- Field-level Support
- Marketing Resources
- Technical Enablement
- Dedicated Resource for Integrations
Quilt Ecosystem Partners
Cyphort’s technology partner program is a collaboration of more than 30 enterprise security vendors working together to create an open software fabric–in essence, a quilt–that can provide customers with more options, more integration, and more protection. Leveraging Cyphort’s open architecture, customers deploying the Anti-SIEM can ingest log and event data from many of these vendors, and often provide auto mitigation back to these tools to strengthen them against advanced threats in the future. The result is a completely integrated security architecture giving customers greater protection and value.
If you’re a prospective customer, a Cyphort sales representative can share more details on vendor relationships and integration options. If you’re a technology vendor who is not yet a Quilt member, please contact us to learn more
about a Quilt Ecosystem Partnership.
Quilt Partner Program Reviews-
“The integration we have with Cyphort has been simple and effective,” said Peter Doggart, VP of Business Development at Symantec. “We’re providing valuable information to the Anti-SIEM, and Cyphort provides valuable information back to our BlueCoat ProxySG appliances. In the end, it’s a huge security benefit for our joint customers.”
“The widely deployed joint solution from Cyphort and Carbon Black empowers customers with maximum visibility in their environments,” said Jim Raine, Carbon Black’s Director of Technology Alliances. “Now, as Cyphort delivers an innovative SIEM alternative, customers can correlate detections from multiple sources, empowering response teams to pinpoint what needs immediate attention.”
“Through our integration with Cyphort’s Anti-SIEM and its threat detection technology, we can automatically isolate endpoint devices known to be compromised, restricting their access and movement,” said Frank Andrus, CTO at Bradford Networks. “The joint solution brings visibility and automated policy-based control to every device that is on the network, whether the device is a guest’s laptop or an IoT device such as a security camera.”