ISE® North America Sponsors 2017

Kilobyte Sponsors

Cloud Passage twitter    linked in

Attivo Networks® provides real-time detection and analysis of inside-the-network threats. The Attivo Threat Matrix Deception Platform detects stolen credentials, ransomware, and targeted attacks within user networks, data centers, clouds, SCADA, and IoT environments by deceiving an attacker into revealing themselves. Comprehensive attack analysis and actionable alerts empower accelerated incident response.



cymmetria twitter    linked in

Centrify redefines security from a legacy perimeter-based approach, to protecting millions of connections in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure access to apps and infrastructure through the power of identity services.



cisco twitter    linked in

Cisco builds truly effective security solutions that are simple, open and automated. Drawing on unparalleled network presence as well as the industry’s broadest and deepest technology and talent, Cisco delivers ultimate visibility and responsiveness to detect more threats and remediate them faster. With Cisco, companies are poised to securely take advantage of a new world of digital business opportunities.



nsslabs twitter    linked in

NSS Labs, Inc. is the global leader in operationalizing cybersecurity. Through continuous security validation and global threat discovery and automation, NSS Labs empowers enterprises to reduce the operational burden of cybersecurity and address crucial gaps in their cybersecurity efforts. Informed by our experience and strong foundation of security product validation, NSS Labs offers CAWS, a cyber threat protection platform that provides businesses with visibility into the cyber kill chain and automated insights into active threats. With global visibility into active threats and vulnerabilities, CAWS delivers a unique cyber risk rating that makes cybersecurity measurable and helps enterprises focus their resources in the areas that make the most difference. Combined, this information enables businesses to continuously monitor and respond to threats, strengthen their cybersecurity posture, and have confidence that they are appropriately securing the enterprise. CISOs, security operations teams, threat researchers, and information security professionals from many of the world's largest and most demanding enterprises rely on trusted insights from NSS Labs. For more information, visit www.nsslabs.com.



phishme twitter    linked in

PhishMe® is the leading provider of human-focused phishing defense solutions for organizations concerned about their susceptibility to today’s top attack vector – spear phishing. PhishMe’s intelligence-driven platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats.



qualys twitter    linked in

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HCL Technologies, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA). For more information, please visit www.qualys.com.



Display Sponsors

interset twitter    linked in

​Interset provides highly intelligent and accurate inside threat detection from back-end systems to networks to endpoints. Our Security Analytics solution unlocks the power of behavioral analytics, machine learning, and big data to provide the fastest, most flexible, and efficient way for IT teams to operationalize an automated threat detection program. Utilizing agentless data collectors, lightweight endpoint sensors, a scalable open architecture, and highly extensible advanced analytics engine, Interset automatically detects and surfaces the threats that matter, delivering unparalleled visibility to high risk events across the enterprise. Capabilities that truly enable early attack detection and actionable forensic intelligence with reduced false positives. Interset solutions are deployed to protect critical data across the manufacturing, life sciences, high-tech, finance, government, aerospace and defense, and securities brokerage industries. For more information, visit Interset.com and follow us on Twitter @intersetca.



endgame twitter    linked in

Endgame is a leading endpoint security platform to help enterprises close the protection gap against advanced adversaries. Endgame transforms security operations teams and incident responders from crime scene investigators into hunters that prevent damage and loss, and dramatically reduces the time and cost associated with incident response and compromise assessment. Our IOC-independent platform covers the entire kill chain, leveraging machine learning and data science to uncover, in real-time, unique attacks that evade traditional defenses and respond precisely without disrupting normal business operations. For more information, visit www.endgame.com and follow us on Twitter @EndgameInc.



check point twitter    linked in

ReliaQuest advances IT security outcomes through customized co-management. ReliaQuest develops solutions based on each organization’s business goals, leveraging existing investments in security hardware and software. Incident Response, Security Engineering, and Threat Management solutions are delivered 24 hours a day, 365 days a year from multiple U.S.-based Security Operations Centers.