Cybereason is the leader in endpoint protection, offering endpoint detection and response, next-generation antivirus, and managed monitoring services. Founded by elite intelligence professionals born and bred in offense-first hunting, Cybereason gives enterprises the upper hand over cyber adversaries. The Cybereason platform is powered by a custom-built in-memory graph, the only truly automated hunting engine anywhere. It detects behavioral patterns across every endpoint and surfaces malicious operations in an exceptionally user-friendly interface. Cybereason is privately held and headquartered in Boston with offices in London, Tel Aviv, and Tokyo.
F-Secure Countercept provides a complete managed service for the detection of, and response to, cyber-attacks, specializing in the ability to detect and respond to state-sponsored attacks (APT groups).
Unlike the traditional style of intrusion detection, based on purely ‘alert driven’ monitoring, F-Secure Countercept offers a 24/7/365 proactive threat-hunting service built around Endpoint Detection and Response (EDR) that utilizes security professionals with real-world experience in attack simulation and incident response.
Proofpoint, Inc. is a leading next-generation security and compliance company that provides cloud-based solutions for comprehensive threat protection, incident response, secure communications, social media security, compliance, archiving and governance.
Organisations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system.
Proofpoint protects against phishing, malware and spam, while safeguarding privacy, encrypting sensitive information, and archiving and governing messages and critical enterprise information.
More information is available at www.proofpoint.com
ReliaQuest, is a force multiplier for security operations to increase visibility, decrease complexity and reduce risks. ReliaQuest GreyMatter, cloud-native Open XDR-as-a-service, brings together telemetry from any security and business solution to unify detection, investigation, response and resilience. Delivered with 24/7/365 security expertise, organizations get the visibility and coverage they require to make their cybersecurity program effective.
SailPoint, the leader in identity management, delivers an innovative approach to securing access across the enterprise with the SailPoint Predictive IdentityTM platform. With SailPoint, enterprises can ensure that everyone and everything has the exact access they need, exactly when they need it, intuitively and automatically. Powered by patented Artificial Intelligence (AI) and Machine Learning( ML) technologies, the SailPoint Predictive IdentityTM platform is designed to securely accelerate the business while delivering adaptive security, continuous compliance and improved business efficiency. As an identity pioneer and market leader serving some of the world’s most prominent global companies, SailPoint consistently pushes the industry to rethink identity to the benefit of their customers’ dynamic business needs.
Stay up-to-date on SailPoint by following us on Twitter and LinkedIn and by subscribing to the SailPoint blog.
SentinelOne is a pioneer in delivering zero-touch endpoint security to help business secure their assets with speed and simplicity. It unifies prevention, detection, response, remediation and forensics in a single platform powered by artificial-intelligence, behavioral analysis and intelligent automation to enable organizations to minimize their time to protection.
More information is available at www.sentinelone.com
Skybox arms security leaders with a comprehensive cybersecurity management platform to address the security challenges of large, complex networks. The Skybox® Security Suite breaks down data silos to build a dynamic network model that gives complete visibility of an organization’s attack surface and the context needed for informed action across physical, multi-cloud and operational technology networks. We leverage data by integrating with 120 security technologies, using analytics, automation and advanced threat intelligence from the Skybox® Research Lab to continuously analyze vulnerabilities in your environment and correlate them with exploits in the wild. This makes the prioritization and mitigation of imminent threats an efficient and systematic process, decreasing the attack surface and enabling swift response to exposures that truly put your organization at risk.
Our award-winning solutions in vulnerability and threat management, firewall and security policy management, and attack surface visibility automate as much as 90 percent of manual processes and are used by the world’s most security-conscious enterprises and government agencies, including Forbes Global 2000 companies.
Find out more: www.skyboxsecurity.com.
Tufin® is the leader in Network Security Policy Orchestration. We serve over 2,000 customers worldwide including more than half of the top 50 companies in the Forbes Global 2100 who employ Tufin solutions to simplify management of some of the largest, most complex networks in the world.
XM Cyber is the global leader in Attack-Centric Risk Prioritization, which is also known as Risk-Based Vulnerability Management (RBVM). The XM Cyber platform enables companies to rapidly respond to cyber risks affecting their business-sensitive systems by continuously finding new exposures, including exploitable vulnerabilities and credentials, misconfigurations, and user activities. XM Cyber constantly simulates and prioritizes the attack paths putting mission-critical systems at risk, providing context-sensitive remediation options. XM Cyber helps to eliminate 99% of the risk by focusing allowing IT and Security Operations to focus on the 1% of the exposures before they get exploited to breach the organization’s “crown jewels” – its critical assets. XM Cyber was founded by top executives from the Israeli cyber intelligence community and has offices in North America, Europe, and Israel.
Organisations rely on Beyond Identity to secure identities on the internet. Beyond Identity secures access to SaaS applications and cloud resources to protect data and privacy. Breaking down the barriers between cybersecurity, identity, and device management, Beyond Identity provides the most secure authentication on the planet, and dramatically improves the way the world logs in.
With the Beyond Identity Passwordless Identity Platform, organisations can eliminate passwords, positively verify user identities, confirm device trust, and enforce risk-based access controls. Beyond Identity enables security teams to implement zero-trust so their organisations can safely and securely work in hybrid-work environments with increasingly cloud-centric IT. Organisations turn to Beyond Identity to stop cyberattacks, protect their most critical data, and meet compliance requirements.
We offer SaaS, subscription-based software.
Founded in 2019, Beyond Identity is headquartered in NYC, and has offices in Boston, Dallas, and London.
CyberVadis provides enterprises with a cost-effective and scalable solution for third-party cybersecurity risk assessments. For a fixed annual fee we perform an unlimited number of evidence-based assessments via the CyberVadis platform. Our intuitive and user-friendly platform is built on a methodology that maps to all major international compliance standards, including NIST, ISO 27001, GDPR, and many other privacy and security laws. The CyberVadis solution combines the speed of automation with the accuracy and effectiveness of our team of experts.
We directly engage vendors from all over the world with assessments and validate results with an in-house team of security analysts. CyberVadis provides companies a standardized cybersecurity rating that they can share with others, along with a detailed improvement plan for increasing their score and the ability to collaborate with clients on implementing better practices.
Darktrace (DARK:L), a global leader in cyber security AI, delivers world-class technology that protects over 5,000 customers worldwide from advanced threats, including ransomware and cloud and SaaS attacks. The company’s fundamentally different approach applies Self-Learning AI to enable machines to understand the business in order to autonomously defend it. Headquartered in Cambridge, UK, the company has 1,500 employees and over 30 offices worldwide. Darktrace was named one of TIME magazine’s ‘Most Influential Companies’ for 2021.
Google Cloud is helping you solve your business challenges head on with cloud computing services. We provide a modern security infrastructure from the user, to the device, to application, to platform. Chronicle, a global security telemetry platform for investigation and threat hunting within your enterprise network, makes security analytics instant, easy, and cost-effective. Chronicle, now part of Google Cloud, is a specialized, cloud-native security analytics system, built on the core infrastructure that powers Google itself. Security professionals use Chronicle to analyze petabytes of telemetry, at the speed of search.
Illusive Networks empowers security teams to reduce the business risk created by today’s advanced, targeted threats by destroying an attacker’s ability to move laterally toward critical assets. Illusive reduces the attack surface to preempt attacks, detects unauthorized lateral movement early in the attack cycle, and provides rich, real-time forensics that enhance response and inform cyber resilience efforts. Agentless and AI-driven, Illusive technology enables organizations to proactively intervene in the attack process and avoid operational disruption and business losses, while functioning with greater confidence in today’s complex, hyper-connected world.
Immersive Labs is the world’s first human cyber readiness platform. Our technology delivers challenge-based cybersecurity content developed by experts and powered by the latest threat intelligence. Our unique approach enables businesses to battle-test and evidence their workforce’s preparedness to face emerging cyber threats.
IntSights, a Rapid7 company, enables organizations of any type or size to gain the full benefits of external threat intelligence, no matter the size or sophistication of their threat intelligence programs. Unlike other solutions on the market, IntSights takes the complexity out of threat intelligence delivering instant value without the heavy lift or sizable resource allocation that traditional threat intelligence solutions require. Designed to scale, IntSights delivers frictionless integration of our real-time cyber threat intelligence with existing security infrastructure allowing enterprises to maximize return on investment.
IntSights has offices in Amsterdam, Boston, Dallas, New York, Singapore, Tel Aviv, and Tokyo.
Kroll is the world’s premier provider of services and digital products related to governance, risk and transparency. Built on the strength and equity of our legacy brands, we are an independent advisory firm with nearly 5,000 professionals in 30 countries and territories around the world.
Our sharp analytical skills, paired with the latest technology, allow us to give our clients clarity—not just answers—in all areas of business.
Enterprise applications and services are only as fast and secure as the APIs that power them; however, most enterprises don’t have a standardized way to inventory, monitor, and secure APIs. The growing complexity of APIs cripples deployment velocity and APIs are quickly becoming the most frequent cyber security attack vector.
Noname Security creates the most powerful, complete, and easy-to-use API security platform that helps enterprises discover, analyze, remediate, and test all legacy and modern APIs. Noname finds and inventories all APIs; detects attacks, suspicious behavior, and misconfigurations using AI-based behavioral analysis; prevents attacks and integrates with existing remediation and security infrastructure; and actively validates APIs before deployment.
Unlike other API security solutions, Noname runs completely out-of-band and doesn’t require any agents or network modifications. Within minutes, you can have complete visibility into all internal, external, and 3rd party APIs. Only Noname Security can find all shadow APIs and API misconfigurations before the bad guys do.
At Talion, we’re changing the way organisations interact with their Managed Security Service Provider. Born out of BAE Systems, our service is built on first-hand knowledge of military engineering and defence-grade security, together with an in-depth understanding of the threat landscape facing the commercial world today.
When it comes to cyber security, we believe every organisation deserves full visibility and complete control over how threats are monitored, how decisions are made, and how their business is protected. That’s why we prioritise transparency and collaboration across our service lines, implementing security programs that give businesses the control and freedom to pursue ambitions and realise goals, safe in the knowledge that we’ve got their back, 24 hours a day, 7 days a week.
Veracode is the leading AppSec partner for confidently and efficiently creating secure software that moves your business, and the world, forward.
Veracode empowers its customers to confidently develop software by reducing the risk of security breach through comprehensive analysis, developer enablement, and governance tools.
Our passion is providing an uncompromising commitment to making secure software your competitive advantage.
Together, we can confidently respond to change faster, confidently identify and address security flaws more quickly, and we give our customers the confidence to focus on work that creates the blueprint for the future.
With a combination of automation, integrations, process, and speed, Veracode helps companies get accurate and reliable results with fewer false positives so they can be confident in knowing their software is protected by the industry's best solution.
Veracode serves more than 2,500 customers worldwide across a wide range of industries. The Veracode Solution has assessed more than 14 trillion lines of code and helped companies fix more than 48 million security flaw.
Axis Security transforms open networks and vulnerable applications into fully protected resources that enterprises can leverage to grow their business securely - and without complexity. Its purpose-built cloud-based service, The Application Access Cloud™ simplifies application access by providing a zero-trust network access solution that is able to fully replace and go beyond VPNs, without replicating or changing the existing network.
The Application Access Cloud has a unique overlay architecture that makes it extremely easy to deploy, use, and manage while delivering secure access by keeping users off the corporate network, and reducing risk by isolating applications. It enables more use cases than any other ZTNA solution, accommodating any application or user as well as latency-sensitive and multi-directional access scenarios. For more information visit: https://www.axissecurity.com/
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment.
By implementing least privilege access, Centrify minimizes the attack surface, improves audit and compliance visibility, and reduces risk, complexity and costs for the modern, hybrid enterprise. Over half of the Fortune 100, the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies, all trust Centrify to stop the leading cause of breaches – privileged credential abuse.
Devo is the only cloud-native logging and security analytics platform that releases the full potential of your data to empower bold, confident action. With unrivaled scale to collect all of your data without compromise, speed to give you immediate access and answers, and clarity to focus on the signals that matter most, Devo is your ally in protecting your organization today and tomorrow. Devo is headquartered in Cambridge, Massachusetts, USA and has its European headquarters in Madrid, Spain. Devo is backed by Insight Partners, Georgian, and Bessemer Venture Partners. Learn more at www.devo.com.
FireMon is the only agile network security policy platform for firewalls and cloud security groups providing the fastest way to streamline network security policy management, which is one of the biggest impediments to IT and enterprise agility. Since creating the first-ever network security policy management solution, FireMon has delivered command and control over complex network security infrastructures for more than 1,700 customers located in nearly 70 countries around the world. For more information, visit www.firemon.com.
Founded in 2006, Intragen is an identity-led security advisory and solution implementation partner. Intragen has implemented over one hundred Identity and Access Management (IAM) projects with its team of IAM experts and is continuously developing its offerings to meet the evolving demand of remote workforces, cloud environments and growing security threats. Intragen’s team of IAM professionals offers expert guidance to advance the security agenda for organisations looking for solutions. In-house teams can rely on experienced consultants for best practice advice and project management. Intragen offers a diverse portfolio of identity-led security solutions, including Identity and Access Governance, Access Management and Privileged Access Management. Working closely with organisations through assessments and workshops, Intragen will build a roadmap to structure the direction and outcomes of implemented security solutions. To find out more, visit www.intragen.com.
The digital transformation journey demands agility and defensibility from your IT infrastructure. Open Systems’ secure access service edge (SASE) solution unifies security and comprehensive networking capabilities, enabling organizations to connect their clouds, branches, applications and users anywhere in the world, in a secure and flexible way. Open Systems’ cloud-delivered Secure SD-WAN and Managed Detection and Response (MDR) services combine 24x7 experts with AIOps and an automation platform to deliver immediate peace of mind, and future-proof your business. For more information, visit open-systems.com.
Vectra® is the leader in threat detection and response – from cloud and data center workloads to user and IoT devices. Its Cognito® platform accelerates threat detection and investigation using AI to enrich network metadata it collects and stores with the right context to detect, hunt and investigate known and unknown threats in real time. Vectra offers four applications on the Cognito platform to address high-priority use cases. Cognito Stream™ sends security-enriched metadata to data lakes and SIEMs. Cognito Recall™ is a cloud-based application to store and investigate threats in enriched metadata. Cognito Detect™ uses AI to reveal and prioritize hidden and unknown attackers at speed. And Cognito Detect for Office 365 and Azure AD™ finds and stops attacks in enterprise SaaS applications and the Microsoft 365 ecosystem. For more information, visit vectra.ai..
A fast-growing European scale-up, ZIVVER has become a market leader in the Netherlands with their innovative communication security platform. Trusted by more than 3000 organisations of all sizes to safeguard important data, the user-friendly platform helps to improve regulatory compliance as well as business performance.
ZIVVER’s smart technology platform is designed to prevent human errors, the cause of over 75% of data leaks. Users receive real-time awareness training when sending sensitive communications electronically. The service conveniently integrates with leading email clients such as Outlook and Gmail, so it’s easy to use.
With ZIVVER, many companies quickly see a positive business case. That’s why 98% of customers renew their service agreements, and the average rating on Gartner Peer Reviews is 4.6 out of 5.