AttackIQ, the leading independent vendor of breach and attack simulation solutions, built the industry’s first Security Optimization Platform for continuous security control validation and improving security program effectiveness and efficiency. AttackIQ is trusted by leading organizations worldwide to plan security improvements and verify that cyberdefenses work as expected, aligned with the MITRE ATT&CK framework. The Company is committed to giving back to the cybersecurity community through its free AttackIQ Academy, open Preactive Security Exchange, and partnership with the MITRE Engenuity.
Follow AttackIQ on Twitter, LinkedIn, and YouTube.
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with hundreds of security and management solutions, Axonius is deployed in minutes, improving cyber hygiene immediately. Covering millions of devices at customers like the New York Times, Schneider Electric, Landmark Health, AppsFlyer, and many more, Axonius was named the Most Innovative Startup of 2019 at the prestigious RSAC Innovation Sandbox and was named to the CNBC Upstart 100 list and Forbes 20 Rising Stars. For more, visit Axonius.com.
Devo is the only cloud-native logging and security analytics platform that releases the full potential of your data to empower bold, confident action. With unrivaled scale to collect all of your data without compromise, speed to give you immediate access and answers, and clarity to focus on the signals that matter most, Devo is your ally in protecting your organization today and tomorrow. Devo is headquartered in Cambridge, Massachusetts, USA and has its European headquarters in Madrid, Spain. Devo is backed by Insight Partners, Georgian, and Bessemer Venture Partners. Learn more at www.devo.com.
FireMon is the only agile network security policy platform for firewalls and cloud security groups providing the fastest way to streamline network security policy management, which is one of the biggest impediments to IT and enterprise agility. Since creating the first-ever network security policy management solution, FireMon has delivered command and control over complex network security infrastructures for more than 1,700 customers located in nearly 70 countries around the world. For more information, visit www.firemon.com.
We're a group of cyber and technology experts with a mission to revolutionize security operations by combining data engineering, security expertise and layers of automation to expedite decision making, helping security teams become attack-ready.
Hunters infuses how attackers think and act into a platform that helps security operations see and stop attacks at their root.
Founded in 2014, IronNet Cybersecurity is a global cybersecurity leader that is revolutionizing how enterprises, industries, and governments secure their networks. IronNet takes the skills of its top-notch cybersecurity operators with their real-world, public and private sector, offensive and defensive cyber experience, and integrates their deep tradecraft knowledge into its industry-leading products to solve the most challenging cyber problems facing industry today.
IronNet’s solutions leverage behavioral analytics, machine learning, and artificial intelligence techniques to help public and private enterprises across critical infrastructure detect unknown threats. Our ability to share the derived raw intelligence with peer enterprises in real-time and at machine speed, uniquely enables industries and governments to collectively defend against well-funded nation state and cyber criminal threats.
KnowBe4 is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering.
The KnowBe4 platform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Our goal was to design the most powerful, yet easy-to-use platform available.
Customers of all sizes can get the KnowBe4 platform deployed into production twice as fast as our competitors. Our Customer Success team gets you going in no time, without the need for consulting hours.
Enterprise applications and services are only as fast and secure as the APIs that power them; however, most enterprises don’t have a standardized way to inventory, monitor, and secure APIs. The growing complexity of APIs cripples deployment velocity and APIs are quickly becoming the most frequent cyber security attack vector.
Noname Security creates the most powerful, complete, and easy-to-use API security platform that helps enterprises discover, analyze, remediate, and test all legacy and modern APIs. Noname finds and inventories all APIs; detects attacks, suspicious behavior, and misconfigurations using AI-based behavioral analysis; prevents attacks and integrates with existing remediation and security infrastructure; and actively validates APIs before deployment.
Unlike other API security solutions, Noname runs completely out-of-band and doesn’t require any agents or network modifications. Within minutes, you can have complete visibility into all internal, external, and 3rd party APIs. Only Noname Security can find all shadow APIs and API misconfigurations before the bad guys do.
ReliaQuest, is a force multiplier for security operations to increase visibility, decrease complexity and reduce risks. ReliaQuest GreyMatter, cloud-native Open XDR-as-a-service, brings together telemetry from any security and business solution to unify detection, investigation, response and resilience. Delivered with 24/7/365 security expertise, organizations get the visibility and coverage they require to make their cybersecurity program effective.
Organisations rely on Beyond Identity to secure identities on the internet. Beyond Identity secures access to SaaS applications and cloud resources to protect data and privacy. Breaking down the barriers between cybersecurity, identity, and device management, Beyond Identity provides the most secure authentication on the planet, and dramatically improves the way the world logs in.
With the Beyond Identity Passwordless Identity Platform, organisations can eliminate passwords, positively verify user identities, confirm device trust, and enforce risk-based access controls. Beyond Identity enables security teams to implement zero-trust so their organisations can safely and securely work in hybrid-work environments with increasingly cloud-centric IT. Organisations turn to Beyond Identity to stop cyberattacks, protect their most critical data, and meet compliance requirements.
We offer SaaS, subscription-based software.
Founded in 2019, Beyond Identity is headquartered in NYC, and has offices in Boston, Dallas, and London.
Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide.
Guardian over millions of consumer, business, and government environments, Bitdefender is the industry’s trusted expert for eliminating threats, protecting privacy and data, and enabling cyber resiliency.
With deep investments in research and development, Bitdefender Labs discovers 400 new threats each minute and validates 30 billion threat queries daily.
The company has pioneered breakthrough innovations in anti-malware, IoT security, behavioral analytics, and artificial intelligence and its technology is licensed by more than 150 of the world’s most recognized technology brands.
For companies that want to manage their security posture against the evolving threat landscape: Cymulate SaaS-based Extended Security Posture Management (XSPM) deploys within an hour, enabling security professionals to continuously challenge, validate and optimize their cyber-security posture end-to-end across the MITRE ATT&CK® framework. The platform provides out-of-the-box, expert, and threat intelligence-led risk assessments that are simple to deploy and use for all maturity levels, and constantly updated. It also provides an open framework to create and automate red and purple teaming by generating penetration scenarios and advanced attack campaigns tailored to their unique environments and security policies. Cymulate allows professionals to manage, know and control their dynamic environment.
For more information, please visit www.cymulate.com
Over 500 of the largest and most security-conscious enterprises in the world rely on Skybox® Security for the insights and assurance required to stay ahead of dynamically changing attack surfaces. At Skybox, we don’t just serve up data and information. We provide the intelligence and context to make informed decisions, taking the guesswork out of securely enabling enterprises at scale and speed. Our security posture management platform delivers complete visibility, analytics, and automation to quickly map, prioritize and remediate vulnerabilities across your organization.
Integrating with over 150 networking, security, cloud and IT management solutions, along with a variety of threat intelligence sources, the Skybox platform offers the crucial context to break-down organization and information silos, while providing total visibility to your hybrid infrastructure and the exposure to emerging threats. Our unique vulnerability and policy management capabilities help you establish a mature and tightly connected security posture management framework that spans across your planning, implementation, and continuous change management workflows. With Skybox, security teams can now focus on the most strategic business initiatives while ensuring enterprises remain protected.
At Talion, we’re changing the way organisations interact with their Managed Security Service Provider. Born out of BAE Systems, our service is built on first-hand knowledge of military engineering and defence-grade security, together with an in-depth understanding of the threat landscape facing the commercial world today.
When it comes to cyber security, we believe every organisation deserves full visibility and complete control over how threats are monitored, how decisions are made, and how their business is protected. That’s why we prioritise transparency and collaboration across our service lines, implementing security programs that give businesses the control and freedom to pursue ambitions and realise goals, safe in the knowledge that we’ve got their back, 24 hours a day, 7 days a week.
Tenable™, Inc. is the Cyber Exposure company. Over 24,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver Tenable.io, the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 20 percent of the Global 2000 and large government agencies. Learn more at tenable.com.
Digital transformation has led to an explosion of new technologies, connected devices and compute platforms. From IT to Cloud to IoT to OT, this complex digital computing landscape is the modern cyber attack surface. Organizations are lacking visibility and insight into this modern attack surface, creating a gap in an organization’s ability to understand its Cyber Exposure at any given time.
The tools and processes of yesterday are being used to solve today’s problem – built and designed for the old era of IT when the cyber attack surface was a static laptop, desktop or on-premises server. In the new digital era, a new approach is needed.
Vectra® protects business by detecting and stopping cyberattacks.
As a leader in network detection and response (NDR), Vectra® protects your data, systems, and infrastructure. Vectra enables your SOC team to quickly discover and respond to would-be attackers – before they act.
No business or organization is impervious to cyberattacks. Your existing security tools will prevent 99% of those attacks. But with enough time, bad actors can get past even the most secure barriers. With Vectra, you stop them in their tracks.
Vectra gives security analysts the ability to rapidly identify suspicious behavior and activity on your extended network. Whether that activity originates outside the firewall or from within, whether an attack is directed against an on-prem data center or the cloud, Vectra will find it, flag it, and alert security personnel so they can respond before the damage is done.
Vectra is Security that thinks®. It uses artificial intelligence and machine learning to improve detection and response over time, eliminating false positives so you can focus on real threats. The result of an unparalleled marriage of security research and data science, Vectra will change the way you think about cybersecurity.
XM Cyber is the global leader in Attack-Centric Risk Prioritization, which is also known as Risk-Based Vulnerability Management (RBVM). The XM Cyber platform enables companies to rapidly respond to cyber risks affecting their business-sensitive systems by continuously finding new exposures, including exploitable vulnerabilities and credentials, misconfigurations, and user activities. XM Cyber constantly simulates and prioritizes the attack paths putting mission-critical systems at risk, providing context-sensitive remediation options. XM Cyber helps to eliminate 99% of the risk by focusing allowing IT and Security Operations to focus on the 1% of the exposures before they get exploited to breach the organization’s “crown jewels” – its critical assets. XM Cyber was founded by top executives from the Israeli cyber intelligence community and has offices in North America, Europe, and Israel.
Contrast Security is the world's leading provider of security technology that enables software applications to protect themselves against cyberattacks, heralding the new era of self-protecting software. Contrast's patented deep security instrumentation is the breakthrough technology that enables highly accurate assessment and always-on protection of an entire application portfolio, without disruptive scanning or expensive security experts. Only Contrast has sensors that work actively inside applications to uncover vulnerabilities, prevent data breaches, and secure the entire enterprise from development, to operations, to production.
HelpSystems is a software company focused on helping exceptional organizations Build a Better IT™. Our cybersecurity and automation software simplifies critical IT processes to give our customers peace of mind. HelpSystems offer a comprehensive, powerful data security suite designed for today’s hybrid IT reality. We partner with organizations to provide layered data protection where you need it most. From understanding what data you have to controlling its access and sharing it securely, we can help minimize threats and maintain compliance – wherever data is stored or moved. Our complete solution set includes data classification, DLP, email security, managed file transfer, encryption, and digital rights management for ultimate, data-centric security from one trusted vendor. Learn more at www.helpsystems.com
The Security Platform for the Cloud.
Lacework delivers security and compliance for the cloud. The Lacework Cloud Security Platform is cloud-native and offered as-a-Service; delivering build-time to run-time threat detection, behavioral anomaly detection, and cloud compliance across multicloud environments, workloads, containers, and Kubernetes. Customers significantly drive down costs and risk by freeing themselves from the burden of unnecessary hardware, rule writing, and inaccurate alerts. We automate cloud security at scale so your organization can innovate with speed and safety.
Panaseer is the first Continuous Controls Monitoring platform for enterprise security. We help stakeholders to make informed, risk-based security decisions.
Our platform shows you every asset, application, user and database across your IT estate in real-time. This identifies gaps in controls coverage, aligns security with framework standards and substantiates regulatory compliance.
Our automated reports significantly reduce reporting time and tailor insights to stakeholders at every level, enhancing decision-making from the boardroom to the analyst. These reports can also be mapped to the organisation’s structure, so you can prioritise risk based on impact to the business.
Enterprise security leaders around the world trust our platform to help them make better security decisions.