Our partnerships are one of the cornerstones of Safeway's business, where long-term relationships, deep technical expertise and a long history of success bring our customers the best information security solutions. We constantly evaluate these partnerships to bring our customers what will really bring value to their business.


When it comes to cyber security threats, no one is immune. That's why IBM® Security helps its customers develop an intelligent, integrated immune system to prevent and repair the damage cyber attacks can do to their organization.

• QRadar SIEM
• QRadar Vulnerability and Risk Management
• QRadar Cloud
• AppScan
• MaaS360
• Identity and Access Management
(Web, Mobile, Policy, Single Sign-On)
• Big Fix
• Guardium
• Trusteer
• Security Secret (Password Vault)


Cybereason is a leader in endpoint protection, offering endpoint detection and response, state-of-the-art antivirus, managed monitoring and IR services.
Founded by elite intelligence professionals born and raised in the first attempt at attack, Cybereason offers companies the edge over cyber adversaries.
The Cybereason platform is powered by a personalized graphic in memory, the only truly automated hunting engine anywhere. It detects patterns of behavior at all endpoints and presents malicious operations in an exceptionally friendly interface. Cybereason is a privately held company with headquarters in Boston, with offices in London, Tel Aviv and Tokyo.






Hewlett Packard Enterprise

An open, intelligent and comprehensive approach to `` Protecting the New. Protect applications and data, drive identity-centric controls and intelligence, and leverage powerful analytics to detect known and unknown threats. HP Micro Focus solutions include the best enterprise-class security platform, with built-in scalability and analytics to drive the future of security.

• ArcSight
• Fortify
• Secure Gateway


All essential security solutions working together to protect your business.
The Symantec Integrated Cyber Defense (ICD) platform provides Endpoint Security, Web Security, Email Security and Identity Security across on-premises and cloud infrastructures to provide the most complete and effective asset protection in the industry.

Cloud Access Security Broker CASB
Endpoint Security
Secure Web Gateway Web Isolation


BeyondTrust security solutions provide the visibility and control you need to safely reduce risk, maintain productivity and ensure business continuity. The company is a world leader in privilege security, offering a straightforward and straightforward approach to preventing data breaches related to stolen credentials, hijacked internal accounts and improper privileges.

• Retina
• Powerbroker PAM
• IoT Vulnerability

Kaspersky Lab

Kaspersky Lab's detailed threat intelligence and security expertise transform into security solutions and services to protect businesses, critical infrastructures, governments and consumers around the world. The company's comprehensive portfolio includes superior endpoint protection and numerous specialized security solutions and services to combat evolving sophisticated digital threats.

More than 400 million users are protected by Kaspersky Lab technologies and 270,000 corporate customers are protecting what matters most to them.

• Kaspersky Endpoint Security
• Kaspersky Endpoint Detection and Response
• Kaspersky Hybrid Cloud Security
• Kaspersky Anti Targeted Attack Platform
• Kaspersky Private Security Network
• Kaspersky Embedded Systems Security


WatchGuard has developed approximately one million integrated multifunction threat management appliances worldwide. Its unique red boxes are engineered to be the smartest, fastest and most excellent security devices on the market, with all scanning engines running full force.

• WatchGuard Unified Threat Management (UTM)
• WatchGuard Dimension


Imperva is a leader in providing data security solutions and critical applications on cloud-based and on-premise models. Aiming to defend companies from cyber attacks and insider threats, their solutions enable you to identify assets and risks within corporate perimeters, protecting what really matters: intellectual property, business plans, secret deals, customer and employee information, as well as data. day by day that guide the development of business.

• Imperva Database Activity Monitor (DAM)
• Imperva Web Application Firewall (WAF)


Varonis vision is to protect your sensitive information from threats, automate time-consuming tasks and extract intelligence from your data. The platform 'collects', stores and analyzes metadata non-intrusively, in real time, from leading unstructured data storage platforms. It was engineered from scratch by a team of technologists with expertise, deep mastery, and obstinate in tackling giant problems.

• DATADVANTAGE Data Audit & Protection
• DATALERT User Behavior Analytics
• DATA CLASSIFICATION ENGINE Sensitive Content Discovery
• DATAPRIVILEGE Data Access Governance
• DATA TRANSPORT ENGINE Data Retention & Migration
• AUTOMATION ENGINE Security Orchestration
• VARONIS EDGE Perimeter Telemetry
• GDPR PATTERNS GDPR Content Discovery
• SATANSWERS Enterprise Search And eDiscovery


McAfee offers cyber security solutions for consumers and businesses, helping them orchestrate truly integrated cyber environments where security threat protection, detection and neutralization occur simultaneously and collaboratively.

Complete Endpoint Protection - Business
• Endpoint Security


Thales offers everything an organization needs to protect and manage its data, identities, intellectual property, and regulatory compliance. All through encryption, advanced key management, tokenization, privileged user control, within the highest certification standards for high security solutions.

• Vormetric
• Key Management


Cloudflare protects and accelerates any Internet Online application without adding hardware, installing software, or changing a line of code. The properties provided by the company have all traffic routed through its smart global network - which improves with each new site added. As a result, you can see a significant performance improvement and a decrease in spam and other attacks.

Cloudflare has been recognized by the World Economic Forum as a Pioneer in Technology and named the Most Innovative Network for two consecutive years by the Wall Street Journal, a title that has also made it among the 50 placed by Fast Company.

• Web Application Firewall
• DDoS Protection


FireEye is at the forefront of cyber attacks. Their expert knowledge of the threat landscape provides insights that enable them to build industry-leading technologies through a unique innovation cycle that combines technology with expertise to continually improve solutions with industry-leading speed and sophistication.

• FireEye Helix
• Network Security
• Endpoint Security
• Email Security
• FireEye Threat Analytics
• Network Forensics
• FireEye Security Suite


Veracode provides the application security solutions and services that today's software-driven world requires. CA Veracode's unified platform assesses and enhances application security from inception to production so that companies can confidently innovate with the mobile and web applications they create, buy and build, as well as the components they integrate in their environments.


IntSights Cyber Intelligence provides an automated system that detects, analyzes, and corrects threats through an intuitive dashboard. Offers solutions for attack intent, data leakage, phishing, fake applications and VIP protection. The company is headquartered in Herzliya, Israel, with an additional office in Amsterdam, the Netherlands.

This year, IntSights Cyber Intelligence announced the launch of its new solution, IntSights for Financial Services, designed to help financial services and banking organizations anticipate direct threats, reduce fraud costs and protect their customers. The new IntSights for Financial Services solution incorporates finance-specific digital assets and new sources into the IntSights cyber risk analysis algorithm, enabling users to; Enjoy active SWIFT code monitoring against fraudulent activity, discover compromised bank accounts, identify stolen credit cards, discover hacked bank account logins, and leverage dedicated research and analysis from a large repository of threat sources specifically related to information sharing financial and / or attack planning financial organizations.


SOPHOS has been developing antivirus and encryption for over 32 years. Its products help protect networks used by more than 100 million people in more than 150 countries and for 100,000 companies, including Pixar, Under Armor, Northrop Grumman, Xerox, Ford, Avis, and Toshiba.

As networks grow in complexity, we are focused on keeping security simple and reliable.

Sophos Solutions is based on an integrated security strategy that includes networks, servers and mobile devices, all centrally managed through the cloud.
Are they:

- Firewall
Visibility and Full Control, Zero Days Attack Protection, High performance.

- Wireless
Managed access points via NGFW and via Cloud and High device density.

- Endpoint
Full Anti-Malware, Anti-Exploit and Ransomware protection.

- Mobile
Policy Enforcement & Mobile Control, Corporate Data Protection

- Web
Policy configuration and implementation, Sandboxing Cloud with Sandstorm.

- Email
Anti-Spam and Anti-Malware protection for cloud MTAs such as Office365.

- Encryption
Disk and File Encryption, Data Loss Transparently

- Server
For physical and virtual environments, uncomplicated Server Lockdown Super Protection


Microsoft uses intelligent security to reduce complexity, empower security teams, and provide seamless user experiences.

Microsoft Windows
Microsoft Office, Office 365
Protection from Azure and Office 365 threats
Microsoft Azure
Microsoft Authenticator

Intel Security


XM Cyber was founded by the highest caliber of security executives in Israel's elite intelligence sector. Together, they bring a proven track record unmatched in both offensive and defensive cyberspace.
Our team shares extensive experience in the latest attack techniques and in-depth knowledge of the blue team and red team processes. This distinctive skill set helps us position ourselves as the only cyber defense vendor based on ongoing, fully automated purple team activities.



Tufin is a security policy management company specializing in automating security policy changes on hybrid platforms, improving security and compliance. The Tufin Orchestration Suite supports next-generation firewalls, network layer firewalls, routers, network switches, load balancers, web proxies, private and public cloud platforms and micro services.

Tufin Orchestration Suite ™


Forcepoint products are guided by an understanding of people's behavior and intention. Our innovative technology, decades of experience and a clear vision help solve critical security issues to protect employees, business data and intellectual property.

Web Security
Email Security
Data Guard
Inside Threat


Governance, risk and compliance
Respond to business risks in real time. Connect security and IT with an integrated risk program that offers continuous monitoring, prioritization and automation.

Security Operations
Identify, prioritize and respond to threats faster. Connect existing security tools to a security orchestration, automation and response mechanism to resolve incidents quickly.


Know your data: find and inventory personal data for each data subject with BigID software. Classify, catalog and correlate all confidential customer data between sources. Get a demo. Structured and unstructured. Rights of the data subject. Petabyte scale.


Rio de Janeiro
Telephone: +55 (21) 4063.7233
Luiz Carlos Prestes Avenue, 180
3rd floor, ZIP Code: 22775-055

Sao Paulo
Telephone: +55 (11) 4063.3221
Av. Dr. Chucri Zaidan, 1550 cj 1916/1917
19th floor, Postal Code: 04711-130

Belo Horizonte
Telephone: +55 (31) 4063.9511
Av. Do Contorno, 6594
17th floor, ZIP Code: 30110-044