Vendor Guidelines

A list of vendors that are used in packages for the #Vendor tag.

If you are creating a package with a vendor that has already been used in other packages, make sure to use the same name as they have in here. If you create a package for a new vendor, add the vendor name here.

When choosing a new name, use something that is concise and clear, and use full words instead of abbreviations. E.g. choose “apple” instead of “Apple Inc.” and “aws” over “amazon”. Remember that the vendor name should most likely also be used for the scope of your package, so it must abide by the rules those use:

  • Must be at least three characters long.
  • Must only contain lowercase letters “a” through “z”, numbers 0-9, and underscores and hyphens.
  • Must begin with a letter.

Vendor names

#Vendor Legal name
1password AgileBits, Inc.
a10 A10 Networks, Inc.
abnormal Abnormal Security Corp
airlockdigital Airlock Digital Pty Ltd
akamai Akamai Technologies, Inc.
apache The Apache Software Foundation (ASF)
apple Apple Inc.
appomni AppOmni, Inc
arista Arista Networks, Inc.
armis Armis, Inc.
aruba HPE Aruba Networking
asimily Asimily
atlassian Atlassian Corporation Plc
aws Amazon Web Services, Inc.
barracuda Barracuda Networks Inc
beyondtrust BeyondTrust Software, Inc.
box Box, Inc.
broadcom Broadcom Inc.
cato Cato Networks Ltd.
cetu CeTu Systems Ltd.
checkpoint Check Point Software Technologies Ltd.
cisco Cisco Systems, Inc.
citrix Citrix Systems, Inc.
claroty Claroty Ltd.
cloudflare CloudFlare, Inc.
cofense Cofense Inc.
contrastsecurity Contrast Security, Inc.
corelight Corelight, Inc.
crowdstrike CrowdStrike Holdings, Inc.
cyberark CyberArk Software Ltd.
cynerio Cynerio
darktrace Darktrace Limited
delinea Delinea Inc.
dell Dell, Inc.
dope-security Dope Security Inc.
dragos Dragos, Inc.
druva Druva Inc.
enzoic Enzoic Inc.
epicsecurity Epic Security Corp.
extrahop ExtraHop Networks, Inc.
f5networks F5, Inc.
fidelis Fidelis Cybersecurity, Inc.
forcepoint Forcepoint LLC
forgerock ForgeRock US, Inc.
fortinet Fortinet Inc.
gigamon Gigamon Inc.
google Google LLC
gytpol GYTPOL Inc.
haproxy HAProxy Technologies LLC
hashicorp HashiCorp, Inc.
imperva Imperva, Inc.
infoblox Infoblox, Inc.
ironscales Ironscales Ltd.
island Island Technology, Inc
juniper Juniper Networks, Inc.
keepersecurity Keeper Security, Inc.
linux The Linux Foundation
logbinder Monterey Technology Group, Inc
lookout Lookout, Inc.
menlo Menlo Security, Inc.
microsoft Microsoft Corporation
mimecast Mimecast Services Ltd.
nasuni Nasuni Corporation
netgate Rubicon Communications LLC (Netgate)
netskope Netskope, Inc.
nozomi Nozomi Networks Inc
nutanix Nutanix, Inc.
obsidiansecurity Obsidian Security, Inc.
okta Okta, Inc.
oneidentity One Identity LLC
ordr Ordr, Inc.
paloalto Palo Alto Networks, Inc.
pingidentity Ping Identity Corporation
proofpoint Proofpoint, Inc.
pulse Pulse Secure LLC
purestorage Pure Storage, Inc.
qualys Qualys, Inc.
radware Radware, Inc.
raynet Raynet GmbH
redhat Red Hat, Inc.
rubrik Rubrik, Inc.
sailpoint SailPoint Technologies, Inc.
salesforce Salesforce.com, Inc.
saltsecurity Salt Security, Inc.
seraphic Seraphic Security Ltd.
servicenow ServiceNow Inc.
silverfort Silverfort, Inc.
skyhigh Musarubra US LLC
softerra Softerra, Inc.
sonicwall SonicWall Inc.
sophos Sophos Ltd.
squid Squid Software Foundation
superna Superna Inc.
tausight Tausight Inc.
trellix Trellix
trendmicro Trend Micro Inc.
tufin Tufin Software Technologies Ltd.
varonis Varonis Systems, Inc.
vectra Vectra AI, Inc.
veeam Veeam Software
vercara Vercara Inc.
veriti Veriti Security Ltd.
versa Versa Networks, Inc.
viavi VIAVI Solutions Inc.
vmware VMware, Inc.
watchguard WatchGuard Technologies, Inc.
workday Workday, Inc.
zimperium Zimperium, Inc.
zoom Zoom Video Communications, Inc.
zscaler Zscaler, Inc.