AttackIQ, the leading independent vendor of breach and attack simulation solutions, built the industry’s first Security Optimization Platform for continuous security control validation and improving security program effectiveness and efficiency. AttackIQ is trusted by leading organizations worldwide to plan security improvements and verify that cyberdefenses work as expected, aligned with the MITRE ATT&CK framework. The Company is committed to giving back to the cybersecurity community through its free AttackIQ Academy, open Preactive Security Exchange, and partnership with the MITRE Engenuity.
Follow AttackIQ on Twitter, LinkedIn, and YouTube.
Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy. With solutions for both cyber asset attack surface management (CAASM) and SaaS management, Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically validate and enforce policies. Cited as one of the fastest-growing cybersecurity startups, with accolades from CNBC, Forbes, and Fortune, Axonius covers millions of assets, including devices and cloud assets, user accounts, and SaaS applications, for customers around the world. For more, visit Axonius.com.
CrowdStrike Holdings, Inc. (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with one of the world’s most advanced cloud-native platforms for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data.
Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.
Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.
CrowdStrike: We stop breaches.
Learn more: https://www.crowdstrike.com/
Devo is the only cloud-native logging and security analytics platform that releases the full potential of your data to empower bold, confident action. With unrivaled scale to collect all of your data without compromise, speed to give you immediate access and answers, and clarity to focus on the signals that matter most, Devo is your ally in protecting your organization today and tomorrow. Devo is headquartered in Cambridge, Massachusetts, USA and has its European headquarters in Madrid, Spain. Devo is backed by Insight Partners, Georgian, and Bessemer Venture Partners. Learn more at www.devo.com.
FireMon is the only agile network security policy platform for firewalls and cloud security groups providing the fastest way to streamline network security policy management, which is one of the biggest impediments to IT and enterprise agility. Since creating the first-ever network security policy management solution, FireMon has delivered command and control over complex network security infrastructures for more than 1,700 customers located in nearly 70 countries around the world. For more information, visit www.firemon.com.
We're a group of cyber and technology experts with a mission to revolutionize security operations by combining data engineering, security expertise and layers of automation to expedite decision making, helping security teams become attack-ready.
Hunters infuses how attackers think and act into a platform that helps security operations see and stop attacks at their root.
Founded in 2014, IronNet Cybersecurity is a global cybersecurity leader that is revolutionizing how enterprises, industries, and governments secure their networks. IronNet takes the skills of its top-notch cybersecurity operators with their real-world, public and private sector, offensive and defensive cyber experience, and integrates their deep tradecraft knowledge into its industry-leading products to solve the most challenging cyber problems facing industry today.
IronNet’s solutions leverage behavioral analytics, machine learning, and artificial intelligence techniques to help public and private enterprises across critical infrastructure detect unknown threats. Our ability to share the derived raw intelligence with peer enterprises in real-time and at machine speed, uniquely enables industries and governments to collectively defend against well-funded nation state and cyber criminal threats.
KnowBe4 is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering.
The KnowBe4 platform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Our goal was to design the most powerful, yet easy-to-use platform available.
Customers of all sizes can get the KnowBe4 platform deployed into production twice as fast as our competitors. Our Customer Success team gets you going in no time, without the need for consulting hours.
Noetic Cyber enables security teams to make faster, more accurate decisions to detect coverage gaps and reduce cyber risk. The Noetic solution is a cloud-based Continuous Cyber Asset Management & Controls Platform that provides teams with unified visibility of all assets across their cloud and on-premises systems, and delivers continuous, automated remediation to close coverage gaps and enforce security policy. Noetic improves security tool and control efficacy by breaking down existing siloes and improving the entire security ecosystem. Founded in 2019, Noetic is based in Boston and London.
Enterprise applications and services are only as fast and secure as the APIs that power them; however, most enterprises don’t have a standardized way to inventory, monitor, and secure APIs. The growing complexity of APIs cripples deployment velocity and APIs are quickly becoming the most frequent cyber security attack vector.
Noname Security creates the most powerful, complete, and easy-to-use API security platform that helps enterprises discover, analyze, remediate, and test all legacy and modern APIs. Noname finds and inventories all APIs; detects attacks, suspicious behavior, and misconfigurations using AI-based behavioral analysis; prevents attacks and integrates with existing remediation and security infrastructure; and actively validates APIs before deployment.
Unlike other API security solutions, Noname runs completely out-of-band and doesn’t require any agents or network modifications. Within minutes, you can have complete visibility into all internal, external, and 3rd party APIs. Only Noname Security can find all shadow APIs and API misconfigurations before the bad guys do.
ReliaQuest, is a force multiplier for security operations to increase visibility, decrease complexity and reduce risks. ReliaQuest GreyMatter, cloud-native Open XDR-as-a-service, brings together telemetry from any security and business solution to unify detection, investigation, response and resilience. Delivered with 24/7/365 security expertise, organizations get the visibility and coverage they require to make their cybersecurity program effective.
Organisations rely on Beyond Identity to secure identities on the internet. Beyond Identity secures access to SaaS applications and cloud resources to protect data and privacy. Breaking down the barriers between cybersecurity, identity, and device management, Beyond Identity provides the most secure authentication on the planet, and dramatically improves the way the world logs in.
With the Beyond Identity Passwordless Identity Platform, organisations can eliminate passwords, positively verify user identities, confirm device trust, and enforce risk-based access controls. Beyond Identity enables security teams to implement zero-trust so their organisations can safely and securely work in hybrid-work environments with increasingly cloud-centric IT. Organisations turn to Beyond Identity to stop cyberattacks, protect their most critical data, and meet compliance requirements.
We offer SaaS, subscription-based software.
Founded in 2019, Beyond Identity is headquartered in NYC, and has offices in Boston, Dallas, and London.
Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide.
Guardian over millions of consumer, business, and government environments, Bitdefender is the industry’s trusted expert for eliminating threats, protecting privacy and data, and enabling cyber resiliency.
With deep investments in research and development, Bitdefender Labs discovers 400 new threats each minute and validates 30 billion threat queries daily.
The company has pioneered breakthrough innovations in anti-malware, IoT security, behavioral analytics, and artificial intelligence and its technology is licensed by more than 150 of the world’s most recognized technology brands.
For companies that want to manage their security posture against the evolving threat landscape: Cymulate SaaS-based Extended Security Posture Management (XSPM) deploys within an hour, enabling security professionals to continuously challenge, validate and optimize their cyber-security posture end-to-end across the MITRE ATT&CK® framework. The platform provides out-of-the-box, expert, and threat intelligence-led risk assessments that are simple to deploy and use for all maturity levels, and constantly updated. It also provides an open framework to create and automate red and purple teaming by generating penetration scenarios and advanced attack campaigns tailored to their unique environments and security policies. Cymulate allows professionals to manage, know and control their dynamic environment.
For more information, please visit www.cymulate.com
Imperva is a cybersecurity leader with a mission to protect data and all paths to it. We protect the data of over 6,000 global customers from cyber attacks through all stages of their digital transformation. Our products are informed by the Imperva Research Lab, a global threat intelligence community, that feeds the latest security and compliance expertise into our solutions.
Over 500 of the largest and most security-conscious enterprises in the world rely on Skybox® Security for the insights and assurance required to stay ahead of dynamically changing attack surfaces. At Skybox, we don’t just serve up data and information. We provide the intelligence and context to make informed decisions, taking the guesswork out of securely enabling enterprises at scale and speed. Our security posture management platform delivers complete visibility, analytics, and automation to quickly map, prioritize and remediate vulnerabilities across your organization. The vendor-agnostic platform intelligently optimizes security policies, actions, and change processes across all corporate networks and cloud environments. With Skybox, security teams can now focus on the most strategic business initiatives while ensuring enterprises remain protected.
At Talion, we’re changing the way organisations interact with their Managed Security Service Provider. Born out of BAE Systems, our service is built on first-hand knowledge of military engineering and defence-grade security, together with an in-depth understanding of the threat landscape facing the commercial world today.
When it comes to cyber security, we believe every organisation deserves full visibility and complete control over how threats are monitored, how decisions are made, and how their business is protected. That’s why we prioritise transparency and collaboration across our service lines, implementing security programs that give businesses the control and freedom to pursue ambitions and realise goals, safe in the knowledge that we’ve got their back, 24 hours a day, 7 days a week.
Tenable®, Inc. is the Cyber Exposure company. Over 30,000 organisations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 30 percent of the Global 2000 and large government agencies. Learn more at www.tenable.com.
Vectra® is a leader in threat detection and response for hybrid and multi-cloud enterprises. The Vectra platform uses AI to detect threats at speed across public cloud, identity, SaaS applications, and data centres. Only Vectra optimises AI to detect attacker methods—the TTPs at the heart of all attacks—rather than simplistically alerting on “different”. The resulting high-fidelity threat signal and clear context enables security teams to respond to threats sooner and to stop attacks in progress faster. Organisations worldwide rely on Vectra for resilience in the face of dangerous cyber threats and to prevent ransomware, supply chain compromise, identity takeovers, and other cyberattacks from impacting their businesses. For more information, visit vectra.ai.
XM Cyber is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk. Its attack path management platform continuously uncovers hidden attack paths to businesses’ critical assets across cloud and on-prem environments, enabling security teams to cut them off at key junctures and eradicate risk with a fraction of the effort. Many of the world’s largest, most complex organizations choose XM Cyber to help eradicate risk. Founded by top executives from the Israeli cyber intelligence community, XM Cyber has offices in North America, Europe, and Israel.
Anomali is the leader in intelligence-driven extended detection and response (XDR) cybersecurity solutions. Anchored by big data management and refined by artificial intelligence, the Anomali XDR platform delivers proprietary capabilities that correlate the largest repository of global intelligence with telemetry from customer-deployed security solutions, empowering security operations teams to detect threats with precision, optimize response, achieve resiliency, and stop attackers and breaches. Our SaaS-based solutions easily integrate into existing security tech stacks through native-cloud, multi-cloud, on-premises, and hybrid deployments. Founded in 2013, Anomali serves public and private sector organizations, ISACs, MSSPs, and Global 1000 customers around the world in every major industry. Leading venture firms including General Catalyst, Google Ventures, and IVP back Anomali. Learn more at www.anomali.com.
Contrast Security is the world's leading provider of security technology that enables software applications to protect themselves against cyberattacks, heralding the new era of self-protecting software. Contrast's patented deep security instrumentation is the breakthrough technology that enables highly accurate assessment and always-on protection of an entire application portfolio, without disruptive scanning or expensive security experts. Only Contrast has sensors that work actively inside applications to uncover vulnerabilities, prevent data breaches, and secure the entire enterprise from development, to operations, to production.
HelpSystems is a software company focused on helping exceptional organizations Build a Better IT™. Our cybersecurity and automation software simplifies critical IT processes to give our customers peace of mind. HelpSystems offer a comprehensive, powerful data security suite designed for today’s hybrid IT reality. We partner with organizations to provide layered data protection where you need it most. From understanding what data you have to controlling its access and sharing it securely, we can help minimize threats and maintain compliance – wherever data is stored or moved. Our complete solution set includes data classification, DLP, email security, managed file transfer, encryption, and digital rights management for ultimate, data-centric security from one trusted vendor. Learn more at www.helpsystems.com
The Security Platform for the Cloud.
Lacework delivers security and compliance for the cloud. The Lacework Cloud Security Platform is cloud-native and offered as-a-Service; delivering build-time to run-time threat detection, behavioral anomaly detection, and cloud compliance across multicloud environments, workloads, containers, and Kubernetes. Customers significantly drive down costs and risk by freeing themselves from the burden of unnecessary hardware, rule writing, and inaccurate alerts. We automate cloud security at scale so your organization can innovate with speed and safety.
Panaseer is the first Continuous Controls Monitoring platform for enterprise security. We help stakeholders to make informed, risk-based security decisions.
Our platform shows you every asset, application, user and database across your IT estate in real-time. This identifies gaps in controls coverage, aligns security with framework standards and substantiates regulatory compliance.
Our automated reports significantly reduce reporting time and tailor insights to stakeholders at every level, enhancing decision-making from the boardroom to the analyst. These reports can also be mapped to the organisation’s structure, so you can prioritise risk based on impact to the business.
Enterprise security leaders around the world trust our platform to help them make better security decisions.
Picus Security is a leading Breach and Attack Simulation (BAS) vendor, enabling organisations to test, measure and improve the effectiveness of their cyber security controls through automated and continuous offensive and defensive security testing.
Picus’ complete security control validation platform challenges organisations' cyber-security controls at prevention and detection layers by simulating over 10,000 threats and attack scenarios. This includes the latest types of malware and ransomware as well as MITRE ATT&CK techniques.
Crucially, the Picus platform not only identifies defensive weaknesses as well as threat coverage and visibility gaps, it supplies content to help mitigate them too. This includes prevention signatures as well as detection rules for SIEM and EDR tools - removing the need for security teams to create and test their own.
Unlike other tools and assessments, Picus enables security leaders to understand and measure an organisation’s cyber security posture at any moment in time. It provides insights into the impact of infrastructure changes and security improvements, and helps guide and prioritise future investment decisions.