Okta is the leading independent provider of Identity for the Enterprise.
The Okta Identity Cloud connects and protects employees of many of the world's largest enterprises. It also securely connects enterprises to their partners, suppliers and customers. With deep integrations to over 6,000 apps, the Okta Identity Cloud enables simple and secure access from any device.
We make Experian, NHS, LinkedIn, Flex, News Corp, Gavi, Funding Circle and Adobe successful by enabling them to securely use the best technologies for their business.
Proofpoint, Inc. is a leading next-generation security and compliance company that provides cloud-based solutions for comprehensive threat protection, incident response, secure communications, social media security, compliance, archiving and governance.
Organisations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system.
Proofpoint protects against phishing, malware and spam, while safeguarding privacy, encrypting sensitive information, and archiving and governing messages and critical enterprise information.
More information is available at www.proofpoint.com
SailPoint is the leading provider of enterprise identity governance solutions. Our team of visionary industry veterans launched SailPoint to empower our customers to efficiently and securely govern the digital identities of employees, contractors, business partners and other users, and manage their constantly changing access rights to enterprise applications and data. Our open identity platform provides organizations with critical visibility into who currently has access to which resources, who should have access to those resources, and how that access is being used.
SentinelOne is a pioneer in delivering zero-touch endpoint security to help business secure their assets with speed and simplicity. It unifies prevention, detection, response, remediation and forensics in a single platform powered by artificial-intelligence, behavioral analysis and intelligent automation to enable organizations to minimize their time to protection.
Skybox arms security leaders with a comprehensive cybersecurity management platform to address the security challenges of large, complex networks. The Skybox® Security Suite breaks down data silos to build a dynamic network model that gives complete visibility of an organization’s attack surface and the context needed for informed action across physical, multi-cloud and operational technology networks. We leverage data by integrating with 120 security technologies, using analytics, automation and advanced threat intelligence from the Skybox® Research Lab to continuously analyze vulnerabilities in your environment and correlate them with exploits in the wild. This makes the prioritization and mitigation of imminent threats an efficient and systematic process, decreasing the attack surface and enabling swift response to exposures that truly put your organization at risk.
Our award-winning solutions in vulnerability and threat management, firewall and security policy management, and attack surface visibility automate as much as 90 percent of manual processes and are used by the world’s most security-conscious enterprises and government agencies, including Forbes Global 2000 companies.
Find out more: www.skyboxsecurity.com.
Tufin® is the leader in Network Security Policy Orchestration for enterprise cybersecurity. More than half of the top 50 companies in the Forbes Global 2000 turn to Tufin to simplify management of some of the largest, most complex networks in the world, consisting of thousands of firewall and network devices and emerging hybrid cloud infrastructures.
Enterprises select the company’s award-winning Tufin Orchestration Suite™ to increase agility in the face of ever-changing business demands while maintaining a robust security posture. The Suite reduces the attack surface and meets the need for greater visibility into secure and reliable application connectivity. Its network security automation enables enterprises to implement changes in minutes with proactive risk analysis and continuous policy compliance.
Tufin serves over 2,000 customers spanning all industries and geographies; its products and technologies are patent-protected in the U.S. and other countries. Find out more at www.tufin.com, follow Tufin on Twitter at @TufinTech and read more on Tufin’s blog, Suite Talk.
ForeScout Technologies is transforming security through visibility, providing Global 2000 enterprises and government agencies with agentless visibility and control of traditional and IoT devices the instant they connect to the network.
Our technology continuously assesses, remediates and monitors devices and works with disparate security tools to help accelerate incident response, break down silos, automate workflows and optimize existing investments. As of June 30, 2017 more than 2,500 customers in over 70 countries improve their network security and compliance posture with ForeScout solutions.
See devices. Control them. Orchestrate system-wide threat response. Learn how at www.forescout.com
Radware (NASDAQ: RDWR) is a global leader of application delivery and network and application security solutions for enterprises, carriers and service providers.
Radware’s suite of DDoS protection solutions and web application security offerings provide integrated application and network security solutions for a best of breed, multi-layered security architecture. Our Attack Mitigation Solution is a hybrid DDoS protection solution integrating always-on detection and mitigation (on-premise or in the cloud) with cloud-based volumetric DDoS attack prevention, scrubbing and 24x7 cyber attack and DDoS security with Radware’s Emergency Response Team (ERT) support.
It is the industry's first fully integrated IT security solution that protects application infrastructure in real time against network and application downtime, application vulnerability exploitation, malware spread, information theft, Web services attacks and Web defacement.
As methods of attack increase in frequency, sophistication and severity, security solutions need to meet and surpass these threats. Radware's dynamic real-time security solutions provide the necessary level of defense for today's application and network security needs, and are ready for tomorrow's challenges.
Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Our solutions for consumers, businesses and governments provide layered content security to protect information on mobile devices, endpoints, gateways, servers and the cloud.
Trend Micro enables the smart protection of information, with innovative technology that is simple to deploy and manage, and security that fits an evolving ecosystem. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks.
All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™, and are supported by over 1,200 threat experts around the globe. For more information, visit www.trendmicro.com
Agari protects the inboxes of the world’s largest organisations from the #1 cyber security threat of advanced email attacks including phishing and business email compromise.
Email is the most popular communication tool and the entry point for up to 95% of security breaches. The Agari Email Trust Platform is the only solution that verifies trusted email identities based on insight into 10 billion emails per day to stop advanced email threats that use identity deception.
The Agari Email Trust platform powers Agari Enterprise Protect, which help organisations protect themselves from advanced spear phishing attacks, and Agari Customer Protect, which protects consumers from email attacks that spoof enterprise brands.
Agari is a recipient of the JPMorgan Chase Hall of Innovation Award and recognised as a Gartner Cool Vendor in Security. Learn more at www.agari.com and follow us on Twitter @AgariInc
The leading provider of business-driven security management solutions, AlgoSec helps the world’s largest organizations align security with their business processes. With AlgoSec users can discover, map and migrate business application connectivity, proactively analyze risk from the business perspective, tie cyber-attacks to business processes and intelligently automate network security changes with zero touch - across their cloud, SDN and on-premise networks. Over 1,500 enterprises, including 20 of the Fortune 50, utilize AlgoSec’s solutions to make their organizations more agile, more secure and more compliant - all the time. Since its inception, AlgoSec has provided the industry’s only money-back guarantee.
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment. By implementing least privilege access, Centrify minimizes the attack surface, improves audit and compliance visibility, and reduces risk, complexity and costs for the modern, hybrid enterprise. Over half of the Fortune 100, the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies, all trust Centrify to stop the leading cause of breaches – privileged credential abuse.
Nominet is a world leader in cyber security. Our services are employed by the Government, among others, to protect their secure networks. Use our experience and expertise to understand what’s happening on your network. We offer cyber security services to help protect your business.
These services range from access to our analytics software to integrate into your existing security stack, through to full management of your DNS, a service we run for the UK Government. Our active defence platform analyses huge volumes of data in real-time, identifying abnormalities and flagging top issues to be addressed.
By employing our services, you will be armed with the information you need to put risk mitigation strategies in place. We also ingest third party intelligence feeds to identify known threats and automatically block them from your network. Additionally, you will get access to an intuitive web dashboard to help you monitor your traffic easily. The combination presents a robust solution for cyber protection.
Protegrity is the leading enterprise data security software company worldwide, providing high performance, infinitely scalable, end-to-end data security solutions. Protegrity delivers centrally managed and controlled data security that protects sensitive information across the enterprise in big data, databases, applications and file systems from the point of acquisition to deletion.
Protegrity’s solutions give corporations the ability to implement a variety of data protection methods, including Vaultless Tokenization, strong encryption, masking, and monitoring to ensure the protection of their sensitive data and enable compliance for PCI DSS, HIPAA and other data security requirements.
Protegrity’s award winning software products and innovative technology are backed by over 17 industry patents, all of which elevate the Protegrity Data Security Platform above point solutions. Protegrity employees are security technology specialists with deep industry expertise in data security approaches and techniques, including key management, forensics reporting and security policy definition and management. Protegrity has helped more than 200 enterprise customers worldwide to fulfill their obligations to protect their sensitive data, brand, and business reputation.
Qualys is a pioneer and leading provider of cloud-based security and compliance solutions with over 10,300 customers in more than 130 countries.Qualys helps organisations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds.
Veracode gives companies a comprehensive view of security defects so they can create secure software, and ensure the software they are buying or downloading is free of vulnerabilities. As a result, companies using Veracode are free to boldly innovate, explore, discover, and change the world.
With its combination of automation, integrations, process, and speed, Veracode helps companies make security a seamless part of the development process. This allows them to both find and fix security defects quickly so that they can use software to achieve their missions.
Companies collaborating with Veracode are able to create comprehensive application security programs that focus on reducing risk, achieving compliance with industry regulations and customer requirements, increasing the speed of secure software delivery, and making secure software a competitive advantage.
The Veracode Verified Program allows customers to provide attestation of their secure development processes, demonstrating their commitment to creating secure software.
Securing software is a priority for any company looking to change the world. With Veracode, companies can start securing their software immediately, without the need for additional staff or equipment.