¥Õ¥£¥ê¥Ô¥ó¤Î¥µ¥¤¥Ð©`¥»¥­¥å¥ê¥Æ¥£ ¥È¥Ã¥×¹«Ë¾

  1. IBM Corporation

  2. Cisco Systems Inc.

  3. Fortinet Inc.

  4. Trend Micro Inc.

  5. Palo Alto Networks Inc.

*ÃâØŸÊÂí—£ºÉÏλ¹«Ë¾¤Ï혲»Í¬

¥Õ¥£¥ê¥Ô¥ó¤Î¥µ¥¤¥Ð©`¥»¥­¥å¥ê¥Æ¥£Êг¡ Ö÷Òª¥×¥ì©`¥ä©`

¥Õ¥£¥ê¥Ô¥ó¤Î¥µ¥¤¥Ð©`¥»¥­¥å¥ê¥Æ¥£ ÊЈö¼¯ÖжÈ

¥Õ¥£¥ê¥Ô¥ó¤Î¥µ¥¤¥Ð©`¥»¥­¥å¥ê¥Æ¥£Êг¡ ¼¯ÖжÈ

¥Õ¥£¥ê¥Ô¥ó¤Î¥µ¥¤¥Ð©`¥»¥­¥å¥ê¥Æ¥£ »áÉçÒ»ÓE

  • Cisco Systems Inc.

  • Fortinet Inc.

  • Trend Micro Inc.

  • Palo Alto Networks Inc.

  • IBM Corporation

  • Check Point Software Technologies Ltd.

  • Kaspersky Lab

  • Sophos Ltd.

  • Dell Technologies Inc.

  • Microsoft Corp. (Defender)

  • Huawei Technologies Co. Ltd.

  • RSA Security LLC

  • Accenture PLC (MSSP)

  • PLDT Enterprise (ePLDT Cybersecurity)

  • Globe Telecom Inc. (Globe Business CyberSec)

  • Dragonpay Corp. (Cyber-fraud solutions)

  • MicroD International Inc. (MDI Novare)

  • eSecure Networks Inc.

  • Pointwest Technologies Corp.

  • Netpoleon Philippines

Êг¡¥×¥ì©`¥ä©`¤È¾ººÏËûÉç¤ÎÏêϸ¤¬±ØÒª¤Ç¤¹¤«£¿
±Ê¶Ù¹ó¤ò¥À¥¦¥ó¥í©`¥É

¥Õ¥£¥ê¥Ô¥ó¤Î¥µ¥¤¥Ð©`¥»¥­¥å¥ê¥Æ¥£ ¥ì¥Ý©`¥È¥¹¥Ê¥Ã¥×¥·¥ç¥Ã¥È