- Our Vendors
- Open a Ticket
Zebra Technologies represents the best vendors in the field of network and cyber security. Using unique integration between solutions, we are pushing forward future changes and innovation.
"Trend Micro has been working with Zebra Technologies for almost 10 years, and throughout the partnership, we have been continually impressed with Zebra’s ability to always add value to our customers, innovate with the evolving market and be a reliable value added distributor"Yael Teryohin, Country Manager at Trend Micro
"Zebra Technologies pioneered the distribution market with a model that brings technical value to all partners and customers. Zebra has been distributing Juniper Solutions in Israel for the past decade and has been recognized in Juniper World as a professional, skilled distributor with proven receipts"Gilron Tzarum, Sr. Partner Account Manager at Juniper Networks
"The long-standing partnership between Zebra Technology and Forcepoint is based on openness, blind faith and mutual acceptance. Knowing that Zebra is always there for us to help with any challenge gives us flexibility, fast reactivity and resilience. The partnership with Zebra includes significant additional metrics including sales resources, financing capabilities, inventory, Demo assistance and partner support"NITZAN COHEN, Regional Manager at Forcepoint
"Zebra Technologies has been a true ADDED VALUE DISTRIBUTOR of the world's most advanced cyber security solutions for Palo Alto Networks in Israel... Zebra Technologies' professional team including product managers and professional system engineers are certified with official manufacturer certifications and thus bring significant added professional value most especially in the design and construction process of the project for both the integrator and the end customer"Dudi Ilan, GM Israel & Cyprus at Paloalto Networks
"Zebra, Gigamon's distributor in Israel specializes with leading cyber security manufacturers and this has created a base of collaboration for Gigamon with other vendors as well as a growing ecosystem of partners. Zebra's professional team... allows a broad picture of the markets needs in the field of cyber security and thus has become a significant value-added distributor that connects needs, partners and customers"Ziv Rokach, Senior Regional Sales Director, EMEA EAST at Gigamon
Juniper, we believe that the network is the single greatest vehicle for knowledge, understanding, and human advancement that the world has ever known. The task of delivering a network in the digital transformation era pivots on the creativity and commitment of our people. It requires a consistent and committed practice—something that we call the Juniper Way.
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.
By delivering an integrated platform and empowering a growing ecosystem of partners, Palo Alto Networks is at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices.
Trend Micro’s unwavering vision has been to make the world safe for exchanging digital information. Security is our entire focus, and it shows. 250+ million endpoints. 500,000+ companies worldwide. One security software company.
Forcepoint is the leading user and data protection cybersecurity company, entrusted to safeguard organizations while driving digital transformation and growth. Our solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value.
Gigamon provides network visibility and analytics on all traffic across physical, virtual and cloud infrastructure to solve for critical security and performance needs by Using a single integrated platform.
Imperva is an analyst-recognized, cybersecurity leader championing the fight to secure data and applications wherever they reside by delivering best-in-class cybersecurity solutions on-premises, in the cloud, and across hybrid environments.
Pulse Secure is a company that 100% focused on delivering secure access solutions for people, devices, things and services. For years, enterprises of every size and industry have been trusting our integrated virtual private network, network access control, mobile security and application delivery solutions to enable secure access seamlessly in their organizations and to empower digital transformation.
Forescout Technologies is the leader in device visibility and control. Our unified security platform enables enterprises and government agencies to gain complete situational awareness of their extended enterprise environment and orchestrate actions to reduce cyber and operational risk.
RAD – As a global telecom access solutions vendor, RAD is committed to enabling service providers and critical infrastructure operators to evolve any service over any network. be it in network edge virtualization and vCPE, industrial IoT, or 5G xHaul. Evolve any service over any network with RAD.
RSA is one of the first public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and distinct from the decryption key which is kept secret.
A10 Networks provides secure, scalable application services for on-premises, cloud, and edge-cloud environments. Enabling Service providers and enterprises to deliver business–critical applications that are secure, available, and efficient for multi-cloud transformation and 5G readiness.
Tenable.io® is a Leader in Vulnerability Risk Management.
provides the actionable and accurate data you need to identify, investigate, and prioritize the remediation of vulnerabilities and misconfigurations in your modern IT environment.
Available as a cloud-delivered solution, intuitive dashboard visualizations for rapid analysis, and seamless integrations that help you maximize efficiency and increase effectiveness.
Terafence Ltd. has developed an advanced firmware/microchip solution for cyber security connectivity and additional mechanical waves based solution to control medical implants and wearable devices. Established in 2015, our patent-pending TFence™ technology uniquely offers total protection from tampering or hacking IoT devices by completely blocking data entry – while maintaining data outflow and control intact. And relevant patent describing a secure way to control implants and wearable based on ultrasound waves. Our pioneering company comprises seasoned professionals sharing a common goal – to make IoT and NoT safe and secure from malicious attacks.