|Booz Allen Hamilton has been at the forefront of strategy and technology consulting for 100 years. Today, the firm provides business and technology solutions to major corporations in the financial services, heath, and energy markets, leveraging capabilities and expertise developed over decades of helping US government clients in the defense, intelligence, and civil markets solve their toughest problems. Booz Allen is headquartered in McLean, Virginia, employs approximately 23,000 people, and had revenue of $5.76 billion for the 12 months ended March 31, 2013. In 2014, Booz Allen celebrates its 100th anniversary year. To learn more, visit www.boozallen.com. (NYSE: BAH)|
EY is a global leader in assurance, tax, transaction and advisory services. The insights and quality services we deliver help build trust and confidence in the capital markets and in economies the world over. We develop outstanding leaders who team to deliver on our promises to all of our stakeholders. In so doing, we play a critical role in building a better working world for our people, for our clients and for our communities.It's how EY makes a difference.
|FireEye® has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection against the next generation of cyber attacks. The FireEye platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors, including Web, email, and files. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time.|
IBM is one of the world's largest information technology companies with over 100 years of leadership in helping institutions innovate. As a recognized security leader, we protect clients from billions of security events each day. Our technologies can help solve the most difficult security issues and enable secure access to people, data, applications and infrastructure. In today's world, data is flowing like water and traditional security solutions are no longer sufficient. IBM’s approach enables a more holistic, comprehensive perspective and can enhance your security maturity. For more details on IBM Security Solutions; visit www.ibm.com/security
|iSIGHT Partners is the leading global provider of cyber threat intelligence. With 200+ experts in 16 countries and expertise in 24 languages, only iSIGHT can deliver the full context and intent of the most damaging threats, enabling security organizations to respond faster, defend proactively, and invest smarter. Find iSIGHT Partners on the web at www.iSIGHTpartners.com or email us at firstname.lastname@example.org.|
RSA, The Security Division of EMC, is the premier provider of intelligence-driven security solutions. RSA helps the world's leading organizations solve their most complex and sensitive security challenges: managing organizational risk, safeguarding mobile access and collaboration, preventing online fraud, and defending against advanced threats.
Combining agile controls for identity assurance, fraud detection, and data protection, robust Security Analytics and industry-leading GRC capabilities, and expert consulting and advisory services, RSA brings visibility and trust to millions of user identities, the data they create, the transactions they perform, and the IT infrastructure they rely on. For more information, please visit www.EMC.com/RSA.
ThreatMetrix builds trust on the Internet by offering market-leading advanced fraud prevention and frictionless context-based security solutions. These solutions authenticate consumer and workforce access to mission critical applications using real-time identity and access analytics that leverage the world’s largest trusted identity network.
ThreatMetrix secures enterprise applications against account takeover, payment fraud, fraudulent account registrations, malware, and data breaches. Underpinning the solution is the ThreatMetrix™ Global Trust Intelligence Network, which analyzes over 500 million monthly transactions and protects more than 160 million active user accounts across 2,500 customers and 10,000 websites.
The ThreatMetrix solution is deployed across a variety of industries, including financial services, enterprise, e-commerce, payments, social networks, government and insurance.
For more information, visit www.threatmetrix.com or call 1-408-200-5755.
|Arxan protects mobile applications from hacker attacks and malware exploits with the world's strongest and most deployed application security products. Arxan's patented Guarding technology is embedded directly into apps to yield self-defending, tamper-proof apps that are resistant to unauthorized code tampering and reverse engineering attacks. Arxan’s multi-operating system approach mitigates risk, such as fraud or data compromise, by ensuring critical security and business logic are hardened from repackaging and redistribution attempts and unauthorized access on untrusted devices. Arxan’s application integrity protection is deployed on over 250 million devices by Fortune 500 organizations in financial services, retail, healthcare, ISV, entertainment and other enterprises.|
BAE Systems Applied Intelligence creates solutions with our clients to protect and enhance the connected world.
We help leading enterprises and government departments to manage multiple threats from digital criminality – whether your goal is to manage cyber security risk, reduce losses from banking or insurance fraud, protect mobile banking, uncover unauthorised trading, prevent tax or healthcare fraud or ensure regulatory compliance.
Our expertise in advanced data acquisition, network analytics, threat intelligence and operations management gives you the ability to derive intelligence from IT network, communications and transactions data to:
Our solutions are delivered securely through multiple deployment options, enabling your organisation to successfully deliver its core mission at lower risk.
Applied Intelligence is part of BAE Systems, a global defence, aerospace and security company with approximately 90,000 employees. Learn more at www.baesystems.com/ai.
BitSight is transforming how companies manage technology risk. BitSight’s global platform measures risk by collecting and analyzing vast amounts of data on security behaviors. With its empirical, data-driven risk assessments, BitSight provides organizations with the insight needed to proactively identify, quantify, and mitigate risk. BitSight was founded in 2011 and is based in Cambridge, MA. Learn more about BitSight at www.bitsighttech.com
Bromium is re-inventing enterprise security with its powerful new technology, micro-virtualization, which was designed to protect businesses from advanced malware, while simultaneously empowering users and delivering unmatched threat intelligence to IT. Unlike traditional security methods, which rely on complex and ineffective detection techniques, Bromium protects against malware from the Web, email or USB devices, by automatically isolating each user-task at the endpoint in a hardware-isolated micro-VM, preventing theft or damage to any enterprise resource. Bromium’s technological innovations have earned the company numerous industry awards including being named as a CNBC Disruptor and a Gartner Cool Vendor for 2013. Bromium counts a rapidly growing set of Fortune 500 companies and government agencies as customers, including NYSE and BlackRock. www.bromium.com
FireMon develops proactive security intelligence solutions for large organizations that deliver continuous control of infrastructure, policy & IT risk. The FireMon Security Intelligence Platform is a massively scalable, high performance foundation for network risk detection, firewall rule base clean-up, change workflow automation, compliance audit preparation and security operations cost reduction. Learn more at www.firemon.com
Today’s organizations are facing the most aggressive threat environment in the history of information technology. Emerging computing trends have greatly increased productivity and business agility—but at the same time, have introduced a host of new risks. Actionable security intelligence is critical to protecting your organization from this rising tide of security threats.
HP is a leading provider of security intelligence and compliance solutions for enterprises that want to mitigate risk and defend against today’s most advanced threats. Based on market-leading products from ArcSight, Atalla, Fortify and TippingPoint, HP Enterprise Security Products enables organizations to take a proactive approach to security, integrating information correlation, application analysis and network-level defense. HP Security Research strengthens this portfolio of solutions through innovative research, delivering actionable security intelligence while providing insight into the future of security and the most critical threats facing organizations today.
More information about HP Enterprise Security Products is available at www.hpenterprisesecurity.com.
|Kaspersky Lab is the world’s largest privately held vendor of endpoint protection solutions and the owner of the most advanced global threat intelligence ecosystem. Kaspersky Lab technologies prevent cyber threats for over 300 million people and 250,000 corporate clients throughout 200 countries and territories. Kaspersky Fraud Prevention combines Kaspersky Lab’s global security intelligence and innovative security technologies – to provide rigorous, multi-layered security for online and mobile transactions that prevent fraud by proactively breaking the fraud lifecycle at its earliest stages and eliminate financial information theft. These solutions minimize impact to the end user experience, enable cross-channel visibility, and provide comprehensive, measurable controls against fraud.|
PhishMe® is the leading provider of phishing mitigation and detection for organizations concerned about human susceptibility to sophisticated cyber attacks. PhishMe's immersive training platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. A data-driven approach ensures that PhishMe integrates easily into the security technology stack, demonstrating measurable results to help inform an organization's security decision making process. PhishMe's customers include the defense industrial base, critical infrastructure, and Global 1,000 entities that understand changing user security behavior will improve security, aid incident response, and reduce the risk of compromise.
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud security and compliance solutions with over 6,700 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The QualysGuard Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and Web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations, including Accuvant, BT, Dell SecureWorks, Fujitsu, NTT, Symantec, Verizon, and Wipro. The company is also a founding member of the CloudSecurityAlliance (CSA).
For more information, please visit www.qualys.com.
|Return Path is the worldwide leader in email threat intelligence. We analyze more data about email than anyone else in the world and use that data to power solutions that protect your brand and customers from the full-spectrum of email-borne threats. Our email brand protection solutions provide financial services organizations with a proactive means of mitigating fraud risk and potential financial loss by providing real-time visibility into all outbound mail activity, blocking malicious email from reaching customers, and forensic data for efficient takedown of malicious sites.|
Founded in 2002, Secunia is a leading provider of IT security solutions that help businesses and private individuals globally manage and control vulnerability threats, risks across their networks, and end-points. This is enabled by Secunia’s award-winning Vulnerability Intelligence, Vulnerability Assessment, and Patch Management solutions that ensure optimal and cost-effective protection of critical information assets.
Secunia plays an important role in the IT security ecosystem, and is the preferred supplier for enterprises and government agencies worldwide, counting Fortune 500 and Global 2000 businesses among its customer base.
|Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account, and system behavior Securonix is able to automatically and accurately detect the most advanced data security, insider threats and fraud attacks. Globally customers are using Securonix to address the most basic and complex needs around threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring, and access risk management. For more information visit www.securonix.com.|
|Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Our solutions for consumers, businesses and governments provide layered content security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative technology that is simple to deploy and manage, and security that fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™, and are supported by over 1,200 threat experts around the globe. For more information, visit www.trendmicro.com.|
Privately held and based in Santa Clara, CA, vArmour Networks is the pioneer of software-defined security (SDSec). vArmour’s SDSec solution brings a scalable, flexible, programmable network security enforcement layer to highly-virtualized computing environments in a way that fits; the security now mirrors the environment, rather than contorting the environment to fit the security.
For more information, visit www.varmour.com.
Veracode delivers the most widely used cloud-based platform for securing web, mobile, legacy and third-party enterprise applications. By identifying critical application-layer threats before cyber-criminals can find and exploit them, Veracode helps enterprises deliver innovation to market faster – without sacrificing security.
Veracode’s powerful cloud-based platform, deep security expertise and programmatic, best practices approach provide enterprises with a simpler, and more scalable way to reduce application-layer risk across their global software infrastructures.
Recognized as a Gartner Magic Quadrant Leader since 2010, Veracode secures hundreds of the world’s largest global enterprises, including 3 of the top 4 banks in the Fortune 100 and 25 of the world’s top 100 brands. Learn more at www.veracode.com, on the Veracode blog, and on Twitter.
|Agari||Agari collects terabytes of email data from email receivers like Gmail and Yahoo! representing 85% of the email inboxes in the U.S., to provide global brands with a cloud-based SaaS solution that eliminates email threats, protects customers and their personal data, and proactively guards brand reputation.Today, Agari has analyzed over a trillion emails, and has blocked over a 2.5 billion malicious messages at a clip of over 200 per second. Founded by the thought leaders behind Cisco’s IronPort solutions, Agari, a recipient of the JPMorgan Chase Hall of Innovation Award, is headquartered in Silicon Valleyand is backed by Alloy Ventures, Battery Ventures, First Round Capital, and Greylock Partners. Learn more at www.agari.com.|
|AirWatch||AirWatch by VMware is the leader in enterprise mobility management, with more than 10,000 global customers. The AirWatch platform includes industry-leading mobile device, email, application, content, and browser management solutions. Organizations can implement these solutions across device types and use cases, including complete EMM for corporate and line of business deployments, and containerized solutions for Bring Your Own Device (BYOD) programs. Acquired by VMware in February 2014, AirWatch is based in Atlanta and can be found online at www.air-watch.com. VMware is headquartered in Silicon Valley and can be found online at www.vmware.com.|
|Arbor Networks||Arbor Networks, Inc. helps secure the world's largest enterprise and service provider networks from DDoS attacks and advanced threats. Arbor is the world's leading provider of DDoS protection in the enterprise, carrier and mobile market segments, according to Infonetics Research. Arbor's advanced threat solutions deliver comprehensive network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor delivers market-leading security analytics for dynamic incident response and forensics. Arbor strives to be a "force multiplier," making network and security teams the experts. Our goal is to provide a richer picture into networks and more security context - so customers can solve problems faster and help reduce the risk to their business.|
|Aspect Security, Inc.||Aspect Security is a consulting firm focusing exclusively on application security ensuring that the software that drives business is protected against hackers. Our engineers validate an average of 5,000,000 lines of critical code per month. We unearth more than 10,000 vulnerabilities every year across a wide range of technologies and architectures. We support a worldwide clientele with critical applications in the government, defense, financial, healthcare, services and retail sectors.|
BioCatch analyzes user interactions in online and mobile applications, providing visibility into a whole new dimension: user behavior. We collect hundreds of behavioral, cognitive and physiological biometric parameters by observing how the user holds and touches a mobile device, interacts with an online site, and responds to subtle challenges.
This allows us to continuously, biometrically authenticate users, detecting when someone else is inside their account. It’s a completely frictionless authentication, and it works equally well on both mobile devices and PCs.
We spot abnormal interactions indicative of criminal behavior, separate between machines and humans, detect Remote Access (RAT) attacks, and identify advanced cyber threats such as Man in the Browser.
Gartner named us a Cool Vendor in their 2013 report and we have installations in US, Canada and Europe showing superb performance. Our team consists of subject matter experts in Cyber, machine learning, cognitive studies and web fraud detection.
|CrowdStrike||CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks. Using big-data technologies, CrowdStrike's next-generation threat protection platform leverages real-time Stateful Execution inspection (SEI) at the endpoint and Machine Learning, in the cloud instead of solely focusing on malware signatures, indicators of compromise, exploits, and vulnerabilities. The CrowdStrike Falcon Platform is a combination of big data technologies and endpoint security driven by advanced threat intelligence. CrowdStrike Falcon enables enterprises to identify unknown malware, detect zero-day threats, pinpoint advanced adversaries and attribution, and prevent damage from targeted attacks in real time.|
|CyberArk||CyberArk is the only security company that proactively stops the most advanced cyber threats – those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to lock down privileged accounts and protect against cyber threats before attacks can escalate and do irreparable business damage. CyberArk is trusted by the world’s leading companies – including 40 of the Fortune 100 – to protect their highest value information assets, infrastructure and applications, while ensuring tight regulatory compliance and audit requirements.|
|GuruCul||GuruCul products will improve risk, threat, and compliance postures by applying an identity centric approach of correlating identity, activity, and access information to provide actionable data and prioritized alerts. GuruCul has developed industry's most advanced patent pending algorithms for risk profiling and analyzing trends, to detect threats and anomalous behavior.|
|Lancope||Lancope, Inc. is a leading provider of network visibility and security intelligence to defend enterprises against today’s top threats. By collecting and analyzing NetFlow, IPFIX and other types of flow data, Lancope’s StealthWatch® System helps organizations detect a wide range of attacks including APTs, DDoS, zero-day malware and insider threats. www.lancope.com|
|NuData Security||NuData Security is a leading innovator in online fraud detection and protection. NuDetect's behavioural analysis is used to detect the use of stolen credentials, identity theft, to reduce bot activity, and improve conversion rates by reducing false positive fraud assessments. nudatasecurity.com|
Radware (NASDAQ: RDWR), is a global leader of application delivery and application security solutions for virtual and cloud data centers. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility. Radware’s solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down. For more information, please visit www.radware.com.
Radware encourages you to join our community and follow us on; LinkedIn, Radware Blog, Twitter, YouTube, Radware Connect app for iPhone® and our new security center DDoSWarriors.com that provides a comprehensive analysis on DDoS attack tools, trends and threats.
|Skyhigh Networks||Skyhigh Networks, the Cloud Visibility and Enablement Company, allows companies to embrace cloud services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, professional services, energy, healthcare, high technology, media and entertainment, manufacturing, and legal verticals, the company was a finalist for the RSA Conference Most Innovative Company award and was recently named a “Cool Vendor” by Gartner, Inc. For more information, visit us at skyhighnetworks.com|
|Splunk Inc.||Splunk Inc. (NASDAQ: SPLK) provides the leading software platform for real-time Operational Intelligence. Splunk® software and cloud services enable organizations to search, monitor, analyze and visualize machine-generated big data coming from websites, applications, servers, networks, sensors and mobile devices. More than 7,000 enterprises, government agencies, universities and service providers in over 90 countries use Splunk software to deepen business and customer understanding, mitigate cybersecurity risk, prevent fraud, improve service performance and reduce costs. Splunk products include Splunk® Enterprise, Splunk Cloud™, Splunk Storm®, Hunk™: Splunk Analytics for Hadoop and premium Splunk Apps. To learn more, please visit www.splunk.com/company.|
Tanium was founded to deliver a new and innovative approach to endpoint management and security that delivers instant visibility and responsiveness that does not slow down as the enterprise environment scales. Tanium is empowering the largest enterprises in the world to gather critical information globally from every endpoint and drive remediating action in seconds, including the distribution of patches, applications, and tools - all from a single server.
In the complex space of enterprise threat detection and response, Tanium provides an accessible and extensible platform for your security team to hunt for advanced persistent threats, complex threat signatures, suspicious network connections, and rogue processes in time frames that are orders of magnitude faster than was ever possible before. The platform has the capability to rapidly search for large volumes of indicators of compromise at enterprise scale. Tanium also integrates with Security Information and Event Monitoring systems as well as big data systems for advanced behavioral analytics and anomaly detection. When a security event inevitably occurs, Tanium is the solution of choice to identify and remediate a targeted breach, malware outbreak, or zero-day attack before it can do serious damage within the enterprise.
|Tripwire, Inc.||Tripwire is a leading global provider of risk-based security and compliance management solutions, enabling enterprises, government agencies and service providers to effectively connect security to their business. Tripwire provides the broadest set of foundational security controls including security configuration management, vulnerability management, file integrity monitoring, log and event management. Tripwire solutions deliver unprecedented visibility, business context and security business intelligence allowing extended enterprises to protect sensitive data from breaches, vulnerabilities, and threats. Learn more at www.tripwire.com or follow us @TripwireInc on Twitter.|
|Triumfant||Triumfant leverages patented analytics to detect, analyze and remediate the malicious attacks that evade traditional endpoint protection solutions such as the Advanced Volatile Threat, Advanced Persistent Threat, zero-day attacks, targeted attacks and rootkits. Triumfant automates the process of building a contextual and surgical remediation that addresses the malware and all of the associated collateral damage. Endpoints go from infection to remediation in five minutes without the need to reboot or re-image. No signatures or prior knowledge of any kind are required to stop the adversary. Triumfant uses these same analytics to continually enforce security configurations and policies, ensuring that organizations start every day with their endpoints secure and audit ready. To learn more about the company go to: http://www.triumfant.com/default.asp or follow Triumfant on Twitter and YouTube.|
|Accenture||Accenture is a global management consulting, technology services and outsourcing company, with approximately 289,000 people serving clients in more than 120 countries. Combining unparalleled experience, comprehensive capabilities across all industries and business functions, and extensive research on the world’s most successful companies, Accenture collaborates with clients to help them become high-performance businesses and governments. The company generated net revenues of US$28.6 billion for the fiscal year ended Aug. 31, 2013. Its home page is www.accenture.com|
|Agiliance||Agiliance, the Big Data Risk Company, is the leading independent provider of integrated solutions for Operational and Security Risk programs. Agiliance is automating how Global 2000 companies and government agencies continuously monitor big data for risks across financial, operations, and IT domains to increase operational efficiency and orchestrate incident, threat, and vulnerability actions in real time. RiskVision customers demonstrate automation use cases within 30 days on-demand, and within 60 days on-premise, made possible by a configurable platform and applications, broad library of technology integrations, and vast domain and regulatory content. RiskVision scales with businesses, effectively managing assets, data, people, and processes to achieve 100 percent risk and compliance coverage. Its real-time risk analysis leads to optimized business performance and better investment decisions. For more information, please visit www.agiliance.com.|
|Authentify, Inc.||Authentify delivers user-centric multi-factor authentication services, (SaaS) employing smart phones, tablets, laptops, feature mobile phones, or landline telephones for out-of-band 2 factor authentication. An Enterprise may choose multiple authentication factors including pki digital certificate, soft-token, digital certificates, voice biometrics, shared secrets and others, minus the deployment effort and overhead associated with deploying MFA.|
|Cigital||Cigital is one of the world’s leading software security products and services companies. We help clients make the software they create or license from third-party vendors more secure. Our expert consultants, innovative product technologies, and effective training courses provide a comprehensive solution to reduce the risk and cost of breaches and non-compliance with a proactive approach to software security. From Architecture Risk Analysis and BSIMM Measurements to Source Code Review and Penetration Testing, Cigital is uniquely qualified to help clients find and fix the security flaws and defects that make software vulnerable to being attacked and exploited.|
CipherCloud, the leader in cloud information protection, enables organizations to securely adopt cloud applications by overcoming data privacy, residency, security, and regulatory compliance risks. CipherCloud delivers an open platform with comprehensive security controls, including AES 256-bit encryption, tokenization, cloud data loss prevention, cloud malware detection and activity monitoring. CipherCloud's ground breaking technology protects sensitive information in real time, before it is sent to the cloud, while preserving application usability and functionality.
CipherCloud has experienced exceptional growth and success with over 2 million business users, more than 250 million customer records, in over 10 industries, and with marquee customers around the globe.
The CipherCloud product portfolio protects popular cloud applications out-of-the-box such as Salesforce, Chatter, Box, Google Gmail, Microsoft Office 365, and Amazon Web Services. Additionally, CipherCloud for Any App and CipherCloud for Databases enable organizations to extend data protection to hundreds of third-party cloud and private cloud applications and databases.
CipherCloud, named as SC Magazine's 2013 Best Product of the Year, is backed by premier venture capital firms Andreessen Horowitz, Index Ventures, and T-Venture, the venture capital arm of Deutsche Telekom. For more information, visit www.ciphercloud.com and follow us on Twitter @ciphercloud.
CounterTack’s real-time endpoint threat detection and response platform, Sentinel, delivers unprecedented visibility and context to enterprise security teams around targeted, persistent threats. CounterTack dramatically reduces the impact of advanced attacks, providing real-time, behavioral-based intelligence on attacker activity upon infiltration, so organizations can defend their business leveraging Sentinel’s contextual evidence for a rapid, prioritized response.
By combining ‘stealthware’ technology and Big Data analytics, CounterTack turns the tables on attackers, giving security teams and incident responders an advantage over their adversaries to make better security decisions with real-time, automated, forensic-level analysis. CounterTack is revolutionizing how companies defend their endpoints – across the enterprise.
|CSC||CSC provides global enterprise-class cybersecurity services that have evolved from over 35 years experience in some of the world's most sophisticated, disparate and challenging environments. CSC offers innovative information security programs for Managed Security Services, Compliance management, Incident Response, Identity and Access Management, Security Consulting, Application Protection, Business Continuity and Disaster Recovery.. visit: http://www.csc.com/cybersecurity|
|Cylance, Inc.||Cylance is the first company to apply artificial intelligence, algorithmic science and machine learning to cyber security and improve the way companies, governments and end users proactively solve the world’s most difficult security problems. Using a breakthrough mathematical process, Cylance quickly and accurately identifies what is safe and what is a threat, not just what’s in a blacklist or whitelist. By coupling sophisticated math and machine learning with a unique understanding of a hacker’s mentality, Cylance provides the technology and services to be truly predictive and preventive against advanced threats. www.cylance.com|
|Cyphort, Inc.||Cyphort is innovative provider of Advanced Threat Protection solutions that deliver a complete defense against current and emerging Advanced Persistent Threats, targeted attacks and zero day vulnerabilities. The Cyphort Platform accurately detects and analyzes next generation malware, providing actionable, contextual intelligence that enables security teams to respond to attacks faster, more effectively, and in as surgical a manner as their attackers. Cyphort's software-based, distributed architecture offers a cost effective, high performance approach to detecting and protecting an organization's virtual, physical and cloud infrastructure against sophisticated attacks. Malware detection for Windows, OSX and Linux allows businesses to extract maximum value from IT assets without compromising the security of an organization. Founded by experts in advanced threats from government intelligence agencies and premier network security companies, Cyphort is a privately held company headquartered in Santa Clara, California. For more information, please visit: www.cyphort.com.|
|DB Networks||DB Networks is innovating behavioral analysis technology in the field of database security. Developed for organizations that need to protect their data from advanced attacks, including Zero-Day attacks, DB Networks offers effective countermeasures against SQL injection attacks. Database attacks happen rapidly – in a matter of minutes – and bypass traditional perimeter security measures. DB Networks’ unique approach uses behavioral analysis technology to automatically learn each application’s proper SQL statement behavior. Any SQL statement dispatched from the application that deviates from the established behavioral model immediately raises an alarm as a possible attack. DB Networks is a privately held company headquartered in San Diego, Calif.|
|Entersekt||Entersekt is an innovator in transaction authentication and mobile app security. Our one-of-a-kind approach harnesses the power of electronic certificate technology with the convenience of mobile phones to provide financial institutions and their customers with full protection from online and mobile banking fraud. With our patented security products authenticating millions of transactions globally, none of our clients have experienced a successful phishing attack on their systems since implementing Entersekt technology. Financial institutions worldwide look to us to strengthen the all-important bond of trust they share with their customers, and to build on those relationships by introducing increasingly innovative mobile and online banking services.|
ForeScout delivers pervasive network security by allowing organizations to continuously monitor and mitigate security exposures and cyberattacks. The company's CounterACT platform dynamically identifies and assesses all network users, endpoints and applications to provide complete visibility, intelligence and policy-based mitigation of security issues. ForeScout’s open ControlFabric technology allows a broad range of IT security products and management systems to share information and automate remediation actions. Because ForeScout’s solutions are easy to deploy, unobtrusive, flexible and scalable, they’ve been chosen by over 1,500 enterprises and government agencies. Headquartered in Campbell, California, ForeScout offers its solutions through its network of authorized partners worldwide.
|Fox-IT||Fox-IT’s is dedicated to making innovative solutions that ensure a more secure society. We develop advanced cybersecurity and cyberdefense solutions for our clients around the world. We have a strong focus on innovation and a tireless dedication to our clients, our values, and our integrity. Fox-IT delivers solutions before, during and after attacks: InTELL provides global visibility into on-line threats. The ability to understand threats is the most effective way for companies to build their defenses. DetACT delivers real-time behavioral analytics to detect attacks and anomalies to on-line channels. DetACT offers intelligence powered detection, scaling infosec and anti-fraud processes. with analytics, channel insight and fraud stopping engines. FoxCERT is our global CERT, investigating breaches and normalizing difficult situations all over the world.|
Guardian Analytics offers behavioral analytics solutions that prevent online and mobile banking fraud, detect fraudulent ACH and wire payments, and detect unauthorized access to Web portals such as Web mail, wealth management, board portals, and merchant accounts.
FraudMAP behavioral analytics solutions provide banks and credit unions with the ability to proactively recognize account takeover, reconnaissance, and fraud setup, and stop fraudulent transactions before the money is gone, regardless of the fraud scheme in play.
For Guardian Analytics’ 300+ customers, FraudMAP is a critical factor in their ability to achieve strategic business objectives, including improved competitiveness, revenue growth, enhanced customer experience and trust, and operational efficiency. By mitigating fraud risks, our customers can offer new and improved services while also decreasing costs stemming from fraud attacks, including direct losses, client churn, damaged reputations, lost productivity, and litigation.
Please stop by our display to see our full suite of behavioral analytics solutions, including FraudMAP Online, FraudMAP Mobile, FraudMAP ACH, FraudMAP Wire, and FraudMAP Access.
|IID||IID is a cybersecurity company that provides the platform to easily exchange cyber threat intelligence between enterprises and governments. Top financial firms, the largest government agencies, and leading e-commerce companies, social networks and ISPs leverage IID to detect and mitigate threats. IID was founded in 1996. The company is headquartered in Tacoma, Washington. For more information about IID, go to www.internetidentity.com.|
|Imperva||Imperva, pioneering the third pillar of enterprise security, fills the gaps in endpoint and network security by directly protecting high-value applications and data assets in physical and virtual data centers. With an integrated security platform built specifically for modern threats, Imperva data center security provides the visibility and control needed to neutralize attack, theft, and fraud from inside and outside the organization, mitigate risk, and streamline compliance. Over 3,000 customers in more than 75 countries rely on our SecureSphere® platform to safeguard their business. Imperva is headquartered in Redwood Shores, California. Learn more: www.imperva.com, our blog, on Twitter.|
|Intellinx Software, Inc.||Intellinx Ltd. is the innovative leader in enterprise fraud management, providing protection from internal and external fraud and data theft committed by legitimate end-users. Intellinx captures application data directly from the corporate network providing a detailed forensic audit trail of all end-users with unparalleled visibility into user activity. Intellinx detects fraud attempts in real-time with powerful analytics based on genuine behavior profiling. The Intellinx suite provides protection against a wide range of threat areas including Employees Fraud, Web Fraud, ATM Fraud, Check Fraud, AML and ACH/ Wire Fraud – all integrated with the Intellinx Enterprise Alert and Case Manager. Intellinx is recognized by Gartner as #1 in two important categories: internal fraud protection and deployment simplicity. The Intellinx patented, agent-less, technology imposes no risk or overhead to the organization and enables seamless compliance with government regulations (including PCI, GLBA, FACTA Red-Flags, Sarbanes-Oxley and Basel II). Intellinx serves over 150 large and medium sized financial, healthcare, government and telecom organizations worldwide.|
Invincea is the market leader in user protection solutions, delivering advanced malware threat detection, breach prevention and forensic threat intelligence. Invincea provides enterprise and small business networks with coverage against the largest attack surface for cyber-breach— attacks aimed at end users in the form of spear phishing, drive-by download exploits, poisoned search results and user-initiated infections.
The company’s solutions include a desktop security software suite and cloud hosted management and threat intelligence service. The solutions offer a unique ability to protect networks against all types of threats directed at end users, including zero-days, by seamlessly moving applications that render untrusted content into controlled, secure virtual containers that automatically detect and terminate threats in real time. Invincea’s platform seamlessly moves the browser, PDF reader and Microsoft Office suite from the native operating system into secure virtualized environments without altering the user experience.
|Lockheed Martin||Lockheed Martin is a global security company that employs approximately 115,000 people worldwide and had net sales of $45.4 billion in 2013. With a focus on offering our customers innovative information technology (IT) solutions, management services, and advanced technologies our Information Systems & Global Solutions (IS&GS) business area is a leading service and IT provider, as well as a dedicated partner to commercial companies and financial institutions. With a solid legacy of delivering world-class solutions and advanced technology across a broad spectrum of commercial, civil, defense and intelligence domains, IS&GS is uniquely positioned to strategically protect corporate America’s competitiveness and critical infrastructure particularly with a focus on cyber security in the financial services industry. www.lockheedmartin.com/us/what-we-do/information-technology/cyber-security.html|
At Message Bus, we believe an email service must do more than simply send messages. Sophisticated enterprises require email solutions that are as secure as their infrastructure, feed into their big data initiative, and increase their customer engagement with zero maintenance from IT. Message Bus meets the challenges of today’s businesses by bringing advanced analytics, anti-fraud protection, and unparalleled consistency to email. By delivering email for the entire organization, including legacy servers, external vendors, and hosted applications, Message Bus transforms email into insight by providing a cross-organization view into customer behavior. Built-in email protection, including the best consumer security protections available like DMARC, protects customers from fraud and spoofing attempts. A dedicated Customer Love team and a flexible service that works with existing systems makes upgrading to Message Bus easy and affordable.
Message Bus: Secure Email that Improves Customer Engagement. Learn more at www.messagebus.com
|MobileIron||The leader in Mobile Device Management software, MobileIron has been chosen by thousands of organizations that are transforming their businesses through Mobile IT. Available as an on-premise or a cloud solution, MobileIron was purpose-built to secure and manage mobile apps, content, and devices for global companies. MobileIron was the first to deliver key innovations such as multi-OS mobile device management (MDM), mobile application management (MAM), and BYOD privacy controls. For more information, please visit www.mobileiron.com.|
|Norse||Norse is the leading innovator in the live threat intelligence security market. With the goal of transforming the traditionally reactive IT security industry, Norse offers proactive, intelligence-based security solutions that enable organizations to identify and defend against the advanced cyberthreats of today and tomorrow. Norse's synchronous, global platform is a patent-pending infrastructure-based technology that continuously collects and analyzes real-time, high-risk Internet traffic to identify the sources of cyber attacks and fraud. Norse is the only provider of live, actionable, cyberthreat intelligence that enables organizations to prevent financial fraud and proactively defend against today's most advanced cyber threats including zero day and advanced persistent threats. Norse has offices in Silicon Valley, St. Louis, and Atlanta. Visit us online at norse-corp.com.|
PhishLabs is the leading provider of cybercrime protection and intelligence services that fight back against online threats and reduce the risk posed by phishing, malware, distributed denial of service (DDoS) and other cyber-attacks. The company fights back against cybercrime by detecting, analyzing and proactively dismantling the systems and illicit services cybercriminals depend on to attack businesses and their customers. With a fixed-fee service model that ensures alignment with client goals, the company partners with businesses to decrease attacks, reduce online fraud and prevent the loss of customer trust.
To learn more about PhishLabs, visit http://www.phishlabs.com or email info[at]phishlabs[dot]com.
|Pindrop Security||Pindrop Security provides solutions to protect enterprise call centers and phone users. Pindrop’s solution combines authentication and anti-fraud detection technology to verify legitimate callers while detecting malicious callers. Pindrop’s unique Phoneprinting™ technology is the first of its kind to analyze and fingerprint individual phone calls, providing the caller’s true location and calling device and matching them to Pindrop’s fraud database. Named SC Magazine 2013 Rookie Security Company of the Year, a Gartner “Cool Vendor” in Enterprise Unified Communications and Network Services for 2012 and one of the 10 Most Innovative Companies at the 2012 RSA conference, Pindrop Security’s solutions restore enterprises’ confidence in the security of phone-based transactions.|
|PwC||PwC US helps organizations and individuals create the value they’re looking for. We’re a member of the PwC network of firms in 158 countries with more than 180,000 people. We’re committed to delivering quality in assurance, tax and advisory services. Tell us what matters to you and find out more by visiting us at www.pwc.com/us|
|Recorded Future||Recorded Future’s patented Temporal Analytics™ Engine mines threat intelligence from the entire open web. Recorded Future continuously surfaces trend signals and leading indicators by harvesting hundreds of thousands of web sources across multiple, crucial languages. Analysts can ask-and-answer questions, understand trends and patterns, and better foresee what lies ahead.|
|RiskIQ||RiskIQ protects corporate brands and their customers on the internet. The company combines a worldwide proxy network with synthetic clients that emulate real users to monitor, detect and take down malicious and copycat apps, drive by malware and malvertisements. RiskIQ is being used by leading financial institutions and brands in the US to protect their web assets and visitors/users from security threats and fraud. RiskIQ is headquartered in San Francisco and is backed by growth equity firm Summit Partners. To learn more about RiskIQ, visit www.riskiq.com.|
|SafeNet, Inc.||SafeNet is a leading global provider of data protection. For over 25 years, Fortune 500 global corporations and government agencies have turned to SafeNet to secure and protect their most valuable data assets and intellectual property. SafeNet’s data-centric approach focuses on the protection of high value information throughout its lifecycle, from the data center to the cloud. More than 25,000 customers across commercial enterprises and government agencies trust SafeNet to protect and control access to sensitive data, manage risk, ensure compliance, and secure virtual and cloud environments.|
|Security Mentor, Inc.||Security Mentor, Inc., pioneer of security awareness training that employees love to take, enables companies in every industry to reduce risk by creating a more secure workforce. Interactive, highly engaging lessons teach critical security skills in an easy-to-understand, fun format. Our Brief, Frequent, Focused™ training model of 10-minute lessons delivered monthly fits employees' busy schedules and keeps security top of mind. Training is served from Security Mentor's Cloud LMS or provided as SCORM-compliant modules. Founded in 2008, Security Mentor has customers ranging from Fortune 500 enterprises to local and state governments, including the State of Michigan. To learn more, take a look at our two-minute introductory video or request a demo at www.securitymentor.com.|
|Sonatype||Sonatype protects the world’s enterprise software from security, compliance and licensing risks, while reducing application development and deployment time. In December of 2013, the FS-ISAC Third Party Software Security Working Group released new controls to manage risk associated with open source libraries and components. These controls recommend financial institutions apply policy management and enforcement as well as inventory management for open source libraries and components used in their application portfolio. With automated governance, monitoring, and alerts, Sonatype Component Lifecycle Management allows enterprises to accurately identify flawed components and proactively fix these components throughout the software development lifecycle. Today’s top financial services organizations rely on Sonatype to select the best components from the start so trustworthy applications also meet release deadlines. To learn more visit, www.sonatype.com.|
|Symantec||Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.|
|Tenable Network Security, Inc.||Tenable Network Security is relied upon by more than 20,000 organizations, including the entire U.S. Department of Defense and many of the world’s largest companies and governments, to stay ahead of emerging vulnerabilities, threats and compliance-related risks. Its solutions continue to set the standard to identify vulnerabilities, prevent attacks and comply with a multitude of regulatory requirements. For more information, please visit www.tenable.com.|
|ThreatGRID||ThreatGRID is the first unified malware analysis and threat intelligence solution that is revolutionizing how organizations use accurate and context-rich intelligence to defend against advanced cyber attacks. ThreatGRID customers include large organizations across a number of verticals such as financial services, government, healthcare, energy, manufacturing and more. ThreatGRID securely crowdsources large volumes of malware and performs advanced analysis in the cloud, to identify key behavioral indicators enabling near real-time remediation. ThreatGRID empowers security teams with continuous real-time threat intelligence, enriched by global and historical context, to prevent future attacks. ThreatGRID’s API simplifies sample submission and intelligence integration with other security products to maximize the effectiveness of existing investments. Founded by entrepreneurs with deep security expertise, ThreatGRID is privately held and is based in New York City. For more information, visit www.threatgrid.com, read our blog, follow us on Twitter @ThreatGRID and LinkedIn.|
|Trusteer||Trusteer, an IBM company, delivers a holistic endpoint cybercrime prevention platform that protects organizations against financial fraud and data breaches. Hundreds of organizations and over a hundred millions users rely on Trusteer to protect their web applications, computers and mobile devices from online threats (such as advanced malware and phishing attacks). With a dedicated, advanced research team, Trusteer’s unique and real-time intelligence enables our cloud-based platform to rapidly adapt to emerging threats.|
|Voltage Security||Voltage Security®, Inc. is the leading data protection provider, delivering secure, scalable, and proven data-centric encryption, tokenization and key management solutions, enabling our customers to effectively combat new and emerging security threats. Our powerful data protection solutions allow any company to seamlessly secure all types of sensitive corporate and customer information, wherever it resides, while efficiently meeting regulatory compliance and privacy requirements.|
|Vorstack Corporation||Vorstack is a venture-backed company founded and staffed by security and legal experts. We offer solutions that provide automation and control over threat and fraud intelligence sharing, resulting in a significant reduction in human resources and earlier identification of relevant threats. The Vorstack solution for financial services is a distributed analytics and correlation platform for multi-party coordinated cyber defense. We provide the control and auditability necessary to satisfy strict domestic and international privacy, anonymity and compliance requirements. Our solution natively operates across emerging threat-sharing standards like STIX/TAXII to enable organizations to leverage public-private partnerships and ISACS to promote intelligence sharing. Vorstack’s solution provides a configurable channel for human intelligence collaboration complementing real-time data intelligence analysis.|
Financial institutions necessitate strong, layered security as they continue to be top targets for online criminals. For financial customers, a stolen password or a hacked account can wreak havoc on their assets and online identity, while deteriorating their confidence in the financial organization. Addressing this demand, Yubico has revolutionized the world of two-factor authentication with the YubiKey, a USB and NFC enabled device that delivers strong, yet simple, and affordable authentication in a simple touch.
Loved by both consumers and enterprises, the YubiKey is used by millions in more than 120 countries, enabling secure access to computers, mobile devices, networks and cloud services.
Yubico will be demonstrating the YubiKey NEO as the industry’s first FIDO Universal 2nd Factor (U2F) Ready device. Designed with the scaling needs of financial and internet companies in mind, the YubiKey NEO enables authentication via OTP, smart cards, as well as U2F in a single, compact form factor with no drivers or middleware necessary. A user can use the same Yubikey NEO, to first login to their enterprise device as a driverless smart card and then to a multitude of enterprise and consumer applications securely via the OTP or U2F capabilities.
Additionally, the current YubiKey NEO can be used for Windows login using our PIV applet, generate PGP keys using the OpenPGP applet, generate Yubico OTP to work with password managers, and even support OATH TOTP to work with leading cloud services.
To learn about Yubico and see a product demonstration, visit Yubico at booth ####.
|AccessData||AccessData provides a family of stand-alone and enterprise-class solutions that enable digital investigations of any kind; including computer and mobile forensics, incident response and information assurance. 130,000 users in law enforcement, government agencies and corporations around the world rely on AccessData software solutions and premier digital investigations.|
|Artemis Internet, Inc.||Artemis Internet Inc, a part of NCC Group plc, was founded by a group of Internet security experts to deliver real-world solutions for securing the Internet. Our premier offering is the .trust Top-Level Domain and the Artemis Domain Trust Solution which provides continuous security monitoring of public online assets.|
|Blue Coat Systems, Inc.||Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance.|
|Catbird||Catbird brings the power, agility and automation of the cloud to security policy and compliance, with a solution that automates, instruments and enforces policy while providing proof of continuous compliance. Customers rely on Catbird for managing cloud and virtualized infrastructure subject to compliance requirements including HIPAA, PCI-DSS, FISMA and SOX. For more information, visit www.catbird.com.|
|Co3 Systems||Headquartered in Cambridge, MA, Co3 Systems is leading the market for Incident Response Management Systems. Co3's platform helps organizations prepare, assess, manage and mitigate security incidents, including privacy breaches. Co3 is led by a proven team of security entrepreneurs including security legend, Bruce Schneier (CTO). In a short period of time, Co3 has emerged as the gold standard for how organizations—from Fortune 500 companies, to smaller organizations— manage incident response.|
|CXOWARE, Inc.||CXOWARE’s RiskCalibrator is the only risk assessment and analysis application that effectively communicates the financial ramifications of cybersecurity risk to C-Level executives, BOD’s, and auditors. For the first time CRO’s, CIO’s, & CISO’s can identify and report on total cybersecurity loss exposure, show where risk is concentrated, and then optimize budgets and mitigation efforts. By understanding cybersecurity from a financial perspective, considerations such as budget allocations, cybersecurity insurance, and capital set-aside/loss reserves become more aligned with BOD and C-Level oversight and fiduciary care.|
For more than 16 years, Cyveillance has been recognized as an innovative developer of intelligence-led security solutions. Leading financial services companies and Fortune 500 insurance companies were among the first to embrace cyber intelligence from Cyveillance. Through our proprietary technology platform and support from expert analysts, we identify risks early for effective prevention and mitigation. With continuous, comprehensive Internet monitoring and sophisticated intelligence analysis, Cyveillance proactively identifies and eliminates threats to information, infrastructure, individuals and their interactions.
Key solutions for the financial and insurance industry include Anti-Phishing, Information Protection, Corporate Security, Brand Protection, Data Feeds, Response Services, and Rogue Mobile Application Monitoring. Cyveillance helps financial institutions reduce fraud-related losses by proactively identifying transactions utilizing stolen personal credentials; maintain customer trust by eliminating phishing websites and monitoring for data breaches, rogue mobile apps and insider leaks; protect executives, events, and facilities; and assure compliance with corporate policies.
Cyveillance serves the Global 2000 and OEM Data Partners — protecting the majority of the Fortune 50, regional financial institutions nationwide, and more than 100 million global consumers through its partnerships with security and service providers that include Blue Coat, AOL and Microsoft. Cyveillance is a wholly-owned subsidiary of QinetiQ, a FTSE250 company which uses its domain knowledge to provide technical support and know-how to customers in the global aerospace, defence and security markets. For more information on QinetiQ, please visit www.qinetiq.com.
|Dell SecureWorks||Dell SecureWorks uses cyber threat intelligence to provide predictive, continuous and responsive protection for thousands of organizations worldwide. Enriched by intelligence from our Counter Threat Unit research team, Dell SecureWorks’ Information Security Services help organizations predict threats, proactively fortify defenses, continuously detect and stop cyber-attacks, and recover faster from security breaches. For more information, visit secureworks.com.|
|Deloitte||Deloitte & Touche LLP’s Security & Privacy Services offers a portfolio of services to help companies with their information security risk management, business continuity, privacy and data protection initiatives. We work with clients to improve enterprise security and value, shape the advancement and evolution of transformative solutions, and develop risk aware programs and processes. Deloitte’s over 1,500 security professionals deliver security & privacy services across all industries.
|Entrust||Entrust offers software authentication platforms that strengthen security in a wide range of identity and transaction ecosystems. Government agencies, financial institutions and other enterprises rely on Entrust solutions to strengthen trust and reduce complexity for consumers, citizens and employees. Now, as part of Datacard Group, Entrust offers an expanded portfolio of solutions across more than 150 countries. Together, Datacard Group and Entrust issue more than 10 million secure identities every day, manage billions of secure transactions annually and issue a majority of the world’s financial cards. For more information about Entrust solutions, call 888-690-2424, email email@example.com or visit entrust.com.|
|General Dynamics Fidelis Cybersecurity Solutions||General Dynamics Fidelis Cybersecurity Solutions provides organizations with a robust, comprehensive portfolio of products, services, and expertise to combat today's sophisticated advanced threats and prevent data breaches. Our commercial enterprise and government customers around the globe can face advanced threats with confidence through use of our Network Defense and Forensics Services, delivered by an elite team of security professionals with decades of hands-on experience, and our award-winning Fidelis XPS™ Advanced Threat Defense Products , which provide visibility and control over the entire threat life cycle.|
|ID Analytics, Inc.||ID Analytics is a leader in consumer risk management with patented analytics, proven expertise, and real-time insight into consumer behavior. By combining proprietary data from the ID Network®— one of the nation's largest networks of cross-industry consumer behavioral data—with advanced science, ID Analytics provides in-depth visibility into identity risk and creditworthiness. Every day, many of the largest U.S. companies and critical government agencies rely on ID Analytics to make risk-based decisions that enhance revenue, reduce fraud, drive cost savings, and protect consumers. ID Analytics is a wholly-owned subsidiary of LifeLock, Inc. Please visit us at www.idanalytics.com.|
|Identity X||IdentityX--a Daon affiliate--is a leader in mobile biometric authentication technology. Since 2010, IdentityX has pioneered methods for securely and conveniently fusing multiple identity factors (including biometrics, device authentication, PIN, token, and location), empowering users to choose the factor or combination of factors that best meets their situational needs and preferences. A demonstration of award-winning IdentityX technology can be found at www.identityx.com. IdentityX is a FIDO Alliance Board Member.|
|LockPath||LockPath brings a flexible, pragmatic approach to governance, risk management, compliance and security programs. Its solutions help organizations gain a deeper understanding of their security and risk posture while reducing their audit fatigue by aligning people with their processes and the enabling technology. LockPath provides the platform to efficiently manage and harvest meaningful data from GRC activities, including regulatory compliance, policy life cycle, information security risk data, incidents, disaster recovery plans, third party assessments and internal audits. LockPath is headquartered in Kansas City. Visit LockPath.com to learn more.|
|Lookingglass||Lookingglass Cyber Solutions is the world leader in threat intelligence monitoring and management enabling global cyber threat visibility and risk decision support. With its ScoutVisionTM and CloudScoutTM products, Lookingglass leverages all-source intelligence to provide context and continuously monitor threats far and near, such as the presence of botnets, hosts associated with cybercriminal networks, unexpected route changes and the loss of network resiliency. Lookingglass’ outside-in approach accounts for a client’s entire enterprise cyber ecosystem including the extended enterprise, and other networks beyond their control. This visibility brings an unprecedented view to help organizations understand their risks and enable a more proactive approach to the management of their overall security posture. For more information, visit www.LGScout.com.|
Malcovery Security is the leading provider of actionable cyber security intelligence and forensic analysis about email-based threats (phishing, spam and malware) that identifiy prioritize and target cybercriminal activities and provide effective countermeasures.
Delivered as a suite of subscription services, the company's patented and patent-pending technology provides the ability to identify the root sources of cybercrime attacks (servers, perpetrators, locations, etc.), delivering rich actionable intelligence information about cross-brand attacks and targeted attacks, as well as advanced notification of emerging email-based threats.
Unlike services that serve only as a reactive response to these attacks today--services that simply address the symptoms but cannot provide the intelligence to actually stop the cybercriminal and their activities--Malcovery Security's solutions provide the unique intelligence required to respond effectively to attacks on customers' brands, to disrupt email-based threats on an organization.
Netskope™ is the leader in cloud app analytics and policy enforcement. Only Netskope eliminates the catch-22 between being agile and being secure and compliant by providing complete visibility, enforcing sophisticated policies, and protecting data in cloud apps. The Netskope Active Platform™ performs deep analytics and lets decision-makers create policies in a few clicks that prevent the loss of sensitive data and optimize cloud app usage in real-time and at scale, whether IT manages the app or not. With Netskope, people get their favorite cloud apps and the business can move fast, with confidence.
Ntrepid’s product suite has been enabling enterprises to securely conduct online business activities for 20 years. From corporate identity management to secure browsing, our products facilitate online research and big data collection, and eliminate the threats that come with having a workforce connected to the Internet. Ntrepid has been building safe environments for Internet operations against the most sophisticated opponents and in the most hostile network environments around the world. We are proud to support some of the most demanding customers, including the Intelligence Community, our Armed Forces and Law Enforcement. This year, we decided to take the technologies from our top of the line specialized tools and create a product that would secure the Web for every business: Passages.
Passages by Ntrepid is a secure browser designed to eliminate malware from infecting your corporate network. Passages mitigates against 90% of all attacks directed at the enterprise by securing the browser. Passages runs on a user’s computer and isolates web browsing within a lightweight virtual machine removing the threats associated with connected computers. We understand that preventing data loss is a priority for financial services firms and we've built in the most comprehensive logging tools of any virtual browser. In addition, Passages incorporates data and audit management tools, providing management with valuable historical information and trend analysis ensuring compliance and reporting functions can be met.
Learn more at GetPassages.com
Using our consulting team's deep security knowledge and our proprietary CorrelatedVM™ vulnerability management & reporting solution, NetSPI acts as a trusted advisor to large enterprises by providing deep-dive, manual penetration testing – from mobile applications to entire networks and infrastructures. In addition, NetSPI also provides assessment and vulnerability management advisory services designed to analyze and mitigate risks and ensure compliance with relevant regulations and industry standards.
By utilizing our proven and comprehensive methodology in conjunction with its adaptive and responsive client service – NetSPI is more than a vendor, its partner you can trust with your most critical assets.
More information is available at www.netspi.com.
OPSWAT is a San Francisco based software company that provides solutions to secure and manage IT infrastructure for financial, healthcare, government and other highly secure environments. Founded in 2002, OPSWAT’s technologies are deployed by SMB, enterprise and OEM customers to more than 100 million endpoints worldwide.
OPSWAT solutions include GEARS, which provides advanced threat detection and compliance enforcement, helping organizations secure and manage endpoints and maintain compliance with standards such as PCI. GEARS allows network administrators to monitor devices for the presence of active and up-to-date antivirus software, active encryption software, user password protection and more, as well as to determine if the device is currently infected.
OPSWAT’s Metascan and Metadefender technologies help organizations protect against zero day attacks by enabling control over the flow of data traveling into and through an organization. These solutions use up to 30 anti-malware engines to scan for malware simultaneously, as well as data sanitization and file filtering to help reduce the risk of malware entering the organization. Metadefender is available on a kiosk for scanning peripheral media, allowing organizations to establish checkpoints for USB drives, CDs, memory cards and other media being brought into a facility. Metascan exposes robust APIs to allow easy integration to existing security processes and is often used to scan files on upload servers.
To learn more about OPSWAT and our technologies, please visit http://www.opswat.com.
|Palo Alto Networks||
Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Because of our deep expertise, steadfast commitment to innovation and game-changing next-generation security platform, more than 13,500 customers have chosen Palo Alto Networks and this number grows every day. Our platform natively brings together all key network security functions, including firewall, URL filtering, IDS/IPS, and advanced threat protection. Because these functions are purposely built into the platform from the ground up and they natively share important information across the respective disciplines, we ensure better security than legacy products. As a result, organizations can safely enable the use of all applications critical to running their business, maintain complete visibility and control, confidently pursue new technology initiatives like cloud, SDN and mobility, and protect the organization from the most basic to multi-faceted and complicated cyber attacks – known and unknown.
Find out more at www.paloaltonetworks.com.
|Ping Identify||Ping Identity is The Identity Security Company. Ping Identity believes secure professional and personal identities underlie human progress in a connected world. Our identity and access management platform gives enterprise customers and employees one-click access to any application from any device. Over 2,000 companies, including half of the Fortune 100, rely on our award-winning products to make the digital world a better experience for billions of people. Visit pingidentity.com for more information.|
|Proofpoint||Proofpoint, Inc. (NASDAQ:PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance and secure communications. Organizations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information. www.proofpoint.com|
|Security Compass||Security Compass is an industry-leading information security firm that provides professional services and training to security-conscious companies. We bring extensive, internationally recognized, cross-industry experience to every client engagement. To our clients, we're not simply an information security company - we are trusted partners in the development of secure software.|
|Shape Security||Shape Security is a startup in Mountain View, California that has created a completely new approach to website defense. Its flagship product, the ShapeShifter, is the world’s first botwall: an advanced technology that disables the attack capability of malware, botnets, and scripts. This results in a comprehensive defense against the most serious website breaches, for which there are no other existing solutions. Shape is backed by top investors including Kleiner Perkins, Venrock, Norwest, Google Ventures, and Eric Schmidt. It is led by cybersecurity leaders from the Pentagon, Cisco, Mozilla, Oakley Networks, Palo Alto Networks, VMware, and Google.|
Solarflare is the leading provider of application-intelligent networking I/O software and hardware that accelerate, monitor and secure network data. The firm recently introduced SolarSecureTM – the first distributed, active security solution that is implemented at network servers – the prime targets of cyber attacks. This set of applications empower the enterprise with the technical sophistication necessary to effectively capture, identify and block malicious traffic before it penetrates the operating system or applications on network servers and enforce policies, all without requiring any additional hardware.
The SolarSecure active security layer is built on Solarflare's industry-leading Flareon™ 10/40GbE network adapters to seamlessly deploy a new level of protection across the enterprise, delivering distributed, active protection of targeted assets. Today, these capabilities include Precision Time Stamping and Synchronization, Packet Capture and Denial of Service (DoS/DDoS) protection.
With over 1,000 customers worldwide, the company's solutions are widely used in scale-out server environments such as electronic trading, high performance computing, cloud, virtualization and big data. Solarflare’s products are available from leading distributors and value-added resellers, as well as from Dell, HP and IBM. Solarflare is headquartered in Irvine, California, and operates R&D facilities in Cambridge, UK and New Delhi, India.
|TEKsystems||People are at the heart of every successful business initiative. At TEKsystems, we understand people. Every year we deploy over 80,000 IT professionals at 6,000 client sites across North America, Europe and Asia. Our deep insights into IT human capital management enable us to help our clients achieve their business goals—while optimizing their IT workforce strategies. We provide IT staffing solutions, IT talent management expertise and IT services to help our clients plan, build and run their critical business initiatives. Through our range of quality-focused delivery models, we meet our clients where they are, and take them where they want to go, the way they want to get there.|
|ThreatStream||ThreatStream is a security company that offers a SaaS-based cyber security intelligence platform. The company’s Optic Platform is the first ever crowd-sourced cyber security intelligence solution that aggregates millions of threat indicators from around the Internet and integrates them directly to an organization’s existing security infrastructure. ThreatStream provides businesses and governments visibility into newly discovered security threats so that they can proactively defend against malicious attacks. Headquartered in Redwood City, Calif, the company is privately held with venture capital backing from Google Ventures and Paladin Capital Group with other individual investors. To learn more, visit www.threatstream.com.|
|Unisys||Unisys is a worldwide information technology company. We provide a portfolio of IT services, software, and technology that solves critical problems for clients. We specialize in helping clients secure their operations, increase the efficiency and utilization of their data centers, enhance support to their end users and constituents, and modernize their enterprise applications. To provide these services and solutions, we bring together offerings and capabilities in outsourcing services, systems integration and consulting services, infrastructure services, maintenance services, and high-end server technology. With approximately 23,000 employees, Unisys serves commercial organizations and government agencies throughout the world. For more information, visit www.unisys.com.|
|VASCO Data Security||VASCO Data Security is the leading provider of strong authentication and e-signature solutions to over banks and financial institutions in over 100 countries. VASCO brings user authentication and transaction data signing capabilities into corporate cash management and retail e-banking and m-banking applications to help combat cyber fraud. Over 1,700 financial institutions currently utilize VASCO’s products ranging from hardware to mobile to out-of-band solutions. The newest addition to the VASCO family includes a secure, easy, and accurate Visual Transaction Verification solution based on QR code technology to help banks become FFIEC compliant and avoid security and usability criticism.|
|VirtualArmour||VirtualArmor is a network and cybersecurity company servicing mid to large enterprise and service provider markets by providing solutions that incorporate a wide range of wide range of products, managed services, professional services and software development. By working with well-established and respected technology partners in network appliance, software and systems, VirtualArmor provides the most advanced network and cybersecurity support available.|
Founded in 2001 and headquartered in Santa Clara, California, WhiteHat Security is the leader in application security, enabling businesses to protect critical data, ensure compliance, and manage risk. WhiteHat is different because we approach application security through the eyes of the attacker.
Through a combination of technology, more than a decade of intelligence metrics, and the judgment of real people, WhiteHat Security provides complete web security at a scale and accuracy unmatched in the industry. WhiteHat Sentinel, the company’s flagship product line, currently manages tens of thousands of websites – including sites in highly regulated industries, such as top e-commerce, financial services, and healthcare companies.
For more information on WhiteHat Security, please visit www.whitehatsec.com.
|Akamai||Akamai is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. Our Intelligent Platform™ removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud – Akamai accelerates innovation in our hyperconnected world.|
|CSG Invotas||CSG International (NASDAQ: CSGS), a global provider of interactive transaction-driven solutions and services, launches a unifying threat response approach founded on carrier-grade technology. CSG Invotas™ offers security orchestration and automation solutions that provide dynamic, real-time management of large security ecosystems. Invotas builds upon CSG's proven solutions and expertise to support the mitigation and eradication of cyber attacks across complex enterprise environments. For more information, please visit www.csginvotas.com.|
Dataguise is the leading provider of Big Data security intelligence and protection solutions. Organizations in the financial services rely on Dataguise for discovery, data masking, encryption, and intelligence for their sensitive data within Hadoop and other Big Data environments. This allows them to effectively identify information in need of protection and to address regulatory compliance risk. Customers using DgSecure for Hadoop, DG for DBMS, DG for SharePoint and DG for Files are able to enforce the most appropriate remediation policies for data stored on premises or in the cloud. The key challenge for the financial services industry has been to fully leverage Big Data without exposing or risking sensitive information. Not only is this industry subject to a multitude of regulatory compliance issues in terms of data protection, they also face production challenges in Hadoop such as maintaining performance, scalability, and high availability.
Dataguise is recognized as a visionary by one of the world's leading analyst firms for its ability to help its customers to reduce the risk of data breaches and to remain compliant with leading regulations designed to protect personally identifiable information (PII) such as the Health Insurance Portability and Accountability Act (HIPAA). For more information visit: dataguise.com.