technology enabled Managed Cloud Protection Service where cloud security experts leverage customers’ cloud security stack (CNAPP/CSPM/CIEM/DSPM tools) to continuously reduce exposure & risk.\nTamnoon experts team, enabled by technology, empowers security teams by optimizing security tools, analyzing thousands of security alerts and translating them into curated actionable tasks, assisting with remediation and making the most out of the existing security investments.</p>','\n',char(10)),NULL,'https://www.twitter.com/tamnoon_io ','https://www.linkedin.com/company/tamnoon.io','');
|
||
INSERT INTO vendors VALUES('4a5ea041-9e0c-4db6-98b6-96dd766d1129','published','threatx','ThreatX','www.threatx.com','ThreatX’s API protection platform makes the world safer by protecting APIs from all threats, including DDoS attempts, bot attacks, API abuse, exploitations of known vulnerabilities, and zero-day attacks. ','225 Friend Street ','8th Floor','Boston','MA','USA','830437d7-9777-4359-b21e-a16152647b14',replace('<h5>ThreatX</h5>\n<p>\nThreatX’s API protection platform makes the world safer by protecting APIs from all threats, including DDoS attempts, bot attacks, API abuse, exploitations of known vulnerabilities, and zero-day attacks. Its multi-layered detection capabilities accurately identify malicious actors and dynamically initiate appropriate action. ThreatX effectively and efficiently protects APIs for companies in every industry across the globe.<br>\n</p>\n<h5>Why ThreatX?</h5>\n<p>Secure APIs and applications with confidence, not complexity\nBlock attacks in real time with API and application protection you can trust 24/7 (without having to manage it yourself).\nDescription of ThreatX:\nThese days, everything’s more complex – from your infrastructure itself to the attackers who want to exploit it. The use of APIs has exploded, making attackers’ jobs easier and yours a lot harder. You can never let your guard down, even on a Friday night or at your kid’s basketball game.In the face of multi-vector, long-play attacks, a signature-based approach just won’t cut it. It’s a game of cat and mouse - and you always feel a step behind. You know you need to be proactive to stay ahead, but you just don’t have the time and resources to do it yourself.You’d like your sites to be up and running all the time – doing what they’re supposed to do to serve your customers. You want to know that if anything does threaten your APIs and applications, it’ll be handled right away. </p>','\n',char(10)),NULL,'https://www.twitter.com/threatx_inc ',' https://twitter.com/threatx_inc','');
|
||
INSERT INTO vendors VALUES('480fe730-ad35-4676-a880-b6dd6d5d33e3','published','techstrong-group','Techstrong Group','www.techstronggroup.com','Techstrong Group is the power source for people and technology. We are an omniversal tech media company covering IT industries and practices that are re-shaping the world of technology. Our focus is digital transformation, DevOps, cybersecurity, cloud and cloud-native. Techstrong Group business units include: Techstrong Media, Techstrong Research and Techstrong Learning.','751 Park of Commerce Drive ','Suite 108 ','Boca Raton','FL','USA','e9fdfbb6-6619-4d0f-a2bf-dd70b2f652de',replace('<h5>Techstrong Group</h5>\n<p>\nTechstrong Group is the power source for people and technology. We are an omniversal tech media company covering IT industries and practices that are re-shaping the world of technology. Our focus is digital transformation, DevOps, cybersecurity, cloud and cloud-native. Techstrong Group business units include: Techstrong Media, Techstrong Research and Techstrong Learning.<br>\n</p>\n<h5>Why Techstrong Group?</h5>\n<p>With a broad set of IT-related communities and offerings, Techstrong Group is the only media company serving the needs of IT leaders and practitioners with news, research, analysis, events, education, certifications and professional development. For technology providers, Techstrong business units offer many ways to reach IT professionals and tell their stories.</p>','\n',char(10)),'https://www.facebook.com/Techstrong-Group-103080304863624','https://www.twitter.com/TechstrongGroup','https://www.linkedin.com/company/techstrong-group','');
|
||
INSERT INTO vendors VALUES('dcdbcad5-6c5e-459a-9fa5-c96ea96ff3f2','published','techguard','TechGuard','www.techguard.com','For over 22 years TechGuard has secured government and corporate cyberspace through its proven holistic approach to ensure people, processes, and technology align with cybersecurity and compliance best practices. ','1722 Corporate Crossing ','Suite 1','O''Fallon','IL','USA','682f3a2d-fa0c-4c60-9bbd-97459936942c',replace('<h5>TechGuard </h5>\n<p>\nFor over 22 years TechGuard has secured government and corporate cyberspace through its proven holistic approach to ensure people, processes, and technology align with cybersecurity and compliance best practices. From the Pentagon to your boardroom, TechGuard protects freedom and your brand.<br>\n</p>\n<h5>Why TechGuard ?</h5>\n<p>Trusted. Proven. Cyber. TechGuard is a trusted partner to thousands of commercial consumers and providers navigating our clients through the everchanging cyberspace threatscape. Our Cybersecurity Specialists are tenured, certified professionals who utilize their extensive Cyber experience and outside the box thinking to support SMB, Enterprise, and Government/Municipal clients. Our holistic approach is tailored for each client, focusing on all layers of your critical infrastructure - people, processes, and technology. A sample of our services offerings include Incident Response, Insider Threat Mitigation, Strategic Policy Shaping, Phishing Simulation, Vulnerability Assessment, Penetration Testing, Cloud Security Assessments, Audit & Gap Analysis, Compliance Consultation, Infrastructure Design & Support, Program & Project Management, Red/Blue Team Operations, Offensive/Defensive Cyber Operations planning and support, Knowledge Management, Records Management, Risk Management.</p>','\n',char(10)),'https://www.facebook.com/TGSCyber/','https://www.twitter.com/TGScyber','https://www.linkedin.com/company/107631','');
|
||
INSERT INTO vendors VALUES('bb6e2564-eff8-4368-ab96-101b457cbd9c','published','tailscale','Tailscale','www.tailscale.com','Tailscale is a highly secure mesh VPN that makes it easy to connect all your devices, wherever they are. Built on WireGuard, Tailscale can be set up in minutes and facilitates zero-trust networking by enabling SSO and “always-on” remote access.','125-720 King St W','Suite 585','Toronto','ON','CAN','0dd827d5-d627-4460-8d4e-c16ab7c7ad0a',replace('<h5>Tailscale</h5>\n<p>\nTailscale is the simple, safe, and secure way to build your team’s network and manage access to devices, servers, and dev environments on that network. Trusted by hundreds of thousands of developers and thousands of teams worldwide, Tailscale is easy to set up, uses the open source WireGuard® protocol, and integrates directly with identity providers like Google, Okta, GitHub, and Azure AD to help keep users in your tailnet up to date.\nTailscale handles complex network configurations on your behalf, effectively navigating firewalls and routers so devices in your tailnet can connect directly, without manual configuration or port forwarding. Tailscale also enables roaming so teammates stay connected to your tailnet when they’re traveling or working remotely, even when switching between WiFi and cell networks.\nWith Tailscale, teams can connect securely to internal apps and resources, manage access to those resources, and even SSH into devices in your tailnet using Tailscale SSH.<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/tailscale','https://www.linkedin.com/company/tailscale/','');
|
||
INSERT INTO vendors VALUES('f77f9f98-5605-4bd0-8fdd-881e842eb58b','published','varonis','Varonis','https://www.varonis.com/','Varonis is a pioneer in data security and analytics, specializing in software for data protection, threat detection and response, and compliance. Varonis protects enterprise data by analyzing data activity, perimeter telemetry, and user behavior; prevents disaster by locking down sensitive data; and efficiently sustains a secure state with automation.','1250 Broadway','FL 28','New York','NY','USA','092272d5-e088-4967-a6be-d7f5d42c310b',replace('<h5>Varonis</h5>\n<p>\nVaronis is a pioneer in data security and analytics, specializing in software for data protection, threat detection and response, and compliance. Varonis protects enterprise data by analyzing data activity, perimeter telemetry, and user behavior; prevents disaster by locking down sensitive data; and efficiently sustains a secure state with automation.<br>\n</p>','\n',char(10)),'https://www.facebook.com/VaronisSystems/','https://www.twitter.com/varonis','https://www.linkedin.com/company/varonis','');
|
||
INSERT INTO vendors VALUES('62dd10e0-6c87-4533-9a27-ade6daceaf89','published','trustwave','Trustwave','www.trustwave.com','Trustwave is a global cybersecurity and managed security services provider. Trustwave leverages its team of threat hunters, researchers, and consultants, and a leading security operations platform to fortify cyber resilience against advanced threats.','70 West Madison Street','Suite 600','Chicago','IL','USA','170edd81-7ac5-41dc-baeb-763f636c8768',replace('<h5>Trustwave</h5>\n<p>\nAs a recognized global cyber defender that stops cyber threats all day, every day – we enable our clients to conduct their business securely.\nTrustwave detects threats that others can’t see, enabling us to respond quickly and protect our clients from the devastating impact of cyberattacks. We leverage our world-class team of security consultants, threat hunters and researchers, and our market-leading security operations platform to relentlessly identify and isolate threats with the right telemetry at the right time for the right response.\nTrustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security. Our elite Trustwave SpiderLabs team provides award-winning threat research and intelligence, which is infused into Trustwave services and products to fortify cyber resilience in the age of advanced threats.\n<br>\n</p>\n<h5>Why Trustwave?</h5>\n<p>A leading global cyber defender, Trustwave enables organizations to conduct their business securely.\nWe detect threats others can’t see, enabling us to respond quickly and protect organizations from the devastating impact of cyberattacks. We leverage our elite team of security consultants, threat hunters and researchers, and our market-leading security operations platform to relentlessly identify and isolate threats with the right telemetry at the right time for the right response.\nTrustwave provides:\n• Managed Detection & Response (MDR), Managed Security Services (MSS), & Co-managed SOC\n• Consulting & Professional Services from world-class experts\n• Database security to prevent data compromise\n• Email security to help protect against phishing & ransomware\nOur world-class SpiderLabs team provides award-winning threat research & intelligence. This is infused into Trustwave services & products to fortify cyber resilience in the age of advanced threats.\n</p>','\n',char(10)),'https://www.facebook.com/Trustwave','https://www.twitter.com/Trustwave','https://www.linkedin.com/company/trustwave/','');
|
||
INSERT INTO vendors VALUES('3d9ad291-1e9e-468b-af51-c7b25beb7b41','published','trellix','Trellix','www.trellix.com','Trellix is redefining the future of cybersecurity with its open and native extended detection and response (XDR) platform, helping organizations to gain confidence in the protection and resilience of their operations. Trellix and its partner ecosystem, accelerates innovation through machine learning and automation, empowering over 40,000 customers with living security. ','3099 N First Street',NULL,'San Jose','CA','USA','34868524-865e-4ae4-891f-2bc74d958dce',replace('<h5>Trellix</h5>\n<p>\nTrellix is redefining the future of cybersecurity with its open and native extended detection and response (XDR) platform, helping organizations to gain confidence in the protection and resilience of their operations. Trellix and its partner ecosystem, accelerates innovation through machine learning and automation, empowering over 40,000 customers with living security. <br>\n</p>','\n',char(10)),'facebook.com/teamtrellix','https://www.twitter.com/Twitter.com/Trellix','linkedin.com/company/trellixsecurity','');
|
||
INSERT INTO vendors VALUES('f2b0ef98-c81b-40f8-a25b-86da0e33943a','published','vmware','VMware','https://www.vmware.com/',replace('VMware is a leading provider of multi-cloud services for all apps. As the trusted foundation to accelerate innovation, our software gives businesses the freedom and flexibility they need to build the future. \n\nWith VMware Cross-Cloud™ services, customers experience multi-cloud autonomy and consistent operations while delivering a more secure, frictionless employee experience and retaining enterprise control. \n\n','\n',char(10)),'3401 Hillview Ave',NULL,'Palo Alto','CA','USA','4862788f-7b21-4abc-9a1b-79c39b4079a3',replace('<h5>VMware</h5>\n<p>\nVMware is a leading provider of multi-cloud services for all apps, enabling digital innovation with enterprise control. With VMware Cross-Cloud[tm] services and our global ecosystem of partners, we deliver the smartest path to cloud, edge and app modernization. Our technology also supports multi-cloud autonomy for developers and consistent operations for DevSecOps - while creating a more secure, frictionless experience for the distributed workforce. As the trusted foundation to accelerate innovation, VMware preserves customer choice and protects against lock-in. Instead of tradeoffs and compromise, our software offers businesses the freedom and flexibility they need to build the future.<br>\n</p>','\n',char(10)),'https://www.facebook.com/vmware','https://www.twitter.com/VMware','https://www.linkedin.com/company/vmware/mycompany/','');
|
||
INSERT INTO vendors VALUES('94df73fc-ca4a-458d-a418-319d3e6f0057','published','tresorit','Tresorit','www.tresorit.com','Tresorit’s GDPR, ISO 27001:2013 certified platform, makes it easy for teams to collaborate efficiently and securely via our end-to-end encrypted, cloud-based document ecosystem. Unlike other cloud providers, our end-to-end encryption ensures that your data always remains private, even on the go.','Koztelek u. 6.',NULL,'Budapest',NULL,'HUN','6b072a23-f689-41ce-849f-192ba7610672',replace('<h5>Tresorit</h5>\n<p>\nTresorit makes it easy for teams to collaborate efficiently and securely with our end-to-end encrypted, cloud-based document ecosystem. Over 10,000 businesses rely on Tresorit''s GDPR, ISO 27001:2013 compliant platform to protect their confidential data, including HR, legal, financial, or R&D documents.\nTresorit’s cloud-based digital workspace is tailor-made for companies to store, share and govern sensitive data. Unlike other cloud providers, our end-to-end encryption ensures that your information always remains private, even when files are sent or downloaded on the go.\nTresorit’s end-to-end encrypted email service currently works with Microsoft Outlook, and will soon integrate with Microsoft Teams, and Microsoft 365, allowing you to send hassle-free encrypted emails direct from your existing inbox.\nTresorit eSign allows users to oversee every part of the signing process, tracking digital documents securely and efficiently.<br>\n</p>\n<h5>Why Tresorit?</h5>\n<p>Tresorit makes it easy to get work done securely in the cloud. Store, share govern and sign sensitive documents from one single platform. Tresorit''s patented zero-knowledge encryption safeguards your confidential documents.\nTresorit for Microsoft Teams\nThe integration enables secure and compliant way to store, share and sign confidential documents within the Microsoft Teams communication platform.\nEmail encryption for Outlook for Mac and Web\nThe new plugin provides an extra layer of security while using Microsoft Outlook on Mac and on the web.\nSecure communication product\nProvides an end-to-end encrypted and compliant data exchange solution via secure links, file requests and encrypted emails.\nFeature enhancements for Admins\nWe are dedicated to continually improve our solutions with advancements in user and data management e.g. custom integration options for enterprises, more granular admin roles and user group options and additional options in terms of shared link customization.</p>','\n',char(10)),'https://www.facebook.com/tresorit','https://www.twitter.com/Tresorit','https://www.linkedin.com/company/2449399/admin/','');
|
||
INSERT INTO vendors VALUES('4c9f19bb-a566-4bd4-97b4-4fa99c3c7862','published','veracode','Veracode','www.veracode.com','Veracode is a leading AppSec partner for creating secure software, reducing risk of security breach and increasing security and development teams’ productivity. Veracode has assessed over 112 trillion lines of code & helped fix over 81 million flaws.','65 Blue Sky Drive',NULL,'Burlington','MA','USA','bb7feb17-e4d6-4a80-b111-c18eea5e9dc9',replace('<h5>Veracode</h5>\n<p>\nVeracode is a leading AppSec partner for creating secure software, reducing the risk of security breach, and increasing security and development teams’ productivity. As a result, companies using Veracode can move their business, and the world, forward. With its combination of process automation, integrations, speed, and responsiveness, Veracode helps companies get accurate and reliable results to focus their efforts on fixing, not just finding, potential vulnerabilities. Learn more at www.veracode.com, on the Veracode blog, on Linkedin, and on Twitter. <br>\n</p>','\n',char(10)),'https://www.facebook.com/VeracodeInc','https://www.twitter.com/Veracode','https://www.linkedin.com/company/veracode/','');
|
||
INSERT INTO vendors VALUES('5d10e403-2165-4886-88ef-3243896aed53','published','verizon','Verizon','https://www.verizon.com/business/products/security/','Verizon offers a comprehensive and proven portfolio of managed and professional services that enables security teams to optimize their operations, from threat identification and detection to response and recovery. We leverage our experience as a world-renowned provider of business services to help security leaders earn – and keep – their seat at the decision-making table.','1 Verizon Way',NULL,'Basking Ridge','NJ','USA','7dfc1cb2-0d73-48ce-8779-8cb113528406',replace('<h5>Verizon</h5>\n<p>\nVerizon offers a comprehensive and proven portfolio of managed and professional services that enables security teams to optimize their operations, from threat identification and detection to response and recovery. We leverage our experience as a world-renowned provider of business services to help security leaders earn – and keep – their seat at the decision-making table.<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/VerizonBusiness','https://www.linkedin.com/company/verizonbusiness','');
|
||
INSERT INTO vendors VALUES('41b1e167-518d-43b6-8d27-026766c41201','published','veeam','Veeam','www.veeam.com','Veeam® is the leader in backup, recovery and data management solutions that deliver Modern Data Protection on a single platform for Cloud, Virtual, Physical, SaaS and Kubernetes environments. Visit www.veeam.com to learn more.','8800 Lyra Dr',NULL,'Columbus','OH','USA','ea178e22-c1bd-4a55-920e-d80915f69b31',replace('<h5>Veeam</h5>\n<p>\nVeeam® is the leader in Modern Data Protection. The company provides backup, recovery and data\nmanagement solutions through a single platform for Cloud, Virtual, Physical, SaaS and Kubernetes\nenvironments. Veeam customers are confident their apps and data are protected from ransomware,\ndisaster and harmful actors and always available with the most simple, flexible, reliable and powerful\nplatform in the industry. Veeam protects 450,000 customers worldwide, including 81% of the Fortune 500\nand 72% of the Global 2,000. Headquartered in Columbus, Ohio, with offices in more than 30 countries,\nVeeam’s global ecosystem includes 35,000+ technology partners, resellers and service providers, and\nalliance partners. To learn more, visit https://www.veeam.com or follow Veeam on LinkedIn @veeamsoftware and Twitter @veeam.<br>\n</p>\n<h5>Why Veeam?</h5>\n<p>Backup is easy, recovery is hard. Veeam is the best at recovery. Backup is easy, recovering from a ransomware attack can be hard. At Veeam, we believe in bringing people, processes, and technology together to make recovery the priority. Veeam is the best at data recovery because we’ve always been focused on it. Everything we do to is designed to help you successfully get your data back into production after a crisis. We do this by giving you secure backup with trusted immutability everywhere, secure access to prevent unauthorized entry, and the visibility you need to make sure your data is protected and available for secure recovery.</p>','\n',char(10)),'https://www.facebook.com/VeeamSoftware/','https://www.twitter.com/Veeam','https://www.linkedin.com/company/veeam-software/','');
|
||
INSERT INTO vendors VALUES('97d60918-ce65-4e97-a24a-d5f3ba2b8d83','published','forescout-technologies-inc','Forescout Technologies, Inc.','www.forescout.com','Forescout delivers automated cybersecurity across the digital terrain, maintaining continuous alignment of customers’ security frameworks with their digital realities, including all asset types. The Forescout Continuum Platform provides 100% asset visibility, continuous compliance, network segmentation and a strong foundation for zero trust.','2400 Dallas Pkwy Dr. ','Suite 230','Plano','TX','USA','cd91f2c2-b2ee-460d-bdb5-14007ac02846',replace('<h5>Forescout Technologies, Inc.</h5>\n<p>\nForescout delivers automated cybersecurity across the digital terrain, maintaining continuous alignment of customers’ security frameworks with their digital realities, including all asset types. The Forescout Continuum Platform provides 100% asset visibility, continuous compliance, network segmentation and a strong foundation for zero trust.<br>\n</p>','\n',char(10)),'https://www.facebook.com/ForescoutTechnologies','https://www.twitter.com/Forescout','https://www.linkedin.com/company/forescout-technologies','');
|
||
INSERT INTO vendors VALUES('57918d2d-519c-41fb-807c-87b04f5059d6','published','truefort','TrueFort','www.truefort.com','TrueFort manages lateral movement across the data center and the cloud, keeping applications and service accounts secure. Trusted by leading global enterprises for unmatched discovery and microsegmentation. ','3 W. 18th St',NULL,'Weehawken','NJ','USA','326df957-4d81-4e67-a1b4-b984bc4c469a',replace('<h5>TrueFort</h5>\n<p>\nTrueFort puts you in control of lateral movement across the data center and cloud. The TrueFort Cloud extends protection beyond network activity by shutting down the abuse of service accounts. Founded by former IT executives from Bank of America and Goldman Sachs, leading global enterprises trust TrueFort to deliver unmatched application environment discovery and microsegmentation for accounts and activity. www.truefort.com<br>\n</p>\n<h5>Why TrueFort?</h5>\n<p>PROTECTING CLOUD WORKLOADS: Stop attacks from spreading by monitoring and securing on-premises and cloud-based applications and workloads\nCONTROLLING LATERAL MOVEMENT: Limit the spread of attacks by restricting access through microsegmentation and service account protection\nISOLATING RANSOMWARE: Prevent the spread of ransomware before it reaches critical data with microsegmentation and CIS hardening\nMITIGATING SOFTWARE SUPPLY CHAIN ATTACKS: Microsegmentation between and within applications to limit the attack surface available to compromised supply chains\nMANAGING INSIDER RISK: Block unauthorized access and misuse of privileged accounts with service account behavior analytics\nCIS BENCHMARKING: Meet globally recognized Center of Internet Security (CIS) cybersecurity defense best practices\nSECURING CONTAINERS & KUBERNETES: Enforce traffic between containers and constantly monitor containerization behavior for optimum protection\n</p>','\n',char(10)),NULL,'https://www.twitter.com/TrueFort','https://www.linkedin.com/company/10834479','');
|
||
INSERT INTO vendors VALUES('e29da918-2bce-43a7-a68c-9255ad2af294','published','tidelift','Tidelift','https://tidelift.com/','The TIdelift Subscription is a proactive approach to improving the health, security, and resilience of your organization’s open source software supply chain. ','50 Milk Street','Floor 16','Boston','MA','USA','5f577a11-1234-40b7-ac06-607526758487',replace('<h5>Tidelift</h5>\n<p>\nThe Tidelift Subscription is a proactive approach to improving the health, security, and resilience of your organization’s open source software supply chain. Tidelift provides the tools, data, and strategies that help organizations assess risk and improve the health, security, and resilience of the open source used in their applications. Tidelift partners directly with maintainers and pays them to ensure the open source software organizations rely on meets enterprise standards now and into the future. <br>\n</p>\n<h5>Why Tidelift?</h5>\n<p>The TIdelift Subscription is a proactive approach to improving the health, security, and resilience of your organization’s open source software supply chain. Tidelift provides the tools, data, and strategies that help organizations assess risk and improve the health, security, and resilience of the open source used in their applications.\nDefine open source standards and policies\nCreate and maintain catalogs of pre-vetted and approved open source components\nHelp developers self serve and keep moving fast\nKey benefits of the Tidelift Subscription are:\nImprove visibility of the open source in use across the organization, including transitive dependencies while dynamically generating up-to-date SBOMs\nImprove decision-making with human-researched, validated, and normalized metadata\nImprove governance by centralizing open source security, maintenance, licensing policies and standards\nImprove resilience by validating that the components you use meet emerging enterprise standards</p>','\n',char(10)),'https://www.facebook.com/tidelift','https://www.twitter.com/tidelift','https://www.linkedin.com/company/tidelift/mycompany/','');
|
||
INSERT INTO vendors VALUES('7152b318-0ed6-4e05-8bee-43e05e5e006f','published','torq','Torq','https://torq.io','Torq is the cybersecurity force multiplier. Its comprehensive security automation platform unifies and automates the entire security stack to deliver unparalleled protection and productivity.','411 NW Park Ave ','Suite 500','Portland','OR','USA','fe509ae6-fee0-4fcb-a368-e6c39376361a',replace('<h5>Torq</h5>\n<p>\nTorq’s enterprise-grade security hyperautomation platform unifies and automates the entire security infrastructure to deliver unparalleled protection and productivity. Torq drives maximum value and efficiency from existing security investments. It supercharges security teams with powerful, easy-to-use no-code, low-code, and full-code workflows that reduce manual tasks, freeing security professionals to focus on higher-value strategic activities.\n<br>\n</p>','\n',char(10)),'https://www.facebook.com/torqhq/','https://www.twitter.com/torq_io','https://www.linkedin.com/company/torqio','');
|
||
INSERT INTO vendors VALUES('3fbcbebb-38bf-403d-990a-5a7ac8d66b9f','published','forward-networks','Forward Networks','www.forwardnetworks.com','Forward Networks delivers a mathematical model (or “digital twin”) of the network to enable advanced security and reliability across complex on-prem and multi-cloud environments.','2390 Mission College Blvd. ','4th Floor','Santa Clara','CA','USA','52024855-9b1c-4234-8f0d-990ec3aa4fae',replace('<h5>Forward Networks</h5>\n<p>\nForward Networks delivers a mathematical model (or “digital twin”) of the network that enables advanced security and reliability across complex on-prem and multi-cloud environments.\nThe digital twin delivers actionable insights that enable SecOps teams to make data-driven decisions, prevent incidents, continually prove compliance, visualize zone-to-zone connectivity, instantly define the attack surface of a compromised host, prioritize CVE remediation, and ensure cloud traffic passes through enforcement points to enhance overall network security, compliance, and health. Forward Networks supports all major networking vendors and cloud, hybrid-cloud, and multi-cloud environments, including AWS, Google Cloud Platform, and Microsoft Azure.<br>\n</p>\n<h5>Why Forward Networks?</h5>\n<p>Forward Networks delivers a mathematical model (or “digital twin”) of the network that enables advanced security and reliability across complex on-prem and multi-cloud environments. The digital twin delivers actionable insights that enable SecOps teams to make data-driven decisions, prevent incidents, continually prove compliance, visualize zone-to-zone connectivity, instantly define the attack surface of a compromised host, prioritize CVE remediation, and ensure cloud traffic passes through enforcement points to enhance overall network security, compliance, and health. Forward Networks supports all major networking vendors and cloud, hybrid-cloud, and multi-cloud environments, including AWS, Google Cloud Platform, and Microsoft Azure.</p>','\n',char(10)),'https://www.facebook.com/forwardnetworks','https://www.twitter.com/fwdnetworks','https://www.linkedin.com/company/forward-networks','');
|
||
INSERT INTO vendors VALUES('ab70b584-7603-4d21-bc40-cfa89123ca93','published','forgerock','ForgeRock','www.forgerock.com','ForgeRock®, (NYSE: FORG) is a global leader in digital identity that delivers modern and comprehensive identity and access management solutions for consumers, employees, and things to simply and safely access the connected world. ','201 Mission Street ','Suite 2900','San Francisco','CA','USA','8111791d-a533-4936-9e6b-00213a3e0c05',replace('<h5>ForgeRock</h5>\n<p>\nForgeRock® (NYSE: FORG) is a global digital identity leader helping people simply and safely access the connected world. The ForgeRock Identity Platform delivers enterprise-grade identity solutions at scale for customers, employees, and connected devices. More than 1,300 organizations depend on ForgeRock’s comprehensive platform to manage and secure identities with identity orchestration, dynamic access controls, governance, and APIs in any cloud or hybrid environment. For more information, visit www.forgerock.com or follow ForgeRock on social media: Facebook - https://www.facebook.com/ForgeRockIdentity | Twitter - @ForgeRock | LinkedIn - https://www.linkedin.com/company/forgerock/<br>\n</p>\n<h5>Why ForgeRock?</h5>\n<p>CIAM - As the undisputed CIAM leader, ForgeRock helps enterprise organizations acquire customers faster, deliver great experiences, and protect customers and the organization. You can do business better with the industry''s only enterprise-grade, full-suite, AI-driven identity platform purpose-built for all identities and any cloud. Realize benefits such as 186% ROI, increase customer engagement by 400% and reduce helpdesk volumes by 40%.\nWorkforce IAM - ForgeRock provides identity management, access management, and identity governance capabilities to enable organizations to secure user access, maximize productivity, and reduce costs. The solution is simple to use, AI-infused, and built on ForgeRock’s scalable, high-performance Identity Cloud. With a converged IAM platform, enterprises gain efficiencies and cost savings with the ability to manage, secure, and govern identities throughout their entire lifecycle — all from a single platform.</p>','\n',char(10)),'https://www.facebook.com/ForgeRockIdentity','https://www.twitter.com/ForgeRock','https://www.linkedin.com/company/forgerock','');
|
||
INSERT INTO vendors VALUES('fa4dcf58-1fd6-49a6-8e21-4734c921ef17','published','fluid-attacks','Fluid Attacks','www.fluidattacks.com','Deploy secure applications without delaying your time-to-market. Fluid Attacks offers multiple security testing techniques in a single solution. Our continuous assessments allow you to secure your technology across the software development lifecycle.','95 3rd St','Apt 302',' San Francisco','CA','USA','d7a48eca-eef4-407c-9b92-dc761ee9806c',replace('<h5>Fluid Attacks</h5>\n<p>\nFor over 20 years, Fluid Attacks has been developing technology in cybersecurity. We perform automated penetration testing across our clients’ entire software development lifecycles. Our team helps them identify and manage vulnerabilities in their systems so they can deploy secure technology, achieve DevSecOps and reduce cyber risks. We work with a wide range of industries, including banking, finance, and technology. <br>\nWhy Fluid Attacks? <br> <br>\nFluid Attacks combine the advantages of expert knowledge, automation, and AI. Our security analysts and vulnerability scanner perform Continuous Hacking on apps, infrastructure, and source code at the speed of your business. The tests cover all software development stages and include SAST, DAST, SCA, reverse engineering, and manual pen-testing. Thus, we achieve low false positive and false negative rates. On our platform, you have control of the vulnerability testing and remediation processes and can access detailed data on each finding.\n<br>\n</p>\n<h5>Why Fluid Attacks?</h5>\n<p>Fluid Attacks’ Continuous Hacking detects vulnerabilities and weaknesses in your applications at the speed of your business, covering all software development stages. We offer two plans. Our Machine Plan performs SAST, DAST, SCA, and CSPM with our scanner, which is CASA approved and has a perfect score in the OWASP Benchmark (v1.2). Visit our website and start a 21-day free trial. Our Squad Plan offers the combined advantages of automation, AI, and expert knowledge. In addition to vulnerability scanning, our hackers attack your systems repeatedly to test all existing versions with manual penetration testing and reverse engineering. This comprehensive approach allows us to achieve low false positive and false negative rates in our reports. On our Attack Resistance Management (ARM) platform, you can manage vulnerability testing and remediation processes, read detailed data on each finding and, if you use Squad Plan, request meetings to receive support from our hackers. </p>','\n',char(10)),NULL,'https://www.twitter.com/fluidattacks/ ','https://www.linkedin.com/company/fluidattacks ','');
|
||
INSERT INTO vendors VALUES('7926a6c3-3326-4c69-9f21-c1a5a654a8e8','published','votiro','Votiro','votiro.com','Votiro is an award winning zero trust content security company serving hundreds of commercial and government organizations, worldwide. Votiro Cloud offers an open, API-centric Content Disarm and Reconstruction (CDR) solution.','1220 Plum Tree Lane',NULL,'Penryn','CA','USA','fa08f530-5a51-4903-9c17-4f915a290d65',replace('<h5>Votiro</h5>\n<p>\nVotiro is an award winning zero trust content security company serving hundreds of commercial and government organizations, worldwide. Votiro Cloud offers an open, API-centric Content Disarm and Reconstruction (CDR) solution to deliver safe content to your modern digital business processes and content-rich applications. Votiro eliminates file-borne threats targeting remote workers, supply chain collaborations, and B2C digital interactions.\nHeadquartered in the United States, with offices in Australia, Israel, and Singapore, Votiro is trusted by millions of users worldwide to receive billions of pieces of content with complete peace of mind. Votiro Cloud is SOC 2 Type II compliant solution and certified by the international standard of Common Criteria for Information Technology Security Evaluation (ISO/IEC 15408). <br>\n</p>','\n',char(10)),'https://www.facebook.com/votiro','https://www.twitter.com/Votiro','https://www.linkedin.com/company/votiro/','');
|
||
INSERT INTO vendors VALUES('08f61151-7b6b-4a1c-b9e4-bb6bc4ba06e0','published','fortifydata','FortifyData','www.fortifydata.com','FortifyData is a Continuous Threat Exposure Management company that enables companies to manage cyber risk. Our platform combines attack surface assessments, risk-based vulnerability management, security ratings and third-party risk management.','1825 Barrett Lakes Blvd ','Suite 300','Kennesaw','GA','USA','26e028a6-eb66-4fcb-a8c6-fcf7a5096261',replace('<h5>FortifyData</h5>\n<p>\nFortifyData is an industry-leading Continuous Threat Exposure Management (CTEM) company that enables the enterprise to manage cyber risk across the organization. By combining automated attack surface assessments with asset classification, risk-based vulnerability management, security ratings and third-party risk management, you get an all-in-one cyber risk management platform.<br>\n</p>\n<h5>Why FortifyData?</h5>\n<p>The FortifyData platform was built to provide an integrated view of cybersecurity risks and threat exposures across external networks, internal networks, cloud misconfigurations and third-party exposures. The platform conducts direct assessments and uses machine learning algorithms to analyze live data against thousands of unique data points, using qualitative and quantitative risk assessment methodologies, giving organizations an integrated view of the cyber risk factors across an organization’s entire threat landscape along with actionable guidance to improve the organization’s risk posture.</p>','\n',char(10)),NULL,'https://www.twitter.com/FortifyData','https://www.linkedin.com/company/fortifydata/','');
|
||
INSERT INTO vendors VALUES('5904f23f-a597-42cd-b118-4002fe476a73','published','verimatrix-inc','Verimatrix, Inc.','www.verimatrix.com','Verimatrix protects our connected digital world with cybersecurity engineered for enterprises. Our award-winning threat defense products help CISOs and SOC teams secure, detect and defend against mobile attacks utilizing AI/ML and data scientists.','6059 Cornerstone Ct W',NULL,'San Diego','CA','USA','96580221-d19d-4bb8-8952-cd0626d83f65',replace('<h5>Verimatrix, Inc.</h5>\n<p>\nVerimatrix helps power the modern connected world with security made for people. We protect digital content, applications, and devices with intuitive, people-centered, and frictionless security. Leading brands turn to Verimatrix to secure everything from content to sensitive financial and healthcare data, to mission-critical applications and mobile applications. Our leading solutions cover needs from prevention to detection & response. We enable the trusted connections our customers depend on to deliver compelling content and experiences to millions of consumers around the world. Verimatrix, helps partners get to the market faster, scale easily, protect business continuity and valuable revenue streams, and win new business. <br>\n</p>\n<h5>Why Verimatrix, Inc.?</h5>\n<p>Verimatrix XTD (Extended Threat Defense) - The fastest-growing enterprise security threat today is from mobile. And if you have a mobile app, chances are your enterprise security is at risk. Verimatrix XTD shields mobile apps with layered protection + telemetry to empower CISOs, SOC teams, product engineers and mobile app developers to detect and respond to cyber attacks that originate from any connected device powered by an app – even unmanaged consumer devices that most MTD vendors don''t monitor. Using AI/ML combined with a team of data scientists who provide monitoring services, along with our agentless, zero code deployment, we help customers launch quickly, mitigate risks, safeguard consumer data, prevent compliance fines, and protect their valuable reputations.</p>','\n',char(10)),'https://www.facebook.com/verimatrixinc','https://www.twitter.com/verimatrixinc','https://www.linkedin.com/company/verimatrix/mycompany/','');
|
||
INSERT INTO vendors VALUES('8c090bd3-230a-4add-9464-5980be552dea','published','vehere','Vehere','www.vehere.com','Vehere uses the best-in-breed technology to ensure a safer cyberspace. Our military-grade cybersecurity solutions empower governments and enterprises with actionable intelligences for detecting threat actors and countering cyber-attacks effectively. ','1603 PS Srijan Corporate Park','Block GP Sector V, Salt Lake','Kolkata','WB','IND','0515a136-5b87-42b6-becc-229a9b079057',replace('<h5>Vehere</h5>\n<p>\nVehere’s vision is to create a world where cyber threats are no longer a concern. Vehere is a leading cyber network intelligence company that safeguards challenging networks with wire-speed visibility and actionable intelligence to counter cyber threats and data breaches most effectively.\nOur AI-driven Network Detection & Response solution combined with Network Forensics provides proactive network security for evolving threats. Our cutting-edge solutions are designed to detect and prevent cyber threats in real time, providing valuable insights with 360° Visibility that can help organizations respond quickly to potential threats.\nVisit www.vehere.com to know more.<br>\n</p>\n<h5>Why Vehere?</h5>\n<p>How does this product(s) solve a specific problem?\n• Detect attacks through IOC/IOA and AI/ML • Understand TTPs for proper response • Create & share IOCs/IOAs to prevent known attacks.\nWhy is this product(s) better than other similar products?\n• Lossless Packet Capture at line rate • Unified Platform: Network Detection & Response, Network Forensics & Threat Hunting • Detection @NIC • Port Agnostic Protocol Detection for thousands of protocols (5000+) • Smart Storage - Option to define retention period based on data type, thereby optimizing the storage •Architecture to support consumption of millions of IOCs & IOAs•Flexible deployment with both flow and PCAP•Single integrated platform\nWhat benefit does it offer to potential customers?\n•Real-time monitoring of network activity•Early and automated threat detection•Improved incident response•Complete visibility to reveal hidden malicious behavior•Provides threat intelligence•Compliance with regulations•Cost-effective•Modular and Scalable</p>','\n',char(10)),'https://www.facebook.com/InVehere','https://www.twitter.com/Vehere_Inc','https://www.linkedin.com/company/vehere-interactive-p-ltd/','');
|
||
INSERT INTO vendors VALUES('cd751024-8d47-40b8-a59f-5e82cf591351','published','graphus','Graphus','https://www.graphus.ai','Graphus supercharges your Microsoft 365 and Google Workspace email security with AI, stopping current and emerging email threats without you lifting a finger or hurting your budget and takes just 3 clicks to deploy.','701 Brickwell Ave.','#400','Miami','FL','USA','652ebef3-3c68-4a9e-848a-c4fa568838ef',replace('<h5>Graphus</h5>\n<p>\nIf managing your company''s Microsoft 365 or Google Workspace email security is just one of your many responsibilities, then let Graphus help with its patented AI technologies that automate security workflows. Graphus excels at stopping current and never-before-seen email threats before they ever reach your employee mailboxes-without you lifting a finger or hurting your budget. Graphus is cloud-native and starts protecting you in minutes, with no software installation or email rerouting required. <br>\n</p>\n<h5>Why Graphus?</h5>\n<p>Graphus is an automated, AI-based cloud email security and phishing defense solution that protects organizations from dangerous email attacks like spear phishing, business email compromise, and ransomware.\nIt automatically neutralizes advanced threats that slip past other solutions, like secure email gateways and built-in MS365 or Google Workspace security. Utilizing a patented machine learning algorithm, Graphus instantly analyzes 50+ characteristics of an incoming email and compares it to the established communication patterns for the recipient and organization, allowing it to detect and quarantine even the most sophisticated attacks, like brand impersonation and email sent from accounts that have been taken over by hackers. It also places an interactive warning banner on unexpected or suspicious emails allowing users to mark them as safe or report them as phishing in one click.\nWith just 3 clicks to deploy, you''re protected without burdening your IT team or your budget.</p>','\n',char(10)),'https://www.facebook.com/GraphusInc/',NULL,'https://www.linkedin.com/company/graphus-inc-/','');
|
||
INSERT INTO vendors VALUES('a0c212a5-a510-4f1c-ad27-80c4b7f6350a','published','veriti','Veriti','www.veriti.ai','Veriti is a consolidated security platform that integrates with the security stack to continually and proactively monitor exposure to threats, and remediate security gaps across the organization’s infrastructure and attack surface.','150 menahem begin Rd.',NULL,'Tel Aviv',NULL,'ISR','c5b31125-955b-4834-8d50-f3267f5502fc',replace('<h5>Veriti</h5>\n<p>\nVeriti is a consolidated security platform that integrates with the security stack to continually and proactively monitor exposure to threats, and remediate security gaps across the organization’s infrastructure and attack surface.<br>\n</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/veriti-security','');
|
||
INSERT INTO vendors VALUES('fe0f3aa1-8594-4a76-9f0c-71c7862aca86','published','fido-alliance','FIDO Alliance','https://fidoalliance.org','The 250+ member, cross-industry FIDO Alliance provides specifications and certifications to enable an interoperable ecosystem of on-device authenticators that can be used for simpler, stronger authentication to many compliant mobile apps and websites','3855 SW 153rd Drive',NULL,'Beaverton','OR','USA','18b42233-3219-4539-b663-6216398f9926',replace('<h5>FIDO Alliance</h5>\n<p>\nThe 250+ member, cross-industry FIDO Alliance provides specifications and certifications to enable an interoperable ecosystem of on-device authenticators that can be used for simpler, stronger authentication to many compliant mobile apps and websites<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/@FIDOAlliance',NULL,'');
|
||
INSERT INTO vendors VALUES('1b2f1b34-bbf5-4eeb-90fc-154aa38ed5d2','published','filecloud','FileCloud','www.filecloud.com','FileCloud is a hyper-secure content collaboration platform (CCP) that provides industry-leading compliance, data governance, data leak protection, data retention, Zero Trust file sharing and digital rights management capabilities.','13785 Research Blvd. ','Suite 125','Austin','TX','USA','af046135-e4df-47ba-8a5e-c0c131f33ae3',replace('<h5>FileCloud</h5>\n<p>\nFileCloud is a hyper-secure content collaboration platform (CCP) that provides industry-leading compliance, data governance, data leak protection, data retention, zero trust file sharing and digital rights management capabilities. Workflow automation and granular control of content sharing across most enterprise platforms are fully integrated into the complete CCP stack. The platform offers powerful file sharing, sync, and mobile access capabilities on public, private, and hybrid clouds.\nFileCloud is used by millions of users around the world, including top Global 1000 enterprises, educational institutions, government organizations, and managed service providers.\nFileCloud is used by millions of users around the world, including top Global 1000 enterprises, educational institutions, government organizations, and managed service providers.<br>\n</p>\n<h5>Why FileCloud?</h5>\n<p>FileCloud is a hyper-secure, enterprise-grade Content Collaboration Platform (CCP) that comes in two variations:\n<br>\n• FileCloud Online - We host FileCloud on our world-class infrastructure in your chosen region.<br>\n• FileCloud Server - You host FileCloud on-premises on your own infrastructure, giving you full control over your private cloud.<br><br>\nFileCloud is chosen by enterprises in various sectors worldwide, including government, finance, healthcare, education, legal, & marketing. Our solution resolves pain points around secure file sharing and collaboration, whereas FileCloud''s Compliance Center and resource library support adherence to complex regulations such as CPRA, HIPAA, GDPR, ITAR, & FINRA. <br><br>\nSecurity features:<br>\n• Zero Trust File Sharing SM<br>\n• Granular permissions<br>\n• Data Leak Prevention (DLP)<br>\n• Audit logs<br>\n• Custom metadata<br>\n• Data encryption (at rest and in transit)<br>\n• Endpoint protection<br>\n• Malware screening</p>','\n',char(10)),'https://www.facebook.com/getfilecloud','https://www.twitter.com/getfilecloud','https://www.linkedin.com/company/filecloud/','');
|
||
INSERT INTO vendors VALUES('f30fdfee-523d-474a-bf7b-dcb903c43bd0','published','firemon','FireMon','www.firemon.com',replace('FireMon improves security operations, leading to better security outcomes. FireMon delivers industry-leading security policy management, cloud security operations, and asset management solutions.\n\n','\n',char(10)),'8801 Renner Blvd',' 2nd floor ','Lenexa','KS','USA','f41e23f1-23ae-42c9-b071-114343e9fe4e',replace('<h5>FireMon</h5>\n<p>\nFireMon’s mission is to improve security operations that will in turn lead to better security outcomes. FireMon delivers industry-leading security policy management, cloud security operations, and asset management solutions to over 1,700 enterprises in nearly 70 countries. Our security policy management platform is the only real-time solution that reduces firewall and cloud security policy-related risks, manages policy changes, and enforces compliance. FireMon’s Cloud Defense (formerly DisruptOps) offering is the only distributed cloud security operations offering that detects and responds to issues in the fast-paced public cloud environments such as AWS and Azure. Our cloud-based Asset Management solution (formerly Lumeta) can scan an entire enterprise infrastructure, from on-premises networks to the cloud, to identify everything in the environment and provide valuable insights into how it’s all connected together. Learn more at FireMon.com and the FireMon Blog.<br>\n</p>\n<h5>Why FireMon?</h5>\n<p>FireMon delivers industry-leading security policy management, cloud security operations, and asset management solutions to over 1,700 enterprises in nearly 70 countries. Our security policy management platform is the only real-time solution that reduces firewall and cloud security policy-related risks, manages policy changes, and enforces compliance. FireMon’s Cloud Defense offering is the only distributed cloud security operations offering that detects and responds to issues in the fast-paced public cloud environments such as AWS and Azure. Our cloud-based Asset Management solution can scan an entire enterprise infrastructure, from on-premises networks to the cloud, to identify everything in the environment and provide valuable insights into how it’s all connected together. </p>','\n',char(10)),'https://www.facebook.com/FireMon/','https://www.twitter.com/FireMon','https://cc.linkedin.com/company/firemon','');
|
||
INSERT INTO vendors VALUES('418ee4c6-b4d1-4c4e-831f-72602e1e950d','published','flashpoint','Flashpoint','www.flashpoint.io','Trusted by governments, commercial & educational institutions worldwide, we help organizations protect their most critical assets, infrastructure & stakeholders from security risks such as cyber threats, ransomware, fraud, physical threats & more','6218 Georgia Ave NW ','Suite #1','Washington','DC','USA','887cb09f-a1d0-4ca7-a8a5-dd581ac1638c',replace('<h5>Flashpoint</h5>\n<p>\nWhen it comes to decisions and mitigating risk, organizations require a solution that provides immediate visibility into real-world threats that have potential to disrupt and harm the enterprise. The best way to get this insight is to harness the relevant information within illicit online communities to track threats and threat actors, where they originate, and where the discussions take place that put sensitive assets at risk. Collecting relevant data to support intelligence functions is an extraordinarily difficult and risky endeavor. Flashpoint Intelligence Platform grants access to our archive of finished intelligence reports, data from illicit communities, chat services platforms, open web and technical data in a single, finished intelligence experience. Whether you are an intel expert or new to assessing risk, our platform delivers relevant intelligence that empowers you to make more informed decisions and to mitigate risk across your organization.\n<br>\n</p>\n<h5>Why Flashpoint?</h5>\n<p>Threat intelligence for every team, Flashpoint is a comprehensive threat intelligence solution that enables security teams to rapidly identify risks, safeguard information, and remediate threats to protect their organization’s assets. Our intelligence software delivers the contextual and actionable intelligence teams need to automatically detect, prioritize, and remediate emerging cyber and physical risks. Flashpoint aligns with every step of the intelligence lifecycle. Our technology fused with our industry-leading analysts, empowers us to rapidly tune our intelligence to deliver insights that matter to customers right now. Flashpoint’s data enrichment pipeline automatically adds critical context to collected data enabling rapid discovery and triaging of potential threats. We measure success by ensuring that we deliver the right intelligence at the right time, with the right context, so that our customers can mitigate risk faster than anyone else.</p>','\n',char(10)),NULL,'https://www.twitter.com/flashpointintel','https://www.linkedin.com/company/flashpoint-intel/','');
|
||
INSERT INTO vendors VALUES('60decb8f-0a62-4467-a94a-248ed4fd7229','published','fastly-inc','Fastly, Inc.','www.fastly.com','Fastly is upgrading the internet experience. With the fastest global edge cloud network and the industry’s first and only unified WAF, we help develop, deliver, and secure modern distributed applications and engaging digital experiences.','475 Brannan Street ','#300','San Francisco','CA','USA','483e1d3b-4dd7-484d-9d79-aad296894cfa',replace('<h5>Fastly, Inc.</h5>\n<p>\nFastly’s powerful and programmable edge cloud platform helps the world’s top brands deliver the fastest online experiences possible while improving site performance, enhancing security, and empowering innovation at a global scale. With world-class support that achieves 95%+ average annual customer satisfaction ratings, Fastly’s suite of edge compute, delivery, and security offerings has been recognized as a leader by industry analysts such as IDC, Forrester, and Gartner. Compared to legacy providers, Fastly’s powerful and modern network architecture is the fastest on the planet, empowering developers to deliver secure websites and apps at global scale with rapid time-to-market and industry-leading cost savings. Thousands of the world’s most prominent organizations trust Fastly to help them upgrade the internet experience, including Reddit, Pinterest, Stripe, Neiman Marcus, The New York Times, Epic Games, and GitHub. Learn more about Fastly at https://www.fastly.com/ <br>\n</p>\n<h5>Why Fastly, Inc.?</h5>\n<p>The future of business starts with developers.\nExpectations for websites and apps are at an all-time high. If they aren’t fast, secure, and highly personalized, users take their business elsewhere. But today’s most innovative companies are thriving by meeting this challenge head on: they’re choosing Fastly and an investment in their developers.\nWith Fastly’s powerful edge cloud platform, developers get the tools they need to build the most groundbreaking apps — all optimized for speed, security, and scale — so businesses can effectively transform to compete in today’s markets. Together, we’re building the future of the web.\nThe technology behind better business.\nTechnology is the muscle behind user experiences, and it directly relates to your bottom line. By leveraging the right infrastructure, you can scale smarter, improve security, and optimize the user experience. With Fastly powering things in the background, you can get back to focusing on what matters most for your business.</p>','\n',char(10)),'https://www.facebook.com/FastlyEdgeCloud','https://www.twitter.com/fastly','https://www.linkedin.com/company/fastly','');
|
||
INSERT INTO vendors VALUES('f734a600-140d-4af9-918f-4cfbdc2bfae9','published','flexxon-pte-ltd','Flexxon Pte. Ltd.','https://x-phy.com','Flexxon is an international next-generation storage device manufacturer, specializing in hardware-based cybersecurity solutions & industrial NAND flash storage devices with a key focus on Cybersecurity, Industrial, Medical & Automotive applications.','28 Genting Lane','#09-03 Platinum 28','Singapore',NULL,'SGP','f0a5af75-6a76-4981-a0a9-9e4e8de1ab32',replace('<h5>Flexxon Pte. Ltd.</h5>\n<p>\nFlexxon is a next-generation storage device manufacturer, specializing in industrial NAND flash storage devices and hardware-based cybersecurity solutions. We cater to a broad spectrum of industries with a strong focus on Cybersecurity, Industrial, Medical and Automotive applications. Founded in Singapore in 2007, Flexxon has a global presence in Asia-Pacific, Europe, North America, and the Middle East. Our flagship X-PHY® brand is the world''s first AI-embedded firmware-based cybersecurity solution, providing real-time protection against a broad spectrum of software-based malware, ransomware, and viruses, including hardware and physical attacks. Backed by Heliconia Capital Management, we''re committed to constant innovation to address the evolving cybersecurity needs of today.<br>\n</p>\n<h5>Why Flexxon Pte. Ltd.?</h5>\n<p>X-PHY® addresses the growing concerns of cybersecurity by providing real-time protection against known and unknown threats. With its AI-embedded module and reinforced firmware security, X-PHY® offers a unique hardware-based cybersecurity solution that is easy to implement and use, ensuring the last line of defense for the data protection of businesses.\nX-PHY® is a hardware cybersecurity solution that is distinct from other similar products. With its AI-embedded firmware technology, X-PHY® provides an added layer of security that is standalone and impossible to compromise. By detecting and preventing threats in real-time, X-PHY® offers superior protection against a wide range of cyber threats, giving organizations an added layer of security to mitigate the risk of data breaches.\nX-PHY® provides the peace of mind to organizations in protecting sensitive data against a wide range of cyber threats. It is intuitive, allowing for seamless integration with existing hardware and systems. </p>','\n',char(10)),'https://www.facebook.com/X-PHY-339457977396013','https://www.twitter.com/XphySecure?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor','https://www.linkedin.com/company/x-phy-ai-cybersecurity-solutions','');
|
||
INSERT INTO vendors VALUES('849d1096-d174-4f57-98d9-6e973dc68b35','published','fastpath','Fastpath','www.gofastpath.com','Fastpath allows businesses to seamlessly orchestrate security, compliance and risk management across multi-site, multi-application environments. It enables complete access control, identity management, and insight across their business applications.','4093 NW Urbandale Dr',NULL,'Des Moines ','IA','USA','35b68ef3-1fd4-49be-b89f-ac8f80b93726',replace('<h5>Fastpath</h5>\n<p>\nFastpath is a cloud-based access orchestration platform. It allows organizations to manage and automate the processes around access governance and security, quickly and efficiently.\nCustomizable, quick to implement and deploy means you get value right away. And it works with all major enterprise software in multi-site, multi-application environments.\nFastpath helps to identify, quantify, and manage data access risk, so you can be confident that the right people are accessing the right information for the right reasons. Make informed strategic business decisions confidently, knowing your organization is secure and compliant.<br>\n</p>\n<h5>Why Fastpath?</h5>\n<p>Fastpath''s intuitive cloud-based platform enables you to manage compliant access control and identity management across multi-site, multi-application environments from one place.\nThe platform achieves this across 4 key products. Identity makes it efficient and cost-effective to discover, manage, and secure identities across an enterprise. From the moment you hire in your HR system, Fastpath enables you to automate access as users join, move within, or leave the organization. Access Control analyzes cross-application risk and allows a company to manage it from a central location. Certification helps businesses keep track of who has access to critical business applications, define owners and reviewers, schedule periodic certification reviews, and sign off for different types of access. Change Tracking is designed to detect and reduce both potential and actual risk, with the option to define changes that are tracked or leverage out-of-the-box templates that focus on high-risk areas.</p>','\n',char(10)),'https://www.facebook.com/gofastpath','https://www.twitter.com/GoFastpath','https://www.linkedin.com/company/fastpath-inc-','');
|
||
INSERT INTO vendors VALUES('36732bad-df88-41bc-84b7-290cbf238d4a','published','axis','Axis','axissecurity.com',replace('Axis aims to elevate secure access to power a modern workplace where people, and technology, work in harmony.\n\nAtmos is the first SSE platform to elegantly integrate ZTNA, SWG, CASB and Digital Experience into a single, easy to use, interface.\n','\n',char(10)),'7700 Windrose ave','Suite 300','Plano','TX','USA','56a3c6a3-8e34-4873-a64e-7a67ce0a5c02',replace('<h5>Axis</h5>\n<p>\nAt Axis our mission is to elevate secure access to power a modern workplace where people, and technology, work in harmony.\nAtmos, the cloud-native platform delivered by Axis, artfully extends secure connectivity out to the user’s location through 350 edge locations running on the global backbone of AWS Global Accelerator, Google Cloud Platform, and Oracle. The security service edge (SSE) platform sits inline to inspect all traffic, seamlessly broker surgical, one-to-one, connections based on identity and policy, and perform end-user experience monitoring.\nThus, IT leaders are empowered to make hybrid work simple, digital experience a competitive advantage, and ensure business data remains protected - even as it moves to the cloud.\n<br>\n</p>\n<h5>Why Axis?</h5>\n<p>Atmos is the first SSE platform to elegantly integrate ZTNA, SWG, CASB and Digital Experience into a single, easy to use, interface.\n100% cloud-delivered with over 350 PoPs running on AWS, Google and Oracle. This ensures less latency, more redundancy and faster disaster recovery than any other SSE platform.\nAtmos provides a single interface to manage all your policies, apps, devices, users, data, and more.\nAtmos inspects all traffic to provide visibility into user access across both internal and external apps so IT can prevent data leakage.\nAtmos is the only service that supports all ports and protocols, even VOIP, ICMP, AS400 apps, and RDP, SSH, Git and DG via agentless web browsing – plus common SaaS apps and Internet protocols.\nIntegrations with identity and endpoint security solutions enable context sharing across cloud services. If changes in identity or device health are detected, the Atmos access policies automatically adapt.</p>','\n',char(10)),'https://www.facebook.com/Axis-Security-102823254782459','https://www.twitter.com/AxisSecurityHQ','https://www.linkedin.com/company/axis-security/','');
|
||
INSERT INTO vendors VALUES('4eb7ed4f-3ad1-42e4-9a50-1b77cb66d0b3','published','astrix-security','Astrix Security','https://astrix.security/',replace('Astrix lets you safely unleash the power of app-to-app connectivity by securing non-human identities across IaaS, PaaS, and SaaS. It detects and remediates over-privileged or suspicious third-party app connections to your core systems. \n','\n',char(10)),'545 East 14th Street',NULL,'New York','NY','USA','fd743c91-78c1-4de6-9b26-d5a37858a5ce',replace('<h5>Astrix Security </h5>\n<p>\nAt Astrix, we help you extend access management and threat prevention to non-human identities to ensure your core systems are securely connected to third-party cloud services (via API keys, service accounts, issued tokens, webhooks, and other types of integrations).\nFrom Salesforce and Office 365 to GitHub, Snowflake, and Workato, we keep core systems across SaaS, PaaS, and IaaS secure from over-privileged, unnecessary, and malicious connections exposing you to supply chain attacks, data leakage, and compliance violations.\nOur agentless, easy-to-deploy solution provides holistic visibility into all app-to-app connections and instantly detects and mitigates risky connections with automated remediation workflows.\nIn doing so, we enable you to unleash the power of app-to-app integration and automation without compromising security.\n<br>\n</p>\n<h5>Why Astrix Security ?</h5>\n<p>Astrix’s agentless, easy-to-deploy solution allows you to extend access management and threat detection and response to non-human identities (API keys, service accounts, issued tokens, webhooks, etc.) ensuring your core systems are securely connected to third-party cloud services.\nFrom Salesforce and Office 365 to GitHub, Snowflake, and Workato, we keep core systems across SaaS, PaaS, and IaaS secure from over-privileged, unnecessary, and malicious connections exposing you to supply chain attacks, data leakage, and compliance violations.\nOur agentless, easy-to-deploy solution provides holistic visibility into all app-to-app connections and instantly detects and mitigates risky connections with automated remediation workflows.\nIn doing so, we enable you to unleash the power of app-to-app integration and automation without compromising security.\n</p>','\n',char(10)),'https://www.facebook.com/AstrixSec','https://www.twitter.com/AstrixSecurity','https://www.linkedin.com/company/astrix-security','');
|
||
INSERT INTO vendors VALUES('1c68348e-1c22-494f-88e7-1f74934fdff7','published','alixpartners','AlixPartners','alixpartners.com','AlixPartners’ cyber advisory services cover the cyber risk value chain to provide a comprehensive suite of solutions designed to empower enterprises and businesses.','909 Third Ave.','30th Floor','New York','NY','USA','5a50adde-5b55-443a-bd56-fb6ec0233e27',replace('<h5>AlixPartners</h5>\n<p>\nAlixPartners’ cyber advisory services cover the cyber risk value chain to provide a comprehensive suite of solutions designed to empower enterprises and businesses.<br>\n</p>','\n',char(10)),'https://www.facebook.com/AlixPartners/','https://www.twitter.com/AlixPartnersLLP','https://www.linkedin.com/company/alixpartners/','');
|
||
INSERT INTO vendors VALUES('2f28f781-adbb-42e7-86ee-355a9707a87d','published','allegro-software','Allegro Software','www.allegrosoft.com','Security and Connectivity for the IoT Edge - Allegro Software is a leading provider of IoT Edge device security and connectivity software toolkits to manufacturers and deployed in 275+ million devices worldwide. Learn more at www.allegrosoft.com','1740 Massachusetts Avenue',NULL,'Boxborough','MA','USA','f0b23a91-0685-4adb-88df-0d6aa3010dc8',replace('<h5>Allegro Software</h5>\n<p>\nSecurity and Connectivity for the IoT Edge - Allegro Software is a leading provider of IoT Edge device security and connectivity software toolkits to manufacturers worldwide. Field-proven in 275+ million devices, our solutions enable Medical Device manufacturers and OEMs in Energy, Military, Enterprise, and Consumer markets to create connected secure devices using TLS, SSH, XML, JSON, FIPS validated cryptography and more. Learn more at www.allegrosoft.com<br>\n</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/allegro-software-development-corporation/','');
|
||
INSERT INTO vendors VALUES('90822539-d78e-49c9-bf7a-5a52aad7033c','published','aic-inc','AIC Inc.','www.aicipc.com','AIC is a leading provider of standard OTS (off-the-shelf) and OEM/ODM server and storage solutions. AIC''s products are highly flexible and configurable to any form factor, standard or custom. For more information, please visit: https://www.aicipc.com','21808 Garcia Lane',NULL,'City of Industry','CA','USA','e62fc40e-f52a-4d5a-80a2-1f59f20633ad',replace('<h5>AIC Inc.</h5>\n<p>\nAIC is a leading provider of both standard OTS (off-the-shelf) and OEM/ODM server and storage solutions. With expert in-house design, manufacturing and validation capabilities, AIC''s products are highly flexible and configurable to any form factor, standard or custom. AIC leads the industry with over 25 years of experience in mechanical, electronic, system-level engineering as well as a dedication to innovation and customer satisfaction. Headquartered in Taiwan, AIC has offices and operations throughout the United States, Asia, and Europe. For more information, please visit: https://www.aicipc.com<br>\n</p>','\n',char(10)),'https://www.facebook.com/AICinc/',NULL,'https://www.linkedin.com/company/aicinc','');
|
||
INSERT INTO vendors VALUES('9b643afd-4b02-4342-a199-f6e626893794','published','authlite','AuthLite','www.authlite.com','AuthLite adds native 2-factor authentication to your Active Directory, protects Administrator accounts and RDP by assigning privileged groups dynamically after login, and eliminates a variety of credential exposure risks like Pass-the-Hash attacks.','1099 Willowbrook Dr.',NULL,'Springfield','IL','USA','b160768a-d8e3-4343-bec6-3df3980e9232',replace('<h5>AuthLite</h5>\n<p>\nAuthLite adds native 2-factor authentication to your Active Directory, protects Administrator accounts and RDP by assigning privileged groups dynamically after login, and eliminates a variety of credential exposure risks like Pass-the-Hash attacks.<br>\n</p>','\n',char(10)),NULL,NULL,NULL,'');
|
||
INSERT INTO vendors VALUES('d0ff5d33-2edc-40ff-8298-d7a0a1d0ab31','published','atandt-cybersecurity','AT&T Cybersecurity','https://cybersecurity.att.com/','AT&T Cybersecurity is one of the world’s leading managed security services providers. Our experienced cybersecurity consultants and SOC analysts help manage your network transformation to reduce cybersecurity risk and overcome skill gaps. Our mission is to be your trusted advisor on your journey to cybersecurity resiliency, making it safer for your business to innovate.','208 S Akard Street','17th floor','Dallas','TX','USA','7d941531-ac96-445d-b2c9-0a56e71d1cca',replace('<h5>AT&T Cybersecurity</h5>\n<p>\nAT&T Cybersecurity helps make your network more resilient. Together, the power of the AT&T network, our SaaS-based solutions with advanced technologies including virtualization and actionable threat intelligence from AT&T Alien Labs and the Open Threat Exchange™, and our relationship with best-of-breed vendors, accelerate your response to cybersecurity threats. Our experienced consultants and SOC analysts help manage your network transformation to reduce cybersecurity risk and overcome the skills gap. Our mission is to be your trusted advisor on your journey to cybersecurity resiliency, making it safer for your business to innovate.<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/attcyber','https://www.linkedin.com/company/attcybersecurity','');
|
||
INSERT INTO vendors VALUES('ca9965ff-d378-4f34-a701-d944d5597cc8','published','alta-associates-a-part-of-diversified-search-group','Alta Associates, a part of Diversified Search Group','https://diversifiedsearchgroup.com/alta-associates/','Founded in 1986, Alta Associates, a part of Diversified Search Group, is the pioneer and preeminent executive search firm specializing in Cybersecurity, Risk Management, and Technology. Alta Associates has a successful record of placing cyber roles. ','8 Bartles Corner Rd. ','Suite 021','Flemington','NJ','USA','e676c76b-b0fe-4ffe-b0d5-5ea1a93ab2dd',replace('<h5>Alta Associates, a part of Diversified Search Group</h5>\n<p>\nWhen Russians hacked into Citibank in 1994, Alta Associates was retained to help build the first-ever information security organization. We have been placing Chief Information Security Officers and the teams that support them ever since. Alta is the go-to specialty search firm for companies that are the targets of sophisticated cyber attacks as well as companies hiring their first-ever CISO or elevating their cybersecurity, IT risk management, governance, compliance, and privacy leadership teams.\nFor over three decades, Alta Associates has helped to define, elevate, and integrate the role of cybersecurity and risk professionals in firms ranging from private equity and venture-backed growth companies to the world’s largest and most complex global and regulated corporations.<br>\n</p>','\n',char(10)),'https://www.facebook.com/DivSearch','https://www.twitter.com/DivSearch','https://www.linkedin.com/company/diversifiedsearchgroup/','');
|
||
INSERT INTO vendors VALUES('f5e03c17-e135-4790-bde4-d865621a3400','published','anjuna','Anjuna','www.anjuna.io','Anjuna Security is the leader in data security and privacy. Our breakthrough platform transforms your hybrid-cloud into a high-trust environment where data is always encrypted and code is verified for authenticity. ','380 Portage Avenue',NULL,'Palo Alto','CA','USA','491d3009-7fe7-404e-9d3b-a1f3981f87dc',replace('<h5>Anjuna</h5>\n<p>\nAnjuna Security is the leader in data security and privacy. Our breakthrough platform transforms your hybrid-cloud into a high-trust environment where data is always encrypted and code is verified for authenticity. <br>\n</p>','\n',char(10)),NULL,NULL,NULL,'');
|
||
INSERT INTO vendors VALUES('49c52e04-ccd8-498b-a5b9-4d6db7be2233','published','anitian','Anitian','www.anitian.com','Anitian helps make cloud applications secure and FedRAMP compliant up to 50% faster, at 50% of the cost. Enter federal and defense markets faster while product teams stay focused on adding value to your applications and services. ','8625 SE Cascade Ave ','Suite 500','Beaverton','OR','USA','663b5a53-8cac-49f8-963d-9420fc25d619',replace('<h5>Anitian</h5>\n<p>\nGet FedRAMP audit-ready in half the time for half the cost. Accelerate revenue with Anitian''s advanced, pre-built cloud security and compliance platform for AWS and Azure. Enter new federal markets faster while minimizing cost, resources and risk. <br>\n</p>','\n',char(10)),'https://www.facebook.com/Anitian.Infosec/','https://www.twitter.com/AnitianSecurity','https://www.linkedin.com/company/anitian-enterprise-security','');
|
||
INSERT INTO vendors VALUES('9dce6f07-5ee1-40df-aaa4-9c50fffccff0','published','akeyless','Akeyless','www.akeyless.io','Securely adopt DevOps, Hybrid Multi-cloud Transformation, and Zero-Trust Access initiatives, with Akeyless’ unified Secrets and Secure Access Management platform','122 Grand St',NULL,'NEW YORK','NY','USA','f63326cd-153f-49f7-a40e-92a1dc3d6704',replace('<h5>Akeyless</h5>\n<p>\nAkeyless is a Secrets Orchestration Platform, protecting and managing credentials, certificates and keys used by machines, applications and DevOps teams, in both hybrid and multi-cloud environments. It offers Secrets Management with extensions that provide Secure Remote Access and Data Protection.\nThe Akeyless SaaS platform is built on top of a unique KMS (Key Management System) patented technology that enables us to provide a true Zero Knowledge solution where even Akeyless can’t access the customers’ secrets and keys. The Akeyless platform is FIPS 140-2 and SOC 2 Type 2 certified.\nTo learn more, or schedule a demo, visit www.akeyless.io<br>\n</p>\n<h5>Why Akeyless?</h5>\n<p>Akeyless is a Secrets Orchestration Platform, protecting and managing credentials, certificates and keys used by machines, applications and DevOps teams, in both hybrid and multi-cloud environments. It offers Secrets Management with extensions that provide Secure Remote Access and Data Protection.\nThe Akeyless SaaS platform is built on top of a unique KMS (Key Management System) patented technology that enables us to provide a true Zero Knowledge solution where even Akeyless can’t access the customers’ secrets and keys. The Akeyless platform is FIPS 140-2 and SOC 2 Type 2 certified.</p>','\n',char(10)),'https://www.facebook.com/Akeylessio/','https://www.twitter.com/akeylessio','https://www.linkedin.com/company/akeyless','');
|
||
INSERT INTO vendors VALUES('23ba3650-273c-4951-82e6-a6c9c7db79ce','published','abnormal-security','Abnormal Security','https://www.abnormalsecurity.com/','Abnormal Security provides the leading behavioral AI-based security platform that leverages machine learning to stop sophisticated inbound email attacks and dangerous email platform attacks that evade traditional solutions.','185 Clara St. ','Ste 100','San Francisco','CA','USA','f4d0842e-82ad-42de-b9fa-bbbf04792b01',replace('<h5>Abnormal Security</h5>\n<p>\nAbnormal Security provides the leading behavioral AI-based security platform that leverages machine learning to stop sophisticated inbound email attacks and dangerous email platform attacks that evade traditional solutions. The anomaly detection engine leverages identity and context to analyze the risk of every cloud email event, preventing inbound email attacks, detecting compromised accounts, and remediating emails in milliseconds—all while providing visibility into configuration drifts across your environment. You can deploy Abnormal in minutes with an API integration for Microsoft 365 or Google Workspace and experience the full value of the platform instantly. More information is available at abnormalsecurity.com.<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/abnormalsec','https://www.linkedin.com/company/abnormalsecurity/','');
|
||
INSERT INTO vendors VALUES('1de28966-fca5-4a2d-9874-172d244d9145','published','attackiq','AttackIQ','www.attackiq.com','AttackIQ, the leading independent vendor of breach and attack simulation solutions, built the industry’s first Security Optimization Platform for continuous security control validation and improving security program effectiveness and efficiency. ','171 Main Street','Suite 656','Los Altos','CA','USA','9a0cc6d8-7f17-4935-8444-6f0e7dd447a6',replace('<h5>AttackIQ</h5>\n<p>\nAttackIQ, the leading independent vendor of breach and attack simulation solutions, built the industry’s first Security Optimization Platform for continuous security control validation and improving security program effectiveness and efficiency. AttackIQ is trusted by leading organizations worldwide to plan security improvements and verify that cyberdefenses work as expected, aligned with the MITRE ATT&CK framework. The Company is committed to giving back to the cybersecurity community through its free AttackIQ Academy, open Preactive Security Exchange, and partnership with MITRE Engenuity Center for Threat-Informed Defense.<br>\n</p>\n<h5>Why AttackIQ?</h5>\n<p>The AttackIQ Security Optimization Platform uses real-time performance data from automated adversary emulations\nto help improve the defense capabilities that matter most – from endpoint detection and response, to next generation\nfirewalls, to security segmentation capabilities, to native internal security controls in cloud providers. It is also the industry’s\nbest deployment model for testing your controls at scale and in production; you can test on your laptop, in your home\noffice, or wherever you want.\nThe scenarios and assessment templates in the AttackIQ Security Optimization Platform align deeply to the MITRE\nATT&CK framework and reflect up-to-date threat intelligence. With novel, patent-applied-for capabilities, the Security\nOptimization Platform tests artificial intelligence (AI) and machine learning (ML)-based cyberdefense technologies with\nrealism and comprehensiveness wherever they make enforcement decisions. </p>','\n',char(10)),NULL,'https://www.twitter.com/AttackIQ','https://www.linkedin.com/company/attackiq','');
|
||
INSERT INTO vendors VALUES('608071c0-d754-4190-9b42-3adce4938649','published','abacode-cybersecurity-and-compliance','Abacode Cybersecurity & Compliance','www.abacode.com','Abacode is a (MCCP™) offering customized, framework-based programs and leading technologies to deliver security and compliance results 4x faster than industry average, while increasing efficiency and streamlining processes for clients globally.','777 S. Harbour Island Blvd., ',NULL,'Tampa','FL','USA','811d6581-e1f5-44f6-a8d2-569a840aa3c5',replace('<h5>Abacode Cybersecurity & Compliance</h5>\n<p>\nAbacode is a Managed Cybersecurity & Compliance Provider (MCCP™) that delivers customized, framework-based programs using leading technologies and professional services. Their unique approach achieves security and compliance results four times faster than the industry average, while increasing efficiency and streamlining processes for clients worldwide. <br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/Abacode_Cyber','https://www.linkedin.com/company/abacode-llc/','');
|
||
INSERT INTO vendors VALUES('20851a87-a42e-4207-86c6-2c40fdbf32bc','published','axonius','Axonius','www.axonius.com','With solutions for both cyber asset attack surface management (CAASM) and SaaS management, Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically validate and enforce policies. ','330 Madison Ave ','39th Floor','New York','NY','USA','3d16251a-f758-4a58-b1f5-38aec59d9dd1',replace('<h5>Axonius</h5>\n<p>\nAxonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy. With solutions for both cyber asset attack surface management (CAASM) and SaaS management, Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically validate and enforce policies. For more, visit Axonius.com.<br>\n</p>\n<h5>Why Axonius?</h5>\n<p>Axonius Cybersecurity Asset Management Platform\nAxonius is the cybersecurity asset management platform that gives organizations a Comprehensive Asset Inventory. We uncover security coverage gaps, and automatically validate and enforce your security policies.\nBy seamlessly integrating with over 300 security and IT management solutions, Axonius deploys in hours (not weeks)\nAxonius SaaS Management\nAxonius SaaS Management connects to all layers of the SaaS application stack to reveal actionable insights and provide a comprehensive solution addressing both security and IT needs. Leveraging a rich library of API adapters, Axonius discovers all of your known and unknown SaaS applications, identifies misconfigurations and data security risks, and delivers insights for better IT management and cost optimization.</p>','\n',char(10)),'https://www.facebook.com/Axonius/','https://www.twitter.com/axoniusinc','https://www.linkedin.com/company/axonius','');
|
||
INSERT INTO vendors VALUES('4b3a3585-c814-4817-8808-de50d1927356','published','aqua','Aqua','www.aquasec.com','Aqua Security is the largest pure-play cloud native security company, providing customers the freedom to innovate and accelerate their digital transformations.','800 District Avenue ','Suite 510','Burlington','MA','USA','db12e33f-d2df-4f64-abc6-9ad5764fb196',replace('<h5>Aqua</h5>\n<p>\nAqua Security is the largest pure-play cloud native security company, providing customers the freedom to innovate and accelerate their digital transformations. The Aqua Platform is the leading Cloud Native Application Protection Platform (CNAPP) and provides prevention, detection, and response automation across the entire application lifecycle to secure the supply chain, secure cloud infrastructure and secure running workloads wherever they are deployed. Aqua customers are among the world’s largest enterprises in financial services, software, media, manufacturing and retail, with implementations across a broad range of cloud providers and modern technology stacks spanning containers, serverless functions and cloud VMs.<br>\n</p>\n<h5>Why Aqua?</h5>\n<p>Stop cloud native attacks from day one and in real-time with the Aqua Platform, a Cloud Native Application Protection Platform (CNAPP). Its fully integrated set of security and compliance capabilities visualize, prioritize, and eliminate risk in minutes across the full software development life cycle. Automated policies for shift-left prevention and runtime detection and response reduce your attack surface and mitigate active attacks—before damaging losses can occur. Aqua empowers you to unleash the full potential of your digital transformation and accelerate innovation with the confidence that your cloud native applications are secured from start to finish, at any scale.</p>','\n',char(10)),'https://www.facebook.com/AquaSecTeam','https://www.twitter.com/AquaSecTeam','https://www.linkedin.com/company/aquasecteam/','');
|
||
INSERT INTO vendors VALUES('a22f0696-0e60-4446-93e0-89b0f402c653','published','asimily','Asimily','www.asimily.com','Asimily’s IoMT & IoT risk remediation platform holistically secures the mission-critical healthcare devices that deliver safe and reliable care','440 N Wolfe Rd',NULL,'Sunnyvale','CA','USA','dfb58751-c09b-4519-87a6-daf165fe14bb',replace('<h5>Asimily</h5>\n<p>\nAsimily is an industry-leading risk management platform that secures connected medical and IoT devices specially designed for healthcare, life sciences, and universities. With the most extensive knowledge base of IoT and security protocols, Asimily inventories and classifies every device across an organization, both connected and stand-alone. Because risk assessment—and threats—are not a static targets, Asimily monitors organizations’ connected devices, detects anomalous behavior, and alerts operators to remediate any identified anomalies. With secure medical, laboratory, IoT/OT, and IT equipment, Asimily customers know their business-critical devices and data are safe.\nAsimily solves various use cases including device identification and classification, device connectivity, vulnerability management, anomaly + threat detection, mitigation, forensic analysis, asset utilization, FDA recall monitoring, policy management, and vendor management. <br>\n</p>\n<h5>Why Asimily?</h5>\n<p>Asimily is an industry-leading risk management platform that secures connected medical and IoT devices specially designed for healthcare, life sciences, and universities. Asimily solves various use cases including device identification and classification, device connectivity, vulnerability management, anomaly + threat detection, mitigation, forensic analysis, asset utilization, FDA recall monitoring, policy management, and vendor management. For more information, contact Asimily at info@asimily.com.\n</p>','\n',char(10)),NULL,'https://www.twitter.com/asimilysecurity','https://www.linkedin.com/company/asimily','');
|
||
INSERT INTO vendors VALUES('7a253448-e1a3-4ab2-90be-dfded4a21fbb','published','arctic-wolf-networks-inc','Arctic Wolf Networks, Inc.','www.arcticwolf.com','Arctic Wolf® is a global leader in security operations, delivering a premier cloud-native security operations platform designed to end cyber risk.','8939 Columbine Road',NULL,'Eden Prairie','MN','USA','8a2f7da9-ff67-4e54-9275-f9dba85efdb3',replace('<h5>Arctic Wolf Networks, Inc.</h5>\n<p>\nArctic Wolf is a global leader in security operations, enabling customers to manage their cyber risk in the face of modern cyber attacks via a premier cloud-native security operations platform. To accomplish unprecedented capacity and scale for cyber defense, the Arctic Wolf Security Operations Cloud ingests and analyzes more than three trillion security events a week, enabling customers of virtually all sizes and in all industries to feel confident in their security posture, readiness, and remediation. By delivering automated threat detection and response at the speed of the cloud, Arctic Wolf empowers organizations to establish world-class security operations with the push of a button and defend their greatest assets at the speed of data. <br>\n</p>','\n',char(10)),'https://www.facebook.com/ArcticWolfNetworks/','https://www.twitter.com/AWNetworks','https://www.linkedin.com/company/arcticwolf/','');
|
||
INSERT INTO vendors VALUES('5baad229-3625-4b81-bfd2-72833d6d42f2','published','anvilogic','Anvilogic','www.anvilogic.com','Anvilogic modern security operations platform for threat detection and incident response helps unify across signals to gain valuable insights and recommendations to continuously assess, detect, hunt, triage, and respond. ','644 Emerson St',NULL,'Palo Alto','CA','USA','1a8c60b0-c3bd-4495-90fe-5b0ab77d949a',replace('<h5>Anvilogic</h5>\n<p>\nAnvilogic is purpose-built to break down security operations, cloud workload, and data silos – moving security from being a bottleneck to helping accelerate and align to business priorities. By automating threat detection and incident response you can gain visibility across complex interactions across different systems to correlate seemingly unrelated events. The platform makes security operations better, faster, and stronger reducing manual efforts and expertise needed, while increasing accuracy, efficacy through AI-driven recommendations, detection automation, and continuous maturity scoring.<br>\n</p>\n<h5>Why Anvilogic?</h5>\n<p>Anvilogic is purpose-built to break down security operations, cloud workload, and data silos – moving security from being a bottleneck to helping accelerate and align to business priorities. By automating threat detection and incident response you can gain visibility across complex interactions across different systems to correlate seemingly unrelated events. The platform makes security operations better, faster, and stronger reducing manual efforts and expertise needed, while increasing accuracy, efficacy through AI-driven recommendations, detection automation, and continuous maturity scoring.</p>','\n',char(10)),NULL,'https://www.twitter.com/weareanvilogic','https://www.linkedin.com/company/anvilogic/','');
|
||
INSERT INTO vendors VALUES('9c528c8b-8737-412f-a1d8-3a46641dccaf','published','appgate','Appgate','appgate.com',replace('Appgate provides industry leading Zero Trust access, designed differently for a reason. Why? To uphold your access control standards, not those mandated by a vendor’s cloud-routed architecture. Superior network control for complex environments. \n\n ','\n',char(10)),'2 Alhambra Plaza ','Suite PH-1-B','Coral Gables','FL','USA','2e00f314-aa57-4d08-a685-a97b8f3cf270',replace('<h5>Appgate</h5>\n<p>\nAppgate provides industry leading Zero Trust access, designed different for a reason. To uphold your access control standards, not those mandated by a vendor’s cloud-routed architecture.\nMost Zero Trust access solutions require traffic to traverse their cloud, failing to meet the standards of organizations with high security requirements and intricate networks. The flexible architecture of Appgate SDP delivers superior network control for organizations with sophisticated and complex environments needing to simplify and secure access. With Appgate SDP you can secure your hybrid environment, transform and maintain control of your network, deliver security adaptability and agility within your organization, and reduce operator and end user complexity.\nNotably, Appgate is a leader positioned highest for current offering in Forrester’s ZTNA New Wave and is a trusted Zero Trust provider to the U.S. Department of Defense.\nLearn more: appgate.com/zero-trust-network-access <br>\n</p>\n<h5>Why Appgate?</h5>\n<p>Secure Your Whole Environment, Everywhere\n• Any workload, user or device that’s on-premises, remote or at the furthest edge of your enterprise\n• Stop lateral attacks with identity, context + risk aware least privilege access\nTransform and Maintain Full Control of Your Network\n• Unified access policies with centralized entitlement management across all network protocols\n• High performance, two-way encrypted direct connectivity\n• Drastically reduce WAN costs and securely transition to Café Style networking\nDeliver Security Adaptability and Agility to the Business\n• Unlock the potential of a unified Zero Trust policy engine with security, IT and business system interoperability\n• Define entitlements that dynamically adjust using environment metadata\n• Deliver Zero Trust security as code\nReduce Operator and End User Complexity\n• Empower admins to reduce secure access provisioning time by 91%\n• Empower users with a seamless experience, reducing access-related trouble tickets by 66%</p>','\n',char(10)),NULL,'https://www.twitter.com/AppgateSecurity','https://www.linkedin.com/company/appgate-security/','');
|
||
INSERT INTO vendors VALUES('d0756373-50de-443a-aa70-368a26372918','published','auditboard','AuditBoard','auditboard.com','AuditBoard transforms how audit, risk, and compliance professionals manage today’s dynamic risk landscape with a modern, connected platform that engages the front lines, surfaces the risks that matter, and drives better strategic decision-making.','12900 Park Plaza Dr. ','Suite 200','Cerritos','CA','USA','204032ce-ee74-44e4-87f0-4284e81ac2e5',replace('<h5>AuditBoard</h5>\n<p>\nAuditBoard is the leading cloud-based platform transforming audit, risk, and compliance management. More than 35% of the Fortune 500 leverage AuditBoard to move their businesses forward with greater clarity and agility. AuditBoard is top-rated by customers on G2, Capterra, and Gartner Peer Insights, and was recently ranked for the fourth year in a row as one of the fastest-growing technology companies in North America by Deloitte. To learn more, visit: AuditBoard.com.<br>\n</p>\n<h5>Why AuditBoard?</h5>\n<p>AuditBoard transforms how InfoSec and IT compliance professionals manage today’s dynamic digital risk landscape with a modern, connected platform that empowers them to scale their programs, automate recurring tasks, and focus on the security and risk trends that matter.\nAt the heart of our connected risk architecture is a unified data core that centralizes risks, controls, policies, frameworks, and issues, and powers our purpose-built security compliance and third-party risk management solutions. AuditBoard is top-rated by customers on G2, Capterra, and Gartner Peer Insights, and was recently named one of the Best Software Products for 2023 by G2. </p>','\n',char(10)),'https://www.facebook.com/auditboard/','https://www.twitter.com/auditboard/','https://www.linkedin.com/company/auditboard/','');
|
||
INSERT INTO vendors VALUES('8b595c55-5208-44ee-8ffd-b2dc63a13216','published','armorblox','Armorblox','www.armorblox.com','Armorblox secures enterprise communications over email and other cloud office applications with the power of Natural Language Understanding (NLU). ','100 S. Murphy Ave ','Suite 200','Sunnyvale','CA','USA','84dcf9a7-dd2a-42a1-a655-ce436f8985bb',replace('<h5>Armorblox</h5>\n<p>\nArmorblox secures enterprise communications over email and other cloud office applications with the power of Natural Language Understanding. The Armorblox platform connects over APIs and analyzes thousands of signals to understand the context of communications and protect people and data from compromise. Over 58,000 organizations use Armorblox to stop BEC and targeted phishing attacks, protect sensitive PII and PCI, and automate remediation of user-reported email threats. Armorblox was featured in the Gartner 2021 Market Guide for Email Security and Gartner 2022 Market Guide for Data Loss Prevention. Founded in 2017, Armorblox is headquartered in Sunnyvale, CA and backed by General Catalyst and Next47. <br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/armorblox','https://www.linkedin.com/company/armorbloxinc/','');
|
||
INSERT INTO vendors VALUES('536769d1-d170-4e46-86c3-a971983daf00','published','adaptiva','Adaptiva','www.adaptiva.com','The world’s largest enterprises and government agencies trust Adaptiva for real-time endpoint visibility, software distribution, compliance checks, remediations, and autonomous patching without impacting productivity. Learn how at adaptiva.com.','4010 Lake Washington Blvd.','Suite 200','Kirkland','WA','USA','0a6ac87e-dfc8-4e3c-bc03-1772da1bbd01',replace('<h5>Adaptiva</h5>\n<p>\nAdaptiva provides autonomous endpoint management applications that eliminate complexity. Our applications run on a proprietary platform, which is powered by the surplus capacity of on-network and remote devices to continuously deliver software, configurations, and patches to endpoints in the digital workplace without disrupting employees or business traffic. The world’s largest enterprises and government agencies trust Adaptiva for real-time endpoint visibility, content delivery, compliance checks, remediations, and patching without impacting productivity. Learn how at adaptiva.com.<br>\n</p>\n<h5>Why Adaptiva?</h5>\n<p>Autonomous Patch will automatically patch third-party Windows applications without human assistance at enterprise speed and scale, with industry defining capabilities that allow administrators to focus on strategy and modelling desired state across even the most complex environments. IT will never have to worry about patching again, making it more difficult for hackers to find vulnerabilities in applications to exploit. A few highlights of Autonomous Patch capabilities include:\n- Set it and Forget it\n- Full Visibility and Control\n- Limitless Scale\n- Continuous Metadata\n- Flexible Patch Distribution\n- Strengthen UEM - Flexibility to work with any unified endpoint management and substantially improves the performance of tools like Microsoft Intune, VMware Workspace One, and others by ensuring content is fully distributed to every device.</p>','\n',char(10)),'https://facebook.com/adaptiva','https://www.twitter.com/adaptiva','https://linkedin.com/company/adaptiva','');
|
||
INSERT INTO vendors VALUES('5bf2b6b4-8da2-4bef-9590-2530e2e7b6f9','published','infosecurity-magazine','Infosecurity Magazine','www.infosecurity-magazine.com','Infosecurity Magazine is the leading digital platform and print magazine for information security professionals globally across all the key business verticals. ','Gateway House 28 ','The Quadrant','Richmond',NULL,'GBR','e0a3ec5e-62c4-471e-a967-23abecac7e9d',replace('<h5>Infosecurity Magazine</h5>\n<p>\nInfosecurity Magazine has over twelve years of experience providing knowledge and insight into the information security industry. Its multiple award winning editorial content provides compelling features both online and in print that focus on hot topics and trends, in-depth news analysis and opinion columns from industry experts.\nInfosecurity Magazine also provides free educational content featuring: an established webinar channel, whitepaper syndication programs & industry leading virtual conferences all of which are endorsed by all major industry accreditation bodies, making Infosecurity Magazine a key learning resource for industry professionals.<br>\n</p>\n<h5>Why Infosecurity Magazine?</h5>\n<p>Infosecurity Magazine is the authoritative voice within the cyber security industry, providing knowledge and insight into the industry with daily news updates, regular features and interviews in additional to educational content with its webinars, whitepapers and online summit. </p>','\n',char(10)),'https://www.facebook.com/infosecmag/','https://www.twitter.com/infosecuritymag','https://www.linkedin.com/company/infosecurity-magazine','');
|
||
INSERT INTO vendors VALUES('7fbff625-1859-47d9-b42a-1d0df3253c97','published','aewin-tech-inc','AEWIN Tech Inc.','www.aewin.com','AEWIN: ISO-9001 certified manufacturer of commercial off-the-shelf (COTS) and customized embedded computers for OEMs, ODMs, and system integrators serving various IT applications, with a focus on telco, embedded and network security. ','780 Montague Expressway ','#207','San Jose','CA','USA','845342d3-6ead-477c-8d35-c8054040a7d7',replace('<h5>AEWIN Tech Inc.</h5>\n<p>\nAEWIN Tech was founded in Taipei, Taiwan in the year 2000 based on the design concept that boards should maintain a consistent modular approach and to avoid over-engineering a solution. Creating a library of working formats and improving on those designs throughout our history has allowed us to pair reliability with reduced time-to-market. With new technologies constantly being developed, we have met these challenges while maintaining our original vision.\nAEWIN has profound accumulated experience and state-of-art know-how. With ISO 9001/ISO 14001/ ISO 45001 /IECQ QC080000 certification. We have the best solutions for Network Appliance and Edge Computing Servers; Our comprehensive in-house resources such as modular design workflow, overall quality control and management, and elite engineering team that is composed of aces from related industries.\nAEWIN is able to meet any unique ODM/OEM requirements in network appliances, edge servers, and cloud servers.<br>\n</p>\n<h5>Why AEWIN Tech Inc.?</h5>\n<p>From ultra-compact fanless computers to versatile edge network appliances to high performance computing, AEWIN designs the platforms wisely with years of experiences to fulfill a variety of market requirements. We provide featured products based on wide-range of CPUs from both Intel and AMD for various applications including 5G Open-RAN, SD-WAN, Edge AI, and further virtualized network solutions.\nOn top of that, AEWIN ''s QAT (Crypto Acceleration) cards with Intel QuickAssist Adapter including C626 and C627 to expand the performance and security capabilities. We have multiple options, ranging from 1G/10G/100Gbps and mixed configurations, easy to configure and integrate to the exact requirements into diverse solutions, per use cases and applications. It is also suitable for SDN and NFV solutions as VPN traffic acceleration and I/O virtualization using SR-IOV is supported. </p>','\n',char(10)),NULL,'https://www.twitter.com/IPC_aewin','https://www.linkedin.com/company/aewin-usa','');
|
||
INSERT INTO vendors VALUES('8357d78c-17bc-4e0b-9c19-569e65ed937e','published','adlink','ADLINK','www.adlinktech.com','ADLINK is committed to developing industry-leading edge computing platforms to drive the transformation of communications network architectures, and enable customers to explore new services and business models across various market segments. ','6450 Via Del Oro',NULL,'San Jose','CA','USA','97f6c021-a57b-4459-bf1e-7f2d72110924',NULL,NULL,NULL,NULL,'adlink-1435012082729001wr53');
|
||
INSERT INTO vendors VALUES('8723e145-f285-4538-9dc9-7cc4c9d8cd01','published','algosec','AlgoSec','www.algosec.com',replace('AlgoSec, a global cybersecurity leader, empowers organizations to secure application connectivity by automating connectivity flows and security policy, anywhere.\n ','\n',char(10)),'65 Challenger Rd','Suite 310','Ridgefield Park ','NJ','USA','ce8b35f9-88b6-4aa1-8912-142a0f845afb',replace('<h5>AlgoSec</h5>\n<p>\nAlgoSec, a global cybersecurity leader, empowers organizations to secure application connectivity by automating connectivity flows and security policy, anywhere. \nThe AlgoSec platform enables the world’s most complex organizations to gain visibility, reduce risk and process changes at zero-touch across the hybrid network. \nOver 1,800 of the world’s leading organizations trust AlgoSec to help secure their most critical workloads across public cloud, private cloud, containers, and on-premises networks, while taking advantage of almost two decades of leadership in Network Security Policy Management. \nSee what securely accelerating your digital transformation, move-to-cloud, infrastructure modernization, or micro-segmentation initiatives looks like at www.algosec.com <br>\n</p>\n<h5>Why AlgoSec?</h5>\n<p>AlgoSec’s unique technology visualizes connectivity flows and security posture by listening to the network to associate security policy with specific applications. Additionally, AlgoSec integrates with leading ITSM, SIEM, vulnerability scanners, identify management, and orchestration systems to promote a holistic, more robust security posture.\nAlgoSec’s platform delivers a unified way to visualize and manage the application connectivity and security policies across all public clouds, private clouds, containers, and on-premises networks. Its real-time network map provides a complete view and connectivity flows across all security and filtering technologies.\nUsing its unique vendor-agnostic deep algorithm for change management automation, AlgoSec enforces application connectivity and security policy, thus preventing human errors, substantially reducing exposure to security risks and expediting time-to-market. </p>','\n',char(10)),'https://www.facebook.com/AlgoSec/','https://www.twitter.com/AlgoSec','https://www.linkedin.com/company/algosec','');
|
||
INSERT INTO vendors VALUES('eaa43f60-2c3c-4d6a-8205-79522e847978','published','juniper-networks','Juniper Networks','https://www.juniper.net/us/en/security.html','Juniper Networks is dedicated to dramatically simplifying network operations and driving superior experiences for end users. Our solutions deliver industry-leading insight, automation, security, and AI to drive real business results. We believe that powering connections will bring us closer together while empowering us all to solve the world’s greatest challenges.','1133 Innovation Way',NULL,'Sunnyvale','CA','USA','51419d78-1722-4076-b200-121ca58ed64e',replace('<h5>Juniper Networks</h5>\n<p>\nJuniper Networks is dedicated to dramatically simplifying network operations and driving superior experiences for end users. Our solutions deliver industry-leading insight, automation, security and AI to drive real business results. We believe that powering connections will bring us closer together while empowering us all to solve the world’s greatest challenges of well-being, sustainability and equality.<br>\n</p>','\n',char(10)),'https://www.facebook.com/JuniperNetworks','https://www.twitter.com/JuniperNetworks','https://www.linkedin.com/company/juniper-networks/','');
|
||
INSERT INTO vendors VALUES('2ecc0bcd-1ca8-4032-9b96-22b970d686ba','published','jamf','Jamf','www.jamf.com',replace('Jamf’s purpose is to simplify work. With over 69,00 customers, Jamf helps organizations manage and secure an Apple experience that end users love and organizations trust. To learn more, visit jamf.com\n','\n',char(10)),'100 Washington Ave S ','Suite 1100','Minneapolis','MN','USA','f8db85d5-52a8-4d7f-be67-860401a0f9b2',replace('<h5>Jamf</h5>\n<p>\nJamf’s purpose is to simplify work by helping organisations manage and secure an Apple experience that end users love and organisations trust. Jamf is the only company in the world that provides complete management and security solutions for an Apple-first environment that is enterprise secure and consumer simple while protecting personal privacy.\nJamf is uniquely positioned to bring together the best of device management, user identity and endpoint protection to deliver Trusted Access. Trusted Access enables organisations to ensure that only authorised users on enrolled and secured devices can connect to business applications and data.\nWith more than 71,000 customers, Jamf extends the legendary Apple experience people love to businesses, schools and government organisations through its software and the largest online community of Apple IT admins in the world, Jamf Nation.<br>\n</p>\n<h5>Why Jamf?</h5>\n<p>By bringing together Management and Security through Trusted Access with Jamf, each layer of defense increases your endpoint security and protection of sensitive work resources.\nJamf Pro is the standard in Apple management with powerful workflows for device and app management, inventory and security, ensuring users are productive from wherever they work, while preserving the best-in-class Apple experience and personal privacy that end users expect.\nJamf Connect is purpose-built for Mac and mobile devices to streamline provisioning, authentication and identity management and modern remote access by giving users the power to leverage a single cloud-based identity to gain immediate access to the resources and apps they need to be productive.\nJamf Protect is an endpoint security and mobile threat defense (MTD) solution that helps organizations defend against modern threats, maintain endpoint compliance, identify active threats and respond to them.\n</p>','\n',char(10)),'https://www.facebook.com/jamfsoftware/','https://www.twitter.com/jamfsoftware','https://www.linkedin.com/company/jamf-software/','');
|
||
INSERT INTO vendors VALUES('c9bb128e-af6e-4b61-acc5-a215e3929f99','published','jfrog','JFrog','www.jfrog.com','JFrog Ltd. and the JFrog Platform enable developers to build, secure, distribute, and connect any source with any production environment. Thousands of customers worldwide, including a majority of the Fortune 100, depend on JFrog to securely manage their software. Learn more at jfrog.com.','270 East Caribbean Drive',NULL,'Sunnyvale','CA','USA','08e5455a-8d2d-40fc-8fe8-0beac5670ddb',replace('<h5>JFrog</h5>\n<p>\nJFrog Ltd. (Nasdaq: FROG), is on a mission to create a world of software delivered without friction from developer to device. Driven by a “Liquid Software” vision, the JFrog Software Supply Chain Platform is a single system of record that powers organizations to build, manage, and distribute software quickly and securely, ensuring it is available, traceable, and tamper-proof. The integrated security features also help identify, protect, and remediate against threats and vulnerabilities. JFrog’s platform is available as both self-hosted and SaaS services across major cloud service providers. Millions of users and 7K+ customers worldwide depend on JFrog solutions to securely embrace digital transformation. Once you leap forward, you won’t go back! Learn more at jfrog.com and follow us on Twitter: @jfrog.<br>\n</p>\n<h5>Why JFrog?</h5>\n<p>JFrog’s universal Software Supply Chain Platform is the database of DevOps that serves as a single system of record for automating and managing software releases at scale. Comprised of JFrog Artifactory, Xray, Advanced Security, Pipelines, and Distribution, it creates, tracks and manages binaries across software development pipelines. JFrog Xray is a software composition analysis (SCA) solution that deeply analyzes open source binaries to detect known security vulnerabilities and also understand their license compliance status. JFrog Advanced Security augments JFrog Xray’s SCA capabilities with new in-depth binary security scanning, allowing a new understanding of the security state of your binaries, especially container images. Advanced scanners identify security issues that can’t be found via source code analysis alone and include contextual analysis of CVEs, IaC security issues, exposed secrets detection, and the identification of insecure use of OSS libraries and services. </p>','\n',char(10)),'https://www.facebook.com/artifrog','https://www.twitter.com/jfrog','https://www.linkedin.com/company/jfrog-ltd','');
|
||
INSERT INTO vendors VALUES('1aff2f10-648a-40a6-9346-bf01c8bea8f4','published','jupiterone','JupiterOne','www.jupiterone.com?utm_source=event&utm_campaign=rsac2023','JupiterOne gives enterprises full visibility into their attack surface and security posture with continuous asset management. Reduce risk, triage incidents, and prioritize vulnerability findings with greater clarity and 85% fewer SecOps resources.','2701 Aerial Center Parkway ','Suite 120','Morrisville','NC','USA','454223b0-00d7-401f-a3f3-9251b346ac9c',replace('<h5>JupiterOne</h5>\n<p>\nJupiterOne is a cyber asset management and governance solution, providing visibility and security into your entire cyber asset universe. JupiterOne allows enterprises of any size and in any industry to answer the question: are we compliant and secure? JupiterOne helps you know more and fear less.\nJupiterOne reduces security and compliance risks with unparalleled visibility into your entire cyber asset universe. Determine the blast radius for any attack vector and fast-track investigation and response with the ability to query and get results in seconds.<br>\n</p>\n<h5>Why JupiterOne?</h5>\n<p>JupiterOne unifies your fragmented technology stack, giving you visibility and contextual insights into your attack surface.\nJupiterOne ingests assets via API from every tool in your technology stack. It aggregates and normalizes data, giving you a holistic view of your security posture. By mapping the connections between assets, security teams get deeper context and insights, and can uncover their most pressing security issues. Similar tools only look for issues in cloud infrastructure, missing critical information. Others only look at basic information like users and devices and can’t provide the same level of context and insights.\nJupiterOne helps enterprise security teams answer critical security questions, uncover threats, close compliance gaps, and prioritize risk. With a connected view of assets, infrastructure, and security information, you can respond faster to incidents, prioritize actions based on business impact, and conduct everyday security operations more efficiently.</p>','\n',char(10)),NULL,'https://www.twitter.com/jupiterone','https://www.linkedin.com/company/jupiterone','');
|
||
INSERT INTO vendors VALUES('f19050f3-8406-4c9d-bf11-4d8dd1c88d26','published','jetway-computer-corp','Jetway Computer Corp.','www.jetwaycomputer.com','Jetway, established in 1998, specializing in the development and marketing of industrial motherboards and computer systems in USA. Among our products are embedded motherboards, industrial barebone systems, rackmounts, and panel PC.','8058 Central Ave.',NULL,'Newark','CA','USA','52f6b834-85f1-4d66-b337-bcca27b53d98',replace('<h5>Jetway Computer Corp.</h5>\n<p>\nJetway, established in 1998, specializing in the development and marketing of industrial motherboards and computer systems in USA. Among our products are embedded motherboards, industrial barebone systems, rackmounts, and panel PC.<br>\n</p>','\n',char(10)),'https://www.facebook.com/jetway.usa','https://www.twitter.com/jetwaycomputer','https://www.linkedin.com/company/jetway-usa','');
|
||
INSERT INTO vendors VALUES('3a59914e-09b6-40c2-ad14-2e288edf26ad','published','qax-technology-group-inc','QAX Technology Group Inc.','https://en.qianxin.com/','QAX is a leader in cybersecurity industry, providing new generation enterprise-level and national-level cybersecurity solutions. Years of R&D and innovation, QAX has reinforced the strength in big data, AI, and security operation.','QAX Security Center,No.1','26 Xizhimenwai South Road Xicheng District','Beijing',NULL,'CHN','f78d435f-480b-4a5b-9dca-3d24d9b08fb9',replace('<h5>QAX Technology Group Inc.</h5>\n<p>\nQAX is a leader in cybersecurity industry, providing new generation enterprise-level and national-level cybersecurity solutions. Years of R&D and innovation accumulated from cyber offense and defense practice, QAX has reinforced the strength in big data, AI, and security operation. In 2019, QAX also became the official cybersecurity services and anti-virus software sponsor of the Olympic and Paralympic Winter Games Beijing 2022. During years of development, company business has enjoyed high recognition at home and aboard.\nTo dedicate in development of “New Infrastructure Construction” and digitalization, QAX has employed the methodology of system engineering together with the idea of “Built-in security”, in the age of IOE, to build a collective cybersecurity defense system on top of “new generation cybersecurity framework”; to accomplish that, company is using “data-driven security” as technology concept, and “co-operating of ‘human + machine’” as method.\n<br>\n</p>','\n',char(10)),NULL,NULL,NULL,'');
|
||
INSERT INTO vendors VALUES('3b9eec5d-aa01-4230-8206-d3784a97844d','published','quest-software','Quest Software','https://www.quest.com/solutions/cybersecurity-risk-management-solutions/','Quest solutions work together to protect your hybrid Active Directory environment and manage risk. Quest helps you discover and eliminate potential attack paths, identify risky changes, control group policy chaos, & quickly recover from AD disasters.','4 Polaris Way',NULL,'Aliso Viejo','CA','USA','40fd37d6-0e7e-4e24-8ed2-c9ab88e9ee38',replace('<h5>Quest Software</h5>\n<p>\nQuest solutions work together to protect your hybrid Active Directory environment and manage risk. Quest helps you discover and eliminate potential attack paths, identify risky changes, control group policy chaos, and quickly recover from AD disasters.<br>\n</p>\n<h5>Why Quest Software?</h5>\n<p>Hybrid Active Directory & Microsoft environments are constantly evolving and growing – as are the risks & complexities in securing them. Quest Recovery Manager for AD Disaster Recovery Edition can slash AD forest recovery time up to 98% & fuel a quick return to business operations from breaches like ransomware. Attack path management is a vital component of defense in depth for AD & M365 environments. With Quest & SpecterOps BloodHound Enterprise, you can identify IOEs & prioritize the attack paths an attacker could use to own your environment. You’ll be able to quickly assess potential risks & establish a plan that eliminates the most vulnerable paths. Quest On Demand Audit Hybrid Suite mitigates risk by allowing you to audit security changes in hybrid AD environments, monitor AD in real-time for active attacks & IOCs, & roll back any unwanted changes. With GPOADmin, you can automate critical Group Policy management & governance tasks to reduce risk & eliminate manual processes.</p>','\n',char(10)),'https://www.facebook.com/questsoftware','https://www.twitter.com/Quest','https://www.linkedin.com/company/quest-software','');
|
||
INSERT INTO vendors VALUES('c8e4317b-4a10-46d4-a126-b310ab50f4c6','published','quintessencelabs','QuintessenceLabs','www.quintessencelabs.com','QuintessenceLabs is a leader in quantum cybersecurity recognized for its quantum-safe data protection capabilities, including the world’s fastest quantum random number generators, crypto-agile key management, and ultra-secure quantum key distribution','175 Bernal Rd. ','Suite 220','San Jose','CA','USA','5fcef6a6-409a-4669-8746-9b6bf0bf5b60',replace('<h5>QuintessenceLabs</h5>\n<p>\nQuintessenceLabs is a global leader in post-quantum cybersecurity. The company offers a suite of crypto-agile solutions and services ranging from qStream, the world''s fastest quantum random number generator to qOptica™ QKD a continuously variable quantum key distribution system which is underpinned by the Trusted Security® (TSF®), the industry''s most secure encryption key and policy management platform. The company is currently working with governments and global enterprise organizations worldwide to build a quantum-resilient future.<br>\n</p>\n<h5>Why QuintessenceLabs?</h5>\n<p>qOptica™ Quantum Key Distribution (QKD) - QuintessenceLabs’ continuous variable quantum key distribution (CV-QKD) technology is the most secure means of distributing keys, protected by the laws of physics. Our solution integrates a quantum entropy source and distributes keys over existing optic fiber between network nodes offering built-in cost advantages.\nTrusted Security Foundation® | TSF® Enterprise Key and Policy Manager\nThe crypto-agile TSF tackles tough key management challenges by providing highly-capable and fully interoperable centralized key and policy management with outstanding performance, availability, and integrity.\nqStream™ Quantum Random Number Generator (QRNG)\nThe qStream™ QRNG appliance forms the foundational layer of all our security products. It uses patented quantum technology to deliver unpredictable true random numbers at 1Gbit/sec ensuring applications always have sufficient entropy and preventing performance and security issues.</p>','\n',char(10)),NULL,'https://www.twitter.com/QuintessenceLab','https://www.linkedin.com/company/quintessencelabs-pty-ltd','');
|
||
INSERT INTO vendors VALUES('ccb81813-748f-4174-923c-faa280fcd684','published','qohash','Qohash','https://qohash.com','One platform to manage the full sensitive data lifecycle. Qohash makes it faster, easier and more affordable for information security teams to meet data privacy regulations and prevent data breaches.','394 Rue de Sainte-Helene',NULL,'Quebec City','QC','CAN','d978756c-bcf7-40d5-a394-5c8fcca40ebe',replace('<h5>Qohash</h5>\n<p>\nQohash was designed from the CPU up to help information security teams defy legacy data privacy limitations, while giving them back time, money and resources. Manage all sensitive data risk from Qohash’s Qostodian platform. Classify and inventory data across every business system 50x faster than alternatives. Slice through false positives with surgically precise, contextualized results that prioritize risk levels. Take action early to prevent insider data breaches with real-time notifications of policy violations. Nailing audits, meeting regulatory requirements and preventing insider threats just got easier, with Qohash.<br>\n</p>\n<h5>Why Qohash?</h5>\n<p>Qohash’s QOSTODIAN platform offers the simplest way for information security teams to manage sensitive data risk, while saving time, money and resources. Foundational to sensitive data compliance, information security teams receive a complete inventory of unstructured data at-rest, across every data source, 50x faster than alternatives. As required by regulations, teams quickly and easily regulate access control, fulfill data deletion requests, meet breach notification requirements, and show proof of policy enforcement. QOSTODIAN delivers quantified risk levels by employee and department. Alerts are generated the instant risky behavior occurs, including employee accumulation, deletion or exfiltration of data. Only QOSTODIAN enables reverse search functionality to save valuable remediation time. See the full data lineage of a credit card, bank account number, or other data element, including where data got out of an environment, where it ended up, and every touch point in between.\n</p>','\n',char(10)),NULL,'https://www.twitter.com/Qohash','https://www.linkedin.com/company/qohash/','');
|
||
INSERT INTO vendors VALUES('3572ec2a-9e0a-43c9-a652-35e5e15715f5','published','quantinuum','Quantinuum','www.quantinuum.com','Quantinuum harnesses the power of quantum computing to help security teams stay ahead of cyber risks. Its Quantum Origin platform provides the world’s only quantum-computing-hardened encryption keys to protect data and assets from advanced threats. ','303 S Technology Ct',NULL,'Broomfield','CO','USA','f0c242c8-f471-44fa-a879-593e123f14f1',replace('<h5>Quantinuum</h5>\n<p>\nQuantinuum unites best-in-class software with high-fidelity hardware to accelerate quantum computing and cybersecurity. With integrated full-stack technology, our world-class experts are rapidly scaling quantum computing in a variety of industries, including cybersecurity. Quantinuum''s Quantum Origin solution is the world''s first quantum-computing-hardened encryption key generation solution. <br>\n</p>\n<h5>Why Quantinuum?</h5>\n<p>Quantum Origin is the world’s first cryptographic key generation platform that uses the unpredictable nature of quantum mechanics to generate quantum-computing-hardened encryption keys. These keys harden encryption measures to help customers secure their most valuable assets and data against sophisticated encryption-based threats.</p>','\n',char(10)),'https://www.facebook.com/QuantinuumQC','https://www.twitter.com/QuantinuumQC','https://www.linkedin.com/company/quantinuumqc/','');
|
||
INSERT INTO vendors VALUES('213b7434-09e1-44c8-ac17-242399521ec6','published','accedian','Accedian','https://accedian.com/','Accedian is the leader in performance analytics, cybersecurity threat detection and end user experience solutions, dedicated to providing our customers with the right insight to control their digital infrastructure.','2351 Alfred Nobel Bd ','Suite N-410','Saint- Laurent','QC','CAN','20efe404-f3dd-4340-be5b-1861e5e52308',replace('<h5>Accedian</h5>\n<p>\nAccedian is a leader in performance analytics, cybersecurity threat detection, and end user experience solutions, dedicated to providing our customers with the ability to assure and secure their digital infrastructure, while helping them to unlock the full productivity of their users.\nWe are committed to empowering our customers with the ability to see far and wide across their IT and network infrastructure and a microscopic ability to dive deep and understand the experience and security of every user, helping them to delight and protect their own customers each and every time.\nAccedian has been delivering solutions to high profile customers globally for over 15 years.\nLearn more at accedian.com <br>\n</p>\n<h5>Why Accedian?</h5>\n<p>Accedian’s Skylight Interceptor is a Network Detection and Response solution (NDR) that helps organizations proactively identify threats that hide deep within the network and are often missed by other security solutions. Interceptor protects the network from Zero-Day attacks by delivering prioritized, context-rich incidents to speed detection and response of security threats. Traffic is analyzed and dynamically correlated in real-time leverage common network sensors with the Accedian Skylight network performance monitoring and diagnostic platform (NPMD).\nNew to Interceptor is our integrated Honeypot technology. By deploying lightweight, integrated, honeypots throughout the network, Interceptor can not only identify when a malicious actor is on the network, but based on behavioral analytics, deliver a complete historical analysis of their activity.</p>','\n',char(10)),'https://www.facebook.com/accedian/ ','https://www.twitter.com/Accedian ','https://www.linkedin.com/company/accedian','');
|
||
INSERT INTO vendors VALUES('c81f7a65-0636-4dbd-b300-f4f0e190f0f5','published','mimecast','Mimecast','www.mimecast.com',replace('Mimecast: Work Protected™ \nSince 2003, Mimecast has stopped bad things from happening to good organizations by enabling them to work protected. We transform email and collaboration security into the eyes and ears of 40,000 organizations worldwide to mitigate risk and simplify complexities. Our solutions provide the proactive threat detection your workplace needs today. ','\n',char(10)),'191 Spring Street',NULL,'Lexington','MA','USA','a087d329-0e00-4efc-b552-961136fffa8a',replace('<h5>Mimecast</h5>\n<p>\nSince 2003, Mimecast has stopped bad things from happening to good organizations by enabling them to work protected. We empower over 40,000 customers to mitigate risk and manage complexities across a threat landscape driven by malicious cyberattacks, human error, and technology fallibility. Our advanced solutions provide proactive threat detection, brand protection, awareness training, and data retention capabilities evolving workplaces need today. Mimecast transforms email and collaboration security into the eyes and ears of organizations worldwide.<br>\n</p>','\n',char(10)),'https://www.facebook.com/Mimecast/','https://www.twitter.com/Mimecast','https://www.linkedin.com/company/mimecast/','');
|
||
INSERT INTO vendors VALUES('ac3a122e-9148-4669-86db-c62efe4d41ca','published','mandiant-google-cloud','Mandiant | Google Cloud','http://mandiant.com/events/rsac','Mandiant | Google Cloud: where frontline intelligence meets cloud innovation. We provide the tools you need to understand, detect, and respond to security incidents. With a cloud-native security operations platform and the most trusted cloud for digital transformation, we’re here to deliver swifter, targeted solutions to cyber threats.','11955 Freedom Drive',NULL,'Reston','VA','USA','1f0e6384-82db-4ad4-832a-da6f107cf600',replace('<h5>Mandiant | Google Cloud</h5>\n<p>\nMandiant | Google Cloud: where frontline intelligence meets cloud innovation. We provide the tools you need to understand, detect, and respond to security incidents. With a cloud-native security operations platform and the most trusted cloud for digital transformation, we’re here to deliver swifter, targeted solutions to cyber threats.<br>\n</p>','\n',char(10)),'https://www.facebook.com/Mandiant','https://www.twitter.com/Mandiant','https://www.linkedin.com/company/mandiant','');
|
||
INSERT INTO vendors VALUES('e0b7f9ff-2b8e-4bca-b773-f2c62f764591','published','microsoft','Microsoft','https://www.microsoft.com/security','Microsoft Security helps eliminate gaps and get simplified, comprehensive protection and expertise so you can be fearless as you grow, create, and innovate','One Microsoft Way',NULL,'Redmond','WA','USA','3999e4e8-fe10-420c-b4ac-a7682b7d3929',replace('<h5>Microsoft</h5>\n<p>\nMicrosoft Security helps eliminate gaps and get simplified, comprehensive protection and expertise so you can be fearless as you grow, create, and innovate.<br>\n</p>\n<h5>Why Microsoft?</h5>\n<p>Microsoft Security empowers small businesses, enterprises, & governments to protect what matters most with a comprehensive approach to security. Today, organizations struggle to build a strong posture because the solutions available to them are fragmented. They’re left to try & stitch together a patchwork of solutions that often don’t work together. We believe that anything less than comprehensive security is no security at all. Microsoft Security protects everything with interconnected security, compliance, & identity solutions that eliminate gaps in coverage & help secure devices, identities, confidential data, apps, & clouds across every platform & at every scale. It simplifies the complex by prioritizing the right risks with unified management tools & strategic guidance created to maximize the human expertise inside your company. Leading AI, automation, & expertise help you detect threats quickly, respond effectively, & fortify your security posture catching what others miss.</p>','\n',char(10)),NULL,'https://www.twitter.com/msftsecurity','https://www.linkedin.com/showcase/microsoft-security/','');
|
||
INSERT INTO vendors VALUES('c2f9166c-8f60-4cc3-b3ad-7b562e1c295c','published','mira-security','Mira Security','www.mirasecurity.com','Mira Security provides visibility into network traffic as our customers transition to higher speeds and new architectures, and eliminates the compromise between privacy and security.','3159 Unionville Road ','Suite 100','Cranberry Twp.','PA','USA','f2b0c494-63a3-46b8-83aa-6cfd34829d7c',replace('<h5>Mira Security</h5>\n<p>\nMira Security has a global team with strong backgrounds in cybersecurity and networking that have been working on, and deploying decryption technology for over 10 years. Our mission is to provide visibility into network traffic as our customers transition to higher speeds and new architectures, and to eliminate the compromise between privacy and security along their journey. We will build lasting relationships with our valued customers and partners, and deliver innovative encryption software and products.<br>\n</p>\n<h5>Why Mira Security?</h5>\n<p>Mira Security has a global team with strong backgrounds in cybersecurity and networking that have been working on, and deploying decryption technology for over 10 years. Our mission is to provide visibility into network traffic as our customers transition to higher speeds and new architectures, and to eliminate the compromise between privacy and security along their journey. We will build lasting relationships with our valued customers and partners, and deliver innovative encryption software and products.</p>','\n',char(10)),'https://www.facebook.com/people/Mira-Security/100063917720537/','https://www.twitter.com/SecurityMira','https://www.linkedin.com/company/mira-security/','');
|
||
INSERT INTO vendors VALUES('d2c4ea8e-4aae-4d90-9c7c-dc6cc3e88e59','published','mazebolt','MazeBolt','https://www.mazebolt.com','MazeBolt is pioneering a new standard in DDoS testing with its non-disruptive vulnerability solution, RADAR™️. The solution continuously detects, analyzes, and prioritizes remediation across the network with zero downtime.','Moshe Aviv Towers 46th Fl','Jabostinsky 7','Ramat Gan',NULL,'ISR','b84b4739-5407-4497-8cb0-927d5d65f8e5',replace('<h5>MazeBolt</h5>\n<p>\nMazeBolt is pioneering a new standard in achieving DDoS resilience by providing enterprises with non-disruptive full attack surface coverage and management. RADAR™, an industry-first soltuion, continuously tests tens of thousands of potential DDoS attack entry points, identifying how attackers succeed in bypassing existing mitigation systems.\nMazeBolt RADAR’s autonomous risk detection allows cybersecurity teams to go beyond traditional DDoS testing to uncover blind spots in their mitigation layers by continuously testing, analyzing, and prioritizing remediation across the network with zero operational downtime. Global enterprises, including financial services, insurance, gaming, and governments rely on MazeBolt for full visibility into their true DDoS security risk.\nFor more information visit www.mazebolt.com.\n<br>\n</p>\n<h5>Why MazeBolt?</h5>\n<p>MazeBolt presents RADAR™, a revolutionary patented solution that performs continuous and non-disruptive DDoS testing across the network with zero operational downtime.</p>','\n',char(10)),'https://www.facebook.com/mazebolt','https://www.twitter.com/Mazebolt','https://www.linkedin.com/company/mazebolt-technologies/','');
|
||
INSERT INTO vendors VALUES('229c5a4f-38ef-4e21-bfd0-6ce13aa02dce','published','ine','INE','http://www.ine.com','INE is the market leader in IT Training as a Service, working with Fortune 500 companies to accelerate business and training objectives with best-in-class training & hands-on enterprise-specific labs in networking, cyber security, & cloud management.','575 New Waverly Place','Suite 201 ','Cary','NC','USA','10aab815-3c54-4d66-af4d-7ad76b999d5d',replace('<h5>INE</h5>\n<p>\nINE is the premier provider of online technical training for the IT industry.\nHarnessing the world''s most powerful hands-on lab platform, cutting-edge technology, global video distribution network, and world-class expert instructors, INE is the top training choice for Fortune 500 companies worldwide, and for IT professionals looking to advance their careers.\nINE’s suite of learning paths offers an incomparable depth of expertise across cyber security, cloud, networking, and data science. INE is committed to delivering the most advanced technical training on the planet, while also lowering the barriers worldwide for those looking to enter and excel in an IT career.<br>\n</p>\n<h5>Why INE?</h5>\n<p>INE is the premier provider of online technical training for the IT industry.\nHarnessing the world''s most powerful hands-on lab platform, cutting-edge technology, global video distribution network, and world-class expert instructors, INE is the top training choice for Fortune 500 companies worldwide, and for IT professionals looking to advance their careers.\nINE’s suite of learning paths offers an incomparable depth of expertise across cyber security, cloud, networking, and data science. INE is committed to delivering the most advanced technical training on the planet, while also lowering the barriers worldwide for those looking to enter and excel in an IT career.</p>','\n',char(10)),'https://www.facebook.com/inetraining/','https://www.twitter.com/https://mobile.twitter.com/ine','https://www.linkedin.com/company/inetraining/','');
|
||
INSERT INTO vendors VALUES('4767ab32-f493-4767-9c8c-fe33a85b0a30','published','malwarebytes-for-business','Malwarebytes for Business','www.malwarebytes.com/business','Malwarebytes for Business makes it easy for resource-constrained IT teams to prevent more threats, detect and stop zero-day vulnerabilities, and thoroughly remove malware to restore operations. Combining award-winning EDR, proprietary remediation technology and a world-class team of threat hunters, Malwarebytes continuously protects thousands of businesses worldwide.','3979 Freedom Circle ','12th Floor','Santa Clara','CA','USA','3eec9074-0d70-4010-b5d3-e471e7fb1d2a',replace('<h5>Malwarebytes for Business</h5>\n<p>\nMalwarebytes for Business makes it easy for resource-constrained IT teams to prevent more threats, detect and stop zero-day vulnerabilities, and thoroughly remove malware to restore operations. Combining award-winning EDR, proprietary remediation technology and a world-class team of threat hunters, Malwarebytes continuously protects thousands of businesses worldwide.<br>\n</p>','\n',char(10)),'https://www.facebook.com/Malwarebytes','https://www.twitter.com/Malwarebytes','https://www.linkedin.com/company/malwarebytes/','');
|
||
INSERT INTO vendors VALUES('a97b02bf-695b-4523-ae07-439b16139097','published','mend','Mend','www.mend.io','Mend io, formerly WhiteSource, takes away the burden of fixing application security problems allowing development teams to deliver quality, secure code, faster. ','93 Summer Street',NULL,'Boston','MA','USA','d9e09045-2e41-46d4-8468-724a8f2c86f9',replace('<h5>Mend</h5>\n<p>\nMend, formerly known as WhiteSource, effortlessly secures what developers create. Mend uniquely removes the burden of application security, allowing development teams to deliver quality, secure code, faster.<br>\n</p>\n<h5>Why Mend?</h5>\n<p>Mend SCA reduces software attack surface, improves security workflow, and saves developers'' time.\nCustomers who have chosen Mend over Snyk SCA have told us the reasons are the following:\n- Our integration options make everything easier for the developer. There is no need for a developer to leave his familiar environment.\n- Our prioritize feature works better than Snyk''s similar feature. Our algorithms are patented. Snyk can''t confidently tell you if you can safely ignore vulnerabilities.\n- Our license detection is more accurate.\nMend SCA provides automated remediation, scales quickly and easily via repo integration, and eliminates false positives.</p>','\n',char(10)),NULL,'https://www.twitter.com/mend_io','https://www.linkedin.com/company/mend-io','');
|
||
INSERT INTO vendors VALUES('2b8b774d-82f4-4193-bcbc-4c9fef007642','published','whistic','Whistic','www.whistic.com','Whistic simplifies how businesses assess, publish, and share security documentation with customers and vendors. ','365 S. Garden Grove Lane ','Suite 220','Pleasant Grove','UT','USA','25ed5455-ec75-43df-932f-4c2f52111871',replace('<h5>Whistic</h5>\n<p>\nLocated in the heart of Silicon Slopes in Utah, Whistic is the network for assessing, publishing, and sharing vendor security information. The Whistic Vendor Security Network accelerates the vendor assessment process by enabling businesses to access and evaluate a vendor’s Whistic Profile and create trusted connections that last well beyond the initial assessment. Make security your competitive advantage and join businesses like Airbnb, Okta, Zendesk, Asana, Atlassian, Snap, Notion, TripActions, and G2 that are leveraging Whistic to modernize their vendor security programs.<br>\n</p>','\n',char(10)),'https://www.facebook.com/whisticinc/','https://www.twitter.com/Whistic_Inc','https://www.linkedin.com/company/whistic','');
|
||
INSERT INTO vendors VALUES('0f12203d-51d8-4146-8a07-765be3df473f','published','waratek','Waratek','www.waratek.com','Waratek is the only Security-as-Code Application Security platform that automates the manual process of fixing known and unknown code vulnerabilities.','159 N Sangamon ','Suite 200','Chicago','IL','USA','eafbf450-c3de-4bf8-82d6-dc812c863ba5',replace('<h5>Waratek</h5>\n<p>\nWaratek is the only Security-as-Code Application Security platform that automates the manual process of fixing known and unknown code vulnerabilities.<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/waratek','https://www.linkedin.com/company/waratek-ltd/','');
|
||
INSERT INTO vendors VALUES('43f5640d-8ec0-464d-8f37-91f0dddfb6cb','published','mutare-inc','Mutare, Inc.','www.mutare.com','With over 30 years of developing enterprise-class solutions, our technologies work seamlessly with your existing infrastructure to immediately protect your organization and team members from robocalls, vishing, smishing, and social engineering.','2325 Hicks Road',NULL,'Rolling Meadows','IL','USA','fb4e3416-eca8-4b33-aa1c-e156bbea3de1',replace('<h5>Mutare, Inc.</h5>\n<p>\nFor three decades, we’ve been empowering organizations to re-imagine a better way to connect with each other. Today, through our transformative digital voice and text messaging solutions, we make communications with colleagues, customers and prospects simple, secure and effective. And that means more time and less stress for your employees, a more positive experience for your customers, and improved bottom line results for your organization.<br>\n</p>\n<h5>Why Mutare, Inc.?</h5>\n<p>Mutare Voice Traffic Filter is an enterprise-class software built to provide five (5) layers of protection against unwanted traffic by eliminating nuisance and nefarious calls at the network edge. Remove the traffic that causes fraud, security incidents and data breaches. Enterprise-class software built to provide five (5) layers of protection against unwanted traffic by eliminating nuisance and nefarious calls at the network edge.</p>','\n',char(10)),NULL,'https://www.twitter.com/MutareInc','https://www.linkedin.com/company/mutare-inc/','');
|
||
INSERT INTO vendors VALUES('7bc409da-b0ed-4d05-bc1a-fe4d90b25132','published','wallarm','Wallarm','www.wallarm.com','Security and DevOps teams choose Wallarm to discover all cloud-native APIs and legacy web applications running in their environment, and to detect & respond to threats against them.','188 King Street, ','Unit 508','San Francisco','CA','USA','db32979e-9203-4d3e-8323-924e8b4ef66b',replace('<h5>Wallarm</h5>\n<p>\nWallarm End-to-End API Security offerings provide robust protection for APIs, web applications, microservices, and serverless workloads running in cloud-native environments. Hundreds of Security and DevOps teams choose Wallarm to: discover all their web apps & API endpoints, traffic flows and sensitive data usage for complete visibility; protect their entire API portfolio against emerging threats; and respond automatically to incidents for better risk management. Our platform supports modern tech stacks, offering dozens of deployment options in cloud and Kubernetes-based environments, and also provides a full cloud solution.<br>\n</p>\n<h5>Why Wallarm?</h5>\n<p>Wallarm is the only solution that unifies best-in-class API Security and WAAP (Next-Gen WAF) capabilities to protect your entire API and web application portfolio in multi-cloud and cloud-native environments. Wallarm Advanced API Security provides comprehensive real-time API discovery and threat prevention across your entire portfolio – regardless of protocol, while the Wallarm Cloud-Native WAAP elegantly deploys in any environment to protect thousands of exposed and internal workloads: in datacenter or cloud, multi-cloud or Kubernetes-based environment.</p>','\n',char(10)),NULL,'https://www.twitter.com/wallarm','https://www.linkedin.com/company/wallarm/','');
|
||
INSERT INTO vendors VALUES('a1b7b153-07e9-4f18-a986-03f6ba53a7af','published','withsecure','WithSecure','https://www.withsecure.com/us-en/home','WithSecure™ builds outcome-based cyber security solutions and services for businesses on F-Secure’s 35-year expertise. ','Tammasaarenkatu 7','PL 24','Helsinki',NULL,'FIN','66f92336-d38a-4936-a190-58c6131ee1fd',replace('<h5>WithSecure</h5>\n<p>\nWithSecure™ provides outcome-based cyber security services and solutions that are trusted by IT service providers, MSSPs, financial institutions, manufacturers, and the most advanced technology providers worldwide. We’re proud to protect, enable and optimise their operations through dependable cyber security that strives for a better return on investment. <br>\n</p>\n<h5>Why WithSecure?</h5>\n<p>We experience every threat you face. To build your resilience we are dedicated to coming up with actionable cyber security advice gathered from our experts who lead the way on offense and defense.\nBy detecting, responding and countering active attacks every day, we create a wealth of experience and best practices. And we make them available to you anywhere and anytime.</p>','\n',char(10)),'https://www.facebook.com/WithSecure','https://www.twitter.com/withsecure','https://www.linkedin.com/company/withsecure/','');
|
||
INSERT INTO vendors VALUES('63a2357d-37fe-4994-85e2-4696265edd08','published','optiv','Optiv','www.optiv.com',replace('Optiv is the cyber advisory and solutions leader. We manage cyber risk so you can secure your full potential.\n','\n',char(10)),'1144 15th Street ','Suite 2900','Denver','CO','USA','2cd1ce6e-f042-46c3-b993-fdb38f552ec4',replace('<h5>Optiv</h5>\n<p>\nOptiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your\nfull potential.\n<br>\n</p>','\n',char(10)),'https://www.facebook.com/OptivInc/','https://www.twitter.com/optiv','https://www.linkedin.com/company/optiv-inc','');
|
||
INSERT INTO vendors VALUES('86a8e4db-7e4b-4e72-802a-045b75c38744','published','optimal-idm','Optimal IdM','www.optimalidm.com','Optimal IdM is a global provider of innovative and affordable identity access management solutions that meet businesses specific security, usability, and scalability needs for every industry as well as federal, state and local government agencies. ','3959 Van Dyke Rd. ','Suite 190','Lutz','FL','USA','46fed92e-6704-4889-9d80-c06f05fcd981',replace('<h5>Optimal IdM</h5>\n<p>\nOptimal IdM is a global provider of innovative and affordable identity access management solutions that meet businesses specific security, usability, and scalability needs. Optimal IdM also offers its solutions as a managed service offering. Customers include Fortune 1000 companies from every industry as well as federal, state and local government agencies. Optimal IdM has been named to the Gartner Magic Quadrant for Access Management, received the Best IAM Solution in the annual ASTOR awards program, Best Product in IAM from Cyber Defense Magazine, and the CODiE Award for Best IAM Solution.<br>\n</p>\n<h5>Why Optimal IdM?</h5>\n<p>The OptimalCloud from Optimal IdM is a scalable and affordable Identity and Access Management solution built for the security and usability needs of small, mid-sized and enterprise organizations. The OptimalCloud platform can be deployed in workforce and consumer scenarios and each feature-rich pricing tier comes with MFA and a guaranteed uptime of 99.99%. Also, the OptimalCloud uses AI, a machine-based learning system, to continuously detect and block hacking attempts on public-facing websites.\nThe Optimal License Management Assistant™ (OLMA) for Microsoft Azure/Office365 provides a centralized way to manage licenses for Azure AD services - including Office365 (exchange), SharePoint and OneDrive. OLMA shows you what licenses are assigned, being used, or not used, so you can remove unused licenses. This increases efficiency and can be used to optimize license allocation and reduce costs.</p>','\n',char(10)),'https://www.facebook.com/optimalidm/','https://www.twitter.com/Optimal_IdM','https://www.linkedin.com/company/optimal-idm','');
|
||
INSERT INTO vendors VALUES('a49a0028-030c-4b63-bb7d-907aa4defdfb','published','ox-security','Ox Security','https://www.ox.security/',replace('OX Security transforms fragmented workflows and noise from tool overload into Continuous Software Supply Chain Security. Protect dev and prod environments, build and deliver secure software, and secure your software supply chain, from code to cloud.\n','\n',char(10)),'Tozeret Haaretz 7',NULL,'Tel Aviv ',NULL,'ISR','c13a5b6c-81b8-4f64-a395-63310c1e5e16',replace('<h5>Ox Security</h5>\n<p>\nAt OX, we believe that security should be an integral part of the software development process, not an afterthought. We are reinventing product security by treating security and compliance as a continuum - looking at development and production as a single security concern. We are taking an entirely new approach that transforms fragmented workflows and the noise from tool overload into Continuous Software Supply Chain Security, from design and planning through to production.\n1. Build and deliver secure software.\n2. Protect development and production environments from attackers.\n3. Secure the software supply chain, from code to cloud.\nAll of this in one non-intrusive, continuous motion that allows developers to know that time spent fixing critical risks pre-production will avoid going into crisis mode later.\nOX also leads the OSC&R (Open Software Supply Chain Attack Reference) initiative - the first MITRE-like framework solely dedicated to the software supply chain.\n<br>\n</p>\n<h5>Why Ox Security?</h5>\n<p>In order to secure the full software supply chain, security teams need many tools that provide too many alerts and create fragmented workflows. Developers are frustrated and overwhelmed with pointless notifications. As a result, they ignore all notifications — including the critical ones.\nOX transforms fragmented workflows and the noise from tool overload into the only Continuous Software Supply Chain Security solution. OX scans the complete software supply chain and not just the CI/CD or SDLC. As a result, the visibility is complete, contextual prioritization of issues is accurate and automated remediation recommendations are trustworthy.\n1. Accelerate Delivery: Triage issues in a fraction of the time\n2. Reduce Risk: Contextualized, non-intrusive alerts with actionable fix recommendations\n3. Reduce Costs: automate manual processes & eliminate time spent chasing false positives\n4. Single Pane of Glass: Consolidate security findings, easily orchestrate DevSecOps activities\n</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/81846757','');
|
||
INSERT INTO vendors VALUES('35e76880-df42-44fb-be84-87062f6f8c4e','published','ontinue-the-mdr-division-of-open-systems','Ontinue, the MDR division of Open Systems.','https://www.ontinue.com/','Ontinue is the only MDR provider that leverages AI-driven automation, human expertise, and the Microsoft security platform to continuously assess and protect your environment and advance your security posture for digital transformation.','450 Maple Street',NULL,'Redwood City','CA','USA','042b909d-bb08-4a73-b6de-4aed39af508a',replace('<h5>Ontinue, the MDR division of Open Systems.</h5>\n<p>\nOntinue, the MDR division of Open Systems, is on a mission to be the most trusted, 24/7, always-on security partner that empowers customers to embrace the future by operating more strategically and with less risk. Grounded in an intelligent, cloud-delivered SecOps platform, Ontinue offers superior protection that goes well beyond basic detection and response services.Ontinue is the only MDR provider that leverages AI-driven automation, human expertise, and the Microsoft security platform to continuously assess and protect your environment and advance your security posture for digital transformation. Continuous protection. Always-on prevention Services. Nonstop SecOps. That’s Ontinue. Learn more: www.ontinue.com. <br>\n</p>','\n',char(10)),'https://www.facebook.com/people/Ontinue/100088512353993/','https://www.twitter.com/ontinuemxdr','https://www.linkedin.com/company/ontinue/about/?viewAsMember=true','');
|
||
INSERT INTO vendors VALUES('c29cf602-d580-44c4-a5ee-bc317b3fce53','published','ordr','Ordr','https://ordr.net/','Ordr makes it easy to see, know, and secure every connected device, from traditional IT to newer and more vulnerable IoT, IoMT, and OT devices.','2445 Augustine Drive ','Suite 601','Santa Clara','CA','USA','6633d7dc-00fd-4385-b762-d35d5b85fd4d',replace('<h5>Ordr</h5>\n<p>\nOrdr makes it easy to see, know, and secure every connected device, from traditional IT to newer and more vulnerable IoT, IoMT, and OT devices.<br>\n</p>\n<h5>Why Ordr?</h5>\n<p>Ordr makes it easy to see, know, and secure every connected device, from traditional IT to newer and more vulnerable IoT, IoMT, and OT devices.</p>','\n',char(10)),NULL,'https://www.twitter.com/ordrofthings','https://www.linkedin.com/company/ordrinc','');
|
||
INSERT INTO vendors VALUES('28f22ad5-4484-4c6f-b3c8-3cc3ffdb8e22','published','onetrust','OneTrust','www.onetrust.com',replace('The market-defining Trust Intelligence Platform from OneTrust connects privacy, GRC, ethics, and ESG teams, data, and processes, so all companies can collaborate seamlessly and put trust at the center of their operations and culture by unlocking their value and potential to thrive by doing what’s good for people and the planet.\n\nLearn more at OneTrust.com.\n','\n',char(10)),'1200 Abernathy Rd ','Suite 700','Atlanta','GA','USA','209df123-174c-468f-ae15-d6648206de3c',replace('<h5>OneTrust</h5>\n<p>\nThe market-defining Trust Intelligence Platform from OneTrust connects privacy, GRC, ethics, and ESG teams, data, and processes, so all companies can collaborate seamlessly and put trust at the center of their operations and culture by unlocking their value and potential to thrive by doing what’s good for people and the planet.\nLearn more at OneTrust.com.\n<br>\n</p>','\n',char(10)),'https://www.facebook.com/officialonetrust','https://www.twitter.com/OneTrust','https://www.linkedin.com/company/onetrust/','');
|
||
INSERT INTO vendors VALUES('0de4c055-f8d9-4ddd-97cc-e49b2779cab9','published','opentext-cybersecurity','OpenText Cybersecurity','https://www.opentext.com/products/cyber-security','OpenText Cybersecurity provides comprehensive security solutions for companies and partners of all sizes. From prevention, detection and response to recovery, investigation and compliance, our unified end-to-end platform helps customers build cyber resilience via a holistic security portfolio. ','385 Interlocken Crescent','Suite 800','Broomfield','CO','USA','b575ca09-07d3-42aa-8f6a-f5a7f4905555',replace('<h5>OpenText Cybersecurity</h5>\n<p>\nOpenText Cybersecurity provides comprehensive security solutions for companies and partners of all sizes. From prevention, detection and response to recovery, investigation and compliance, our unified end-to-end platform helps customers build cyber resilience via a holistic security portfolio. Powered by actionable insights from our real-time and contextual threat intelligence, OpenText Cybersecurity customers benefit from high efficacy products, a compliant experience and simplified security to help manage business risk.<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/OpenTextSec ','https://www.linkedin.com/showcase/opentext-cybersecurity/','');
|
||
INSERT INTO vendors VALUES('2b9852e2-3b38-452b-b47c-5f110f12dd74','published','open-raven','Open Raven','www.openraven.com','Open Raven is the secure, private, budget-safe data security posture management solution that prevents leaks, breaches, and compliance incidents across thousands of accounts, billions of objects, and petabytes of data. Learn more at openraven.com','601 Marshall St.',NULL,'Redwood City','CA','USA','96445656-574b-4db1-9725-3a1b8a531b8d',replace('<h5>Open Raven</h5>\n<p>\nOpen Raven, the trusted Enterprise Data Security Platform, pinpoints data security and compliance risk, applies data security guardrails, prevents incidents, and streamlines response. Far too often, security and cloud infrastructure teams do not have the right tools to keep pace with the explosive growth of their data. Fundamental questions such as “Where’s our data?”, “What types of data do we have?” and “Is it secured properly?” are too time-consuming and expensive to answer. Open Raven eliminates blind spots by fully mapping a cloud estate using serverless functions and native APIs, classifying data at petabyte scale, and enabling effortless policy-based monitoring that fits existing workflows. The company is headquartered in Los Angeles and backed by Pelion, Kleiner Perkins, Upfront, Ballistic, and cybersecurity leaders, including Niloofar Razi Howe and Phil Venables.<br>\n</p>\n<h5>Why Open Raven?</h5>\n<p>Open Raven is the data security posture management company that prevents leaks, breaches, and compliance incidents. Data is the lifeblood of the modern economy. The companies at the forefront do an exceptional job at equipping their data teams, but far too often, security and cloud infrastructure teams do not have the right tools to keep pace with the explosive growth of their data. For security teams to locate and secure sensitive, toxic, and exposed data within hundreds or thousands of accounts, billions of objects, and petabytes of data, existing tools don’t work. Security must be able to answer fundamental questions such as “Where’s our data?”, “What types of data do we have?” and “Is it secured properly?”. The Open Raven Data Security Platform is the secure, private, budget-safe solution that closes data visibility gaps – and just works.</p>','\n',char(10)),'https://www.facebook.com/openraven/','https://www.twitter.com/openraven','https://www.linkedin.com/company/open-raven/','');
|
||
INSERT INTO vendors VALUES('0eed45fe-7252-432f-b467-c46e0a967c72','published','halcyon','Halcyon','www.halcyon.ai','Halcyon is the first, dedicated anti-ransomware and endpoint resiliency platform focused on reducing the risk and impact of destructive ransomware events. Learn more at www.halcyon.ai','5900 Balcones Drive ','Suite 5404','Austin','TX','USA','41405e3c-ab0e-4d3a-90fe-d90fb9a5ee69',replace('<h5>Halcyon</h5>\n<p>\nHalcyon is the first anti-ransomware and cyber resilience platform built for the modern enterprise. Our goal is to make all endpoints capable of withstanding and recovering from catastrophic events like ransomware. Our built-in encryption key capture and automated endpoint recovery engine reduces the recovery time from a ransomware incident from weeks down to mere minutes.<br>\n</p>\n<h5>Why Halcyon?</h5>\n<p>Halcyon is one of the only security tools that specifically protects other endpoint products like EPP, EDR, and XDR from being unhooked and compromised during an incident. Our product was designed with one question, "what happens if this layer fails" and subsequently was built knowing that attackers will attempt to game the system at every step. The platform was built fresh from the ground up to stop ransomware and leverages a unique modular approach to machine learning micro-models that allow for quicker training and deployment than the first and second generation of ML-based security tools.\nWe''re pioneering the concept of endpoint resilience and our platform is designed to keep your business operational even in the event of a catastrophic ransomware incident. The previous approaches to endpoint security are still helpful, but ransomware behaves differently from malware and requires a new way to solve the problem.\n</p>','\n',char(10)),'https://www.youtube.com/@halcyonsecurity','https://www.twitter.com/HalcyonAI','https://www.linkedin.com/company/halcyonai','');
|
||
INSERT INTO vendors VALUES('968cd68d-051f-4c08-bcfa-131cc39cb8bb','published','zimperium','Zimperium','www.zimperium.com','Founded upon the premise that mobile security requires a novel approach, Zimperium protects both mobile devices and the entire application development cycle to ensure secure access to enterprise data.','4055 Valley View ','Suite 300','Dallas','TX','USA','9ca15fda-a1b9-4d6a-9238-eda4055a6f02',replace('<h5>Zimperium</h5>\n<p>\nFounded upon the premise that mobile security requires an entirely novel approach, Zimperium secures both mobile devices and applications so they can safely and securely access data. A single unified platform protects the endpoint and secures the entire application development cycle with the only on-device, machine learning-based engine. Zimperium provides visibility and protection against known and zero-day threats and attacks across device, network, phishing, and application threat vectors against Android, iOS, and ChromeOS devices. Headquartered in Dallas, Texas, Zimperium is backed by Warburg Pincus, SoftBank, Samsung, Sierra Ventures, and Telstra Ventures. Find additional information or contact us at zimperium.com<br>\n</p>\n<h5>Why Zimperium?</h5>\n<p>Zimperium Mobile Threat Defense (MTD) is the only on-device mobile security solution that protects the enterprise from known and unknown threats. MTD uses machine learning to detect threats across the kill chain: device, network, phishing, and app attacks. It provides detailed and actionable mobile threat forensics across all threat and risk vectors, improving your threat hunting and SOC operations. Zimperium MTD offers protection against zero-day threats, network-based attacks, and provides insight into iOS apps. Zimperium’s Mobile Application Protection Suite (MAPS) is the only unified platform encompassing centralized visibility with in-app protection, using inside-out and outside-in security approaches to help enterprises build and maintain secure mobile apps. This platform offers persistent security during development and run-time, MAPS comprises four components that prevent data loss and infrastructure exposure, resulting in fraud, reputation damage, and regulatory penalties.</p>','\n',char(10)),'https://www.facebook.com/ZIMPERIUMINC/','https://www.twitter.com/Zimperium','https://www.linkedin.com/company/zimperium/','');
|
||
INSERT INTO vendors VALUES('754e25e6-13c6-4289-be85-2ce12b39e4af','published','oloid-inc','Oloid, Inc.','www.oloid.com','OLOID is a leading provider of physical identity and access technology, dedicated to facilitating secure and privacy-focused authentication for the contemporary workplace.','440 N Wolfe Rd.',NULL,'Sunnyvale','CA','USA','87a96c54-264c-46ee-95ec-a738df474554',replace('<h5>Oloid, Inc.</h5>\n<p>\nOLOID is a leading provider of physical identity and access technology, dedicated to facilitating secure and privacy-focused authentication for the contemporary workplace. OLOID offers a comprehensive identity framework that connects and manages workplace identity and access, integrating seamlessly with HR, IT, and various records systems to enable a unified digital identity across the organization. OLOID empowers businesses to upgrade their workplace access technology with ease, offering seamless mobile access, automated workflows, and physical access integrations, all without requiring the replacement of existing hardware and access control infrastructure.<br>\n</p>','\n',char(10)),'https://www.facebook.com/oloidAI/','https://www.twitter.com/oloid_ai','https://www.linkedin.com/company/oloid-ai/','');
|
||
INSERT INTO vendors VALUES('35e3def6-0097-48d1-b1ff-038a9119bc77','published','obsidian-security','Obsidian Security','www.obsidiansecurity.com','Obsidian Security is the only comprehensive security solution built for SaaS. We help reduce enterprise risk by proactively identifying SaaS misconfigurations, detecting real-time threats and enabling visibility into risky SaaS integrations.','680 Newport Center Drive ','Suite 200','Newport Beach','CA','USA','e5698024-305e-4646-90fe-ef91584a3c1e',replace('<h5>Obsidian Security</h5>\n<p>\nObsidian Security protects the applications businesses rely on most by providing the first and only comprehensive security solution built for SaaS. The Obsidian SSPM platform provides value in minutes by connecting to applications with a few clicks and without the need to deploy agents or software. Obsidian comes equipped with expert rulesets to get security teams started immediately.<br>\n</p>','\n',char(10)),'https://www.facebook.com/obsidiansec','https://www.twitter.com/obsidiansec','https://www.linkedin.com/company/obsidiansecurity/','');
|
||
INSERT INTO vendors VALUES('247510fe-5fc0-4128-9d49-63b2c568280a','published','kyndryl','Kyndryl','https://www.kyndryl.com/us/en/services/cyber-resilience','Kyndryl Security and Resiliency provides the expertise, services and technologies that help enterprises anticipate, protect against, withstand, and recover from adverse conditions, stresses, attacks and compromises of cyber-enabled services. ','1 Vanderbilt Ave',NULL,'New York','NY','USA','336cd646-9c67-4579-93c2-a389b2196414',replace('<h5>Kyndryl</h5>\n<p>\nKyndryl works at the core of businesses that move the world. With more than 90,000 skilled professionals serving customers in over 60 countries, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. We are committed to the health and continuous improvement of the vital systems at the heart of the digital economy. With our partners and thousands of customers, we co-create solutions to help enterprises reach their peak digital performance. Our world has never been more alive with opportunities. Together, we can seize them. To learn more, visit www.kyndryl.com.<br>\n</p>\n<h5>Why Kyndryl?</h5>\n<p>About Kyndryl\nKyndryl (NYSE: KD) is the world’s largest IT infrastructure services provider, serving thousands of enterprise customers in more than 60 countries. The company designs, builds, manages and modernizes the complex, mission-critical information systems that the world depends on every day. For more information, visit www.kyndryl.com\nWhy Kyndryl Security and Resiliency\nKyndryl Security and Resiliency provides the expertise, services and technologies that help enterprises anticipate, protect against, withstand, and recover from adverse conditions, stresses, attacks and compromises of cyber-enabled services. Our integrated approach helps customers embed cyber resilience into the broader IT and operational strategy, underpinned by cloud and zero trust principles</p>','\n',char(10)),NULL,'https://www.twitter.com/Kyndryl','https://www.linkedin.com/company/kyndryl/','');
|
||
INSERT INTO vendors VALUES('10033bc5-ab60-4422-891e-c230a5f7b963','published','kandji','Kandji','www.kandji.io','We’re Kandji: the Apple device management and security platform that empowers secure and productive global work.','101 W Broadway ','Suite 1440','San Diego','CA','USA','5798c4b4-d98c-4d93-bb16-fbdff3387b0d',replace('<h5>Kandji</h5>\n<p>\nKandji, the Device Harmony platform for Apple devices in the enterprise, tears down the wall between IT and InfoSec teams to keep Apple users secure and productive.<br>\n</p>\n<h5>Why Kandji?</h5>\n<p>With Kandji Device Management, Apple devices transform themselves into enterprise-ready endpoints, with all the right apps, settings, and security controls in place. Kandji’s Device Management extends far beyond Apple’s MDM framework, encompassing zero-touch deployment, the Mac setup experience, device configuration and hardening, automated remediation for security controls, application deployment and patch management, OS updates, and single sign-on integration for Mac.\nKandji EDR is purpose-built to detect and stop threats on Mac computers. Armed with hundreds of millions of malware definitions, data from the world’s leading threat feeds, and a team of threat researchers feeding the detection engine, our threat intelligence for Mac is among the world’s most comprehensive. Kandji EDR is deployed alongside MDM in a unified agent. It monitors all files and applications on the Mac. It can detect threats, kill processes, quarantine files, and provide alerts and notifications.</p>','\n',char(10)),'https://www.facebook.com/kandjimdm','https://www.twitter.com/KandjiMDM','https://www.linkedin.com/company/kandji','');
|
||
INSERT INTO vendors VALUES('eb81f801-1484-4ffa-ac9c-20cc57651ff0','published','keyfactor','Keyfactor','www.keyfactor.com','Keyfactor is the identity-first security solution for modern enterprises. Keyfactor brings digital trust to the hyper-connected world with identity-first security for every machine and human.','6150 Oak Tree Blvd. ','Suite 200','Independence','OH','USA','7d8b82b1-1016-4e27-98f6-f1c9f5fa6064',replace('<h5>Keyfactor</h5>\n<p>\nKeyfactor brings digital trust to the hyper-connected world with identity-first security for every machine and human. By simplifying PKI, automating certificate lifecycle management, and securing every device, workload, and thing, Keyfactor helps organizations move fast to establish digital trust at scale — and then maintain it. In a zero-trust world, every machine needs an identity and every identity must be managed. For more information visit: www.keyfactor.com<br>\n</p>\n<h5>Why Keyfactor?</h5>\n<p>Keyfactor is the identity-first solution for modern enterprises to establish digital trust and protect every device, workload, and connected thing with a trusted and unique identity. To establish digital trust in a hyper-connected world, every machine needs an identity, and every identity must be managed.\nKeyfactor’s identity-first solution stack enables teams to modernize their PKI as they adopt new use cases, gain complete visibility and control over the growing number of machine identities across the business, and digitally sign software, firmware, code, and containers to ensure that every machine and application is trusted and secure.\nDeploy however, wherever your business runs; on-prem or in the cloud, turnkey or highly configurable, self-managed or fully managed. We know that PKI is more than just software; it is critical infrastructure. Industry-leading certifications back our solutions – Common Criteria, PCI Compliance, FIPS 140-2, SOC 2 Type 2, and more.</p>','\n',char(10)),'https://www.facebook.com/wearekeyfactor','https://www.twitter.com/keyfactor','https://www.linkedin.com/company/wearekeyfactor','');
|
||
INSERT INTO vendors VALUES('c25b4a9b-49e2-4bbb-900a-a9e5ef857833','published','kingston-technology','Kingston Technology','www.kingston.com/us','Kingston Technology is known for many things, from memory and storage solutions like solid-state drives (SSDs) and encrypted USBs to high-performance memory. Kingston is made of amazing people who operate more like a family than a large corporation.','17600 Newhope St.',NULL,'Fountain Valley','CA','USA','a90a1f9e-9029-4cd2-9e76-478cedf0ecbc',replace('<h5>Kingston Technology</h5>\n<p>\nKingston Technology is known for many things, from memory and storage solutions like solid-state drives (SSDs) and encrypted USBs to high-performance memory. However, even with our status as a global leader in the tech industry, Kingston is made of amazing people who operate more like a family than a large corporation.<br>\n</p>','\n',char(10)),'https://www.facebook.com/kingstontechnology','https://www.twitter.com/kingstontech','https://www.linkedin.com/company/kingston','');
|
||
INSERT INTO vendors VALUES('e63b4fb4-70ee-4859-ab87-1676f8a68151','published','keysight-technologies','Keysight Technologies','https://www.keysight.com/us/en/products/network-visibility.html',replace('Keysight Network Visibility & Test solutions eliminate blind spots, expose hidden threats and validate network architectures. Our tools enable enterprises, NEMs, SPs and governments to optimize network performance and defend against cyberattacks. \n','\n',char(10)),'1400 Fountaingrove Parkway',NULL,'Santa Rosa','CA','USA','4889a4c6-c006-4a63-a209-bcd417ac090f',replace('<h5>Keysight Technologies</h5>\n<p>\nKeysight delivers leading network visibility and test solutions that eliminate security blind spots in data center, hybrid cloud, and distributed network environments to expose hidden security threats. Keysight''s Network Visibility Solutions deliver complete access to cloud, IT and even OT and IoT networks. Taps provide raw traffic to network packet brokers which then filter, deduplicate, decrypt and otherwise streamline it to provide dynamic network intelligence for monitoring, performance and security tools. Our security threat simulator, cybersecurity performance, and cyber range platforms validate network security architectures that enable network equipment manufacturers to roll out products more confidently, allow service providers to meet SLA agreements, and equip enterprises with tools to ensure their networks work as designed for optimum performance. Use Keysight security solutions to stop security threats.\n<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/KeysightNAS','https://www.linkedin.com/company/keysight-visibility-network-test-security/','');
|
||
INSERT INTO vendors VALUES('55da91ec-ce7e-4450-8bc0-452787f93e1e','published','heroic-com','HEROIC.com','www.heroic.com','With a vision to protect against next-generation cyber threats, HEROIC began with reactive cybersecurity solutions. Although enterprise-level products have drastically improved, artificially-intelligent solutions have yet to reach the masses.','1881 W Traverse Pkwy','Ste E257','Lehi','UT','USA','898883bf-7688-4fb8-bd4f-d17e74ba9370',replace('<h5>HEROIC.com</h5>\n<p>\nWith a vision to protect against next-generation cyber threats, HEROIC began with reactive cybersecurity solutions. Although enterprise-level products have drastically improved, artificially-intelligent solutions have yet to reach the masses.<br>\n</p>','\n',char(10)),'https://www.facebook.com/heroiccybersecurity/','https://www.twitter.com/heroiccyber','https://www.linkedin.com/company/heroiccyber/','');
|
||
INSERT INTO vendors VALUES('c98294ee-50a4-4e53-9caa-5a349098f870','published','hub-security','HUB Security','https://hubsecurity.com/',replace('HUB Security specializes in unique Cyber Security solutions protecting sensitive information. The company’s Confidential Computing platforms secure the entire computing stack environment by utilizing advanced encryption and Cyber Digital Twins.\n\n\n','\n',char(10)),'17 Rothschild Av.',NULL,'Tel Aviv',NULL,'ISR','b6e2693f-87bc-478c-86e6-14fbad71a160',replace('<h5>HUB Security</h5>\n<p>\nHUB Security specializes in unique cybersecurity solutions protecting sensitive commercial and government information and is a recognized leader in the rapidly evolving field of zero-trust confidential computing, an area of cybersecurity that provides protection to data even when computers are infected and administrators are compromised. HUB’s computing solutions aim at preventing hostile intrusions at the hardware level while introducing a novel set of data theft prevention solutions. The Company operates in over 30 countries and provides innovative cybersecurity computing appliances as well as a wide range of cybersecurity services worldwide. <br>\n</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/hubsecurityio/mycompany/?viewAsMember=true','');
|
||
INSERT INTO vendors VALUES('6df694b4-56a7-44b4-92ab-d54350bf04c5','published','korea-trade-investment-promotion-agency','Korea Trade-Investment Promotion Agency','www.kotrasv.org',replace('[KOREA PAVILION] \nKorea Trade-Investment Promotion Agency is a state-funded organization operated by the Government of South Korea which has facilitated Korea''s rapid export-led economic development through various trade promotion activities.','\n',char(10)),'3003 North First Street',NULL,'San Jose','CA','USA','7f97a2eb-5af8-412b-8aaf-f3a4ae69a073',replace('<h5>Korea Trade-Investment Promotion Agency</h5>\n<p>\nKorea Pavilion - South Hall #0634 |\nKOTRA(Korea Trade-Investment Promotion Agency) is a state-funded trade and investment promotion organization operated by the Government of South Korea. KOTRA has facilitated Korea''s rapid export-led economic development through various trade promotion activities such as overseas market surveys, SME export promotion, trade info services, government-to-gov''t export, foreign investment in Korea (FDI) promotion and business matchmaking. KOTRA has a network of 128 offices in 84 countries worldwide with 10 of the regional headquarters.<br>\n</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/kotrasvitc/','');
|
||
INSERT INTO vendors VALUES('7dda3615-f753-45b2-b9f5-bb3f966eb6cd','published','zscaler','Zscaler','www.zscaler.com','Zscaler accelerates digital transformation with its Zero Trust Exchange, an SSE-based platform that provides fast, secure connections between users, devices, and applications over any network.','120 Holger Way',NULL,'San Jose','CA','USA','4967c59b-b80e-4919-beb1-70a3fddd06f6',replace('<h5>Zscaler</h5>\n<p>\nZscaler accelerates digital transformation so customers can be agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. Distributed across more than 150 data centers globally, the SSE-based Zero Trust Exchange is the world’s largest inline cloud security platform.\nThe Zero Trust Exchange is the cloud native one true zero trust platform that uses identity and context to secure users, apps, and IoT/OT devices over any network. Its proxy architecture terminates every connection to inspect all traffic in real time to eliminate attack surface, prevent lateral movement of threats, and stop data loss. With the Zero Trust Exchange, organizations enable an agile, modern workplace that allows employees, partners, customers, and suppliers to securely access applications from anywhere, on any device, while ensuring a great digital experience.<br>\n</p>\n<h5>Why Zscaler?</h5>\n<p>Protect and empower your business with zero trust\nThe Zscaler Zero Trust Exchange™ is a cloud native platform that powers a complete security service edge (SSE) to connect users, workloads, and devices without putting them on the corporate network. It reduces the security risks and complexity associated with perimeter-based security solutions that extend the network, expand the attack surface, increase the risk of lateral threat movement, and fail to prevent data loss.\nThe Zero Trust exchange runs on the world''s largest security cloud, operating from more than 150 data centers globally, delivering comprehensive security with an exceptional user experience. </p>','\n',char(10)),'https://www.facebook.com/Zscaler','https://www.twitter.com/zscaler','https://www.linkedin.com/company/zscaler/mycompany/verification/','');
|
||
INSERT INTO vendors VALUES('74efea53-5cde-4c31-80a4-a9b9e9593ac7','published','zpe-systems','ZPE Systems','zpesystems.com',replace('ZPE Systems addresses IT pain from service reliability, security & personnel shortages delivering out-of-band automation infrastructure to simplify Hyperautomation. Six of 10 tech giants rely on ZPE to eliminate human error from datacenter to edge.\n','\n',char(10)),'3793 Spinnaker Court',NULL,'Fremont','CA','USA','f5480cd1-1f97-46ac-b53f-6820cbfda5d1',replace('<h5>ZPE Systems</h5>\n<p>\nZPE Systems provides the best, most resilient, and secure solutions that support infrastructure reliability and holistic security for medium to large enterprises and digital service providers.\nSix of the top 10 global tech giants trust ZPE Systems’ Cybersecurity Delivery Platform for Automated Zero-day Infrastructure Patching and Ransomware Recovery & Remediation for Datacenter, Edge, OT, and MSPs.\nZPE Systems solutions eliminate human error and allow IT to easily to manage, secure, and scale a resilient infrastructure with Intel-based serial consoles, services routers, sensors, zero-touch zero-trust provisioning and cloud managed out-of-band automation.<br>\n</p>\n<h5>Why ZPE Systems?</h5>\n<p>Enterprises trust ZPE System''s Intel-based serial consoles, services routers, sensors, zero-touch zero-trust provisioning and cloud managed out-of-band automation, to eliminate human error and operate an agile, easy to manage, secure and resilient infrastructure from datacenter to distributed edge at scale.</p>','\n',char(10)),'https://www.facebook.com/zpesystems','https://www.twitter.com/ZPESystems','https://www.linkedin.com/company/zpe-systems','');
|
||
INSERT INTO vendors VALUES('abfd3f46-3959-471a-8a0b-b1d52cb805d6','published','human','HUMAN','https://www.humansecurity.com/?utm_source=rsa_portal&utm_medium=referral&utm_campaign=rsa_apr_2023&utm_content=link','HUMAN is a cybersecurity company that safeguards 465+ customers from digital attacks, including bots, fraud and account abuse with an industry-leading modern defense strategy. To Know Who’s Real, visit www.humansecurity.com.','111 W 33rd Street ','Floor 11','New York','NY','USA','88720595-5191-479d-8326-21a291869668',replace('<h5>HUMAN</h5>\n<p>\nHUMAN is a cybersecurity company that protects organizations by disrupting digital fraud and abuse. We leverage modern defense to disrupt the economics of cybercrime by increasing the cost to cybercriminals while simultaneously reducing the cost of collective defense. Today we verify the humanity of more than 20 trillion digital interactions per week across advertising, marketing, e-commerce, government, education and enterprise security, putting us in a position to win against cybercriminals. Protect your digital business with HUMAN. To Know Who’s Real, visit www.humansecurity.com. <br>\n</p>\n<h5>Why HUMAN?</h5>\n<p>HUMAN offers an award-winning suite of products to protect organizations from digital fraud and abuse targeting ad, web, mobile, and API surfaces. Our platform is powered by modern defense—built on the pillars of visibility, network effect, and disruptions and takedowns—which increases the cost of attacks while reducing the cost of collective protection. Our modules include:\n- Account Takeover Defense - Neutralizes account takeover attacks and remediates compromised accounts, whether perpetrated by a bot or human fraudster.\n- Account Fraud Defense - Protects against mass fake account creation and remediates new accounts being used for fraud.\n- PCI Compliance Defense - Identifies vulnerabilities and anomalous behavior to reduce the risk of PCI non-compliance via malicious client-side code.\nOur solutions work together, using the world''s largest fraud sensor network to deliver protection that''s greater than the sum of its parts. </p>','\n',char(10)),'https://www.facebook.com/nomorebots/','https://www.twitter.com/SecureWithHUMAN','https://www.linkedin.com/company/humansecurityinc/','');
|
||
INSERT INTO vendors VALUES('51bf7a38-4be1-4bd8-ab47-93aa1a52bafc','published','mondoo','Mondoo','www.mondoo.com','Mondoo is an open and extensible security platform that creates a full asset inventory and prioritizes critical issues to address pressing security challenges. Avoid ransomware attacks, failed audits, and understand your risk profile with Mondoo.','602 Preston Village Way',NULL,'Cary','NC','USA','ad13dabd-32dc-403b-b173-9271556bf68b',replace('<h5>Mondoo</h5>\n<p>\nMondoo is a powerful security, compliance, and asset inventory tool that helps businesses identify vulnerabilities, track lost assets, and ensure policy compliance across their entire infrastructure. Our extensible security posture management (xSPM) platform is built on open-source components like cnquery and cnspec, giving customers complete transparency and control over how their data is processed. With Mondoo, you can easily integrate security into your developer workflows and protect your organization''s assets while minimizing the risk of security incidents.<br>\n</p>\n<h5>Why Mondoo?</h5>\n<p>Mondoo is the ultimate cybersecurity platform that solves critical problems faced by CISOs. It provides unique security automation and seamless integration into the development process, which makes it an innovative and unparalleled product.\nMondoo offers limitless support for any system in your infrastructure, from traditional categories like cloud security, Kubernetes, and containers, to SaaS services, repos, on-premise systems, and embedded devices. Mondoo''s lightweight policy engine makes it fully customizable to fit your unique needs.\nMondoo''s Security Co-pilot reduces false-positives and noise, making it an effective tool for threat and behavior analysis. It also helps establish security baselines, demonstrate progress against goals, and respond effectively in case of emergency.\nMondoo is perfect for both security and development teams, as it uses a common language and toolset to break down silos and improve communication. This leads to better security outcomes.</p>','\n',char(10)),NULL,'https://www.twitter.com/mondoohq','https://www.linkedin.com/company/mondoo/','');
|
||
INSERT INTO vendors VALUES('4d38d28b-5c5f-4d7d-8ba2-bf2b73eae101','published','zenity','Zenity','www.zenity.io','The only security governance platform for no-code/low-code development. Zenity enables enterprises to promote no-code/low-code and citizen development securely- discover shadow app development, detect risks, and enforce security policies.','10 Dubnov street',NULL,'Tel-Aviv',NULL,'ISR','3ca6bc65-f2c3-4994-9c3f-90dcf7de1d82',replace('<h5>Zenity</h5>\n<p>\nZenity is the first and only security governance platform for No-Code/Low-Code applications, automations and integrations.\nNo-Code/Low-Code platforms are sweeping the world, allowing pro and citizen developers to create what they need, when they need it and on their own, but without any security governance and tooling.\nZenity empowers IT and Security professionals to gain complete visibility and control [3][4] over their No-Code/Low-Code estate, enabling them to unblock No-Code/Low-Code development and:\n(1) Gain visibility and discover No-Code/Low-Code shadow app development with a cross-platform inventory\n(2) Get continuous risk assessment to pinpoint vulnerabilities and insecure components\n(3) Mitigate risk with automated remediation actions\n(4) Govern the No-Code/Low-Code lifecycle and enforce security policies with playbooks.<br>\n</p>\n<h5>Why Zenity?</h5>\n<p>Zenity is used by application security professionals who are looking to secure business application development that is taking place with low-code/no-code tools, especially such that takes place in their big SaaS platforms like Microsoft, Salesforce, and ServiceNow.\nZenity''s platform offering is focused on 3 main pillars: (1) Visibility, (2) Risk Assessment, (3) Governance.\n(1) Visibility- Generating a continuous cross-platform inventory of all No-Code/Low-Code apps, automations, connectors, data objects, identities, including their business criticality their relationships and change timeline.\n(2) Risk Assessment- Performing continuous risk assessment to pinpoint vulnerabilities and insecure components in the implemented business logics (such as app impersonation, supply-chain, data exfiltration and other scenarios).\n(3) Governance- Applying security and compliance standards with customized policies, remediation actions and enforcement playbooks.</p>','\n',char(10)),NULL,'https://www.twitter.com/zenitysec','https://www.linkedin.com/company/zenitysec','');
|
||
INSERT INTO vendors VALUES('94244add-1cc4-40dd-8cf0-ba430660319f','published','huntress','Huntress','www.huntress.com','We protect small and mid-sized businesses from cyber threats. Founded by NSA veterans and backed by a team of 24/7 threat hunters—our managed security platform defends against persistent footholds, ransomware and other attacks. Visit huntress.com.','6021 University Ave. ','Suite 450','Ellicott City','MD','USA','6343016b-73f5-41e6-909c-27689b9250c2',replace('<h5>Huntress</h5>\n<p>\nHackers are constantly evolving, exploiting new vulnerabilities and dwelling in IT environments—until they meet Huntress.\nHuntress protects small and mid-market businesses from modern cyberattackers. Founded by former NSA Cyber Operators—and backed by a team of 24/7 threat hunters—our managed security platform defends businesses from persistent footholds, ransomware and other attacks.\nWe’re on a mission to secure the 99%. Learn more at www.huntress.com and follow us on social @HuntressLabs.<br>\n</p>\n<h5>Why Huntress?</h5>\n<p>What is Huntress?\nBuilt by offensive security experts, The Huntress Managed Security Platform enables you to find and eliminate threats that lead to breaches, ransomware, and more. We deliver a powerful suite of endpoint detection and response, antivirus, and security awareness training — backed by a team of 24/7 threat hunters—to protect your business from cybercriminals.\nThreatOps fills a critical gap in your security stack, supplying you with a team of cybersecurity professionals. ThreatOps provides 24/7 support and a degree of analysis and expertise software-only solutions can’t match.\nManaged Endpoint Detection and Response provides unparalleled visibility and detection of threats within an organization. Managed EDR makes evicting hackers easy with assisted remediation.\nHuntress Security Awareness Training (SAT) delivers a powerful—and fun—combination of episodes, assessments, simulations, and reports to help employees become more cybersavvy in the fight against bad actors.</p>','\n',char(10)),'https://www.facebook.com/huntresslabs','https://www.twitter.com/huntresslabs','https://www.linkedin.com/company/huntress-labs/','');
|
||
INSERT INTO vendors VALUES('83d9f5c1-e7ba-4cd8-baf2-035212e41bf7','published','picus','PICUS','https://www.picussecurity.com/',replace('Picus Security makes it easy for security teams to validate cyber resilience 24/7. As the pioneer of Breach & Attack Simulation, our Complete Security Validation Platform identifies security gaps and optimizes controls & processes to mitigate them.\n\n\n','\n',char(10)),'160 Spear Street','#1000','San Francisco','CA','USA','5bef8ad8-a4e9-4ede-916b-7e23569d161c',replace('<h5>PICUS</h5>\n<p>\nAt Picus Security, our priority is making it easy for security teams to continuously validate and enhance organizations’ cyber resilience.\nOur Complete Security Validation Platform simulates real-world threats to automatically measure the effectiveness of security controls, identify high-risk attack paths to critical assets, and optimize threat prevention and detection capabilities.\nAs the pioneer of Breach and Attack Simulation, our people and technology empower customers worldwide to be threat-centric and proactive.\nPicus has been named a ‘Cool Vendor’ by Gartner and is cited by Frost & Sullivan as one of the most innovative players in the BAS market.<br>\n</p>\n<h5>Why PICUS?</h5>\n<p>At Picus Security, we prioritize making it easy for organizations to validate and enhance their resilience against cyber attacks. By leveraging our technology, security teams can quantify risk, enhance threat readiness, and use automation to increase impact. Trusted by Mastercard and other industry leaders, our Complete Security Validation Platform simulates real-world threats to discover at-risk assets, measure security control effectiveness, manage attack paths, and optimize prevention and detection capabilities.\nAs the pioneer of Breach and Attack Simulation, Picus believes that every organization should perform security validation continuously. Unlike other BAS products, The Picus Platform is quick to deploy and manage. A rich, constantly updated threat library ensures organizations can test their defenses against current and emerging threats. Plus, due to the platform’s actionable insights and vendor-specific recommendations, they can address exposures more swiftly than ever.\n</p>','\n',char(10)),NULL,'https://www.twitter.com/PicusSecurity','https://www.linkedin.com/company/picus-security','');
|
||
INSERT INTO vendors VALUES('53dedb31-656f-4c5f-bf30-5da075fc0714','published','hillstone-networks','Hillstone Networks','www.hillstonenet.com','Hillstone Networks'' innovative and accessible cybersecurity solutions enable an enterprise’s cyber resilience by providing visibility, intelligence and protection to see, understand, and act against cyberthreats.','5201 Great America Parkway ','#420','Santa Clara','CA','USA','284e63ba-a07d-445e-87b2-87e26a7253ee',replace('<h5>Hillstone Networks</h5>\n<p>\nHillstone Networks’ Integrative Cyber Security approach delivers coverage, control, and consolidation to secure digital transformation for more than 26,000 enterprises worldwide. Hillstone Networks is a trusted leader in cyber security, protecting enterprise critical assets and infrastructure, from edge to cloud, regardless of where the workload resides. Recognized as a Visionary in Gartner’s Magic Quadrant for Network firewalls, Hillstone Networks’ entire suite of cyber security solutions is relied upon in many of the world’s most challenging technology environments. <br>\n</p>\n<h5>Why Hillstone Networks?</h5>\n<p>An integrative cyber security strategy refers to a holistic approach to cyber security that integrates multiple solutions and technologies into a single, cohesive system, delivered on a centralized platform, with a comprehensive cyber security solution portfolio. The purpose of this strategy is to help CISOs improve their organization’s cyber resilience and ensure business continuity despite the challenges they confront.\nHillstone''s Integrative Cyber Security eliminates gaps in protection that put your enterprise at risk and reduces layers of complexity and cost - from technology to solutions, to their delivery and functionality, across vendors and platforms, Hillstone’s Integrative Cyber Security solutions bring Coverage, Control and Consolidation to secure the digital transformation at global scale.\n</p>','\n',char(10)),'https://www.facebook.com/Hillstone-Networks-230976560386832/','https://www.twitter.com/hillstone_net','https://www.linkedin.com/company/hillstonenet','');
|
||
INSERT INTO vendors VALUES('5955be5d-cfce-420d-be5a-6e0f466a0e69','published','haproxy-technologies','HAProxy Technologies','www.haproxy.com',replace('HAProxy Technologies is the company behind HAProxy, the world’s fastest and\nmost widely used software load balancer. Deploy HAProxy products to deliver websites and applications with the utmost performance, observability, and security at any scale.','\n',char(10)),'375 Totten Pond Road','Suite 302','Waltham','MA','USA','01145770-b5c0-4491-b5dc-c6bad2e2eb3b',replace('<h5>HAProxy Technologies</h5>\n<p>\nHAProxy Technologies is the company behind HAProxy, the world’s fastest and most widely-used software load balancer. Organizations deploy HAProxy products to deliver websites and applications with the utmost performance, observability, and security at any scale and in any environment. HAProxy solutions include load balancing, web application and API protection (WAAP), web application firewall (WAF), API gateway, application acceleration, and high availability. Community products include HAProxy load balancer, HAProxy Kubernetes Ingress Controller, and Data Plane API. Enterprise versions add an enterprise suite of advanced security and administration features, third-party integrations, and enterprise support. HAProxy ALOHA hardware or virtual load balancer also provides line-rate DDoS protection. HAProxy Fusion Control Plane adds centralized WAF configuration, Global Profiling Engine, and bot blocking to HAProxy Enterprise. HAProxy Edge is a secure ADN/CDN with a global footprint.<br>\n</p>\n<h5>Why HAProxy Technologies?</h5>\n<p>HAProxy Technologies provides a secure application delivery platform that enables organizations of any size to ensure the high availability, security, and performance of applications in any environment.\nOur customers use HAProxy to keep their website or application online even when disasters or DDoS attacks strike; scale up efficiently and reliably when their traffic and business grow; optimize application performance and improve user experience.\nHAProxy offers market-leading performance and multi-layer security, so you can scale up while protecting against a full spectrum of security threats. Advanced WAF & WAAP capabilities protect against DDoS, bots, OWASP Top 10, and more. Our products support modern architectures (including API gateways and microservices) and deployment environments (cloud, virtual, containers, and appliances).\nHAProxy solutions enable reliable application security at scale with authoritative support, which reduces risk, improves compliance, and powers growth.</p>','\n',char(10)),'https://www.facebook.com/haproxy.technologies','https://www.twitter.com/HAProxy','https://www.linkedin.com/company/haproxy-technologies/','');
|
||
INSERT INTO vendors VALUES('9a2b18a2-32bc-4627-8799-578d2f1777a9','published','passbolt','Passbolt','https://www.passbolt.com',replace('Passbolt is a security-first, open source password manager for businesses.\n','\n',char(10)),'9 Avenue du Blues',NULL,'Belvaux',NULL,'LUX','79860139-36d6-414c-b892-d2426bc04f26',replace('<h5>Passbolt</h5>\n<p>\nPassbolt is a security-first, open source password manager for businesses.\n<br>\n</p>','\n',char(10)),NULL,NULL,NULL,'');
|
||
INSERT INTO vendors VALUES('19a113bb-33ea-4f35-b64a-fffe94315fa9','published','partner-with-finland','Partner with Finland','www.fisc.fi','Finland stands for trust, innovation and calmness, qualities that make us humbly the best nation to partner with. Experience the Finnish spirit of good partnership with HoxHunt, Xiphera, SensorFleet, SSH Communications, Binare, Traficom & WithSecure.','Eteläranta 10',NULL,'Helsinki',NULL,'FIN','7ec5dc68-9c12-4131-9cc7-e36b3c942e56',replace('<h5>Partner with Finland</h5>\n<p>\nFinland stands for trust, innovation and calmness, qualities that make us humbly the best nation to partner with.\nOur exhibitors:\nThe NCSC-FI is the coordinating authority in Finnish cyber domain.\nCyberCoach is a Security and Privacy Awareness Training App with Social Impact for Teams and Slack.\nXiphera’s xQlave™ Post-Quantum Cryptographic (PQC) IP secures FPGAs/ASICs against quantum attacks.\nSensorFleet offers an open, scalable software platform for Network Detection and Response.\nHoxhunt is a Human Risk Management Platform that combines AI and behavioral science to measurably lower cyber risk from people centered attacks.\nBinaré offers a cloud based service with optional professional services that help your business to anticipate emerging cyberattacks.<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/FISCFi','https://www.linkedin.com/company/3998716/','');
|
||
INSERT INTO vendors VALUES('9675aec7-70a9-4962-9769-7102163f77bd','published','hashicorp-inc','HashiCorp, Inc.','www.hashicorp.com/','HashiCorp provides infrastructure automation software for multi-cloud environments, enabling enterprises to unlock a common cloud operating model to provision, secure, connect, and run any application on any infrastructure.','101 2nd St.','Suite 700','San Francisco','CA','USA','4e270928-bc85-418e-8f0b-8183d176e561',replace('<h5>HashiCorp, Inc.</h5>\n<p>\nHashiCorp is a leader in multi-cloud infrastructure automation software. The HashiCorp software suite enables organizations to adopt consistent workflows and create a system of record for automating the cloud: infrastructure provisioning, security, networking, and application deployment. HashiCorp’s portfolio of products includes Vagrant™, Packer™, Terraform®, Vault™, Consul®, Nomad™, Boundary™, and Waypoint™. HashiCorp offers products as open source, enterprise, and as managed cloud services. The company is headquartered in San Francisco, though most of HashiCorp employees work remotely, strategically distributed around the globe. For more information, visit hashicorp.com or follow HashiCorp on Twitter @HashiCorp.\n<br>\n</p>\n<h5>Why HashiCorp, Inc.?</h5>\n<p>HashiCorp is a leader in multi-cloud infrastructure automation software. The HashiCorp software suite enables organizations to adopt consistent workflows and create a system of record for automating the cloud: infrastructure provisioning, security, networking, and application deployment. HashiCorp’s portfolio of products includes Vagrant™, Packer™, Terraform®, Vault™, Consul®, Nomad™, Boundary™, and Waypoint™. HashiCorp offers products as open source, enterprise, and as managed cloud services. The company is headquartered in San Francisco, though most of HashiCorp employees work remotely, strategically distributed around the globe. For more information, visit hashicorp.com or follow HashiCorp on Twitter @HashiCorp.\n</p>','\n',char(10)),'https://www.facebook.com/HashiCorp/','https://www.twitter.com/HashiCorp','https://www.linkedin.com/company/hashicorp/mycompany/','');
|
||
INSERT INTO vendors VALUES('13550614-603b-4ff4-b666-77f4476c31ac','published','hughes-an-echostar-company','Hughes, An EchoStar Company','www.hughes.com/security','Hughes provides tailored managed security services and smart connectivity for small, medium or large enterprises. Managed Services, Managed Smarter','11717 Exploration Lane',NULL,'Germantown','MD','USA','1cf8195b-b939-43db-85a2-a4c50bd04d48',replace('<h5>Hughes, An EchoStar Company</h5>\n<p>\nHughes provides tailored managed security services and smart connectivity for small, medium or large enterprises. Managed Services, Managed Smarter<br>\n</p>','\n',char(10)),'https://www.facebook.com/HughesConnects/','https://www.twitter.com/HughesConnects','https://www.linkedin.com/company/hughesconnects/','');
|
||
INSERT INTO vendors VALUES('53f5662c-323d-4e03-95b9-2d34727c2597','published','fortinet','Fortinet','https://www.fortinet.com/','Fortinet s a driving force in the evolution of cybersecurity and the convergence of networking and security. Our mission is to secure people, devices, and data everywhere, and today we deliver cybersecurity everywhere you need it with the largest integrated portfolio of over 50 enterprise-grade products. ','899 Kifer Road',NULL,'Sunnyvale','CA','USA','29e4a4c3-80b9-4a28-8b47-8c727f03df08',replace('<h5>Fortinet</h5>\n<p>\nFortinet s a driving force in the evolution of cybersecurity and the convergence of networking and security. Our mission is to secure people, devices, and data everywhere, and today we deliver cybersecurity everywhere you need it with the largest integrated portfolio of over 50 enterprise-grade products. <br>\n</p>','\n',char(10)),NULL,NULL,NULL,'');
|
||
INSERT INTO vendors VALUES('9043c1c7-116e-4a3d-8229-6232933f83ae','published','privacera','Privacera','www.privacera.com',replace('Privacera is the only open-standards based data security governance leader that enables data and security teams to simplify data access, security, and privacy for data applications and analytical workloads. \n','\n',char(10)),'39300 Civic Center Drive','Suite 140','Fremont','CA','USA','4de7e25e-d9fa-4525-9fd7-2a1b0ae1bbaf',replace('<h5>Privacera</h5>\n<p>\nFounded in 2016 by the creators of Apache Ranger™, Privacera’s SaaS-based data security and access governance platform enables data and security teams to simplify data access, security, and privacy for data applications and analytical workloads. The Privacera platform supports compliance with regulations such as GDPR, CCPA, LGPD, and HIPAA. Privacera provides a unified view and control for securing sensitive data across multiple cloud services such as AWS, Azure, Databricks, GCP, Snowflake, and Starburst. The Privacera platform is utilized by Fortune 500 customers across finance, insurance, life sciences, retail, media, and consumer industries, as well as government agencies to automate sensitive data discovery, mask sensitive data, and manage high-fidelity policies at petabyte scale on-premises and in the cloud.<br>\n</p>','\n',char(10)),'https://www.facebook.com/privacera/','https://www.twitter.com/privacera','https://www.linkedin.com/company/privacera/','');
|
||
INSERT INTO vendors VALUES('7d6bf96d-aa18-4553-a9d7-2eb430e7f223','published','processunity','ProcessUnity','https://www.processunity.com/?utm_source=rsa&utm_medium=rsa_website_link&utm_campaign=cpm-shw-tradeshow-rsac-230424&utm_content=sponsor_link','ProcessUnity is a leading provider of cloud-based applications for third-party risk and cybersecurity performance management. The ProcessUnity platform unifies how organizations assess, measure, and mitigate risk through automation. ','3 Bradford Street',NULL,'Concord','MA','USA','55b98a60-095d-4029-8ea1-344409a0f491',replace('<h5>ProcessUnity</h5>\n<p>\nProcessUnity is a leading provider of cloud-based applications for third-party risk and cybersecurity performance management. The ProcessUnity platform unifies how organizations assess, measure, and mitigate risk through automation. Built by a team of risk experts and implemented within the world’s leading enterprises, ProcessUnity solutions align programs and people to create a well-rounded defense against critical business risks.<br>\n</p>\n<h5>Why ProcessUnity?</h5>\n<p>ProcessUnity Cybersecurity Performance Management (CPM) unifies your cybersecurity program, enabling you to accurately measure control effectiveness, prioritize remediation investments, drive risk awareness and bolster cybersecurity resiliency. Powered by a suite of automated tools, the comprehensive platform equips you to create a world-class cybersecurity program that helps you meet business demands and protect your organization.\nProcessUnity’s Anti-Bribery and Corruption (ABAC) software streamlines organizations’ compliance efforts while promoting transparency, accountability, and integrity in business and government dealings.\nProcessUnity Vendor Risk Management (VRM) protects companies and their brands by reducing risk from third parties, vendors and suppliers. Our third-party risk tools help customers effectively and efficiently assess and monitor both new and existing vendors – from initial onboarding to ongoing due diligence and monitoring.</p>','\n',char(10)),NULL,'https://www.twitter.com/ProcessUnity','https://www.linkedin.com/company/processunity/','');
|
||
INSERT INTO vendors VALUES('c2fdcd62-a7b3-4b9f-8444-ab0aa2ba44e3','published','pluralsight','Pluralsight','www.pluralsight.com','Pluralsight is the leading technology workforce development company that helps companies and teams build better products by developing critical skills, improving processes and gaining insights through data, and providing strategic skills consulting. ','42 Future Way',NULL,'Draper','UT','USA','0d047f71-dfee-45b7-9992-3f5771ee9648',replace('<h5>Pluralsight</h5>\n<p>\nThe technology workforce development company. At Pluralsight, we believe everyone should have the opportunity to create progress through technology and develop the skills of tomorrow. With assessments, learning paths and courses authored by industry experts, our platform helps businesses and individuals benchmark expertise across roles, speed up release cycles and build reliable, secure products.<br>\n</p>\n<h5>Why Pluralsight?</h5>\n<p>Pluralsight is the only technology workforce partner that equips your team with the right skills while simultaneously addressing workflow gaps, providing the holistic visibility needed to execute your most critical business priorities and keep your teams productive and engaged. First, our experts help you translate your business strategy to a specific, custom plan to identify and close necessary organizational skill and workflow gaps. Then, our Saas Platforms helps you assess skill proficiency at the individual level and close those skill gaps with customized learning paths across any number of tech domains (IT infrastructure, cloud, software development, AI/ML, cybersecurity, and more). All the while, our software delivery intelligence platform, Pluralsight Flow, can help ensure your development teams are collaborating effectively and maximizing their efficiency.\n</p>','\n',char(10)),'https://www.facebook.com/pluralsight/','https://www.twitter.com/pluralsight','https://www.linkedin.com/company/pluralsight/','');
|
||
INSERT INTO vendors VALUES('9d7edf03-61ea-4645-ad05-a17f714146b2','published','horizon3-ai','Horizon3.ai','www.horizon3.ai','Our autonomous pentesting solution, NodeZero, offers a find, fix, verify loop using AI to identify paths to exploit before attackers do. Continuously verify your security posture by executing internal & external pentests at-scale.','8 The Green ','Suite 8584','Dover','DE','USA','b9d7a9e7-07df-4852-ab2c-958e40f596c2',replace('<h5>Horizon3.ai</h5>\n<p>\nHorizon3.ai''s mission is to help you find and fix attack vectors before attackers can exploit them. NodeZero, our autonomous penetration testing solution, is an unlimited, self-service SaaS offering that is safe to run in production, available on-demand, and requires no persistent or credentialed agents. See your enterprise through the eyes of the attacker, identify your ineffective security controls, and ensure your limited time and resources are spent fixing problems that matter. Not just a compliance checkbox; this is effective security. Founded in 2019 by industry, US Special Operations, and US National Security veterans, Horizon3.ai is headquartered in San Francisco, CA. <br>\n</p>','\n',char(10)),'https://www.facebook.com/Horizon3ai/','https://www.twitter.com/Horizon3ai','https://www.linkedin.com/company/horizon3ai','');
|
||
INSERT INTO vendors VALUES('f9e5e942-0791-41d8-aecd-1054d7255d72','published','pkware','PKWARE','www.pkware.com','PKWARE offers the only data discovery and protection solution that locates and secures sensitive data to minimize organizational risks and costs, regardless of device or environment. Our software enables visibility and control of personal data, even in complex environments.','201 E. Pittsburgh Ave. ','Suite 400','Milwaukee','WI','USA','5c801e28-5f58-4228-b9cf-a06ec9b2085a',replace('<h5>PKWARE</h5>\n<p>\nPKWARE offers the only data discovery and protection solution that locates and secures sensitive data to minimize organizational risks and costs, regardless of device or environment. Our software enables visibility and control of personal data, even in complex environments, making PKWARE a global leader in data discovery, security, and compliance.<br>\n</p>\n<h5>Why PKWARE?</h5>\n<p>PK Protect enables enterprise-wide sensitive data protection, safeguarding people’s privacy and the entire organization’s security. The full product suite offers solutions for managing personal information and other sensitive data, combining extensive expertise, data-driven processes, and proven technologies to balance data usage with data protection for minimal risk and maximum value. Automated enterprise-wide location and monitoring of sensitive data, identity creation, data classification, and policy-based data protection techniques ensure complete privacy for individuals and protection of organizational personal data vulnerabilities. With PK Protect, businesses can be confident that they have complete administrative control in finding and protecting sensitive data, wherever it is stored. </p>','\n',char(10)),'https://www.facebook.com/PKWAREINC?utm_medium=email&_hsmi=2&_hsenc=p2ANqtz-81oCmLATZ-OmYFGAmVhUc2OuKBsDPy3zNHmFR5KTY8iHY6nPlQ6zQswf_ZEZOsPeJ7JTLmwSTLVMznUTW4iK3nIeYB2GgHZ6Oyp18OX8emEbhD5ZE&utm_content=2&utm_source=hs_email','https://www.twitter.com/PKWARE?utm_medium=email&_hsmi=2&_hsenc=p2ANqtz-8d1J2rC8ydcFHXCFdr01pVRnnjtnJ6_BgzWlBXSBBkjajKo7FkdxD3bB0qV9gmua-OunIYpNhFayX5uUEUF451rGOipGfnPsJt3IehnUrH-ga3uXg&utm_content=2&utm_source=hs_email','https://www.linkedin.com/company/pkware/mycompany/','');
|
||
INSERT INTO vendors VALUES('e7c86628-70b1-468b-980f-21748036484e','published','wolfssl','wolfSSL','www.wolfssl.com','wolfSSL provides lightweight and embedded security solutions with an emphasis on speed, size, portability, features, and standards compliance. wolfSSL is currently the leader in embedded FIPS certificates. For more information visit our booth 6373','10016 Edmonds Way','C-300','Edmonds','WA','USA','bbecd12a-8e4c-4c5b-8020-5f63a1dcb96f',replace('<h5>wolfSSL</h5>\n<p>\nwolfSSL provides lightweight and embedded security solutions with an emphasis on speed, size, portability, features, and standards compliance.\nwolfSSL is currently the leader in embedded FIPS certificates. We currently maintain a FIPS 140-2 certificate for the wolfCrypt Cryptographic Module: #3389. Certificate #3389 includes algorithm support required for TLS 1.3 and can be used in conjunction with the wolfSSL embedded SSL/TLS library for full TLS 1.3 client and server support. wolfSSL continues to serve our customers long term needs by taking wolfCrypt through the FIPS 140-3 validation process, where we are currently in review at NIST.\nIn addition, any of the FIPS 140-2 validated crypto algorithms can be used in DO-178 mode for combined FIPS 140-2/DO-178 consumption. For more information come visit us at Booth # 6373<br>\n</p>\n<h5>Why wolfSSL?</h5>\n<p>wolfSSL is currently the leader in embedded FIPS certificates. We currently maintain a FIPS 140-2 certificate for the wolfCrypt Cryptographic Module: #3389. Certificate #3389 includes algorithm support required for TLS 1.3 and can be used in conjunction with the wolfSSL embedded SSL/TLS library for full TLS 1.3 client and server support. wolfSSL continues to serve our customers long term needs by taking wolfCrypt through the FIPS 140-3 validation process, where we are currently in review at NIST.\nIn addition, any of the FIPS 140-2 validated crypto algorithms can be used in DO-178 mode for combined FIPS 140-2/DO-178 consumption.\nwolfSSL products:\nwolfSSL, wolfCrypt, wolfCrypt FIPS, wolfTPM, wolfMQTT, wolfSSH, wolfBoot, wolfSentry, curl, wolfSSL JSSE Provider and JNI Wrapper,\nwolfCrypt JCE Provider and JNI Wrapper, wolfSSL C#,\nwolfSSL Support for DO-178 DAL A, wolfCrypt FIPS</p>','\n',char(10)),'https://www.facebook.com/wolfssl','https://www.twitter.com/wolfssl','https://www.linkedin.com/company/wolfssl/','');
|
||
INSERT INTO vendors VALUES('7a131fb0-db44-41fa-84e5-c13099ab34f0','published','pradeo','Pradeo','https://www.pradeo.com','Pradeo is a global mobile security leader. It provides solutions to protect mobile device fleets, mobile applications, and associated web services. The technology Pradeo Security is recognized by Gartner, IDC, Forrester and Frost & Sullivan.','71 Place Vauban ','Les Portes d'' Antigone','Montpellier',NULL,'FRA','d1bf5e96-63d5-42a7-8dc2-730726b961dc',replace('<h5>Pradeo</h5>\n<p>\nPradeo is a mobile and application security leader. It provides solutions to protect mobile devices, as well as mobile and web applications. The technology Pradeo Security is recognized as the most accurate of the market by Gartner, IDC and Frost & Sullivan. It provides a reliable detection and response to vulnerabilities and threats, hence preventing data leakage and reinforcing compliance with privacy laws.<br>\n</p>\n<h5>Why Pradeo?</h5>\n<p>We offer services dedicated to securing your mobile devices and applications.\n• Mobile Threat Defense to secure mobile device fleets. Easily integrated in SOCs.\n• Secure Private Store to set up conditional access to corporate resources. Perfect to secure BYOD usages.\n• Mobile and Web App Security Testing to detect and remediate vulnerabilities in applications’ source code. Secure coding enablement.\n• Mobile Application Compliance Audit to reveal unwanted behaviors. Ideal to vet libraries.\n• Mobile Application Shielding to harden applications’ binary. In a few clicks.\n• Runtime Application Self Protection to protect critical app''s data and transactions.\n• Mobile app certifier to defeat clones.</p>','\n',char(10)),NULL,'https://www.twitter.com/@pradeo','https://www.linkedin.com/company/pradeo-security-systems','');
|
||
INSERT INTO vendors VALUES('a2101b5f-e945-4439-96fa-423b4dc8786f','published','nokia','Nokia','www.nokia.com',replace('At Nokia, we create technology that helps the world act together.\nAs a trusted partner for critical networks, we are committed to innovation and technology leadership across mobile, fixed and cloud networks. ','\n',char(10)),'Karakaari 7',NULL,'Espoo',NULL,'FIN','6acdddf1-e37b-438f-9435-c34604ec3571',replace('<h5>Nokia</h5>\n<p>\nAt Nokia, we create technology that helps the world act together.\nAs a trusted partner for critical networks, we are committed to innovation and technology leadership across mobile, fixed and cloud networks. We create value with intellectual property and long-term research, led by the award-winning Nokia Bell Labs.\nAdhering to the highest standards of integrity and security, we help build the capabilities needed for a more productive, sustainable and inclusive world.<br>\n</p>\n<h5>Why Nokia?</h5>\n<p>NetGuard Cybersecurity Dome\nThe cloud-based software as a service (SaaS) allows you to detect, manage, investigate, hunt, contain, and remediate threats for 5G security assurance\nNokia delivers managed security services - comprising of Managed Detection and Response (MDR) as well as wide variety of value-added telco security services - for communication service providers and enterprise customers tailored to protect both operational technology (5G security) and IT environment of CSPs and verticals from the evolving cyber threats in the 5G and Industry 4.0 era\nNokia cybersecurity consulting brings deep 5G security expertise and one of the world’s only end-to-end 5G security assessment and insight capabilities to help you transform your 5G security operations and stay ahead of cybersecurity threats. We have the know-how you need to manage cyber threats and protect the security and privacy of sensitive business data, critical infrastructure, and all other aspects of your critical network</p>','\n',char(10)),'https://www.facebook.com/nokia/','https://www.twitter.com/nokianetworks','https://www.linkedin.com/company/nokia-for-service-providers/','');
|
||
INSERT INTO vendors VALUES('5544151c-0c5e-4583-8c11-2fe0a5d57a72','published','palo-alto-networks','Palo Alto Networks','https://www.paloaltonetworks.com/','Palo Alto Networks is the world’s cybersecurity leader. Our next-gen security solutions, expert services, and industry-leading threat intelligence empower organizations across every sector to transform with confidence. We’re committed to helping ensure each day is safer than the one before.','3000 Tannery Way',NULL,'Santa Clara','CA','USA','f76605ff-b191-4cda-be51-0df272ea13c9',replace('<h5>Palo Alto Networks</h5>\n<p>\nPalo Alto Networks is the world’s cybersecurity leader. We innovate to outpace cyberthreats, so organizations can embrace technology with confidence. We provide next-gen cybersecurity to tens of thousands of customers globally, across all sectors. Our best-of-breed cybersecurity platforms and services are backed by industry-leading threat intelligence and strengthened by state-of-the-art automation. Whether deploying our products to enable the Zero Trust Enterprise, responding to a security incident, or partnering to deliver better security outcomes through a world-class partner ecosystem, we’re committed to helping ensure each day is safer than the one before. It’s what makes us the cybersecurity partner of choice.\nFor more information, visit www.paloaltonetworks.com.\n<br>\n</p>','\n',char(10)),'https://www.facebook.com/PaloAltoNetworks/','https://www.twitter.com/PaloAltoNtwks','https://www.linkedin.com/company/palo-alto-networks/','');
|
||
INSERT INTO vendors VALUES('21a9a3b0-4f2f-41dd-8656-e5e958fb14a1','published','proofpoint','Proofpoint','www.proofpoint.com','Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks.','925 W. Maude Ave',NULL,'Sunnyvale','CA','USA','2cd2444c-6a34-49ac-a611-0fff178e4f80',replace('<h5>Proofpoint</h5>\n<p>\nProofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including 75 percent of the Fortune 100, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web. More information is available at www.proofpoint.com.<br>\n</p>\n<h5>Why Proofpoint?</h5>\n<p>Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including 75 percent of the Fortune 100, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web. More information is available at www.proofpoint.com.</p>','\n',char(10)),'https://www.facebook.com/proofpoint/','https://www.twitter.com/proofpoint','https://www.linkedin.com/company/proofpoint/','');
|
||
INSERT INTO vendors VALUES('fb72e40b-f38b-4184-a22b-0c7995db8b79','published','netenrich','Netenrich','www.netenrich.com','Netenrich boosts the effectiveness of organizations’ security and digital operations so they can avoid disruption and preempt risk. Its Resolution Intelligence Cloud™ is a native SaaS data analytics platform for managing secure operations. ','2590 N. First Street ','Suite 300','San Jose','CA','USA','62562798-a5c1-4656-80cc-c8722c5afc33',replace('<h5>Netenrich</h5>\n<p>\nNetenrich boosts the effectiveness of organizations’ security and digital operations so they can avoid disruption and manage risk. Its Resolution Intelligence Cloud™ is a native cloud data analytics platform for enterprises and service providers that need highly scalable, multitenant secure incident and event management (SIEM) with advanced analytics to provide actionable insights to act on. The platform leverages Google Chronicle as its fast, scalable security data lake. Resolution Intelligence Cloud transforms security and operations data into intelligence that organizations can act on before critical issues occur. More than 3,000 customers and managed services providers rely on Netenrich to deliver secure operations at scale and speed. <br>\n</p>','\n',char(10)),'https://www.facebook.com/netenrich/','https://www.twitter.com/Netenrich','https://www.linkedin.com/company/netenrich/','');
|
||
INSERT INTO vendors VALUES('9da90769-a26f-4ff8-941d-b96c8bd5a111','published','napatech','Napatech','https://www.napatech.com/','Whether your critical network application is commercial, open-source or homegrown, Napatech SmartNICs can offload burdensome infrastructure and pre-processing workloads from the CPU to free up valuable compute resources to your application.','Tobaksvejen 23A',NULL,'Soeborg',NULL,'DNK','0681d503-305d-44e0-9af9-3db3cd7c5528',replace('<h5>Napatech</h5>\n<p>\nNapatech is the leading supplier of programmable FPGA-based SmartNIC solutions used in telecom, cloud, enterprise, cybersecurity and financial applications worldwide. Through commercial-grade software suites integrated with robust, high-performance hardware, Napatech accelerates telecom, networking and security workloads to deliver best-in-class system-level performance while maximizing the availability of server compute resources for running applications and services. <br>\n</p>\n<h5>Why Napatech?</h5>\n<p>Visit the Napatech booth to learn how SmartNIC solutions can accelerate security applications dramatically and scale critical networking use cases.</p>','\n',char(10)),NULL,'https://www.twitter.com/Napatech','https://www.linkedin.com/company/napatech','');
|
||
INSERT INTO vendors VALUES('392d7967-3e17-4f12-89a2-58f972fcdf1c','published','pentera','Pentera','www.pentera.io','Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers including their ransomware readiness, unfolding true, current security exposures at any moment.','200 Summit Drive','Floor 3','Burlington','MA','USA','9cf9b08f-a964-4fc5-9b78-5dd0584add53',replace('<h5>Pentera</h5>\n<p>\nPentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. For more info visit: pentera.io.<br>\n</p>\n<h5>Why Pentera?</h5>\n<p>The Pentera Platform automatically uncovers real exposures in the organization’s environment. It challenges the entire IT attack surface (internal, external, and cloud) by safely emulating the actions of an attacker, providing real-time security validation at scale.\nRequiring no agents, the platform tests the effectiveness of existing security controls including Endpoint Detection and Response (EDR/XDR), Endpoint Protection Platforms (EPP), Firewalls, Web Application Firewalls (WAF), and more. The result of the tests provides security teams with an understanding of their defenses'' efficacy against modern attacks.\nWith Pentera, organizations can continuously improve their cybersecurity posture by performing validation tests as frequently as needed - daily, weekly, or monthly. Evidence-based test findings are prioritized based on their risk impact, giving organizations the ability to focus remediation efforts on the vulnerabilities that matter the most.</p>','\n',char(10)),'https://www.facebook.com/Penterasec','https://www.twitter.com/penterasec','https://www.linkedin.com/company/penterasecurity','');
|
||
INSERT INTO vendors VALUES('3958d2e5-55dd-49e4-8a3a-b1330206e512','published','netography','Netography','https://netography.com/','Netography® has created the first network-centric platform that reconstitutes capabilities disrupted by the combined impact of encryption and Atomized Networks across the security world. ','382 NE 191st St.','#60908','Miami','FL','USA','671f302e-0629-4d4b-8dd2-fa15bb9c113c',replace('<h5>Netography</h5>\n<p>\nNetography® has created the first network-centric platform that reconstitutes capabilities disrupted by the combined impact of encryption and Atomized Networks across the security world. Netography Fusion® is for enterprise security operations center (SOC) and cloud operations teams that need scalable, continuous network visibility across the Atomized Network – legacy, on-premises, hybrid, multi-cloud, and edge environments.\n<br>\n</p>\n<h5>Why Netography?</h5>\n<p>Netography Fusion® is for enterprise security operations center (SOC) and cloud operations teams that need scalable, continuous network visibility and operational governance across the Atomized Network – legacy, on-premises, hybrid, multi-cloud and edge environments. With Netography Fusion’s Operational Governance capabilities, your teams are able to monitor and enforce security postures and policies in real-time and at scale.\nNetography Fusion enables organizations to greatly reduce cyber threat risks and ensure that organizational policies and changes to them can be rapidly enforced and monitored in real-time.\nWithin minutes and without hardware, complicated network taps and packet inspection agents, your team can gain visibility from firewalls, routers, switches, load balancers, multiple cloud networks, even legacy devices that you’ve never had visibility or due to lack of agent support, encrypted network traffic, or complex global network topographies. </p>','\n',char(10)),'https://www.facebook.com/netography.inc','https://www.twitter.com/netography','https://www.linkedin.com/company/netography/','');
|
||
INSERT INTO vendors VALUES('440cbd9f-9d74-400d-b6d9-303e8e43b827','published','netskope','Netskope','www.netskope.com','Netskope, a global cybersecurity leader, is redefining cloud, data, and network security. The Netskope platform provides optimized access and zero trust security for people, devices, and data anywhere they go.','2445 Augustine Dr.','3rd Floor','Santa Clara','CA','USA','3778b1bd-0ab2-4ea9-9032-8bd0cc258300',replace('<h5>Netskope</h5>\n<p>\nNetskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply zero trust principles to protect data. Fast and easy to use, the Netskope platform provides optimized access and zero trust security for people, devices, and data anywhere they go. Netskope helps customers reduce risk, accelerate performance, and get unrivaled visibility into any cloud, web, and private application activity. Thousands of customers, including more than 25 of the Fortune 100, trust Netskope and its powerful NewEdge network to address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.<br>\n</p>','\n',char(10)),'https://www.facebook.com/netskope','https://www.twitter.com/netskope','https://www.linkedin.com/company/netskope/','');
|
||
INSERT INTO vendors VALUES('16785462-8c28-4c8b-bd1d-ebdfeb19d29a','published','netscout','NETSCOUT','www.netscout.com','The world’s most demanding digital ecosystems rely on our Visibility Without Borders® platform to ensure the performance, security, and availability of their business services. Our solutions include Arbor DDoS Protection and Omnis Network Security.','310 Littleton Rd',NULL,'Westford','MA','USA','1f0f28c8-4a95-40f5-94c4-5393102f8a6d',replace('<h5>NETSCOUT</h5>\n<p>\nWe are the Guardians of the Connected World.\nNETSCOUT SYSTEMS, INC. assures digital business services against disruptions in availability, performance, and security. Our market and technology leadership stems from combining our patented smart data technology with smart analytics. We provide real-time, pervasive visibility, and insights customers need to accelerate, and secure their digital transformation. Our approach transforms the way organizations plan, deliver, integrate, test, and deploy services and applications. The world’s most demanding digital ecosystems rely on our Visibility Without Borders® platform to ensure the performance, security, and availability of their business services. Our cybersecurity solutions include Arbor DDoS Protection and Omnis Network Security.<br>\n</p>\n<h5>Why NETSCOUT?</h5>\n<p>NETSCOUT Arbor DDoS Protection: The Arbor Edge Defense, Arbor Cloud and Arbor Sightline and Threat Mitigation System products use a unique combination of global threat intelligence and automated threat detection and mitigation to stop the most complex multi—vector DDoS attacks which threaten the availability of business-critical networks and services.\nNETSCOUT Omnis Network Security: Omnis CyberStream sensors and Cyber Intelligence use scalable Deep packet Inspection (DPI) to gain pervasive network visibility, execute real-time threat analytics at source of capture, conduct historical investigation and proactive hunting of network metadata and packets to help security teams improve cyber threat detection and incident response.</p>','\n',char(10)),'https://www.facebook.com/netscoutinc/','https://www.twitter.com/NETSCOUT','https://www.linkedin.com/company/netscout/','');
|
||
INSERT INTO vendors VALUES('5901c0f8-1f72-464c-9b83-32aa2c28c08c','published','neosec','Neosec','www.neosec.com','Neosec is reinventing application security. Built for organizations that expose APIs to partners, suppliers, and users, Neosec discovers all your APIs, analyzes their behavior, and stops threats lurking inside.','691 South Milpitas Blvd. ','Suite 212','Milpitas','CA','USA','95db0c05-a1c5-4be1-8e79-bc5301a39216',replace('<h5>Neosec</h5>\n<p>\nThe intelligent way to protect your APIs from business abuse and data theft.\nNeosec''s pioneering SaaS platform is built for organizations that expose APIs to partners, suppliers, & users. Neosec discovers all your APIs, analyzes their behavior, & stops threats lurking inside.\nWhy Neosec?\nBroadest API discovery - Neosec finds more APIs by integrating seamlessly where your API activity data is found\nContext-aware security - Using Behavioral analytics our data-rich platform enables your teams to investigate, hunt, & respond to real threats & know exactly what happened\nData is the difference - Neosec stores historical API data utilizing the cloud to examine your entire API dataset–finding threats that others miss\nOpen platform - Security teams can create unique responses to threats, extend your security capabilities, & use the historical data–all accessed via Neosec APIs\nInnovative detection & response - Neosec is the first to bring XDR techniques & expertise to application security<br>\n</p>','\n',char(10)),'https://www.facebook.com/neoseccom','https://www.twitter.com/neosec_com','https://www.linkedin.com/company/neosec-com/','');
|
||
INSERT INTO vendors VALUES('3d6c955b-e54f-4d37-9c09-0a105ba113ef','published','netally','NetAlly','https://netally.com','NetAlly helps network engineers and technicians better deploy, manage, and maintain complex wired and wireless networks. We simplify network testing, provide instant visibility, and enable seamless collaboration between site and remote personnel.','2075 Research Parkway ','Suite 190','Colorado Springs','CO','USA','244cd577-9423-4f46-ac95-0de6f345ea5e',replace('<h5>NetAlly</h5>\n<p>\nNetAlly helps network engineers and technicians better deploy, manage, and maintain complex wired and wireless networks. We simplify network testing, provide instant visibility, and enable seamless collaboration between site and remote personnel.<br>\n</p>\n<h5>Why NetAlly?</h5>\n<p>NetAlly is excited to launch a new product into the cyber security market.\nIt’s unique because it offers comprehensive site security surveying, analysis and reporting from a powerful, portable tool.\nNetAlly solutions provide fast, actionable insights on-prem in your site networks, filling the visibility gaps that your other toolsets do not cover.\nIt delivers full visibility - either onsite or remotely. Imagine being able to quickly identify every wired Ethernet, Wi-Fi, and Bluetooth/BLE device on your site network, pinpoint precisely where it is connected, and instantly determine if it is friend or foe – without agents, appliances or ‘big iron’ monitoring systems.</p>','\n',char(10)),'https://www.facebook.com/netally19','https://www.twitter.com/netally','https://www.linkedin.com/company/netally/mycompany/','');
|
||
INSERT INTO vendors VALUES('f3dc726f-d901-49e0-b629-b276ee937227','published','nasa-sewp','NASA SEWP','www.sewp.nasa.gov','NASA SEWP GWAC provides the latest in Information Technology products and services for all Federal Agencies and their approved contractors. SEWP offers low prices, the lowest surcharge, and the fastest ordering procedure using pre-competed contracts.','10210 Greenbelt Road ','Suite 200','Lanham','MD','USA','6b29c33b-44f7-496a-aa8d-e22f9f6d8d79',replace('<h5>NASA SEWP</h5>\n<p>\nThe NASA SEWP (Solutions for Enterprise-Wide Procurement) GWAC (Government-Wide Acquisition Contract) provides the latest in Information Technology (IT) products and services for all Federal Agencies and their approved contractors. SEWP offers low prices, the lowest surcharge and the fastest ordering procedure using pre-competed contracts.<br>\n</p>','\n',char(10)),'https://www.facebook.com/nasa.sewp.3?fref=ts','https://www.twitter.com/nasasewp','https://www.linkedin.com/company/nasa-sewp/','');
|
||
INSERT INTO vendors VALUES('ed3f6696-3fcf-4670-9dc9-d7fba52a69c5','published','ncp-engineering-inc','NCP engineering, Inc.','www.ncp-e.com','NCP is a software vendor and technological market leader for secure communcations products including advanced VPN solutions for cloud environments to level up companies IT strategy for SASE, SD-WAN and Zero Trust.','19321 US Highway 19 N. ','Suite 401','Clearwater','FL','USA','eccb0569-6d98-4519-a8a0-23d268c52fad',replace('<h5>NCP engineering, Inc.</h5>\n<p>\nNCP engineering, Inc.\nFor more than 35 years, Nuremberg (Germany)-based NCP engineering has been focusing on the development of universally applicable software components, that enable end devices to easily and securely connect to the corporate headquarters’ network. The remote access VPN solutions are used for mobile computing, branch office networking, cloud security and Industry 4.0.\nWhy NCP engineering, Inc.?\nIn most IT departments, remote access to company resources is a must, especially given today''s increasingly growing mobile workforce. NCP’s VPN products are designed according to the needs of the customers, with a focus on ease of use, IT management, compatibility, and cost effectiveness. The number of successful projects is a testament to our passion. NCP’s VPN solutions are also made to integrate seamlessly with newest cloud security concepts and standards such as SASE, Single Sign-On, SD-WAN or Zero Trust, that open up new possibilities for remote access today.\n<br>\n</p>\n<h5>Why NCP engineering, Inc.?</h5>\n<p>Ready to secure any infrastructure\nTechnology and standards such as SASE, Single Sign-On, SD-WAN and Zero Trust have opened up exciting new possibilities for implementing remote access solutions. Integrating cloud solutions must be just as secure, if not provide more security than the traditional on-premise infrastructure.\nNCP is ready to meet this challenge with enterprise VPN products designed with users, companies and service providers in mind.\nIn most IT departments, secure remote access is a must, especially given today''s increasingly growing mobile workforce. NCP’s VPN products are designed according to the needs of customers, with a focus on ease of use, management, compatibility, and cost effectiveness. The number of successful projects is a testament to our passion. NCP’s VPN solutions are also made to integrate seamlessly with newest cloud security concepts and standards (SASE, Single Sign-On, SD-WAN and Zero Trust) which open up new possibilities for remote access today.\n</p>','\n',char(10)),'https://www.facebook.com/NCPengineeringInc/',NULL,'https://www.linkedin.com/company/ncp-engineering-inc./','');
|
||
INSERT INTO vendors VALUES('46edf4f5-8a61-4ace-938d-931023aa45e5','published','netwrix','Netwrix','www.netwrix.com','Netwrix empowers information security professionals at more than 13,000 organizations worldwide to identify and protect sensitive data by strengthening their security posture across all three primary attack vectors: data, identity and infrastructure.','6160 Warren Parkway','Suite 100','Frisco','TX','USA','83348013-9145-4154-9c51-1f6e231ecfa2',replace('<h5>Netwrix</h5>\n<p>\nNetwrix empowers information security and governance professionals to identify and protect sensitive data to reduce the risk of a breach. Our solutions also limit the impact of attacks by helping IT teams detect, respond and recover from them faster and with less effort. Over 13,000 organizations worldwide rely on Netwrix solutions to strengthen their security and compliance posture across all three primary attack vectors: data, identity and infrastructure.<br>\n</p>\n<h5>Why Netwrix?</h5>\n<p>Netwrix makes data security easy. Simplify your life with easy-to-use products to identify and protect sensitive data to reduce the risk of a breach, and to detect, respond to and recover from attacks, limiting their impact. The Netwrix solutions enable organizations to govern access to data, secure Active Directory, offer protection from ransomware and manage identities and access. But don’t believe us - more than 13,000 organizations worldwide rely on Netwrix to strengthen their security and compliance posture across all three primary attack vectors: data, identity and infrastructure.</p>','\n',char(10)),'https://www.facebook.com/Netwrix','https://www.twitter.com/netwrix','https://www.linkedin.com/company/455932/','');
|
||
INSERT INTO vendors VALUES('b23d68d1-697c-4f3d-a742-dc36010d8781','published','next-dlp','Next DLP','nextDLP.com','Next DLP (“Next”) is a leading provider of data protection solutions for organizations with valuable data who need to uncover risk, educate employees and fulfill security, compliance and regulatory needs. ','110 East 42nd St ','Suite 815','New York','NY','USA','c8aa455f-d65a-4cdc-bfce-78e91394b1ed',replace('<h5>Next DLP</h5>\n<p>\nThe Reveal SaaS Platform by Next provides data protection for organizations with sensitive data that must uncover risk, educate employees and fulfill security, privacy, compliance, and regulatory needs.\nNext DLP Reveal is built with today’s technology: Next’s high performance agent combined with a cloud-native, SaaS, multi-tenant platform provides organizations with speedy deployments and immediate visibility. The non-intrusive, system-aware, self-auditing agent works seamlessly within customer ecosystems respecting existing business processes. Reveal leverages machine learning on the endpoint to analyze user behavior and stop data loss. Via automated user guidance and dynamic classification, Reveal reinforces a positive security culture at the point of risk.<br>\n</p>\n<h5>Why Next DLP?</h5>\n<p>Reveal is built with modern tech, designed for today’s threat landscape and aimed at contemporary organizations with a distributed, security-aware\nworkforce. Once deployed, our high-performance, self-auditing Reveal agent begins collecting and analyzing millions of events delivering instant visibility into user behaviors and the movement of sensitive data assets to inform sensible controls.\nThe Reveal Cloud combines human-centric context with content-centric DLP controls. There’s no need to discover and pre-classify data. Reveal leverages machine-learning powered insider-risk management to glean how users are interacting with data, recognize risky activities, then automatically adapt DLP controls based on the data breach risk-level presented - all to deliver the healthy balance of user productivity, employee privacy and data security that has eluded organizations using legacy DLP.\n</p>','\n',char(10)),'https://www.facebook.com/NextDLP/','https://www.twitter.com/Next_DLP','https://www.linkedin.com/company/nextdlp/','');
|
||
INSERT INTO vendors VALUES('8df94254-44bc-4abb-830d-da7c5e7ad7c5','published','ninjio-cybersecurity-awareness-training','NINJIO Cybersecurity Awareness Training','www.ninjio.com','NINJIO offers a cybersecurity awareness training and simulated phishing solution that uses engaging, 3 to 4-minute Hollywood-style micro-learning videos to empower individuals and organizations to become defenders against cyberthreats.','880 Hampsire Rd. ','Suite B','Westlake Village','CA','USA','a7482bf4-6202-4e8e-8ebc-14eacd13434f',replace('<h5>NINJIO Cybersecurity Awareness Training</h5>\n<p>\nNINJIO offers a cybersecurity awareness training and simulated phishing solution that uses engaging, 3 to 4-minute Hollywood-style micro-learning videos to empower individuals and organizations to become defenders against cyberthreats. We teach organizations, employees, and families how not to get hacked, which makes them the first line of defense against today’s increasingly sophisticated cybercriminals.\nWe serve some of the largest companies in the world and have changed the behavior of hundreds of thousands of people through engaging, emotionally driven storytelling.\nOur philosophy? No more boring, check-the-box security awareness lectures. Simply teach, test, repeat, and stay secure.<br>\n</p>\n<h5>Why NINJIO Cybersecurity Awareness Training?</h5>\n<p>NINJIO AWARE is our flagship cybersecurity awareness training service. Users receive monthly training based on real-life threats and supporting content that builds their security skills over time. This option is best suited for companies that need a training solution for their employees and may not have a learning management system (LMS).\nNINJIO ENTERPRISE offers all of the content from NINJIO AWARE for companies that already have an LMS in place and prefer to distribute NINJIO episodes within it.\nNINJIO PHISH is our fully managed phishing simulation program. It’s integrated into our DOJO platform and lets you test how users respond to phishing attacks, which make up the bulk of cyberthreats. For comprehensive training, we recommend pairing with NINJIO AWARE.\nNINJIO PRODIGY is a cost-effective bundle that integrates NINJIO AWARE training with NINJIO PHISH, equipping users with more tools to stay secure. And it’s hosted on our DOJO platform, so customers don’t need a preexisting LMS.</p>','\n',char(10)),'https://www.facebook.com/getninjio/','https://www.twitter.com/Im_Ninjio','https://www.linkedin.com/company/ninjio-llc-/','');
|
||
INSERT INTO vendors VALUES('0d439e0f-0740-4615-8ec4-0a5f62b85a0c','published','nozomi-networks','Nozomi Networks','www.nozominetworks.com','Nozomi Networks accelerates digital transformation by protecting critical infrastructure organizations from cyber threats. Our solution delivers exceptional network & asset visibility, threat detection & insights for OT & IoT environments.','575 Market St. ','Suite 3650','San Francisco','CA','USA','12102fb4-1732-4cae-9fa7-1ae6eb7a889a',replace('<h5>Nozomi Networks</h5>\n<p>\nWith Nozomi Networks, you can minimize your organizations risk and maximize resilience through unmatched OT and IoT network visibility, dynamic threat and anomoly detection.\nWe enable enterprise and critical infrastructure providers to:\nAnticipate Problems: Unparalleled OT and IoT visibility helps you foresee potential security and reliability threats long before they impact operations\nDiagnose Threats: We go beyond OT and IoT anomaly detection to help you diagnose the root causes of unexpected process changes and deviations from baseline behavior\nRespond Quickly: Actionable intelligence and guided remediation provide the insight you need to accelerate your response to critical OT and IoT security breaches and process control issues.<br>\n</p>\n<h5>Why Nozomi Networks?</h5>\n<p>Nozomi Networks protects the world’s critical infrastructure from cyber threats. We deliver exceptional network and asset visibility, threat detection, and insights for OT and IoT environments. CISOs rely on us to minimize risk and complexity while maximizing operational resilience.\nProducts include:\nVantage, a SaaS-based security and visibility platform for dynamic OT & IoT networks.\nGuardian sensors make it possible to see, secure and monitor all your ICS, OT, IoT, IT, edge and cloud assets.\nArc – delivers OT endpoint security.\nThreat and Asset Intelligence Services provide continues updates on emerging threats and new asset vulnerabilities for strong security and response.</p>','\n',char(10)),NULL,'https://www.twitter.com/nozominetworks','https://www.linkedin.com/company/nozomi-networks-sa/','');
|
||
INSERT INTO vendors VALUES('b09f9ba6-0625-4025-8f73-1486e6729b8b','published','nri-secure','NRI Secure','https://www.nri-secure.com/','NRI Secure is a global MSSP delivering 20+ years of managed security services including: 24x7 Cybersecurity Defense ◇ Managed Detection & Response ◇ Vulnerability Management ◇ Security Consulting, Assessment & Pentesting ◇ Security Awareness Training','26 Executive Park ','#150','Irvine','CA','USA','3e2d64f6-3035-4214-9655-77b989be80aa',replace('<h5>NRI Secure</h5>\n<p>\nNRI SecureTechnologies (NRI Secure) is a global service provider of next-gen Managed Security Services with 20+ years in InfoSec. Our mission is protecting your organization and optimizing your security resources with accuracy, speed and efficiency.\nWe deliver CyberSecurity Defense solutions including 24x7 security alert & monitoring (SOC), managed detection & response (MDR) and vulnerability management as well as security consulting, assessment and pentest services.\nPlease visit us RSA Conference in the Moscone North Expo Hall at Booth# 5525 for a meet & greet. See you there!<br>\n</p>\n<h5>Why NRI Secure?</h5>\n<p>24x7 Cybersecurity Defense with NeoSOC ◇ Managed Detection & Response with CrowdStrike ◇ Vulnerability Management with Qualys ◇ Security Awareness Training with Cofense ◇ Security Consulting, Assessment and Pentesting Services</p>','\n',char(10)),'https://www.facebook.com/nrisecurejp/','https://www.twitter.com/NRIST','https://www.linkedin.com/company/nri-securetechnologies-ltd','');
|
||
INSERT INTO vendors VALUES('bfe65122-84a0-48bf-85d3-6800e922a9e6','published','laminar','Laminar','www.laminarsecurity.com','Laminar’s Cloud Data Security Platform protects data for everything you build and run in the cloud. Visit: www.laminarsecurity.com.','1013 Centre Road',NULL,'Wilmington','DE','USA','c397e991-0689-4c5c-869c-194e1ab5b4e1',replace('<h5>Laminar</h5>\n<p>\nLaminar, the first agile data security platform, provides organizations the visibility and control they need to achieve security, privacy, and governance in the cloud. Our cloud-native DSPM provides autonomous and continuous data discovery, classification, and protection across AWS, Azure, Google Cloud, and Snowflake via a unified console. Agentless security proactively uncovers cloud data, classifies it based on its sensitivity and business impact, detects and prioritizes data security policy violations, and delivers guided remediation. Laminar deploys in minutes and integrates with existing security stacks and process flows, empowering teams to deliver agile data security at the speed of innovation.<br>\n</p>\n<h5>Why Laminar?</h5>\n<p>As the leading enterprise DSPM solution, Laminar gives organizations the visibility and control they need to support their data security, privacy, and governance initiatives in the cloud. The cloud-native platform provides autonomous and continuous data discovery, classification, and protection across a multi-cloud environment via a unified console. Laminar deploys in minutes and integrates with existing security stacks and process flows, empowering teams to deliver agile data security at the speed of innovation.</p>','\n',char(10)),'https://www.facebook.com/laminarsec','https://www.twitter.com/laminarsec','https://www.linkedin.com/company/laminar-security/','');
|
||
INSERT INTO vendors VALUES('cd63f212-3c56-43e3-b418-105ea6d236d2','published','lumu-technologies','Lumu Technologies','www.lumu.io','Lumu is focused on helping organizations detect threats and confirmed instances of compromise. Applying principles of continuous compromise assessment, Lumu has built a solution that helps security teams accelerate compromise detection in real-time.','8600 NW 36 Street','Suite 150','Doral','FL','USA','6d6ccf61-5104-4f42-b68c-07f395d3b291',replace('<h5>Lumu Technologies</h5>\n<p>\nLumu is focused on helping organizations illuminate threats and isolate confirmed instances of compromise. Applying principles of continuous compromise assessment, Lumu has built a powerful closed-loop, self-learning solution that helps security teams accelerate compromise detection, gain real-time visibility across their infrastructure, and close the breach detection gap from months to minutes.<br>\n</p>\n<h5>Why Lumu Technologies?</h5>\n<p>Legacy network security tools are siloed and limited in their abilities to take action and integrate with existing investments. This provides attackers ample time to fully execute attacks. Lumu breaks those barriers by providing visibility and initiating responses to threats before they can be fully executed or cause any damage.\nLumu offers comprehensive network monitoring to detect malicious activity and respond in real time. The solution is able to identify anomalous behavior and confirm malicious activity within an organization’s network. When a threat is confirmed, the client is notified and automated actions are taken to block the threat via integrations with existing technologies. This enables customers to operationalize their existing security infrastructure while protecting against the most pervasive threats.</p>','\n',char(10)),'https://www.facebook.com/lumutech/','https://www.twitter.com/lumutech','https://www.linkedin.com/company/lumutech','');
|
||
INSERT INTO vendors VALUES('d023c509-05d0-4bd1-ab24-c1bfe1a5a420','published','lanner-electronic-inc','Lanner Electronic Inc.','www.lannerinc.com','Lanner Electronics Inc is a world leading provider of design, engineering and manufacturing services for advanced network appliances and rugged applied computing platforms for system integrator, service providers and application developers.','7F, 173 Datong Road Section 2','Xizhi District','New Taipei City ',NULL,'TWN','114974a8-a9db-4952-83f0-8540e0e6eddf',replace('<h5>Lanner Electronic Inc.</h5>\n<p>\nLanner Electronics Inc. is a world leading provider of design, engineering and manufacturing services for advanced network appliances and rugged applied computing platforms for system integrator, service providers and application developers.\nFounded in 1986, Lanner is an ISO 9001 accredited organization with headquarters in Taipei, Taiwan, and offices in USA, Canada and China. With over 35+ years of experience in system and board hardware engineering, Lanner provides high-performance, reliable and cost-effective computing platforms.\nLanner is most renowned for its range of x86 and RISC network appliances as it has for many years been the key hardware provider to some of the largest network security companies in the world. In this field Lanner delivers hardware for everything from basic load balancing and firewall appliances to more demanding VPN, bypass, intrusion detection and UTM systems that require deep packet inspection.\n<br>\n</p>\n<h5>Why Lanner Electronic Inc.?</h5>\n<p>Lanner’s platform allows an integration of satellite-based connections with 5G and other connections to create an enhanced reliable solution.\nThe NCA-6530 is a high-performance 2U rackmount network appliance powered by the Intel® Xeon® Processor Scalable family (codenamed Sapphire Rapids-SP), featuring powerful networking processing capability, higher throughput, advanced hardware-enabled security, and exceptional NIC module expansion. The appliance supports up to 8x NIC slots, max. 1536GB system memory, 6x hot-swappable fans, 1600W/2000W redundant power supply, Intel® QAT, and optional PCIe expansion. The NCS2-M201 expansion NIC module brings pre-certified Wi-Fi 6, LTE/5G wireless connectivity to compatible Lanner network appliances.</p>','\n',char(10)),'https://www.facebook.com/lannerinc/','https://www.twitter.com/LannerInc','https://www.linkedin.com/company/lanner-electronics-inc-/','');
|
||
INSERT INTO vendors VALUES('599409f4-c6f7-42fa-900d-0bdddadf57d1','published','lookingglass-cyber-solutions','LookingGlass Cyber Solutions','www.LookingGlassCyber.com',NULL,'10740 Parkridge Blvd ','Suite 200','Reston','VA','USA','8fe1d3ee-e5ba-45a2-b3b9-1d51190783cd',replace('<h5>LookingGlass Cyber Solutions</h5>\n<p>\n<br>\n</p>','\n',char(10)),NULL,NULL,NULL,'');
|
||
INSERT INTO vendors VALUES('a53d9de4-3c54-4229-b57e-b3ae44de44ae','published','liveaction','LiveAction','http://www.liveaction.com','The LiveAction Network Intelligence platform empowers network and security teams to rapidly resolve network and application performance issues at scale, accelerate threat response, increase employee productivity, and reduce business risk. ','960 San Antonio Rd. ','Suite 200','Palo Alto','CA','USA','8448c7ce-0ab8-4a59-8b21-80d5f80de379',replace('<h5>LiveAction</h5>\n<p>\nFor today’s connected, always-on business demands – where critical systems are always available and secure – the network is the vantage point for the business. But with increasingly complex networks, today’s network security and performance tools have blind spots and struggle to transform network data into actionable insights.\nLiveAction’s Network Intelligence platform transforms complex data into actionable insights, providing organizations with a comprehensive view of the network for performance and security. Empowered teams rapidly take action to resolve network issues at scale, accelerate threat response, increase employee productivity, and reduce business risk. \nLiveAction’s unifies all your flow and packet data to deliver end-to-end visibility, accelerated troubleshooting, and AI-driven network detection and response for on-premises, SD-WAN, cloud, and hybrid networks. Only LiveAction lets you monitor, manage, troubleshoot, and secure your network from a single pane of glass.<br>\n</p>\n<h5>Why LiveAction?</h5>\n<p>LiveAction provides network intelligence for complex networks that drives actionable insights for performance and security. Our vision is realized through three main software solutions – LiveNX network performance management, LiveWire high-speed packet capture, and ThreatEye network detection and response (NDR).\nThreatEye is our AI-driven NDR platform for threat detection and encrypted traffic analysis (ETA). By combining behavioral analysis and streaming machine learning (MLE), ThreatEye restores visibility and security without breaking encryption, analyzing and correlating millions of events per second to create automated SOC-ready alerts based on behaviors. This decreases mean time to detection, response time, and cyber risk.\nThreatEye’s integration with LiveWire provides single-click real-time and historical forensics for security analysts, effectively reducing MTTR and speeding response time to malicious attacks.</p>','\n',char(10)),'https://www.facebook.com/LiveActionIT','https://www.twitter.com/LiveActionIT','https://www.linkedin.com/company/liveaction','');
|
||
INSERT INTO vendors VALUES('507d72ec-bfd5-4964-b9f0-dd6ccec72e04','published','salt-security','Salt Security','https://salt.security','Salt Security protects the APIs that form the core of every modern application. Our patented API Platform is the only API security solution that combines the power of cloud-scale big data and time-tested ML/AI to detect and prevent API attacks. ','3921 Fabian Way ',NULL,'Palo Alto','CA','USA','ee56c873-d7dc-4db5-aabb-112917b2aa01',replace('<h5>Salt Security</h5>\n<p>\nSalt Security protects the APIs that form the core of every modern application. Our patented API Platform is the only API security solution that combines the power of cloud-scale big data and time-tested ML/AI to detect and prevent API attacks. <br>\n</p>','\n',char(10)),'https://www.facebook.com/SaltAPIProtectionInc/','https://www.twitter.com/SaltSecurity','https://www.linkedin.com/company/saltsecurity/mycompany/','');
|
||
INSERT INTO vendors VALUES('54fd90a2-8b77-43ac-96b8-a528dc759a0d','published','sumo-logic','Sumo Logic','www.sumologic.com','Sumo Logic empowers the people who power modern, digital business through its Continuous Intelligence Platform™ to help practitioners and developers deliver reliable and secure cloud-native applications. For more information, visit www.sumologic.com.','305 Main Street','3rd floor','Redwood City','CA','USA','bc307103-da4c-429a-ae75-37e8ee97f801',replace('<h5>Sumo Logic</h5>\n<p>\nNearly every enterprise undergoing digital transformation is building cloud-native applications to deliver new, digital experiences. The Sumo Logic Continuous Intelligence Platform™ provides real-time analytics and insights to help practitioners and developers ensure application reliability, secure and protect against modern threats, and gain insights into their cloud infrastructures. By delivering a SaaS analytics platform for cloud-native application observability and security solutions, Sumo Logic is empowering the people who power modern, digital business so they, in turn, can deliver reliable and secure digital experiences. Visit www.sumologic.com.<br>\n</p>\n<h5>Why Sumo Logic?</h5>\n<p>Facing increasing complexity, a lack of threat visibility, a lack of experienced staff, and high costs—security teams are overwhelmed. Sumo Logic’s Cloud Security Analytics solution provides scalable log collection, real-time threat detection, along with compliance reporting and dashboards. Our cloud-native SaaS platform enables SecOps and DevOps teams to use built-in detection, integrated threat intelligence, correlation, and deep search-based investigation to ensure a strong enterprise security posture.\nFor organizations struggling with alert fatigue, our Cloud SIEM automatically uncovers indicators of early stage threats arising from expanded attack surfaces and insider threats and generates actionable insights security analysts can quickly investigate.\nSumo Logic Cloud SOAR boosts collaboration for SOC teams, using orchestration capabilities to automate a wide array of time-consuming tasks while increasing efficiencies during each phase of the incident response process.\n</p>','\n',char(10)),'https://www.facebook.com/Sumo.Logic','https://www.twitter.com/sumologic','https://www.linkedin.com/company/sumo-logic','');
|
||
INSERT INTO vendors VALUES('a93d7f1d-3e99-40fd-afa7-14d9f7614806','published','lumen','Lumen','www.lumen.com','Lumen is dedicated to furthering human progress through technology, providing the fastest, most secure platform for applications and data to help businesses, government and communities deliver amazing experiences around the world.','1025 El Dorado Blvd.',NULL,'Broomfield','CO','USA','0641b198-0e5c-431a-ba08-3d29afc14818',replace('<h5>Lumen</h5>\n<p>\nLumen is an American multinational technology company headquartered in Monroe, Louisiana dedicated to furthering human progress through technology, providing the fastest, most secure platform for applications and data to help businesses, government and communities adopt emerging technologies and deliver amazing experiences around the world.\nLumen is guided by the belief that humanity is at its best when technology advances the ways we live and work. The company leverages a vast collection of talent, experience, assets, and capabilities to address the dynamic data and application needs of the 4th Industrial Revolution.<br>\n</p>\n<h5>Why Lumen?</h5>\n<p>Communications: Contact Center & UCC, 911 Services, VoIP\nEdge Computing\nHybrid IT & Cloud: Data Analytics, Data Centers, Cloud Application Manager, Backup Storage\nManaged & IT Services\nNetworking\nSecurity: Black Lotus Labs, Cybersecurity, Analytics and Threat Management, DDoS, Edge Protect</p>','\n',char(10)),'https://www.facebook.com/LumenTechnologies/','https://www.twitter.com/lumentechco','https://www.facebook.com/LumenTechnologies/','');
|
||
INSERT INTO vendors VALUES('5dfda775-9501-4bc4-af67-806eeaae4984','published','lepide','Lepide','https://www.lepide.com/','Lepide is a global provider of data security solutions. We help thousands of organizations, large and small, protect their sensitive data, reduce their threat surface, and meet compliance through our award-winning Lepide Data Security Platform.','600 Congress Avenue',NULL,'Austin','TX','USA','52d566b6-edd6-4264-a75a-242e6eb9ee03',replace('<h5>Lepide</h5>\n<p>\nLepide is a leading company in the field of data security and analytics, taking a unique approach compared to traditional cybersecurity firms. Their focus is on safeguarding enterprise data, including sensitive documents and emails, confidential customer and employee information, financial records, strategic plans, and other proprietary assets. The Lepide Data Security Platform detects potential security threats by analyzing data, user activity, and behavior, both from internal and external sources. It also helps to prevent and mitigate data breaches by securing sensitive information through governance and spotting anomalies with automation and machine learning. Additionally, Lepide''s products offer solutions for data protection, governance, zero trust, compliance, data privacy, classification, and threat detection and response.<br>\n</p>\n<h5>Why Lepide?</h5>\n<p>The majority of security threats originate with Active Directory, and nearly always involve the compromise of sensitive, unstructured data. However, many organizations struggle to find solutions that protect sensitive data and critical infrastructure through the entire attack path. This often leads to siloed solutions and a lack of true visibility.\nWith the Lepide Data Security Platform, you can protect sensitive data and detect threats across Active Directory, Microsoft 365, File Server, and more. All from a single scalable, powerful, and simple solution.\nUsing Lepide, companies can find out where their most sensitive data is, see which users have access to it, see what their users are doing with it, and spot any changes taking place to the surrounding systems. All this in one Platform helps companies to reduce their risk surface area, detect and react to threats in real-time, and achieve compliance with industry regulations. </p>','\n',char(10)),'https://www.facebook.com/Lepide/','https://www.twitter.com/lepideSW','https://www.linkedin.com/company/2630106/','');
|
||
INSERT INTO vendors VALUES('1705016d-fd06-46fb-8af0-5db266e27149','published','logrhythm','LogRhythm','www.logrhythm.com','Security made easy: LogRhythm empowers security teams with the most intuitive experience and contextual analytics into cybersecurity threats so they can reduce noise, prioritize work and quickly secure their environment.','385 Interlocken Crescent Suite 1050',NULL,'Broomfield','CO','USA','12a0c626-70c6-410c-ad5d-73923c62253f',replace('<h5>LogRhythm</h5>\n<p>\nLogRhythm helps busy and lean security operations teams save the day — day after day. There’s a lot riding on the shoulders of security professionals — the reputation and success of their company, the safety of citizens and organizations across the globe, the security of critical resources — the weight of protecting the world.\nLogRhythm helps lighten this load. The company is on the frontlines defending against many of the world’s most significant cyberattacks and empowers security teams to navigate an ever-changing threat landscape with confidence. As allies in the fight, LogRhythm combines a comprehensive and flexible security operations platform, technology partnerships, and advisory services to help SOC teams close the gaps. Together, LogRhythm and our customers are ready to defend. Learn more at logrhythm.com. <br>\n</p>','\n',char(10)),'https://www.facebook.com/LogRhythmInc','https://www.twitter.com/LogRhythm','https://www.linkedin.com/company/logrhythm/','');
|
||
INSERT INTO vendors VALUES('f6767fd6-cc77-43dd-8397-574a2cb8de7f','published','sands-lab','SANDS Lab','https://www.sandslab.io/','For actively responding against cyber security threats, SANDSLab has been putting its best efforts to generate so called “Hyper-Intelligence” and to develop related various base technologies along with AI, big data and cloud technology.','Floor 4, Chosun-Newha Building','Seolleungno 577','Gangnam-gu, Seoul',NULL,'KOR','6a20feae-4472-4023-9bc2-ff211552fc35',replace('<h5>SANDS Lab</h5>\n<p>\nSANDS Lab provides the unprecedented intelligence service through\na mutual organic ecosystem of Cyber Security, AI, Network and Data.\nFor actively responding against cyber security threats, SANDS Lab has been putting its\nbest efforts to generate so called “Hyper-Intelligence” and to develop related various base\ntechnologies along with AI, big data and cloud technology.<br>\n</p>','\n',char(10)),'https://www.facebook.com/malwarescom',NULL,'https://www.linkedin.com/in/k-secu/','');
|
||
INSERT INTO vendors VALUES('0f8cbdbc-56b2-4591-ba50-a8287913c0c5','published','legit-security','Legit Security','www.legitsecurity.com','Legit Security''s platform protects an organization''s software supply chain from attack and ensures secure application delivery, governance and risk management from code to cloud.','2345 Yale St. ','1st Floor','Palo Alto','CA','USA','d82221a4-e306-4359-acd3-a0d191b5a29b',replace('<h5>Legit Security</h5>\n<p>\nLegit Security protects an organization''s software supply chain from attack and ensures secure application delivery, governance and risk management from code to cloud. The platform’s unified application security control plane and automated SDLC discovery and analysis capabilities provide visibility and security control over rapidly changing environments, and allow security issues to be prioritized based on context and business criticality to improve security team efficiency and effectiveness.<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/LegitSecurity1 ','https://www.linkedin.com/company/legitsecurity','');
|
||
INSERT INTO vendors VALUES('28dff223-9741-42a6-8170-3d82b72966c3','published','simeon-cloud','Simeon Cloud','www.simeoncloud.com','Simeon Cloud helps IT teams manage their M365 configurations by providing a purpose-built Configuration as Code platform for Microsoft 365. The platform offers baseline management, lifecycle & change management, drift detection, as well as backups.','2570 N. First Street ','2nd Floor','San Jose','CA','USA','289d2def-2f47-4491-a541-0247f09495b1',replace('<h5>Simeon Cloud</h5>\n<p>\nSimeon Cloud provides enterprise IT teams and managed service providers with the only configuration as code platform purpose-built for Microsoft 365. Backup and restore configurations, establish a baseline or golden tenant for compliance management, implement proper change controls and life cycle management. <br>\n</p>\n<h5>Why Simeon Cloud?</h5>\n<p>Simeon Cloud helps companies:\nBackup and Restore M365 configurations\nEstablish a Baseline or Golden Tenant to ensure compliance adherence, best-practices and monitor drift\nImplement proper change controls, audit history, logging\nEstablish true life cycle management processes with Dev,Test,Prod syncronization</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/simeon-cloud/mycompany/','');
|
||
INSERT INTO vendors VALUES('e96fd72f-e0e3-43b9-9821-139b25299f0d','published','intelligent-ciso','Intelligent CISO','https://www.intelligentciso.com/','Intelligent CISO is a technology brand that encompasses various intelligence platforms aimed at the enterprise sector looking for updates and research driven data about cybersecurity. As part of Lynchpin Media, this digital medium gives unparalleled advice to the EMEA, APAC and North America cybersecurity communities. Spreading our resources across print, digital and events, Intelligent CISO endeavours to guide CISOs within the EMEA, APAC, North America and Latin America regions with thought leadership, industry expertise, knowledge sharing and practical platforms from which to better understand the views of the cybersecurity industry, encompassing the voice of vendors, distributors, resellers and the all-important end-user. With social media supporting all the above, our content is delivered across all platforms and enables industry professionals to discover and read this on their preferred device.','63-66 Hatton Garden',NULL,'London ',NULL,'GBR','40320c5f-d438-4a4d-97c9-ba1b067184f9',replace('<h5>Intelligent CISO</h5>\n<p>\nIntelligent CISO is a technology brand that encompasses various intelligence platforms aimed at the enterprise sector looking for updates and research driven data about cybersecurity. As part of Lynchpin Media, this digital medium gives unparalleled advice to the EMEA, APAC and North America cybersecurity communities.\nSpreading our resources across print, digital and events, Intelligent CISO endeavours to guide CISOs within the EMEA, APAC, North America and Latin America regions with thought leadership, industry expertise, knowledge sharing and practical platforms from which to better understand the views of the cybersecurity industry, encompassing the voice of vendors, distributors, resellers and the all-important end-user. With social media supporting all the above, our content is delivered across all platforms and enables industry professionals to discover and read this on their preferred device.\n<br>\n</p>\n<h5>Why Intelligent CISO?</h5>\n<p>Intelligent CISO provides security officers with the latest information and intelligence to help them make important, informed decisions. Our integrated platforms enable the industry to receive the content they need. It is our unparalleled understanding of this audience which enables us to deliver effective campaigns aimed at ensuring maximum return on investment combined with sustained brand awareness across our digital platforms. Strategic partnerships with regional industry bodies, events and research companies enable us to both manage and grow the audience.\nIntelligent CISO can tailor a partnership to suit your own requirements. This can be across multiple regions, different technology focuses or just a chance to align with a new corporate message. Being a young, nimble, digital company allows us to work closely with partners in developing strategic campaigns bespoke to their needs.\nServices Include:\nLead Generation\nBespoke Surveys\nBrand Awareness\nThought Leadership</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/showcase/intelligent-ciso/','');
|
||
INSERT INTO vendors VALUES('ff90b75c-ad34-4036-96f2-f466e3af6e0f','published','sepio','Sepio','https://sepiocyber.com/','Sepio is the leading asset risk management platform that operates on asset existence rather than activity. Within 24 hours, Sepio''s solution will report what assets you actually have and help enhance your cybersecurity posture. ','1 Research Court','Suite 160','Rockville','MD','USA','962d648f-858f-4cc0-bbee-eff6aaf4957f',replace('<h5>Sepio</h5>\n<p>\nSepio has created the first asset risk management platform that operates on asset existence rather than activity. Using physical layer asset DNA profiling, our solution provides customers with actionable visibility, policy enforcement and mitigation capabilities. These allow our customers to gain better control of all assets at scale. With trafficless monitoring, our solution is asset agnostic - whether your infrastructure is connected to IT/OT/IOT. Within 24 hours, Sepio''s solution will report what assets you actually have with their respective asset risk factor and help you achieve a stronger cybersecurity posture.<br>\n</p>\n<h5>Why Sepio?</h5>\n<p>Sepio’s Asset Risk Management platform sees, assesses, and mitigates all known and shadow assets as fast as they are added by anyone, anywhere. Sepio’s patented technology gets to the true source of asset risk without monitoring any traffic, providing you and the security tools you’ve invested in with a new dimension of asset visibility that simply wasn’t possible before.</p>','\n',char(10)),'https://www.facebook.com/cybersepio','https://www.twitter.com/sepiosys','https://www.linkedin.com/company/sepiocyber/','');
|
||
INSERT INTO vendors VALUES('0a030489-d2b7-41fd-a486-5ae84866745f','published','safebreach','SafeBreach','www.safebreach.com','SafeBreach provides you with visibility across siloed security solutions to reveal your actual risk and promote cross-functional mitigation efficiency.','111 W. Evelyn Avenue ','Suite #117','Sunnyvale','CA','USA','5e0e45a2-71d0-4fe0-aade-15b7f4ccc45d',replace('<h5>SafeBreach</h5>\n<p>\nCombining the mindset of a CISO and the toolset of a Hacker, SafeBreach is the pioneer in breach and attack simulation (BAS) and is the most widely used continuous security control validation platform. SafeBreach continuously executes attacks, correlates results to help visualize security gaps, and leverages contextual insights to highlight remediation efforts. With its Hacker’s Playbook™, the industry’s most extensive collection of attack data enabled by real threat intelligence research, SafeBreach empowers organizations to get proactive about security with a simple approach that replaces hope with data. <br>\n</p>\n<h5>Why SafeBreach?</h5>\n<p>The SafeBreach breach and attack simulation (BAS) platform enables your team to assess the efficacy of its security ecosystem, by safely executing breach scenarios across the entire cyber kill chain to determine where security is working as expected and where attacks will break through current defense configurations. This helps proactively identify security risks and make informed decisions to best protect the business. SafeBreach empowers teams to continuously validate and optimize the efficacy of cloud and on-prem security controls, test security posture against emerging and known threats, discover and mitigate critical gaps before adversaries, improve overall SOC efficacy by testing current detection capabilities and incident response playbooks, and more. </p>','\n',char(10)),NULL,'https://www.twitter.com/safebreach','https://www.linkedin.com/company/safebreach/','');
|
||
INSERT INTO vendors VALUES('5e991e2b-05ff-419a-9fdb-f85f16dd9b68','published','sgs-north-america','SGS North America','www.sgs.com','Information is your most important and valuable asset. As the world’s leading testing, inspection and certification company, SGS has the global network you need to help you protect your information and provide assurance to your stakeholders.','201 Route 17 North',NULL,'Rutherford','NJ','USA','1f9b9f14-8eb8-4836-9ce7-1f58ae4d9ec9',replace('<h5>SGS North America</h5>\n<p>\nDo you have concerns about your information security systems? Would you like to be able to take a proactive approach to data management – closing the gaps and allowing you to think beyond incident management? SGS offers solutions that improve your efficiency, while guiding you towards compliance with internationally-recognized statutory regulations.\nOur services cover a wide range of certification schemes aimed at data processing and protection, cloud storage, facility security, lottery security and supporting your response to business-critical events. Whether you want to understand your own information systems better, or to take a long-term critical look at security, we add value to your business.\nInvesting in a partnership with SGS allows you time when you can afford it: an in-depth rethink of your systems before resources are wasted on incident-led events. As a world-leading preferred testing, inspection and certification partner, we give you the best and most trusted expertise.<br>\n</p>\n<h5>Why SGS North America?</h5>\n<p>As a truly global player, we have over 97,000 employees and 2,650 offices in nearly all countries and experience in virtually any industry. We can help customers of any size, complexity and industry to demonstrate their ISMS’ effectiveness by having it assessed by our experienced audit team and, after successful completion, presenting an SGS ISO/IEC 27001 certificate.</p>','\n',char(10)),'https://www.facebook.com/SGS/','https://www.twitter.com/SGS_SA','https://www.linkedin.com/company/sgs','');
|
||
INSERT INTO vendors VALUES('31d1bb08-411b-4dcc-97c7-8900713191c0','published','s3m-security','S3M Security','www.s3msecurity.com','S3M Security brings advanced network and information security products offering pioneering solutions from London based office and our centers across US, Europe and EMEA regions.','4 Edgecot Grove, N15 5HD ',NULL,'London',NULL,'GBR','7510d4fc-220b-4818-b061-c290620ec2cd',replace('<h5>S3M Security</h5>\n<p>\nS3M Security brings advanced network and information security products offering pioneering solutions from London based office and our centers across US, Europe and EMEA regions.\nS3M Security came up with a new NAC concept. It''s a multidimensional and multi-layer modular network access control solution developed by tech experts in the field. This NAC product also brings a new approach to cybersecurity, like Hybrid NAC. Hybrid NAC technology is designed to allow agent and agentless NAC architectures to work together, to maximize the advantages of these two architectures and to minimize their disadvantages.\nMoreover, S3M Security is honored to have introduced the MSSP NAC to the world of cyber security. EdgeBoX, is a cyber security solution designed to be used in Managed Security Service Provider (MSSP) activities in organizations with distributed branch infrastructure or centrally managed multi-domain infrastructure and authorizations. <br>\n</p>\n<h5>Why S3M Security?</h5>\n<p>As if it wasn''t enough to have all the features of the best NAC products on the market, we also offer a Network Access Control solution designed to eliminate the missing or unfriendly aspects of these solutions. S3M Security presents the latest technology NAC to your liking with full visibility, security of guest and BYOD devices, interoperability of agent and agentless architecture, radius based identification technology working with "Authentication, Authorization, Accounting" logic.\nAlso, we came up with the new "MSSP NAC" concept named EdgeBoX. The EdgeBoX solution is a NAC virtual appliance technology managed by the EdgeBoX Console, which stores corporate data at the edge and enables all services to operate at the endpoints. It provides the console connection with its own VPN infrastructure. It ensures end-to-end information security while has the easiest configuration, thanks to low hardware resources and the ability to store configuration settings both in itself and in the cloud.</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/s3m-security/','');
|
||
INSERT INTO vendors VALUES('175437d4-83f0-4d15-b3b9-341b7d423554','published','software-engineering-institute-at-carnegie-mellon-university','Software Engineering Institute at Carnegie Mellon University','www.sei.cmu.edu','The Carnegie Mellon University Software Engineering Institute, a Federally Funded Research and Development Center, conducts evidence-based research, introducing private-sector innovations into government to ensure a more secure tomorrow.','4500 5th Ave.',NULL,'Pittsburgh','PA','USA','164f59d8-de1f-40d4-b740-cf448209ca86',replace('<h5>Software Engineering Institute at Carnegie Mellon University</h5>\n<p>\nThe CERT Division of the Carnegie Mellon University Software Engineering Institute (CMU SEI) is the birthplace of cybersecurity, strengthening the resilience of systems and networks.\nSince 1984, CMU SEI has been critical to the government’s ability to acquire, develop, operate, and sustain software systems that are innovative, affordable, trustworthy, and enduring. We research complex software engineering, cyber operations, and artificial intelligence engineering solutions; create and pilot innovative technologies; and transition maturing solutions into practice. Although we are a FFRDC, we also make things that our partners in government, academia, and the private sector can use—prototypes, tools, methods, curricula, and more.\nWe are part of CMU, pioneering discoveries that enrich the lives of people on a global scale. We turn disruptive ideas into successes through leading-edge research.<br>\n</p>\n<h5>Why Software Engineering Institute at Carnegie Mellon University?</h5>\n<p>The Carnegie Mellon University Software Engineering Institute (CMU SEI) is a leader in researching complex solutions, connecting AI, cyber, and software strategies for maximum impact.\nSince 1984, CMU SEI has been one of only 10 Federally Funded Research and Development Centers (FFRDCs) that engineers AI systems for mission-practical capabilities, ensures U.S. cyber dominance and resilience, and deploys software innovations with confidence.\nOur products are knowledge-based – knowledge we create and capture, apply to your real-world problems, and distribute to the community.\nBy using our tools, technologies, and practices, your organization can benefit from AI that is reliable, responsible, fair, and transparent; cyber that is secure; and software that is predictable.\nCMU SEI brings innovation to the U.S. government, industry, and academia.\nLearn about our discoveries at sei.cmu.edu or by visiting our booth 1643 at RSA Conference 2023!\n</p>','\n',char(10)),'https://www.facebook.com/SEICMU','https://www.twitter.com/seinews','https://www.linkedin.com/company/software-engineering-institute','');
|
||
INSERT INTO vendors VALUES('47656855-f4de-49c0-8d83-d5ccfe2c2546','published','sysdig','Sysdig','www.sysdig.com','Sysdig is driving the standard for cloud and container security. With Sysdig, teams prioritize software vulnerabilities, detect and respond to threats, and manage configurations, permissions and compliance.','135 Main Street ','21st Floor','San Francisco','CA','USA','af2c9d7d-8c1b-4e54-b6c4-747e1f3ae9ef',replace('<h5>Sysdig</h5>\n<p>\nSysdig delivers cloud and container security so you can stop attacks with no wasted time. The company created open-source Falco, the standard for cloud-native threat detection. Using Falco, the platform provides real-time threat detection with the detail to respond immediately. With Sysdig, you can prioritize vulnerabilities, trim excess permissions, and fix misconfigurations based on in-use risk exposure. Manage cloud costs and rapidly troubleshoot issues. The largest and most innovative companies worldwide rely on Sysdig for cloud and container security.<br>\n</p>\n<h5>Why Sysdig?</h5>\n<p>As our customers move to the cloud, we help them stop attacks with no wasted time. Here’s what makes us different:\n1) To address the mountain of vulnerabilities and alerts, we use our unique visibility into what is in use to help them prioritize the risks that matter most\n2) Based on Falco, our platform was designed to detect threats in real-time in cloud-native environments.\n3) Finally, by understanding the entire source to runtime flow, we help you fix fast with guided remediation and context enrichment.\n</p>','\n',char(10)),'https://www.facebook.com/Sysdig415/','https://www.twitter.com/sysdig','https://www.linkedin.com/company/sysdig/','');
|
||
INSERT INTO vendors VALUES('d3aa812d-3fc3-416e-90a7-5da801303907','published','senseon','SenseOn','www.senseon.io','SenseOn improves cyber team productivity with more effective and faster investigations, and reduces costs for its clients by consolidating point solutions and deploying 15x faster than legacy security architectures.','8 St James''s Square',NULL,'London',NULL,'GBR','9191788e-c863-4adc-aa96-3215f4b711f1',replace('<h5>SenseOn</h5>\n<p>\nFounded in 2017 by David Atkinson, the first cyber specialist in the United Kingdom’s specialist military units, SenseOn brings together cyber security experts, former government cyber operatives and applied machine learning specialists. SenseOn was named the “Cybersecurity Innovation of 2019” by the Institute of Engineering and Technology (IET) and a World Economic Forum (WEF) Technology Pioneer in June 2021. SenseOn improves cyber team productivity with more effective and faster investigations, and it also reduces costs for its clients by consolidating point solutions and deploying 15x faster than legacy security architectures. Its unified platform proactively detects and shuts down threats including ransomware and malicious insiders, solving critical security challenges in a rapidly evolving IT landscape. It’s also uniquely suited to hybrid and remote work settings as it can be rapidly deployed across any endpoint or network inside and outside the traditional perimeter. <br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/senseontech?lang=en','https://www.linkedin.com/company/senseon-tech/mycompany/?viewAsMember=true','');
|
||
INSERT INTO vendors VALUES('b187f9e9-0c3a-403b-8964-e97b6d9e7b78','published','solarwinds','SolarWinds','www.solarwinds.com','SolarWinds is a leading provider of simple, powerful, and secure IT management software. Our solutions provide organizations worldwide with a comprehensive and unified view of today’s distributed and hybrid IT environments.','7171 Southwest Parkway ','Bldg 400','Austin','TX','USA','38ac352f-92e0-495e-9ad7-2035ecded708',replace('<h5>SolarWinds</h5>\n<p>\nSolarWinds (NYSE:SWI) is a leading provider of simple, powerful, and secure IT management software. Our solutions give organizations worldwide the power to accelerate business transformation in today’s hybrid IT environments. We continuously engage with technology professionals—IT service and operations professionals, DevOps and SecOps professionals, and Database Administrators (DBAs) – to understand the challenges they face in maintaining high-performing and highly available IT infrastructures, applications, and environments. Our focus on the user and commitment to excellence in end-to-end hybrid IT management has established SolarWinds as a worldwide leader in solutions for observability, IT service management, application performance, and database management.<br>\n</p>\n<h5>Why SolarWinds?</h5>\n<p>Why SolarWinds?\nSolarWinds offers a holistic approach to security for your hybrid enterprise environment. Our AIOps-powered platform observes your users, networks, infrastructure, apps, and services so you can reduce your attack surface, manage access, detect and mitigate anomalies, and ensure compliance. We’re ready to keep you secure with simple, sophisticated, scalable SolarWinds Hybrid Cloud Observability—created for users and built for business agility.\n</p>','\n',char(10)),'https://www.facebook.com/SolarWinds/','https://www.twitter.com/solarwinds','https://www.linkedin.com/company/solarwinds','');
|
||
INSERT INTO vendors VALUES('37eab928-6e72-48bf-99da-9c8407c87bc6','published','sectigo','Sectigo','sectigo.com','Sectigo is the leading provider of digital certificates and automated Certificate Lifecycle Management (CLM) solutions. Its cloud-based universal CLM platform issues and manages the lifecycles of digital certificates to secure every human and machine identity across the enterprise. Sectigo''s 700,000 customers include 36% of the Fortune 1000. Visit www.sectigo.com.','5 Becker Farm Road ','Ste 300','Roseland','NJ','USA','da3e4736-cd7a-4ef5-981e-e1be73830dde',replace('<h5>Sectigo</h5>\n<p>\nSectigo is the leading provider of digital certificates and automated Certificate Lifecycle Management (CLM) solutions trusted by the world’s largest brands. Its cloud-based universal CLM platform issues and manages the lifecycles of digital certificates issued by Sectigo and other Certificate Authorities (CAs) to secure every human and machine identity across the enterprise.\nWith over 20 years of experience establishing digital trust, Sectigo is one of the longest-standing and largest CAs with more than 700,000 customers, including 36% of the Fortune 1000.\nFor more information, visit www.sectigo.com.<br>\n</p>\n<h5>Why Sectigo?</h5>\n<p>Sectigo Certificate Manager (SCM) is an industry leading, CA agnostic platform, purpose-built to issue and manage the lifecycles of all public and private digital certificates through a single pane of glass. SCM authenticates and secures every human and machine identity across the enterprise.\nCustomers can automate the issuance and management of Sectigo digital certificates, alongside digital certificates originating from other public Certificate Authorities (CAs) as well as private CAs such as Microsoft Active Directory Certificate Services (ADCS), AWS Cloud Services and Google Cloud Platform (GCP).\nWith over 20 years of experience establishing digital trust, Sectigo is one of the longest-standing and largest CAs. For more information, visit www.sectigo.com.</p>','\n',char(10)),NULL,'https://www.twitter.com/SectigoHQ','https://www.linkedin.com/company/sectigo/','');
|
||
INSERT INTO vendors VALUES('bd34ade0-c0fd-4be4-9fc0-fbcff4414c8c','published','hoxhunt','Hoxhunt','https://www.hoxhunt.com/','Hoxhunt helps security leaders and employees join forces to prevent data breaches. Combining AI and behavioral science, their Human Risk Management Platform drives behavior change that auto-enhances protect-detect-respond capabilities to lower risk. ','7760 France Avenue South','Suite 1146','Minneapolis','MN','USA','aff602b4-42a1-4095-bbf0-71b539ba5c35',replace('<h5>Hoxhunt</h5>\n<p>\nHoxhunt helps security leaders and employees join forces to prevent data breaches. Hoxhunt is a Human Risk Management platform that goes beyond security awareness to drive behavior change and measurably lower risk. Data breaches start with people, so Hoxhunt does too. It combines AI and behavioral science to create individualized micro-training experiences people love. Employees learn to detect and report advanced phishing attacks. Operations teams respond fast with limited resources. And security leaders gain outcome-driven metrics to document reduced cybersecurity risk. <br>\n</p>\n<h5>Why Hoxhunt?</h5>\n<p>Hoxhunt helps security leaders and employees join forces to prevent data breaches. Hoxhunt is a Human Risk Management platform that goes beyond security awareness to drive behavior change and measurably lower risk. Data breaches start with people, so Hoxhunt does too. It combines AI and behavioral science to create individualized micro-training experiences people love. Employees learn to detect and report advanced phishing attacks. Operations teams respond fast with limited resources. And security leaders gain outcome-driven metrics to document reduced cybersecurity risk. </p>','\n',char(10)),'https://www.facebook.com/hoxhunt/','https://www.twitter.com/hoxhunt','https://www.linkedin.com/company/hoxhunt/','');
|
||
INSERT INTO vendors VALUES('669e0f16-6617-4252-ba80-4002df4d7335','published','spin-ai','Spin.AI','www.spin.ai',replace(' SpinOne, the all-in-one SaaS data protection platform for your mission-critical SaaS Apps, provides an extra protection layer of security across multiple environments, including Google Workspace, Microsoft Office 365, Salesforce and Slack.\n','\n',char(10)),'2100 Geng Road ','#210','Palo Alto','CA','USA','258d1bc6-7dce-4f6f-8b95-948102a12b34',replace('<h5>Spin.AI</h5>\n<p>\nSpin Technology is a SaaS data protection company protecting enterprises against SaaS ransomware, risky apps, human error, and insider threats.\nSpinOne, the all-in-one SaaS data protection platform for your mission-critical SaaS Apps, provides an extra protection layer of security across multiple environments including Google Workspace, Microsoft 365, Salesforce and Slack. SpinOne is the ultimate SaaS data protection platform that delivers the most innovative last line of cyber defense, SaaS security posture management, and protection for more than 1,500 organizations worldwide to reduce downtime, recovery costs, improve compliance and save a tremendous amount of time for the SecOps teams. For more information, please visit: https://www.spin.ai/\n<br>\n</p>\n<h5>Why Spin.AI?</h5>\n<p>SpinOne is an all-in-one SaaS security platform that protects SaaS data for mission critical apps so that enterprises can mitigate risk, save time, reduce downtime, and improve compliance.\nSpinOne protects SaaS data for mission critical apps – Google Workspace, Microsoft 365, Salesforce, and Slack– by reducing the risk of ransomware, shadow IT, data leak and loss, and non-compliance. It helps IT security and operations teams to proactively identify and protect integrations, detect and respond to anomalies, and recover sensitive data.\nUnlike point products, the all-in-one SaaS security platform from Spin is the only one that provides a layered defense to protect SaaS data, including SaaS security posture management (SSPM), SaaS data leak and loss prevention (DLP), and SaaS ransomware detection and response. Enterprises use these solutions to mitigate risk, save time, reduce downtime, and improve compliance.</p>','\n',char(10)),'https://www.facebook.com/spintechinc','https://www.twitter.com/spintechinc','https://www.linkedin.com/company/spintechinc','');
|
||
INSERT INTO vendors VALUES('26f9ff65-4cc0-4662-8d9b-24c67ab6193a','published','spyderbat','Spyderbat','www.spyderbat.com','Gain runtime superpowers from Spyderbat to ensure resilience across your Software Development Lifecycle (SDLC) in Linux VMs and Kubernetes clusters. Achieve the ability to time travel, stop application drift, and surgically extract attackers!','7301 Ranch Rd 620 N ','Suite 155','Austin','TX','USA','ca1c3955-7ce3-4d83-afc3-f0d4659b33dc',replace('<h5>Spyderbat</h5>\n<p>\nGain runtime superpowers from Spyderbat to ensure resilience across your Software Development Lifecycle (SDLC) in Linux VMs and Kubernetes clusters using eBPF.\nAchieve the ultimate superpower - time travel, revealing the step-by-step sequence of activities within and across your containers at the earliest warning signs of trouble.\nStop application drift and accelerate your releases by continuously comparing running applications against prior versions, all with the insight to take instant action.\nDetect. Dissect. Destroy attackers’ attempts, surgically extracting them just as their activities begin to unfold.\nThrough Spyderbat’s supported integrations, automated actions, and documented APIs, weave Spyderbat’s workload behavior monitoring and blocking into your existing build practices and notification channels.\nSee it for yourself! Visit Spyderbat.com to try out our previously captured scenarios or create your own on your own systems.<br>\n</p>\n<h5>Why Spyderbat?</h5>\n<p>The Spyderbat Platform secures and hardens cloud native runtime environments throughout the Software Development Lifecycle (SDLC) in Linux VMs and Kubernetes clusters.\nUsing eBPF, Spyderbat arms platform engineering, site reliability, and security teams with three core capabilities:\nSpyderbat Flashforward(™) provides complete realtime and historical visibility to runtime activities by revealing their step-by-step sequences within and across containers.\nSpyderbat Guardian(™) stops application drift and misconfiguration by continuously comparing running applications against prior versions.\nSpyderbat Interceptor(™) recognizes intrusions with high accuracy and precision.\nSpyderbat deploys effortlessly into cloud native and Kubernetes environments, using eBPF to collect data from Linux nodes using eBPF with negligible resource load. Users see value within minutes of deployment. Spyderbat offers a free tier for up to 5 nodes.</p>','\n',char(10)),'https://www.facebook.com/Spyderbatinc','https://www.twitter.com/SpyderbatInc','https://www.linkedin.com/company/spyderbat/','');
|
||
INSERT INTO vendors VALUES('56df3791-be8b-485e-8474-bc7244a6625c','published','qwiet-ai','Qwiet.ai','https://qwiet.ai/','Qwiet AI is the first AppSec platform to utilize AI and ML to provide highly accurate and relevant findings that enable our customers to spend less time chasing false positives and more time focusing on fixing the vulnerabilities that truly matter.','2033 Gateway Place','Ste. 500','San Jose ','CA','USA','177bf6dd-1b3e-4ae7-9a5a-31461d45f5d7',replace('<h5>Qwiet.ai </h5>\n<p>\nQwiet AI is the first AppSec platform to utilize AI and ML to provide highly accurate and relevant findings that enable our customers to spend less time chasing false positives and more time focusing on fixing the vulnerabilities that truly matter.<br>\n</p>\n<h5>Why Qwiet.ai ?</h5>\n<p>Qwiet AI''s preZero platform leverages AI to enhance security in software development without increasing production time or tech debt. The platform focuses on 4 key principles: accuracy, reachability, context, and speed. It uses a patented Code Property Graph (CPG) to map the internal functions and data flows of an application so it can identify vulnerabilities and whether or not those vulnerabilities can be reached by attackers. The preZero platform allows developers to "Qwiet" the noise and focus on the issues that are truly important, allowing them to focus on what''s important: getting quality, secure code out the door. (edited) </p>','\n',char(10)),NULL,'https://www.twitter.com/shiftleftinc','https://www.linkedin.com/company/shiftleft','');
|
||
INSERT INTO vendors VALUES('e448ad58-41c3-4cce-b8a7-a36aa1705c33','published','securityscorecard','SecurityScorecard','www.securityscorecard.com','SecurityScorecard is an information security company that rates cybersecurity postures of corporate entities through completing scored analysis of cyber threat intelligence signals for the purposes of third party management and IT risk management.','Tower 49, 12E 49th St.','Suite 15-001','New York','NY','USA','b0f9412d-8f02-40f7-aad1-132c5ffd914c',replace('<h5>SecurityScorecard</h5>\n<p>\nSecurityScorecard is the global leader in cybersecurity ratings and the only service with millions of organizations continuously rated. Thousands of organizations leverage our patented rating technology for self-monitoring, third-party risk management, board reporting, and cyber insurance underwriting. But we don’t stop there. Through a customer-centric, solution-based commitment to our partners, we are transforming the digital landscape building a path toward resilience.<br>\n</p>\n<h5>Why SecurityScorecard?</h5>\n<p>Stopping sophisticated cyberattacks requires visibility beyond your organization. Security teams need a complete understanding of their attack surface and business ecosystem risk—including partners, contractors, third- and fourth-party vendors, and supply chain. As the industry leader in security ratings, SecurityScorecard uniquely provides actionable insights for over 12 million organizations so you can quantify trustworthiness, quickly respond to cyber-risks, and strengthen cyber defenses.</p>','\n',char(10)),'https://www.facebook.com/SecScorecard/','https://www.twitter.com/security_score','https://www.linkedin.com/company/security-scorecard/mycompany/verification/','');
|
||
INSERT INTO vendors VALUES('db1961c6-28d8-41a2-b39c-c871de5fe578','published','panther','Panther','www.panther.com','Panther is a solution for security practitioners who face challenges of security operations at scale. Panther is a threat detection and response platform powered by a highly scalable security data lake and detection-as-code.','38 Bluxome Street',NULL,'San Francisco','CA','USA','f559fa21-63f0-4708-8316-696618e2c876',replace('<h5>Panther</h5>\n<p>\nPanther Labs was founded by a team of veteran security practitioners who faced the challenges of security operations at scale and set out to build a platform to solve them. The result was Panther, a refreshingly practical platform for threat detection and response powered by a highly scalable security data lake and detection-as-code. Panther gives security teams the power to detect any breach, anywhere and is trusted by customers like Snowflake, Dropbox, Zapier, and more. Learn more: https://panther.com/ <br>\n</p>\n<h5>Why Panther?</h5>\n<p>- Powerful, flexible detections using Python\n- Lightning-fast queries on any size data set\n- Cost-effective storage of normalized logs\n- Zero ops overhead with serverless architecture\n</p>','\n',char(10)),NULL,'https://www.twitter.com/runpanther','https://www.linkedin.com/company/panther-labs','');
|
||
INSERT INTO vendors VALUES('a7d2485e-a3a8-4eac-a014-b828961daf60','published','silobreaker','Silobreaker','www.silobreaker.com','Silobreaker enables organisations to make confident intelligence-led decisions that reduce risk, by providing insights no other solution can match, at unprecedented speed.','Holden House 4th Floor ','57 Rathbone Place','London',NULL,'GBR','b1c09c27-6690-4726-a638-03d484e669bb',replace('<h5>Silobreaker</h5>\n<p>\nSilobreaker enables organisations to make confident intelligence-led decisions that reduce risk, by providing insights no other solution can match, at unprecedented speed. Aggregating a vast, unique collection of data from millions of open and dark web sources, we unlock relevant intelligence with context, across cyber, physical and geopolitics. This allows analysts to identify undetected threats and incidents early and deliver real-time reports at one-click, so decision-makers can make accurate decisions to mitigate risks. Learn more at www.silobreaker.com<br>\n</p>\n<h5>Why Silobreaker?</h5>\n<p>Silobreaker enables organisations to make confident intelligence-led decisions that reduce risk, by providing insights no other solution can match, at unprecedented speed. Aggregating a vast, unique collection of data from millions of open and dark web sources, we unlock relevant intelligence with context, across cyber, physical and geopolitics. This allows analysts to identify undetected threats and incidents early and deliver real-time reports at one-click, so decision-makers can make accurate decisions to mitigate risks. </p>','\n',char(10)),'https://www.facebook.com/Silobreaker','https://www.twitter.com/Silobreaker','https://www.linkedin.com/company/silobreaker/','');
|
||
INSERT INTO vendors VALUES('6004d328-ec82-4dd0-899f-3fc39bba99a4','published','snyk','Snyk','snyk.io',NULL,'100 Summer Street ','7th Floor','Boston','MA','USA','e9549820-7a59-409a-b97e-7c16794611d6',replace('<h5>Snyk</h5>\n<p>\nSnyk is a developer-first security company that helps software-driven businesses develop fast and build secure applications. Only Snyk provides a platform to secure all of the critical components of today’s application development. With tight integration into existing developer workflows, source control (including Bitbucket, GitLab, Github), and CI/CD pipelines, Snyk enables efficient security workflows and reduces mean-time-to-fix. Snyk is securing industry leaders such as Google, Salesforce, and BBC. For more information or to get started with Snyk for free, visit https://snyk.io.<br>\n</p>','\n',char(10)),'https://www.facebook.com/snyksec','https://www.twitter.com/@snyksec / snyksec','https://www.linkedin.com/company/snyk/','');
|
||
INSERT INTO vendors VALUES('5f15d14a-2e3d-4044-89d7-153293634247','published','saviynt','Saviynt','www.saviynt.com','Saviynt’s Enterprise Identity Cloud helps enterprises scale cloud initiatives and solve security and compliance challenges. Saviynt brings together identity governance, cloud security, and privileged access to secure the entire business ecosystem. ','1301 E. El Segundo Blvd. ','Suite D','El Segundo','CA','USA','fac45a7d-7d54-46b7-b736-1ff0185cc721',replace('<h5>Saviynt</h5>\n<p>\nSaviynt’s Enterprise Identity Cloud helps modern enterprises scale cloud initiatives and solve the toughest security and compliance challenges in record time. The company brings together identity governance (IGA), granular application access, cloud security, and privileged access to secure the entire business ecosystem and provide a frictionless user experience. For more information, please visit saviynt.com. <br>\n</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/saviynt/','');
|
||
INSERT INTO vendors VALUES('6337e623-72a0-4538-bf2d-c0afaa137d99','published','securitymetrics','SecurityMetrics','www.securitymetrics.com','SecurityMetrics secures peace of mind for organizations that handle sensitive data. They hold their tools, training, and support to a higher, more thorough standard of performance and service. Never have a false sense of security.™','1275 W 1600 N',NULL,'Orem','UT','USA','5680f46b-d0d4-4d57-934b-c3df73e63e97',replace('<h5>SecurityMetrics</h5>\n<p>\nSecurityMetrics secures peace of mind for organizations that handle sensitive data. SecurityMetrics is one of only a few companies that is qualified to do everything PCI related such as audits, penetration testing, ecommerce security, and forensics. With over 20 years of forensic investigations, penetration testing, vulnerability assessments, and compliance audits, SecurityMetrics has tested over 1 million systems for vulnerabilities.<br>\n</p>\n<h5>Why SecurityMetrics?</h5>\n<p>Shopping Cart Monitor is an ecommerce solution that meets the PCI 11.6.1 standard which requires organizations to monitor javascript for attacks on payment pages. Shopping Cart Monitor monitors your iframes and ecommerce pages for eskimming to protect customer payment card data. It doesn''t require a software installation, and the process is non-intrusive so you can enhance your ecommerce security without compromising speed or your customer’s shopping experience.</p>','\n',char(10)),'https://www.facebook.com/securitymetrics','https://www.twitter.com/www.twitter.com/securitymetrics','https://www.linkedin.com/company/securitymetrics/','');
|
||
INSERT INTO vendors VALUES('f25630b5-c950-4aff-a575-32f768e0dc13','published','sonicwall','SonicWall','www.sonicwall.com','SonicWall delivers Boundless Cybersecurity for the hyper-distributed workforce era with an industry-leading TCO. SonicWall empowers enterprises, governments and SMBs worldwide with threat intelligence critical to remain ahead of tomorrow''s threats.','1033 McCarthy Blvd',NULL,'Milpitas','CA','USA','d169e532-678a-4315-abc2-9afdeb257197',replace('<h5>SonicWall</h5>\n<p>\nAbout SonicWall\nSonicWall delivers Boundless Cybersecurity for the hyper-distributed era in a work reality where everyone is remote, mobile and unsecure. SonicWall safeguards organizations mobilizing for their new business normal with seamless protection that stops the most evasive cyberattacks across boundless exposure points and increasingly remote, mobile and cloud-enabled workforces. By knowing the unknown, providing real-time visibility and enabling breakthrough economics, SonicWall closes the cybersecurity business gap for enterprises, governments and SMBs worldwide. For more information, visit www.sonicwall.com or follow us on Twitter, LinkedIn, Facebook and Instagram.<br>\n</p>\n<h5>Why SonicWall?</h5>\n<p>SonicWall Inc. safeguards organizations’ networking infrastructure over boundless exposure points and increasingly remote, mobile and cloud-enabled workforces. Leveraging scalable, seamless protection, our solutions stop the most evasive cyberattacks — all at an industry-leading TCO. By knowing the unknown, providing real-time visibility and enabling breakthrough economics, SonicWall empowers enterprises, governments and SMBs worldwide with the actionable threat intelligence they need to stay steps ahead of tomorrow''s threats.</p>','\n',char(10)),'https://www.facebook.com/SonicWall/','https://www.twitter.com/SonicWALL','https://www.linkedin.com/company/sonicwall','');
|
||
INSERT INTO vendors VALUES('6f0a38ee-82ea-4123-a1b7-b204a9a8190e','published','strider','Strider','www.striderintel.com','Strider is revolutionizing the way companies protect their innovation and compete in an era of competition. Our technology enables clients to identify, manage, and respond to nation state directed IP theft and supply chain vulnerabilities.','10377 South Jordan Gateway','Suite 150','South Jordan','UT','USA','e94eb257-c1fb-4660-8d19-6dc8b4c9f214',replace('<h5>Strider</h5>\n<p>\nStrider is revolutionizing the way companies, universities, research institutions, and government agencies protect their innovation and compete in a new era of global strategic competition. Our trailblazing technology and intelligence solutions enable clients to proactively identify, manage, and respond to nation-state directed IP theft and supply chain vulnerabilities.<br>\n</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/teamstrider/','');
|
||
INSERT INTO vendors VALUES('1fcd6aff-99da-4bda-b4e3-8cd006f723a8','published','sailpoint','SailPoint','www.sailpoint.com','SailPoint is the leading provider of identity security for the modern enterprise, empowering organizations worldwide to put identity security at the core of their business. ','11120 Four Points Drive ','Suite 100','Austin','TX','USA','4a48c9c5-d56a-4990-a16c-70c46356c9e8',replace('<h5>SailPoint</h5>\n<p>\nSailPoint is the leading provider of identity security for the modern enterprise. Enterprise security starts and ends with identities and their access, yet the ability to manage and secure identities today has moved well beyond human capacity. Using a foundation of artificial intelligence and machine learning, the SailPoint Identity Security Platform delivers the right level of access to the right identities and resources at the right time—matching the scale, velocity, and environmental needs of today’s cloud-oriented enterprise. Our intelligent, autonomous, and integrated solutions put identity security at the core of digital business operations, enabling even the most complex organizations across the globe to build a security foundation capable of defending against today’s most pressing threats.<br>\n</p>','\n',char(10)),'https://www.facebook.com/SailPoint/','https://www.twitter.com/SailPoint','https://www.linkedin.com/company/sailpoint-technologies/','');
|
||
INSERT INTO vendors VALUES('c1b609db-447a-44f8-9275-edaac7608d2b','published','spycloud','SpyCloud','www.spycloud.com','SpyCloud transforms recaptured darknet data to protect businesses from cyberattacks. Its proprietary engine collects, curates, enriches and analyzes data, allowing enterprises to prevent account takeover, ransomware and online fraud.','2130 South Congress Ave',NULL,'Austin','TX','USA','d05fcaaf-2915-486e-bfb7-07cbf8dfc253',replace('<h5>SpyCloud</h5>\n<p>\nSpyCloud transforms recaptured darknet data to protect businesses from cyberattacks. Its products operationalize Cybercrime Analytics (C2A) to produce actionable insights that allow enterprises to proactively prevent ransomware and account takeover, protect their business from consumer fraud losses, and investigate cybercrime incidents. Its unique data from breaches, malware-infected devices, and other underground sources also powers many popular dark web monitoring and identity theft protection offerings. SpyCloud customers include half of the ten largest global enterprises, mid-size companies, and government agencies around the world. Headquartered in Austin, TX, SpyCloud is home to nearly 200 cybersecurity experts whose mission is to make the internet a safer place.\nTo learn more and see insights on your company’s exposed data, visit spycloud.com.<br>\n</p>\n<h5>Why SpyCloud?</h5>\n<p>SpyCloud transforms recaptured darknet data to protect businesses from cyberattacks. Its products operationalize Cybercrime Analytics (C2A) to produce actionable insights that allow enterprises to proactively prevent ransomware and account takeover, protect their business from consumer fraud losses, and investigate cybercrime incidents. Its unique data from breaches, malware-infected devices, and other underground sources also powers many popular dark web monitoring and identity theft protection offerings. SpyCloud customers include half of the ten largest global enterprises, mid-size companies, and government agencies around the world. Headquartered in Austin, TX, SpyCloud is home to nearly 200 cybersecurity experts whose mission is to make the internet a safer place.\nTo learn more and see insights on your company’s exposed data, visit spycloud.com.</p>','\n',char(10)),NULL,'https://www.twitter.com/spycloudco','https://www.linkedin.com/company/spycloud','');
|
||
INSERT INTO vendors VALUES('df7eac3a-6c99-49c8-ad58-d87bb973979d','published','spirion','Spirion','www.spirion.com','Spirion is STEP ONE in sensitive data governance. Spirion’s Privacy-Grade™ data protection platform addresses these challenges with our sensitive data governance framework — a comprehensive foundation for data security and privacy programs.','3030 North Rocky Point Drive West','Suite 470','Tampa','FL','USA','fdd57a35-f7e5-4f98-a5d8-3f2e274f0e8e',replace('<h5>Spirion</h5>\n<p>\nSpirion is STEP ONE in sensitive data governance. Whether your organization wants to understand its data-at-risk, reduce exposure for a potential breach, or mitigate risk of noncompliance and failed audits, Spirion’s Privacy-Grade™ data protection platform addresses these challenges with our sensitive data governance framework — a comprehensive foundation for data security and privacy programs.\nIt begins with our proven 98.5% accurate discovery and then enforced through our powerful and purposeful automated classification and remediation capabilities. This gives you clarity as to what sensitive data you have and where it is located, control over how your data is stored and used, and confidence that your data is protected.\nSpirion has solved real data protection problems since 2006, enabling organizations to significantly reduce their risk exposure while facilitating compliance with data protection laws and regulations.<br>\n</p>\n<h5>Why Spirion?</h5>\n<p>Spirion® is STEP ONE for sensitive data governance. Our Privacy-Grade™ data protection software enables organizations to reduce risk exposure, gain visibility into their data footprint, improve decision-making, and maintain regulatory compliance.\nProven 98.5% discovery accuracy finds sensitive data everywhere—across Windows, Mac OS X or Linux; structured or unstructured data; on-prem, cloud, and endpoint-based storage, applications, systems and websites.\nContext-rich classification delineates data value and purpose, including how it is used, where it resides, and how it moves.\nSensitive Data Risk SDV3™ Dashboard features the industry’s first risk score based on data value, volume, and overall vulnerability.\nPlaybook orchestration automates policies to protect sensitive data with appropriate protections, cures, and necessary controls.\nAudit-ready proof of sensitive data governance allows rapid response to Data Subject Access Rights (DSAR) requests.\n</p>','\n',char(10)),NULL,'https://www.twitter.com/spirion','https://www.linkedin.com/company/spirion/','');
|
||
INSERT INTO vendors VALUES('b540531a-de66-46b6-998f-094376431db1','published','specterops','SpecterOps','www.specterops.io','SpecterOps aspires to set the cadence for the security industry and bring unique insight into the advanced threat actor tradecraft. We help clients shut down attack paths, evaluate, and develop security operations programs, provide premier training courses, and sponsor projects to help the industry.','100 N. Pitt St.','Suite 310','Alexandria','VA','USA','32832546-589d-4188-8f50-db9d43143193',replace('<h5>SpecterOps</h5>\n<p>\nSpecterOps aspires to set the cadence for the rest of the security industry and bring unique insight into the advanced threat actor tradecraft. Our team has deep experience built through helping hundreds of clients shut down attack paths, evaluate, and develop security operations programs, providing premier training courses to thousands of students in advanced adversary Tactics, Techniques, and Procedures (TTPs), and sponsoring numerous projects to help the industry as a whole.<br>\n</p>\n<h5>Why SpecterOps?</h5>\n<p>BloodHound Enterprise:\nFrom the creators of BloodHound, an Attack Path Management solution that continuously maps and quantifies identity Attack Paths in Active Directory and Azure (Azure Active Directory and Azure Resource Manager). Remove millions of Attack Paths within your existing architecture and eliminate the attacker’s easiest, most reliable, and most attractive target.</p>','\n',char(10)),NULL,'https://www.twitter.com/SpecterOps','linkedin.com/company/specterops','');
|
||
INSERT INTO vendors VALUES('71a480cc-c856-4d91-a4cb-fffa6ae94c84','published','runecast-solutions','RUNECAST SOLUTIONS','https://www.runecast.com/','Runecast is a provider of a patented solution for proactive risk mitigation, security compliance, operational efficiency & mission-critical stability for IT Security and Operations teams. To add proactive to your IT strategy, visit www.runecast.com','300 Delaware Ave','Suite 210, Box #241','Wilmington','DE','USA','2f88ca57-61d3-4ae8-b773-83f40fab96b4',replace('<h5>RUNECAST SOLUTIONS</h5>\n<p>\nRunecast Solutions Ltd. is a leading global provider of a patented, AI-driven vulnerability management and cloud-native application protection platform (CNAPP) for IT Security and Operations teams. Forward-focused enterprises rely on Runecast for Security and Compliance, Container Security, and Proactive ITOM. Runecast is built to save your Security and Operations teams time and money. Now your team can do more with less, via a single platform that checks all your cloud infrastructure, for increased visibility, security and time saving. Gain visibility into hidden risks so that you can take action to prevent issues and take control of your entire on-prem, hybrid, or multi-cloud environment with a proactive, AI-driven solution. Join us at RSA Conference 2023 to see how Runecast can enhance the security and efficiency of your infrastructure.<br>\n</p>\n<h5>Why RUNECAST SOLUTIONS?</h5>\n<p>Runecast is an AI-powered platform that provides vulnerability management and assessment, security compliance and best practices analysis for the hybrid cloud.\nRunecast can be easily deployed in a variety of environments including AWS, Azure, Google Cloud, Kubernetes and VMware. It operates both with and without an internet connection, making it the only solution you need even in air-gapped environments.\nA comprehensive combination of continuous analysis against the Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerability (KEV) list, as well as checks against a broad range of security standards, best practices and security hardening guides, provide clear and precise alerts to prioritize remediation.\nBy combining vulnerability assessment with continuous analysis of the environment against a wide range of security best practices and security hardening guides, Runecast provides an efficient solution to prevent cyber-attacks from happening.</p>','\n',char(10)),'https://www.facebook.com/Runecast.Solutions','https://www.twitter.com/Runecast','https://www.linkedin.com/company/runecast','');
|
||
INSERT INTO vendors VALUES('c82ae98a-7a46-4a4b-9910-8db0f116c264','published','sans-institute','SANS Institute','www.sans.org','SANS'' full-spectrum of courses, certifications, degree programs, and community events led by the world''s most esteemed cyber professionals provides you and your organization with an unrivaled security foundation and critical edge required to win.','11200 Rockville Pike ','Suite 200','North Bethesda','MD','USA','015b68a2-c4b2-45e3-9c90-4202d135c49b',replace('<h5>SANS Institute</h5>\n<p>\nCombating the onslaught of threat actors that attack your critical assets and systems requires constant vigilance. SANS believes that only real-world, hands-on training can protect and defend against today’s dynamic threat landscape. SANS'' best-in-class technical course content, certifications, awareness training, and mission-based educational resources delivered by world-renowned instructors provide you and your organization with the solid IT security foundation and critical edge required to defeat real-world threats in real-time.<br>\n</p>\n<h5>Why SANS Institute?</h5>\n<p>SANS Institute is the world’s leading provider of cybersecurity training. For more than twenty-five years, SANS has provided cutting edge training to governments and organizations across the world. Technology may have changed in that time, but our core mission has remained constant: to protect through sharing cybersecurity knowledge and skills. SANS offers more than 70 cybersecurity courses, has more than 147,000 learners across 200+ countries and 15 million employees protecting their organization with SANS Security Awareness Training.</p>','\n',char(10)),'https://www.facebook.com/sansinstitute/','https://www.twitter.com/sansinstitute/','https://www.linkedin.com/company/sans-institute/','');
|
||
INSERT INTO vendors VALUES('bfd6edc8-541f-4fd1-ba10-2d11d476bd1d','published','secureauth','SecureAuth','www.secureauth.com','SecureAuth is a leading next-gen access management and authentication company that enables the most secure and passwordless, continuous authentication experience for everyone. Our mission is to make every digital journey simple, seamless, and secure.','38 Discovery ','Suite 100','Irvine ','CA','USA','89406ef5-155f-4a96-ba1e-2644ff5fbf29',replace('<h5>SecureAuth</h5>\n<p>\nSecureAuth is a leading next-gen access management and authentication company that enables the most secure and passwordless, continuous authentication experience for everyone, everywhere. Our platform leverages adaptive risk analytics, using hundreds of human variables to create each user’s unique digital DNA. This enables real-time continuous authentication and provides the highest level of security throughout the digital journey. The patented AI/ML technology allows you to access any file, any application, any VDI from your desktop or mobile device without repeat authenticating. <br>\n</p>\n<h5>Why SecureAuth?</h5>\n<p>SecureAuth offers 2 products: Arculix provides a passwordless continuous authentication platform, powered by behavioral analytics. SecureAuth Identity Provider provides adaptive authentication, SSO and IdP capabilities. The products can be used independently or in combination with one another.\nArculix has 3 differentiated features: 1. Passwordless Continuous Authentication: Arculix continuously monitors users & devices and conducts step up auth when risk scores demand it. Gain access to any file, app, VDI from your desktop or mobile device without auth requests. Use invisible MFA to meet cyber insurance and ZTA requirements. Improve user experience and security by providing fewer MFA prompts which lesson MFA bombing attacks. 2. Risk Engine / Behavioral Modeling: Evaluate your security posture and risk exposure most effectively with patented DLOA risk scores to decrease ATO and fraud loss. 3. Device Trust: Shift security left by enabling the root of trust at the device level. </p>','\n',char(10)),'https://www.facebook.com/SecureAuth/','https://www.twitter.com/SecureAuth','https://www.linkedin.com/company/secureauth-corporation/','');
|
||
INSERT INTO vendors VALUES('44121d10-96fa-4683-96fc-98a45ee8fecc','published','spanning','Spanning','www.spanning.com','You don''t have time for lengthy, complex, and manual backup and recovery processes. That''s why we''ve created backup solutions purpose built for Microsoft 365, Google Workspace, and Salesforce that are secure, affordable, and insanely easy to use.','701 Brickwell Ave.','#400','Miami','FL','USA','ddc5de9b-55b5-4444-aeef-5aacf0b20b84',replace('<h5>Spanning</h5>\n<p>\nYour Business Runs on SaaS. Let''s Protect It.\nWe understand your SaaS data is critical and that you''re on the hook to protect it. You don''t have time for lengthy, complex, and manual backup and recovery processes. That''s why we''ve created backup solutions purpose built for Microsoft 365, Google Workspace, and Salesforce that are secure, affordable, and insanely easy to use.\nWith 10,000+ organizations that rely on Spanning to secure their data, 1.4 million+ users protected from data loss, and 2.2 billion+ backups completed per week, you can understand why Spanning is the #1 SaaS Backup Solution. See for yourself by contacting Spanning today: https://spanning.com/get-started/<br>\n</p>\n<h5>Why Spanning?</h5>\n<p>Spanning, a Kaseya company, is the leader in SaaS Cloud-to-Cloud Backup, proven and trusted by more than 10,000 organizations across the globe to provide enterprise-class data protection. Spanning''s cloud-native, purpose-built solutions for Microsoft 365, Google Workspace and Salesforce provide easy-to-use yet powerful capabilities for end users and administrators and meet the rigorous requirements for listing on Microsoft AppSource, Salesforce AppExchange and Google Workspace Marketplace. </p>','\n',char(10)),'https://www.facebook.com/SpanningBackup','https://www.twitter.com/spanningbackup/','https://www.linkedin.com/company/spanning-cloud-apps/','');
|
||
INSERT INTO vendors VALUES('eb007bbf-5bf5-4893-ac2e-970578887974','published','stackhawk','StackHawk','https://www.stackhawk.com/',replace('StackHawk gives Development teams the ability to find and fix security vulnerabilities during pre-production through automation in CI/CD, while giving AppSec teams controlled and security-tested applications in production.\n\n','\n',char(10)),'1624 Market St ','Suite 226 PMB 36969','Denver','CO','USA','1e3758b3-bc76-4b71-91d1-331531d328af',replace('<h5>StackHawk</h5>\n<p>\nFocused on pre-production API and web application security testing, StackHawk gives Development teams the ability to actively run security testing as part of their traditional software testing workflows, while giving AppSec teams the peace of mind of controlled and security-tested applications in production.<br>\n</p>\n<h5>Why StackHawk?</h5>\n<p>StackHawk is the only automated API and web application security testing solution that was purpose-built to bridge the trust gap between AppSec and Developer teams to deliver more secure software faster.\nStackHawk helps organizations improve their security testing posture with three key value drivers:\n- Helping Dev and App Sec teams operate efficiently\n- Deploy safer code and push applications to market with speed\n- Reduce risk by eliminating vulnerabilities/software bugs pushed to production\n</p>','\n',char(10)),'https://www.facebook.com/StackHawk/','https://www.twitter.com/StackHawk?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor','https://www.linkedin.com/company/stackhawk/mycompany/?viewAsMember=true','');
|
||
INSERT INTO vendors VALUES('eea362dc-15ab-47a2-b73e-6a6cb8a7afca','published','softwarfare','SOFTwarfare','www.softwarfare.com','SOFTwarfare is a trusted provider of passwordless multi-factor authentication and cybersecurity integrations. Our patented solutions combine multi-modal biometric factors with AI and ML learning to rapidly modernize security infrastructures.','7301 Mission Rd. ','Suite 141','Prairie Village','KS','USA','6f5a515e-dde2-4d74-90d9-a1ca839ee6ac',replace('<h5>SOFTwarfare</h5>\n<p>\nSOFTwarfare secures authentication in your enterprise using Trusted Passwordless™ Authentication to build trust on a per session basis for user and machine identities. Fully deployed and integrated within your existing infrastructure, SOFTwarfare’s products modernize and secure your authentication and integration architecture to meet next generation requirements for zero trust, CMMC and other regulatory compliance.<br>\n</p>\n<h5>Why SOFTwarfare?</h5>\n<p>SOFTwarfare manufactures next-generation authentication and integration products that enhance security and decrease user friction enterprise wide through Trusted Passwordless authentication and Zero Trust Identity. These products incorporate our multi-modal, phishing-resistant MFA, BioThenticate, and our cybersecurity integration platform-as-a-service, PangaeAPI, to distribute strong authentication enterprise-wide. These solutions build the Identity component of a Zero Trust Network Architecture by eliminating passwords, reducing attack surfaces and enforcing identity at every endpoint all while decreasing user and administrator friction and assisting companies to achieve regulatory compliance.</p>','\n',char(10)),NULL,'https://www.twitter.com/SOFTwarfare','https://www.linkedin.com/company/softwarfare','');
|
||
INSERT INTO vendors VALUES('b2c1efc1-c9a2-4b76-9a2a-e90543e9e9a9','published','sisa','SISA','www.sisainfosec.com/us/','SISA is a global forensics-driven cybersecurity solutions company trusted by leading organizations for securing their businesses with robust preventive, detective, and corrective cybersecurity solutions. ','Las Colinas The Urban Towers','22 West Las Colinas Boulevard, Suite 1650','Irving','TX','USA','9419e46b-e81b-4681-af55-bda17193c645',replace('<h5>SISA</h5>\n<p>\nSISA is a global forensics-driven cybersecurity solutions company trusted by leading organizations for securing their businesses with robust preventive, detective, and corrective cybersecurity solutions. Our problem-first, human-centric approach helps businesses strengthen their cybersecurity posture. We apply the power of forensic intelligence and advanced technology to offer true security to 2,000+ customers in 40+ countries.<br>\n</p>\n<h5>Why SISA?</h5>\n<p>SISA Radar – Our data discovery and classification solution reduces the attack surface and prioritizes at-risk data by improving sensitive data management. It provides new use cases for data discovery and classification based on SISA’s learning from forensic activities, MITRE ATT&CK framework, and Zero-day vulnerabilities & manages workflow for privacy regulations.\nSISA ProACT – Our MDR solution visualizes the state of enterprise security, reduces alert fatigue, & accelerates time to detection and response. It addresses talent shortages using AI/ML-based threat detection & SOAR features.\nWe leverage our ''Forensics-driven Cybersecurity'' approach to guide our product development.\n• Our cloud-native products have the lowest total cost of operations, making our solutions a fraction of the cost of other monolithic applications\n• SISA''s Radar & ProACT are among the highest-rated solutions on Gartner Peer Insights.\nSISA''s solutions are elastic & scalable as these are deployed on the cloud.</p>','\n',char(10)),'https://www.facebook.com/SISAInfosec','https://www.twitter.com/sisainfosec','https://www.linkedin.com/company/sisainfosec/','');
|
||
INSERT INTO vendors VALUES('b4e3d18b-18c4-4730-a760-0eaa47eb1803','published','secpod-technologies','SecPod Technologies','www.secpod.com','SecPod is a cyber security product company. We prevent cyberattacks. Our SanerNow platform provides continuous visibility to the computing environment, detects vulnerabilities and misconfigurations, mitigates loopholes to eliminate attack-surface.','303 Twin Dolphin Dr 6th Floor',NULL,'Redwood City','CA','USA','b02b8642-36ca-42a5-9db8-23f03d1cce4e',replace('<h5>SecPod Technologies</h5>\n<p>\nSecPod is a cyber security technology company. We prevent cyberattacks. Our product, SanerNow, is a SaaS-based continuous and automated vulnerability management platform that provides visibility to the computing environment, identifies vulnerabilities and misconfigurations, mitigates risks to eliminate attack-surface, and helps automate these routines.\nSecPod’s SanerNow platform, launched in 2018, is used by enterprises and MSPs worldwide across verticals, including finance & insurance, healthcare, manufacturing, IT/ITES, and Govt sector. SecPod also licenses security technology to top security vendors. SecPod has established strategic partnerships, channel, and direct sales models and has gained customers'' trust in over 25 countries.\n<br>\n</p>\n<h5>Why SecPod Technologies?</h5>\n<p>SecPod’s SanerNow CyberHygiene Platform is an advanced vulnerability management solution for preventing cyberattacks and achieving a security risk compliance posture. Enterprise IT Security Teams use SanerNow to effectively reduce the risk imposed by vulnerabilities and misconfigurations, automatically patch assets, enforce continuous compliance with regulatory standards, and control all devices from one console.\nSanerNow automates the end-to-end vulnerability management lifecycle into one unified console with six products operating in a seamlessly integrated form. SanerNow consolidates Visibility, Normalization, Detection, Prioritization, Remediation, and Reporting use cases into one platform, making vulnerability management a continuous and automated routine. </p>','\n',char(10)),'https://www.facebook.com/secpod/','https://www.twitter.com/SecPod','https://www.linkedin.com/company/secpod-technologies','');
|
||
INSERT INTO vendors VALUES('3f457e62-c3b0-466f-9391-0de7847a3451','published','rapidfort','RapidFort','https://www.rapidfort.com/','RapidFort is the first Software Attack Surface Optimization Platform that optimizes and secures modern cloud software automatically, dramatically increasing security and efficiency of an organization.','440 North Wolfe Road',NULL,'Sunnyvale','CA','USA','48817320-dcc2-44d3-9737-ad8ed5240e32',replace('<h5>RapidFort</h5>\n<p>\nRapidFort is the first Software Attack Surface Optimization Platform.\nModern cloud workloads include a large number of unused components. Current products that are in the market can only identify & list vulnerabilities. It is the responsibility of the dev team to address these vulnerabilities. Since there are typically 1000s of vulnerabilities in containerized images, it is impossible to address all of them. However, RapidFort''s revolutionary product profiles containerized images during runtime, identifies packages/files that are unused and then automatically removes them. By removing all the vulnerabilities associated with those packages, it makes s/w secure as well as increases productivity.<br>\n</p>\n<h5>Why RapidFort?</h5>\n<p>RapidFort''s Software Attack Surface Management (SASM) platform not only provides visibility to the OSS vulnerabilities present in modern cloud software but also removes ~80% of them, automatically, without expending additional resources. Current products in the market only provide visibility and require dev or security teams to remediate them. Remediation is mostly done by patching, which is expensive and not viable for all vulnerabilities. RapidFort''s SASM platform makes it possible to dramatically improve the security and efficiencies of an organization.</p>','\n',char(10)),NULL,'https://www.twitter.com/rapidfortinc','https://www.linkedin.com/company/rapidfort/','');
|
||
INSERT INTO vendors VALUES('829a8a57-28bc-40d0-ac8a-744f9da60d33','published','searchlight-cyber','Searchlight Cyber','www.slcyber.io','Searchlight Cyber provides organizations with relevant and actionable dark web threat intelligence, to help them identify and prevent criminal activity, we have the most comprehensive dataset based on proprietary techniques and research. ','Pure Office, One Port Way',NULL,'Port Solent',NULL,'GBR','653ab14d-8760-46ea-92a8-12c416b191a1',replace('<h5>Searchlight Cyber</h5>\n<p>\nSearchlight Cyber provides organizations with relevant and actionable dark web intelligence, to help them identify and prevent criminal activity. Founded in 2017 with a mission to stop criminals acting with impunity on the dark web, we have been involved in some of the world’s largest dark web investigations and have the most comprehensive dataset based on proprietary techniques and ground-breaking academic research. Today we help government and law enforcement, enterprises, and managed security services providers around the world to illuminate deep and dark web threats and prevent attacks. Visit www.slcyber.io to find out more.<br>\n</p>\n<h5>Why Searchlight Cyber?</h5>\n<p>Searchlight Cyber’s market-leading dark web investigation and monitoring tools are trusted by the world’s most forward-thinking law enforcement agencies, enterprises, and MSSPs.\nCerberus\nUse our dark web investigation platform to search previously unindexed areas of the internet. Gather intelligence on marketplaces, forums, sites, individuals, and groups from the most comprehensive datasource on deep and dark web activity.\nDarkIQ\nUse our dark web monitoring platform as an automated analyst, continuously searching the deep and dark web for indicators of an attack against your organization. Assess your dark web exposure over time and triage imminent threats based on contextual data.\nAPIS and Integrations\nIntegrate our dark web intelligence feed into your existing cybersecurity stack to improve your attack surface visibility. Easily enrich your threat intelligence, SIEM, or SOAR platforms with dark web data on threat groups, exploits, and vulnerabilities, through our versatile API.</p>','\n',char(10)),NULL,'https://www.twitter.com/SLCyberSec','https://www.linkedin.com/company/searchlight-cyber','');
|
||
INSERT INTO vendors VALUES('1affbf07-6a89-4d2d-b94b-b24ff3c186b4','published','ridge-security-technology-inc','Ridge Security Technology Inc.','www.ridgesecurity.ai','Ridge Security is in the heart of Silicon Valley. Our relentless vision is to bring information security to enterprises, small or large, with cutting edge technology to ensure our customers stay complied, alerted, and secured all the time. ','1601 McCarthy Blvd.',NULL,'Milpitas','CA','USA','577f2a18-aa45-406e-87dc-72f86d59351a',replace('<h5>Ridge Security Technology Inc.</h5>\n<p>\nRidge Security is a Silicon Valley based startup, it provides zero trust security with automated testing, segmentation, and protection. With our solution, the financial institutions, government agencies, telcos, and large enterprises can continuously validate their cyber security postures, segment critical assets, and enforce unified security policies across on-premises, hybrid-clouds, and multi-clouds. Ridge Security platform also enables MSSPs/MDRs to offer new cybersecurity services to their clients. <br>\n</p>\n<h5>Why Ridge Security Technology Inc.?</h5>\n<p>Ridge Security’s Zero Trust solution consists of two product lines: RidgeBot and RidgeShield, the former one offers zero-trust automated security validation and the latter one provides zero-trust micro-segmentation and unified policy enforcement across environments. RidgeBot automates the penetration testing by coupling the ethical hacking techniques with the AI technology, it reduces the high-false positives of vulnerability scanners, validates security risks, and demonstrates potential damage with proof. The automation and ultra-ease of use feature of both products help customers achieve operational efficiency, shorten the remediation time, and alleviate the shortage of security personnel. RidgeBot has a wider coverage, deeper findings, and better efficacy than most players in the market; and RidgeShield presents intelligent visualization of the workload communications and seamlessly integrated with RidgeBot for 1-click away security testing. </p>','\n',char(10)),'https://www.facebook.com/RidgeBot/','https://www.twitter.com/ridgesecurityai','https://www.linkedin.com/company/37183366/','');
|
||
INSERT INTO vendors VALUES('e6d897ab-7db3-4d8a-b93f-4a2ce17bb956','published','recorded-future','Recorded Future','www.recordedfuture.com','Recorded Future is the world’s largest intelligence company. Its Intelligence Cloud provides complete coverage across adversaries, infrastructure, and targets, empowering countries and organizations to disrupt adversaries.','363 Highland Avenue ','Suite 2','Somerville','MA','USA','b47965e6-ffb5-4c85-aae7-bfb46751ef4f',replace('<h5>Recorded Future</h5>\n<p>\nRecorded Future is the world’s largest intelligence company. Recorded Future’s Intelligence Cloud provides complete coverage across adversaries, infrastructure, and targets. By combining persistent and pervasive automated data collection and analytics with human analysis, Recorded Future provides real-time visibility into the vast digital landscape. It empowers countries and organizations to take proactive action to disrupt adversaries and keep their people, systems, and infrastructure safe. Headquartered in Boston with offices and employees around the world, Recorded Future works with more than 1,500 businesses and government organizations across more than 60 countries. Learn more at recordedfuture.com.<br>\n</p>','\n',char(10)),'https://www.facebook.com/RecordedFuture/','https://www.twitter.com/RecordedFuture','https://www.linkedin.com/company/recorded-future','');
|
||
INSERT INTO vendors VALUES('df9dbbca-bc02-4062-8ff4-2090946cec61','published','resecurity-inc','Resecurity, Inc.','www.resecurity.com','Resecurity® is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.','445 S. Figueroa Street','Suite 3100','Los Angeles','CA','USA','6d027283-9e89-4403-a877-e3916c162c84',replace('<h5>Resecurity, Inc.</h5>\n<p>\nResecurity® is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence. Known for providing best-of-breed data-driven intelligence solutions, Resecurity''s services and platforms focus on early-warning identification of data breaches and comprehensive protection against cybersecurity risks.<br>\n</p>\n<h5>Why Resecurity, Inc.?</h5>\n<p>Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence. Known for providing best-of-breed data-driven intelligence solutions, Resecurity''s services and platforms focus on early-warning identification of data breaches and comprehensive protection against cybersecurity risks. Founded in 2016, it has been globally recognized as one of the world''s most innovative cybersecurity companies with the sole mission of enabling organizations to combat cyber threats regardless of how sophisticated they are.\nBottom line, Resecurity solves problems through data. No commodity or commercially available but tailored and curated by our Hunter Unit. We focus on "threat risk" meaning, who is targeting you and if you are breached, not scores related to hygiene or a score. Engaging and developing chain of assets for upstream forward hunting.</p>','\n',char(10)),NULL,'https://www.twitter.com/resecurity','https://www.linkedin.com/company/resecurity','');
|
||
INSERT INTO vendors VALUES('30a3086e-4dc9-4db8-994f-3d4c28bb1491','published','riskoptics','RiskOptics','riskoptics.com','RiskOptics helps organizations make proactive, risk-informed decisions by unifying compliance, cybersecurity and IT risk activities and aligning them with the business objectives your organization cares about.','548 Market Street','#73905','San Francisco','CA','USA','34eb3198-f7ff-4eed-a6b7-4d6b33414bca',replace('<h5>RiskOptics</h5>\n<p>\nTaking a proactive and strategic view of risk requires the ability to see, understand and act on risk across your organization. Current approaches for the mid-market are manual, disconnected and fail to surface unseen risks.\nAt RiskOptics, we aim to make risk management more strategic, pulling it up from tactical “check-the-box” work to something more valuable to both the company and the information security team. Our vision is a world where organizations understand and use risk to move forward with what matters most.\nRiskOptics helps organizations make proactive, risk-informed decisions by unifying compliance, cybersecurity and IT risk activities and aligning them with the business objectives your organization cares about.\nWith this business-centered, risk-first approach, you’ll have the insights needed to make smarter, more informed decisions for your business and convert risk to business advantage.<br>\n</p>\n<h5>Why RiskOptics?</h5>\n<p>The RiskOptics ROAR Platform helps you see risk differently by providing a unified, real-time view of risk and compliance—framed around your organization and what it cares about the most. You gain the strategic, contextual insight needed to manage, quantify and communicate risk, enabling leaders to make smart, risk-informed decisions.\nThe ROAR platform breaks down the silos that cause inefficiencies, gaps and blind spots to help InfoSec teams be more connected and efficient.\nWith simple, guided onboarding and expertise built-in, you can get started fast and see value quickly. Automated evidence collection and assessments, real-time risk scoring and continuous monitoring help ensure you are always audit ready, maintaining compliance and managing risk to acceptable levels. By demonstrating your risk and compliance posture in the context of how your organization needs to see it, you can better prioritize, quantify and justify the actions and investments needed.</p>','\n',char(10)),NULL,'https://www.twitter.com/@RiskOptics','https://www.linkedin.com/company/riskoptics/','');
|
||
INSERT INTO vendors VALUES('b676fd3a-1c3a-4788-b5cf-4d2e566701e8','published','red-canary','Red Canary','www.redcanary.com','Red Canary stops cyber threats no one else does, so organizations can fearlessly pursue their missions. We do it by delivering managed detection and response (MDR) across enterprise endpoints, cloud workloads, network, identities, and SaaS apps. ','1601 19th St','900','Denver','CO','USA','520a5cc5-68e0-4d8f-ac5a-c458fa690214',replace('<h5>Red Canary</h5>\n<p>\nRed Canary stops cyber threats no one else does, so organizations can fearlessly pursue their missions. We do it by delivering managed detection and response (MDR) across enterprise endpoints, cloud workloads, network, identities, and SaaS apps. As a security ally, we define MDR in our own terms with unlimited 24×7 support, deep threat expertise, hands-on remediation, and by doing what’s right for customers and partners.<br>\n</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/redcanary/','');
|
||
INSERT INTO vendors VALUES('c02e32ec-3fd2-44a5-a46f-cf14667828ae','published','relyance-ai','Relyance AI','relyance.ai',replace('Privacy. It''s in the Code. Using machine learning, Relyance AI builds a dynamic, real-time data inventory and map so your organization can monitor how personal data moves through your code, applications, infrastructure, and to third-party vendors.\n','\n',char(10)),'1900 South Norfolk Street ','Suite 350','San Mateo','CA','USA','0a564f50-b51e-4abd-9b57-3d662277e4e5',replace('<h5>Relyance AI</h5>\n<p>\nRelyance AI enables organizations to match the speed of privacy and compliance operations to the speed of engineering and business operations. Relyance AI is not just shifting left–it’s flipping the approach to data protection on its head by leveraging machine learning to build a global, cross-functional, comprehensive solution to manage privacy seamlessly, data governance, and legal operations. It is the only data protection platform that offers privacy at the code level–without intrusion. Relyance AI’s core differentiators are quick implementation time, automation, code and contract integrations, and intelligent insights. Relyance AI tracks and manages the entire data lifecycle held by vendors and third parties. In addition to automatically generating and maintaining Records of Processing (ROPAs), our Vendor Data Lifecycle Management module scans contracts and agreements to surface important clauses surrounding security, agreement termination, and ROPAs throughout the supply chain.<br>\n</p>\n<h5>Why Relyance AI?</h5>\n<p>Privacy. It''s in the Code. The Relyance AI platform enables your entire organization to manage privacy and data protection with a one-stop solution. Mapping to your legal and technical sources of truth, Relyance AI embeds within existing business processes so engineers can speak contract and lawyers can speak code. Data-driven insights keep everyone focused on the most important privacy issues. Relyance AI enables organizations to match the speed of privacy and compliance operations to the speed of engineering and business operations. Relyance AI is the only data protection platform that offers privacy at the code level–without intrusion. Relyance AI’s core differentiators are quick implementation time, automation, code and contract integrations, and intelligent insights. Competing solutions rely on manual workflow solutions or require excessive data access, and do not offer real-time visibility into how applications process personal and sensitive data.</p>','\n',char(10)),NULL,'https://www.twitter.com/relyanceai?lang=en','https://www.linkedin.com/company/relyanceai/','');
|
||
INSERT INTO vendors VALUES('078653be-6a92-4a89-ac47-1847e65efa2a','published','rangeforce','RangeForce','www.rangeforce.com','RangeForce reduces cyber risk with a cloud-based upskilling platform designed to help SOC teams detect, disrupt, and defend against the latest threats. ','440 Monticello Ave. ','Ste. 1802 PMB 44296','Norfolk','VA','USA','b6f92b19-6cf6-41f2-9f76-55a581b485b9',replace('<h5>RangeForce</h5>\n<p>\nRangeForce is a cloud-based platform to improve human cyber readiness:\nCyber Skills Modules: Expert-designed content mapped to industry frameworks, including MITRE ATT&CK and D3FEND\nTeam Threat Exercises: Team members work together to detect, contain, and remediate a real-life attack scenario in a safe, emulated environment. Scenarios range from simple ransomware attacks to complex, multi-stage APT attacks.\nThreat-centric Reporting: Post-exercise reports highlight actionable insights leaders can use to build a continuous cyber readiness program. Leaders can also measure team progress against specific skill areas and benchmark against peers.\nDefense Readiness Index: Provides an outlook on threat actors most relevant to the organization, allowing them to measure team progress around specific threats and focusing time on the most important areas.\nTalent: Hands-on assessments to equip hiring managers with skill-based insights to source and validate candidates.<br>\n</p>\n<h5>Why RangeForce?</h5>\n<p>For enterprise security teams who need to defend against cyber threats, RangeForce provides the only cyber risk reduction solution built for organizations, teams, and individuals, that reduces organizational risk and human capital spend.\nThe cloud-based platform provides a powerful set of tools for cyber risk reduction, including:\nCyber Skills Modules\nTeam Threat Exercises\nThreat-centric Reporting\nTalent Assessments\nRangeForce is the only platform offering truly holistic upskilling via team defensive readiness exercises plus on-demand modules. RangeForce is designed to teach, providing enough support to ensure consistent and continuous improvement. Rather than simply assessing knowledge, we guide learners through a concept and ensure their comprehension.</p>','\n',char(10)),NULL,'https://www.twitter.com/RangeForce','https://www.linkedin.com/company/rangeforce/','');
|
||
INSERT INTO vendors VALUES('3d74bb30-7c6e-4dae-bed9-4e1e919d97ad','published','rubrik','Rubrik','www.rubrik.com','Rubrik is a cybersecurity company on a mission to secure the world’s data. Our Zero Trust Data Security™ platform keeps your data secure, monitors your data risks, and quickly recovers your data, wherever it lives.','3495 Deer Creek Road',NULL,'Palo Alto','CA','USA','bf62e12d-eead-42da-8a56-3255edd277db',replace('<h5>Rubrik</h5>\n<p>\nRubrik is a cybersecurity company, and our mission is to secure the world’s data. We help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, delivers data protection and cyber resilience in a single platform across enterprise, cloud, and SaaS applications. Our platform automates policy management of data and enforcement of data security through the entire data lifecycle. We help organizations uphold data integrity, deliver data availability, continuously monitor data threats, and restore businesses with their data when infrastructure is attacked. <br>\n</p>\n<h5>Why Rubrik?</h5>\n<p>Rubrik Security Cloud is a data security platform that keeps your data secure, monitors your data risks, and quickly recovers your data, wherever it lives.\nBuilt on zero trust architectural principles, Rubrik Security Cloud is composed of the following elements:\n1. Data Resilience: Preserve data integrity and keep data readily accessible to withstand cyberattacks, malicious insiders, and operational disruptions\n2. Data Observability: Reduce your data risks by continuously monitoring for emergent cyber threats such as ransomware and sensitive data exposure\n3. Data Remediation: Surgically and rapidly restore your impacted apps, files, or objects by containing threats and orchestrating recoveries while avoiding malware reinfection</p>','\n',char(10)),'https://www.facebook.com/RubrikInc/','https://www.twitter.com/rubrikInc','https://www.linkedin.com/company/rubrik-inc/','');
|
||
INSERT INTO vendors VALUES('e86dddba-0e0d-472f-9fa8-6a99e3c22529','published','slashnext','SlashNext','www.slashnext.com','SlashNext protects the modern workforce from malicious messages with integrated cloud messaging security for email, mobile, and browser that stops BEC, smishing, account takeovers, scams, and phishing attacks in M365, Zoom, SMS, LinkedIn, and more.','6701 Koll Center Parkway ','Suite 250','Pleasanton','CA','USA','dd2af02a-01ad-4f79-a976-57787f3a37c1',replace('<h5>SlashNext</h5>\n<p>\nSlashNext protects the modern workforce from malicious messages across all digital channels. SlashNext’s patented HumanAI™, a combination of computer vision, natural language processing, and behavioral contextualization, detects threats in real time with 99.9% accuracy. SlashNext Complete™ integrated cloud messaging security platform stops zero-hour threats in email, mobile, and web messaging apps across M365, Gmail, LinkedIn, WhatsApp, Telegram, Slack, Teams, and other messaging apps to detect and prevent threats before they become a breach.<br>\n</p>\n<h5>Why SlashNext?</h5>\n<p>SlashNext Cloud Email Security delivers twice the protection at half the cost. SlashNext is the only security company with BEC Generative AI technology, and the only company to combine the benefits of relationship graphs, contextual analysis, natural language processing and computer vision recognition in one solution.\nSlashNext’s Generative AI technology identifies new BEC emails and auto-generates the anticipated potential variants, which are then fed into its Machine Learning (ML) system to train the platform to block those variants. In short, SlashNext uses today’s Zero-Hour threats to stop the threats of tomorrow. Extending SlashNext’s existing Human AI Zero-Hour Protection, these technologies work together to stop 65% more Zero-Hour threats including BEC, links and files, and remediate threats with a 99% detection rate.\n</p>','\n',char(10)),'https://www.facebook.com/slashnextinc/','https://www.twitter.com/slashnextinc','https://www.linkedin.com/company/slashnextinc/','');
|
||
INSERT INTO vendors VALUES('3c8063b8-2761-407b-af79-15e95513877a','published','stytch','Stytch','https://stytch.com/','Stytch is an all-in-one customer identity and access management platform that enables companies to incorporate frictionless authentication and bot detection technology into applications and websites through flexible API and SDKs.','555 Montgomery Street','Floor 17','San Francisco ','CA','USA','649d8da5-c105-441d-b553-b2a76e85e184',replace('<h5>Stytch</h5>\n<p>\nStytch is an all-in-one customer identity and access management platform that enables companies to incorporate frictionless authentication and bot detection technology into applications and websites. Our flexible API and SDKs power user onboarding and retention via secure and low-friction authentication methods like Passwords, Passkeys, Email Magic Links, One-Time Passcodes, Biometrics, Social OAuth Logins, Single Sign-On, and more. We also offer risk and fraud prevention tools like Strong CAPTCHA and Device Fingerprinting to protect your app from malicious activity.\nWe are headquartered in San Francisco and backed by Benchmark, Coatue, Index Ventures and Thrive Capital. For more information, please visit Stytch.com.<br>\n</p>\n<h5>Why Stytch?</h5>\n<p>Stytch’s mission is simple: make authentication easy for developers. We’re an API-first CIAM that focuses on making authentication solutions that are as intuitive to build as they are to use and we’ve built sophisticated fraud detection into our IAM platform.\nWe provide:\n- Future-forward authentication flows, including breach-resistant passwords, a suite of passwordless options, and phishing-resistant MFA\n- B2B and B2C user and access management, including single sign on and org tenancy for B2B customers\n- Fraud and risk prevention, with our enhanced CAPTCHA solution and a sophisticated approach to device fingerprinting\n- Session management that offers step-up auth, opaque session tokens and JSON Web Tokens (JWTs)\nWe have built our product around developer empowerment. We’ve designed our ecosystem of API, SDKs, docs, and developer support teams to give developers the tools they need to build the auth that’s right for their product as quickly and effortlessly as possible.</p>','\n',char(10)),NULL,'https://www.twitter.com/stytchauth','https://www.linkedin.com/company/stytch/','');
|
||
INSERT INTO vendors VALUES('662eb53f-cd39-4bdc-ba5b-de0b9edafd60','published','common-vulnerabilities-and-exposures-cve-program','Common Vulnerabilities and Exposures (CVE) Program','www.cve.org','The mission of the CVE® Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. ','7515 Colshire Drive',NULL,'McLean','VA','USA','04525548-d30e-4b4c-b41d-9775a7e92e00',replace('<h5>Common Vulnerabilities and Exposures (CVE) Program</h5>\n<p>\nThe mission of the CVE® Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. There is one CVE Record for each vulnerability in the catalog. The vulnerabilities are discovered then assigned and published by organizations from around the world that have partnered with the CVE Program. Partners publish CVE Records to communicate consistent descriptions of vulnerabilities. Information technology and cybersecurity professionals use CVE Records to ensure they are discussing the same issue, and to coordinate their efforts to prioritize and address the vulnerabilities.\nBecome a CVE Program partner: https://www.cve.org/PartnerInformation/Partner#HowToBecomeAPartner<br>\n</p>\n<h5>Why Common Vulnerabilities and Exposures (CVE) Program?</h5>\n<p>Organizations from around the world partner with the CVE Program to assign CVE IDs and publish CVE Records for vulnerabilities within their distinct, agreed upon scope. There are minimal requirements to become a partner and there is no monetary fee or contract to sign. Top benefits: Demonstrate mature vulnerability management practices and a commitment to cybersecurity to current and potential customers; Communicate value-added vulnerability information to your customer base; Control the CVE publication release process for vulnerabilities in your scope; Assign CVE IDs without having to share embargoed information with another CNA; and Streamline your vulnerability disclosure processes.\n</p>','\n',char(10)),NULL,'https://www.twitter.com/CVEnew/','https://www.linkedin.com/company/cve-program','');
|
||
INSERT INTO vendors VALUES('a9be2545-f169-478c-9b0d-a8c8bc58353d','published','rockwell-automation','Rockwell Automation','https://www.rockwellautomation.com/en-us/capabilities/industrial-cybersecurity.html','We provide end-to-end industrial cybersecurity protection for operational technology, from plant floor to cloud. Our proven solutions ensure today’s manufacturers have reliable threat protection and are equipped for secure digital transformation. ','1201 S Second Street',NULL,'Milwaukee','WI','USA','8d9e7664-91ef-4d51-8d8c-b88e041fc7d5',replace('<h5>Rockwell Automation</h5>\n<p>\nRockwell Automation, Inc. (NYSE: ROK), is a global leader in industrial automation and digital transformation. We connect the imaginations of people with the potential of technology to expand what is humanly possible, making the world more productive and more sustainable. Headquartered in Milwaukee, Wisconsin, Rockwell Automation employs approximately 26,000 problem solvers dedicated to our customers in more than 100 countries. To learn more about how we are bringing the Connected Enterprise to life across industrial enterprises, visit www.rockwellautomation.com.<br>\n</p>','\n',char(10)),'https://www.facebook.com/ROKAutomation','https://www.twitter.com/ROKAutomation','https://www.linkedin.com/company/rockwell-automation/','');
|
||
INSERT INTO vendors VALUES('74147345-b83d-40d4-b000-c06dc2f529b5','published','reliaquest','ReliaQuest','www.reliaquest.com','ReliaQuest, the force-multiplier of security operations, increases visibility, reduces complexity, and manages risk with its cloud-native security operations platform, GreyMatter. ','1001 Water Street','Suite 1400','Tampa','FL','USA','fa67d20b-ce12-4bd2-b0aa-278eb1016287',replace('<h5>ReliaQuest</h5>\n<p>\nReliaQuest, the force-multiplier of security operations, increases visibility, reduces complexity, and manages risk with its cloud-native security operations platform, GreyMatter. ReliaQuest GreyMatter is built on an XDR architecture and delivered as a service anywhere in the world, any time of the day, by bringing together telemetry from tools and applications across cloud, on-premises, and hybrid cloud architectures.\nHundreds of the world’s most trusted brands team up with ReliaQuest to enable them to extend detection and response across cloud, endpoint, and network infrastructures, leveraging relevant data from both security and business applications. ReliaQuest is a privately held technology unicorn headquartered in the U.S. with multiple global locations. For more information, visit www.reliaquest.com.\n<br>\n</p>\n<h5>Why ReliaQuest?</h5>\n<p>New Product Alert: Phishing Analyzer automates the process of abuse mailbox management for you. Suspicious emails are analyzed, remediation actions are taken, and follow-up notifications are sent– all without disrupting your team. Phishing Analyzer frees your team to work on the most important priorities. </p>','\n',char(10)),'https://www.facebook.com/ReliaQuest/ ','https://www.twitter.com/ttps://twitter.com/ReliaQuest',': https://www.linkedin.com/company/reliaquest/ ','');
|
||
INSERT INTO vendors VALUES('cad6bcd1-04e9-46c1-bffc-9ef75dac5d7f','published','code42','Code42','code42.com','Code42 is the leader in Insider Risk Management. Native to the cloud, the Code42® Incydr™ solution rapidly detects data loss and speeds incident response without inhibiting employee productivity. With Code42, security professionals can protect corporate data and reduce insider threats while fostering an open and collaborative culture for employees.','100 Washington Avenue South','Suite 2000','Minneapolis','MN','USA','7a0f0ee2-4b81-43fb-9f3c-bd556ea3cc4f',replace('<h5>Code42</h5>\n<p>\nCode42 is the leader in Insider Risk Management (IRM), offering end-to-end data loss detection and response solutions. The Code42® Incydr™ product is native to the cloud and rapidly detects data exposure, loss, leak and theft as well as speeds incident response – all without lengthy deployments, complex policy management or blocking employee productivity. Accelerating the effectiveness of Insider Risk programs are the Code42® Instructor™ microlearning solution, and Code42’s full suite of expert services.\nWith Code42, security professionals can protect corporate data and reduce insider risk while fostering an open and collaborative culture for employees. Designed to meet regulatory control requirements, Code42’s IRM solution is FEDRAMP authorized and can be configured for GDPR, HIPAA, PCI and other compliance frameworks. Innovative organizations, including the fastest-growing security companies, rely on Code42 to safeguard their ideas.<br>\n</p>\n<h5>Why Code42?</h5>\n<p>Incydr is a SaaS product designed to stop data leak and IP theft caused by employees. It monitors corporate computer, cloud, and email systems to detect data exfiltration without overwhelming security teams or disrupting employee productivity.\nDeploys in days & does not require file inventory, data classification, web proxies, or regex policy creation and management\nDetects file exfiltration of IP and other critical business documents via web browsers, Git, USB, cloud apps, cloud sharing, AirDrop, email & more\nDetects and prioritizes insider threats using a library of more than 120 Insider Risk Indicators\nAllows you to programmatically protect data for departing employees, contractors, privileged users, & other high-risk user populations\nWith Incydr, organizations have the visibility and controls needed to address insider threats, unsanctioned cloud usage, IP theft, and employee mistakes – while allowing employee collaboration to thrive.</p>','\n',char(10)),NULL,'https://www.twitter.com/code42','https://www.linkedin.com/company/code-42-software-inc/','');
|
||
INSERT INTO vendors VALUES('65c9b2a9-acfe-4988-9e06-b48790d88aef','published','comcast-business','Comcast Business','www.business.comcast.com','Comcast Business is a leading connectivity provider for small and mid-size businesses and a rising leader in technology solutions for the Enterprise market.','1701 JFK Blvd.',NULL,'Philadelphia','PA','USA','df5811d0-c43b-484c-b72b-a6a4c4418f83',replace('<h5>Comcast Business</h5>\n<p>\nComcast Business powers businesses with innovative technology and a team of dedicated\nprofessionals with industry-leading expertise. Comcast Business offers a suite of Connectivity,\nCommunications, Cybersecurity, Wireless, and Managed Solutions to help organizations of all\nsizes prepare for what’s next. Powered by the nation’s largest Gig-speed broadband network and\nbacked by 24/7 customer support, Comcast Business is a leading connectivity provider for small\nand mid-size businesses and a rising leader in the Enterprise market. Comcast Business has\nbeen recognized by industry analysts and associations as a leader and innovator, including an\nAmerican Business Gold Award for Most Innovative Company in 2021.<br>\n</p>','\n',char(10)),'https://www.facebook.com/ComcastBusiness/','https://www.twitter.com/comcastbusiness','https://www.linkedin.com/company/comcast-business/','');
|
||
INSERT INTO vendors VALUES('6843a24a-b37d-4ae9-9bc9-8b729075aea4','published','cloud-native-computing-foundation-cncf','Cloud Native Computing Foundation (CNCF)','https://www.cncf.io/','CNCF is the vendor-neutral hub of cloud native computing, dedicated to making cloud native ubiquitous. ','548 Market St','PMB 57274','San Francisco ','CA','USA','f790a7f4-3162-40e6-8ad9-f3c934c1df53',replace('<h5>Cloud Native Computing Foundation (CNCF) </h5>\n<p>\nCNCF is the vendor-neutral hub of cloud native computing, dedicated to making cloud native ubiquitous. <br>\n</p>','\n',char(10)),'https://www.facebook.com/CloudNativeComputingFoundation/','https://www.twitter.com/cloudnativefdn','https://www.linkedin.com/company/cloud-native-computing-foundation/','');
|
||
INSERT INTO vendors VALUES('e58e3d1f-9ffa-403b-8d77-b9eed353d65c','published','radiant-logic','Radiant Logic','www.radiantlogic.com','Radiant Logic, the Identity Data Fabric company, helps organizations combat complexity and improve security by making identity data easy to use, manage, and protect. Improve decision making, accelerate innovation, and minimize risk with RadiantOne.','75 Rowland Way ','Suite 300','Novato','CA','USA','e6f6f1a9-6052-4b1e-b318-63e6411c12a0',replace('<h5>Radiant Logic</h5>\n<p>\nRadiant Logic, the enterprise Identity Data Fabric company, helps organizations combat complexity and improve security by making identity data easy to use, manage, and protect. The RadiantOne Platform turns identity data into a strategic asset, enabling organizations to improve decision making, accelerate innovation, and minimize risk.\nBuilt to overcome identity sprawl and technical debt, RadiantOne unifies identity information from disparate sources across legacy and cloud infrastructures to create an authoritative data pipeline that drives: Zero Trust Architecture; merger and acquisition integrations or divestitures; access, authorization, governance & administration processes; cloud migration initiatives; customer identity and access management; directory modernization efforts; and more. It’s a radically simple approach. Learn more at http://www.radiantlogic.com/<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/RadiantLogic','https://www.linkedin.com/company/radiant-logic/','');
|
||
INSERT INTO vendors VALUES('beb2144f-3b17-4dfb-92dc-40bc2178b0dc','published','crowdstrike','CrowdStrike','https://www.crowdstrike.com/',replace('CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data.\n\nCrowdStrike: We stop breaches.','\n',char(10)),'150 Mathilda Place ','Suite 300','Sunnyvale','CA','USA','59afe39a-17de-4f25-8e97-aef54e92325e',replace('<h5>CrowdStrike</h5>\n<p>\nCrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data.\nPowered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.\nPurpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.\nCrowdStrike: We stop breaches.<br>\n</p>','\n',char(10)),'https://www.facebook.com/CrowdStrike','https://www.twitter.com/CrowdStrike','https://www.linkedin.com/company/crowdstrike','');
|
||
INSERT INTO vendors VALUES('53186b3b-5cd7-482f-8887-3bd8d0eae7d7','published','ctm360','CTM360','www.ctm360.com','A global Digital Risk Protection Platform, CTM360® identifies vulnerabilities, and detects, manages and responds to threats in the Surface, Deep & Dark web. Offered as a fully managed technology platform in the cloud.','Office 2101 Bahrain Financial Harbour',NULL,'Manama',NULL,'BHR','a1924ef6-1962-4e51-aa97-bd004d1621f5',replace('<h5>CTM360</h5>\n<p>\nA global Digital Risk Protection Platform, CTM360® identifies vulnerabilities, and detects, manages, and responds to threats in the Surface, Deep & Dark web. Offered as a fully managed technology platform in the cloud, CTM360® is outside an organization''s perimeter.<br>\n</p>\n<h5>Why CTM360?</h5>\n<p>The platform was built and developed in-house on global standards without external collaboration, making it an independent technology.\nHackerView, the EASM platform, provides an inventory of your digital assets discovered automatically, identifies issues, and vulnerabilities, & generates a digital risk scorecard for organizations.\nThe DRP platform, CyberBlindspot, detects threats across the surface, deep and dark web, & monitors different types of incidents. These incidents include phishing, social media fraud, suspicious mobile apps etc.\nThreatCover, the CTI platform, enables environment hardening through security control recommendations.\nKey USPs\nPre-populated & pre-configured: no installation or configuration required\nHigh data quality and accuracy: all data is cataloged and curated with minimal false positives\nNo limitations: Unlimited takedowns, investigations & analysis\nComprehensive coverage: coverage of threats across the surface, deep and dark web, including future variants\n</p>','\n',char(10)),'https://www.facebook.com/ctm360','https://www.twitter.com/home','https://www.linkedin.com/company/','');
|
||
INSERT INTO vendors VALUES('0c00d01e-e340-4dea-8bab-771abd50b4b0','published','cequence-security','Cequence Security','www.cequence.ai','Cequence Unified API Protection maximizes API business value, eliminates shadow API risk and protects all APIs against attacks. Cequence, Know the Unknown, Protect the Unprotected ','100 S Murphy St.','#300','Sunnyvale','CA','USA','c47af136-462a-45cf-8783-9301e04f248e',replace('<h5>Cequence Security</h5>\n<p>\nCequence Security, the pioneer of Unified API Protection, is the only solution that unifies API discovery, inventory tracking, dynamic testing, risk analysis and native mitigation with proven, real-time threat protection against ever-evolving API attacks. Cequence Security secures more than 6 billion API calls a day and protects more than 2 billion user accounts across our Fortune 500 customers. Our customers trust us to protect their APIs and web applications with the most effective and adaptive defense against online fraud, business logic attacks, exploits and unintended data leakage, which enables them to remain resilient in today’s ever-changing business and threat landscape. <br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/cequenceai?s=11&t=5Zu_yekGnymmzfO91ofiHg','https://www.linkedin.com/company/cequence-security/','');
|
||
INSERT INTO vendors VALUES('aeec60fd-aeba-466b-b47b-1f9cffd78b5e','published','rackspace-technology-government-solutions','Rackspace Technology-Government Solutions','https://www.rackspace.com/industry/government','The Rackspace Government Solutions portfolio offers unparalleled multicloud, security and compliance expertise; empowering Public Sector organizations and their partners to confidently design, build, manage, and optimize the cloud. ','9836 Bowden Mill Court',NULL,'Land O Lakes','FL','USA','df34e4be-3612-415f-8f5c-dae1088ceceb',replace('<h5>Rackspace Technology-Government Solutions</h5>\n<p>\nThe Rackspace Government Solutions portfolio offers unparalleled multicloud, security and compliance expertise; empowering Public Sector organizations and their partners to confidently design, build, manage, and optimize the cloud. As a result, agencies, systems integrators (SIs), independent software vendors (ISVs) and educational institutions can accelerate innovation and agility – and meet mission and business requirements faster. Rackspace Technology Government Solutions enables customers to focus on being mission experts, rather than cloud experts.<br>\n</p>','\n',char(10)),'https://www.facebook.com/rackspacetechnology/','https://www.twitter.com/Rackspace','https://in.linkedin.com/company/rackspace-technology','');
|
||
INSERT INTO vendors VALUES('3218d75a-3839-4848-926b-c97c542489bd','published','cynet','Cynet','https://www.cynet.com/','Cynet’s end-to-end, natively automated XDR platform was purpose-built to enable lean IT security teams to easily achieve comprehensive, effective, and efficient protection regardless of their resources. ','33 Arch Street',NULL,'Boston','MA','USA','57fa4959-1da8-43d1-a2f7-2b0e4111075d',replace('<h5>Cynet</h5>\n<p>\nCynet’s end-to-end, natively automated XDR platform, backed by a 24/7 MDR service, was purpose-built to enable lean IT security teams to achieve comprehensive and effective protection regardless of their resources, team size, or skills. \nCynet delivers the prevention and detection capabilities of EPP, EDR, NDR, Deception, UBA, SSPM & CSPM, together with alert and activity correlation and extensive response automation capabilities.\nOur vision is to enable security teams to put their cybersecurity on autopilot and focus their limited resources on managing security rather than operating it. \nBring sanity back to cybersecurity with a fresh approach that makes protecting your organization easy and stress-less.<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/www.twitter.com/cynet360','www.linkedin.com/company/cynet-security','');
|
||
INSERT INTO vendors VALUES('688058d3-4c3c-46ca-ab1e-d5b6340860ef','published','cyera','Cyera','cyera.io','Cyera is the data security company that gives businesses visibility, context and control over their sensitive data. As a pioneer in Data Security Posture Management, Cyera empowers teams to reduce the attack surface and ensure operational resilience.','3 East 3rd Ave. ','Suite 200','San Mateo','CA','USA','c1cd25d3-bb42-40e9-a8b7-b028cccb12ab',replace('<h5>Cyera</h5>\n<p>\nCyera is the cloud data security and privacy company that gives businesses the context and control over their cloud data. The company’s mission is to empower its customers to enable innovation, securely. As the industry’s most advanced cloud data protection platform, Cyera instantly provides companies with a strong baseline for all security, risk management, privacy, and compliance efforts and ensures the entire organization operates with the same policies and guardrails.\nOur next-generation data security platform empowers security teams to manage and protect all of their company''s sensitive data. The cloud-native platform is purpose-built to provide visibility and contextualized insight into the risks that sensitive data, identities, and access represent. With Cyera, security teams can reduce access risk, contain data sprawl and ensure encryption from a single platform, allowing them to partner with the business to foster innovation and build value with security as an enabler.<br>\n</p>\n<h5>Why Cyera?</h5>\n<p>Cyera is revolutionizing the way businesses secure sensitive data. Digital transformation initiatives are creating data faster than ever before, making it nearly impossible for businesses to know what data they manage, where it’s stored, or if it’s secured. Cyera is the only Data Security Posture Management (DSPM) solution that provides holistic sensitive data security across SaaS, PaaS, and IaaS environments to answer those questions and provide consistent visibility and control.\nCyera puts data first, empowering security teams to harden their data security posture, ensure compliance, and optimize costs. Cyera’s cloud-native platform was purpose-built to elevate security teams from gatekeepers to critical partners in enabling collaboration and sharing securely.\nCyera enables innovation, securely with:\n* Sensitive Data Discovery and Classification\n* Data Security Posture Mgmt (DSPM)\n* Cloud Data Loss Prevention (DLP)\n* Data Access Governance\n* Data Privacy</p>','\n',char(10)),NULL,'https://www.twitter.com/cyera_io','https://www.linkedin.com/company/cyera/','');
|
||
INSERT INTO vendors VALUES('e5ffc932-ce9e-41d2-ad2b-ff2ad0c14e6c','published','cybersecurity-and-infrastructure-security-agency-cisa','Cybersecurity and Infrastructure Security Agency (CISA)','www.cisa.gov',replace('As America’s Cyber Defense Agency and the National Coordinator for critical infrastructure resiliency and security, CISA leads the national effort to understand, manage, and reduce risk to the cyber and physical infrastructure. \n','\n',char(10)),'1110 N. Glebe Road',NULL,'Arlington','VA','USA','1f8be747-0db2-486e-b2f4-df557c038dba',replace('<h5>Cybersecurity and Infrastructure Security Agency (CISA)</h5>\n<p>\nAs America’s Cyber Defense Agency and the National Coordinator for critical infrastructure resiliency and security, CISA leads the national effort to understand, manage, and reduce risk to the cyber and physical infrastructure.\n<br>\n</p>','\n',char(10)),'https://www.facebook.com/CISA','https://www.twitter.com/cisagov','https://www.linkedin.com/company/cisagov','');
|
||
INSERT INTO vendors VALUES('e84be716-0bce-4cc6-bce4-aa718786a995','published','cyderes','Cyderes','www.cyderes.com','As the #1 MSSP in the world (Cyber Defense Magazine’s 2021 Top MSSPs List), Cyderes is a global cybersecurity powerhouse offering comprehensive solutions around managed security, identity and access management, and professional services.','13333 Holmes Rd',NULL,'Kansas City','MO','USA','abd68097-6918-497d-8232-211cde0ec553',replace('<h5>Cyderes</h5>\n<p>\nCyderes (cyber-defense-and-response) provides best-in-class managed security services on a global scale, for the modern digital workforce. Born from the best of two award-winning cybersecurity companies, Herjavec Group and Fishtech Group, Cyderes provides the people, processes, and technology to manage risk, and detect and respond to any threats – in ways that are better, faster, more scalable, and more cost-effective than traditional in-house solutions. <br>\n</p>\n<h5>Why Cyderes?</h5>\n<p>Cyderes Managed Services delivers world class security-as-a-service. We enable our customers to focus their resources on growing their business while we help address their threats in a way that’s better, faster, more cost effective, and more scalable than in-house solutions. </p>','\n',char(10)),'https://www.facebook.com/CyderesFB','https://www.twitter.com/Cyderes','https://www.linkedin.com/company/47729/','');
|
||
INSERT INTO vendors VALUES('847d9358-4ff8-420b-9ee4-e2b4a6e345a9','published','cyberhaven','Cyberhaven','https://www.cyberhaven.com/','Cyberhaven is the data security company transforming how companies protect their valuable information. Our data tracing technology protects data other security products can’t see, from threats they can’t detect, across assets they can’t control.','101 Metro Dr.','Suite #340','San Jose','CA','USA','5e0176d9-55e2-4b38-bb07-90b2ebc2000a',replace('<h5>Cyberhaven</h5>\n<p>\nWith the industry’s first Data Detection and Response (DDR) platform, Cyberhaven protects intellectual property and sensitive data from theft and mis-use by mapping the full journey of every piece of data to accurately classify sensitive data, detect risk, and proactively enforce policy for any organization that believes data is a key differentiator in their business.\nEvery day, millions of sensitive documents, files, and other data are being exfiltrated because traditional data security products have failed to do their job, resulting in an estimated $600B annual cost to the US economy.\nThese data breaches cause severe near- and long-term impact, including stolen IP, business interruptions, loss of customer trust, weakened competitiveness, and significant financial penalties. Cyberhaven will help organizations secure all of the data they must protect in order to compete and thrive in the digital economy. It’s one big hairy problem and we are up to the challenge.<br>\n</p>\n<h5>Why Cyberhaven?</h5>\n<p>Cyberhaven Data Detection and Response is a better way to protect your important data.\nLet’s face it, data security products never lived up to our expectations and now that the way we work is changing they can’t keep up. Cyberhaven solves these challenges so companies can finally protect their data. Key capabilities of the solution include:\nStop data exfiltration anywhere\nBlock important data from leaving your control via cloud, web, email, removable storage, and more.\nUnderstand how data flows\nSee what systems store different types of data and how data moves within the company to new places and people.\nDetect and stop risky behavior\nInstantly detect when a user handles important data in a risky way and stop them in real time while coaching them.\nAccelerate internal investigations\nQuickly understand user intent with the full context of an incident and a forensic record of all events collected remotely. </p>','\n',char(10)),'https://www.facebook.com/cyberhaven/','https://www.twitter.com/CyberhavenInc','https://www.linkedin.com/company/cyberhaven/','');
|
||
INSERT INTO vendors VALUES('31be7484-533f-4f6f-bcb0-45733eee44ab','published','cycode','Cycode','www.cycode.com','Application Security That Delivers Visibility And Integrity Across The SDLC','181 Metro Drive ','Suite 290','San Jose','CA','USA','ce2db507-30b8-4660-9992-7e0a2b260ac5',replace('<h5>Cycode</h5>\n<p>\nCycode is the leader in Application Security from Code to Cloud. We enable DevSecOps to coordinate across tools and phases of the SLDC to securely deliver Applications at the speed of business.<br>\n</p>\n<h5>Why Cycode?</h5>\n<p>Cycode’s modern approach to application security enables organizations to effectively secure their cloud-native applications with cost-efficient use of tooling and staff across the SDLC.\nCycode provides: A single unified software supply chain security platform that consolidates secret scanning, SAST, SCA, container scanning, IaC scanning, pipeline security and governance, and code leak detection; Complete visibility of application security risks with rapid deployment and agentless integrations; Alert prioritization that optimizes remediation based on event correlation from code to cloud; Developer workflow integrations that incorporate security processes into development while giving security teams the visibility and control to reduce risk.\nCycode gives security teams the ability to drive digital transformation through a unified, cost-effective program that delivers, high-efficiency risk mitigation, tool consolidation and cost reduction, and business acceleration.</p>','\n',char(10)),'https://www.facebook.com/Life.at.Cycode','https://www.twitter.com/CycodeHQ','https://www.linkedin.com/company/cycode','');
|
||
INSERT INTO vendors VALUES('892f5955-572d-4cdf-aff7-ced84bed8eb7','published','censys','Censys','https://censys.io/','The one place to understand everything on the internet. Censys is the proven leader in Attack Surface Management by relentlessly searching and proactively monitoring your digital footprint far more broadly and deeply than ever thought possible.','116 S Main Street',NULL,'Ann Arbor','MI','USA','df6e98c8-789c-4c7f-89bf-93e651548516',replace('<h5>Censys</h5>\n<p>\nCensys is the leading Internet Intelligence platform for Threat Hunting and Exposure Management. At Censys, we work relentlessly to make the internet a secure place for everyone. As the leading Attack Surface Management provider, we take the guesswork out of understanding and protecting the organization''s digital footprint. From the world''s most comprehensive real-time view of global networks and devices, Censys provides a comprehensive profile of the exposed assets on the internet, delivering the tools and insights to manage potential risks. Censys empowers security teams with the most comprehensive, accurate, and up-to-date map of the internet to defend attack surfaces and hunt for threats. From the corporate network to the cloud and beyond, a secure internet starts with Censys. Start your Censys today at www.censys.io. <br>\n</p>\n<h5>Why Censys?</h5>\n<p>The threat environment is rapidly evolving and bad actors are adjusting their tactics at alarming rates. As a result, today’s organizations need to be vigilant to protect themselves and their customers from harmful breaches. With Censys, organizations can get the most accurate data available, enabling teams to take down threats as close to real-time as possible. We scan the top 137 ports and the top 1440 ports in the cloud on a daily basis, while refreshing all known services within a 24-hour time frame. Censys provides a rich understanding of everything on the internet, enabling security teams to understand asset connections, current configurations, and discovered threat details. Additionally, security teams get access to the potential impacts of each risk and recommended steps for remediation. Through our advanced attribution engine, seed data is exposed to show connected assets, which are then enriched with contextual data for even deeper visibility.</p>','\n',char(10)),NULL,'https://www.twitter.com/censysio','https://www.linkedin.com/company/censysio/','');
|
||
INSERT INTO vendors VALUES('fdf4a9b9-8d34-4ebd-a371-76ab01deee41','published','critical-start','Critical Start','https://www.criticalstart.com',replace('CRITICALSTART® simplifies breach prevention with managed detection and incident response services powered by our Zero Trust Analytics Platform™ (ZTAP), seasoned SOC, and threat intelligence experts.\n','\n',char(10)),'6100 Tennyson Parkway ','Suite 200','Plano','TX','USA','7b1337ef-d161-4ca2-b0b0-ee98fe45053c',replace('<h5>Critical Start</h5>\n<p>\nCRITICALSTART® simplifies breach prevention by delivering the most effective managed detection and incident response services powered by our Zero Trust Analytics Platform™ and the industry’s only Trusted Behavior Registry™ and MOBILESOC®. With 24x7 expert security analysts, and Cyber Research Unit, we monitor, investigate, and remediate alerts swiftly and effectively, via contractual Service Level Agreements for Time to Detection and Median Time to Resolution, and 100% transparency into our service.\n<br>\n</p>\n<h5>Why Critical Start?</h5>\n<p>Critical Start MDR Services extends your team with a complete enterprise solution comprised of services, exclusive technology and well-trained, seasoned security experts that deeply understand, adapt and scale with an organization’s unique needs and collaborate with you to detect, investigate and respond to all alerts. Our industry leading Trusted Behavior Registry within ZTAP is built to resolve all alerts. While others are focused on finding bad; we focus on finding the good. While others prioritize or suppress alerts, we say bring us every alert! Critical Start is the only MDR service provider leveraging this proprietary technology to help enterprise organizations scale their threat detection and response program and reduce risk exposure. •Optimize security investments: 80% reduction in false positives on the first day of production monitoring •Improve team efficacy: Reduce alert volume by more than 99% •Reduce and mitigate risk exposure: We resolve more than 99% of alerts</p>','\n',char(10)),'https://www.facebook.com/CriticalStartMDR/','https://www.twitter.com/CRITICALSTART','https://www.linkedin.com/company/critical-start/','');
|
||
INSERT INTO vendors VALUES('31296221-5bd7-495f-a6d6-3a224eb29c25','published','contrast-security','Contrast Security','https://www.contrastsecurity.com/','Contrast Security is a world-leading code security platform company purposely built for developers to get secure code moving and trusted by security teams to protect business applications.','240 Third Street ','Suite 200','Los Altos','CA','USA','d8b932e2-176d-472c-9e01-adeede165e7d',replace('<h5>Contrast Security</h5>\n<p>\nContrast Security is a world-leading code security platform company purposely built for developers to get secure code moving and trusted by security teams to protect business applications. Developers, security and operations teams quickly secure code across the complete Software Development Life Cycle (SDLC) with Contrast to protect against today’s targeted Application Security (AppSec) attacks. Contrast also makes security testing available to all developers for free with CodeSec. With today’s pressures to develop business applications at increasingly rapid paces, the Contrast Secure Code Platform identifies 3x more actual vulnerabilities, resulting in faster remediation without the noise of time-consuming false positives.\n<br>\n</p>\n<h5>Why Contrast Security?</h5>\n<p>Contrast was established to replace legacy AppSec solutions that cannot protect modern enterprises. The Contrast Secure Code Platform identifies 3x more actual vulnerabilities, resulting in faster remediation without the noise of time-consuming false positives. Contrast’s platform solutions for code assessment, testing, protection, serverless, supply chain, application programming interfaces (APIs) and languages help enterprises achieve true DevSecOps transformation and compliance.\nContrast protects against major cybersecurity attacks for its customer base, which represents some of the largest brand-name companies in the world, including BMW, DocuSign, AXA, Zurich, Sompo Japan and American Red Cross, as well as numerous other leading global Fortune 500 enterprises. Contrast partners with global organizations such as AWS, Microsoft, IBM Cloud, Guidepoint, Deloitte and Carahsoft, to seamlessly integrate and achieve the highest level of security for customers.\n</p>','\n',char(10)),'https://www.facebook.com/contrastsec','https://www.twitter.com/contrastsec','https://www.linkedin.com/company/contrast-security/','');
|
||
INSERT INTO vendors VALUES('8477a943-d174-408a-badc-99f73270df3d','published','cigent','Cigent','www.cigent.com','We protect your data from insiders and external sources, such as ransomware and malware (including wiper). Our strategy integrates preventative measures into both storage and individual files, ensuring complete protection throughout their lifespan.','2211 Widman Way ','Suite 150','Ft Meyers','FL','USA','23bf22ee-4d16-48e2-98aa-4381c5cd3dee',replace('<h5>Cigent</h5>\n<p>\nCigent offers a new approach to data security for organizations of all sizes to stop ransomware and data theft, as well as achieve compliance. Cigent protects your most valuable asset - your data - against the most sophisticated adversaries. We protect data throughout its lifecycle via prevention-based defenses embedded into storage and individual files. From decades of data recovery, cybersecurity, and device sanitization experience, the experts at Cigent have developed prevention methods beyond anything that exists today. Cigent.com.<br>\n</p>\n<h5>Why Cigent?</h5>\n<p>Current protections will continue to be bypassed. To fully secure data, Cigent created two discrete solutions. Both products incorporate the latest in data protection technology that can stand up against the most advanced adversaries and data attack techniques.\nDATA DEFENSE (Software as a Service): Truly stop ransomware and data theft for all files on your endpoint devices with MFA for File Access. Further make data invisible protected by non-recoverable keys on devices with secure storage. And keep data secure wherever it goes with file encryption and secure file sharing.\nSECURE SSD (Secure Storage): Government-certified Data at Rest (DAR) protection that complies with FIPS, CC, and CSfC, protecting data on any O/S with full disk encryption, MFA, crypto erase, verified full drive erasure and on Windows OS makes data invisible, automatically responds to threats, and has immutable insider detection.</p>','\n',char(10)),'https://www.facebook.com/profile.php?id=100089315479996','https://www.twitter.com/Cigent_Tech','https://www.linkedin.com/company/cigent/','');
|
||
INSERT INTO vendors VALUES('eec6ed64-bd67-4de8-b207-e07f20317521','published','concentric-ai','Concentric AI','www.concentric.ai','Concentric AI''s Data Security Posture Management solutions uses deep learning to accurately categorize data, assess risk, and remediate security issues – without relying on upfront rules or complex configuration and can be deployed in minutes.','19548 Chardonnay Ct.',NULL,'Saratoga','CA','USA','fafdea11-1125-446e-b91d-e6ee839efdf3',replace('<h5>Concentric AI</h5>\n<p>\nWith Concentric AI, organizations can finally address their unmet data security needs by discovering and protecting business-critical content in unstructured and structured data. Concentric AI protects intellectual property, financial documents, PII/PCI content, customer data, business confidential data and more, across on-premises and cloud-based data stores, as well as messaging and communication applications. The Concentric AI Data Security Posture Management (DSPM) solution uses deep learning and Risk Distance™ analysis to accurately categorize data, assess risk, and remediate security issues – without relying on upfront rules or complex configuration. Deploy Concentric AI''s agentless platform in minutes and see value in days, with little ongoing administration for security teams manage once deployed.<br>\n</p>\n<h5>Why Concentric AI?</h5>\n<p>Concentric Semantic Intelligence solution uses sophisticated machine learning technologies to autonomously scan and categorize data. Our solution discovers and categorizes all your data, from financial data to PII/PHI/PCI to intellectual property to business confidential information. With the MIND™ deep learning-as-a-service capability, customers will always have the latest AI models for fast, accurate discovery and categorization.\nConcentric Risk Distance analysis engine comprehensively identifies data that may be at risk due to various factors: inappropriate classification, inaccurate permissions, unauthorized access and entitlements, link sharing, sharing with third parties, personal email addresses, or risky sharing within your company. With our robust data access governance, your organization will know where your business-critical content is, who has access to it, and whether it has been shared or accessed inappropriately.</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/concentricinc','');
|
||
INSERT INTO vendors VALUES('dcb8b53f-92da-4026-8bd3-1fbc6ba93361','published','cyberint','CYBERINT','https://www.cyberint.com/','Cyberint fuses threat intelligence with attack surface management, providing extensive integrated visibility into their external risk exposure. Leveraging autonomous discovery of all external-facing assets, coupled with open, deep & dark intelligence','17 Ha-Mefalsim St',NULL,'Petah Tikva',NULL,'ISR','c5d0ad8f-ac7e-4ddc-a033-66229d253670',replace('<h5>CYBERINT</h5>\n<p>\nCyberint is a cybersecurity solution provider that pioneered attack surface reconnaissance. The solution fuses threat intelligence with attack surface management, providing organizations with extensive integrated visibility into their external risk exposure. Leveraging autonomous discovery of all external-facing assets, coupled with open, deep & dark web intelligence, it allows cybersecurity teams to uncover their most relevant known and unknown digital risks - earlier. Global customers, including Fortune 500 leaders across all major market verticals, rely on Cyberint to prevent, detect, investigate, and remediate phishing, fraud, ransomware, brand abuse, data leaks, external vulnerabilities and more, ensuring continuous external protection from cyber threats.<br>\n</p>','\n',char(10)),'https://www.facebook.com/Cyberint','https://www.twitter.com/cyber_int','https://www.linkedin.com/company/cyberint','');
|
||
INSERT INTO vendors VALUES('57c46619-df18-461b-a1be-74c153ebe70e','published','corelight','Corelight','www.corelight.com','Corelight transforms network and cloud activity into evidence so that data-first defenders can stay ahead of ever-changing attacks.','548 Market Street','PMB 77799','San Francisco','CA','USA','26034204-f261-4d72-9492-d49a1fa94418',replace('<h5>Corelight</h5>\n<p>\nCorelight transforms network and cloud activity into evidence so that data-first defenders can stay ahead of ever-changing attacks. Delivered by our open NDR platform, Corelight’s comprehensive, correlated evidence gives you unparalleled visibility into your network. This evidence allows you to unlock new analytics, investigate faster, hunt like an expert, and even disrupt future attacks.\nOur on-prem and cloud sensors go anywhere to capture structured, industry-standard telemetry and insights that work with the tools and processes you already use. Corelight’s global customers include Fortune 500 companies, major government agencies, and research universities.<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/corelight_inc','https://www.linkedin.com/company/corelight/','');
|
||
INSERT INTO vendors VALUES('8dec4965-53a2-4fda-beea-54f9f12d6049','published','cloudflare','Cloudflare','https://www.cloudflare.com/','Cloudflare is the security, performance, and reliability company on a mission to help build a better Internet — Running one of the world’s largest networks, Cloudflare powers & secures anything connected to the Internet including about 20% of the web','101 Townsend Street',NULL,'San Francisco','CA','USA','3223f725-a14d-4130-8089-eac8c2af1941',replace('<h5>Cloudflare</h5>\n<p>\nCloudflare, Inc. (www.cloudflare.com / @cloudflare) is on a mission to help build a better Internet. Cloudflare’s suite of products protect and accelerate any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare have all web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was awarded by Reuters Events for Global Responsible Business in 2020, named to Fast Company''s Most Innovative Companies in 2021, and ranked among Newsweek''s Top 100 Most Loved Workplaces in 2022.<br>\n</p>\n<h5>Why Cloudflare?</h5>\n<p>Everywhere Security means protecting employees, applications, and networks, everywhere. At Cloudflare, we do this with our cloud platform powered by threat intelligence from our ultrafast globe-spanning network. We improve security, reduce complexity and deliver higher performance so our customers can innovate with confidence. We help secure hybrid work, and deliver industry-leading defense against the growing threat landscape across key vectors such as applications, API, email and DNS. We do this with our unified, cloud-delivered security and networking platform, powered by our intelligently-driven network. The days of siloed products, porous security, and slow, unreliable application and network performance are over. Now you can consolidate vendors, dramatically improve your secure posture, and drive application and network performance better than ever. Cloudflare One delivers security and networking to provide a leading Secure Access Service Edge (SASE) or Zero Trust Edge solution.</p>','\n',char(10)),'https://www.facebook.com/Cloudflare/','https://www.twitter.com/Cloudflare','https://www.linkedin.com/company/cloudflare','');
|
||
INSERT INTO vendors VALUES('69a939a8-5b30-42c1-b710-e6436455a4a4','published','cisco','Cisco','www.cisco.com','Cisco''s the worldwide leader in technology that powers the Internet. Cisco inspires new possibilities by reimagining your applications, securing your data, transforming your infrastructure, and empowering your teams for a global and inclusive future.','170 W. Tasman Drive',NULL,'San Jose','CA','USA','d0f8a973-e5f3-4989-9513-dcdd233ab3cd',replace('<h5>Cisco</h5>\n<p>\nCisco''s the worldwide leader in technology that powers the Internet. Cisco inspires new possibilities by reimagining your applications, securing your data, transforming your infrastructure, and empowering your teams for a global and inclusive future.<br>\n</p>','\n',char(10)),'https://www.facebook.com/ciscosecure/','https://www.twitter.com/CiscoSecure','https://www.linkedin.com/showcase/cisco-secure/','');
|
||
INSERT INTO vendors VALUES('06a7de0b-7754-4b19-8b7d-97c97b394b34','published','cato-networks','Cato Networks','www.catonetworks.com','Cato is the world’s first SASE platform, converging SD-WAN and network security into a global cloud-native service. Cato optimizes and secures application access for all users and locations. CatoNetworks.com ','3031 Tisch Way, 110 Plaza West',NULL,'San Jose','CA','USA','b69ecf83-09ec-4f83-9c6f-e6cf34eed37c',replace('<h5>Cato Networks</h5>\n<p>\nCato provides the world’s most robust single-vendor SASE platform, converging Cato SD-WAN and a cloud-native security service edge, Cato SSE 360, into a global cloud service. Cato SASE Cloud optimizes and secures application access for all users and locations everywhere. Using Cato, customers easily replace costly and rigid legacy MPLS with modern network architecture based on SD-WAN, secure and optimize a hybrid workforce working from anywhere, and enable seamless cloud migration. Cato enforces granular access policies, protects users against threats, and prevents sensitive data loss, all easily managed from a single pane of glass. With Cato your business is ready for whatever’s next.\nCatoNetworks.com @CatoNetworks.\nCato. Ready for Whatever’s Next.\n<br>\n</p>\n<h5>Why Cato Networks?</h5>\n<p>Cato provides the world’s most robust single-vendor SASE platform, converging Cato SD-WAN and a cloud-native security service edge, Cato SSE 360, into a global cloud service. Cato SASE Cloud optimizes and secures application access for all users and locations everywhere. Using Cato, customers easily replace costly and rigid legacy MPLS with modern network architecture based on SD-WAN, secure and optimize a hybrid workforce working from anywhere, and enable seamless cloud migration. Cato enforces granular access policies, protects users against threats, and prevents sensitive data loss, all easily managed from a single pane of glass. With Cato your business is ready for whatever’s next.\nCatoNetworks.com @CatoNetworks.\nCato. Ready for Whatever’s Next.\n</p>','\n',char(10)),'https://www.facebook.com/CatoNetworks','https://www.twitter.com/CatoNetworks','https://www.linkedin.com/company/cato-networks/','');
|
||
INSERT INTO vendors VALUES('9d66370c-da05-4e8d-ab77-3b7c77f70cb1','published','cardinalops','CardinalOps','www.cardinalops.com','Proactively eliminate detection coverage gaps with automation, analytics, and MITRE ATT&CK. The CardinalOps detection posture management platform helps you close critical security gaps in your existing SIEM/XDR and build a threat-informed defense.','1007 North Orange St',NULL,'Wilmington','DE','USA','948987a4-0644-4688-88db-053a2a59a133',replace('<h5>CardinalOps</h5>\n<p>\nCardinalOps’ mission is to improve the effectiveness and efficiency of an organization’s existing SOC tools through continuous detection posture management. CardinalOps’ cloud-based platform continuously audits an organization’s readiness to defend against the most used and dangerous attack methods utilized by malicious actors as laid out in the MITRE ATT&CK framework. With CardinalOps, organizations can close critical security gaps in their existing SIEM/XDR, optimize their security techniques and gain comprehensive visibility into their detection posture. Using built-in analytics and MITRE ATT&CK, the CardinalOps automation platform maximizes the effectiveness of your existing SIEM/XDR by continuously identifying and remediating detection coverage gaps — so you can easily implement a proactive, adversary-informed defense to reduce risk of breach, based on your business priorities. Visit www.cardinalops.com to learn more.<br>\n</p>\n<h5>Why CardinalOps?</h5>\n<p>The CardinalOps detection posture management platform uses analytics and MITRE ATT&CK to maximize the effectiveness of your existing SIEM/XDR and security stack. It continuously identifies and remediates detection coverage gaps — based on your business priorities and the adversary techniques and APTs most relevant to your organization — so you can easily implement a proactive, adversary-informed defense to reduce risk of breach. Importantly, it also allows you to keep the significant investments you’ve already made in your current security stack. By providing continuous visibility into your current detection posture – with metrics and board-level reporting based on the standard MITRE ATT&CK framework – the platform enables you to programmatically answer the question “How exposed are we?”. Setup takes less than an hour and it easily connects via the native APIs of your SIEM/XDR. What’s more, it helps boost your detection engineering team’s productivity 10x compared to manual processes.</p>','\n',char(10)),NULL,'https://www.twitter.com/CardinalOps','https://www.linkedin.com/company/cardinalops','');
|
||
INSERT INTO vendors VALUES('4b1b45d1-a45c-48a5-b776-f94d7f344415','published','center-for-internet-security','Center for Internet Security','www.cisecurity.org',replace('CIS® is responsible for the CIS Benchmarks™ and CIS Critical Security Controls®, globally recognized best practices for securing IT systems and data. Our CIS Hardened Images® provide secure, on-demand, scalable computing environments in the cloud.\n','\n',char(10)),'31 Tech Valley Drive ','Suite 2','East Greenbush','NY','USA','21e6bc8d-e614-4ace-97c8-d28dd8e2d94e',replace('<h5>Center for Internet Security</h5>\n<p>\nCIS® is responsible for the CIS Benchmarks™ and CIS Critical Security Controls®, globally recognized best practices for securing IT systems and data. Our CIS Hardened Images® provide secure, on-demand, scalable computing environments in the cloud.<br>\n</p>\n<h5>Why Center for Internet Security?</h5>\n<p>The Center for Internet Security, Inc. (CIS®) is responsible for globally recognized best practices for securing IT systems and data including the CIS Benchmarks™ and CIS Critical Security Controls®. Our CIS Hardened Images® provide secure, on-demand, scalable computing environments in the cloud.\nThe Multi-State Information Sharing and Analysis Center® (MS-ISAC®), is the key resource for cyber threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) governments. The mission of the MS-ISAC is to improve the cybersecurity posture of the nation’s SLTT governments through coordination, collaboration, and cooperation.</p>','\n',char(10)),'https://www.facebook.com/CenterforIntSec/','https://www.twitter.com/CISecurity/','linkedin.com/company/the-center-for-internet-security/','');
|
||
INSERT INTO vendors VALUES('dbe52e54-c494-4ab2-9f35-f716bb65e044','published','cyral','Cyral','www.cyral.com','The Last Line of Defense For Data - Secure databases in any cloud with authentication, authorization, and auditing controls.','691 S Milpitas Blvd. ','Suite 212','Milpitas','CA','USA','73e4f1c9-234f-4d5f-a879-f98586c0eb5d',replace('<h5>Cyral</h5>\n<p>\nMost companies don’t know what data they have, where it is stored, or who has access to the data. As more users, applications, and services require access to sensitive datasets across multiple clouds, security organizations struggle to keep pace with the growing risks, complexity, and costs associated with securing data.\nCyral automates least privilege for your most sensitive datasets to reduce risk, complexity, and cost. The Cyral Platform discovers these datasets, unifies access controls for users and applications, and enables fine-grained authorization policies as code, which enables risk-based governance and limits the blast radius of data breaches.\n<br>\n</p>','\n',char(10)),'https://www.facebook.com/CyralInc/','https://www.twitter.com/cyralinc','https://www.linkedin.com/company/cyral/','');
|
||
INSERT INTO vendors VALUES('29ec6fd2-6df2-4ff1-8a71-606f72d8a074','published','cohesity','Cohesity','https://www.cohesity.com/','Cohesity is a leader in data security and management. Cohesity protects the world’s most critical data workloads and provides organizations a simple way to secure and manage their data across data centers, edge, and cloud. ','300 Park Ave ','Suite 1700','San Jose','CA','USA','0b2485b3-4153-4011-9fec-8d5922044fc2',replace('<h5>Cohesity</h5>\n<p>\nCohesity is a leader in data security and management. We make it easy to secure, protect, manage, and derive value from data — across the data center, edge and cloud. We offer a full suite of services consolidated on one multicloud data platform: backup and recovery, data security, disaster recovery, file and object services, dev/test, and analytics — reducing complexity and eliminating mass data fragmentation. <br>\n</p>\n<h5>Why Cohesity?</h5>\n<p>Cohesity helps organizations recover from ransomware and other cyber threats with comprehensive data protection and security. Our solution ensures the quick recovery of critical data and business processes. It is simple, scalable, and secure, making it ideal for managing and protecting complex infrastructures and ensuring cyber resiliency.\nCohesity uses Al/ML to protect data and detect threats with support across all sources and types. Cohesity supports modern environments with protection for cloud, Saas, on-premises, and edge; managed by customers or partners for maximum flexibility.\nSimplicity: Organizations can provide global data protection with a single platform.\nScalability: Support for scalable enterprise performance and hybrid requirements today including SaaS, on-premises and cloud.\nSecurity: Beyond zero-trust principles with extensive features driven by AI/ML and award-winning solutions, and integration to existing security operations to accelerate recovery.\n</p>','\n',char(10)),'https://www.facebook.com/cohesity/','https://www.twitter.com/Cohesity','https://www.linkedin.com/company/cohesity/','');
|
||
INSERT INTO vendors VALUES('1391e6ea-6b73-4ffd-81dc-2090c88f0f21','published','cyber-defense-magazine','Cyber Defense Magazine','www.cyberdefensemagazine.com',NULL,'1717 Pennsylvania Avenue NW','10th Floor, Suite 1025 ','Washington','DC','USA','260216c3-b94b-47a1-8d26-40ba9fc2c2e1',replace('<h5>Cyber Defense Magazine</h5>\n<p>\n<br>\n</p>','\n',char(10)),NULL,NULL,NULL,'');
|
||
INSERT INTO vendors VALUES('6d60bceb-4cfc-4a99-978b-20448001649f','published','bolster-inc','Bolster, Inc.','www.bolster.ai',replace('Bolster offers the only platform in the world that automates the detection, analysis, and takedown of threats across domains, social media, app stores, and the dark web.\n\n','\n',char(10)),'4940 El Camino Real ','#200','Los Altos','CA','USA','5f308cd9-00e4-4284-b7b5-b2499f9dc434',replace('<h5>Bolster, Inc.</h5>\n<p>\nBolster offers the only platform in the world that automates the detection, analysis, and takedown of threats across domains, social media, app stores, and the dark web.\n<br>\n</p>\n<h5>Why Bolster, Inc.?</h5>\n<p>Massive new attack surfaces have emerged across the digital ecosystem making companies more vulnerable than ever. The same touch points you use to connect with customers and employees are being exploited by attackers to phish credentials, steal private data, destroy customer trust, and worse. And these phishing scams are more sophisticated and convincing than ever before. To make matters worse, every piece of fraud has a digital component making people-based or legacy approaches nearly impossible to scale with the massive volume of data on the web.\nTo solve this, we created a revolutionary phishing and scam protection solution for the internet. Bolster offers the only platform in the world that automates the detection, analysis, and takedown of threats across domains, social media, app stores, and the dark web.</p>','\n',char(10)),NULL,'https://www.twitter.com/BolsterAI','https://www.linkedin.com/company/bolster-ai/','');
|
||
INSERT INTO vendors VALUES('ed64ecac-510f-4fb2-9e05-c77e8e385e24','published','bright-data','Bright Data','brightdata.com','Bright Data is the leading web data platform, with Fortune 500 companies, universities, & small businesses relying on its solutions to retrieve reliable web data efficiently, in order to make better business decisions, faster.','4 Hamahshev St.',NULL,'Netanya',NULL,'ISR','7c14458c-8e0a-4464-be0b-162c4536c7f5',replace('<h5>Bright Data</h5>\n<p>\nBright Data is the leading web data platform and first line of defense against cybersecurity threats, with Fortune 500 companies & small businesses relying on its solutions to fight fraud, mitigate risk, and achieve real-time visibility.<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/bright_data','https://www.linkedin.com/company/bright-data/','');
|
||
INSERT INTO vendors VALUES('99c58572-d859-4e54-926b-42c7a10af4ed','published','beyondtrust','BeyondTrust','www.beyondtrust.com','BeyondTrust is the worldwide leader in intelligent identity and access security, empowering organizations to protect identities, stop threats, and deliver dynamic access to empower and secure a work-from-anywhere world.','11695 Johns Creek Parkway','Suite 200','Johns Creek','GA','USA','3730a8eb-ceed-4e64-8ae3-6212022a1851',replace('<h5>BeyondTrust</h5>\n<p>\nBeyondTrust is the worldwide leader in intelligent identity and access security, empowering organizations to protect identities, stop threats, and deliver dynamic access to empower and secure a work-from-anywhere world. Our integrated products and platform offer the industry''s most advanced privileged access management (PAM) solution, enabling organizations to quickly shrink their attack surface across traditional, cloud and hybrid environments.\nWith a heritage of innovation and a staunch commitment to customers, BeyondTrust solutions are easy to deploy, manage, and scale as businesses evolve. We are trusted by 20,000 customers, including 75 of the Fortune 100, and a global partner network. Learn more at www.beyondtrust.com. <br>\n</p>\n<h5>Why BeyondTrust?</h5>\n<p>Security Solutions That Drive Your Business\nBeyondTrust protects identities and critical access from security threats while creating operational efficiencies. Our integrated platform delivers fast time to value with solutions that are not only simple to deploy but also enable a superior user experience.\nPassword Safe\nGain visibility and control of Privileged Credentials and secrets\nPrivileged Remote Access\nManage and audit employee and vendor remote access\nRemote Support\nSecurely access and support any device or system in the world\nCloud Privilege Broker\nVisualize and right-size entitlements across clouds\nActive Directory Bridge\nExtend and manage Unix/Linux authentication and group policies\nPrivilege Management for Unix & Linux\nImplement unmatched privilege access security\nPrivilege Management for Windows & Mac\nEnforce least privilege and control applications</p>','\n',char(10)),'https://www.facebook.com/BeyondTrust','https://www.twitter.com/beyondtrust','https://www.linkedin.com/company/beyondtrust','');
|
||
INSERT INTO vendors VALUES('25973a96-414b-4a29-8555-bbaf23c32711','published','grammatech','GrammaTech','www.grammatech.com','GrammaTech is a leading provider of product security solutions. CodeSonar''s (SAST) integrates into a team''s DevSecOps process . CodeSentry discovers vulnerabilities with out access to source code while creating a software bill of material (SBOM).','6903 Rockledge Drive','Suite 1250','Bethesda','MD','USA','0fc6ebd3-a1ad-46f2-a60c-4cffcc292fc2',replace('<h5>GrammaTech</h5>\n<p>\nGrammaTech is a leading global provider of product security solutions used by the world''s most security conscious organizations to detect, measure, analyze and resolve vulnerabilities for software they develop or use. CodeSonar''s (SAST) static analysis engine is extraordinarily deep, finding 3-5 times more defects on average than other static analysis tools and can be seamlessly integrated into a team''s DevSecOps process to enable rapid developer adoption.\nOur Binary software composition analysis (SCA) product CodeSentry discovers vulnerabilities when you don’t have access to the source code while creating a software bill of material (SBOM) to secure your software supply chain.\nThe company is also a trusted cybersecurity and artificial intelligence research partner for the nation’s civil, defense, and intelligence agencies.\n<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/GrammaTech','https://www.linkedin.com/company/grammatech','');
|
||
INSERT INTO vendors VALUES('db15c021-4896-4c34-bd7f-ff12a5ed2ae2','published','cybereason','Cybereason','www.cybereason.com',replace('Cybereason arms today’s cyber defenders, with an AI-driven security platform, the most effective in the history of MITRE testing, that can end attacks on the endpoint, across the enterprise, and everywhere the battle is waged. \n','\n',char(10)),'200 Clarendon St ','18th Floor','Boston','MA','USA','c5679973-1a39-49b1-a581-219b2d8f7a3d',replace('<h5>Cybereason</h5>\n<p>\nCybereason, the XDR company, extends Defenders visibility to prevent, detect, and end attacks on the endpoint, in the cloud and across the entire enterprise ecosystem.\nFueled by the AI-driven MalOp™ detection engine, the Cybereason Defense Platform moves your security practice from alert-centric to operation centric. Cybereason is the most effective solution in the history of MITRE testing and delivers customers 10X efficiency across their entire security teams.\nWith Cybereason, defenders can end cyber attacks, reduce deployment time, and decrease operational costs. Cybereason, end cyber attacks from the endpoint to everywhere.\n<br>\n</p>\n<h5>Why Cybereason?</h5>\n<p>The Cybereason Defense Platform combines the industry’s top-rated detection and response (EDR and XDR), next-gen anti-virus (NGAV), and proactive threat hunting to deliver context-rich analysis of every element of an attack. The single agent and console delivers unparalleled efficiency, equipping a single analyst with the power to defend up to 200,000 endpoints.\nCybereason is operation-centric, not alert-centric. Our platform is built to instantly deliver fully contextualized and correlated insights into the malicious operations (MalOps) designed to evade traditional defenses. This operational security focus leads to increased efficiency in detection and response, helping teams reduce investigation and remediation from days to minutes.</p>','\n',char(10)),'https://www.facebook.com/Cybereason','https://www.twitter.com/cybereason','https://www.linkedin.com/company/cybereason/','');
|
||
INSERT INTO vendors VALUES('a80c508c-5c94-473a-871b-20251b40f166','published','datasunrise-data-and-database-security','DataSunrise Data and Database Security','www.datasunrise.com','DataSunrise homogeneous security experience in heterogeneous database environment. DataSunrise protects sensitive structured & unstructured data, enforces compliance.Data Auditing, DAM, Database Firewall, Dynamic & Static Data Masking, Data Discovery','3040 78th Avenue SE ','#273','Mercer Island','WA','USA','0bdde198-3663-4340-8ae8-4d887a1a05fb',replace('<h5>DataSunrise Data and Database Security</h5>\n<p>\nDataSunrise secures data and databases in the clouds and on-premises. DataSunrise software protects against external and internal threats with real-time sql traffic monitoring. DataSunrise includes database activity monitoring (DAM), data masking (dynamic and static), sensitive data discovery, database firewall, vulnerability assessment. DataSunrise secures all major SQL and NoSQL databases and cloud files systems. DataSunrise is AWS Security Competency Partner.\nDataSunrise enables PII and PHI data protection compliance with privacy law, SOX, HIPAA, ISO27001, PCI or GDPR. DataSunrise gives customers full and granular control over security of their data, access to data and databases and automated compliance policies. DataSunrise empowers organizations when moving their databases workload to db managed services. Database Proxy, High-Availability, Autoscaling Authentication proxy, Active Directory and LDAP support.\nPlease contact DataSunrise for more details at info@datasunrise.com<br>\n</p>\n<h5>Why DataSunrise Data and Database Security?</h5>\n<p>DataSunrise Security offers homogeneous database security experience in heterogeneous database environments in cloud and on-prem. DataSunrise software protects sensitive data in real-time, helps organizations to stay in compliance with SOX, HIPAA, ISO 27001, PCI, GDPR.\nDataSunrise enables database protection and prevention from internal & external attacks such as SQL Injections or DDOS. At the same time, DataSunrise audits database traffic, monitors and reports all relevant activities in real-time.\nDataSunrise includes:\n-intelligent database firewall\n-data auditing,database activity monitoring (DAM)\n-dynamic data masking (DDM) to protect and mask data from unauthorized requests\n-static masking (or persistent) to create a fully functional protected copy of production data\n-discovery of sensitive data and compliance automation\n-databases vulnerability assessment\nDataSunrise can secure all major databases, data lakes, SQL and NoSQL and cloud file systems.\nwww.datasunrise.com</p>','\n',char(10)),'https://www.facebook.com/datasunrise','https://www.twitter.com/datasunrise','https://www.linkedin.com/company/datasunrise-inc','');
|
||
INSERT INTO vendors VALUES('6532ee85-8dfa-4d98-b50e-ea143dcf49eb','published','d3-security','D3 SECURITY','www.d3security.com','D3 Security’s NextGen SOAR is the #1 independent SOAR platform, automating and orchestrating across 500+ integrations with an event pipeline that reduces alerts by over 90%. Build, modify, and scale SecOps workflows with our no-code playbooks.','1450-700 W Pender St',NULL,'Vancouver','BC','CAN','e3246dc8-606b-4594-93a0-efed60bee99d',replace('<h5>D3 SECURITY</h5>\n<p>\nD3 Security has been at the forefront of SOAR since before the term was even\ninvented. As a leading independent SOAR vendor, D3 has helped the world’s largest\ncompanies transform their security operations with automation. As cyber attacks\ngrow in volume and sophistication, SOC teams can’t afford to waste time managing\na flood of alerts. D3''s Smart SOAR empowers them with automated enrichment,\npowerful codeless playbooks, and deep integrations with tools.\nD3’s Event Pipeline streamlines alert-handling with automated data\nnormalization, threat triage, and auto-dismissal of false positives—ensuring\nthat only genuine threats get escalated to analysts. When a real threat is\nidentified, D3 provides rich contextual data to create high-fidelity incidents\nthat provide analysts with the complete picture of an attack.\nD3 clients reduce their MTTD and MTTR by as much as 90%, while shifting their\nfocus from repetitive alert-handling to proactively shut down threats before\nthey develop.<br>\n</p>\n<h5>Why D3 SECURITY?</h5>\n<p>Smart SOAR uses automation as a force multiplier for SOC teams, helping them reduce their MTTD and MTTR by as much as 90%, while shifting their focus from repetitive alert-handling to proactive tasks. Our SOAR platform helps security teams automate and orchestrate dozens of incident response use cases through powerful codeless playbooks that leverage unlimited integrations across the cyber tech stack.\nAs one of the few independent SOAR vendors, we are able to maintain fully featured integrations with virtually any security tool. This helps security teams follow a best-of-breed approach to their security tooling.\nUnlike other “amnesia” SOAR products that provide little or no context and leave masses of incidents uninvestigated, Smart SOAR maintains an identity layer to hold the memory of related events across 90 days. This helps provide context to every alert and incident by detecting, correlating and mitigating the attack across the security perimeter.</p>','\n',char(10)),'https://www.facebook.com/D3Sec/','https://www.twitter.com/D3Security','https://www.linkedin.com/company/d3-security-management-systems/','');
|
||
INSERT INTO vendors VALUES('54aa1d38-72eb-4f5f-8c5c-084662caceda','published','domaintools','DomainTools','www.domaintools.com','DomainTools is the global leader for Internet intelligence that enables security practitioners to proactively defend their organization in a constantly evolving threat landscape. ','2101 4th Avenue ','Suite 1150','Seattle','WA','USA','58a2cd31-b497-4480-b75a-8d9637952d40',replace('<h5>DomainTools</h5>\n<p>\nDomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know. The world''s most advanced security teams use our solutions to identify external risks, investigate threats, and proactively protect their organizations in a constantly evolving threat landscape. DomainTools constantly monitors the Internet and brings together the most comprehensive and trusted domain, website and DNS data to provide immediate context and machine-learning driven risk analytics delivered in near real-time. Visit domaintools.com to experience firsthand why DomainTools is the first stop for advanced security teams when they need to know.<br>\n</p>\n<h5>Why DomainTools?</h5>\n<p>Iris Detect is an Internet infrastructure detection, monitoring, and enforcement tool (UI and API) built on the industry’s fastest and broadest domain discovery engine and the largest databases of domain data. Capturing key data on new domains and risk-scoring them within minutes of discovery, Detect is a game-changer for brand managers, digital risk and fraud prevention teams, and network defenders. The DomainTools Iris data set helps analysts, detection engineering teams, threat hunters, and other practitioners obtain critical situational awareness on domains or IP addresses observed in the protected environment. DNSDB is a Passive DNS historical database that provides a unique, fact-based, multifaceted view of the configuration of the global Internet infrastructure.</p>','\n',char(10)),'https://www.facebook.com/domaintoolsllc/','https://www.twitter.com/DomainTools','https://www.linkedin.com/company/domaintools/','');
|
||
INSERT INTO vendors VALUES('4b7fb985-e1ad-4fe1-bd03-e94b09724807','published','ismg','ISMG','https://ismg.io/',NULL,'902 Carnegie Center','Suite 430','Princeton','NJ','USA','0885bed2-d4da-4f55-a275-624810277cfe',replace('<h5>ISMG</h5>\n<p>\n<br>\n</p>','\n',char(10)),NULL,NULL,NULL,'');
|
||
INSERT INTO vendors VALUES('22654128-9fc3-43f6-a3e7-964b14764637','published','infoblox','Infoblox','https://www.infoblox.com/','Infoblox is the company that unites networking and security to deliver better performance and protection. We provide visibility and control over who and what connects to your network and identify threats through intelligent DNS.','2390 Mission College Blvd. ','Suite 501','Santa Clara','CA','USA','81f10498-e387-4098-a3e0-cdab8808115d',replace('<h5>Infoblox</h5>\n<p>\nOver 70% of the Fortune 500 look to Infoblox for the security visibility, control, and automation they need to address the security and networking challenges of the hybrid workplace, multi-cloud environments, new technologies, and more. Our core network services expertise enables us to apply unique ML/AI at the DNS layer to identify and block threat activity most defenses cannot see, while comprehensive threat intelligence shortens incident investigations and speeds threat response. Automation capabilities can be used to collect, normalize and distribute your own, custom blend of threat intelligence across the entire security stack. Or automate data sharing and incident response between security tools using custom integrations or by taking advantage of the massive Infoblox partner ecosystem to uplift your protection, detection, investigation, and response capabilities to get more out of your overall security investment. <br>\n</p>','\n',char(10)),'https://www.facebook.com/Infobloxinc','https://www.twitter.com/infoblox','https://www.linkedin.com/company/infoblox/','');
|
||
INSERT INTO vendors VALUES('9ff97561-c9ab-4169-bc43-479ba26a13b2','published','enea-qosmos','Enea - Qosmos','www.enea.com/qosmos','Enea Qosmos ixEngine is the leading embedded traffic intelligence & DPI engine. It is used by security vendors & service providers to classify encrypted traffic, applications, services & users in NGFW, FWaaS, SWG, SD-WAN, XDR, SIEM, SASE, ZTNA, AI/ML','1700 Alma Drive','Suite 550','Plano','TX','USA','87b37fec-6fda-4234-a6f7-265b64e72266',replace('<h5>Enea - Qosmos</h5>\n<p>\nCybersecurity vendors embed Enea’s Qosmos application classification and deep packet inspection (DPI) software to enhance their solutions with accurate, real-time network traffic visibility. The Qosmos ixEngine® is the flagship traffic intelligence product at Enea. It accurately identifies protocols, applications and services, even in encrypted traffic. It also detects evasive & anomalous patterns indicating potential threats.\nQosmos ixEngine is trusted by 75% of vendors who source their DPI technology, including 4 of the top 5 SASE vendors. It is also embedded by market-leading providers of SSE, ZTNA, On-Premise & Cloud Firewalls, SWGs, XDR, Secure SD-WAN and Private 5G.\nEnea is one of the world’s leading specialists in software for telecommunications & cybersecurity. Enea’s cloud-native products are used to enable and protect services for mobile subscribers, enterprise customers, and connected devices. More than 4.5 billion people rely on Enea technologies in their daily lives.<br>\n</p>\n<h5>Why Enea - Qosmos?</h5>\n<p>Enea’s Qosmos ixEngine® delivers deep L2-L7 visibility required for superior security products without having to develop and maintain highly complex DPI technology in-house or relinquish roadmap control over key security components.\nKey features include:\n- Flexible form factors for fast integration (SDK, CNF, VNF or standalone SW sensor)\n- Market leading coverage: 4000 protocols & apps, 5600 types of metadata\n- First Packet Advantage (unique 1st packet processing capability)\n- Continuously updated protocols with regular hot-swap releases\n- Optional modules (e.g., Rules Engine, Custom Signatures)\n- Global professional services & support\nIt provides unique threat hunting insights, including:\n- ML-enhanced encrypted traffic classification & categorization\n- Classification of evasive and anomalous traffic\n- Complex tunneling visibility: full paths for up to 16 levels of encapsulation\n- Extraction of files and embedded links\n- Detection of potential Man-in-the-Middle attacks</p>','\n',char(10)),NULL,'https://www.twitter.com/enea_qosmos','https://www.linkedin.com/showcase/enea-qosmos-embedded-dpi-for-software-vendors/','');
|
||
INSERT INTO vendors VALUES('c4f0ed9e-3a99-4752-8f93-51600119e234','published','threatdefence','Threatdefence','www.threatdefence.com','ThreatDefence is a security operations platform that provides evidence-based threat detection and response solutions. Our SecOps platform includes SIEM, NDR, threat hunting, SOC automation, attack surface management, and other services.','88 Pitt St.',NULL,'Sydney',NULL,'AUS','7fdd30be-0d6c-4c71-888a-f37997be0e62',replace('<h5>Threatdefence</h5>\n<p>\nThreatDefence provides innovative Security Operations and cyber defense solutions to MSPs and Enterprises. Our SecOps Platform is designed to assist businesses of all sizes in implementing world-class detection and response, utilizing all available data sources, whether it be within their network, on the Dark Web, or concealed deep within their supply chain. We value open ecosystems and seamlessly integrate with any and all threat intelligence feeds and log sources, delivering immediate actionable security insights.<br>\n</p>\n<h5>Why Threatdefence?</h5>\n<p>ThreatDefence is a security operations platform that provides evidence-based threat detection and response solutions. Our SecOps platform includes SIEM, NDR, threat hunting, SOC automation, attack surface management, and other services. Our value proposition is a practical, sustainable and customized SecOps capability that can be launched for your business in a day.</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/threatdefence/','');
|
||
INSERT INTO vendors VALUES('cf123055-e0f9-4ab4-a944-d59cfa121f93','published','iei-technology-usa-corp','IEI Technology USA Corp.','www.ieiworld.com','IEI has more than 25-year experience as a provider of computer-based solutions across diverse applications, in this annual RSA event, IEI will dive into several major core tracks: Edge AI, 5G Networking, Cybersecurity, and Edge to Cloud.','138 University Parkway',NULL,'Pomona','CA','USA','7dc74318-e574-421b-905d-46353d9d8d44',replace('<h5>IEI Technology USA Corp.</h5>\n<p>\nIEI has more than 25-year experience as a provider of computer-based solutions across diverse applications, in this annual RSA event, IEI will dive into several major core tracks: Edge AI, 5G Networking, Cybersecurity, and Edge to Cloud.<br>\n</p>','\n',char(10)),'https://www.facebook.com/IEIUS',NULL,'https://www.linkedin.com/company/iei-technology-usa-corp/','');
|
||
INSERT INTO vendors VALUES('1506ea49-dd1d-4072-a8ff-c7e2902904ce','published','traceable','Traceable','https://www.traceable.ai/','Traceable is the leading API security platform for a cloud-first, API-driven world. The platform helps organizations discover, test and secure APIs, minimize business risk, and optimize the value that APIs bring to their customers.','548 Market Street ','PMB 83903','San Francisco','CA','USA','addf3281-6665-4c14-aea0-26793bbab03b',replace('<h5>Traceable</h5>\n<p>\nModern applications are extremely hard to secure and protect. Micro-services, APIs, and cloud services are complex and continuously changing. Traceable enables security to manage their application and API risks given the continuous pace of change and modern threats to applications.\nTraceable is the industry’s leading API security platform that identifies APIs, evaluates API risk posture, stops API attacks, and provides deep analytics for threat hunting and forensic research. With visual depictions of API paths at the core of its technology, its platform applies the power of distributed tracing and machine learning models for API security across the entire development lifecycle. Visual depictions provide insight into user and API behaviors to understand anomalies and block API attacks, enabling organizations to be more secure and resilient.<br>\n</p>\n<h5>Why Traceable?</h5>\n<p>Traceable is the industry’s leading API security platform that identifies APIs, evaluates API risk posture, stops API attacks, and provides deep analytics for threat hunting and forensic research. With visual depictions of API paths at the core of its technology, its platform applies the power of distributed tracing and machine learning models for API security across the entire development lifecycle. Visual depictions provide insight into user and API behaviors to understand anomalies and block API attacks, enabling organizations to be more secure and resilient.</p>','\n',char(10)),'https://www.facebook.com/traceableai','https://www.twitter.com/traceableai','https://www.linkedin.com/company/traceable-ai/','');
|
||
INSERT INTO vendors VALUES('2658e2ad-6f9c-4512-a81b-b31b8c209b45','published','twingate','Twingate','https://www.twingate.com/',replace('It’s time to break up with your VPN. Connect securely from anywhere with Twingate. Eliminate public attack surfaces and prevent lateral traffic with Twingate’s Zero Trust Network Access. Easy to deploy, even easier to use, and always secure.\n','\n',char(10)),'541 Jefferson Avenue ','# 100','Redwood City','CA','USA','47014879-fc5c-4cb3-9871-0862426e44c4',replace('<h5>Twingate</h5>\n<p>\nEveryone hates their VPN but making the move to a Zero Trust model is challenging when you’re forced to wade through bull$hit and buzzwords. Twingate built something better: so fast you don''t feel like you are on a VPN, more secure than traditional network models, no punching your firewall, and we play nicely with your existing tech stack. Plus, end users love us - say goodbye to inboxes full of dropped connection complaints. We believe in investing in the product, not marketing. If you want to eliminate all public attack surfaces, provide seamless access to employees that seems like magic, and reduce the burden on your IT teams, try Twingate for yourself. We offer a free full feature trial, no annoying sales pitches required. We guarantee you can get up and running in 15 minutes and that you''ll find our architecture superior to any other zero trust access product that exists. Stop by our booth and we will even give you our Chief Product Officer''s cell phone number (if you ask nicely).<br>\n</p>\n<h5>Why Twingate?</h5>\n<p>Twingate’s new approach to network architecture uses modern technologies like NAT traversal, QUIC, private proxies, and split tunneling to create direct peer-to-peer connections that are authorized through rich contextual data. Unlike legacy Zero Trust remote access solutions, traffic is not proxied via centralized choke points, leading to faster access and built-in redundancies for Twingate customers.\nGranular access controls - Implement least privilege access quickly and easily.\nVPN replacement - No more heavy maintenance and constant user complaints.\nUniversal MFA - Apply TOTP, biometric, and security key-based MFA to to any type of resource, even SSH.\nZero Trust as Code - Programmatically deploy and maintain a Zero Trust approach to your infrastructure, in as little as 15 minutes.\nAPI & integrations - Integrate with your existing security stack, including major IdPs, with no changes to your applications.</p>','\n',char(10)),NULL,'https://www.twitter.com/TwingateHQ','https://www.linkedin.com/company/twingate','');
|
||
INSERT INTO vendors VALUES('1e4bda69-464f-440e-9e86-8ba71d4829ea','published','futurex','Futurex','www.futurex.com','For over 40 years Futurex has delivered enterprise security solutions for organizations worldwide. Customers choose Futurex for our best-in-class technology solutions and our exceptional customer support.','864 Old Boerne Road',NULL,'Bulverde','TX','USA','523134e8-b75c-45e9-9ee3-4250fae80323',replace('<h5>Futurex</h5>\n<p>\nFor over 40 years Futurex has delivered enterprise security solutions for organizations worldwide. Customers choose Futurex for our best-in-class technology solutions and our exceptional customer support.<br>\n</p>\n<h5>Why Futurex?</h5>\n<p>Futurex data encryption solutions adapt to your organization’s needs, both in scale and functionality. Our wide range of encryption tools protect data, prevent unauthorized access, and mitigate data breaches. Learn more about how Futurex products protect sensitive data in a compliant and scalable manner, both now and in the future.</p>','\n',char(10)),'https://www.facebook.com/FuturexLP/','https://www.twitter.com/@Futurex','https://www.linkedin.com/company/futurex/','');
|
||
INSERT INTO vendors VALUES('67a96cce-f212-4c3f-8522-a6a5eb484d7e','published','vulcan-cyber','Vulcan Cyber','https://vulcan.io','Vulcan Cyber automates the management of the entire vulnerability risk lifecycle across IT and cloud-native environments by aggregating scan data, prioritizing vulnerability risk to the business, and orchestrating a clear path to risk mitigation.','116 Menachem Begin Street',NULL,'Tel Aviv',NULL,'ISR','360eff57-3a4f-465f-8d62-fe88716ec1d7',replace('<h5>Vulcan Cyber</h5>\n<p>\nVulcan Cyber® breaks down the vulnerability risk lifecycle into measurable and manageable functions to help security analyst and vulnerability management teams go beyond scan data and actually orchestrate cyber risk reduction. With powerful prioritization, orchestration and mitigation capabilities, the Vulcan Cyber risk management SaaS platform provides clear solutions to help manage risk effectively. Vulcan enhances teams'' existing cyber environments by connecting with all the tools they already use, supporting every stage of the cyber security lifecycle across cloud, IT and application attack surfaces. The unique capability of the Vulcan Cyber platform has garnered Vulcan recognition as a 2019 Gartner Cool Vendor and as a 2020 RSA Conference Innovation Sandbox finalist.<br>\n</p>\n<h5>Why Vulcan Cyber?</h5>\n<p>Vulcan Cyber subscription licensing is detailed on our pricing page here: https://vulcan.io\nVulcan Cyber platform details and benefits are outlined here: https://vulcan.io/platform\nVulcan Enterprise\nVulcan Enterprise provides full access to all Vulcan Cyber vulnerability risk management capabilities and functionality and is designed for large organizations with tens of thousands of assets to secure and hyper-scale vulnerability risk lifecycle management requirements.\nVulcan Standard\nVulcan Standard is packaged with the needs of mid-sized teams in mind.\nVulcan Free\nVulcan Free is the industry’s only freemium vulnerability prioritization tool for small businesses and was used by more than 1000 teams in 2022 alone.\nVulnRX\nVulnRX is a remediation intelligence database and is a freemium service for vulnerability risk management and SecOps practitioners.\nMITRE Mapper\nMITRE Mapper for attack path modeling is a freemium service for vulnerability risk management and SecOps practitioners.</p>','\n',char(10)),'https://www.facebook.com/VulcanCyber','https://www.twitter.com/VulcanCyber/','https://www.linkedin.com/company/vulcancyber/','');
|
||
INSERT INTO vendors VALUES('e8684a00-cb2b-4a78-aab9-204e06f7850d','published','fbi','FBI','www.fbi.gov',replace('The FBI’s cyber mission is to impose risk and consequences on our cyber adversaries through our unique authorities, world-class investigative capabilities, and enduring partnerships.\n','\n',char(10)),'935 Pennsylvania Ave NW',NULL,'Washington','DC','USA','eeab596d-32df-4139-b807-d5334e6384e6',replace('<h5>FBI</h5>\n<p>\nThe FBI is the premier domestic cyber investigative agency. We are committed to preventing and mitigating harm to Americans, our economy and infrastructure, and potential victims worldwide.\nAs an intelligence-driven national security organization, we impose costs on cyber adversaries by investigating cyber attacks using a blend of unique legal authorities, world-class capabilities, and enduring partnerships.\nThose enduring partnerships, like the RSAC 2023 theme, make us all "Stronger Together." FBI Cyber''s diverse cadre of technically-trained experts—special agents, computer scientists, intelligence analysts, and more—are domestically dispersed and proactively share intelligence and best practices with our private sector, law enforcement, and intelligence partners. These partnerships, in combination with our Cyber Assistant Legal Attachés positioned in U.S. embassies across the globe, make our reach unparalleled so we can hold cyber adversaries accountable wherever they may be.<br>\n</p>','\n',char(10)),'https://www.facebook.com/FBI','https://www.twitter.com/fbi','https://www.linkedin.com/company/fbicyber/','');
|
||
INSERT INTO vendors VALUES('860ed79b-2939-420e-9f7e-a9a64ef0102a','published','versa-networks','Versa Networks','http://versa-networks.com/','Versa Networks, a leader in single-vendor SASE platforms, provides networking and security with true multitenancy and sophisticated analytics via the cloud, on-premises, or as a combination to meet the SASE needs of small to large enterprises and SPs','2550 Great America Way ','Suite 350','Santa Clara','CA','USA','f73fb4de-6bc9-492b-a635-102bf89c7a58',replace('<h5>Versa Networks</h5>\n<p>\nVersa Networks, the leader in single-vendor SASE platforms, delivers AI/ML-powered SSE and SD-WAN solutions. The platform provides networking and security with true multitenancy, and sophisticated analytics via the cloud, on-premises, or as a blended combination of both to meet SASE requirements for small to extremely large enterprises and Service Providers. Thousands of customers globally with hundreds of thousands of sites and millions of users trust Versa with their mission critical networks and security. Versa Networks is privately held and funded by Sequoia Capital, Mayfield, Artis Ventures, Verizon Ventures, Comcast Ventures, BlackRock Inc., Silicon Valley Bank, Liberty Global Ventures, Princeville Capital, RPS Ventures and Triangle Peak Partners. For more information, visit https://www.versa-networks.com or follow Versa Networks on Twitter @versanetworks.<br>\n</p>\n<h5>Why Versa Networks?</h5>\n<p>Versa Networks is simplifying how enterprises protect and connect their users, devices, sites to workloads or applications anywhere, anytime. Versa has built a differentiated Unified SASE architecture that delivers AI/ML-powered SSE and SD-WAN that converges security with networking to deliver an improved security posture, enhanced user-to-application experience and operational efficiency.\nVersa is unique in it’s approach of a unified platform, unified console, unified policy and unified data lake. Versa’s Unified SASE delivers organically developed best-of-breed functions that tightly integrate and deliver services via the cloud, on-premises, or both, managed through a single pane of glass. Versa delivers SASE services - Secure SD-WAN, NGFW, NGFWaaS, Cloud Network Firewall, UTM including ATP, SWG, ZTNA, CASB, DLP, RBI and UEBA.\nThousands of customers globally with hundreds of thousands of sites and millions of users trust Versa with their mission critical networks and security.</p>','\n',char(10)),'https://www.facebook.com/VersaNetworks/','https://www.twitter.com/versanetworks','https://www.linkedin.com/company/versa-networks/','');
|
||
INSERT INTO vendors VALUES('d1a0b404-8454-4d7b-b453-d32ac4336f54','published','venafi','Venafi','www.venafi.com','Venafi is the cybersecurity market leader in IAM for machines. From the ground to the cloud, Venafi automates the lifecycle of identities for all types of machines—from physical devices to software applications, APIs & containers.','175 E 400 Street ','Suite 300','Salt Lake City','UT','USA','c31df147-c7aa-44ca-bded-afa805dc95d7',replace('<h5>Venafi</h5>\n<p>\nAs organizations are rapidly shifting to cloud infrastructures, they must contend the associated complexity of managing rising numbers of digital keys and certificates. Venafi helps global enterprises take charge of their machine identities, both on-premises and in the cloud, with centralized, controlled management. With observability, consistency and control, businesses can protect every machine identity while maintaining a clear focus on modernization.\nThe largest organizations in the world trust Venafi to manage and protect their machine identities:\n• Category Creator – Venafi established the market for machine identity management and protection across enterprise infrastructures.\n• Industry Standard – The Venafi Control Plane set the standard for managing and protecting all types of machine-to-machine connections and communications.\n• Cloud Native Protector – Venafi experts created the wildly successful open-source project, cert-manager, to protect cloud native machine identities.<br>\n</p>\n<h5>Why Venafi?</h5>\n<p>As organizations are rapidly shifting to cloud infrastructures, they must contend the associated complexity of managing rising numbers of digital keys and certificates. Venafi helps global enterprises take charge of their machine identities, both on-premises and in the cloud, with centralized, controlled management. With observability, consistency and control, businesses can protect every machine identity while maintaining a clear focus on modernization.\nThe largest organizations in the world trust Venafi to manage and protect their machine identities:\n• Category Creator – Venafi established the market for machine identity management and protection across enterprise infrastructures.\n• Industry Standard – The Venafi Control Plane set the standard for managing and protecting all types of machine-to-machine connections and communications.\n• Cloud Native Protector – Venafi experts created the wildly successful open-source project, cert-manager, to protect cloud native machine identities.</p>','\n',char(10)),NULL,'https://www.twitter.com/Venafi','https://www.linkedin.com/company/venafi/','');
|
||
INSERT INTO vendors VALUES('01f7f78f-473b-44e3-98d5-9f8aeb3387bb','published','feitian-technologies','FEITIAN Technologies','https://ftsafe.us/','FEITIAN is the world’s leading supplier and provider of customizable cyber-physical security, payment and IoT hardware and technology solutions. ','2580 N First St','Unit 130','San Jose','CA','USA','da24ccd5-7771-47da-a879-02dfc2cf6b01',replace('<h5>FEITIAN Technologies</h5>\n<p>\nFEITIAN is the world’s leading supplier and provider of customizable cyber-physical security, payment and IoT hardware and technology solutions. Founded in 1998, the company has been at the forefront of the security industry for over 20 years. FEITIAN solutions are designed to protect against cyber threats and data breaches, and help organizations comply with industry regulations.\nOver the course of company’s history, FEITIAN’s expertise spans the entire process for creating digital security solutions, producing and personalizing secure devices that truly meet the customer’s requirements. FEITIAN Technologies is committed to providing its customers with the highest level of security and customer support. The company''s solutions are easy to use, highly scalable and can be easily integrated with existing systems. <br>\n</p>\n<h5>Why FEITIAN Technologies?</h5>\n<p>FEITIAN Technologies leverages best-in-class hardware, software, biometrics, and cryptography to protect businesses and institutions from cyber-attacks.\nCyberattacks continue to be a significant and growing problem for businesses, governments, healthcare, and other institutions. A major cause for most cyber-attacks is compromised individual credentials. Large and growing businesses and institutions want solutions that will protect their data, networks, employees, and customer information.\nFEITIAN provides single device solutions for all popular MFA applications, including OTP, FIDO U2F, FIDO2, PKI, PIV and more, along with smart cards, readers, and access control. In addition to hardware solutions, FEITIAN designs the entire technology solution, including software and firmware, compatible with mainstream MFA/ IDP systems. FEITIAN also provides enterprise-grade integration and deployment, while keeping products both affordable, and customizable to fit any brand requirements! </p>','\n',char(10)),'https://www.facebook.com/FeitianTech/','https://www.twitter.com/FEITIAN_Tech','https://www.linkedin.com/company/feitian-technologies','');
|
||
INSERT INTO vendors VALUES('871d79e3-76d3-4d00-8869-7ee1cbbff8c3','published','fortanix','Fortanix','www.fortanix.com','Fortanix secures data, wherever it is. Our data-first approach helps businesses to modernize their security solutions on-premises, in the cloud and everywhere in-between. Enterprises trust Fortanix for data security, privacy and compliance. ','3910 Freedom Circle','Suite 104','Santa Clara','CA','USA','f032bd85-9efe-4d88-b32f-622c5abf2bfe',replace('<h5>Fortanix</h5>\n<p>\nFortanix secures data, wherever it is. Fortanix’s data-first approach helps businesses of all sizes to modernize their security solutions on-premises, in the cloud and everywhere in-between. Enterprises worldwide, especially in privacy-sensitive industries like healthcare, fintech, financial services, government, and retail, trust Fortanix for data security, privacy and compliance. Fortanix investors include Goldman Sachs, Foundation Capital, Intel Capital, In-Q-Tel, Neotribe Ventures and GiantLeap Capital.<br>\n</p>\n<h5>Why Fortanix?</h5>\n<p>Fortanix helps organizations protect data, whether it is at rest, in transit, or in use. Data Security Manager (DSM) is a centralized platform that unifies a comprehensive set of data security features across hybrid and multicloud infrastructures, helping customers to simplify, secure, and comply.\nDSM simplifies encryption with modern cryptography services, including format-preserving tokenization. and Key Management System (KMS).\nFortanix DSM helps upgrade cryptography postures to strong algorithms, including Post-Quantum Cryptography. Fortanix built the platform on security: Confidential Computing protects data in use, while the highly secure Rust programming language avoids common security bugs.\nFortanix helps with data security and privacy regulations with full key custody and segregation of keys and data. Tokenization and Confidential Computing enables secure data sharing without without compromising compliance. </p>','\n',char(10)),'https://www.facebook.com/fortanix/','https://www.twitter.com/fortanix','https://www.linkedin.com/company/fortanix/','');
|
||
INSERT INTO vendors VALUES('a9eb0ad4-3b5d-4a30-a200-f580701a4433','published','akamai','Akamai','https://www.akamai.com/','Akamai powers and protects life online. Leading companies choose Akamai to build, deliver, and secure digital experiences. Akamai Connected Cloud, a massively distributed edge and cloud platform, puts apps and experiences closer to users and keeps threats farther away. Learn more about Akamai’s cloud computing, security, and content delivery solutions at akamai.com.','145 Broadway Street',NULL,'Cambridge','MA','USA','2d0396b0-f531-4fe4-8591-0d5a0804bce6',replace('<h5>Akamai</h5>\n<p>\nAkamai powers and protects life online. Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences — helping billions of people live, work, and play every day. Akamai Connected Cloud, a massively distributed edge and cloud platform, puts apps and experiences closer to users and keeps threats farther away. Learn more about Akamai’s cloud computing, security, and content delivery solutions at akamai.com and akamai.com/blog, or follow Akamai Technologies on Twitter and LinkedIn.<br>\n</p>','\n',char(10)),'https://www.facebook.com/AkamaiTechnologies/','https://www.twitter.com/Akamai','https://www.linkedin.com/company/akamai-technologies/','');
|
||
INSERT INTO vendors VALUES('6fc321c2-4ce3-405c-bae6-fc7839cee800','published','armis','Armis','www.armis.com','The Armis Platform is the industry’s most comprehensive asset intelligence platform providing unified asset visibility and superior security for organizations that need to protect against unseen operational and cyber risks, increase efficiencies, optimize use of resources, and safely innovate with new technologies to grow the business.','548 Market Street','Suite 97439','San Francisco','CA','USA','80fc6e86-552e-4584-9ffd-2319a580c20e',replace('<h5>Armis</h5>\n<p>\nArmis is the leading unified asset intelligence platform designed to help secure the expanded attack surface that connected devices create. Powered by the world’s largest asset intelligence engine, Fortune 100 companies trust our real-time, comprehensive asset monitoring and are able to gain full context across every connected device—managed and unmanaged, including IT, IoT, IoMT, OT/ICS, Cloud and Cellular IoT assets. See and secure your entire cyber universe. <br>\n</p>\n<h5>Why Armis?</h5>\n<p>The Armis Asset Intelligence platform is an agentless SaaS platform that automatically collects and analyzes data through hundreds of meaningful integrations, delivering the industry’s most comprehensive asset intelligence platform. Armis provides complete and continuous real-time visibility into enterprise assets, enabling our customers to greatly improve their operational and security posture.\n</p>','\n',char(10)),'https://www.facebook.com/ArmisInc/','https://www.twitter.com/ArmisSecurity','https://www.linkedin.com/company/armis-security','');
|
||
INSERT INTO vendors VALUES('aaec8a0b-2c43-426a-838c-d1b54b2d8c31','published','automox','AUTOMOX','www.automox.com','Automox is the cloud-native endpoint management platform for modern organizations ensuring every endpoint is automatically patched, configured and secured – anywhere, anytime.','4845 Pearl East Cir ','Ste 118 PMB 80340','Boulder','CO','USA','b0908e03-67ad-45fc-aed0-86bae6d6f5e7',replace('<h5>AUTOMOX</h5>\n<p>\nAutomox is the cloud-native endpoint management platform for modern organizations ensuring every endpoint is automatically patched, configured and secured – anywhere, anytime. With the push of a button, fix critical vulnerabilities faster, slash cost and complexity, and win back hours in the day. Join thousands of companies transforming their IT into a strategic business driver with a single, cloud-native solution from Automox.<br>\n</p>\n<h5>Why AUTOMOX?</h5>\n<p>Rapid patching, configuration, and control of your endpoints is your best defense against wasted time and out-of-compliance endpoints. Automox provides simple, VPN-free automation so it’s easy to keep your systems and third-party software patched. Start winning hours back in your day with:\nAutomated patching and configuration for Windows, macOS & Linux: Enforce patches, security configurations, software deployment, & custom scripting across all your systems from one console.\nRemote control: Gain immediate access to Windows and macOS endpoints to fix issues fast without jumping to another tool or team.\nModern, intuitive dashboard: Get a comprehensive snapshot of your environment and quickly see which endpoints need attention.\nBroad third-party support: Save time with automated third-party patching deployments and updates for 125 titles & counting.\nStraightforward vulnerability remediation: Simplify your vulnerability identification-to-remediation process with Automox & Rapid7 InsightVM.</p>','\n',char(10)),'https://www.facebook.com/automox/','https://www.twitter.com/Automox','https://www.linkedin.com/company/automox/','');
|
||
INSERT INTO vendors VALUES('45e0f1c7-d5b5-4367-a736-264af634c8d7','published','aci-learning','ACI Learning','https://www.itpro.tv/','The products you know and love, ITProTV, AuditProTV & Practice Labs are training the modern workforce TOGETHER,as ACI Learning.Whether you''re starting your career,mastering your profession,or developing your team,we''re with you every step of the way.','7525 NW 4th Blvd',NULL,'Gainsville ','FL','USA','d61d5e04-f735-4a53-8cac-0d6cc48eb4f6',replace('<h5>ACI Learning</h5>\n<p>\nACI Learning is a leading certification prep and skills training provider of audit, cybersecurity and IT training solutions designed for individuals and enterprises.\nWe take training to the next level with our SaaS platform that supports multiple learning styles – instructor-led, online video self-paced, hands-on and real-life labs and assessments – and provides insight.\nWe empower people and businesses to grow and thrive with world-class, up-to-date and binge-worthy training. Our ITProTV solution offers a unique talk-show format, which keeps learners interested and excited to learn while our Practice Labs solution has helped over 1 million learners achieve professional growth.\nWe are driven by helping people, especially veterans, start and advance their IT careers. <br>\n</p>','\n',char(10)),'https://www.facebook.com/acilearningco/','https://www.twitter.com/ITProTV','https://www.linkedin.com/company/itprotv/','');
|
||
INSERT INTO vendors VALUES('d458318e-5cca-47d4-9571-d39288f6dabf','published','jscrambler','JSCRAMBLER','https://jscrambler.com','Jscrambler is the leading client-side security solution for JavaScript protection and webpage monitoring. Jscrambler''s technology enables enterprises to mitigate JavaScript code tampering, reverse-engineering, and client-side attacks.','Rua Alfredo Allen, 455',NULL,'Porto',NULL,'PRT','96459d2a-c48b-4b4e-8682-e6c65ec8ba9f',replace('<h5>JSCRAMBLER</h5>\n<p>\nJscrambler is a leading authority in client-side security software. Our solutions defend enterprises from revenue and reputational harm caused by accidental or intentional JavaScript misbehavior. We make first-party code resilient to tampering and prevent interference with third-party code. Our solutions work continuously, keeping you protected regardless of how frequently things change. From code to runtime, we have you covered with a level of visibility and control that supports business innovation. We think of it as defense-in-depth on every screen. Our customers include the FORTUNE 500, retailers, airlines, banks, and other enterprises whose success depends on safely engaging with their customers online. We keep these interactions secure so they can continue to innovate without fear of damaging their revenue source, reputation, or regulatory compliance. Good things happen when you defend the client-side. Get real-time, automatic defense on every screen, every time.<br>\n</p>','\n',char(10)),'https://www.facebook.com/Jscrambler.AppSec','https://www.twitter.com/jscrambler','https://www.linkedin.com/company/jscrambler/mycompany/','');
|
||
INSERT INTO vendors VALUES('2f95eeab-f064-4330-bf3a-3e72bf154947','published','quantropi-inc','Quantropi Inc.','quantropi.com','Quantropi''s QiSpace™ and TrUE suite of quantum-secure cryptographic solutions and quantum entropy services enable public and private organizations to protect their data and communications from today''s AI cyberattacks and tomorrow''s quantum threat.','1545 Carling Ave. ','Suite 620','Ottawa','ON','CAN','bbd55995-86b0-488c-89ff-1acc8ed2da94',replace('<h5>Quantropi Inc.</h5>\n<p>\nRecent breakthroughs using hybrid attack methods that incorporate AI & machine learning have drastically reduced the quantum capabilities required for “Y2Q” – the day bad actors will be in a position to break today’s encryption. Meanwhile, the pace of quantum computing innovation is rapidly accelerating. Combined with more efficient AI and machine learning hybrid attack methods, Y2Q could be just 1 – 3 years away.\nQuantropi is a cybersecurity company that provides quantum-secure encryption solutions to enterprises, governments, product manufacturers, and the IoT market. Quantropi''s QiSpace™ is the only platform on the planet offering a full suite of quantum-secure cryptographic products and quantum entropy services.\nProtect data, networks, connected devices, and communications, from today’s AI threats and tomorrow’s quantum attacks — now and forever.<br>\n</p>\n<h5>Why Quantropi Inc.?</h5>\n<p>QiSpace™ is a TrUE quantum-secure cryptography platform for enterprises, governments, product manufacturers, and the IoT market.\nUniquely capable of all three prerequisites for end-to-end quantum security – Trust, Uncertainty, and Entropy – only QiSpace™ provides “TrUE” quantum security. MASQ™ – Quantropi’s Trust offering – provides quantum-secure asymmetric encryption, also known as post-quantum cryptography (PQC). QEEP™ – Quantropi’s Uncertainty offering – provides quantum-secure symmetric encryption that’s up to 18 times faster than AES-256. And SEQUR™ – Quantropi’s Entropy offering – provides quantum random number generation and quantum-secure distribution to enable the full security potential of current cryptographic algorithms.</p>','\n',char(10)),NULL,'https://www.twitter.com/quantropi','https://www.linkedin.com/company/quantropi/','');
|
||
INSERT INTO vendors VALUES('be275ea1-7268-4fc2-ba38-73b277967485','published','meritalk','MeriTalk','www.meritalk.com',NULL,'921 King St.',NULL,' Alexandria','VA','USA','4a4ac6cb-3978-47c1-81ec-397ca672c479',replace('<h5>MeriTalk</h5>\n<p>\nMeriTalk is the #1 platform in government IT, covering the latest in cybersecurity news. We foster vital engagement between government and industry – innovating together to improve IT outcomes. Visit MeriTalk.com and MeriTalkSLG.com for the latest news, research, events, and insight for the government IT community.\n• Subscribe to MeriTalk’s newsletter: https://meritalk.com/\n• Learn how to get involved with our programs: sales@meritalk.com<br>\n</p>\n<h5>Why MeriTalk?</h5>\n<p>MeriTalk programs enable IT organizations to reach their target public sector audience(s) – Federal and State & Local. Offerings include advertising, demand generation, digital marketing, editorial, events, networking opportunities, research, and more.</p>','\n',char(10)),NULL,'https://www.twitter.com/MeriTalk','https://www.linkedin.com/company/meritalk/','');
|
||
INSERT INTO vendors VALUES('e618ce8c-c27a-4d10-8eb6-37060a353b8b','published','wib','Wib','www.wib.com','Wib is revolutionizing API security with its holistic API security platform providing continuous and complete visibility and control across the entire API ecosystem. Our advanced API security protects the digital economy and empowers innovation.','144 Menahem Begin Street',NULL,'Tel Aviv',NULL,'ISR','0649c0a2-f138-4fd0-9949-66f8479a024e',replace('<h5>Wib</h5>\n<p>\nWib is pioneering a new era in API security with its industry first holistic API security platform. Providing continuous and complete visibility and control across the entire API ecosystem, Wib enables developers to code with confidence and security teams to secure with surety.\nWib’s elite team of developers, attackers, defenders and seasoned cybersecurity professionals draw on real-world experience and expertise to help define and develop innovative technology solutions that enable customers with the identity, inventory and integrity of every API, wherever it may be within the development lifecycle, without compromising development or stifling\ninnovation.\nWib is Headquartered in Tel Aviv, Israel with international presence in Houston, USA and London, UK. It was founded in August 2021 by serial entrepreneur Gil Don (CEO), Ran Ohayon (CRO) and Tal Steinherz who previously served as the CTO of Israel’s national cyber directorate.<br>\n</p>\n<h5>Why Wib?</h5>\n<p>Wib''s Fusion platform secures the APIs that fuel our digital economy. It''s the industry''s first and only holistic API security solution providing security, visibility and analysis across code, testing and production.\nThe platform consists of 3 layers:\n- Fusion Discovery: Understand the true attack surface with automated API inventory and API documentation, exposing all APIs, known and unknown.\n- Fusion Defense: Discover OWASP API security vulnerabilities and extract poor encryption and authorization methods across the entire API lifecycle.\n- Fusion Analysis: Assess the risk and business impact of APIs and prioritize remediation based on actionable insights and recommendations.\nTraditional and legacy technologies such as web application firewalls (WAFs) and API gateways were not designed to protect against the API attacks of today, leaving organizations dangerously exposed. The Fusion platform has been purpose-built to address the growing risk posed by the API attack surface.</p>','\n',char(10)),NULL,NULL,'https://linkedin.com/company/wibsecurity','');
|
||
INSERT INTO vendors VALUES('f5a8cfb4-0fa0-4c37-8245-50fea76e1303','published','mitre','MITRE','mitre.org','At MITRE, we''re dedicated to solving problems for a safer world. That includes advancing the worldwide community of cyber defenders with the knowledge, training, frameworks, and tools needed to address the ever-evolving challenges in cybersecurity.','7596 Colshire Dr.',NULL,'McLean','VA','USA','a24531a4-2c50-4ae7-9443-0a1f5cc1215b',replace('<h5>MITRE</h5>\n<p>\nMITRE draws from a wealth of deep technical expertise to create innovative solutions that address ever-evolving cyber challenges. As part of our cybersecurity research in the public interest, MITRE has a 50-plus-year history of developing standards and tools used by the broad cybersecurity community. With frameworks like ATT&CK®, Engage™, and CALDERA™ and a host of other cybersecurity tools, MITRE empowers the worldwide community of cyber defenders. We give them vital information to thwart network intruders, build resiliency against future attacks, and develop assurance to overcome possible vulnerabilities. <br>\n</p>','\n',char(10)),'https://www.facebook.com/MITREcorp','https://www.twitter.com/MITREcorp','https://www.linkedin.com/company/mitre/','');
|
||
INSERT INTO vendors VALUES('65c121bd-fa65-416e-902f-1f5bbb7fed1d','published','mezmo','Mezmo','www.mezmo.com?utm_medium=sponsorship&utm_source=sponsorship-partner&utm_campaign=fy23q2-rsa',replace('Mezmo provides an observability pipeline to collect, transform, and route telemetry data to control costs and drive actionability. \nIngest, process, and route data to make it more consumable to drive faster decision-making across various use cases.','\n',char(10)),'2059 Camden Avenue ','#297','San Jose','CA','USA','05f53d58-4095-40a3-ad3e-cc69e208c071',replace('<h5>Mezmo</h5>\n<p>\nMezmo provides an observability pipeline to collect, transform, and route telemetry data to control costs and drive actionability.\nMezmo helps organizations derive more value from their telemetry data. Centralize data from various sources via our open platform, apply out-of-the-box and custom processors to transform data to drive actionability, and route it to end destinations for further analysis. This empowers teams to make crucial decisions faster, all while better controlling data costs.\nMezmo provides this level of control on a platform that is loved by customers for its speed, ease of use, and scale. The platform gives customers flexibility, regardless of the other tools they are using in their observability and security stacks. <br>\n</p>\n<h5>Why Mezmo?</h5>\n<p>Mezmo provides a telemetry pipeline to collect, transform, and route telemetry data to control costs and drive actionability.\nMezmo helps organizations derive more value from their telemetry data. Centralize data from various sources via our open platform, apply out-of-the-box and custom processors to transform data to drive actionability, and route it to end destinations for further analysis. This empowers teams to make crucial decisions faster, all while better-controlling data costs.\nMezmo provides this level of control on a platform that is loved by customers for its speed, ease of use, and scale. The platform gives customers flexibility, regardless of the other tools they are using in their observability and security stacks. </p>','\n',char(10)),'https://www.facebook.com/MezmoData','https://www.twitter.com/mezmodata','https://www.linkedin.com/company/mezmo/','');
|
||
INSERT INTO vendors VALUES('5fee1578-740c-4911-86cc-1f2eef6ae5c0','published','wiz','Wiz','https://www.wiz.io/','Wiz secures everything organizations build and run in the cloud. Organizations across verticals, including 30% of the F100, use our agentless graph-based platform to accurately identify, prioritize, and remove critical risks. Learn more at wiz.io.','One Manhattan West ','57th Floor','New York','NY','USA','d8f3f181-2263-451f-8727-dbcadf2c239a',replace('<h5>Wiz</h5>\n<p>\nWiz helps organizations rapidly identify and remove critical risks in their cloud environments. Founded in 2020, Wiz is the fastest-growing software company in the world, scaling from $1M to $100M ARR in 18 months. Organizations of every size, including 30+ percent of the Fortune 100, use Wiz''s purpose-built cloud security platform to gain full-stack visibility, accurate risk prioritization, and enhanced business agility. Wiz connects in minutes to scan the entire cloud environment without agents and identifies the flaws representing real risk. Security and cloud teams then proactively remove risk and harden cloud environments with remediation workflows. Wiz''s customers include Salesforce, Slack, Mars, BMW, Avery Dennison, Priceline, Cushman & Wakefield, DocuSign, Plaid, and Agoda, among others. Visit https://www.wiz.io/ for more information.\n<br>\n</p>\n<h5>Why Wiz?</h5>\n<p>Wiz helps organizations rapidly identify and remove critical risks in their cloud environments. Founded in 2020, Wiz is the fastest-growing software company in the world, scaling from $1M to $100M ARR in 18 months. Organizations of every size, including 30+ percent of the Fortune 100, use Wiz''s cloud security platform to gain full-stack visibility, accurate risk prioritization, and enhanced business agility. Wiz connects in minutes to scan the entire cloud environment without agents and identifies the flaws representing real risk. Security and cloud teams then proactively remove risk and harden cloud environments with remediation workflows. Wiz''s customers include Salesforce, Slack, Mars, BMW, Avery Dennison, Priceline, Cushman & Wakefield, DocuSign, Plaid, and Agoda, among others. Visit https://www.wiz.io for more information. </p>','\n',char(10)),'https://www.facebook.com/wiz.io.sec','https://www.twitter.com/wiz_io','https://www.linkedin.com/company/wizsecurity/ ','');
|
||
INSERT INTO vendors VALUES('1ab61476-e2ae-413e-8128-c890f9161361','published','okta','Okta','www.okta.com','Okta is the World’s Identity Company. We free everyone to safely use any technology. Our Workforce and Customer Identity Clouds enable secure yet flexible access, authentication,and automation that transforms how people move through the digital world','100 First Street ','6th Floor','San Francisco','CA','USA','ac60f76a-822e-4636-872e-9e23fe5f86e1',replace('<h5>Okta</h5>\n<p>\nOkta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.<br>\n</p>\n<h5>Why Okta?</h5>\n<p>Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.</p>','\n',char(10)),'https://www.facebook.com/Okta/','https://www.twitter.com/okta','https://www.linkedin.com/company/okta-inc-/','');
|
||
INSERT INTO vendors VALUES('0d90814a-204d-4825-8b64-dd610d99287a','published','onapsis','Onapsis','www.onapsis.com','Onapsis protects the business applications that run the global economy. The Onapsis Platform uniquely delivers vulnerability management, threat detection and response, change assurance, and continuous compliance for business-critical applications from leading vendors such as SAP, Oracle, and others.','101 Federal Street ','Suite 1800','Boston','MA','USA','669a0a58-6329-4810-aa4a-d457bf0bdfba',replace('<h5>Onapsis</h5>\n<p>\nOnapsis protects the business applications that run the global economy. The Onapsis Platform uniquely delivers vulnerability management, threat detection and response, change assurance, and continuous compliance for business-critical applications from leading vendors such as SAP, Oracle, and others. The Onapsis Platform is powered by the Onapsis Research Labs, the team responsible for the discovery and mitigation of more than 1,000 zero-day vulnerabilities in business-critical applications.\nOnapsis is headquartered in Boston, MA, with offices in Heidelberg, Germany and Buenos Aires, Argentina, and proudly serves hundreds of the world’s leading brands, including close to 30% of the Forbes Global 100, six of the top 10 automotive companies, five of the top 10 chemical companies, four of the top 10 technology companies, and three of the top 10 oil and gas companies.\nFor more information, connect with us on Twitter or LinkedIn, or visit https://www.onapsis.com.<br>\n</p>','\n',char(10)),'https://www.facebook.com/Onapsis/','https://www.twitter.com/onapsis','https://www.linkedin.com/company/onapsis','');
|
||
INSERT INTO vendors VALUES('09055303-fa56-47ff-b270-dc4786cae6a6','published','harness','Harness','www.harness.io',replace('Harness, an end-to-end platform for complete software delivery, empowers developers to release applications into production securely, detects quality of deployments and rolls back failed ones, saving time and reducing the need for manual oversight.\n','\n',char(10)),'55 Stockton Street',NULL,'San Francisco','CA','USA','02327553-f752-4545-97e3-65ea292fa5ea',replace('<h5>Harness</h5>\n<p>\nHarness, an end-to-end platform for complete software delivery, empowers software developers and DevOps teams to release applications into production securely and at the increased velocity business constantly demands. Harness uses machine learning to detect the quality of deployments and automatically roll back failed ones, saving time and reducing the need for custom scripting and manual oversight, giving engineers their weekends back. Harness Inc. is based in San Francisco. www.harness.io.<br>\n</p>\n<h5>Why Harness?</h5>\n<p>Harness STO integrates with multiple open-source and commercial security scanners for secure pipeline development and security testing. Orchestrating application security scanners across software delivery and processing the output of the scanners allows for both enhanced application security and high delivery velocity. With assistance from STO, enterprises can ensure they adhere to industry governance and compliance requirements. Key Harness STO differentiators include deep CI/CD integration with the ability to create appropriate app security testing guardrails within various stages of CI and CD pipelines. Customizable application security testing policies defined by what is best for each service, team, or organization. Pipeline governance by defining and enforcing usage of application security testing guardrails across CI and CD pipelines. Intelligent deduplication & prioritization of data collected from application security scanners to reduce burden on engineering and innovation.\n</p>','\n',char(10)),'https://www.facebook.com/harnessinc/','https://www.twitter.com/harnessio','https://www.linkedin.com/company/harnessinc/','');
|
||
INSERT INTO vendors VALUES('0c864123-2bad-4a81-a0fb-5b24eb96d563','published','zerofox','ZeroFox','https://www.zerofox.com/','ZeroFox (Nasdaq: ZFOX), is the pioneer in external cybersecurity, delivering the world’s first unified solution to expose malicious activity and end cyber threats targeting your most critical external assets – brands, domains and people.','1834 S. Charles St.',NULL,'Baltimore','MD','USA','a89bd34c-7690-45f5-917b-aefb90b9971b',replace('<h5>ZeroFox</h5>\n<p>\nZeroFox (Nasdaq: ZFOX), is the leader in external cybersecurity, empowering organizations to stay ahead of threat actors by informing early, protecting proactively, and responding rapidly to threats outside the perimeter. The ZeroFox Platform provides global intelligence collection across the surface, deep and dark web, domains and social media, discovering and analyzing hidden threats to your brands, data, assets and people. Expert analysts and threat hunters serve as an extension of your team, embedded in the criminal underground and always ready to take action on your behalf to disrupt adversaries. Gain visibility into external threats, reduce risk and protect your organization, brands, data and assets beyond the corporate network. <br>\n</p>\n<h5>Why ZeroFox?</h5>\n<p>ZeroFox (Nasdaq: ZFOX), an enterprise software-as-a-service leader in external cybersecurity, has redefined security outside the corporate perimeter on the internet, where businesses operate, and threat actors thrive.\nThe ZeroFox platform combines advanced AI analytics, digital risk and privacy protection, full-spectrum threat intelligence, and a robust portfolio of breach, incident and takedown response capabilities to expose and disrupt phishing and fraud campaigns, botnet exposures, credential theft, impersonations, data breaches, and physical threats that target your brands, domains, people, and assets.\nThousands of ZeroFox customers, including some of the largest public sector organizations as well as finance, media, technology and retail companies to stay ahead of adversaries and address the entire lifecycle of external cyber risks. See why customers choose ZeroFox: https://www.zerofox.com/why-zerofox</p>','\n',char(10)),'https://www.facebook.com/GetZeroFox/','https://www.twitter.com/ZeroFox','https://www.linkedin.com/company/zerofox/mycompany/','');
|
||
INSERT INTO vendors VALUES('ba2b018b-5eae-4e22-812c-6995f863a298','published','penn-state-world-campus','Penn State World Campus','worldcampus.psu.edu/rsac','Whether you''re just starting out in the IT field, or ready to advance your career, Penn State''s online degrees can help you gain the expertise you need to succeed. Penn State World Campus has programs that meet all levels of experience.','227 Outreach Building',NULL,'University Park','PA','USA','ed7eed9b-61ad-464f-894d-e0b70866f549',replace('<h5>Penn State World Campus</h5>\n<p>\nWhether you''re just starting out in the IT field, or ready to advance your career, Penn State''s online degrees can help you gain the expertise you need to succeed. Penn State World Campus has programs that meet all levels of experience. <br>\n</p>\n<h5>Why Penn State World Campus?</h5>\n<p>Whether you''re just starting out in the IT field, or ready to advance your career, Penn State''s online degrees can help you gain the expertise you need to succeed. Penn State World Campus has programs that meet all levels of experience. </p>','\n',char(10)),'https://www.facebook.com/psuworldcampus','https://www.twitter.com/PSUWorldcampus','https://www.linkedin.com/school/penn-state-world-campus/mycompany/','');
|
||
INSERT INTO vendors VALUES('85c34693-3502-4ffa-8b34-405e964e0355','published','panorays','Panorays','www.panorays.com','Panorays automates, accelerates and scales your third-party security evaluation and management process so you can easily manage and remediate risk','155 East 44th Street ','Suite 701','New York','NY','USA','2e849b2e-d688-4352-a2f6-f796a2191fca',replace('<h5>Panorays</h5>\n<p>\nPanorays is dedicated to eliminating third-party security risk so companies worldwide can quickly and securely do business together. With its solution, users can manage, mitigate and remediate supplier security risks, reduce breaches and improve security across the board. The company is recognized as a strong performer by Forrester, and received the highest rating in the criteria of data accuracy and risk context.<br>\n</p>\n<h5>Why Panorays?</h5>\n<p>Panorays is a rapidly growing provider of third-party security risk management software, offered as a SaaS-based platform. The company serves enterprise and mid-market customers primarily in North America, the UK and the EU, and has been adopted by leading banking, insurance, financial services and healthcare organizations, among others. Headquartered in New York and Israel, with offices around the world, Panorays is funded by numerous international investors, including Aleph VC, Oak HC/FT, Greenfield Partners, BlueRed Partners (Singapore), StepStone Group, Moneta VC, Imperva Co-Founder Amichai Shulman and former CEO of Palo Alto Networks Lane Bess. Visit us at www.panorays.com.</p>','\n',char(10)),'https://www.facebook.com/panorays','https://www.twitter.com/panorays','https://www.linkedin.com/company/panorays','');
|
||
INSERT INTO vendors VALUES('7ee090ae-384d-48a4-a9be-bfcbd8563b6a','published','noname-security','Noname Security','https://nonamesecurity.com/','Noname Security is taking a complete, proactive approach to API Security. Noname works with 20% of the Fortune 500 and covers the entire API security scope across three pillars - Posture Management, Runtime Security, and API Security Testing. ','181 Metro Drive',NULL,'San Jose','CA','USA','f685ad79-f766-451a-a01c-a4334933c862',replace('<h5>Noname Security</h5>\n<p>\nAbout Noname Security\nNoname Security is the leader in API security and the only solution with a complete, proactive, and flexible platform to align development and security teams. The Noname Security platform covers the entire API lifecycle from discovery, posture management, and runtime protection for your live APIs and security testing to ensure new APIs are built with security from the beginning. Noname Security has customers from the Fortune 100 to mid-sized organization, all of whom depend on their APIs for growth. Noname Security is privately held with headquarters in Silicon Valley, California, and offices in Tel Aviv and Amsterdam.<br>\n</p>\n<h5>Why Noname Security?</h5>\n<p>Noname Security is the market leader and defines what API security means. Our platform delivers the most complete API security solution, offers the greatest deployment flexibility, and provides the fastest time to value.\n1. The most effective API posture management solution - Noname delivers the broadest collection of cloud partner and on-premises integrations for visibility into and protection of your entire API ecosystem.\n2. The fastest time-to-value for your API security program - Simplified deployment and the most comprehensive cloud and on-premises partnerships means you can connect and see your APIs with minimal setup or custom configuration.\n3. The most flexible deployment options - Only Noname can deploy to match your business requirements. Whether you have a private cloud, run on a public cloud (including multi-cloud environments), or use a hybrid of both approaches, we’ve got you covered.</p>','\n',char(10)),'https://www.facebook.com/nonamesec/','https://www.twitter.com/NonameSecurity','https://www.linkedin.com/company/nonamesecurity/','');
|
||
INSERT INTO vendors VALUES('fa75d639-1a22-494e-9ca3-fc1ce609adef','published','nsfocus','NSFOCUS','www.nsfocusglobal.com','NSFOCUS protects telcos, ISPs, MSSPs & enterprises from advanced cyberattacks. Its Intelligent Hybrid Security strategy utilizes cloud + on-premises products and services with real-time global threat intelligence to provide multi-layered, unified and dynamic cyber defense. ','690 N McCarthy Blvd','Suite 170','Milpitas','CA','USA','0a321e46-5d6f-41d4-bc5b-f1c0d5d4c41e',replace('<h5>NSFOCUS</h5>\n<p>\nNSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company''s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against ever-evolving cyber threats.\nNSFOCUS works with Fortune Global 500 companies, including four of the world''s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).\nNSFOCUS Inc. is a wholly owned subsidiary of NSFOCUS Technologies Group Co., Ltd., operating in the Americas, Europe, the Middle East and Asia Pacific.<br>\n</p>','\n',char(10)),'https://www.facebook.com/nsfocus','https://www.twitter.com/NSFOCUS_Intl','www.linkedin.com/company/nsfocus/','');
|
||
INSERT INTO vendors VALUES('5bcca7c1-3650-4193-9de8-ae6ec70f8cff','published','national-security-agency','National Security Agency','www.nsa.gov','The NSA leads the U.S. Government in cryptology that encompasses both signals intelligence insights and cybersecurity products and services and enables computer network operations to gain a decisive advantage for the nation & our allies.','9800 Savage Road',NULL,'Ft. Meade','MD','USA','ae98a449-2d45-4221-a94f-a7fed4e2f8f2',replace('<h5>National Security Agency</h5>\n<p>\nThe National Security Agency/Central Security Service (NSA/CSS) leads the U.S. Government in cryptology that encompasses both signals intelligence (SIGINT) insights and cybersecurity products and services and enables computer network operations to gain a decisive advantage for the nation and our allies. <br>\n</p>','\n',char(10)),'https://www.facebook.com/NSAUSGov/','https://www.twitter.com/NSAGov','https://www.linkedin.com/company/national-security-agency/','');
|
||
INSERT INTO vendors VALUES('e5dadade-5350-4fbd-a7c5-85c15dd88c2e','published','ninjaone','NinjaOne','https://www.ninjaone.com/','NinjaOne''s Unified IT Management platform enables IT departments to centrally manage, support, patch, and secure any endpoint anywhere within one intuitive platform that improves technician efficiency and device security.','301 Congress Avenue','Suite 400','Austin','TX','USA','e309e9c8-4fb0-4ebb-a10d-02010c2fbb59',replace('<h5>NinjaOne</h5>\n<p>\nNinjaOne''s Unified IT Management platform enables IT departments to centrally manage, support, and secure endpoints within one fast, modern, intuitive platform that improves technician efficiency and device security.\nNinjaOne supports over 9,000 customers around the world, and is consistently ranked #1 for its world-class customer support. NinjaOne has been recognized as the best rated software in its category on G2 and Gartner Digital Markets for the past 3 years.<br>\n</p>\n<h5>Why NinjaOne?</h5>\n<p>With NinjaOne you get a unified tool to centrally monitor, manage, and secure all your servers, workstations, laptops, virtual machines, and networking devices. Our cloud-native solution enables centralized management of any device, on any network, anywhere in the world without the need for on-premises infrastructure or a VPN.\nYou get:\n- Fully-automated cloud-based patch management across Windows, Mac, and Linux endpoints\n- A powerful automation engine that saves you 30%+ time on device hardening & management\n- Device monitoring and alerting to make your IT team far more proactive\n- One-click remote access for quick remote support\n- IT-specific ticketing with in-context device support and management\n- Endpoint backup to protect critical business data from ransomware and loss</p>','\n',char(10)),'https://www.facebook.com/ninjarmm/','https://www.twitter.com/NinjaRMM','https://www.linkedin.com/company/ninjaone/','');
|
||
INSERT INTO vendors VALUES('656bf372-f25a-493e-bb80-c837ba8966a9','published','xm-cyber','XM Cyber','www.xmcyber.com','XM Cyber is a hybrid cloud security company changing the way organizations approach cyber risk. By continuously uncovering hidden attack paths to critical assets, it enables security teams to remediate exposures at key junctures and eradicate risk. ','7 Sapir',NULL,'Herzlyia',NULL,'ISR','98500a7f-c368-4fd1-be2d-eada067aeac9',replace('<h5>XM Cyber</h5>\n<p>\nXM Cyber is a leading hybrid cloud security company that’s changing the way organizations approach cyber risk. XM Cyber transforms exposure management by demonstrating how attackers leverage and combine misconfigurations, vulnerabilities, identity exposures, and more, across AWS, Azure, GCP and on-prem environments to compromise critical assets. With XM Cyber, you can see all the ways attackers might go, and all the best ways to stop them by remediating exposures, to eradicate risk at a fraction of the effort. Many of the world’s largest, most complex organizations choose XM Cyber to help eradicate risk. Founded by top executives from the Israeli cyber intelligence community, XM Cyber has offices in North America, Europe, and Israel.<br>\n</p>\n<h5>Why XM Cyber?</h5>\n<p>XM Cyber is the go-to solution for security teams looking to prioritize their remediation efforts and reduce risk in the most cost-efficient manner. As security issues continue to mount and hybrid cloud environments become more complex, XM Cyber provides an attacker''s perspective of how these environments can be compromised. By combining toxic exposures such as CVEs, misconfigurations, identity exposures, and security control gaps, XM Cyber maps all possible attack paths onto an attack graph, providing the context security teams need to identify and prioritize remediation efforts accurately.\nWith XM Cyber, you can uncover security control gaps and exploitable exposures in your environment, understand how attackers use them to move through your hybrid and cloud networks, and cut them off at choke points to prioritize what matters most.\nBenefits include continuous & safe risk visibility, cost effective remediation, hybrid cloud attack surface reduction, security posture score & trends.</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/xm/','');
|
||
INSERT INTO vendors VALUES('344fa12a-c3c4-42a0-90be-f291453fbfd4','published','logicgate','LogicGate','www.logicgate.com','LogicGate''s Risk Cloud® is the most nimble and collaborative GRC solution out there. Automate. Collaborate. Build. Risk Cloud’s interconnected view of risk helps you risk better. After all, great companies don’t avoid risks but choose the right ones.','320 W Ohio St.','#5E','Chicago','IL','USA','02a21d05-404f-429b-99ca-669b7d1ac02b',replace('<h5>LogicGate</h5>\n<p>\nLogicGate was founded with a rebellious spirit and lofty objectives: to offer modern, well-supported risk transformation software that scales exactly to the customer’s maturity, extends their capability, improves efficiency, and empowers insight. Because risk is a team sport, we created Risk Cloud® — the most nimble and collaborative GRC platform out there. Rapidly adapt to changing business conditions. Confidently innovate and build new processes as you go. Collaborate on risk across your entire organization. Risk Cloud gives you a truly holistic view of risk that you just can’t get from point solutions. After all, great companies are built not by avoiding risks — but by choosing the right ones.\nAt LogicGate, we set out to build a different technology company. We are passionate about risk, technology, and people. And when you combine these three things, magic happens. <br>\n</p>\n<h5>Why LogicGate?</h5>\n<p>Risk Cloud® is the most nimble and collaborative GRC platform out there. Risk Cloud gives you an interconnected view of risk that you just can’t get from point solutions. Rapidly adapt to changing business conditions. Confidently innovate and build new processes as you go. Collaborate on risk across your entire organization. By opening up the expansive world of GRC on one holistic platform, anyone can create a market-leading risk program.</p>','\n',char(10)),NULL,'https://www.twitter.com/LogicGate','https://www.linkedin.com/company/logic-gate/','');
|
||
INSERT INTO vendors VALUES('e0c1f69c-be3b-4efa-9234-e4d5399e3cdc','published','lansweeper','Lansweeper','www.lansweeper.com',NULL,'Zeelsebaan 83/Z',NULL,'Dendermonde',NULL,'BEL','34b49074-53ba-4728-8a40-bc1e8021fb6c',replace('<h5>Lansweeper</h5>\n<p>\nLansweeper provides a unique Technology Asset Intelligence platform helping businesses better understand, manage and protect their technology estate and network. Lansweeper helps customers minimize risks and optimize their technology investments by providing actionable insight into their technology estate at all times, offering trustworthy, valuable, and accurate insights about the state of users, devices, and software.\nLansweeper has been developing a software platform that scans and inventories all IT devices, installed software, and active users on a network - allowing organizations to manage their IT centrally.\nThe Lansweeper platform currently discovers and monitors over 80 million connected devices from 28,000+ customers, including Mercedes, Michelin, Liverpool FC, Carlsberg, Nestle, IBM, and Samsung, along with governments, banks, NGOs, and universities, driven by its 300+ strong team across the world.<br>\n</p>\n<h5>Why Lansweeper?</h5>\n<p>Increase Visibility\nEliminate the blind spots and discover hardware and software assets you didn''t even know about.\nImprove Efficiency\nAuto-populate your CMDB, enrich service desk tickets, and track your asset''s lifecycle to make time for what you do best.\nManage Risk\nDetect rogue devices, vulnerabilities and non-compliance issues before they become a problem.\nReduce Costs\nReveal needless expenses, support budgeting decisions and manage your IT cost-effectively with accurate data.</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/lansweeper/mycompany/verification/','');
|
||
INSERT INTO vendors VALUES('34cb920e-32e7-42c5-828e-c6b35d741ba7','published','swimlane','Swimlane','https://swimlane.com/','Swimlane provides cloud-scale, low-code security automation for organizations of all industries and sizes. Our technology is relied upon by major security-forward organizations including Sony, Lumen, Sagicor and Toshiba. ','363 Centennial Pkwy',NULL,'Louisville','CO','USA','d7bda256-7619-4365-8708-a60223d59213',replace('<h5>Swimlane</h5>\n<p>\nSwimlane provides cloud-scale, low-code security automation for organizations of all industries and sizes. Our technology is relied upon by major security-forward organizations including Sony, Lumen, Sagicor and Toshiba. Customers consistently rate us as the #1 trusted low-code security automation platform. Swimlane Turbine harnesses the power of the world’s most extensible security automation engine to unlock the potential of automation beyond the security operations center (SOC) and serve as the system of record for the entire security organization.\nOur mission – to prevent breaches and enable continuous compliance via a low-code security automation platform that serves as the system of record for the entire security organization.<br>\n</p>\n<h5>Why Swimlane?</h5>\n<p>Swimlane is the leader in cloud-scale, low-code security automation. Swimlane unifies security operations in-and-beyond the SOC into a single system of record that helps overcome process and data fatigue, chronic staffing shortages, and quantifying business value. The Swimlane Turbine platform combines human and machine data into actionable intelligence for security leaders.</p>','\n',char(10)),'https://www.facebook.com/getswimlane/','https://www.twitter.com/swimlane/','https://www.linkedin.com/company/swimlane/','');
|
||
INSERT INTO vendors VALUES('1514740a-9c8a-40c3-aade-61df96ccb625','published','lookout','Lookout','www.lookout.com','With a unified policy engine, complete visibility & data-centric approach, Lookout protects mobile endpoints & secures access to corporate apps and data. Secure your hybrid workforce, detect & mitigate risk across all your endpoints, apps and data.','3 Center Plaza','Suite 330','Boston','MA','USA','c9e0fdd9-606a-4102-824f-b479d7c9a3f3',replace('<h5>Lookout</h5>\n<p>\nLookout, Inc. is the endpoint to cloud security company purpose-built for the intersection of enterprise and personal data. We safeguard data across devices, apps, networks and clouds through our unified, cloud-native security platform.<br>\n</p>\n<h5>Why Lookout?</h5>\n<p>Lookout is the only security provider that addresses your needs across mobile EDR as well as SSE.\nHere are 3 reasons for you to consider Lookout:\nEnhance your endpoint security strategy with mobile EDR. Lookout integrates seamlessly with your existing infrastructure, including mobile device or unified endpoint management (MDM or UEM) solutions, to enhance protection of your modern devices that run operating systems like iOS, Android and Chrome OS.\nDynamic zero-trust access that safeguards your data. Unlike many of the existing SSE products, which focus on allowing or denying access to just your apps, the Lookout Cloud Security Platform is built with native data protection capabilities to go beyond access and protect your data.\nComplete end to end visibility to discover shadow IT and reduce risk of insider threat. With a single control plane, Lookout gets visibility of all the user traffic going to your corporate apps, and to the Internet. </p>','\n',char(10)),'https://www.facebook.com/lookoutinc','https://www.twitter.com/lookout ','https://www.linkedin.com/company/lookout','');
|
||
INSERT INTO vendors VALUES('86f34b08-738b-4b18-a7ce-3c011b3ecf3e','published','securonix','Securonix','www.securonix.com','Securonix provides threat detection and response solutions powered by the most advanced analytics and built on a scalable, flexible cloud native architecture. Securonix Unified Defense SIEM enables fast, precise incident response, providing high fidelity alerts with analytics that pioneered the UEBA category. For more information visit www.securonix.com.','5080 Spectrum Drive','Suite 950W','Addison','TX','USA','92167223-9c16-459e-b910-303676c45172',replace('<h5>Securonix</h5>\n<p>\nSecuronix is redefining threat detection and response for today’s hybrid cloud, data-driven enterprise. Securonix Unified Defense SIEM is powered by the most advanced analytics and built on a scalable, flexible cloud native architecture. Securonix leverages behavioral analytics technology that pioneered the UEBA category to reduce noise, prioritize high fidelity alerts, and enable fast and precise response to insider and cyber threats. For more information visit www.securonix.com.<br>\n</p>\n<h5>Why Securonix?</h5>\n<p>For modern organizations combating sophisticated threats, Securonix Unified Defense SIEM is the security information and event management solution that delivers the most advanced threat analytics and up-to-date content to keep pace with today’s most aggressive threat actors. Unlike other SIEMs, Securonix Unified Defense SIEM builds on the user and behavior analytics that pioneered the UEBA space to deliver more effective threat detection and response to avoid and minimize the impact of threats.\n</p>','\n',char(10)),'https://www.facebook.com/Securonix/','https://www.twitter.com/Securonix','https://www.linkedin.com/company/securonix','');
|
||
INSERT INTO vendors VALUES('f0ee04c0-f741-46c4-bff7-d3c829a3dcc9','published','syxsense','Syxsense','www.syxsense.com','Syxsense delivers real-time vulnerability monitoring & intelligent automation for IT management, patch management, and security remediation with a Zero Trust approach. We secure every endpoint, remote, roaming, or in the cloud, from a single console.','100 Bayview Circle','Suite 100','Newport Beach','CA','USA','5a4e88f2-0c6d-4977-87a1-f2e9b11564ac',replace('<h5>Syxsense</h5>\n<p>\nSyxsense delivers real-time vulnerability monitoring & intelligent automation for IT management, patch management, and security remediation with a Zero Trust approach. We secure every endpoint, remote, roaming, or in the cloud, from a single console.\nHeadquartered in Newport Beach, California, Syxsense is a growing and dynamic organization with offices in four countries and 12 partners in nine countries. Over the past 10 years, Syxsense has worked with more than 500 companies ranging from 100 to 100,000 endpoints delivering a variety of solutions for organizations of all sizes as well as Managed Service Providers (MSPs).\nThe Syxsense product portfolio includes: Syxsense Manage, Syxsense Secure, & Syxsense Enterprise.\nSyxsense’s technologies are offered either directly or through an extensive network of solutions providers serving a variety of markets, including healthcare, government, education, financial services, legal, manufacturing, retail, transportation, and utilities.<br>\n</p>\n<h5>Why Syxsense?</h5>\n<p>Syxsense is a Unified Security & Endpoint Management solution using a Zero Trust approach to IT management, patch management & security remediation for desktops, laptops, servers, mobile devices, virtual machines, & IoT in a single platform. It discovers all endpoints communicating over your network, remote, roaming, or in the cloud & brings OS, hardware, & software details into your cloud-based console with cross-platform support that includes Windows, Mac, Linux, Apple, and Android OS. The Cortex task sequencing & automation engine reduces the burden on IT teams to eliminate threats effectively & rapidly. It’s a powerful, no-code interface that enables teams to easily perform complex automated security scanning & remediation with a drag-and-drop interface. With the Enterprise Zero Trust feature, IT teams can evaluate the security posture of every endpoint communicating over the network & allow or deny access through automated device & user-based policies on an asset-by-asset level.\n</p>','\n',char(10)),'https://www.facebook.com/SyxsenseInc','https://www.twitter.com/Syxsenseit','https://www.linkedin.com/company/syxsense','');
|
||
INSERT INTO vendors VALUES('878e86fc-fae3-4866-bb83-3a1be8bcef3d','published','strike-graph','Strike Graph','http://strikegraph.com',replace('Strike Graph offers an easy, flexible security compliance solution that scales efficiently with your business needs — from SOC 2 to ISO 27001 to GDPR and beyond. \n\n\n\n','\n',char(10)),'999 Third Avenue','33rd Fl','Seattle','WA','USA','7ab4ac56-5a51-4edd-a694-25f9f3e0568d',replace('<h5>Strike Graph </h5>\n<p>\nStrike Graph simplifies security certifications, such as [SOC 2/ISO 27001/HIPAA/PCI DSS/GDPR], so companies can focus on driving their business forward. Our innovative, easy-to-use platform adapts to your company’s specific needs and then integrates with common business systems and infrastructure to automatically collect evidence for auditor review. Strike Graph empowers companies to create trust, pass audits, and close enterprise deals at a fraction of the time and cost of traditional methods.\n<br>\n</p>','\n',char(10)),'https://www.facebook.com/strikegraphinc/','https://www.twitter.com/StrikeGraph','https://www.linkedin.com/company/strikegraph/','');
|
||
INSERT INTO vendors VALUES('02c7860f-709d-4fa2-9c37-ae3b2b69b940','published','soos','SOOS','soos.io','SOOS is an open source vulnerability, monitoring, license, compliance, SBOM, and DAST (Dynamic Application Security Testing) platform that integrates easily into your developer pipelines and repositories. One low price for the whole team - Free Trial','20 Winooski Falls Way ','Suite 302','Winooski','VT','USA','646434df-c18d-425a-a033-e96e697825ae',replace('<h5>SOOS</h5>\n<p>\nSOOS is the affordable, easy to integrate Software Security Platform for your whole team. Scan your open source software for vulnerabilities, control the introduction of new dependencies, exclude unwanted license types, generate SBOMs, and fill out your compliance worksheets with confidence for one low monthly price. SOOS DAST gives your team a no limit dynamic application security test that integrates seamlessly into developer pipelines. Test all build branches automatically, find issues and assign remediation tasks directly into your workflow management systems. Flat fee pricing with no per seat licenses or pricing tiers.<br>\n</p>\n<h5>Why SOOS?</h5>\n<p>SOOS SCA helps you scan your open source software for vulnerabilities, control the introduction of new dependencies, exclude unwanted license types, generate SBOMs, and fill out your compliance worksheets. SOOS DAST gives your team a no limit dynamic application security test that integrates seamlessly into developer pipelines.\nSOOS is the affordable alternative to manage your software security. One click sign up, no sales calls, no seat limits with straightforward flat rate pricing.\nSOOS tools improve your organization’s security posture, prepare the business for compliance initiatives, expose open source license usage and provide a full accounting of what’s in the software you build (SBOM) so that you’re ready for emerging disclosure regulations.\n</p>','\n',char(10)),'https://www.facebook.com/soossoftware','https://www.twitter.com/soostech','https://www.linkedin.com/company/soos','');
|
||
INSERT INTO vendors VALUES('2bca2683-b849-4b90-8972-83bec81c41d1','published','coalfire','Coalfire','www.coalfire.com/','The world’s leading organizations trust Coalfire to elevate their cyber programs and secure the future of their business. #1 in compliance and cloud pen testing, Coalfire provides unparalleled technology-enabled professional and managed services.','11000 Westmoor Circle ','Suite 450','Westminster','CO','USA','596dac06-58fe-42c7-aa0a-19abaab37418',replace('<h5>Coalfire</h5>\n<p>\nThe world’s leading organizations – including the top five cloud service providers and leaders in financial services, healthcare, and retail – trust Coalfire to elevate their cyber programs and secure the future of their business. Number one in compliance, FedRAMP, and cloud penetration testing, Coalfire is the world’s largest firm dedicated to cybersecurity, providing unparalleled technology-enabled professional and managed services. <br>\n</p>','\n',char(10)),'https://www.facebook.com/coalfiresys/','https://www.twitter.com/coalfire','https://www.linkedin.com/company/coalfire/','');
|
||
INSERT INTO vendors VALUES('133a5af6-c6d7-4f8a-8405-bc5a89478e68','published','security-journey','Security Journey','https://www.securityjourney.com/','Security Journey (previously HackEDU), delivers secure code training and AppSec education to the entire SDLC team to help build a security-first development culture, improve efficiency, and reduce vulnerabilities. ','40 24th Street ','4th floor','Pittsburgh','PA','USA','4876981c-66f4-4eb4-b820-2e5c0e70c315',replace('<h5>Security Journey</h5>\n<p>\nSecurity Journey (previously HackEDU) delivers secure code training and AppSec education to the entire SDLC team to help build a security-first development culture, improve efficiency, and reduce vulnerabilities.\n<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/SecurityJourney','https://www.linkedin.com/company/security-journey','');
|
||
INSERT INTO vendors VALUES('671084ea-50aa-4a83-9617-f1152e202892','published','skopenow','Skopenow','www.skopenow.com','Skopenow helps ORC investigations by giving investigators the ability to analyze the subject''s online content using keyword & object recognition to flag brand mentions & photos of stolen products across third party listings and social media sites.','12 East 49th Street','11th Floor','New York','NY','USA','7c8e8300-be7e-4046-a975-d428e1b74b09',replace('<h5>Skopenow</h5>\n<p>\nSkopenow is an open-source intelligence platform providing situational awareness, people and business intelligence, and link analysis to help organizations identify, monitor, and mitigate potential threats and risks. With a strong focus on information security, Skopenow enables clients to make informed decisions based on real-time data.\nSkopenow’s turnkey, AI/ML-powered platform is trusted by more than 1,000 customers, including 20% of the Fortune 500 as well as large government and law enforcement agencies.\nFor more information please visit www.skopenow.com or e-mail us at sales@skopenow.com<br>\n</p>\n<h5>Why Skopenow?</h5>\n<p>Skopenow’s open-source intelligence platform enables organizations to make informed decisions based on real-time data while reducing manual processes, creating time and cost efficiencies.\nGrid, Skopenow’s situational awareness solution, delivers real-time information and alerts on critical events and incidents that may impact operations.\nWorkbench, Skopenow’s investigation product, provides comprehensive reports on individuals and companies, including their social media presence and history.\nAdditionally, Skopenow offers a link analysis module that enables organizations to visualize and analyze complex relationships between entities, helping to identify potential vulnerabilities and threats.\nFused together, these fully integrated solutions replace disjointed OSINT tools and legacy techniques. Over 1,000 customers, including 20% of the Fortune 500, trust Skopenow to help them stay ahead of the ever-evolving threat landscape and unlock the power of OSINT.</p>','\n',char(10)),'https://www.facebook.com/skopenow/','https://www.twitter.com/Skopenow','https://www.linkedin.com/company/skopenow','');
|
||
INSERT INTO vendors VALUES('3fa60e47-d313-47a9-8961-65452243de52','published','riskrecon-a-mastercard-company','RiskRecon, a Mastercard Company','www.riskrecon.com','RiskRecon’s cybersecurity ratings and assessments make it easy for you to understand and act on your risks, delivering accurate, risk-prioritized action plans custom-tuned to match your risk priorities. ','5241 S. State Street ','Unit 3','Murray','UT','USA','b3444263-06d0-470e-b8ad-069d21ed2635',replace('<h5>RiskRecon, a Mastercard Company</h5>\n<p>\nRiskRecon, a Mastercard Company, enables you to achieve better risk outcomes for your enterprise and your digital supply chain. RiskRecon’s cybersecurity ratings and assessments make it easy for you to understand and act on your risks, delivering accurate, risk-prioritized action plans custom-tuned to match your risk priorities. Learn more about RiskRecon and request a demo at www.riskrecon.com.<br>\n</p>','\n',char(10)),'https://www.facebook.com/riskrecon/','https://www.twitter.com/riskrecon','https://www.linkedin.com/company/riskrecon','');
|
||
INSERT INTO vendors VALUES('7b48817a-a32d-48f6-a133-d561a7adf29d','published','mitigant-by-resility','Mitigant by Resility','www.mitigant.io','Mitigant is an enterprise cloud security SaaS solution helping organizations to build security, compliance, and cyber-resilience for their public cloud infrastructures (AWS, Azure, GCP, Kubernetes) with a continuous security verification approach. ','August-Bebel-strasse 89','Haus 7','Potsdam',NULL,'DEU','c575ca41-f794-4e44-9dd7-140aa8db8e34',replace('<h5>Mitigant by Resility</h5>\n<p>\nMitigant is an enterprise cloud security SaaS solution helping organizations to build security, compliance, and cyber-resilience for their public cloud infrastructures (AWS, Azure, GCP, Kubernetes) with a continuous security verification approach. <br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/cyber_mitigant','https://linkedin.com/company/mitigant','');
|
||
INSERT INTO vendors VALUES('efd377e6-f00b-41de-a48e-1967a7d757c6','published','checkmarx-inc','Checkmarx, Inc.','www.checkmarx.com','Checkmarx offers the most comprehensive AppSec platform, providing unparalleled accuracy, coverage, visibility and guidance to reduce risk across all components of software—including proprietary code, open source, APIs, and Infrastructure as Code.','7000 Central Parkway ','Suite 1045','Atlanta','GA','USA','d77baa47-2e21-4ea7-9c85-d8cc1b58ac7d',replace('<h5>Checkmarx, Inc.</h5>\n<p>\nCheckmarx is the leading application security provider. We empower enterprises to shift everywhere in order to secure every phase of development for every application while simultaneously balancing the dynamic needs of CISOs, security teams, and development teams. Our comprehensive cloud-native platform — Checkmarx OneTM — and extensive services portfolio, provide unparalleled scan accuracy, coverage, visibility, and guidance to prioritize the most impactful vulnerabilities, reduce risk across all components of modern software, and build for the always-evolving technological landscape. We are honored to serve more than 1,800 customers, including 60 percent of Fortune 100 organizations, and are committed to moving forward with an unwavering dedication to the safety and security of our customers and the applications that power our day-to-day lives.\nCheckmarx. Make Shift Happen.\n<br>\n</p>\n<h5>Why Checkmarx, Inc.?</h5>\n<p>Checkmarx OneTM provides the industry’s most comprehensive application security platform, helping you shift everywhere with SAST, DAST, SCA, supply chain security, API security, container security, and IaC security on a single platform. Checkmarx enables you to go deep and wide to secure every part of every application, identify vulnerabilities with the highest accuracy, and manage application security risk over time. With the most software development life cycle (SDLC) integrations and broadest programming language support, Checkmarx One offers a seamless developer experience to make it easier and faster to fix security issues.</p>','\n',char(10)),'https://www.facebook.com/Checkmarx.Source.Code.Analysis','https://www.twitter.com/checkmarx','https://www.linkedin.com/company/checkmarx','');
|
||
INSERT INTO vendors VALUES('abd22f92-8559-49a6-8f4d-e4b01e447c76','published','cybrary','Cybrary','www.cybrary.it','Cybrary is the industry-leading cybersecurity training platform that provides professionals at every stage of their career with interactive training to level up their skills to confidently address the ever-evolving threat landscape.','4600 River Rd','Suite 400','Riverdale Park','MD','USA','5e91e3da-2b5c-464b-8c18-ae8c9cc9ff12',replace('<h5>Cybrary</h5>\n<p>\nCybrary is the industry-leading professional development platform that provides the right training at the right time to fully equip cybersecurity professionals at every stage in their careers. Cybrary’s threat-informed training, advanced assessment capabilities, and certification preparation helps industry professionals build the skills and knowledge to confidently mitigate the threats their organizations face and bridge the persistent cybersecurity skills gap. Cybrary enables more than 3 million learners, from individuals to service providers and government agencies to Fortune 1000 organizations, to be ready to respond in the fight against constantly-evolving cybersecurity threats. For more information on Cybrary’s offerings, visit www.cybrary.it.<br>\n</p>','\n',char(10)),'https://www.facebook.com/cybraryit','https://www.twitter.com/cybraryIT','https://www.linkedin.com/company/cybrary/','');
|
||
INSERT INTO vendors VALUES('5a53bb14-922c-4b41-b770-a56d320a5b14','published','ionix','IONIX','https://www.ionix.io','IONIX (formerly Cyberpion) is the attack surface management solution that uses Connection Intelligence to shine a spotlight on exploitable risks across your real attack surface – and its digital supply chain.','218 Main Street ','Suite 500','Kirkland','WA','USA','4b4b94bb-b8d3-452d-ba85-da3041184e28',replace('<h5>IONIX</h5>\n<p>\nIONIX (formerly Cyberpion) is the attack surface management solution that uses Connection Intelligence to shine a spotlight on exploitable risks across your real attack surface – and its digital supply chain. Only IONIX discovers and monitors every internet-facing asset and connection, delivers laser focus into the most important risks to your business, and provides the tools to rapidly remediate exploitable threats and reduce attack surface risk. Global leaders depend on IONIX’s machine learning-powered discovery engine, contextual risk assessment and prioritization, and action-focused remediation workflow to proactively prevent cyber-attacks before they happen.<br>\n</p>\n<h5>Why IONIX?</h5>\n<p>IONIX Connective Intelligence is the underlying technology powering our Attack Surface Management (ASM) platform. Connective Intelligence drives attack surface discovery, risk assessment, risk prioritization, and automatic protection. At its foundation is an attack surface model that maps and contextualizes assets and connections. We go beyond discrete assets to analyze attack paths and the extent of your online risk exposure.</p>','\n',char(10)),NULL,'https://www.twitter.com/ionix_io','https://www.linkedin.com/company/ionix-io/','');
|
||
INSERT INTO vendors VALUES('08e5d43f-ab71-43dd-af3f-be30c6c1ad89','published','cado-security','Cado Security','cadosecurity.com',' Cado Security is a cloud forensics and incident response company. The Cado platform leverages the scale, speed and automation of the cloud to effortlessly deliver forensic-level detail into cloud, container and serverless environments. ','30 Stamford Street',NULL,'London',NULL,'GBR','699b2d11-1ef0-4ef4-8fa0-3ae3f5f17502',replace('<h5>Cado Security</h5>\n<p>\nCado Security is a cloud forensics and incident response company. The Cado platform leverages the scale, speed and automation of the cloud to effortlessly deliver forensic-level detail into cloud, container and serverless environments. Only Cado empowers security teams to investigate and respond at cloud speed.\nCado’s mission is to empower security teams with a smarter and faster way to investigate and respond to cyber incidents in the cloud.<br>\n</p>\n<h5>Why Cado Security?</h5>\n<p>Cado expedites incident response in the cloud — the cloud is complex and data can be extremely difficult to access; or worse, disappear in the blink of an eye. The Cado platform:\n- Automates forensic data capture and processing across cloud, containers and serverless environments,\n- Presents hundreds of data sources in a central console for investigation, automatically surfacing incident root cause, scope and impact; and,\n- Enables security analysts of all levels to perform forensics investigations and the quickly remediate cloud incidents.\nThe Cado platform delivers unmatched visibility, depth and speed, enabling security teams to better understand and manage cloud risk and drastically reduce time to investigation and response.</p>','\n',char(10)),NULL,'https://www.twitter.com/CadoSecurity','https://www.linkedin.com/company/cado-security','');
|
||
INSERT INTO vendors VALUES('de94e1cd-dc1f-4c71-bdd3-a09c12838d0b','published','brandshield-ltd','BrandShield Ltd.','https://www.BrandShield.com/',replace('BrandShield is a Brand-Oriented Digital Risk Protection company. BrandShield''s proactive approach to protecting against online threats: online scams, phishing, social media impersonation, typosquatting, and more.\nExperts'' detection and takedown services lead to outstanding takedown success rates. ','\n',char(10)),'4 Shenkar Street',NULL,'Herzliya',NULL,'ISR','56fd94d1-b29c-4b5a-99bc-62e4d2d76a92',replace('<h5>BrandShield Ltd.</h5>\n<p>\nBrandShield is a Brand-Oriented Digital Risk Protection company. We detect digital threats. We take them down.\nThe company’s proactive approach prevents, detects, and fights phishing, impersonation, and online fraud outside your firewall perimeter, where fraudsters focus their efforts.\nBrandShield''s fully managed solution provides monitoring and detection of external threats to protect your organization and customers.\nThe AI-based solution provides an advanced and automated metrics threat intelligence map of online risks, as well as advanced enforcement tools. The robust, patented technology finds brand violations and fraud across multiple platforms: Website monitoring, social media, PPC ads, mobile apps, and marketplaces.\nBrandShield comes with fully managed detection and takedown expert services to make a complete solution from detection to takedown with an outstanding takedown success rate.<br>\n</p>\n<h5>Why BrandShield Ltd.?</h5>\n<p>BrandShield offers a variety of Brand-Oriented Digital Risk Protection solutions.\nOur Cyber Brand Protection solutions provide proactive 360-degree external threat protection. with 8 different layers of detection and remediation.\nWe detect online threats. We take them down.\nThe SaaS software detects typosquatting as well as non-infringing domain websites suspicious of dangering you or your customers, by AI-based website content analysis, including visual social engineering.\nOur Social Media protection covers more platforms with dedicated crawlers than anyone else, including advanced monitoring and detection capabilities on Facebook, Twitter, Instagram, TikTok, Telegram, and many more.\nAll remediation efforts, fraud-based or IP claim-based, are performed by a team of dedicated enforcement managers and threat hunters. Team members are all experienced experts with great relations to 3rd party online providers, and team leaders are lawyers with extensive IP backgrounds. </p>','\n',char(10)),'https://www.facebook.com/BrandShield/','https://www.twitter.com/BrandShieldltd','https://www.linkedin.com/company/2231196/','');
|
||
INSERT INTO vendors VALUES('3ddcd47b-96e1-472b-8ee9-8fd9adf285ef','published','baramundi-software-usa-inc','baramundi software USA, Inc.','www.baramundi.com/en-us/','baramundi software is a leading developer of Unified Endpoint Management and provides efficient and secure cross-platform management of their workstation and mobile environments. Customers worldwide benefit from the German manufacturer‘s many years of experience and outstanding products.','30 Speen St. ','Suite 401','Framingham','MA','USA','8baa433f-1b04-475b-ad6d-2a972b78d437',replace('<h5>baramundi software USA, Inc.</h5>\n<p>\nbaramundi is a leader and innovator in endpoint management and security. Our mission is to provide a platform where you can maintain, monitor and control your devices – whether they are on-prem or off-net. With the baramundi Management Suite you are able to automate routine tasks over all supported form factors like Desktops, Laptops, iOS, Androids and other mobile devices. It enables you to standardize configurations and simplify your patching process.\nWith the baramundi Management Suite, you can centrally manage any number of devices – no matter where they are located. Our solution helps you to manage your client life cycle from start to finish, to expedite the deployment of new hardware, track existing devices and the rollout to your users with dynamic reporting. Improve your security management of Microsoft BitLocker and Windows Defender and stay up to date with Windows Updates, and Microsoft in-place Updates – and all that from a single pane of glass.\n<br>\n</p>\n<h5>Why baramundi software USA, Inc.?</h5>\n<p>Why baramundi software?\nbaramundi Management Suite – All endpoints under control – Anywhere, anytime With the baramundi Management Suite, you can centrally manage any number of devices – no matter where they are located – via LAN or Internet. Thanks to Internet-Enabled Endpoint Management, you can easily distribute necessary updates to smartphones, tablets and notebooks outside the company. The system is quickly installed and ready for use and easily scalable thanks to decentrally synchronized depots. Additional baramundi services are also available – for example, to continuously supply locally operated management instances with current data.\n</p>','\n',char(10)),'https://www.facebook.com/baramundisoftware/','https://www.twitter.com/baramundiWORLD','https://de.linkedin.com/company/baramundi-software-ag','');
|
||
INSERT INTO vendors VALUES('b29e3afe-dee3-43e9-88ec-e60d56b72d98','published','bloombase','Bloombase','www.bloombase.com','Bloombase is the intelligent storage firewall company providing data-at-rest encryption using post-quantum cryptography (PQC) from edge, physical/virtual DCs, through hyper-converged (HCI) and composable disaggregated infrastructures (CDI), to cloud.','1300 Island Drive ','Suite 103','Redwood City','CA','USA','d36ec22e-2eb1-46b4-9eb3-2b93119f5d36',replace('<h5>Bloombase</h5>\n<p>\nBloombase is the intelligent storage firewall company providing application-transparent, high-bandwidth, low-latency data-at-rest encryption security using post-quantum cryptography (PQC) technologies from edge computing, physical and virtual datacenters, through hyper-converged infrastructure (HCI) and composable disaggregated infrastructure (CDI), to the cloud.<br>\n</p>','\n',char(10)),'https://www.facebook.com/Bloombase','https://www.twitter.com/Bloombase','https://www.linkedin.com/company/Bloombase','');
|
||
INSERT INTO vendors VALUES('7cb00547-703c-4998-90ee-6b6b67600c96','published','gitguardian','GitGuardian','https://www.gitguardian.com/',replace('GitGuardian is the code security platform for the DevOps generation.\nWith automated secrets detection and remediation, our platform enables Dev, Sec, and Ops to advance together toward the Secure Software Development Lifecycle.','\n',char(10)),'17 Rue de la Banque',NULL,'Paris',NULL,'FRA','6ce35222-7424-46a0-9702-be27f0e76f3e',replace('<h5>GitGuardian</h5>\n<p>\nGitGuardian is a global cybersecurity startup focusing on code security solutions for the DevOps generation. A leader in the market of secrets detection and remediation, its solutions are already used by hundred thousands developers in all industries.\nGitGuardian helps developers, cloud operation, security and compliance professionals secure software development, define and enforce policies consistently and globally across all their systems.\nGitGuardian solutions monitor public and private repositories in real-time, detect secrets and alert to allow investigation and quick remediation.<br>\n</p>\n<h5>Why GitGuardian?</h5>\n<p>GitGuardian is a global cybersecurity startup focusing on code security solutions for the DevOps generation. A leader in the market of secrets detection and remediation, its solutions are already used by hundred thousands developers in all industries.\nGitGuardian helps developers, cloud operation, security and compliance professionals secure software development, define and enforce policies consistently and globally across all their systems.\nGitGuardian solutions monitor public and private repositories in real-time, detect secrets, sensitive files, IaC misconfigurations and alert to allow investigation and quick remediation.</p>','\n',char(10)),'https://www.facebook.com/GitGuardian/','https://www.twitter.com/GitGuardian','https://www.linkedin.com/company/gitguardian/','');
|
||
INSERT INTO vendors VALUES('b7a7c9ec-0441-47c8-be1c-7e14a80b90bc','published','deleteme','DeleteMe','https://business.joindeleteme.com/','DeleteMe proactively reduces attack vectors by continuously removing executive and employee personal data online. With 35+ million pieces of personal data removed since 2010, we are the trusted privacy partner to the world’s most recognizable brands.','18 Bow St. ','#55','Somerville','MA','USA','fd0ce540-71e1-4011-b98f-c9aace3f8ac1',replace('<h5>DeleteMe</h5>\n<p>\nDeleteMe for business is a simple, proactive way to reduce attack vectors by removing unwanted instances of executive and employee personal data—name, address, phone, and more—from online sources. Designed for the enterprise, DeleteMe for business continuously scans for and removes employee personal data online to reduce the business and individual risk from social engineering, doxxing, online harassment, and physical threats. We provide detailed exposure risk reporting via dashboard reports that provide quick visibility into organizational and individual risk exposure and reduction over time and high-quality support for custom removal requests and incident response. <br>\n</p>\n<h5>Why DeleteMe?</h5>\n<p>Your employees'' personal information is available for public consumption. DeleteMe removes unwanted instances of personal data—name, address, phone, and more—from those online sources, making it simple to keep executive and employee personal information from being used and abused by others.\nWe''ve developed a trusted, proven approach to removing personal information found online; designed for the enterprise.\nWe continuously scan for and remove employee personal data to reduce the business and individual risk from social engineering, doxxing, online harassment, and physical threats. 400+ pieces of personal data, per user on average\nDashboard reports provide quick visibility into organizational and individual risk exposure and reduction over time\nOur high-quality support team provides priority service for custom removal requests and incident response.\nSimple onboarding for your employees (in minutes).</p>','\n',char(10)),'https://www.facebook.com/joindeleteme/','https://www.twitter.com/deleteme','https://www.linkedin.com/showcase/joindeleteme/','');
|
||
INSERT INTO vendors VALUES('780f0738-8930-421f-b198-96112f5c30a7','published','german-pavilion-teletrust-it-security-association-germany','German Pavilion / TeleTrusT - IT Security Association Germany','https://www.rsac.german-pavilion.com',replace('The German Pavilion is presented by the Federal Ministry for Economic Affairs and Climate Action and AUMA and is supported by TeleTrusT – IT Security Association Germany (www.teletrust.de). Explore 25 companies! Visit www.rsac.german-pavilion.com \n','\n',char(10)),'NuernbergMesse GmbH','Messezentrum','Nuernberg',NULL,'DEU','83e97ef3-143a-411e-a37f-460f89697818',replace('<h5>German Pavilion / TeleTrusT - IT Security Association Germany</h5>\n<p>\nGerman Pavilion - North Hall #5469\nGerman Federal Ministry for Economic Affairs and Climate Action in cooperation with AUMA_Association of the German Trade Fair Industry and TeleTrusT – IT Security Association Germany\nGermany participates with a German Pavilion offering a professional brokerage service to help to establish contacts with German companies and comprehensive information on Germany as an important business location.\nExplore abt. 25 companies from Germany!\nasvin GmbH\nAuconet Solutions GmbH\nAWARE7 GmbH\nBeta Systems Software AG\nBundesdruckerei GmbH\nDeutsche Gesellschaft für Cybersicherheit mbH & Co. KG\nEBRAND AG\nEnclaive GmbH\nHornetsecurity GmbH\nINFODAS GmbH\nitWatch GmbH\nLocateRisk GmbH\nMaltego Technologies GmbH\nMitigant by Resility\nMTRIX GmbH\neCom Service IT GmbH\nONEKEY GmbH\nROHDE & SCHWARZ GmbH & Co. KG\nsecunet Security Networks AG\nSoSafe GmbH\nTenzir GmbH\nTÜV Informationstechnik Gmbh\nTWINSOFT biometrics GmbH & Co. KG\nFor more information visit: www.rsac.german-pavilion.com\n<br>\n</p>','\n',char(10)),NULL,NULL,NULL,'');
|
||
INSERT INTO vendors VALUES('d6cd02c8-4a7e-43d8-99dc-abe6a2c05b2c','published','globalsign','GlobalSign','www.globalsign.com','GMO GlobalSign is the leading Certificate Authority of security solutions for businesses to conduct secure communications, manage millions of verified digital identities and automate authentication and encryption. See https://www.globalsign.com.','Two International Drive ','Suite 150','Portsmouth','NH','USA','53968f75-a965-4015-96f3-119970263ab6',replace('<h5>GlobalSign</h5>\n<p>\nAs one of the world’s most deeply-rooted certificate authorities, GlobalSign is the leading provider of trusted identity and security solutions enabling businesses, large enterprises, cloud-based service providers, and IoT innovators worldwide to conduct secure online communications, manage millions of verified digital identities and automate authentication and encryption. Its high-scale PKI and identity solutions support the billions of services, devices, people, and things comprising the IoT. A subsidiary of Japan-based GMO GlobalSign Holdings K.K and GMO Internet Group, GMO GlobalSign has offices in the Americas, Europe and Asia. For more information, visit https://www.globalsign.com.<br>\n</p>\n<h5>Why GlobalSign?</h5>\n<p>Get started mastering PKI with a Cloud-based lifecycle management platform from GlobalSign; Atlas, that centralizes all certificate, user and billing activity to simplify deployments and lower TCO. Automate deployments for mixed environments with Auto Enrollment Gateway, integrating with Active Directory and MDMs, and support for SCEP, ACME, and Mac Enrollment automates provisioning and management for all enterprise endpoints. Secure Websites & Servers (SSL/TLS) with the strongest managed SSL available for public and internal needs. Authenticate users & Machines, keeping the right users and endpoints in and the wrong ones out. Encrypt & secure emails (S/MIME) to protect contents and prove message origin. Digitally sign documents to protect contents and enable automated electronic workflows. Deploy PKI for mobile to provide mutual authentication to corporate resources. Digitally Sign Code to protect your brand reputation and ensure code cannot be altered.</p>','\n',char(10)),'https://www.facebook.com/GlobalSignSSL','https://www.twitter.com/globalsign','https://www.linkedin.com/company/globalsign/','');
|
||
INSERT INTO vendors VALUES('75234542-206f-45c3-96cf-783a4af678f7','published','gtb-data-security','GTB Data Security','www.gttb.com','GTB, the creator of DLP for IP, offers the only data security platform that prevents data breaches from insider threats. Delivered as a SaaS or on-premises, GTB integrates awareness, encryption, & controls to prevent data loss, misuse, and theft.','2054 Vista Parkway','Suite 400','West Palm Beach','FL','USA','53e5a38f-8964-4b1b-b277-544a1dc30c83',replace('<h5>GTB Data Security</h5>\n<p>\nGTB, the creator of DLP for IP, offers the only data security platform that prevents data breaches from insider threats. Delivered as a SaaS or on-premises, GTB integrates awareness, encryption, & controls to prevent data loss, misuse, and theft.\nWhy GTB Data Security that Works?\nOur solutions work, it’s that simple. GTB sets the standard by offering the market’s only data security platform that’s proven to stop data breaches – on premises and off.\nFor over 15 years, GTB’s data protection solutions have provided the most effective security against advanced malware and insider threats for the world’s largest enterprises. Our solutions provide the ability to create, manage & enforce policies based on content &/ context for when, where, how and by whom. Thus, controlling when data can or can’t be moved, either to or from the network &/ devices, both on premise and off premise.\n<br>\n</p>\n<h5>Why GTB Data Security?</h5>\n<p>GTB SOLUTIONS ARE A PROVEN INTELLIGENT CYBERSECURITY TECHNOLOGY PLATFORM WITH:\n- Accurate Detection, Prevention, and Response\n- Coverage from on-premises, endpoint, data centers to the cloud\n- Hybrid Deployment\n- Cloud-based (public & private) services\n- Central Management & Reporting\n- 3rd Party Integration tools\nBy implementing GTB’S Data Security that Works solutions, organizations can reduce the risk of insider threats by preventing sensitive data from being leaked or stolen, either intentionally or unintentionally. Additionally, DLP can also help organizations detect, prevent, and respond to data breaches more quickly, and find those actors exfiltrating sensitive data, thus reducing the potential damage and improving overall security.\n</p>','\n',char(10)),'https://www.facebook.com/GTBTechnologies.usa','https://www.twitter.com/gtbtechnologies','https://www.linkedin.com/company/gtb-technologies-inc','');
|
||
INSERT INTO vendors VALUES('9b91f8d5-cac4-49d5-8396-3c1b4179ab15','published','devo','Devo','https://www.devo.com/','Devo is the only cloud-native logging and security analytics platform that releases the full potential of your data to empower bold, confident action. ','255 Main Street ','Suite 702','Cambridge','MA','USA','82d9a7ee-ca22-483e-9a4e-7fc329c6671e',replace('<h5>Devo</h5>\n<p>\nDevo is the only cloud-native logging and security analytics platform that releases the full potential of your data to empower bold, confident action. With unrivaled scale to collect all of your data without compromise, speed to give you immediate access and answers, and clarity to focus on the signals that matter most, Devo is your ally in protecting your organization today and tomorrow. <br>\n</p>\n<h5>Why Devo?</h5>\n<p>Devo Platform:\nThe Devo Platform evolves analyst expertise and improves SOC efficiency by providing complete data visibility, AI-driven analytics, and rapid response capabilities, enabling security organizations to defend, monitor, and safeguard the business.\nDevo DeepTrace:\nDevo DeepTrace performs autonomous alert investigation and threat hunting using attack-tracing AI, advancing how security teams easily identify attacks, rapidly investigate threats, and secure the organization.\nDevo SOAR:\nDevo SOAR provides comprehensive data enrichment, decision automation, and response automation, dramatically reducing manual workloads while increasing accuracy and speed of threat detection and remediation.\n</p>','\n',char(10)),NULL,'https://www.twitter.com/devo_Inc','https://www.linkedin.com/company/devoinc/','');
|
||
INSERT INTO vendors VALUES('f3761ea8-667c-4e16-8af4-83f95e5f2049','published','delinea','Delinea','www.delinea.com',replace('Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower thousands of global organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security.\n','\n',char(10)),'201 Redwood Shores Parkway','Suite 300','Redwood City','CA','USA','3d31cdac-4019-4e7a-bb2a-8001ddc648e1',replace('<h5>Delinea</h5>\n<p>\nDelinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide. Our customers range from small businesses to the world''s largest financial institutions, intelligence agencies, and critical infrastructure companies.<br>\n</p>\n<h5>Why Delinea?</h5>\n<p>Delinea is a leading provider of PAM solutions that empower cybersecurity for the modern, hybrid enterprise. We put privileged access at the center of cybersecurity strategies by defining the boundaries of access.\nThe Delinea Platform seamlessly extends PAM to provide just-in-time access with easy, adaptive controls that help IT and security reduce risk while enabling growth, efficiency, and scalability.\nSecure privileged accounts efficiently with Secret Server. Seamlessly discover, secure, manage, monitor and audit privileged accounts to align security with business initiatives.\nWhen teams work remotely Remote Access Service provides just-in-time, just-enough access for third parties. IT teams can support remote workers from start to finish with Connection Manager.\nAvoid standing privileges for a Zero Trust security posture with Server PAM and Privilege Manager. Manage just-in-time, just-enough privileged access policies, and enforce MFA for additional assurance.\n</p>','\n',char(10)),'https://www.facebook.com/DelineaInc/','https://www.twitter.com/delineainc','https://www.linkedin.com/company/delinea','');
|
||
INSERT INTO vendors VALUES('9ad65660-aa16-41a6-9aa1-78a12faf291a','published','intel-471','Intel 471','www.intel471.com','Fight cyber threats and win — Intel 471 empowers security teams to be proactive with our relevant and timely insights into the cyber underground.','1209 Orange Street',NULL,'Wilmington','DE','USA','114a2301-ea0b-4040-be0e-e3f88119613c',replace('<h5>Intel 471</h5>\n<p>\nIntel 471 empowers enterprises, government agencies, and other organizations to win the cybersecurity war using near-real-time insights into the latest malicious actors, relationships, threat patterns, and imminent attacks relevant to their businesses.\nThe company’s TITAN platform collects, interprets, structures, and validates human-led, automation-enhanced results.\nClients across the globe leverage this threat intelligence with our proprietary framework to map the criminal underground, zero in on key activity, and align their resources and reporting to business requirements. Intel 471 serves as a trusted advisor to security teams, offering ongoing trend analysis and supporting your use of the platform. Learn more at https://intel471.com/.<br>\n</p>\n<h5>Why Intel 471?</h5>\n<p>Intel 471 is a cyber intelligence company that provides organizations with insights and solutions to detect, prevent and respond to cyber threats. Our team is comprised of experienced cybersecurity professionals, threat intelligence analysts, and researchers who specialize in identifying and tracking cybercriminals and their activities. We provide a comprehensive view of the underground economy, including dark web marketplaces, forums, and other criminal communities. We collect and analyze data from a wide range of sources, including social media, malware samples, and open-source intelligence, in order to deliver actionable insights to customers and demonstrable solutions to real problems. As a result, our intelligence is used globally by financial institutions, government agencies, and Fortune 500 companies to protect their infrastructure and prevent cyberattacks.\nYour window into the cyber underground.\n</p>','\n',char(10)),'https://www.facebook.com/Intel471Inc/','https://www.twitter.com/Intel471Inc','https://www.linkedin.com/company/intel-471/mycompany/','');
|
||
INSERT INTO vendors VALUES('58c246f1-55ef-4a2f-9c8a-6c5e7c358984','published','elastic','Elastic','www.elastic.co','Elastic modernizes SecOps by unifying SIEM, endpoint security, and cloud security capabilities so you can protect, detect, and respond to complex attacks. Get a limitless view of your data across cloud and on-prem. Eliminate blindspots, automate threat detection, and streamline investigation and response. All at scale with Elastic Security.','800 W El Camino Real ','Suite 350','Mountain View','CA','USA','2cb9426d-4710-4e87-b2a1-ecddaca9d6b9',replace('<h5>Elastic</h5>\n<p>\nElastic modernizes SecOps by unifying SIEM, endpoint security, and cloud security capabilities so you can protect, detect, and respond to complex attacks. Get a limitless view of your data across cloud and on-prem. Eliminate blindspots, automate threat detection, and streamline investigation and response. All at scale with Elastic Security.<br>\n</p>','\n',char(10)),'https://www.facebook.com/elastic.co/','https://www.twitter.com/elastic','https://www.linkedin.com/elastic','');
|
||
INSERT INTO vendors VALUES('4a06a364-3817-4211-a5e2-bb4b0e02d5ed','published','expel','Expel','https://expel.com/','Expel''s security operations platform and people work together to make sense of security signals to detect, understand, and fix issues fast - minimizing risk. We offer managed detection and response (MDR), remediation, phishing, and threat hunting. ','12950 Worldgate Drive','Suite 200','Herndon','VA','USA','45cc82f9-37f6-480c-99c2-e087d3ef5467',replace('<h5>Expel</h5>\n<p>\nExpel helps companies of all shapes and sizes minimize business risk. Our technology and people work together to make sense of security signals — with your business in mind — to detect, understand, and fix issues fast. Expel offers managed detection and response (MDR), phishing, and threat hunting. Our “BYO-tech” approach and API integrations get you up and running within hours. You can choose to protect everything – cloud infrastructure, on-prem infrastructure, SaaS apps – or just what you need. This unique MDR approach includes extended detection and response (XDR) capabilities to give you a full picture across your security and business applications. With our SOC analysts chasing down your alerts and responding to incidents 24x7, your team can focus on advancing security strategies unique to your business. For more information, visit our website, check out our blog, or follow us on LinkedIn or Twitter.<br>\n</p>\n<h5>Why Expel?</h5>\n<p>Expel helps organizations of all shapes and sizes manage business risk. Our detection and response technology, people, and expertise enable us to provide businesses with security that makes sense.\nWe deliver clear answers and advice to quickly and proactively identify and remediate vulnerabilities and threats. Fueled by Expel Workbench™, our security operations platform, Expel’s managed security products transparently thwart attackers and breaches. Expel gives organizations the confidence that their businesses are secure, their security investments are working, and their teams are focused on business priorities, instead of alerts.\nWhether you’re cloud-native or migrating to the cloud, our technology and people work together – each doing what they do best – to make security easy to understand, easy to use, and easy to continuously improve. And, we take you along for the ride with full visibility into everything we do.</p>','\n',char(10)),NULL,'https://www.twitter.com/ExpelSecurity','https://www.linkedin.com/company/expel ','');
|
||
INSERT INTO vendors VALUES('b95e9637-a5c7-4b3c-a16a-778d4164671f','published','esentire','eSentire','www.esentire.com','eSentire is the Authority in Managed Detection and Response. With XDR, 24/7 threat hunting and SOC, we disrupt threats before they impact your business.','451 Phillip St.','Suite 135','Waterloo','ON','CAN','94018011-6d31-40ae-83f7-3b9754b15360',replace('<h5>eSentire</h5>\n<p>\neSentire, Inc. is the Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations in 80+ countries, representing 35 industries from known and unknown cyber threats. Founded in 2001, the company''s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts, Elite Threat Hunters, and industry-leading threat intelligence research from eSentire''s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response services. For more information, visit www.esentire.com and follow @eSentire.<br>\n</p>\n<h5>Why eSentire?</h5>\n<p>Our cybersecurity services portfolio is designed to stop breaches, simplify security and minimize business risk.\n- Exposure Management: Strategic services including Managed Vulnerability Assessments, vCISO and Managed Phishing & Security Awareness Training to identify gaps, build defensive strategies, operationalize risk mitigation and continuously advance your security program.\n- Managed Detection & Response: We deliver Response + Remediation you can trust. By combining our cutting-edge XDR platform, 24/7 SOC support, around the clock threat hunting and security operations leadership, we hunt and stop known & unknown threats before they disrupt your business.\n- Digital Forensics & Incident Response: Battle-tested Incident Commander level expertise, crime scene reconstruction and digital forensics investigations that can bear scrutiny in a court of law. The world’s fastest threat suppression guarantee with a 4-hour SLA available with our IR Retainer.</p>','\n',char(10)),NULL,'https://www.twitter.com/eSentire','https://ca.linkedin.com/company/esentire-inc-','');
|
||
INSERT INTO vendors VALUES('dd54ba33-5af4-4f8b-80d9-9f9a74ed6a7b','published','eclypsium','Eclypsium','https://www.eclypsium.com','Eclypsium’s cloud-based platform provides digital supply chain security for critical hardware, firmware and software. Eclypsium defends enterprises from the deep implants and exploits that have become the vector of choice for modern adversaries.','920 SW 6th Avenue','Suite 375','Portland','OR','USA','0023b5d9-cc11-45e0-8e10-d2d012f03f67',replace('<h5>Eclypsium</h5>\n<p>\nEclypsium’s cloud-based platform provides digital supply chain security for critical hardware, firmware and software. Eclypsium defends enterprises and government agencies from the deep implants and exploits that have become the vector of choice for modern adversaries. For more information, visit eclypsium.com.<br>\n</p>','\n',char(10)),'https://www.facebook.com/Eclypsium/','https://www.twitter.com/eclypsium','https://www.linkedin.com/company/eclypsium/','');
|
||
INSERT INTO vendors VALUES('a148d6ee-a39f-45ee-bfbc-62e4c206fbf2','published','think-cyber-security-ltd','Think Cyber Security Ltd.','thinkcyber.co.uk','ThinkCyber deliver secure behaviour change for their customers. Their award-winning Redflags™ software applies behavioural science theory to uniquely deliver real-time, context-aware, on-device security interventions and nudges at the point of risk.','20-22 Wenlock Road',NULL,'London',NULL,'GBR','ad440e2a-f239-48bf-ab39-2fd2a2d8de9d',replace('<h5>Think Cyber Security Ltd.</h5>\n<p>\nThink Cyber Security deliver measurable secure behaviour change for their customers.\nThe company’s multi-award winning Redflags™ Real-time Security Awareness product applies behavioural and learning science theory to deliver context-sensitive, just-in-time guidance. For example, when users are about to click links, visit certain web pages, enter their username into a web page, handle attachments, etc.\nRedflags™ offers the toolkit organisations need to: manage operational risk from cyber-attacks directed at staff; meet compliance goals; keep content refreshed and relevant; target specific behaviours and users; all whilst allowing staff to get on with their jobs, to achieve business goals.\n<br>\n</p>\n<h5>Why Think Cyber Security Ltd.?</h5>\n<p>ThinkCyber deliver measurable, secure behaviour change for their customers. When 90% of cyber-attacks start with the human user, and technical controls can never be 100%, organisations need their staff to be the last line of defence. ThinkCyber have applied the theory and evidence of behavioural science in their multi-award winning Redflags® product to uniquely deliver real-time, context aware-guidance – at the point the user is at risk. Short, actionable and highly relevant content educates the user. Gentle and timely “nudges” strengthen behaviours, reduce risk and offer security teams visibility.\nFull metrics on and measurement of engagement offer unique insights. We’ve seen engagement levels with Redflags® at 80-90%, halved click rates in just three months, doubled phishing reporting rates and allowed our clients to reach people and behaviours other awareness simply cannot reach.\nThinkCyber don’t just train staff, they change their behaviours.\n</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/think-cyber-security-ltd','');
|
||
INSERT INTO vendors VALUES('070691f1-e3fd-44d5-9bb9-92d7875b1731','published','techtarget','TechTarget','https://www.techtarget.com/searchsecurity/',NULL,'275 Grove Street',NULL,'Newton','MA','USA','d6e3eddf-1129-45c3-a37c-76cc5fe9c0c4',replace('<h5>TechTarget</h5>\n<p>\nTechTarget helps tech companies achieve sustainable pipeline impact and operates the world’s largest online enterprise tech communities serving every major enterprise tech market. <br>\n</p>','\n',char(10)),'https://www.facebook.com/techtargetinc/','https://www.twitter.com/techtarget','https://www.linkedin.com/company/techtarget','');
|
||
INSERT INTO vendors VALUES('1a0bf553-3a5c-434f-b019-550f4c592294','published','threatconnect','ThreatConnect','https://threatconnect.com/','ThreatConnect’s market leading, cloud-native solutions enables threat intelligence operations, security operations, and cyber risk management teams to work together for more efficient, effective, and collaborative cyber defense and protection.','3865 Wilson Blvd. ','Suite 550','Arlington','VA','USA','fb32ebc2-5b97-4ffb-ba08-63d70daa91ba',replace('<h5>ThreatConnect</h5>\n<p>\nThreatConnect enables threat intelligence operations, security operations, and cyber risk management teams to work together for more effective, efficient, and collaborative cyber defense and protection. With ThreatConnect, organizations infuse ML and AI-powered threat intel and cyber risk quantification into their work, allowing them to orchestrate and automate processes to get the necessary insights, and respond faster and more confidently than ever before. More than 200 enterprises and thousands of security operations professionals rely on ThreatConnect every day to protect their organizations'' most critical assets.<br>\n</p>\n<h5>Why ThreatConnect?</h5>\n<p>ThreatConnect’s market leading, cloud-native solutions enables threat intelligence operations, security operations, and cyber risk management teams to work together for more efficient, effective, and collaborative cyber defense and protection. With ThreatConnect, organizations infuse threat intelligence and cyber risk quantification into their work, allowing them to orchestrate and automate processes to get the necessary insights, and respond faster and more confidently than ever before.</p>','\n',char(10)),'https://www.facebook.com/ThreatConnect/','https://www.twitter.com/threatconnect','https://www.linkedin.com/company/threatconnect-inc/','');
|
||
INSERT INTO vendors VALUES('756cac53-0c93-434a-92c4-80666dbcd4bf','published','teramind-inc','Teramind Inc','www.teramind.co','Teramind provides comprehensive user behavior data for insider threat management, data loss prevention, and business process optimization. Our user behavior analytics brings organizations peace of mind by providing data-backed workforce insights.','19495 Biscayne Blvd','Suite 606','Aventura','FL','USA','6f41397c-9cb7-4b61-907d-63e5f077cbf6',replace('<h5>Teramind Inc</h5>\n<p>\nSince 2014 over 10,000 organizations across all major industries have trusted Teramind to provide insider threat management, data loss prevention, and business process engineering through behavioral user data. By harnessing behavior analytics, the award-winning and top-rated platform has helped enterprises and organizations in finance, retail, manufacturing, energy, technology, healthcare, and government verticals detect, record, and prevent malicious user behavior while driving productivity and improving workflow efficiency. Available as a cloud-based, on-premise, or private cloud solution, Teramind’s insider threat management and user behavior analytics for business brings organizations peace of mind by providing data-backed workforce insights. Teramind is headquartered in Miami, Florida. Learn more about Teramind by visiting teramind.co or follow us on LinkedIn, Twitter and YouTube.<br>\n</p>\n<h5>Why Teramind Inc?</h5>\n<p>Teramind is a robust user activity monitoring platform to protect & optimize businesses for nearly every behavior-related use case.\nFeatures:\nScriptable Rule Logic- custom rules to make any activity a metric\nIn-App Field Parsing- unparalleled insights into field-level activity\nUAM Toolkit- full visibility into user activity across 15+ endpoints\nVideo Sessions- live view & playback for threat investigation & incident forensics\nPatented OCR- search video sessions for sensitive data anywhere on screen, even in photos/videos\nSmart Rules & Alerts- define policies that auto-alert admins, enforce rules & block behaviors\nBI Dashboards- unmatched data visualization, dynamic viewing & custom reports\nTeramind UAM: Detailed UAM for insider threat detection, business optimization & employee monitoring\nTeramind DLP: Protect sensitive data & combat malicious insiders with in-depth behavioral analytics\nTeramind Enterprise: Customizable platform with advanced capabilities & professional services</p>','\n',char(10)),'https://www.facebook.com/teramindco/','https://www.twitter.com/teramindco?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor','https://www.linkedin.com/company/teramind-inc/mycompany/','');
|
||
INSERT INTO vendors VALUES('b122490f-e8ac-43e1-8594-cf250bd20a9f','published','tufin','Tufin','https://www.tufin.com/','Tufin is the leader in network security policy management. The platform centralizes and automates network and cloud access. Over 2,900 enterprises have trusted Tufin to implement accurate network changes in minutes instead of days, accelerate secure application deployments, and virtually eliminate manual tasks. Find out more at www.tufin.com. ','10 Summer Street','Suite 605','Boston','MA','USA','0947d18b-1437-4ee8-a693-e113217d6ca8',replace('<h5>Tufin</h5>\n<p>\nTufin is the leader in network security policy management. The platform centralizes, automates, and orchestrates network and cloud access for many of the largest organizations in the world. Over 2,900 enterprises have trusted Tufin to implement accurate network changes in minutes instead of days, accelerate secure application deployments, and virtually eliminate manual tasks. A vendor-agnostic solution designed to integrate network and cloud security processes, Tufin is the answer to balancing security and business agility.<br>\n</p>\n<h5>Why Tufin?</h5>\n<p>-SecureTrack+ offers a holistic view of network access and security configurations, centralizing network security policy management, risk mitigation and compliance monitoring across your entire enterprise.\n-SecureChange+ delivers the compliance monitoring, policy management, and risk mitigation that comes with SecureTrack+, as well as full-spectrum change design automation, rule lifecycle management, and complete topology visibility.\n-Tufin Enterprise is the ultimate destination on this journey. It elevates your network security program to a highly evolved state, in which, network and cloud security processes are integrated, policy is managed and implemented via zero-touch automation, and everything is administered via a central control plane that delivers unmatched scalability and extensibility.</p>','\n',char(10)),'https://www.facebook.com/Tufintech/','https://www.twitter.com/TufinTech','https://www.linkedin.com/company/tufin-technologies/','');
|
||
INSERT INTO vendors VALUES('083a5718-bb51-486d-8d0f-9390aa87ae7c','published','technology-record','Technology Record','https://www.technologyrecord.com/',NULL,'6 Friar Lane',NULL,'Leicester',NULL,'GBR','66506982-867d-4160-a528-59eb1f7bac5a',replace('<h5>Technology Record</h5>\n<p>\n<br>\n</p>','\n',char(10)),NULL,NULL,NULL,'');
|
||
INSERT INTO vendors VALUES('0cb0c2b7-f863-4a62-a2f4-a3714dd6a5fc','published','thinkst-canary','Thinkst Canary','https://canary.tools/','Most companies discover they''ve been breached way too late. Thinkst Canary fixes this: just 3 minutes of setup; no ongoing overhead; nearly 0 false positives, and you can detect attackers long before they dig in. Check out why our Canaries are deployed and loved on all 7 continents...','Unit L6, 5 Howe Street','Observatory','Cape Town',NULL,'ZAF','6e98f030-7c15-40a3-a3e2-aaa8faca0bf7',replace('<h5>Thinkst Canary</h5>\n<p>\nMost companies discover they''ve been breached way too late. Thinkst Canary fixes this: just 3 minutes of setup; no ongoing overhead; nearly 0 false positives, and you can detect attackers long before they dig in. Check out why our Canaries are deployed and loved on all 7 continents...<br>\n</p>\n<h5>Why Thinkst Canary?</h5>\n<p>Most companies discover they''ve been breached way too late. Thinkst Canary fixes this: just 3 minutes of setup; no ongoing overhead; nearly 0 false positives, and you can detect attackers long before they dig in. Check out why our Canaries are deployed and loved on all 7 continents...</p>','\n',char(10)),NULL,'https://www.twitter.com/thinkstcanary','https://www.linkedin.com/company/thinkstcanary/','');
|
||
INSERT INTO vendors VALUES('a1ff1973-fcc4-4124-a0bc-68d63f438b6b','published','tessian','Tessian','www.tessian.com','Tessian Cloud Email Security intelligently prevents advanced email threats and protects against data loss, to strengthen email security and build smarter security cultures in modern enterprises.','200 Portland St.','5th Floor','Boston','MA','USA','8df5225c-e106-4ffa-a058-cc18f810251a',replace('<h5>Tessian</h5>\n<p>\nTessian is committed to securing the human layer in the enterprise, by protecting all the digital interactions people need to get their jobs done - starting with email. Tessian is a leading cloud email security platform that intelligently protects organizations against advanced threats and data loss on email, while coaching people about security threats in-the-moment. Using machine learning and behavioral data science, Tessian automatically stops threats that evade legacy Secure Email Gateways, including advanced phishing attacks, business email compromise, accidental data loss and insider threats. Tessian’s intelligent approach not only strengthens email security but also builds smarter security cultures in the modern enterprise.\nThe company is backed by legendary investors such as March Capital, Sequoia, Accel and Balderton, and has been recognized as one of Fast Company’s Most Innovative Companies for 2022. More information can be found at www.tessian.com <br>\n</p>\n<h5>Why Tessian?</h5>\n<p>The Tessian Cloud Email Security Platform intelligently protects against advanced threats and data loss on email while reducing security teams'' workloads and coaching people about security threats in-the-moment.\nUsing Behavioral Intelligence Modeling and machine learning, Tessian automatically detects and prevents threats that legacy SEGs fail to stop, including advanced phishing attacks, email impersonation, accidental data loss and insider threats. Tessian automates the investigation and remediation of email threats, freeing up the security''s time and in-the-moment security coaching educates users in real time to help them make informed security decisions.\nAs a cloud-native solution, Tessian integrates seamlessly with Microsoft 365, Microsoft Exchange, and Google Workspace. Tessian is a fully automated platform that requires zero configuration, is deployed in minutes, and learns people’s email behaviors within hours, closing critical security gaps in the enterprise security stack.</p>','\n',char(10)),'https://www.facebook.com/TessianOfficial/','https://www.twitter.com/tessian','https://www.linkedin.com/company/tessian/','');
|
||
INSERT INTO vendors VALUES('0b2db12d-49e2-4802-a279-0d58ce3ea3e4','published','team-cymru','Team Cymru','https://team-cymru.com/','Team Cymru provides digital business risk platforms for private organizations, and community services that maintain internet integrity to save and improve human lives.','901 International Parkway ','Suite 350','Lake Mary','FL','USA','5e615cd4-3fad-4519-b153-971e91f8efce',replace('<h5>Team Cymru</h5>\n<p>\nTeam Cymru’s mission is to save and improve human lives. We are unrivalled across three disciplines; digital business risk platforms, free to use community services and support services to over 143 Government CSIRT teams.<br><br>\nOur business risk and threat intelligence platforms empower global organizations with unmatched Threat Reconnaissance and Attack Surface Management capabilities to meet the challenges of today’s cyber threats.<br><br>\nCommunity Services equip those who run the internet to defend it from criminals who wish to disrupt and cause harm, and CSIRT enables Governments the tools to outmaneuver nation state threat actors.<br><br>\nSince 2005, our reputation remains unchallenged.\n<br>\n</p>\n<h5>Why Team Cymru?</h5>\n<p>Team Cymru’s mission is to save and improve human lives. We are unrivalled across three disciplines; digital business risk platforms, free to use community services and support services to over 143 Government CSIRT teams.<br><br>\nOur business risk and threat intelligence platforms empower global organizations with unmatched Threat Reconnaissance and Attack Surface Management capabilities to meet the challenges of today’s cyber threats.<br><br>\nCommunity Services equip those who run the internet to defend it from criminals who wish to disrupt and cause harm, and CSIRT enables Governments the tools to outmaneuver nation state threat actors.<br><br>\nSince 2005, our reputation remains unchallenged</p>','\n',char(10)),NULL,'https://www.twitter.com/teamcymru','https://www.linkedin.com/company/team-cymru','');
|
||
INSERT INTO vendors VALUES('de431007-cb83-4bc2-8bcf-c85de36fe72c','published','virtue-security','Virtue Security','https://www.virtuesecurity.com',NULL,'244 5th Avenue ','F290','New York','NY','USA','6b8cf852-547a-487c-a6a4-0833cf07bc07',replace('<h5>Virtue Security </h5>\n<p>\n<br>\n</p>','\n',char(10)),NULL,NULL,NULL,'');
|
||
INSERT INTO vendors VALUES('42e27601-dfba-47cb-af11-7f832ce9cafa','published','fortra','Fortra','https://www.fortra.com/','Fortra is a cybersecurity company like no other. We’re creating a simpler, stronger future for our customers. Our trusted experts and portfolio of integrated, scalable solutions bring balance and control to organizations around the world. We’re the positive change makers and your relentless ally to provide peace of mind through every step of your cybersecurity journey. ','11096 Viking Dr. ','Suite 100','Eden Prairie','MN','USA','0b99a4bf-4608-43ac-8c1d-cca5314bfba9',replace('<h5>Fortra</h5>\n<p>\nFortra is a cybersecurity company like no other. We’re creating a simpler, stronger future for ourcustomers. Our trusted experts and portfolio of integrated, scalable solutions bring balance and control toorganizations around the world. We’re the positive changemakers and your relentless ally to provide peaceof mind through every step of your cybersecurity journey. Learn more at fortra.com.<br>\n</p>\n<h5>Why Fortra?</h5>\n<p>When it comes to cybersecurity, the landscape is full of single-solution providers, making it easy for unexpected cyberthreats to sneak through the cracks. At Fortra, we’re creating a stronger, simpler strategy for protection. One that increases your security maturity while decreasing the operational burden that comes with it. This is all possible thanks to our best-in-class portfolio and deep bench of expert problem solvers. Our integrated, scalable solutions help our customers face their toughest challenges with confidence. We’re your cybersecurity ally, working to provide peace of mind along every step of your journey.</p>','\n',char(10)),NULL,'https://www.twitter.com/fortraofficial','https://www.linkedin.com/company/fortra','');
|
||
INSERT INTO vendors VALUES('5464e61d-a452-4384-b6d3-8f8e29e2266d','published','f5','F5','https://www.f5.com/','F5 is a multi-cloud application services & security company committed to bringing a better digital world to life. F5 partners with the most advanced organizations to secure & optimize every app and API anywhere—on premises, in the cloud, or at the edge. F5 enables organizations to provide secure digital experiences for their customers & stay ahead of threats.','501 5th Ave',NULL,'Seattle','WA','USA','7ad9971f-9c4c-4964-8dec-938e05aeb0db',replace('<h5>F5</h5>\n<p>\nF5 is a multi-cloud application services and security company committed to bringing a better digital world to life. F5 partners with the world’s largest, most advanced organizations to secure and optimize apps and APIs anywhere—on premises, in the cloud, or at the edge. F5 enables organizations to provide exceptional, secure digital experiences for their customers and continuously stay ahead of threats.\nF5 is committed to bringing a better digital world to life by securing optimizing the applications, APIs, and infrastructure your business relies on—on premises, in the cloud, and at the edge. Trusted by 85% of the Fortune 500, F5 powers half of the world’s applications, protects 4.5 billion web transactions every day, and mitigates 30 billion fraudulent transactions per month. In today’s fast-moving digital world, F5 helps your business innovate at speed and adapt to real-time changes, so you can deliver the exceptional experiences that build customer trust and loyalty.<br>\n</p>\n<h5>Why F5?</h5>\n<p>F5 security solutions help you secure your apps, APIs, and infrastructure without changing the way you do business. For legacy and modern apps, for data centers, for the cloud, and at the edge; it works in the architecture you have now, with the flexibility to adapt as you modernize and thrive.\nF5 Web App and API Protection (WAAP) solutions include F5 Distributed Cloud (F5XC), F5 BIG-IP, and NGINX to secure what matters most and simplify operations. At RSAC F5 will feature solutions designed to realize these benefits across the hybrid, multi-cloud digital fabric. Demos include:\n•Mitigate Application Vulnerabilities\n•Mitigate Bots and Automated Attacks\n•Secure APIs and Third-Party Integrations\n•Protect Against DDoS Attacks\n•Protect App Infrastructure\n•Prevent Client-Side Attacks\n•Implement Zero Trust\nWant to stay competitive in a digital-first world? Only F5 offers the comprehensive protection and consistent security you need to stay agile and resilient in a hybrid, multi-cloud world.</p>','\n',char(10)),'https://www.facebook.com/f5incorporated','https://www.twitter.com/f5','https://www.linkedin.com/company/f5/','');
|
||
INSERT INTO vendors VALUES('bcc384ce-e1d8-496b-93b7-daeea628742d','published','flanders-investment-and-trade','Flanders Investment & Trade','https://www.flandersinvestmentandtrade.com/invest/en','Flanders Investment & Trade enhances Flanders’ position as the gateway to Europe for inward investors. The government agency identifies, informs, advises, and supports overseas enterprises.','Koning Albert II-laan 37',NULL,'Brussels',NULL,'BEL','991e99ed-06d0-4f06-b4c7-9e93f9ffbf24',replace('<h5>Flanders Investment & Trade</h5>\n<p>\nThe Flanders Investment & Trade agency promotes sustainable international business, in the interest of both Flanders-based companies and overseas enterprises. We will help you establish contact with the Flemish companies for products, services, and business relationships. Flanders Investment & Trade enhances Flanders’ position as the gateway to Europe for inward investors. The agency identifies, informs, advises, and supports overseas enterprises by establishing production and research facilities, contact centers, headquarters, logistics operations, and the like in Flanders, the northern region of Belgium. This broad focus on international entrepreneurship, involving outward trade as well as inward investments, requires not only a thorough knowledge of the Flemish economy but also an extensive network outside of Flanders. We have just that for you. Do visit our website and discover our worldwide network. With over 100 offices we are bound to be conveniently located near you.<br>\n</p>','\n',char(10)),'https://www.facebook.com/flandersinvestmentandtrade','https://www.twitter.com/InvestFlanders','https://www.linkedin.com/showcase/flanders-investment-&-trade---usa/?viewAsMember=true','');
|
||
INSERT INTO vendors VALUES('aa659a84-c08a-49e3-929d-aa2aaa987239','published','flow-security','Flow Security','www.flowsecurity.com','Flow Security’s DSPM platform offers a new approach to data security by combining data scanning and real-time analysis to continuously detect and prevent data-related risks, providing comprehensive data discovery, classification, and protection.','3 Aluf Albert Mendler',NULL,'Tel-Aviv',NULL,'ISR','7ca525f4-3df1-4fc2-a95f-c52f3d7217e0',replace('<h5>Flow Security</h5>\n<p>\nFlow is a data security platform that combines Data Security Posture Management (DSPM) together with real-time detection and response to data security violations. Flow is not just your cloud security tool with a data scanning utility. It is the only platform that analyzes both data at rest and data in motion. By also following and analyzing all data flows in runtime, the platform enables security teams to regain control over all their data, including shadow data stores and applications across all cloud, on-prem and SaaS environments.\nFlow’s deep analysis of the organization’s data journey from origin to destination allows security teams to automatically catalog all their sensitive data (e.g. PII, PHI, PCI); visualize data flows; detect and remediate data risks; and effectively respond in real-time to data violations by providing the full context: who, what, when, where and why.<br>\n</p>\n<h5>Why Flow Security?</h5>\n<p>Flow Security is not just your cloud security tool with a data scanning utility. Flow Security is the first and only DSPM to analyze both data at rest and data in motion, giving organizations complete visibility and control of their data in managed, unmanaged, and unmanageable data stores. Flow’s deep analysis of your data''s journey from origin to destination provides you with valuable business and applicative context for complete visibility and efficient remediation.</p>','\n',char(10)),NULL,'https://www.twitter.com/flow_security','https://www.linkedin.com/company/flowsecurity/','');
|
||
INSERT INTO vendors VALUES('091e7a49-ed37-4d89-b690-7479a403052a','published','arcon','ARCON','http://www.arconnet.com','ARCON is a leading Information Technology company specialized in providing Risk Control solutions. ARCON believes in ceaseless technological innovations to mitigate the current and emerging IT security threats that can wreak havoc on organizations.','Kamla Executive Park, 901, Andheri - Kurla Rd,','Vljay Nagar Colony, J B Nagai, Andherl East,','Mumbai','MH','IND','2726dd91-e659-4ff8-af86-152b82e7dc0c',replace('<h5>ARCON</h5>\n<p>\nARCON is a leading Information Technology company specialized in providing Risk Control (both risk predictive and preventive) solutions. ARCON believes in ceaseless technological innovations to mitigate the current and emerging IT security threats that can wreak havoc on organizations of all sizes, from various industries and from multiple geographies. These industries include BFSI, Telecom, Government, Healthcare, Utilities, Oil & Gas, Logistics, Hospitality, Entertainment, et al. As the number of interconnected devices and IoT (Internet of Things) is increasing drastically, the overall digitization scenario is revolutionizing the world of technology. In order to combat these complex and advanced risks, ARCON has developed its next-generation risk control solutions that can work seamlessly in any IT environment.\n<br>\n</p>\n<h5>Why ARCON?</h5>\n<p>The “PAM” in PAM security stands for privileged access management, which refers to the different strategies and technologies used to control access and permissions for users, accounts, systems, and processes across a digital environment. If an account has “privileged access,” it has elevated capabilities compared to regular users and likely has access to confidential systems and data. These privileged accounts pose a significant risk compared to non-privileged accounts because of their elevated access. A PAM security solution like ARCON ensures that the credentials of secret accounts are protected and don’t fall into the wrong hands. This is especially important in the United States, considering cybercrime has increased by over 50% in recent years. ARCON | PAM security solution is recognized as the best protection for digital identities not only here in America but across the globe. We can offer seamless data security regardless of your organization’s product, service, or industry. </p>','\n',char(10)),'https://www.facebook.com/arcontechsolutions','https://www.twitter.com/ARCONRiskCtrl','https://www.linkedin.com/company/arcon-risk-control','');
|
||
INSERT INTO vendors VALUES('cd1089e2-fb6e-4f85-8afe-cefa4cbfcb23','published','apiiro','Apiiro','apiiro.com','Apiiro helps security teams and developers gain full visibility by discovering all app components like APIs, services, dependencies & sensitive data, and mapping the attack surface to proactively remediate critical risks before releasing to the cloud','150 Greenwich St ','4 WTC Floor 29 Room 81','New York','NY','USA','8f56d3fa-3f99-47b6-ad57-69dbbfbb6f71',replace('<h5>Apiiro</h5>\n<p>\nApiiro is transforming the way security and development teams from companies like Morgan Stanley, BlackRock, Rakuten, and Rivian secure their cloud applications. By building a complete application inventory and connecting risk signals from design to code to cloud, Apiiro’s Cloud Application Security Platform provides contextual visibility of components and risks throughout the software supply chain. With Apiiro’s prioritization based on exploitability and business impact, security teams can more effectively triage risks and with Apiiro’s automated workflows and integrations, developers can proactively fix risks and release with confidence.<br>\n</p>','\n',char(10)),'https://www.facebook.com/Apiiro/','https://www.twitter.com/apiiroSecurity','https://www.linkedin.com/company/apiiro','');
|
||
INSERT INTO vendors VALUES('f65961b4-572d-41a8-bb10-e596ed8f614f','published','amax','AMAX','www.amax.com','AMAX is a designer and provider of advanced computing solutions. Focusing on artificial intelligence, high performance computing, edge computing and appliance manufacturing.','1565 Reliance Way',NULL,'Fremont','CA','USA','2d6e33de-c3c2-49b9-8017-73f2361ba8cd',replace('<h5>AMAX</h5>\n<p>\nAMAX is a designer and provider of advanced computing solutions. Focusing on artificial intelligence, high performance computing, edge computing and appliance manufacturing to provide solutions for the energy, semiconductor, healthcare, federal, security, higher education, and life sciences industries. As an IT infrastructure design company, AMAX offers specialized computing solutions to meet unique application requirements. Optimized solutions are delivered through a quality-first, high-touch, and high-value approach to customer engagement through custom system designs, OEM, and professional services. Our services span the entire solution development process with over 40 years of engineering expertise, design customization, and global manufacturing. <br>\n</p>\n<h5>Why AMAX?</h5>\n<p>AMAX advanced OEM service blends our extensive knowledge in hardware, software, and manufacturing expertise to transform our clients’ concepts into turnkey deployable appliances. From new product introduction to full-scale production, supply chain management and post-sales services, our mirrored capabilities across AMER, EMEA and APAC regions enable innovators to seamlessly go to market worldwide.\nOur proprietary quality standards put every product through rigorous testing and validation, ensuring each build deploys with the highest quality and field reliability. AMAX are ISO certified (ISO 9001, ISO 13485, ISO 14001, ISO 26000, ISO 270010), meets global and regional compliance requirement such as FCC, CE, NEN, KCC, and TUV, and complies with industry standard such as UL, IEC< SEMI and NFPA.</p>','\n',char(10)),NULL,'https://www.twitter.com/AMAXTechnology','https://www.linkedin.com/company/amax-engineering/','');
|
||
INSERT INTO vendors VALUES('33cc7d24-02f8-4838-8da7-10a7fbe69d09','published','appsealing','AppSealing','https://www.appsealing.com/','AppSealing is a leader in mobile app shielding solutions that deliver robust runtime features and ensures mobile apps and customers'' data are safe from reverse engineering, tampering, untrusted environments, and other unknown threats.','3003 North First Street#322, San Jose, California 95134',NULL,'San Jose','CA','USA','7f75a981-9885-41bd-8c4f-b99f358368d1',replace('<h5>AppSealing</h5>\n<p>\nAppSealing is a leader in mobile app shielding solutions that deliver robust runtime features and ensures mobile apps and customers'' data are safe from reverse engineering, tampering, untrusted environments, and other unknown threats.\nAt AppSealing we''re helping companies win over millions of customers while we shoulder the responsibility of:\n- Protecting Resources from Fraud\n- Stop cheating tools\n- Preventing Cloning Attempts\n- Stopping monetary frauds and securing in-app purchases\n- Ensuring Regulatory Compliance\nTypes of attacks we stop in runtime:\nReverse Engineering\nApplication Repackaging\nDynamic Modification\nMan in The Device\nEmulators & Debuggers\nRooted Jailbroken\nWith AppSealing you never have to worry about security when you are building mobile apps for your customers. Build the apps you and your customers want, the way you want to, and AppSealing will take care of the security!<br>\n</p>\n<h5>Why AppSealing?</h5>\n<p>AppSealing can fully secure your mobile apps in minutes from known and unknown threats that too without ANY CODING.\n1) jailbroken/rooted devices\n2) hooking attacks\n3) Reverse engineering\n4) device hijacking\n5) code tampering\n6) app repackaging\n7) SSL Pinning\n8) Remote Access app\n9) Mirroring app\n10) unknown threats\nAppSealing is the leading mobile app shielding solution that stops android app threats in runtime that can cause unexpected negative consequences, including:\nCustomer loss\nRevenue loss\nReputational damage\nLoss of competitive advantage\nFines and retribution\nIncident handling costs\nInvestor mistrust\nAppSealing has been working with companies like Bajajfinserv, Kotak, HDFC, Edelweiss, and other companies to ensure their mobile apps and customers'' data are safe. We shoulder the responsibility:\n- Protecting Resources from Fraud\n- Stop cheating tools\n- Preventing Cloning Attempts\n- Stopping monetary frauds and securing in-app purchases\n- Ensuring Regulatory Compliance\n</p>','\n',char(10)),'https://www.facebook.com/Appsealing/','https://www.twitter.com/appsealing','https://www.linkedin.com/company/appsealing','');
|
||
INSERT INTO vendors VALUES('5b332c9d-6598-4e6b-aa77-1c183408178b','published','asrock-rack-inc','ASRock Rack Inc.','https://www.asrockrack.com/index.asp','ASRock Rack Inc., established in 2013, specialized in the field of Cloud Computing server hardware with “Creativity and Reliability", ','4F., No.37, Sec. 2, Jhongyang S. Rd., ','Beitou District','Taipei City ',NULL,'TWN','7409c07e-6e3c-4308-a543-d9ad502ca6a9',replace('<h5>ASRock Rack Inc.</h5>\n<p>\nASRock Rack Inc., established in 2013, specialized in the field of Cloud Computing server hardware. While inheriting ASRock’s design concepts, “Creativity, Consideration, Cost-effectiveness”, the company is dedicated to bring the Server Industry out of the box thinking with the passion to innovate. Leveraged by ASRock’s growing momentum and distribution channels, this young and vibrant company targets at the booming market of Cloud Computing, and commits to serve the market with user friendly and eco friendly Do It Yourself Server hardware, featuring flexible and reliable products.<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/ASROCKRACK','https://www.linkedin.com/company/3568757/admin/','');
|
||
INSERT INTO vendors VALUES('1583d679-34e0-47ca-839c-f77edaa39697','published','apricorn','Apricorn','www.apricorn.com',replace('THE LEADER IN PORTABLE USB DEVICE ENCRYPTION\n\nHeadquartered in Poway, California, Apricorn provides hardware-based 256-bit encrypted external storage products to companies and organizations that require high-level protection for their data at rest.','\n',char(10)),'12191 Kirkham Rd',NULL,'Poway','CA','USA','dc1aa4ed-269d-4106-83eb-5251800c7041',replace('<h5>Apricorn</h5>\n<p>\nTHE LEADER IN PORTABLE USB DEVICE ENCRYPTION\nHeadquartered in Poway, California, Apricorn provides hardware-based 256-bit encrypted external storage products to companies and organizations that require high-level protection for their data at rest.<br>\n</p>','\n',char(10)),NULL,NULL,NULL,'');
|
||
INSERT INTO vendors VALUES('9d5b11f4-2109-4d1b-9f19-f9990947cdbe','published','appviewx','AppViewX','www.appviewx.com','As a leading provider of automated machine identity management and application infrastructure security solutions, AppViewX is trusted by many global organizations to reduce risk and ensure compliance with centralized orchestration capabilities.','City Hall, 222 Broadway',NULL,'New York','NY','USA','53cf5158-452f-41f9-95dc-85f64c055dee',replace('<h5>AppViewX</h5>\n<p>\nAppViewX is revolutionizing the way NetOps & DevSecOps teams deliver Machine Identity Management solutions to enterprise IT. The AppViewX Platform is purpose-built for orchestrating & governing digital identities to improve agility, enforce compliance, eliminate errors, and reduce cost.\nAs a leading provider of automated machine identity management and application infrastructure security solutions, AppViewX is trusted by many global organizations to reduce risk and ensure compliance with centralized orchestration capabilities.<br>\n</p>\n<h5>Why AppViewX?</h5>\n<p>AppViewX is an application-centric identity and access management (IAM) platform that enables self-service workflow automation and orchestration to ensure continuous application access and availability, identity-first security and compliance control.\n1. CERT+ - The certificate and key lifecycle automation platform, CERT+ prevents outages and ensure constant network availability by gaining full visibility into and control over your PKI.\n2. PKI+ - Setting up a secure, scalable and compliant cloud-based public key infrastructure (PKI) is now easier and faster than ever with AppViewX PKI+.\n3. ADC+ - ADC lifecycle automation platform empowers network and app teams with self-service capabilities to automate, orchestrate, and manage application delivery services.</p>','\n',char(10)),'https://www.facebook.com/AppViewX.Official/','https://www.twitter.com/appviewx','https://www.linkedin.com/company/appviewx/','');
|
||
INSERT INTO vendors VALUES('0dcd904f-244e-4ce4-b8f1-00d60aa5d240','published','arqit','Arqit','arqit.uk','Arqit supplies a unique quantum safe encryption Platform-as-a-Service which makes the communications links or data at rest of any networked device or cloud machine secure against current and future forms of attack – even from a quantum computer.','11 Bressenden Place ','Nova North Floor 7','London',NULL,'GBR','c7269da6-ed8d-44b4-87b3-1fd8436d63f3',replace('<h5>Arqit</h5>\n<p>\nArqit supplies a unique quantum safe encryption Platform-as-a-Service which makes the communications links or data at rest of any networked device or cloud machine secure against current and future forms of attack – even from a quantum computer.<br>\n</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/arqit/','');
|
||
INSERT INTO vendors VALUES('a8c64c7c-939c-4169-96aa-45a311d2999e','published','arista-networks','Arista Networks','www.arista.com',replace('From network security to trusted, secure networks with:\n- Arista NDR: AI-driven network detection & response platform\n- Arista CUE: Optimal edge as a service solution\n- Arista DMF: Integrated network packet broker & analytics for network visibility \n','\n',char(10)),'5453 Great America Parkway',NULL,'Santa Clara','CA','USA','a4bf1e20-bb88-4b47-9440-64b81d9fefe9',replace('<h5>Arista Networks</h5>\n<p>\nWhy Arista Networks?\nArista Networks is helping customers move from network security to trusted, secure networks. Our security solutions address challenges for organizations of all sizes: from those trying to implement their zero trust strategy to those looking to consolidate multiple security and networking functions into a cloud-managed, “edge as a service” solution. - Arista NDR: Arista''s AI-driven network detection and response platform - Arista CUE (Cognitive Unified Edge): built for commercial users as an optimal edge as a service solution - Arista DMF: Arista’s integrated network packet broker and analytics platform for proactive and pervasive network visibility\n<br>\n</p>\n<h5>Why Arista Networks?</h5>\n<p>Arista’s security solutions address challenges for organizations of all sizes:\nArista DANZ Monitoring Fabric™ - Proactive and Pervasive Network Visibility\nDANZ Monitoring Fabric (DMF) is a next-gen network packet broker (NPB) architected for pervasive, network observability delivering real-time and historical insights into your physical, virtual, and container environments.\nArista NDR - AI-driven network detection and response platform\nArista NDR is built on a foundation of deep network analysis across the campus, data center, IoT, and cloud workload networks and offers continuous diagnostics and monitoring capabilities that are critical to a successful NIST 800-207 zero trust architecture.\nArista Edge Threat Management - Network Security and Connectivity\nEdge Threat Management (ETM) is a comprehensive approach to security orchestration.\nETM provides IT teams with the ability to ensure protection, monitoring and control for all devices, applications, and events on a network.\n</p>','\n',char(10)),'https://www.facebook.com/AristaNW','https://www.twitter.com/@AristaNetworks','https://www.linkedin.com/company/arista-networks-inc/','');
|
||
INSERT INTO vendors VALUES('b58822ad-dccb-4d3e-99c6-60ba7bc5efa9','published','afero','Afero','https://afero.io/',replace('Afero''s mission is to make all the world''s devices really smart and really secure.\nThe Afero IoT Platform provides the ''Operating System'' to make the massive range of connected products work securely every-time.','\n',char(10)),'4410 El Camino Real','#200','Los Altos','CA','USA','e64273e1-5ae3-4a7f-badd-2fc35754b2cd',replace('<h5>Afero</h5>\n<p>\nAfero is the leading secure IoT Platform as a Service. Afero technology incorporates simplicity, ease of use, security, & data privacy into the entire solution, from manufacturing to product to cloud to end user. The Afero IoT PaaS accelerates time to market by unifying embedded, mobile, & cloud providing a comprehensive solution for both IoT users & companies deploying complex IoT programs. The Afero platform uniquely secures your entire supply chain while providing your customers with end-to-end encryption, fast onboarding, & direct to device failover. Products get to market 3x faster & have 10x fewer customer escalations. Afero’s user-friendly, fast, & secure IoT platform unlocks smart & connected capabilities for any product, vertical, sector or industry, whether large or tiny, fixed or mobile. Afero’s world-class team is comprised by mobile, hardware, security, & cloud veterans from Google, Apple, Nest, Danger, Microsoft, Amazon, Twitter, Netflix & other leading platform companies<br>\n</p>\n<h5>Why Afero?</h5>\n<p>Afero is the leading secure IoT Platform as a Service. Afero technology incorporates simplicity, ease of use, security, and data privacy into the entire solution, from manufacturing to product to cloud to end user. The Afero IoT PaaS accelerates time to market by unifying embedded, mobile, & cloud providing a comprehensive solution for both IoT users and companies deploying complex IoT programs. The Afero platform uniquely secures your entire supply chain while providing your customers with end-to-end encryption, fast onboarding, and direct to device failover. With Afero, products get to market 3x faster, & have 10x fewer customer escalations. Afero’s user-friendly, fast, & secure IoT platform unlocks smart & connected capabilities for any product, vertical, sector, or industry, whether large or tiny, fixed or mobile. Our world-class team is composed of mobile, hardware, security, & cloud veterans from Google, Apple, Nest, Symantec, Danger, Microsoft, Amazon, Twitter, Netflix, & Roku.</p>','\n',char(10)),'https://www.facebook.com/afero.io/','https://www.twitter.com/afero_IoT','https://www.linkedin.com/company/afero','');
|
||
INSERT INTO vendors VALUES('128fe68c-d5d9-4738-808f-39715ddc6b4a','published','adaptive-shield','Adaptive Shield','https://www.adaptive-shield.com/',replace('Adaptive Shield, leader in SaaS security. \nEnable security teams to gain visibility and control over all business-critical SaaS apps. With Adaptive Shield’s SSPM platform, prevent, detect and respond to SaaS threats.\n','\n',char(10)),'181 Metro Drive','Suite 290','San Jose','CA','USA','a5c32044-e573-45b6-8718-24f9df5c43ba',replace('<h5>Adaptive Shield</h5>\n<p>\nAdaptive Shield, leader in SaaS Security, enables security teams to secure their entire SaaS stack through threat prevention, detection and response. With Adaptive Shield, organizations continuously manage and control all SaaS misconfigurations, 3rd-party connected apps, govern users and manage risks associated with user devices devices. Founded by Maor Bin and Jony Shlomoff, Adaptive Shield works with many Fortune 500 enterprises. For more information, visit us at www.adaptive-shield.com, or follow us on LinkedIn.\n<br>\n</p>\n<h5>Why Adaptive Shield?</h5>\n<p>Stay on Top of Security Misconfigurations\nIntegrate with all SaaS apps to monitor and manage security misconfigurations through in-depth security checks and auto/step-by-step remediation.\nGovern Identity and Access Management\nGovern SaaS users by gaining consolidated visibility of user accounts, permissions and privileged activities across the entire stack.\nDiscover 3rd-Party Connected Apps\nDiscover and control all third-party SaaS apps connected to your core SaaS hubs, and the level of risk they pose to your business\nManage SaaS Risks Deriving from User Devices\nGain unprecedented context and visibility to easily use and manage the risks that stem from SaaS user and their associated devices.\nDetect and Respond to Threats (ITDR)\nDetect and respond to identity-centric threats originating from the SaaS ecosystem such as unusual activities, malicious applications or any indication of compromise.\n</p>','\n',char(10)),NULL,'https://www.twitter.com/AdaptiveShield','https://www.linkedin.com/company/adaptiveshield/mycompany/','');
|
||
INSERT INTO vendors VALUES('4d1d52cf-47db-4d75-9cc7-24732b777e38','published','adlumin-inc','Adlumin Inc.','www.adlumin.com','Adlumin Inc. provides the enterprise-grade security operations platform and managed detection and response services that keep mid-market organizations secure.','1140 3rd Street NE ','Suite 340','Washington','DC','USA','df8b80d7-399f-4081-9b48-3bb6d3754b54',replace('<h5>Adlumin Inc.</h5>\n<p>\nWhat you can’t see poses the greatest risk to your organization. Your exposures lurk in the cloud, hybrid environments, and the darknet. There are countless gaps where threats can hide before they lead to business disrupting events like ransomware shutdowns or massive data breaches. \n \nAdlumin Inc. is a patented, cloud-native Security Operations Platform plus Managed Detection and Response Services. The platform focuses on advanced cyber threats, system vulnerabilities, and sprawling IT operations to command greater visibility, stop threats, reduce business risk, and automate compliance. The command center for security operations, Adlumin leverages powerful machine learning, identifies critical threats, orchestrates auto-remediation system updates, and provides live continuous compliance reporting. Don’t let your IT organization be caught in the dark. \n \nIlluminate Threats, Eliminate Risks, and Command Authority with Adlumin. www.adlumin.com <br>\n</p>','\n',char(10)),'https://www.facebook.com/checkpoint/1501092823525282/?next=https%3A%2F%2Fwww.facebook.com%2Fadlumin','https://www.twitter.com/adlumin','https://www.linkedin.com/company/adlumin-inc/mycompany/verification/','');
|
||
INSERT INTO vendors VALUES('1ea4335d-8b69-401f-97b3-73afc481766f','published','uptycs','Uptycs','www.uptycs.com','Uptycs reduces risk by prioritizing your responses to threats, vulnerabilities, misconfigurations, sensitive data exposure, and compliance mandates across your modern attack surface—all from a single UI and data model. Shift up with Uptycs.','404 Wyman Street ','Suite 357','Waltham','MA','USA','2c86325b-555b-480b-a1da-4b92fa64d419',replace('<h5>Uptycs</h5>\n<p>\nUptycs is the first unified CNAPP and XDR solution.\nYour developer’s laptop is just a hop away from cloud infrastructure. Attackers don’t think in silos, so why would you have siloed solutions protecting public cloud, private cloud, containers, laptops, and servers?\nUptycs reduces risk by prioritizing your responses to threats, vulnerabilities, misconfigurations, sensitive data exposure, and compliance mandates across your modern attack surface—all from a single UI and data model. This includes the ability to tie together threat activity as it traverses on-prem and cloud boundaries, thus delivering a more cohesive enterprise-wide security posture.\nLooking for acronym coverage? We have that, too, including CNAPP, CWPP, CSPM, KSPM, CIEM, CDR, and XDR. Start with your Detection Cloud, Google-like search, and the attack surface coverage you need today. Be ready for what’s next.\nShift up your cybersecurity with Uptycs.<br>\n</p>','\n',char(10)),'https://www.facebook.com/uptycs/','https://www.twitter.com/uptycs','https://www.linkedin.com/company/uptycs/','');
|
||
INSERT INTO vendors VALUES('4d8b0b34-a33f-4d27-bbbb-aea0c0a54b1d','published','morphisec','Morphisec','www.morphisec.com','Morphisec prevents the most damaging, undetectable attacks others don’t by securing runtime memory, while giving you real-time app inventory and risk visibility. Our Moving Target Defense technology stops threats that evade NGAV, EPP, and EDR/XDR, with no performance impact or additional staff. ','11 Beacon Street','Suite 735','Boston','MA','USA','17872cea-9276-4fcd-a5ae-1553384ffd33',replace('<h5>Morphisec</h5>\n<p>\nMorphisec prevents the most damaging, undetectable attacks others don’t by securing runtime memory, while giving you real-time app inventory and risk visibility. Our Moving Target Defense technology stops threats that evade NGAV, EPP, and EDR/XDR, with no performance impact or additional staff. <br>\n</p>','\n',char(10)),'https://www.facebook.com/Morphisec/','https://www.twitter.com/morphisec','https://www.linkedin.com/company/9434365/','');
|
||
INSERT INTO vendors VALUES('0e2d49ba-f349-458f-bada-4a8760f99ea4','published','utimaco-inc','UTIMACO INC.','www.utimaco.com','UTIMACO is a global platform provider of Cybersecurity & Compliance solutions + services & develops on-premises & cloud-based HSMs, solutions for key management, data protection, identity management & data intelligence for regulated critical infrastructures & Public Warning Systems.','900 E Hamilton Ave ','Suite 400','Campbell','CA','USA','4275b659-7a11-4db2-a6c9-708f4f120843',replace('<h5>UTIMACO INC.</h5>\n<p>\nUTIMACO is a global platform provider of Cybersecurity & Compliance solutions + services & develops on-premises & cloud-based HSMs, solutions for key management, data protection, identity management & data intelligence for regulated critical infrastructures & Public Warning Systems.<br>\n</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/utimaco/','');
|
||
INSERT INTO vendors VALUES('f0930e62-e7e2-4938-9356-f7e5cb4c00e6','published','aioncloud','AIONCLOUD','https://www.aioncloud.com/','AIONCLOUD is the ALL in ONE SECaaS platform of MONITORAPP utilizing Security Service Edge(SSE) offering services for Website Protection such as cloud-based WAAP & Malware Scanning; and Secure Internet Access such as Secure Web Gateway, CASB, and ZTNA','9342 Greenbelt Place',NULL,'Rancho Cucamonga','CA','USA','5b1b2890-48a1-43a4-973a-8fbf31f1e810',replace('<h5>AIONCLOUD</h5>\n<p>\nAIONCLOUD is the ALL in ONE SECaaS platform of MONITORAPP utilizing Security Service Edge (SSE). AIONCLOUD services include (1) Website Protection category that aims at protecting web servers with its cloud-based Web Application and API Protection (WAAP), Website Malware Scanning (WMS), DDoS Mitigation and Content Delivery Network (CDN); and (2) Secure Internet Access category that aims at protecting employees internet use despite remote location through its services such as Secure Web Gateway, Cloud Access Security Broker (CASB), and Zero Trust Network Access (ZTNA). AIONCLOUD Web Protection service is designated in 2023 by the South Korea’s Public Procurement Service as an “Innovative Product” – the first in the country for SECaaS platform. AIONCLOUD has a worldwide Service Infrastructure with 40 Datacenters in 15 Global Regions, thus is able to provide service through the nearest edge enabling security for remote users and cater faster internet connection to remote users worldwide. <br>\n</p>\n<h5>Why AIONCLOUD?</h5>\n<p>According to reports, 30,000 websites are hacked daily and 64% of companies worldwide have experienced at least one form of cyberattack.\nAIONCLOUD Web Protection allows clients to protect their websites 24/7 with pre-built security policy, simple on-off policy configuration, subscription-based (Pay as you go) model, flexible and rapid deployment in less than 30 mins with simple and convenient user portal and dashboard that users can monitor anytime anywhere.\nThe AIONLCOUD Website Protection implemented on edge networks exhibits the same performance strength as physical servers. You can also maintain application performance and security regardless of where your application is located, such as in data centers, cloud, or multi-cloud. AIONCLOUD''s Secure Internet Access is a SSE platform that provides full visibility and control into the organization''s network, data and cloud application usage. It protects remote users accessing the internet from various internet threats wherever they are.</p>','\n',char(10)),'https://www.facebook.com/AIONCLOUD/',NULL,'https://www.linkedin.com/company/aioncloud/','');
|
||
INSERT INTO vendors VALUES('85580ca9-ba16-479e-965d-8ddc25eff49a','published','manageengine','ManageEngine','www.manageengine.com',replace('We craft the industry’s broadest suite of IT management software. We have everything you need to manage all of your IT operations, from networks and servers to applications, service desk, Active Directory, security, desktops, and mobile devices.\n','\n',char(10)),'4141 Hacienda Drive ',NULL,'Pleasanton','CA','USA','b7fbc0a5-f31b-4cee-baa2-21d6d8c1118f',replace('<h5>ManageEngine</h5>\n<p>\nManageEngine crafts the industry’s broadest suite of IT management software. We have everything you need — more than 120 products and free tools — to manage all of your IT operations, from networks and servers to applications, service desk, Active Directory, security, desktops, and mobile devices.\nSince 2002, IT teams like yours have turned to us for affordable, feature-rich software that’s easy to use. You can find our on-premises and cloud solutions powering the IT of over 280,000 companies around the world, including nine of every ten Fortune 100 companies.\nAs you prepare for the IT management challenges ahead, we’ll lead the way with new solutions, contextual integrations, and other advances that can only come from a company singularly dedicated to its customers. And as a division of Zoho Corporation, we’ll continue pushing for the tight business-IT alignment you’ll need to seize opportunities in the future.<br>\n</p>\n<h5>Why ManageEngine?</h5>\n<p>ManageEngine crafts the industry’s broadest suite of IT management software.\nWe have everything you need — more than 120 products and free tools — to manage\nall of your IT operations, from networks and servers to applications, service desk,\nActive Directory, security, desktops, and mobile devices.</p>','\n',char(10)),'https://www.facebook.com/ManageEngine','https://www.twitter.com/manageengine','https://www.linkedin.com/company/manageengine','');
|
||
INSERT INTO vendors VALUES('f7464f22-058c-4951-974b-4b933be79084','published','mitiga','Mitiga','www.mitiga.io','Mitiga is the cloud and SaaS incident response leader. Our IR2 solution provides instant answers to incident-related questions, to speed investigations, prevent unnecessary loss, and develop greater cyber resilience against future attacks.','131 7th Ave ','Suite 253','New York','NY','USA','7a9fbfc4-370d-447c-844a-7d54bf13b8ac',replace('<h5>Mitiga</h5>\n<p>\nMitiga is the cloud and SaaS incident response leader. Our IR2 solution provides instant answers to incident-related questions, to speed investigations, prevent unnecessary loss, and develop greater cyber resilience against future attacks.<br>\n</p>','\n',char(10)),'https://www.facebook.com/mitiga.io','https://www.twitter.com/Mitiga_io','https://www.linkedin.com/company/mitiga-io','');
|
||
INSERT INTO vendors VALUES('684c867e-8eb8-4be1-a2d5-3a1d7a6b9460','published','1password','1Password','www.1password.com','1Password’s human-centric security safeguards people’s most important data, at work and at home. Our solution enables 100,000 businesses and millions of individuals to navigate the digital world without fear or friction – and in less time.','4711 Yonge St. ','10th Floor','Toronto','ON','CAN','0277a8ea-45bc-4841-b852-ab5196b85ddf',replace('<h5>1Password</h5>\n<p>\n1Password''s human-centric approach to security keeps people safe, at work and at home. It''s the only solution built from the ground up to enable anyone – no matter the level of technical proficiency – to navigate the digital world without fear or friction. The company''s password management and credentials security platform is trusted by over 100,000 businesses, including IBM, Slack, Snowflake, Shopify, and Under Armour. 1Password protects the most sensitive information of millions of individuals and families across the globe, helping consumers and businesses get more done in less time – with security and privacy as a given. Learn more at 1Password.com.<br>\n</p>\n<h5>Why 1Password?</h5>\n<p>1Password is a secure, end-to-end encrypted password manager helping businesses aggregate authentication above SSO and transition to the passwordless future. Single sign-on protects logins for approved apps covered by your SSO provider. 1Password protects virtually everything else – and weaves it all into a comprehensive enterprise security suite with granular admin controls, actionable insights, and extensive reporting. More than 100,000 business customers, including IBM, Slack, PagerDuty, and GitLab, trust 1Password as their enterprise password manager now and into the future.</p>','\n',char(10)),'https://www.facebook.com/1Password/','https://www.twitter.com/1Password','https://www.linkedin.com/company/1password/','');
|
||
INSERT INTO vendors VALUES('5af677e5-bc23-4c62-a91e-2957a4755730','published','owasp-foundation-inc','OWASP Foundation, Inc.','https://owasp.org/','OWASP is the premier global application security non-profit, with a mission to provide free and open source standards, tools, events, and learning. Our worldwide community hosts hundreds of chapters and thousands of active members.','401 Edgewater Place','#600','Wakefield','MA','USA','47a17e90-1ef4-45d0-a991-95c67ee5d8ff',replace('<h5>OWASP Foundation, Inc.</h5>\n<p>\nNo more insecure software.\nAs the world’s largest non-profit organization concerned with software security, OWASP:\nSupports the building of impactful projects;\nDevelops & nurtures communities through events and chapter meetings worldwide; and\nProvides educational publications & resources\nIn order to enable developers to write better software, and security professionals to make the world’s software more secure.\n<br>\n</p>\n<h5>Why OWASP Foundation, Inc.?</h5>\n<p>The Open Worldwide Application Security Project® (OWASP) is a nonprofit foundation that works to improve the security of software. Through community-led open-source software projects, hundreds of local chapters worldwide, tens of thousands of members, and leading educational and training conferences, the OWASP Foundation is the source for developers and technologists to secure the web.</p>','\n',char(10)),'https://www.facebook.com/groups/owaspfoundation','https://www.twitter.com/owasp','https://www.linkedin.com/company/owasp','');
|
||
INSERT INTO vendors VALUES('f870c2e6-377b-4c3a-a254-2f7b3348039b','published','orca-security','Orca Security','https://orca.security','Orca Security provides instant-on security and compliance for AWS, Azure, and GCP - without the gaps in coverage, alert fatigue, and operational costs of agents. Orca’s CNAPP platform detects and prioritizes risk and is trusted by global innovators.','2175 NW Raleigh St. ','Suite 110','Portland','OR','USA','c44ad4bb-fa93-4548-a7a2-86dfb41b5027',replace('<h5>Orca Security</h5>\n<p>\nOrca Security provides comprehensive security and compliance for AWS, Azure, and GCP - without the gaps in coverage, alert fatigue, and operational costs of agents. Simplify cloud security operations with a single Cloud Security Platform for workload and data protection, cloud security posture management, vulnerability management, and compliance. Orca Security prioritizes risk based on the severity of the security issue, its accessibility, and business impact. This helps you focus on the critical alerts that matter most. Orca Security is trusted by global innovators, including Databricks, NCR, Autodesk, Lemonade, and Gannett. Connect your first account in minutes: https://orca.security\n<br>\n</p>\n<h5>Why Orca Security?</h5>\n<p>Orca Security is the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across your cloud estate spanning AWS, Azure, Google Cloud and Kubernetes.\nOrca detects all of your cloud risks and prevents them from recurring in future. We’re differentiated to provide:\n-100% frictionless coverage\n-Comprehensive platform of capabilities to address misconfigurations, vulnerabilities, lateral movement, active infections, and more\n-Risk prioritization avoids long lists of alerts to focus on vital attack paths across multiple risk categories\n</p>','\n',char(10)),'https://www.facebook.com/lifeatorca/','https://www.twitter.com/orcasec','https://www.linkedin.com/company/orca-security/','');
|
||
INSERT INTO vendors VALUES('4ca96409-991c-4f5c-9fb7-4d425aedfb66','published','sentinelone','SentinelOne','www.sentinelone.com',replace('SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond\nto cyber attacks faster and with higher accuracy than ever before. Our Singularity XDR platform\nprotects and empowers leading global enterprises with real-time visibility into attack surfaces,\ncross-platform correlation, and AI-powered response. ','\n',char(10)),'444 Castro Street ','4th Floor','Mountain View','CA','USA','17bf8a5e-8f29-44cf-8df4-7ed9522e3937',replace('<h5>SentinelOne</h5>\n<p>\nSentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks at faster speed, greater scale, and higher accuracy than human-powered technology alone. Our Singularity XDR Platform empowers enterprises to achieve greater visibility of their dynamic attack surfaces, including endpoints, cloud workloads, containers, identity, and mobile & network-connected devices, and take action in real time with AI-powered automation and cross-platform correlation. Over 9,250 customers, including 4 of the Fortune 10, hundreds of the Global 2000, prominent governments, healthcare providers, and educational institutions, trust SentinelOne to bring their defenses into the future, gaining more capability with less complexity.<br>\n</p>\n<h5>Why SentinelOne?</h5>\n<p>Singularity Cloud Workload Security is SentinelOne’s CWPP solution providing real-time cloud threat prevention, detection, and response for hybrid cloud workloads. Enriching threat detections with issues identified by Wiz - for example, publicly exposed VM instances - helps cloud security and DevOps practitioners better assess, prioritize, and respond to cloud security events.\nSentinelOne’s CWPP agent is built upon the eBPF framework, to provide Linux kernel process visibility without kernel interference. No kernel modules, no kernel panics. Our CWPP agent delivers high security performance with low overhead and maximum operational stability. It also acts as your Workload Flight Data Recorder™, monitoring workload activity in real-time, at the OS process-level, providing the forensic visibility needed to streamline incident response and proactive threat hunting.\n</p>','\n',char(10)),'https://www.facebook.com/sentinelone/','https://www.twitter.com/sentinelone','https://www.linkedin.com/company/2886771?trk=tyah&trkInfo=clickedVertical%3Acompany%2CclickedEntityId%3A2886771%2Cidx%3A2-3-4%2CtarId%3A1483744835083%2Ctas%3ASentine','');
|
||
INSERT INTO vendors VALUES('936c20fb-2bb0-438f-9a50-c5da28167a7c','published','oomnitza','Oomnitza','www.oomnitza.com','The industry’s most versatile Enterprise Technology Management platform that delivers key business process automation for IT. Our SaaS solution enables enterprises to achieve operational, security & financial efficiency.','548 Market St.',NULL,'San Francisco','CA','USA','fad2dac6-c568-49a9-9cec-4ad4bc77dda1',replace('<h5>Oomnitza</h5>\n<p>\nOomnitza provides an Enterprise Technology Management (ETM) solution that automates common IT processes throughout the technology asset lifecycle. This includes processes such as onboarding and offboarding, preparing for audits, maintaining continuous compliance, forecasting procurement needs, and managing SaaS and software.\nOomnitza''s solution is built on top of a modern asset management system that integrates with over 160 IT, security, and business systems bidirectionally. This approach provides a comprehensive asset inventory across endpoints, software/SaaS, network, and cloud infrastructure and enables you to orchestrate processes across your existing technology landscape with no-code automations.<br>\n</p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/oomnitza/','');
|
||
INSERT INTO vendors VALUES('2d67c8a3-6352-4b45-ab33-06898db799f4','published','hive-pro','Hive Pro','www.hivepro.com','Hive Pro provides an all-in-one Threat Exposure Management Platform, promoting collaboration, streamlining vulnerability management, and enhancing organizational resilience, while optimizing security controls and risk management.','1551 McCarthy Blvd. ','Suite 212','Milipitas','CA','USA','aae6d505-4dae-4b34-9c65-0a541695fec2',replace('<h5>Hive Pro</h5>\n<p>\nHive Pro is a cutting-edge cybersecurity company offering an all-in-one Threat Exposure Management platform to enhance security controls, double operational efficiency, and build cyber resilience. The platform, featuring Artemis Pro and HivePro Uni5, streamlines vulnerability management and promotes collaboration.\nWith rich intelligence, immediate patch insights, and bi-directional integrations, Hive Pro revolutionizes cybersecurity. Schedule a demo to explore Hive Pro''s capabilities tailored to your organization''s needs, regardless of size or maturity. Experience the future of threat management today!<br>\n</p>\n<h5>Why Hive Pro?</h5>\n<p>The cybersecurity market is rife with point-solutions that solve for single or disparate parts of the vulnerability and threat exposure management story. At Hive Pro, we speak to Security teams with 10+ tools and several consoles, and they have all espoused the need to collapse the most necessary functions for vulnerability and threat exposure management into one platform. We also speak to Security teams who have just started their SOC journey, and they want the most fundamental thing: insight that matters. Hive Pro strives to meet Security Teams’ needs, no matter their maturity with Hive Pro: Threat Exposure Management, an all-in-one fully-integrated platform.</p>','\n',char(10)),NULL,'https://www.twitter.com/HiveProInc','https://www.linkedin.com/company/hive-pro','');
|
||
INSERT INTO vendors VALUES('fa3fd7d9-4d76-4c00-80b1-3fd82aed31db','published','kroll','Kroll','https://www.kroll.com/en/services/cyber-risk','Kroll is uniquely positioned to deliver end-to-end cyber risk solutions, merging unrivaled incident response expertise with frontline threat intelligence from over 3000 incidents handled per year to protect, detect, and respond against cyberattacks.','55 East 52nd Street ','Floor 17','New York','NY','USA','ba1ea41d-dff5-4843-86c8-407ccd8012c3',replace('<h5>Kroll</h5>\n<p>\nKroll is uniquely positioned to deliver end-to-end cyber risk solutions worldwide, merging unrivaled incident response expertise with frontline threat intelligence from over 3000 incidents handled per year to protect, detect, and respond against cyberattacks.\nExplore more at kroll.com/cyber<br>\n</p>\n<h5>Why Kroll?</h5>\n<p>our cyber risk core solutions are centered around:\nIncident Response\nKroll is one of the largest incident response firms in the world. elite experts leverage proprietary tools to tackle complex incidents, remote/onsite.\nKroll Responder MDR\nFrontline threat intel from 3000+ incidents and seasoned IR experts make Kroll Responder the most robust MDR in the market.\nPentesting and AppSec\nOur adversarial mindset, gained from tacking complex incidents, empowers our ethical hackers to find ways around most controls and deliver hardening guidance.\nCyber Risk Retainer\nwith the most flexible retainer in the market, we go beyond traditional IR to incorporate any cyber service. clients realize tremendous value and gain peace of mind.\n</p>','\n',char(10)),NULL,'https://www.twitter.com/KrollWire','https://www.linkedin.com/showcase/kroll-cyber-risk/','');
|
||
INSERT INTO vendors VALUES('184af8eb-5f69-4b07-ba4c-0af5263d0447','published','keeper-security-inc','Keeper Security, Inc.','www.keepersecurity.com','Keeper Security is transforming cybersecurity for organizations around the world with next-generation privileged access management. Keeper’s solutions are built with zero-trust and zero-knowledge security to protect every user on every device. ','333 N. Green Street','Suite 811','Chicago','IL','USA','b747a36e-24a2-49a5-837b-f1ba2c95b5f8',replace('<h5>Keeper Security, Inc.</h5>\n<p>\nKeeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by millions of individuals and thousands of organizations, Keeper is the leader for best-in-class password management, secrets management, privileged access, secure remote access and encrypted messaging. Learn more at KeeperSecurity.com.\n<br>\n</p>\n<h5>Why Keeper Security, Inc.?</h5>\n<p>Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by millions of individuals and thousands of organizations, Keeper is the leader for best-in-class password management, secrets management, privileged access, secure remote access and encrypted messaging. Learn more at KeeperSecurity.com.\n</p>','\n',char(10)),'https://www.facebook.com/keeperplatform','https://www.twitter.com/keepersecurity','https://www.linkedin.com/company/3554342','');
|
||
INSERT INTO vendors VALUES('8f045312-44db-4e4b-a61c-a8b2db910472','published','probely','Probely','http://www.probely.com','Probely is a DAST Scanner designed for companies that manage many web applications and APIs, internal or exposed on the Internet. Get the security vulnerabilities that matter, false-positive free - 0.06%','Rua Alfredo Allen 455',NULL,'Porto',NULL,'PRT','687746e8-b386-4079-b8dd-a244e6e195fd',replace('<h5>Probely</h5>\n<p>\nProbely is the premier cloud-based DAST Scanner designed for enterprise companies that manage many web applications and APIs, internal or exposed on the Internet. Probely empowers Security and DevOps or Development teams to work together to secure their web applications and APIs. With Probely, you can automate security testing most efficiently. You can narrow the gap between development, security, and operations teams by integrating security testing into your development processes, from your CI/CD tool to your issue tracker. Probely reports vulnerabilities that matter, false-positive free — ( 0.06% in 2022 ), and includes detailed instructions on fixing them. Probely scan restful APIs, websites, and complex web applications, including rich Javascript applications such as single-page applications (SPA). It detects over 30,000 potential vulnerabilities, including SQL injection, Cross-Site Scripting (XSS), Log4j, OS Command Injection, and SSL/TLS issues.<br>\n</p>\n<h5>Why Probely?</h5>\n<p>Probely is the premier cloud-based DAST Scanner designed for enterprise companies that manage many web applications and APIs, internal or exposed on the Internet. Probely empowers Security and DevOps or Development teams to work together to secure their web applications and APIs. With Probely, you can automate security testing most efficiently. You can narrow the gap between development, security, and operations teams by integrating security testing into your development processes, from your CI/CD tool to your issue tracker. Probely reports vulnerabilities that matter, false-positive free —0.06%, and includes detailed instructions on fixing them. Probely scan restful APIs, websites, and complex web applications, including rich Javascript applications such as single-page applications (SPA). It detects over 30,000 potential vulnerabilities, including SQL injection, Cross-Site Scripting (XSS), Log4j, OS Command Injection, and SSL/TLS issues.</p>','\n',char(10)),NULL,'https://www.twitter.com/probely','https://pt.linkedin.com/company/probely','');
|
||
INSERT INTO vendors VALUES('2cce11bc-e02c-464f-9355-1fa7ea990a69','published','hackerone','HackerOne','www.hackerone.com','HackerOne''s Attack Resistance Management blends the security expertise of ethical hackers with asset discovery, continuous assessment, and process enhancement to find and close the security gaps in the ever-evolving digital attack surface. ','180 Geary Street ','5th Floor','San Francisco','CA','USA','eb52d1fd-218a-489b-8a69-efa687a8884c',replace('<h5>HackerOne</h5>\n<p>\nHackerOne closes the security gap between what organizations own and what they can protect. HackerOne''s Attack Resistance Management blends the security expertise of ethical hackers with asset discovery, continuous assessment, and process enhancement to find and close gaps in the ever-evolving digital attack surface. This approach enables organizations to transform their business while staying ahead of threats. Customers include The U.S. Department of Defense, General Motors, GitHub, Goldman Sachs, Google, Hyatt, Lufthansa, Microsoft, MINDEF Singapore, Nintendo, PayPal, Slack, Twitter, and Yahoo. In 2021, HackerOne was named as a ‘brand that matters’ by Fast Company.<br>\n</p>\n<h5>Why HackerOne?</h5>\n<p>Wake up your attack resistance with HackerOne. Security innovation at the speed of cybercriminals.\nJoin HackerOne at the North Expo Hall booth #6279 to learn how to innovate your security at the speed of cybercrime with ethical hackers that work for you. Our Attack Resistance Platform brings together Attack Surface Management, adversarial application testing, and a range of services to minimize your threat exposure.</p>','\n',char(10)),'https://www.facebook.com/Hacker0x01','https://www.twitter.com/Hacker0x01','https://www.linkedin.com/company/hackerone','');
|
||
INSERT INTO vendors VALUES('65224dc9-1b4c-4bc7-8a99-7ed2e0e89477','published','phishfirewall','PhishFirewall','https://www.phishfirewall.com/','Experience PhishFirewall, the game-changing AI-powered cybersecurity solution that slashes phish clicks by 99% in 6 months! Personalized training elevates your security, saves time, and maximizes ROI. Embrace the future of cybersecurity now! ','120 Holmes Ave NE','STE 305','Huntsville','AL','USA','0ce70074-9c5a-4d96-8b12-fe72bd9060a9',replace('<h5>PhishFirewall </h5>\n<p>\nOur vision at Phishfirewall is to empower organizations to build a culture of security that can keep up with the constantly evolving threat landscape. Traditional approaches to cybersecurity training were falling short, with lengthy, infrequent training sessions leaving employees feeling disengaged and ill-equipped to handle the latest cyber threats. That''s why we created a cybersecurity awareness training platform that delivers short, digestible lessons on a weekly basis, making it easier for employees to stay engaged and up-to-date with the latest cybersecurity best practices.\nWe believe that cybersecurity is everyone''s responsibility, and that by providing accessible and engaging training, we can help organizations of all sizes and industries protect themselves and their customers from cyber threats. Join us in our mission to build a safer, more secure digital world.<br>\n</p>','\n',char(10)),'https://www.facebook.com/phishfirewall/',NULL,'https://www.linkedin.com/search/results/all/?fetchDeterministicClustersOnly=true&heroEntityKey=urn%3Ali%3Aorganization%3A70753848&keywords=phishfirewall&origin=RICH_QUERY_TYPEAHEAD_HISTORY&position=0&searchId=84540333-fb3e-466f-a9ea-3880f2d64e6b&sid=5el','');
|
||
INSERT INTO vendors VALUES('76676f39-1fef-41fa-8714-f37bc7a74f9b','published','promon','Promon','www.promon.co','Promon’s technology is research-based, and their patented deep protection technology Promon SHIELD™ protects apps used by hundreds of millions of users.','Stortingsgata 4',NULL,'Oslo',NULL,'NOR','058a6c45-802d-4adb-bb49-3dbfded98164',replace('<h5>Promon</h5>\n<p>\nPromon is a Norwegian company with offices in APAC, the US, Germany, the UK, and India.\nSince 2006, we have been pioneers in app security and delivered world-leading security software to many of the largest banks around the globe.\nWe work across a range of industries with various global Tier 1 clients, counting customers in industries such as finance, health, public sector, and more. Promon’s technology is research-based and originates from the internationally recognized research environments at SINTEF and the University of Oslo. Promon’s patented deep protection technology Promon SHIELD™ protects apps used by hundreds of millions of users.<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/Promon_Shield','https://www.linkedin.com/company/promon-as/','');
|
||
INSERT INTO vendors VALUES('88f38404-3ba4-4841-a182-0a7cbb09f751','published','bitdefender','Bitdefender','www.bitdefender.com','Bitdefender provides cybersecurity solutions with leading security efficacy, performance, and ease of use to enterprise organizations and consumers. ','3945 Freedom Circle','Suite 500','Santa Clara','CA','USA','69bf01e4-3d7b-418b-bd2f-3844171c7be0',replace('<h5>Bitdefender</h5>\n<p>\nBitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Guardian over millions of consumer, enterprise, and government environments, Bitdefender is one of the industry’s most trusted experts for eliminating threats, protecting privacy, digital identity and data, and enabling cyber resilience. With deep investments in research and development, Bitdefender Labs discovers hundreds of new threats each minute and validates billions of threat queries daily. The company has pioneered breakthrough innovations in antimalware, IoT security, behavioral analytics, and artificial intelligence and its technology is licensed by more than 150 of the world’s most recognized technology brands. Founded in 2001, Bitdefender has customers in 170+ countries with offices around the world. For more information, visit https://www.bitdefender.com.<br>\n</p>\n<h5>Why Bitdefender?</h5>\n<p>Unified Prevention, Detection & Response Platform\nWorks across endpoints, productivity apps, identities, networks, and hybrid cloud workloads with high efficacy, multiple security functions and easy administration.</p>','\n',char(10)),'https://www.facebook.com/bitdefender','https://www.twitter.com/Bitdefender_Ent','https://ro.linkedin.com/company/bitdefender','');
|
||
INSERT INTO vendors VALUES('817a3077-34a2-4ffb-937c-32900c253a5e','published','hunters','Hunters','www.hunters.ai','Hunters SOC Platform empowers security teams to automatically identify and respond to incidents that matter, helping teams mitigate real threats faster and more reliably than SIEM.','275 Grove St.',NULL,'Newton','MA','USA','de24ecc1-c5ed-4c83-9ff1-19c5f7473a70',replace('<h5>Hunters</h5>\n<p>\nHunters delivers a Security Operations Center (SOC) Platform that empowers security teams to automatically identify and respond to security incidents across their entire attack surface. The platform enables vendor-agnostic data ingestion and normalization at a predictable cost, and its built-in detection engineering, data correlation, and automatic investigation help teams overcome volume, complexity, and false positives. Hunters mitigates real threats faster and more reliably than SIEMs, ultimately reducing customers'' overall security risk. Enterprises like Booking.com, Snowflake, Netgear and Cimpress leverage Hunters SOC Platform to empower their security teams.\nHunters is backed by leading VCs and strategic investors including Stripes, YL Ventures, DTCP, Cisco Investments, Bessemer Venture Partners, U.S. Venture Partners (USVP), Microsoft’s venture fund M12, Blumberg Capital, Snowflake, Databricks, and Okta.\nLearn more about Hunters at https://hunters.ai. <br>\n</p>\n<h5>Why Hunters?</h5>\n<p>Free up your security team to focus on incidents that matter and remediate them faster\nModern Data Approach: Unlimited ingestion and normalization of all security and IT sources into a unified schema, at a predictable cost.\nScale to any size of environment and leverage a "bring-your-own data lake" deployment model (Snowflake, Databricks), or leveraging Hunters'' embedded one\nBuilt-In Detection Engineering: Always-up-to-date detection with transparent security updates.\nAll detection rules are pre-verified on real-world customer data to remove false positives and excessive alerting, then deployed directly to customers. This dramatically reduces risk exposure while reducing operational overhead.\nAutomatic Investigation: Focus on the incidents that matter.\nAutomatic triage, enrichment and correlation of signals and alerts to surface and prioritize the ones that matter, and enable security teams to remediate incidents faster with full context.\n</p>','\n',char(10)),NULL,'https://www.twitter.com/hunters_ai','https://www.linkedin.com/company/hunters-ai/','');
|
||
INSERT INTO vendors VALUES('4871a36a-4d9f-443d-85fa-ee74af9671ee','published','pqshield','PQShield','http://www.pqshield.com/','PQShield is a world leader in Post-Quantum Cryptography - for standards, software and hardware. Team PQShield contributed to all the PQC NIST standards announced so far. Team PQShield is also involved in WEF, NCCoE, GSMA, IETF, RISC-V and more...','Prama House',NULL,'Oxford',NULL,'GBR','36ebf4e0-bbca-40c0-80ab-3c0098e6bb74',replace('<h5>PQShield</h5>\n<p>\nPQShield is a world leader in new cryptography standards. Our researchers and advisory board contributed to all the first international PQC NIST standards announced in July 2022. Team PQShield also led multiple projects for RISC‐V, IETF, GlobalPlatform and WE,F as well as being involved in NCCoW and GSMA PQC groups\nPQShield is the only cybersecurity company that can demonstrate quantum‐safe cryptography on chips, in applications, and in the cloud. Our solutions are already in the hands of customers such as Microchip, Collins Aerospace and Bosch.\n<br>\n</p>\n<h5>Why PQShield?</h5>\n<p>Licenses cryptographic Hardware/Software IP with services to help companies transition to PQC be that for chips, applications or the cloud. Just two example solutions offered are:\nFIPS140‐3 software IP: PQCryptoLib\nThis hybrid cryptographic library was the first ever submitted to the NIST Validation Program for FIPS 140‐3. It consists of a library of modern cryptographic primitives designed for crypto‐agility to help smooth transition, providing support for classical/hybrid key derivation and TLS implementation with multiple PQC algorithms/classical schemes\nPQC hardware IP: PQSubSys\nModular Hardware‐Software CoDesign delivering post‐quantum-secured isolated execution environments, PQC hardware co‐processor, side channel protection, RISC‐V extensions, entropy, and firmware support for AES/DRBG/SHA2/HMAC/KDF/Key-Wrap\nPQShield IPs are tested on RISC‐V/Intel/AMD/ARM and we are a leading authority on PQC SCA resistance, with a dedicated SCA test lab verified by our partner, Riscure.\n</p>','\n',char(10)),NULL,'https://www.twitter.com/PqShield','https://www.linkedin.com/company/pqshield/','');
|
||
INSERT INTO vendors VALUES('e5ec3b80-d66f-4cf0-bb9a-9d73e7504997','published','plextrac-inc','PlexTrac, Inc.','https://plextrac.com/','The Premier Cybersecurity Reporting and Collaboration Platform making security data aggregation, red and blue team reporting, purple team collaboration, and remediation tracking more effective and efficient so security teams become more proactive.','816 W Bannock St','Ste. 400','Boise','ID','USA','c72281d6-d121-41c8-bb5a-7b0f008eefff',replace('<h5>PlexTrac, Inc.</h5>\n<p>\nFueled by a $70M Series B investment from Insight Partners, PlexTrac is on a mission to empower cybersecurity service providers and teams to win the right cybersecurity battles. The PlexTrac solution is a cybersecurity reporting, collaboration, and management platform focused on workflow automation for proactive assessments.\nPlexTrac streamlines reporting of cybersecurity risks and collaboration between service providers and clients and among security teams. PlexTrac also supports a purple teaming strategy with a robust test plan execution module and integrations with popular ticketing tools to improve prioritization & time to remediation.\nCustomers report a “60% reduction in the amount of time our practitioners spend writing reports,” and a “30 percent increase in efficiency.” Whether it''s delivering better reports faster or growing a program’s maturity & communication to stakeholders, PlexTrac is the premier cybersecurity reporting and collaboration platform to get the job done.\n<br>\n</p>\n<h5>Why PlexTrac, Inc.?</h5>\n<p>PlexTrac is a reporting and collaboration platform designed specifically for cybersecurity work. Unwieldy reporting, data overload, risk prioritization, and communication among stakeholders can take the focus off the real cybersecurity work. The PlexTrac platform addresses these issues, and more, by aggregating data from your security tools, streamlining reporting, providing powerful analytics, and supporting proactive assessments, tracking remediation, and constituent communication.\nSecurity service providers increase team productivity & effectiveness with features like scanner integrations, a reusable content library, custom report templates, and a client portal. Enterprise teams enjoy features for conducting proactive assessments and purple teaming, integrations with ticketing tools to track remediation, and generating analytics for attestation. Aggregate and prioritize your most critical vulnerabilities, and mobilize your team to reduce risk and improve efficiency with PlexTrac.\n</p>','\n',char(10)),'https://www.facbook.com/plextrac','https://www.twitter.com/PlexTrac','https://www.linkedin.com/company/plextrac','');
|
||
INSERT INTO vendors VALUES('95bc5671-a8db-4e0d-a385-84baefc1ad79','published','pavilion-of-spain','Pavilion of Spain','www.icex.es','Spanish Pavilion is showcasing a collection of 18 Spanish cybersecurity companies at RSA Conference 2023 in San Francisco. For profiles of our partipating companies, download https://www.icex.es/estaticos/spain-rsa-2023.pdf','1900 Avenue of the Stars','Suite 2430','Los Angeles','CA','USA','c1e58b8e-bd3b-41a8-9431-813ab4a3a366',replace('<h5>Pavilion of Spain</h5>\n<p>\nhttps://www.icex.es/estaticos/spain-rsa-2023.pdf<br>\n</p>\n<h5>Why Pavilion of Spain?</h5>\n<p>The Trade Commission of Spain, as part of the Embassy of Spain in the U.S., assists and promotes Spanish companies entering the market, as well as American firms interested on investing in Spain. The Trade Commission of Spain is a branch of the Government agency ICEX Exportación e Inversiones, which provides practical advice, market intelligence and ongoing support to Spanish businesses that want to develop international markets and promote overseas investment. </p>','\n',char(10)),NULL,NULL,'https://www.linkedin.com/company/trade-commission-of-spain-in-la/','');
|
||
INSERT INTO vendors VALUES('c6c1abfb-06d2-4fe5-b93a-20e5c6b311bb','published','netquest-corporation','NetQuest Corporation','https://netquestcorp.com/','NetQuest offers Ethernet and WAN Flow and Packet-Based traffic monitoring solutions that deliver the highest levels of accuracy, capacity, and performance. Solutions from NetQuest are deployed across thousands of network segments across the globe.','523 Fellowship Road ','Suite 205','Mount Laurel','NJ','USA','5ff97a8d-3def-45a2-a2e2-0fdc16a48ec6',replace('<h5>NetQuest Corporation</h5>\n<p>\nNetQuest provides market-leading Ethernet and WAN Flow and Packet-Based traffic monitoring solutions that deliver the highest levels of accuracy, capacity, and performance at scale. Monitoring solutions from NetQuest are deployment-proven across thousands of network segments in enterprise, carrier, government, and defense agency networks across the globe, empowering security operations teams with high-scale visibility and actionable traffic intelligence.\nThe high-performance Optical Monitoring EXchange™ (OMX) packet processing appliance combines both high-scale industry-standard IPFIX Flow Metadata Generation and Packet-Flow Optimization capabilities in a 1RU modular, software-define, high-density 10/40/100/400G appliance that works with the tools and systems already deployed.<br>\n</p>\n<h5>Why NetQuest Corporation?</h5>\n<p>OMX Capabilities include:\n• 100G Flow Sensor for Cisco Secure Network Analytics - Cisco validated and certified Flow Sensor that feeds into Cisco Flow Collectors and can be deployed alongside Cisco 10G and 40G Flow Sensors;\n• High-Scale Flow Metadata Generation – Terabit scale 1:1 unsampled IPFIX metadata generation for IPv4 and IPv6 traffic;\n• Application-Layer Enriched Metadata – L4-7 Enriched Flow Intelligence to reveal application and protocol attributes for clear and encrypted traffic including fingerprints, signatures, and heuristics;\n• Advanced Packet Processing – High-Scale optimization of packet-flow traffic with wire-speed header stripping, tunnel decapsulation, source tagging, timestamping and load balancing;\n• Network Security Broker - Policy-Based inspection & classification of traffic with multi-stage filtering and encrypted packet/payload optimization and intelligent packet slicing forwards only high-value packets to security tools\n</p>','\n',char(10)),'https://www.facebook.com/profile.php?id=100064060324261','https://www.twitter.com/netquestcorp','https://www.linkedin.com/company/netquest-corporation/','');
|
||
INSERT INTO vendors VALUES('5bf486d6-d777-4326-9871-c334914b9ec8','published','netacea','Netacea','www.netacea.com','Netacea is the fastest and most accurate protection against malicious automated threats, such as credential stuffing and scraping. Our technology is quickly implemented and supports a range of integrations to protect websites, mobile apps and APIs.','Maybrook House ','40 Blackfriar''s Street','Manchester',NULL,'GBR','ac27e7e5-7481-4ef1-999e-8b7cb0a6450d',replace('<h5>Netacea</h5>\n<p>\nAt Netacea we understand bot behaviour better than anyone else, thanks to a pioneering server-side approach to detection and mitigation.\nOur approach guarantees quick and easy implementation of our technology and enables us to support a wide range of integrations. This ensures comprehensive coverage against malicious bots across your website, mobile apps and APIs, without detriment to your website infrastructure, reliance on hardware or disruptive code changes.\nWe quickly distinguish automated bots from humans to prioritize genuine users, with our team of experts and revolutionary, machine learning powered Intent Analytics™ engine at the heart of the solution. Netacea works hand-in-hand with your in-house security functions from implementation, through to providing accurate detection and empowering you with actionable threat intelligence. <br>\n</p>\n<h5>Why Netacea?</h5>\n<p>At Netacea we understand bot behaviour better than anyone else, thanks to a pioneering agentless approach to detection and mitigation.\nOur approach guarantees quick and easy implementation of our technology and enables us to support a wide range of integrations. This ensures comprehensive coverage against malicious bots across your website, mobile apps and APIs, without detriment to your website infrastructure, reliance on hardware or disruptive code changes.\nChoose to automatically block, redirect or challenge automated threats with technology designed to complement existing controls such as WAF rulesets, rate limiting and threat databases to provide a deep analysis of all website visitors, actionable intelligence and real-time threat.\nWith our team of experts and revolutionary, machine learning powered Intent Analytics™ engine at the heart of the solution, Netacea quickly and accurately solves the growing problem of scalping, scraping and account takeover at scale.\n</p>','\n',char(10)),'https://www.facebook.com/Netacea.corp','https://www.twitter.com/Netacea_AI','https://www.linkedin.com/company/netacea','');
|
||
INSERT INTO vendors VALUES('a4eb5cfb-3553-467f-80d9-dc498140f1f1','published','netspi','NetSPI','www.netspi.com','NetSPI is the leader in enterprise penetration testing and attack surface management. ','800 Washington Avenue N ','Suite 670','Minneapolis','MN','USA','2ef80b3e-779f-496b-9cdf-bfa19560c57a',replace('<h5>NetSPI</h5>\n<p>\nNetSPI is the leader in enterprise penetration testing and attack surface management. Today, NetSPI offers the most comprehensive suite of offensive security solutions – penetration testing as a service, attack surface management, and breach and attack simulation. Through a combination of technology innovation and human ingenuity NetSPI helps organizations discover, prioritize, and remediate security vulnerabilities. For over 20 years, its global cybersecurity experts have been committed to securing the world’s most prominent organizations, including nine of the top 10 U.S. banks, four of the top five leading global cloud providers, four of the five largest healthcare companies, three FAANG companies, seven of the top 10 U.S. retailers & e-commerce companies, and 50 percent of the Fortune® top 50. NetSPI is headquartered in Minneapolis, MN, with global offices across the U.S., Canada, the UK, and India. <br>\n</p>\n<h5>Why NetSPI?</h5>\n<p>NetSPI is more than a penetration testing company. We specialize in offensive security services, rooted in two decades of penetration testing expertise. We provide our customers with a full suite of offensive security testing capabilities including:\n-Attack Surface Management\n-Penetration Testing as a Service\n-Breach and Attack Simulation\nEach of our services are supported by a team of highly skilled, in-house security testing experts AND cloud-native technology platforms. The technology platforms automate administrative tasks and create efficiencies so that our team can perform more manual testing. Our technologies enable our customers to ingest and manage the results in the format they choose and in real-time as security issues are identified.\nWith NetSPI, you don’t just get a technology or a service, you get a true extension of your team to help you discover and fix vulnerabilities, improve your security posture, and reduce your organization’s risk.</p>','\n',char(10)),'https://www.facebook.com/netspi/','https://www.twitter.com/NetSPI','https://www.linkedin.com/company/netspi/','');
|
||
INSERT INTO vendors VALUES('df029554-2a3a-4bf3-b6da-22cb556110be','published','normalyze','Normalyze','normalyze.ai','Normalyze is a cloud data security platform that continuously discovers sensitive data and their access paths across your cloud environments. Normalyze provides the ability to analyze, prioritize and respond to data threats to prevent data leakage.','1276 Nightingale Ct.',NULL,'Los Altos','CA','USA','9b0cfa62-ce43-490a-a2a7-1d46457ef773',replace('<h5>Normalyze</h5>\n<p>\nNormalyze is a pioneering provider of cloud data security solutions helping customers secure their data, applications, identities, and infrastructure across public clouds. With Normalyze, organizations can discover and visualize their cloud data attack surface within minutes and get real-time visibility and control into their security posture, including access, configurations, and sensitive data to secure cloud infrastructures at scale. The Normalyze agentless and machine-learning scanning platform continuously discovers resources, sensitive data and access paths across all cloud environments. The company was founded by industry veterans Ravi Ithal and Amer Deeba and has several customers, including Corelight, Netskope, and Orkes. The company is funded by Lightspeed Venture Partners and Battery Ventures.\nFor more information, please visit normalyze.ai.<br>\n</p>\n<h5>Why Normalyze?</h5>\n<p>Sensitive data is sprawling across public clouds, exacerbating governance, security, and compliance challenges for enterprises. For years, prevalent point security tools have focused on infrastructure and applications, failing to help enterprises protect their most precious asset - the data. Access governance, cross-account and multi-cloud data movement, shadow data stores, and other attack vectors remain unaddressed. Normalyze’s answer to these challenges is the data-first approach to data security that addresses risks contextually, continuously, and across any cloud.\nNormalyze Data-first Cloud Security Platform focuses on the data - the organization’s most valuable, sensitive, and vulnerable asset. Unlike legacy point products, the platform discovers, classifies, prioritizes, and remediates critical risks to sensitive data across all cloud infrastructure, applications, and datastores in minutes.</p>','\n',char(10)),NULL,'https://www.twitter.com/normalyze_ai','https://www.linkedin.com/company/normalyze/','');
|
||
INSERT INTO vendors VALUES('e300a0e0-4591-4fed-a0c1-eb945482fd61','published','nucleus-security','Nucleus Security','www.nucleussec.com','Nucleus is a vulnerability and risk management solution that automates VM processes and workflows, enabling organizations to mitigate vulnerabilities 10 times faster, using a fraction of the resources that it takes to perform these tasks today. ','71 Alafia Drive',NULL,'Sarasota','FL','USA','72a0f8cf-4a23-4062-9eb8-e41de8508790',replace('<h5>Nucleus Security</h5>\n<p>\nNucleus is a Risk Based Vulnerability Management (RBVM) solution that automates vulnerability management processes and workflows, enabling organizations to mitigate vulnerabilities 10 times faster, using a fraction of the resources that it takes to perform these tasks today.<br>\n</p>\n<h5>Why Nucleus Security?</h5>\n<p>Nucleus Security is a Risk-Based Vulnerability Management (RBVM) solution that automates time-consuming vulnerability management processes, enabling large and complex enterprises to scale their vulnerability management program and remediate vulnerabilities 10x faster. Supporting nearly 100 integrations, Nucleus Security creates a unified vulnerability inventory, fully enriched with the world’s leading threat intelligence, and provides the automation engine needed to eliminate the stovepipes of chaos found in large enterprise vulnerability management programs today. Harness the power of a unified vulnerability solution today at https://nucleussec.com/.</p>','\n',char(10)),'https://www.facebook.com/nucleussec/','https://www.twitter.com/nucleussec','https://www.linkedin.com/company/nucleussec/','');
|
||
INSERT INTO vendors VALUES('16b4addf-82df-443f-ab82-8a2985a521a5','published','iboss','iboss','www.iboss.com','iboss is a cloud security company that enables organizations to reduce cyber risk by delivering a Zero Trust Security Service Edge platform designed to protect resources and users. The iboss platform replaces legacy VPN, Proxies and VDI with a consolidated service that improves security, increases the end user experience, and substantially reduces network security costs.','101 Federal Street ','23rd Floor','Boston','MA','USA','ced475c0-9f76-4934-9622-9da16b48b5a9',replace('<h5>iboss</h5>\n<p>\niboss is a cloud security company that enables organizations to reduce cyber risk by delivering a Zero Trust Security Service Edge platform designed to protect resources and users in the modern distributed world. Applications, data and services have moved to the cloud and are located everywhere while users needing access to those resources are working from anywhere. The iboss platform replaces legacy VPN, Proxies and VDI with a consolidated service that improves security, increases the end user experience, consolidates technology and substantially reduces costs. Built on a containerized cloud architecture, iboss delivers security capabilities such as SWG, malware defense, Browser Isolation, CASB and Data Loss Prevention to protect all resources, via the cloud, instantaneously and at scale. This shifts the focus from protecting buildings to protecting people and resources wherever they are located.<br>\n</p>\n<h5>Why iboss?</h5>\n<p>The iboss Zero Trust Security Service Edge is a platform that combines connectivity, such as ZTNA, and security capabilities such as CASB, malware defense, DLP and logging, into a single platform that automatically connects users and devices to all enterprise owned resources and the public Internet. The iboss platform replaces legacy VPN, Proxies and VDI with a consolidated service that improves security, increases the end user experience, consolidates technology and substantially reduces costs. It automatically encrypts all network traffic, including DNS, at all times regardless of location and redirects the traffic to the global Security Service Edge which provides connectivity and security capabilities. The iboss Zero Trust SSE is the first and only solution that allows all protected resources within an organization to be labeled and categorized, including Security Objectives and Impact Levels. </p>','\n',char(10)),'https://www.facebook.com/ibosscloud','https://www.twitter.com/ibosscloud/','https://www.linkedin.com/company/iboss','');
|
||
INSERT INTO vendors VALUES('01a4cf87-2fdd-40b4-b996-c13f7bc3f825','published','lacework','Lacework','www.lacework.com','Lacework is the data-driven security platform for the cloud. Lacework is the only CNAPP solution that can collect, analyze, & accurately correlate data, without requiring manually written rules, across an organization’s cloud and K8s environments.','391 San Antonio Rd',NULL,'Mountain View','CA','USA','d4586f71-05c8-424b-bd8a-8203d3015f92',replace('<h5>Lacework</h5>\n<p>\nLacework offers the data-driven security platform for the cloud and is the leading cloud-native application protection platform (CNAPP) solution. Only Lacework can collect, analyze, and accurately correlate data — without requiring manually written rules — across an organization’s cloud and Kubernetes environments, and narrow it down to the handful of security events that matter. Security and DevOps teams around the world trust Lacework to secure cloud-native applications across the full lifecycle from code to cloud.<br>\n</p>\n<h5>Why Lacework?</h5>\n<p>Lacework helps you find the truth of what’s happening across your cloud and where the issues are. We help you uncover risk and help you prove compliance faster, without the overhead. Where we truly stand apart is our ability to continuously monitor for signs of trouble in your cloud accounts and workloads using behavior-based threat detection.\nThe engine fueling this is our patented Polygraph technology, which automatically builds a baseline of how your unique environment operates. It uncovers the relationships between resources, services, users, network activity, etc., and uses behavioral analytics to detect abnormal activity. With the cloud, new things happen all the time, but our technology recognizes those patterns automatically and uncovers meaningful new behaviors that you should pay attention to most. Lacework identifies unknowns because we’re looking at changes in behavior at scale, based on learning your unique cloud.</p>','\n',char(10)),'https://www.facebook.com/laceworkinc','https://www.twitter.com/Lacework','https://www.linkedin.com/company/lacework/','');
|
||
INSERT INTO vendors VALUES('d5514e4e-ac44-4549-a591-6db2c4c560f3','published','lastpass','LastPass','https://www.lastpass.com/products/business','LastPass® is an award-winning password manager that provides identity and access management solutions. From single sign-on and enterprise password management to multi-factor authentication, LastPass gives superior control to IT and access to users. For more information, visit https://lastpass.com. ','333 Summer Street',NULL,'Boston','MA','USA','98da3535-5b27-4e02-9591-a94716f4af59',replace('<h5>LastPass</h5>\n<p>\nLastPass is an award-winning password manager which has helped more than 33 million registered users organize and protect their online lives. For more than 100,000 businesses of all sizes, LastPass provides password and identity management solutions that are convenient, easy to manage and effortless to use. From enterprise password management and single sign-on to adaptive multi-factor authentication, LastPass for Business gives superior control to IT and frictionless access to users. For more information, visit https://www.lastpass.com.\nLastPass is trademarked in the U.S. and other countries.<br>\n</p>\n<h5>Why LastPass?</h5>\n<p>LastPass Business simplifies work-life security for employees and IT leaders, making it easy to generate, secure, access and share credentials, while IT admins gain oversight and control with reporting, policies, integrations and more. Plus, Site License option allows SMBs and Enterprises alike to scale at a faster rate. </p>','\n',char(10)),'https://www.facebook.com/LastPass/','https://www.twitter.com/lastpass','https://www.linkedin.com/company/lastpass','');
|
||
INSERT INTO vendors VALUES('010499c4-342e-4fb8-945e-fd87ac1d0fbe','published','lydsec-digital-technology','Lydsec Digital Technology','https://www.keypasco.com/','Lydsec Digital Tech. focuses on Keypasco Multi-Factor Authentication (MFA) solution that protects the security of access to identity and provides for enterprise zero-trust networks or cloud services to meet various network security needs.','No. 159, Songde Rd, Xinyi District','25F','Taipei City ',NULL,'TWN','7473714f-56cd-4234-8cd0-e8824f679d8a',replace('<h5>Lydsec Digital Technology </h5>\n<p>\nLydsec Digital Technology is a software company founded in 2012 and set up subsidiaries in Sweden, Japan, the United States, and other places over the world. Lydsec focuses on Keypasco Multi-Factor Authentication (MFA) solutions provided to Internet Content Providers (ICPs) and IoT Service Providers across more than ten industries, including 10 banks, third-party payment companies, e-commerce, online gaming, healthcare, biotech, government, and high-tech manufacturing. Keypasco MFA has been sold to 16 countries around the world through 18 global channel partners. Lydsec also got the first prize in the Cybersecurity sector in 2022 SelectUSA.<br>\n</p>\n<h5>Why Lydsec Digital Technology ?</h5>\n<p>Keypasco Multi-Factor Authentication (MFA) is an integrated software for network identity security protection. It is developed by Sweden and Taiwan with several unique multi-factor authentication technology, whether it is API platform or enterprise internal network, Keypasco can completely protect the security of access to identity. It also provides high-strength identity authentication solutions to meet various network security needs for enterprise zero-trust networks or cloud services.</p>','\n',char(10)),'https://www.facebook.com/Keypasco',NULL,'https://www.linkedin.com/company/keypasco/','');
|
||
INSERT INTO vendors VALUES('0b5eed03-0da4-4c48-8dbc-05dfbf527938','published','servadus','Servadus','servadus.com','We provide best-in-class Cybersecurity assessments and consulting. Our team supports CMMC v2, PCI DSS, NIST 800-53, 800-171, CSF, and many others. We also offer first-of-its-kind online shopping for businesses to conduct self-assessments. ',NULL,NULL,'Walnut Creek','CA','USA','6d085443-e8f0-4ef5-b057-7dd43dfa9308',replace('<h5>Servadus</h5>\n<p>\nServadus is a U.S.-based cybersecurity and compliance consulting leader, providing premier services for establishing a continuous security program with easy-to-understand processes. Servadus’ mission is to support a holistic approach to information operations management and security from small businesses to global enterprises. Servadus has certifications as a PCI DSS Qualified Security Assessor (QSA) company, a SWIFT CSP assessor for the SWIFT CSCF program, and a CMMC Registered Practitioner. <br>\n</p>\n<h5>Why Servadus?</h5>\n<p>Servadus has experience and credentials, a strategic focus on cybersecurity services, an outstanding reputation, and a solid commitment to customers in multiple industries. It will continue to offer a full-service assessment program to all industries. The long-term success of our clients is one of our essential core values. The Servadus difference comes from how well the right people, tools, and processes work together. We work with the right partners to find the best tools for managing projects, GRC management, assessments, penetration testing, and managing vulnerability management, so we can focus on you and give you a great, easy, and valuable experience.</p>','\n',char(10)),'https://www.facebook.com/Servadus/','https://www.twitter.com/servadus','https://www.linkedin.com/company/servadus/ ','');
|
||
INSERT INTO vendors VALUES('d49116e1-2257-4cfd-ace8-93d774fe5100','published','simspace','SimSpace','simspace.com','Founded in 2015 by experts from the U.S. Cyber Command and MIT’s Lincoln Laboratory, SimSpace combines the highest-fidelity, military-grade cyber ranges and training content with unique user and adversary emulation techniques.','320 Congress St. ','7th Floor','Boston','MA','USA','6066146d-ad59-40ed-a4d2-f161934a20e4',replace('<h5>SimSpace</h5>\n<p>\nSimSpace provides military-grade cyber ranges, to run live-fire exercises, optimize security stacks, and deliver elite cyber training to enable continuous security improvement programs based on technology from the US Cyber Command.<br>\n</p>\n<h5>Why SimSpace?</h5>\n<p>The SimSpace Cyber Force Platform: SimSpace’s military-grade cyber range is an open, high-fidelity cyber range that enables continuous security improvement programs for the US Cyber Command, Allied Nation-States and F2000 organizations. Powered by the world’s most advanced military-grade cyber range, this platform provides a guaranteed safe environment to improve cyber operations readiness continuously. SimSpace enables you to leverage the same military-grade cyber ranges as the US Cyber Command, nation-state critical infrastructure, global intelligence communities, law enforcement agencies, and Fortune 2000 organizations to validate security teams, processes, techniques, and technology and drive continuous security improvement.</p>','\n',char(10)),NULL,'https://www.twitter.com/SimSpaceCorp','https://www.linkedin.com/company/simspace-corporation/','');
|
||
INSERT INTO vendors VALUES('af9ee6ef-f706-41bd-b865-7d4f09e5263c','published','ssh-communications-security','SSH Communications Security','https//www.ssh.com/','SSH helps organizations safeguard their mission-critical digital assets at rest, in transit, and in use with Zero Trust, Operational Technology and Quantum-Safe solutions. We have 5,000+ customers worldwide, including 40 % of Fortune 500 companies. ','434 W 33rd Street ','Suite 842','New York ','NY','USA','d7b889c4-9b7d-49b9-8b63-2744d3ee3f84',replace('<h5>SSH Communications Security</h5>\n<p>\nSSH is a defensive cybersecurity company that safeguards communications and access between systems, automated applications, and people. We have 5,000+ customers worldwide, including 40 percent of Fortune 500 companies and major organizations in the Finance, Government, Retail, and Industrial segments.\nWe help our customers secure their business in the age of hybrid cloud and distributed IT and OT infrastructures. Our passwordless and keyless Zero Trust solutions reduce costs and complexity while quantum-safe encryption keeps critical connections future-proof. Our teams and partners in North America, Europe, and Asia ensure customer success. The company’s shares (SSH1V) are listed on Nasdaq Helsinki. www.ssh.com.\n<br>\n</p>\n<h5>Why SSH Communications Security?</h5>\n<p>SSH provides passwordless, keyless, defensive cybersecurity solutions with Quantum-Safe encryption. Our solutions secure communications from machine to machine, system to system, applications to applications, data center to data center, and sensitive information sharing between people.\nOur solutions provide state-of-art privileged access management for government agencies, critical industries and infrastructure, operational technology, financial institutions, authorities, health institutions, and individual citizens.\nStarting with an ingeniously safe internet protocol SSH, which we originally invented, we continue to help customers improve their security, automate processes, reduce costs, pass audits, and ensure compliance in novel ways, like moving away from static perimeter-based cyber defense to a Zero Trust model, where there are no passwords or keys nor implicitly trusted users, connections, applications, servers, or devices.</p>','\n',char(10)),'https://www.facebook.com/sshcom/','https://www.twitter.com/SSH','https://www.linkedin.com/company/ssh-communications-security/','');
|
||
INSERT INTO vendors VALUES('feafd1cd-02dc-473f-b4bb-fa508a40a611','published','sasa-software','Sasa Software','https://www.sasa-software.com',replace('Sasa Software'' GateScanner solutions protect critical networks from email and file based attacks using Content Disarm and Reconstruction (CDR) file-sanitization technology. CDR prevents known and unknown malware in email, USB and file shares.\n','\n',char(10)),'Kibbutz Sasa',' M.P. Merom Hagalil','Kibbutz Sasa',NULL,'ISR','e7a4dcdb-86d2-4535-89c4-de2b6d64f28e',replace('<h5>Sasa Software</h5>\n<p>\nSasa Software is a leader in CDR file sanitization technology protecting critical networks from email and file based attack. CDR technology (Content Disarm and Reconstruction) disarms incoming content without need for detection. Every email and file are deconstructed, scanned with multiple AV''s and AI, and then restructured in a way that neutralizes any remaining undetected malicious code. The GateScanner line addresses a wide range of network configurations, offering dedicated solutions for email, portable media imports (USB), app to app file transfers, file sanitization via API, secure managed file transfers with embedded CDR and digital vaults. GateScanner products are protecting over 450 government and enterprise networks in the energy, banking, infrastructure, transportation, healthcare and legal services sectors. In 2022, GateScanner Imaging Gateway protecting healthcare networks from infected imaging data was launched and put into service by two major hospitals in Israel.<br>\n</p>\n<h5>Why Sasa Software?</h5>\n<p>GateScanner blocks advanced, undetectable malware, hidden in incoming emails, file transfers and USB data imports. It utilizes Content Disarm and Reconstruction (CDR) technology, recognized by Gartner as ''the strongest option for (securing) the second network layer''. Since it doesn''t rely on detection it is also protects against completely new attack types. GateScanner suite offers modular solutions delivering CDR for the sanitization of content in a broad range of applications, including a secure email gateway, managed file transfer and vaults, CDR via API, API-less app-to-app transfer solutions, data diodes and USB kiosks (stand-alone or networked). An integration engine allows easy integration with existing tools such as sandboxes. GateScanner is the choice of top government agencies and infrastructure providers in Israel, and major enterprises worldwide, since 2013. It''s efficacy is tested and approved annually by Israel''s cyber-command and penetration tests of the major clients.</p>','\n',char(10)),'https://www.facebook.com/sasasoftware/','https://www.twitter.com/Sasa_Software','https://www.linkedin.com/company/sasa-software/','');
|
||
INSERT INTO vendors VALUES('9ad512a4-f997-41c7-8a41-7d3d86c23d30','published','nanitor','Nanitor','www.nanitor.com','Nanitor delivers a market-leading out-of-the-box vulnerability management system empowering SME''s to simply monitor, identify, and remediate vulnerabilities across their entire IT infrastructure. Nanitor makes vulnerability management easy.','Sudurlandsbraut 6',NULL,'Reykjavik',NULL,'ISL','11ad6397-3737-42eb-bb87-affff3b05d75',replace('<h5>Nanitor</h5>\n<p>\nNanitor is a vulnerability management company that uses cutting-edge technology and expert analysis to protect businesses from cyber threats. We offer 24/7 monitoring, incident response, vulnerability assessments, and compliance management, all tailored to the unique needs of each client across sectors and verticals. With a track record of success in the industry, Nanitor is the go-to partner for businesses looking to safeguard their digital assets and sensitive information.
\nThe Nanitor system is a non-modular full service solution with simplicity embedded into the product from integration to remediation monitoring. By offering real-time vulnerability scanning across your entire IT infrastructure and prioritizing all issues within the Nanitor UI, users can focus their efforts on remediating the most critical issues quickly.\n
Vulnerability management just got simple. We’re that good.<br>\n</p>\n<h5>Why Nanitor?</h5>\n<p>Nanitor provides a non-modular all encompassing simple vulnerability management system, empowering IT professionals across sectors to keep their IT infrastructure’s secure. With simple integration and setup through to issue monitoring, and remediation activities, Nanitor takes away the common pain and struggle within vulnerability management.\nNanitor provides real-time issue monitoring, issue prioritisation, as well as a health score across both your organisation and departmental level. With an intuitive user interface, the Nanitor system simplifies every element of a traditional vulnerability management program. It is a product built with customer regulatory requirements in mind, ensuring easy device and system reporting, and simple support for all auditing scenarios.
\nNanitor makes vulnerability management simple, straight-forward, and effective no matter the industry.</p>','\n',char(10)),'https://www.facebook.com/nanitorehf',NULL,'https://www.linkedin.com/company/9484774/','');
|
||
INSERT INTO vendors VALUES('b1e2c092-c9f8-40ef-b0d3-66da953c5801','published','safebase','SafeBase','safebase.com','SafeBase is the customer trust platform that helps organizations develop long-term buyer confidence through improved transparency, proactive communication, and real-time oversight and insights. ','441 43rd Ave',NULL,'San Francisco','CA','USA','abf67036-48dc-42ac-bf07-73fa4869c264',replace('<h5>SafeBase</h5>\n<p>\nSafeBase is the customer trust platform that helps organizations develop long-term buyer confidence through improved transparency, proactive communication, and real-time oversight and insights. <br>\n</p>\n<h5>Why SafeBase?</h5>\n<p>SafeBase is the customer trust platform that helps organizations develop long-term buyer confidence through improved transparency, proactive communication, and real-time oversight and insights.\nWith our Smart Trust Center, companies can transparently share their security posture, answer frequently asked questions, proactively provide updates on incidents, and securely share Trust documentation.\nSafeBase takes the complex process of sharing Trust documentation and makes it simple and smooth. Customers and prospects can get access to the information they need with no friction, and very little delay. Meanwhile, companies enjoy a shorter deal cycle and stronger customer relationships.\nSafeBase integrates with a wide range of applications, including Slack, Jira, Salesforce, and Hubspot. We also support data warehouse sync to most popular destinations.\nWe currently power the trust programs of 250+ leading companies and growing.</p>','\n',char(10)),NULL,'https://www.twitter.com/getsafebase','https://www.linkedin.com/company/safebase/','');
|
||
INSERT INTO vendors VALUES('db967400-cad1-4a44-8075-69596c6e1b2a','published','silverfort','Silverfort','www.silverfort.com','Silverfort pioneers the first Unified Identity Protection platform, enabling enterprises to extend MFA and modern identity security controls to resources that couldn’t be protected before – legacy applications, service accounts, and many more.','43 Westland Ave',NULL,'Boston','MA','USA','cd383217-61bc-4ef1-ab7f-76f87264bab8',replace('<h5>Silverfort</h5>\n<p>\nSilverfort pioneers the first Unified Identity Protection platform, that enables enterprises to extend MFA and modern identity security controls to any sensitive resource, including ones that couldn’t be protected before – legacy applications, service accounts (non-human identities), IT/OT infrastructure, command-line interfaces used by ransomware, and many more. Silverfort enables enterprises to prevent, detect and respond to identity threats such as account takeover and lateral movement, achieve compliance with industry regulations and cyber insurance requirements, and consolidate their legacy and cloud-based IAM ‘silos’ to gain unified security and user experience everywhere. Silverfort is trusted by hundreds of enterprise customers around the world, including Fortune 100 companies.<br>\n</p>\n<h5>Why Silverfort?</h5>\n<p>Silverfort Unified Identity Protection platform extends MFA and modern security controls to all users, service accounts and resources. Silverfort integrates with all leading Identity Providers to deliver continuous monitoring, risk analysis, and active policy enforcement on every authentication, on-prem and in the cloud. Customers use Silverfort to apply MFA protection to legacy apps, command line access and other resources that couldn’t be secured before, automate the discovery and protection of service accounts, and meet the new cyber insurance identity protection requirements.</p>','\n',char(10)),'https://www.facebook.com/silverfort','https://www.twitter.com/silverfort','https://www.linkedin.com/company/silverfort/','');
|
||
INSERT INTO vendors VALUES('0a265d0f-3888-4d3f-b7b8-302c822c50f1','published','sphere','SPHERE','www.sphereco.com',replace('We are a woman-owned company that has redefined how organizations achieve controls across their environment. Our mission is to empower security & IT teams to improve identity hygiene so information can be properly protected against theft and abuse.\n','\n',char(10)),'3 Gateway Center','100 Mulberry Street, 8th Floor','Newark','NJ','USA','080b7f6b-1d1f-42d8-8670-cb0138a400b4',replace('<h5>SPHERE</h5>\n<p>\nWe are a woman-owned company that has redefined how organizations achieve controls across their environment. Our mission is to empower security & IT teams to improve identity hygiene so information can be properly protected against theft and abuse.\n<br>\n</p>\n<h5>Why SPHERE?</h5>\n<p>SPHEREboard is an Identity Hygiene platform that enables enterprises to enforce and secure Account, Groups and Data Access controls.\nOur solution was developed by and for Identity practitioners to provide a holistic approach that immediately reduces risk while also preventing compliance failures with improved operational effectiveness. </p>','\n',char(10)),'https://www.facebook.com/SphereTechnologySolutions','https://www.twitter.com/SPHERETechSol','https://www.linkedin.com/company/sphere-technology-solutions/','');
|
||
INSERT INTO vendors VALUES('f9a5e53b-d0aa-4ad9-a268-41b17fb7fbe7','published','sentra','Sentra','www.sentra.io','Sentra’s data lifecycle security platform protects data as it moves through cloud environments. With total visibility and control of data, organizations can finally leverage the speed and scalability of the cloud while keeping sensitive data secure. ','101 Avenue of the Americas ','8th and 9th Floors','New York','NY','USA','58d46086-703f-4103-9537-52c2fbac7102',replace('<h5>Sentra</h5>\n<p>\nSentra tracks and assesses data and its security through the entire lifecycle.\nBy providing automatic visibility, risk assessment, and access analysis for cloud data, Sentra ensures that sensitive data is always secured - regardless of where it travels in your cloud.\nSentra''s multi-cloud data security platform that works across IaaS, SaaS and DBaaS, including AWS, Azure, GCP, Oracle Cloud, Snowflake, Databricks, and more.\n<br>\n</p>\n<h5>Why Sentra?</h5>\n<p>Sentra’s data lifecycle security platform protects data as it moves through cloud environments. With total visibility and control of data, organizations can finally leverage the speed and scalability of the cloud while keeping sensitive data secure.\nSentra’s agentless Data Security Posture Management (DSPM) platform connects to the cloud infrastructure, providing full multi-cloud coverage within minutes. Sentra then automatically discovers and classifies data without introducing any privacy risks.\nSentra’s unique data classification leverages ML and AI to detect each customer’s proprietary sensitive data and understand where the data is located and how it travels through complex cloud environments. Sentra supports all cloud-native and unmanaged databases, data warehouses, data lakes, data pipelines, and metadata catalogs across all major public cloud providers.\n</p>','\n',char(10)),NULL,'https://www.twitter.com/sentra_security','https://www.linkedin.com/company/sentra-io/','');
|
||
INSERT INTO vendors VALUES('8a94213b-6148-41a7-8ec2-db90175a1028','published','stellar-cyber','STELLAR CYBER','https://stellarcyber.ai','Stellar Cyber’s Open XDR platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill to secure their environments successfully. For more information, contact https://stellarcyber.ai.','2590 N First St Suite 360',NULL,'San Jose','CA','USA','bef8f78d-94bd-40c7-88df-b62a86f14479',replace('<h5>STELLAR CYBER</h5>\n<p>\nStellar Cyber, the Open XDR company, re-invents how lean-security teams keep on-premises, cloud, and IT/OT environments secure. Uniquely designed to meet the needs of lean Enterprise and MSSP security teams, the Stellar Cyber Open XDR Platform enables them to produce consistent security outcomes with their existing staff. Packed with easy-to-use security features and intelligent automation, Stellar Cyber complements a security team''s human expertise, making them more productive and efficient.\nUnlike other SecOps platforms that require expert security engineers to deploy and senior security analysts to utilize fully, Stellar Cyber Open XDR Platform provides NG-SIEM, NDR, UEBA, SOAR, and TIP capabilities anyone can use. Powered by deep learning AI and an open integration architecture, Stellar Cyber automatically correlates alerts, logs, and telemetry data, providing security analysts with the holistic view of threats they need to mitigate cyber threats fast. <br>\n</p>\n<h5>Why STELLAR CYBER?</h5>\n<p>Stellar Cyber, the Open XDR company, re-invents how lean-security teams keep on-premises, cloud, and IT/OT environments secure. Uniquely designed to meet the needs of lean Enterprise and MSSP security teams, the Stellar Cyber Open XDR Platform enables them to produce consistent security outcomes with their existing staff. Packed with easy-to-use security features and intelligent automation, Stellar Cyber complements a security team''s human expertise, making them more productive and efficient.\nUnlike other SecOps platforms that require expert security engineers to deploy and senior security analysts to utilize fully, Stellar Cyber Open XDR Platform provides NG-SIEM, NDR, UEBA, SOAR, and TIP capabilities anyone can use. Powered by deep learning AI and an open integration architecture, Stellar Cyber automatically correlates alerts, logs, and telemetry data, providing security analysts with the holistic view of threats they need to mitigate cyber threats fast. </p>','\n',char(10)),'Twitter: https://twitter.com/stellarcyberai ','https://www.twitter.com/LinkedIn: https://www.linkedin.com/company/stellarcyber ','YouTube: https://www.youtube.com/@stellarcyber3758 ','');
|
||
INSERT INTO vendors VALUES('a31e5d6d-20c7-49d3-b500-b256599d7950','published','secutech','SecuTech','www.esecutech.com','For the past decade, SecuTech has been regarded as a global leader in providing hardware-based software protection & licensing options, as well as strong two factor authentication for Windows, iOS and Linux based systems.','Suite 206, 32 Delhi Rd',NULL,'North Ryde',NULL,'AUS','7c45413d-232f-4ddf-85d2-6b25a61738d9',replace('<h5>SecuTech</h5>\n<p>\nSoftware Protection\nSoftware protection has always been an integral part of modern businesses. With SecuTech’s wide range of driverless UniKey® dongles this has never been easier to achieve. The UniKey ensures not to burden the user, while providing exceptional functionality options to the developer to ensure their visions are met.\nMulti-Factor Authentication\nSecuTech’s authentication solutions provide an array of sophisticated and robust authentication of users, ensuring the protection of information through access is met whether cost, transparency, or security is the priority.\nKoalaKey,\nA Data, Software, and Password token.\nThe KoalaKey is a hybrid device combining ease of use with security.\nFor personal, software licensing, or enterprise use, the KoalaKey can meet almost anyone’s needs.\nWithin a single token, KoalaKey’s solution provides:\nData security\nSoftware protection\nPassword management\n3rd party authentication\nUnparalleled customization\nAttack and tamper resistant<br>\n</p>\n<h5>Why SecuTech?</h5>\n<p>At SecuTech we provide a highly customizable and economical software protection and user authentication solutions with OEM customization options. We are the hardware manufacturer for our products.</p>','\n',char(10)),NULL,NULL,NULL,'');
|
||
INSERT INTO vendors VALUES('dcc6e133-c555-4e11-b69d-1ab373263550','published','security-compass','Security Compass','https://www.securitycompass.com/?utm_source=rsac&utm_medium=referral&utm_campaign=fy23_rsac','Secure, compliant software by design. Implement secure software coding practices at scale in environments with increasingly complex security and compliance requirements, rapidly accelerating release schedules, and limited access to security experts.','390 Queens Quay W ','Suite 209','Toronto','ON','CAN','9d404daf-2fa9-4d56-a90d-a3400fc156ba',replace('<h5>Security Compass</h5>\n<p>\nSecurity Compass'' SD Elements platform is the best solution for organizations who need to scalably model software threats, identify countermeasures, and deliver secure, compliant code quickly. SD Elements'' comprehensive approach to application security empowers DevSecOps teams to make software secure and compliant by design through automating threat modeling, generating application security requirements, and providing secure development and compliance best practices. With SD Elements, DevSecOps teams can fully “shift left,” and take a proactive, developer-centric “plan and prevent” approach to software security, which lowers software development costs and cyber risks, rather than a reactive, “find and fix” approach, which increases costs and risk.<br>\n</p>\n<h5>Why Security Compass?</h5>\n<p>Security Compass. Secure, compliant software by design.\nSD Elements platform seamlessly integrates secure development requirements and best practices into the very beginning of your software development process. Help developers proactively write code that incorporates the latest secure coding practices, complies with security regulations and standards, and significantly reduces cyber risks and remediation costs. Enable consistent, scalable, developer-friendly secure coding practices across your entire software portfolio to deliver more secure products to market faster.</p>','\n',char(10)),'https://www.facebook.com/SecCompass/','https://www.twitter.com/securitycompass','https://www.linkedin.com/company/security-compass','');
|
||
INSERT INTO vendors VALUES('32e0798b-aaa7-4129-8f66-1b2c4005e40a','published','sonatype','Sonatype','www.sonatype.com','Sonatype is the software supply chain management company. We empower developers and security professionals with intelligent tools to innovate more securely at scale. ','8161 Maple Lawn Blvd.','Suite 250','Fulton','MD','USA','65f4eb12-b34e-4619-b8f9-8420840c8e1d',replace('<h5>Sonatype</h5>\n<p>\nSonatype is the software supply chain management company. We enable organizations to innovate faster in a highly competitive market. We allow engineers to develop software fearlessly and focus on building products that power businesses. We help security teams be confident that the software is secure. Sonatype researchers have analyzed more than 120 million components – 40x more than our competitors. Enabling high-quality, secure software helps organizations meet their business needs and those of their customers and partners. More than 2,000 organizations, including 70% of the Fortune 100 and 15 million software developers, rely on our tools and guidance to be ambitious, move fast, and do it securely. To learn more about Sonatype visit https://www.sonatype.com.<br>\n</p>\n<h5>Why Sonatype?</h5>\n<p>he Sonatype platform offers a suite of tools that help teams develop software quickly, securely and with unparalleled quality by behavioral Artificial Intelligence and the world’s most comprehensive and accurate data set to manage and recommend open source software components. The award-winning, analyst-recognized platform includes:\nLifecycle: Controls open source risk across the Software Development Life Cycle (SDLC).\nLift: Evaluates code you own and code you borrow using Sonatype''s trailblazing research to vastly improve code quality and reduce technical debt.\nRepository Firewall: Your first line of defense against modern software supply chain attacks. Automatically spot and stop malicious and vulnerable components from downloading into your repository.\nNexus Repository: World’s leading tool to manage components, binaries and build artifacts across your entire software supply chain.</p>','\n',char(10)),'https://www.facebook.com/Sonatype/','https://www.twitter.com/sonatype','https://www.linkedin.com/company/sonatype','');
|
||
INSERT INTO vendors VALUES('a618b8bf-f4b3-4ab9-b45d-45421f395092','published','splunk','Splunk','https://www.splunk.com/?utm_medium=medium&utm_source=3rdparty&utm_campaign=AMERFY24Q1_GEM_GLBL_TSHW_SEC_EN_RSAApr23','Splunk delivers unified security operations for digital resilience through a unified work surface combining industry-leading SIEM, SOAR, behavior analytics & threat intelligence management. This helps customers achieve efficient integration & process execution across cloud, on-prem & hybrid environments to accelerate threat detection, investigation & response. ','250 Brannan St',NULL,'San Francisco','CA','USA','58ed512a-72c6-4193-ae9e-0ad0e77b5276',replace('<h5>Splunk</h5>\n<p>\nSplunk delivers unified security operations for digital resilience by enabling SOCs with a unified work surface to accelerate threat detection, investigation and response. At the core is an extensible data platform for end-to-end visibility of your security posture. By combining industry-leading Splunk Enterprise Security, Splunk SOAR, behavior analytics and threat intelligence capabilities and workflows into a simplified security operations experience with Splunk Mission Control, you can achieve efficient integration and process execution across cloud, on-prem, and hybrid environments. Splunk’s open ecosystem of 2,800+ applications and integrations allows you to extract value from, and rapidly analyze data in, your existing infrastructure. Splunk security research and rapid response guides also help you gain situational awareness for fast-moving, high-profile threats. With Splunk, security teams can tackle the most pressing security challenges and minimize business risk.<br>\n</p>\n<h5>Why Splunk?</h5>\n<p>Splunk accelerates threat detection, investigation and response with:\nSplunk Enterprise Security, an industry-leading modern SIEM solution that is purpose built on top of an extensible data platform, and provides full breadth visibility into your security posture so you can protect your business and mitigate risk – at scale\nSplunk SOAR enables your team to work smarter by automating repetitive tasks, respond to security incidents in seconds, and increase analyst productivity and accuracy\nCloud-based streaming analytics allow you to quickly detect suspicious and malicious behaviors\nThreat intelligence management delivers actionable intelligence to accelerate threat detection and investigation\nSplunk Mission Control unifies Splunk’s security technologies and extensive ecosystem within a single work surface to streamline security operations and improve processes\n</p>','\n',char(10)),'https://www.facebook.com/splunk','https://www.twitter.com/splunk','https://www.linkedin.com/company/splunk/','');
|
||
INSERT INTO vendors VALUES('9f35a2db-98e7-429d-97ef-02da080b9d37','published','snapattack','SnapAttack','https://www.snapattack.com','SnapAttack provides organizations with a unique platform combining Threat Intelligence, BAS, Detection Engineering, Threat Hunting, and Purple Teaming — to help them stay ahead of cyber threats and stop attacks before they occur.','4075 Wilson Blvd',NULL,'Alexandria','VA','USA','6852cd1f-21a1-4280-96a3-27f820d62797',replace('<h5>SnapAttack</h5>\n<p>\nSnapAttack is the enterprise-ready platform that helps security leaders answer their most pressing question: “Are we protected?”\nBy rolling intel, adversary emulation, detection engineering, threat hunting, and purple teaming into a single, easy-to-use product with a no-code interface, SnapAttack enables you to get more from your technologies, more from your teams, and makes staying ahead of the threat not only possible - but also achievable.<br>\n</p>\n<h5>Why SnapAttack?</h5>\n<p>SnapAttack provides organizations with a unique platform combining Threat Intelligence, BAS, Detection Engineering, Threat Hunting, and Purple Teaming — to help them stay ahead of cyber threats and stop attacks before they occur. In addition, SnapAttack features integration into over 30 strategic EDR/XDR platforms with pushbutton deployment that complements your installed toolsets and enhances your current SOC Staff.</p>','\n',char(10)),NULL,'https://www.twitter.com/https://mobile.twitter.com/snapattackhq','https://www.linkedin.com/company/snapattack/','');
|
||
INSERT INTO vendors VALUES('0195e54e-699c-43f2-9ff7-b333e7ea2300','published','rsa','RSA','https://www.rsa.com/','RSA provides trusted identity and access management for 12,000 organizations around the world, managing 25 million enterprise identities and providing secure, convenient access to millions of users. RSA empowers organizations to thrive in a digital world, with complete capabilities for modern authentication, lifecycle management, and identity governance. Whether in the cloud or on-premises, RSA connects people with the digital resources they depend on everywhere they live, work, and play.','176 Middlesex Turnpike',NULL,'Bedford','MA','USA','ed678556-ff29-422b-8cb2-7f4821c20a79',replace('<h5>RSA</h5>\n<p>\nRSA provides trusted identity and access management for 12,000 organizations around the world, managing 25 million enterprise identities and providing secure, convenient access to millions of users. RSA empowers organizations to thrive in a digital world, with complete capabilities for modern authentication, lifecycle management, and identity governance. Whether in the cloud or on-premises, RSA connects people with the digital resources they depend on everywhere they live, work, and play.<br>\n</p>\n<h5>Why RSA?</h5>\n<p>NetWitness XDR is a comprehensive threat detection and response platform that empowers organizations with full security visibility. It includes Network Detection and Response (NDR); Security Incident Event Management (SIEM); Endpoint Detection and Response (EDR); and Security Orchestration, Automation and Response (SOAR). The components can be implemented individually or as an integrated eXtended Detection and Response Platform (XDR).\nOur highly scalable solution collects and analyzes data from all enterprise sources, whether they are on-prem or in the cloud, including SASE infrastructure and SaaS applications. NetWitness provides a unified interface and advanced analytics, for comprehensive visibility, fast detection and resolution of potentially business-impacting threats.\nOur Cyber Defense Readiness and Incident Response teams can drastically improve your security posture and provide world-class expertise if or when major incidents occur.</p>','\n',char(10)),'https://www.facebook.com/RSASecure/','https://www.twitter.com/RSAsecurity','https://www.linkedin.com/company/rsasecurity','');
|
||
INSERT INTO vendors VALUES('52113eb1-803d-45dd-9652-e8b5016f0097','published','rackmount-it','Rackmount.IT','https://www.rackmount.it/','Rackmount.IT produces 19” mount kits for network security brands like Fortinet, Cisco, SonicWall and more! Secure your appliances, perfect for Retail, MSP''s. Rackmount.IT kits are a perfect fit for your specific appliance. We Rack Your World!','9201 Metric Blvd.','Unit A','Austin','TX','USA','ab4b94c6-905c-40c7-920a-ef28ec59b8b3',replace('<h5>Rackmount.IT</h5>\n<p>\nRackmount.IT produces high-quality 19" rack mount kits for major network security brands such as Fortinet, Cisco/Meraki, SonicWall, WatchGuard and more! Our solution secures your device and power supply, provides front facing connections using CAT6 cables and couplers, custom air-flow cutouts and a 5-minute install. Secure your network devices with Rackmount.IT!<br>\n</p>\n<h5>Why Rackmount.IT?</h5>\n<p>Rackmount.IT offers high-quality 19" rack mount kits for network security devices. These kits are customized to fit specific appliances from various brands, including Apple, Barracuda, Cisco/Meraki, Check Point, Dell/VMware, Forcepoint, Fortinet, HPE/Aruba, Palo Alto Networks, SOPHOS, SonicWall, Ubiquiti, Versa Networks, Vertiv, and WatchGuard. Check out our website for a list of supported appliances. (https://www.rackmount.it/products.html). Our solution is not just a tray, but it also secures the appliance and power supply, provides front-facing connections with CAT6 cables and couplers, features custom air-flow cutouts, and can be installed in under 5 minutes. Our kits are used in many major retail locations and are ideal for MSPs and VARs. You can purchase our products through the channel or directly from our website. Visit us at (https://www.rackmount.it) to learn more and secure your devices out in the field with Rackmount.IT!</p>','\n',char(10)),'https://www.facebook.com/rackmount.it/','https://www.twitter.com/RackmountIT','https://www.linkedin.com/company/rackmount.it-b.v./','');
|
||
INSERT INTO vendors VALUES('7abeec21-487e-4178-ba32-fadc32b10cae','published','reversinglabs','ReversingLabs','www.reversinglabs.com','ReversingLabs provides the only software supply chain security platform for Dev and SOC teams. The ReversingLabs Titanium Platform integrates seamlessly at scale, analyzing compiled binaries and release packages for tampering, enabling Devs to release confidently, and the SOC to accelerate response.','222 Third St. ','Suite 1101','Cambridge','MA','USA','00e72a4a-3aed-4f53-bf28-75197dbead88',replace('<h5>ReversingLabs</h5>\n<p>\nReversingLabs provides the only software supply chain security platform for Dev and SOC teams. The ReversingLabs Titanium Platform integrates seamlessly at scale, analyzing compiled binaries and release packages for tampering, enabling Devs to release confidently, and the SOC to accelerate response.<br>\n</p>','\n',char(10)),'https://www.facebook.com/reversinglabs ','https://www.twitter.com/ReversingLabs ','https://www.linkedin.com/company/reversinglabs ','');
|
||
INSERT INTO vendors VALUES('554b7040-2dbc-4a37-9f13-bd2dfc8f80e2','published','redseal','RedSeal','www.redseal.net','RedSeal – a security solutions and professional services company – helps government agencies and Global 2000 companies see and secure their on-premise networks and cloud environments. ','C/O Symphony Technology Group 1300 El Camino Real','Suite 300','Menlo Park','CA','USA','b5f175e7-7a1a-4677-8187-769315a24d57',replace('<h5>RedSeal</h5>\n<p>\nRedSeal security solutions and professional services helps companies see and secure their on-premise networks and cloud environments. The award-winning security solution verifies that networks align with security best practices, validates network segmentation policies, and continuously monitors compliance with policies and regulations. RedSeal prioritizes mitigation based on each vulnerability’s associated risk.<br>\n</p>\n<h5>Why RedSeal?</h5>\n<p>\nRedSeal helps government agencies and Global 2000 companies see and secure their on-premises and cloud environment. With RedSeal, enterprises improve their resilience to security events by understanding what’s on their networks, how it’s all connected, and the associated risk. RedSeal protects enterprises by validating that resources are securely configured and continuously monitors compliance to internal and external security mandates. It also calculates and prioritizes risk to organizations.</p>','\n',char(10)),NULL,'https://www.twitter.com/RedSeal_co','https://www.linkedin.com/company/redseal-co/','');
|
||
INSERT INTO vendors VALUES('728c89bf-9803-4bd2-ae62-1e58d129b257','published','revealsecurity','RevealSecurity','https://www.reveal.security/','RevealSecurity detects malicious insiders and imposters by monitoring user journeys in SaaS applications. Reveal''s tracking of insider threats is based on an advanced unsupervised ML algorithm to detect and alert abnormal journeys in appslications.','5 HaHilazon Street Street','7th Floor','Ramat Gan',NULL,'ISR','a56daabf-4afa-4006-bf11-4d697e730bee',replace('<h5>RevealSecurity</h5>\n<p>\nRevealSecurity detects attackers and malicious insiders by monitoring user journeys in enterprise applications. Powered by our unique clustering engine, RevealSecurity protects enterprise organizations against cases in which either an impersonator successfully bypasses authentication mechanisms and poses as a legitimate user, or when an authenticated user is taking advantage of permissions to abuse or misuse an application. Tracking user journeys within applications does not rely on solution-specific rules, and is instead based on an advanced unsupervised machine learning algorithm to detect abnormal journeys which reflect abuse, misuse and malicious activities.<br>\n</p>\n<h5>Why RevealSecurity?</h5>\n<p>The most important criteria in a detection solution is accuracy: the number of false positives and number of false negatives, and the goal is of course to minimize these alerts. However, current application detection solutions are based on rules and highly inaccurate.\nTrackerIQ’s unique analytic approach achieves high accuracy using the context of the activity, i.e. by analyzing a sequence of activities, instead of the activity itself. TrackerIQ does this with user journey analytics in the application. These user journey characteristics are completely indifferent to the essence of specific user activities. Thus, TrackerIQ’s detection model can be applied to any application because it is ubiquitous and agnostic to the meaning of an application’s activities. This is fundamental to RevealSecurity’s detection, as each application has a different set of activities.</p>','\n',char(10)),NULL,'https://www.twitter.com/TrackerIq','https://www.linkedin.com/company/72435797/admin/','');
|
||
INSERT INTO vendors VALUES('bd2f4ab3-abf8-470f-820f-e8abf181ae1e','published','radware-inc','Radware, Inc.','www.radware.com',replace('Radware® is a global leader of cybersecurity and application delivery solutions for physical, cloud and software-defined data centers. Our solutions empower enterprise and carrier customers worldwide maintaining business continuity & productivity. \n','\n',char(10)),'575 Corporate Drive ','Suite 1','Mahwah','NJ','USA','6f5c2f55-1a5b-4282-9964-d6742df69d92',replace('<h5>Radware, Inc.</h5>\n<p>\nRadware® is a global leader of cybersecurity and application delivery solutions for physical, cloud and software-defined data centers. Our solutions empower enterprise and carrier customers worldwide maintaining business continuity & productivity.\n<br>\n</p>','\n',char(10)),'https://www.facebook.com/Radware','https://www.twitter.com/radware','https://www.linkedin.com/company/radware/mycompany/','');
|
||
INSERT INTO vendors VALUES('c3dab62c-eba5-49a3-b82b-18f6f3fca262','published','colortokens','ColorTokens','https://colortokens.com','ColorTokens provides a Unified Zero Trust Platform that protects against modern cyberattacks such as ransomware by detecting and stopping its lateral movement inside the enterprise network. ','3590 North First St',NULL,'San Jose','CA','USA','7ac440d0-a031-4160-90a0-0a886efa108b',replace('<h5>ColorTokens</h5>\n<p>\nColorTokens provides a Unified Zero Trust Platform that protects against modern cyberattacks such as ransomware by detecting and stopping its lateral movement inside the enterprise network. <br>\n</p>','\n',char(10)),NULL,NULL,NULL,'');
|
||
INSERT INTO vendors VALUES('883062d5-92df-431d-a198-f632749d2e7e','published','cybersecurity-ventures','Cybersecurity Ventures','https://cybersecurityventures.com/',NULL,'83 Main St. ','Ste #5 ','Northport','NY','USA','4baf963b-6176-4595-99f9-e4dd79034a39',replace('<h5>Cybersecurity Ventures</h5>\n<p>\n<br>\n</p>','\n',char(10)),NULL,NULL,NULL,'');
|
||
INSERT INTO vendors VALUES('bb5852fc-dbc2-4228-959c-c1a4e989a59a','published','cybersixgill','Cybersixgill','www.cybersixgill.com','Cybersixgill''s threat intelligence and ASM solutions exposes and prioritizes the earliest possible indications of risk produced by threat actors moments after they surface allowing you to take action before the threat can materialize into an attack. ','177 Huntington Ave ','Ste 1703','Boston','MA','USA','c1b7b650-f23c-4849-97e2-0365dac8633d',replace('<h5>Cybersixgill</h5>\n<p>\nCybersixgill continuously collects and exposes the earliest possible indications of risk produced by threat actors moments after they surface on the clear, deep and dark web. This data is processed, correlated and enriched with machine learning techniques to create profiles and patterns of threat actors and their peer networks, delivering critical insight into the nature, source and context of each threat.Our extensive body of threat intelligence data can be consumed through various solution offerings and integrations, each addressing critical customer pain points and use cases. These solutions are scalable, searchable and seamlessly integrated into existing security stacks, arming teams with critical insights to proactively block threats before they materialize into attacks.<br>\n</p>\n<h5>Why Cybersixgill?</h5>\n<p>Cybersixgill protects organizations against cyber attacks originating from the clear, deep, and dark web, before they materialize. Our agile, automated threat intelligence solutions include: <br><br>\n•Investigative Portal – contextual and actionable insights for real-time investigations<br>\n•DVE Intelligence – automates and streamlines vulnerability prioritization<br>\n•New! Attack Surface Management (ASM) module – continuous discovery of unknown assets and systems across an organization’s attack surface<br>\nCybersixgill offers the most extensive, automated collection of clear, deep, and dark web threat intelligence on the market, alerting teams to emerging threats, TTPs and IOCs before they’re widely known, and most importantly, before threat actors execute their mission.\nCybersixgill continuously exposes the earliest indicators of risk, giving customers the insights they need to make informed, data-driven decisions, enhance their cyber resilience and minimize their risk exposure in real-time.\n</p>','\n',char(10)),'https://www.facebook.com/Cybersixgill/','https://www.twitter.com/CyberSixgill','https://www.linkedin.com/company/sixgill','');
|
||
INSERT INTO vendors VALUES('a14698f1-ca1c-45fd-bd4f-77d57dc57fbc','published','cribl','Cribl','https://cribl.io/','The Cribl product suite makes open observability a reality for today’s tech professionals by defying data gravity with radical levels of choice and control.','22 4th street ','13th floor','San Francisco','CA','USA','b7153a7c-43f6-42fb-9430-cba1a840633c',replace('<h5>Cribl</h5>\n<p>\nCribl makes open observability a reality for today’s tech professionals. The Cribl product suite defies data gravity with radical levels of choice and control. Wherever the data comes from, wherever it needs to go, Cribl delivers the freedom and flexibility to make choices, not compromises. It’s enterprise software that doesn’t suck, enables tech professionals to do what they need to do, and gives them the ability to say “Yes.” With Cribl, companies have the power to control their data, get more out of existing investments, and shape the observability future.\nFounded in 2017, Cribl is a remote-first company with an office in San Francisco, CA. For more information, visit www.cribl.io or our LinkedIn, Twitter, or Slack community.<br>\n</p>\n<h5>Why Cribl?</h5>\n<p>Cribl Stream is a vendor-agnostic observability pipeline that gives you the flexibility to collect, reduce, enrich, normalize, and route data from any source to any destination within your existing data infrastructure. You’ll finally achieve full control of your data stream, empowering you to choose how to treat your data to best support your business goals.\nCribl Edge provides the flexibility and control administrators love from Stream, now running at the edge. Combined with automatic log discovery and metrics production, Cribl Edge empowers developers and operations teams to discover relevant telemetry hidden in unknown and legacy applications that have limited tooling.\nCribl Search allows users to search data in place. No longer must data be collected and moved to storage before being examined, now administrators can search data at the edge, moving through an observability pipeline, stored in a data lake, or even stored in their existing solutions like TSDBs or log stores.</p>','\n',char(10)),NULL,'https://www.twitter.com/cribl_io','https://www.linkedin.com/company/cribl/','');
|
||
INSERT INTO vendors VALUES('00e124ba-3481-4e20-99bf-20cbd02c3f96','published','cybervista','CyberVista','www.cybervista.net','CyberVista is a cybersecurity training and workforce development company. Our data-driven approach gives organizations the visibility to make better training decisions, build the right skills, and drive defense. ','1300 17th St. North ','17th Floor, Suite 1600','Arlington','VA','USA','c902fa4a-69dd-40b7-b7b4-9908052511aa',replace('<h5>CyberVista</h5>\n<p>\nCyberVista, part of N2K Networks, is a cybersecurity training and workforce development company established in 2016, based on a profound need to change the way organizations identify and develop cybersecurity talent. Our data-driven approach gives organizations the visibility to make better training decisions, build the right skills, and drive defense.\nWhether you’re looking for comprehensive training courses, practice tests, or practical labs for more than 100 certification exams; role-based training for cybersecurity, IT, and non-technical teams (SOC, IR, and Executive Leadership to name a few); or a true workforce transformation to enhance your cybersecurity talent strategy, we’ve got you covered. Each of CyberVista’s programs is rooted in data to provide detailed insights and trends into your capabilities so you can remediate skills gaps faster and more accurately.<br>\n</p>\n<h5>Why CyberVista?</h5>\n<p>Whether you’re interested in off-the-shelf or configured solutions, we partner with your organization to ensure training fits your workforce needs. Each program is rooted in data to provide detailed insights and trends into the capabilities of your workforce so you can remediate skills gaps faster and more accurately.\nDiagnostic assessments identify team skills gaps by role or topic to create a clear skills baseline and deploy the most relevant training path.\nRole-Based training for cybersecurity and cyber-enabled teams including SecOps, Incident Response, Cloud, IT, Executive Leadership, and more.\nCertify your team with comprehensive online courses for top security titles, plus practice exams and labs for 100+ certs.\nMatch skills to job roles, update job profiles or career pathways, align your cyber talent strategy to the NICE Framework, and more.\nWe data to tailor training and close persistent skills gaps. Spend your training budget and time more efficiently with CyberVista.</p>','\n',char(10)),NULL,'https://www.twitter.com/cybervistaed','https://www.linkedin.com/company/cybervista','');
|
||
INSERT INTO vendors VALUES('6c150cf8-bf45-4f40-b935-57e10cc7eea4','published','endpoint-protector-by-cososys','Endpoint Protector by CoSoSys','endpointprotector.com','Endpoint Protector by CoSoSys is a leading developer of endpoint centric Data Loss Prevention solutions and security software. Its flagship product, Endpoint Protector, is an advanced multi-OS DLP solution for Windows, macOS, and Linux, that protects businesses from insider threats and data breaches','213 Fayetteville Street, 1st Floor',NULL,' Raleigh',NULL,'USA','f44b4edf-7712-4060-8650-b1efc6703dc5',replace('<h5>Endpoint Protector by CoSoSys</h5>\n<p>\nCoSoSys is a leading developer of endpoint centric Data Loss Prevention (DLP) solutions and security software. The company’s mission is to enable businesses worldwide to take full advantage of the performance benefits of mobility, portability, and communications solutions, without compromising security.\nEndpoint Protector by CoSoSys is an advanced all-in-one Data Loss Prevention (DLP) solution that puts an end to unintentional data leaks, protects from malicious data theft, offers seamless control of portable storage devices, and helps to reach compliance with data protection regulations such as the GDPR, HIPAA, CCPA, or PCI DSS. It also helps to mitigate insider threats and to safeguard directly sensitive categories of data such as Personally Identifiable Information (PII) or Intellectual Property (IP). <br>\n</p>\n<h5>Why Endpoint Protector by CoSoSys?</h5>\n<p>Endpoint Protector is an enterprise-grade DLP software for Windows, macOS, and Linux computers, Thin Clients, and Desktop-as-a-Service (DaaS) solutions. It is an ideal choice for companies running on multi-OS networks, and the solution’s modular format allows them to mix and match the right tools to serve specific needs. Endpoint Protector is available directly to North American customers and users through its online portal, and it is distributed globally through partners and resellers. With its user-friendly interface, flexible policy management, and carefree installation, the product offers a short learning curve and can be easily managed even by non-specialized personnel.\nThe product is a perfect fit for all industries, such as financial institutions, healthcare and medical providers, media and entertainment sector, and more.\n</p>','\n',char(10)),'https://www.facebook.com/EndpointProtector','https://www.twitter.com/cososys','https://www.linkedin.com/company/endpointprotector','');
|
||
INSERT INTO vendors VALUES('d119e40d-c6eb-4ef8-a339-591086bd8d4f','published','constella-intelligence','Constella Intelligence','https://constellaintelligence.com/','The global leader in Digital Risk Protection to anticipate and remediate external threats to your executives, employees, brand, and business assets —powered by the world’s largest collection of proprietary breach and botnet data.','201 Redwood Shores ','Suite 345','Redwood City','CA','USA','37f4c2e3-3bc8-4397-a9d6-c5b854e0b3fd',replace('<h5>Constella Intelligence</h5>\n<p>\nConstella is a Cybercrime Intelligence company powered by data acquired in the cybercriminal underground. We help companies in 2 ways:\n1) Protection. We protect companies and consumers by alerting them of their sensitive information being stolen by criminals - including active botnets in your corporate network or devices, stolen passwords and exposed PII.\n2) Investigation. We offer tools and expertise for advanced Threat Actor Investigators. We help analyze the Impact, Vector of Attack, Attribution, TTPs and Risks of cyber incidents (please recent see public investigations by Reuters and Brian Krebs)\n<br>\n</p>\n<h5>Why Constella Intelligence?</h5>\n<p>The Constella breach Identity Intelligence Datalake contains over 60BN records of validated and indexed breach data, augmented daily with data from recent botnet, infostealer and breach attacks.\nThis data lake powers our Hunter cyber investigation tool that enables you to rapidly attribute malicious activity, fraud, and potential insider threats. With Hunter, you can analyze data from thousands of sources, collate and compare it across sources, and identify unknown connections and networks of activity, including recent botnet and infostealer attacks. Hunter is used by law enforcement, F100 organizations and leader cyber journalist such as Brian Krebs and Reuters.\nOur breach intelligence is also available via our Unified API framework offering search and alerting of breached credentials, stolen PII, and recent infostealer attacks, supporting leading enterprises, 6 of the top 10 Identity Protection providers and over 35million consumers worldwide.\n</p>','\n',char(10)),NULL,'https://www.twitter.com/ConstellaIntel','https://www.linkedin.com/company/constella/mycompany/','');
|
||
INSERT INTO vendors VALUES('090bd8bc-ef55-4303-8a1c-9af365b56f95','published','cobalt','Cobalt','https://cobalt.io','Cobalt’s Pentest as a Service (PtaaS) model empowers organizations with fast, easy pentests. Our SaaS platform and closed tester community help you create stronger security programs and sharpen your competitive edge while maintaining velocity.','575 Market Street','4th Floor','San Francisco','CA','USA','03d4a55d-72ca-438f-8c7c-04aa6e1f44ff',replace('<h5>Cobalt</h5>\n<p>\nCobalt was founded on the belief that pentesting can be better. Our pentests start in as little as 24 hours and integrate with modern development cycles thanks to the powerful combination of a SaaS platform coupled with an exclusive community of testers known as the Cobalt Core. Accepting just 5% of applicants, the Core boasts over 400 closely vetted and highly skilled testers who jointly conduct thousands of tests each year.\nOur award-winning, fully remote team is committed to helping agile businesses remediate risk quickly and innovate securely. Today, over 1,000 customers use Cobalt to run pentests on demand via Pentest as a Service, AKA PtaaS, a space which Cobalt pioneered (you could even say we wrote the book on it) and continues to lead. <br>\n</p>\n<h5>Why Cobalt?</h5>\n<p>Cobalt’s Pentest as a Service (PtaaS) model infuses pentesting with speed and transparency. We combine human ingenuity with technology for scalability and ease, empowering organizations to keep pace with a modern SDLC.\nWhy choose Cobalt?\n- Our SaaS platform increases ROI. Our platform unlocks additional value through purpose-built integrations, security authentication features, and workflows for high-volume testing while acting as a single source for pentest data.\n- Access to top talent helps you maximize resources. Cobalt frees up time and reduces job stress for security and development teams by making every stage of the pentest lifecycle frictionless and quick. The Cobalt Core lets you tap into the brainpower of over 400 skilled, vetted testers.\n- Cobalt leads PtaaS. We invented the category, so it’s no surprise we’re #1. We back up this claim with earned third party recognition, number of pentest days delivered, analyst research, and customer reviews on third party sites.</p>','\n',char(10)),'https://www.facebook.com/cobaltsecured/','https://www.twitter.com/cobalt_io','https://www.linkedin.com/company/cobalt_io/mycompany/','');
|
||
INSERT INTO vendors VALUES('4fc2a291-0d1e-4031-b816-7aec9d4439dd','published','comptia','CompTIA','comptia.org','CompTIA is a leading voice for the global IT industry and professionals. Through education, training, certifications, advocacy, philanthropy, and market research, CompTIA is the hub for unlocking the potential of the tech industry and its workforce.','3500 Lacey Road ','Suite 100','Downers Grove','IL','USA','f8ff4592-2cfd-4a5d-9cd1-9ddad85aac52',replace('<h5>CompTIA</h5>\n<p>\nThe Computing Technology Industry Association (CompTIA) is a leading voice and advocate for the $5 trillion global information technology ecosystem; and the estimated 75 million industry and tech professionals who design, implement, manage, and safeguard the technology that powers the world’s economy. Through education, training, certifications, advocacy, philanthropy, and market research, CompTIA is the hub for unlocking the potential of the tech industry and its workforce.<br>\n</p>\n<h5>Why CompTIA?</h5>\n<p>CompTIA is a leading voice and advocate for the $5 trillion global information technology ecosystem; and the estimated 75 million industry and tech professionals who design, implement, manage and safeguard the technology that powers the world’s economy.\nWe are a vendor-neutral, independent source of information on a wide range of technology topics, including cybersecurity; education, training and certification of the global tech workforce; new and emerging technologies; legislation and policies affecting the industry and workforce data, development and trends.\nWe routinely engage with individual technology professionals as the largest vendor-neutral credentialing program for technology workers. CompTIA has awarded more than 2.5 million certifications in areas such as cybersecurity, networking, cloud computing and technical support.</p>','\n',char(10)),'https://www.facebook.com/CompTIA/','https://www.twitter.com/comptia','https://www.linkedin.com/company/16529/','');
|
||
INSERT INTO vendors VALUES('c6434536-96b8-44e3-b0f5-18d3fa48b43e','published','cybelangel','CybelAngel','https://cybelangel.com/','CybelAngel protects its customers with External Attack Surface Management (EASM) solutions that are powered by the most comprehensive external asset discovery and threat detection technologies available. Learn more https://cybelangel.com/','185 Alewife Brook Parkway ','Suite 210','Cambridge','MA','USA','bb2d61f1-01fd-468e-b8ef-940b43e25241',replace('<h5>CybelAngel</h5>\n<p>\nAt CybelAngel, we see a safer internet for business. CybelAngel continuously scans the depths of the internet making a full sweep every 24 hours to find the access points into a company''s network before others can. We offer pre-emptive cybersecurity solutions that can detect and remediate shadow IT, third-party exposures, compromised credentials, leaked data, and malicious domains... eliminating all the threats that reside across the external attack surface that can''t be seen.\nLearn more about CybelAngel External Attack Surface Management at https://cybelangel.com/<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/CybelAngel','https://www.linkedin.com/company/cybelangel/','');
|
||
INSERT INTO vendors VALUES('0a53c20c-882c-492d-94a6-e695025f41e6','published','cloud-security-alliance','Cloud Security Alliance','www.cloudsecurityalliance.org','The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment.','709 Dupont Street',NULL,'Bellingham','WA','USA','d5732ce6-e3f1-4911-a384-b7e030bae999',replace('<h5>Cloud Security Alliance</h5>\n<p>\nThe Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, certification, events and products. CSA’s activities, knowledge and extensive network benefit the entire community impacted by cloud — from providers and customers, to governments, entrepreneurs and the assurance industry — and provide a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem.<br>\n</p>','\n',char(10)),'https://www.facebook.com/csacloudfiles/','https://www.twitter.com/cloudsa','https://twitter.com/cloudsa','');
|
||
INSERT INTO vendors VALUES('b2f35ced-3c21-40da-a21d-e47a43ba54be','published','caveonix','Caveonix','https://www.caveonix.com','Caveonix’s unified platform protects against compliance, security, and governance risks. It employs AI and automation to ensure full-stack visibility, prioritize risks and continuously assess and remediate risks to reduce your attack surface and TCO.','7777 Leesburg Pike ','#303s','Falls Church','VA','USA','e2543f37-07f8-4e86-8690-a6aba00db137',replace('<h5>Caveonix</h5>\n<p>\nCaveonix’s unified platform protects against compliance, security, and governance risks. It employs AI and automation to ensure full-stack visibility, prioritize risks and continuously assess and remediate risks to reduce your attack surface and TCO.<br>\n</p>','\n',char(10)),NULL,NULL,NULL,'');
|
||
INSERT INTO vendors VALUES('4b805bb4-b4fe-4f69-85fb-4eccdf1afa24','published','cyberark','CyberArk','www.cyberark.com','CyberArk is the global leader in Identity Security. Centered on Privileged Access Management, CyberArk provides the most comprehensive security solutions for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads, and throughout DevOps pipelines. ','60 Wells Avenue ',NULL,'Newton','MA','USA','da427843-8edf-4aaf-b38e-8dc8d0f2f3bd',replace('<h5>CyberArk</h5>\n<p>\nCyberArk is the global leader in Identity Security. Centered on Privileged Access Management, CyberArk provides the most comprehensive security solutions for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads, and throughout DevOps pipelines. <br>\n</p>\n<h5>Why CyberArk?</h5>\n<p>The proliferation of identities, combined with cloud migration and accelerating attacker innovation, has created the perfect storm for security teams who are facing a surge in identity-based cyberattacks. For sophisticated hackers, stolen identities are a gateway to sensitive information. The security challenge is compounded by internal users who may abuse or misuse privileged credentials. The only way to truly ensure that the right users access the right resources at the right time is to enforce proper authorization controls to every identity. Enter CyberArk. \nCyberArk applies intelligent privilege controls to all identities – human & machine – with continuous threat detection and prevention across the entire identity lifecycle. With CyberArk, organizations can enable Zero Trust and least privilege with complete visibility, ensuring that every identity can securely access any resource, located anywhere, from everywhere – with a single Identity Security Platform. \n</p>','\n',char(10)),'https://www.facebook.com/CyberArk/','https://www.twitter.com/CyberArk','https://www.linkedin.com/company/cyber-ark-software/','');
|
||
INSERT INTO vendors VALUES('09720abc-e5a5-4471-84e7-09cbccd2b35b','published','cybergrx','CyberGRX','https://www.cybergrx.com','CyberGRX standardizes third-party cyber risk management, making it possible to make smarter decisions across your entire vendor ecosystem. Driven by sophisticated data analytics, automation, and threat intelligence, CyberGRX provides customers with comprehensive analysis of their vendor portfolio.','1601 19th Street','Ste 350','Denver','CO','USA','cfee51a6-d79c-4b26-9248-7cb88f96a6d1',replace('<h5>CyberGRX</h5>\n<p>\nCyberGRX standardizes third-party cyber risk management, making it possible to achieve insights, prioritize risks and make smarter decisions across your entire vendor ecosystem. Driven by sophisticated data analytics and automation, real-world attack scenarios, and real-time threat intelligence, CyberGRX provides customers with comprehensive and ongoing analysis of their vendor portfolio.<br>\n</p>\n<h5>Why CyberGRX?</h5>\n<p>CyberGRX operates a dual-sided third-party risk platform that provides value for both customers and third parties. Members have threat and risk data at their fingertips without having to sift through multiple documents, saving countless hours. For third parties, they no longer need to complete multiple customized assessments as they can share their CyberGRX assessment with any customer, even those not on the CyberGRX Exchange. By proactively sharing the assessment, third parties achieve a 70% acceptance rate, eliminating the need to complete additional questionnaires. Security practitioners no longer have to chase vendors or wait for assessment data. Leveraging CyberGRX''s sophisticated data analytics, predictive risk intelligence, real-world attack scenarios, and real-time threat intelligence, CISOs can make data-informed decisions faster, and prioritize risks more effectively using comprehensive data on over 225,000 third parties. </p>','\n',char(10)),NULL,'https://www.twitter.com/cybergrx','https://www.linkedin.com/company/cybergrx/','');
|
||
INSERT INTO vendors VALUES('7b5e7d1a-9464-476c-acb0-5d630a2baab3','published','acronis','Acronis','www.acronis.com',replace('Acronis delivers integrated, automated cyber protection that solves the safety, accessibility, privacy, authenticity, and security challenges. They provide cyber protection for data, applications, and systems with antivirus, backup, disaster recovery, and endpoint protection management solutions. \n','\n',char(10)),'1 Van de Graaff Drive','Suite 301','Burlington','MA','USA','c2a30a42-96ea-426f-aa01-ace4115f550a',replace('<h5>Acronis</h5>\n<p>\nAcronis unifies data protection and cybersecurity to deliver integrated, automated cyber protection that solves the SAPAS challenges of the modern digital world. With flexible deployment models that fit the demands of service providers and IT professionals, Acronis provides superior cyber protection for data, applications, and systems with innovative next-generation antivirus, backup, disaster recovery, and endpoint protection management solutions powered by AI. With advanced anti-malware powered by cutting-edge machine intelligence and blockchain based data authentication technologies, Acronis protects any environment - from cloud to hybrid to on premises - at a low and predictable cost.\nAcronis is a Swiss company, founded in Singapore. Celebrating two decades of innovation, Acronis has more than 2,000 employees in 45 locations. Acronis Cyber Protect solution is available in 26 languages in over 150 countries and is used by 16,000 service providers to protect over 750,000 businesses.<br>\n</p>','\n',char(10)),'https://www.facebook.com/acronis','https://www.twitter.com/Acronis','https://www.linkedin.com/company/acronis','');
|
||
INSERT INTO vendors VALUES('1a55773c-6140-4ba8-96ab-7b8fb21cb26b','published','skyhigh-security','Skyhigh Security','https://www.skyhighsecurity.com','Skyhigh Security is securing the world’s data with our cloud-native security solutions that are data-aware and simple to use. Our Security Service Edge Portfolio goes beyond data access and focuses on use, organizations can collaborate from any device and from anywhere without sacrificing security.','6000 Headquarters Drive',NULL,'Plano','TX','USA','32ab5ce4-a8d3-4515-92a8-88399e6519a0',replace('<h5>Skyhigh Security</h5>\n<p>\nAt its heart, security is a data protection problem. Skyhigh Security protects organizations with cloud-native security solutions that are both data-aware and simple to use. Its market-leading Security Service Edge (SSE) Portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security. For more information, visit www.skyhighsecurity.com.<br>\n</p>\n<h5>Why Skyhigh Security?</h5>\n<p>Skyhigh Cloud Access Security Broker (CASB) protects data and stops threats in the cloud across SaaS, PaaS, and IaaS from a single, cloud-native enforcement point. It enables organizations to accelerate their business by giving them visibility and control over their data in the cloud and protection from threats with a frictionless model.\nSkyhigh Secure Web Gateway (SWG) protects users from threats and data from exfiltration while accessing the internet. With integrated CASB capabilities, a superior DLP engine, and integrated RBI. Skyhigh SWG is a complete solution protecting both users and data.\nSkyhigh Private Access is a data centric Zero Trust Network Access (ZTNA) solution providing integrated DLP scanning and seamless Remote Browser Isolation (RBI) integration for robust data protection. Apply a unified policy across web, SaaS, and private apps.\nAll Skyhigh products are on a consolidated platform, and managed from the same single console. </p>','\n',char(10)),'https://www.facebook.com/SkyhighSecurity-101903715781929','https://www.twitter.com/SkyhighSecurity','https://www.linkedin.com/company/skyhighsecurity/','');
|
||
INSERT INTO vendors VALUES('cff25be7-12bc-4652-839c-aed36274f71f','published','synopsys','Synopsys','https://www.synopsys.com/software-integrity','Synopsys builds trust in software by enabling organizations to manage application security, quality, and compliance risks at the speed their business demands. With Synopsys, organizations can transform the way they build and deliver software, aligning people, processes, and technology to address risks across their portfolio and at all stages of the application lifecycle. ','690 E Middlefield Rd',NULL,'Mountain View','CA','USA','d1422fb4-c90e-4823-bf24-6fe501e1be0e',replace('<h5>Synopsys</h5>\n<p>\nSynopsys Software Integrity Group provides integrated solutions that transform the way development teams build and deliver software, accelerating innovation while addressing business risk. An S&P 500 company with more than $2 billion invested in application security, Synopsys is the recognized leader in the “essential three” testing solutions: static analysis, software composition analysis, and dynamic analysis. Synopsys also offers a wide range of services that augment our core products, helping our customers build, mature, and scale their application security programs to reduce software risk across their organization. With our combination of industry-leading tools, services, and expertise, only Synopsys offers everything you need to build trust in your software.<br>\n</p>','\n',char(10)),NULL,'https://www.twitter.com/SynopsysAppsec','https://www.linkedin.com/showcase/sw_integrity/','');
|
||
INSERT INTO vendors VALUES('be3c2f26-ef82-4c6b-8a8c-b9222bd2acbf','published','knowbe4','KnowBe4','www.knowbe4.com','KnowBe4 is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering.','33 N Garden Ave. ','Suite 1200','Clearwater','FL','USA','140a626e-f40c-474f-b010-5f96a890069a',replace('<h5>KnowBe4</h5>\n<p>\nKnowBe4 is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering.<br>\n</p>\n<h5>Why KnowBe4?</h5>\n<p>KnowBe4 is the world’s largest integrated security awareness training and simulated phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created to help organizations manage the ongoing problem of social engineering through a comprehensive new-school awareness training approach. This method integrates baseline testing using real-world mock attacks, engaging interactive training, continuous assessment through simulated phishing attacks and enterprise-strength reporting, to build a more resilient organization with security top of mind. Tens of thousands of organizations worldwide use KnowBe4’s platform across all industries, including highly regulated fields such as finance, healthcare, energy, government and insurance to mobilize their end users as a last line of defense and enable them to make smarter security decisions</p>','\n',char(10)),'https://www.facebook.com/knowbe4','https://www.twitter.com/KnowBe4','https://www.linkedin.com/company/knowbe4/','');
|
||
CREATE TABLE IF NOT EXISTS "vendors_files" (`id` integer PRIMARY KEY AUTOINCREMENT NOT NULL, `vendors_id` char(36) NULL, `directus_files_id` char(36) NULL, CONSTRAINT `vendors_files_directus_files_id_foreign` FOREIGN KEY (`directus_files_id`) REFERENCES `directus_files` (`id`) ON DELETE SET NULL, CONSTRAINT `vendors_files_vendors_id_foreign` FOREIGN KEY (`vendors_id`) REFERENCES `vendors` (`id`) ON DELETE SET NULL);
|
||
CREATE TABLE IF NOT EXISTS "vendors_files_1" (`id` integer PRIMARY KEY AUTOINCREMENT NOT NULL, `vendors_id` char(36) NULL, `directus_files_id` char(36) NULL, CONSTRAINT `vendors_files_1_directus_files_id_foreign` FOREIGN KEY (`directus_files_id`) REFERENCES `directus_files` (`id`) ON DELETE SET NULL, CONSTRAINT `vendors_files_1_vendors_id_foreign` FOREIGN KEY (`vendors_id`) REFERENCES `vendors` (`id`) ON DELETE SET NULL);
|
||
CREATE TABLE IF NOT EXISTS "pages" (`slug` varchar(255) NOT NULL, `status` varchar(255) NOT NULL DEFAULT 'draft', `title` varchar(255) NULL, `content` text NULL, PRIMARY KEY (`slug`));
|
||
INSERT INTO pages VALUES('about-us','published','About Us','<p>Lorem ipsum ...</p>');
|
||
INSERT INTO pages VALUES('privacy-policy','published','Privacy',replace('<h1>Privacy Policy</h1>\n<p>Last updated: June 14, 2023</p>\n<p>This Privacy Policy describes Our policies and procedures on the collection, use and disclosure of Your information when You use the Service and tells You about Your privacy rights and how the law protects You.</p>\n<p>We use Your Personal data to provide and improve the Service. By using the Service, You agree to the collection and use of information in accordance with this Privacy Policy. This Privacy Policy has been created with the help of the <a href="https://www.freeprivacypolicy.com/free-privacy-policy-generator/" target="_blank" rel="noopener">Free Privacy Policy Generator</a>.</p>\n<h1>Interpretation and Definitions</h1>\n<h2>Interpretation</h2>\n<p>The words of which the initial letter is capitalized have meanings defined under the following conditions. The following definitions shall have the same meaning regardless of whether they appear in singular or in plural.</p>\n<h2>Definitions</h2>\n<p>For the purposes of this Privacy Policy:</p>\n<ul>\n<li>\n<p><strong>Account</strong> means a unique account created for You to access our Service or parts of our Service.</p>\n</li>\n<li>\n<p><strong>Affiliate</strong> means an entity that controls, is controlled by or is under common control with a party, where "control" means ownership of 50% or more of the shares, equity interest or other securities entitled to vote for election of directors or other managing authority.</p>\n</li>\n<li>\n<p><strong>Company</strong> (referred to as either "the Company", "We", "Us" or "Our" in this Agreement) refers to PCA Pijac, Maršala Tite 1, Belgrade.</p>\n</li>\n<li>\n<p><strong>Cookies</strong> are small files that are placed on Your computer, mobile device or any other device by a website, containing the details of Your browsing history on that website among its many uses.</p>\n</li>\n<li>\n<p><strong>Country</strong> refers to: Serbia</p>\n</li>\n<li>\n<p><strong>Device</strong> means any device that can access the Service such as a computer, a cellphone or a digital tablet.</p>\n</li>\n<li>\n<p><strong>Personal Data</strong> is any information that relates to an identified or identifiable individual.</p>\n</li>\n<li>\n<p><strong>Service</strong> refers to the Website.</p>\n</li>\n<li>\n<p><strong>Service Provider</strong> means any natural or legal person who processes the data on behalf of the Company. It refers to third-party companies or individuals employed by the Company to facilitate the Service, to provide the Service on behalf of the Company, to perform services related to the Service or to assist the Company in analyzing how the Service is used.</p>\n</li>\n<li>\n<p><strong>Usage Data</strong> refers to data collected automatically, either generated by the use of the Service or from the Service infrastructure itself (for example, the duration of a page visit).</p>\n</li>\n<li>\n<p><strong>Website</strong> refers to PCA Pijac, accessible from <a href="pcapijac.com" target="_blank" rel="external nofollow noopener">pcapijac.com</a></p>\n</li>\n<li>\n<p><strong>You</strong> means the individual accessing or using the Service, or the company, or other legal entity on behalf of which such individual is accessing or using the Service, as applicable.</p>\n</li>\n</ul>\n<h1>Collecting and Using Your Personal Data</h1>\n<h2>Types of Data Collected</h2>\n<h3>Personal Data</h3>\n<p>While using Our Service, We may ask You to provide Us with certain personally identifiable information that can be used to contact or identify You. Personally identifiable information may include, but is not limited to:</p>\n<ul>\n<li>\n<p>Email address</p>\n</li>\n<li>\n<p>Usage Data</p>\n</li>\n</ul>\n<h3>Usage Data</h3>\n<p>Usage Data is collected automatically when using the Service.</p>\n<p>Usage Data may include information such as Your Device''s Internet Protocol address (e.g. IP address), browser type, browser version, the pages of our Service that You visit, the time and date of Your visit, the time spent on those pages, unique device identifiers and other diagnostic data.</p>\n<p>When You access the Service by or through a mobile device, We may collect certain information automatically, including, but not limited to, the type of mobile device You use, Your mobile device unique ID, the IP address of Your mobile device, Your mobile operating system, the type of mobile Internet browser You use, unique device identifiers and other diagnostic data.</p>\n<p>We may also collect information that Your browser sends whenever You visit our Service or when You access the Service by or through a mobile device.</p>\n<h3>Tracking Technologies and Cookies</h3>\n<p>We use Cookies and similar tracking technologies to track the activity on Our Service and store certain information. Tracking technologies used are beacons, tags, and scripts to collect and track information and to improve and analyze Our Service. The technologies We use may include:</p>\n<ul>\n<li><strong>Cookies or Browser Cookies.</strong> A cookie is a small file placed on Your Device. You can instruct Your browser to refuse all Cookies or to indicate when a Cookie is being sent. However, if You do not accept Cookies, You may not be able to use some parts of our Service. Unless you have adjusted Your browser setting so that it will refuse Cookies, our Service may use Cookies.</li>\n<li><strong>Web Beacons.</strong> Certain sections of our Service and our emails may contain small electronic files known as web beacons (also referred to as clear gifs, pixel tags, and single-pixel gifs) that permit the Company, for example, to count users who have visited those pages or opened an email and for other related website statistics (for example, recording the popularity of a certain section and verifying system and server integrity).</li>\n</ul>\n<p>Cookies can be "Persistent" or "Session" Cookies. Persistent Cookies remain on Your personal computer or mobile device when You go offline, while Session Cookies are deleted as soon as You close Your web browser. Learn more about cookies on the <a href="https://www.freeprivacypolicy.com/blog/sample-privacy-policy-template/#Use_Of_Cookies_And_Tracking" target="_blank" rel="noopener">Free Privacy Policy website</a> article.</p>\n<p>We use both Session and Persistent Cookies for the purposes set out below:</p>\n<ul>\n<li>\n<p><strong>Necessary / Essential Cookies</strong></p>\n<p>Type: Session Cookies</p>\n<p>Administered by: Us</p>\n<p>Purpose: These Cookies are essential to provide You with services available through the Website and to enable You to use some of its features. They help to authenticate users and prevent fraudulent use of user accounts. Without these Cookies, the services that You have asked for cannot be provided, and We only use these Cookies to provide You with those services.</p>\n</li>\n<li>\n<p><strong>Cookies Policy / Notice Acceptance Cookies</strong></p>\n<p>Type: Persistent Cookies</p>\n<p>Administered by: Us</p>\n<p>Purpose: These Cookies identify if users have accepted the use of cookies on the Website.</p>\n</li>\n<li>\n<p><strong>Functionality Cookies</strong></p>\n<p>Type: Persistent Cookies</p>\n<p>Administered by: Us</p>\n<p>Purpose: These Cookies allow us to remember choices You make when You use the Website, such as remembering your login details or language preference. The purpose of these Cookies is to provide You with a more personal experience and to avoid You having to re-enter your preferences every time You use the Website.</p>\n</li>\n</ul>\n<p>For more information about the cookies we use and your choices regarding cookies, please visit our Cookies Policy or the Cookies section of our Privacy Policy.</p>\n<h2>Use of Your Personal Data</h2>\n<p>The Company may use Personal Data for the following purposes:</p>\n<ul>\n<li>\n<p><strong>To provide and maintain our Service</strong>, including to monitor the usage of our Service.</p>\n</li>\n<li>\n<p><strong>To manage Your Account:</strong> to manage Your registration as a user of the Service. The Personal Data You provide can give You access to different functionalities of the Service that are available to You as a registered user.</p>\n</li>\n<li>\n<p><strong>For the performance of a contract:</strong> the development, compliance and undertaking of the purchase contract for the products, items or services You have purchased or of any other contract with Us through the Service.</p>\n</li>\n<li>\n<p><strong>To contact You:</strong> To contact You by email, telephone calls, SMS, or other equivalent forms of electronic communication, such as a mobile application''s push notifications regarding updates or informative communications related to the functionalities, products or contracted services, including the security updates, when necessary or reasonable for their implementation.</p>\n</li>\n<li>\n<p><strong>To provide You</strong> with news, special offers and general information about other goods, services and events which we offer that are similar to those that you have already purchased or enquired about unless You have opted not to receive such information.</p>\n</li>\n<li>\n<p><strong>To manage Your requests:</strong> To attend and manage Your requests to Us.</p>\n</li>\n<li>\n<p><strong>For business transfers:</strong> We may use Your information to evaluate or conduct a merger, divestiture, restructuring, reorganization, dissolution, or other sale or transfer of some or all of Our assets, whether as a going concern or as part of bankruptcy, liquidation, or similar proceeding, in which Personal Data held by Us about our Service users is among the assets transferred.</p>\n</li>\n<li>\n<p><strong>For other purposes</strong>: We may use Your information for other purposes, such as data analysis, identifying usage trends, determining the effectiveness of our promotional campaigns and to evaluate and improve our Service, products, services, marketing and your experience.</p>\n</li>\n</ul>\n<p>We may share Your personal information in the following situations:</p>\n<ul>\n<li><strong>With Service Providers:</strong> We may share Your personal information with Service Providers to monitor and analyze the use of our Service, to contact You.</li>\n<li><strong>For business transfers:</strong> We may share or transfer Your personal information in connection with, or during negotiations of, any merger, sale of Company assets, financing, or acquisition of all or a portion of Our business to another company.</li>\n<li><strong>With Affiliates:</strong> We may share Your information with Our affiliates, in which case we will require those affiliates to honor this Privacy Policy. Affiliates include Our parent company and any other subsidiaries, joint venture partners or other companies that We control or that are under common control with Us.</li>\n<li><strong>With business partners:</strong> We may share Your information with Our business partners to offer You certain products, services or promotions.</li>\n<li><strong>With other users:</strong> when You share personal information or otherwise interact in the public areas with other users, such information may be viewed by all users and may be publicly distributed outside.</li>\n<li><strong>With Your consent</strong>: We may disclose Your personal information for any other purpose with Your consent.</li>\n</ul>\n<h2>Retention of Your Personal Data</h2>\n<p>The Company will retain Your Personal Data only for as long as is necessary for the purposes set out in this Privacy Policy. We will retain and use Your Personal Data to the extent necessary to comply with our legal obligations (for example, if we are required to retain your data to comply with applicable laws), resolve disputes, and enforce our legal agreements and policies.</p>\n<p>The Company will also retain Usage Data for internal analysis purposes. Usage Data is generally retained for a shorter period of time, except when this data is used to strengthen the security or to improve the functionality of Our Service, or We are legally obligated to retain this data for longer time periods.</p>\n<h2>Transfer of Your Personal Data</h2>\n<p>Your information, including Personal Data, is processed at the Company''s operating offices and in any other places where the parties involved in the processing are located. It means that this information may be transferred to — and maintained on — computers located outside of Your state, province, country or other governmental jurisdiction where the data protection laws may differ than those from Your jurisdiction.</p>\n<p>Your consent to this Privacy Policy followed by Your submission of such information represents Your agreement to that transfer.</p>\n<p>The Company will take all steps reasonably necessary to ensure that Your data is treated securely and in accordance with this Privacy Policy and no transfer of Your Personal Data will take place to an organization or a country unless there are adequate controls in place including the security of Your data and other personal information.</p>\n<h2>Delete Your Personal Data</h2>\n<p>You have the right to delete or request that We assist in deleting the Personal Data that We have collected about You.</p>\n<p>Our Service may give You the ability to delete certain information about You from within the Service.</p>\n<p>You may update, amend, or delete Your information at any time by signing in to Your Account, if you have one, and visiting the account settings section that allows you to manage Your personal information. You may also contact Us to request access to, correct, or delete any personal information that You have provided to Us.</p>\n<p>Please note, however, that We may need to retain certain information when we have a legal obligation or lawful basis to do so.</p>\n<h2>Disclosure of Your Personal Data</h2>\n<h3>Business Transactions</h3>\n<p>If the Company is involved in a merger, acquisition or asset sale, Your Personal Data may be transferred. We will provide notice before Your Personal Data is transferred and becomes subject to a different Privacy Policy.</p>\n<h3>Law enforcement</h3>\n<p>Under certain circumstances, the Company may be required to disclose Your Personal Data if required to do so by law or in response to valid requests by public authorities (e.g. a court or a government agency).</p>\n<h3>Other legal requirements</h3>\n<p>The Company may disclose Your Personal Data in the good faith belief that such action is necessary to:</p>\n<ul>\n<li>Comply with a legal obligation</li>\n<li>Protect and defend the rights or property of the Company</li>\n<li>Prevent or investigate possible wrongdoing in connection with the Service</li>\n<li>Protect the personal safety of Users of the Service or the public</li>\n<li>Protect against legal liability</li>\n</ul>\n<h2>Security of Your Personal Data</h2>\n<p>The security of Your Personal Data is important to Us, but remember that no method of transmission over the Internet, or method of electronic storage is 100% secure. While We strive to use commercially acceptable means to protect Your Personal Data, We cannot guarantee its absolute security.</p>\n<h1>Children''s Privacy</h1>\n<p>Our Service does not address anyone under the age of 13. We do not knowingly collect personally identifiable information from anyone under the age of 13. If You are a parent or guardian and You are aware that Your child has provided Us with Personal Data, please contact Us. If We become aware that We have collected Personal Data from anyone under the age of 13 without verification of parental consent, We take steps to remove that information from Our servers.</p>\n<p>If We need to rely on consent as a legal basis for processing Your information and Your country requires consent from a parent, We may require Your parent''s consent before We collect and use that information.</p>\n<h1>Links to Other Websites</h1>\n<p>Our Service may contain links to other websites that are not operated by Us. If You click on a third party link, You will be directed to that third party''s site. We strongly advise You to review the Privacy Policy of every site You visit.</p>\n<p>We have no control over and assume no responsibility for the content, privacy policies or practices of any third party sites or services.</p>\n<h1>Changes to this Privacy Policy</h1>\n<p>We may update Our Privacy Policy from time to time. We will notify You of any changes by posting the new Privacy Policy on this page.</p>\n<p>We will let You know via email and/or a prominent notice on Our Service, prior to the change becoming effective and update the "Last updated" date at the top of this Privacy Policy.</p>\n<p>You are advised to review this Privacy Policy periodically for any changes. Changes to this Privacy Policy are effective when they are posted on this page.</p>\n<h1>Contact Us</h1>\n<p>If you have any questions about this Privacy Policy, You can contact us:</p>\n<ul>\n<li>By email: privacy@pcapijac.com</li>\n</ul>','\n',char(10)));
|
||
INSERT INTO pages VALUES('home','published',NULL,'<p>HOME PAGE</p>');
|
||
DELETE FROM sqlite_sequence;
|
||
CREATE UNIQUE INDEX `directus_users_external_identifier_unique` on `directus_users` (`external_identifier`);
|
||
CREATE UNIQUE INDEX `directus_users_email_unique` on `directus_users` (`email`);
|
||
CREATE UNIQUE INDEX `directus_users_token_unique` on `directus_users` (`token`);
|
||
CREATE UNIQUE INDEX `directus_flows_operation_unique` on `directus_flows` (`operation`);
|
||
CREATE UNIQUE INDEX `directus_operations_resolve_unique` on `directus_operations` (`resolve`);
|
||
CREATE UNIQUE INDEX `directus_operations_reject_unique` on `directus_operations` (`reject`);
|
||
CREATE UNIQUE INDEX `categories_slug_unique` on `categories` (`slug`);
|
||
CREATE UNIQUE INDEX `vendors_slug_unique` on `vendors` (`slug`);
|
||
COMMIT;
|