1E References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (1369)
    9+ References
  • 4.8 / 5.0 (1407)
    12+ References
  • 4.8 / 5.0 (1034)
    Verified14+ References

1E Testimonials

  • “Seeing all that data come back in a few seconds is really quite extraordinary.”

  • "Nomad has enabled us to process the migration to Windows 7 remotely without interrupting any business traffic. If I compare it to when we migrated all the desktops to Microsoft Office 2010 – the bandwidth issues and the size of the MS Office Package were a huge issue for us at the time – these would have melted away had we had Nomad."

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References9 total
    About

    Blue Hexagon is a deep learning innovator focused on protecting organizations from cyberthreats. They've built the industry's first real-time deep learning platform for network threat protection. They have a world class team of deep learning and security experts innovating and setting a new standard for cyber defense.

  • Reference Rating
    4.7 / 5.0
    Customer References12 total
    About

    Great Bay Software is an IoT security and operational efficiency leader providing comprehensive visibility and control over endpoints on the network so organizations can secure data, preserve customer trust and protect revenue. By delivering real-time insight into device identity, location and behavior, Great Bay helps organizations identify and respond to potential threats and improve operational efficiency, all while supporting millions of connected devices.

  • Reference Rating
    4.7 / 5.0
    Customer References14 total
    About

    Virsec provides Zero Trust cybersecurity for legacy and modern workloads with the Virsec Security Platform (VSP). Using a default-deny, allow-on-trust security compensating control, VSP protects applications and workloads by proactively preventing cyber-attacks in milliseconds. VSP ensures only trusted code is allowed to run and stops everything else. With this proactive approach, workloads are immune to ever-evolving threat actor techniques and are protected against unpatched vulnerabilities.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked