1E References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (3201)
    Premium215+ References
  • 4.8 / 5.0 (2418)
    Premium98+ References
  • 4.7 / 5.0 (2599)
    Verified34+ References
  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References215 total
    About

    Cato is the world’s first SASE platform, converging SD-WAN and network security into a global, cloud-native service. Cato optimizes and secures applications access for all users and locations. Using Cato, customers easily migrate from MPLS to SD-WAN, optimize global connectivity to on-premises and cloud applications, enable secure branch Internet access everywhere, and seamlessly integrate cloud datacenters and mobile users into the network with a zero trust architecture. Visit www.catonetworks.com and Twitter: @CatoNetworks

  • Reference Rating
    4.7 / 5.0
    Customer References98 total
    About

    Kisi develops cloud technology to build secure access control systems that use a combination of sensors and mobile devices to grant facility access to authorized personnel. Designed for commercial and enterprise applications, the Kisi system provides an added layer of intelligence and enhanced experience at all access points of the facility. The system software streamlines access management for operations teams while generating sophisticated data visualizations and personnel tracking for advanced IT departments. For the end user, Kisi works in the background to detect their presence and timely unlock doors for them as they approach.

  • Reference Rating
    4.7 / 5.0
    Customer References34 total
    About

    Lastline’s Network Detection and Response platform delivers the visibility security professionals need to detect and contain sophisticated cyberthreats before they disrupt your business. We offer the industry’s most accurate detection of threats entering and operating within your network, both on premises and in the cloud. The company’s software protects network, email, cloud, and web infrastructures, minimizing the risk of a damaging and costly breach that results in the loss of data, customers, and reputation.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked