Skip to content

Texas DIR Solutions

Complete List of Vendors

A10 Networks is an American public company specializing in the manufacturing of application delivery controllers. Founded in 2004 by Lee Chen, co-founder of Foundry Networks, A10 originally serviced just the identity management market with its line of ID Series products


(Now Fortra)

Agari helps secure the very foundation of digital communications with our Trusted Email Identity solutions.

A provider of enterprise mobility management (EMM) software and standalone management systems for content, applications and email.

Aqua Security helps enterprises secure their cloud native applications from development to production, whether they run using containers, serverless, or virtual machines. Aqua bridges the gap between DevOps and security, promoting business agility and accelerating digital transformation.

Arista Networks was founded to pioneer and deliver software-driven cloud networking solutions for large data center storage and computing environments.

Armis, the leading asset visibility and security company, provides the industry's first unified asset intelligence platform designed to address the new extended attack surface that connected assets create.

Much more than a technology solution, AttackIQ is a world-class team of security practitioners and researchers. They help you build your testing strategy, validate your security controls, and breakdown silos between teams.


(Now SentinelOne)

Attivo Networks is a leading identity security and lateral movement protection company with a rapidly growing business serving hundreds of global enterprises including Fortune 500 organizations. With this acquisition, SentinelOne extends Singularity XDR capabilities to identity-based threats across endpoint, cloud workloads, IoT devices, mobile, and data wherever it resides, setting the standard for XDR and accelerating enterprise zero trust adoption. Now SentinelOne.


(Now Harmony Email)

Enterprise AI cloud security: prevent phishing, malware, data leakage, account takeover, & shadow IT for full-suite cloud applications like Office 365™.

Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with over 250 security and management solutions, Axonius is deployed in minutes, improving cyber hygiene immediately.

BackBox is a penetration test and security assessment oriented Ubuntu-based Linux distribution providing a network and informatic systems analysis toolkit. It includes a complete set of tools required for ethical hacking and security testing.

Balbix provides a platform for cybersecurity posture management, BreachControl™, which leverages specialized artificial intelligence (AI) to deliver continuous and predictive assessment of breach risk. BreachControl forecasts critical breach scenarios, prioritizes mitigating actions based on business impact, and automatically creates workflows to address them. Designed for CISOs, CIOs and IT security teams, BreachControl reduces risk by a factor of 50 or more, and can make security teams up to 10 times more efficient.


(Now ThreatBlockr®)

ThreatBlockr® (formerly Bandura Cyber) is led by experts with decades of experience across threat intelligence, blockchain, geospatial technology and engineering domains.

Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Bitdefender provides cybersecurity solutions with leading security efficacy, performance and ease of use to small and medium businesses, mid-market enterprises and consumers.


(Now Forcepoint)

Consistently protect sensitive data in use across managed and unmanaged devices with agentless or agent-based security, all from one console. By uniting Bitglass' cloud-native security with Forcepoint, we'll offer one digital security platform – simplifying how you secure your data.

Blumira detection and response collects remote Windows endpoint logs, sending them directly to Blumira's platform for analysis, detection and threat response.



Broadcom Inc. is a global technology leader that designs, develops and supplies semiconductor and infrastructure software solutions.



Bromium was a venture capital–backed startup based in Cupertino, California that worked with virtualization technology. Bromium focused on virtual hardware claiming to reduce or eliminate endpoint computer threats like viruses, malware, and adware.

VMware Carbon Black is a cybersecurity company that develops cloud-native endpoint security software that is designed to detect malicious behavior and to help prevent malicious files from attacking an organization.


(Now Delinea)

Centrify is now Delinea, a PAM leader providing seamless security for modern, hybrid enterprises. With Delinea, privileged access is more accessible.

Check Point Infinity architecture delivers consolidated Gen V cyber security across networks, cloud, and mobile environments.

Cisco Systems, Inc. is the worldwide leader in networking for the Internet. Today, networks are an essential part of business, educa- tion, government, and home communications. Delivering several Cisco products including DUO, Cloudlock, Umbrella, SourceFIRE, ISE, and Stealthwatch.



Cisco Cloudlock is a cloud-native cloud access security broker (CASB) that helps you move to the cloud safely. It protects your cloud users, data, and apps. Cloudlock's simple, open, and automated approach uses APIs to manage the risks in your cloud app ecosystem. With Cloudlock you can more easily combat data breaches while meeting compliance regulations.

Disrupt future attacks with complete network visibility, next-level analytics, faster investigations, and expert threat hunting.

CrowdStrike is a global cybersecurity leader with an advanced cloud-native platform for protecting endpoints, cloud workloads, identities and data.



CyberArk offers the most complete and extensible Identity Security Platform, protecting identities and critical assets by enabling Zero Trust and enforcing least privilege

A unique blend of cybersecurity awareness courses, autonomous learning content and behaviour nudging is all accessed through our cloud-based learning platform. Small and midsize companies will find our plug and play standard offering easy to use and rollout for their teams.


(Now Fortinet)

CyberSponse offers the leading patented security orchestration & automation response (SOAR) solution that bridges the gap between automation only & human dependent security organizations.

Cymulate enables remote working by ensuring that VPN connections are secure and people continue to be productive with least privilege access.

Cyren provides integrated threat detection and intelligence solutions to protect against emerging email, malware, and web cyberattacks.

DarkOwl is a darknet data provider offering access to the world's largest dataset of deep and dark web content.

Cyren provides integrated threat detection and intelligence solutions to protect against Darktrace, a global leader in cyber security AI, delivers complete AI-powered solutions in its mission to free the world of cyber disruption.

An award-winning multi-factor authentication system that can secure all types of business applications and resources.


(Centrify and Thycotic Merge)

A leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide. Our customers range from small businesses to the world's largest financial institutions, intelligence agencies, and critical infrastructure companies.

Secureworks® is a leader in cybersecurity providing best-in-class cybersecurity solutions and threat intelligence that reduces risk, optimizes IT and security investments, and fills security team talent gaps.



Securing your entire organization has never been easier. Duo’s multi-factor authentication (MFA), single sign-on (SSO), remote access and access control products deploy fast in any environment. We help keep companies safer than ever before with minimal downtime and optimized productivity.

EnCase is the shared technology within a suite of digital investigations products by Guidance Software. The software comes in several products designed for forensic, cyber security, security analytics, and e-discovery use. EnCase is traditionally used in forensics to recover evidence from seized hard drives.

Entrust / nCipher

Provides software and hardware used to issue financial cards, e-passport production, user authentication for those looking to access secure networks or conduct financial transactions, trust certificated for websites, mobile credentials, and connected devices. Entrust acquired nCipher.



Trellix delivers industry-leading device-to-cloud security across multicloud and on-premises environments. Our solutions protect data, defend against threats, and provide actionable insights through an open platform and the largest threat telemetry network.

Flashpoint intelligence combines data, insights, and automation to identify risks and stop threats for cyber, fraud, and physical security teams.

Forcepoint ONE is security simplified. Get consistent security across any app, device or location and control it from one platform.

Develops and sells cybersecurity solutions, such as physical firewalls, antivirus software, intrusion prevention systems, and endpoint security components.


(Now Thales)

Identity management and data protection technologies help banks exchange funds; people cross borders, energy become smarter and much more.

GhangorCloud is a leading provider of Cyber Security solutions enabling defense against most sophisticated Cyber Attacks on Information and Data Repositories and Applications.

Guidance Software

(EnCase by NDM Technologies)

Guidance Software is recognized worldwide as the industry leader in digital investigative solutions. Our EnCase® Enterprise platform is used by numerous government agencies, more than 70 percent of the Fortune 100, and more than 45 percent of the Fortune 500, to conduct digital investigations of servers, laptops, desktops and mobile devices.

Identite® PasswordFree™ is integrated with our patented Full Duplex Authentication® and other factors such as biometrics and hardware tokens creating a strong multi-layer passwordless MFA solution with the highest level of protection for users against phishing and other password-related cyber attacks. And it allows the user to verify the service with a simple look, click, or tap—no expiring codes on email, OTP, or SMS (no typing).

Illusive is a defense to eliminate attacker pathways that uses deception for detection of lateral movement of APTs, ransomware & threats.


(Now Datto)

Infocyte is a cybersecurity company providing the leading platform for Incident Response and delivering cost-effective MDR services. Acquired by Datto.

IRONSCALES™ is a cloud-based anti-phishing platform that provides businesses with a complete solution for enterprise email security.

Ivanti produces software for IT Security, IT Service Management, IT Asset Management, Unified Endpoint Management, Identity Management and Supply Chain Management.

Ixia provides application performance and security resilience solutions to validate, secure, and optimize businesses' physical and virtual networks.

Juniper Is A Market Leader In AI Networking and Can Support Your Networking Needs. Enhance Your Network Experience, Security & Performance With Juniper Networks.

Kaseya provides IT Management Software to MSPs and IT Teams to improve efficiency and security. Manage IT assets, service desk, and more.

Kenna is a SaaS risk and vulnerability intelligence platform that accurately measures risk and prioritizes remediation efforts.

Run your PKI and certificate lifecycle automation in the cloud. Eliminate outages & risks. Reduce unnecessary costs, mitigate risk & eliminate outages with Keyfactor PKI Management.

Lacework is a cloud security services provider that automates cloud security at scale so customers can innovate with speed and safety.

Security Information and Event Management, log management, network and endpoint monitoring and forensics, and security analytics.

LookingGlass Cyber Solutions™ empowers government entities and Fortune 500 companies to meet their missions with contextualized threat intelligence.

McAfee Security is a privacy, security, and identity monitoring product that provides always-on and up-to-date protection for your device and your personal information. McAfee Security is available for both Android and iOS devices.

MediaPRO content helps build a culture of security, accelerates learning, and connects with your employees in an encouraging and conversational way.

Ransomware attacks are being fueled by Highly Evasive Adaptive Threats (HEAT). Prevent HEAT attacks from evading your defenses with Menlo Security.


(Now KnowBe4)

The MobileIron platform was built to secure and manage corporate data in a world where people access cloud data using mobile devices and modern endpoints.

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply zero trust principles to protect data.

Onapsis cybersecurity solutions automate the monitoring and protection of your SAP and Oracle applications, keeping them compliant and safe from insider and outsider threats. As the proven market leader, global enterprises trust Onapsis to protect the essential information and processes that run their businesses.

OPAQ Networks

(Now Fortinet)

The OPAQ cloud is a Secure Access Service Edge (SASE) platform that protects an organization’s entire distributed network – data centers, branch offices, remote users, and IoT devices across all ports and protocols. OPAQ delivers zero trust security-as-a-service using an infrastructure optimized for security and hyperscale performance.

OpenText is a world leader in Information Management, helping companies securely capture, govern and exchange information on a global scale.

Ordr automatically discovers all our managed and unmanaged devices and delivers critical insights through a real-time dashboard. Ordr also generates policies by type and enforces them to support microsegmentation, zero trust, and other network access controls. Arun Desouza. CISO, Nexteer Automotive.

A platform that includes advanced firewalls and cloud-based offerings that extend those firewalls to cover other aspects of security.

A software as a service provider for email security, identity threat defense, data loss prevention, electronic discovery, and email archiving.

A powerful, practitioner-first approach for comprehensive, operationalized risk & threat response and results.

Recorded Future is the world's largest intelligence company with complete coverage across adversaries, infrastructure, and target

Remediant is a leading precision privileged access management software provider that prevents ransomware attacks, removes 24x7 admin rights, Just-in-Time.



RiskIQ helps customers discover and assess the security of their entire enterprise attack surface—in the Microsoft cloud, AWS, or other clouds.

RSA helps manage your digital risk with a range of capabilities and expertise including integrated risk management, threat detection and response and more.



SafeNet Trusted Access is an access management and authentication service that ensures no user is a target by allowing you to expand authentication to all users and apps with diverse authentication capabilities. Because it gives you the power to control access to all apps with the right policy, you can enforce the right authentication method for the right user.

Securonix delivers a security analytics and operations management platform for the modern era of big data and advanced cyber threats.



Secureworks Taegis™ offers managed threat prevention , detection, and response (MDR) with the best overall value. Together, we’ll stop cyberattacks faster and more efficiently with Extended Detection and Response (XDR).

Securiti is the leading provider of Unified Data Controls with its Data Controls Cloud. It is a holistic solution for privacy, security, governance, and compliance across on-premise, hybrid, and multicloud environments in different geographies.

SentinelOne Singularity platform is an industry-first data lake that seamlessly fuses together the data, access, control, and integration planes of its endpoint protection (EPP), endpoint detection and response (EDR), IoT security, and cloud workload protection (CWPP) into a centralized platform.



Enable fast and effective response to cyber threats with SOAR by combining playbook automation, case management and integrated threat intelligence.

SixEngines provides smart assessments via scalable SaaS solutions for organizations of all sizes. Our technology produces an algorithmic-driven view into endpoint environments that delivers crisp security intelligence and an instant determination of areas for improvement.

Centralized security management and operations from the world's most trusted and scalable cloud security platform.



A single, seamless interface for former Sourcefire partners and customers to open or manage service renewals and requests.

Splunk is the data platform that powers enterprise observability, unified security and limitless custom applications in hybrid environments.

The leader in operationalizing Cybercrime Analytics to prevent ATO, ransomware, and online fraud.



Cisco Stealthwatch drastically enhances threat defence by giving detailed network visibility and security analytics. It helps you know every host, record every conversation, understand what is normal, it alerts you to change, and enables you to respond to threats quickly.

TeamViewer is one of the world wide leading solutions for desktop sharing and online collaboration over the Internet.

The industry’s only truly native Zero Trust Software-Defined Perimeter (SDP) solution. Airwall is the modern air gap for all connected things. Airwall makes it easy to create and maintain hyper-secure networks across complex infrastructure anywhere, including IT/OT/ICS/SCADA, remote and in the cloud. Airwall networks are multi-factor authenticated, micro-segmented, encrypted end-to-end, and impervious to lateral movement.

Tenable Network Security: Assess Your Security Across Your Modern IT Attack Surface. Offers the Industry's Most Comprehensive Vulnerability Coverage. #1 In Accuracy.

Develops and manufactures electrical systems as well as devices and equipment for the aerospace, defence, transportation and security sectors.



With Delinea, Experience Seamless And Personalized Privileged Access Management. Discover, Manage, Protect & Audit Privileged Access For Your Company At Lightning Speed.

Trellix XDR Platform delivers a broad and deep range of capabilities to boost your secops efficiencies.

Trend Micro™ TippingPoint™ provides best-of-breed intrusion prevention to protect against the full range of threats at wire speed anywhere on your network.

TrustMAPP is a cybersecurity maturity assessment, gap analysis, risk management, recommendation engine, and remediation tracking tool.



Cisco Umbrella offers flexible, cloud-delivered security. It combines multiple security functions into one solution, so you can extend data protection to devices, remote users, and distributed locations anywhere. Umbrella is the easiest way to effectively protect your users everywhere in minutes.

Valimail offers an easy, self-service platform that gives you all the info you need at a glance and facilitates your path to DMARC enforcement.

As the leader in AI-driven threat detection and response, Vectra helps organizations detect, prioritize, investigate, and respond to cyberthreats early in the attack progression.

VMware is a leading provider of multi-cloud services for all apps, enabling digital innovation with enterprise control.

WhiteHat Security


WhiteHat Security has been in the business of securing applications for over 15 years. In that time, we’ve seen applications evolve and become the driving force of the digital business, but they’ve also remained the primary target of malicious hacks.

The YubiKey is a hardware authentication device manufactured by Yubico to protect access to computers, networks, and online services that supports one-time passwords, public-key cryptography, and authentication, and the Universal 2nd Factor and FIDO2 protocols developed by the FIDO Alliance.

Zscaler is revolutionizing cloud security with the industry’s first Security as a Service platform.