On This Page

Sponsors

Diamond Sponsors


Platinum Sponsors


Gold Sponsors


Silver Sponsors


Business Hall Lounge Sponsor


Association Partners




Diamond Sponsors

KNOW, CONTROL AND EXPOSE ATTACKS BEFORE THEY DO HARM.

The dark underworld of data security is constantly evolving. Once considered the realm of hotshot hackers and loners, today's security threat is more likely to come from a mature, well-organized cybercrime underground. You can't see these threats, but you don't have to stay in the dark. Let Juniper show you the way.

Juniper Data Center Security solutions, like WebApp Secure track, trap and learn about attackers as they attempt to enter restricted areas, control their movements and upload info about them to a global database-destroying their ability to launch further attacks.

For an even more complete security solution, add in Juniper Networks Firefly Host and Firefly Perimeter. These virtualized products provide security solutions for modern, virtualized data centers and clouds both at the periphery of the data center network and within its virtualized core.

URL: www.juniper.net


RSA, The Security Division of EMC, is the premier provider of intelligence-driven security solutions. RSA helps the world's leading organizations solve their most complex and sensitive security challenges: managing organizational risk, safeguarding mobile access and collaboration, preventing online fraud, and defending against advanced threats.

Combining agile controls for identity assurance, fraud detection, and data protection, robust Security Analytics and industry-leading GRC capabilities, and expert consulting and advisory services, RSA brings visibility and trust to millions of user identities, the data they create, the transactions they perform, and the IT infrastructure they rely on. For more information, please visit www.EMC.com/RSA.


Platinum Sponsors

EIT ICT Labs is the leading European organisation for Education and Innovation in the field of Information and Communication Technologies (ICT). The mission of EIT ICT Labs is to drive European leadership in ICT innovation for economic growth and quality of life. EIT ICT Labs was established in 2010 as one of the first Knowledge and Innovation Communities of the European Institute of Innovation and Technology (EIT), as the initiative of the European Union. EIT ICT Labs invests human and financial resources in key topics that have high potential for the development of ICT talent and business in Europe. EIT ICT Labs’ ecosystem is characterised by an open and collaborative way of working with partners representing global companies, leading research centres, and top ranked universities in the field of ICT


Palo Alto Networks is leading a new era in security by protecting thousands of enterprise, government, and service provider networks from cyber threats. Because of our deep expertise, steadfast commitment to innovation and game-changing security platform, more than 16,000 customers have chosen Palo Alto Networks and this number grows every day. Our platform natively brings together all key network security functions, including firewall, URL filtering, IDS/IPS, and advanced threat protection. Because these functions are purposely built into the platform from the ground up and they natively share important information across the respective disciplines, we ensure better security than legacy products. As a result, organizations can safely enable the use of all applications critical to running their business, maintain complete visibility and control, confidently pursue new technology initiatives like cloud, SDN and mobility, and protect the organization from the most basic to sophisticated cyber attacks — known and unknown.


Communication Valley Reply is a leading provider of managed security services in EMEA, delivering them through its own Security Operation Centre (SOC), a specialist physical and logical facility for remote management of IT security and communications. The center acts as a “control tower” and is staffed 24 hours a day, 365 days a year by a security team of analysts, systems experts and testers specializing in threat and fraud management, real-time monitoring, malware analysis, security device management and security assessment. These services are essential to help improve customers’ operational and business continuity and security while exploiting the potential of security technology to the fullest.


Gold Sponsors

Emulex, a leader in network connectivity, monitoring and management, provides hardware and software solutions for global networks that support enterprise, cloud, government and telecommunications. Emulex's products enable unrivaled end-to-end application visibility, optimization and acceleration. The Company's I/O connectivity offerings, including its line of ultra high-performance Ethernet and Fibre Channel-based connectivity products, have been designed into server and storage solutions from leading OEMs, including Cisco, Dell, EMC, Fujitsu, Hitachi, HP, Huawei, IBM, NetApp and Oracle, and can be found in the data centers of nearly all of the Fortune 1000. Emulex's monitoring and management solutions, including its portfolio of network visibility and recording products, provide organizations with complete network performance management at speeds up to 100Gb Ethernet. Emulex is headquartered in Costa Mesa, Calif., and has offices and research facilities in North America, Asia and Europe. For more information about Emulex (NYSE:ELX) please visit www.Emulex.com.


FireEye� has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors, including Web, email, and files and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 1,000 customers across more than 40 countries, including over one-third of the Fortune 100.


Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud security and compliance solutions with over 6,700 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, Accuvant, BT, Cognizant Technology Solutions, Dell SecureWorks, Fujitsu, HCL Comnet, InfoSys, NTT, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA) and the Council on CyberSecurity. For more information, please visit www.qualys.com.


Veracode's cloud-based service and programmatic approach deliver a simpler and more scalable solution for reducing global application-layer risk. Veracode delivers the most widely used cloud-based platform for securing web, mobile, legacy and third-party enterprise applications. By identifying critical application-layer threats before cyber-criminals can find and exploit them, Veracode helps enterprises deliver innovation to market faster — without sacrificing security.

Recognised as a Gartner Magic Quadrant Leader since 2010, Veracode secures hundreds of the world's largest global enterprises, including 3 of the top 4 banks in the Fortune 100 and 25+ of the world's top 100 brands.

Veracode's comprehensive solution portfolio includes static and dynamic application security testing, web application monitoring, mobile application security and third party software security.

www.veracode.com


Silver Sponsors

Bit9 + Carbon Black offers the most complete solution against the advanced threats that target your endpoints and servers, making it easier for you to see – and immediately stop – those threats. Thousands of organizations use Bit9 + Carbon Black to increase security, reduce operational costs and improve compliance. Leading managed security service providers (MSSP) and incident response (IR) companies have made Bit9 + Carbon Black a core component of their detection and response services. With Bit9 + Carbon Black, you can arm your endpoints against advanced threats.


Checkmarx provides the best way for organizations to introduce security into their Software Development Lifecycle (SDLC). The product enables developers and auditors to easily scan un-compiled code in all major coding languages and identify its security vulnerabilities. With Checkmarx's CxSuite, auditors and developers have immediate access to the code analysis results and remediation advice. We provide user friendly, high productivity, flexible and accurate risk intelligence platform that ensures your application remains hacker-proof.

Checkmarx's customers include hundreds of Fortune 500, government and SMB organizations in over 30 countries. Checkmarx has been named a "Challenger" in the 2014 Gartner Application Security Testing Magic Quadrant, Ranked 69th Fastest Growing Tech Company in EMEA and announced – Best Product in Application Security 2014 – by Cyber Defense Magazine.


Imperva, pioneering the third pillar of enterprise security, fills the gaps in endpoint and network security by directly protecting high-value applications and data assets in physical and virtual data centers. With an integrated security platform built specifically for modern threats, Imperva data center security provides the visibility and control needed to neutralize attack, theft, and fraud from inside and outside to mitigate risk; and to streamline compliance. Over 2,700 customers in more than 75 countries rely on our SecureSphere® platform to safeguard their business. Imperva is headquartered in Redwood Shores, California. Learn more: www.imperva.com


Rapid7's IT security solutions deliver visibility and insight that help you make informed decisions, create credible action plans, and monitor progress. They simplify risk management by uniquely combining contextual threat analysis with fast, comprehensive data collection across your users, assets, services and networks, whether on premise, mobile or cloud-based. Rapid7's simple and innovative solutions are used by more than 2,500 enterprises and government agencies in more than 65 countries, while the Company's free products are downloaded more than one million times per year and enhanced by more than 200,000 members of its open source security community. Rapid7 has been recognized as one of the fastest growing security companies by Inc. Magazine and as a "Top Place to Work" by the Boston Globe. Its products are top rated by Gartner and SC Magazine.

For more information, please visit www.rapid7.com


SecureAuth is a technology leader, providing identity and access control for hundreds of customers and more than 10 million users worldwide. SecureAuth's Identity Provider, winner of numerous awards and named Network World's best authentication product, uniquely delivers multi-factor authentication and single sign-on together in a powerful solution for mobile, cloud, web, and network resources without requiring supplementary components or add-ons. SecureAuth delivers on the vision of "Security as a Productivity Enabler" in every deployment by providing a streamlined workflow of secure access to corporate data from any device.


Tenable Network Security:
The Leader in Continuous Network Monitoring

Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Our family of products includes SecurityCenter Continuous View®, which provides the most comprehensive and integrated view of network health, and Nessus®, the global standard in detecting and assessing network data.

Tenable is relied upon by more than 20,000 organizations, including the entire U.S. Department of Defense and many of the world's largest companies and governments. We offer customers peace of mind thanks to the largest install base, the best expertise, and the ability to identify their biggest threats and enable them to respond quickly.

For more information, please visit www.tenable.com.


Business Hall Lounge Sponsor

Microsoft (Nasdaq "MSFT") is the worldwide leader in software, services, and solutions that help people and businesses realize their full potential. Microsoft remains dedicated to software security and privacy and continues to collaborate with the community of people and technology organizations helping to protect customers and the broader ecosystem.

www.microsoft.com/security


Association Partners

Celebrating its 25th anniversary, ISC2 is the largest not-for-profit membership body of certified information and software security professionals worldwide, with nearly 100,000 members in more than 135 countries. Globally recognized as the Gold Standard, ISC2 issues the Certified Information Systems Security Professional (CISSP®) and related concentrations, as well as the Certified Secure Software Lifecycle Professional (CSSLP®), the Certified Cyber Forensics Professional (CCFP), Certified Authorization Professional (CAP®), HealthCare Information Security and Privacy Practitioner (HCISPP), and Systems Security Certified Practitioner (SSCP®) credentials to qualifying candidates. ISC2 offers education programs and services based on its CBK®.

Visit www.isc2.org.


The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.

For more information, please visit www.owasp.org.