Tech Marketplace

The RH-ISAC Tech Marketplace features industry-leading service and product providers that add value within the RH-ISAC community and the activities it supports.



CONTACT: | 877-425-2624

Akamai powers and protects life online. The most innovative companies worldwide choose Akamai to secure and deliver their digital experiences — helping billions of people live, work, and play every day. With the world's largest and most trusted edge platform, Akamai keeps apps, code, and experiences closer to users — and threats farther away.  Learn more about Akamai's security, content delivery, and edge compute products and services at



Fortinet provides retailers with top-rated cybersecurity solutions covering the entire attack surface. Advantages include centralized visibility and management, lower TCO, and top performance. Proven threat protection and seamless integration deliver better, faster response to attacks across the entire network.


CONTACT: Ben Drumm  |  |  410-200-7328

Kyndryl is the world's largest provider of IT infrastructure services serving thousands of enterprise customers in more than 60 countries. As a focused, independent company, we're building on our foundation of excellence by bringing in the right partners, investing in our business, and working side-by-side with our customers to unlock their potential.

Palo Alto

Palo Alto Networks
CONTACT: Michael Laport | | 866-320-4788 

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life.


360 Privacy
CONTACT: Tom Aldrich  |  |  203-912-3130

360 Privacy’s mission is to protect the digital identity, security, and reputation of high-profile executives, athletes and high net-worth families. Digital identity is at the intersection of physical security, cyber, fraud prevention, and reputation. Powered by proprietary technology and an expert team, 360 Privacy correlates, analyzes and deletes data daily to protect your digital identity, keeping it out of the hands of sophisticated threat actors, fraudsters, and other criminals.

Allure Security
CONTACT: Jason Gonzales |  |  973-420-8518

Allure Security protects brands by finding and stopping online brand impersonation attacks before customers fall victim. Our patented, artificial intelligence-powered engine finds more spoofed websites, social media accounts, and mobile apps more quickly and with greater accuracy than legacy approaches. Our unique, multi-pronged approach to response – blocklisting, decoy data, and takedown – significantly reduces the lifespan of a scam and the damage it can do.

DataDome logo

CONTACT: Brendan Nuessle  |

DataDome’s bot and online fraud protection detects and mitigates attacks with unparalleled accuracy and zero compromise. Our machine-learning solution analyzes 3 trillion signals per day to adapt to new threats in real time. Our 24/7 SOC protects enterprises' mobile apps, websites, and APIs from ATO, scraping, carding, DDoS, credential stuffing, and more. A force multiplier for IT and security teams, DataDome is fully transparent, easy to deploy, and frictionless for consumers.

Flare logo

CONTACT: Bill Imbimbo  |  |  833-685-3527

Flare’s platform proactively detects threats across the clear and dark web using a simple, flexible approach that empowers our customers to monitor dozens of sources for external risk. Flare unifies the core functionalities of a cyber threat intelligence, digital risk protection services and external attack surface management into an effective solution for RH-ISAC Members to reduce risk.


CONTACT: Alyssa Downing  |  516-721-5920

Flashpoint delivers Business Risk Intelligence to empower organizations with meaningful intelligence and information to combat threats. To learn more visit

Accenture Logo

Intel 471
CONTACT: Joy Nemitz  |  408-765-8080

Intel 471 provides the RH-ISAC team with timely and exclusive data on current, real-time threats and pending future threats. This partnership provides the RH-ISAC with increased visibility and focused insight related to the increased number and sophistication of attacks against retailers.

Niso Logo

Nisos - The Managed Intelligence Company
CONTACT: Dylan Hennessy  |  |  602-549-9398

Nisos is The Managed Intelligence Company™. Our analyst-led intel investigations, assessments, and monitoring services empower your security, intelligence, and trust and safety teams. We provide accurate, customized intelligence that guides your security and risk decisions - protecting your organization, assets, and people.

CONTACT: Mike Petitti | | 312-267-3222

Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security. Our elite Trustwave SpiderLabs team provides award-winning threat research and intelligence, which is infused into Trustwave services and products to fortify cyber resilience against advanced threats.


CONTACT: David Capezza | 908-601-2752

Indicators of Compromise help organizations determine if they have been the target of a breach and contributes actionable data helping merchants avoid future breaches. When payment fraud occurs, Visa’s Risk and Fraud teams collect and analyze information from the breach and that data is provided through an API to VTI subscribers.



CONTACT: 877-929-2374

CyberGRX is on a mission to modernize third-party cyber risk management. Built on the market’s first third-party cyber risk exchange, CyberGRX's dynamic and scalable approach is innovating TPCRM for enterprises and third parties. Armed with fast and accurate data and a proven and innovative approach, CyberGRX customers make rapid, informed decisions and confidently engage with partners.



Our purpose—to build trust in society and solve important problems—is at the core of everything we do. To help our clients build trust and deliver sustained outcomes, PwC provides professional services across two segments: Trust Solutions and Consulting Solutions. Within these segments we bring a range of capabilities to help organizations solve faster, solve more and realize more value. These capabilities include cloud and digital, cybersecurity and privacy, risk, transformation, and much more.

Risk Recon

CONTACT: Holly Glynn |

RiskRecon, a Mastercard company, is the only continuous vendor monitoring solution that delivers risk-prioritized action plans custom-tuned to match your risk priorities. RiskRecon provides the world’s easiest path to understanding and acting on own enterprise and third-party cyber risk, enabling organizations to efficiently operate scalable, third-party risk management programs for dramatically better risk outcomes.

Security Scorecard

CONTACT: 800-682-1707

SecurityScorecard is the global leader in cybersecurity ratings and the only service with over 1.4 million companies continuously rated. The SecurityScorecard platform is used by over 1,200 organizations around the world for third-party risk management, cyber risk monitoring, board reporting, and cyber insurance underwriting. SecurityScorecard offers organizations valuable insights into the vulnerabilities that exist in their own environments and their third-party ecosystems



CONTACT: Scott Oldfield  |  |  888-452-4011

Armis is the leading agentless, enterprise-class device security platform designed to address the new threat landscape of unmanaged and IoT devices. Fortune 1000 companies trust our real-time and continuous protection to see and control all managed, unmanaged, and IoT devices – from traditional devices like laptops and smartphones to new smart devices like smart TVs, webcams, printers, HVAC systems, industrial control systems and PLCs, medical devices and more. Armis provides passive and unparalleled cybersecurity asset management, risk management, and automated enforcement. 


Booz Allen Hamilton Logo

Booz Allen Hamilton
CONTACT: Omar Ellis | 703-902-5000

We are a global firm of approximately 27,600 diverse, passionate, and exceptional people driven to excel, do right, and realize positive change in everything we do. We bring bold thinking and a desire to be the best in our work in consulting, analytics, digital solutions, engineering, and cyber, and with industries ranging from defense to health to energy to international development.



CONTACT: George Cuchural  |  |  781-630-3136

HackerOne was started by hackers and security leaders who are driven by a passion to make the internet safer. Our platform is the industry standard for hacker-powered security. We partner with the global hacker community to surface the most relevant security issues of our customers before they can be exploited by criminals.


CONTACT: Sophie Barrett  |  802-355-9788  |

Kasada provides website, API, and mobile app protection for enterprises that are quick to evolve, difficult to evade, and invisible to customers. The Kasada technology and team defend some of the largest brands in the world from automated threats without impacting the end-user experience. Kasada’s defenses work by combining server-side detections and invisible client-side challenges with an unmatched understanding of how adversaries evade detection. 

Red Sift Logo

Red Sift
CONTACT: Brian Westnedge |  |  303-817-9141

Red Sift's Digital Resilience Platform solves for the greatest vulnerabilities across the complete attack surface. By providing comprehensive coverage of an organization’s digital footprint through best-in-class discovery and monitoring, Red Sift enables users to proactively uncover threats within email, domains, brand, and the network perimeter. Paired with sophisticated remediation capabilities, Red Sift provides organizations with the tools to shut down phishing and ensure ongoing compliance with email and web security protocols.


CONTACT: Quinton Schanbaum | 972-378-5554 x310 |

Specialized Security Services, Inc. (S3 Security) is building cyber resilience to support business in a digital world. We are a woman-owned, global cybersecurity firm headquartered in Dallas, TX. For over 23 years, our expert team has successfully assisted organizations with the design, implementation, & ongoing testing of their cyber & information security programs, providing professional guidance with clarity & assurance.

At S3 Security, people are our purpose, and we form long-lasting, strategic partnerships with our clients. We recognize that behind every security program, title, policy, and security control are real people protecting other people. We've seen a lot in the past two decades and apply this knowledge with straightforward cyber security guidance, information, and education.


CONTACT: Chris Simmons | 415-848-8450 |

Splunk Inc. (NASDAQ: SPLK) turns data into doing with the Data-to-Everything Platform. Splunk technology is designed to investigate, monitor, analyze, and act on data at any scale.


CONTACT: Heather Smith | 1-800-513-2502 |

SpyCloud protects consumers, employees, suppliers, and citizens globally from the dangers of compromised identity. Its solutions make breached information actionable to prevent fraud, enabling a proactive, automated response that negates the value of stolen data before it can be used to cause harm. Its data also powers many popular dark web monitoring and identity theft protection offerings. SpyCloud customers include four of the ten largest global enterprises, mid-size companies, and government agencies around the world. 


Level 6

Level 6
CONTACT: Kevin Jackson | 513-270-0150 |

Level 6 Cybersecurity's analytic tool suite - LISN - uses the power of artificial intelligence to analyze what statistically works and fails in cybersecurity, delivering detailed answers to the most pressing information security questions every organization faces. These answers are based on cybersecurity ROI calculations from real-world data, giving cybersecurity decision-makers actionable guidance on what security strategies to employ for maximum organizational benefit.




Accenture Security helps organizations build resilience from the inside out. With services including strategy & risk management, cyber defense, digital identity, application security & managed security, Accenture enables businesses around the world to defend against threats. Follow @AccentureSecure on Twitter or visit the Accenture Security blog.

N2K Networks
CONTACT: Patrick Mullan |

N2K Networks delivers strategic workforce intelligence that enables organizations to build and maintain high-performing teams, rapidly climb the knowledge curve, and stay a step ahead in a relentlessly changing world. As part of our Strategic Cyber Workforce Intelligence capabilities, our solutions provide measurable and actionable insights into your team's capabilities to build effective talent strategies and make continuous talent development decisions.