As part of the annual Tech Innovators Awards evaluation process, CRN selects a number of the applicants’ products as finalists. Here’s a look at the innovative products that have made the first round of the judging.
Accelerating Innovation
Innovation has always been a hallmark of the IT industry. Pushing the envelope on the performance and capabilities of IT products: software, PCs, hardware, networks and more, is what it’s all about. And it’s what fuels new opportunities for the channel.
Industry innovation has reached a new high in the last several years with the advent of AI technology, leading to a surge in development of new AI-based applications and agentic AI software and the addition of AI capabilities to existing IT products and systems including PCs, ERP and CRM applications, data management software and cybersecurity tools.
This wave of innovation is spread across the industry, from well-established IT giants to startups with breakthrough product ideas. IT vendors are rushing to develop new products and adapt their current product portfolios in the face of the AI tsunami, either to reap the advantages of adding AI capabilities or upgrade them to meet the new demands of AI systems.
So which new and updated products create opportunities for solution providers who work on the front lines with customers as they navigate this new AI-driven market?
To help solution providers identify products that are truly innovative and offer real value for their customers, the 2025 CRN Tech Innovator Awards showcase IT products that provide significant advances in IT—and partner growth opportunities—across a broad range of technologies.
CRN staff has been evaluating some 220 applications across 33 product categories for this year’s Tech Innovator Awards. The following are the finalists among those applications. The winners will be announced on Aug. 6 on crn.com and in the August print issue of CRN.
The following product descriptions are those provided by the IT vendor applicants.
AI Infrastructure
Cerio Accelerated Computing Platform
The Cerio Accelerated Computing Platform transforms the way systems are designed and deployed, providing full control over the utilization, choice and scale of GPU infrastructure. Cerio makes it possible to compose systems to match workloads—all defined and implemented in software.
Significant reductions in footprint, overprovisioning, power and cooling translate into significant cost savings at any scale. The Cerio Accelerated Computing Platform provides the foundation for agile systems designed for compute-intensive applications from visualization and simulation to analytics and AI.
DDN Infinia
DDN Infinia is a next-generation AI data intelligence platform that accelerates and unifies data pipelines across core, cloud and edge environments. Purpose-built for modern AI workloads, Infinia delivers real-time data services, intelligent automation and seamless data unification, maximizing efficiency and accelerating insight.
With multitenancy at its core, Infinia ensures secure isolation and consistent performance for large-scale GPU clusters. Fully cloud-native, hardware-agnostic and scalable, Infinia empowers enterprises to unlock the full potential of their AI infrastructure. The target market includes resellers, channel partners and enterprises.
Phison aiDAPTIV+
Phison Electronics offers aiDAPTIV+, an affordable AI training and inferencing offering for on-premises environments, available as of March 17, 2025, in the ABS Newegg AI Training PC and the ABS Newegg AI Workstation. Phison captured the AI training power traditionally delivered by large public cloud data centers or racks of servers in an on-premises data center to instead deliver it within a compact, cost-effective infrastructure using the aiDAPTIV+ GPU memory extension technology.
Powered by a special AI-optimized version of Phison’s high endurance, capacity and performance PASCARI enterprise SSDs, aiDAPTIV+ enables an affordable, reliable, secure, end-to-end in-house AI training offering. aiDAPTIV+ enables training of LLMs up to 8 billion parameters on the PC, and 70 billion on the workstation, while providing a simple graphical user interface to interact with and ask inferencing questions using the trained LLM.
AI PCs
Acer Chromebook
The Acer Chromebook R757T was designed to positively impact the school environment to promote student success. The convertible 360-degree hinges allow it to be used in various settings, including tablet mode for taking notes. The 11.6-inch Full HD touch display features Antimicrobial Corning Gorilla Glass to reduce scratches and bacteria.
Powered by the latest Intel N150 and N250 processors, the Acer Chromebook is performance-minded and provides 10 hours of battery life. It comes with the new Quick Insert key to easily access helpful ChromeOS features. Wi-Fi 7 ensures secure, reliable and fast internet connections, while the premium 1,080p webcam ensures high-quality video during online classes and includes a webcam shutter to protect student privacy. It features HDMI and two USB Type-C ports, ensuring flexibility without sacrificing charging convenience and supports wireless Cast Moderator and projection via HDMI, so students can smoothly cast to the display upon teacher approval.
HP EliteBook Ultra G1i
The HP EliteBook Ultra G1i is a 14-inch, ultra-slim, premium AI business notebook designed for modern leaders and executives. Powered by the latest Intel Core Ultra processors with up to 48 TOPS of NPU performance, it accelerates productivity, enhances collaboration and streamlines demanding workloads using local AI capabilities.
Featuring a built-in 9-megapixel camera, dual mics, quad speakers and Poly Camera Pro conferencing, the EliteBook Ultra G1i delivers professional-level audio/video for remote work. The 3K OLED display and the world’s largest haptic trackpad on an AI PC provide a rich user experience, while HP Wolf Security ensures enterprise-grade protection. Its lightweight, sleek design and sustainable materials make it ideal for executives who prioritize performance, portability and purpose.
AI Software
CrowdStrike Charlotte AI
Charlotte AI, CrowdStrike’s agentic and GenAI assistant, addresses the critical need for organizations to defend against advanced attacks at machine speed. Powered by millions of triage decisions from CrowdStrike Falcon Complete Next-Gen MDR, Charlotte AI triages security detections with over 98 percent accuracy, eliminating more than 40 hours of manual work per week on average to scale SOC operations and accelerate response times.
Charlotte AI is a purpose-built agentic offering for security professionals across industries, from SMBs to midsize enterprises to the Fortune 500, who need to detect, investigate and respond to threats faster and more accurately. It redefines cybersecurity, empowering teams to outpace adversaries and stop breaches with efficiency and confidence.
Red Hat OpenShift AI
Red Hat OpenShift AI is built for customers who are ready to scale their AI applications. It provides data scientists and developers with an AI platform for building and managing predictive and generative AI models across the hybrid cloud. The platform includes MLOps and LLMOps capabilities, as well as tools to simplify data science and model pipelines, model monitoring, governance and more.
On March 26, 2025, Red Hat announced the latest release of the platform, Red Hat OpenShift AI 2.18, which features significant updates and new capabilities to support Red Hat OpenShift AI’s aim of bringing better optimized and more efficient AI models at scale to the hybrid cloud. The new capabilities include support for distributed serving, an end-to-end model-tuning experience, a technology preview of Guardrails and model evaluation.
SentinelOne Purple AI Community Verdict And Purple AI Similarity Analysis
Community Verdict and AI Similarity Analysis are the first of many agentic capabilities coming to Purple AI. These foundational AI-driven capabilities harness the collective expertise and intelligence from SentinelOne’s global analyst community. Community Verdict shows how similar alerts have been triaged by other analysts, eliminating triage silos and dramatically shortening mean time to respond. Analysts will gain insight from some of the world’s largest and most mature SOCs, including SentinelOne’s expert threat services and intelligence teams, which heavily influence Community Verdict’s assessments.
AI Similarity Analysis analyzes trillions of datapoints using advanced neural networks to identify similar alerts in the global population. Building on SentinelOne’s commitment to data privacy in AI, all alerts are stripped of any identifying information.
Together, they scale security teams with the power of AI and human expertise providing the actionable insight needed to triage threats quickly and accurately.
Snowflake Cortex AI
Snowflake Cortex AI is Snowflake’s fully managed suite of AI services, offering access to best-in-class LLMs like Anthropic, Meta, Mistral, OpenAI and more, to democratize advanced analytics. It provides LLM functions like text summarization, translation and sentiment analysis for tasks such as synthetic data generation, alongside ML functions for forecasting, anomaly detection and classification. Features like Cortex Search enable natural language queries across large datasets, while Cortex Analyst empowers nontechnical users with analytics.
The platform supports fine-tuning of models for industry-specific needs and ensures secure, governed operations within Snowflake’s infrastructure. By unifying structured and unstructured data processing, Cortex delivers real-time insight for retail, health care, finance and manufacturing, enabling businesses to scale AI solutions efficiently under a pay-as-you-go model.
Application Development And DevOps
GitLab Duo Enterprise
GitLab Duo Enterprise is an end-to-end AI partner designed for the entire software development life cycle. It helps organizations boost developer productivity, enhance security, streamline collaboration and accelerate DevSecOps processes. GitLab Duo Enterprise builds on GitLab’s AI offering, with additional enterprise-grade features that support all functions involved in delivering software, from developers to nontechnical team members.
GitLab Duo Enterprise’s capabilities span intelligent code assistance across 25-plus programming languages, AI-powered security vulnerability identification, remediation and root cause analysis, automated test generation, team collaboration enhancements with AI-driven summaries, and ROI quantification through an AI Impact Dashboard. It takes a privacy-first approach to AI, enabling it to be used by any organization, from compliance-focused enterprises to public sector agencies.
Harness Internal Developer Portal
Harness Internal Developer Portal (IDP) is a centralized platform designed to streamline software development by reducing complexity, improving visibility and accelerating on-boarding. Built on Backstage, Harness IDP provides developers with self-service workflows, a centralized software catalog, integrated documentation, and automated scorecards that track software health, maturity and compliance.
These features eliminate reliance on ticket-based processes and disconnected tools, allowing developers to focus on innovation while ensuring adherence to organizational standards. Platform engineers benefit from simplified configuration and governance, enabling scalability and consistency across teams. Harness IDP is ideal for medium to large enterprises seeking to enhance developer productivity, reduce cognitive load and standardize development processes across diverse teams and toolchains.
JFrog ML
JFrog ML is an MLOps solution integrated into the JFrog Platform, designed to streamline the development, deployment and security of AI-powered applications. It unifies machine learning practices with traditional DevSecOps processes, providing a holistic view of the software supply chain.
Key features include ML model security scanning, centralized management, simplified deployment, and full traceability of AI models and datasets. JFrog ML supports integrations with popular AI platforms like Hugging Face, AWS SageMaker and Nvidia NIM, enabling teams to accelerate AI initiatives while ensuring security and compliance.
JFrog ML was created for enterprise-level development teams, data scientists, ML engineers and DevSecOps teams across industries looking to scale and secure AI applications. JFrog ML helps overcome the challenges of AI model governance, deployment and collaboration, making it ideal for organizations in need of scalable, secure AI solutions.
OutSystems Mentor
Available on the OutSystems Developer Cloud platform, Mentor is a digital assistant that transforms the entire software development life cycle (SDLC) using low-code, generative AI and AI-driven guidance. Mentor helps to
generate fully functional applications, complete with UI, data and logic, from natural language prompts or product requirement documents in a matter of minutes, significantly reducing development time,
It helps to iterate and evolve applications effortlessly using AI-powered suggestions, enabling continuous improvement and rapid iteration,
In addition, it helps to embed AI agents within apps, adding advanced capabilities like natural language understanding to humanize digital interactions without any coding,
It also helps to validate and maintain applications through AI-powered code reviews, ensuring all applications meet the highest possible standards for development, security, performance, architecture, and long-term maintainability,
Mentor acts as an indispensable AI partner across the entire software development life cycle, accelerating secure, error-free application delivery while boosting developer productivity and redefining how software gets built.
Application Performance/Observability
Catchpoint Internet Performance Monitoring
Catchpoint’s Internet Performance Monitoring (IPM) platform is used by 13 of the top 20 global brands to monitor what matters, where it matters, in an ever-changing and fragile internet ecosystem. With over 3,000 smart agents around the world and its advancements in observability, Catchpoint’s platform offers unparalleled observability into digital experience, networks, cloud services, websites, applications and APIs.
Every major hyperscaler, every major CDN, the leading telco and hosting providers around the world and the top e-commerce platforms and retailers rely on Catchpoint to provide internet resilience and ensure applications and users deliver the expected experience. Catchpoint has been leading the effort to move the industry from system metrics and SLAs to eXperience-Level-Objectives (XLOs), which better capture the ultimate goal of systems and align IT with the business.
LogicMonitor Envision
LogicMonitor Envision, a SaaS-based platform, delivers AI-powered data center transformation and hybrid observability for enterprise IT. The platform provides IT teams with unified visibility across hybrid environments, enhancing resilience and efficiency across the entire technology stack. LM Envision ingests telemetry across even the most complex heterogeneous environments, enabling IT teams to pinpoint and resolve issues before they cause costly disruptions. Its AI/ML features provide dynamic insight and deliver unparalleled observability through data, while AI-powered automation streamlines incident response.
The platform also includes Edwin AI, an agentic AIOps product and the first AI agent for IT operations (ITOps), which reduces MTTR by 60 percent-plus with generative AI-powered summaries, root cause analysis, actionable recommendations and predictive insight. It filters out 90 percent-plus of alert noise, freeing IT teams to focus on critical incidents. By enabling teams to proactively resolve issues before they escalate, LM Envision optimizes performance and efficiency across modern data centers.
Netscout Remote InfiniStreamNG And nGenius Edge Sensor
Remote InfiniStreamNG (ISNG) and Edge Sensor extend packet-level visibility to the most remote edges of the business, where it’s not always possible to dispatch tech teams. This helps IT dramatically improve troubleshooting times and reduce mean time to repair (MTTR). This type of comprehensive visibility, combining synthetic testing with Netscout’s patented Adaptive Service Intelligence (ASI) Smart Data technology and deep packet inspection (DPI) at scale, is offered in various form factors and specifications. By combining both types of technologies in a single solution, customers get the best of both worlds.
With multiple types of Remote InfiniStreamNG (ISNG) and Edge Sensors available, organizations can choose the right instrumentation for their infrastructure, whether it be Ethernet, SD-WAN, SASE, MPLS, or direct-to-internet traffic flows. Target markets include manufacturing facilities, banks, hospitals and government offices that need and run mission-critical applications and services at remote sites. Proactive deep-dive observability reduces business risk.
The New Relic Intelligent Observability Platform
Powered by a sophisticated AI engine that leverages compound and agentic AI, the New Relic Intelligent Observability Platform can predict potential issues before they arise, assess the impact and make thoughtful recommendations in plain language. While its compound AI system tackles the complicated tasks, its agentic AI makes developers’ lives easier by automating complex workflows and completing tasks.
New Relic also offers several agentic AI integrations, including Amazon Q Business, Google Gemini, GitHub Copilot, and ServiceNow to bring critical observability data and intelligent recommendations directly to IT teams and developers across the business and tech ecosystem. Because of this natively integrated New Relic AI generative AI assistant, anyone from a seasoned developer to a business analyst can interact with New Relic’s Intelligent Observability Platform and receive instant insights in return.
Cloud Tools/Management
Parallel Works Activate
Parallel Works Activate is a computing control plane, empowering teams with seamless provisioning, management and shared compute resources at scale across on-premises, cloud and hybrid environments with advanced cost control and budgeting features. Acting as a central nervous system for distributed AI, Activate unifies AI and HPC workloads across diverse infrastructures, enabling the recapture of idle capacity with up to 30 percent more utilization while delivering immediate ROI. Activate facilitates collaborative research and enhances productivity through intuitive interfaces and API-driven processes, enabling flexible HPC cluster creation in the cloud.
The Activate computing control plane is scalable, flexible and vendor-neutral, and enhances technological advancements, optimizing workflows and empowering businesses to innovate. Parallel Works targets the enterprise research market in the financial services, oil and gas, public sector, medical and environmental industries, as well pure AI markets involving core and edge workload orchestration and infrastructure allocation.
Exclaimer
Exclaimer is a provider of email signature management, managing over 22 billion emails annually across 70,000 customers. Its platform helps IT and marketing teams solve the everyday challenge of inconsistent, outdated or noncompliant email signatures by centralizing control, automating updates and transforming signatures into a dynamic channel for brand engagement. Email signature management is an ongoing business need, and the Exclaimer centralized platform simplifies deployment, automates compliance and unlocks marketing potential.
Exclaimer allows customers/partners to eliminate manual email signature updates; reduce IT support tickets and operational overhead; provide a solution compatible with Microsoft 365 and Google Workspace; enable marketing teams to run personalized campaigns through CRM integrations with Salesforce, HubSpot and others; and deliver marketing performance data through engagement analytics and A/B testing tools.
In 2024 alone Exclaimer introduced many new features designed to address real customer issues while making it simpler for our partners to bundle its solution.
Dynatrace Cloud Security Posture Management (CSPM)
Dynatrace Cloud Security Posture Management (CSPM) is a comprehensive security offering designed for enterprises that are managing complex hybrid and multi-cloud environments. This extends Dynatrace’s existing Kubernetes Security Posture Management capabilities to manage enterprises’ entire cloud security posture through a single, unified platform.
Powered by the Dynatrace Davis AI Engine and Dynatrace Grail data lakehouse, CSPM aggregates and contextualizes security and observability data to provide comprehensive insight across applications, containers and cloud infrastructure, while monitoring compliance against regulatory standards like PCI DDS, CIS and GDPR. CSPM caters to enterprises seeking to strengthen their cloud security posture, reduce their operational complexity and move from reactive to proactive security management.
Data And Information Management
Airbyte 1.0 Self-Managed Enterprise
Airbyte is an open-source data movement platform syncing data from applications, APIs and databases to data warehouses, lakes and other destinations. Airbyte delivers a reliable, enterprise-grade data movement platform focused on scalability, security and flexibility to meet modern data infrastructure needs.
Airbyte provides production-ready deployment with an easy setup, data reliability and robust security features. Airbyte makes moving structured and unstructured data easy and affordable across nearly any source and destination enabling users to build and scale for data analytics and generative AI. Airbyte provides an open-source edition of its software along with commercial Airbyte Enterprise and Airbyte Cloud editions that are used by the data and AI engineering community.
Cribl Copilot
Copilot is an AI-powered intelligent guide that accelerates efficiency in managing IT and security data at scale. Copilot provides auto-generated insight, dashboards and notifications based on organizational data and system metadata. It generates code functions, pipelines and Kusto Query Language (KQL) using natural language capabilities that reduce learning curves to minutes. Users can ask questions of their data and allow Copilot to create complex telemetry pipeline configurations and search queries for quick answers.
Users can chat with Copilot to address problems and solve the most challenging data problems by tapping Cribl’s entire solution engineering experience in real-time including:
-Build Cribl Search dashboards: Copilot’s natural language to KQL generates basic or complex dashboard panels for existing or new dashboards,
-Build AI-powered troubleshooting tools: A dedicated support guru for building troubleshooting tools and reducing time to resolution,
-Build language models: Produce data-driven insight to find new pathways to accelerate productivity across an organization.
Dell AI Data Platform
The Dell AI Data Platform is a system designed to handle data placement, processing and protection. Built on an open and secure architecture, it supports structured, semi-structured and unstructured data, enabling scalability and flexibility for AI, analytics and generative AI workloads. It integrates with the Dell AI Factory to support the entire AI development life cycle, from preparing data to running advanced AI models.
This platform includes features like data organization, metadata enrichment and secure access controls while ensuring data protection with advanced threat detection. It’s ideal for industries like health care, finance and retail. For health care, it can improve patient data management and analysis. Within finance, it helps with tasks like identifying fraud, and in retail, it supports enhancing customer personalization to improve customer experience.
EDB Postgres AI
EDB Postgres AI is a unified platform for transactional, analytical and AI workloads, combining cloud agility with hybrid control, built for sovereign, scalable,and complex use cases. Key technical features include:
-Unified workloads: Supports transactional, analytical and AI tasks in the Postgres engine, eliminating data silos
-Multi-model capabilities: Integrates SQL, vector, JSON and time-series data in one platform
-Advanced query engine: Up to 30X faster analytical queries than native PostgreSQL
-Built-in observability: Real-time monitoring and diagnostics ensure efficiency,
-Hardened security: TDE, SQL injection protection and RBAC
-AI-driven migration: Cuts application rewrites by 95 percent when moving from legacy databases
-AI accelerator: Automates AI pipelines with just five lines of code, 95 percent fewer than traditional approaches.
EDB Postgres AI is built for modern developers, data engineers and AI builders tackling mission-critical workloads.
VirtualZ Computing PropelZ
PropelZ by VirtualZ Computing is a patented, no-code solution that transforms how enterprises integrate structured data from IBM Z systems into modern cloud and analytics platforms. Designed for simplicity and speed, PropelZ installs in minutes and is fully operational the same day, no specialized mainframe skills required. From first login to streaming real-time data, customers consistently report seamless setup, intuitive configuration and immediate results.
PropelZ eliminates the need for ETL, replication or change data capture, dramatically reducing complexity and cost. Whether accessing VSAM, Db2, IMS or other mainframe data sources, PropelZ provides real-time data in open formats like JSON and CSV, ready for AI, BI and modernization initiatives.
Built with enterprise-grade security and optimized for hybrid cloud, PropelZ empowers organizations to accelerate digital transformation without disruption. The result is faster decision-making, simplified operations and greater agility, all delivered by a proven offering that’s redefining mainframe data access.
Data Protection, Management And Resiliency
Commvault Cloud
The Commvault Cloud platform is redefining cyber resilience with comprehensive AI-powered data protection, proactive data defense advanced ransomware protection and a single view across everything. Unlike other offerings, Commvault Cloud empowers customers to protect, test and rapidly recover their data, applications and production workloads—whether it’s on-premises, across public, private and hybrid clouds, over SaaS, or in multi-cloud environments.
With Commvault Cloud, it’s more than just recovering customers’ data. It’s about enabling continuous business (i.e., helping businesses get back online quickly, cleanly, and completely). From data security to readiness to recovery, Commvault Cloud helps customers address their most pressing cybersecurity challenges across a range of verticals, including: federal government agencies requiring quick recovery of critical applications, financial institutions needing regulatory-compliant data protection, health-care providers safeguarding HIPAA-protected patient information, and educational institutions seeking scalable, cost-effective data security.
Cohesity NetBackup 11.0
Cohesity NetBackup is a powerful and highly scalable data protection offering that supports over 1,000 data sources and over 1,000 storage targets to ensure all of an organization’s critical data is protected and secured. With built-in threat detection, advanced analytics and integrations, and intelligent automation, NetBackup provides integrated cyber resilience and comprehensive coverage for today’s complex hybrid and multi-cloud large enterprise environments.
Cybercriminals are now using sophisticated AI tools to increase the frequency, sophistication and scale of their attacks, overwhelming data protection teams. At the same time, organizations are less likely to be hiring additional data protection specialists. This leaves both existing data protection specialists and IT generalists in need of additional support. Cohesity offers intelligent data management tools, AI-powered anomaly detection, a self-defending backup infrastructure, and orchestrated recovery to help organizations defend against attacks and recover from breaches quickly and confidently.
Rubrik Turbo Threat Hunting
Identifying the initial point of infection is crucial when it comes to ransomware and other cyberattacks. Rubrik Turbo Threat Hunting can scan up to 75,000 backups within 60 seconds, to swiftly pinpoint clean recovery points and prevent malware reinfection. It is available as part of Rubrik Enterprise Edition, which also features Rubrik Anomaly Detection, Threat Monitoring and Sensitive Data Monitoring.
Turbo Threat Hunting is suited for organizations that need to ensure fast and reliable cyber recovery to minimize business disruption and financial implications. For businesses with millions in daily revenue, every hour of downtime is a significant hit to the bottom line. By reducing the potential recovery time from weeks to minutes, Turbo Threat Hunting can help save costs and thereby preserve customer trust.
Edge Computing/Internet of Things
Asimily
Asimily has significantly upgraded its platform with the 2025 release of IoT Patching, completely automating IoT firmware update management. Designed for channel partners to deploy into organizations with diverse IoT device ecosystems, the platform centralizes and standardizes the otherwise complex process of implementing critical security updates across heterogeneous IoT device fleets. It automatically monitors IoT device manufacturer repositories for new firmware releases, provides real-time notifications, and enables one-click deployment options including individual, bulk and scheduled automated patching.
The platform features a dedicated audit interface for detailed tracking and reporting of patch status across the organization. Asimily is particularly targeted at industries where IoT devices play mission-critical roles, including health care, manufacturing, higher education, government, life sciences and retail. The system is compatible with devices from major manufacturers such as Axis Communications, Cisco, Hewlett Packard Enterprise and Zebra, covering IP cameras, printers, network applications and more, with ongoing expansion of supported devices.
KORE OmniSIM
KORE OmniSIM is a global eSIM offering designed to simplify IoT connectivity by providing seamless, multi-network access across regions. Leveraging eUICC technology, OmniSIM allows devices to switch between carrier profiles remotely, ensuring reliable connectivity without the need for physical SIM swaps. This makes it ideal for enterprises deploying IoT solutions across multiple countries, eliminating the complexities of managing different carrier agreements. OmniSIM is particularly beneficial for industries such as asset tracking, fleet management, health care and industrial IoT, where uninterrupted connectivity is crucial.
Businesses gain greater flexibility, enhanced coverage and improved resilience against network outages. With KORE’s advanced connectivity management platform, enterprises can monitor and optimize their IoT connections in real time. Whether for logistics companies needing global tracking capabilities or health-care providers requiring secure remote monitoring, OmniSIM delivers a future-proof solution for scalable, reliable IoT deployments worldwide.
StorMagic SvHCIv1.3
SvHCI is a full-stack hyperconverged infrastructure solution built on StorMagic’s proven SvSAN software (introduced in 2009, 50,000+ global installs). SvHCI combines virtualized storage with a StorMagic hypervisor, virtualized networking and management components, and includes 24x7x365 StorMagic Platinum support for the entire HCI stack.
SvHCI is set apart from the competition due to its ability to deliver high availability with just two nodes and that it was specifically designed for enterprises with multiple edge locations. The system operates across dozens, hundreds or thousands of sites, while reducing hardware, software and operating costs and complexity. An ideal VMware replacement, it simplifies operations and delivers high availability for enterprise edge environments with only two servers and is over 60 percent less expensive.
Zebra Kiosk System
The Zebra Kiosk System is a comprehensive, modular offering designed to meet self-service needs in retail and beyond. The KC50 Android Kiosk Computer, available with 15-inch and 22-inch screens, is the heart of the versatile Zebra Kiosk System. The Kiosk is flexible and versatile, offering hundreds of configurations and opening hundreds of applications with additional peripherals: bar-code scanner, payment terminal, RGB LED light and touch display for assisted service use cases. With built-in tap-to-pay capability and support for external payment terminals, it’s a self-or-assisted checkout.
The Kiosk supports natural language voice assistance for information lookup and voice-guided assistance. Powered by Qualcomm’s advanced chipset and built on Zebra’s Enterprise Android platform with Zebra DNA, the KC50 shares the same tools and features for deployment, security updates and device management as Zebra’s mobile computers and tablets, simplifying infrastructure management. Retail, hospitality, health care, government and education are the prime target verticals.
Enterprise IT Management
HP Workforce Experience Platform
Employees perform at their best when their technology simply works. This only happens when IT has the right tools to manage the complexity of the new digital ecosystem. The HP Workforce Experience Platform is an AI-powered, enterprise platform aimed at boosting employee productivity by reducing digital friction and empowering IT teams to resolve issues with predictability and proactivity. It gathers and analyzes billions of near-real-time datapoints from devices and applications to intelligently anticipate problems and identify potential workflow disruptions. The platform then provides actionable insight and recommendations to IT leaders, enabling proactive problem resolution. By predicting and resolving issues before they impact employees, IT can reduce friction, improve security and better serve the company by making employees productive and fulfilled again.
Jamf Pro Blueprints
Blueprints in Jamf Pro simplifies the creation of complex workflows by leveraging declarative device management to ensure devices meet a particular management state. By harnessing the power of DDM, this release enables customers to simplify device management, enforce policies faster and enhance device security and control, all while upholding Apple best practices in a simple, scalable and secure way.
Customers can use blueprints to scope management settings to devices using customizable components that include payloads and their configurable settings, all in one location. Using declarative device management also enables devices to proactively and autonomously apply the scoped management settings and report state changes to the MDM server asynchronously, streamlining the device management workflow. The target market for this product is large enterprises that primarily rely on Apple devices for their operations and thus require management and security of these devices.
NetBrain Next-Gen 12
NetBrain Release 12 (R12) transforms enterprise network operations with AI-powered automation, observability, and proactive issue resolution. It reduces downtime, enhances security and streamlines compliance. Key innovations include:
-Golden Engineering Studio (GES): Automates configuration analysis, detects deviations and enforces Golden Configurations to prevent outages
-AI Insight Manager: Centralizes AI-driven diagnostics, providing real-time network insight and automated root-cause analysis
-Co-Pilot: Simplifies troubleshooting via natural language queries, automating complex tasks
-Next-Gen Runbooks: Containerized workflows combine AI insight, maps and policies for one-click automation
R12 also makes change management safer and adds API integration with ITSM and monitoring platforms. By shifting from reactive fixes to proactive optimization, NetBrain empowers teams to ensure reliability at scale.
ThreatLocker Patch Management
ThreatLocker Patch Management enhances security by giving IT teams full visibility into unpatched software, including both installed applications and stand-alone executables that don’t require installation or are stored in custom directories. This ensures that all potential vulnerabilities are identified, not just traditionally installed programs.
Integrated with the ThreatLocker Zero Trust framework, the system enables IT administrators to assess, schedule and enforce patch policies while maintaining strict control over what gets updated. Designed for MSPs, midmarket businesses and enterprises, ThreatLocker Patch Management helps reduce the attack surface by detecting and managing software vulnerabilities across the entire network, ensuring compliance and operational security.
Hybrid Cloud Infrastructure
Rackspace OpenStack Flex
Rackspace OpenStack Flex is designed to simplify deployments, reduce complexity and foster collaboration across development, infrastructure and security teams. Built in the open, it combines Kubernetes and OpenStack to deliver streamlined cloud infrastructure management with minimal operational overhead. By uniting traditionally siloed platforms under a single application workflow, Rackspace OpenStack Flex empowers organizations to innovate faster without sacrificing performance or security. Its automation-first approach and robust capabilities make it well-suited for industries ranging from health care to e-commerce, where cost-effective scalability and reliable uptime are paramount.
Whether for a midmarket company or a large enterprise, Rackspace OpenStack offers a flexible, open platform for running mission-critical applications, accelerating time-to-market and maintaining compliance. Drawing on Rackspace’s extensive OpenStack expertise, Rackspace OpenStack Flex delivers a modern, comprehensive cloud experience that adapts to evolving business needs and industry demands, all underpinned by the proven reliability of Rackspace support.
IT Automation/RPA
NinjaOne Patch Intelligence AI
Effective patching could stop almost 60 percent of data breaches. But patching has historically been cumbersome and risky because IT teams need to manually monitor, research and test available patches before deploying. To streamline organizations’ patch management life cycles, NinjaOne built Patch Intelligence AI, an artificial intelligence feature within the NinjaOne Automated Endpoint Management Platform, that reduces patch-related risk by leveraging generative AI to provide comprehensive sentiment analysis for Windows KB updates.
Designed for IT teams managing a growing number of endpoints, the offering aids in more informed decision-making by providing detailed insight and community feedback, helping IT teams determine when to deploy or delay patches. What’s more, NinjaOne Patch Intelligence AI identifies potentially risky patches, allowing IT teams to avoid security vulnerabilities or compatibility issues, and improves efficiency as IT teams can quickly understand the potential impact of patches without needing to manually research or test each update.
Tines
Tines is a powerful automation platform built for modern, security-conscious organizations looking to optimize and scale their operations. Designed with flexibility and extensibility in mind, Tines integrates effortlessly with existing tech stacks, whether in cloud, on-premises or hybrid environments. It enables teams to automate manual workflows across security, IT, engineering and business operations. Tines supports advanced use cases such as SOAR, vulnerability management, phishing response and identity life-cycle management, using an event-driven architecture to process data, trigger actions and enforce logic securely.
Trusted by both lean teams and global enterprises, Tines delivers enterprise-grade control with features like granular permissions, detailed audit logs and strong compliance support. Its adaptability makes it a strong fit across a wide range of industries, including finance, health care, technology and critical infrastructure where efficiency, security and reliability are paramount. Tines is more than a tool; it’s a foundational platform for building resilient, scalable and future-ready operations.
Rewst
Rewst is an automation platform that’s purpose-built for MSPs, with native multi-tenant support and integrations with 70-plus widely used MSP tools, including Acronis, HaloPSA, Microsoft, N-able, Nerdio, NinjaOne, Pax8 and SentinelOne. Using Rewst, MSPs can orchestrate actions from these tools to automate everything from basic tasks to end-to-end processes. Popular use cases include new user on-boarding, user off-boarding, billing reporting, documentation updates, Microsoft 365 management, password resets and more.
Rewst offers options for any automation skill level: 100-plus prebuilt automations that help unlock immediate value and a flexible, low-code platform for building custom workflows tailored to the needs of your MSP and clients. Rewst also allows you to kick off workflows with dynamic forms that automatically verify essential information and pre-populate data. Rewst helps MSPs not only save time but ensures greater consistency, client satisfaction and scalable business growth.
MSP RMM Platforms
Acronis RMM
Acronis RMM is a remote monitoring and management offering designed for mature and emerging MSPs as part of the Acronis Cyber Platform, accelerating security-first MSP 3.0 transformation with platform integration and AI-powered automation. It natively integrates RMM with XDR, backup and disaster recovery, and PSA in a unified cloud console and agent, providing unique synergies and efficiencies.
Acronis RMM includes software inventory, vulnerability and patch management (previously in Acronis Advanced Management), covering OS and 300-plus third-party applications. It now also includes Device Sense network discovery, ML-powered monitoring and enterprise-class remote assistance, as well as Cyber Scripting and DeployPilot for malware-free task automation and software deployment. In addition, Acronis RMM most recently extended to Security Posture and User Management for Microsoft 365. Furthermore, Acronis CyberApp enables easy integration of both Acronis RMM into third-party stacks and any MSP tool into Acronis RMM, providing adoption flexibility and operational excellence.
Guardz AI-Powered Unified Detection And Response Platform
Guardz AI-native Unified Detection and Response Platform empowers MSPs to protect small businesses from threats such as phishing, ransomware, data breaches, etc. Unlike traditional platforms that require multiple tools, Guardz leverages AI automation to streamline detection, remediation and risk management across emails, endpoints, cloud environments and data, significantly reducing false positives and enhancing efficiency, from a single pane of glass. Designed for simplicity and scalability, the platform integrates seamlessly with Microsoft 365 and Google Workspace, enabling rapid deployment and low-touch management.
Automated risk assessments and user-centric insight enable MSPs to deliver enterprise-grade protection with minimal overhead. Guardz bridges cybersecurity with financial resilience, helping small businesses qualify for insurance coverage through proactive threat mitigation. By consolidating the essential elements of a modern security stack into one intuitive dashboard, Guardz empowers MSPs to scale their services, improve operational efficiency and strengthen client trust in an increasingly hostile threat landscape.
LastPass MSP Admin Console
The LastPass MSP Admin Console is a centralized platform designed to streamline password management for MSPs. It offers a unified dashboard to manage single sign-on, password management,and multi-actor authentication, enhancing security and efficiency. The console features an adoption dashboard, providing insight into client enrollment and usage, with steps to boost adoption rates. Simplified navigation and customizable user tables allow tailored client management, including on-boarding and authentication statuses. Granular access controls enable MSPs to assign specific permissions to technicians, ensuring appropriate access levels.
Integration with Professional Services Automation (PSA) tools like ConnectWise Manage and Datto Autotask allows efficient client provisioning, reducing setup times. Enhanced reporting capabilities support invoicing, prorated billing and executive summary reports, showcasing product adoption, security scores and return on investment. Overall, the LastPass MSP Admin Console empowers MSPs to deliver robust password management solutions, fostering stronger client relationships and driving growth.
Multifunction Printers
Epson Workforce Enterprise AM-C550 A4 Color MFP
The AM-C550 Color MFP is engineered to deliver when it comes to “less is more,” with more simplicity meaning few maintenance parts, minimized machine downtime for productivity, low energy consumption, and low waste. The A4 color MFP delivers print speeds up to 55 ISO ppm (black/color) and supports legal-sized media. It’s engineered for exceptional reliability, outstanding image quality, high-performance printing and scanning, and a fast first-page out.
The AM-C550 can be configured as either a desktop or floor-standing unit with up to three optional cassettes for a total of five paper sources. It offers an intuitive, user-friendly experience, including a large, intuitive 10.1-inch customizable color touch screen for easy navigation and operation. Black and color print speeds are measured in accordance with ISO/IEC 24734. Actual print times will vary based on factors including system configuration, software and page complexity.
Xerox PrimeLink C9200 Series
The Xerox PrimeLink C9200 packs high-end production power into a compact, cost-effective footprint. Built for serious versatility, it handles everything from envelopes to 12 x 18″-inch textured stocks and 51-inch banners—including media up to 400gsm. With print speeds up to 81 ppm, ultra-sharp 2,400 x 2,400-dpi resolution and a fully redesigned imaging system, it delivers brilliant results with every job. Pair that with advanced feeding and finishing options and high-definition EA toner, and you’ve got a true production workhorse built to go further, faster.
Clients can choose between the Xerox Integrated Color Server or upgrade to one of two Fiery digital front ends offering scalable performance, enhanced color control, and workflow automation. The product integrates with Xerox FreeFlow Core for intelligent job automation and FreeFlow Vision Connect for real-time performance monitoring, helping simplify tasks, optimize uptime and ensure consistent, high-quality output. For personalized print at scale, it works with XMPie.
Networking—Enterprise
ANA, Ericsson’s Generative AI-Based NetCloud Assistant
Ericsson’s NetCloud Assistant (ANA) is a gen AI-based virtual expert designed to simplify the administration of enterprise 5G networks. It’s embedded within Ericsson’s NetCloud management and orchestration solution, supporting approximately 37,000 enterprises managing 2.9 million devices. ANA elevates the NetCloud management solution by providing personalized, real-time responses that correlate AI insight from an enterprise’s network with a library of technical documentation.
Key features include knowledge summarization, configuration assistance and enhanced troubleshooting. ANA also enables custom graph generation to visualize complex network data. ANA’s AI components are securely hosted within Ericsson’s environment to ensure privacy and data protection. Targeted at enterprises managing wireless WAN networks, ANA is designed to streamline network deployment, troubleshooting,and performance optimization for IT teams and channel partners to install, configure and enhance network performance and reliability.
Gluware Intelligent Automation Platform 5.4
Gluware 5.4 is a significant update to the Gluware Intelligent Network Automation Platform, designed to streamline and enhance network management for large, complex enterprises. Its core functionality revolves around intelligent discovery, advanced automation and seamless integration. The platform excels at comprehensive network discovery, providing unparalleled visibility across diverse vendor infrastructures. Key features include direct Ansible Playbook integration, enabling users to leverage existing automation scripts within Gluware’s framework, and extensive customization options for tailored workflows. This empowers network teams to automate configuration management, compliance checks, and operational tasks with efficiency.
Gluware 5.4 targets enterprise-level organizations seeking to reduce operational costs, improve network agility, and minimize human error through robust, vendor-agnostic network automation. Gluware 5.4’s enhanced discovery capabilities provide real-time insight, fostering proactive network management. Its intuitive interface and API-driven architecture simplify complex automation tasks, ensuring seamless integration with existing IT ecosystems.
Meter Cellular
Meter Cellular is an innovative product developed by Meter that delivers high-quality cell coverage at a fraction of the cost and install time than existing solutions. It’s a Neutral Host CBRS solution that brings seamless, carrier-grade coverage to buildings with spotty coverage, underground settings or remote areas. The company has partnered with major carriers to broadcast their signal through its Cellular Access Points, bringing five bars of native coverage to end users’ phones with no special configuration required.
All phones manufactured since 2019 support CBRS and Meter Cellular—if a device can connect to its local cell tower, it can connect to the product. With Cellular, customers experience cheaper install, management and support than existing solutions. It is seeing significant demand for the product, having completed its first large enterprise deployments. Cellular is a fit for office and retail, schools, hospitals, and other large-scale operations experiencing unreliable coverage.
Networking—SMB
Auvik Network Management
Auvik is a cloud-based IT management platform, empowering IT teams with seamless deployment, intuitive interfaces, and effortless automation. The Auvik Network Management (ANM) solution provides today’s busy IT and MSP leaders with real-time network visibility, actionable insight, customizable alerts, automated record-keeping and more, dramatically boosting network efficiency and security.
In the past year, Auvik has introduced new, transformational capabilities and features to ANM. In September 2024, Auvik launched Northstar, a troubleshooting tool based on network path visualization and an updated alerting engine, which allows for additional customized settings for alerts and notifications. In March 2025, Auvik launched Endpoint Network Monitoring, a new feature of ANM that extends network visibility to the endpoint, across remote and hybrid work environments to help IT teams manage and improve the end-user experience on Windows and Mac OS devices.
Zyxel CX4800-56F 48-port 10G/25G L3 Aggregation Fiber Switch with 8 100G Uplinks
Ideal for enterprise and campus aggregation network environments, CX4800-56F 48-port 10G/25G L3 Aggregation Fiber Switch is a high-density 48-port Layer 3 managed switch that features upgradable SFP28 ports to support current 10GbE requirements and enables users to upgrade to 25GbE as network demands increase. Featuring an eight-port 100GbE QSFP28 that supports large uplinks and cross-stack bandwidth delivery, CX4800-56F delivers a high-performance switching capacity of up to 4.0 Tbps with forwarding rates of up to 2.0 Bpps. Even under heavy traffic conditions, the non-blocking architecture delivers a full 25GbE throughput on every port. NebulaFlex Pro enables the switch to be easily managed as a stand-alone device or as part of a cloud-managed network. The dedicated networked AV mode makes it easy to set up professional 4K streaming AVoIP networks to support bandwidth-intensive and latency-sensitive audio and video services.
Networking—Wireless
Ericsson Enterprise 5G Coverage
Ericsson Enterprise 5G Coverage, an offering that includes the Ericsson Radio Dot System, delivers a high-performance neutral host network that extends cellular coverage and capacity in buildings. It supports multiple frequency bands, is certified by all three major U.S. operators, and supports these carriers through one system and universal radios. This is a small cell neutral host alternative to the active Distributed Antenna System (DAS) systems that have been prevalent for years. Legacy DAS requires more hardware, cabling and power, making Ericsson a cost-efficient alternative that is easier to scale.
Ericsson Enterprise 5G Coverage is ideal for office buildings, hospitals, campus, and other large indoor areas because of:
-Emergency communications: Inconsistent cellular prevents peoples from calling 9-1-1, inhibiting safety and potentially making organizations liable.
-User experience: Phones are key for work, communication, and entertainment. When digital experiences falter, so do sentiment and satisfaction.
RYTHMz
RYTHMz’s all-in model offers channel partners lucrative recurring revenue opportunities. Rental and markup structure partners rent RYTHMz’s carrier-agnostic, unlimited bandwidth system at wholesale rates and resell with markup, creating a steady income stream. Key revenue drivers include unlimited bandwidth with premium pricing for high-data users; rapid deployment for quick setup that enables partners to offer fast, potentially higher-priced emergency solutions; scalability for easy upselling as customer needs grow; and flexibility with a carrier-agnostic approach that allows for quick deployment and broader market reach.
Value-added services partners can increase revenue by bundling managed services or premium support with RYTHMz’s offering. This model allows partners to control pricing, maximize profitability and build a predictable, subscription-based revenue stream while offering a powerful connectivity solution.
Zyxel WBE630S BE12300 WiFi 7 Tri-Band Dual-Radio NebulaFlex Pro Access Point
Designed for high-traffic environments, Zyxel WBE630S BE12300 WiFi 7 Dual-Radio NebulaFlex Pro Access Point is a dual-radio access point that offers speeds of up to 12.3 Gbps and delivers low latency. The affordable access point features a BandFlex radio that enables it to support 2.4GHz and 5GHz or 6GHz operation by configuration, making it an ideal system that can extend an existing 5GHz network while providing the flexibility to add or upgrade the network to 6GHz.
Smart Antenna technology automatically adapts antenna patterns for peak performance, minimizing interference and ensuring optimal Wi-Fi connectivity and coverage. The combination of MLO, which enables simultaneous data transmission across 2.4GHz, 5GHz and 6GHz bands, and Advanced Cellular Coexistence, which minimizes interference from 4G/5G network, boosts speed, reduces latency, minimizes interference and enhances reliability. NebulaFlex Pro enables users to easily manage the access point as a stand-alone device, via an on-premises controller or via the cloud.
Power Protection And Management
CyberPower PFC Sinewave 1U Rackmount UPS Series
The PFC Sinewave 1U Rackmount UPS series provides battery backup (using sine wave output), surge protection, and EMI/RFI filtration for security systems, audio/visual equipment, and networking equipment requiring active PFC power source compatibility. This series of UPS systems feature Automatic Voltage Regulation (AVR), which corrects minor power fluctuations without switching to battery power, and a multifunction control panel with a color LCD to quickly confirm status and alerts at-a-glance. Remote management and/or monitoring is available with optional purchase of a Remote Network Management Card or Cloud Monitoring Card.
At only 9.04 or 15.3 inches deep, these UPS systems fit comfortably in rack installations where space is at a premium. The CyberPower PFC Sinewave 1U Rackmount UPS systems are ideal for applications in security, audio/visual, edge computing, telecom, networking, and in small-business environments.
Eaton Tripp Lite Cloud-Connected Uninterruptable Power Supply
The Eaton Tripp Lite series cloud-connected uninterruptible power supply (UPS) offers an innovative, cloud-based system for managing backup power across multiple locations. With seamless integration into Eaton’s Brightlayer platform, this UPS enables IT administrators to leverage a robust remote monitoring application for effective power management of power devices in distributed environments. Through the Brightlayer app, teams can remotely monitor asset performance, receive alerts, control outlets and perform device shutdowns from any location, ensuring consistent uptime and operational efficiency for critical applications like network infrastructure, wireless access points and technology systems.
Designed to support multi-location deployments, this UPS features point-and-click commissioning, a user-friendly dashboard and remote monitoring capabilities. Built to operate in environments with uncontrolled temperatures or humidity, the Eaton Tripp Lite series cloud-connected UPS offers durable construction, automatic restart following power interruption and a variety of mounting options.
Security—Cloud And Application Security
Cavelo CIS Benchmark Misconfiguration Capabilities For Microsoft Office 365
The Cavelo CIS Benchmark Misconfiguration feature for Microsoft Office 365 empowers managed service providers with Office 365 misconfiguration detection and CIS benchmark implementation capabilities. The CIS benchmarks, developed by global cybersecurity experts, provide unbiased, consensus-based best practices for securing commonly used systems and applications. Covering over 100 benchmarks across 25 product families, including cloud services, CIS guidelines prioritize critical areas like network security, data protection and access management. Cloud services introduce unique challenges for vulnerability management.
Unlike traditional infrastructure, where vulnerabilities stem primarily from software flaws, risk in the cloud is largely tied to misconfigurations. Common misconfiguration types, such as default settings, insecure permissions and outdated software, can expose sensitive data, including personally identifiable information (PII). This new feature helps managed service providers identify and apply CIS benchmarks to Office 356, ensuring cloud services uphold the same best practices that they maintain across their on-premises infrastructure.
Commvault Cloud
Commvault’s platform, Commvault Cloud, is redefining cyber resilience with comprehensive AI-powered data protection, proactive data defense, advanced ransomware protection and a single view across everything. Commvault Cloud empowers customers to protect, test and rapidly recover their data, applications and production workloads—whether it’s on-premises, across public, private and hybrid clouds, over SaaS, or in multi-cloud environments.
With Commvault Cloud, it’s more than just recovering customers’ data, it’s about enabling continuous business (i.e., helping businesses get back online quickly, cleanly and completely). From data security to readiness to recovery, Commvault Cloud helps customers address their most pressing cybersecurity challenges across a range of verticals, including federal government agencies requiring quick recovery of critical applications, financial institutions needing regulatory-compliant data protection, health-care providers safeguarding HIPAA-protected patient information, or educational institutions seeking scalable, cost-effective data security.
CrowdStrike Falcon Cloud Security
CrowdStrike Falcon Cloud Security is a unified CNAPP that secures the entire cloud estate across infrastructure, custom applications, data, identities, SaaS applications and AI workloads. Built for modern enterprises, Falcon Cloud Security empowers security and DevOps teams to stop breaches in hybrid and multi-cloud environments. It consolidates disparate tools into a single solution that protects the full application life cycle—from build to runtime—while delivering comprehensive visibility, real-time threat prevention,and automated remediation.
The platform is trusted by global organizations to protect cloud-native architectures and accelerate secure innovation. Organizations of all sizes and leading services partners, including GSIs, MSPs and MSSPs, trust Falcon Cloud Security to protect complex, distributed cloud environments at scale.
Orca Cloud Security Platform (CNAPP)
Orca is the pioneer of agentless cloud-native security, trusted by hundreds of enterprises globally. Its patented SideScanning technology provides deep and wide visibility into risks and compliance issues across 100 percent of cloud workloads, configurations and identities. After a quick and easy one-time deployment, Orca surfaces the most critical risk combinations so these can be addressed first and helps companies shift security left by providing complete cloud security from code to runtime and back.
Orca is trusted by innovative organizations across the globe that range from startups to Fortune 500 companies. Orca’s ideal customer varies depending on the business need and buyer persona, and includes security practitioners (cloud security engineer, cloud security Architect, SOC analyst), executives (CISO, CTO, VP/Director of Security) DevOps / ITOps (DevOps engineer, DevSecOps, cloud platform engineer, cloud platform architect) and governance, risk, and compliance staff.
Palo Alto Networks Cortex Cloud
Cortex Cloud is the evolution of Palo Alto Networks’ Prisma Cloud CNAPP, merged with Palo Alto Networks’ Cortex Cloud Detection & Response, to deliver real-time cloud security from code to cloud to SOC. Cortex Cloud unifies data for an optimized user experience, automates workflows, and uses AI-driven insight to reduce risk, prevent threats and stop attacks in real time across the entire cloud security ecosystem.
Cortex Cloud delivers:
-Application security for building secure apps and preventing issues in development before they become production issues that attackers can target
-Cloud posture for improving multi-cloud risk management with new AI-powered prioritization, guided fixes to resolve multiple risks with a single action, and automated remediation
-Cloud runtime to stop attacks in real time with a single XDR agent for cloud and endpoint
-SOC for integrated cloud data, context and workflows within Cortex XSIAM to significantly reduce the mean time to respond.
Tenable Cloud Security
Data security posture management (DSPM) capabilities within Tenable Cloud Security continuously monitor multi-cloud environments to discover and classify data types, assign sensitivity levels and prioritize data findings in the context of the entire cloud attack surface. AI security posture management (AI-SPM) capabilities enable customers to confidently forge ahead with AI adoption by enforcing AI and machine learning configuration best practices and securing training data.
With the combined power of AI-SPM and Tenable Cloud Security’s cloud infrastructure entitlement management (CIEM) and Cloud Workload Protection (CWP) capabilities, customers can manage AI entitlements, reduce exposure risk of AI resources, and safeguard critical AI and machine learning training data to ensure data integrity. Tenable Cloud Security easily answers tough questions such as “What type of data do I have in the cloud, where is it located and who has access?” and “What AI resources are vulnerable and how do I remediate the issue?”
Security — Data Security
FortiDLP
FortiDLP is a next-generation, cloud-native endpoint data protection solution (integrating DLP and insider risk management capabilities) that provides enterprises with the capabilities needed to protect sensitive data across cloud environments, endpoints, and SaaS applications. This offering addresses critical threats such as data exfiltration, insider threats and accidental data loss. Unlike legacy DLP tools, which tackle data security challenges with cumbersome data classification and complex policy creation before offering any visibility or controls to mitigate data loss, FortiDLP overcomes these challenges. It combines machine learning algorithms integrated into its lightweight agent with localized real-time context and content inspection to deliver data protection across all data egress points.
Given that data breaches and insider threats are increasingly sophisticated, FortiDLP’s ability to anticipate and prevent data leaks, detect high-risk activities, and educate users on proper data handling is essential. This proactive approach helps organizations maintain compliance with regulations while safeguarding intellectual property and sensitive information.
Halcyon Data Exfiltration Protection
The Halcyon Data Exfiltration Protection (DXP) module significantly expands the Halcyon Platform’s anti-ransomware capabilities. About 80 percent of ransomware attacks involve double extortion, in which sensitive data is exfiltrated before delivery of the ransomware payload, and is then used as added leverage to compel payment of a ransom demand. In fact, suspicious data movement is often the first indicator that a ransomware attack is in progress and a payload may be about to detonate.
Halcyon DXP allows organizations to proactively identify suspicious data movement, insulating them from the threat of ransomware and reducing potential legal and regulatory liability from data loss associated with ransomware attacks. With DXP integrated into the Halcyon anti-ransomware platform, organizations can rely on Halcyon to detect data exfiltration attempts, defend against data extortion attacks, and receive early detection of any threat actor activity across their networks, yielding true cyber resilience.
MIND
MIND is the first-ever data security platform that puts data loss prevention (DLP) and insider risk management programs on autopilot to autonomously discover and classify sensitive data, fix data security issues and stop data leaks in this AI era. MIND reimagines data security to deliver both posture and prevention, protecting data at rest, in motion and in use. With the MIND AI multilayer classification engine, real-time detection and automated prevention and remediation, MIND enables enterprises to build effective data security programs with minimal head count.
By providing a unified data security platform, MIND allows organizations to seamlessly safeguard sensitive data across SaaS and GenAI apps, endpoints, on-premises file shares and emails. Security teams can consolidate DLP tools and policies, eliminate false positives and act with confidence. Its target market is the Chief Information Security Officer (CISO) and their security teams at North American enterprises (1,000+ users), except federal government.
Sentra Data Security Platform
Sentra’s cloud-native Data Security Platform (DSP) empowers enterprise security teams to automatically classify sensitive data, assess risk and remediate threats across multiple cloud, SaaS and on-premises environments. As organizations manage increasing volumes of data across hybrid environments, Sentra provides critical visibility and automation to streamline compliance and enhance security posture.
Leveraging machine learning and metadata clustering, Sentra automatically classifies data with an unprecedented level of speed, accuracy and detailed context, continuously for petabytes across IaaS, PaaS, SaaS, DBaaS and on-premises platforms. Its unified approach integrates Data Security Posture Management (DSPM), Data Access Governance (DAG), and Data Detection and Response (DDR) to discover exposures, improve data security posture, control access permissions, and detect threats in real-time. This enables businesses to scale efficiently while ensuring stronger data management and security.
Security—Email And Web Security
Abnormal AI Security Mailbox
AI Security Mailbox provides an AI coworker for email security operations, addressing two critical market needs. First, it automates the user-reported phishing emails workflow—a process that is highly manual and time-consuming for security teams that are often dealing with hundreds or even thousands of phishing reports every day. Second, it re-imagines security awareness through AI, engaging employees in immediate and personalized education around reported emails.
When an employee reports an attack, AI Security Mailbox automatically inspects and judges user-reported emails as malicious, spam, safe or a phishing simulation, automatically remediating messages deemed unsafe. It then automatically delivers a personalized response to the reporter explaining the outcome of their report and starting a two-way conversation enabled by generative AI. Employees can converse directly with the AI security analyst, with real-time feedback as it teaches them better security practices.
Barracuda Email Protection
Barracuda Email Protection helps organizations of all sizes and industries defeat increasingly sophisticated, frequent and targeted attacks, including phishing, ransomware, business email compromise (BEC) and more. Email remains the top attack vector and securing it has become an urgent priority—especially as cybercriminals leverage AI to improve and scale their attacks.
Barracuda Email Protection defends against all types of email threats with a multi-layered approach that includes both pre- and post-delivery defenses. It combines AI-powered threat prevention and detection, automated incident response, DMARC reporting and much more. What sets the offering apart is that these robust capabilities are included as standard in every plan, ensuring organizations receive complete protection without the need to manage separate, disparate tools or compromise on security.
INKY Generative AI
Generative AI is transforming software capabilities. It enables systems to understand language and engage intelligently with users. With INKY’s integration of generative AI, email security has entered a new era, offering extraordinary protection against today’s threats. With Generative AI, INKY can read and comprehend the text of each email. INKY’s deep understanding of language anticipates every way a request, threat, or scam could be worded. This capability ensures proactive, zero-day protection against phishing attacks.
The Dashboard provides admins with a whole new level of detail to understand and track threats. It tags the categories found in the email, provides a detailed explanation with mouse-over, and then highlights the language in the text of the email that it found suspicious. INKY is a modern email security platform purpose-built for MSPs. The addition of INKY Generative AI enables the company to provide partners with critical information security protection.
Mailprotector Shield
Designed specifically for MSPs and their clients, Shield eliminates the traditional trade-off between email security and usability. This enables service providers to deliver protection that clients appreciate, positioning MSPs as strategic advisers who solve problems rather than create friction. The result: happier clients, fewer support tickets and stronger security outcomes. Users regain control of their inbox and attention, seeing only messages that matter while Shield quietly handles the rest. Security decisions become more intuitive with clear visual cues that anyone can understand at a glance. Protection adapts to each user’s unique communication patterns, growing stronger and more personalized without requiring constant adjustments.
Shield transforms email security by replacing constant vigilance with genuine peace of mind for MSPs and their clients. Where traditional solutions force MSPs to manage complex configurations and field endless user questions, Shield’s zero trust approach questions everything automatically, dramatically reducing service desk overhead while strengthening protection.
Security—Endpoint Protection/Extended Detection And Response
Arctic Wolf Aurora Endpoint Security
Aurora Endpoint Security is Arctic Wolf’s next-generation endpoint protection suite, launched in February 2025. It integrates Cylance’s proven, AI-driven threat prevention technology into the Arctic Wolf Aurora Platform, extending advanced prevention and detection directly to endpoints. This cloud-native portfolio includes next-gen antivirus (Aurora Protect), endpoint detection and response (Aurora Endpoint Defense), and two managed service options: on-demand and fully managed.
By leveraging insight from thousands of customers and trillions of weekly security observations, Aurora Endpoint Security delivers proactive threat prevention and rapid detection at scale. Designed for organizations of all sizes seeking enterprise-grade cyber defense, Aurora Endpoint Security provides robust, AI-powered endpoint protection through a unified and easy-to-adopt platform.
Barracuda Managed XDR
Barracuda Managed XDR is a comprehensive next-generation cybersecurity offering that protects organizations of all sizes against today’s ever-evolving threat landscape. A fully managed service that instantly augments an organization’s IT staff, identifies signals amid noise, and reduces TTR from days to seconds, Barracuda Managed XDR features advanced Barracuda AI analytics, SIEM, SOAR and enterprise-grade threat intelligence from 11-plus billion indicators of compromise (IOCs) and 1,000-plus machine learning-enriched detection rules aligned to the MITRE ATT&CK framework.
Ingesting trillions of events across endpoints, servers, cloud, email and firewalls, the system detects, responds to and eliminates cyberthreats in real time across the attack life cycle. An “open” XDR system, Barracuda Managed XDR integrates with an organization’s existing technology, ensuring a smooth deployment while enhancing its security posture and operational efficiency. Barracuda Managed XDR is powered by Barracuda’s 24x7x365 global SOC, featuring five specialized expert-level teams delivering best-in-class SLAs and proactive real-time threat detection and response.
ESET Protect Elite
ESET Protec Elite is a next-gen endpoint offering for businesses and channel partners who require enterprise-grade XDR and all-in-one prevention, detection and response. Leveraging 30 years of cutting-edge threat identification and incident response, ESET Protect Elite defends against ransomware and zero-days by pairing human expertise with proprietary cloud-based sandboxing to provide a powerful, isolated test environment. Unique behavior and reputation-based detection give clients full visibility and real-time feedback, gathered from the 100 million-plus endpoints utilized by ESET LiveGrid.
Throughout 2024 and 2025, major enhancements have been made to the ESET Protect platform to support MSPs and channel partners. One of the major updates was Ransomware Remediation, which offers next-gen ransomware rollback enhanced with remediation features. ESET also announced new AI tools and updated ESET Cloud Office Security with new anti-spoofing capabilities to detect and block impostor messages and homoglyph protection to identify disguised malicious domains and URLs.
Trellix Endpoint Detection And Response With Forensics (EDRF)
Trellix Endpoint Detection and Response with Forensics (EDRF) detects threats, collects forensic data critical to investigations and provides powerful response capabilities. Trellix EDRF gives organizations of any size the visibility and context needed to identify, investigate and respond to threats. Trellix EDRF includes Trellix Wise generative AI to help analysts quickly understand, scope and analyze alerts accurately. Trellix EDR with Wise accelerates threat hunting activities through a single integrated management console and reduces mean time to detect and respond (MTTD/MTTR) by 50 percent, offering substantial benefits for organizations with security analysts and dedicated security teams.
XCitium’s ZeroDwell Technology
Xcitium’s ZeroDwell Technology is an advanced cybersecurity offering purpose-built to neutralize threats before they can execute. Unlike traditional detection-based approaches that only react once malicious activity is identified, ZeroDwell proactively isolates all unknown files and processes at runtime, eliminating risk before damage occurs. Leveraging patented virtualization and real-time containment, the technology prevents ransomware, zero-day attacks and advanced malware without disrupting business operations. ZeroDwell Technology is integrated into Xcitium’s comprehensive cybersecurity platform, serving SMB, midmarket and enterprise organizations across all industries seeking a proactive, prevention-first strategy to secure their endpoints and digital environments.
Security—Identity And Access Management
1Password Extended Access Management
In 2024, 1Password pioneered a new security category with its Extended Access Management platform. For the first time, businesses can close the Access-Trust Gap (the security risks posed by unfederated identities, unmanaged devices, applications, and AI-powered tools accessing company data without proper governance controls) by securing every sign-in, device, and application—even the unmanaged apps and devices that are difficult to secure with legacy IAM and MDM tools.
The platform enables IT and security teams to prevent breaches, reduce IT overhead and spend, and minimize SaaS sprawl. As part of its Extended Access Management platform, 1Password recently announced new Agentic AI Security capabilities to secure and govern identities, credentials, and access of autonomous AI agents in the enterprise. As Agentic AI reshapes the workplace, 1Password provides the missing identity security layer to manage AI agents with the same rigor as human identities, without sacrificing developer velocity or scalability.
CrowdStrike Falcon Identity Protection
CrowdStrike Falcon Identity Protection unifies comprehensive visibility, real-time prevention, detection and response to stop identity-based attacks throughout the entire life cycle—from initial access to lateral movement—across hybrid identity environments. Designed for small businesses, midsize organizations and large enterprises alike, it delivers comprehensive identity security across on-premises Active Directory (AD), cloud-based identity providers and SaaS applications.
Seventy-nine percent of attacks to gain initial access are now malware free, with adversaries exploiting trusted identities to infiltrate organizations undetected. Defending against these evolving threats requires organizations to stop external adversaries from gaining access, while rapidly detecting and eliminating threats that may already be inside. From blocking initial access to detecting and stopping lateral movement with advanced ITDR, Falcon Identity Protection, built on the Falcon platform, unifies endpoint and identity protection to see and secure all potential attack paths across every part of modern hybrid environments.
CyberArk Identity Security Platform’s CORA AI Integration
Centered on intelligent privilege controls, the CyberArk Identity Security Platform seamlessly secures human and machine identities accessing workloads from hybrid to multi-cloud and flexibly automates the identity life cycle. CyberArk released a new set of AI-powered capabilities embedded within the CyberArk Identity Security Platform known as CORA AI. This feature significantly reduces the time and complexity of securing organizational identities, both human and machine.
CORA AI analyzes vast amounts of identity data, identifies anomalies and translates this insight into actionable, natural-language recommendations, enabling security practitioners to quickly detect and respond to identity-based threats. CORA AI streamlines tasks like session analysis, secrets anomaly detection and policy creation, moving from hours of manual work to minutes. Its initial functionality includes an Identity Security Assistant for natural language interaction, automated policy creation and real-time assistance through a documentation chatbot. The target market includes organizations of all sizes seeking to enhance their identity security posture.
Keeper Security KeeperPAM
As a fully cloud-native platform, KeeperPAM consolidates vaulting, secrets management, connection management, zero-trust access and remote browser isolation in a unified interface, eliminating issues users see with legacy solutions. Revolutionizing privileged access security, KeeperPAM provides advanced automation and real-time monitoring, ensuring that every access request is dynamically verified, credentials are securely vaulted and privileged sessions are closely tracked. This end-to-end system minimizes the risk of unauthorized access, streamlines compliance efforts and empowers businesses to stay ahead of emerging threats, whether managing hybrid cloud or on-premises environments.
KeeperPAM enables security teams to control and monitor all privileged accounts, makes audits effortless for compliance teams, and streamlines access to resources with developer-friendly features to enhance productivity for engineering teams. Organizations of all sizes and across all industries benefit from adopting KeeperPAM: 80 percent of organizations that have adopted PAM solutions report a reduction in successful cyberattacks related to credential theft and misuse.
Oasis NHI Security Cloud
Oasis Security provides an enterprise platform purpose-built to address the complex challenges of managing Non-Human Identities (NHIs) across hybrid cloud environments. Oasis delivers end-to-end visibility, security and governance throughout the entire NHI life cycle using cloud-agnostic AI/ML algorithms to automate discovery, classification and risk assessment.
Oasis recently introduced two major advancements to the Oasis Platform. The NHI Ownership Discovery Engine automatically identifies and assigns human owners to NHIs, even in the absence of metadata, improving accountability and compliance. Oasis also introduced Oasis Scout, an Identity Threat Detection and Response (ITDR) offering for NHIs powered by AuthPrint technology to accurately detect and mitigate threats before they escalate
By combining AI-powered intelligence, automation and seamless integrations, Oasis helps organizations proactively manage NHI risks, strengthen security postures and reduce operational complexity. Organizations of all sizes and across all industries benefit from adopting the Oasis Platform.
Security—Managed Detection And Response
Arctic Wolf Managed Detection and Response
As one of the core modules operating on the Aurora Platform, Arctic Wolf Managed Detection and Response helps organizations tackle challenges by providing broad visibility, 24×7 monitoring, and advanced threat detection—all delivered as an outsourced and fully managed solution.
Arctic Wolf MDR optimizes existing security tools for better prevention and then leveraging the Aurora Platform for storage, enrichment, and analysis of their data. It adds external expertise to establish broad 24×7 monitoring that can quickly identify and respond to advanced threats. It continually reviews cybersecurity posture and recommends strategic actions that will harden their environment.
Each Arctic Wolf MDR customer receives on average of less than one ticket per day, which is accompanied by precise remediation recommendations, effectively putting an end to alert fatigue. In addition, a typical Arctic Wolf MDR customer can expect a year’s worth of service to cost less than the annual salary of a single dedicated security analyst.
CrowdStrike Falcon Complete Next-Gen MDR
CrowdStrike Falcon Complete Next-Gen MDR is purpose-built to support organizations of all sizes and industries, whether it’s strengthening the existing defenses of large enterprises with established security programs or enabling small and midsize businesses that lack in-house resources or expertise to combat sophisticated threats. Cyberattacks are becoming increasingly sophisticated, faster and stealthier, creating unprecedented challenges for security teams already strained by the growing cybersecurity skills gap.
CrowdStrike Falcon Complete Next-Gen MDR, powered by the AI-native CrowdStrike Falcon cybersecurity platform, addresses this critical need by providing world-class 24×7 managed detection and response expertise. Falcon Complete operates as a seamless extension of customer teams, providing advanced threat detection, investigation and response across endpoints, cloud, identity and third-party data sources. With unified threat intelligence, cross-domain threat hunting and rapid remediation, CrowdStrike helps organizations close the cybersecurity skills gap, reduce operational complexity and stop breaches.
eSentire Atlas
Atlas allows partners to integrate their services without disrupting existing customer environments. With 300-plus open API integrations, partners can connect their security technology stack. Leveraging agentic AI, Atlas automates threat investigation, risk mitigation and response, reducing operational overhead for partners while enabling faster, more accurate security outcomes. eSentire’s AI engine performs at Tier-3 analyst caliber, allowing MSPs to scale security services without requiring large SOC teams.
Atlas’ AI capabilities eliminate long software development cycles. Partners can design, test and launch new security services in minutes, significantly reducing their time-to-market. Atlas treats customers as a unified security network, enabling automated intelligence sharing and proactive threat blocking, giving MSSPs a competitive advantage and customers superior protection. Atlas supports multitenant compliance models, ensuring partners meet data sovereignty requirements and in-region security mandates. Partners are provided deep security expertise, SOC training, go-to-market support, and co-branded marketing initiatives to enhance service delivery and customer acquisition.
Expel Managed Detection and Response
Expel MDR (Managed Detection and Response) is a 24×7 MDR offering that delivers rapid detection and response and helps large and small customers across every industry build cyber resilience. Expel MDR quickly detects advanced threats across organizations’ tech stacks (including endpoint, cloud, Kubernetes, SaaS, network, SIEM, email, identity and more), and human expertise collaborates with customers’ security teams to verify threats, take critical remediation actions, and provide detailed data and reporting of what happened, where, when and why in real time.
Powered by Expel’s security operations platform, Expel Workbench, the company uses automations and AI to integrate with more than 150 security and business applications to filter out false positives and expected behavior alerts to only surface real issues that require investigation. When a legit alert arises, Expel MDR automatically gathers and presents critical information about the alert to human security analysts to help them in remediation actions.
Security—Network Security, Enterprise
Armis Centrix For VIPR Pro Prioritization And Remediation
Armis Centrix for VIPR Pro-Prioritization and Remediation (VIPR Pro) introduces advancements by going beyond vulnerability management to identify, consolidate, contextualize and prioritize security findings across all sources. This allows security teams to holistically understand risk and automate prioritization. The product streamlines the entire remediation life cycle, from deduplicating alerts from multiple security tools to assigning the appropriate owners for operationalizing fixes, providing a unified platform for prioritization and efficient risk resolution management. VIPR Pro revolutionizes how organizations mitigate high-risk findings, empowering them to stay ahead of evolving threats and safeguard their organization with confidence.
Aviatrix Kubernetes Firewall
The Aviatrix Kubernetes Firewall is designed to provide strong security for Kubernetes environments by giving deep visibility, microsegmentation and policy enforcement to protect containerized applications in multi-cloud and hybrid cloud settings. It secures east-west traffic between Kubernetes clusters, enforces Zero Trust policies, and prevents unauthorized access or lateral movement. The firewall also works smoothly with cloud-native security tools, ensuring compliance and threat protection without slowing down application performance.
The system is ideal for industries with strict security and compliance requirements, such as finance, health care and technology. It is particularly valuable for companies managing multi-cloud Kubernetes deployments, where traditional security solutions may lack the flexibility and scalability needed to protect dynamic containerized environments. By providing a centralized, cloud-native security approach, the Aviatrix Kubernetes Firewall simplifies security operations while enhancing protection for modern, cloud-first businesses.
FireMon Insights
FireMon Insights is an AI-driven network security benchmarking platform designed to help organizations measure, track and improve their firewall policy management. Built in close collaboration with customers, it addresses key challenges facing security operations teams by delivering advanced visibility, real-time benchmarking and actionable intelligence. The platform features nearly 50 KPIs and enables IT leaders to compare firewall policy performance against industry peers, identify high-risk areas and reduce policy complexity.
FireMon Insights’ AI-powered chatbot streamlines troubleshooting and policy validation through natural language interactions, reducing operational bottlenecks. It is purpose-built for enterprises operating in hybrid and cloud environments that require continuous visibility, compliance assuranc and risk reduction. It serves CISOs, security architects and operations teams seeking to align security practices with business goals while optimizing policy efficiency. With FireMon Insights, organizations gain the data and insight needed to proactively manage firewall risk and drive measurable security outcomes
Forescout eyeScope
New to Forescout Cloud, Forescout eyeScope provides a modern enterprise management console that helps medium to large enterprise customers gain visibility into every connected device, the health of their Forescout deployment and the outcomes being achieved.
-Consolidated asset inventory view provides centralized visibility across enterprise networks, helping organizations gain visibility and control of every device whether managed, unmanaged or agentless.
-Proactive health monitoring improves reliability and minimizes downtime.
-Security teams can develop executive-level reports on the overall security posture of the organization to evaluate security program effectiveness and support informed decision-making.
Forescout eyeScope can be easily expanded to solve complex network security, risk and exposure management, and threat detection and response use cases quickly and seamlessly.
Zscaler Private Access
Organizations need secure access to applications, but traditional VPNs pose security risks. Zscaler Private Access (ZPA), a zero trust offering, revolutionized access for modern apps. Now, ZPA extends zero trust to legacy apps like VoIP and server-initiated flows, eliminating VPN gaps. This update enables unified security, allows businesses to retire VPNs, improve security, reduce costs and enhance productivity with seamless access.
ZPA applies fine-grained policies based on identity, device posture and context. A cloud-based overlay ensures continuous verification and least-privileged access. Outbound-only tunnels secure traffic, block inbound threats and prevent lateral movement. By combining network-level connectivity and granular ZTNA, ZPA minimizes attack surfaces and simplifies distributed environments. Its target market is enterprise, SMB and commercial.
Security—Network Security, SMB
Coro Complete
Coro is a cybersecurity platform built for SMBs, providing comprehensive protection across endpoints, email, users, cloud apps and networks. Designed for simplicity, Coro automates 95 percent of security tasks, reducing complexity and eliminating the need for dedicated security teams.
The platform is purpose-built for the channel, enabling MSPs, MSSPs and VARs to deliver powerful cybersecurity services at scale while increasing operational efficiency and profitability. With a modular design, intuitive interface and multi-tenant architecture, Coro makes it easy for partners to on-board and manage multiple customers from a single dashboard. Coro’s offering helps partners secure their clients quickly, consistently, and cost-effectively.
Sophos Firewall OS v21 and new XGS Series Appliances
The new Sophos XGS firewall appliances are a fit for businesses of all sizes, with different models offering excellent performance and connectivity at every price point to power the protection they need for today’s diverse, distributed and encrypted networks.
Sophos XGS devices come with new Sophos Firewall software packed with new features, including support for third-party threat feeds and Let’s Encrypt certificate support—a top customer-requested capability.
Zyxel USG Lite 60AX AX6000 Wi-Fi 6 Security Router
Zyxel USG LITE 60AX AX6000 Wi-Fi 6 Security Router is an all-in-one, cloud-managed router for small businesses, teleworkers and managed service providers. The high-performance appliance combines blazing-fast speeds and best-in-class threat management to provide an easy-to-manage, high-speed, secure networking offering.
USG LITE 60X, which features an intuitive mesh system for automatically establishing dynamic wireless links with Zyxel Nebula access points, delivers wireless speeds up to 6 Gbps and incorporates dual 2.5-GbE WAN/LAN ports to reduce or eliminate network bottlenecks. Robust network security features protect users from cyberthreats such as ransomware, malware and other vulnerabilities, and site-to-site VPN connections using the intuitive Zyxel Nebula Cloud Center provide remote workers with secure access to the main office network. The cloud-native security router is easily managed using Zyxel Nebula Cloud Management platform, enabling users to centrally configure and manage Nebula-compatible access points, switches, firewalls and routers from a single pane of glass.
Security—Security Operations Platform/SIEM
Arctic Wolf Aurora Platform
The Arctic Wolf Aurora Platform is a cloud-native security operations platform that provides comprehensive, 24×7 threat detection and response as a concierge-delivered service. It unifies capabilities like managed detection and response (MDR), vulnerability management, cloud monitoring and security awareness training into a single platform designed to reduce cyber risk.
By ingesting and analyzing trillions of security events per week across endpoints, networks, cloud workloads and identities, Aurora leverages AI-driven analytics to rapidly detect threats and orchestrate remediation.
Backed by Arctic Wolf’s Concierge Security Team for expert guidance, the platform enables organizations of all sizes to achieve enterprise-grade security operations “at the push of a button” without managing complex point tools.
CrowdStrike Falcon Next-Gen SIEM
CrowdStrike Falcon Next-Gen SIEM reimagines security operations by delivering a cloud-native, petabyte-scale solution that provides visibility across all users and data. It combines the CrowdStrike Falcon cybersecurity platform and third-party data with real-time threat intelligence, AI, and automation to accelerate threat detection and response. By eliminating the complexity and cost issues of legacy SIEMs, it empowers organizations to streamline operations, improve visibility and stop breaches faster.
Designed for both midmarket and large enterprises seeking to modernize their SOC, CrowdStrike Falcon Next-Gen SIEM also enables service providers to deliver strategic guidance, deployment and ongoing management, turning SIEM transformation into operational success.
Huntress Managed Security And Information Event Management
Huntress Managed SIEM was built from the ground up to solve the problems of data overload, unfiltered sources and alert fatigue. Unlike traditional SIEMs that overwhelm users with excessive data and alerts, Huntress focuses on what matters most, providing actionable insight and enhanced threat visibility. The system helps organizations address compliance use cases and empowers the Huntress SOC to uncover attacker behavior.
Fully managed and backed by a 24×7 human-led SOC, Huntress handles every aspect—from integration and parsing to detection and monitoring. An expert-led on-boarding process ensures seamless integration with existing tools, getting users up and running with minimal disruption. Huntress Managed SIEM supports Windows event logs, M365, firewalls, Syslog and API integrations, offering dependable, cost-effective protection for under-resourced teams. With affordable data source-based pricing, there are no surprises or hidden fees. It’s a powerful, accessible offering delivering enterprise-grade security without added complexity or costs.
Securonix Noise-Canceling SIEM
Leveraging AI, Noise Canceling SIEM dramatically reduces alert fatigue by suppressing up to 50 percent of total alert volume, allowing your CyberOps team to focus on critical threats. This innovative approach unpacks violations to detect subtle patterns in data, high correlations of alerts, or noisy entities, reducing duplication and irrelevant alerts to improve analyst efficiency and effectiveness.
Through automated analysis, Noise Canceling SIEM minimizes false positives and irrelevant alerts, enhancing speed and efficacy. Noise Canceling SIEM also auto picks SOAR playbooks through the free SOAR LITE module for auto investigations and remediations, accelerating response and reducing incident impacts.
Zscaler Asset Exposure Management
Modern organizations have complex environments with on-premises and cloud-based IT systems and myriad asset types (workstations, laptops, tablets, servers, cloud assets, OT/IoT, etc.). As a result, IT and security operations teams struggle to maintain an accurate inventory of their assets, assess the risks these assets pose, and prioritize which security gaps to fix first. This challenge grows in regulated industries, such as health care and financial services, where non-compliance can result in significant fines.
Zscaler Asset Exposure Management is designed to advance how organizations manage their asset risk, commonly referred to as Cyber Asset Attack Surface Management (CAASM). Serving as a critical foundation for Zscaler’s broader exposure management offerings, this innovative offering consolidates and correlates data from a vast array of sources to deliver a complete and accurate inventory of assets, surfacing of security gaps on these assets, and workflows to mitigate their risk.
Security—Security Service Edge
Cloudflare Quantum-Safe Zero Trust
With Cloudflare Quantum-Safe Zero Trust, Cloudflare advanced the industry by providing the first cloud-native, quantum-safe Zero Trust offering. This set a new industry standard with the only quantum-ready Zero Trust Network Access solution. Today encryption is used to keep online data protected—everything from personal messages to financial information to customer data—and anything that people and organizations would want to keep safe from hackers.
As quantum computers move closer to production, that data is at risk of being unlocked, breaking current encryption methods and potentially exposing data that was once secured. Meaning, the conventional cryptographic algorithms used across the internet securing everything from major financial organizations and health-care providers to government agencies and consumer smart devices, are vulnerable to post-quantum attacks.
Dope.security CASB Neural
Imagine a Cloud Access Security Broker (CASB) that’s not just powerful but effortless. That’s CASB Neural—an AI-driven solution from Dope.security that redefines data security for small to midsize enterprises (500 to 5,000 devices). With zero policies and zero configuration, CASB Neural instantly scans an organization’s Microsoft 365 or Google Workspace tenant to detect externally shared files containing sensitive data: PII, PCI, PHI, intellectual property and more.
Powered by Dopamine DLP, Dope’s proprietary large language models (LLMs), CASB Neural delivers human-readable document summaries and pinpointed sensitive data extractions, ensuring security teams can act fast. It also provides continuous monitoring, automatically detecting file-sharing changes in real time. Sleek, intuitive and built for small to midsize enterprises, CASB Neural transforms data protection from a burden into a seamless, AI-powered advantage.
Fortinet Unified SASE
Fortinet Unified SASE tackles all hybrid workforce security challenges through a comprehensive, single-vendor approach. Fortinet Unified SASE secures the hybrid workforce with robust AI-powered threat protection. Unified SASE offers comprehensive networking and security functionality such as Universal ZTNA, Secure SD-WAN, Firewall-as-a-Service, SWG, and CASB/DLP. It also delivers strong data visibility, control and integrated advanced analytics and DEM for quick threat response.
Simplified interfaces and AI-driven assistance tools reduce operational overhead, while flexible deployment options and a large network of more than 150 global POPs ensure policy enforcement is close to users, meeting compliance and performance needs. With the addition of Fortinet Sovereign SASE, customers can determine how their data is routed and where security inspections occur, whether to a data center owned by Fortinet, a partner or the customer, while ensuring their traffic is protected by Fortinet’s full security stack.
Palo Alto Networks Prisma SASE
Prisma SASE from Palo Alto Networks is a comprehensive SASE offering converging networking and security for the entire hybrid workforce. Prisma SASE secures users, apps, data and devices everywhere they are. It delivers best-in-class security, exceptional user experiences and simplified operations through a unique multi-cloud architecture, single console, unified policies and AI copilot.
Designed for enterprises of all sizes that are embracing hybrid work and digital transformation, Prisma SASE secures an organization’s adoption of GenAI tools, makes secure BYOD a reality, delivers blazing-fast connectivity to apps and secures zero trust branch.
Versa Sovereign SASE
Versa Sovereign SASE allows enterprises, governments and service providers to deploy customized networking and security services directly from their own infrastructure in a “do-it-yourself” model. This first-of-its-kind approach addresses the growing demand for greater control amid evolving data privacy regulations, heightened security threats, and challenges posed by reliance on third-party SaaS infrastructure.
Versa Sovereign SASE is intended for organizations operating in highly regulated industries or operating critical infrastructure that require the highest levels of protection, with the ability to deploy a cutting-edge “air-gapped” infrastructure model ensuring unmatched security.
Storage—Cloud
Backblaze B2 Live Read
Backblaze B2 Live Read is a patent-pending service that gives media production teams working on live events the ability to access, edit and transform media content while it is being uploaded into Backblaze B2 Cloud Storage. This means that teams can start working on content far faster than they could before, without having to drastically change their workflows and tools, massively speeding up their time to engagement and revenue.
Beyond media, the Live Read API can support breakthroughs across development and IT workloads. For example, organizations maintaining large data logs or surveillance footage backups have often had to parse them into hundreds or thousands of small files each day in order to have quick access when needed. But with Live Read, they can now move to far more manageable single files per day or hour while preserving the ability to access parts immediately after they are written.
Infinidat InfuzeOS, Cloud Edition Extended To Microsoft Azure
InfuzeOS powers Infinidat’s software-defined storage (SDS) architecture. It drives the performance, availability, cyber storage resilience, ease of use and economic benefits of the company’s storage platforms, InfiniBox, InfiniBox SSA G4, and InfiniGuard. The InfuzeOS SDS architecture delivers these powerful capabilities without dependence on proprietary hardware or components. InfuzeOS Cloud Edition delivers the InfiniBox platform experience on public cloud compute and storage resources.
Amazon Web Services (was the first supported public cloud platform to support InfuzeOS Cloud Edition and on May 22, 2024, support for Microsoft Azure clouds was announced. New support in InfuzeOS Cloud Edition extends the InfiniBox experience into the Microsoft Azure public cloud. This expanded support for cloud-native/hybrid multi-cloud deployments brings all of the enterprise data services and associated benefits of Infinidat to the cloud, including ease of use, automation and cyber storage resilience.
VirtualZ Computing Virtual Zaac
Zaac is patented software that delivers instant, cloud-based storage for IBM Z environments, enabling mainframe applications to access cloud storage (e.g., AWS S3, Azure Blob, IBM Cloud Object Storage) as if it were native DASD or tape. Designed for enterprises running mission-critical workloads on IBM Z, Zaac eliminates the need for costly physical storage, accelerates disaster recovery and simplifies hybrid cloud integration.
The offering is no-code, installs quickly, and requires no changes to existing applications or infrastructure. With full support for mainframe security protocols (e.g., RACF, ACF2), Zaac ensures secure, scalable storage that meets compliance requirements. Zaac serves highly regulated industries such as financial services, health care, insurance and government, helping organizations cut storage costs while boosting resilience and agility. It’s ideal for any enterprise looking to modernize storage without disrupting operations or investing in new hardware.
Storage—Enterprise
Dell ObjectScale
ObjectScale is built to handle the toughest workloads, delivering fast object performance at nearly limitless scale. ObjectScale’s scale-out, geo-distributed architecture delivers seamless expansion to match exponential data growth: Add nodes as needed to achieve public cloud-scale performance with the control and reliability of private cloud infrastructure. ObjectScale enables globally accessible content repositories through multisite federation and copy-to-cloud capabilities. It minimizes latency and ensures efficient access for distributed users with replication technology.
With support for S3, S3a and NFS, ObjectScale creates versatile, scalable data lakes for analytics and modern applications. Seamless cross-protocol access removes the need to rearchitect, accelerating insight and innovation. A single administrator can manage billions of objects and petabytes of data with ease while integrated management simplifies workflows and maximizes efficiency. ObjectScale provides enterprise-grade security, protecting data with durability and ransomware protection through S3 Object Lock technology.
Infinidat InfiniBox SSA G4
Infinidat’s InfiniBox SSA G4 delivers comprehensive high-end enterprise capabilities, including 100 percent guaranteed availability, real-world application performance, comprehensive cyber resiliency and ease-of-use. It provides available capacity from 86 TB to multi-petabytes.
The offering provides best-in-class, guaranteed cyber resilience with InfiniSafe technology, transparent integration with data center-wide cybersecurity software, and data validation with InfiniSafe Cyber Detection—which adds VMware support with 99.99 percent detection accuracy to find cyberthreats. Seamless hybrid multi-cloud is available with InfuzeOS Cloud Edition for AWS and Azure. InfiniVerse provides proactive AI-driven insight and monitoring while InfiniVerse Mobius simply extends product life cycle with controller upgrades to the next generation of the InfiniBox platform.
Object First Ootbi
Ootbi is an advanced immutable object storage appliance designed for seamless Veeam backup and recovery, built on zero trust and data security principles. It reduces ransomware threats via immutable object storage model, offers smaller Ootbi appliances with 20/40TB capacities and the company’s largest at 432 TB in a single node, scaling up to 1.7 PB in a four-node cluster.
Businesses can mix and match Ootbi to build the perfect cluster to meet immutable storage needs. The latest firmware version yields 10 percent to 20 percent faster Veeam ingest/restore speeds for all Ootbi appliances. The 432-TB box provides twice the performance, unlocking over 8-GBps data transfer speeds on a 1.7-PB four-node cluster.
Additional optimizations unlock generic S3 read/write speeds, offering flexibility for third-party data movers without sacrificing performance. Ootbi’s consumption-based subscription model allows for predictable monthly fees, offering scalable backup solutions from 17 TB to 7 PB, ensuring cost efficiency with lower per-TB pricing as usage grows.
Quantum Scaler i7 Raptor
The Quantum Scalar i7 Raptor is a scalable and dense enterprise tape storage solution, built for hyperscalers, MSPs and large enterprises managing massive growth in unstructured data. Designed to address petabyte- and exabyte-scale demands across data lakes, AI workflows and hybrid cloud architectures, Raptor delivers unmatched sustainability, security and storage economics.
Raptor features an ultra-dense architecture, interactive AI-powered diagnostics, and seamless integration with Quantum’s ActiveScale object storage and StorNext file system. Raptor enables long-term, air-gapped data preservation with minimal energy footprint, meeting today’s needs for cost-effective, high-capacity storage and cyber-resilience. It simplifies deployment and maintenance with customer-replaceable components and predictive analytics, and supports data protection, compliance, archiving, and AI training workflows. This next-gen platform is ideal for customers looking to modernize their storage strategy while reducing TCO and environmental impact.
Unified Communications And Collaboration—Enterprise
Logitech Rally Board 65
Rally Board 65 is an all-in-one videoconferencing offering designed for meeting rooms and open spaces, simplifying the way people meet and collaborate. The expansive 65-inch touch screen enables a seamless and intuitive collaboration experience in any environment. Designed for flexibility, Rally Board 65 works seamlessly with leading platforms like Microsoft Teams, Zoom and Google Meet, so it works beautifully in Android, PC, or BYOD mode, making it adaptable for current and future needs in open spaces and meeting rooms. The simple setup process has Rally Board 65 up and running in minutes, with minimal or no need for on-site IT support.
Luware Nimbus Attendant Console 2.0
The Luware Nimbus Attendant Console 2.0 is a powerful, enterprise-grade tool designed for receptionists and operators within Microsoft Teams, offering features like call queuing, routing and transfer, along with real-time presence information. A significant advancement in call handling and management, Luware’s Attendant Console leverages innovative technology to instantly identify callers, check colleague availability and transfer them with one click. For customers managing high call volumes, where agents handle up to 400 calls daily, even seconds of time saved per call translate to significant efficiency gains. For example, saving just 10 seconds per call results in a saving of over an hour per agent per day.
That’s why Luware has prioritized a simplified, intuitive interface, enabling many actions with a single click. The latest major update incorporates customer feedback and numerous enhancements to its interface layout, workflows and efficiency functionality, as well as the technology that facilitates gradual transition and minimizes disruption.
Owl Labs Meeting Owl 4+
The Meeting Owl 4+ is an all-in-one, 360-degree camera, speaker and mic device, featuring crystal-clear 4K Ultra HD video quality. It is designed to create natural collaboration experiences for in-person, hybrid and remote environments. It features advanced technology, powered by the patented proprietary Owl Intelligence System software. The Meeting Owl 4+ enables companies to scale their meeting room solutions effortlessly and is easy to set up and use.
Along with the other devices in its connected system, the Meeting Owl 4+ offers the ultimate flexibility in both hardware and software. The Meeting Owl 4+ is ideal for businesses that are looking for next-generation technology that brings teams together regardless of location through elevated video and enhanced features.
Owl Labs customers include everything from large enterprises to small businesses, and the company serves over 225,000 organizations, including 92 Fortune 100 companies.
HP Inc. Poly Studio V12 Video Bar
The Poly Studio V12 is a USB video bar designed for small meeting rooms, offering AI-driven video and audio capabilities for a seamless conferencing experience. It features a 4K UltraHD 20-megapixel camera with a 120-degree field of view, ensuring all participants remain clearly visible. The latest generation of Poly DirectorAI technology automatically adjusts framing to keep the focus on active speakers or groups, enhancing engagement in hybrid meetings. For audio, beamforming microphones capture voices with clarity, while stereo speakers deliver room-filling sound.
Poly NoiseBlockAI and Acoustic Fence technologies reduce background noise, ensuring distractions like keyboard typing, office chatter or reverberation don’t disrupt conversations. The device supports an audio pickup range of up to 15 feet, making it well-suited for small spaces. Easy to deploy, the V12 offers multiple power options and connects via USB to Microsoft Teams, Zoom and Google Meet.
Unified Communications and Collaboration—SMB
Intermedia Embedded Solution for Microsoft Teams
Intermedia’s Embedded Microsoft Teams Integration unifies cloud-based UC, contact center and archiving directly within the Microsoft Teams interface—no bots, bridges or third-party plug-ins required. Tailored for businesses of all sizes and the partners who support them, this breakthrough delivers embedded calling and contact center functionality within Teams, combined with intelligent archiving that captures and retains Teams-based interactions, contact center communications, and (soon) Microsoft 365 email—all from right within the familiar Teams interface. It simplifies compliance, enhances productivity and creates a powerful new revenue opportunity for channel partners.
Talkdesk Express
Talkdesk Express is an enterprise-grade omnichannel contact center system designed for SMBs. Available today exclusively through partners, it enables SMBs to leverage the same advanced technology used by large enterprises to deliver modern customer service without the complexity or cost. With automated provisioning, businesses can deploy in minutes (without needing Talkdesk sales support or professional services), centralizing voice, SMS and chat into a single, easy-to-use platform. A 15-day free trial and click-to-buy functionality accelerate adoption.
Key features include:
-User-friendly, omnichannel interface for seamless engagement
AI-powered automation to maximize efficiency
-Instant setup with pre-configured integrations and automatic channel deployment
-Advanced routing, reporting and analytics for a comprehensive customer journey
-Cost-effective, pay-as-you-go pricing with no lengthy contracts
Talkdesk Express accelerates partner growth by automating customer acquisition and enabling fast revenue generation while offering a best-in-class offering for small teams.
Xtel Communications Flexpoint Teams For SMB
Flexpoint Teams for SMB is a voice provisioning and management platform that empowers MSPs to deliver enterprise-grade collaboration to small and midsize businesses. Featuring a single, intuitive interface, Flexpoint dramatically simplifies the deployment of Teams Voice (and other UC platforms) through automated provisioning, real-time analytics and multilayer security. This consolidated approach eliminates the hassle of juggling multiple admin portals, while ensuring that E911 compliance and other core regulatory needs are seamlessly addressed.
Geared toward SMBs that require advanced communication capabilities but lack extensive internal IT resources, Flexpoint reduces overhead and time-to-deploy, giving MSPs a powerful, cost-effective solution for their clients. Supported by Xtel’s deep communications expertise, SMB customers can effectively compete in an increasingly connected world without facing the usual complexity and up-front investment typically associated with advanced UC tools.
Virtualization/Virtual Desktop Infrastructure
Nerdio Manager For MSP (NMM), Version 5.0
Nerdio Manager for MSP (NMM) is a modern work offering tailored specifically to the challenges and business models of MSPs and their customers. Through the platform’s 2024 updates, NMM has grown from a leading AVD management tool into a more comprehensive offering supporting the new ways MSP customers work. This means that NMM now harnesses its existing pane-of-glass approach for AVD management to also support remote and hybrid work across the full Microsoft 365 environment.
NMM now also deploys automation tools that support distinct MSP challenges, including the need to auto-scale quickly, update deployment, manage endpoints, and optimize cloud infrastructure usage. This makes NMM a single tool MSPs can deploy to manage a customer’s individual needs and challenges—whether they’re scaling faster than traditional MSP tools can accommodate or helping a customer navigate workloads across a disparate hybrid working network.
Red Hat OpenShift Virtualization Engine
Many organizations use Red Hat OpenShift Virtualization to manage and deploy virtualized workloads alongside containerized ones on the same unified OpenShift platform. For those prioritizing virtualization, Red Hat OpenShift Virtualization Engine, a new edition of OpenShift, provides a dedicated option focused entirely on virtualization workloads. It simplifies the process of deploying, managing and scaling virtual machines by removing non-virtualization capabilities that they may not currently need.
This targeted approach ensures teams can maximize the value of OpenShift Virtualization while aligning with their specific infrastructure requirements. OpenShift Virtualization Engine easily integrates with tools across the Red Hat portfolio to deliver a complete automation and management offering.