Microsoft is proud to be a continuing sponsor of the Black Hat Security conference. We appreciate Black Hat providing a unique forum in which security researchers from all over the world, IT Pros and industry luminaries can gather to share insights, knowledge and information to advance security research.
Microsoft remains dedicated to software security and privacy and continues to collaborate with the community of people and technology organizations helping to protect customers and the broader ecosystem, Microsoft is also dedicated to software security and privacy.
Since the onset of Trustworthy Computing we have fostered a culture of security within Microsoft that includes developing secure code, building strong relationships with industry researchers and partners, and providing guidance to help protect customers. We would like to thank all of the customers, partners and security researchers who have worked with us to advance the state of the art in security science. Only by working together with partners, researchers and the community can we all ensure the advancement and success of the technology industry.
Qualys, Inc. (NASDAQ: QLYS), is a pioneer and leading provider of cloud security and compliance solutions with over 5,800 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The QualysGuard Cloud Platform and integrated suite of solutions helps organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including BT, Dell SecureWorks, Fujitsu, IBM, NTT, Symantec, Verizon, and Wipro. The company is also a founding member of the CloudSecurity Alliance (CSA).
For more information, please visit www.qualys.com
RSA, The Security Division of EMC, is the premier provider of security, risk and compliance management solutions for business acceleration. RSA helps the world’s leading organizations solve their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments.
Combining business-critical controls in identity assurance, encryption & key management, SIEM, Data Loss Prevention, Continuous Network Monitoring, and Fraud Protection with industry leading eGRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform and the data that is generated. For more information, please visit www.RSA.com and www.EMC.com.
Accuvant LABS is the world's best and most respected attack and penetration team. Since 2002, Accuvant LABS has provided penetration testing, application and enterprise security assessments, vulnerability research and training to more than 2,000 clients across industry verticals. Experts from the team have won numerous awards and been featured in articles published by the Ars Technica, Associated Press, SC Magazine, CSO Magazine, and New York Times, among others, and regularly speak at national information security conferences.
AlienVault™ is the creator of OSSIM, the de facto standard open source Security Information and Event Management (SIEM) solution. The OSSIM powered AlienVault Unified Security Management™ (USM) platform reduces cost of visibility and accelerates time to PCI/SOX compliance. The USM Framework comes with five essential security capabilities built-in: asset discovery, vulnerability assessment, threat detection, behavioral monitoring and security intelligence. It also leverages dozens of the best open source tools like Snort, OSSEC, OpenVAS, ntop, Nagios, and more, and integrates easily with existing security components. Additionally, OSSIM users and AlienVault customers benefit from the AlienVault Open Threat Exchange™, the most diverse and comprehensive sharing system for threat intelligence that automaticallycleanses, aggregates, validates and publishes threat data streaming from the broadest range of security devices. OSSIM has over 160,000 downloads and users in 80 countries. AlienVault is privately held and headquartered in Silicon Valley. www.alienvault.com
Today's organizations are facing unprecedented security challenges. The consumerization of IT, including BYOD, and the broad adoption of virtualization and the cloud bring new capabilities to organizations. But as network guests, contractors, employees, and partners all need differing levels of access, across a variety of devices, to resources that might be located virtually anywhere, IT teams also realize that traditional security models are ill-equipped to address the new security demands and threats that this network revolution is bringing. The Cisco SecureX security strategy is designed to address the new network and security landscape. SecureX is based on four key concepts: First, any effective security strategy needs to leverage the intelligence and footprint of the network as its foundation, because every user, device, and resource is attached to the network. Second, security needs to exist within the framework of dynamic context - understanding the who, what, when, where, and how of every user, device, and traffic flow. Third, security is only as good as its awareness of the threats. Cisco's Security Intelligence Operations, the largest threat telemetry database in the world, analyzes real time data from over 700,000 appliances, 30 billion web requests, 1/3 of the world's email messages, and over 150 million endpoint devices every single day, resulting in over 8 million daily security updates fed continuously to Cisco's family of security products. And fourth, the ability to define and distribute security policies that allow organizations to see every device, control access to resources, and leverage the network itself must be part of a unified policy enforcement strategy. Combined, these elements of Cisco SecureX enable the flexible, any-device connectivity that organizations want with the accurate, effective enforcement that they need, across the entire distributed network environment.Cisco provides the industry's largest portfolio of security products and solutions in every form factor, including appliances, cloud, virtualized, and integrated network security offerings. These include the next-generation, context-based ASA security appliance, email and web content security, IPS sensors, the AnyConnect mobile security client, and TrustSec's identity-based access control enabled by the new Identity Services Engine.Cisco is proud to be a BlackHat sponsor. For more information on Cisco Security, please visit cisco.com/go/security or cisco.com/go/SecureX.
As the leading provider of predictive security intelligence solutions, CORE Security answers the call of organizations demanding a proactive approach to eliminating business risk. Our solutions empower customers to think ahead, take control of their security infrastructure, and predict and prevent IT security threats.Organizations have to predict security threats – not just react to them
Today, the majority of security spending is focused on solutions that take defensive or reactive approaches to threats. As a result, security teams are saddled with overwhelming amounts of disparate security data, tools that don't communicate, and alerts that sound only after the damage has been done. Organizations that seek to survive and thrive must go on the offensive and predict and preempt threats before it's too late.We empower organizations to preempt business risk
At CORE Security, we believe the greatest risk organizations can take is to remain reactive to IT security threats. We therefore enable our customers to proactively identify critical threats and reveal risk in the context of specific business objectives, operational processes, and regulatory mandates. As a result, security teams not only predict threats but also more effectively communicate their implications to peers in the line of business.
LogRhythm is the leader in cyber threat defense, detection and response. The company's SIEM 2.0 security intelligence platform delivers the visibility, insight and remediation required to detect the previously undetectable and address the mutating cyber threat landscape. LogRhythm also provides unparalleled compliance automation and assurance as well as operational intelligence to Global 2000 organizations, government agencies and mid-sized businesses worldwide.
The company earned a perfect, 5-star rating and this year's exclusive "BEST BUY" in the SC Magazine SIEM Group Test, Computing Security's Bench Tested Solution of the Year, SC Labs' "Recommended" 5-star designation twice, SC Magazine's Innovator of the Year Award, Readers Trust Award for "Best SIEM" solution and "BEST BUY" designation for Digital Forensics. LogRhythm is headquartered in Boulder, Colorado with operations in Canada, Europe and the Asia Pacific region. For more information, visit www.logrhythm.com
Lookingglass Cyber Solutions is the world leader in over-the-horizon (OTH) cyber threat suppression, whose revolutionary solutions deliver deep visibility into the Internet threat landscape. With its ScoutVisionTM and CloudScoutTM solutions, Lookingglass offers alert and warning capabilities that empower customers to continuously monitor for over the horizon threats, such as the presence of botnets, hosts associated with cyber criminal networks, unexpected route changes and the loss of network resiliency. Lookingglass' outside-in approach accounts for a client's entire enterprise cyber ecosystem including the extended enterprise, and other networks beyond their control. This oversight ensures business partners or service providers are not the proximate cause of security breaches or data loss. For more information, visit www.LGScout.com
Blue Coat Systems is a leading provider of Web security and WAN optimization solutions. Blue Coat offers solutions that provide the visibility, acceleration and security required to optimize and secure the flow of information to any user, on any network, anywhere. This application intelligence enables enterprises to tightly align network investments with business requirements, speed decision making and secure business applications for long-term competitive advantage. Blue Coat also offers service provider solutions for managed security and WAN optimization, as well as carrier-grade caching solution s to save on bandwidth and enhance the end-user Web experience. For additional information, please visit: www.bluecoat.com
IBM's security portfolio provides the security intelligence to help organizations holistically protect its people, infrastructure, data and applications. IBM offers solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. IBM operates the world's broadest security research and development organization and delivery organization. This comprises nine security operations centers, nine IBM Research centers, 11 software security development labs and an Institute for Advanced Security with chapters in the United States, Europe and Asia Pacific. IBM monitors 13 billion security events per day in more than 130 countries and holds more than 3,000 security patents. For more information please visit us at ibm.com/security.
Lieberman Software Corporation is a USA based cross-platform security software developer. We provide tools for the mass security/configuration reporting and remediation of Microsoft Windows workstations and servers with real time reporting and repair capabilities. We also provide cross-platform solutions to proactively manage privileged identities such as root, administrator, sa and other accounts (located in routers, switches, embedded systems, host hardware, virtualization hypervisors, host OS, databases, middleware, applications, etc) at both the user and application level. Using automation, we provide auto-discovery, correlation and propagation to make it possible to discover what credentials you have, where they are being used, and give you the ability to regularly change credentials as needed or required. Our goal is to provide sharp tools for your IT administrators and solutions that give you the ability to understand where and how credentials are used as well as the power to change them as needed. To learn more about our tools and solutions stop by our booth for a hands-on demo or visit our website at www.liebsoft.com.
Solera Networks is the industry's leading advanced Security Intelligence and Analytics provider. Its award-winning DeepSee® platform is powered by next-generation deep-packet inspection and indexing technologies, network security analytics and intelligence capabilities. Global 2000 enterprises, cloud service providers and government agencies rely on Solera to see everything and know everything on their network—allowing them to gain total visibility and situational awareness, respond quickly and intelligently to advanced threats and malware, protect critical informationassets, minimize exposure and loss and reduce business risk. For more information, please visit www.soleranetworks.com
Symantec is a global leader in providing security, storage and systems management solutions to help our customers Ð from consumers and small businesses to the largest global organizations Ð secure and manage their information, identities, technology infrastructures and related processes against more risks at more points, more completely and efficiently than any other company. Our unique focus is to eliminate information, technology and process risks independent of device, platform, interaction or location. Our software and services protect completely, in ways that can be managed easily and with controls that can be enforced automatically Ð enabling confidence wherever information is used or stored.
As the world becomes increasingly technology-centric and information-driven, Symantec is providing the leading products to ensure the availability of data, to backup and recover information, and prevent its loss. This includes helping consumers organize, backup and easily access their digital music, photos, files and more. Small businesses and large organizations can access and ensure the availability of information, whenever it is needed, with company-wide data protection, archiving and high availability clustering solutions. Since information now resides and is used in more places than ever Ð on phones, notebooks, USB devices, online portals and over global networks, protecting information is increasingly critical. Symantec has leading solutions that can identify and automatically prevent loss of valuable and confidential information Ð on the endpoint, in storage and over the network.
Symantec provides comprehensive security that more people and organizations count on, with the best-of-breed and market-leading products in each of the company's business categories. From zero-day detection of new security threats to anti-fraud countermeasures, Symantec products continue to receive recognition from analysts and industry publications for providing superior threat detection and more in-depth and comprehensive security and data protection. This protection now extends to more information points, from mobile devices to servers, storage, networks and external and unmanaged systems. Symantec software reaches and protects more information points against more risks than any other company.
Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantecª Global Intelligence Network. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled sources of data to identify and analyze, to deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam.
More than 240,000 sensors in more than 200 countries and territories monitor attack activity through a combination of Symantec products and services such as Symantec DeepSightª Threat Management System, Symantec ª Managed Security Services and Nortonª consumer products, as well as additional third-party data sources.
Symantec gathers malicious code intelligence from more than 133 million client, server, and gateway systems that have deployed its antivirus products. In addition, Symantec maintains one of the world's most comprehensive vulnerability databases, currently consisting of more than 40,000-recorded vulnerabilities (spanning more than two decades) affecting more than 105,000 technologies from more than 14,000 vendors. Symantec also facilitates the BugTraqª mailing list, one of the most popular forums for the disclosure and discussion of vulnerabilities on the Internet, which has approximately 24,000 subscribers who contribute, receive, and discuss vulnerability research on a daily basis.
More than half of the world's data is protected by Symantec Ð in the home, small business and enterprise, including security of a third of the world's email. At Symantec, we envision a world where security follows information everywhere. Through an information- and identity-centric approach that is device and platform independent, our Security 2.0 vision is fast becoming a reality. Information, personal identities, interactions and communications can be protected against online fraud, spam, viruses, malware, inadvertent loss, theft and more, regardless of the system or technology. It's part of a comprehensive strategy to help customers protect their information more completely than any other software company.
Trustwave is a leading provider of compliance, Web, application, network and data security solutions delivered through the cloud, managed security services, software and appliances. For organizations faced with today's challenging data security and compliance environment, Trustwave provides a unique approach with comprehensive solutions that include its TrustKeeper® portal and other proprietary security solutions. Trustwave has helped hundreds of thousands of organizations--ranging from Fortune 500 businesses and large financial institutions to small and medium-sized retailers--manage compliance and secure their network infrastructures, data communications and critical information assets.
SpiderLabs is the elite security team at Trustwave, offering clients the most advanced information security expertise available today. The SpiderLabs team has performed more than 1,500 computer incident response and forensic investigations globally and has run over 12,000 penetration and application security tests for clients. Companies and organizations in more than 50 countries rely on the SpiderLabs team's technical expertise to identify and anticipate cyber security attacks before they happen. In a rapidly evolving threat environment, SpiderLabs has the extensive field experience to asses threat levels, anticipate weaknesses, investigate breaches, and fortify environments against attacks.
Trustwave is headquartered in Chicago with offices throughout North America, South America, Europe, Africa, Asia and Australia.
For more information, visit www.trustwave.com
The Dell SecureWorks Counter Threat UnitSM (CTUSM) research team is an expert group of security researchers who identify and analyze emerging threats and develop countermeasures, correlation rules and SOC processes to protect customers' critical information assets.
CTU researchers frequently serve as expert resources for the media, publish technical analyses for the security community and speak about emerging threats at security conferences. Leveraging our advanced security technologies and a network of industry contacts, the CTU research team tracks leading hackers and analyzes anomalous activity, uncovering new attack techniques and threats. This process enables CTU researchers to identify threats as they emerge and develop countermeasures that protect our customers before damage occurs.
FireEye is the leader in stopping advanced cyber attacks that use advanced malware, zero-day exploits, and APT tactics. The FireEye solutions supplement traditional and next-generation firewalls, IPS, anti-virus, and gateways, which cannot stop advanced threats, leaving security holes in networks. FireEye offers the industry's only solution that detects and blocks attacks across both Web and email threat vectors as well as latent malware resident on file shares. It addresses all stages of an attack lifecycle with a signature-less engine utilising stateful attack analysis to detect zero-day threats. Based in Milpitas, California, FireEye is backed by premier financial partners including Sequoia Capital, Norwest Venture Partners, and Juniper Networks
Taking a strategic approach to security, Foreground Security helps organizations align information security with key business objectives. The company was founded by security professionals with over 20 years of experience to provide organizations with cutting-edge information and network security services, designed to significantly refine and improve their protection efforts. Foreground Security enables customers to optimize their network security investments while taking a proactive approach to protecting their most important information assets from potential threats.
Foreground Security offers comprehensive security services that enable Government agencies and commercial organizations to secure critical data, protect identities and demonstrate compliance. The company leverages its experts' unparalleled insights to provide customers with the strategy and know-how required to develop, implement and maintain on-going secure and compliant policies, infrastructure and training.
Foreground Security performs in-depth technical testing of networks, applications, and various security related infrastructure components such as firewalls, virtual and wireless networks. The company employs experienced professionals who hold CISSP, CCSP, CISM, CEH, CHFI and MCSE certifications and who have conducted Penetration Tests, C&A Projects, and Policy development for well over 100 Government agencies and corporations, making Foreground Security the ideal information security partner.
General Dynamics Fidelis Cybersecurity Solutions provides organizations with a robust, comprehensive portfolio of products, services, and expertise to combat today's sophisticated advanced threats and prevent data breaches. Our commercial enterprise and government customers around the globe can face advanced threats with confidence through use of our Network Defense and Forensics Services, delivered by an elite team of security professionals with decades of hands-on experience, and our award-winning Fidelis XPS™ Advanced Threat Defense Products , which provide visibility and control over the entire threat life cycle.
HBGary Inc. was founded in 2003 to develop products to counter APT and other unknown cyberthreats. HBGary has in-depth expertise in advanced malware, rootkits, zero-day exploits, and targeted threats. Customers include Fortune 500 corporations, DOD and other U.S. government agencies. HBGary Inc. is headquartered in Sacramento, CA with offices in the Washington D.C. area.
HP is a leading provider of security and compliance solutions for modern enterprises that want to mitigate risk in their hybrid environments and defend against advanced threats. Based on market leading products from ArcSight, Fortify, and TippingPoint, the HP Security Intelligence and Risk Management (SIRM) Platform uniquely delivers the advanced correlation, application protection, and network defense technology to protect today's applications and IT infrastructures from sophisticated cyber threats. Visit HP Enterprise Security at: www.hpenterprisesecurity.com.
Imperva is the global leader in data security. Thousand of the world's leading businesses, government organizations, and managed service providers rely on Imperva solutions to prevent data breaches, meet compliance mandates, and manage data risk.
Underscoring Imperva's commitment to data security excellence, our Application Defense Center (ADC) is a world-class security research organization that maintains SecureSphere's cutting edge protection against evolving threats.
The award-winning Imperva SecureSphere is the market leading data security and compliance solution. SecureSphere protects sensitive data from hackers and malicious insiders, provides a fast and cost-effective route to regulatory compliance and establishes a repeatable process for mitigating data risk.
For more information, visit: www.imperva.com
Mykonos Software, a Juniper Networks company, is the smartest way to secure websites and web applications against hackers, fraud and theft. Its Web Intrusion Deception System uses deception to detect, track, profile and prevent hackers in real-time. Unlike signature-based approaches, Mykonos Software is the first technology that inserts detection points to proactively identify attackers before they do damage – with virtually no false positives. Mykonos goes beyond the IP address to track the individual attacker, profile their behavior and deploy counter measures. With the Mykonos Web Security, administrators are liberated from writing rules, analyzing massive log files or monitoring another console.
For more information, please go to www.mykonossoftware.com
Mandiant is the information security industry's leading provider of advanced threat detection and incident response solutions and services. Mandiant provides products, professional services and education to Fortune 500 companies, financial institutions, government agencies, domestic and foreign police departments and leading U.S. law firms. www.mandiant.com/
nCircle is the leading provider of Information Risk & Security Performance Management solutions to automate compliance and reduce risk. Solutions from nCircle enable enterprises of all sizes to achieve higher levels of security and operational efficiency. Over 6,500 businesses and government agencies use nCircle's compliance, risk and security performance management solutions to proactively protect high value assets and corporate data. Customers can choose to deploy nCircle's solutions at their location, in the cloud or in a hybrid environment. To learn how you can more effectively protect your company visit us at www.ncircle.com
NORMAN AS is a world leading company in the field of data security, network protection, and malware analysis tools. Norman offers unique and proactive protection through its proprietary SandBox® technology. Norman Data Defense Systems focuses on deep analysis of malware that evades traditional enterprise defenses, providing actionable intelligence to security teams to mitigatedamages and remediatevulnerabilities to improve overall defensive posture. Norman was established in 1984, headquartered in Norway, with primary markets in continental Europe, UK and USA.
For more information, please visit http://enterprise.norman.com
Rapid7 is the leading provider of security risk intelligence software and cloud solutions. Its integrated vulnerability management and penetration testing products, Nexpose and Metasploit, and mobile risk management solution, Mobilisafe, empower organizations to obtain accurate, actionable and contextual intelligence into their threat and risk posture. Rapid7's solutions are used by more than 2,400 enterprises and government agencies in more than 65 countries, while the Company's free products are downloaded more than one million times per year and enhanced by the more than 200,000 members of its open source security community. Rapid7 has been recognized as one of the fastest growing security companies by Inc. Magazine and as a "Top Place to Work" by the Boston Globe. Its products are top rated by Gartner®, and SC Magazine. The Company is backed by Bain Capital Ventures and Technology Crossover Ventures. For more information about Rapid7, please visit www.rapid7.com.
Splunk® Inc. provides the engine for machine data™. Splunk software collects, indexes and harnesses the massive machine data continuously generated by the websites, applications, servers, networks and mobile devices that power business. Splunk software enables organizations to monitor, search, analyze, visualize and act on massive streams of real-time and historical machine data. More than 3,700 enterprises, universities, government agencies and service providers in more than 75 countries use Splunk Enterprise to gain operational intelligence that deepens business understanding, improves service and uptime, reduces cost and mitigates cyber-security risk. To learn more please visit www.splunk.com/company.
Stonesoft delivers the industry's most innovative and adaptable network security solutions to protect against advanced threats and reduce network complexity. Through our scalable NGFW, NGIPS, SSL-VPN and multi-factor authentication technologies, we bring military-grade security to any organization, while also delivering true next generation functionality. Built on a dynamic, integrated, software-based platform, Stonesoft solutions are highly adaptable, contextually aware, and easily managed and configured. Using Stonesoft's unique network security engine, users can pick and choose what kind of protection they need in a single solution, eliminate the need for upgrades and scale protection as their security requirements change. In effect, Stonesoft is the only provider in the industry to deliver future-proof security. For more information, visit www.stonesoft.com/us
Tenable Network Security is relied upon by more than 15,000 organizations, including the entire U.S. Department of Defense and many of the world’s largest companies and governments, to stay ahead of emerging vulnerabilities, threats and compliance-related risks. Its Nessus and SecurityCenter solutions continue to set the standard for identifying vulnerabilities, preventing attacks and complying with a multitude of regulatory requirements. For more information, please visit www.tenable.com.
ThreatTrack Security specializes in helping organizations identify and stop Advanced Persistent Threats (APTs), targeted attacks and other sophisticated malware that are designed to evade the traditional cyber-defenses deployed by enterprises, and small and medium-sized businesses (SMBs) around the world. The company develops advanced cybersecurity solutions that analyze, detect and remediate the latest malicious threats, including its ThreatAnalyzer malware behavioral analysis sandbox, VIPRE business and consumer antivirus software, and ThreatIQ real-time threat awareness service. To learn more, visit www.ThreatTrackSecurity.com
BeyondTrust is the only security solution vendor providing Context-Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting. BeyondTrust offers consistent policy-driven vulnerability and privilege management, role-based access control, monitoring, logging, auditing and reporting to protect internal assets from the inside out. The company’s products empower IT governance to strengthen security, improve productivity, drive compliance, and reduce expense across physical, virtual, mobile and cloud environments. To learn more, visit www.beyondtrust.com
Bit9, the global leader in Advanced Threat Protection, protects the world's intellectual property (IP) by providing innovative, trust-based security solutions to detect and prevent sophisticated cyber threats. The world's leading brands rely on Bit9's award-winning Advanced Threat Protection Platform for endpoint protection and server security.
Bit9 stops advanced persistent threats by combining real-time sensors, cloud-based software reputation services, continuous monitoring and trust-based application control and whitelisting—eliminating the risk caused by malicious, illegal and unauthorized software. The company's global customers come from a wide variety of industries, including e-commerce, financial services, government, healthcare, retail, technology and utilities. Bit9 was founded on a prestigious United States federal research grant from the National Institute of Standards and Technology – Advanced Technology Program (NIST ATP) to conduct the research that is now at the core of the company's solutions. For more information about Bit9 go to www.Bit9.com
Click Security is all about Real-time Security Analytics. We find the unknown attack activity hidden in the "event haystack" that today goes unnoticed until it is too late.
Signature-based products are easily evaded. Security event logging / management systems and forensics tools are designed only for postmortem analysis of highly structured events. Click Security finds the linkages between seemingly independent network activity events and automatically builds live, "actor-based" information through interactive visualizations – empowering the analyst to see, prioritize, and halt anomalous activity with revolutionary speed and accuracy.
It's all made possible through a breakthrough real-time processing data flow engine; a revolutionary ability to encode any security analytic through open-design, shareable Click Modules; and a world-class module development agency – Click Labs.
Click Security has the only solution designed to move far beyond the traditional "point product" model into the realm of an open security analytics platform enabling crowd-sourced security intelligence sharing.
Click Security is based in Austin, Texas and backed by Sequoia Capital.
Code 42 Software is the creator of CrashPlan, CrashPlan PRO and CrashPlan PROe, award-winning onsite, offsite and cloud backup solutions for consumers and businesses. Established in 2001 as a software development company specializing in enterprise solutions, Code 42 continues to deliver high-performance, easy-to-use hardware and software that protect the world’s data. CrashPlan PROe provides people-friendly, enterprise-tough and secure backup. Engineered with laptops in mind, PROe is continuous backup that won't slow you down and its self-service restores free up IT. PROe is an end-to-end data security solution that automatically encrypts on the source device and remains encrypted during transit and storage. Additionally, PROs's cross-platform backup lets you back up everyone, everywhere. For more information, visit www.crashplanproe.com.
Cybertap LLC delivers powerful and human-oriented tools to investigators of net-based activity. As more and more organizations capture and retain their raw network traffic to deal with network-oriented reduction of employee productivity, loss/theft of valuable assets, conduct of crimes, and planning of terrorist actions, investigators need tools that allow them to work with and understand that data contextually in its original form as web pages, e-mail, Facebook, and documents. Cybertap Recon reassembles raw network traffic back into its original human-facing form, indexes it for comprehensive and rapid search, and provides investigators with sophisticated analysis tools with which to visualize the content, establish connections, and thus make cases. Recon supports 'Insider Threat' investigations, eDiscovery, eFOIA, lawful intercept, intelligence uses, cyber security, and net-based activity impact assessments.
For additional information, please visit: www.cybertapllc.com
ESET® is on the forefront of proactive endpoint protection, delivering trusted security solutions to make the Internet safer for businesses and consumers. For over 25 years, ESET has led the industry in proactive threat detection and its award-winning NOD32® Antivirus technology has detected 100% of the WildList Organization “In-the-Wild” malware samples since testing began in 1998. ESET recently received its 78th VB100 award and consistently earns high ratings from AV-Comparatives, Virus Bulletin, AV-TEST and other independent testing organizations. ESET NOD32 Antivirus, ESET Smart Security®, ESET Endpoint Solutions, ESET Mobile Security and ESET Cyber Security (solution for Mac®) are trusted by millions of users and are among the most recommended security solutions in the world. IDC has recognized ESET as a top five corporate anti-malware provider.
FireHost is a secure cloud hosting company that delivers secure solutions to eCommerce, SaaS, healthcare IT, and security companies around the world. Specializing in protecting sites and data with compliance and high traffic needs, FireHost makes hacker awareness, management and prevention a standard part of every hosting plan. Advanced security combined with a comprehensive portfolio of hosting solutions helps FireHost protect companies of all sizes from threats to their websites, applications, and other valuable data.
FireMon is the industry leader in providing enterprises, governments and managed services providers with advanced security management solutions that deliver deeper visibility and tighter control over their network security infrastructure. The integrated FireMon solution suite – Security Manager, Policy Planner and Risk Analyzer – enables customers to identify network risk, proactively prevent access to vulnerable assets, clean up firewall policies, automate compliance, strengthen security throughout the organization, and reduce the cost of security operations. For more information, visit http://www.firemon.com.
McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), is the world's largest dedicated security technology company. Backed by global threat intelligence, our solutions empower home users and organizations by enabling them to safely connect to and use the Internet, prove compliance, protect data, prevent disruptions, identify vulnerabilities, and monitor and improve their security. McAfee is relentlessly focused on constantly finding new ways to keep our customers safe.
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 20Gbps with no performance degradation. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls accurately identify and control applications – regardless of port, protocol, evasive tactic or SSL encryption – and scan content to stop threats and prevent data leakage. Most recently, Palo Alto Networks has enabled enterprises to extend this same network security to remote users with the release of GlobalProtect™ and to combat targeted malware with its WildFire™ service.
We help organizations keep data safe and block the growing number of complex threats. We protect everywhere and offer complete security with our full range of endpoint, encryption, email, web, network security and UTM products.
We help customers protect their businesses and meet compliance needs. And all our customers benefit from the expertise of our threat analysts located around the world. Their research is at the heart of everything we do. They quickly find the latest threats and update protection for our customers automatically. Plus, our support engineers are experts on all our products, and they're available whenever you need them.
We make our products easy to install and use so you spend less time managing security. With Sophos you can focus on the needs of your business because we're securing your entire organization. www.sophos.com
Founded in 1995, SSH Communications Security is the company that invented the SSH protocol - the gold standard protocol for data-in-transit security solutions. Today, over 3,000 customers across the globe, including 7 of the Fortune 10, trust our Information Assurance Platform to secure the path to their information assets. Our platform enables businesses of all types and sizes to protect their information assets by:
Veracode is the only independent provider of cloud-based application intelligence and security verification services. The Veracode platform provides the fastest, most comprehensive solution to improve the security of internally developed, purchased or outsourced software applications and third-party components. By combining patented static, dynamic and manual testing, extensive eLearning capabilities, and advanced application analytics, Veracode enables scalable, policy-driven application risk management programs that help identify and eradicate numerous vulnerabilities by leveraging best-in-class technologies from vulnerability scanning to penetration testing and static code analysis. Veracode delivers unbiased proof of application security to stakeholders across the software supply chain while supporting independent audit and compliance requirements for all applications no matter how they are deployed, via the web, mobile or in the cloud. Visit www.veracode.com
VMware(NYSE: VMW), the global leader in virtualization and cloud infrastructure, delivers customer-proven solutions that accelerate IT by reducing complexity and enabling more flexible, agile service delivery. VMware enables enterprises to adopt a cloud model that addresses their unique business challenges. VMware's approach accelerates the transition to cloud computing while preserving existing investments and improving security and control. With more than 250,000 customers and 25,000 partners, VMware solutions help organizations of all sizes lower costs, increase business agility and ensure freedom of choice.
Visit www.vmware.com for more information.
Websense, Inc. (NASDAQ: WBSN) is a global leader in protecting organizations from the latest cyber attacks and data theft. Websense TRITON comprehensive security solutions unify web security, email security, mobile security and data loss prevention (DLP) at the lowest total cost of ownership. Tens of thousands of enterprises rely on Websense TRITON security intelligence to stop advanced persistent threats, targeted attacks and evolving malware. Websense prevents data breaches, intellectual property theft and enforces security compliance and best practices. A global network of channel partners distributes scalable, unified appliance- and cloud-based Websense TRITON solutions.
Websense TRITON stops more threats, visit www.websense.com/proveit to see proof. To access the latest Websense security insights and connect through social media, please visit www.social.websense.com. For more information, visit www.websense.com and www.websense.com/triton.
AccessData Group has pioneered computer forensics and litigation support for more than twenty years and is the maker of FTK and Summation. Over that time, the company has grown to provide a family of stand-alone and enterprise-class solutions that enable digital investigations of any kind, including computer forensics, incident response, e-discovery, legal review, IP theft, compliance auditing and information assurance. More than 100,000 users in law enforcement, government agencies, corporations and law firms around the world rely on AccessData software solutions and its premier digital investigations and hosted review services. AccessData Group is also a leading provider of digital forensics and litigation support training and certification.
Amazon.com, a Fortune 500 company based in Seattle, opened on the World Wide Web in July 1995 and offers Earth's Biggest Selection, where customers can find and discover anything they might want to buy online. The brightest minds come to Amazon to develop technology that improves the lives of shoppers and sellers around the world. Always looking for new ways to help customers, in 2006 Amazon opened up access for developers to on-demand technology infrastructure services based in the company’s own back-end platform through Amazon Web Services (AWS). The AWS platform has grown rapidly since the launch of the first service and it is now the underlying infrastructure for hundreds of thousands of businesses in over 190 countries around the world from start-ups to enterprises to government agencies. Examples of Amazon Web Services’ technologies include Amazon Elastic Compute Cloud, Amazon Simple Storage Service, Amazon SimpleDB, Amazon Simple Queue Service, Amazon Flexible Payments Service, and Amazon Mechanical Turk. For more info, visit: aws.amazon.com
Barracuda Networks is the leading provider of award-winning IT solutions designed to simplify and secure your network. With fanatical support and a portfolio spanning security, networking and data protection, Barracuda Networks solutions ensure total business continuity. Our market leading Web Application firewall improves application delivery and security when it matters most — 24 hours a day. The award-winning Barracuda NG Firewall protects your business and improves connectivity whether you have one office or offices all over the world allowing granular management from a central location. Our ADC, security and content filtering solutions allow you to report, monitor and control social media and Web applications that cause security, bandwidth and productivity issues for organizations of all sizes.
Security breaches damage revenue, brand equity and customer satisfaction. Coverity enables organizations developing C/C++ and Java web applications to effectively and efficiently build security into the development process by eliminating critical defects that could lead to security vulnerabilities earlier in the development lifecycle, without jeopardizing speed or cost. Developers can manage quality and security defects together, in their existing workflow, without requiring them to become security experts or impacting their productivity. Over 1,100 of the world's largest brands, including Honeywell, NEC, BAE Systems, Juniper Networks, BMC Software, Samsung, France Telecom, Sega, and Schneider Electric rely on Coverity to help ensure the quality, safety and security of their products and services.
Damballa is the leader in advanced threat protection and active threat monitoring, pinpointing breaches in networks from advanced malware, targeted APTs, and zero-day threats that have by-passed traditional and virtual defense layers. By monitoring the network, Damballa spots threats entering a network or identifies threats trying to communicate back out of a network, and correlates the activity and behavior to confirm the infection and risk to the enterprise. Signatureless and platform agnostic, Damballa rapidly and automatically detects today's stealthy cyber attacks and protects networks with any type of device or OS.
For additional information, please visit: www.damballa.com
Emulex (NYSE: ELX), the leader in converged networking solutions, provides enterprise-class connectivity for servers, networks and storage devices within the data center. Emulex's Fibre Channel HBAs, NICs, CNAs, controllers, embedded bridges and switches, and connectivity management software are trusted by the world's largest IT environments. Visit http://www.Emulex.com.
ERPScan is an award-winning innovative company founded in 2010, the leading SAP AG partner in discovering and solving security vulnerabilities. ERPScan is engaged in the research of ERP and business application security, particularly SAP, and the development of SAP system security monitoring, compliance, and cybercrime prevention software. Besides, the company renders consulting services for secure configuration, development, and implementation of SAP systems which are used by SAP AG and Fortune 500 companies, and conducts comprehensive assessments and penetration testing of custom solutions.
The company’s expertise is based on research conducted by the ERPScan research subdivision which is engaged in vulnerability research and analysis of critical enterprise applications and gain multiple acknowledgments from biggest software vendors like SAP, Oracle, IBM, VMware, Adobe, HP, Kaspersky, Apache, and Alcatel for finding vulnerabilities in their solutions. ERPScan experts are frequent speakers in prime international conferences held in USA, Europe, CEMEA, and Asia, such as BlackHat, RSA, HITB, and Defcon. ERPScan researchers lead project OWASP-EAS, which is focused on enterprise application security. Our flagship product is ERPScan Security Monitoring Suite for SAP: award-winning innovative software and the only solution in the market which can analyze all tiers of ERP security (continuous monitoring, standard compliance, vulnerability assessment, SoD, and source code review).
For more details, please visit erpscan.com
F5 Networks is the global leader in Application Delivery Networking (ADN), focused on ensuring the secure, reliable, and fast delivery of applications. F5's flexible architectural framework enables community-driven innovation that helps organizations enhance IT agility and dynamically deliver services that generate true business value. F5's vision of unified application and data delivery offers customers an unprecedented level of choice in how they deploy ADN solutions. It redefines the management of application, server, storage, and network resources, streamlining application delivery and reducing costs. Global enterprise organizations, service and cloud providers, and Web 2.0 content providers trust F5 to keep their business moving forward. For more information, go to www.f5.com
Fluke Networks is the world-leading provider of network test and monitoring solutions to speed the deployment and improve the performance of networks and applications. Leading enterprises and service providers trust Fluke Networks' products and expertise to help solve today's toughest issues and emerging challenges in WLAN security, mobility, unified communications and datacenters. Based in Everett, Washington, the company distributes products in more than 50 countries. For more information on our wireless solutions, visit www.FlukeNetworks.com
ForeScout is the leading provider of automated security control solutions for Fortune 1000 enterprises and government organizations. ForeScout's automated solutions for network access control, mobile security, threat prevention and endpoint compliance empower organizations to gain access agility while preempting risks and eliminating remediation costs. Because ForeScout's CounterACT portfolio is easy to deploy, unobtrusive, intelligent and scalable, they have been chosen by over 1000 of the world's most secure enterprises and military installations for global deployments spanning 37 countries. Within hours, ForeScout customers can see and control everything on their network—all devices, all operating systems, all applications, all users.
Fortinet is a global provider of high-performance network security and specialized security solutions that provide our customers with the power to protect and control their IT infrastructure. Our purpose-built, integrated security technologies, combined with our FortiGuard security intelligence services, provide the high performance and complete content protection our customers need to stay abreast of a constantly evolving threat landscape.
More than 125,000 customers around the world - including the majority of the Global 1,000 enterprises, service providers and governments - are utilizing Fortinet's broad and deep portfolio to improve their security posture, simplify their infrastructure, and reduce their overall cost of ownership.
From endpoints and mobile devices, to the perimeter and the core - including databases, messaging and Web applications - Fortinet helps protect the constantly evolving networks in every industry and region around the world.
For more information, visit www.fortinet.com
Gigamon® provides an intelligent Visibility Fabric™ architecture to enable the management of increasingly complex networks. Gigamon technology empowers infrastructure architects, managers and operators with pervasive visibility and control of traffic across both physical and virtual environments without affecting the performance or stability of the production network. Through patented technologies, centralized management and a portfolio of high availability and high-density fabric nodes, network traffic is intelligently delivered to management, monitoring and security systems. Gigamon solutions have been deployed globally across enterprise, data centers and service providers, including over half of the Fortune 100 and many government and federal agencies.
Guidance Software is recognized worldwide as the industry leader in digital investigative solutions. Its EnCase® platform provides proven solutions for government, corporate and law enforcement organizations to respond to computer security incidents, eDiscovery requests or regulatory inquiries; conduct internal investigations; perform data and compliance auditing; and secure sensitive data. There are more than 30,000 licensed users of the EnCase technology worldwide, and thousands attend Guidance Software's renowned training programs annually. For more information, visit: www.guidancesoftware.com.
GuruCul is the leading provider of security and business intelligence solutions. GuruCul products will improve risk, threat, and compliance postures by applying a unique identity centric approach of correlating identity, activity, and access information to provide actionable data and prioritized alerts. GuruCul has developed industry's most advanced patent pending algorithms for risk profiling and analyzing trends, to detect threats and anomalous behavior. GuruCul's intelligent risk platform will help your organization efficiently protect intellectual property and effectively manage risk.
GuruCul Risk Analytics Capabilities:
How do you keep mobile workers productive and sensitive data protected? With Imation secure mobile storage and device management solutions.
Imation's data, identity and workspace solutions marshal some of the most advanced authentication and encryption technologies available today. But they're still flexible and familiar enough to get mobile employees and contractors working right away.
Rely on the industry's first FIPS 140-2 Level 3 validated flash drives, the first management solution for USB devices and portable identity, the first flash drives to earn the highest security validations, the first to integrate CAC/PIV smart cards for U.S. government use – to keep your security policies intact and enforced.
Imation Mobile Security provides solutions that address the demands of the mobile workforce, for enterprise and government organizations, that are easy to use, easy to deploy and easy to manage, while also providing a broad set of security options able to meet varying customer requirements.
Secure, deploy, and manage. With Imation, you can do it all.
Immunity is an industry leader in discovering, developing and delivering offensive information security technologies and services. This includes exploitation and vulnerability analysis software, wireless penetration testing hardware, security analysis services and attack training.
Immunity products include exploitation development tools, vulnerability assessment tools, and remote control technologies. Immunity delivers consulting services including penetration testing, vulnerability management, and Immunity's experts provide regular training classes.
Lancope, Inc. is a leading provider of network visibility and security intelligence to defend enterprises against today’s top threats. By collecting and analyzing NetFlow, IPFIX and other types of flow data, Lancope’s StealthWatch® System helps organizations quickly detect a wide range of attacks from APTs and DDoS to zero-day malware and insider threats. Through pervasive insight across distributed networks, including mobile, identity and application awareness, Lancope accelerates incident response, improves forensic investigations and reduces enterprise risk. Lancope’s security capabilities are continuously enhanced with threat intelligence from the StealthWatch Labs research team. For more information, visit www.lancope.com.
Magnet Forensics is a global leader in the development of forensic software solutions. Our flagship product INTERNET EVIDENCE FINDER™ (IEF) was developed by a former forensic examiner who recognized the need for an easy to use, comprehensive tool to help perform digital investigations. Since its creation, IEF has quickly become a trusted solution for thousands of the world’s top law enforcement, government, military and corporate organizations in over 92 countries, used to recover 200+ Internet-related communications to support their most important investigations. For a free 14-day trial of IEF please click here, or visit us online at: www.magnetforensics.com.
Mocana products help secure the "Internet of Things" - the 20 billion datacom, smartgrid, federal, consumer, industrial and medical devices that connect across every sector of our economy. Mocana is developing the industry's only device-independent security platform that protects devices and the information, apps and services that run on them. Every day, millions of people use products sold by over 150 companies that leverage Mocana's solutions, including Cisco, Honeywell, Dell, General Electric, General Dynamics, Avaya and Harris, among others. Mocana recently won Frost & Sullivan's Technology Innovation of the Year award for Device Security, and was named to the Red Herring Global 100 as one of the "top 100 privately-held technology companies in the world".
Since its inception in 1986, NCP Engineering has delivered innovative software that allows enterprises to implement a new way to secure remote access and overcome the complexities of creating, managing and maintaining network access. NCP's award winning product line spans the spectrum of remote access, from hybrid IPSec / SSL VPN to end-point firewalls and network access control (NAC) functions. The company's products support organizations with complex remote user needs, who want to leverage the latest end-devices to increase staff productivity, reduce network administration and adapt policy changes on-the-fly. Each solution is interoperable with existing third-party software or hardware. Headquartered in the San Francisco Bay Area, the company serves 30,000+customers worldwide throughout the healthcare, financial, education and government markets, as well as many Fortune 500 companies. NCP has established a network of national and regional technology, channel, and OEM partners to serve their customers.
Net Optics is the leading provider of total application and network visibility solutions that deliver real-time intelligence for peak performance in network monitoring and security. Businesses rely on us for scalable, end-to-end visibility, enabling them to optimize network functionality across physical, virtual and cloud environments as well as branch offices.
We provide total visibility into the entire network, helping customers control access while remaining secure and compliant. We allow them to maintain data and network integrity as they move into cloud computing and creation and hosting of critical applications.
Currently, more than 7,500 enterprises, service providers and government organizations—including 85 of the Fortune 100—trust Net Optics’ plug-and-play family of Application-Aware Network Performance Management (AA-NPM), Network Packet Broker (NPB), Virtual/Cloud and Visibility Management System (VMS) solutions to deliver immediate results and quick time-to-value through an easy-to-use interface. We maintain a global presence through leading OEM partner and reseller networks.
Onapsis is the leading provider of cybersecurity, compliance and continuous monitoring solutions for ERP systems and business-critical infrastructure. Through its innovative solutions, Onapsis helps its customers to protect their core business platforms from espionage, sabotage and fraud attacks.
Large organizations rely on SAP, Oracle E-Business Suite, PeopleSoft and Siebel platforms to store and process their most sensitive business information. Onapsis enables them to increase the security level of these systems while enforcing compliance requirements, decreasing financial fraud risks and reducing audit costs drastically. Onapsis solutions are trusted by several Fortune Global 100 companies, large governmental entities and military agencies.
Onapsis X1, the company's flagship product, is the industry's first comprehensive solution for the Automated Security Assessment of SAP platforms. Being the first and only SAP-certified solution of its kind, Onapsis X1 Enterprise allows customers to perform Automated Vulnerability Assessments and Security & Compliance Audits over their entire SAP platform. For organizations that need to go deeper, Onapsis X1 Consulting Pro also safely exploits existing weaknesses to illustrate the associated business impacts.
Onapsis is built upon a world-renowned team of experienced security researchers leading the SAP & ERP security fields. These experts were also the first to perform specialized SAP Penetration Tests, Vulnerability Assessments and Security Audits. Because of its cutting-edge research, Onapsis is continuously invited to lecture at the most important security conferences in the world, private companies and defense agencies.
If you are wondering whether your ERP systems and business-critical infrastructure are exposed, find more information at www.onapsis.com.
OPSWAT is the industry leader in software management SDKs, interoperability certification, secure browsing technology and multiple-engine malware scanning solutions. OPSWAT's Metascan technology enables easy API integration of multiple anti-malware engines into proprietary solutions. Combining up to 30 antivirus engines in a single box, Metascan optimizes engines to scan simultaneously and efficiently. Metascan technology is licensed by many large corporations, governments, and defense agencies for malware research and advanced threat detection. Metascan is also synergetic with third-party sandboxing tools for effectively analyzing malicious code. Try the online demo at http://www.metascan-online.com. OPSWAT also offers: Secure Virtual Desktop for shielding sensitive data while browsing anonymously from any computer (perfect for securing access to cloud-based solutions); GEARS for managing networks from the cloud and identifying potential security risks on endpoints; AppRemover for thoroughly uninstalling security applications; and MD4SA for quickly scanning endpoints for active malware without the need for installation.
Founded in 1944, Parsons is an engineering, construction, technical, and professional services firm with revenues of $3 billion in 2012.
Parsons is a leader in many diversified markets with a focus on defense/security, environmental/infrastructure, transportation, and resources. Parsons delivers design/design-build, program/construction management, and other professional services packaged in innovative alternative delivery methods to federal, regional, and local government agencies, as well as to private industrial customers worldwide.
We conquer the toughest logistical and technical challenges and deliver landmark projects across the globe. Today, more than 11,500 employees are engaged in executing more than 2,000 projects in 25 countries around the world. For more about Parsons, please visit www.parsons.com.
PhishMe.com provides organizations the ability to train their employees and customers about the risks of spear phishing with just a few simple clicks. With over 3.1 million individuals trained since its launch in 2008, PhishMe provides a cost effective way to mitigate this challenge. The company has proven that its trainings can reduce the threat of employees and customers falling victim to phishing attacks by up to 80 percent. PhishMe.com facilitates and automates the execution of mock phishing exercises against employees and customers, provides clear and accurate reporting on user behavior, and most importantly provides instant, targeted training. PhishMe.com works with Federal Agencies and Fortune 1000 companies across multiple vertical market sectors including financial services, healthcare, higher education and defense. For additional information, please visit: www.phishme.com
Pico Computing offers scalable, FPGA-based platforms for embedded and high performance computing. Customer applications include cryptography, signal and video processing, DSP, bioinformatics and financial computing.
We specialize in highly integrated computing platforms based on Field Programmable Gate Array (FPGA) technologies. We offer standard and custom products, and we provide consulting and engineering services. We are the experts in FPGA-accelerated algorithms for data security.
Pico Computing E-Series cards are designed to be easy to use, fast to deploy, and scalable. Use a single E-Series card for rapid algorithm prototyping. Deploy your application as an embedded system, or scale to multiple FPGAs using an SC-Series FPGA cluster.
Pico EX-Series boards offer high performance for the most demanding data security applications. Deploy multiple EX-Series boards in a rack-mounted cluster for truly amazing levels of password cracking performance. Our latest FPGA computing board, the Pico EX-500, can be equipped with up to 12 Xilinx FPGAs on a single, 16-lane PCI Express card. Up to 11 EX-500 cards can be installed in a standard 4U rack mounted chassis.
Pico Computing is headquartered in Seattle, Washington and has customers worldwide. For more information or to request a free Data Security White Paper, visit www.picocomputing.com.
Proofpoint, Inc. (NASDAQ:PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance and secure communications. Organizations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information.
Radware (NASDAQ:RDWR), a global leader in integrated application delivery and network security solutions, assures the full availability, maximum performance, and complete security of business-critical applications for nearly 10,000 enterprises and carriers worldwide. Radware's family of cutting-edge security solutions provide integrated application and network security technologies to enhance best of breed, multi-layered security architectures.
The full suite of award-winning attack mitigation technologies include: intrusion prevention, web application firewall, DoS protection, network behavioral analysis, and reputation preservation capabilities. These are integrated into one solution Ð DefensePro® Ð for ease of deployment and cost-effectiveness. These technologies are complemented by an advanced SEIM management and forensics system (APSolute Visionª) and professional security services. Radware's Emergency Response Team (ERT) provides 24*7, on-site support for customers facing immediate attack. In addition, Radware' security operations center (SOC) provides necessary ongoing updates for emergency signature creation; emerging threat mitigation, detection and updates; and custom signature development. Both the ERT and SOC have been industry recognized for providing first and necessary safeguards against: WikiLeaks Operation Payback; South Korean DDoS attacks; and iPhone, Oracle, Italian Job and Windows vulnerabilities.
Radware also provides a custom Managed Security Service Provider (MSSP) solution for target customers in need. With this complete suite of products, services, and tailored offerings, Radware is optimally suited to meet your current and emerging security needs.
RedSeal Networks is the leading provider of risk based security management solutions for cyber attack prevention. The RedSeal Platform delivers the industry’s most powerful network security insights, enabling enterprises to continuously audit and monitor IT compliance. Using patented network visualization and predictive threat modeling, RedSeal eliminates network security dark space by providing the most complete picture of access risk. Backed by Venrock, OVP, Sutter Hill, JAFCO, Leapfrog and IN-Q-Tel, RedSeal is used by the world’s largest government and commercial organizations to dramatically cut compliance costs, prioritize vulnerability remediation efforts and reduce IT security risk profiles. For more information, visit www.redsealnetworks.com
ReversingLabs delivers industry leading file analysis tools that drastically accelerate and broaden security analysts' ability to detect new threats, respond to incidents, find hidden information and verify software integrity.
TitaniumCore™ is the world's fastest and most comprehensive tool for automated static decomposition of files. The engine automatically extracts all contained objects and their internal information from a sample and stores them in a database for further analysis. A single server can process 100,000 samples daily.
TitaniumCloud™ service provides internal information and virus scanning results for over 1B goodware and malware files and reputation information on over 4 billion network locations.
ReversingLabs products reduce analysis tasks from days to seconds, enabling analysts to respond quicker and cover more potential threats. Our customers include antivirus vendors, security vendors, government agencies, and commercial enterprises across the globe. Visit us at: www.reversinglabs.com
SAINT Corporation, a global leader in network security, offers the first integrated vulnerability assessment and penetration testing. Examine your network with the SAINT vulnerability scanner, and expose where an attacker could breach your network. Go to a higher level of visibility with the SAINTexploit penetration testing tool and exploit the vulnerability to prove its existence without a doubt. The SAINT scanner and penetration testing tools are fully integrated within the same interface, making it easy to determine where to begin remediation--with the exploitable vulnerabilities found by the scanner. WebSAINT, the online SaaS (Software as a Service) vulnerability scanner, is ideal for organizations that need to perform vulnerability scans or meet PCI ASV third party quarterly scanning requirements. SAINT is a PCI Approved Scanning Vendor (ASV). WebSAINT Pro is the online SaaS solution that includes vulnerability scanning, penetration testing, and Web application scanning along with the full functionality of the award winning SAINT scanner and exploit technology. In 2011, SAINTscanner became the first product to receive validation by NIST for the U.S. Government Configuration Baseline (USGCB) as well as FDCC and other scanner specifications. SAINT SCAP supports includes OVAL, CPE and CVE enumeration, and CVSS scoring.
SAINT can help to
Secure Ninja- Expert InfoSec Training and Certification & Security Services. CISSP, CEH v7.1, CHFI v8, Security+, CISM, ECSA, FITSP, VMware, Cloud Security, PMP and more. Secure Ninja has trained and/or certified thousands of individuals. With an overall course pass rate approaching 98%, Secure Ninja is well above the industry average for technical training success. Our classes come in flexible formats (Boot Camp, Live Online, Evenings, Weekends and On-site) to meet your busy schedule or organizational need. Secure Ninja services/consulting specialize in governance, risk and compliance programs for government agencies including information assurance, IV&V security assessments, and cyber-security solutions. Secure Ninja has the knowledge and experience to keep your sensitive information safe. All Black Hat USA 2012 attendees receive 20% off our regular pricing. For More information call 703-535-8600 or visit www.secureninja.com
Securonix is the Security Intelligence Platform that identifies IT threats using advanced identity, access, and behavior analytics and scores the results in actionable business risk terms. Security, risk, and fraud management groups use Securonix to focus their SOC, IT risk, SIEM, IAM, DLP and fraud programs on the real and emerging threats.
Skybox Security, Inc. is the leader in proactive security management solutions, providing automated tools that find and prioritize cyber risks such as vulnerabilities, firewall configuration errors, and access compliance issues. Our solutions help IT security personnel continuously monitor and prevent security risks that could lead to a data breach or cyber-attack. Organizations in Financial Services, Government, Energy, Defense, Retail, and Telecommunications rely on Skybox Security solutions to reduce risk exposure and achieve compliance. For more information visit www.skyboxsecurity.com
Nac-tile Dysfunction? Don’t suffer in silence. StillSecure Safe Access NAC: Deploy within an hour for full visibility of your network, and of course manage that BEEEYOD guy. Safe Access is the leading provider of Network Access Control (NAC) for the US DoD and heavily deployed within the commercial sector. Providing visibility, knowledge and control, Safe Access helps to fulfill compliance across industry. Over 2,000 vendor agnostic tests allow you to tailor your compliance policy, enforce, quarantine and remediate for a much more satisfying experience. Safe Access is fully virtualizable, reducing your hardware and administration costs.
StrongAuth, Inc. is a Silicon Valley-based company that has been focused on enterprise key-management infrastructure since 2001. It is the creator of many free and open-source cryptographic tools, as well as a web-application architecture for secure cloud computing.
Regulatory Compliant Cloud Computing (RC3). Some of StrongAuth's open-source solutions include:
TeleCommunication Systems, Inc. (TCS) (NASDAQ: TSYS) is a world leader in highly reliable and secure mobile communication technology, training, and services. TCS infrastructure forms the foundation for market-leading solutions in E9-1-1, text messaging, commercial location and deployable wireless communications. TCS is at the forefront of new mobile cloud computing services providing wireless applications for navigation, hyper-local search, asset tracking, social applications and telematics. TCS trains tomorrow’s cyber security experts through its Art of Exploitation (AoE) curriculum, which delivers focused training to aspiring cyber experts. Government agencies utilize TCS' cyber security expertise and professional services for mission-critical communications. Headquartered in Annapolis, MD, TCS maintains technical, service and sales offices around the world. To learn more about emerging and innovative wireless technologies, visit www.telecomsys.com.
The Hacker Academy (THA) is an online learning platform for ethical hacking and penetration testing that provides real world tools, concepts, and 24/7 hands on training in a cloud based environment. The Hacker Academy provides a true understanding of how hacking actually works and what it feels like from a "bad guys" perspective, which arms you with the knowledge to protect your own systems.
THA is a division of MAD Security, an information security training firm focused on the human side of information security. While technology helps to stop hackers, viruses and malware, humans remain the single biggest threat. MAD Security's deep understanding of human nature has led to the development of a unique approach that enables our clients to effectively reduce the threat against their organizations. For more information, visit: www.hackeracademy.com.
TIBCO LogLogic® is a leading log and security management provider. Trusted globally by 1000+ companies and 200+ partners, our solutions collect and analyze terabytes of Big Data generated by IT assets and give Security, Compliance, and IT Operations professionals actionable information to identify issues within their environment proactively or for forensics.
University of Maryland University College (UMUC) is a member institution of the University System of Maryland and a leader in high-quality online education. As a natural evolution of its programs in information assurance, the university has launched undergraduate and graduate degrees and certificates in cybersecurity, cybersecurity policy, and digital forensics and cyber investigation. UMUC has a long history of serving the active duty member. It has provided academic programs under contract with the Department of Defense to service members across the United States and overseas for eight decades, including Europe and Asia and more recently the Middle East, Afghanistan and Africa. Located near the nation's capital, UMUC is one of the largest public universities in the United States, serving 92,000 students and offering more than 120 undergraduate and graduate programs. It is an NSA/DHS Center of Academic Excellence for Information Assurance Education. To learn more, visit www.umuc.edu/spotlight/cybersecurity.cfm.
VASCO Data Security is a leading provider of strong authentication and e-signature solutions, specializing in protecting online accounts, identities, and transactions. VASCO helps 10,000+ organizations in over 100 countries to ensure secure access to networks, web applications, LANs, and online portals for their customers, partners, and employees with a wide range of solutions from OTPs to mobile authentication to PKI. For more information, visit www.vasco.com
Venafi is the inventor of and market leader in Enterprise Key and Certificate Management (EKCM) solutions. Venafi delivered the first enterprise class solution to automate the provisioning, discovery, monitoring and management of digital certificates and encryption keys from the desktop to the datacenter built specifically for encryption management interoperability across heterogeneous environments. Venafi products reduce the unquantified and unmanaged risks associated with encryption deployments that result in data breaches, security audit failures and unplanned system outages. Venafi also publishes best practices for effective key and certificate management at www.venafi.com/best-practices. Venafi customers include the world's most prestigious Global 2000 organizations in financial services, insurance, high tech, telecommunications, aerospace, healthcare and retail. Venafi is backed by top tier venture capital funds, including Foundation Capital, Pelion Venture Partners and Origin Partners. For more information, visit www.venafi.com
WatchGuard Technologies Since 1996, WatchGuard Technologies has provided reliable, easy-to-manage security appliances to hundreds of thousands of businesses worldwide. WatchGuard's award-winning extensible threat management (XTM) network security solutions combine firewall, VPN, and a suite of security services to boost protection in critical attack areas. The extensible content security (XCS) line of products offers content security across email and web, as well as data loss prevention. Both product lines help you meet regulatory compliance requirements including PCI DSS, HIPAA, SOX and GLBA. Represented by more than 15,000 partners in 120 countries, WatchGuard is headquartered in Seattle, Washington, with offices in North America, Latin America, Europe, and Asia Pacific. For more information, visit http://www.watchguard.com.
Headquartered in Santa Clara, California, WhiteHat Security is the leading provider of website risk management solutions that protect critical data, ensure compliance and narrow the window of risk. WhiteHat Sentinel, the company's flagship product family, is the most accurate, complete and cost-effective website vulnerability management solution available. It delivers the flexibility, simplicity and manageability that organizations need to take control of website security and prevent Web attacks. Furthermore, WhiteHat Sentinel enables automated mitigation of website vulnerabilities via integration with Web application firewalls and Snort-based intrusion prevention systems.
wolfSSL is an open source internet security company whose primary products include the wolfSSL embedded SSL library, wolfCrypt embedded crypto engine, SSL Inspection, and the wolfSSL Embedded Web Server. Primary users are programmers building security functionality into applications, devices, and cloud services. wolfSSL employs the dual licensing model offering products under both the GPLv2 as well as a standard commercial license.
wolfSSL's products are designed to offer optimal embedded performance, rapid integration into existing applications and platforms, the ability to leverage hardware crypto solutions, and support for the most current standards. All products are designed for ease-of-use with clean APIs, and are backed by a dedicated and responsive support and development team.
BlackBerry Security, Research in Motion (RIM), is a world class organization providing end to end security focus including: driving the BlackBerry security message globally, security accreditations, development of security products, advanced threat research, building mitigations into BlackBerry products, and by rapidly responding to security incidents. More information: www.blackberry.com/security.
Bromium has pioneered new endpoint security technologies that protect enterprises from advanced threats. Rather than relying on detection to prevent attacks, Bromium leverages hardware-enforced isolation to protect endpoints from even “undetectable” threats, while providing actionable intelligence on malware behavior - enabling IT to understand attack intents and bolster existing defenses.
FileTrek provides an innovative approach to information security and forensic investigations by using worklog data of enterprise users. The solution addresses the challenges related to advanced detection of risk and data loss by effectively tracking and maintaining control over sensitive unstructured information and intellectual property as it travels throughout the extended enterprise.
Using its consulting team's deep security knowledge and its own CorrelatedVM vulnerability management & reporting solution, NetSPI acts as a trusted advisor to large enterprises by providing penetration testing, assessment, and advisory services designed to analyze and mitigate risks and ensure compliance with relevant regulations and industry standards. More information available at www.netspi.com.
Norse is the leading provider of live, actionable, cyber threat intelligence and solutions that enable organizations to prevent financial fraud and proactively defend against today’s most advanced cyber threats. Norse’s live global threat intelligence platform is a patent-pending infrastructure-based technology that continuously collects and analyzes live high risk Internet traffic identifying the sources of cyber attacks and fraud.
(ISC)² is the largest not-for-profit membership body of certified information and software security professionals worldwide, with nearly 90,000 members in more than 135 countries. Globally recognized as the Gold Standard, (ISC)² issues the Certified Information Systems Security Professional (CISSP®) and related concentrations, as well as the Certified Secure Software Lifecycle Professional (CSSLP®), Certified Authorization Professional (CAP®), and Systems Security Certified Practitioner (SSCP®) credentials to qualifying candidates. (ISC)²’s certifications are among the first information technology credentials to meet the requirements of ISO/IEC Standard 17024. (ISC)² offers education programs and services based on its CBK®, a compendium of information security topics. Visit www.isc2.org.
MITRE's "Making Security Measurable" cybersecurity effort provides standards-based building blocks for transforming security in the enterprise. Through development and adoption of standardized enumerations, establishment of languages and interface standards for conveying information amongst tools and organizations, and by sharing security guidance and measurement goals with others by encoding them in these standardized languages and concepts, organizations across the world can dramatically change their security posture, vendor independence and flexibility. Come visit us to learn more about MITRE's community efforts: CVE®, OVAL™, CAPEC™, CWE™, MAEC™, STIX™, CybOX™, and TAXII™ initiatives. More information available at msm.mitre.org.