Attivo Networks® provides real-time detection and analysis of inside-the-network threats. The Attivo Threat Matrix Deception Platform detects stolen credentials, ransomware, and targeted attacks within user networks, data centers, clouds, SCADA, and IoT environments by deceiving an attacker into revealing themselves. Comprehensive attack analysis and actionable alerts empower accelerated incident response.
Cylance® is revolutionizing cybersecurity with products and services that proactively prevent execution of advanced persistent threats and malware at the endpoint, enabling a level of security that far exceeds the effectiveness of current industry solutions deployed throughout enterprises, government ,and institutions worldwide. Visit www.cylance.com or call +1-877-973-3336 for information.
PhishMe® is the leading provider of human-focused phishing defense solutions for organizations concerned about their susceptibility to today’s top attack vector – spear phishing. PhishMe’s intelligence-driven platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats.
Demisto provides a comprehensive platform that combines incident case management, security automation & orchestration, and threat management. By using Demisto, customers reduce manual work, accelerate investigations and improve decision support for security operation center (SOC) analysts. Such benefits help shorten MTTR and reduce company brand risk.
Check Point Software Technologies Ltd. (www.checkpoint.com), is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security architecture defending enterprises – from networks to mobile devices – in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.
RedOwl provides information security teams a single platform to proactively monitor insider risk across the enterprise. The RedOwl platform analyzes all observable interactions between employees, contractors, devices, and applications within your organization. Only RedOwl analyzes structured and unstructured data to provide immediate and unparalleled visibility into human risk to combat intellectual property loss, detect compromised accounts, monitor privileged users and enhance forensics.
Varonis is a leading provider of software solutions that protect data from insider threats and cyberattacks. Varonis allows organizations to analyze, secure, manage, and migrate their volumes of unstructured data, which often contain an enterprise’s financial information, product plans, strategic initiatives, intellectual property, and confidential employee, customer or patient records.