![AWS - logo](https://cdn.prod.website-files.com/60f18940cf1a8761850efb4b/6141f1b41e4d8f7c96421262_AWS.svg)
AWS native tools for security, AWS Well-Architected Framework
![Cato Networks - logo](https://cdn.prod.website-files.com/60f18940cf1a8761850efb4b/6619777321fd8d51790749b2_logo-cato.svg)
Secure access service edge (SASE), Firewall as a service, Cloud access security broker
![Cloudflare - logo](https://cdn.prod.website-files.com/60f18940cf1a8761850efb4b/66862b92f94a561d6e6dc9f8_logo-cloudflare-o.svg)
DDoS mitigation, SASE, SSE, ZTNA, SWG, CASB, WAF, DLP, CDN
![Crowdstrike - logo](https://cdn.prod.website-files.com/60f18940cf1a8761850efb4b/6597bd518b369b5ba1b50ab0_crowdstrike-logo-o.svg)
NGAV, EDR, SIEM, Cloud security, ITDR, Data protection
![Cybereason - logo](https://cdn.prod.website-files.com/60f18940cf1a8761850efb4b/668601e607d3951eac3f6430_logo-cybereason-y-o.svg)
Extended detection and response, Endpoint security, Mobile threat defense, Cloud workload protection
![Delinea - logo](https://cdn.prod.website-files.com/60f18940cf1a8761850efb4b/661973314a62414358814c39_logo-delinea.svg)
Privileged access management, Least privilege
![Exabeam - logo](https://cdn.prod.website-files.com/60f18940cf1a8761850efb4b/63297288df8005dd2ffb5556_Exabeam-logo-emblem-dark-010522.svg)
SIEM, User behavior analytics
![F5 Networks - logo](https://cdn.prod.website-files.com/60f18940cf1a8761850efb4b/632970191a824bf4b847a281_F5-Networks-logo.svg)
Application delivery controller, Web application firewall (WAF), Load balancer, Anty-DDoS
![Infoblox - logo](https://cdn.prod.website-files.com/60f18940cf1a8761850efb4b/661d35349efac6701bd62b62_logo-infoblox.svg)
DNS, DHCP and IPAM (DDI), DNS firewall
![Palo Alto Networks - logo](https://cdn.prod.website-files.com/60f18940cf1a8761850efb4b/60f578c9f8186ca081d09925_paloalto.svg)
Next-generation firewall, Cloud security posture management (CSPM)
![Wiz - logo](https://cdn.prod.website-files.com/60f18940cf1a8761850efb4b/66861d5193e28cbdb6a1ff0a_logo-wiz-o.svg)
CNAPP, CSPM, CDR, CWPP, CIEM, DSPM, Vulnerability management