F-Secure Countercept provides a complete managed service for the detection of, and response to, cyber-attacks, specializing in the ability to detect and respond to state-sponsored attacks (APT groups).
Unlike the traditional style of intrusion detection, based on purely ‘alert driven’ monitoring, F-Secure Countercept offers a 24/7/365 proactive threat-hunting service built around Endpoint Detection and Response (EDR) that utilizes security professionals with real-world experience in attack simulation and incident response.
Forcepoint is transforming cybersecurity by focusing on what matters most: people’s behaviour as they interact with critical data and systems. This human-centric approach to cybersecurity frees employees to innovate by understanding the normal rhythm of user behaviour and the flow of data in and out of an organisation.
Forcepoint behaviour-based solutions adapt to risk in real time and are delivered via a converged security platform to protect network users and cloud access, prevent confidential data from leaving the corporate network, and eliminate breaches caused by insiders. Based in Austin, Texas, Forcepoint protects the human point for thousands of enterprise and government customers in more than 150 countries.
McAfee is the device-to-cloud cybersecurity company. Inspired by the power of working together, McAfee creates business and consumer solutions that make our world a safer place.
By building solutions that work with other companies’ products, McAfee helps businesses orchestrate cyber environments that are truly integrated, where protection, detection, and correction of threats happen simultaneously and collaboratively.
By protecting consumers across all their devices, McAfee secures their digital lifestyle at home and away. By working with other security players, McAfee is leading the effort to unite against cybercriminals for the benefit of all.
Okta is the leading independent provider of Identity for the Enterprise.
The Okta Identity Cloud connects and protects employees of many of the world's largest enterprises. It also securely connects enterprises to their partners, suppliers and customers. With deep integrations to over 6,000 apps, the Okta Identity Cloud enables simple and secure access from any device.
We make Experian, NHS, LinkedIn, Flex, News Corp, Gavi, Funding Circle and Adobe successful by enabling them to securely use the best technologies for their business.
Proofpoint, Inc. is a leading next-generation security and compliance company that provides cloud-based solutions for comprehensive threat protection, incident response, secure communications, social media security, compliance, archiving and governance.
Organisations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system.
Proofpoint protects against phishing, malware and spam, while safeguarding privacy, encrypting sensitive information, and archiving and governing messages and critical enterprise information.
More information is available at www.proofpoint.com
SailPoint is the leading provider of enterprise identity governance solutions. Our team of visionary industry veterans launched SailPoint to empower our customers to efficiently and securely govern the digital identities of employees, contractors, business partners and other users, and manage their constantly changing access rights to enterprise applications and data. Our open identity platform provides organizations with critical visibility into who currently has access to which resources, who should have access to those resources, and how that access is being used.
SentinelOne is a pioneer in delivering zero-touch endpoint security to help business secure their assets with speed and simplicity. It unifies prevention, detection, response, remediation and forensics in a single platform powered by artificial-intelligence, behavioral analysis and intelligent automation to enable organizations to minimize their time to protection.
More information is available at www.sentinelone.com
Skybox arms security leaders with a comprehensive cybersecurity management platform to address the security challenges of large, complex networks. The Skybox® Security Suite breaks down data silos to build a dynamic network model that gives complete visibility of an organization’s attack surface and the context needed for informed action across physical, multi-cloud and operational technology networks. We leverage data by integrating with 120 security technologies, using analytics, automation and advanced threat intelligence from the Skybox® Research Lab to continuously analyze vulnerabilities in your environment and correlate them with exploits in the wild. This makes the prioritization and mitigation of imminent threats an efficient and systematic process, decreasing the attack surface and enabling swift response to exposures that truly put your organization at risk.
Our award-winning solutions in vulnerability and threat management, firewall and security policy management, and attack surface visibility automate as much as 90 percent of manual processes and are used by the world’s most security-conscious enterprises and government agencies, including Forbes Global 2000 companies.
Find out more: www.skyboxsecurity.com.
Tufin® is the leader in Network Security Policy Orchestration for enterprise cybersecurity. More than half of the top 50 companies in the Forbes Global 2000 turn to Tufin to simplify management of some of the largest, most complex networks in the world, consisting of thousands of firewall and network devices and emerging hybrid cloud infrastructures.
Enterprises select the company’s award-winning Tufin Orchestration Suite™ to increase agility in the face of ever-changing business demands while maintaining a robust security posture. The Suite reduces the attack surface and meets the need for greater visibility into secure and reliable application connectivity. Its network security automation enables enterprises to implement changes in minutes with proactive risk analysis and continuous policy compliance.
Tufin serves over 2,000 customers spanning all industries and geographies; its products and technologies are patent-protected in the U.S. and other countries. Find out more at www.tufin.com, follow Tufin on Twitter at @TufinTech and read more on Tufin’s blog, Suite Talk.
Our experts are helping organisations in every industry transform their businesses, get more from their data, secure their systems, and personalise customer service. We’ve got the experience and solutions you can trust. We believe that’s why we’ve been named a Leader in three Gartner Magic Quadrants—for Network Services, Global; Managed Security Services, Worldwide; and Unified Communications as a Service, Worldwide.
Our experience doesn’t just come from helping other organisations transform their businesses. It comes from transforming our own operations to better serve our customers. We understand the challenges you face, because we’ve faced many of them ourselves. We operate over 2,300 retail stores in the US. And we’ve been through deregulation in the market 20 years ago, and multiple technology changes. We’re living proof that you can survive disruption and thrive.
With our global reach and extensive experience, we’re in a unique position to support you in transforming your contact centre to deliver great CX.
Cybereason is the leader in endpoint protection, offering endpoint detection and response, next-generation antivirus, and managed monitoring services. Founded by elite intelligence professionals born and bred in offense-first hunting, Cybereason gives enterprises the upper hand over cyber adversaries. The Cybereason platform is powered by a custom-built in-memory graph, the only truly automated hunting engine anywhere. It detects behavioral patterns across every endpoint and surfaces malicious operations in an exceptionally user-friendly interface. Cybereason is privately held and headquartered in Boston with offices in London, Tel Aviv, and Tokyo.
ForeScout Technologies is transforming security through visibility, providing Global 2000 enterprises and government agencies with agentless visibility and control of traditional and IoT devices the instant they connect to the network.
Our technology continuously assesses, remediates and monitors devices and works with disparate security tools to help accelerate incident response, break down silos, automate workflows and optimize existing investments. As of June 30, 2017 more than 2,500 customers in over 70 countries improve their network security and compliance posture with ForeScout solutions.
See devices. Control them. Orchestrate system-wide threat response. Learn how at www.forescout.com
Illusive Networks empowers security teams to reduce the business risk created by today’s advanced, targeted threats by destroying an attacker’s ability to move laterally toward critical assets. Illusive reduces the attack surface to preempt attacks, detects unauthorized lateral movement early in the attack cycle, and provides rich, real-time forensics that enhance response and inform cyber resilience efforts. Agentless and AI-driven, Illusive technology enables organizations to proactively intervene in the attack process and avoid operational disruption and business losses, while functioning with greater confidence in today’s complex, hyper-connected world.
| OneTrust Privacy
OneTrust is the #1 most widely used privacy, security and third-party risk technology platform trusted by more than 3,000 companies to comply with the CCPA, GDPR, ISO27001 and hundreds of the world’s privacy and security laws. OneTrust’s three primary offerings include OneTrust Privacy Management Software, OneTrust PreferenceChoice™ consent and preference management software, and OneTrust Vendorpedia™ third-party risk management software and vendor risk exchange. To learn more, visit
OneTrust Third-Party Risk Management Software is the way the world manages vendor security and privacy risk at scale. Through a centralized platform, security and privacy professionals can assess, exchange and monitor third-party risk programs for the CCPA, GDPR, ISO27001 and hundreds of the world's privacy regulations and security frameworks.
OneTrust Third-Party Risk Management enables teams to automate vendor risks assessments via industry-standard templates, free OneTrust vendor chasing services and bring-your-own assessment capabilities. With Vendorpedia™ Third-Party Risk Exchange, access thousands of vendor security and privacy profiles, pre-completed assessments and tiered assessment validation. Teams can leverage ongoing third-party threat monitoring, including privacy and security scanning, upstream assessment updates and ongoing compliance alerts.
For more information about OneTrust Third-Party Risk Management, visit onetrust.com/VRM. To see how OneTrust powers compliance across privacy, security, third-party risk and marketing teams, visit
Radware (NASDAQ: RDWR) is a global leader of application delivery and network and application security solutions for enterprises, carriers and service providers.
Radware’s suite of DDoS protection solutions and web application security offerings provide integrated application and network security solutions for a best of breed, multi-layered security architecture. Our Attack Mitigation Solution is a hybrid DDoS protection solution integrating always-on detection and mitigation (on-premise or in the cloud) with cloud-based volumetric DDoS attack prevention, scrubbing and 24x7 cyber attack and DDoS security with Radware’s Emergency Response Team (ERT) support.
It is the industry's first fully integrated IT security solution that protects application infrastructure in real time against network and application downtime, application vulnerability exploitation, malware spread, information theft, Web services attacks and Web defacement.
As methods of attack increase in frequency, sophistication and severity, security solutions need to meet and surpass these threats. Radware's dynamic real-time security solutions provide the necessary level of defense for today's application and network security needs, and are ready for tomorrow's challenges.
Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Our solutions for consumers, businesses and governments provide layered content security to protect information on mobile devices, endpoints, gateways, servers and the cloud.
Trend Micro enables the smart protection of information, with innovative technology that is simple to deploy and manage, and security that fits an evolving ecosystem. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks.
All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™, and are supported by over 1,200 threat experts around the globe. For more information, visit www.trendmicro.com
Agari protects the inboxes of the world’s largest organisations from the #1 cyber security threat of advanced email attacks including phishing and business email compromise.
Email is the most popular communication tool and the entry point for up to 95% of security breaches. The Agari Email Trust Platform is the only solution that verifies trusted email identities based on insight into 10 billion emails per day to stop advanced email threats that use identity deception.
The Agari Email Trust platform powers Agari Enterprise Protect, which help organisations protect themselves from advanced spear phishing attacks, and Agari Customer Protect, which protects consumers from email attacks that spoof enterprise brands.
Agari is a recipient of the JPMorgan Chase Hall of Innovation Award and recognised as a Gartner Cool Vendor in Security. Learn more at www.agari.com and follow us on Twitter @AgariInc
The leading provider of business-driven security management solutions, AlgoSec helps the world’s largest organizations align security with their business processes. With AlgoSec users can discover, map and migrate business application connectivity, proactively analyze risk from the business perspective, tie cyber-attacks to business processes and intelligently automate network security changes with zero touch - across their cloud, SDN and on-premise networks.
Over 1,500 enterprises, including 20 of the Fortune 50, utilize AlgoSec’s solutions to make their organizations more agile, more secure and more compliant - all the time. Since its inception, AlgoSec has provided the industry’s only money-back guarantee.
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment.
By implementing least privilege access, Centrify minimizes the attack surface, improves audit and compliance visibility, and reduces risk, complexity and costs for the modern, hybrid enterprise. Over half of the Fortune 100, the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies, all trust Centrify to stop the leading cause of breaches – privileged credential abuse.
We are CORVID – an experienced team of cyber security experts, developers and analysts who are passionate about delivering innovative, robust and extensive cyber defence solutions and services to protect businesses against cyber threats.
Part of Ultra Electronics, a FTSE 250 company, we understand the highest standards required to safeguard against cyber threats – it’s the reason CORVID was created. We’re committed to providing industry-leading cyber security services with integrity, including:
• Email Protection
• Managed Detection and Response
• Vulnerability Scanning
• Network Defence
• Compromise Assessments
• Cyber Consultancy
Our approach is proactive and we nurture close working relationships with our customers to establish and maintain an effective response to their cyber security challenges, in a professional and efficient manner. What’s more, we pride ourselves on discretion – if we’re providing intelligent, efficient cyber defence solutions that go unnoticed, we’re doing our job!
Kenna is a Risk and Vulnerability Intelligence platform that measures risk, predicts attacks, and prioritizes remediation efforts quickly before an attacker can exploit vulnerabilities. By leveraging more than 15 sources of exploit intelligence, a growing knowledge base of more than 2 billion managed vulnerabilities, global attack telemetry and remediation intelligence, Kenna provides the most accurate and focused risk prioritization available.
Kenna also offers predictive modeling technology that accurately forecasts the future weaponization and risk of emergent threats the instant they’re disclosed. The Kenna Security platform seamlessly integrates with existing workflows, processes and tools, making for easy and rapid implementation.
| Micro Focus
Cyber threats are escalating. Aging apps and processes (along with new ones) are full of unforeseen risks. Privacy and compliance requirements are mounting. And point solutions don’t offer the scope, vision, or cross-silo analytics needed for these company-wide challenges.
With our solutions, you can take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data.
Our Security, Risk, and Governance solutions help you:
Nominet has been at the heart of the internet for over 20 years running the .UK internet infrastructure, keeping it safe and secure. In providing registry services for top level domains, it has a wealth of experience in running and protecting the Domain Name System (DNS) as well as analysing threats within the DNS traffic.
This expertise underpins its cyber security solutions that protect governments and global enterprises from constant attack. NTX uses machine learning to reduce risk on your network and eliminates threats before they cause harm. It analyses DNS traffic for known and unknown bad in real time to predict, detect and block cyber threats.
Providing your security teams with visibility and protection against critical threats such as malware, phishing, data theft and DNS hijacking, NTX narrows the window of compromise by identifying malicious domains, on average, one week faster than other network security solutions.
NTX is an easy-to-deploy solution used by commercial clients worldwide, as well as the UK Government and over 400 of its public bodies as part of the Protective DNS service we provide.
Protegrity is the leading enterprise data security software company worldwide, providing high performance, infinitely scalable, end-to-end data security solutions. Protegrity delivers centrally managed and controlled data security that protects sensitive information across the enterprise in big data, databases, applications and file systems from the point of acquisition to deletion.
Protegrity’s solutions give corporations the ability to implement a variety of data protection methods, including Vaultless Tokenization, strong encryption, masking, and monitoring to ensure the protection of their sensitive data and enable compliance for PCI DSS, HIPAA and other data security requirements.
Protegrity’s award winning software products and innovative technology are backed by over 17 industry patents, all of which elevate the Protegrity Data Security Platform above point solutions. Protegrity employees are security technology specialists with deep industry expertise in data security approaches and techniques, including key management, forensics reporting and security policy definition and management. Protegrity has helped more than 200 enterprise customers worldwide to fulfill their obligations to protect their sensitive data, brand, and business reputation.
Qualys is a pioneer and leading provider of cloud-based security and compliance solutions with over 10,300 customers in more than 130 countries.Qualys helps organisations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds.
RSA delivers business-driven security solutions that provide a unified approach to managing digital risk that hinges on integrated visibility, automated insights and coordinated actions. RSA solutions protect millions of users globally and help more than 90 percent of Fortune 500 companies thrive and continuously adapt to transformational change.
RSA solutions hold leadership positions in Gartner Magic Quadrants and protect over 50 million identities and over a billion consumers worldwide. With over 700 dedicated security practitioners and a global ecosystem of over 400 partners, RSA delivers unified capabilities in the four essential areas of business-driven security: evolved SIEM & threat defence, identity and access assurance, integrated risk management, and fraud prevention, as well as services for risk and cyber security.
Veracode gives companies a comprehensive view of security defects so they can create secure software, and ensure the software they are buying or downloading is free of vulnerabilities. As a result, companies using Veracode are free to boldly innovate, explore, discover, and change the world.
With its combination of automation, integrations, process, and speed, Veracode helps companies make security a seamless part of the development process. This allows them to both find and fix security defects quickly so that they can use software to achieve their missions.
Companies collaborating with Veracode are able to create comprehensive application security programs that focus on reducing risk, achieving compliance with industry regulations and customer requirements, increasing the speed of secure software delivery, and making secure software a competitive advantage.
The Veracode Verified Program allows customers to provide attestation of their secure development processes, demonstrating their commitment to creating secure software.
Securing software is a priority for any company looking to change the world. With Veracode, companies can start securing their software immediately, without the need for additional staff or equipment.