Technology Partners

At Assura, we only partner with OEMs that we use ourselves and as part of delivery of our services.  This ensures that our clients not only receive the best solutions on the market, but that they only deal with people who use the products and have “been there and done that.”

We don’t partner with just anyone. Our selection process has to meet three immovable criteria: the partner has to have the best products on the market; we have to be able to use those products in the delivery of our services; and we have to use them for our own security (i.e., eat our own dogfood). That’s why you don’t see everyone and their brother on this list.

AlienVault has simplified the way organizations detect and respond to today’s ever-evolving threat landscape. Its award-winning approach combines essential security controls with the world’s largest crowd-sourced threat intelligence community, making effective and affordable threat detection attainable for resource-constrained IT teams. With integrated vulnerability assessment, threat intelligence, and Security Incident and Event Management (SIEM), AlienVault’s Unified Security Management (USM) platform provides any organization with the tools it needs to identify and fight off cyber threats.

Duo’s Trusted Access platform verifies your users’ identity with two-factor authentication and confirms the security health of their devices before they connect to the apps you want them to access. With robust conditional access policies, Assura can help clients comply with modern security frameworks and build robust zero-trust architectures for its clients.

Huntress finds and stops hidden threats that sneak past preventive security tools so that Assura’s clients are protected from today’s determined cybercriminals. Huntress is an active threat hunting agent for systems running Microsoft’s Windows® operating system. By focusing on a specific set of attack surfaces, vulnerabilities and exploits, the Huntress platform helps Assura protect against persistent footholds, ransomware and other attacks. With a unique combination of automated detection and human-powered threat hunting, even sophisticated attackers won’t stand a chance.

IntSights delivers powerful early warning of hacking and fraud attacks, via sophisticated cyber intelligence, rapid mitigation and one-click remediation of deep web and dark web threats.

Imperva protects and provides a secure foundation for its customers’ businesses. Once deployed, our solutions proactively identify, evaluate, and eliminate current and emerging threats, so you never have to choose between innovating for customers and protecting what matters most. Imperva innovates by using data, analytics, best of breed software and the community’s expertise to deliver simple, effective, and enduring protection.

Ironscales provides a tool for organizations that need a comprehensive, automated solution to stop tomorrow’s phishing attacks today. This tool can help customers leverage more people and expertise against threats than any other solution, based on the structure of decentralized intelligence and AI-powered incident response and remediation. It offers customers The Power of Now with a single, unified email security platform that combines multiple point solutions into one. The self-learning system helps where your email security is most at risk, with post-delivery prevention, detection and remediation.

NetSecurity’s ThreatResponder® Platform is an all-in-one cloud-native endpoint threat detection, prevention, response, analytics, intelligence, investigation, and hunting product. Once lightweight agents (“Rovers”) are deployed, Assura’s analysts gain situational awareness and immediate threat visibility into hundreds and thousands of endpoints, respond to nation-state and insider threats, and neutralize cyber attacks quickly. ThreatResponder® allows our investigators to conduct incident response and computer forensics investigation on a remote endpoint.

Veracode is the most widely used cloud-based platform for securing web, mobile, legacy and third-party applications, seamlessly integrating application security into software development.