CMA Technology Subprocessors
Security
CMA Technology provides tailored federal cyber solutions, enhancing security operations and improving network visibility.
| Name | Category | Purpose | Country | Data Processed |
|---|---|---|---|---|
| Palo Alto Networks ↗ | Security | - | - | - |
| Splunk ↗ | Analytics | - | - | - |
| Armis ↗ | Security | - | - | - |
| Gigamon ↗ | Network Visibility | - | - | - |
| Snowflake ↗ | Data Warehouse | - | - | - |
| Thales ↗ | Security | - | - | - |
| VAST Data ↗ | Storage | - | - | - |
| Wiz ↗ | Cloud Security | - | - | - |
| Forward Networks ↗ | Network Visibility | - | - | - |
| Vectra AI ↗ | Security | - | - | - |
| Everbridge ↗ | Communications | - | - | - |
| Informatica ↗ | Data Integration | - | - | - |
| Varonis ↗ | Data Security | - | - | - |
| CyberArk ↗ | Security | - | - | - |
| F5 ↗ | Application Delivery | - | - | - |
| Nutanix ↗ | Cloud Infrastructure | - | - | - |
| Rubrik ↗ | Data Management | - | - | - |
| Trellix ↗ | Security | - | - | - |
| ZeroFox ↗ | Security | - | - | - |
| Harness ↗ | DevOps | - | - | - |
Your data may flow beyond direct subprocessors. Click to expand and see the chain.
Loading data flow...
No changes recorded yet. Changes will appear here after the next scan detects updates.
Summary
20
Total Subprocessors
0
Countries
13
Categories
0%
in
Subprocessors by Country
Subprocessors by Category
Biggest overlap with
Other companies using the most of the same subprocessors
Common in your industry
Top subprocessors used by other Security companies