Abstract Photo of people and technology


The right answer.

Enterprise IT Management Software

We are compelled to emphasize our fundamental premise that data has little value without a human connection. OEM equipment is just hardware without a human connection. Big Data is just a mass of 0s and 1s without a human connection. M2's technology specialists bring a human perspective and help make technology perform.


HP Enterprise Security Products

HP and M2 are leading providers of security and compliance solutions for modern enterprises that want to mitigate risk in their hybrid environments and defend against advanced threats. Based on market leading products from ArcSight, Fortify, and TippingPoint, the HP Security Intelligence and Risk Management (SIRM) Platform uniquely delivers the advanced correlation, application protection, and network defense technology to protect today's applications and IT infrastructures from sophisticated cyber threats.

  • ArcSight is the SIEM market share leader - Complete Visibility to Fix Problems Early
    The ArcSight Enterprise Threat and Risk Management (ETRM) platform helps safeguard Federal enterprises by giving complete visibility into activity across the IT infrastructure:

    • External threats such as malware and hackers
    • Internal threats such as data breaches and fraud
    • Risks from application flaws and configuration changes
    • Compliance pressures from failed audits.

    ArcSight ETRM includes the industry's leading security information and event management (SIEM) products for collecting, analyzing and assessing security and risk event information. The result is rapid identification, prioritization and response to policy breaches, cybersecurity attacks and insider threats. ArcSight correlates logs, user roles, and network flows to understand who, what and where of information security. For six consecutive years, Gartner has positioned ArcSight in the Leaders quadrant for SIEM.

  • Fortify Software – Proactively eliminate risk in software

      Key Benefits
    • Reduces time to find and fix vulnerability issues in software
    • Lowers costs associated with development, remediation, and compliance
    • Boosts productivity by automating application security procedures.
    • Accelerates time to market by ensuring fewer security-related delays

    SSA: A Systematic Approach to Eliminating Risk in Software The most effective way to secure today's software is by employing a proactive approach known as Software Security Assurance (SSA). It's a comprehensive discipline that provides you with a systematic way to eliminate vulnerability risk in software. SSA is based on the very sound principle that it's far more effective and cost-efficient to secure applications while they're being developed than to do so after they've been deployed. Accordingly, the key objectives of SSA are not only to identify and remove risk in existing applications, but more importantly to promote secure development practices during development and throughout the application lifecycle.

    HP Fortify Software Security Center

    HP Fortify Software Security Center enables any organization of any size to automate any or all aspects of a successful SSA program. Part of the family of HP Enterprise Security Products, HP Fortify Software Security Center is comprised of industry-leading products, solutions, and features that address the complete spectrum of your application security needs.

    • Address immediate security issues in software you've already deployed.
    • Reduce systemic risk in software you're developing or acquiring from vendors.
    • Meet compliance goals for internal and external security mandates.
  • The TippingPoint Web Application Digital Vaccine Service - Maximize security investments, reduce risk and maintain a healthy network.
    Standard Web application firewalls can have false positives when deployed in-line to block malicious traffic, causing network outages or performance problems instead of ensuring the high availability of the Web applications they are assigned to protect. Mitigating these issues can require constant tuning, adding an unnecessary drain on IT resources and budget.

    TippingPoint Web App DV services identify and remedy any vulnerability in custom-built Web applications without affecting network performance. Web App DV uses a combination of custom DV filters along with standard filters to provide this comprehensive network protection. TippingPoint Web App DV works by first scanning custom applications and associated URLs to determine the weak points in the code that could be exploited by malicious attacks, which TippingPoint's DVLabs team will use to create the custom filters, or set of filters, that will be deployed through the TippingPoint IPS.

    The integral part of the TippingPoint Web App DV solution is the Digital Vaccine® Service. Developed by TippingPoint's world-renowned security researchers (DVLabs), the Digital Vaccine service delivers comprehensive security filters to TippingPoint Intrusion Prevention Systems to pre-emptively protect against the exploit of new and zero-day vulnerabilities.

Fore more information, please get in touch with:

Jeff Hart, Enterprise IT Management Software Representative
Email Jeff

  • Case Study

    Schedule Management

    Client: U.S. Air Force Base
    Issue: Time Constraints, Quick Responses, Competitive Pricing

    "…government entities sometimes force time constraints and a quick response; it can be very difficult to provide timely services to the customer. M2 does a very good job of working within the collapsed time constraints and getting the information, quotes or relevant product to us within a timely manner. This is a very competitive category, but I count on M2 to provide the government the best possible solution and price."

    VIZVOX™ Watchman G3

    Made of high-impact armored housing materials, a steel lanyard and security-grade handset, the Watchman G3 is manufactured to withstand abuse and designed to provide a safe and secure device for inmate pods and cellblocks. The sturdy construction and resistance to tampering offered by the Watchman G3 are critical characteristics for inmate accessible units. Once deployed, VizVox immediately begins to provide value and security to the facility – inmate movement is limited, human resource costs decreased and improved security for jail personnel, courthouse employees and the general public. The Watchman G3 can be configured to provide additional services including: inmate calling, commissary KIOSK services, media downloads and e-mail.

    • 17" Color Monitor
    • Secure Touch Surface Wave Technology
    • SIP Compliant
    • Hi Resolution Camera With VGA Capability
    • Maximum Bandwidth Connection Speed Of 512kbps
    • Remote Low Voltage DC Power
    • Detention Grade Cast Aluminum Housing
    • USB 2.0 External Port