Loading... Please wait...

Current Sponsors

Platinum Sponsors
boozallen.jpg

Booz Allen Hamilton has been at the forefront of strategy and technology consulting for 100 years. Today, the firm provides services primarily to the US government in defense, intelligence, and civil markets, and to major corporations, institutions, and not-for-profit organizations. Booz Allen offers clients deep functional knowledge spanning consulting, analytics, mission operations, technology, and engineering—which it combines with specialized expertise in clients' mission and domain areas to help solve their toughest problems.

Booz Allen is headquartered in McLean, Virginia, employs approximately 23,000 people, and had revenue of $5.76 billion for the 12 months ended March 31, 2013. In 2014, Booz Allen celebrates its 100th anniversary year. To learn more, visit www.boozallen.com. (NYSE: BAH)

ey-logo6.jpg

EY is a global leader in assurance, tax, transaction and advisory services. The insights and quality services we deliver help build trust and confidence in the capital markets and in economies the world over. We develop outstanding leaders who team to deliver on our promises to all of our stakeholders. In so doing, we play a critical role in building a better working world for our people, for our clients and for our communities.It's how EY makes a difference.

ibm-logo.jpg

IBM is one of the world's largest information technology companies with over 100 years of leadership in helping institutions innovate. As a recognized security leader, we help protect clients from billions of security events each day. Our technologies assist in solving the most difficult security issues and enable secure access to people, data, applications and infrastructure. In today's world, data is flowing like water and traditional security solutions are no longer sufficient. IBM’s approach enables a more holistic, comprehensive perspective and can enhance your security maturity. For more details on IBM Security Solutions; visit ibm.com/security

isight-logo-large.jpg

iSIGHT Partners is the leading global provider of cyber threat intelligence. With 200+ experts in 16 countries and expertise in 24 languages, only iSIGHT can deliver the full context and intent of the most damaging threats, enabling security organizations to respond faster, defend proactively, and invest smarter. Find iSIGHT Partners on the web at www.iSIGHTpartners.com or email us at info@isightpartners.com.

skyhigh-logo-final-jan2014-fsisac-spring-2014.jpg

Skyhigh Networks, the Cloud Visibility and Enablement Company, enables IT organizations to embrace cloud services while ensuring security, compliance and governance. Skyhigh facilitates the entire cloud adoption lifecycle of Discover-Analyze-Secure. Specifically, Skyhigh Discover shines a light on Shadow IT by providing a comprehensive view into the use and risk of all the cloud services within an organization and how their risk compares with peers in the industry. Skyhigh Analyze leverages big data to identify opportunities for IT to enable new cloud services that are in demand, to reduce risk and costs by consolidating and better managing subscriptions, and to highlight anomalous behavior that may indicate a security breach or insider threat. And Skyhigh Secure seamlessly enforces security and compliance policies such as contextual access control, encrypting sensitive data with customer managed keys, and data loss prevention across cloud services.

Skyhigh delivers these capabilities while leveraging your existing IT investments in firewalls, proxies and SIEMs and without requiring any agent or footprint on the device. Proven at over 200 enterprises, Skyhigh Networks is venture-backed by Greylock Partners and Sequoia Capital. For more information, visit us at skyhighnetworks.com or follow us on Twitter @skyhighnetworks

Gold Sponsors

inspired-logo.jpg

BAE Systems Applied Intelligence creates solutions with our clients to protect and enhance the connected world.

We help leading enterprises and government departments to manage multiple threats from digital criminality – whether your goal is to manage cyber security risk, reduce losses from banking or insurance fraud, protect mobile banking, uncover unauthorised trading, prevent tax or healthcare fraud or ensure regulatory compliance.

Our expertise in advanced data acquisition, network analytics, threat intelligence and operations management gives you the ability to derive intelligence from IT network, communications and transactions data to:

  • access more, and better quality, data from multiple sources
  • identify harmful activity from sophisticated external and insider threats
  • improve your risk view through continuous monitoring
  • improve the efficiency and effectiveness of investigations, analysis and remediation

Our solutions are delivered securely through multiple deployment options, enabling your organisation to successfully deliver its core mission at lower risk.

Applied Intelligence is part of BAE Systems, a global defence, aerospace and security company with approximately 90,000 employees.  Learn more at www.baesystems.com/ai.

 bitsight-fsisac-spring-2014.jpg

BitSight

fsisac-fall-cisco-color.jpg

Cisco delivers intelligent cybersecurity for the real world. This vision is based on a threat-centric approach to security that reduces complexity while providing superior visibility, continuous control, and advanced threat protection across the entire attack continuum. With this new security model organizations can act smarter and more quickly before, during, and after an attack.

 fidelis-2013.jpg

General Dynamics Fidelis Cybersecurity Solutions provides organizations with a robust, comprehensive portfolio of products, services, and expertise to combat today's sophisticated advanced threats and prevent data breaches. Our commercial enterprise and government customers around the globe can face advanced threats with confidence through use of our Network Defense and Forensics Services, delivered by an elite team of security professionals with decades of hands-on experience, and our award-winning Fidelis XPS™ Advanced Threat Defense Products , which provide visibility and control over the entire threat life cycle.

 gurucul.jpg

GuruCul products will improve risk, threat, and compliance postures by applying an identity centric approach of correlating identity, activity, and access information to provide actionable data and prioritized alerts. GuruCul has developed industry's most advanced patent pending algorithms for risk profiling and analyzing trends, to detect threats and anomalous behavior.

 hp-logo-fsisac-spring-2013.gif

Networking Break Sponsor (Tue)

Today cyber-security suffers from fragmented intelligence, siloed teams, and standalone point products that delays your ability to respond to threats quickly. It's time to start getting the right intelligence to the right people at the right time so the right action can be taken. HP Security provides security solutions that help you collect the necessary internal and external threat intelligence, process it to determine what are the real risks, and gives you the information you need to act with confidence. With market leading solutions in security intelligence, network security, application security, information security, HP helps you get smarter and take action quicker. Visit hp.com/go/esp.

pan-logo-fsisac-spring-2014-2.jpg

Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Because of our deep expertise, commitment to innovation and game-changing security platform, thousands of customers have chosen our technology and approach to security.

Our security platform natively brings together all key network security functions, including advanced threat protection, firewall, IDS/IPS, and URL filtering. Because these functions are natively-built into the platform and share important information across the respective disciplines, we ensure better security than legacy firewalls, UTMs, or point threat detection products.

With our platform, organizations can safely enable the use of all applications, maintain complete visibility and control, confidently pursue new technology initiatives like cloud and mobility, and protect the organization from cyber attacks — known and unknown.

phishme-logo-rgb-2c.jpg

PhishMe® is the leading provider of phishing mitigation and detection for organizations concerned about human susceptibility to sophisticated cyber attacks. PhishMe's immersive training platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. A data-driven approach ensures that PhishMe integrates easily into the security technology stack, demonstrating measurable results to help inform an organization's security decision making process. PhishMe's customers include the defense industrial base, critical infrastructure, and Global 1,000 entities that understand changing user security behavior will improve security, aid incident response, and reduce the risk of compromise.

pwc-2014-spring-fsisac.jpg

PwC helps organizations and individuals create the value they're looking for. We're a network of firms in 157 countries with more than 195,000 people who are committed to delivering quality in assurance, tax and advisory services. Find out more and tell us what matters to you by visiting us at www.pwc.com

fsisac-spring-return-path.jpg 

We analyze the world's largest collection of email data to protect global businesses, their customers, and their networks from phishing, spoofing, malware and other email-borne threats. As a co-founding member of DMARC, Return Path is an established leader in email security, trusted by many of the world’s biggest companies to eliminate the impact of email fraud.

Through our global network of mailbox providers and security partners, Return Path protects more than 3 billion inboxes worldwide, expanding beyond DMARC to analyze 7 billion messages every day. Our industry-leading coverage enables Return Path to detect and eliminate more email fraud than anyone else in the world.

Return Path was founded in 1999. Headquartered in New York, we are a global company with offices in Denver, Sunnyvale, Austin, Toronto, London, Paris, Munich, Hamburg, Sydney, and Sao Paulo.

Find out more about email fraud protection at www.returnpath.com/stopemailfraud or follow us on Twitter (@StopEmailFraud).

riskiq-fsisac-fall.png

RiskIQ detects online threats that exploit customers and damage enterprise brands. The company discovers and continuously analyzes web and mobile assets from the user perspective to detect malware, fraud and brand infringements. RiskIQ’s cloud service is used by eight of the 10 largest financial institutions in the U.S. and five of the nine leading Internet companies in the world. The company is headquartered in San Francisco and is backed by Battery Ventures and Summit Partners. To learn more about RiskIQ, visit www.riskiq.com.

rsa-division-emc-rgb-25mm-transparent.png

RSA, The Security Division of EMC, is the premier provider of intelligence-driven security solutions. RSA helps the world's leading organizations solve their most complex and sensitive security challenges: managing organizational risk, safeguarding mobile access and collaboration, preventing online fraud, and defending against advanced threats.

Combining agile controls for identity assurance, fraud detection, and data protection, robust Security Analytics and industry-leading GRC capabilities, and expert consulting and advisory services, RSA brings visibility and trust to millions of user identities, the data they create, the transactions they perform, and the IT infrastructure they rely on. For more information, please visit www.EMC.com/RSA.

 securonix.png

Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account, and system behavior Securonix is able to automatically and accurately detect the most advanced data security, insider threats and fraud attacks. Globally customers are using Securonix to address the most basic and complex needs around threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring, and access risk management. For more information visit www.securonix.com

symantec-fsisac-spring-2013.gif

Exclusive Sunday Outdoor Welcome

Symantec is a global leader in providing security; storage and systems management solutions to help consumers and organizations secure and manage their information-driven world.  Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.

threatmetrix-fsisac-fall-2013.jpg

ThreatMetrix builds trust on the Internet by offering market-leading advanced fraud prevention and frictionless context-based security solutions. These solutions authenticate consumer and workforce access to mission critical applications using real-time identity and access analytics that leverage the world’s largest trusted identity network.

ThreatMetrix secures enterprise applications against account takeover, payment fraud, fraudulent account registrations, malware, and data breaches. Underpinning the solution is the ThreatMetrix™ Global Trust Intelligence Network, which analyzes over 500 million monthly transactions and protects more than 160 million active user accounts across 2,500 customers and 10,000 websites.

The ThreatMetrix solution is deployed across a variety of industries, including financial services, enterprise, e-commerce, payments, social networks, government and insurance.

For more information, visit www.threatmetrix.com or call 1-408-200-5755.

Join the cybersecurity conversation by visiting the ThreatMetrix blogFacebookLinkedIn and Twitter pages.

trendmicrologo-notagline-printjpg.jpg

Totebags

Trend Micro, a global leader in security software and solutions, strives to make the world safe for exchanging digital information. For the past 25 years, its employees have been inspired to protect individuals, families, businesses and governments as they look to harness the potential of emerging technologies and new ways of sharing information.

In today's organizations, information has become the most strategic asset; embodying competitive advantage and powering operational excellence. With the explosion of mobile, social and cloud technologies, protecting this information has become more challenging than ever. Organizations need smart protection of information, with technology that is simple to deploy and manage, and security that fits an evolving ecosystem. Trend Micro solutions enable a smart protection strategy for organizations. Smart. Simple. Security that fits.

Trend Micro provides layered content security for mobile devices, endpoints, gateways, servers and the cloud. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks.

All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™, and are supported by over 1,200 threat experts around the globe. For additional information, visit www.trendmicro.com

tripwire-logo-2014.jpg

Tripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence. Learn more at www.tripwire.com, get security news, trends and insights at http://www.tripwire.com/state-of-security/ or follow us on Twitter @TripwireInc.

veracode-logo-hi-res-fsisac-fall-2013.jpg

Offsite Dinner Sunday Night

Veracode's cloud-based service and programmatic approach deliver a simpler and more scalable solution for reducing global application-layer risk. Veracode delivers the most widely used cloud-based platform for securing web, mobile, legacy and third-party enterprise applications. By identifying critical application-layer threats before cyber-criminals can find and exploit them, Veracode helps enterprises deliver innovation to market faster - without sacrificing security.

Recognized as a Gartner Magic Quadrant Leader since 2010, Veracode secures hundreds of the world's largest global enterprises, including 3 of the top 4 banks in the Fortune 100 and 25+ of the world's top 100 brands.

Silver Sponsors

Agari Inc.

Off-site Dinner Sunday Night

Agari builds new, internet scale, data driven security solutions that eliminate email as a channel for cyberattacks and enable businesses and consumers to interact safely. The Agari cloud-based SaaS solution aggregates data from 2.5 billion mailboxes hosted by email receivers including Gmail and Yahoo! to help global brands including JPMorgan Chase, Facebook, Aetna, and UPS eliminate email threats, protect customers and their personal data, and proactively guard brand reputation. Today, Agari analyzes over 6 billion messages per day, identifies over 2 million malicious URLs per month, and blocks over 200 million malicious emails per month. Founded by the thought leaders behind Cisco's IronPort solutions, Agari, a recipient of the JPMorgan Chase Hall of Innovation Award and recognized as a Gartner Cool Vendor in Security, is headquartered in Silicon Valley. Learn more at www.agari.com.

Akamai Technologies

Akamai® is a leading provider of cloud services for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the Company's solutions is the Akamai Intelligent Platform™ providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai helps enterprises around the world optimise the web experience with SaaS cloud computing solutions including web application acceleration, mobile commerce optimization, web video streaming and content delivery network (CDN) services. Akamai's web security solutions protect online assets against threats such as SQL Injection and DDoS attacks for maximum information security. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud.

Over 100 banks worldwide use Akamai security solutions, helping protect them against both large scale denial of service and sophisticated application-layer threats seeking to compromise their brands, applications and associated data. These attacks can cost institutions millions in lost transactions and business productivity each year, and even higher losses in their brand value and reputation.

Arxan Technologies

Arxan is the world’s leading provider of Application Protection. We protect applications at the binary level to harden and tamper-proof the code. Arxan’s multi-platform approach mitigates risk, such as fraud or data compromise, and is adopted to protect applications of leading financial institutions, multi-screen digital media and gaming platforms, healthcare/medical devices, enterprise apps, and products from leading high-tech software vendors. We protect desktop, server, mobile and embedded applications with solutions currently deployed on over 300 million devices worldwide.

BioCatch

BioCatch is a leading provider of Cognitive Biometrics and Authentication solutions for mobile and Web applications. Available as a cloud-based solution, BioCatch proactively collects and analyzes more than 400 bio-behavioral, cognitive and physiological parameters to generate a unique user profile. Banks and eCommerce websites and mobile apps use BioCatch to significantly reduce friction associated with risky transactions and protect users against cyber threats, such as Account Takeovers, Man-in-the-Browser (MitB) Malware and Remote Access (RAT) attacks. Additionally, BioCatch provides an enterprise tool that improves the employee authentication experience while protecting access to critical IT assets. The Company was founded in 2011 by experts in neural science research, machine learning and cyber security and is currently deployed in leading banks, eCommerce sites and enterprises across North America, Latin America and Europe. For more information, please visit www.biocatch.com.

Bit9 + Carbon Black

More than 1,000 organizations worldwide—from 25 Fortune 100 companies to small enterprises—use Bit9 + Carbon Black to increase security, reduce operational costs and improve compliance. Leading managed security service providers (MSSP) and incident response (IR) companies have made Bit9 + Carbon Black a core component of their advanced threat prevention, threat detection and incident response services. With Bit9 + Carbon Black, you can arm your endpoints against advanced threats.

Contrast Security, Inc.

 

Crowdstrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks. Using big-data technologies, CrowdStrike's next-generation threat protection platform leverages real-time Stateful Execution inspection (SEI) at the endpoint and Machine Learning, in the cloud instead of solely focusing on malware signatures, indicators of compromise, exploits, and vulnerabilities. The CrowdStrike Falcon Platform is a combination of big data technologies and endpoint security driven by advanced threat intelligence. CrowdStrike Falcon enables enterprises to identify unknown malware, detect zero-day threats, pinpoint advanced adversaries and attribution, and prevent damage from targeted attacks in real time.

CyberArk

CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world’s leading companies – including 35 of the Fortune 100 – to protect their highest value information assets, infrastructure and applications.  CyberArk is a vital security partner to more than 1,500 global businesses, including 17 of the world’s top 20 banks. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, MA, CyberArk also has offices throughout EMEA and Asia-Pacific. To learn more about CyberArk, visit www.cyberark.com, read the company blog, http://www.cyberark.com/blog/, follow on Twitter @CyberArk or Facebook at https://www.facebook.com/CyberArk.

DB Networks

DB Networks® innovates cybersecurity through intelligent continuous monitoring. Our customers include the world's largest financial institutions, manufacturers, healthcare, and governments. DB Networks provides four primary benefits;

  • Databases discovery - including undocumented ones
  • Detailed insights of interactions between application and databases
  • Monitoring core network policies
  • Behavioral analysis to immediately identify database attacks

DB Networks' unique approach to database security utilizes machine learning to model an applications SQL generation process. It then uses behavioral analysis to immediately identify when the application has been compromised and is generating rogue SQL statements designed to attack a database. With no signature files to deal with or endless false positives to chase down, operational support becomes trivial.

Easy Solutions

Easy Solutions is a security company focused on the comprehensive detection and prevention of electronic fraud across all devices, channels and clouds. Our products range from fraud intelligence and secure browsing to multi-factor authentication and transaction anomaly detection, offering a one-stop shop for end-to-end fraud protection. The online activities of over 60 million customers at 220 leading financial services companies, security firms, retailers, airlines and other entities in the US and abroad are protected by Easy Solutions Total Fraud Protection® platform.

Flashpoint Partners

Flashpoint is dedicated to meeting the challenge of providing its customers with the data and expertise necessary to demystify the Deep and Dark Web - the areas on the internet where mainstream search engines are unable to penetrate - and turn the unknown and unseeable into actionable intelligence to assist corporations, governments, and individuals in protecting their interests and obligations.

Fox-IT

Fox-IT creates innovative cybersecurity solutions for a more secure society. We are dedicated to our clients, our values, and our integrity. Fox-IT delivers solutions before, during and after attacks. Recently we have provided a solution for the Cryptolocker threat, helping thousands of victims getting their data back for free.

InTELL is real-time cyber intelligence. It provides actionable data feeds, real time threat information, and global real-time insight in the threat landscape. We base our intelligence around actor attribution. This angle drives an unique visibility on online threats. Our Intelligence is delivered through our collaboration portal, alerting, and through automated feeds.

DetACT is web and mobile event analytics. DetACT provides 100% visibility on events, sessions, anomalies and attacks, while featuring zero touch architecture. DetACT actionable architecture spots anomalies, account takeovers, malware and hybrid attacks and channel misuse, and has the ability to alert and mitigate in real-time.

www.fox-it.com

Guardian Analytics

Protect payments, personal information, and online and mobile banking. Come see how our behavioral analytics solutions help hundreds of financial institutions mitigate fraud risk so they can expand revenue-generating services while improving operational efficiency, competitiveness, and client loyalty and trust.

IKANOW

Founded in 2010 while doing high-pressure intelligence work in Afghanistan and Iraq, IKANOW created an open analytics platform using industry-leading open source technologies. We work with the Fortune 500, Service Providers, and Government Agencies and deliver robust analytical solutions around cyber security, social media intelligence, and crisis informatics.

IKANOW Threat Analytics helps organizations assess their current risk level, strengthen their security posture, increase their situational awareness and automate these processes to enable them to maintain an optimal security posture in a rapidly changing threat landscape.

Lastline

Lastline is innovating the way companies detect active breaches caused by advanced persistent threats, targeted attacks and evasive malware with its software-based Breach Detection Platform. Lastline’s open architecture integrates advanced threat defenses and intelligence into existing operational workflows and security systems. Inspection of suspicious objects occurs at scale in real time using a full-system emulation approach to sandboxing that is superior to virtual machine-based and OS emulation techniques. Lastline's technology correlates network and object analysis to achieve timely breach confirmation and incident response. Lastline was built by Anubis and Wepawet researchers and industry veterans with decades of experience focused specifically on advanced breach weaponry and tactics. Headquartered in Redwood City, California with offices throughout North America, Europe and Asia, Lastline’s platform is used by global managed security service providers, Global 2000 enterprises and leading security vendors worldwide. To learn more, visit www.lastline.com.

Magnus Cloud LLC

Bag Insert

 

NowSecure

NowSecure is a leading mobile security company from Oak Park, IL, whose technology protects nearly 300 million devices and app downloads worldwide.

Perspecsys

Perspecsys’ AppProtex™ Cloud Data Protection Platform gives financial service organizations full control of sensitive and regulated information at all times, ensuring compliance with data privacy, security and residency requirements. Many financial institutions are wrestling with sector specific regulations (such as GLBA and PCI DSS) and the loss of data control that comes with cloud adoption – which is why they turn to Perspecsys for the data control needed as they make the move to the cloud. The AppProtex Platform replaces sensitive data with tokens or encrypted values before it leaves the organization for processing and storage in the cloud, keeping sensitive data completely within the enterprise at all times. AppProtex’s advanced architecture maintains cloud application (i.e. Salesforce, ServiceNow, etc.) functionality, such as searching, e-mailing, and more.

At Perspecsys we encourage enterprises to #takebackyourdata. For more information please visit www.Perspecsys.com and follow us on Twitter @Perspecsys.

Raytheon Cyber Products

Raytheon Cyber Products Company, a leading provider of commercial-off-the-shelf cyber security solutions for government and industry, is a wholly owned subsidiary of Raytheon Company. Founded on deep knowledge of cyber security stemming from the U.S. Department of Defense and the Intelligence Community, the company’s portfolio of products address a variety of cyber challenges including insider threat, secure information sharing, data loss prevention, and data analysis. With over 20 years of collective experience delivering high caliber security solutions, customers trust Raytheon Cyber Products to deliver solutions that are innovative, flexible, and scalable, meeting their security needs today and in the future.

Tanium

Tanium was founded to deliver a new and innovative approach to endpoint management and security that delivers instant visibility and responsiveness that does not slow down as the enterprise environment scales. Tanium is empowering the largest enterprises in the world to gather critical information globally from every endpoint and drive remediating action in seconds, including the distribution of patches, applications, and tools - all from a single server.

In the complex space of enterprise threat detection and response, Tanium provides an accessible and extensible platform for your security team to hunt for advanced persistent threats, complex threat signatures, suspicious network connections, and rogue processes in time frames that are orders of magnitude faster than was ever possible before. The platform has the capability to rapidly search for large volumes of indicators of compromise at enterprise scale. Tanium also integrates with Security Information and Event Monitoring systems as well as big data systems for advanced behavioral analytics and anomaly detection. When a security event inevitably occurs, Tanium is the solution of choice to identify and remediate a targeted breach, malware outbreak, or zero-day attack before it can do serious damage within the enterprise.

Triumfant, Inc.

Triumfant leverages patented analytics to detect, analyze and remediate the malicious attacks that evade traditional endpoint protection solutions such as the Advanced Volatile Threat, Advanced Persistent Threatzero-day attacks, targeted attacks and rootkits. Triumfant automates the process of building a contextual and surgical remediation that addresses the malware and all of the associated collateral damage. Endpoints go from infection to remediation in five minutes without the need to reboot or re-image.  No signatures or prior knowledge of any kind are required to stop the adversary. Triumfant uses these same analytics to continually enforce security configurations and policies, ensuring that organizations start every day with their endpoints secure and audit ready.  To learn more about the company go to: http://www.triumfant.com/default.asp or follow Triumfant on Twitter and YouTube.

Waratek

Waratek has developed a disruptive approach to application security that protects banking and financial applications and data from logic attacks like SQL Injection, network attacks and unpatched vulnerabilities at runtime, with no code changes or hardware. The Waratek approach is unique because the security resides in the ‘Runtime Environment’, an approach that analyst firm Gartner calls Runtime Application Self Protection or RASP. Waratek is therefore able to perform transparent taint detection and validation of each character in a SQL query to identify injection attacks with 100 percent accuracy. Waratek's Threat Forensics provide an in-depth level of information about attacks that originate both internally to and externally from the enterprise network. This eliminates the need to wade through gigabytes logs, radically lowering both the time to respond and to remediate by providing security teams with precise, real-time forensic data. Waratek monitors, detects and blocks threats from within the Java Virtual Machine without any user discernible performance degradation. Waratek AppSecurity for Java provides transparent, runtime application self-protection in datacenter environments, while Waratek Locker provides the same capabilities in the Cloud.

Waratek have recently been announced as finalists for the prestigious RSA Innovation Sandbox Contest which will take place at the RSA Conference in April 2015. In 2013 the company was named a Gartner Cool Vendor, selected for the Fintech Innovation Lab and voted top Global Innovator in the SWIFT Innotribe Challenge. Waratek is headquartered in Dublin, Ireland with offices in London and New York.

Yubico, Inc.

Financial institutions necessitate strong, layered security as they continue to be top targets for online criminals. For financial customers, a stolen password or a hacked account can wreak havoc on their assets and online identity, while deteriorating their confidence in the financial organization. Addressing this demand, Yubico has revolutionized the world of two-factor authentication with the YubiKey, a USB and NFC enabled device that delivers strong, yet simple, and affordable authentication in a simple touch.

Loved by both consumers and enterprises, the YubiKey is used by millions in more than 120 countries, enabling secure access to computers, mobile devices, networks and cloud services.

Yubico will be demonstrating the YubiKey NEO as the industry’s first FIDO Universal 2nd Factor (U2F) Ready device. Designed with the scaling needs of financial and internet companies in mind, the YubiKey NEO enables authentication via OTP, smart cards, as well as U2F in a single, compact form factor with no drivers or middleware necessary. A user can use the same Yubikey NEO, to first login to their enterprise device as a driverless smart card and then to a multitude of enterprise and consumer applications securely via the OTP or U2F capabilities.

Additionally, the current YubiKey NEO can be used for Windows login using our PIV applet, generate PGP keys using the OpenPGP applet, generate Yubico OTP to work with password managers, and even support OATH TOTP to work with leading cloud services.

ZeroFOX

ZeroFOX is the leader in social media cyber security and has developed security technology that enables organizations to monitor and prevent social media cyber attacks, conduct proactive attack reconnaissance and safeguard their social assets. ZeroFOX Enterprise represents an evolution in security technology, custom engineered to identify both behavioral and technical threat indicators across cyber security’s newest and most dangerous threat vector: social media. Through a combination of cutting edge technology and expert security professionals, ZeroFOX provides solutions for the full spectrum of social media risk.

Bronze Sponsors

Authentify

 

Cigital

Nikki's Beach Dessert After Hours Hospitality Suite (Mon)

Cigital is one of the world’s leading software security products and services companies. We help clients make the software they create or license from third-party vendors more secure. Our expert consultants, innovative product technologies, and effective training courses provide a comprehensive solution to reduce the risk and cost of breaches and non-compliance with a proactive approach to software security. From Architecture Risk Analysis and BSIMM Measurements to Source Code Review and Penetration Testing, Cigital is uniquely qualified to help clients find and fix the security flaws and defects that make software vulnerable to being attacked and exploited.

CipherCloud

CipherCloud, the leader in cloud information protection, enables organizations to securely adopt cloud applications by overcoming data privacy, residency, security, and regulatory compliance risks. CipherCloud delivers an open platform with comprehensive security controls, including AES 256-bit encryption, tokenization, cloud data loss prevention, cloud malware detection and activity monitoring. CipherCloud's ground breaking technology protects sensitive information in real time, before it is sent to the cloud, while preserving application usability and functionality.

CipherCloud has experienced exceptional growth and success with over 2 million business users, more than 250 million customer records, in over 10 industries, and with marquee customers around the globe.

The CipherCloud product portfolio protects popular cloud applications out-of-the-box such as Salesforce, Chatter, Box, Google Gmail, Microsoft Office 365, and Amazon Web Services. Additionally, CipherCloud for Any App and CipherCloud for Databases enable organizations to extend data protection to hundreds of third-party cloud and private cloud applications and databases.

CipherCloud, named as SC Magazine's 2013 Best Product of the Year, is backed by premier venture capital firms Andreessen Horowitz, Index Ventures, and T-Venture, the venture capital arm of Deutsche Telekom. For more information, visit www.ciphercloud.com and follow us on Twitter @ciphercloud.

CyberSponse, Inc.

Lanyards
Half Page Handbook Ad

CyberSponse provides an automated enterprise security operations management platform that provides a transparent view of an organization’s entire security operations (SecOps) — from allocated human resources and deployed information security technologies to identified threats, breaches and risk management efforts.  CyberSponse’s technology solution dramatically improves the efficiency and the effectiveness of the SecOps team’s efforts, resulting in rapid return on investment by providing a centralized platform for managing, monitoring, reporting, and analyzing an organization’s entire IT security infrastructure and processes, as well as requiring less manpower for managing the increasing cyber threats.

Founded in 2011, CyberSponse provides solutions for CSIRTs and allows them to communicate securely and seamlessly across the organization, while automating workflows and tasks.  Organizations across a wide range of markets including financial services, healthcare, retail, government, higher education, utilities, and hospitality turn to CyberSponse to shorten the time it takes to resolve cyber threats and comply with industry regulations and best practices — including PCI, HIPAA, and GLBA.  Offices are located in Scottsdale, Arizona. For more information, please visit www.CyberSponse.com.

Cylance, Inc.

 

DomainTools

DomainTools is the leader in Cyber Threat Intelligence and cybercrime forensics for investigations ‘outside the firewall.’ With over 12 years of domain name, DNS and related ‘cyber fingerprint’ data across the entire Internet, DomainTools helps companies assess security threat risks, profile attackers, map cyber activity in order to stop attacks. Fortune 1000 companies, global government agencies, and many security and online fraud investigation vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work. Learn more about how to connect the dots on criminal activity at www.domaintools.com or follow us on Twitter: @domaintools.

Farsight Security, Inc.

Founded in 2013 by Internet pioneer Dr.Paul Vixie, Farsight Security, Inc. delivers real-time Threat Intelligence enrichment solutions in the form of DNS intelligence for faster, more precise detection and response to today’s cyberthreats. Farsight solutions include DNSDB™, SIE™, WHOIS Domain and NOD™. The company is headquartered in San Mateo, California.

Foreground Security

Foreground Security is a dedicated cyber security company providing security engineering, assessment, training, incident response, and forensics services. Recently ranked as the 9th largest Cyber Security Services provider in North America, Foreground helps organizations align information security with key business objectives. Our V-SOC service and ATIP product provide clients with advanced hunting capabilities and an immediate return on investment. Our experienced professionals maintain numerous certifications and our penetration testers have identified over 100 zero day vulnerabilities within the last 12 months. We provide our clients with the proven expertise and real-world implementation experience required to protect against today’s leading threats.

Forescout

 

Invincea, Inc.

Sunday Cabana
Key Card

Invincea is the market-leading solution for advanced malware threat detection, breach prevention and forensic threat intelligence. The Invincea platform provides organizations of all sizes—enterprises to small-medium businesses—with coverage against the largest attack surface for cyber-breach attacks aimed at end-users in the form of spear-phishing, drive-by download exploits, poisoned search results and user-initiated infections. The company is venture capital-backed and based in Fairfax, VA. For more information, visit www.invincea.com.

Lookingglass

Lookingglass, the leader in threat intelligence that transforms security operations, empowers confident real-time decisions through focused verified multi-source information. We provide a unique lens to information customers may already have, creating active intelligence for effective decisions. Lookingglass is transforming the art of threat intelligence with innovative technology that empowers customers with complete and relevant risk information, delivering confidence, streamlining workflows and dramatically driving efficiencies. Our threat intelligence management platform, ScoutVision, delivers content, context and confidence in risk and security operations decision support. This platform increases visibility within and beyond the network perimeter, empowering customers to continuously assess and mitigate threats. For more information visit www.lgscout.com.

Lookout

Lookout is a cybersecurity company that predicts and stops mobile attacks before harm is done to an individual or an enterprise. Lookout's cloud-based technology is fueled by a global sensor network of more than 60 million users and tens of thousands of apps that are added daily. With this dataset of virtually all the mobile code in the world and the predictive machine intelligence to analyze and make sense of the data, Lookout can identify connections that would otherwise go unseen.

Novetta Solutions

 

Ntrepid Corporation

Since 2013, the financial services sector has faced an ever-increasing number of detected cyber attacks. The largest attacks are costing upwards of $100 million, and traditional antivirus solutions are no longer a match against these increasingly sophisticated attackers.

Ntrepid combats these threats with Passages, a secure virtual browser that protects the enterprise from all web-based attacks. Over 90% of all undetected malware infections access the enterprise via the web browser. Passages isolates all browsing activity from the local computer and network, stopping malware at the source of infection without disrupting users' normal workflow. We've also included data and audit management tools to provide the enterprise with valuable historical information and trend analysis and ensure compliance and reporting functions can be met.

Passages leverages Ntrepid's platform and 15-year history protecting the national security community from the world's most sophisticated opponents. From corporate identity management to secure browsing, Ntrepid products facilitate online research and big data collection, and they eliminate the threats that come with having a workforce connected to the Internet.

To learn more visit GetPassages.com.

Pindrop Security

Jeopardy Dessert After Hours Hospitality Suite

Pindrop Security provides solutions to protect enterprise call centers and phone users. Pindrop’s solution combines authentication and anti-fraud detection technology to verify legitimate callers while detecting malicious callers. Pindrop’s unique Phoneprinting™ technology is the first of its kind to analyze and fingerprint individual phone calls, providing the caller’s true location and calling device and matching them to Pindrop’s fraud database. Named SC Magazine 2013 Rookie Security Company of the Year, a Gartner “Cool Vendor” in Enterprise Unified Communications and Network Services for 2012 and one of the 10 Most Innovative Companies at the 2012 RSA conference, Pindrop Security’s solutions restore enterprises’ confidence in the security of phone-based transactions.

Recorded Future

We arm you with real-time threat intelligence so you can proactively defend your organization against cyber attacks. With billions of indexed facts, and more added every day, our patented Web Intelligence Engine continuously analyzes the open Web to give you unmatched insight into emerging threats. Recorded Future helps protect four of the top five companies in the world.

Resilient Systems

 

Safenet, Inc.

 

ThreatConnect, Inc.

ThreatConnect, Inc. is the leading provider of advanced threat intelligence products and services including ThreatConnect®, the most comprehensive Threat Intelligence Platform (TIP) on the market. ThreatConnect delivers a single platform in the cloud and on-premises to effectively aggregate, analyze, and act to counter sophisticated cyber-attacks. Leveraging advanced analytics capabilities, ThreatConnect offers a superior understanding of relevant cyber threats to business operations. To register for a free ThreatConnect account, or to learn more about our products and services, visit: www.threatconnect.com. ThreatConnect is proud to be an FS-ISAC Affiliate Member and Bronze Sponsor. Stop by our booth to learn more!

Additional Sponsors

Accenture

Padfolios

Full Page Handbook Ad

Bag Insert

Accenture is a global management consulting, technology services and outsourcing company, with approximately 289,000 people serving clients in more than 120 countries. Combining unparalleled experience, comprehensive capabilities across all industries and business functions, and extensive research on the world’s most successful companies, Accenture collaborates with clients to help them become high-performance businesses and governments. The company generated net revenues of US$28.6 billion for the fiscal year ended Aug. 31, 2013. Its home page is www.accenture.com

Adallom

Beach Blast Cabana

Adallom delivers visibility, governance and protection for the top SaaS applications used by businesses worldwide, including GoogleApps, Office 365 and Salesforce. Founded in 2012 by Israeli Intelligence alumni, our cloud application security platform extends the boundaries of enterprise security into the cloud. You will be able to gain actionable intelligence into cloud application usage, secure corporate data and detect suspicious activities, without requiring any agent in your datacenter or endpoint. Powered by the Adallom SmartEngineTM advanced heuristics technology, and backed by Adallom Labs, our elite cybersecurity research team, we are the ONLY cloud security provider that has protected businesses from real-world attacks.

Arbor Networks, Inc.

Off-site Dinner Sunday Night
Handbook Band

Arbor Networks, Inc. helps secure the world's largest enterprise and service provider networks from DDoS attacks and advanced threats. Arbor is the world's leading provider of DDoS protection in the enterprise, carrier and mobile market segments, according to Infonetics Research. Arbor's advanced threat solutions deliver comprehensive network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor delivers market-leading security analytics for dynamic incident response and forensics. Arbor strives to be a "force multiplier," making network and security teams the experts. Our goal is to provide a richer picture into networks and more security context - so customers can solve problems faster and help reduce the risk to their business.

Blue Coat Systems

Networking Break (Wed)
Half Page Handbook Ad
Wifi

Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance.

Checkmarx, Inc.

Beach Blast Cabana

Checkmarx (www.checkmarx.com ) is a leading developer of software solutions used to identify, fix and block security vulnerabilities in web and mobile applications.

The company's customers include 4 of the world's top 10 software vendors and many Fortune 500 and government organizations, including Samsung, Salesforce.com, Coca Cola and the US Army.

Checkmarx offers a suite of application security solutions from code development to live production:

Static Application Security Testing (SAST) - Identify and fix security vulnerabilities in the source code, at the early stages of  the application development. The solution enables full automation by integration into the Software Development Lifecycle (SDLC).

Runtime Application Self Protection (RASP) - Block attacks in real time.

Secure Coding Education - Hands on secure coding training based on gamification, using your own code base and real life security vulnerabilities.

CloudPassage

Full Page Handbook Ad

 

Cyphort

Summit Peak - High Top Cocktail Round
Room Drops
Elevator Sleeve

Cyphort is innovative provider of Advanced Threat Protection solutions that deliver a complete defense against current and emerging Advanced Persistent Threats, targeted attacks and zero day vulnerabilities. The Cyphort Platform accurately detects and analyzes next generation malware, providing actionable, contextual intelligence that enables security teams to respond to attacks faster, more effectively, and in as surgical a manner as their attackers. Cyphort's software-based, distributed architecture offers a cost effective, high performance approach to detecting and protecting an organization's virtual, physical and cloud infrastructure against sophisticated attacks. Malware detection for Windows, OSX and Linux allows businesses to extract maximum value from IT assets without compromising the security of an organization. Founded by experts in advanced threats from government intelligence agencies and premier network security companies, Cyphort is a privately held company headquartered in Santa Clara, California. For more information, please visit: www.cyphort.com.

Cyveillance

Full Page Handbook Ad

For more than 16 years, Cyveillance has been recognized as an innovative developer of intelligence-led security solutions. Leading financial services companies and Fortune 500 insurance companies were among the first to embrace cyber intelligence from Cyveillance. Through our proprietary technology platform and support from expert analysts, we identify risks early for effective prevention and mitigation. With continuous, comprehensive Internet monitoring and sophisticated intelligence analysis, Cyveillance proactively identifies and eliminates threats to information, infrastructure, individuals and their interactions.

Key solutions for the financial and insurance industry include Anti-Phishing, Information Protection, Corporate Security, Brand Protection, Data Feeds, Response Services, and Rogue Mobile Application Monitoring. Cyveillance helps financial institutions reduce fraud-related losses by proactively identifying transactions utilizing stolen personal credentials; maintain customer trust by eliminating phishing websites and monitoring for data breaches, rogue mobile apps and insider leaks; protect executives, events, and facilities; and assure compliance with corporate policies.

Cyveillance serves the Global 2000 and OEM Data Partners - protecting the majority of the Fortune 50, regional financial institutions nationwide, and more than 100 million global consumers through its partnerships with security and service providers that include Blue Coat, AOL and Microsoft. Cyveillance is a wholly-owned subsidiary of QinetiQ, a FTSE250 company which uses its domain knowledge to provide technical support and know-how to customers in the global aerospace, defense and security markets. For more information on QinetiQ, please visit www.qinetiq.com.

For more information: Visit www.cyveillance.com or read our blog at blog.cyveillance.com, follow @Cyveillance on Twitter, or find us on LinkedIn www.linkedin.com/company/cyveillance.

Darktrace, Inc.

Evelator Sleeve

Darktrace is a cyber threat defense company with a fundamental new approach to helping organizations manage the risk of advanced cyber-attacks, including insider threat. Darktrace's Enterprise Immune System is based on machine learning and mathematics developed at the University of Cambridge, combined with expertise from US and UK intelligence agencies. Darktrace’s technology is uniquely capable of detecting previously-unseen threats in real time, from within the network. The company is headquartered in Cambridge, UK and Washington D.C., with offices in London, Milan, New York, Paris, San Francisco and Singapore.

Deloitte Services LP

Summit Peak - High Top Cocktail Round

Deloitte & Touche LLP’s Security & Privacy Services offers a portfolio of services to help companies with their information security risk management, business continuity, privacy and data protection initiatives. We work with clients to improve enterprise security and value, shape the advancement and evolution of transformative solutions, and develop risk aware programs and processes.

Deloitte’s over 1,500 security professionals deliver security & privacy services across all industries.

  • Cyber Threat & Vulnerability Management
  • Information & Technology Risk Management
  • Identity Access Management
  • Application Integrity

Online at www.deloitte.com/security/us/securityandprivacysolutions

Dtex Systems

Sunday Cabana

Dtex stops insider cyber threats. Mature global organizations deploy Dtex’s lightweight endpoint technology to get complete user visibility across their entire enterprise without any noticeable system or network impact. By gathering and analyzing anonymized metadata, Dtex's advanced user analytics identifies the highest risk users without violating employee privacy. Dtex ships with hundreds of patterns built from 10+ years of insider threat investigations that are highly effective in spotting malicious insiders, insiders colluding with external parties, and employees who accidentally expose the company to theft and loss. Learn more at www.dtexsystems.com

eSentire

Sunday Cabana
Bag Insert

eSentire® is the leader in Active Threat Protection solutions and services, the most comprehensive way to defend enterprises from advanced and never-before-seen cyber threats. eSentire’s flagship offering, Network Interceptor, challenges legacy security approaches, combining behavior-based analytics, immediate mitigation and actionable intelligence on a 24x7x365 basis. The company’s dedicated team of security experts continuously monitors customer networks to detect and block cyber attacks in real-time. Protecting more than $2.0 trillion in combined assets, eSentire is the trusted choice for security decision-makers in financial services, healthcare, mining, energy, engineering and construction, legal services, and technology companies. In late 2013, eSentire was named to the Deloitte Technology Fast 50 Companies to Watch and cited as a Canadian Innovation Exchange CIX Top 20 most innovative Canadian company. For more information visit www.esentire.com and follow @esentire.

F5

Summit Peak - High Top Cocktail Round
Full Page Handbook Ad
Bag Insert

F5 (NASDAQ: FFIV) provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, and software defined networking (SDN) deployments successfully delivering applications to anyone, anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich partner ecosystem of leading technology and data center orchestration vendors. The world’s largest businesses, service providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility trends. For information about F5, its partners and technologies go to f5.com; follow @f5networks on Twitter or visit us onFacebook.

HID Global

Summit Peak - High Top Cocktail Round

 

Intralinks

Full Page Handbook Ad
Keynote Sponsor
Off-site Dinner Sunday Night

 

Lancope, Inc.

Summit Peak - High Top Cocktail Round
Bag Insert

Lancope, Inc. is a leading provider of network visibility and security intelligence to defend enterprises against today's top threats. By collecting and analyzing NetFlow, IPFIX and other types of flow data, Lancope's StealthWatch® System helps organizations quickly detect a wide range of insidious attacks from APTs and DDoS to zero-day malware and insider threats. Through pervasive insight across distributed networks, including mobile, identity and application awareness, Lancope accelerates incident response, improves forensic investigations and dramatically reduces enterprise risk. Lancope's anomaly detection capabilities are continuously enhanced with threat intelligence from the StealthWatch Labs security research team. For more information, visit www.lancope.com.

Malwarebytes

Half Page Handbook Ad
Summit Peak - High Top Cocktail Round

Malwarebytes provides anti-malware and anti-exploit software designed to protect businesses and consumers against malicious threats that consistently escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware earned an “Outstanding” rating by CNET editors and is a PCMag.com Editor’s Choice. It is one of most popular anti-malware solutions in the world, protecting over 80 million users. Malwarebytes Endpoint Security delivers proven malware and exploit security for SMBs and Enterprise businesses. Founded in 2008, Malwarebytes is headquartered in California, operates offices in Europe, and employs a global team of researchers and experts. For more information, please visit us at www.malwarebytes.org.

NSS Labs

Summit Peak -High Top Cocktail Round

NSS Labs helps clients achieve a forward-looking perspective on IT Security and manage cyber risk more effectively. With NSS Research & Testing, enterprises can make rapid business decisions about competing vendors, products and technologies. Our unique perspective and expertise are based on over 2 million man hours of real-world security product testing and provide crucial visibility into future market and technology trends. The NSS Cyber Advanced Warning System™ is a groundbreaking real-time situational awareness solution that enables security professionals to quickly assess their exposure and identify risk of critical assets being breached in the face of a dynamic, every changing environment.

PhishLabs

Green Water Station

PhishLabs is the leading provider of cybercrime protection and intelligence services that fight back against online threats and reduce the risk posed by phishing, malware, distributed denial of service (DDoS) and other cyber-attacks. The company fights back against cybercrime by detecting, analyzing and proactively dismantling the systems and illicit services cybercriminals depend on to attack businesses and their customers. With a fixed-fee service model that ensures alignment with client goals, the company partners with businesses to decrease attacks, reduce online fraud and prevent the loss of customer trust.

To learn more about PhishLabs, visit www.phishlabs.com or email info[at]phishlabs[dot]com.

Follow PhishLabs: Twitter | LinkedIn | Google +

Security Compass

Beach Blast Cabana
Half Page Handbook Ad

Security Compass is an industry-leading information security firm that provides professional services and training to security-conscious companies. We bring extensive, internationally recognized, cross-industry experience to every client engagement. To our clients, we're not simply an information security company - we are trusted partners in the development of secure software.

Skybox Security

Summit Peak - High Top Cocktail Round

 

Synack

Sunday Cabana
Bag Insert
Door Hangers

 

Threat Stream

Summit Peak -High Top Cocktail Round

 

Vormetric, Inc.

Summit Peak -High Top Cocktail Round

 

Vorstack

Half Page Handbook Ad

 

Zscaler, Inc.

Beach Blast Cabana

Zscaler ensures that more than 12 million employees at more than 5,000 enterprise and government organizations worldwide are protected against cyber attacks and data breaches while staying fully compliant with corporate and regulatory policies. Zscaler’s award-winning Security-as-a-Service platform delivers a safe and productive Internet experience for every user, from any device and from any location. Zscaler effectively moves security into the Internet backbone, operating in more than 100 data centers around the world and enabling organizations to fully leverage the promise of cloud and mobile computing with unparalleled and uncompromising protection and performance. Zscaler delivers unified, carrier-grade Internet security, advanced persistent threat (APT) protection, data loss prevention, SSL decryption, traffic shaping, policy management and threat intelligence–all without the need for on-premise hardware, appliances or software. To learn more, visit us at www.zscaler.com.

 

 

 




?