SAUDI THALATE GROUP

Products

We are proud Product Distributors of Gartner’s best Technology Leaders

Our award-winning product distribution and premium cyber security solutions are well suited to meet your requirements. With our commitment to innovation, We at CyberSTG ensures that our clients are prepared to prevent, detect, and respond to cyber threats by offering world-class network products and in-depth knowledge of the latest security technologies.

Identity Governance & Administration

IGA provides administrative control of digital identities and access rights across multiple systems for multiple user types — members of the workforce, partners and machines. IGA tools aggregate, correlate and orchestrate disparate identity and access rights data distributed throughout an organization’s IT ecosystem both on-premises and in the cloud. 

SAILPOINT

IdentityIQ

ORACLE

Identity  Governance

OKTA

Lifecycle Management

IBM

SV Governance

ONE IDENTITY

OI Manager

Privilege Access Management

A privileged access management (PAM) tool is used to mitigate the risk of privileged access. In other words, accounts, credentials and operations that offer an elevated (or “privileged”) level of access. PAM tools are used by machines (software) and by people who administer or configure IT Infrastructure. A PAM solution can be deployed as on-premises software, SaaS or a hardware appliance.

CyberArk

BeyondTrust

Delinea

Arcon

Iraje

Network Security

Network firewalls are used for bidirectional stateful traffic inspection (for both egress and ingress) to secure networks. These can be on-premises, hybrid (on-premises and cloud), public cloud or private cloud networks. Network firewall enforced through hardware, virtual appliances, cloud-native controls and support different deployment use cases, such as for perimeters, midsize enterprises, data centers, clouds, cloud-native and distributed offices.

F5

PALOALTO

FORTINET

CHECKPOINT​

FORCEPOINT

Endpoint Protection Platforms

An Endpoint Protection Platform (EPP) is a solution deployed on endpoint devices to prevent file-based malware, to detect and block malicious activity from trusted and untrusted applications, and to provide the investigation and remediation capabilities needed to dynamically respond to security incidents and alerts. 

SYMANTEC

TRELLIX

MICROSOFT

TRENDMICRO

SOPHOS

Governance Risk & Compliance

Integrated risk management (IRM) as the combined technology, processes and data that serves to fulfill the objective of enabling the simplification, automation and integration of strategic, operational and IT risk management across an organization.

SYMANTEC

RSA

LOGICMANAGER

METRICSTREAM

IBM

Data Loss Prevention

DLP technology includes offerings that provide visibility into data usage and movement across an organization. It also involves dynamic enforcement of security policies based on content and context for data in use and at rest. DLP technology seeks to address data-related threats, including the risks of inadvertent or accidental data loss and the exposure of sensitive data, using monitoring, alerting, warning, blocking, quarantining and other remediation features

SYMANTEC

TRELLIX

MICROSOFT

FORCEPOINT

GTB TECH

SIEM Solutions

SIEM aggregates the event data that is produced by monitoring, assessment, detection and response solutions deployed across application, network, endpoint and cloud environments. Capabilities include threat detection, through correlation and user and entity behavior analytics (UEBA), and response integrations commonly managed through security orchestration, automation and response (SOAR). Security reporting and continuously updated threat content through threat intelligence platform (TIP) functionality are also common integrations. SIEM is primarily deployed on-premises deployment and it also support cloud-based services.

SPLUNK

LOGRHYTHM

DELL

IBM

TRELLIX

Business Intelligence Platforms

Analytics and business intelligence (ABI) platforms enable less technical users, including businesspeople, to model, analyze, explore, share and manage data, and collaborate and share findings, enabled by IT and augmented by artificial intelligence (AI). ABI platforms may optionally include the ability to create, modify or enrich a semantic model including business rules.

SALESFORCE

MICROSOFT

QLIK​

SISENSE​

SAP​

More

MANDIANT

QUALYS

HP

BROADCOM

VMWARE

FORGEROCK

PINGIDENTITY

Barracuda