CMA Technology Subprocessors
Security
CMA Technology provides tailored federal cyber solutions, enhancing security operations and improving network visibility.
| Name | Category | Purpose | Country | Data Processed |
|---|---|---|---|---|
| Palo Alto Networks ↗ | Security | - | - | - |
| Splunk ↗ | Analytics | - | - | - |
| Armis ↗ | Security | - | - | - |
| Gigamon ↗ | Network Visibility | - | - | - |
| Snowflake ↗ | Data Warehouse | - | - | - |
| Thales ↗ | Security | - | - | - |
| VAST Data ↗ | Storage | - | - | - |
| Wiz ↗ | Cloud Security | - | - | - |
| Forward Networks ↗ | Network Visibility | - | - | - |
| Vectra AI ↗ | Security | - | - | - |
| Everbridge ↗ | Communications | - | - | - |
| Informatica ↗ | Data Integration | - | - | - |
| Varonis ↗ | Data Security | - | - | - |
| CyberArk ↗ | Security | - | - | - |
| F5 ↗ | Application Delivery | - | - | - |
| Nutanix ↗ | Cloud Infrastructure | - | - | - |
| Rubrik ↗ | Data Management | - | - | - |
| Trellix ↗ | Security | - | - | - |
| ZeroFox ↗ | Security | - | - | - |
| Harness ↗ | DevOps | - | - | - |
No changes recorded yet. Changes will appear here after the next scan detects updates.
Summary
20
Total Subprocessors
0
Countries
13
Categories
0%
in
Subprocessors by Country
Subprocessors by Category
Biggest overlap with
Other companies using the most of the same subprocessors
Common in your industry
Top subprocessors used by other Security companies