This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Thank you to our Sustaining Partners that support the community through sponsorship at multiple Black Hat events. If you would like to learn more about becoming a Sustaining Partner, please click here.
Armis is the leading unified asset intelligence platform designed to address the new threat landscape that connected devices create. Fortune 100 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, cloud, IoT devices, IoMT, OT, ICS, and 5G.
Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy. With solutions for both cyber asset attack surface management (CAASM) and SaaS management, Axonius provides a comprehensive asset inventory, uncovers gaps, and automatically validates and enforces policies.
Cisco inspires new possibilities by reimagining your applications, securing your data, transforming your infrastructure, and empowering your teams for a global and inclusive future.
Claroty empowers organizations to secure cyber-physical systems across industrial (OT), healthcare (IoMT), and enterprise (IoT) environments: the Extended Internet of Things (XIoT). The company’s unified platform integrates with customers’ existing infrastructure to provide a full range of controls for visibility, risk and vulnerability management, threat detection, and secure remote access.
CrowdStrike is the leader in cloud-delivered endpoint protection. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform offers instant visibility and protection across the enterprise and prevents attacks on endpoints on or off the network. CrowdStrike Falcon deploys in minutes to deliver real-time protection and actionable intelligence from Day One. It seamlessly unifies next-generation AV with best-in-class endpoint detection and response, backed by 24/7 managed hunting. Its cloud infrastructure and single-agent architecture take away complexity and add scalability, manageability, and speed.
CrowdStrike Falcon protects customers against all cyber attack types, using sophisticated signatureless AI and Indicator-of-Attack (IoA) based threat prevention to stop known and unknown threats in real time. Powered by the CrowdStrike Threat Graph™, Falcon instantly correlates 1 trillion security events a week from across the globe to immediately prevent and detect threats.
There's much more to the story of how Falcon has redefined endpoint protection but there's only one thing to remember about CrowdStrike: WE STOP BREACHES.
CyCognito solves one of the most fundamental business problems in cybersecurity: understanding how attackers will find and exploit security gaps in your IT ecosystem. Addressing this problem requires full visibility of an organization's external attack surface, security testing at scale, and risk prioritization to eliminate the alert fatigue associated with legacy security testing approaches.
We’re Kandji: the Apple device management and security platform that empowers secure and productive global work. Through advanced automation and thoughtful experiences, we’re bringing much-needed harmony to the way admins, end-users, and global teams work today and tomorrow.
KnowBe4 is the world's largest integrated Security Awareness Training and Simulated Phishing platform. KnowBe4 helps organizations manage the ongoing problem of social engineering through a comprehensive new-school awareness training approach. Tens of thousands of organizations worldwide use KnowBe4's platform to mobilize their end users as a last line of defense.
Lacework is the data-driven security platform for the cloud. The Lacework Cloud Security Platform, powered by Polygraph, automates cloud security at scale so our customers can innovate with speed and safety. Only Lacework can collect, analyze, and accurately correlate data across an organization’s AWS, Azure, GCP, and Kubernetes environments, and narrow it down to the handful of security events that matter. Customers all over the globe depend on Lacework to drive revenue, bring products to market faster and safer and consolidate point security solutions into a single platform.
Mimecast was born in 2003 with a focus on delivering relentless protection. Each day, we take on cyber disruption for our tens of thousands of customers around the globe; always putting them first and never giving up on tackling their biggest security challenges together. Our intentional and scalable design ideology solves the number one cyberattack vector – email, and thoughtfully integrates other essential capabilities. We continuously invest to thoughtfully integrate brand protection, security awareness training, web security, compliance and other essential capabilities. www.mimecast.com
Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers including their ransomware readiness, unfolding true, current security exposures at any moment, at any scale.
Secureworks (NASDAQ: SCWX) is a global cybersecurity leader that protects customer progress with Secureworks® Taegis™, a cloud-native security operations and analytics platform built on 20+ years of real-world threat intelligence and research, improving customers' ability to detect advanced threats, streamline and collaborate on investigations, and automate the right actions.
Snyk is a developer-first security company that helps software-driven businesses develop fast and build their cloud native applications securely. Snyk is securing the industry leaders such as Google, Salesforce, Asos, BBC, and Asurion. For more information or to get started with Snyk for free, visit:
Wiz helps every organization rapidly remove the most critical risks in their cloud environments. Connect in minutes and discover the toxic combinations across the security stack along with the attacker's view to a breach. Use Wiz to proactively remove risks and prevent risks from becoming breaches.