The 2024 Tech Innovator Awards: The Finalists
As part of the annual Tech Innovator Awards evaluation process CRN selects a number of the applicants as finalists. Here’s a look at the innovative products that have made the first round of the judging.
Innovation Surge
The wave of development around artificial intelligence and generative AI in the last two years has shaken up the IT industry. As with earlier major paradigm shifts, such as the Internet and cloud computing, AI is spurring innovation across nearly every IT product and technology category including applications, software development, data management, PCs and cybersecurity.
From well-established IT giants to startups with breakthrough ideas, IT vendors have been rushing to develop new products and adapt their current product portfolios in the face of the AI tsunami, either to reap the advantages of adding AI capabilities or upgrade them to meet the new demands of AI systems.
So which new and updated products are creating opportunities for solution providers who work on the front lines with customers as they navigate this new AI-driven market?
To help solution providers identify products that are truly innovative and offer real value for their customers, the 2024 CRN Tech Innovator Awards showcase IT products that can provide game-changing advances in IT – and partner growth opportunities – across a broad range of technologies.
CRN staff have been evaluating more than 320 applications across 36 product categories for this year’s Tech Innovator Awards. The following are the finalists among those applications. The winners will be announced on Aug. 7 on CRN.com and in the August print issue of CRN.
AI Infrastructure
Liqid UltraStack AI Server
The Liqid UltraStack AI Server integrates up to 20 Nvidia L40S GPUs for computational efficiency for AI applications, surpassing traditional server limitations. UltraStack is equipped to handle a wide array of data center workloads, including generative AI, compute, 3D graphics, rendering, and video processing.
UltraStack accelerates Nvidia's full software stack, including the Nvidia AI Enterprise and Nvidia Omniverse platforms. The UltraStack design significantly reduces the total cost of ownership while enhancing computational performance. Liqid UltraStack is available in 8-, 10-, 16-, and 20-GPU configurations.
NetApp AIPod
NetApp AIPod is an artificial intelligence- and machine learning-focused converged infrastructure system built on NetApp all-flash storage. AIPod provides a comprehensive AI solution that’s designed to address the challenges that businesses face when adopting and implementing AI.
AIPod consolidates a data center's worth of analytics, training, and inference compute into a single AI infrastructure, reducing cost and complexity. Supported by NetApp's storage systems plus NetApp BlueXP, AI Control Plane and DataOps Toolkit, AIPod integrates with the most popular MLOps platforms.
Vertiv SmartRow 2
The Vertiv SmartRow 2 is an innovative edge data center solution designed to reduce deployment time and costs associated with traditional edge data center builds by 80 percent and 30 percent, respectively. The solution is a complete, pre-engineered edge data center that minimizes the planning and preparation typically required by traditional infrastructure deployments. Vertiv SmartRow 2 is ideal for fast deployment of edge applications, including edge AI that is closer to the user such as manufacturing floor and retail use cases.
WEKA WEKApod
WEKApod is a powerful, AI-native appliance certified for Nvidia DGX SuperPOD on Nvidia DGX H100 systems. This new system from WEKA combines the power of the WEKA Data Platform software with class-leading storage hardware to provide a ready-to-use, purpose-built environment for AI applications.
Ideal for enterprise AI, generative AI, and GPU cloud customers, WEKApod delivers all the capabilities of WEKA's Data Platform software in an easy-to-deploy appliance with hybrid cloud connectivity.
WEKApod offers a highly performant data management foundation for Nvidia DGX SuperPOD deployments. It provides efficient write performance for AI model checkpointing, delivering superior training, scalability, enterprise-grade resiliency, and support for real-time applications.
Application Development & DevOps
The Azul Zulu Builds of OpenJDK for Java 21
Azul Zulu Builds of OpenJDK for Java 21 are executable binaries best described as Java Development Kits (JDKs). Java Development Kits (which include Java Virtual Machines) provide developers the tools and libraries they need to create Java applications that utilize Java Virtual Machines to run on any device, ranging from a server to a desktop or an embedded sensor.
Azul provides Java Development Kits for all versions of Java, and subscribers to Azul Platform Core have access to several hundred Azul Zulu JDKs – all built to the specifications of Java 21. The target market are organizations that rely on Java applications for critical business functions.
GitLab Duo
GitLab Duo is a privacy- and transparency-first suite of AI capabilities embedded across the entire software development lifecycle. Applying AI across DevSecOps workflows improves team collaboration and reduces the security and compliance risks of AI adoption.
GitLab's goal is to deliver a comprehensive suite of AI features that supports and provides value to all users involved in delivering software, from developers to non-technical team members.
Duo’s capabilities go beyond code generation to include: Suggested Reviewers, Code Suggestions, Chat, Vulnerability Summary, Code Explanation, Planning Discussions Summary, Merge Request Summary, Merge Request Template Population, Code Review Summary, Test Generation, Git Suggestions, Root Cause Analysis, Planning Description Generation, and Value Stream Forecasting.
LaunchDarkly Feature Management Platform
The LaunchDarkly Platform allows customers to ship software with confidence and release better software faster. In 2023 the platform was significantly enhanced with its Galaxy Product Release to increase functionality and support engineers across every aspect of software releases. This update included capabilities to release stable features faster, support more effective migrations and avoid outages or data loss, increase targeting opportunities, and optimize mobile releases.
LaunchDarkly has committed to supporting customers as they embrace generative AI – a process that many have struggled to get beyond the pilot phase because they were reliant on outdated and risk-heavy release processes. The LaunchDarkly platform allows customers to quickly and safely release, measure, and iterate GenAI projects by enabling and disabling new models, targeting specific access groups, iterating and optimizing prompts, and measuring each release's effectiveness.
Application Performance/Observability
Cisco Observability Platform
The Cisco Observability Platform is a developer-ready system built on an open, extensible, scalable and flexible entity relationship data model that allows developers to build and extend data models and experiences to deliver relevant and impactful observability and business insights.
The platform gathers and correlates metric, event, log and trace data from multiple domains at scale, such as networking, security, applications, end user, cloud services and verticals, and leverages ML and AI capabilities to contextualize and correlate real-time telemetry across these domains. This functionality allows organizations to better gain visibility, insights and actions to improve digital experiences for customers, employees and end-users.
Nobl9 Reliability Center
Nobl9 Reliability Center introduced new features usable by organizations of any type or size and particularly effective for large enterprises managing a complex collection of services. It includes new dashboards and reports designed to let executives and engineers understand a reliability score calculated from all the service level objectives (SLOs) they want to manage.
Critical new capabilities for SLO management include enhanced reliability experience, helping engineers and teams become more productive in identifying targets, prescribing SLOs and policies, and automating runbooks for reliability risks. It also enables SLO-backed operations via continuous monitoring and management systems using SLOs, as well as the ability to receive timely error-budget-backed alerts.
Additionally, Reliability Center provides instant visibility into the overall health of an organization's systems and the ability to align technology investment with business needs.
vFunction Architectural Observability Platform
vFunction's AI-driven architectural observability (AO) platform provides software architects, developers and engineering leaders with real-time visibility into how applications are structured and increases application resiliency, scalability and engineering velocity by continuously identifying and recommending ways to reduce technical debt and complexity in applications with every release.
vFunction's architectural observability platform addresses risk by identifying existing architectural technical debt, suggesting actionable steps to reduce it and validating new features after each release based on their impact on application quality and alignment with business priorities. Using vFunction to address technical debt and improve the architecture on an ongoing basis can overcome the friction that exists in large-scale IT modernization projects.
Artificial Intelligence
Atlassian Intelligence
Atlassian Intelligence is a new virtual teammate to help you and your team work more effectively. Using artificial intelligence and machine learning, Atlassian Intelligence is a tool that is integrated into our cloud-based products.
Cohesity Gaia
Cohesity Gaia is an AI-powered enterprise search assistant that brings retrieval augmented generation (RAG) AI and large language models (LLMs) to high-quality backup data within Cohesity environments.
The conversational AI assistant enables users to ask questions and receive answers by accessing and analyzing vast pools of enterprise data. When coupled with the Cohesity Data Cloud, these AI advancements transform data into knowledge and can help accelerate an organization’s goals while keeping data secure and compliant.
By building a RAG AI solution on Cohesity's multi-cloud platform, Gaia provides RAG AI conversational search experiences across cloud and hybrid environments, allowing enterprises to gain deeper insights into their data and make informed decisions, no matter where their stored data resides.
ConnectWise Sidekick
ConnectWise Sidekick is a purpose-built AI companion for IT solution providers and MSPs. This addition to the ConnectWise suite of tools leverages artificial intelligence to enhance productivity and decision making.
By analyzing data and providing real-time insights, ConnectWise Sidekick empowers MSPs to make informed decisions, automate tasks, and optimize workflows. From ticket management to resource allocation it acts as a trusted assistant, guiding users through complex scenarios and offering actionable recommendations.
With Sidekick, businesses can deliver exceptional customer experiences while focusing on strategic initiatives. SideKick offers AI-driven productivity, efficiencies, and effectiveness to elevate MSPs' businesses.
Domino Data Lab Domino Enterprise
In the last year Domino Data Lab has announced a host of new features for its Enterprise AI platform including:
-AI Project Hub, which accelerates the development of real-world AI applications, including Generative AI, with pre-packaged reference projects integrating the best of the AI ecosystem. AI Hub includes templates for common AI use cases (Chatbots, Q&A, etc.);
-Vector DB Access to enable retrieval augmented generation (RAG), and a built-in wizard to fine-tune open-source foundation models on data;
-Model Sentry, which features a new unified model registry for complete lineage tracking, and auditability with automated model cards that ensures teams can responsibly design and reproduce models;
-AI Gateway, which hosts an internal service to centralize governance and secure connections to external LLMs, giving entire enterprises secure and streamlined, governed access to commercial LLMs.
Fortinet FortiAI
FortiAI is a GenAI-based security assistant that uses natural language and generative AI to guide, simplify, and automate security analyst activities. With the help of FortiAI, security teams can make better informed decisions, rapidly respond to threats, and save time on even the most complex tasks.
The initial release of FortiAI is seamlessly integrated into the user experience of Fortinet's Security Operations (SecOps) solutions such as FortiSIEM and FortiSOAR to help optimize threat investigation and response, SIEM queries, SOAR playbook creation and more.
HiddenLayer AI Detection & Response for GenAI
The HiddenLayer AI Detection and Response (AIDR) cybersecurity solution monitors, detects and responds to adversarial artificial intelligence attacks targeted at GenAI and traditional ML models. AIDR fortifies organizations' Gen AI deployments against PII leakage, prompt injection, and intellectual property theft.
AIDR’s functionality includes immediate and continuous real-time protection against cyber threats; unlocked innovation, enabling quick deployment of models into production while proactively mitigating cybersecurity risks in real-time; and assistance in maintaining compliance as safeguards against threats that could result in regulatory issues.
Red Hat OpenShift AI
Red Hat OpenShift AI is a flexible, scalable MLOps platform with tools to build, deploy, and manage AI models and AI-enabled applications. Built using open-source technologies, it provides trusted, operationally consistent capabilities for teams to experiment, serve models, and deliver innovative apps.
OpenShift AI supports traditional and generative AI workloads, making the process of fine-tuning and serving foundation models seamless, scalable, and efficient across public cloud, on-premises and edge environments. It is available both as traditional software and as a managed cloud service.
SnapLogic SnapGPT
SnapGPT is a generative integration solution that empowers everyone, not just IT professionals, to integrate applications or data sources using natural language. SnapGPT layers generative AI and large language models (LLMs) to existing AI/ML capabilities honed through Iris, SnapLogic's AI assistant (launched in 2017).
SnapGPT helps companies translate business intent into technical delivery in minutes using cutting-edge generative integration. It can be used to integrate a variety of applications and data sources, including on-premises, cloud-based, and hybrid environments, and shrink time spent on integration from days and weeks to hours and minutes.
SnapGPT accelerates time to production for data engineers, automates business workflows for RevOps and human resource leaders, and accelerates issue resolution speed for IT helps desk managers.
Business Intelligence & Data Analytics
Cloudera Open Data Lakehouse (1.7.9 release)
AI and GenAI implementations have stalled as enterprises struggle to achieve business value from their data with AI. Challenges include distributed data infrastructures, governance risks and security concerns. Solving these challenges are requirements for deploying and capturing the transformative potential of AI.
Cloudera empowers the world's largest enterprises to solve some of today's most complex business problems with a software platform that helps them control, analyze, and modernize their most strategic asset – their data.
Cloudera's latest release represents the next phase of its Open Data Lakehouse on private cloud, revolutionizing on-premises data experiences for trusted analytics and AI at scale. By delivering Apache Iceberg for private clouds, Cloudera is empowering every organization to overcome these issues and quickly scale AI deployments to generate greater value.
Starburst Galaxy
Starburst Galaxy is a fully managed, end-to-end data lakehouse platform built on the open-source Trino SQL query engine and Apache Iceberg, known as Icehouse. It offers a solution for near real-time analytics, allowing customers to leverage the scalability, performance, and cost-effectiveness of Icehouse without the complexities of creating and maintaining a custom solution.
The platform supports data ingestion, governance, and Iceberg data management at scale, particularly in multi-cloud environments. It targets industries aiming to harness interactive applications and business intelligence, offering a user-friendly SQL interface for data optimization and live application integration, catering to a broad market that requires advanced data management and analytics capabilities.
Zscaler Business Analytics
Business Analytics is a set of offerings that delivers AI-powered business analytics across cyber risk, digital experience, and SaaS and workplace usage – all with an organization's current Zscaler deployment. With Business Analytics companies gain a holistic ability to quantify cyber risk yielding stronger cyber postures, better manage digital experiences for flawless employee productivity, and utilize insights on SaaS app usage and spending and office space utilization trends, leading to valuable cost savings.
Cloud Tools/Management
Alkira Extranet-as-a-Service
Alkira Extranet-as-a-Service simply and securely connects customers, partners, and third parties. Alkira EaaS is delivered entirely as a service, providing turnkey transformation and advanced cloud networking capabilities on-demand. From network segmentation to complex shared services environments, Alkira EaaS provides advanced B2B extranet connectivity capabilities.
With Alkira EaaS customers can insert cloud firewalls in a few clicks, seamlessly share resources with secure unidirectional and bidirectional traffic flows, and leverage Alkira's hyperscale cloud backbone to bring network access closer to users wherever they are. They can use built-in segmentation, services, and Day2 troubleshooting tools to quickly untangle complex security challenges, reduce risk, and maintain compliance.
The product is applicable to any IT organization managing the complexities of single and multi-cloud environments and struggling to keep pace with the rapid changes presented by accelerating DevOps, remote work, and security compliance regulations across an ecosystem of customers, partners, and end users.
Prosimo AI Suite for Multi-Cloud Networking
Prosimo's AI Suite for Multi-Cloud Networking (MCN) is a full-stack, cloud-native platform that streamlines AI adoption for enterprises. The AI Suite enables organizations to utilize cloud-native connectivity for AI, helping teams deploy AI workloads faster. Prosimo's platform takes a full lifecycle approach, offering Multi-Cloud Networking for AI and Nebula, a conversational AI assistant enabling AIOps for MCN.
Multi-Cloud Networking for AI provides the core connectivity, security, and infrastructure for AI workloads, including: end-to-end private connectivity for seamless data access distribution, deep observability to detect abnormal behaviors across the stack, enhanced enterprise-level security for AI services, and application-driven routing for request-aware steering.
Nebula enhances observability, monitoring, and troubleshooting with predictive recommendations and accelerated root-cause analysis.
Quest Software Foglight Cloud
Foglight Cloud, targeted towards database administrators and IT/cloud teams globally, offers extensive diagnostic capabilities and performance monitoring for databases, servers, virtual machines, containers, and cloud services. With Foglight Cloud, rapid implementation offers quick time to value for actionable insights on performance, while the scalable, flexible cloud-based architecture enables organizations to reduce cloud TCO.
Key features include:
-Predictive capabilities to actively predict future costs and take steps to reduce inefficient cloud and data spend,
-Observability powered by automated workflows, custom notifications and reusable templates helping to manage alerts across databases,
-Standardization of performance monitoring with aggregated query insights and prioritized alerts to identify deviations from normal activity and quickly diagnose and resolve performance issues, including at the statement level,
-Flexible architecture that can be easily configured as a standalone solution or integrated as a database monitor within existing infrastructure.
Tangoe One Cloud
The Tangoe One Cloud expense management solution helps IT and finance leaders simplify, manage, and optimize their cloud spending and resource utilization. It offers a comprehensive solution to address SaaS, UCaaS, IaaS, and private cloud environments collectively.
Leveraging AI automation and the largest ecosystem of integrations, Tangoe One Cloud helps clients track and monitor a growing inventory of cloud assets and costs; simplify cloud expense management, invoice processing, and cost allocation; gain visibility into cloud service utilization, unused resources, and IT waste; optimize assets and costs across cloud infrastructure and software; and govern spending, budgeting and forecasting.
Data and Information Management
Couchbase Capella
Couchbase Capella is a flexible and scalable, fully managed, multipurpose NoSQL Database-as-a-Service that makes it simple and cost-efficient for organizations to build modern applications on one platform.
Available on all major cloud providers, Capella gives customers flexibility with JSON documents, integrated cache, text-based search and analytics. Capella effortlessly converts relational models to JSON, facilitating secure data migration. It enables developers to build modern applications with SQL querying and ACID transactions in NoSQL to easily and quickly migrate or offload processes.
New major features include Capella columnar service and vector search capabilities that enable development teams to build trustworthy, adaptive applications that can run from the cloud to the edge.
Cribl Lake
Cribl Lake is a turnkey data lake solution designed to provide IT and security teams with complete control and flexibility over their data. Provisioned directly from Cribl.Cloud, organizations collect, analyze and route a complete view of all IT and security data across the enterprise, streamlining workflows and providing value within minutes.
Cribl Lake's unified management layer allows organizations to leverage low-cost object storage, either Cribl-managed or customer-owned, and automate provisioning, unify security and retention policies, and use open formats to eliminate vendor lock-in. Cribl Lake integrates with Cribl's suite of products including Ingest, Stream, Edge and Search.
M-Files Aino
M-Files revolutionizes knowledge work by using AI to streamline document creation, document management, workflow automation and content collaboration. M-Files Aino, the company's generative AI assistant, facilitates seamless understanding of information within the platform using Large Language Models (LLMS).
Aino can organize data, understand context, and facilitate natural language interactions regardless of language barriers. Functions such as document summarization, Q&A, and intelligent search allow knowledge workers to extract insights from vast amounts of information, enhancing productivity while maintaining data security.
Organizations that utilize M-Files Aino maximize their stored information potential, driving informed decision-making beyond traditional search constraints.
Nasuni File Data Platform
The Nasuni File Data Platform delivers enterprise file synchronization, storage, collaboration, and protection against disasters and ransomware. Nasuni is based on a cloud-native global file system, scalable on AWS, Azure, or Google Cloud.
The recent Nasuni IQ addition to the platform provides data intelligence capabilities, enabling businesses to manage and prepare their unstructured data environment for AI. With Nasuni IQ, enterprises can quickly monitor usage patterns, make proactive data management decisions, and better enable the delivery of intelligent insights.
Key features include:
-Enhanced visibility for a comprehensive understanding of distributed Nasuni file data infrastructure with monitoring that provides a detailed view of all user activities, usage patterns, and consumption,
-Proactive data management to anticipate storage needs, identify potential bottlenecks, and implement data management policies to ensure resources are allocated effectively,
-Data curation for AI to help curate unstructured data to support advanced analytics and AI.
Promethium Data Fabric
Promethium addresses the growing demand for advanced data analytics and management solutions that help businesses drive digital transformation and foster data-driven decision-making.
Promethium's AI-native data fabric empowers organizations to automate the creation of data products via GenAI, enabling them to easily manage, discover, and utilize their data across multiple platforms/sources. Leveraging GenAI, natural language processing and native data virtualization, Promethium enhances operational efficiencies and unlocks new insights by creating a unified and consistent view of all data and providing fast/secure access to it.
Promethium enables trusted data products to be assembled automatically and with greater agility/ease in a federated manner for self-service and security. With Promethium, customers can democratize their data access, find new insights and answers to pressing questions faster while reducing project backlogs and decreasing TCO.
Tessell Database-as-a-Service
Tessell is an AWS- and Azure-native database-as-as-service (DBaaS) supporting converged transactional databases as well as converged AI/ML/LLM (Large Language Model) databases. Tessell provides customers with database self-service, DevSecOps automation, and production lifecycle management without having to deploy and manage the underlying infrastructure.
Tessell 's technological innovation and patents provide differentiated data infrastructure with 10X performance/price, improved data management, and enterprise-grade governance – all while running on a multi-cloud platform.
Tessell's user-interface complements database fleet-management, providing a single pane of glass for incident management by exception, visualized database instrumentation, ticketing federation and response. Tessell's target market encompasses both closed and open-source databases including MySQL, PostgreSQL, Oracle, MS SQL Server, MongoDB and Milvus.
Data Protection, Management and Resiliency
Enterprise Control for Backblaze Computer Backup
Enterprise Control is an administrative feature set that helps companies meet their continuity and data security standards for workstation data while supporting a hybrid and remote workforce. It provides fine-grained access permissions to manage, protect, and control group members’ data; advanced single sign-on for tools like Okta and Azure Active Directory in addition to GSuite and Microsoft applications; and support to meet mandates related to compliance, cyber insurance, and heightened RPO and RTO requirements. Businesses from the midmarket to the enterprise that manage a fleet of workstations are the target market.
Commvault Cloud powered by Metallic AI
Commvault Cloud, powered by Metallic AI, is a leading cyber resilience platform built to meet the demands of the hybrid enterprise at the lowest TCO. Commvault Cloud empowers customers to secure, defend, and recover their data, applications, and production workloads – whether their data is on-premises, across public, private and hybrid clouds, over SaaS, or in multi-cloud environments.
The unified platform can be managed by a single pane of glass. Commvault Cloud delivers next-generation capabilities that intelligently engage and surface cyber risks, minimize active data threats, and drive intelligent, more informed recovery outcomes sooner, assuring cyber resilience in a rapidly and continuously evolving threat landscape.
HYCU R-Cloud
HYCU R-Cloud is a single platform delivered as true, cloud-native SaaS. Within the platform customers have access to HYCU's discovery and visualization solution, HYCU R-Graph, which is built-in and offered completely free. Partners and their customers can quickly and easily turn on data protection for new data sources from the built-in HYCU Marketplace: Once protection for a new source has been turned on, it is delivered through the R-Cloud Platform.
For partners that need on-premises use for customers running software behind their firewall or for hybrid-cloud capabilities, HYCU offers the R-Cloud Hybrid Cloud Edition. Regardless of deployment model, R-Cloud is delivered 100-percent agentless, without the need for additional hardware or software.
HYCU prioritizes partners’ and their customers' data privacy and security and uses a private network for data movement within the cloud. R-Cloud has been significantly updated since its February 2023 introduction.
Infinidat InfiniSafe Cyber Detection
InfiniSafe provides a multi-layered cyber stack for the creation of resilient cyber storage environments with InfiniSafe Cyber Detection, adding a powerful level of data detection to this stack and deepening the ability of InfiniSafe to detect cyber incidents.
InfiniSafe Cyber Detection, targeted for the enterprise market, performs deep scanning of block, file, and database stores by presenting InfiniBox and InfiniBox SSA immutable snapshots to powerful AI-based scanning engines that validate their cyber integrity and, through machine learning, identify any malicious changes that could indicate a cyberattack. When an attack is detected, InfiniSafe Cyber Detection provides forensic reporting to diagnose what data has been compromised, the nature of the compromise, and critical insights to where the compromised data originated. Then, using the power of InfiniSafe technology, the user can quickly deliver a guaranteed cyber recovery, once they have identified a known good copy of the data.
Veeam Data Platform
Built on the principles of data security, recovery and freedom, the Veeam Data Platform 23H2 update includes advanced data security, malware detection, automated recovery, and hybrid cloud capabilities to keep businesses running even in the face of ransomware and cyberattacks.
As part of the update, Veeam Backup & Replication v12.1 further reduces incident response time with proactive threat hunting for backups, integration with SIEM platforms, and YARA rules for ransomware pattern detection.
Beyond the platform updates, the new Veeam Data Cloud is built on Microsoft Azure and Zero Trust principles and leverages Azure Blob Storage isolated from production environments. This all-in-one service includes backup software, infrastructure and storage, keeping costs low and predictable while simplifying management.
Displays
Hisense USA 75MR6DE GoBoard Live
The New 75MR6DE GoBoard Live display features Google certification, Android 13 operating system and an integrated 4K camera. Hisense Interactive Display solutions deliver unrivalled performance and market leading value. Combining the power of a digital display, tablet, electronic whiteboard and video conference device, Hisense delivers the ultimate all-in-one display solution. Superior processors and the latest touch technology provide best-in-class user experiences while seamless wireless integration makes collaboration both simple and engaging.
Hisense USA 100BM66D
Hisense’s latest 100-inch, large-format display is designed for any environment where high-impact communication is required including high-volume retail and corporate installations. A combination of seamless design and enhanced brightness ensure digital content vividly stands out from the crowd.
The Hisense M Series display delivers 500 nits brightness for enhanced visibility in brightly lit environments. This higher brightness helps Hisense Commercial Displays provide better color accuracy and vibrancy, meaning colors appear more lifelike and true to their intended experience, creating a more immersive viewing experience. Hisense M Series displays are engineered for 24/7 operation, making them ideal for mission critical environments with zero downtime required.
Edge Computing/Internet of Things
Expanso Bacalhau
Bacalhau is Expanso’s open-source software designed to orchestrate jobs across any deployment location. It operates on a self-organizing network that efficiently distributes and executes jobs. Utilizing a decentralized approach, Bacalhau uses a “bidding system” for job distribution. This ensures that each compute node, fully aware of its own hardware capabilities, can determine if it has the appropriate compute power for a specific job. The inherent distributed orchestrator enables organizations to bring workloads such as machine learning inference directly to where data is generated. This orchestration platform is a fit for every company with a distributed system architecture, including most mid-to-large-sized corporations.
Radix IoT Mango 5.1
The Radix IoT Mango 5.1 offers enhanced MQTT messaging protocol support, fortifying the company's market leadership as the IoT platform of choice for advanced scalability and monitoring of globally diverse facilities. Owners, operators, and managers of smart infrastructure can use MQTT with existing devices that communicate on any of the other 21 supported protocols – along with additional devices and integrations for smart buildings, telecommunications infrastructure, data centers, and the energy sector.
Mango also released the Pi-Portfolio Builder, which revolutionizes how the setup of thousands of locations on a global scale can be done with in a no- or low-code environment. Facilities and infrastructure can use the cloud-native platform to organize and unlock critical data – and gain cost-efficient actionable insights to enhance operational efficiency – with expedited data unification across one or tens of thousands of disjointed buildings and automation equipment.
Red Hat Device Edge
Red Hat Device Edge aggregates an enterprise-ready and supported distribution of the Red Hat-led open-source community project MicroShift (a lightweight Kubernetes project derived from the edge capabilities of Red Hat OpenShift) along with Red Hat Enterprise Linux and Red Hat Ansible Automation Platform, providing more consistent Day One and Day Two management of hundreds to thousands of sites and devices.
Red Hat Device Edge is targeted at partners and customers looking for a consistent platform for resource-constrained environments that require small form factor compute at the device edge, including Internet of Things gateways, industrial controllers, smart displays, point of sales terminals, vending machines, robots, in space and more.
Scale Computing Autonomous Infrastructure Management Engine
Scale Computing Autonomous Infrastructure Management Engine (AIME) is the orchestration and management engine that powers SC//HyperCore, the award-winning self-healing platform that identifies, reduces, and corrects problems in real-time. AIME handles day-to-day administrative tasks and maintenance automatically, monitors systems for security, hardware, and software errors, and remediates errors where possible. It identifies the root cause and minimizes the impact of those issues when it cannot repair them automatically, notifying users with specific problem determination and action versus sending a stream of data that must be interpreted.
AIME maintains current firmware, driver, and OS versions for security and stability purposes. AIME is a core feature of SC//HyperCore, which is the ideal solution for MSPs as it saves time and valuable resources because software, servers, and storage are in one fully integrated platform. The same innovative software and simple user interface powers infrastructure regardless of hardware configuration.
Thinaer Sonar
Thinaer, a manufacturing digital transformation pioneer, fills blind spots with critical data and analysis through IIoT asset tracking and digital twin capabilities to enable better, more profitable production decisions. Thinaer's Sonar is a SaaS platform that tracks the untrackable with patented cloud and hardware-agnostic technology. Sonar continuously democratizes and contextualizes data for the broadest range of sensors bridging IT and OT across commercial and classified area manufacturing processes.
Thinaer provides the foundation for Industry 4.0/Smart Manufacturing digital transformation initiatives that improve yield, profitability, and compliance while decreasing waste, maintenance requirements, and energy consumption. Thinaer’s mission is to give manufacturing organizations in the aerospace, defense, and CPG industries the data needed to improve their operations. Thinaer’s SaaS-based business model deploys IIoT sensors and infrastructure that organizations pay to use and access the data provided by the sensors.
Hybrid Cloud Infrastructure
Broadcom VMware Cloud Foundation
VMware Cloud Foundation is a private cloud infrastructure platform that delivers industry leading compute, networking, storage, management and security software in a single integrated product, deployable on-premises and across hyperscaler and cloud partner environments.
VCF is purpose built to modernize infrastructure and accelerate innovation, empowering IT operations to deliver developer-ready infrastructure for applications across all cloud endpoints. It enables organizations to deliver a developer cloud experience on-premises, combining the scale and agility of public cloud with the security and performance of private cloud, resulting in industry-leading TCO.
A third-party study of production VCF environments found that customers could achieve a three-year ROI of 171-percent, $1.9M in network operations savings, $2.6M in IT operations savings, and $4.8M in savings from integrated security capabilities.
Dell APEX Cloud Platforms
Dell Technologies’ APEX Cloud Platforms are turnkey systems that integrate Dell infrastructure, automated management and operations software, and cloud operating stacks to deliver consistent multi-cloud operations by extending cloud operating environments on-premises.
APEX systems are collaboratively developed with partners, including Microsoft and Red Hat, to deliver: choice for the cloud ecosystem that best meets needs without being constrained by operational considerations; adaptability while protecting investments with common infrastructure building blocks; productivity using familiar operational and developer experiences regardless of cloud; operational excellence with automated management and operations software that delivers consistent outcomes across every ecosystem; and control using a shared, storage layer that spans multiple ecosystems and locations.
Flexera One IT Visibility
Flexera says it is the first ITAM provider to add software bills of materials. Enterprises increasingly demand SBOMs to understand the components of their essential software, driven by new government regulations, more open-source elements, and rising cyber threats. Flexera's software composition analysis (SCA) platform, through its Revenera division, has provided SBOM management capabilities to software developers for years. Now, Flexera One IT Visibility enhances these features, addressing the needs of software buyers with the same trusted capabilities.
This update offers robust protection against software vulnerabilities and data breaches, facilitating strategic IT decisions with a granular asset view. Flexera’s SBOM management offers detailed component insights and a vast compliance library of over 18 million components.
SoftIron HyperCloud
SoftIron designs and manufactures HyperCloud, a complete technology for building and running sovereign clouds. HyperCloud dramatically reduces the complexity of architecting, deploying and operating a resilient cloud infrastructure in such a fundamental way that it will drive significant disruption, especially where security and the secure provenance of hardware is critical.
HyperCloud enables service providers to build infrastructures that compete with the hyperscalers, enterprise IT teams to build their own private or hybrid clouds (and offer IT as-a-service within their own organizations) and enable MSPs to service demands for hybrid cloud in a way that is achievable, repeatable and profitable. HyperCloud provides organizations with true ownership of their clouds and can be used in any industry sector that utilizes cloud computing.
IT Automation/RPA
ConnectWise RPA
Robotic process automation (RPA) uses software robots to automate individual, repetitive tasks that usually require human access. RPA bots can mimic human actions such as button clicks, text box fills, and file path updates. ConnectWise has custom-built RPA for MSPs. With ConnectWise RPA, MSPs can drastically enhance a team's productivity and customer satisfaction. Sixty-six percent of knowledge workers say that automation has helped them be more productive, and 90 percent say that automation has improved their lives in the workplace. ConnectWise says it is bringing RPA to partners in an actionable way so they can achieve more with automation.
Gluware Intelligent Network Automation (5.1, 5.2 and 5.3)
Network operations teams use network automation to reduce outages, enhance security, and ensure compliance across their network environments. Gluware's Intelligent Network Automation delivers a set of pre-built solutions that can discover, automate and orchestrate tasks and processes as well as remediate issues across complex multi-vendor, multi-domain, multi-cloud network environments in as little as four weeks with no coding required.
Gluware's customers experience a 95-percent reduction in network outages, maintain 100-percent network security policy compliance, and perform OS upgrades 300 times faster than manual methods.
Since spring 2023 Gluware has released a series of platform updates, adding powerful new features throughout the system, as well as expanding the platforms' pre-built and multi-vendor capabilities.
Red Hat Ansible Automation Platform
Ansible Automation Platform is a simple, agentless platform that can improve current processes, migrate apps for better optimization and provide a single language for DevOps practices across an organization.
Red Hat recently added two key functions for innovation:
-Ansible Lightspeed is a generative AI service designed to drive consistent and accurate automation adoption across an organization, making it easier for novices to automate. Experienced automation managers can remove the burden of low-level task creation, improve playbooks and post processing best practices. Using NLP, the service integrates with IBM watsonX Code Assistant to help teams quickly build automation code;
-Event-Driven Ansible receives events from third-party tools, determines next steps and acts automatically with predetermined rules to initiate automated responses. Connecting infrastructure and application observability tools with enterprise-grade automation, it reduces the burden of manual, error-prone and high-volume routine tasks, codifies existing knowledge for new team members, and helps mitigate hiring challenges.
IT Infrastructure Monitoring and Management
ConnectWise Automate
With ConnectWise Sidekick for Automate, AI does the heavy lifting and creates PowerShell scripts in minutes. Experienced technicians can save time by allowing AI to generate scripts, allowing them to focus their efforts on reviewing, testing, and customizing results. Technicians new to PowerShell can gain confidence by prompting script creation using plain text and sharing results for review.
Traditional methods for creating scripts require advanced knowledge of PowerShell scripts or have technicians search well-known technical forums (i.e., Stack Exchange) to find appropriate scripting solutions for their problems. ConnectWise Sidekick solves this problem by generating the script using the power of AI within the Automate console. All AI-generated scripts require approval, so techs are empowered and always in control.
NetBrain Next-Gen V11
Next-Gen is NetBrain's flagship no-code network automation platform. It enables automation to be universally applied to troubleshooting, change management, and outage prevention across complex and distributed hybrid cloud networks. NetBrain Next-Gen enables every network engineer to become a network automation engineer using the no-code platform. NetBrain captures their experience, replicates it, and enables it to be leveraged across the network.
Next-Gen includes NetBrain's new Continuous Network Assessment (CNA) technology. CNA assesses and validates any number of points across the hybrid network and organizes these points into clear, live summary dashboards. These dashboards can be created on the fly and used to collaboratively navigate network investigations. The effect is that network engineers can draw from the institutional knowledge captured by peers, dramatically reducing escalations and lowering repair times and costs associated with network operations.
Next-Gen is used by network operations teams, including teams at one-third of the Fortune 500.
Netwrix 1Secure
Netwrix 1Secure is a SaaS solution for auditing clients' data, identity, and infrastructure. It accelerates incident detection and response by tracking critical changes in an IT infrastructure. Netwrix 1Secure diagnoses the risks facing clients' security infrastructure, identifies trends, and reduces the risk of a data breach.
In October 2023 the product was significantly enhanced with new capabilities including:
-SharePoint Online and Exchange Online were added as data sources for tracking critical changes (besides Active Directory, Microsoft Entra ID, and Windows File Servers),
-Dozens of new Active Directory and Microsoft Entra ID compliance reports were introduced,
-A new risk assessment feature was released, evaluating nearly two dozen risk factors.
Netwrix 1Secure was initially launched as an MSP-exclusive product and in April it became available to end customers.
Nexthink Flow
Nexthink Flow is a powerful orchestration engine for end-user computing that bridges the gap between monitoring and management with its real-time, automated workflows.
Nexthink Flow combines AI-powered data with a low-code orchestration engine to continuously optimize complex workflows, monitor progress, handle exceptions, and ensure that all tasks are completed as intended.
With Nexthink Flow EUC teams can: achieve proactive IT with real-time event monitoring and workflow triggering; improve productivity with a low-code visual designer; save time with less powershell coding and manual intervention: resolve complex issues using smart automations with built-in logic and decision making; and cut costs with software license reclamation and hardware refresh use cases using third-party API connectors.
Laptops and Mobile Devices
Acer TravelMate P2 14
The Acer TravelMate P2 14 series laptop (model TMP214-55-53ZF) is powered by Windows 11 Pro Education, an Intel Core i5-1335U Deca-core 1.30 GHz processor, 16GB memory and 512GB SSD. The 14-inch, 16:10 WUGXA (1920 x 1200) IPS display reduces glare and provides crisp images and accurate wide-angle views up to 170 degrees. In addition, its 180-degree hinge lets the laptop lay flat when needed. Both features make it ideal for collaborating with others during group study sessions.
Connecting to the internet and peripherals is easy with support from Wi-Fi 6E and the inclusion of a wide variety of ports such as a Thunderbolt 4 Type C port that supports fast 40Gbps data transfer and dual 4K displays. The keyboard features a large OceanGlass touchpad made from ocean bound plastic, provides quiet clicks to reduce ambient noise, and keys with 1.55 mm travel distance for fast and smooth typing.
HP Elite x360 1040 14-inch G11 2-in-1 Notebook PC
The HP Elite x360 1040 G11 is designed for users seeking to excel anywhere, any time with maximum performance optimized for AI experiences and seamless collaboration in a safe, secure PC that is thin, lightweight, and sleek.
Featuring an Intel Core Ultra processor with a NPU, the device powers AI-enabled intelligent performance while optimizing power usage to help ensure the PC stays cool and quiet. Four Poly Studio tuned speakers and SNR studio microphones ensure comfort and clarity during virtual collaboration with AI noise reduction, dynamic voice leveling, and studio mode recording. HP Wolf Security for Business provides a hardware-enforced, always-on, resilient defense to protect the PC from modern threats.
Panasonic Toughbook 55 Mk3
The new TOUGHBOOK 55 Mk3 is faster, more efficient, and more flexible for customers across mission-critical industries, such as utilities, the public sector, and first responder networks.
This new model uses the 13th Gen Intel CoreTM i5 and i7 Processor with Intel vPro Technology. It is equipped with Wi-Fi 6E and Bluetooth 5.3 to further enhance connection speeds so workers can retrieve, analyze, and transmit data in real time. With an AI-enhanced microphone and 92dB speakers, workers can use speech recognition solutions more easily in loud environments such as a law enforcement officer at a crime scene. It also features new programmable keys to provide a more intuitive experience for assigning shortcuts to applications and common actions, like pulling up frequently used reports.
Overall, the new TOUGHBOOK 55 Mk3 offers the latest features that mission-critical workers depend on to serve their local communities when and where they're needed most.
MSP RMM Platforms
ConnectWise Asio Platform
ConnectWise Asio is a modern, scalable, and secure cloud-based platform purpose-built for MSPs. It leverages centralized data and common services, including ticketing, contacts, and alerting. A generative AI engine and an orchestration layer support the delivery of hyperautomation and productivity for MSPs.
Centralizing data puts AI at the center of the platform, creating insights and automation that span products in ways decoupled solutions never could. Hyperautomation empowers organizations to rapidly identify, vet, and automate as many business and IT processes as possible. Workflow orchestration allows for process automation across many integrated products and prescriptive AI allows learning models to predict what will happen and proactively suggest solutions or auto-remediate.
Guardz AI-Powered Multilayered Cybersecurity Platform
Guardz offers an AI-powered multilayered cybersecurity platform built for MSPs to secure and insure small to medium-sized businesses against ever-evolving cyber threats, including phishing, ransomware, account breaches, data loss, user vulnerabilities, and more.
Utilizing AI within a multilayered approach to support a holistic solution, Guardz integrates automated detection and response capabilities seamlessly across users, emails, devices, cloud directories, and data, all accessible through a unified interface. By fusing cutting-edge cybersecurity technology with extensive insurance expertise, Guardz ensures continuous monitoring, management, and optimization of businesses' security, mitigating risks and preventing potential attacks.
HP Managed Print Service Subscription
Equipping employees with everything they need to do their job is a difficult challenge for businesses today. Simple solutions that work both at home and in the office are not easy to find, and generally even harder to manage.
HP Managed Print Services (MPS) Subscription is a simple and flexible cloud-based managed print and supplies service to simplify print management, help optimize costs, and support modern, more distributed ways of working – all through an annual subscription model that can adapt as business needs change. Managed Print Subscription is ideal for customers that want to optimize print management or have distributed fleets and work-from-home programs and need the simplicity of a cloud solution.
Moovila Perfect Project
Moovila Perfect Project is a project management platform powered by autonomous technology for MSPs, MSSPs, TSPs and others providing project-based services within the channel. Perfect Project brings automation to project and resource management with its unique capabilities.
-Critical path visualization: Moovila's innovative approach to the network diagram provides an interactive, accurate, at-a-glance insight into a project's status.
-24/7 project risk detection: Perfect Project includes automated risk detection features to quickly highlight problem areas within a project including delayed tickets, inaccurate date assignments, forecasting errors, and more.
-AI-project coach: Built within the platform, users can leverage the Carmen AI-project coach and analyst to guide users through issue remediation, offering real-time micro-learning at each step.
-Native integration: Unlike other project management tools, Perfect Project is built for the channel and comes with native integrations to some of the most popular PSA systems to eliminate duplicate entry or risk of data leakage.
Thread
Founded in 2017, Thread is the world's first service experience platform, serving IT managed service providers (MSPs) in the United States, Canada and Australia. Thread empowers MSPs to deliver exceptional, AI-enabled, conversational service experiences designed to meet the MSP's clients where they work - in Slack, Microsoft Teams, desktops, and the web.
Multifunction Printers
Epson SureColor T5770DM 36-inch Large-Format Multifunction CAD/Technical Printer
The SureColor T5770DM 36-inch multifunction CAD/technical printer is designed to meet the complex and demanding needs of technical and production printing environments. Its innovative and compact design features an integrated 36-inch wide dual-light scanner that enables both high-speed scanning and copying for wide-format documents. The scanner's dual light source reduces the appearance of wrinkles on the original document, and predefined modes help optimize scan quality based on image type.
The SureColor T5770DM comes equipped with the industry-leading 2.64-inch PrecisionCore TFP printhead technology and delivers A1/D-size prints in as little as 16 seconds. It leverages UltraChrome XD3 six-color inks, including dedicated red ink, to produce crisp lines and vibrant branding colors for graphics, signage, blueprints, documents, and more.
HP Color LaserJet Pro 3000 Series
Designed for customers that require high-performance printing in a small footprint, the new Color LaserJet 3000 series is the latest device powered by energy efficient TerraJet toner technology, enabling sharper colors and fast print speeds for growing businesses. The series introduces both a single-function and multifunction devices for all the varying print needs.
Networking – Enterprise
Aryaka Unified SASE-as-a-Service
Aryaka's Unified SASE-as-a-Service converges four design elements: Aryaka OnePass Architecture enables distributed policy enforcement through a distributed data plane, unified control plane and single management pane; Aryaka Zero Trust WAN traverses Aryaka's global private network backbone in over 100 countries; comprehensive networking, security and observability, including Aryaka SmartSecure next-generation firewall with secure web gateway, anti-malware and intrusion prevention system; and flexible delivery that empowers businesses to choose their preferred approach to delivery (Aryaka or third-party) and implementation (managed, co-managed or self-managed).
Customer benefits include reduced network attack surface and risk with integrated network security; cost-effective network performance, security and operations due to "as a service" economics, flexibility and simplicity; improved business agility and scaling due to policy-controlled connectivity and access; and SaaS and application access and performance with WAN optimizations and quality of service.
ExtremeCloud SD-WAN
Extreme has integrated network fabric capabilities into its ExtremeCloud SD-WAN platform, enabling customers to securely connect disparate environments such as the data center, campus and branch locations from within a single platform. Enhancements include automated workflows as part of a simplified UI/UX and improved visibility and control for superior application performance. Customers can automate tasks related to provisioning new sites and services, lower fabric deployment time by more than 90 percent and boost network security through hyper-segmentation.
This solution is designed for any organization that needs to manage secure connectivity between multiple sites, including healthcare providers managing multiple remote clinics, school districts delivering connectivity for new buildings or temporary classrooms, and retailers managing store locations around the world. It securely connects disparate environments within a single platform, sets up new sites and identifies/solves for the cause of disruptions.
F5 rSeries r12900-DS
F5 rSeries is a next-generation application delivery controller designed to optimize, secure, and control the delivery of web applications through a highly scalable, rearchitected modern architecture with an unprecedented level of performance for critical applications and network deployments. The F5 rSeries provides the highest reliability with enhanced hardware performance, increased scalability, and multi-tenancy to consolidate infrastructure and application services and lower TCO.
Advanced features include traffic management, security protections like firewall capabilities, and DDoS mitigation, as well as application acceleration through compression and SSL offloading. Targeted primarily at large enterprises, financial services, government, and service providers, the F5 rSeries caters to sectors that demand robust, scalable solutions for managing high volumes of web traffic and protecting sensitive data, such as finance, healthcare, and e-commerce.
Meter DNS Security
Meter’s NaaS solution works with Cloudflare and brings DNS security into network infrastructure, consolidating multiple vendors and protecting customers in a totally new way all through the Meter Dashboard. This solution empowers Meter customers to manage network team operations efficiently and enforce strong security policies across offices, schools, warehouses, and more.
Meter DNS Security enhances security by blocking access to known malicious websites, bolstering network performance, and optimizing DNS response times. It puts organizations in a position to protect students, employees, customers, and more by bringing control front and center to the Meter Dashboard. In schools, for example its content filtering capabilities ensure a safe browsing environment by filtering out inappropriate content, while in warehouses it boosts performance by restricting high-bandwidth sites that slow down activity.
Nile Access Service
Nile Access Service delivers campus wired and wireless LAN as a cloud-native service, powered by a new approach to enterprise AI networking that is within reach for all businesses, whether they have five people or 50,000.
This model combines cloud-native software delivery, AI and automation, zero trust networking security, and custom-built wired, wireless, and sensor network infrastructure in an "as-a-Service" offering. Unlike legacy Network-as-a-Service products, Nile Access Service was built from the ground up with powerful AI applications to automate and orchestrate traditionally manual network operations.
It offers a standardized system design, a single data store, and an integrated software stack to deliver guaranteed performance, coverage, capacity, and availability for wired and wireless LAN connectivity.
Networking – SMB
Aryaka Unified SASE-as-a-Service
Aryaka's Unified SASE-as-a-Service leverges four design elements: Aryaka OnePass Architecture, which enables distributed policy enforcement through a distributed data plane, unified control plane and single management pane; Aryaka Zero Trust WAN, which traverses Aryaka's global private network backbone in over 100 countries; comprehensive networking, security and observability, including the Aryaka SmartSecure next-generation firewall with secure web gateway, anti-malware and intrusion prevention system; and flexible delivery that allows businesses to choose their preferred delivery (Aryaka or third-party) and implementation (managed, co-managed or self-managed).
Customer benefits include reduced network attack surface and risk with integrated network security, and cost-effective network performance, security and operations due to "as a service" economics, flexibility and simplicity.
Zyxel Networks XMG1930-30HP 24-Port 2.5G Multi-Gig Lite-L3 Smart Managed PoE++/PoE+ Switch with 6 10G Uplinks
Zyxel Networks XMG1930-30HP 24-Port 2.5G Multi-Gig Lite-L3 Smart Managed Switch with 6 10G Uplinks is a cloud-managed, PoE multi-Gigabit switch with a cost-per-port below $50. XMG1930-30HP not only makes multi-Gigabit networking affordable for small- and medium-sized businesses, but also makes it affordable to deploy WiFi 7.
XMG190-30HP provides the multi-Gigabit capability required to realize WiFi 7 speeds on the network and PoE++ (802.11bt) enables the switch to support access points like Zyxel's WBE660S WiFi 7 that provides a high number of spatial streams. XMG1930-30HP is equipped with 24 2.5G multi-Gigabit ports and provides six 10G uplinks that support fiber or copper infrastructures, enabling service providers to upgrade customers' network speeds from 1G to 2.5G without re-cabling and provide extensibility and resilience for network expansion. A 700W power budget enables XMG1930-30HP to support a wide range of PoE devices.
Networking – Wireless
Cisco Spaces (“AP Auto Locate” Feature)
AP Auto Locate introduces a groundbreaking feature that empowers customers to precisely locate access points at the campus, building, and floor level, revolutionizing the management of wireless AP networks on a large scale. AP Auto Locate utilizes a sophisticated building clustering algorithm combined with powerful digital maps to categorize APs into specific buildings within a campus environment. Once APs are identified within their respective buildings, the system seamlessly transitions to the floor clustering algorithm, meticulously determining the exact floor where the desired APs are located on digital maps, which are auto-scaled, auto-oriented on a world map and fully geo-referenced.
Fortinet FortiAP-441K
FortiAP 441K is a comprehensive secure networking solution integrated with Wi-Fi 7 that delivers increased speed and capacity. The new FortiSwitch T1024 is purpose-built with 10 Gigabit Ethernet (GE) access and 90W Power over Ethernet (PoE) technology to support Wi-Fi 7 bandwidth requirements.
These new devices deliver the cutting-edge wireless performance today's enterprises need and, as a part of Fortinet's Secure Networking solutions, seamlessly integrate with AIOps and FortiGuard AI-Powered Security Services for security, visibility, and control.
Enterprises are eager to embrace the increased speed and bandwidth of Wi-Fi 7 to support data-heavy applications and wireless devices in their networks. With FortiAP-441K organizations can take advantage of Wi-Fi 7's increased throughput while keeping wireless traffic secure and their business efficient.
Zyxel Networks WBE660S BE22000 WiFi 7 Triple-Radio NebulaFlex Pro Access Point
Zyxel Networks says the WBE660S BE22000 WiFi 7 Triple-Radio NebulaFlex Pro Access Point is the first WiFi 7 access point with a Smart Antenna for MSPs and SMBs. WBE660S combines the most advanced WiFi standard with the most advanced antenna technology to deliver an outstanding WiFi experience in high-density environments such as offices, classrooms, and airports.
While Smart Antenna technology intelligently shapes antenna patterns to mitigate interference, Zyxel's exclusive RF-first design incorporates Advanced RF Filter and Advanced Cellular Coexistence technologies to minimize interference from adjacent WiFi channels and 4G/5G mobile networks. The enterprise-grade WiFi 7 Access Point delivers speeds up to five times faster than WiFi 6/6E solutions, providing seamless, latency-free connectivity to optimize high-bandwidth applications.
Power Protection and Management
CyberPower Smart App Sinewave Lithium UPS Series (PRL1500RT2UC and PRL3000RT2UC)
The Smart App Sinewave Lithium UPS series is the next generation of cloud-enabled UPS systems for powering and protecting corporate, networking, and telecom applications. Lithium battery backup technology translates to lighter weight, longer run times, and a product life of up to eight-to-10 years. Integrated PowerPanel Cloud technology makes it easy to monitor power status of the UPS and connected equipment from anywhere there is an internet connection.
Eaton 9PX 6kVA lithium-ion UPS
Eaton's 9PX 6kVA lithium-ion UPS features lithium-ion batteries, remote firmware upgrades and seamless integration with leading HCI and virtualization platforms, making it ideal for enterprise IT, edge computing environments, and light industrial, K-12 and higher education IT applications.
The larger power rating and extended battery life allows for a "set-it-and-forget-it" approach that requires little on-site support from IT staff, data center professionals or maintenance personnel. By providing warning of pending issues and helping to perform orderly shutdown of servers and storage, the integrated network interface card improves power system reliability.
Schneider Electric EcoStruxure IT
Schneider Electric's comprehensive data center infrastructure monitoring (DCIM) solution, EcoStruxure IT, ensures business continuity by enabling secure monitoring, management, insights, planning, and modeling – from a single IT rack to hyper-scale IT, on premises, in the cloud and at the edge.
The EcoStruxure IT for Partners platform enables solution providers to deliver value through a multi-tenant, cloud-based monitoring solution. It provides vendor-neutral visibility into their customers’ IT infrastructure across multiple sites delivering actionable insights, building customer intimacy, improving their operations and unlocking new, recurring revenue streams. The end-user target market includes SMB, enterprise and colocation/hyperscale data centers, IT and data center managers and IT operations teams.
SD-WAN
FortiGate Rugged 70G with 5G Dual Modem, powered by Fortinet Secure SD-WAN
Fortinet's Secure Networking strategy integrates an organization's network infrastructure and security architecture, enabling networks to transform at scale without compromising security. This next-generation approach provides consistent security enforcement across flexible perimeters by combining NGFW with secure SD-WAN.
FortiGate Rugged 70G with 5G Dual Modem delivers industry-leading Secure SD-WAN in a ruggedized, compact form factor. This appliance is explicitly built to deliver enhanced secure networking capabilities and 5G connectivity to OT environments. Backed by the fifth-generation Fortinet Security Processing Unit, the solution provides unparalleled networking performance, cutting-edge FortiGuard AI-Powered Security Services, and high availability through a 5G dual modem.
It addresses a variety of use cases, including the deployment and management of remote ATMs, which are often installed in challenging environments like stadiums, malls, or outdoors. The banking industry can elevate remote ATM networks, seamlessly scale across thousands of locations, and develop new services with minimal infrastructure investment.
Zscaler Zero Trust SD-WAN (SASE)
Zscaler Zero Trust SASE builds on the industry's leading AI-powered security service edge (SSE) platform with a fresh approach to SD-WAN that securely and reliably connects users, locations, and cloud services via the Zscaler Zero Trust Exchange. Zero Trust SASE provides least-privileged access for users, devices, workloads, and business partners in managed offices, eliminating the need for complex and costly network-based security that fails to prevent security breaches. Remote workers, who are already cared for with the Zscaler Client Connector on their devices, represent only a fraction of a customers' total attack surface. Zscaler SASE adds Zero Trust SD-WAN access through a virtual or physical gateway for workloads, IoT/OT devices and business partners at managed locations.
Security: Cloud and Application Security
Cisco Multicloud Defense
Cisco Multicloud Defense protects cloud environments using a centralized software as a service (SaaS) control plane and platform as service gateways. The gateways serve as enforcement points for cloud network traffic, bringing firewall, IDS/IPS, URL filtering, FQDN filtering, web application firewall, DLP, and antivirus capabilities together into a single solution to protect workloads across complex environments. Multicloud Defense also delivers security in a cloud native way by using tag-based policies, including APIs, Terraform, auto-scale, and more, to keep security controls up to date as environments change.
CrowdStrike Falcon Cloud Security
CrowdStrike is a leader in modern cloud security and protecting organizations of all sizes and maturities against cloud threats. With CrowdStrike Falcon Cloud Security, CrowdStrike delivers a complete cloud native application protection platform (CNAPP) with unified agent and agentless protection. CrowdStrike Falcon Cloud Security protects the entire cloud estate with integrated cloud workload protection (CWP), cloud security posture management (CSPM), cloud detection and response (CDR), cloud identity entitlement management (CIEM), and application security posture management (ASPM).
With its recent acquisition of Flow Security, the product will soon feature data security posture management (DSPM) to deliver complete visibility and protection from code to application, from device to cloud.
Lacework Code Security
With millions of lines of code that are constantly being reused, forked, and updated, how can teams effectively secure their code and protect their systems, data, and reputations? Lacework Code Security enables customers to prevent third-party and first-party code risks from getting into the wild, and rapidly find and fix risks at the source as developers write and commit code. By connecting code with cloud telemetry, companies can use data to measure each vulnerability in terms of relative risk to their unique environments.
Lacework Code Security arms professionals with added context and correlation, supplying users with stronger security outcomes at an accelerated rate and cutting back on unnecessary working hours. This consolidated approach saves security professionals hours of fixing orphaned code and code with no attack path, instead providing teams with end-to-end visibility and insight from code origin through runtime.
Orca Cloud Security Platform (CNAPP)
Orca is a pioneer in agentless cloud-native security, trusted by hundreds of enterprises globally. Its patented SideScanning technology provides deep and wide visibility into risks and compliance issues across 100 percent of cloud workloads, configurations, and identities. After a quick and easy one-time deployment, Orca surfaces the most critical risk combinations so these can be addressed first, and helps companies provide complete cloud security from code to runtime and back.
Orca is trusted by innovative organizations across the globe that range from startups to Fortune 500 companies. Orca's ideal customer varies depending on the business need and buyer persona, and includes security practitioners (cloud security engineers, cloud security architects and SOC analysts); executives (CISO, CTO, VP/director of security); DevOps/ITOps managers (DevOps engineer, DevSecOps manager, cloud platform engineer, cloud platform architect); and governance, risk and compliance staff .
Palo Alto Networks Prisma Cloud (Darwin Launch)
Palo Alto Networks (Darwin Launch) for Prisma Cloud delivers an integrated Code-to-Cloud intelligence platform that connects insights from the developer environment through application runtime for security teams to contextualize alerts and pinpoint remediations.
Major updates include a code to cloud dashboard: Unified visibility, control and reporting into the entire application lifecycle; code to cloud vulnerability management that identifies vulnerable software packages across the application life cycle and traces each risk back to the source; and code to cloud remediation, which prioritizes risks and prevents problems from returning by suggesting precise fixes in the code with pull requests.
Other updates include AppDNA, which uses application context to classify risks, accelerate root cause analysis and undertake remediation steps; Infinity Graph, which identifies relationships between risks, apps and infrastructure to prioritize weaknesses that adversaries may exploit to compromise cloud applications; and cloud discovery and exposure management to discover, evaluate and mitigate unknown and unmanaged internet exposure risks in cloud environments.
Qualys TotalCloud2.0
Qualys TotalCloud is a CNAPP (Cloud Native Application Protection Platform) that provides unified vulnerability, posture, and threat management for cloud infrastructure and SaaS applications. The product creates a single unified view of risk, which reduces the work companies must do since they can focus their remediation efforts on the risk that matters most. The product reduces the cost of ownership as it is a single tool for risk mitigation that would normally require several tools. This product is primarily intended for the enterprise sector of the market across all industries.
Snyk AppRisk
Snyk AppRisk is an Application Security Posture Management (ASPM) solution that empowers AppSec managers by minimizing risk and improving developer productivity. Snyk AppRisk delivers automated application asset discovery, tailored security controls and risk-based prioritization.
The ASPM solution allows for seamless collaboration between developer and security teams to better address cybersecurity challenges, while also providing C-Suite stakeholders with visibility into software supply chain risk posture.
Snyk AppRisk also complements the Snyk Developer Security Platform by providing a holistic, developer-first ASPM workbench that aims to improve the overall security posture for developers so they can focus on fixes that reduce the most critical business risks.
Tenable Cloud Security
Tenable Cloud Security is a unified, identity-centric, cloud-native application protection (CNAPP) solution. Tenable Cloud Security continuously analyzes all cloud resources across infrastructure, workloads, data, identities and applications to discover the most important risks, spot unknown threats and deliver actionable insights within hours.
Best-of-breed cloud entitlement management (CIEM), cloud workload protection (CWP) and vulnerability management combined with robust security posture management for cloud (CSPM), Kubernetes (KSPM) and Infrastructure as Code (IaC), reduce the cloud attack surface, automate reporting, and facilitate zero trust and least privilege at scale.
The easy-to-use interface and quick time to value can address the security needs of businesses at all sizes, regardless of where they are in their cloud journey. Key market segments include companies focused on using public cloud infrastructure to scale business velocity. Target verticals include financial services, retail, and technology companies.
Security: Data Security
BigID AI Remediation Recommendations
BigID's AI Remediation Recommendations equip security teams with intelligent recommendations to swiftly and decisively respond to their biggest data risks, from dealing with insider threats to elevating their data security posture management. Organizations are armed with actionable recommendations that help increase security posture, enable security teams to make the right decisions based on the data, and mitigate the risk of manual errors and disruptions.
Organizations will automatically get immediate, informed guidance when addressing critical data risks to accelerate remediation and reduce the window of vulnerability. Security teams can leverage in-app recommendations on the most optimal course of action based on the context of the data, including sensitivity, location, accessibility, and past actions. And security teams can pinpoint the right steps to reduce data risks promptly, minimizing guesswork and mitigating human error to prevent disruption and maintain business continuity.
Deep Instinct Prevention for Storage
Deep Instinct Prevention for Storage (DPS) applies a prevention-first approach to cybersecurity, filling gaps in data security using a deep learning framework. Files added or changed in NAS or cloud storage environments, even large volumes, are scanned in real time without impacting system performance. Malicious files are eliminated or quarantined, pre-execution, before harm can be done.
DPS provides a holistic approach to storage security across on-premises and public clouds. This is crucial as the amount of data being stored in these environments grows exponentially. While cloud vendors protect the storage itself, they do not ensure the integrity or safety of files stored as DPS does.
Forcepoint ONE Data Security
Forcepoint ONE Data Security is a fully cloud-native data loss prevention (DLP) solution designed for the modern distributed enterprise. An essential component of Forcepoint's data-first SASE architecture, Forcepoint ONE Data Security offers simplified data security with unified enforcement across all key channels including cloud applications, web, email, and endpoints.
The solution works to safeguard sensitive information, prevent data breaches, and ensure compliance with global privacy regulations, providing enterprises with simplified, industry-leading cybersecurity wherever data resides. With policy coverage for over 150 regions worldwide, Forcepoint ONE Data Security streamlines compliance and enhances productivity by increasing visibility and data control, while reducing the false positives and negatives often found with legacy solutions.
Sentra’s LLM-powered classification engine
Sentra's addition of LLMs into its data classification engine enables enterprises to accurately identify and understand sensitive unstructured data like employee contracts, source code and user-generated content to proactively reduce the data attack surface. It analyzes documents, emails, and other unstructured data sources with an understanding of contract clauses, expiration dates, and potential compliance issues.
For source code scattered across folders, it recognizes programming languages, identifies proprietary code, and ensures adequate protection of sensitive code. The LLM-powered classification engine offers data risk scoring that considers multiple layers of context, including data sensitivity, access permissions, user activity, data movement, and misconfigurations so security teams can understand, quantify, and prioritize risks while targeting remediation efforts.
Sentra's LLM classification engine is ideal for cloud-native enterprises and cloud-first organizations with vast amounts of data. Because Fortune 500 companies store most data in the cloud, the CISOs of these organizations are the target market.
Security: Email and Web Security
Abnormal Security QR Code Detector
Abnormal Security now provides capabilities to detect QR codes in emails and parse their corresponding links, strengthening protection against evolving email attacks.
The new models are designed to determine when an email contains a QR code within the body of the email or in image/PDF attachments. The platform parses the QR code's embedded link and employs NLP to detect topics, tone, and sentiment commonly associated with social engineering attacks, including urgency and formality.
These extracted signals are combined with Abnormal's behavioral analysis across the broader email and SaaS environment. The platform already analyzes tens of thousands of signals across these environments to understand normal business relationships and communication patterns, allowing it to pinpoint unusual (malicious) behavior.
Menlo Security Secure Cloud Browser
The Menlo Security Enterprise Browser solution is powered by the Secure Cloud Browser, which protects millions of enterprise users globally. The platform prevents phishing and malware attacks on any browser and any device across an organization's hybrid enterprise, while providing complete end-to-end visibility for users.
Beneficiaries of Menlo's products and services include C-level executives and IT professionals in mid-size to large enterprises across various industries including financial, retail, healthcare, and government. The Menlo AI-powered platform protects employees from zero-hour phishing, eliminates ransomware and malicious files, and allows Zero Trust access to all applications for contractors and BYOD users. It replaces costly VDI with streamlined workflow and a high ROI approach and even enables ChatGPT adoption while protecting sensitive data.
Serving 8 million active users daily, Menlo eliminates the browser attack surface for all users with a three-pronged goal: comprehensively manage the browser, protect the user, and secure access and data.
SlashNext Email+ Security
SlashNext Email+ Security is a multi-channel phishing protection platform for users across email, mobile and web messaging apps. The integrated cloud email service stops spear phishing, legitimate service compromise, BEC, QR-based phishing, smishing, social engineering and other human compromise attacks across popular messaging platforms including SMS, Slack, Zoom, Teams, Gmail and more.
The platform utilizes SlashNext's AI capabilities, its BEC Generative AI Detection and LiveScan to protect users from the latest generation of attacks including those spread via QR codes. SlashNext recently added new QR Code phishing protection to its platform, protecting customers from Quishing, QRLJacking and other scams distributed via malicious QR codes. SlashNext provides multi-channel quishing protection to block malicious QR Codes with 99 percent accuracy.
Trustifi Security Awareness Training Module
The Security Awareness training module is a threat simulation tool embedded in Trustifi's overall email security suite, which MSPs can offer to their end-customers. The module lets businesses train network users to recognize and avoid phishing attacks, then goes a step further to provide actionable strategies, analytics, and reports that help IT administrators evaluate the module's results and enhance the protection of their networks.
Through a series of false phishing attempts customized and launched by the IT administrator, the Security Awareness tool identifies users who are most vulnerable to phishing, allowing administrators to apply warning banners and training strategies to users who fall prey to the program's mock attacks. These campaigns can be conducted by the end-users' IT department or by the managing MSP itself, depending on the customer/MSP business model. Tests can be repeated and analyzed for effectiveness over time, documenting whether users have become savvier.
Security: Endpoint Security
Cisco Secure Endpoint
Cisco Secure Endpoint integrates prevention, detection, threat hunting, and response capabilities in a unified solution leveraging the power of cloud-based analytics. Secure Endpoint protects Windows, Mac, Linux, Android, and iOS devices through a public or private cloud deployment.
Cisco Secure Endpoint is a single-agent solution that provides comprehensive protection, detection, response, and user access coverage to defend against threats to endpoints. Secure Endpoint continuously aggregates data and events across extended networks, endpoints, mobile devices, servers, data centers, and virtual environments. It delivers visibility and control against malware and persistent threats across the full attack continuum before, during, and after an attack.
Secure Endpoint natively integrates with the newly introduced Cisco XDR, which amplifies security operations, accelerates responses, and empowers Security Operations Center (SOC) teams with AI-driven and proactive threat detection and response to dramatically reduce the mean time to detect and respond to threats.
ControlUp Secure DX
For IT teams that need to enforce security standards and mitigate risk, Secure DX is a real-time scanning, detection, and remediation solution for a more secure digital employee experience. Designed to enhance the security of Windows OS-based devices and applications, Secure DX enhances IT security by scanning and addressing vulnerabilities in real time, ensuring compliance and reinforcing desktop security. The impact is a safer, elevated digital employee experience aligned with organizational goals for robust cybersecurity and enhanced operational resilience.
Secure DX provides real-time detection to collect an inventory of OS and applications to find vulnerabilities, detect missing and outdated patches, and identify compliance risks on endpoint devices. It offers smart prioritization through an intuitive scoring system for remediation based on the exposure and risk to users, devices, and applications. And it provides continuous remediation for fixing misconfigured OSes and applications automatically with modern patch management when enrolling new devices or identifying new vulnerabilities.
ESET Protect Elite
ESET Protect Elite was introduced as a next-gen endpoint offering for businesses requiring all-in-one prevention, detection and response. Elite expands on existing ESET Protect subscription tiers for enterprises, SMBs, and channel partners with more sophisticated cybersecurity requirements.
As part of Elite, ESET introduced vulnerability and patch management for automatic and manual patching options for thousands of popular applications, such as Adobe Acrobat, Mozilla Firefox, and Zoom Client, and over 35,000 common vulnerabilities and exposures (CVEs). With centralized management from the cloud console, organizations can easily assess security risks and manage patches across the entire network, ensuring timely detection and remediation of the latest zero-day vulnerabilities.
Multitenancy functionality enables organizations to enjoy full visibility over the entire network yet be focused on a dedicated area. The Elite offering also includes multilayered endpoint protection with multi-factor authentication, server security, advanced threat defense, full disk encryption, mail security and cloud application protection.
Sophos Intercept X
Sophos Intercept X defends more than 300,000 organizations worldwide against advanced attacks with anti-ransomware, anti-exploitation, behavioral analysis, and other innovative technologies. It provides multiple layers of security for unparalleled protection against known and unknown threats.
New context-sensitive defenses in Intercept X are revolutionizing endpoint security. Defenses include Critical Attack Warning, launched in September 2023, which detects and notifies organizations of high-impact indicators of in-progress attacks, and Adaptive Attack Protection, also introduced in 2023, which automatically disrupts in-progress attacks, giving defenders valuable time to respond.
Intercept X is powered by threat intelligence from Sophos X-Ops and is part of the Sophos Adaptive Cybersecurity Ecosystem and shares real-time threat intelligence for improved detection, protection, and response.
Tanium Converged Endpoint Management (XEM)
Autonomous Endpoint Management (AEM) is an emerging product category from market researcher Gartner and Tanium is an early mover into this new market that converges endpoint domains (UEM, VM, DEX, etc.) and uses AI to automate endpoint management and security tasks.
Tanium's XEM converged endpoint management solution provides unified experiences to IT and security teams to equip them with instant real-time visibility and control. Tanium AI takes advantage of XEM's real-time capabilities to deliver a quantum leap forward to mitigate risks, manage environments, and remediate incidents before damage occurs.
Using the power of AI, Tanium boosts operator productivity with tailored recommendations to improve operations and security and to automate their implementation.
WatchGuard Advanced EPDR
WatchGuard Advanced EPDR, part of WatchGuard's Unified Security Platform architecture, is designed to empower MSPs and their security teams with advanced capabilities to manage and neutralize sophisticated threats on customer endpoints.
This new product that enhances the existing WatchGuard EPDR includes centralized Indicators of Compromise (IoC) management and search, discovery of advanced Indicators of Attacks (IoAs) aligned with the MITRE ATT&CK framework, and a remote shell for in-depth investigation and threat mitigation.
Aimed at enabling comprehensive endpoint-managed security services, WatchGuard Advanced EPDR facilitates attack surface reduction, automated detection and response, and proactive threat hunting. It offers MSPs the tools to build robust security operations, improve response efficiency, and scale managed security services according to their needs.
Security: Identity Security
1Password Enterprise Password Manager
1Password's leading enterprise password manager addresses the needs of today's hybrid workforce and ever-evolving threat landscape, enabling partners to help customers secure every sign-in while balancing robust security controls and employee productivity.
Key product functionalities include Digital Wallet to securely store credit/debit cards, banking information, and associated logins and fill them from any device or platform; 1Password Watchtower, which alerts users of compromised websites and vulnerable credentials so they can proactively stay secure; Travel Mode to remove sensitive data from devices when crossing boundaries and restore access with a click upon arrival; and Passkeys to save and sign in with passkeys across platforms and devices. Users also can unlock 1Password with a passkey (vs. account password and secret key).
BeyondTrust Identity Security Insights
In 2023, BeyondTrust introduced Identity Security Insights, a transformative cloud-native, data-driven identity security platform that goes beyond traditional Privileged Access Management (PAM) capabilities to protect identities and the underlying identity infrastructure in a holistic way. In a world where every identity can be privileged and under attack, Insights cuts through the complexity and helps organizations gain a unified understanding of its identity security posture across all environments including on-premises, cloud and SaaS.
The product also leverages machine learning to automatically correlate and contextualize identity data to surface threat detections and recommendations to harden identity security posture across the entire identity fabric. BeyondTrust customers not only effectively prevent and manage privileged access but can now detect when those privileges have been exploited or active identity-driven threats are present. From a single platform, users gain recommendations to improve identity security hygiene to remediate issues from the BeyondTrust PAM products.
ConnectWise Access Management
ConnectWise Access Management is a Privileged Access Management (PAM) solution that provides tools to secure, monitor, and control access across an environment without shared admin credentials. It streamlines the process for end-users facing user account control (UAC) prompts, allowing them to quickly request 'just enough access.' It empowers administrators with the agility to manually approve or deny these elevation requests or employ pre-configured rules for streamlined workflow automation. Furthermore, technicians can request credential-less administrator accounts to provide 'just in time' access to servers and shared machines without sharing credentials, thus enhancing security and efficiency.
Tailored to small to medium-sized businesses (SMBs), managed service providers (MSPs), and IT departments within larger organizations, ConnectWise Access Management addresses the intricate access challenges these entities frequently encounter, ensuring a fortified, efficient, and controlled access environment.
CyberArk Secure Cloud Access
New security controls for CyberArk Secure Cloud Access secure access to every layer of cloud environments, while causing no disruption or change to the way developers and others access cloud services.
New capabilities include the ability to identify IAM misconfiguration risks in multi-cloud environments, context-based automatic approval workflows for high-risk access to cloud services that can be easily customized to meet governance objectives via no-code identity orchestration and automation capabilities within the CyberArk platform, and integration with IT Service Management and ChatOps to facilitate greater adoption from engineers and allow cloud security teams to quickly and securely approve time-sensitive access requests in service outages.
The system also provides additional support for delegated administration, allowing for approvals to be addressed on a team or department level, and enables more multi-cloud deployments thanks to expanded coverage for just-in-time access to support short-lived infrastructure workloads.
Veza Access Control Platform
Veza's Access Control platform helps leading organizations answer security teams' most difficult question: Who can take what action on what data?
The platform is purpose-built for today's modern environments – its core functionality is to highlight the relationship between identities and data access to define the right controls for an organization. Veza has set out to solve the root cause of the identity security problem by allowing customers to see who has access to what, how long they have had that access, and why they have that access. With this clear picture, security teams can easily adjust levels of access for groups of people and individuals to ensure that folks only have access to the data and applications necessary for their job responsibilities. This is a core requirement for any organization that wants to significantly limit its risk.
Xage Multi-Layer Identity and Access Management
Xage's Multi-Layer Identity and Access Management solution brings defense-in-depth to every asset in every layer of operational technology (OT), IT, and cloud environments. This innovation pairs with Xage's existing multi-layer, multi-factor authentication (MFA) to stop attackers and insider threats from compromising critical assets, even if the attackers have stolen privileged login credentials.
With Xage, enterprises with complex, multi-layer and multi-site environments can easily create, manage, and monitor separate identities (e.g. login credentials) and access policies at each layer and site with different admins and IDPs to ensure that compromise can't spread laterally through an environment. With per-layer and per-device MFA challenges and automatic credential rotation, assets and identities stay protected. In addition, teams can reduce complexity in the access management flow for team personnel, and even for third-party contractors and vendors, all while improving the user experience and blocking attacks.
Security: Managed Detection and Response
Arctic Wolf Managed Detection and Response
Arctic Wolf Managed Detection and Response helps organizations address the effectiveness of their security operations by optimizing existing security tools for better prevention and then leveraging the Arctic Wolf Security Operations Cloud for storage, enrichment, and analysis of their data. The system adds external expertise to establish 24x7 monitoring that can quickly identify and respond to advanced threats, continually reviews an organization’s cybersecurity posture, and recommends strategic actions to harden their environment.
Each Arctic Wolf MDR customer receives, on average, less than one ticket per day, which is accompanied by precise remediation recommendations, effectively putting an end to alert fatigue. Arctic Wolf MDR's target market is organizations of all sizes and industries, particularly those lacking in-house cybersecurity expertise or resources.
Blackpoint Cyber Dark Web Monitoring
Blackpoint's Dark Web Monitoring solution empowers MSPs with visibility into the hidden risks of the internet, allowing them to inform their clients of risk and help them prevent breaches. The product presents the MSP/end user with data regarding discovered compromised domains or email addresses, reducing the threat actors' ability to compromise systems.
The solution features bi-weekly automated dark web scans that regularly scan up to 10 domains per customer and ensure timely detection of compromised information, unlimited ad-hoc dark web scans, the ability to run a dark web scan whenever necessary to address top-of-mind concerns, and e-mail alerts for newly discovered threats.
The service also provides detailed reports on compromised credentials, impacted domains, breach names, and discovery dates, and offers on-demand reports for regular updates, in-depth analysis, and record-keeping.
Cisco XDR
Cisco Extended Detection and Response (XDR) is an integrated and comprehensive security solution designed to facilitate and streamline the operations of Security Operations Centers by providing visibility and actionable insights across a broad security ecosystem, including networks, endpoints, email, cloud, and applications.
Cisco XDR simplifies threat detection and response processes through automation and machine learning to prioritize and combat sophisticated threats more efficiently, enhancing overall security resilience. It achieves a more unified security stance by integrating with a wide array of both Cisco's own and third-party security technologies, enabling teams to respond to incidents with greater speed, precision and confidence while reducing complexity and alert fatigue. Target customers are enterprises with existing Cisco security investments, organizations seeking a cloud-native XDR solution, organizations requiring advanced threat detection and response, and security-conscious organizations of all sizes.
CrowdStrike Falcon XDR Platform
The CrowdStrike Falcon XDR platform is a powerful, capable and innovative cybersecurity platform that delivers market-leading security to the endpoint and beyond within organizations of all sizes. Customers are consolidating with CrowdStrike because the AI-native CrowdStrike Falcon XDR platform brings industry-leading EDR outcomes to all key security domains and makes it easy to expand protection beyond the endpoint to defend cloud, mobile, identity and data using the same lightweight agent and command console.
Expel Vulnerability Prioritization
Expel Vulnerability Prioritization (VP) informs organizations about exploit risk associated with their vulnerabilities. It identifies the vulnerabilities that pose the greatest risk to their environment so SOC and IT teams can take immediate action.
Expel Vulnerability Prioritization assesses exploitability factors, real-world attack evidence, and social media sources to correlate data with context from the customer's business and asset prioritization. The VP service team escalates critical vulnerabilities that require additional research to perform further investigation and prioritizes the ones that require immediate action.
The service assesses the risk and potential impact of vulnerabilities against internal and external threat intelligence and what criminals are currently exploiting. The customer's exploit risk profile is provided with a timely, prioritized remediation list so the remediation guidance is actionable.
Huntress MDR for Microsoft 365
A single stolen credential or compromised account can be used to launch debilitating cyberattacks against modern, cloud-based infrastructures. Huntress MDR for Microsoft 365, a managed identity protection solution, secures Microsoft 365 users, applications, and environments with a team of security experts who quickly detect and respond to early signs of malicious hacker activity.
MDR for Microsoft 365 integrates with an organization's Microsoft Cloud environment, collecting user, tenant, and application data, which the Huntress SOC enriches using organic and external threat feeds to supply contextualized threat detections and actionable remediations. Purpose-built for Microsoft 365 cloud environments, Huntress MDR for Microsoft 365 offers world-class mail security that defends identities from account takeover attacks such as business email compromise (BEC). The system monitors and responds to suspicious login activity, email tampering and forwarding, and privilege escalation attempts.
Secureworks Taegis ManagedXDR
The Secureworks MDR solution, Taegis ManagedXDR, delivers 24/7 holistic threat monitoring, detection, investigation, and response with direct access to security operations experts. The solution is delivered via the Taegis XDR platform, which continuously gathers and interprets telemetry from native and third-party sources, including endpoints, networks, cloud, identity, and other business systems, and harnesses the latest advancements in AI, ML, and data analytics to stay ahead of the rapidly evolving threat landscape.
Hundreds of AI models leverage the Secureworks proprietary data set and thousands of investigation hours to perform automated detections, prioritize threats, and draft incident summaries. In the last year Secureworks leveraged AI to reduce alert noise and increase the triage productivity for SecOps analysts by 100 percent. Taegis ManagedXDR enables customers to accelerate their security maturity and reduce overall risk by combining the speed and scalability of an AI-powered XDR platform with the knowledge and oversight of deep human expertise.
Sophos Managed Detection and Response
Sophos MDR is a 24/7 service delivered by experts who detect and respond to cyberattacks targeting customers' computers, servers, networks, cloud workloads, email accounts, and more. The service can be delivered using Sophos' integrated portfolio or through a vendor-agnostic, bring-your-own-technology model.
In July 2023, Sophos released Sophos MDR for Microsoft Defender to provide threat detection and response for Microsoft environments. Unlike other MDR services that limit support to Microsoft Defender for Endpoint or Sentinel, Sophos MDR leverages data from the full Microsoft Security suite, including its solutions for identity, cloud, endpoint, SIEM, and more.
Sophos is a major global provider of MDR with over 20,000 customers, representing organizations across industries and ranging from large enterprises to SMBs. Sophos MDR is the highest rated and most reviewed service on Gartner Peer Insights, was named Gartner Customers' Choice, and is a G2 Leader and a top performer in the MITRE ATT&CK Evaluations for Managed Services.
Security: Network Security – Enterprise
Armis Centrix
Armis, the asset intelligence cybersecurity company, protects the entire attack surface and manages the organization's cyber risk exposure in real time. Armis Centrix, the Armis cyber exposure management platform, is powered by the Armis AI-driven Asset Intelligence Engine, which sees, protects and manages billions of assets around the world in real time.
Armis Centrix is a seamless, frictionless, cloud-based platform that proactively mitigates all cyber asset risks, remediates vulnerabilities, blocks threats and protects the entire attack surface. Armis Centrix protects all critical assets 24/7 across all verticals and industries including manufacturing, health and medical, information technology, energy and utilities, financial services, transportation, telecommunications and media, public sector and more.
Cisco Cyber Vision
Industrial organizations need to protect operational (OT) networks from cyberthreats to maintain production uptime and comply with ever more stringent regulatory requirements (TSA, DHS, NERC-CIP, etc). Cisco Cyber Vision gives IT and security teams comprehensive visibility into OT assets, their vulnerabilities, their activities, and any cybersecurity posture, so they have the context to drive cyber hygiene in industrial networks and protect operations through network segmentation and access control policies that will not disrupt operations.
Cisco Cyber Vision is a software solution that understands proprietary communications protocols used in industrial networks such as manufacturing, utilities, roadways, rail, oil and gas, and more. It combines protocol analysis, intrusion detection, and behavioral analysis to inventory all connected OT assets, profile them, and detect their vulnerabilities and anomalous behaviors. This information is shared with IT security tools, giving security analysts a unified view across IT and OT domains.
Fortinet FortiGuard Attack Surface Security Service
Developed by FortiGuard Labs, the FortiGuard Attack Surface Security Service helps Security and IT teams proactively identify, assess and monitor assets – IT/IoT and OT – and associated security controls and risks across their environment.
The service provides a consolidated view of the organization's security posture and adherence to Fortinet Security Best Practices/CIS Controls/PCI DSS, their integration with – and optimization of – the Fortinet Security Fabric, and their level of network optimization. The FortiGuard Attack Surface Security Service is effectively a lightweight Cyber Asset Attack Surface Management or CAASM tool that is integrated into Fortinet FortiGate solutions. The service greatly reduces what would be significant manual or homegrown efforts to perform a similar function by staff and helps security and IT teams move into a more proactive security footing when it comes to assets and risk to their organizations.
Infoblox BloxOne Threat Defense – SOC Insights
Infoblox's DNS Detection and Response (DNSDR) solution, BloxOne Threat Defense, expanded its leading AI-driven analytics with the launch of SOC Insights. SOC Insights turns vast amounts of event, network, ecosystem, and unique DNS intelligence data into a manageable set of actionable insights to stop attacks before they occur, raise the ROI of the existing security stack, and elevate overall efficiency.
Each insight provides easy access to device, event, and attacker infrastructure details and Infoblox's unique DNS intelligence data. SOC Insights empowers analysts to jump-start investigations into the events that truly matter most and reduce MTTR by eliminating wasted time and providing actionable guidance and easy access to enriched data pivot capabilities. SOC Insights' primary target audience is the MSSP market, reaching sales and channel partners globally.
Palo Alto Networks Strata Cloud Manager
Palo Alto Networks takes a fundamentally different approach with Strata Cloud Manager, an AI-powered Zero Trust management and operations solution. It revolutionizes network security management and operations, proactively preventing network disruptions and strengthening security in real-time across all enforcement points. Security teams can achieve comprehensive visibility and management for all deployments in a single user interface, strengthen security in real-time, and predict and prevent network disruptions.
The target market is enterprises, SMBs and MSSPs with a network security system. Specific use cases include net-new Palo Alto Networks customers that don't need an on-premises management solution and SASE customers who want to expand or connect to a data center.
SonicWall NSsp Series
SonicWall NSsp Series delivers industry-leading performance and high port density with lowest cost of ownership in its class. NSsp Series, built on award-winning hardware and powered by SonicOS 7, protects medium and large, distributed enterprise networks with comprehensive, integrated advanced security services like malware analysis, encrypted traffic inspection, cloud application security, DNS and content filtering, and other services.
This firewall series delivers centralized management using a single interface and intuitive dashboards to significantly improve security teams’ operational efficiency, policy consistency and ease-of-management. It also includes advanced networking features such as HA, SD-WAN, dynamic and virtual routing. Now medium and distributed enterprises in high security industries including financial services, healthcare, government, retail and education organizations can get high performance, networking, and security capabilities from their firewalls despite budget constraints.
Security: Network Security – SMB
Zyxel Networks USG FLEX 700H Security Firewall Appliance
Zyxel Networks USG FLEX 700H Security Firewall Appliance is a Unified Threat Management (UTM) firewall that delivers 2.5G WAN performance for under $2,000. As multi-gigabit Internet becomes more widely available to SMBs, USG FLEX 700H makes it feasible for businesses to harness that performance while maintaining uncompromised high-speed network security.
The high-performance firewall combines ultra-fast firewall/UTM/VPN throughput, powerful multi-gigabit and PoE+ interfaces, and advanced best-of-breed network security to provide multi-layered protection against cyber threats. It supports enhanced SecuExtender to extend enterprise-grade security to remote networks while providing a 30W PoE power budget option that simplifies deployment of devices such as WiFi 6E access points, IP Cameras, VoIP Phones and 5G routers.
Security: Security Operations Platform
Adlumin Ransomware Prevention
Adlumin's new Ransomware Prevention feature immediately detects and stops ransomware from encrypting files. In benchmark tests against malware from some of the world's most notorious ransomware groups, including Black Basta, Conti, Ryuk, NoEscapeLocker, and others, Adlumin Ransomware Prevention saved, on average, 99 percent of the file system from encryption.
In addition to the launch of Adlumin's Ransomware Prevention feature, the company also introduced a Ransomware Simulation Tool. This complementary offering allows any organization to test its ransomware defenses. The self-service tool deploys mock-up data and files onto an organization's system, launches a ransomware attack against them, and provides a grade that details how well the organization's defenses performed. This synthetic attack is isolated to the mock-up files, which the Adlumin tool then cleans from the file system.
Exabeam Threat Center and Exabeam Copilot
Built on Exabeam's Security Operations Platform, Threat Center is a unified workbench that simplifies analysts' workflows through enhanced TDIR capabilities with advanced AI and automation. Threat Center provides analysts with a comprehensive view of threats enabling them to perform investigations and remediation from a single platform, saving time and increasing efficiency. Embedded within Threat Center, Exabeam Copilot employs generative AI to provide clear threat explanations and actionable insights that help analysts in their decision-making process.
Palo Alto Networks Cortex XSIAM 2.0
Cortex XSIAM (extended security intelligence and automation management) is the AI-driven security operations platform for the modern SOC, harnessing the power of AI to simplify security operations, stop threats at scale, and accelerate incident remediation. It reduces risk and operational complexity by centralizing multiple products into a single, coherent platform.
XSIAM unifies security operations functions including EDR, XDR, SOAR, ASM, UEBA, TIP, and SIEM. It centralizes all security data and uses machine learning data models designed specifically for security. Organizations can automate data integration, analysis, and response actions, enabling analysts to focus on the incidents that matter and allow them to work on threat hunting and proactive threat intelligence.
Securonix EON for Unified Defense SIEM
Securonix EON is a new suite of AI-reinforced capabilities for the Unified Defense SIEM platform, a solution that provides enterprise organizations with 365 days of 'hot' data. Unified Defense SIEM pushes the boundaries of what's possible in threat detection content and user experience with a seamless TDIR experience, all in a single platform.
Securonix EON adds the scale of Amazon Bedrock to the powerful Snowflake backend and unified user experience, offering new features that include Insider Threat Psycholinguistics, Adaptive Threat Modeling and InvestigateRX. The evolution of Securonix Unified Defense SIEM is based on a revolutionary approach to AI-reinforced CyberOps that incorporates AI across all layers of the platform for precise security decision making. It's built on three key principles: AI-reinforced capabilities, cybersecurity mesh, and frictionless experience. These capabilities are being rolled out to all Securonix customers to address the cyber risks modern enterprises face.
Sevco Security
To proactively manage security threats and threat exposure, organizations must focus on uncovering and managing vulnerabilities before they inevitably become a serious security risk. That is why in August 2023, Sevco launched new vulnerability hunting capabilities that provide CISOs and security teams with the tools needed to proactively find and remediate vulnerabilities across their attack surface.
Powered by a patented asset correlation and visualization engine, the Sevco Security platform helps organizations protect the modern attack surface by delivering end-to-end visibility into all their assets and the security controls that should be protecting them. To do this, Sevco integrates with existing IT and security tools via an API approach to pull data into its platform, delivering a comprehensive, accurate, real-time aggregated and deduplicated asset inventory. This data helps security teams make better, more informed decisions to close security gaps and uncover new or misconfigured assets.
SonicWall Network Security Manager
SonicWall Network Security Manager, a multi-tenant, centralized firewall management solution, delivers operational efficiency by orchestrating all firewall operations error-free using auditable workflows. Reporting and analytics capabilities provide single-pane visibility and lets users monitor and uncover threats by unifying and correlating logs across all firewalls. Network Security Manager also helps with compliance by allowing consistent policy enforcement across firewalls and providing granular reporting and detailed audit trails of every configuration change.
The solution is scalable to accommodate networks with hundreds of firewall devices deployed across multiple tenants and locations. Network Security Manager eliminates management silos and facilitates rapid deployment of VPN and SD-WAN networks. This solution is available as a SaaS application or can be deployed on a public cloud or on-premises. It also supports any firewall operating system from older to newer versions. Network Security Manager caters to MSSPs, MSPs, small, midsize, large, and distributed enterprises.
WatchGuard Cloud
WatchGuard Cloud is the centralized management interface for WatchGuard's Unified Security Platform architecture, providing a "single pane of glass" experience for administration, operational automation, deep visibility, and advanced reporting across WatchGuard's product portfolio. Built from the ground up to support and enable MSPs, it allows IT solution providers to deliver enterprise-grade security services for small and midsize businesses while eliminating infrastructure costs, accelerating customer acquisition, delivering infinite scalability via multi-tier, multi-tenant capabilities, and minimizing time spent on reporting and operational tasks.
Security: Security Service Edge
Barracuda SecureEdge
Barracuda SecureEdge is a secure access service edge (SASE) solution that helps make hybrid and remote work easier to secure. Barracuda SecureEdge integrates Barracuda's Secure SD-WAN, Firewall-as-a-Service, Zero Trust Network Access, and Secure Web Gateway capabilities. Using a single-vendor solution enables businesses and MSPs to strengthen their security posture and reduce costs. Delivered as a service, Barracuda SecureEdge secures users, sites, and IoT devices, is easy to manage, and connects any device, application, and cloud/hybrid environment.
Cisco Secure Access
Cisco Secure Access (CSA) is an advanced cloud security service edge platform, built upon zero trust principles, offering secure and effortless connectivity from any device to any destination. It streamlines security by integrating a suite of core modules: Zero Touch Network Access, Secure Web Gateway, Cloud Access Security Broker, Firewall-as-a-Service, and Intrusion Prevention System. It also incorporates advanced multimode Data Loss Prevention, enhanced DNS security, Remote Browser Isolation, advanced sandboxing technologies, and Cisco Talos threat intelligence into a single cloud-driven platform allowing organizations to address a wide array of security concerns with ease.
Cisco Secure Access offers users frictionless access to the resources and applications they require, irrespective of the underlying protocol, port, or the degree of customization involved. This ensures that users can work unhindered while maintaining the highest standards of security and providing a protected environment for both data and users across an organization.
Fortinet FortiSASE
As a comprehensive cloud-delivered security service edge (SSE) service, FortiSASE safeguards users, devices, and off-site locations, including thin-edge locations with only Fortinet Access Points or Extenders. This Fortinet SASE solution features AI-powered services, a unified agent, unified management, and digital experience monitoring (DEM).
FortiSASE includes a high-performance and scalable cloud network along with top-tier SSE components such as Firewall-as-a-Service (FWaaS), secure web gateway (SWG), cloud access security broker (CASB), data loss protection (DLP), universal zero-trust network access (ZTNA), and sandboxing. FortiSASE ensures the utmost protection for work-from-anywhere (WFA) users, whether they are accessing the web, corporate applications, or SaaS applications.
Skyhigh Security Service Edge Portfolio
The Skyhigh Security Service Edge (SSE) portfolio protects sensitive data no matter where users are, what device they are using, or where their data resides – on the web, cloud, email, or private applications. The portfolio is cloud-native, architected with Zero Trust principles, and provides a common data loss prevention and policy engine.
Skyhigh SSE converges Secure Web Gateway, Cloud Access Security Broker, Skyhigh Private Access, and Remote Browser Isolation into a single platform, providing one of the most comprehensive portfolios in the market. By providing real-time data and threat protection against advanced and cloud-enabled threats, Skyhigh SSE safeguards data across all vectors and users. Enterprises across all sectors, from government agencies to financial institutions, look to Skyhigh Security to protect their data: Its customers include nearly half of the Fortune 100 and more than a third of the Fortune 500.
Zscaler Zero Trust SASE
Zscaler Zero Trust SASE builds on the company's AI-powered security service edge (SSE) platform with a fresh approach to SD-WAN that securely and reliably connects users, locations, and cloud services via the Zscaler Zero Trust Exchange.
Zero Trust SASE provides least-privileged access for users, devices, workloads, and business partners in managed offices, eliminating the need for complex and costly network-based security. Remote workers with the Zscaler Client Connector on their devices represent only a fraction of our customers' total attack surface. Zscaler SASE adds Zero Trust SD-WAN access through a virtual or physical gateway for workloads, IoT/OT devices and business partners at managed locations, requiring only an internet connection.
Storage – Cloud
Dell APEX Block Storage for Public Cloud
Dell APEX Block Storage for AWS and Azure is a deployment of Dell's PowerFlex software-defined storage in the public cloud. It's the most scalable, flexible, and reliable cloud block storage in the market today. It allows customers to experience the same benefits of enterprise-class storage services in the cloud as they appreciate on-premises. It provides higher performance, larger volume sizes and improved resilience than what is currently available in the public cloud.
Recently released is Dell APEX Navigator, a SaaS-based tool designed to securely deploy, configure, and manage APEX Block Storage, providing monitoring capabilities and seamless data mobility across multi-cloud environments. This solution is for IT, cloud and DevOps decision makers and ITOps leaders looking to extend to the public cloud and grow their multi-cloud environment. It's ideal for those who have performance issues, data mobility challenges, and lack a multi-cloud disaster recovery plan or have pre-committed cloud spend.
Infinidat InfuzeOS, Cloud Edition
InfuzeOS powers Infinidat's unique software-defined storage (SDS) architecture. It drives the performance, availability, cyber storage resilience, ease of use, and economic benefits of Infinidat storage platforms InfiniBox, InfiniBox SSA, and InfiniGuard. InfuzeOS' SDS architecture delivers powerful capabilities without dependence on proprietary hardware or components.
InfuzeOS Cloud Edition delivers InfiniBox platform experience on public cloud compute and storage resources. It is functionally equivalent to the on-premises InfuzeOS that enables InfiniBox platforms. Amazon Web Services is the first supported public cloud platform to deploy InfuzeOS Cloud Edition in a single node, allowing customers to deploy a full version of InfuzeOS that resides in their AWS environment. In May support for Microsoft Azure clouds was announced.
NetApp Google Cloud NetApp Volumes
Google Cloud NetApp Volumes is a fully managed, first-party service from Google Cloud built on NetApp ONTAP technology. Customers can seamlessly bring business-critical workloads across both Windows and Linux environments to Google Cloud, even for the most demanding use cases – all without refactoring code or redesigning processes.
Key capabilities include:
-Enterprise-grade, multiprotocol file shares with rich SMB and NFS protocol support for the most demanding Windows or Linux workloads, including Google Cloud's only storage service to support protocols such as SMB and NFSv4.1 (and v3),
-Support for instant capacity additions or changes between performance tiers – without downtime – resulting in the ability to balance investment/performance in real-time,
-Built-in data protection that creates efficient, block-level incremental backups that don't impact uptime or performance while meeting RTO/RPO parameters to ensure optimum application availability.
Titan Cloud Storage, S3-Compatible Cloud Storage
Titan Cloud Storage’s S3-compatible cloud storage provides multi-region, redundant, fully encrypted S3-compatible, hot-cloud storage, including features such as ransomware protection and immutability versioning, botnet tracking, and bad actor blocking. All object storage includes unlimited API calls and free egress (up to 3x). Titan Cloud Storage maintains SOCII, PCI, HIPAA, and ISO27001 compliances to meet regulatory requirements. Titan provides these services explicitly within the channel at competitive price points and is vertically agnostic with an emphasis on security, legal, medical, retail, financial and AI industries.
Storage – Enterprise
Dell PowerScale (OneFS 9.8 software, F210 & F710 all-flash lineup)
Dell PowerScale OneFS is a software-driven, scale-out file storage platform that is purpose built for AI. Dell’s all-flash lineup (F210 and F710) combined with the latest OneFS 9.8 software release delivers new levels of performance, flexibility, security, and efficiency. The F210 is the optimal platform for performance with small capacity requirements whereas the F710 offers a balance of high performance and greater capacity.
Key features include GPU direct, non-disruptive scaling, multi-tenant capabilities, universal data access with multi-protocol support, federal-grade security and 6x9s availability. Additionally, PowerScale simplifies an organization's journey to the public cloud by integrating with AWS and Azure using Dell APEX File Storage with software-defined OneFS as-a-Service. The solution delivers a consistent on-premises experience and interoperability across cloud and cloud-adjacent environments to power AI anywhere on data everywhere.
Dell PowerStore 3.6
Dell PowerStore is an enterprise class all-flash solution designed to meet any storage requirement. It's delivered with an adaptive architecture, intelligent automation, cloud integration, clustering support, scalable performance and an efficient 4:1 no assessment guaranteed data reduction rate that lowers capex/opex and increases storage utilization. All-inclusive data services include immutable snapshots that prevent tampering, QoS, DevOps integrations, an HA dual-active controller design, and scale up/out with expansion enclosures.
PowerStore also features robust cybersecurity and data protection capabilities, including support for Multi-Factor Authentication for PS Manager and REST API using RSA SecurID. It also complies with STIG requirements that follow the US Federal Security Technical Guide conditions, provides 3rd-party certificate imports for VMware VASA provider, metro synchronous replication for DR and native integration with Dell PowerProtect.
MinIO Enterprise Object Storage
The MinIO Enterprise Object Store is a distinct binary that is designed for the challenges associated with large scale AI data infrastructure. It has six core features that are each designed for deployments where the standard is measured in billions of objects, thousands of drives and hundreds of servers. The features include MinIO-specific implementations of observability, key management, data firewall, DRAM caching, namespace search and a global console that lets customers view all their MinIO deployments and manage every MinIO feature - from the public cloud, private cloud, colocation and edge. The Enterprise Object Store is only available to commercial customers.
Nexsan Unity NV6000
The Nexsan Unity NV6000 is a versatile enterprise-class unified storage system tailored for SMEs, adept at managing diverse workloads and providing flexible options for immutable backup protection. Its unified architecture, supporting block, file, and S3 object storage, along with multi-protocol support, delivers the compatibility to handle diverse mixed workloads efficiently.
The Unity NV6000 provides advanced immutable snapshot functionality, ensuring robust protection against data tampering and reinforcing data integrity. These snapshots, coupled with rigorous access controls and the optional integration with Nexsan Assureon, provide a formidable defense against cybersecurity threats. It also incorporates FASTier Caching to significantly boost performance, and its dual-active controllers offer high availability and data redundancy, minimizing the risk of downtime. The Unity NV6000 is ideal for SMEs seeking a reliable and secure unified storage solution that demands high reliability and data protection.
Quantum ActiveScale Z200 All-Flash Object Storage
Quantum's ActiveScale Z200 All-Flash Object Storage with Cold Storage capabilities combines advanced object storage software, high density all-flash servers, and hyperscale tape technology, providing an advanced solution for data lakes and storage clouds with high performance, durability, and storage efficiency.
The Z200 is a scale-out object storage architecture built for the AI era, 'always available' access and massive scale - efficiently storing billions of objects from terabytes to exabytes. The Z200 delivers up to 5X greater throughput (GB/s) and up to 9X more transactions (obj/s) to support high throughput ingest and AI pipelines. The solution is intended for organizations that require high-performance analysis, fast data retrieval, and long-term data preservation.
Unified Communications and Collaboration – Enterprise
Bright Pattern AI-Powered Interaction Analytics
Bright Pattern AI-Powered Interaction Analytics is a toolkit that uses AI to analyze call center interactions in real-time and provides functionality that builds on those capabilities. AI-Powered Interaction Analytics enhances customer intent, agent assistance, and quality management capabilities.
For customer intent, AI-Powered Interaction Analytics will monitor 100 percent of interactions on all channels and identify common topics brought up during interactions. For agent assistance, the tool can analyze an interaction in real-time and provide suggestions for how best to respond based on key business objectives set up by the supervisor. For quality management, the tool uses AI to auto-score agent interactions based on criteria custom set by the business, like how closely they adhere to a script or if they fulfilled business objectives.
Logitect Sight
Sight is a tabletop companion camera that pairs with Logitech Rally Bar or Rally Bar Mini to provide remote participants with a front-and-center view of in-person interactions, ensuring a more equitable meeting experience. Sight seamlessly frames and presents multiple active speakers, dynamically replacing and displaying individuals as they contribute to the conversation around the table. Meanwhile, the front-of-room camera overlays the front-of-room view of all in-room participants, providing a comprehensive and engaging view of the entire meeting.
Sight integrates with leading video conferencing platforms like Microsoft Teams, Zoom, and Google Meet, making it easy to connect hybrid teams. Easy deployment and management capabilities that provide a hassle-free experience with remote monitoring, updating, and troubleshooting are available through Logitech Sync, and enhanced support is available through Logitech Select.
RingCentral RingCX
RingCX is a native and proprietary AI-first contact center solution that's simple to use and easy to deploy. Available as a standalone product or integrated with RingCentral's unified communications platform, RingCX offers omnichannel capabilities across voice and digital in a single pane of glass. RingCX seamlessly connects with leading CRMs and workforce engagement management tools. AI-generated call summaries and conversational analytics turn agents into customer superheroes, freeing them up to handle more complex customer cases.
Built on RingCentral's secure and reliable global network, RingCX meets compliance standards for complex verticals. RingCX provides smarter customer experiences, with a lower total cost of ownership compared to traditional contact center options.
Zoom AI Companion
In September 2023, Zoom launched Zoom AI Companion, a generative AI assistant that helps users work more efficiently, empowers collaboration, and helps teams support their customers. Zoom AI Companion leverages a federated approach to AI, using both Zoom's own large language model and leading third-party models to provide high-quality results for users.
Zoom AI Companion is designed to be approachable and affordable so that more people can incorporate AI into their daily workflows and businesses don't have to choose who can access these capabilities. Since AI Companion launched, more than 510,000 Zoom accounts have enabled the AI assistant and used it to generate more than 7.2 million meeting summaries. Zoom AI Companion is for businesses of all sizes and is included at no additional cost for eligible paid users.
Unified Communications and Collaboration – SMB
8x8’s Proactive Outreach and Video Elevation for 8x8 Contact Center
Proactive Outreach and Video Elevation for 8x8 Contact Center enhances the customer experience by offering digital and video customer engagement channels to customers and contact center agents for faster issue resolution and enhanced experiences. The new solutions eliminate the reactive nature of customer service by leveraging 8x8 CPaaS programmable SMS, WhatsApp and video capabilities natively in 8x8 Contact Center.
Agents have the ability to send highly personalized, outbound messaging campaigns at scale, with inbound responses directly routing to agents or bots with full context and rich reporting. Agents can elevate customer interactions to video directly within 8x8 Agent Workspace, part of 8x8 Contact Center, allowing customers to visually help agents troubleshoot issues through their mobile devices for enhanced first contact resolution. By embedding 8x8 CPaaS functionality directly into 8x8 Contact Center, the solutions allow organizations to easily and seamlessly add video, enhancing customer engagement and driving business success.
Cisco Webex Customer Experience Essentials
Cisco Webex Customer Experience Essentials is an innovative contact center solution that seamlessly integrates calling and contact center functionalities within the Webex App. Designed for both agents and supervisors, it provides essential capabilities without the complexity of advanced solutions. It's ideal for Webex Calling customers across various sectors such as enterprise help desks, pharmacies, insurance agencies, and healthcare clinics seeking to enhance customer engagement.
At its core, the solution offers easy configuration via Webex Control Hub, real-time and historical data views, agent and queue management, and URL screen pops for efficient customer interaction. It empowers customer engagement teams beyond traditional contact centers, removing communication barriers and providing comprehensive analytics for data-driven decision-making.
Intermedia Spark AI
Spark AI is foundational, AI-powered technology that is intelligently and responsibly built throughout Intermedia's communications, collaboration, and contact center platform to help businesses achieve their full potential. By harnessing generative AI, large language models, and natural language processing, Intermedia SPARK AI is helping businesses both large and small enhance employee collaboration, efficiency, productivity, and customer care. Product solutions powered by SPARK AI technology include Intermedia Unite AI Assistant, AI Transcription Redaction, AI Sentiment Analysis, AI Interaction Summary, AI Call Transcription, AI Evaluator, and AI Meeting Notes & Action Items.
Nimble CRM Webforms
Nimble Web Forms offers an intuitive web form builder that enables users to create customized web forms seamlessly for integration into websites, social media, and emails. This new feature allows for easy embedding of forms on both company and personal websites. Even if an organization lacks a specific site for a form, Nimble ensures flexibility by allowing forms to be shared anywhere a link can go. This includes placement in social media posts, newsletters, emails, and beyond, ensuring the ability to gather information or feedback from a broad audience.
This product targets small to medium-sized businesses using Microsoft 365 or Google Workspace and seek to enhance lead generation and customer interaction processes without requiring an additional subscription to a 3rd-party web form product. Nimble Web Forms offers pre-made templates and the ability to create automatic contact creation and notification actions based on responses.
Virtualization/Virtual Desktop Infrastructure
Parallels DaaS
Parallels DaaS launched January 30, 2024, as a cloud-native solution for Desktop-as-a-Service (DaaS), granting users secure and immediate access to their virtual desktops and applications. Its unique architecture fortifies security and functionality; simplifies the administrative complexities of deploying, configuring, and maintaining a cloud environment; and offers an exceptional user experience accessible from any device with a modern HTML5-based web browser.
Administrators connect their company's Microsoft Azure subscription to host resources. They are then provided with an intuitive, simple, modern Web-based management portal for all Parallels DaaS configuration and management. At a glance they can see registered users, published resources, running virtual machines, and active user sessions, amongst other things.
Nerdio Manager for Enterprise: Unified Application Management (UAM)
Nerdio's Unified App Management (UAM) feature represents a pioneering leap for application management, promising simplicity and consistency across customer environments. Seamlessly integrating with Microsoft's robust frameworks, Nerdio's UAM is engineered to streamline app deployment, ensuring a uniform, secure, and up-to-date application landscape across diverse client bases.
With UAM, users experience simplified application deployment, keeping software current and environments secure. They enjoy a consistent user experience, delivering uniformity across clients while bidding farewell to the complexities of managing applications across different environments. UAM's multi-OS support, encompassing iOS, Android, Windows, and MacOS, ensures comprehensive coverage across a diverse array of devices, further enhancing its appeal and utility.