Technology partners

Technology Partners

IBM Security

IBM Security provides an integrated family of security products that bring a comprehensive and scalable solution for your centralized identity and security management. IBM Security removes many of the security barriers to fully exploiting e-business by:

  •  Enabling you to quickly deploy secure e-business applications
  • Allowing consistent enforcement of security and privacy policies
  • Providing centralized enterprise identity management
  • Simplifying your security administration

IBM Security provides a single interface for maintaining security profiles and policies across heterogeneous systems in mainframe, distributed and desktop environments. This allows you to decrease your costs while increasing productivity and customer satisfaction. We use several IBM products, such as: IBM Security Identity Manager, IBM Security Access Manager for Web, IBM Security Access Manager for Single Sign-On, IBM Security Access Manager for Mobile. With over 388,000 employees worldwide, IBM is the largest and most profitable information technology employer in the world. The company is active in over 170 countries.

RSA Aveksa

RSA Aveksa's leadership in Identity and Access Governance (“IAG”) will help our customers ensure that users have appropriate and secure access to applications from within the enterprise or the cloud.  Maintaining compliance with regulatory guidelines is critical – whether it’s SOX, HIPAA, PCI DSS, or any of the other security regulations that may be applicable to your firm and industry. RSA Aveksa’s purpose-built architecture provides the functionality needed to efficiently meet compliance standards while concurrently delivering access to business users.

Very often, access review processes are poorly documented (if at all) and often manual. Access reviews can take multiple weeks to complete using cumbersome spreadsheets, with multiple participants and infrequent violation checks.
With RSA Aveksa your organization can easily automate access certification, reporting, user entitlement remediation and change validation to create an efficient and seamless review process. Access changes resulting from review processes are easily made through service desk integration or provisioning solutions like ISIM.

Together with all of our trusted technology partners we can offer you a complete set of solutions. Please check our product site for more information.


CyberArk is a global leader and pioneer of a new layer of IT security solutions that protects organizations from cyber attacks that have made their way inside the network perimeter to strike at the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage.

The company is trusted by the world’s leading companies – including 40 percent of the Fortune 100 and 17 of the world’s top 20 banks – to protect their highest value information assets, infrastructure and applications. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, MA. The company also has offices throughout EMEA and Asia-Pacific.