Diamond | Platinum Plus | Platinum | Gold Plus | Gold | Silver Plus | Silver | Sponsored Workshop | Innovation City | International Pavilion | Career Zone | Business Hall Networking Lounge | Wi-Fi Networking Lounge | Business Center | Association Partners | Media Partner
Company | Booth |
---|---|
FireEye
FireEye protects the most valuable assets in the world from those who have them in their sights. Our combination of technology, intelligence, and expertise combined with the most aggressive “boots on the ground” helps eliminate the impact of security breaches. We find and stop attackers at every stage of an incursion. With FireEye, you’ll detect attacks as they happen. You’ll understand the risk these attacks pose to your most valued assets. And you’ll have the resources to quickly respond and resolve security incidents. The FireEye Global Defense Community includes more than 2,200 customers across more than 60 countries, including more than 130 companies in the Fortune 500. Address Website Products/Services Offered
| 111 |
Lieberman Software
Lieberman Software Corporation provides privileged identity management and security management solutions to more than 1,200 customers worldwide, including half of the US Fortune 50. By automatically discovering and managing privileged accounts that appear whenever enterprises deploy and change IT resources, the company's products help secure access to sensitive systems and data. The company's multi-faceted, agentless software can reliably track privileged accounts on dynamic networks and change service and process account credentials by auto-discovering complex account interdependencies. With this technology, Lieberman Software enables organizations to fully automate labor-intensive, error-prone IT administrative tasks without the need for ongoing customization and professional services. To learn more about our tools and solutions stop by our booth for a hands-on demo or visit our website at liebsoft.com. Address Website Products/Services Offered
| 511 |
Qualys
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud security and compliance solutions with over 7,700 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100.The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, Accuvant, BT, Cognizant Technology Solutions, Dell SecureWorks, Fujitsu, HCL Comnet, InfoSys, NTT, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA). Address Website Products/Services Offered
| 211 |
RSA
Everyday, and for over 30 years, RSA’s singular mission has been to help our more than 30,000 customers around the world protect their most valuable digital assets. RSA is driven by its uncompromising belief that organizations should not have to accept getting breached or hacked as an unavoidable consequence of operating in a digital world. In fact, RSA believes that organizations must become aggressive defenders of their right to operate securely and that no other company is in a better position to help them. RSA’s Intelligence Driven Security solutions help organizations reduce this risk. Through visibility, analysis, and action, RSA solutions give customers the ability to detect, investigate and respond to advanced threats; confirm and manage identities; and ultimately, prevent IP theft, fraud and cybercrime. With Intelligence Driven Security, organizations no longer have to take a “wait and let’s see what happens” approach to security. For more information on RSA, please visit www.rsa.com. Address Website | 519 |
Tenable Network Security
Tenable Network Security: The Leader in Continuous Network Monitoring Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Our family of products includes SecurityCenter Continuous View™, which provides the most comprehensive and integrated view of network health, and Nessus® the global standard in detecting and assessing network data. Tenable is relied upon by more than 20,000 organizations, including the entire U.S. Department of Defense and many of the world's largest companies and governments. We offer customers peace of mind thanks to the largest install base, the best expertise, and the ability to identify their biggest threats and enable them to respond quickly. For more information, please visit tenable.com. Address Website | 419 |
Company | Booth |
---|---|
AlienVault
AlienVault’s mission is to enable organizations with limited resources to accelerate and simplify their ability to detect and respond to the growing landscape of cyber threats. Our Unified Security Management (USM) platform provides all of the essential security controls required for complete security visibility, and is designed to enable any IT or security practitioner to benefit from results on day one. Powered by threat intelligence from AlienVault Labs and the AlienVault Open Threat Exchange—the world’s largest crowd-sourced threat intelligence network — AlienVault USM delivers a unified, simple and affordable solution for threat detection, incident response and compliance management. AlienVault is a privately held company headquartered in Silicon Valley and backed by Trident Capital, Kleiner Perkins Caufield & Byers, GGV Capital, Intel Capital, Sigma West, Adara Venture Partners, Top Tier Capital and Correlation Ventures. Address Website Products/Services Offered
| 619 |
Cisco
Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. Cisco delivers intelligent cybersecurity for the real world, providing one of the industry's most comprehensive advanced threat protection portfolio of solutions across the broadest set of attack vectors. Cisco's threat–centric and operationalized approach to security reduces complexity while providing unmatched visibility, consistent control, and advanced threat protection before, during, and after an attack. For more information visit: cisco.com/go/security. Address Website | 227 |
Digital Guardian
Digital Guardian is the only data-centric security platform designed to stop data theft. Our unique data awareness and transformative endpoint visibility, combined with behavioral threat detection and response, let you protect data without slowing the pace of your business. Address Website | 611 |
Fidelis Cybersecurity
Fidelis Cybersecurity provides organizations with a robust, comprehensive portfolio of products, services, and expertise to combat today's sophisticated advanced threats and prevent data breaches. Our commercial enterprise and government customers around the globe can face advanced threats with confidence through use of our Network Defense and Forensics Services, delivered by an elite team of security professionals with decades of hands-on experience, and our award-winning Fidelis XPS Advanced Threat Defense Products, which provide visibility and control over the entire threat life cycle. Address Website | 719 |
HP
HP Security HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. Drawing on decades of experience in enterprise security, HP is a leading provider of solutions designed to mitigate risk and defend against today’s most advanced threats. HP Security enables organizations to take a proactive approach to security, disrupting the life cycle of an attack through prevention and real-time threat detection. With market-leading products, services and innovative research, HP Security brings a global network of security operations centers and more than 5,000 IT security experts to help customers strengthen their security posture to minimize risk and incident impact. Address Website | 411 |
Lockheed Martin Corporation
Lockheed Martin (LM) is a global provider of cybersecurity solutions focused on developing, implementing, maintaining, and securing critical infrastructures for both government and commercial clients in Oil & Gas, Utilities, Financial Services, Healthcare and Chemical industries. LM engineers literally span the globe, overseeing more than 4,000 programs at 600 locations in all 50 states and in 75 countries. We employ over 3,000 cyber-security professionals and have robust IT and OT technology partnerships. Our lifecycle-focused products and programs enable both success and sustainability protecting networks across our commercial clients' infrastructures. Address Website | 919 |
LogRhythm
LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s award-winning platform unifies next-generation SIEM, log management, network and endpoint forensics, and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides innovative compliance automation and assurance, and enhanced IT intelligence. LogRhythm is consistently recognized as a market leader. The company has been positioned as a Leader in Gartner’s SIEM Magic Quadrant report for three consecutive years, named a “Champion” in Info-Tech Research Group’s 2014-15 SIEM Vendor Landscape report and ranked Best-in-Class (No. 1) in DCIG’s 2014-15 SIEM Appliance Buyer’s Guide. In addition, LogRhythm has received Frost & Sullivan’s SIEM Global Market Penetration Leadership Award and been named a Top Workplace by the Denver Post. LogRhythm is headquartered in Boulder, Colorado, with operations throughout North and South America, Europe and the Asia Pacific region. Address Website Products/Services Offered
| 219 |
Palo Alto Networks, Inc.
Palo Alto Networks is leading a new era in security by protecting thousands of enterprise, government, and service provider networks from cyber threats with a truly unique, enterprise-class integrated and automated enterprise security platform designed with cyber threat prevention in mind. Because of our deep expertise, steadfast commitment to innovation and game-changing security platform, approximately 22,500 customers have chosen Palo Alto Networks®, making us the fastest growing security company in the market. Palo Alto Networks recognizes that organizations today are getting pummeled by new sophisticated attacks that blend malicious techniques. These attacks can cost millions of dollars in lost revenue and compromise customer data, intellectual property, business reputation, and overall livelihood. Cybersecurity risk increases with the adoption of initiatives like cloud computing, BYOD, and SDN, which represent new computing models that have the potential of introducing weaknesses in an organization’s security posture. Compounding this is the growing number of Internet-connected applications entering an organization’s environment that unintentionally provide more “windows and doors” for cybercriminals to worm their way into the network. The combination of these factors makes security a real challenge for organizations today. Unfortunately, legacy firewalls, UTMs, and standalone threat detection products fall short addressing these challenges because they are not architecturally designed to effectively coordinate across threat vectors or deliver the advanced protection and performance needed at the right place and the right time in today’s modern computing environments. Our game-changing enterprise security platform, which includes the Palo Alto Networks Next-generation Firewall, Palo Alto Networks Advanced Endpoint Protection and Palo Alto Networks Threat Intelligence Cloud, natively brings together these key security components, and functions such as URL filtering, IDS/IPS, and advanced threat protection. Because these functions are purposely built into the platform from the ground up and they natively share important information across the respective disciplines, we ensure better security than legacy firewalls, UTMs, or point threat detection products. The Palo Alto Networks platform can: ? Eliminate gaping holes in an organization’s security posture because it natively provides the right security technologies and applies them in the right place in the computing environment. ? Safely enable applications and business operations because protection is based on a fine-grained visibility, correlation, and control of what matters most in today’s modern computing environments: applications, users, and content, not just ports and IP addresses. ? Eliminate the age-old compromise between security posture and business performance that organizations have faced for years because it is natively architected to operate in modern networks with new technology initiatives such as cloud computing, software-defined datacenters, and mobility in mind. With our platform, organizations can safely enable the use of all applications critical to running their business, maintain complete visibility and control, confidently pursue new technology initiatives, and protect the organization from the most basic to sophisticated cyber attacks — known and unknown. Address Website | 119 |
Raytheon | Websense
Raytheon Cyber Products and its SureView suite of cybersecurity solutions deliver end-to-end visibility that allows organizations to detect, contain, and control cyber threats. This broad portfolio of technologies addresses a comprehensive set of cybersecurity challenges by delivering tools that not only identify threats but also provide the insight and context of the threat necessary to enable rapid decision making and action. The SureView suite combines analytics, insider threat detection, and advanced threat protection to deliver enterprise visibility and understanding of an organization’s threat landscape required to manage risk. SureView Insider Threat protects intellectual property, aids in fraud investigations, ensures compliance and enables organizations to avoid liabilities, fines, penalties, and brand damage associated with insider data breaches. SureView Threat Protection monitors, detects, and mitigates threats in near real time, minimizing disruptions and protecting business assets. SureView Memory Integrity monitors and detects evidence of compromise in Linux systems using memory forensics to assess the true state of a system and verifying the integrity of the kernel and process executables. SureView Analytics is an enterprise search and visual analytics solution that optimizes actionable intelligence development to speed incident response to threats, fraud, criminal activity and counterterrorism. The products within the SureView suite operate independently while also seamlessly integrating to provide a full spectrum of enterprise security. By leveraging Raytheon’s deep cyber expertise, research and development resources, and experience protecting some of the world’s most critical systems, Raytheon Cyber Products bridges the gap between defense-grade and enterprise cybersecurity. For more information, visit us at http://raytheoncyber.com. Address Website Products/Services Offered
| 711 |
Webroot
Webroot leverages the power of collective threat intelligence to secure enterprises, small businesses and consumers against advanced malware and other cyber-attacks with its SecureAnywhere® endpoint, mobile and web security solutions and BrightCloud® Threat Intelligence services. Using sophisticated, cloud-based threat analysis, machine learning, and data correlation, Webroot is one of the most innovative technology providers in the security industry, and has been identified in recent Gartner and 451 Research reports as a company to watch. Webroot SecureAnywhere® Business Endpoint Protection has revolutionized the way businesses protect endpoints against advanced malware and advanced persistent threats (APTs), having grown to protect over 10 million devices globally in just 3 years. Its cloud-based behavioral analysis, lightweight agent, and unique journaling and rollback remediation have made it a leading choice for enterprises struggling with endpoint infections. Webroot BrightCloud® Threat Intelligence has been the preferred choice of security solution providers for years. Webroot protects over 20 million users though integration into products from Palo Alto Networks, Cisco, RSA, HP McAfee and F5, and nearly 30 other leaders in the security market. Webroot also offers this market-leading threat intelligence directly to enterprises for integration into their NGFW and SIEM environments to detect more attacks at the perimeter and identify potential breaches sooner. Static signature and list-based security can be slow, ineffective, and consume processing power. Smarter cybersecurity solutions from Webroot leverage the Webroot® Intelligence Network (WIN), an advanced cloud-based threat analysis platform, which provides highly accurate, real-time protection without the customary management complexity and slow performance that can disrupt your business. This next-generation architecture is enhanced by advanced machine learning and correlation analysis which not only stops known threats, but can predict potential future threats, even if they have never been seen before. This self-learning network continuously scans the internet and incorporates inputs from millions of real-world endpoints and global sensor arrays, leaving nowhere for threats to hide. Using behavioral and contextual analysis, threats are identified in milliseconds. This data is then available to all Webroot-connected devices in real time, including Webroot partners through BrightCloud Threat Intelligence Services. WIN features limitless scale, lightning-fast data processing, and a globally distributed database cluster for high performance and resilience. Webroot was once again named a Visionary in Gartner’s Magic Quadrant for Endpoint Protection Platforms, and received the highest customer satisfaction scores of any vendor in the Magic Quadrant comparison. Further, Webroot’s anti-fraud and mobile security technologies have been incorporated by leading banks including HSBC, Ally, Citi, Barclay’s and Garanti to protect their customers against online account fraud. Traditional security wastes time, money, processing power, and fails to protect. It’s time for smarter cybersecurity. Learn more at www.webroot.com. Address Website Products/Services Offered
| 911 |
Company | Booth |
---|---|
Bromium
Bromium has transformed endpoint security with its revolutionary isolation technology to defeat cyber attacks. Unlike antivirus or other detection-based defenses, which can’t stop modern attacks, Bromium uses micro-virtualization to hardware isolate every user task—such as opening a webpage or PDF—in a micro-VM, keeping users secure while streamlining IT. Bromium improves the resilience of enterprise endpoints, substantially reduces investment in security, and boosts operational efficiency. Our breakthrough micro-virtualization technology vastly reduces and even eliminates compromises on endpoints, false alerts, urgent patching, and costly remediation. We reduce management overhead, enable security teams to focus on strategic tasks rather than deflecting threats, and empower users to be more productive. Address Website Products/Services Offered
| 1019 |
Core Security Technologies
Core Security provides the industry's first comprehensive attack intelligence platform offering advanced analytics to prioritize, validate and ultimately eliminate security threats. With Core Security, enterprises and security professionals focus on the most likely threats to their business by modeling, simulating and testing the actions of an actual attacker. Core Security helps more than 1,000 customers worldwide identify the most vulnerable areas of their IT environments in order to improve their remediation efforts and better secure their business. The company's patented, proven, award-winning enterprise products and solutions are backed by more than 15 years of applied expertise from CoreLabs research and Core Security Consulting Services. Address Website Products/Services Offered
| 627 |
Fortinet Inc
Fortinet, a global provider of IT security, delivers customer-proven solutions providing organizations with the power to protect and control their IT infrastructure. Our customers rely on our purpose-built technologies, integrated solution architecture, and global security intelligence to block external threats and gain precise control of their network, data, and users. With 190,000+ customers in every industry around the world, Fortinet has the broad base of experience necessary to help secure diverse networks, and improve network and business performance. Fortinet is a 100% security focused company, and was created with an integrated security vision to increase protection and control, while optimizing performance, simplifying management and reducing costs. The company pioneered an innovative, high performance multithread network security platform to address the fundamental problems of ever-evolving, sophisticated multi-vector IT threat landscape. Fortinet has pursued that vision for the last 14 years by continuing to innovate and enrich its solution portfolio. Address Website | 1119 |
IBM
Cybercriminals are growing in number and sophistication, rendering traditional IT protection systems powerless against today’s advanced threats. IBM Security delivers the next-generation security technology that can outsmart bad actors, discover threats and prevent breaches. Over the past decade, IBM spent nearly $2 billion on security research and development, resulting in 3,700 security-related patents, and acquired more than 12 top security companies to build its portfolio. With 6,000 security professionals and threat researchers in more than 130 countries, IBM Security helps more than 10,000 clients adapt to security threats with intelligent, integrated solutions. IBM has identified, and responds to, clients’ four most pressing Security needs: Optimize the Security Program : As security breaches continue to ruin fortunes and reputations, C-Suites demand IT Security strategies that provide the best protection for immediate and long terms. IBM Security Services help organizations with everything from making their ecosystem more risk aware to running their entire security program. IBM bridges the skills gap by advising how to create the best Security program for the organization’s size and industry, or by complementing the IT department with technologists that have coveted cyber security skills. Stop Advanced Threats: APTs, with custom-made malware that executes relentless targeted attacks, are the scourge of enterprise IT. There are two critical points in any chain of attack: the network and the endpoint. These infections are tricky -- they can bypass prevention mechanisms, lie dormant for years, and morph to escape destruction. With IBM Security’s integrated intelligence platform, malware can be detected in real time and stopped from spreading. IBM Security protects more than 270,000,000 endpoints throughout the threat lifecycle, applying an integrated defense that breaks the attack chain and preempts infection. Protect Critical Assets: In today’s era of increasing, easily-shared data, our clients have potentially millions of users – employees, customers, partners, contractors -- coming into their systems to access their records. The data they are using has increased exponentially, and the rate of new applications being developed in the world of mobile apps is astonishing. This velocity and volume requires a different, risk-based approach to security. IBM Security solutions offer automated access controls that are smart enough to know where users are located, what they want to do, and what normal behavior is before letting them in the door. Safeguard Mobile and Cloud: Mobile and cloud technologies are essential to engage and gain competitive advantage. As the traditional network perimeter around the data center dissolves, it’s harder to defend company data and to verify that people accessing that data are protected. About 10 billion mobile Internet devices are expected to be in use by 2016, with the mobile app industry racing to match demand. When developers scramble to keep up with the latest in app technology, security lags behind. And as the lines between work and personal technology usage blurs, mobile security is crucial. IBM Cloud Security Solutions can gain cloud visibility, while IBM MobileFirst Security solutions and Services protect the mobile enterprise. Address Website | 241 |
Optiv Security
Optiv is the largest holistic pure-play cyber security solutions provider in North America. The company’s diverse and talented employees are committed to helping businesses, governments and educational institutions plan, build and run successful security programs through the right combination of products, services and solutions related to security program strategy, enterprise risk and consulting, threat and vulnerability management, enterprise incident management, security architecture and implementation, training, identity and access management, and managed security. Created in 2015 as a result of the Accuvant and FishNet Security merger, Optiv is a Blackstone (NYSE: BX) portfolio company that has served more than 10,000 clients of various sizes across multiple industries, offers an extensive geographic footprint, and has premium partnerships with more than 300 of the leading security product manufacturers. Address Products/Services Offered
| 135 |
Proofpoint, Inc.
Proofpoint, Inc. (NASDAQ:PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance and secure communications. Organizations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information. proofpoint.com Address Website | 1111 |
Tripwire
Tripwire is a leading global provider of advanced threat, security and compliance solutions, enabling enterprises, government agencies and service providers to effectively connect security to their business. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence. Together these solutions deliver unprecedented visibility, along with business context and security business intelligence necessary to protect sensitive data in extended enterprises from breaches, vulnerabilities, and threats. Address Website | 141 |
ZeroFOX Inc.
ZeroFOX protects the world’s social media ecosystem and the people and organizations that rely upon it. In an age of constant connectivity and social sharing, users have become the primary target for the adversary. ZeroFOX protects your people where they are most vulnerable by continuously monitoring social platforms for cyber attacks, sensitive information loss, social engineering campaigns, account compromise and fraud. Leveraging cutting edge technology and proven security practices, ZeroFOX provides both targeted protection and global insights into the world of social media threats. Address Website Products/Services Offered
| 1027 |
Company | Booth |
---|---|
BeyondTrust
BeyondTrust is a global cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks. Corporate and government organizations rely on BeyondTrust solutions to shrink attack surfaces and identify imminent threats. The company's integrated risk intelligence platform presents a unique competitive advantage in its ability to reveal critical risks hidden within volumes of user and system data. This unifies IT and Security departments, empowering them with the information and control they need to jointly prevent breaches, maintain compliance, and ensure business continuity. Over 4,000 customers worldwide trust BeyondTrust's Privileged Account Management and Vulnerability Management solutions to: ?Identify system vulnerabilities and prioritize remediation ?Securely store, rotate and manage privileged account passwords ?Enforce least-privilege policies and ensure administrator accountability ?Provide single sign-on and centralized access control for hybrid IT environments ?Audit, alert and rollback changes in business-critical applications ?Conduct threat analysis to reveal previously overlooked security risks To learn more about BeyondTrust, please visit www.beyondtrust.com. Address Website Products/Services Offered
| 441 |
Bit9 + Carbon Black
Bit9 + Carbon Black provides the most complete solution against advanced threats that target organizations’ endpoints and servers, making it easier to see—and immediately stop—those threats. The company enables organizations to arm their endpoints by combining continuous, real-time visibility into what’s happening on every computer; real-time signature-less threat detection; incident response that combines a recorded history with live remediation; and prevention that is proactive and customizable. More than 1,000 organizations worldwide—from Fortune 100 companies to small enterprises—use Bit9 + Carbon Black to increase security, reduce operational costs and improve compliance. Leading managed security service providers (MSSP) and incident response (IR) companies have made Bit9 + Carbon Black a core component of their detection and response services. Address Website Products/Services Offered
| 735 |
Blue Coat Systems, Inc.
Blue Coat is a leader in enterprise security, providing on-premise, hybrid and cloud-based solutions for protecting web connectivity, combating advanced threats and responding to security breaches. Blue Coat is the global market leader in securing connection to the web and counts nearly 80 percent of the Global Fortune 500 as its customers. Address Website | 235 |
CrowdStrike
CrowdStrike™ is a leading provider of next-generation endpoint protection, threat intelligence, and services. CrowdStrike Falcon enables customers to prevent damage from targeted attacks, detect and attribute advanced malware and adversary activity in real time, and effortlessly search all endpoints, reducing overall incident response time. CrowdStrike customers include some of the largest blue chip companies in the financial services, energy, oil & gas, telecommunications, retail, and technology sectors, along with some of the largest and most sophisticated government agencies worldwide. To learn more, please visit http://www.crowdstrike.com. Follow us: http://blog.crowdstrike.com/ Address Website Products/Services Offered
| 727 |
Dell SecureWorks
Dell SecureWorks understands cyber security is a critical focus for organizations, and technology alone cannot address the risks posed by cyber threats. Recognized as an industry leader, we combine elite intelligence and trusted security expertise, helping organizations solve complex security challenges, strengthen their security postures and reduce risk in the face of a dynamic threat landscape. Intelligence practices developed by our security experts enable a security methodology, ensuring you see the threat, thwart cyber-attacks and recover faster from security breaches. For more information visit www.secureworks.com. Address | 635 |
Dell SonicWALL
Dell® SonicWALL® products provide intelligent network security and data protection solutions that enable customers and partners to dynamically secure, control, and scale their global networks. Securing any organization with multi-threat scanning based on global input at wire speed, Dell SonicWALL is recognized as an industry leader by Gartner and NSS Labs. Dell network security solutions are dynamically updated with current threat protection. Reassembly-Free Deep Packet Inspection® and a multi-core parallel architecture assure optimal performance. Dell delivers firewall, secure remote access/SSL VPN, anti-spam/email security, and continuous backup and recovery, plus centralized management and reporting, and 24x7 technical support for SMB through Enterprise environments. Address | 635 |
Guidance Software
Guidance Software is transforming enterprise security to proactively address the evolving threat landscape through endpoint intelligence products that leverage our market-leading digital investigations platform. We help customers find and eradicate threats that evade signature-based systems, dramatically reduce security costs and time-to-remediation, and help mitigate today’s information-security and legal risks. EnCase® products are used by numerous government agencies worldwide, more than 65 of the Fortune 100, and more than 40 percent of the Fortune 500. Built on the EnCase® Enterprise platform are market-leading security and e-discovery solutions, EnCase® Analytics, EnCase® Cybersecurity, and EnCase® eDiscovery. For more information, visit www.encase.com. Address Website | 641 |
Imperva
Imperva provides cyber security solutions to protect your business-critical data and applications—in the cloud and on-premises. For more information visit imperva.com Address Website | 127 BMR309 |
Raytheon | Websense
Websense enables organizations to prevent data theft while they innovate and grow in an age of disruptive change. In 2014 alone, Websense detected 4 billion security events. With an average of 3 updates a second; our customers trust in us to protect them from a rapidly changing threat landscape. Address Website Products/Services Offered
| 741 |
WhiteHat Security
Founded in 2001 and headquartered in Santa Clara, California, WhiteHat Security is the leader in application security, enabling businesses to protect critical data, ensure compliance, and manage risk. WhiteHat is different because we approach application security through the eyes of the attacker. Through a combination of technology, more than a decade of intelligence metrics, and the judgment of real people, WhiteHat Security provides complete web security at a scale and accuracy unmatched in the industry. WhiteHat Sentinel, the company’s flagship product line, currently manages tens of thousands of websites – including sites in highly regulated industries, such as top e-commerce, financial services, and healthcare companies. For more information on WhiteHat Security, please visit www.whitehatsec.com. Address Website Products/Services Offered
| 1011 |
Company | Booth |
---|---|
A10 Networks
A10 Networks is a leader in application networking and security, providing a range of high-performance solutions that help organizations ensure their applications are highly available, accelerated and secure. A10 Thunder Application Delivery Controller (ADC) optimizes application performance, protects data center assets from attack, and provides visibility into encrypted traffic with SSL Insight technology. A10 Thunder Threat Protection System (TPS) provides network-wide protection against distributed denial of service (DDoS) attacks and mitigates volumetric, protocol, resource, and sophisticated application attacks. Our Advanced Core Operating System (ACOS®) platform is designed to deliver substantially greater performance and security relative to prior generation application networking products. A10 Networks is based in San Jose, Calif., and serves customers globally with offices worldwide http://www.a10networks.com. Address Website Products/Services Offered
| 1135 |
CounterTack
CounterTack is the leading provider of real-time, Big Data endpoint detection and response technology. CounterTack's Sentinel platform provides unprecedented visibility and context around endpoint behavior to targeted, persistent threats improving incident response and threat detection, enterprise-wide. Built on Big Data architecture to counter endpoint threats at-scale and leveraging tamper-resistant collection for pure behavioral capture on workstations and servers. Sentinel dramatically reduces the impact of advanced attacks in real-time, giving teams an opportunity to defend the enterprise before incidents escalate. Address Website Products/Services Offered
| 1147 |
F5 Networks
F5 provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, and software defined networking (SDN) deployments to successfully deliver applications to anyone, anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich partner ecosystem of leading technology and data center orchestration vendors. This approach lets customers pursue the infrastructure model that best fits their needs over time. The world’s largest businesses, service providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility trends. For more information, go to f5.com Address Website | 647 |
ForeScout Technologies
ForeScout enables organizations to continuously monitor and mitigate security exposures and cyber attacks. The company’s CounterACT™ appliance dynamically identifies and evaluates network users, endpoints and applications to provide visibility, intelligence and policy-based mitigation of security problems. ForeScout’s open ControlFabric™ architecture allows a broad range of IT security products and management systems to share information and automate remediation actions. Because ForeScout’s solutions are easy to deploy, unobtrusive, extensible and scalable, as of January 1, 2015, they have been chosen by more than 1,800 of the world’s most secure enterprises and government agencies in over 62 countries. Headquartered in Campbell, California, ForeScout offers its solutions through its global network of authorized partners. Learn more at www.forescout.com. Address Website Products/Services Offered
| 253 |
iboss Network Security
iboss Cybersecurity defends today’s borderless networks against advanced threats and data exfiltration with innovative Web Security, Mobile Security and FireSphere™ Advanced APT Defense. Unlike legacy technology focused solely on keeping malware out, iboss offers a balanced approach with equal emphasis on prevention, detection and containment to reduce loss from data breaches. Backed by patented technology and unparalleled visibility across all inbound/outbound data channels, iboss smart defense provides security weapons that reveal blind spots, detect breaches and minimize the consequences of data exfiltration. Leveraging leading threat protection and unsurpassed usability, iboss is trusted by thousands of organizations and millions of users. Visit www.iboss.com Address Website Products/Services Offered
| 1047 |
Intel Security
McAfee is now part of Intel Security. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence, Intel Security is intensely focused on developing proactive, proven security solutions and services that protect systems, networks, and mobile devices for business and personal use around the world. Intel Security combines the experience and expertise of McAfee with the innovation and proven performance of Intel to make security an essential ingredient in every architecture and on every computing platform. Intel Security’s mission is to give everyone the confidence to live and work safely and securely in the digital world. www.intelsecurity.com. Address Website Products/Services Offered
| 935 |
LookingGlass
Lookingglass, the leader in threat intelligence that transforms security operations, empowers confident real-time decisions through focused verified multi-source information. We provide a unique lens to information customers may already have, creating active intelligence for effective decisions. Lookingglass is transforming the art of threat intelligence with innovative technology that empowers customers with complete and relevant risk information, delivering confidence, streamlining workflows and dramatically driving efficiencies. Our threat intelligence management platform, ScoutVision, delivers content, context and confidence in risk and security operations decision support. This platform increases visibility within and beyond the network perimeter, empowering customers to continuously assess and mitigate threats. Address Website Products/Services Offered
| 1141 BMR 319 |
ManTech Cyber Solutions International
ManTech Cyber Solutions International provides behavior-based cyber threat detection and memory forensics software enabling our customers to secure their endpoints against the most advanced malware including APTs, Zero Days and rootkits. Due to our behavior-based approach, we can detect brand new threats never before seen without the need for signatures or whitelists. This allows threats to be caught early in the cycle allowing companies to break the kill chain sooner and protect their precious data. Some of the most costly and lengthy threats over the last few years were initiated using custom code that could not be identified by AV either using network or storage scans. It was only after information had been stolen and companies went back to look at activities from months earlier that these pieces of malware were identified. The behavior based approach allows companies to catch malware never-before seen based on the activities it tries to perform. While malware can be packed, obfuscated and injected into memory, it cannot harm the IT infrastructure without actually running on an endpoint and demonstrating behaviors common to malware such as logging keystrokes or opening multiple communication channels to exfiltrate sensitive information. By focusing on these behaviors rather than signatures or fingerprints, malware which has been newly created for an attack can be immediately detected thereby defending your endpoints against breaches. Explore our products and services further at mcsi.mantech.com or by emailing mcsisales@mantech.com Address Website | 447 |
Parsons
Parsons has worked behind the scenes for 30+ years to deliver cybersecurity services to federal customers that have protected our nation’s most sensitive information and critical infrastructure. This experience is enhanced by 70+ years of experience designing, building, and managing these assets around the globe. Parsons has combined its in-depth knowledge of cybersecurity with its expertise in the sustainment of critical assets to offer PARSecure®, a secure suite of services that includes both cyber and physical security. This offering allows us to leverage our experience and become a trusted, cybersecurity partner for customers in federal, state, local government, and the commercial marketplace. Using PARSecure® and our team of cybersecurity experts, we can ensure that cutting edge cybersecurity people, processes, and technologies are in place – addressing the full spectrum of risks to your business and protecting your most valuable assets. Setting us apart is our state-of-the-art Cyber Solutions Center, located in Centreville, VA. This hands-on laboratory enables the Parsons team to demonstrate and analyze operational networks, supervisory control and data acquisition (SCADA) systems, and industrial control systems (ICS) that control all critical infrastructure, building systems, manufacturing systems, medical treatment facilities, water and wastewater, transportation, and more. We can then custom design, test, and implement the technical options needed to protect the security of client networks and infrastructure, in addition to providing training to those entrusted to maintaining the security of these systems. Parsons is a leader in technological solutions, continuity of operations, critical infrastructure, and classified facility protection. Address | 1041 |
Rapid7
Rapid7 cybersecurity analytics software and services reduce threat exposure and detect compromise for 3,500 organizations across 78 countries, including 30% of the Fortune 1000. We strengthen your ability to manage risk, stop attacks faster, and systematically advance your security program with comprehensive real-time data collection, advanced correlation, and insight into attacker techniques. With our innovative technology and trusted expertise you’re prepared for everything from drive-by attacks to advanced threats, from the endpoint to the cloud. Address Website | 541 |
Securonix
Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account, and system behavior Securonix is able to automatically and accurately detect the most advanced data security, insider threats and fraud attacks. Globally customers are using Securonix to address the most basic and complex needs around threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring, and access risk management. For more information visit securonix.com. Address Website Products/Services Offered
| 146 |
Splunk
Splunk Inc. (NASDAQ: SPLK) provides the leading software platform for real-time Operational Intelligence. Splunk® software and cloud services enable organizations to search, monitor, analyze and visualize machine-generated big data coming from websites, applications, servers, networks, sensors and mobile devices. More than 9,000 enterprises, government agencies, universities and service providers in over 100 countries use Splunk software to deepen business and customer understanding, mitigate cybersecurity risk, prevent fraud, improve service performance and reduce costs. Splunk products include Splunk® Enterprise, Splunk Cloud™, Splunk Storm®, Hunk®, Splunk Analytics for Hadoop and premium Splunk Apps. To learn more, please visit http://www.splunk.com/company. Address Website | 347 |
Symantec
Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses and governments seeking the freedom to unlock the opportunities technology brings -- anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company, operating one of the largest global data-intelligence networks, has provided leading security, backup and availability solutions for where vital information is stored, accessed and shared. The company's more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2014, it recorded revenues of $6.7 billion. To learn more go to www.symantec.com or connect with Symantec at: http://www.symantec.com/social/. Address Website Products/Services Offered
| 246 |
ThreatTrack Security, Inc.
ThreatTrack specializes in helping organizations identify and stop Advanced Persistent Threats (APTs), targeted attacks and other sophisticated malware designed to evade the traditional cyber-defenses deployed by businesses, enterprises and government agencies around the world. ThreatTrack develops advanced cybersecurity solutions that analyze, detect and remediate the latest malicious threats. Address Website Products/Services Offered
| 747 |
TrustWave
Trustwave helps businesses fight cybercrime, protect data and reduce security risks. With cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, Trustwave enables businesses to transform the way they manage their information security and compliance programs while safely embracing business imperatives including big data, BYOD and social media. More than 2.5 million businesses are enrolled in the Trustwave TrustKeeper® cloud platform, through which Trustwave delivers automated, efficient and cost-effective data protection, risk management and threat intelligence. Trustwave is a privately held company, headquartered in Chicago, with customers in 96 countries. For more information about Trustwave, visit www.trustwave.com. Address Website Products/Services Offered
| 247 |
Veracode
The rise of the digital economy means the world runs on applications. As a result, every company is becoming a software company – regardless of what their primary business is. These enterprises are rapidly producing web, mobile and cloud applications in order to keep up with the pace of innovation. And in order to innovate even faster, they are using agile development processes, reusing open source libraries and components and purchasing software from third-party providers. These programs have helped speed the pace of innovation. But the faster enterprises build, buy and borrow software, the more risk is introduced into the organization. Veracode’s powerful cloud-based platform, deep security expertise and systematic, policy-based approach provide enterprises with a simpler and more scalable way to reduce application-layer risk across their global software infrastructures. Veracode is a leader in securing web, mobile and third-party applications for the world’s largest global enterprises. The company’s automated, cloud-based service enables the rapid detection and remediation of critical vulnerabilities in all of an enterprise’s applications – not just a small subset. By enabling enterprises to rapidly identify and remediate application-layer threats before cyberattackers can exploit them, Veracode helps enterprises speed their innovations to market – without compromising security. Veracode serves hundreds of customers across a wide range of industries, including nearly one-third of the Fortune 100, three of the top four U.S. commercial banks and more than 20 of Forbes’ 100 Most Valuable Brands. Learn more at www.veracode.com, on the Veracode blog and on Twitter Address Website Products/Services Offered
| 1035 |
Verisign
Verisign Security Services protect revenue and brands by securing online services. Verisign provides a portfolio of cloud-based security services supported by industry leading security intelligence. Our DDoS Protection, Managed & Recursive DNS and DNS Firewall services are designed to secure and protect online applications and networks. Verisign iDefense provides actionable security intelligence to support decision making within organizations. Verisign, having maintained 100 percent operational accuracy and stability of its own DNS infrastructure for .COM and .NET for more than 17 years, has unmatched experience in protecting critical Internet infrastructure, and is entrusted by leading organizations to protect their businesses. Address Website Products/Services Offered
| 941 |
Zscaler
Zscaler protects 12 million employees at 5,000 organizations worldwide against cyberattacks and data breaches. Zscaler’s Security-as-a-Service platform delivers Internet security, APT protection, data loss prevention, SSL decryption, traffic shaping, policy management and threat intelligence, ensuring a safe and productive Internet experience for every user, from any device and any location. Address Website | 847 |
Company | Booth |
---|---|
Adallom
Adallom delivers visibility, governance and protection for the top SaaS applications used by businesses worldwide, including GoogleApps, Office 365 and Salesforce. Founded in 2012 by Israeli Intelligence alumni, our cloud application security platform extends the boundaries of enterprise security into the cloud. You will be able to gain actionable intelligence into cloud application usage, secure corporate data and detect suspicious activities, without requiring any agent in your datacenter or endpoint. Powered by the Adallom SmartEngineTM advanced heuristics technology, and backed by Adallom Labs, our elite cybersecurity research team, we are the ONLY cloud security provider that has protected businesses from real-world attacks. Address Website Products/Services Offered
| 947 |
Arbor Networks
Arbor Networks, Inc. helps secure the world’s largest enterprise and provider networks from DDoS and advanced targeted attacks. Arbor believes security solutions today must be coordinated to mitigate attacks before they reach a customer’s network whenever possible, and then quickly identify and stop threats once they have made it past an increasingly porous perimeter. We have leveraged our unique customer footprint and experience working with the world’s most demanding network operators to develop a more enduring solution for the threats of today and tomorrow. Arbor does this not by focusing on specific threats or points in the network but on networks themselves. No matter how much the threats and attackers have changed, security still comes down to understanding networks. Arbor’s goal is to provide a richer picture into networks and more security context—so customers can solve problems faster and help reduce the risk to their business. We strive to be a force multiplier, bringing context to massive amounts of data, making network and security teams the experts. Address Website Products/Services Offered
| 552 |
Avecto
Avecto is an innovative technology business specializing in endpoint security. The company’s revolutionary Defendpoint software ensures security defense in depth while empowering users to work freely. This mantra of security + freedom underpins Avecto’s philosophy to unite IT departments and their end users. Avecto’s experience is proven, with implementations of over 5 million endpoints at many of the world’s most recognizable brands, from the largest banks and most highly regulated government organizations to multichannel retailers and F1 teams. Attention to detail is paramount, with a team of qualified and experienced technology consultants on hand to guide clients through a robust implementation methodology. This consultative approach provides clients with a clearly mapped journey against measurable objectives to ensure project success. Avecto has placed in the top 4 of the Deloitte Fast 50 for the last two consecutive years, making it one of the UK’s fastest growing software companies, winning global accolades for quality and innovation. Address Website Products/Services Offered
| 459 |
Checkmarx
Checkmarx (www.checkmarx.com ) is a leading developer of software solutions used to identify, fix and block security vulnerabilities in web and mobile applications. The company's customers include 4 of the world's top 10 software vendors and many Fortune 500 and government organizations, including Samsung, Salesforce.com, Coca Cola and the US Army. Checkmarx offers a suite of application security solutions from code development to live production: ?Static Application Security Testing (SAST) - Identify and fix security vulnerabilities in the source code, at the early stages of the application development. The solution enables full automation by integration into the Software Development Lifecycle (SDLC). ?Runtime Application Self Protection (RASP) - Block attacks in real time. ?Secure Coding Education - Hands on secure coding training based on gamification, using your own code base and real life security vulnerabilities. Address Website Products/Services Offered
| 259 |
Citrix
Citrix is leading the transition to software-defining the workplace, uniting virtualization, mobility management, networking and SaaS solutions. Citrix solutions power business mobility through secure, mobile workspaces that provide people with instant access to apps, desktops, data and communications on any device, over any network and cloud. Visit www.citrix.com. Address Website Products/Services Offered
| 858 |
Click Security
Click Security’s next generation security investigation solution enables customers to rapidly identify, investigate and respond to cyber threats and breaches. Our solution force multiplies today’s stretched security teams by automatically converting millions of alerts into high-risk actors, streamlining investigative efforts, and converting findings into new continuous protection. Dangerous adversaries will get in. Click Security narrows the enterprise risk gap by finding and responding to their kill chain activity before it’s too late. Address Website Products/Services Offered
| 1211 |
CSG Invotas
CSG Invotas™ is an award-winning leader in security orchestration and automation for global security operations. CSG Invotas delivers an automated threat response solution to unify, orchestrate and automate key elements of incident response into a single console and gives enterprises the ability to respond at machine speed, reduce risk exposure and boost productivity. For more information, please visit invotas.csgi.com. Address Website Products/Services Offered
| 658 |
CyberArk
CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world’s leading companies – including 40 of the Fortune 100 – to protect their highest value information assets, infrastructure and applications. CyberArk is a vital security partner to 1,800 global businesses, including 17 of the world’s top 20 banks. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, MA, CyberArk also has offices throughout EMEA and Asia-Pacific. To learn more about CyberArk, visit www.cyberark.com, read the company blog, http://www.cyberark.com/blog/, follow on Twitter @CyberArk or Facebook at https://www.facebook.com/CyberArk. Address Website | 134 |
Cybereason
Cybereason delivers a proprietary technology platform that automatically uncovers malicious operations and reconstructs them as a clear image of a cyberattack in context. This vastly reduces “alert fatigue”, reduces time spent on manual investigation and enables enterprises to detect sophisticated targeted attacks at a very early stage. Address Website | 358 |
Cylance
Cylance is the first company to apply artificial intelligence, algorithmic science and machine learning to cyber security and improve the way companies, governments and end users proactively solve the world’s most difficult security problems. Using a breakthrough mathematical process, Cylance quickly and accurately identifies what is safe and what is a threat, not just what is in a blacklist or whitelist. By coupling sophisticated math and machine learning with a unique understanding of a hacker’s mentality, Cylance provides the technology and services to be truly predictive and preventive against advanced threats. Address Website | 958 |
Cyphort
Cyphort is an innovative provider of Advanced Threat Protection solutions that deliver a complete defense against current and emerging Advanced Persistent Threats, targeted attacks and zero day vulnerabilities. The Cyphort Platform accurately detects and analyzes next generation malware, providing actionable, contextual intelligence that enables security teams to respond to attacks faster, more effectively, and in as surgical a manner as their attackers. Cyphort's software-based, distributed architecture offers a cost effective, high performance approach to detecting and protecting an organization’s virtual, physical and cloud infrastructure against sophisticated attacks. Malware detection for Windows, OSX and Linux allows businesses to extract maximum value from IT assets without compromising the security of an organization. Founded by experts in advanced threats from government intelligence agencies and premier network security companies, Cyphort is a privately held company headquartered in San Jose, California. For more information, please visit: www.cyphort.com. Address Website Products/Services Offered
| 759 |
ESET
ESET®, the pioneer of proactive protection and the maker of the award-winning ESET NOD32® technology, is a global provider of security solutions for businesses and consumers. For over 26 years, the Company continues to lead the industry in proactive threat detection. By obtaining the 80th VB100 award in June 2013, ESET NOD32 technology holds the record number of Virus Bulletin "VB100” Awards, and has never missed a single “In-the-Wild” worm or virus since the inception of testing in 1998. In addition, ESET NOD32 technology holds the longest consecutive string of the VB100 awards of any AV vendor. ESET has also received a number of accolades from AV-Comparatives, AV-TEST and other testing organizations and reviews. ESET NOD32® Antivirus, ESET Smart Security®, ESET Cyber Security® (solution for Mac), ESET® Mobile Security and IT Security for Business are trusted by millions of global users and are among the most recommended security solutions in the world. The Company has global headquarters in Bratislava (Slovakia), with regional distribution centers in San Diego (U.S.), Buenos Aires (Argentina), and Singapore; with offices in Jena (Germany), Prague (Czech Republic) and Sao Paulo (Brazil). ESET has malware research centers in Bratislava, San Diego, Buenos Aires, Singapore, Prague, Košice (Slovakia), Krakow (Poland), Montreal (Canada), Moscow (Russia) and an extensive partner network for more than 180 countries. More information is available at the ESET Press Center. Address Website Products/Services Offered
| 927 |
Esri
4.The market leader in geospatial technology, Esri software is used by more than 350,000 organizations worldwide including local, state, & national agencies. Esri’s ArcGIS platform can be used to extend current physical security concepts for a better shared situational awareness of cyberspace and associated activity to better anticipate, detect, respond, and recover from cyber disruptions. Esri technology includes tools, workflows, and applications that can be implemented within an organization’s existing cybersecurity data and technology infrastructure to improve data management, incident analysis, situational awareness, and information sharing. Address Website Products/Services Offered
| 258 |
Evident.io
Evident.io is the leader in security and compliance automation for Amazon AWS. The Evident Security Platform (ESP) helps organizations proactively manage security risk and compliance of AWS infrastructure with a single pane of glass view of security threats and compliance across all AWS accounts, services, and regions. ESP manages the complexity and rapid change of public cloud infrastructure by automating threat detection, incident response, and compliance through the continuous monitoring and analysis of configuration and usage data. With ESP security and compliance teams are more productive and efficient while creating a more proactive and adaptive security posture and a process for continuous compliance. Built on Amazon Web Services APIs, ESP is agent-less and can be deployed to even the most complex environments in minutes. Evident.io is a privately held company based in Dublin, CA and backed by Bain Capital Ventures and True Ventures. Address Website | 859 |
FireHost
FireHost offers the most secure, managed cloud available, protecting sensitive data and brand reputations of some of the largest companies in the world. With private cloud infrastructure built for security, compliance, performance and managed service, responsible businesses choose FireHost to reduce risk and improve the collection, storage and transmission of their most confidential data. Address Website | 547 |
Foreground Security
Foreground Security is a dedicated cyber security company providing security engineering, assessment, customized security training, and advanced incident response and forensics services. Our Virtual SOC (V-SOC) service allows clients to outsource the monitoring and management of their current security products while keeping all data inside their boundaries. Our patent-pending Automated Threat Intelligence Platform (ATIP) automates threat identification in real time so we can focus our efforts on diagnosis and remediation. At one client, our innovations resulted in a 300% increase in incident detection rates. Foreground helps organizations align information security with key business objectives. Our experienced professionals hold CISSP, CCSP, CISM, CEH, CHFI, and many other certifications and our penetration testers have identified over 100 zero day vulnerabilities within the last 12 months. We provide our more than 100 government and commercial clients with the proven expertise and real-world implementation experience required to protect against today’s leading threats. Address Website Products/Services Offered
| 126 |
Gigamon
Gigamon provides an intelligent Visibility Fabric™ architecture for enterprises, data centers and service providers around the globe. Gigamon’s technology empowers infrastructure architects, managers and operators with pervasive and dynamic intelligent visibility of traffic across both physical and virtual environments without affecting the performance or stability of the production network. Through patented technologies and centralized management, the Gigamon GigaVUE portfolio of high availability and high-density products intelligently delivers the appropriate network traffic to management, analysis, compliance and security tools. Gigamon has been designing and building traffic visibility products since 2004 and its solutions are deployed globally across vertical markets including over half of the Fortune 100 and many government and federal agencies. Address Website Products/Services Offered
| 140 |
GuruCul
Gurucul is transforming the enterprise security with user behavior based machine learning and predictive analytics. Using identity to monitor for threats, Gurucul provides Actionable Risk Intelligence™ to protect against targeted and under-the-radar attacks. Gurucul is able to proactively detect, prevent, and deter advanced insider threats, fraud and external threats to system accounts and devices using self-learning, behavioral anomaly detection algorithms. Gurucul is backed by an advisory board comprised of Fortune 500 CISOs, and world renowned-experts in government intelligence and cyber security. The company was founded by seasoned entrepreneurs with a proven track record of introducing industry changing enterprise security solutions. Our mission is to help organizations protect their intellectual property, regulated information, and brand reputation from insider threats and sophisticated external intrusions. Address Website | 1126 |
Hexis Cyber Solutions
Hexis Cyber Solutions, Inc. is a team of cybersecurity experts delivering solutions that enable organizations to defend against and remove cyber threats at machine speeds before they do damage. Hexis’ advanced security solutions use real-time endpoint sensors, network detection, and threat analytics to provide organizations with an intelligent and automated threat detection and response solution. Hexis’ solutions deliver improved visibility into the network and endpoints, threat verification, and automated threat removal capabilities for organizations of all sizes. Hexis Cyber Solutions, Inc. is a wholly-owned subsidiary of The KEYW Holding Corporation (KEYW), based in Hanover, Maryland with engineering offices in Columbia, Maryland and San Mateo, California. Hexis’ solutions were developed leveraging KEYW’s expertise in supporting our nation's cybersecurity missions. Address Website Products/Services Offered
| 458 |
Invincea
Invincea is the leader in advanced endpoint threat protection for enterprises worldwide. The company provides the most comprehensive solution to contain, identify, and control the advanced attacks that evade legacy security controls. Invincea protects enterprises against targeted threats including spear-phishing and Web drive-by attacks that exploit Java, Flash, and other applications. Combining the visibility and control of an endpoint solution with the intelligence of cloud analysis, Invincea provides the only market-deployed solution that defends against 0-day exploits, file-less malware, and previously unknown malware. The company is venture capital-backed and based in Fairfax, VA. For more information, visit http://www.invincea.com. Address Website Products/Services Offered
| 852 |
ISACA
Cybersecurity Nexus (CSX)TM is a new security knowledge platform from ISACA® that is shaping the cybersecurity profession through cutting-edge thought leadership, training, certification and career development programs that will guide and resource current and future cybersecurity professionals at every level. The comprehensive set of resources that CSX offers affirms ISACA’s solid commitment to do for cybersecurity professionals what it has done—and will continue to do—for audit, control and governance professionals over the past 45 years. ISACA helps business and IT leaders build trust in, and value from, information and information systems. The global association is the trusted source of knowledge, standards, networking, and career development for 140,000 constituents in 180 countries. ISACA offers extraordinary resources across the information systems and information technology disciplines it serves, and cybersecurity will be no exception to this. For more information, please visit www.isaca.org and www.isaca.org/cyber Address Website | 1226 |
Ixia
Ixia provides application performance and security resilience solutions to validate, secure, and optimize businesses’ physical and virtual networks. Enterprises, service providers, network equipment manufacturers, and governments worldwide rely on Ixia’s solutions to deploy new technologies and achieve efficient, secure, ongoing operation of their networks. Ixia's powerful and versatile solutions, expert global support, and professional services equip organizations to exceed customer expectations and achieve better business outcomes. Application performance means successfully deploying applications across networks so that your customers enjoy a quality user experience. Security resilience means ensuring networks are durable against ever-growing IT security threats, so that your customers are confident their online experience is protected. When asked, Ixia’s customers agree that two things are true: applications are the network, and security is critical. Ixia is committed to helping your network perform at its highest level, so that your end users get the best performing and most secure application experience. Making sure you can seamlessly and securely deliver a quality experience to your customers is Ixia’s business. We help validate the design, secure the rollout, and monitor the operation stages of your network. Our solutions are available for both physical and virtual networking environments. Learn more at www.ixiacom.com. Address Website Products/Services Offered
| 110 |
Juniper Networks
Juniper Networks High-performance security with advanced, integrated threat intelligence, delivered on the industry's most scalable and resilient platform. SRX Series gateways set new benchmarks with 100GbE interfaces and feature Express Path technology, which enables up to 1 Tbps performance for the data center. Security for any size data center and enterprise edge offers a broad range of options—from all-in-one, integrated physical and virtual security networking devices to highly scalable, chassis-based data center solutions—that can defend enterprise data centers and service providers of any size. For More information, please visit juniper.net Address Website | 726 |
Lancope
Lancope, Inc. is a leading provider of network visibility and security intelligence to defend enterprises against today’s top threats. By collecting and analyzing NetFlow, IPFIX and other types of flow data, Lancope’s StealthWatch® System helps organizations quickly detect a wide range of insidious attacks from APTs and DDoS to zero-day malware and insider threats. Through pervasive insight across distributed networks, including mobile, identity and application awareness, Lancope accelerates incident response, improves forensic investigations and dramatically reduces enterprise risk. Lancope’s anomaly detection capabilities are continuously enhanced with threat intelligence from the StealthWatch Labs security research team. For more information, visit www.lancope.com. Address Website | 114 |
Malwarebytes Corporation
In 2004, young Marcin Kleczynski picked up a nasty malware infection one day while in search of video games. This despite having a popular paid antivirus in place. It took him three solid days to remove the malicious code. Three days searching the Internet and consulting with other people on security forums like spywareinfoforum.com who had similar problems. Who had also come to the same two conclusions: 1.There was a lot of new malware out there. 2.Antivirus wasn’t up to the task. So Marcin set out to build the world a better malware fighter. He taught himself code and eventually engineered a lightweight but highly effective anti-malware tool that is now known as Malwarebytes Anti-Malware. Today, more than 38,000 SMBs and Enterprise businesses worldwide trust Malwarebytes to protect their data. And Malwarebytes Anti-Malware has been downloaded to over 200 million home PCs. According to OPSWAT, it is the most popular user-installed security product. Malwarebytes continues to develop anti-malware and anti-exploit software designed to protect businesses and consumers against zero-day threats that consistently escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware earned an “Outstanding” rating by CNET editors, is a PCMag.com Editor’s Choice, and was the only security software to earn a perfect malware remediation score from AV-TEST.org. Malwarebytes is headquartered in California, operates offices in Europe, and employs a global team of 165 malware researchers, software engineers, and support staff. For more information, please visit us at www.malwarebytes.org. Address Website Products/Services Offered
| 1053 |
Norse
Norse is the global leader in live attack intelligence, helping companies block the threats that other systems miss. Serving the world’s largest financial, government and technology organizations, Norse intelligence offerings dramatically improve the performance, catch-rate, and return-on-investment of the entire security infrastructure. The Norse Intelligence Network, a globally-distributed “distant early warning” grid of millions of sensors, honeypots, crawlers, and agents, delivers unmatched visibility into difficult-to-penetrate geographies and darknets, where bad actors operate. Norse processes hundreds of terabytes daily against a 7 petabyte attack history database, and weighs over 1,500 variables to compute real-time risk scores for millions of IP addresses and URLs every day. For more information, visit norsecorp.com. Address Website | 359 |
NRI SecureTechnologies
NRI SecureTechnologies, a leading provider of information security solutions, is one of the affiliate companies of Nomura Research Institute, Ltd. Established in 2000, it examines information security at business corporations from the aspects of technology and business management, offering a one-stop service from consulting to solution implementation, training, management and surveillance. Address Website Products/Services Offered
| 952 |
Onapsis
Onapsis is the leading provider of cybersecurity, compliance and continuous monitoring solutions for ERP systems and business-critical infrastructure. Through its innovative solutions, Onapsis helps its customers to protect their core business platforms from espionage, sabotage and fraud attacks. Large organizations rely on SAP, Oracle E-Business Suite, PeopleSoft and Siebel platforms to store and process their most sensitive business information. Onapsis enables them to increase the security level of these systems while enforcing compliance requirements, decreasing financial fraud risks and reducing audit costs drastically. Onapsis solutions are trusted by several Fortune Global 100 companies, large governmental entities and military agencies. Onapsis X1, the company's flagship product, is the industry's first comprehensive solution for the Automated Security Assessment of SAP platforms. Being the first and only SAP-certified solution of its kind, Onapsis X1 Enterprise allows customers to perform Automated Vulnerability Assessments and Security & Compliance Audits over their entire SAP platform. For organizations that need to go deeper, Onapsis X1 Consulting Pro also safely exploits existing weaknesses to illustrate the associated business impacts. Onapsis is built upon a world-renowned team of experienced security researchers leading the SAP & ERP security fields. These experts were also the first to perform specialized SAP Penetration Tests, Vulnerability Assessments and Security Audits. Because of its cutting-edge research, Onapsis is continuously invited to lecture at the most important security conferences in the world, private companies and defense agencies. If you are wondering whether your ERP systems and business-critical infrastructure are exposed, find more information at onapsis.com. Address Website | 752 |
OpenDNS
OpenDNS provides a cloud-delivered network security service that blocks advanced attacks, as well as malware, botnets and phishing threats regardless of port, protocol or application. Our predictive intelligence uses machine learning to automate protection against emergent threats before your organization is attacked. OpenDNS covers devices worldwide on or off the network in minutes with no hardware to install, software to maintain, and no admin intervention required. opendns.com Address Website Products/Services Offered
| 753 |
PhishMe, Inc.
PhishMe® is the leading provider of threat management for organizations concerned about human susceptibility to advanced targeted attacks. PhishMe’s intelligence-driven solutions empower employees to be an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. Our open approach ensures that PhishMe integrates easily into the security technology stack, delivering measurable results to help inform and adapt an organization’s security programs. PhishMe’s customers include the defense industrial base, energy, financial services, healthcare, and manufacturing industries, as well as other Global 1000 entities that understand changing user security behavior will improve security, aid incident response, and reduce the risk of compromise Address Website Products/Services Offered
| 118 |
ReversingLabs
ReversingLabs delivers industry leading file analysis tools that drastically accelerate and broaden security analysts' ability to detect new threats, respond to incidents, find hidden information and verify software integrity. TitaniumCore™ is the world's fastest and most comprehensive tool for automated static decomposition of files. The engine automatically extracts all contained objects and their internal information from a sample and stores them in a database for further analysis. A single server can process 100,000 samples daily. TitaniumCloud™ service provides internal information and virus scanning results for over 1Billion goodware and malware files. Samples are scanned twice daily with 27 anti-virus products and the history is stored in the TiCloud database. ReversingLabs products reduce analysis tasks from days to seconds, enabling analysts to respond quicker and cover more potential threats. Our customers include antivirus vendors, security vendors, government agencies, and commercial enterprises across the globe. Visit us at: reversinglabs.com Address Website | 553 |
RiskIQ
RiskIQ provides organizations the visibility and intelligence they need to secure their Digital Footprint. Using a global proxy network and virtual user technology, RiskIQ continuously discovers and creates an inventory of managed, unmanaged and rogue web and mobile assets. This “Digital Footprint” is persistently scanned for anomalies, external threats, malvertisements and brand impersonation. Leading financial institutions, insurance providers and consumer as well as B2B brands use RiskIQ to protect themselves and their users from code level threats, malware and fraud. RiskIQ is headquartered in San Francisco and backed by growth equity firms Summit Partners and Battery Ventures. To learn more about RiskIQ, visit www.riskiq.com. Address Website Products/Services Offered
| 265 |
Shape Security
Shape Security is a startup in Mountain View, California that has created a completely new approach to website defense. Its flagship product, the ShapeShifter, is the world’s first botwall: an advanced technology that disables the attack capability of malware, botnets, and scripts. This results in a comprehensive defense against the most serious website breaches, for which there are no other existing solutions. Shape is backed by top investors including Kleiner Perkins, Venrock, Norwest, Google Ventures, and Eric Schmidt. It is led by cybersecurity leaders from the Pentagon, Cisco, Oakley Networks, McAfee, and Google. Address Website Products/Services Offered
| 558 |
SOPHOS
We help organizations keep data safe and block the growing number of complex threats. We protect everywhere and offer complete security with our full range of endpoint, encryption, email, web, network security and UTM products. We help customers protect their businesses and meet compliance needs. And all our customers benefit from the expertise of our threat analysts located around the world. Their research is at the heart of everything we do. They quickly find the latest threats and update protection for our customers automatically. Plus, our support engineers are experts on all our products, and they're available whenever you need them. We make our products easy to install and use so you spend less time managing security. With Sophos you can focus on the needs of your business because we're securing your entire organization. www.sophos.com Address Website Products/Services Offered
| 452 |
Synack
Synack is a security startup that has created a unique Crowd Security Intelligence™ platform that delivers the most secure, continuous, scalable, security assessment on the market. Through leveraging the best combination of humans and technology, Synack creates a uniquely powerful solution that provides ongoing and on-demand vulnerability intelligence. Synack’s innovative model enables customers to safely engage a private community of the most sought-after and trusted security hackers in the world. The resulting actionable vulnerability intelligence augments internal security teams with unparalleled scale and diversity and enables business leaders to make better and faster risk management decisions to better protect their customers and brand. The Synack security-as-a-service offering redefines the traditional static, signature-based model of security testing by providing a proactive, adversarial perspective of the enterprise IT environment. Synack was founded in 2013 by security experts Jay Kaplan, CEO, and Dr. Mark Kuhr, CTO. For more information, visit www.synack.com. Address Website | 559 |
Synopsys
Synopsys, Inc. (Nasdaq:SNPS) is the Silicon to Software™ partner for innovative companies developing the electronic products and software applications we rely on every day. As the world's 15th largest software company, Synopsys has a long history of being a global leader in electronic design automation (EDA) and semiconductor IP, and is also a leader in software quality and security testing with its Coverity® solutions. Whether you're a system-on-chip (SoC) designer creating advanced semiconductors, or a software developer writing applications that require the highest quality and security, Synopsys has the solutions needed to deliver innovative, high-quality, secure products. Learn more at www.synopsys.com. Address Website Products/Services Offered
| 652 |
TeleSign
TeleSign is the leader in Mobile Identity solutions, helping customers secure more than 3.5 billion end user accounts worldwide and prevent registration fraud, while improving user experience and managing support costs. TeleSign delivers account security and fraud prevention with two-factor authentication based on each user’s Mobile Identity (phone number, device and behavior) and driven by real-time, global intelligence, including reputation scoring and device data. TeleSign solutions address the full spectrum of account security – registration, access, usage and recovery – while it also streamlines user experience to help increase adoption, retention and trust. TeleSign prevents registration fraud, stops account takeovers and securely authenticates end users via SMS, voice and mobile app. Address Website Products/Services Offered
| 1217 |
Thycotic Software
Thycotic IT security and password management solutions empower companies to remove the complexities associated with proper access control and management of privileged accounts. An Inc. 5000 company, Thycotic is recognized as the fastest growing, privately held privileged management provider in the USA. Secret Server privileged account management vaults, manages and audits privileged accounts across a company’s entire IT infrastructure. Thycotic also provides end-user password management and self-service AD group management tools. Rated #1 in customer satisfaction and trusted by more than 3,000 organizations worldwide – including members of the Fortune 500, enterprises, government agencies, technology firms, universities, non-profits, and managed service providers. Address Website Products/Services Offered
| 659 |
Trend Micro
Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Our solutions for consumers, businesses and governments provide layered content security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative technology that is simple to deploy and manage, and security that fits an evolving ecosystem. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™, and are supported by over 1,200 threat experts around the globe. For more information, visit www.trendmicro.com. Address Website Products/Services Offered
| 758 |
Company | Booth |
---|---|
Agiliance
Agiliance is the leading independent provider of integrated solutions for Operational and Security Risk Intelligence. Agiliance is automating how Global 2000 companies and government agencies continuously monitor big data for risks across financial, operations, and IT domains to increase operational efficiency and orchestrate incident, threat, and vulnerability actions in real time. The company’s Cyber Security Operational Risk Intelligence solution gathers data feeds from otherwise silo-based security and IT tools such as SIEMs, configuration management databases, vulnerability scanners, threat data feeds and advisory services, database security management, etc. It then aggregates, normalizes, and correlates the information with business criticality. This enables a near real time snap shot of an organization’s security posture and then triggers appropriate remediation actions. By leveraging Agiliance’s Cyber Security Operational Risk Intelligence solution, organizations can minimize the risk of cyber-attacks in today's dynamic threat landscape. For more information, visit www.agiliance.com. Address Website Products/Services Offered
| 767 |
Akamai Technologies
Akamai® is the leading provider of cloud services for delivering, optimizing and securing online content and business applications. At the core of the Company’s solutions is the Akamai Intelligent Platform™ providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit www.akamai.com or blogs.akamai.com, and follow @Akamai on Twitter. Address Website Products/Services Offered
| 466 |
Alert Logic Inc.
ABOUT ALERT LOGIC Alert Logic, the leader in security and compliance solutions for the cloud, provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure resides. Alert Logic partners with the leading cloud platforms and hosting providers to protect over 3,000 organizations worldwide. Built for cloud scale, our patented platform stores petabytes of data, analyses over 450 million events and identifies over 60,000 security incidents each month, which are managed by our 24x7 Security Operations Center. Alert Logic, founded in 2002, is headquartered in Houston, Texas, with offices in Seattle, Cardiff and London. Address Website Products/Services Offered
| 1065 |
Appthority
Appthority is the global leader in mobile application risk assessment and management for the enterprise. The Appthority solution automates the scanning and analysis of mobile apps installed by employees on both personal and company devices. Ranked as the number one mobile application security solution by Gartner, Appthority has analyzed over three million apps for its Global 2000 and government customers. By continually evaluating mobile app risk across all company employees and devices, and providing the ability to set security policy enforcement rules to reduce that risk, Appthority gives enterprise security and mobility teams peace of mind. Appthority enables companies to leverage mobility and empower a smarter, safer, mobile workforce. More information on Appthority can be found at https://www.appthority.com Address Website | 1223 |
Arxan Technologies
Arxan provides the world’s strongest application protection solutions. Our unique patented guarding technology 1. Defends applications against attacks 2. Detects when an attack is being attempted, and 3. Responds to detected attacks with alerts and repairs. Arxan offers solutions for software running on mobile devices, desktops, servers, and embedded platforms – including those connected as part of the Internet of Things (IOT) – and is currently protecting applications running on more than 300 million devices across a range of industries. Address Website Products/Services Offered
| 1236 |
Authentify Inc
Authentify delivers user-centric multi-factor authentication services, SaaS, employing smart phones, tablets, laptops or "just" plain old telephones for out-of-band authentication. An Enterprise may choose multiple authentication factors including soft-token, digital certificates, voice biometrics, shared secrets and others minus the overhead associated with MFA. Broad support for all types of telephone technology ensures authentication workflows in which no end user is left behind. To learn more about how Authentify is defending against cybercrime, please visit www.authentify.com, and follow @Authentify on Twitter. Address Website | 264 266 |
BalaBit
BalaBit, best known its syslog-ng open source log management solution with more than one million users, is a leading developer of advanced monitoring and log management solutions that help protect organizations against internal and external threats. BalaBit, headquartered in Luxembourg, has local offices in France, Germany, Russia, the UK and the USA. Our 200+ employees serve customers across the globe, including 23 of the Fortune 100, through more than 80 partners in more than 40 countries. Our R&D and global support centers are located in Hungary. Address Website Products/Services Offered
| 566 |
Bay Dynamics
Bay Dynamics is the market leader in providing cybersecurity solutions to protect organizations around the world from evolving security threats and to reduce their business risk with its innovative next generation machine learning and predictive analytics technology. For more information, visit www.baydynamics.com. Address | 666 |
Bluebox Security
Founded in 2012 by a team of security experts, Bluebox Security provides the leading mobile app security and management solution. Pairing deep mobile security expertise with dynamic app management, Bluebox ensures that enterprise security moves at the speed of mobile. The cloud-based solution helps enterprises securely enable mobile by protecting apps, detecting threats and responding quickly to keep data secure. Bluebox Security has received a total of $27.5 million in funding from Andreessen Horowitz, Tenaya Capital, Sun Microsystems co-founder, Andreas Bechtolsheim, SV Angel, and Google Board member Ram Shriram. The company is headquartered in San Francisco. Address Website Products/Services Offered
| 965 |
Booz Allen Hamilton
Booz Allen Hamilton is a leading provider of management consulting, technology, and engineering services to the US government in defense, intelligence, and civil markets, and to major corporations and not-for-profit organizations. Booz Allen is headquartered in McLean, Virginia, employs nearly 23,000 people, and had revenue of $5.48 billion for the 12 months ended March 31, 2014. In 2014, Booz Allen celebrates its 100th anniversary year. To learn more, visit www.boozallen.com. (NYSE: BAH) Address Website Products/Services Offered
| 130 |
Cigital
Cigital is one of the world’s largest application security firms. We go beyond traditional testing services to help organizations find, fix and prevent vulnerabilities in the applications that power their business. Our holistic approach to application security offers a balance of managed services, professional services and products tailored to fit your specific needs. We don't stop when the test is over. Our experts also provide remediation guidance, program design services, and training that empower you to build and maintain secure applications. Our proactive methods helps clients reduce costs, speed time to market, improve agility to respond to changing business pressures and threats, and focus resources where they are needed most. Address Website Products/Services Offered
| 1131 |
CipherCloud
CipherCloud, the leader in cloud information protection, enables organizations to securely adopt cloud applications by overcoming data privacy, residency, security, and regulatory compliance risks. CipherCloud delivers an open platform with comprehensive security controls, including AES 256-bit encryption, tokenization, cloud data loss prevention, cloud malware detection and activity monitoring. CipherCloud's ground breaking technology protects sensitive information in real time, before it is sent to the cloud, while preserving application usability and functionality. CipherCloud has experienced exceptional growth and success with over 2 million business users, more than 250 million customer records, in over 10 industries, and with marquee customers around the globe. CipherCloud, named as SC Magazine's 2013 Best Product of the Year, is backed by premier venture capital firms Andreessen Horowitz, Index Ventures, and T-Venture, the venture capital arm of Deutsche Telekom. For more information, visit www.ciphercloud.com and follow us on Twitter @ciphercloud. Address Website Products/Services Offered
| 766 |
Cloudera
Cloudera is revolutionizing enterprise data management with the first unified Platform for Big Data, an enterprise data hub built on Apache Hadoop™. Cloudera offers enterprises one place to store, process and analyze all their data, empowering them to extend the value of existing investments while enabling fundamental new ways to derive value from their data. Founded in 2008, Cloudera was the first and still is the leading provider and supporter of Hadoop for the enterprise. Cloudera also offers software for business critical data challenges including storage, access, management, analysis, security and search. Cloudera works with over 1,400 hardware, software and services partners to meet customers' big data goals. Address Website | 467 |
CloudPassage
CloudPassage Halo® is the world’s leading agile security platform that empowers our customers to take full advantage of cloud infrastructure with the confidence that their critical business assets are protected. Halo delivers a comprehensive set of continuous security and compliance functions right where it counts -- at the workload. Our platform orchestrates security on-demand, at any scale and works in any cloud or virtual infrastructure (private, public, hybrid or virtual data center). Leading enterprises like Citrix, Salesforce.com and Adobe use CloudPassage today to enhance their security and compliance posture, while at the same time enabling business agility. Headquartered in San Francisco, CA, CloudPassage is backed by Benchmark Capital, Meritech Capital Partners, Tenaya Capital, Shasta Ventures, Musea Ventures and other leading investors. For more information, visit cloudpassage.com. Address Website Products/Services Offered
| 366 |
Code42
Code42 connects people to the files they need on the devices they love, enabling continuous data protection and secure access for people and businesses everywhere. Our data governance platform—serving more than 35,000 businesses and protecting millions of consumer devices—delivers industry-leading CrashPlan endpoint backup and SharePlan enterprise file sync/share. Address Website Products/Services Offered
| 164 |
Codenomicon
Codenomicon by Synopsys is a global leader in providing cybersecurity solutions to organizations that develop, deploy, and defend critical software, services, and infrastructure. By enabling organizations to detect and mitigate vulnerabilities and cyber threats, Codenomicon empowers customers and partners to build a more resilient world. Codenomicon’s suite of security solutions include automated testing tools for proactive vulnerability management and an advanced threat intelligence platform to detect and prioritize malicious cyber-attacks in real time. Founded in 2001, Codenomicon was spun out of the PROTOS test tools research of the Oulu University Secure Programming Group. Since then, Codenomicon’s solutions have been used to detect and address widespread, critical vulnerabilities such as Heartbleed. Codenomicon works with hundreds of customers across a wide range of industries, including telecommunications, finance, healthcare, industrial control systems, automotive, and government. Address Website | 664 |
Cybersponse
CyberSponse enables companies to defend and counter attackers through a unique, collaborative security operations platform that facilitates comprehensive incident response lifecycle management. Founded in 2011, CyberSponse is a leading provider of automated incident response (IR) solutions for cyber security threat management. Most security groups within organization’s today use Word, Excel, and internal email to manage their daily security operations. CyberSponse takes a different approach and believes that an automated and transparent view of SecOp efforts and true situational awareness for all levels of management is required for proactive management of the complexity of IT security. The CyberSponse technology platform dramatically improves the efficiency and the effectiveness of the daily SecOps team’s efforts against cyber-attacks by providing a centralized system for managing, monitoring, reporting, and analyzing an organizations entire IT security infrastructure and processes. Address Website | 864 |
Distil Networks
Distil Networks, the global leader in bot detection and mitigation, offers the most automated and accurate way to identify and police malicious website traffic, blocking 99.9% of bad bots without impacting legitimate users. Distil protects against web scraping, competitive data mining, account hijacking, form spam and click fraud while slashing the high tax that bots place on your internal teams and web infrastructure. For more information on Distil Networks, visit us at www.distilnetworks.com or follow @DISTIL on twitter. Address Website Products/Services Offered
| 1068 |
Druva
Druva is the leader in data protection and governance at the edge, bringing visibility and control to business information in the increasingly mobile and distributed enterprise. Built for public and private clouds, Druva’s award-winning inSync and Phoenix solutions prevent data loss and address governance, compliance, and eDiscovery needs on laptops, smart-devices and remote servers. As the industry’s fastest growing edge data protection provider, Druva is trusted by over 3,000 global organizations on over 3 million devices. Learn more at www.druva.com and join the conversation at twitter.com/druvainc. Address Website | 465 |
Elastica
Elastica is the innovator of Data Science Powered™ Cloud Application Security. Its CloudSOC™ solution empowers the Elastic Enterprise and enables companies to confidently leverage cloud applications and services while staying safe, secure and compliant. Elastica Apps on the extensible CloudSOC™ platform today offers cloud audit for Shadow IT, granular transaction visibility, threat detection, security controls and post-incident forensic analysis. Elastica is venture-backed by the Mayfield Fund and is headquartered in San Jose, CA. Learn more about Elastica at elastica.net. Follow us on Twitter @ElasticaInc. Address Website Products/Services Offered
| 567 |
Endgame
Endgame is leveling the playing field against adversaries by protecting national security and commercial interests from the most advanced cyber threats. Using its deep knowledge of the adversary, Endgame helps customers understand their defenses from the perspective of the attacker. This new approach allows organizations to instantly detect and actively respond to advanced threats, preventing damage and loss. Endgame’s technology and techniques are proven in the most extreme environments—from defending U.S. national security interests to protecting the world’s critical infrastructure. Address Website Products/Services Offered
| 1215 |
Federal Bureau of Investigation
Address Website | 158 |
Identity Finder
Identity Finder is a global leader in enterprise security software, focusing on sensitive data management and protection. The company’s award-winning solutions help organizations make smarter information technology decisions, manage risk, and prevent damage by discovering, classifying, and protecting confidential information wherever it exists in the enterprise. Address Website Products/Services Offered
| 166 |
Infoblox
Infoblox (NYSE:BLOX) delivers network control solutions, the fundamental technology that connects end users, devices, and networks. These solutions enable approximately 8,100 enterprises and service providers to transform, secure, and scale complex networks. Infoblox helps take the burden of complex network control out of human hands, reduce costs, and increase security, accuracy, and uptime. Infoblox (www.infoblox.com) is headquartered in Santa Clara, California, and has operations in over 25 countries. Address Website | 865 |
KPMG
Address Website | 167 |
Lastline
Lastline is innovating the way companies detect active breaches caused by advanced persistent threats, targeted attacks and evasive malware with its software-based Breach Detection Platform. Lastline’s open architecture integrates advanced threat defenses and intelligence into existing operational workflows and security systems. Inspection of suspicious objects occurs at scale in real-time using a full-system emulation approach to sandboxing that is superior to virtual machine-based and OS emulation techniques. Lastline's technology correlates network and object analysis to achieve timely breach confirmation and incident response. Lastline was built by Anubis and Wepawet researchers and industry veterans with decades of experience focused specifically on advanced breach weaponry and tactics. Headquartered in Redwood City, California with offices throughout North America, Europe and Asia, Lastline’s platform is used by global managed security service providers, Global 2000 enterprises and leading security vendors worldwide. To learn more, visit www.lastline.com. Address Website Products/Services Offered
| 252 |
Level 3 Communications
Level 3 Communications builds, operates and maintains a global communications network to deliver managed solutions for enterprises, carriers and governments. As a Fortune 500 company and a Tier 1 Internet operator, we offer fiber-based infrastructure and data center solutions, IP-based voice and data communications, wide-area Ethernet services, video and content distribution, security solutions, and cloud-based solutions. Level 3 connects more than 500 markets in over 60 countries across owned fiber networks on six continents, connected by extensive undersea facilities. We take ownership of network reliability and security, so our customers can own their success in return. Learn more: www.level3.com. Address Website | 165 |
Masergy Communications, Inc.
Masergy owns and operates the largest independent cloud networking platform, delivering fully-managed global networks, advanced managed security and cloud unified communication solutions to enterprises. Since 2001, Masergy has delivered innovative technologies and unmatched customer service. We go beyond transforming IT, we are the benchmark for what enterprises expect from their service provider. Address Website Products/Services Offered
| 1067 |
MBX Systems
MBX Systems offers comprehensive OEM hardware manufacturing and services that enable software companies to deliver their applications on single-purpose systems, optimized for increased performance and reliability. The turnkey hardware systems are 100% customized to the customer’s specifications by inhouse platform engineers, and value-added services such as branding, software imaging, regulatory/compliance, global logistics and warranty support relieve customers of all hardware responsibilities. In addition to traditional hardware programs, MBX has launched MBX Clear, a Hardware-as-a-Service model that eliminates upfront capital investments and other hardware-related overhead by providing custom hardware systems to customers on a subscription basis. Additional benefits include eliminated need to purchase inventory or extended hardware warranties and zero risk of obsolete hardware. MBX Systems is an HP OEM Integrator, Intel Technology Provider Platinum, and Seagate Elite Partner and is headquartered near Chicago, offering engineering in San Jose, manufacturing in the U.S. and Europe, and logistics services globally. Address Website Products/Services Offered
| 1242 |
MobileIron
"Customers use MobileIron as the technology foundation on their journey to become “Mobile First” organizations, embracing mobility as a primary computing platform for their employees. Mobile technology is driving a massive shift in the ability of IT to support the way people want to work. Mobile First organizations focus on building superb mobile user experiences that are available anywhere users need them. They have to move fast and adopt new technologies rapidly. Mobile First organizations transform their businesses by giving employees secure access to critical business applications and content on devices employees want with a native user experience they love." Address Website Products/Services Offered
| 866 |
Mocana Corporation
Mocana has been securing the Internet of Things for over a decade. From smart meters to smart phones, anything that has an IP address is securable with Mocana's Security of Things. More information is available at www.mocana.com. Address Website Products/Services Offered
| 122 |
Neustar
Neustar, Inc. (NYSE:NSR) is the first real-time provider of cloud-based information services and data analytics, enabling marketing and IT security professionals to promote and protect their businesses. With a commitment to privacy and neutrality, Neustar operates complex data registries and uses its expertise to deliver actionable, data-driven insights that help clients make high-value business decisions in real time, one customer interaction at a time. More information is available at www.neustar.biz. Address Website Products/Services Offered
| 155 |
Novetta
Novetta’s analytics solutions are used at the heart of our nation’s cyber defense. Now available for commercial enterprises, Novetta Cyber Analytics actually does what our competitors have only claimed to do for years: provide complete, truthful, near real-time network security visibility and awareness. The solution dramatically increases the effectiveness of current security teams and perimeter/SIEM infrastructure by enabling analysts to ask and receive ground truth, PCAP-based answers to subtle questions almost instantly. Customers using the solution handle an estimated 30 times the number of incidents, and have found an immeasurable number of previously unknown intrusions. Learn more at www.novetta.com/cyber-analytics. Address Website | 1064 |
OPSWAT
OPSWAT provides solutions to secure and manage IT infrastructure. Metadefender and Metascan help organizations secure data flow into and through their organization, detecting and preventing known and unknown threats by using multiple anti-malware engine scanning, document sanitization and file filtering. Organizations can set security policies for data entering through USB drives, mail servers, web downloads, upload servers and more. Metascan uses up to 30 anti-malware engines to scan files (using signatures and heuristics) to increase detection rates of malware; it provides an ideal tool for file upload and transfer protection, forensics and malware research, and more. OPSWAT also offers GEARS, a platform for advanced endpoint assessment of in-network and remote devices, including both managed and guest devices. GEARS enables administrators to easily assess endpoints for security and compliance issues and integrates with secure access solutions and other technologies to enhance endpoint posture checking for NAC, SSL VPN, SaaS and more. Address Website Products/Services Offered
| 365 |
PFP Cybersecurity
PFP Cybersecurity provides the next generation of threat detection to solve today’s most sophisticated cyber security attacks on critical infrastructure and supply chain systems. PFP’s physics-based integrity assessment reduces the detection time to mere milliseconds and is capable of detecting malicious intrusions in any device. Even dormant attacks that are simply “listening” can be detected, even if the system is behaving normally from the user’s perspective. Integrating with SIEMs and other threat intelligence/management solutions, PFP is completely complimentary to existing cyber security approaches. It has no impact on the performance of monitored systems, and attackers cannot tell they are being monitored. The PFP physics-based solution uses patent pending, advanced signal processing of instantaneous power consumption to derive the internal execution status of the user’s hardware and firmware. When applied to detection of counterfeit chips and hardware Trojans the technology provides 100% test and verification of supplier components, quickly and efficiently. Address Website Products/Services Offered
| 1234 |
PFU, a Fujitsu Company
PFU, a Fujitsu company, is a $1.2 billion global enterprise that designs, develops, manufactures, sells and maintains network security solutions, computer hardware, peripheral products, enterprise software and systems. Address Website Products/Services Offered
| 367 |
Prevoty
Prevoty has developed a new application security capability that enables applications to be both monitored and protected at runtime. Applications can be easily instrumented to call Prevoty’s security engine without requiring any changes to the applications themselves, enabling instant application threat visibility and rapid reduction in backlog vulnerabilities. Address Website Products/Services Offered
| 966 |
ProtectWise
ProtectWise™ is disrupting network security with its Cloud Network DVR, a virtual camera in the cloud that records everything on the network. The service allows security professionals to see threats in real time and continuously goes back in time to discover previously unknown threats automatically. ProtectWise harnesses the power of the cloud to provide complete visibility and detection of enterprise threats and accelerated incident response. The Cloud Network DVR delivers an unlimited retention window with full-fidelity forensic capacity, the industry’s only automated smart retrospection, advanced security visualization, and the ease and cost-savings of an on-demand deployment model. ProtectWise is led by a team of security SaaS industry veterans from McAfee, IBM, Mandiant and Proofpoint. Address Website Products/Services Offered
| 1221 |
Protiviti
About Protiviti Protiviti (www.protiviti.com) is a global consulting firm that helps companies solve problems in finance, technology, operations, governance, risk and internal audit, and has served more than 60 percent of Fortune 1000® and 35 percent of Fortune Global 500® companies. Protiviti and our independently owned Member Firms serve clients through a network of more than 70 locations in over 20 countries. We also work with smaller, growing companies, including those looking to go public, as well as with government agencies. Named one of the 2015 Fortune 100 Best Companies to Work For®, Protiviti is a wholly owned subsidiary of Robert Half (NYSE: RHI). Founded in 1948, Robert Half is a member of the S&P 500 index. Address Website Products/Services Offered
| 160 |
PuriFile
PuriFile is a Data Loss Prevention (DLP) suite of software tools designed to inspect and sanitize your most sensitive data and keep it where it belongs, INSIDE your organization. Produced and supported by Harris Corporation, PuriFile has the backing of a well-known leader in the information assurance marketplace. Address Website Products/Services Offered
| 1246 |
Radware
Radware (NASDAQ: RDWR), is a global leader of application delivery and application security solutions for virtual and cloud data centers. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility. Radware's solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down. For more information, please visit www.radware.com. Address Website Products/Services Offered
| 254 |
Recorded Future
Recorded Future arms you with real-time threat intelligence so you can proactively defend your organization against cyber attacks. With billions of indexed facts, and more added every day, our patented Web Intelligence Engine continuously analyzes the open Web to give you unmatched insight into emerging threats. Recorded Future helps protect four of the top five companies in the world. To learn more, stop by our booth for a live demo or visit www.recordedfuture.com. Address Website | 564 |
Seculert
Seculert’s automated breach detection platform protects global enterprises from the effects of targeted malware infections. Seculert provides unique visibility into how “owned" an organization is by cyber criminals. The Seculert Platform improves the performance and operational efficiency of Security Operations Center teams while complementing traditional breach prevention systems by providing precise and accurate malware infection data. Seculert delivers only persistent malware detection reports that are verified as “true positives” including sufficient forensic data to immediately remediate the infected device(s). Seculert requires no hardware or software, no agents, and no changes to current security workflow processes. Address Website | 154 |
Secunia
Secunia is recognized industry-wide as a significant global player, within the IT security ecosystem, in the niche of Software Vulnerability Management. The company’s award-winning portfolio equips corporate and private customers worldwide with Vulnerability Intelligence, Vulnerability Assessment, and automated Security Patch Management tools to manage and control software vulnerabilities across networks and endpoints. Secunia supports the entire Software Vulnerability Management Lifecycle and provides trustworthy software vulnerability intelligence, vulnerability remediation and a reliable technology platform that is easily integrated into customer IT environments. Secunia’s in-house Research Team publishes vulnerability intelligence, renowned for its accuracy, timeliness and comprehensiveness. Vulnerability intelligence is at the core of Secunia’s solutions. Secunia is a supplier to Fortune 500s, Global 2000s and government agencies worldwide. By leveraging Secunia’s Vulnerability Management knowledge and solutions, companies can rapidly handle emerging threats, complex IT security risks, security audits, and compliance audits across industries – all the key components of corporate risk management. Address Website Products/Services Offered
| 1231 |
SecureAuth
SecureAuth’s identity and information security solutions deliver innovative access control for cloud, mobile, web and legacy systems. Our customer-first approach is combined with outside the box thinking and standards based development. This ensures we solve even your toughest access control problems with solutions that are quick to deploy, easy to integrate with your existing infrastructure and deliver exceptional value for your investment. SecureAuth's IdP is just what the name implies, an identity provider, and a unique approach to securing user access control. In a world where control of the device, application, and even the infrastructure is moving out of the datacenter, an IdP is the perfect solution to ensure you maintain secure control of user access to your resources and data, whether in the cloud, on the web, via a mobile device or through VPN. With two-factor authentication and single sign-on in one solution, SecureAuth IdP makes deploying secure user access control for all your application resources a snap! And with advanced features such as adaptive authentication to examine the context of each request and user self-service tools, for self-enrollment and password resets, SecureAuth IdP improves security while also reducing user friction and lowering help desk costs. Address Website | 665 |
Skybox Security
Skybox Security provides powerful risk analytics that give security teams the intelligence needed to eliminate attack vectors, respond to threats and improve security processes. Our solutions are used for enterprise-scale vulnerability and threat management, firewall management and compliance monitoring. Address Website | 364 |
SOLARFLARE
Solarflare is the leading provider of application-intelligent networking I/O software and hardware that accelerate, monitor and secure network data. The firm recently introduced SolarSecureTM, SolarCaptureTM and Capture SolarSystemTM. These applications are deployed on Solarflare’s FlareonTM 10/40GbE adapter platform and empower the enterprise with the technical sophistication necessary to effectively capture, identify and block malicious traffic before it penetrates the operating system or applications on network servers and enforce policies, all without requiring any additional hardware With over 1,400 customers worldwide, the company's solutions are widely used in scale-out server environments such as electronic trading, high performance computing, cloud, CDN, virtualization and big data. Solarflare’s products are available from leading distributors and value-added resellers, as well as from Dell, HP and IBM. Solarflare is headquartered in Irvine, California, and operates R&D facilities in Cambridge, UK and New Delhi, India. Address Website | 152 |
SSH Communications Security
Founded in 1995, SSH Communications Security is the company that invented the SSH protocol - the gold standard protocol for data-in-transit security solutions. Today, over 3,000 customers across the globe, including 7 of the Fortune 10, trust our Information Assurance Platform to secure the path to their information assets. Our platform enables businesses of all types and sizes to protect their information assets by: - Developing gold standard data-in-transit security solutions that prevents data loss in both internal and external environments - Delivering hardened perimeter security through our multi-channel two-factor authentication - Providing internal security control management solutions that enables organizations to more easily manage user keys and monitor administrator traffic across your networks Address Website Products/Services Offered
| 931 |
Tanium
Tanium gives the world’s largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise within seconds. Serving as the “central nervous system” for enterprises, Tanium empowers security and IT operations teams to ask questions about the state of every endpoint across the enterprise in plain English, retrieve data on their current state and execute change as necessary, all within seconds. With the unprecedented speed, scale and simplicity of Tanium, organizations now have complete and accurate information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of cost efficiency in IT operations. Visit us at www.tanium.com or follow us on Twitter at @Tanium. Address Website Products/Services Offered
| 1248 |
The Media Trust
The Media Trust is the global leader in monitoring and protecting the online and mobile ecosystem. By monitoring digital properties from the user’s perspective, The Media Trust provides website security via comprehensive detection and alerting services to protect against malware, site performance issues and data leakage. Leveraging a physical presence in 65 countries, The Media Trust monitors the source code, advertising, domains, cookies, third parties and other activities executing on public-facing websites and mobile applications, and recognizes when things aren't right — redirected browsers, infected ads, hijacked third-party vendor code, leaked first-party visitor data, digital defacement, etc. The Company also provides ad campaign quality automation technology, verifying online ad campaigns and enabling comprehensive quality assurance. More than 500 publishers, ad networks, exchanges, agencies and corporate rely on The Media Trust’s comprehensive suite of detection and alerting services to protect their website, their revenue and, most importantly, their brand. Address Website Products/Services Offered
| 1240 |
ThreatConnect
ThreatConnect, Inc. provides industry-leading advanced threat intelligence software and services including ThreatConnect®, the most comprehensive Threat Intelligence Platform (TIP) on the market. ThreatConnect delivers a single platform in the cloud and on-premises to effectively aggregate, analyze, and act to counter sophisticated cyber-attacks. Leveraging advanced analytics capabilities, ThreatConnect offers a superior understanding of relevant cyber threats to business operations. To register for a free ThreatConnect account, or to learn more about our products and services, visit: www.threatconnect.com. Address Website Products/Services Offered
| 867 |
ThreatStream
ThreatStream® provides the leading enterprise class Threat Intelligence Platform, combining comprehensive threat data collection, prioritization, and analytics with secure collaboration in a vetted community. Offering the broadest enterprise security infrastructure integration available, ThreatStream enables organizations to proactively identify and combat cyber threats targeting their operations. Address Website Products/Services Offered
| 765 |
TrapX Security
TrapX Security is a leader in the delivery of deception based cyber security defense. Our solutions rapidly detect, analyze and defend against new zero day and APT attacks in real-time. DeceptionGrid™ provides automated, highly accurate insight into malware and malicious activity unseen by other types of cyber defense. We enable a pro-active security posture, fundamentally changing the economics of cyber defense by shifting the cost to the attacker. The TrapX Security customer base includes global 2000 commercial and government customers around the world in sectors including defense, healthcare, finance, energy, consumer products and other key industries. Address Website Products/Services Offered
| 161 |
UMUC
University of Maryland University College (UMUC) offers undergraduate and graduate degrees and certificates in cybersecurity, cybersecurity policy information assurance, computer networks and security, and digital forensics and cyber investigation. Located near the nation's capital, UMUC is one of the largest public universities in the United States. UMUC has been designated as a National Center of Academic Excellence for Information Assurance Education by NSA/DHS. To learn more, visit www.umuc.edu/spotlight/cybersecurity.cfm Address Website | 565 |
Vectra Networks
Vectra Networks is the leading innovator in real-time detection of in-progress cyber attacks. The Vectra X-series breach detection platform continuously monitors network traffic to automatically detect any phase of an ongoing cyber attack. The platform provides visually intuitive reports of hosts under attack and context about what the attacker is doing. Vectra automatically prioritizes attacks that pose the greatest business risk, enabling organizations to quickly make decisions on where to focus their time and resources. Vectra Networks’ investors include Khosla Ventures, Accel Partners, IA Ventures and AME Cloud Ventures. The company’s headquarters are in San Jose, Calif. Visit www.vectranetworks.com for more information. Address Website Products/Services Offered
| 159 |
Venafi, Inc.
Venafi is the market leading cybersecurity company in Next Generation Trust Protection (NGTP). As a Gartner-recognized Cool Vendor, Venafi delivered the first trust protection platform to secure cryptographic keys and digital certificates that every business and government depend on for secure communications, commerce, computing, and mobility. As part of an enterprise infrastructure protection strategy, Venafi Director prevents attacks on trust with automated discovery and intelligent policy enforcement, detects and reports on anomalous activity and increased threats, and remediates errors and attacks by automatically replacing keys and certificates. Venafi Threat Center provides research and threat intelligence for trust-based attacks. Venafi customers are among the world’s most demanding, security-conscious Global 2000 organizations in financial services, insurance, high tech, telecommunications, aerospace, healthcare and retail. Venafi is backed by top-tier venture capital funds, including Foundation Capital, Pelion Venture Partners and Origin Partners. For more information, visit Venafi.com. Address Website | 731 |
Viewfinity
Viewfinity's advanced endpoint protection solution focuses on lessening the impact of IT security breaches before, during and after an attack. Our core capabilities reduce the attack surface and proactively prevent advanced persistent threats by removing administrative rights and monitoring and classifying applications. Suspect software is cross-referenced with network security sandboxes and cloud databases to accelerate detection, incident response and remediation efforts. Follow-up threat investigations are pinpoint accurate due to our ancestry tracking forensics that trace back to the origin of an attack. Viewfinity has a unique remediation differentiator in its ability to locate all instances of software related to an attack and block from further execution and propagation on endpoints. For more information, visit www.viewfinity.com. Address Website Products/Services Offered
| 764 |
Vormetric, Inc.
Vormetric (@Vormetric) is the industry leader in data security solutions that protect data-at-rest across physical, big data and cloud environments. Vormetric helps over 1500 customers, including 17 of the Fortune 30, to meet compliance requirements and protect what matters — their sensitive data — from both internal and external threats. The company’s scalable Vormetric Data Security Platform protects any file, any database and any application’s data —anywhere it resides — with a high performance, market-leading solution set. Address Website Products/Services Offered
| 153 |
Wallarm
Wallarm is next generation web security solution designed to protect online businesses from application-level attacks. It organically combines vulnerability detection with web application firewall (WAF). Its key features include blocking of 0days attacks with behavioural analytics and machine learning, vulnerability detection, low false positives and resistance to spam in the interface. Wallarm provides rich vertical/horizontal scaling options to protect extremely loaded applications with a very low-performance degradation. Due to integration with popular bug trackers it's a perfect way to automate secure development life-cycle (SDL) and continuous integration (CI). Wallarm is developed on top of NGINX, an increasingly popular high-performance web server and load balancer used by 35% of the busiest 1000 websites. It targets clients with high loaded web projects in e-commerce, SaaS/ PaaS, big data, news media, communication and online payments markets. Address Website Products/Services Offered
| 667 |
Whitewood Encryption Systems
Whitewood Encryption Systems, Inc. builds next-generation systems of data encryption that leverage advanced cryptography technologies emerging from U.S. centers of research excellence. These systems will provide defenders with enhanced security through scalable, cost-effective and low-latency solutions. The company’s initial products will be founded upon technologies created at Los Alamos National Laboratory, backed by nearly two decades of research and representing $10s of millions of federal funding. Whitewood’s advisory group includes Richard Clarke of Good Harbor Consulting, Dr. Bob Brammer (former Northrop Grumman CTO), and Bruce Potter (Shmoo Group, Ponte Technologies). Whitewood is a portfolio company of Allied Minds Federal Innovations, the division of Allied Minds dedicated to commercializing federal intellectual property. Address Website Products/Services Offered
| 967 |
WolfSSL
wolfSSL, founded in 2004, is an open source Internet security company with products including the wolfSSL embedded SSL library, wolfCrypt crypto engine and wolfCrypt FIPS 140-2. Primary users are programmers building security functionality into applications, devices, and cloud services. wolfSSL employs the dual licensing model, offering products under both the GPLv2 as well as a standard commercial license. wolfSSL's products are designed to offer optimal embedded performance, rapid integration into existing applications and platforms, the ability to leverage a wide range of hardware crypto solutions, and support for the most current standards. All products are designed for ease-of-use with clean APIs, and are backed by a dedicated and responsive support and development team. Address Website Products/Services Offered
| 464 |
Yubico Inc
As the inventors of the YubiKey®, Yubico sets new world standards for secure login across the Internet. Our unique USB and NFC key offers one-touch strong authentication supporting multiple authentication protocols for all devices and platforms – with no driver or client software needed. With successful enterprise deployments in 140 countries, including 7 of the top 10 Internet companies, Yubico is adding the consumer market to its list of strong authentication converts. Founded in 2007, Yubico is privately held with offices in Palo Alto, Calif., Stockholm, and London. For more information, please visit www.yubico.com. Address Website Products/Services Offered
| 964 |
Company | Booth |
---|---|
BAE Systems Applied Intelligence
BAE Systems Applied Intelligence delivers solutions that help clients to protect and enhance their critical assets. Our intelligent protection solutions combine large-scale data exploitation, ‘intelligence-grade’ security and complex services and solutions integration. We operate in four key domains of expertise: cyber security, financial crime, communications intelligence and digital transformation. Address Website Products/Services Offered
| |
Booz Allen Hamilton
Booz Allen Hamilton is a leading provider of management consulting, technology, and engineering services to the US government in defense, intelligence, and civil markets, and to major corporations and not-for-profit organizations. Booz Allen is headquartered in McLean, Virginia, employs nearly 23,000 people, and had revenue of $5.48 billion for the 12 months ended March 31, 2014. In 2014, Booz Allen celebrates its 100th anniversary year. To learn more, visit www.boozallen.com. (NYSE: BAH) Address | |
Dark Reading with Veracode + Accenture
Dark Reading: Dark Reading is the most trusted online community for security professionals like you. Our community members include thought-leading security researchers, CISOs, and technology specialists, along with thousands of other security professionals. This is where enterprise security staffers and decision-makers come to learn about new cyber threats, vulnerabilities, and technology trends. | Veracode: Veracode secures web and mobile applications for the world’s largest organizations. A Leader in the Gartner Magic Quadrant, Veracode offers a unified cloud-based platform for multiple assessment technologies (SAST, DAST, IAST, software composition analysis, mobile behavioral analysis, web perimeter monitoring) that is simpler and more scalable than traditional on-premises approaches. | Accenture: Accenture is a global management consulting, technology services and outsourcing company, with more than 336,000 people serving clients in more than 120 countries. Combining unparalleled experience, comprehensive capabilities across all industries and business functions, and extensive research on the world’s most successful companies, Accenture collaborates with clients to help them become high-performance businesses and governments. Address Website | |
FireMon
FireMon solutions deliver continuous visibility into and control over network security infrastructure, policies and risk. Using the FireMon Security Intelligence Platform, today’s enterprise organizations, government agencies and managed services providers dramatically improve effectiveness of network defenses, optimizing investments and speeding response to changing business demands. For more information, visit firemon.com Address Website Products/Services Offered
| |
Twitter
Twitter is a global platform for public self-expression and conversation in real time. By developing a fundamentally new way for people to consume, create, distribute and discover content, Twitter enables any voice to echo around the world instantly and unfiltered. Twitter has more than 288 million monthly active users. Address Website |
Company | Booth |
---|---|
Area 1 Security
Area 1 Security provides the first ever anti phishing platform turning the tables on attackers by accurately identifying, in the wild, the delivery mechanisms of attackers. Address Website | IC21 |
Bricata
Bricata is pioneering the Next Generation of Intrusion Prevention Systems with innovative, high-throughput security and data protection solutions. Our ProAccel™ line enables enterprises of all sizes to safeguard their networks and ensure timely and actionable threat detection with full packet capture for complete contextual awareness of security incidents. Address Website Products/Services Offered
| IC14 |
BrightPoint Security
BrightPoint Security delivers actionable threat intelligence by reducing the noise inherent in threat data and enabling secure and controlled information sharing without attribution. The automated curation and correlation of threat data from external sources, behind your perimeter defenses, enables you to identify relevant threats in minutes instead of months. Address Website Products/Services Offered
| IC16 |
CloudLock
CloudLock offers the cloud security fabric enabling enterprises to protect their data in the cloud, reduce risk, achieve compliance, manage threats and increase productivity by monitoring more than 750 million files for more than 6 million end users daily. Address Website Products/Services Offered
| IC15 |
Cobalt Strike
Cobalt Strike executes targeted attacks and replicates advanced threat actors. Government, military, and commercial red teams use Cobalt Strike to assess security operations and train incident responders. http://www.advancedpentest.com/ Address Website Products/Services Offered
| IC22 |
Contrast Security, Inc.
Contrast Security delivers the world’s fastest application security that eliminates the single greatest security risk to enterprises today. Within seven minutes, Contrast can be deployed, automatically discover applications & identify vulnerabilities. Relying on sensors instead of expensive experts, Contrast runs continuously & is 10 times more accurate than the competition. Address Website Products/Services Offered
| IC4 |
Cymmetria
Need to identify targeted attacks with near zero false-positives; drill-down to data on attackers' tools and techniques; then generate signatures to immunize against similar attacks? Cymmetria have developed a unique approach, the deception stack. Come and see how to build your own deception stack with Cymmetria Maze Runner. Address Website Products/Services Offered
| IC32 |
Farsight Security, Inc.
Founded in 2013 by Internet pioneer Dr. Paul Vixie, Farsight Security, Inc. delivers real-time Threat Intelligence enrichment solutions in the form of DNS intelligence for faster, more precise detection and response to today’s cyber threats. Farsight solutions include DNSDB™, SIE™, WHOIS Domain and NOD™. Headquartered in San Mateo, California. Address Website Products/Services Offered
| IC3 |
Flashpoint Global Partners
Discover the critical missing data and intelligence your security team needs to defend against malicious actors operating in the unmapped regions of the Internet. Our pioneering approach blends subject matter expertise with innovative engineering to deliver Deep and Dark Web data in a sanitized environment. Address Website | IC12 |
Hillstone Networks
Hillstone Networks builds intelligent next-generation firewalls to protect against Advanced Persistent Threats and zero-day attacks. Built from the ground up for today’s virtual and cloud-based data centers, Hillstone’s fully distributed i+NGFW platform provides granular visibility and control of network traffic, based on real-time behavioral anomaly detection and advanced data analytics. Address Website | IC9 |
iScan Online, Inc.
iScan Online is the industry’s first data breach risk intelligence platform that puts a real-time dollar number on an organization’s security risk. iScan’s patented discovery process uncovers sensitive data and vulnerabilities, and financially prioritizes the results in reports that speak the language of the C-suite. Address Website Products/Services Offered
| IC17 |
MetaFlows
MetaFlows Inc. develops SaaS-based, network security software appliances that can reliably find and stop malware hidden in your network. False positives are virtually eliminated by correlating multiple independent flows. False negatives are lowered by combining feeds from Emerging Threats, Cuckoo, VirusTotal, SRI, OSSEC, Trustwave, YARA, ClamAV and Web of Trust. Address Website Products/Services Offered
| IC7 |
Niara, Inc.
Niara’s Big Data Security Analytics platform integrates advanced machine learning and user behavior analytics with rich forensics to automate the discovery of sophisticated, multistage cyber attacks. Headquartered in Sunnyvale, Calif., and backed by NEA, Index Ventures and Venrock. www.niara.com. Address Website Products/Services Offered
| IC19 |
Outlier Security
Outlier provides agentless endpoint detection and response that not only detects malware and APT but also includes user behavior analytics to detect credential misuse and lateral movement. Delivered as SaaS, Outlier is implemented within minutes, has zero impact on end users, and has the lowest TCO compared to agent-based systems. Address Website Products/Services Offered
| IC11 |
Peach Fuzzer
Peach Fuzzer, the world’s leading fuzz testing platform, provides security-testing solutions to organizations around the globe. Peach Fuzzer discovers and buckets vulnerabilities in hardware and software systems, applications, embedded devices, and network protocols. Peach Fuzzer is extensible and modular: a flexible system that can fuzz any automated security-testing scenario. Address Website Products/Services Offered
| IC2 |
Pwnie Express
Pwnie Express is the leading provider of network security assessment solutions for remote locations and wireless. Enterprises and government organizations worldwide rely on Pwnie Express’s products for asset discovery, vulnerability assessment, and drop-box penetration testing and obtain insight into their distributed network infrastructure. Pwnie Express devices leverage open source tools. Address Website Products/Services Offered
| IC1 |
Risk I/O
Risk I/O is a vulnerability threat management platform that processes external Internet breach and exploit data with vulnerability scan data to monitor, measure and prioritize remediation across an IT environment. As a result, organizations know their likelihood of experiencing a breach and what vulnerabilities pose the greatest risk. Address Website Products/Services Offered
| IC20 IC30 |
RiskSense, Inc.
Address Website | IC6 |
SafeBreach
Address Website | IC34 |
Saviynt
Address Website Products/Services Offered
| IC13 |
Twistlock
Twistlock provides a comprehensive security solution for containerized computing, across all phases of the dev lifecycle and across all the landscapes your containers run. Address Website Products/Services Offered
| IC24 |
vThreat
vThreat simulates attacker techniques, tactics, and procedures to help organizations improve cyber readiness. Address Website | IC26 |
whiteCryption
whiteCryption is a leading provider of software code protection and white-box cryptography products. whiteCryption supplies its patented technologies to the world's leading software, hardware, and content companies in the Entertainment, Automotive and Finance Industry. Address Website Products/Services Offered
| IC8 |
x.o.ware
We're encrypting the net. Address Website Products/Services Offered
| IC39 |
Ziften Technologies
Ziften provides continuous endpoint intelligence that yields unprecedented operational insight and enables organizations to efficiently prevent security exposures and respond to advanced threats. Ziften combines real-time user, device and threat behavior monitoring, analytics and reporting that delivers meaningful information to pinpoint issues, expedite investigations and take corrective action. Address Website Products/Services Offered
| IC31 |
Company | Booth |
---|---|
Becrypt Inc.
Becrypt has a long heritage of providing enterprise data protection solutions to security conscious organizations. We believe organizations can unleash business value with effective use of mobile technology, recognizing that evolving cyber attacks drive the need for better cyber security practice. We innovate to deliver independently assured products and support. Address Website Products/Services Offered
| |
CDNetworks
CDNetworks’ global content delivery network, not only accelerates web application performance, but also absorbs DDoS attack traffic and blocks layer 7 attacks with an integrated WAF. With Cloud Security, malicious traffic is filtered and quarantined while legitimate traffic continues to flow, reducing the impact on end-users and revenue. http://www.cdnetworks.com/products/cloud-security/ Address Website Products/Services Offered
| IP29 |
CREST
CREST exists as a response to an evolving cyber security market that lacks technical standards or regulation. It is a not for profit organization that serves the needs of the technical cyber security sector through the accreditation of technical cyber security service providers and the professional certification of individuals. Address Website | IP16 |
Digital Shadows
Digital Shadows provides cyber situational awareness that helps organizations protect against cyber attacks, loss of intellectual property and brand and reputational integrity. Its flagship solution is a data analysis platform that provides a holistic view of an organization’s digital footprint and the profile of its attackers. Address Website Products/Services Offered
| IP25 |
enSilo
enSilo offers a real-time targeted attack exfiltration prevention platform which accurately distinguishes legitimate connections from malicious ones from the moment a connection is established. enSilo’s solution provides virtual patching against advanced targeted threats, enabling employees to keep working as usual while a device compromise is being resolved. Address Website Products/Services Offered
| IP23 |
INSIDE Secure
INSIDE Secure protects transactions, content, and communications. We deliver solutions combining hardware, software and IP meeting evolving security requirements for mobile and IoT. Our expertise positions us to provide solutions for Payment and mobile banking, Content protection and entertainment, Enterprise and secure access and Secure IoT and brand protection technologies. Address Website Products/Services Offered
| IP26 |
Interface Masters Technologies
Interface Masters Technologies leads the network monitoring market, providing 1G, 10G, 40G and 100G include Network Packet Brokers, Network TAP, and Bypass switches that provide network visibility and uptime to inline and out-of-band monitoring systems, networking appliances and other mission-critical IT and security appliances. Address Website Products/Services Offered
| IP17 |
NetSuite
NetSuite is the world's leading provider of cloud-based business management software. NetSuite helps companies manage core business processes with a single, fully integrated system covering ERP/financials, CRM, ecommerce, inventory and more Address Website | IP15 |
Nubo Software
Nubo Software is a pioneer and leading company that develops and provides Virtual Mobile Infrastructure (VMI) solutions for enterprise mobility. Nubo Software has created one, secured remote virtual workspace that is tailor-made for today’s mobile workforce. Nubo’s innovative approach to mobile security stores zero data on personal devices while providing users with a native app experience and the freedom to choose their own applications. Address Website | IP18 |
Company | Booth |
---|---|
780th MI Cyber Brigade
The 780th Military Intelligence Brigade, the Army’s first high-tech cyber start-up, is searching for the best and brightest civilian cyber talent. The unit, comprised of civilian and military professionals, adds new capabilities and capacities to the US arsenal for operations in the cyber war fighting domain. Address Website | CZ9 |
Accenture
Address Website | CZ14 |
Blizzard Entertainment, Inc.
Best known for World of Warcraft and the Warcraft, StarCraft, and Diablo franchises, Blizzard Entertainment is a premier developer and publisher of entertainment software renowned for creating some of the most popular games of all time. Its recent releases include Hearthstone: Heroes of Warcraft and Heroes of the Storm. Address Website Products/Services Offered
| CZ3 |
Blue Canopy Group
Address Website | CZ7 |
Capitol Technology University
Capitol Technology University is a regionally accredited institution which offers a DSc in Cybersecurity, a PhD in Management and Decision Sciences and seven online master's degree programs: MBA, Astronautical Engineering, Computer Science, Electrical Engineering, Internet Engineering, Cyber and Information Security, and Information Systems Management. Address | CZ5 |
Center For Identity
The Master of Science in Identity Management and Security (MSIMS), offered by the University of Texas at Austin’s School of Information and the Center for Identity, is designed to educate a new generation of professionals with the skills they’ll need to become effective stewards of Personally Identifiable Information. Address Website | CZ11 |
Credit Karma
Credit Karma is recreating the financial industry around people. With over 40 million members, Credit Karma is on its way to becoming the place online where people in the U.S. manage their financial identities. Address Website Products/Services Offered
| CZ12 |
Fastly, Inc.
Fastly is the only CDN that offers complete control over how businesses serve content, unprecedented access to real-time performance analytics, and the ability to cache frequently changing content at the edge. Our customers include Twitter, WIRED, Target, and Stripe. Help us build a better internet: www.fastly.com/about/careers. Address Website | CZ13 |
ManTech International
ManTech is a leading provider of innovative technology services and solutions. Our employees solve complex problems for the nation's defense, security, space, and intelligence communities in alignment with our customers’ mission objectives. We offer you challenging and rewarding work, generous benefits, and a commitment to help you grow professionally. Address Website | CZ6 |
Optiv Security
Accuvant and FishNet Security, which will begin conducting business as Optiv Security in 2015, recently merged to become one of North America’s leading information security services and solutions providers. The combined company offers a full suite of services and solutions that enable businesses, governments and educational institutions to define their security strategies, identify and remediate threats and risks, select and deploy the right technology, and achieve operational readiness to protect their organizations from malicious attack. For more information, please visit www.accuvant.com or www.fishnetsecurity.com. Address | CZ8 |
PricewaterhouseCoopers
PwC's Cybersecurity & Privacy team consists of highly trained and specialized consultants and industry veterans with experience helping global businesses across industries assess, design, deploy and operate cybersecurity programs. We provide a comprehensive range of integrated services that help clients protect the assets most critical to your shareholder value. Address Website Products/Services Offered
| CZ4 |
Snapchat
Snapchat is a fast, fun, ephemeral storytelling platform. Millions of people use Snapchat every day to stay in touch with family and friends, and to express themselves using creative tools that make sharing moments more personal. Address Website Products/Services Offered
| CZ1 |
Company | Booth |
---|---|
Microsoft Corporation
Microsoft (Nasdaq "MSFT") is the worldwide leader in software, services, and solutions that help people and businesses realize their full potential. Microsoft remains dedicated to software security and privacy and continues to collaborate with the community of people and technology organizations helping to protect customers and the broader ecosystem. Address Website Products/Services Offered
| 427 |
Company | Booth |
---|---|
Stroz Friedberg
Incident Response, Digital Forensics, and Security Science experts at Stroz Friedberg help organizations defend, respond and advance with certainty. When clients turn to us to assess risks and secure networks, conduct forensic investigations, or counter data breaches, our risk management approach is to SEEK TRUTH that delivers answers and assurance. Address Website |
Company | Booth |
---|---|
Bessemer Venture Partners
Address Website | BMR317 |
Blue Coat Systems, Inc.
Blue Coat is a leader in enterprise security, providing on-premise, hybrid and cloud-based solutions for protecting web connectivity, combating advanced threats and responding to security breaches. Blue Coat is the global market leader in securing connection to the web and counts nearly 80 percent of the Global Fortune 500 as its customers. Address Website | BMR213 |
FireEye
FireEye protects the most valuable assets in the world from those who have them in their sights. Our combination of technology, intelligence, and expertise combined with the most aggressive “boots on the ground” helps eliminate the impact of security breaches. We find and stop attackers at every stage of an incursion. With FireEye, you’ll detect attacks as they happen. You’ll understand the risk these attacks pose to your most valued assets. And you’ll have the resources to quickly respond and resolve security incidents. The FireEye Global Defense Community includes more than 2,200 customers across more than 60 countries, including more than 130 companies in the Fortune 500. Address Website | BMR221 BMR323 |
HEAT Software
HEAT Software is a leading provider of Unified Endpoint Management (UEM) software solutions for organizations of all sizes. Within our UEM platform HEAT offers Lumension Endpoint Protection and malware prevention. Address Website Products/Services Offered
| BMR318 |
Nike
NIKE, Inc. is the world's leading designer, marketer and distributor of authentic athletic footwear, apparel, equipment and accessories for a wide variety of sports and fitness activities. Nike Technology designs, creates and implements technologies, methods and tools to make the world’s largest sport brand run faster, smarter and more securely. Address Website | BMR316 |
ObserveIT
ObserveIT is the world’s leading provider of user activity monitoring. Founded in 2006, the company has grown exponentially in the past eight years (3500% in past five years).ObserveIT provides user-centric security solutions to more than 1,200 customers in over 70 countries. Address Website Products/Services Offered
| BMR320 |
OpenDNS
OpenDNS provides a cloud-delivered network security service that blocks advanced attacks, as well as malware, botnets and phishing threats regardless of port, protocol or application. Our predictive intelligence uses machine learning to automate protection against emergent threats before your organization is attacked. OpenDNS covers devices worldwide on or off the network in minutes with no hardware to install, software to maintain, and no admin intervention required. opendns.com Address Website | BMR321 |
Pwnie Express
Pwnie Express is the leading provider of network security assessment solutions for remote locations and wireless. Enterprises and government organizations worldwide rely on Pwnie Express’s products for asset discovery, vulnerability assessment, and drop-box penetration testing and obtain insight into their distributed network infrastructure. Pwnie Express devices leverage open source tools. Address Website | BMR217 |
RedVector
RedVector is a brand of Glimmerglass Cyber Solutions dedicated to Enterprise network security. Using network metadata, RedVector provides full visibility of months of traffic with substantially less storage cost and network complexity. RedVector listens to everything that traverses your network and discovers advanced persistent threats targeting Enterprise and Government organizations. Address Website Products/Services Offered
| BMR312 |
Company | Booth |
---|---|
ISC2
(ISC)² is the largest not-for-profit membership body of certified information and software security professionals worldwide, with nearly 110,000 members. (ISC)² issues the CAPÒ, CCFPÒ, CCSPSM, CISSPÒ and related concentrations, CSSLPÒ, HCISPPSM, and SSCPÒ credentials to qualifying candidates. (ISC)² offers education programs and services based on its CBK®. Visit www.isc2.org. Address Website Products/Services Offered
| BHB2 |
CIAS/NCCDC
Panoply is a hack and defend competition combined into a single event. Returning for the third year, Panoply is the official competition presented by Black Hat USA and the National Collegiate Cyber Defense Competition. For more information visit: http://nccdc.org and http://cyberpanoply.com Address Website | BHB10 |
Cloud Security Alliance
The Cloud Security Alliance is a not-for-profit organization with a mission to promote best practices and industry-wide education on security assurance within Cloud Computing. Led by industry practitioners, corporations and consumers, CSA serves as an incubator for international cloud standards and is the go-to source for cloud security research and tools. Address | BHB3 |
Electronic Frontier Foundation (EFF)
The Electronic Frontier Foundation (EFF) is the leading nonprofit organization defending civil liberties in the digital world. Founded in 1990, EFF champions user privacy and free expression online through a strategic combination of impact litigation, policy analysis, education, and grassroots activism. We empower tinkerers, creators, coders, and consumers to reclaim freedom as our use of technology grows. Address Website Products/Services Offered
| BHB8 |
Executive Women's Forum
The Executive Women's Forum (EWF) is a prominent community of over 1000 of the nation's most influential female executives within the Information Security, Privacy, and Risk Management industries. The EWF community is a home base for women to grow their professional skills, build important networks and gather industry business intelligence. Address | BHB5 |
IEEE Computer Society
IEEE Computer Society is the world's leading membership organization for computer science and technology. Serving over 60,000 members, the IEEE Computer Society is the trusted information, networking, and career-development source for a global community of technology leaders that includes researchers, educators, software engineers, IT professionals, employers, and students. Address Website Products/Services Offered
| BHB7 |
ISSA International
The Information Systems Security Association (ISSA) is dedicated to developing and connecting cybersecurity leaders globally. ISSA is the community of choice for more than 11,000 international cybersecurity professionals, dedicated to advancing individual growth, managing technology risk, and protecting critical information and infrastructure. ISSA facilitates interaction and education to create an advance environment for global information systems security and for the professionals involved. Members include practitioners at all levels of the security field in a broad range of industries such as communications, education, healthcare, manufacturing, financial, and government. Join ISSA at www.issa.org. Address Website | BHB6 |
National Center for Women & Information Technology
The National Center for Women & Information Technology (NCWIT) is a non-profit community of more than 650 universities, companies, non-profits, and government organizations nationwide working to increase women’s participation in computing and technology. NCWIT equips change leaders with resources for taking action in recruiting, retaining, and advancing women from K–12 and higher education through industry and entrepreneurial careers. Find out more at www.ncwit.org. Address Website | BHB4 |
OWASP
The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. For more information, please visit www.owasp.org. Address Website | BHB9 |
Women's Society of Cyberjutsu
The Women’s Society of Cyberjutsu (WSC) is a one of the fastest growing nonprofits dedicated to women in cybersecurity. The primary mission is to advance women in cybersecurity by providing programs and partnerships that promote networking, education, mentoring, resource-sharing, and opportunities. WSC provides women with the resources and support required to enter and advance as a cybersecurity professional using a holistic approach to develop programs that train women in both the hard technical skills and soft skills - leaving her feeling empowered to succeed. WSC also helps build the pipeline by training girls in technology and cybersecurity via Cyberjutsu Girls Academy. Address Website | BHB1 |
Company | Booth |
---|---|
Dark Reading
Dark Reading is the most trusted online community for security professionals like you. Our community members include thought-leading security researchers, CISOs, and technology specialists, along with thousands of other security professionals. This is where enterprise security staffers and decision-makers come to learn about new cyber threats, vulnerabilities, and technology trends. Address Website |
Company | Booth |
---|---|
ISC2 (ISC)² is the largest not-for-profit membership body of certified information and software security professionals worldwide, with nearly 110,000 members. (ISC)² issues the CAPÒ, CCFPÒ, CCSPSM, CISSPÒ and related concentrations, CSSLPÒ, HCISPPSM, and SSCPÒ credentials to qualifying candidates. (ISC)² offers education programs and services based on its CBK®. Visit www.isc2.org. Address Website Products/Services Offered
|
BHB2 |
780th MI Cyber Brigade The 780th Military Intelligence Brigade, the Army’s first high-tech cyber start-up, is searching for the best and brightest civilian cyber talent. The unit, comprised of civilian and military professionals, adds new capabilities and capacities to the US arsenal for operations in the cyber war fighting domain. Address Website |
CZ9 |
A10 Networks A10 Networks is a leader in application networking and security, providing a range of high-performance solutions that help organizations ensure their applications are highly available, accelerated and secure. A10 Thunder Application Delivery Controller (ADC) optimizes application performance, protects data center assets from attack, and provides visibility into encrypted traffic with SSL Insight technology. A10 Thunder Threat Protection System (TPS) provides network-wide protection against distributed denial of service (DDoS) attacks and mitigates volumetric, protocol, resource, and sophisticated application attacks. Our Advanced Core Operating System (ACOS®) platform is designed to deliver substantially greater performance and security relative to prior generation application networking products. A10 Networks is based in San Jose, Calif., and serves customers globally with offices worldwide http://www.a10networks.com. Address Website Products/Services Offered
|
1135 |
Accenture Address Website |
CZ14 |
Adallom Adallom delivers visibility, governance and protection for the top SaaS applications used by businesses worldwide, including GoogleApps, Office 365 and Salesforce. Founded in 2012 by Israeli Intelligence alumni, our cloud application security platform extends the boundaries of enterprise security into the cloud. You will be able to gain actionable intelligence into cloud application usage, secure corporate data and detect suspicious activities, without requiring any agent in your datacenter or endpoint. Powered by the Adallom SmartEngineTM advanced heuristics technology, and backed by Adallom Labs, our elite cybersecurity research team, we are the ONLY cloud security provider that has protected businesses from real-world attacks. Address Website Products/Services Offered
|
947 |
Agiliance Agiliance is the leading independent provider of integrated solutions for Operational and Security Risk Intelligence. Agiliance is automating how Global 2000 companies and government agencies continuously monitor big data for risks across financial, operations, and IT domains to increase operational efficiency and orchestrate incident, threat, and vulnerability actions in real time. The company’s Cyber Security Operational Risk Intelligence solution gathers data feeds from otherwise silo-based security and IT tools such as SIEMs, configuration management databases, vulnerability scanners, threat data feeds and advisory services, database security management, etc. It then aggregates, normalizes, and correlates the information with business criticality. This enables a near real time snap shot of an organization’s security posture and then triggers appropriate remediation actions. By leveraging Agiliance’s Cyber Security Operational Risk Intelligence solution, organizations can minimize the risk of cyber-attacks in today's dynamic threat landscape. For more information, visit www.agiliance.com. Address Website Products/Services Offered
|
767 |
Akamai Technologies Akamai® is the leading provider of cloud services for delivering, optimizing and securing online content and business applications. At the core of the Company’s solutions is the Akamai Intelligent Platform™ providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit www.akamai.com or blogs.akamai.com, and follow @Akamai on Twitter. Address Website Products/Services Offered
|
466 |
Alert Logic Inc. ABOUT ALERT LOGIC Alert Logic, the leader in security and compliance solutions for the cloud, provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure resides. Alert Logic partners with the leading cloud platforms and hosting providers to protect over 3,000 organizations worldwide. Built for cloud scale, our patented platform stores petabytes of data, analyses over 450 million events and identifies over 60,000 security incidents each month, which are managed by our 24x7 Security Operations Center. Alert Logic, founded in 2002, is headquartered in Houston, Texas, with offices in Seattle, Cardiff and London. Address Website Products/Services Offered
|
1065 |
AlienVault AlienVault’s mission is to enable organizations with limited resources to accelerate and simplify their ability to detect and respond to the growing landscape of cyber threats. Our Unified Security Management (USM) platform provides all of the essential security controls required for complete security visibility, and is designed to enable any IT or security practitioner to benefit from results on day one. Powered by threat intelligence from AlienVault Labs and the AlienVault Open Threat Exchange—the world’s largest crowd-sourced threat intelligence network — AlienVault USM delivers a unified, simple and affordable solution for threat detection, incident response and compliance management. AlienVault is a privately held company headquartered in Silicon Valley and backed by Trident Capital, Kleiner Perkins Caufield & Byers, GGV Capital, Intel Capital, Sigma West, Adara Venture Partners, Top Tier Capital and Correlation Ventures. Address Website Products/Services Offered
|
619 |
Appthority Appthority is the global leader in mobile application risk assessment and management for the enterprise. The Appthority solution automates the scanning and analysis of mobile apps installed by employees on both personal and company devices. Ranked as the number one mobile application security solution by Gartner, Appthority has analyzed over three million apps for its Global 2000 and government customers. By continually evaluating mobile app risk across all company employees and devices, and providing the ability to set security policy enforcement rules to reduce that risk, Appthority gives enterprise security and mobility teams peace of mind. Appthority enables companies to leverage mobility and empower a smarter, safer, mobile workforce. More information on Appthority can be found at https://www.appthority.com Address Website |
1223 |
Arbor Networks Arbor Networks, Inc. helps secure the world’s largest enterprise and provider networks from DDoS and advanced targeted attacks. Arbor believes security solutions today must be coordinated to mitigate attacks before they reach a customer’s network whenever possible, and then quickly identify and stop threats once they have made it past an increasingly porous perimeter. We have leveraged our unique customer footprint and experience working with the world’s most demanding network operators to develop a more enduring solution for the threats of today and tomorrow. Arbor does this not by focusing on specific threats or points in the network but on networks themselves. No matter how much the threats and attackers have changed, security still comes down to understanding networks. Arbor’s goal is to provide a richer picture into networks and more security context—so customers can solve problems faster and help reduce the risk to their business. We strive to be a force multiplier, bringing context to massive amounts of data, making network and security teams the experts. Address Website Products/Services Offered
|
552 |
Area 1 Security Area 1 Security provides the first ever anti phishing platform turning the tables on attackers by accurately identifying, in the wild, the delivery mechanisms of attackers. Address Website |
IC21 |
Arxan Technologies Arxan provides the world’s strongest application protection solutions. Our unique patented guarding technology 1. Defends applications against attacks 2. Detects when an attack is being attempted, and 3. Responds to detected attacks with alerts and repairs. Arxan offers solutions for software running on mobile devices, desktops, servers, and embedded platforms – including those connected as part of the Internet of Things (IOT) – and is currently protecting applications running on more than 300 million devices across a range of industries. Address Website Products/Services Offered
|
1236 |
Authentify Inc Authentify delivers user-centric multi-factor authentication services, SaaS, employing smart phones, tablets, laptops or "just" plain old telephones for out-of-band authentication. An Enterprise may choose multiple authentication factors including soft-token, digital certificates, voice biometrics, shared secrets and others minus the overhead associated with MFA. Broad support for all types of telephone technology ensures authentication workflows in which no end user is left behind. To learn more about how Authentify is defending against cybercrime, please visit www.authentify.com, and follow @Authentify on Twitter. Address Website |
264 266 |
Avecto Avecto is an innovative technology business specializing in endpoint security. The company’s revolutionary Defendpoint software ensures security defense in depth while empowering users to work freely. This mantra of security + freedom underpins Avecto’s philosophy to unite IT departments and their end users. Avecto’s experience is proven, with implementations of over 5 million endpoints at many of the world’s most recognizable brands, from the largest banks and most highly regulated government organizations to multichannel retailers and F1 teams. Attention to detail is paramount, with a team of qualified and experienced technology consultants on hand to guide clients through a robust implementation methodology. This consultative approach provides clients with a clearly mapped journey against measurable objectives to ensure project success. Avecto has placed in the top 4 of the Deloitte Fast 50 for the last two consecutive years, making it one of the UK’s fastest growing software companies, winning global accolades for quality and innovation. Address Website Products/Services Offered
|
459 |
BAE Systems Applied Intelligence BAE Systems Applied Intelligence delivers solutions that help clients to protect and enhance their critical assets. Our intelligent protection solutions combine large-scale data exploitation, ‘intelligence-grade’ security and complex services and solutions integration. We operate in four key domains of expertise: cyber security, financial crime, communications intelligence and digital transformation. Address Website Products/Services Offered
|
|
BalaBit BalaBit, best known its syslog-ng open source log management solution with more than one million users, is a leading developer of advanced monitoring and log management solutions that help protect organizations against internal and external threats. BalaBit, headquartered in Luxembourg, has local offices in France, Germany, Russia, the UK and the USA. Our 200+ employees serve customers across the globe, including 23 of the Fortune 100, through more than 80 partners in more than 40 countries. Our R&D and global support centers are located in Hungary. Address Website Products/Services Offered
|
566 |
Bay Dynamics Bay Dynamics is the market leader in providing cybersecurity solutions to protect organizations around the world from evolving security threats and to reduce their business risk with its innovative next generation machine learning and predictive analytics technology. For more information, visit www.baydynamics.com. Address |
666 |
Becrypt Inc. Becrypt has a long heritage of providing enterprise data protection solutions to security conscious organizations. We believe organizations can unleash business value with effective use of mobile technology, recognizing that evolving cyber attacks drive the need for better cyber security practice. We innovate to deliver independently assured products and support. Address Website Products/Services Offered
|
|
Bessemer Venture Partners Address Website |
BMR317 |
BeyondTrust BeyondTrust is a global cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks. Corporate and government organizations rely on BeyondTrust solutions to shrink attack surfaces and identify imminent threats. The company's integrated risk intelligence platform presents a unique competitive advantage in its ability to reveal critical risks hidden within volumes of user and system data. This unifies IT and Security departments, empowering them with the information and control they need to jointly prevent breaches, maintain compliance, and ensure business continuity. Over 4,000 customers worldwide trust BeyondTrust's Privileged Account Management and Vulnerability Management solutions to: ?Identify system vulnerabilities and prioritize remediation ?Securely store, rotate and manage privileged account passwords ?Enforce least-privilege policies and ensure administrator accountability ?Provide single sign-on and centralized access control for hybrid IT environments ?Audit, alert and rollback changes in business-critical applications ?Conduct threat analysis to reveal previously overlooked security risks To learn more about BeyondTrust, please visit www.beyondtrust.com. Address Website Products/Services Offered
|
441 |
Bit9 + Carbon Black Bit9 + Carbon Black provides the most complete solution against advanced threats that target organizations’ endpoints and servers, making it easier to see—and immediately stop—those threats. The company enables organizations to arm their endpoints by combining continuous, real-time visibility into what’s happening on every computer; real-time signature-less threat detection; incident response that combines a recorded history with live remediation; and prevention that is proactive and customizable. More than 1,000 organizations worldwide—from Fortune 100 companies to small enterprises—use Bit9 + Carbon Black to increase security, reduce operational costs and improve compliance. Leading managed security service providers (MSSP) and incident response (IR) companies have made Bit9 + Carbon Black a core component of their detection and response services. Address Website Products/Services Offered
|
735 |
Blizzard Entertainment, Inc. Best known for World of Warcraft and the Warcraft, StarCraft, and Diablo franchises, Blizzard Entertainment is a premier developer and publisher of entertainment software renowned for creating some of the most popular games of all time. Its recent releases include Hearthstone: Heroes of Warcraft and Heroes of the Storm. Address Website Products/Services Offered
|
CZ3 |
Blue Canopy Group Address Website |
CZ7 |
Blue Coat Systems, Inc. Blue Coat is a leader in enterprise security, providing on-premise, hybrid and cloud-based solutions for protecting web connectivity, combating advanced threats and responding to security breaches. Blue Coat is the global market leader in securing connection to the web and counts nearly 80 percent of the Global Fortune 500 as its customers. Address Website |
235 |
Blue Coat Systems, Inc. Blue Coat is a leader in enterprise security, providing on-premise, hybrid and cloud-based solutions for protecting web connectivity, combating advanced threats and responding to security breaches. Blue Coat is the global market leader in securing connection to the web and counts nearly 80 percent of the Global Fortune 500 as its customers. Address Website |
BMR213 |
Bluebox Security Founded in 2012 by a team of security experts, Bluebox Security provides the leading mobile app security and management solution. Pairing deep mobile security expertise with dynamic app management, Bluebox ensures that enterprise security moves at the speed of mobile. The cloud-based solution helps enterprises securely enable mobile by protecting apps, detecting threats and responding quickly to keep data secure. Bluebox Security has received a total of $27.5 million in funding from Andreessen Horowitz, Tenaya Capital, Sun Microsystems co-founder, Andreas Bechtolsheim, SV Angel, and Google Board member Ram Shriram. The company is headquartered in San Francisco. Address Website Products/Services Offered
|
965 |
Booz Allen Hamilton Booz Allen Hamilton is a leading provider of management consulting, technology, and engineering services to the US government in defense, intelligence, and civil markets, and to major corporations and not-for-profit organizations. Booz Allen is headquartered in McLean, Virginia, employs nearly 23,000 people, and had revenue of $5.48 billion for the 12 months ended March 31, 2014. In 2014, Booz Allen celebrates its 100th anniversary year. To learn more, visit www.boozallen.com. (NYSE: BAH) Address Website Products/Services Offered
|
130 |
Booz Allen Hamilton Booz Allen Hamilton is a leading provider of management consulting, technology, and engineering services to the US government in defense, intelligence, and civil markets, and to major corporations and not-for-profit organizations. Booz Allen is headquartered in McLean, Virginia, employs nearly 23,000 people, and had revenue of $5.48 billion for the 12 months ended March 31, 2014. In 2014, Booz Allen celebrates its 100th anniversary year. To learn more, visit www.boozallen.com. (NYSE: BAH) Address |
|
Bricata Bricata is pioneering the Next Generation of Intrusion Prevention Systems with innovative, high-throughput security and data protection solutions. Our ProAccel™ line enables enterprises of all sizes to safeguard their networks and ensure timely and actionable threat detection with full packet capture for complete contextual awareness of security incidents. Address Website Products/Services Offered
|
IC14 |
BrightPoint Security BrightPoint Security delivers actionable threat intelligence by reducing the noise inherent in threat data and enabling secure and controlled information sharing without attribution. The automated curation and correlation of threat data from external sources, behind your perimeter defenses, enables you to identify relevant threats in minutes instead of months. Address Website Products/Services Offered
|
IC16 |
Bromium Bromium has transformed endpoint security with its revolutionary isolation technology to defeat cyber attacks. Unlike antivirus or other detection-based defenses, which can’t stop modern attacks, Bromium uses micro-virtualization to hardware isolate every user task—such as opening a webpage or PDF—in a micro-VM, keeping users secure while streamlining IT. Bromium improves the resilience of enterprise endpoints, substantially reduces investment in security, and boosts operational efficiency. Our breakthrough micro-virtualization technology vastly reduces and even eliminates compromises on endpoints, false alerts, urgent patching, and costly remediation. We reduce management overhead, enable security teams to focus on strategic tasks rather than deflecting threats, and empower users to be more productive. Address Website Products/Services Offered
|
1019 |
Capitol Technology University Capitol Technology University is a regionally accredited institution which offers a DSc in Cybersecurity, a PhD in Management and Decision Sciences and seven online master's degree programs: MBA, Astronautical Engineering, Computer Science, Electrical Engineering, Internet Engineering, Cyber and Information Security, and Information Systems Management. Address |
CZ5 |
CDNetworks CDNetworks’ global content delivery network, not only accelerates web application performance, but also absorbs DDoS attack traffic and blocks layer 7 attacks with an integrated WAF. With Cloud Security, malicious traffic is filtered and quarantined while legitimate traffic continues to flow, reducing the impact on end-users and revenue. http://www.cdnetworks.com/products/cloud-security/ Address Website Products/Services Offered
|
IP29 |
Center For Identity The Master of Science in Identity Management and Security (MSIMS), offered by the University of Texas at Austin’s School of Information and the Center for Identity, is designed to educate a new generation of professionals with the skills they’ll need to become effective stewards of Personally Identifiable Information. Address Website |
CZ11 |
Checkmarx Checkmarx (www.checkmarx.com ) is a leading developer of software solutions used to identify, fix and block security vulnerabilities in web and mobile applications. The company's customers include 4 of the world's top 10 software vendors and many Fortune 500 and government organizations, including Samsung, Salesforce.com, Coca Cola and the US Army. Checkmarx offers a suite of application security solutions from code development to live production: ?Static Application Security Testing (SAST) - Identify and fix security vulnerabilities in the source code, at the early stages of the application development. The solution enables full automation by integration into the Software Development Lifecycle (SDLC). ?Runtime Application Self Protection (RASP) - Block attacks in real time. ?Secure Coding Education - Hands on secure coding training based on gamification, using your own code base and real life security vulnerabilities. Address Website Products/Services Offered
|
259 |
CIAS/NCCDC Panoply is a hack and defend competition combined into a single event. Returning for the third year, Panoply is the official competition presented by Black Hat USA and the National Collegiate Cyber Defense Competition. For more information visit: http://nccdc.org and http://cyberpanoply.com Address Website |
BHB10 |
Cigital Cigital is one of the world’s largest application security firms. We go beyond traditional testing services to help organizations find, fix and prevent vulnerabilities in the applications that power their business. Our holistic approach to application security offers a balance of managed services, professional services and products tailored to fit your specific needs. We don't stop when the test is over. Our experts also provide remediation guidance, program design services, and training that empower you to build and maintain secure applications. Our proactive methods helps clients reduce costs, speed time to market, improve agility to respond to changing business pressures and threats, and focus resources where they are needed most. Address Website Products/Services Offered
|
1131 |
CipherCloud CipherCloud, the leader in cloud information protection, enables organizations to securely adopt cloud applications by overcoming data privacy, residency, security, and regulatory compliance risks. CipherCloud delivers an open platform with comprehensive security controls, including AES 256-bit encryption, tokenization, cloud data loss prevention, cloud malware detection and activity monitoring. CipherCloud's ground breaking technology protects sensitive information in real time, before it is sent to the cloud, while preserving application usability and functionality. CipherCloud has experienced exceptional growth and success with over 2 million business users, more than 250 million customer records, in over 10 industries, and with marquee customers around the globe. CipherCloud, named as SC Magazine's 2013 Best Product of the Year, is backed by premier venture capital firms Andreessen Horowitz, Index Ventures, and T-Venture, the venture capital arm of Deutsche Telekom. For more information, visit www.ciphercloud.com and follow us on Twitter @ciphercloud. Address Website Products/Services Offered
|
766 |
Cisco Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. Cisco delivers intelligent cybersecurity for the real world, providing one of the industry's most comprehensive advanced threat protection portfolio of solutions across the broadest set of attack vectors. Cisco's threat–centric and operationalized approach to security reduces complexity while providing unmatched visibility, consistent control, and advanced threat protection before, during, and after an attack. For more information visit: cisco.com/go/security. Address Website |
227 |
Citrix Citrix is leading the transition to software-defining the workplace, uniting virtualization, mobility management, networking and SaaS solutions. Citrix solutions power business mobility through secure, mobile workspaces that provide people with instant access to apps, desktops, data and communications on any device, over any network and cloud. Visit www.citrix.com. Address Website Products/Services Offered
|
858 |
Click Security Click Security’s next generation security investigation solution enables customers to rapidly identify, investigate and respond to cyber threats and breaches. Our solution force multiplies today’s stretched security teams by automatically converting millions of alerts into high-risk actors, streamlining investigative efforts, and converting findings into new continuous protection. Dangerous adversaries will get in. Click Security narrows the enterprise risk gap by finding and responding to their kill chain activity before it’s too late. Address Website Products/Services Offered
|
1211 |
Cloud Security Alliance The Cloud Security Alliance is a not-for-profit organization with a mission to promote best practices and industry-wide education on security assurance within Cloud Computing. Led by industry practitioners, corporations and consumers, CSA serves as an incubator for international cloud standards and is the go-to source for cloud security research and tools. Address |
BHB3 |
Cloudera Cloudera is revolutionizing enterprise data management with the first unified Platform for Big Data, an enterprise data hub built on Apache Hadoop™. Cloudera offers enterprises one place to store, process and analyze all their data, empowering them to extend the value of existing investments while enabling fundamental new ways to derive value from their data. Founded in 2008, Cloudera was the first and still is the leading provider and supporter of Hadoop for the enterprise. Cloudera also offers software for business critical data challenges including storage, access, management, analysis, security and search. Cloudera works with over 1,400 hardware, software and services partners to meet customers' big data goals. Address Website |
467 |
CloudLock CloudLock offers the cloud security fabric enabling enterprises to protect their data in the cloud, reduce risk, achieve compliance, manage threats and increase productivity by monitoring more than 750 million files for more than 6 million end users daily. Address Website Products/Services Offered
|
IC15 |
CloudPassage CloudPassage Halo® is the world’s leading agile security platform that empowers our customers to take full advantage of cloud infrastructure with the confidence that their critical business assets are protected. Halo delivers a comprehensive set of continuous security and compliance functions right where it counts -- at the workload. Our platform orchestrates security on-demand, at any scale and works in any cloud or virtual infrastructure (private, public, hybrid or virtual data center). Leading enterprises like Citrix, Salesforce.com and Adobe use CloudPassage today to enhance their security and compliance posture, while at the same time enabling business agility. Headquartered in San Francisco, CA, CloudPassage is backed by Benchmark Capital, Meritech Capital Partners, Tenaya Capital, Shasta Ventures, Musea Ventures and other leading investors. For more information, visit cloudpassage.com. Address Website Products/Services Offered
|
366 |
Cobalt Strike Cobalt Strike executes targeted attacks and replicates advanced threat actors. Government, military, and commercial red teams use Cobalt Strike to assess security operations and train incident responders. http://www.advancedpentest.com/ Address Website Products/Services Offered
|
IC22 |
Code42 Code42 connects people to the files they need on the devices they love, enabling continuous data protection and secure access for people and businesses everywhere. Our data governance platform—serving more than 35,000 businesses and protecting millions of consumer devices—delivers industry-leading CrashPlan endpoint backup and SharePlan enterprise file sync/share. Address Website Products/Services Offered
|
164 |
Codenomicon Codenomicon by Synopsys is a global leader in providing cybersecurity solutions to organizations that develop, deploy, and defend critical software, services, and infrastructure. By enabling organizations to detect and mitigate vulnerabilities and cyber threats, Codenomicon empowers customers and partners to build a more resilient world. Codenomicon’s suite of security solutions include automated testing tools for proactive vulnerability management and an advanced threat intelligence platform to detect and prioritize malicious cyber-attacks in real time. Founded in 2001, Codenomicon was spun out of the PROTOS test tools research of the Oulu University Secure Programming Group. Since then, Codenomicon’s solutions have been used to detect and address widespread, critical vulnerabilities such as Heartbleed. Codenomicon works with hundreds of customers across a wide range of industries, including telecommunications, finance, healthcare, industrial control systems, automotive, and government. Address Website |
664 |
Contrast Security, Inc. Contrast Security delivers the world’s fastest application security that eliminates the single greatest security risk to enterprises today. Within seven minutes, Contrast can be deployed, automatically discover applications & identify vulnerabilities. Relying on sensors instead of expensive experts, Contrast runs continuously & is 10 times more accurate than the competition. Address Website Products/Services Offered
|
IC4 |
Core Security Technologies Core Security provides the industry's first comprehensive attack intelligence platform offering advanced analytics to prioritize, validate and ultimately eliminate security threats. With Core Security, enterprises and security professionals focus on the most likely threats to their business by modeling, simulating and testing the actions of an actual attacker. Core Security helps more than 1,000 customers worldwide identify the most vulnerable areas of their IT environments in order to improve their remediation efforts and better secure their business. The company's patented, proven, award-winning enterprise products and solutions are backed by more than 15 years of applied expertise from CoreLabs research and Core Security Consulting Services. Address Website Products/Services Offered
|
627 |
CounterTack CounterTack is the leading provider of real-time, Big Data endpoint detection and response technology. CounterTack's Sentinel platform provides unprecedented visibility and context around endpoint behavior to targeted, persistent threats improving incident response and threat detection, enterprise-wide. Built on Big Data architecture to counter endpoint threats at-scale and leveraging tamper-resistant collection for pure behavioral capture on workstations and servers. Sentinel dramatically reduces the impact of advanced attacks in real-time, giving teams an opportunity to defend the enterprise before incidents escalate. Address Website Products/Services Offered
|
1147 |
Credit Karma Credit Karma is recreating the financial industry around people. With over 40 million members, Credit Karma is on its way to becoming the place online where people in the U.S. manage their financial identities. Address Website Products/Services Offered
|
CZ12 |
CREST CREST exists as a response to an evolving cyber security market that lacks technical standards or regulation. It is a not for profit organization that serves the needs of the technical cyber security sector through the accreditation of technical cyber security service providers and the professional certification of individuals. Address Website |
IP16 |
CrowdStrike CrowdStrike™ is a leading provider of next-generation endpoint protection, threat intelligence, and services. CrowdStrike Falcon enables customers to prevent damage from targeted attacks, detect and attribute advanced malware and adversary activity in real time, and effortlessly search all endpoints, reducing overall incident response time. CrowdStrike customers include some of the largest blue chip companies in the financial services, energy, oil & gas, telecommunications, retail, and technology sectors, along with some of the largest and most sophisticated government agencies worldwide. To learn more, please visit http://www.crowdstrike.com. Follow us: http://blog.crowdstrike.com/ Address Website Products/Services Offered
|
727 |
CSG Invotas CSG Invotas™ is an award-winning leader in security orchestration and automation for global security operations. CSG Invotas delivers an automated threat response solution to unify, orchestrate and automate key elements of incident response into a single console and gives enterprises the ability to respond at machine speed, reduce risk exposure and boost productivity. For more information, please visit invotas.csgi.com. Address Website Products/Services Offered
|
658 |
CyberArk CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world’s leading companies – including 40 of the Fortune 100 – to protect their highest value information assets, infrastructure and applications. CyberArk is a vital security partner to 1,800 global businesses, including 17 of the world’s top 20 banks. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, MA, CyberArk also has offices throughout EMEA and Asia-Pacific. To learn more about CyberArk, visit www.cyberark.com, read the company blog, http://www.cyberark.com/blog/, follow on Twitter @CyberArk or Facebook at https://www.facebook.com/CyberArk. Address Website |
134 |
Cybereason Cybereason delivers a proprietary technology platform that automatically uncovers malicious operations and reconstructs them as a clear image of a cyberattack in context. This vastly reduces “alert fatigue”, reduces time spent on manual investigation and enables enterprises to detect sophisticated targeted attacks at a very early stage. Address Website |
358 |
Cybersponse CyberSponse enables companies to defend and counter attackers through a unique, collaborative security operations platform that facilitates comprehensive incident response lifecycle management. Founded in 2011, CyberSponse is a leading provider of automated incident response (IR) solutions for cyber security threat management. Most security groups within organization’s today use Word, Excel, and internal email to manage their daily security operations. CyberSponse takes a different approach and believes that an automated and transparent view of SecOp efforts and true situational awareness for all levels of management is required for proactive management of the complexity of IT security. The CyberSponse technology platform dramatically improves the efficiency and the effectiveness of the daily SecOps team’s efforts against cyber-attacks by providing a centralized system for managing, monitoring, reporting, and analyzing an organizations entire IT security infrastructure and processes. Address Website |
864 |
Cylance Cylance is the first company to apply artificial intelligence, algorithmic science and machine learning to cyber security and improve the way companies, governments and end users proactively solve the world’s most difficult security problems. Using a breakthrough mathematical process, Cylance quickly and accurately identifies what is safe and what is a threat, not just what is in a blacklist or whitelist. By coupling sophisticated math and machine learning with a unique understanding of a hacker’s mentality, Cylance provides the technology and services to be truly predictive and preventive against advanced threats. Address Website |
958 |
Cymmetria Need to identify targeted attacks with near zero false-positives; drill-down to data on attackers' tools and techniques; then generate signatures to immunize against similar attacks? Cymmetria have developed a unique approach, the deception stack. Come and see how to build your own deception stack with Cymmetria Maze Runner. Address Website Products/Services Offered
|
IC32 |
Cyphort Cyphort is an innovative provider of Advanced Threat Protection solutions that deliver a complete defense against current and emerging Advanced Persistent Threats, targeted attacks and zero day vulnerabilities. The Cyphort Platform accurately detects and analyzes next generation malware, providing actionable, contextual intelligence that enables security teams to respond to attacks faster, more effectively, and in as surgical a manner as their attackers. Cyphort's software-based, distributed architecture offers a cost effective, high performance approach to detecting and protecting an organization’s virtual, physical and cloud infrastructure against sophisticated attacks. Malware detection for Windows, OSX and Linux allows businesses to extract maximum value from IT assets without compromising the security of an organization. Founded by experts in advanced threats from government intelligence agencies and premier network security companies, Cyphort is a privately held company headquartered in San Jose, California. For more information, please visit: www.cyphort.com. Address Website Products/Services Offered
|
759 |
Dark Reading Dark Reading is the most trusted online community for security professionals like you. Our community members include thought-leading security researchers, CISOs, and technology specialists, along with thousands of other security professionals. This is where enterprise security staffers and decision-makers come to learn about new cyber threats, vulnerabilities, and technology trends. Address Website |
|
Dark Reading with Veracode + Accenture Dark Reading: Dark Reading is the most trusted online community for security professionals like you. Our community members include thought-leading security researchers, CISOs, and technology specialists, along with thousands of other security professionals. This is where enterprise security staffers and decision-makers come to learn about new cyber threats, vulnerabilities, and technology trends. | Veracode: Veracode secures web and mobile applications for the world’s largest organizations. A Leader in the Gartner Magic Quadrant, Veracode offers a unified cloud-based platform for multiple assessment technologies (SAST, DAST, IAST, software composition analysis, mobile behavioral analysis, web perimeter monitoring) that is simpler and more scalable than traditional on-premises approaches. | Accenture: Accenture is a global management consulting, technology services and outsourcing company, with more than 336,000 people serving clients in more than 120 countries. Combining unparalleled experience, comprehensive capabilities across all industries and business functions, and extensive research on the world’s most successful companies, Accenture collaborates with clients to help them become high-performance businesses and governments. Address Website |
|
Dell SecureWorks Dell SecureWorks understands cyber security is a critical focus for organizations, and technology alone cannot address the risks posed by cyber threats. Recognized as an industry leader, we combine elite intelligence and trusted security expertise, helping organizations solve complex security challenges, strengthen their security postures and reduce risk in the face of a dynamic threat landscape. Intelligence practices developed by our security experts enable a security methodology, ensuring you see the threat, thwart cyber-attacks and recover faster from security breaches. For more information visit www.secureworks.com. Address |
635 |
Dell SonicWALL Dell® SonicWALL® products provide intelligent network security and data protection solutions that enable customers and partners to dynamically secure, control, and scale their global networks. Securing any organization with multi-threat scanning based on global input at wire speed, Dell SonicWALL is recognized as an industry leader by Gartner and NSS Labs. Dell network security solutions are dynamically updated with current threat protection. Reassembly-Free Deep Packet Inspection® and a multi-core parallel architecture assure optimal performance. Dell delivers firewall, secure remote access/SSL VPN, anti-spam/email security, and continuous backup and recovery, plus centralized management and reporting, and 24x7 technical support for SMB through Enterprise environments. Address |
635 |
Digital Guardian Digital Guardian is the only data-centric security platform designed to stop data theft. Our unique data awareness and transformative endpoint visibility, combined with behavioral threat detection and response, let you protect data without slowing the pace of your business. Address Website |
611 |
Digital Shadows Digital Shadows provides cyber situational awareness that helps organizations protect against cyber attacks, loss of intellectual property and brand and reputational integrity. Its flagship solution is a data analysis platform that provides a holistic view of an organization’s digital footprint and the profile of its attackers. Address Website Products/Services Offered
|
IP25 |
Distil Networks Distil Networks, the global leader in bot detection and mitigation, offers the most automated and accurate way to identify and police malicious website traffic, blocking 99.9% of bad bots without impacting legitimate users. Distil protects against web scraping, competitive data mining, account hijacking, form spam and click fraud while slashing the high tax that bots place on your internal teams and web infrastructure. For more information on Distil Networks, visit us at www.distilnetworks.com or follow @DISTIL on twitter. Address Website Products/Services Offered
|
1068 |
Druva Druva is the leader in data protection and governance at the edge, bringing visibility and control to business information in the increasingly mobile and distributed enterprise. Built for public and private clouds, Druva’s award-winning inSync and Phoenix solutions prevent data loss and address governance, compliance, and eDiscovery needs on laptops, smart-devices and remote servers. As the industry’s fastest growing edge data protection provider, Druva is trusted by over 3,000 global organizations on over 3 million devices. Learn more at www.druva.com and join the conversation at twitter.com/druvainc. Address Website |
465 |
Elastica Elastica is the innovator of Data Science Powered™ Cloud Application Security. Its CloudSOC™ solution empowers the Elastic Enterprise and enables companies to confidently leverage cloud applications and services while staying safe, secure and compliant. Elastica Apps on the extensible CloudSOC™ platform today offers cloud audit for Shadow IT, granular transaction visibility, threat detection, security controls and post-incident forensic analysis. Elastica is venture-backed by the Mayfield Fund and is headquartered in San Jose, CA. Learn more about Elastica at elastica.net. Follow us on Twitter @ElasticaInc. Address Website Products/Services Offered
|
567 |
Electronic Frontier Foundation (EFF) The Electronic Frontier Foundation (EFF) is the leading nonprofit organization defending civil liberties in the digital world. Founded in 1990, EFF champions user privacy and free expression online through a strategic combination of impact litigation, policy analysis, education, and grassroots activism. We empower tinkerers, creators, coders, and consumers to reclaim freedom as our use of technology grows. Address Website Products/Services Offered
|
BHB8 |
Endgame Endgame is leveling the playing field against adversaries by protecting national security and commercial interests from the most advanced cyber threats. Using its deep knowledge of the adversary, Endgame helps customers understand their defenses from the perspective of the attacker. This new approach allows organizations to instantly detect and actively respond to advanced threats, preventing damage and loss. Endgame’s technology and techniques are proven in the most extreme environments—from defending U.S. national security interests to protecting the world’s critical infrastructure. Address Website Products/Services Offered
|
1215 |
enSilo enSilo offers a real-time targeted attack exfiltration prevention platform which accurately distinguishes legitimate connections from malicious ones from the moment a connection is established. enSilo’s solution provides virtual patching against advanced targeted threats, enabling employees to keep working as usual while a device compromise is being resolved. Address Website Products/Services Offered
|
IP23 |
ESET ESET®, the pioneer of proactive protection and the maker of the award-winning ESET NOD32® technology, is a global provider of security solutions for businesses and consumers. For over 26 years, the Company continues to lead the industry in proactive threat detection. By obtaining the 80th VB100 award in June 2013, ESET NOD32 technology holds the record number of Virus Bulletin "VB100” Awards, and has never missed a single “In-the-Wild” worm or virus since the inception of testing in 1998. In addition, ESET NOD32 technology holds the longest consecutive string of the VB100 awards of any AV vendor. ESET has also received a number of accolades from AV-Comparatives, AV-TEST and other testing organizations and reviews. ESET NOD32® Antivirus, ESET Smart Security®, ESET Cyber Security® (solution for Mac), ESET® Mobile Security and IT Security for Business are trusted by millions of global users and are among the most recommended security solutions in the world. The Company has global headquarters in Bratislava (Slovakia), with regional distribution centers in San Diego (U.S.), Buenos Aires (Argentina), and Singapore; with offices in Jena (Germany), Prague (Czech Republic) and Sao Paulo (Brazil). ESET has malware research centers in Bratislava, San Diego, Buenos Aires, Singapore, Prague, Košice (Slovakia), Krakow (Poland), Montreal (Canada), Moscow (Russia) and an extensive partner network for more than 180 countries. More information is available at the ESET Press Center. Address Website Products/Services Offered
|
927 |
Esri 4.The market leader in geospatial technology, Esri software is used by more than 350,000 organizations worldwide including local, state, & national agencies. Esri’s ArcGIS platform can be used to extend current physical security concepts for a better shared situational awareness of cyberspace and associated activity to better anticipate, detect, respond, and recover from cyber disruptions. Esri technology includes tools, workflows, and applications that can be implemented within an organization’s existing cybersecurity data and technology infrastructure to improve data management, incident analysis, situational awareness, and information sharing. Address Website Products/Services Offered
|
258 |
Evident.io Evident.io is the leader in security and compliance automation for Amazon AWS. The Evident Security Platform (ESP) helps organizations proactively manage security risk and compliance of AWS infrastructure with a single pane of glass view of security threats and compliance across all AWS accounts, services, and regions. ESP manages the complexity and rapid change of public cloud infrastructure by automating threat detection, incident response, and compliance through the continuous monitoring and analysis of configuration and usage data. With ESP security and compliance teams are more productive and efficient while creating a more proactive and adaptive security posture and a process for continuous compliance. Built on Amazon Web Services APIs, ESP is agent-less and can be deployed to even the most complex environments in minutes. Evident.io is a privately held company based in Dublin, CA and backed by Bain Capital Ventures and True Ventures. Address Website |
859 |
Executive Women's Forum The Executive Women's Forum (EWF) is a prominent community of over 1000 of the nation's most influential female executives within the Information Security, Privacy, and Risk Management industries. The EWF community is a home base for women to grow their professional skills, build important networks and gather industry business intelligence. Address |
BHB5 |
F5 Networks F5 provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, and software defined networking (SDN) deployments to successfully deliver applications to anyone, anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich partner ecosystem of leading technology and data center orchestration vendors. This approach lets customers pursue the infrastructure model that best fits their needs over time. The world’s largest businesses, service providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility trends. For more information, go to f5.com Address Website |
647 |
Farsight Security, Inc. Founded in 2013 by Internet pioneer Dr. Paul Vixie, Farsight Security, Inc. delivers real-time Threat Intelligence enrichment solutions in the form of DNS intelligence for faster, more precise detection and response to today’s cyber threats. Farsight solutions include DNSDB™, SIE™, WHOIS Domain and NOD™. Headquartered in San Mateo, California. Address Website Products/Services Offered
|
IC3 |
Fastly, Inc. Fastly is the only CDN that offers complete control over how businesses serve content, unprecedented access to real-time performance analytics, and the ability to cache frequently changing content at the edge. Our customers include Twitter, WIRED, Target, and Stripe. Help us build a better internet: www.fastly.com/about/careers. Address Website |
CZ13 |
Federal Bureau of Investigation Address Website |
158 |
Fidelis Cybersecurity Fidelis Cybersecurity provides organizations with a robust, comprehensive portfolio of products, services, and expertise to combat today's sophisticated advanced threats and prevent data breaches. Our commercial enterprise and government customers around the globe can face advanced threats with confidence through use of our Network Defense and Forensics Services, delivered by an elite team of security professionals with decades of hands-on experience, and our award-winning Fidelis XPS Advanced Threat Defense Products, which provide visibility and control over the entire threat life cycle. Address Website |
719 |
FireEye FireEye protects the most valuable assets in the world from those who have them in their sights. Our combination of technology, intelligence, and expertise combined with the most aggressive “boots on the ground” helps eliminate the impact of security breaches. We find and stop attackers at every stage of an incursion. With FireEye, you’ll detect attacks as they happen. You’ll understand the risk these attacks pose to your most valued assets. And you’ll have the resources to quickly respond and resolve security incidents. The FireEye Global Defense Community includes more than 2,200 customers across more than 60 countries, including more than 130 companies in the Fortune 500. Address Website Products/Services Offered
|
111 |
FireEye FireEye protects the most valuable assets in the world from those who have them in their sights. Our combination of technology, intelligence, and expertise combined with the most aggressive “boots on the ground” helps eliminate the impact of security breaches. We find and stop attackers at every stage of an incursion. With FireEye, you’ll detect attacks as they happen. You’ll understand the risk these attacks pose to your most valued assets. And you’ll have the resources to quickly respond and resolve security incidents. The FireEye Global Defense Community includes more than 2,200 customers across more than 60 countries, including more than 130 companies in the Fortune 500. Address Website |
BMR221 BMR323 |
FireHost FireHost offers the most secure, managed cloud available, protecting sensitive data and brand reputations of some of the largest companies in the world. With private cloud infrastructure built for security, compliance, performance and managed service, responsible businesses choose FireHost to reduce risk and improve the collection, storage and transmission of their most confidential data. Address Website |
547 |
FireMon FireMon solutions deliver continuous visibility into and control over network security infrastructure, policies and risk. Using the FireMon Security Intelligence Platform, today’s enterprise organizations, government agencies and managed services providers dramatically improve effectiveness of network defenses, optimizing investments and speeding response to changing business demands. For more information, visit firemon.com Address Website Products/Services Offered
|
|
Flashpoint Global Partners Discover the critical missing data and intelligence your security team needs to defend against malicious actors operating in the unmapped regions of the Internet. Our pioneering approach blends subject matter expertise with innovative engineering to deliver Deep and Dark Web data in a sanitized environment. Address Website |
IC12 |
Foreground Security Foreground Security is a dedicated cyber security company providing security engineering, assessment, customized security training, and advanced incident response and forensics services. Our Virtual SOC (V-SOC) service allows clients to outsource the monitoring and management of their current security products while keeping all data inside their boundaries. Our patent-pending Automated Threat Intelligence Platform (ATIP) automates threat identification in real time so we can focus our efforts on diagnosis and remediation. At one client, our innovations resulted in a 300% increase in incident detection rates. Foreground helps organizations align information security with key business objectives. Our experienced professionals hold CISSP, CCSP, CISM, CEH, CHFI, and many other certifications and our penetration testers have identified over 100 zero day vulnerabilities within the last 12 months. We provide our more than 100 government and commercial clients with the proven expertise and real-world implementation experience required to protect against today’s leading threats. Address Website Products/Services Offered
|
126 |
ForeScout Technologies ForeScout enables organizations to continuously monitor and mitigate security exposures and cyber attacks. The company’s CounterACT™ appliance dynamically identifies and evaluates network users, endpoints and applications to provide visibility, intelligence and policy-based mitigation of security problems. ForeScout’s open ControlFabric™ architecture allows a broad range of IT security products and management systems to share information and automate remediation actions. Because ForeScout’s solutions are easy to deploy, unobtrusive, extensible and scalable, as of January 1, 2015, they have been chosen by more than 1,800 of the world’s most secure enterprises and government agencies in over 62 countries. Headquartered in Campbell, California, ForeScout offers its solutions through its global network of authorized partners. Learn more at www.forescout.com. Address Website Products/Services Offered
|
253 |
Fortinet Inc Fortinet, a global provider of IT security, delivers customer-proven solutions providing organizations with the power to protect and control their IT infrastructure. Our customers rely on our purpose-built technologies, integrated solution architecture, and global security intelligence to block external threats and gain precise control of their network, data, and users. With 190,000+ customers in every industry around the world, Fortinet has the broad base of experience necessary to help secure diverse networks, and improve network and business performance. Fortinet is a 100% security focused company, and was created with an integrated security vision to increase protection and control, while optimizing performance, simplifying management and reducing costs. The company pioneered an innovative, high performance multithread network security platform to address the fundamental problems of ever-evolving, sophisticated multi-vector IT threat landscape. Fortinet has pursued that vision for the last 14 years by continuing to innovate and enrich its solution portfolio. Address Website |
1119 |
Gigamon Gigamon provides an intelligent Visibility Fabric™ architecture for enterprises, data centers and service providers around the globe. Gigamon’s technology empowers infrastructure architects, managers and operators with pervasive and dynamic intelligent visibility of traffic across both physical and virtual environments without affecting the performance or stability of the production network. Through patented technologies and centralized management, the Gigamon GigaVUE portfolio of high availability and high-density products intelligently delivers the appropriate network traffic to management, analysis, compliance and security tools. Gigamon has been designing and building traffic visibility products since 2004 and its solutions are deployed globally across vertical markets including over half of the Fortune 100 and many government and federal agencies. Address Website Products/Services Offered
|
140 |
Guidance Software Guidance Software is transforming enterprise security to proactively address the evolving threat landscape through endpoint intelligence products that leverage our market-leading digital investigations platform. We help customers find and eradicate threats that evade signature-based systems, dramatically reduce security costs and time-to-remediation, and help mitigate today’s information-security and legal risks. EnCase® products are used by numerous government agencies worldwide, more than 65 of the Fortune 100, and more than 40 percent of the Fortune 500. Built on the EnCase® Enterprise platform are market-leading security and e-discovery solutions, EnCase® Analytics, EnCase® Cybersecurity, and EnCase® eDiscovery. For more information, visit www.encase.com. Address Website |
641 |
GuruCul Gurucul is transforming the enterprise security with user behavior based machine learning and predictive analytics. Using identity to monitor for threats, Gurucul provides Actionable Risk Intelligence™ to protect against targeted and under-the-radar attacks. Gurucul is able to proactively detect, prevent, and deter advanced insider threats, fraud and external threats to system accounts and devices using self-learning, behavioral anomaly detection algorithms. Gurucul is backed by an advisory board comprised of Fortune 500 CISOs, and world renowned-experts in government intelligence and cyber security. The company was founded by seasoned entrepreneurs with a proven track record of introducing industry changing enterprise security solutions. Our mission is to help organizations protect their intellectual property, regulated information, and brand reputation from insider threats and sophisticated external intrusions. Address Website |
1126 |
HEAT Software HEAT Software is a leading provider of Unified Endpoint Management (UEM) software solutions for organizations of all sizes. Within our UEM platform HEAT offers Lumension Endpoint Protection and malware prevention. Address Website Products/Services Offered
|
BMR318 |
Hexis Cyber Solutions Hexis Cyber Solutions, Inc. is a team of cybersecurity experts delivering solutions that enable organizations to defend against and remove cyber threats at machine speeds before they do damage. Hexis’ advanced security solutions use real-time endpoint sensors, network detection, and threat analytics to provide organizations with an intelligent and automated threat detection and response solution. Hexis’ solutions deliver improved visibility into the network and endpoints, threat verification, and automated threat removal capabilities for organizations of all sizes. Hexis Cyber Solutions, Inc. is a wholly-owned subsidiary of The KEYW Holding Corporation (KEYW), based in Hanover, Maryland with engineering offices in Columbia, Maryland and San Mateo, California. Hexis’ solutions were developed leveraging KEYW’s expertise in supporting our nation's cybersecurity missions. Address Website Products/Services Offered
|
458 |
Hillstone Networks Hillstone Networks builds intelligent next-generation firewalls to protect against Advanced Persistent Threats and zero-day attacks. Built from the ground up for today’s virtual and cloud-based data centers, Hillstone’s fully distributed i+NGFW platform provides granular visibility and control of network traffic, based on real-time behavioral anomaly detection and advanced data analytics. Address Website |
IC9 |
HP HP Security HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. Drawing on decades of experience in enterprise security, HP is a leading provider of solutions designed to mitigate risk and defend against today’s most advanced threats. HP Security enables organizations to take a proactive approach to security, disrupting the life cycle of an attack through prevention and real-time threat detection. With market-leading products, services and innovative research, HP Security brings a global network of security operations centers and more than 5,000 IT security experts to help customers strengthen their security posture to minimize risk and incident impact. Address Website |
411 |
IBM Cybercriminals are growing in number and sophistication, rendering traditional IT protection systems powerless against today’s advanced threats. IBM Security delivers the next-generation security technology that can outsmart bad actors, discover threats and prevent breaches. Over the past decade, IBM spent nearly $2 billion on security research and development, resulting in 3,700 security-related patents, and acquired more than 12 top security companies to build its portfolio. With 6,000 security professionals and threat researchers in more than 130 countries, IBM Security helps more than 10,000 clients adapt to security threats with intelligent, integrated solutions. IBM has identified, and responds to, clients’ four most pressing Security needs: Optimize the Security Program : As security breaches continue to ruin fortunes and reputations, C-Suites demand IT Security strategies that provide the best protection for immediate and long terms. IBM Security Services help organizations with everything from making their ecosystem more risk aware to running their entire security program. IBM bridges the skills gap by advising how to create the best Security program for the organization’s size and industry, or by complementing the IT department with technologists that have coveted cyber security skills. Stop Advanced Threats: APTs, with custom-made malware that executes relentless targeted attacks, are the scourge of enterprise IT. There are two critical points in any chain of attack: the network and the endpoint. These infections are tricky -- they can bypass prevention mechanisms, lie dormant for years, and morph to escape destruction. With IBM Security’s integrated intelligence platform, malware can be detected in real time and stopped from spreading. IBM Security protects more than 270,000,000 endpoints throughout the threat lifecycle, applying an integrated defense that breaks the attack chain and preempts infection. Protect Critical Assets: In today’s era of increasing, easily-shared data, our clients have potentially millions of users – employees, customers, partners, contractors -- coming into their systems to access their records. The data they are using has increased exponentially, and the rate of new applications being developed in the world of mobile apps is astonishing. This velocity and volume requires a different, risk-based approach to security. IBM Security solutions offer automated access controls that are smart enough to know where users are located, what they want to do, and what normal behavior is before letting them in the door. Safeguard Mobile and Cloud: Mobile and cloud technologies are essential to engage and gain competitive advantage. As the traditional network perimeter around the data center dissolves, it’s harder to defend company data and to verify that people accessing that data are protected. About 10 billion mobile Internet devices are expected to be in use by 2016, with the mobile app industry racing to match demand. When developers scramble to keep up with the latest in app technology, security lags behind. And as the lines between work and personal technology usage blurs, mobile security is crucial. IBM Cloud Security Solutions can gain cloud visibility, while IBM MobileFirst Security solutions and Services protect the mobile enterprise. Address Website |
241 |
iboss Network Security iboss Cybersecurity defends today’s borderless networks against advanced threats and data exfiltration with innovative Web Security, Mobile Security and FireSphere™ Advanced APT Defense. Unlike legacy technology focused solely on keeping malware out, iboss offers a balanced approach with equal emphasis on prevention, detection and containment to reduce loss from data breaches. Backed by patented technology and unparalleled visibility across all inbound/outbound data channels, iboss smart defense provides security weapons that reveal blind spots, detect breaches and minimize the consequences of data exfiltration. Leveraging leading threat protection and unsurpassed usability, iboss is trusted by thousands of organizations and millions of users. Visit www.iboss.com Address Website Products/Services Offered
|
1047 |
Identity Finder Identity Finder is a global leader in enterprise security software, focusing on sensitive data management and protection. The company’s award-winning solutions help organizations make smarter information technology decisions, manage risk, and prevent damage by discovering, classifying, and protecting confidential information wherever it exists in the enterprise. Address Website Products/Services Offered
|
166 |
IEEE Computer Society IEEE Computer Society is the world's leading membership organization for computer science and technology. Serving over 60,000 members, the IEEE Computer Society is the trusted information, networking, and career-development source for a global community of technology leaders that includes researchers, educators, software engineers, IT professionals, employers, and students. Address Website Products/Services Offered
|
BHB7 |
Imperva Imperva provides cyber security solutions to protect your business-critical data and applications—in the cloud and on-premises. For more information visit imperva.com Address Website |
127 BMR309 |
Infoblox Infoblox (NYSE:BLOX) delivers network control solutions, the fundamental technology that connects end users, devices, and networks. These solutions enable approximately 8,100 enterprises and service providers to transform, secure, and scale complex networks. Infoblox helps take the burden of complex network control out of human hands, reduce costs, and increase security, accuracy, and uptime. Infoblox (www.infoblox.com) is headquartered in Santa Clara, California, and has operations in over 25 countries. Address Website |
865 |
INSIDE Secure INSIDE Secure protects transactions, content, and communications. We deliver solutions combining hardware, software and IP meeting evolving security requirements for mobile and IoT. Our expertise positions us to provide solutions for Payment and mobile banking, Content protection and entertainment, Enterprise and secure access and Secure IoT and brand protection technologies. Address Website Products/Services Offered
|
IP26 |
Intel Security McAfee is now part of Intel Security. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence, Intel Security is intensely focused on developing proactive, proven security solutions and services that protect systems, networks, and mobile devices for business and personal use around the world. Intel Security combines the experience and expertise of McAfee with the innovation and proven performance of Intel to make security an essential ingredient in every architecture and on every computing platform. Intel Security’s mission is to give everyone the confidence to live and work safely and securely in the digital world. www.intelsecurity.com. Address Website Products/Services Offered
|
935 |
Interface Masters Technologies Interface Masters Technologies leads the network monitoring market, providing 1G, 10G, 40G and 100G include Network Packet Brokers, Network TAP, and Bypass switches that provide network visibility and uptime to inline and out-of-band monitoring systems, networking appliances and other mission-critical IT and security appliances. Address Website Products/Services Offered
|
IP17 |
Invincea Invincea is the leader in advanced endpoint threat protection for enterprises worldwide. The company provides the most comprehensive solution to contain, identify, and control the advanced attacks that evade legacy security controls. Invincea protects enterprises against targeted threats including spear-phishing and Web drive-by attacks that exploit Java, Flash, and other applications. Combining the visibility and control of an endpoint solution with the intelligence of cloud analysis, Invincea provides the only market-deployed solution that defends against 0-day exploits, file-less malware, and previously unknown malware. The company is venture capital-backed and based in Fairfax, VA. For more information, visit http://www.invincea.com. Address Website Products/Services Offered
|
852 |
ISACA Cybersecurity Nexus (CSX)TM is a new security knowledge platform from ISACA® that is shaping the cybersecurity profession through cutting-edge thought leadership, training, certification and career development programs that will guide and resource current and future cybersecurity professionals at every level. The comprehensive set of resources that CSX offers affirms ISACA’s solid commitment to do for cybersecurity professionals what it has done—and will continue to do—for audit, control and governance professionals over the past 45 years. ISACA helps business and IT leaders build trust in, and value from, information and information systems. The global association is the trusted source of knowledge, standards, networking, and career development for 140,000 constituents in 180 countries. ISACA offers extraordinary resources across the information systems and information technology disciplines it serves, and cybersecurity will be no exception to this. For more information, please visit www.isaca.org and www.isaca.org/cyber Address Website |
1226 |
iScan Online, Inc. iScan Online is the industry’s first data breach risk intelligence platform that puts a real-time dollar number on an organization’s security risk. iScan’s patented discovery process uncovers sensitive data and vulnerabilities, and financially prioritizes the results in reports that speak the language of the C-suite. Address Website Products/Services Offered
|
IC17 |
ISSA International The Information Systems Security Association (ISSA) is dedicated to developing and connecting cybersecurity leaders globally. ISSA is the community of choice for more than 11,000 international cybersecurity professionals, dedicated to advancing individual growth, managing technology risk, and protecting critical information and infrastructure. ISSA facilitates interaction and education to create an advance environment for global information systems security and for the professionals involved. Members include practitioners at all levels of the security field in a broad range of industries such as communications, education, healthcare, manufacturing, financial, and government. Join ISSA at www.issa.org. Address Website |
BHB6 |
Ixia Ixia provides application performance and security resilience solutions to validate, secure, and optimize businesses’ physical and virtual networks. Enterprises, service providers, network equipment manufacturers, and governments worldwide rely on Ixia’s solutions to deploy new technologies and achieve efficient, secure, ongoing operation of their networks. Ixia's powerful and versatile solutions, expert global support, and professional services equip organizations to exceed customer expectations and achieve better business outcomes. Application performance means successfully deploying applications across networks so that your customers enjoy a quality user experience. Security resilience means ensuring networks are durable against ever-growing IT security threats, so that your customers are confident their online experience is protected. When asked, Ixia’s customers agree that two things are true: applications are the network, and security is critical. Ixia is committed to helping your network perform at its highest level, so that your end users get the best performing and most secure application experience. Making sure you can seamlessly and securely deliver a quality experience to your customers is Ixia’s business. We help validate the design, secure the rollout, and monitor the operation stages of your network. Our solutions are available for both physical and virtual networking environments. Learn more at www.ixiacom.com. Address Website Products/Services Offered
|
110 |
Juniper Networks Juniper Networks High-performance security with advanced, integrated threat intelligence, delivered on the industry's most scalable and resilient platform. SRX Series gateways set new benchmarks with 100GbE interfaces and feature Express Path technology, which enables up to 1 Tbps performance for the data center. Security for any size data center and enterprise edge offers a broad range of options—from all-in-one, integrated physical and virtual security networking devices to highly scalable, chassis-based data center solutions—that can defend enterprise data centers and service providers of any size. For More information, please visit juniper.net Address Website |
726 |
KPMG Address Website |
167 |
Lancope Lancope, Inc. is a leading provider of network visibility and security intelligence to defend enterprises against today’s top threats. By collecting and analyzing NetFlow, IPFIX and other types of flow data, Lancope’s StealthWatch® System helps organizations quickly detect a wide range of insidious attacks from APTs and DDoS to zero-day malware and insider threats. Through pervasive insight across distributed networks, including mobile, identity and application awareness, Lancope accelerates incident response, improves forensic investigations and dramatically reduces enterprise risk. Lancope’s anomaly detection capabilities are continuously enhanced with threat intelligence from the StealthWatch Labs security research team. For more information, visit www.lancope.com. Address Website |
114 |
Lastline Lastline is innovating the way companies detect active breaches caused by advanced persistent threats, targeted attacks and evasive malware with its software-based Breach Detection Platform. Lastline’s open architecture integrates advanced threat defenses and intelligence into existing operational workflows and security systems. Inspection of suspicious objects occurs at scale in real-time using a full-system emulation approach to sandboxing that is superior to virtual machine-based and OS emulation techniques. Lastline's technology correlates network and object analysis to achieve timely breach confirmation and incident response. Lastline was built by Anubis and Wepawet researchers and industry veterans with decades of experience focused specifically on advanced breach weaponry and tactics. Headquartered in Redwood City, California with offices throughout North America, Europe and Asia, Lastline’s platform is used by global managed security service providers, Global 2000 enterprises and leading security vendors worldwide. To learn more, visit www.lastline.com. Address Website Products/Services Offered
|
252 |
Level 3 Communications Level 3 Communications builds, operates and maintains a global communications network to deliver managed solutions for enterprises, carriers and governments. As a Fortune 500 company and a Tier 1 Internet operator, we offer fiber-based infrastructure and data center solutions, IP-based voice and data communications, wide-area Ethernet services, video and content distribution, security solutions, and cloud-based solutions. Level 3 connects more than 500 markets in over 60 countries across owned fiber networks on six continents, connected by extensive undersea facilities. We take ownership of network reliability and security, so our customers can own their success in return. Learn more: www.level3.com. Address Website |
165 |
Lieberman Software Lieberman Software Corporation provides privileged identity management and security management solutions to more than 1,200 customers worldwide, including half of the US Fortune 50. By automatically discovering and managing privileged accounts that appear whenever enterprises deploy and change IT resources, the company's products help secure access to sensitive systems and data. The company's multi-faceted, agentless software can reliably track privileged accounts on dynamic networks and change service and process account credentials by auto-discovering complex account interdependencies. With this technology, Lieberman Software enables organizations to fully automate labor-intensive, error-prone IT administrative tasks without the need for ongoing customization and professional services. To learn more about our tools and solutions stop by our booth for a hands-on demo or visit our website at liebsoft.com. Address Website Products/Services Offered
|
511 |
Lockheed Martin Corporation Lockheed Martin (LM) is a global provider of cybersecurity solutions focused on developing, implementing, maintaining, and securing critical infrastructures for both government and commercial clients in Oil & Gas, Utilities, Financial Services, Healthcare and Chemical industries. LM engineers literally span the globe, overseeing more than 4,000 programs at 600 locations in all 50 states and in 75 countries. We employ over 3,000 cyber-security professionals and have robust IT and OT technology partnerships. Our lifecycle-focused products and programs enable both success and sustainability protecting networks across our commercial clients' infrastructures. Address Website |
919 |
LogRhythm LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s award-winning platform unifies next-generation SIEM, log management, network and endpoint forensics, and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides innovative compliance automation and assurance, and enhanced IT intelligence. LogRhythm is consistently recognized as a market leader. The company has been positioned as a Leader in Gartner’s SIEM Magic Quadrant report for three consecutive years, named a “Champion” in Info-Tech Research Group’s 2014-15 SIEM Vendor Landscape report and ranked Best-in-Class (No. 1) in DCIG’s 2014-15 SIEM Appliance Buyer’s Guide. In addition, LogRhythm has received Frost & Sullivan’s SIEM Global Market Penetration Leadership Award and been named a Top Workplace by the Denver Post. LogRhythm is headquartered in Boulder, Colorado, with operations throughout North and South America, Europe and the Asia Pacific region. Address Website Products/Services Offered
|
219 |
LookingGlass Lookingglass, the leader in threat intelligence that transforms security operations, empowers confident real-time decisions through focused verified multi-source information. We provide a unique lens to information customers may already have, creating active intelligence for effective decisions. Lookingglass is transforming the art of threat intelligence with innovative technology that empowers customers with complete and relevant risk information, delivering confidence, streamlining workflows and dramatically driving efficiencies. Our threat intelligence management platform, ScoutVision, delivers content, context and confidence in risk and security operations decision support. This platform increases visibility within and beyond the network perimeter, empowering customers to continuously assess and mitigate threats. Address Website Products/Services Offered
|
1141 BMR 319 |
Malwarebytes Corporation In 2004, young Marcin Kleczynski picked up a nasty malware infection one day while in search of video games. This despite having a popular paid antivirus in place. It took him three solid days to remove the malicious code. Three days searching the Internet and consulting with other people on security forums like spywareinfoforum.com who had similar problems. Who had also come to the same two conclusions: 1.There was a lot of new malware out there. 2.Antivirus wasn’t up to the task. So Marcin set out to build the world a better malware fighter. He taught himself code and eventually engineered a lightweight but highly effective anti-malware tool that is now known as Malwarebytes Anti-Malware. Today, more than 38,000 SMBs and Enterprise businesses worldwide trust Malwarebytes to protect their data. And Malwarebytes Anti-Malware has been downloaded to over 200 million home PCs. According to OPSWAT, it is the most popular user-installed security product. Malwarebytes continues to develop anti-malware and anti-exploit software designed to protect businesses and consumers against zero-day threats that consistently escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware earned an “Outstanding” rating by CNET editors, is a PCMag.com Editor’s Choice, and was the only security software to earn a perfect malware remediation score from AV-TEST.org. Malwarebytes is headquartered in California, operates offices in Europe, and employs a global team of 165 malware researchers, software engineers, and support staff. For more information, please visit us at www.malwarebytes.org. Address Website Products/Services Offered
|
1053 |
ManTech Cyber Solutions International ManTech Cyber Solutions International provides behavior-based cyber threat detection and memory forensics software enabling our customers to secure their endpoints against the most advanced malware including APTs, Zero Days and rootkits. Due to our behavior-based approach, we can detect brand new threats never before seen without the need for signatures or whitelists. This allows threats to be caught early in the cycle allowing companies to break the kill chain sooner and protect their precious data. Some of the most costly and lengthy threats over the last few years were initiated using custom code that could not be identified by AV either using network or storage scans. It was only after information had been stolen and companies went back to look at activities from months earlier that these pieces of malware were identified. The behavior based approach allows companies to catch malware never-before seen based on the activities it tries to perform. While malware can be packed, obfuscated and injected into memory, it cannot harm the IT infrastructure without actually running on an endpoint and demonstrating behaviors common to malware such as logging keystrokes or opening multiple communication channels to exfiltrate sensitive information. By focusing on these behaviors rather than signatures or fingerprints, malware which has been newly created for an attack can be immediately detected thereby defending your endpoints against breaches. Explore our products and services further at mcsi.mantech.com or by emailing mcsisales@mantech.com Address Website |
447 |
ManTech International ManTech is a leading provider of innovative technology services and solutions. Our employees solve complex problems for the nation's defense, security, space, and intelligence communities in alignment with our customers’ mission objectives. We offer you challenging and rewarding work, generous benefits, and a commitment to help you grow professionally. Address Website |
CZ6 |
Masergy Communications, Inc. Masergy owns and operates the largest independent cloud networking platform, delivering fully-managed global networks, advanced managed security and cloud unified communication solutions to enterprises. Since 2001, Masergy has delivered innovative technologies and unmatched customer service. We go beyond transforming IT, we are the benchmark for what enterprises expect from their service provider. Address Website Products/Services Offered
|
1067 |
MBX Systems MBX Systems offers comprehensive OEM hardware manufacturing and services that enable software companies to deliver their applications on single-purpose systems, optimized for increased performance and reliability. The turnkey hardware systems are 100% customized to the customer’s specifications by inhouse platform engineers, and value-added services such as branding, software imaging, regulatory/compliance, global logistics and warranty support relieve customers of all hardware responsibilities. In addition to traditional hardware programs, MBX has launched MBX Clear, a Hardware-as-a-Service model that eliminates upfront capital investments and other hardware-related overhead by providing custom hardware systems to customers on a subscription basis. Additional benefits include eliminated need to purchase inventory or extended hardware warranties and zero risk of obsolete hardware. MBX Systems is an HP OEM Integrator, Intel Technology Provider Platinum, and Seagate Elite Partner and is headquartered near Chicago, offering engineering in San Jose, manufacturing in the U.S. and Europe, and logistics services globally. Address Website Products/Services Offered
|
1242 |
MetaFlows MetaFlows Inc. develops SaaS-based, network security software appliances that can reliably find and stop malware hidden in your network. False positives are virtually eliminated by correlating multiple independent flows. False negatives are lowered by combining feeds from Emerging Threats, Cuckoo, VirusTotal, SRI, OSSEC, Trustwave, YARA, ClamAV and Web of Trust. Address Website Products/Services Offered
|
IC7 |
Microsoft Corporation Microsoft (Nasdaq "MSFT") is the worldwide leader in software, services, and solutions that help people and businesses realize their full potential. Microsoft remains dedicated to software security and privacy and continues to collaborate with the community of people and technology organizations helping to protect customers and the broader ecosystem. Address Website Products/Services Offered
|
427 |
MobileIron "Customers use MobileIron as the technology foundation on their journey to become “Mobile First” organizations, embracing mobility as a primary computing platform for their employees. Mobile technology is driving a massive shift in the ability of IT to support the way people want to work. Mobile First organizations focus on building superb mobile user experiences that are available anywhere users need them. They have to move fast and adopt new technologies rapidly. Mobile First organizations transform their businesses by giving employees secure access to critical business applications and content on devices employees want with a native user experience they love." Address Website Products/Services Offered
|
866 |
Mocana Corporation Mocana has been securing the Internet of Things for over a decade. From smart meters to smart phones, anything that has an IP address is securable with Mocana's Security of Things. More information is available at www.mocana.com. Address Website Products/Services Offered
|
122 |
National Center for Women & Information Technology The National Center for Women & Information Technology (NCWIT) is a non-profit community of more than 650 universities, companies, non-profits, and government organizations nationwide working to increase women’s participation in computing and technology. NCWIT equips change leaders with resources for taking action in recruiting, retaining, and advancing women from K–12 and higher education through industry and entrepreneurial careers. Find out more at www.ncwit.org. Address Website |
BHB4 |
NetSuite NetSuite is the world's leading provider of cloud-based business management software. NetSuite helps companies manage core business processes with a single, fully integrated system covering ERP/financials, CRM, ecommerce, inventory and more Address Website |
IP15 |
Neustar Neustar, Inc. (NYSE:NSR) is the first real-time provider of cloud-based information services and data analytics, enabling marketing and IT security professionals to promote and protect their businesses. With a commitment to privacy and neutrality, Neustar operates complex data registries and uses its expertise to deliver actionable, data-driven insights that help clients make high-value business decisions in real time, one customer interaction at a time. More information is available at www.neustar.biz. Address Website Products/Services Offered
|
155 |
Niara, Inc. Niara’s Big Data Security Analytics platform integrates advanced machine learning and user behavior analytics with rich forensics to automate the discovery of sophisticated, multistage cyber attacks. Headquartered in Sunnyvale, Calif., and backed by NEA, Index Ventures and Venrock. www.niara.com. Address Website Products/Services Offered
|
IC19 |
Nike NIKE, Inc. is the world's leading designer, marketer and distributor of authentic athletic footwear, apparel, equipment and accessories for a wide variety of sports and fitness activities. Nike Technology designs, creates and implements technologies, methods and tools to make the world’s largest sport brand run faster, smarter and more securely. Address Website |
BMR316 |
Norse Norse is the global leader in live attack intelligence, helping companies block the threats that other systems miss. Serving the world’s largest financial, government and technology organizations, Norse intelligence offerings dramatically improve the performance, catch-rate, and return-on-investment of the entire security infrastructure. The Norse Intelligence Network, a globally-distributed “distant early warning” grid of millions of sensors, honeypots, crawlers, and agents, delivers unmatched visibility into difficult-to-penetrate geographies and darknets, where bad actors operate. Norse processes hundreds of terabytes daily against a 7 petabyte attack history database, and weighs over 1,500 variables to compute real-time risk scores for millions of IP addresses and URLs every day. For more information, visit norsecorp.com. Address Website |
359 |
Novetta Novetta’s analytics solutions are used at the heart of our nation’s cyber defense. Now available for commercial enterprises, Novetta Cyber Analytics actually does what our competitors have only claimed to do for years: provide complete, truthful, near real-time network security visibility and awareness. The solution dramatically increases the effectiveness of current security teams and perimeter/SIEM infrastructure by enabling analysts to ask and receive ground truth, PCAP-based answers to subtle questions almost instantly. Customers using the solution handle an estimated 30 times the number of incidents, and have found an immeasurable number of previously unknown intrusions. Learn more at www.novetta.com/cyber-analytics. Address Website |
1064 |
NRI SecureTechnologies NRI SecureTechnologies, a leading provider of information security solutions, is one of the affiliate companies of Nomura Research Institute, Ltd. Established in 2000, it examines information security at business corporations from the aspects of technology and business management, offering a one-stop service from consulting to solution implementation, training, management and surveillance. Address Website Products/Services Offered
|
952 |
NSS Labs Address Website Products/Services Offered
|
|
Nubo Software Nubo Software is a pioneer and leading company that develops and provides Virtual Mobile Infrastructure (VMI) solutions for enterprise mobility. Nubo Software has created one, secured remote virtual workspace that is tailor-made for today’s mobile workforce. Nubo’s innovative approach to mobile security stores zero data on personal devices while providing users with a native app experience and the freedom to choose their own applications. Address Website |
IP18 |
ObserveIT ObserveIT is the world’s leading provider of user activity monitoring. Founded in 2006, the company has grown exponentially in the past eight years (3500% in past five years).ObserveIT provides user-centric security solutions to more than 1,200 customers in over 70 countries. Address Website Products/Services Offered
|
BMR320 |
Onapsis Onapsis is the leading provider of cybersecurity, compliance and continuous monitoring solutions for ERP systems and business-critical infrastructure. Through its innovative solutions, Onapsis helps its customers to protect their core business platforms from espionage, sabotage and fraud attacks. Large organizations rely on SAP, Oracle E-Business Suite, PeopleSoft and Siebel platforms to store and process their most sensitive business information. Onapsis enables them to increase the security level of these systems while enforcing compliance requirements, decreasing financial fraud risks and reducing audit costs drastically. Onapsis solutions are trusted by several Fortune Global 100 companies, large governmental entities and military agencies. Onapsis X1, the company's flagship product, is the industry's first comprehensive solution for the Automated Security Assessment of SAP platforms. Being the first and only SAP-certified solution of its kind, Onapsis X1 Enterprise allows customers to perform Automated Vulnerability Assessments and Security & Compliance Audits over their entire SAP platform. For organizations that need to go deeper, Onapsis X1 Consulting Pro also safely exploits existing weaknesses to illustrate the associated business impacts. Onapsis is built upon a world-renowned team of experienced security researchers leading the SAP & ERP security fields. These experts were also the first to perform specialized SAP Penetration Tests, Vulnerability Assessments and Security Audits. Because of its cutting-edge research, Onapsis is continuously invited to lecture at the most important security conferences in the world, private companies and defense agencies. If you are wondering whether your ERP systems and business-critical infrastructure are exposed, find more information at onapsis.com. Address Website |
752 |
OpenDNS OpenDNS provides a cloud-delivered network security service that blocks advanced attacks, as well as malware, botnets and phishing threats regardless of port, protocol or application. Our predictive intelligence uses machine learning to automate protection against emergent threats before your organization is attacked. OpenDNS covers devices worldwide on or off the network in minutes with no hardware to install, software to maintain, and no admin intervention required. opendns.com Address Website Products/Services Offered
|
753 |
OpenDNS OpenDNS provides a cloud-delivered network security service that blocks advanced attacks, as well as malware, botnets and phishing threats regardless of port, protocol or application. Our predictive intelligence uses machine learning to automate protection against emergent threats before your organization is attacked. OpenDNS covers devices worldwide on or off the network in minutes with no hardware to install, software to maintain, and no admin intervention required. opendns.com Address Website |
BMR321 |
OPSWAT OPSWAT provides solutions to secure and manage IT infrastructure. Metadefender and Metascan help organizations secure data flow into and through their organization, detecting and preventing known and unknown threats by using multiple anti-malware engine scanning, document sanitization and file filtering. Organizations can set security policies for data entering through USB drives, mail servers, web downloads, upload servers and more. Metascan uses up to 30 anti-malware engines to scan files (using signatures and heuristics) to increase detection rates of malware; it provides an ideal tool for file upload and transfer protection, forensics and malware research, and more. OPSWAT also offers GEARS, a platform for advanced endpoint assessment of in-network and remote devices, including both managed and guest devices. GEARS enables administrators to easily assess endpoints for security and compliance issues and integrates with secure access solutions and other technologies to enhance endpoint posture checking for NAC, SSL VPN, SaaS and more. Address Website Products/Services Offered
|
365 |
Optiv Security Optiv is the largest holistic pure-play cyber security solutions provider in North America. The company’s diverse and talented employees are committed to helping businesses, governments and educational institutions plan, build and run successful security programs through the right combination of products, services and solutions related to security program strategy, enterprise risk and consulting, threat and vulnerability management, enterprise incident management, security architecture and implementation, training, identity and access management, and managed security. Created in 2015 as a result of the Accuvant and FishNet Security merger, Optiv is a Blackstone (NYSE: BX) portfolio company that has served more than 10,000 clients of various sizes across multiple industries, offers an extensive geographic footprint, and has premium partnerships with more than 300 of the leading security product manufacturers. Address Products/Services Offered
|
135 |
Optiv Security Accuvant and FishNet Security, which will begin conducting business as Optiv Security in 2015, recently merged to become one of North America’s leading information security services and solutions providers. The combined company offers a full suite of services and solutions that enable businesses, governments and educational institutions to define their security strategies, identify and remediate threats and risks, select and deploy the right technology, and achieve operational readiness to protect their organizations from malicious attack. For more information, please visit www.accuvant.com or www.fishnetsecurity.com. Address |
CZ8 |
Outlier Security Outlier provides agentless endpoint detection and response that not only detects malware and APT but also includes user behavior analytics to detect credential misuse and lateral movement. Delivered as SaaS, Outlier is implemented within minutes, has zero impact on end users, and has the lowest TCO compared to agent-based systems. Address Website Products/Services Offered
|
IC11 |
OWASP The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. For more information, please visit www.owasp.org. Address Website |
BHB9 |
Palo Alto Networks, Inc. Palo Alto Networks is leading a new era in security by protecting thousands of enterprise, government, and service provider networks from cyber threats with a truly unique, enterprise-class integrated and automated enterprise security platform designed with cyber threat prevention in mind. Because of our deep expertise, steadfast commitment to innovation and game-changing security platform, approximately 22,500 customers have chosen Palo Alto Networks®, making us the fastest growing security company in the market. Palo Alto Networks recognizes that organizations today are getting pummeled by new sophisticated attacks that blend malicious techniques. These attacks can cost millions of dollars in lost revenue and compromise customer data, intellectual property, business reputation, and overall livelihood. Cybersecurity risk increases with the adoption of initiatives like cloud computing, BYOD, and SDN, which represent new computing models that have the potential of introducing weaknesses in an organization’s security posture. Compounding this is the growing number of Internet-connected applications entering an organization’s environment that unintentionally provide more “windows and doors” for cybercriminals to worm their way into the network. The combination of these factors makes security a real challenge for organizations today. Unfortunately, legacy firewalls, UTMs, and standalone threat detection products fall short addressing these challenges because they are not architecturally designed to effectively coordinate across threat vectors or deliver the advanced protection and performance needed at the right place and the right time in today’s modern computing environments. Our game-changing enterprise security platform, which includes the Palo Alto Networks Next-generation Firewall, Palo Alto Networks Advanced Endpoint Protection and Palo Alto Networks Threat Intelligence Cloud, natively brings together these key security components, and functions such as URL filtering, IDS/IPS, and advanced threat protection. Because these functions are purposely built into the platform from the ground up and they natively share important information across the respective disciplines, we ensure better security than legacy firewalls, UTMs, or point threat detection products. The Palo Alto Networks platform can: ? Eliminate gaping holes in an organization’s security posture because it natively provides the right security technologies and applies them in the right place in the computing environment. ? Safely enable applications and business operations because protection is based on a fine-grained visibility, correlation, and control of what matters most in today’s modern computing environments: applications, users, and content, not just ports and IP addresses. ? Eliminate the age-old compromise between security posture and business performance that organizations have faced for years because it is natively architected to operate in modern networks with new technology initiatives such as cloud computing, software-defined datacenters, and mobility in mind. With our platform, organizations can safely enable the use of all applications critical to running their business, maintain complete visibility and control, confidently pursue new technology initiatives, and protect the organization from the most basic to sophisticated cyber attacks — known and unknown. Address Website |
119 |
Parsons Parsons has worked behind the scenes for 30+ years to deliver cybersecurity services to federal customers that have protected our nation’s most sensitive information and critical infrastructure. This experience is enhanced by 70+ years of experience designing, building, and managing these assets around the globe. Parsons has combined its in-depth knowledge of cybersecurity with its expertise in the sustainment of critical assets to offer PARSecure®, a secure suite of services that includes both cyber and physical security. This offering allows us to leverage our experience and become a trusted, cybersecurity partner for customers in federal, state, local government, and the commercial marketplace. Using PARSecure® and our team of cybersecurity experts, we can ensure that cutting edge cybersecurity people, processes, and technologies are in place – addressing the full spectrum of risks to your business and protecting your most valuable assets. Setting us apart is our state-of-the-art Cyber Solutions Center, located in Centreville, VA. This hands-on laboratory enables the Parsons team to demonstrate and analyze operational networks, supervisory control and data acquisition (SCADA) systems, and industrial control systems (ICS) that control all critical infrastructure, building systems, manufacturing systems, medical treatment facilities, water and wastewater, transportation, and more. We can then custom design, test, and implement the technical options needed to protect the security of client networks and infrastructure, in addition to providing training to those entrusted to maintaining the security of these systems. Parsons is a leader in technological solutions, continuity of operations, critical infrastructure, and classified facility protection. Address |
1041 |
Peach Fuzzer Peach Fuzzer, the world’s leading fuzz testing platform, provides security-testing solutions to organizations around the globe. Peach Fuzzer discovers and buckets vulnerabilities in hardware and software systems, applications, embedded devices, and network protocols. Peach Fuzzer is extensible and modular: a flexible system that can fuzz any automated security-testing scenario. Address Website Products/Services Offered
|
IC2 |
PFP Cybersecurity PFP Cybersecurity provides the next generation of threat detection to solve today’s most sophisticated cyber security attacks on critical infrastructure and supply chain systems. PFP’s physics-based integrity assessment reduces the detection time to mere milliseconds and is capable of detecting malicious intrusions in any device. Even dormant attacks that are simply “listening” can be detected, even if the system is behaving normally from the user’s perspective. Integrating with SIEMs and other threat intelligence/management solutions, PFP is completely complimentary to existing cyber security approaches. It has no impact on the performance of monitored systems, and attackers cannot tell they are being monitored. The PFP physics-based solution uses patent pending, advanced signal processing of instantaneous power consumption to derive the internal execution status of the user’s hardware and firmware. When applied to detection of counterfeit chips and hardware Trojans the technology provides 100% test and verification of supplier components, quickly and efficiently. Address Website Products/Services Offered
|
1234 |
PFU, a Fujitsu Company PFU, a Fujitsu company, is a $1.2 billion global enterprise that designs, develops, manufactures, sells and maintains network security solutions, computer hardware, peripheral products, enterprise software and systems. Address Website Products/Services Offered
|
367 |
PhishMe, Inc. PhishMe® is the leading provider of threat management for organizations concerned about human susceptibility to advanced targeted attacks. PhishMe’s intelligence-driven solutions empower employees to be an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. Our open approach ensures that PhishMe integrates easily into the security technology stack, delivering measurable results to help inform and adapt an organization’s security programs. PhishMe’s customers include the defense industrial base, energy, financial services, healthcare, and manufacturing industries, as well as other Global 1000 entities that understand changing user security behavior will improve security, aid incident response, and reduce the risk of compromise Address Website Products/Services Offered
|
118 |
Prevoty Prevoty has developed a new application security capability that enables applications to be both monitored and protected at runtime. Applications can be easily instrumented to call Prevoty’s security engine without requiring any changes to the applications themselves, enabling instant application threat visibility and rapid reduction in backlog vulnerabilities. Address Website Products/Services Offered
|
966 |
PricewaterhouseCoopers PwC's Cybersecurity & Privacy team consists of highly trained and specialized consultants and industry veterans with experience helping global businesses across industries assess, design, deploy and operate cybersecurity programs. We provide a comprehensive range of integrated services that help clients protect the assets most critical to your shareholder value. Address Website Products/Services Offered
|
CZ4 |
Proofpoint, Inc. Proofpoint, Inc. (NASDAQ:PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance and secure communications. Organizations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information. proofpoint.com Address Website |
1111 |
ProtectWise ProtectWise™ is disrupting network security with its Cloud Network DVR, a virtual camera in the cloud that records everything on the network. The service allows security professionals to see threats in real time and continuously goes back in time to discover previously unknown threats automatically. ProtectWise harnesses the power of the cloud to provide complete visibility and detection of enterprise threats and accelerated incident response. The Cloud Network DVR delivers an unlimited retention window with full-fidelity forensic capacity, the industry’s only automated smart retrospection, advanced security visualization, and the ease and cost-savings of an on-demand deployment model. ProtectWise is led by a team of security SaaS industry veterans from McAfee, IBM, Mandiant and Proofpoint. Address Website Products/Services Offered
|
1221 |
Protiviti About Protiviti Protiviti (www.protiviti.com) is a global consulting firm that helps companies solve problems in finance, technology, operations, governance, risk and internal audit, and has served more than 60 percent of Fortune 1000® and 35 percent of Fortune Global 500® companies. Protiviti and our independently owned Member Firms serve clients through a network of more than 70 locations in over 20 countries. We also work with smaller, growing companies, including those looking to go public, as well as with government agencies. Named one of the 2015 Fortune 100 Best Companies to Work For®, Protiviti is a wholly owned subsidiary of Robert Half (NYSE: RHI). Founded in 1948, Robert Half is a member of the S&P 500 index. Address Website Products/Services Offered
|
160 |
PuriFile PuriFile is a Data Loss Prevention (DLP) suite of software tools designed to inspect and sanitize your most sensitive data and keep it where it belongs, INSIDE your organization. Produced and supported by Harris Corporation, PuriFile has the backing of a well-known leader in the information assurance marketplace. Address Website Products/Services Offered
|
1246 |
Pwnie Express Pwnie Express is the leading provider of network security assessment solutions for remote locations and wireless. Enterprises and government organizations worldwide rely on Pwnie Express’s products for asset discovery, vulnerability assessment, and drop-box penetration testing and obtain insight into their distributed network infrastructure. Pwnie Express devices leverage open source tools. Address Website Products/Services Offered
|
IC1 |
Pwnie Express Pwnie Express is the leading provider of network security assessment solutions for remote locations and wireless. Enterprises and government organizations worldwide rely on Pwnie Express’s products for asset discovery, vulnerability assessment, and drop-box penetration testing and obtain insight into their distributed network infrastructure. Pwnie Express devices leverage open source tools. Address Website |
BMR217 |
Qualys Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud security and compliance solutions with over 7,700 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100.The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, Accuvant, BT, Cognizant Technology Solutions, Dell SecureWorks, Fujitsu, HCL Comnet, InfoSys, NTT, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA). Address Website Products/Services Offered
|
211 |
Radware Radware (NASDAQ: RDWR), is a global leader of application delivery and application security solutions for virtual and cloud data centers. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility. Radware's solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down. For more information, please visit www.radware.com. Address Website Products/Services Offered
|
254 |
Rapid7 Rapid7 cybersecurity analytics software and services reduce threat exposure and detect compromise for 3,500 organizations across 78 countries, including 30% of the Fortune 1000. We strengthen your ability to manage risk, stop attacks faster, and systematically advance your security program with comprehensive real-time data collection, advanced correlation, and insight into attacker techniques. With our innovative technology and trusted expertise you’re prepared for everything from drive-by attacks to advanced threats, from the endpoint to the cloud. Address Website |
541 |
Raytheon | Websense Raytheon Cyber Products and its SureView suite of cybersecurity solutions deliver end-to-end visibility that allows organizations to detect, contain, and control cyber threats. This broad portfolio of technologies addresses a comprehensive set of cybersecurity challenges by delivering tools that not only identify threats but also provide the insight and context of the threat necessary to enable rapid decision making and action. The SureView suite combines analytics, insider threat detection, and advanced threat protection to deliver enterprise visibility and understanding of an organization’s threat landscape required to manage risk. SureView Insider Threat protects intellectual property, aids in fraud investigations, ensures compliance and enables organizations to avoid liabilities, fines, penalties, and brand damage associated with insider data breaches. SureView Threat Protection monitors, detects, and mitigates threats in near real time, minimizing disruptions and protecting business assets. SureView Memory Integrity monitors and detects evidence of compromise in Linux systems using memory forensics to assess the true state of a system and verifying the integrity of the kernel and process executables. SureView Analytics is an enterprise search and visual analytics solution that optimizes actionable intelligence development to speed incident response to threats, fraud, criminal activity and counterterrorism. The products within the SureView suite operate independently while also seamlessly integrating to provide a full spectrum of enterprise security. By leveraging Raytheon’s deep cyber expertise, research and development resources, and experience protecting some of the world’s most critical systems, Raytheon Cyber Products bridges the gap between defense-grade and enterprise cybersecurity. For more information, visit us at http://raytheoncyber.com. Address Website Products/Services Offered
|
711 |
Raytheon | Websense Websense enables organizations to prevent data theft while they innovate and grow in an age of disruptive change. In 2014 alone, Websense detected 4 billion security events. With an average of 3 updates a second; our customers trust in us to protect them from a rapidly changing threat landscape. Address Website Products/Services Offered
|
741 |
Recorded Future Recorded Future arms you with real-time threat intelligence so you can proactively defend your organization against cyber attacks. With billions of indexed facts, and more added every day, our patented Web Intelligence Engine continuously analyzes the open Web to give you unmatched insight into emerging threats. Recorded Future helps protect four of the top five companies in the world. To learn more, stop by our booth for a live demo or visit www.recordedfuture.com. Address Website |
564 |
RedVector RedVector is a brand of Glimmerglass Cyber Solutions dedicated to Enterprise network security. Using network metadata, RedVector provides full visibility of months of traffic with substantially less storage cost and network complexity. RedVector listens to everything that traverses your network and discovers advanced persistent threats targeting Enterprise and Government organizations. Address Website Products/Services Offered
|
BMR312 |
ReversingLabs ReversingLabs delivers industry leading file analysis tools that drastically accelerate and broaden security analysts' ability to detect new threats, respond to incidents, find hidden information and verify software integrity. TitaniumCore™ is the world's fastest and most comprehensive tool for automated static decomposition of files. The engine automatically extracts all contained objects and their internal information from a sample and stores them in a database for further analysis. A single server can process 100,000 samples daily. TitaniumCloud™ service provides internal information and virus scanning results for over 1Billion goodware and malware files. Samples are scanned twice daily with 27 anti-virus products and the history is stored in the TiCloud database. ReversingLabs products reduce analysis tasks from days to seconds, enabling analysts to respond quicker and cover more potential threats. Our customers include antivirus vendors, security vendors, government agencies, and commercial enterprises across the globe. Visit us at: reversinglabs.com Address Website |
553 |
Risk I/O Risk I/O is a vulnerability threat management platform that processes external Internet breach and exploit data with vulnerability scan data to monitor, measure and prioritize remediation across an IT environment. As a result, organizations know their likelihood of experiencing a breach and what vulnerabilities pose the greatest risk. Address Website Products/Services Offered
|
IC20 IC30 |
RiskIQ RiskIQ provides organizations the visibility and intelligence they need to secure their Digital Footprint. Using a global proxy network and virtual user technology, RiskIQ continuously discovers and creates an inventory of managed, unmanaged and rogue web and mobile assets. This “Digital Footprint” is persistently scanned for anomalies, external threats, malvertisements and brand impersonation. Leading financial institutions, insurance providers and consumer as well as B2B brands use RiskIQ to protect themselves and their users from code level threats, malware and fraud. RiskIQ is headquartered in San Francisco and backed by growth equity firms Summit Partners and Battery Ventures. To learn more about RiskIQ, visit www.riskiq.com. Address Website Products/Services Offered
|
265 |
RiskSense, Inc. Address Website |
IC6 |
RSA Everyday, and for over 30 years, RSA’s singular mission has been to help our more than 30,000 customers around the world protect their most valuable digital assets. RSA is driven by its uncompromising belief that organizations should not have to accept getting breached or hacked as an unavoidable consequence of operating in a digital world. In fact, RSA believes that organizations must become aggressive defenders of their right to operate securely and that no other company is in a better position to help them. RSA’s Intelligence Driven Security solutions help organizations reduce this risk. Through visibility, analysis, and action, RSA solutions give customers the ability to detect, investigate and respond to advanced threats; confirm and manage identities; and ultimately, prevent IP theft, fraud and cybercrime. With Intelligence Driven Security, organizations no longer have to take a “wait and let’s see what happens” approach to security. For more information on RSA, please visit www.rsa.com. Address Website |
519 |
SafeBreach Address Website |
IC34 |
Saviynt Address Website Products/Services Offered
|
IC13 |
Seculert Seculert’s automated breach detection platform protects global enterprises from the effects of targeted malware infections. Seculert provides unique visibility into how “owned" an organization is by cyber criminals. The Seculert Platform improves the performance and operational efficiency of Security Operations Center teams while complementing traditional breach prevention systems by providing precise and accurate malware infection data. Seculert delivers only persistent malware detection reports that are verified as “true positives” including sufficient forensic data to immediately remediate the infected device(s). Seculert requires no hardware or software, no agents, and no changes to current security workflow processes. Address Website |
154 |
Secunia Secunia is recognized industry-wide as a significant global player, within the IT security ecosystem, in the niche of Software Vulnerability Management. The company’s award-winning portfolio equips corporate and private customers worldwide with Vulnerability Intelligence, Vulnerability Assessment, and automated Security Patch Management tools to manage and control software vulnerabilities across networks and endpoints. Secunia supports the entire Software Vulnerability Management Lifecycle and provides trustworthy software vulnerability intelligence, vulnerability remediation and a reliable technology platform that is easily integrated into customer IT environments. Secunia’s in-house Research Team publishes vulnerability intelligence, renowned for its accuracy, timeliness and comprehensiveness. Vulnerability intelligence is at the core of Secunia’s solutions. Secunia is a supplier to Fortune 500s, Global 2000s and government agencies worldwide. By leveraging Secunia’s Vulnerability Management knowledge and solutions, companies can rapidly handle emerging threats, complex IT security risks, security audits, and compliance audits across industries – all the key components of corporate risk management. Address Website Products/Services Offered
|
1231 |
SecureAuth SecureAuth’s identity and information security solutions deliver innovative access control for cloud, mobile, web and legacy systems. Our customer-first approach is combined with outside the box thinking and standards based development. This ensures we solve even your toughest access control problems with solutions that are quick to deploy, easy to integrate with your existing infrastructure and deliver exceptional value for your investment. SecureAuth's IdP is just what the name implies, an identity provider, and a unique approach to securing user access control. In a world where control of the device, application, and even the infrastructure is moving out of the datacenter, an IdP is the perfect solution to ensure you maintain secure control of user access to your resources and data, whether in the cloud, on the web, via a mobile device or through VPN. With two-factor authentication and single sign-on in one solution, SecureAuth IdP makes deploying secure user access control for all your application resources a snap! And with advanced features such as adaptive authentication to examine the context of each request and user self-service tools, for self-enrollment and password resets, SecureAuth IdP improves security while also reducing user friction and lowering help desk costs. Address Website |
665 |
Securonix Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account, and system behavior Securonix is able to automatically and accurately detect the most advanced data security, insider threats and fraud attacks. Globally customers are using Securonix to address the most basic and complex needs around threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring, and access risk management. For more information visit securonix.com. Address Website Products/Services Offered
|
146 |
Shape Security Shape Security is a startup in Mountain View, California that has created a completely new approach to website defense. Its flagship product, the ShapeShifter, is the world’s first botwall: an advanced technology that disables the attack capability of malware, botnets, and scripts. This results in a comprehensive defense against the most serious website breaches, for which there are no other existing solutions. Shape is backed by top investors including Kleiner Perkins, Venrock, Norwest, Google Ventures, and Eric Schmidt. It is led by cybersecurity leaders from the Pentagon, Cisco, Oakley Networks, McAfee, and Google. Address Website Products/Services Offered
|
558 |
Skybox Security Skybox Security provides powerful risk analytics that give security teams the intelligence needed to eliminate attack vectors, respond to threats and improve security processes. Our solutions are used for enterprise-scale vulnerability and threat management, firewall management and compliance monitoring. Address Website |
364 |
Snapchat Snapchat is a fast, fun, ephemeral storytelling platform. Millions of people use Snapchat every day to stay in touch with family and friends, and to express themselves using creative tools that make sharing moments more personal. Address Website Products/Services Offered
|
CZ1 |
SOLARFLARE Solarflare is the leading provider of application-intelligent networking I/O software and hardware that accelerate, monitor and secure network data. The firm recently introduced SolarSecureTM, SolarCaptureTM and Capture SolarSystemTM. These applications are deployed on Solarflare’s FlareonTM 10/40GbE adapter platform and empower the enterprise with the technical sophistication necessary to effectively capture, identify and block malicious traffic before it penetrates the operating system or applications on network servers and enforce policies, all without requiring any additional hardware With over 1,400 customers worldwide, the company's solutions are widely used in scale-out server environments such as electronic trading, high performance computing, cloud, CDN, virtualization and big data. Solarflare’s products are available from leading distributors and value-added resellers, as well as from Dell, HP and IBM. Solarflare is headquartered in Irvine, California, and operates R&D facilities in Cambridge, UK and New Delhi, India. Address Website |
152 |
SOPHOS We help organizations keep data safe and block the growing number of complex threats. We protect everywhere and offer complete security with our full range of endpoint, encryption, email, web, network security and UTM products. We help customers protect their businesses and meet compliance needs. And all our customers benefit from the expertise of our threat analysts located around the world. Their research is at the heart of everything we do. They quickly find the latest threats and update protection for our customers automatically. Plus, our support engineers are experts on all our products, and they're available whenever you need them. We make our products easy to install and use so you spend less time managing security. With Sophos you can focus on the needs of your business because we're securing your entire organization. www.sophos.com Address Website Products/Services Offered
|
452 |
Splunk Splunk Inc. (NASDAQ: SPLK) provides the leading software platform for real-time Operational Intelligence. Splunk® software and cloud services enable organizations to search, monitor, analyze and visualize machine-generated big data coming from websites, applications, servers, networks, sensors and mobile devices. More than 9,000 enterprises, government agencies, universities and service providers in over 100 countries use Splunk software to deepen business and customer understanding, mitigate cybersecurity risk, prevent fraud, improve service performance and reduce costs. Splunk products include Splunk® Enterprise, Splunk Cloud™, Splunk Storm®, Hunk®, Splunk Analytics for Hadoop and premium Splunk Apps. To learn more, please visit http://www.splunk.com/company. Address Website |
347 |
SSH Communications Security Founded in 1995, SSH Communications Security is the company that invented the SSH protocol - the gold standard protocol for data-in-transit security solutions. Today, over 3,000 customers across the globe, including 7 of the Fortune 10, trust our Information Assurance Platform to secure the path to their information assets. Our platform enables businesses of all types and sizes to protect their information assets by: - Developing gold standard data-in-transit security solutions that prevents data loss in both internal and external environments - Delivering hardened perimeter security through our multi-channel two-factor authentication - Providing internal security control management solutions that enables organizations to more easily manage user keys and monitor administrator traffic across your networks Address Website Products/Services Offered
|
931 |
Stroz Friedberg Incident Response, Digital Forensics, and Security Science experts at Stroz Friedberg help organizations defend, respond and advance with certainty. When clients turn to us to assess risks and secure networks, conduct forensic investigations, or counter data breaches, our risk management approach is to SEEK TRUTH that delivers answers and assurance. Address Website |
|
Symantec Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses and governments seeking the freedom to unlock the opportunities technology brings -- anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company, operating one of the largest global data-intelligence networks, has provided leading security, backup and availability solutions for where vital information is stored, accessed and shared. The company's more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2014, it recorded revenues of $6.7 billion. To learn more go to www.symantec.com or connect with Symantec at: http://www.symantec.com/social/. Address Website Products/Services Offered
|
246 |
Synack Synack is a security startup that has created a unique Crowd Security Intelligence™ platform that delivers the most secure, continuous, scalable, security assessment on the market. Through leveraging the best combination of humans and technology, Synack creates a uniquely powerful solution that provides ongoing and on-demand vulnerability intelligence. Synack’s innovative model enables customers to safely engage a private community of the most sought-after and trusted security hackers in the world. The resulting actionable vulnerability intelligence augments internal security teams with unparalleled scale and diversity and enables business leaders to make better and faster risk management decisions to better protect their customers and brand. The Synack security-as-a-service offering redefines the traditional static, signature-based model of security testing by providing a proactive, adversarial perspective of the enterprise IT environment. Synack was founded in 2013 by security experts Jay Kaplan, CEO, and Dr. Mark Kuhr, CTO. For more information, visit www.synack.com. Address Website |
559 |
Synopsys Synopsys, Inc. (Nasdaq:SNPS) is the Silicon to Software™ partner for innovative companies developing the electronic products and software applications we rely on every day. As the world's 15th largest software company, Synopsys has a long history of being a global leader in electronic design automation (EDA) and semiconductor IP, and is also a leader in software quality and security testing with its Coverity® solutions. Whether you're a system-on-chip (SoC) designer creating advanced semiconductors, or a software developer writing applications that require the highest quality and security, Synopsys has the solutions needed to deliver innovative, high-quality, secure products. Learn more at www.synopsys.com. Address Website Products/Services Offered
|
652 |
Tanium Tanium gives the world’s largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise within seconds. Serving as the “central nervous system” for enterprises, Tanium empowers security and IT operations teams to ask questions about the state of every endpoint across the enterprise in plain English, retrieve data on their current state and execute change as necessary, all within seconds. With the unprecedented speed, scale and simplicity of Tanium, organizations now have complete and accurate information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of cost efficiency in IT operations. Visit us at www.tanium.com or follow us on Twitter at @Tanium. Address Website Products/Services Offered
|
1248 |
TeleSign TeleSign is the leader in Mobile Identity solutions, helping customers secure more than 3.5 billion end user accounts worldwide and prevent registration fraud, while improving user experience and managing support costs. TeleSign delivers account security and fraud prevention with two-factor authentication based on each user’s Mobile Identity (phone number, device and behavior) and driven by real-time, global intelligence, including reputation scoring and device data. TeleSign solutions address the full spectrum of account security – registration, access, usage and recovery – while it also streamlines user experience to help increase adoption, retention and trust. TeleSign prevents registration fraud, stops account takeovers and securely authenticates end users via SMS, voice and mobile app. Address Website Products/Services Offered
|
1217 |
Tenable Network Security Tenable Network Security: The Leader in Continuous Network Monitoring Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Our family of products includes SecurityCenter Continuous View™, which provides the most comprehensive and integrated view of network health, and Nessus® the global standard in detecting and assessing network data. Tenable is relied upon by more than 20,000 organizations, including the entire U.S. Department of Defense and many of the world's largest companies and governments. We offer customers peace of mind thanks to the largest install base, the best expertise, and the ability to identify their biggest threats and enable them to respond quickly. For more information, please visit tenable.com. Address Website |
419 |
The Media Trust The Media Trust is the global leader in monitoring and protecting the online and mobile ecosystem. By monitoring digital properties from the user’s perspective, The Media Trust provides website security via comprehensive detection and alerting services to protect against malware, site performance issues and data leakage. Leveraging a physical presence in 65 countries, The Media Trust monitors the source code, advertising, domains, cookies, third parties and other activities executing on public-facing websites and mobile applications, and recognizes when things aren't right — redirected browsers, infected ads, hijacked third-party vendor code, leaked first-party visitor data, digital defacement, etc. The Company also provides ad campaign quality automation technology, verifying online ad campaigns and enabling comprehensive quality assurance. More than 500 publishers, ad networks, exchanges, agencies and corporate rely on The Media Trust’s comprehensive suite of detection and alerting services to protect their website, their revenue and, most importantly, their brand. Address Website Products/Services Offered
|
1240 |
ThreatConnect ThreatConnect, Inc. provides industry-leading advanced threat intelligence software and services including ThreatConnect®, the most comprehensive Threat Intelligence Platform (TIP) on the market. ThreatConnect delivers a single platform in the cloud and on-premises to effectively aggregate, analyze, and act to counter sophisticated cyber-attacks. Leveraging advanced analytics capabilities, ThreatConnect offers a superior understanding of relevant cyber threats to business operations. To register for a free ThreatConnect account, or to learn more about our products and services, visit: www.threatconnect.com. Address Website Products/Services Offered
|
867 |
ThreatStream ThreatStream® provides the leading enterprise class Threat Intelligence Platform, combining comprehensive threat data collection, prioritization, and analytics with secure collaboration in a vetted community. Offering the broadest enterprise security infrastructure integration available, ThreatStream enables organizations to proactively identify and combat cyber threats targeting their operations. Address Website Products/Services Offered
|
765 |
ThreatTrack Security, Inc. ThreatTrack specializes in helping organizations identify and stop Advanced Persistent Threats (APTs), targeted attacks and other sophisticated malware designed to evade the traditional cyber-defenses deployed by businesses, enterprises and government agencies around the world. ThreatTrack develops advanced cybersecurity solutions that analyze, detect and remediate the latest malicious threats. Address Website Products/Services Offered
|
747 |
Thycotic Software Thycotic IT security and password management solutions empower companies to remove the complexities associated with proper access control and management of privileged accounts. An Inc. 5000 company, Thycotic is recognized as the fastest growing, privately held privileged management provider in the USA. Secret Server privileged account management vaults, manages and audits privileged accounts across a company’s entire IT infrastructure. Thycotic also provides end-user password management and self-service AD group management tools. Rated #1 in customer satisfaction and trusted by more than 3,000 organizations worldwide – including members of the Fortune 500, enterprises, government agencies, technology firms, universities, non-profits, and managed service providers. Address Website Products/Services Offered
|
659 |
TrapX Security TrapX Security is a leader in the delivery of deception based cyber security defense. Our solutions rapidly detect, analyze and defend against new zero day and APT attacks in real-time. DeceptionGrid™ provides automated, highly accurate insight into malware and malicious activity unseen by other types of cyber defense. We enable a pro-active security posture, fundamentally changing the economics of cyber defense by shifting the cost to the attacker. The TrapX Security customer base includes global 2000 commercial and government customers around the world in sectors including defense, healthcare, finance, energy, consumer products and other key industries. Address Website Products/Services Offered
|
161 |
Trend Micro Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Our solutions for consumers, businesses and governments provide layered content security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative technology that is simple to deploy and manage, and security that fits an evolving ecosystem. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™, and are supported by over 1,200 threat experts around the globe. For more information, visit www.trendmicro.com. Address Website Products/Services Offered
|
758 |
Tripwire Tripwire is a leading global provider of advanced threat, security and compliance solutions, enabling enterprises, government agencies and service providers to effectively connect security to their business. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence. Together these solutions deliver unprecedented visibility, along with business context and security business intelligence necessary to protect sensitive data in extended enterprises from breaches, vulnerabilities, and threats. Address Website |
141 |
TrustWave Trustwave helps businesses fight cybercrime, protect data and reduce security risks. With cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, Trustwave enables businesses to transform the way they manage their information security and compliance programs while safely embracing business imperatives including big data, BYOD and social media. More than 2.5 million businesses are enrolled in the Trustwave TrustKeeper® cloud platform, through which Trustwave delivers automated, efficient and cost-effective data protection, risk management and threat intelligence. Trustwave is a privately held company, headquartered in Chicago, with customers in 96 countries. For more information about Trustwave, visit www.trustwave.com. Address Website Products/Services Offered
|
247 |
Twistlock Twistlock provides a comprehensive security solution for containerized computing, across all phases of the dev lifecycle and across all the landscapes your containers run. Address Website Products/Services Offered
|
IC24 |
Twitter Twitter is a global platform for public self-expression and conversation in real time. By developing a fundamentally new way for people to consume, create, distribute and discover content, Twitter enables any voice to echo around the world instantly and unfiltered. Twitter has more than 288 million monthly active users. Address Website |
|
UMUC University of Maryland University College (UMUC) offers undergraduate and graduate degrees and certificates in cybersecurity, cybersecurity policy information assurance, computer networks and security, and digital forensics and cyber investigation. Located near the nation's capital, UMUC is one of the largest public universities in the United States. UMUC has been designated as a National Center of Academic Excellence for Information Assurance Education by NSA/DHS. To learn more, visit www.umuc.edu/spotlight/cybersecurity.cfm Address Website |
565 |
Vectra Networks Vectra Networks is the leading innovator in real-time detection of in-progress cyber attacks. The Vectra X-series breach detection platform continuously monitors network traffic to automatically detect any phase of an ongoing cyber attack. The platform provides visually intuitive reports of hosts under attack and context about what the attacker is doing. Vectra automatically prioritizes attacks that pose the greatest business risk, enabling organizations to quickly make decisions on where to focus their time and resources. Vectra Networks’ investors include Khosla Ventures, Accel Partners, IA Ventures and AME Cloud Ventures. The company’s headquarters are in San Jose, Calif. Visit www.vectranetworks.com for more information. Address Website Products/Services Offered
|
159 |
Venafi, Inc. Venafi is the market leading cybersecurity company in Next Generation Trust Protection (NGTP). As a Gartner-recognized Cool Vendor, Venafi delivered the first trust protection platform to secure cryptographic keys and digital certificates that every business and government depend on for secure communications, commerce, computing, and mobility. As part of an enterprise infrastructure protection strategy, Venafi Director prevents attacks on trust with automated discovery and intelligent policy enforcement, detects and reports on anomalous activity and increased threats, and remediates errors and attacks by automatically replacing keys and certificates. Venafi Threat Center provides research and threat intelligence for trust-based attacks. Venafi customers are among the world’s most demanding, security-conscious Global 2000 organizations in financial services, insurance, high tech, telecommunications, aerospace, healthcare and retail. Venafi is backed by top-tier venture capital funds, including Foundation Capital, Pelion Venture Partners and Origin Partners. For more information, visit Venafi.com. Address Website |
731 |
Veracode The rise of the digital economy means the world runs on applications. As a result, every company is becoming a software company – regardless of what their primary business is. These enterprises are rapidly producing web, mobile and cloud applications in order to keep up with the pace of innovation. And in order to innovate even faster, they are using agile development processes, reusing open source libraries and components and purchasing software from third-party providers. These programs have helped speed the pace of innovation. But the faster enterprises build, buy and borrow software, the more risk is introduced into the organization. Veracode’s powerful cloud-based platform, deep security expertise and systematic, policy-based approach provide enterprises with a simpler and more scalable way to reduce application-layer risk across their global software infrastructures. Veracode is a leader in securing web, mobile and third-party applications for the world’s largest global enterprises. The company’s automated, cloud-based service enables the rapid detection and remediation of critical vulnerabilities in all of an enterprise’s applications – not just a small subset. By enabling enterprises to rapidly identify and remediate application-layer threats before cyberattackers can exploit them, Veracode helps enterprises speed their innovations to market – without compromising security. Veracode serves hundreds of customers across a wide range of industries, including nearly one-third of the Fortune 100, three of the top four U.S. commercial banks and more than 20 of Forbes’ 100 Most Valuable Brands. Learn more at www.veracode.com, on the Veracode blog and on Twitter Address Website Products/Services Offered
|
1035 |
Verisign Verisign Security Services protect revenue and brands by securing online services. Verisign provides a portfolio of cloud-based security services supported by industry leading security intelligence. Our DDoS Protection, Managed & Recursive DNS and DNS Firewall services are designed to secure and protect online applications and networks. Verisign iDefense provides actionable security intelligence to support decision making within organizations. Verisign, having maintained 100 percent operational accuracy and stability of its own DNS infrastructure for .COM and .NET for more than 17 years, has unmatched experience in protecting critical Internet infrastructure, and is entrusted by leading organizations to protect their businesses. Address Website Products/Services Offered
|
941 |
Viewfinity Viewfinity's advanced endpoint protection solution focuses on lessening the impact of IT security breaches before, during and after an attack. Our core capabilities reduce the attack surface and proactively prevent advanced persistent threats by removing administrative rights and monitoring and classifying applications. Suspect software is cross-referenced with network security sandboxes and cloud databases to accelerate detection, incident response and remediation efforts. Follow-up threat investigations are pinpoint accurate due to our ancestry tracking forensics that trace back to the origin of an attack. Viewfinity has a unique remediation differentiator in its ability to locate all instances of software related to an attack and block from further execution and propagation on endpoints. For more information, visit www.viewfinity.com. Address Website Products/Services Offered
|
764 |
Vormetric, Inc. Vormetric (@Vormetric) is the industry leader in data security solutions that protect data-at-rest across physical, big data and cloud environments. Vormetric helps over 1500 customers, including 17 of the Fortune 30, to meet compliance requirements and protect what matters — their sensitive data — from both internal and external threats. The company’s scalable Vormetric Data Security Platform protects any file, any database and any application’s data —anywhere it resides — with a high performance, market-leading solution set. Address Website Products/Services Offered
|
153 |
vThreat vThreat simulates attacker techniques, tactics, and procedures to help organizations improve cyber readiness. Address Website |
IC26 |
Wallarm Wallarm is next generation web security solution designed to protect online businesses from application-level attacks. It organically combines vulnerability detection with web application firewall (WAF). Its key features include blocking of 0days attacks with behavioural analytics and machine learning, vulnerability detection, low false positives and resistance to spam in the interface. Wallarm provides rich vertical/horizontal scaling options to protect extremely loaded applications with a very low-performance degradation. Due to integration with popular bug trackers it's a perfect way to automate secure development life-cycle (SDL) and continuous integration (CI). Wallarm is developed on top of NGINX, an increasingly popular high-performance web server and load balancer used by 35% of the busiest 1000 websites. It targets clients with high loaded web projects in e-commerce, SaaS/ PaaS, big data, news media, communication and online payments markets. Address Website Products/Services Offered
|
667 |
Webroot Webroot leverages the power of collective threat intelligence to secure enterprises, small businesses and consumers against advanced malware and other cyber-attacks with its SecureAnywhere® endpoint, mobile and web security solutions and BrightCloud® Threat Intelligence services. Using sophisticated, cloud-based threat analysis, machine learning, and data correlation, Webroot is one of the most innovative technology providers in the security industry, and has been identified in recent Gartner and 451 Research reports as a company to watch. Webroot SecureAnywhere® Business Endpoint Protection has revolutionized the way businesses protect endpoints against advanced malware and advanced persistent threats (APTs), having grown to protect over 10 million devices globally in just 3 years. Its cloud-based behavioral analysis, lightweight agent, and unique journaling and rollback remediation have made it a leading choice for enterprises struggling with endpoint infections. Webroot BrightCloud® Threat Intelligence has been the preferred choice of security solution providers for years. Webroot protects over 20 million users though integration into products from Palo Alto Networks, Cisco, RSA, HP McAfee and F5, and nearly 30 other leaders in the security market. Webroot also offers this market-leading threat intelligence directly to enterprises for integration into their NGFW and SIEM environments to detect more attacks at the perimeter and identify potential breaches sooner. Static signature and list-based security can be slow, ineffective, and consume processing power. Smarter cybersecurity solutions from Webroot leverage the Webroot® Intelligence Network (WIN), an advanced cloud-based threat analysis platform, which provides highly accurate, real-time protection without the customary management complexity and slow performance that can disrupt your business. This next-generation architecture is enhanced by advanced machine learning and correlation analysis which not only stops known threats, but can predict potential future threats, even if they have never been seen before. This self-learning network continuously scans the internet and incorporates inputs from millions of real-world endpoints and global sensor arrays, leaving nowhere for threats to hide. Using behavioral and contextual analysis, threats are identified in milliseconds. This data is then available to all Webroot-connected devices in real time, including Webroot partners through BrightCloud Threat Intelligence Services. WIN features limitless scale, lightning-fast data processing, and a globally distributed database cluster for high performance and resilience. Webroot was once again named a Visionary in Gartner’s Magic Quadrant for Endpoint Protection Platforms, and received the highest customer satisfaction scores of any vendor in the Magic Quadrant comparison. Further, Webroot’s anti-fraud and mobile security technologies have been incorporated by leading banks including HSBC, Ally, Citi, Barclay’s and Garanti to protect their customers against online account fraud. Traditional security wastes time, money, processing power, and fails to protect. It’s time for smarter cybersecurity. Learn more at www.webroot.com. Address Website Products/Services Offered
|
911 |
whiteCryption whiteCryption is a leading provider of software code protection and white-box cryptography products. whiteCryption supplies its patented technologies to the world's leading software, hardware, and content companies in the Entertainment, Automotive and Finance Industry. Address Website Products/Services Offered
|
IC8 |
WhiteHat Security Founded in 2001 and headquartered in Santa Clara, California, WhiteHat Security is the leader in application security, enabling businesses to protect critical data, ensure compliance, and manage risk. WhiteHat is different because we approach application security through the eyes of the attacker. Through a combination of technology, more than a decade of intelligence metrics, and the judgment of real people, WhiteHat Security provides complete web security at a scale and accuracy unmatched in the industry. WhiteHat Sentinel, the company’s flagship product line, currently manages tens of thousands of websites – including sites in highly regulated industries, such as top e-commerce, financial services, and healthcare companies. For more information on WhiteHat Security, please visit www.whitehatsec.com. Address Website Products/Services Offered
|
1011 |
Whitewood Encryption Systems Whitewood Encryption Systems, Inc. builds next-generation systems of data encryption that leverage advanced cryptography technologies emerging from U.S. centers of research excellence. These systems will provide defenders with enhanced security through scalable, cost-effective and low-latency solutions. The company’s initial products will be founded upon technologies created at Los Alamos National Laboratory, backed by nearly two decades of research and representing $10s of millions of federal funding. Whitewood’s advisory group includes Richard Clarke of Good Harbor Consulting, Dr. Bob Brammer (former Northrop Grumman CTO), and Bruce Potter (Shmoo Group, Ponte Technologies). Whitewood is a portfolio company of Allied Minds Federal Innovations, the division of Allied Minds dedicated to commercializing federal intellectual property. Address Website Products/Services Offered
|
967 |
WolfSSL wolfSSL, founded in 2004, is an open source Internet security company with products including the wolfSSL embedded SSL library, wolfCrypt crypto engine and wolfCrypt FIPS 140-2. Primary users are programmers building security functionality into applications, devices, and cloud services. wolfSSL employs the dual licensing model, offering products under both the GPLv2 as well as a standard commercial license. wolfSSL's products are designed to offer optimal embedded performance, rapid integration into existing applications and platforms, the ability to leverage a wide range of hardware crypto solutions, and support for the most current standards. All products are designed for ease-of-use with clean APIs, and are backed by a dedicated and responsive support and development team. Address Website Products/Services Offered
|
464 |
Women's Society of Cyberjutsu The Women’s Society of Cyberjutsu (WSC) is a one of the fastest growing nonprofits dedicated to women in cybersecurity. The primary mission is to advance women in cybersecurity by providing programs and partnerships that promote networking, education, mentoring, resource-sharing, and opportunities. WSC provides women with the resources and support required to enter and advance as a cybersecurity professional using a holistic approach to develop programs that train women in both the hard technical skills and soft skills - leaving her feeling empowered to succeed. WSC also helps build the pipeline by training girls in technology and cybersecurity via Cyberjutsu Girls Academy. Address Website |
BHB1 |
x.o.ware We're encrypting the net. Address Website Products/Services Offered
|
IC39 |
Yubico Inc As the inventors of the YubiKey®, Yubico sets new world standards for secure login across the Internet. Our unique USB and NFC key offers one-touch strong authentication supporting multiple authentication protocols for all devices and platforms – with no driver or client software needed. With successful enterprise deployments in 140 countries, including 7 of the top 10 Internet companies, Yubico is adding the consumer market to its list of strong authentication converts. Founded in 2007, Yubico is privately held with offices in Palo Alto, Calif., Stockholm, and London. For more information, please visit www.yubico.com. Address Website Products/Services Offered
|
964 |
ZeroFOX Inc. ZeroFOX protects the world’s social media ecosystem and the people and organizations that rely upon it. In an age of constant connectivity and social sharing, users have become the primary target for the adversary. ZeroFOX protects your people where they are most vulnerable by continuously monitoring social platforms for cyber attacks, sensitive information loss, social engineering campaigns, account compromise and fraud. Leveraging cutting edge technology and proven security practices, ZeroFOX provides both targeted protection and global insights into the world of social media threats. Address Website Products/Services Offered
|
1027 |
Ziften Technologies Ziften provides continuous endpoint intelligence that yields unprecedented operational insight and enables organizations to efficiently prevent security exposures and respond to advanced threats. Ziften combines real-time user, device and threat behavior monitoring, analytics and reporting that delivers meaningful information to pinpoint issues, expedite investigations and take corrective action. Address Website Products/Services Offered
|
IC31 |
Zscaler Zscaler protects 12 million employees at 5,000 organizations worldwide against cyberattacks and data breaches. Zscaler’s Security-as-a-Service platform delivers Internet security, APT protection, data loss prevention, SSL decryption, traffic shaping, policy management and threat intelligence, ensuring a safe and productive Internet experience for every user, from any device and any location. Address Website |
847 |