ISE® Southeast Sponsors 2018

Exabyte Sponsor

prevoty twitter    linked in

Prevoty delivers powerful Autonomous Application Protection via its runtime application self-protection (RASP) technology. It enables fast, efficient and secure software development life cycles, monitors and protects applications at runtime, and neutralizes known and zero-day attacks. For more information, visit

Kilobyte Sponsors

Agari twitter    linked in

Agari collects terabytes of email data to provide global brands with a SaaS solution that identifies & eliminates email threats, protects consumer data, and proactively guards brand reputation. Agari protects more than 80% of US consumer inboxes, has analyzed over 1 trillion emails and blocked over 500 million malicious emails.

Cloud Passage twitter    linked in

Attivo Networks® is the leader in deception technology for real-time detection, analysis, and accelerated response to advanced, credential, insider, and ransomware cyber-attacks. The Attivo ThreatDefend™ Deception and Response Platform accurately detects advanced in-network threats and provides scalable continuous threat management for user networks, data centers, cloud, IoT, ICS-SCADA, and POS environments. Attivo Camouflage dynamic deception techniques and decoys set high-interaction traps to efficiently lure attackers into revealing themselves. Advanced attack analysis and lateral movement tracking are auto-correlated for evidence-based alerts, forensic reporting, and automatic blocking and quarantine of attacks.

carbon black twitter    linked in

Carbon Black leads a new era of endpoint security by enabling organizations to disrupt advanced attacks, deploy the best prevention strategies for their business, and leverage the expertise of 10,000 professionals to shift the balance of power back to security teams. Only Carbon Black continuously records and centrally retains all endpoint activity, making it easy to track an attacker’s every action, instantly scope every incident, unravel entire attacks and determine root causes. Carbon Black also offers a range of prevention options so organizations can match their endpoint defense to their business needs. Carbon Black has been named #1 in endpoint protection, incident response, and market share. Forward-thinking companies choose Carbon Black to arm their endpoints, enabling security teams to: Disrupt. Defend. Unite.

cymmetria twitter    linked in

Centrify is the first and only Zero Trust leader to deliver Next-Gen Access that seamlessly converges Identity-as-a Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM), and transforms security to go on the offense and stop the breach. The company’s Zero Trust framework verifies every user and device and limits the amount of access to apps and infrastructure. Centrify enables over 5,000 worldwide organizations, including over half the Fortune 50, to proactively secure their businesses from the inside out.

Cloud Passage twitter    linked in

CloudPassage® Halo® is the world’s leading agile security platform that empowers our customers to take full advantage of cloud infrastructure with the confidence that their critical business assets are protected. Halo delivers a comprehensive set of continuous security and compliance functions right where it counts—at the workload. Our platform orchestrates security on-demand, at any scale and works in any cloud or virtual infrastructure (private, public, hybrid or virtual data center). Leading enterprises like Citrix, and Adobe use CloudPassage today to enhance their security and compliance posture, while at the same time enabling business agility.

Digital Guardian twitter    linked in

Digital Guardian provides the industry’s only threat aware data protection platform that is purpose built to stop data theft from both insider threats and external adversaries. The Digital Guardian platform performs across the corporate network, traditional endpoints, mobile devices and cloud applications and is buttressed by a big data security analytics cloud service, to make it easier to see and block all threats to sensitive information. This platform is recognized as a leader in the 2017 Gartner Magic Quadrant for Enterprise Data Loss Prevention.

Fidelis Cybersecurity Solutions twitter    linked in

Fidelis Cybersecurity protects the world’s most sensitive data by equipping organizations to detect, investigate and stop advanced cyber attacks. Our products, services and proprietary threat intelligence enable customers to proactively face advanced threats and prevent data theft with immediate detection, monitoring and response capabilities. With our Fidelis Network and Fidelis Endpoint, customers can get one step ahead of any attacker before a major breach hits. To learn more about Fidelis Cybersecurity, please visit and follow us on Twitter @FidelisCyber

layer 7 twitter    linked in

Forcepoint is transforming cybersecurity by focusing on what matters most: understanding people’s intent as they interact with critical data and intellectual property wherever it resides. Our uncompromising systems encompass Cloud, data and network security, and enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. The combination of UEBA technology (RedOwl acquired in August 2017), Forcepoint DLP and Forcepoint Insider Threat provide the industry’s only comprehensive solution for understanding and responding to the behaviors and intent of people.

illumio twitter    linked in

Illumio, the leader in micro-segmentation, prevents the spread of cyber threats inside data centers and cloud environments. Enterprises such as Morgan Stanley, BNP Paribas, Salesforce, Workday, and Oracle NetSuite use Illumio to reduce cyber risk and achieve regulatory compliance. Illumio’s Adaptive Security Platform™ uniquely protects critical information with real-time application dependency mapping and micro-segmentation that works in any data center, public cloud, or across hybrid deployments on bare-metal, virtualization, and containers. For more information about Illumio, visit and follow us @Illumio.

Onapsis twitter    linked in

Onapsis cybersecurity solutions automate the monitoring and protection of your SAP and Oracle applications, keeping them compliant and safe from insider and outsider threats. As the proven market leader, global enterprises trust Onapsis to protect the essential information and processes that run their businesses. For more information, please visit

respond software twitter    linked in

Respond Software redefines Security Operations with the first security expert system, the Respond Analyst. Driven by its patent-pending Probabilistic Graphics Optimization (PGO) technology, the Respond Analyst emulates the decision-making of an expert security analyst, effectively becoming a SOC team member that specializes in high-volume, low signal use cases while it applies, adapts and maintains an organization’s tribal knowledge 7x24x365. Respond Software was founded by security operations veterans and world class product technologists to serve its customers across multiple industries.

splunk twitter    linked in

What is Splunk? We take your machine data and make sense of it. IT sense. Security sense. Business sense. Common sense. Splunk products deliver visibility and insights for IT and the business. Splunk was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone.

Valimail twitter    linked in

ValiMail provides the first and only truly automated email authentication solution for brand protection and anti-fraud defense. ValiMail's patented, standards-compliant technology provides an unrivaled one-click solution for DMARC enforcement to stop phishing attacks, increase deliverability, and protect organizations’ reputations. ValiMail authenticates billions of messages a month for some of the world's biggest companies, in finance, government, transportation, health care, manufacturing, media, technology, and more. ValiMail is based in San Francisco. For more information visit

vectra twitter    linked in

Vectra® is an artificial intelligence company transforming cybersecurity. Its Cognito platform is the fastest, most efficient way to detect and respond to cyberattacks, reducing security operations workload by 168X. Cognito performs real-time attack hunting by analyzing rich metadata from network traffic, relevant logs and cloud events to detect attacker behaviors within all cloud and data center workloads, and user and IoT devices. Cognito correlates threats, prioritizes hosts based on risk and provides rich context to empower response. Cognito integrates with endpoint, NAC, firewall security to automate containment, and provides a clear starting point for searches within SIEM and forensic tools.

zerofox twitter    linked in

ZeroFOX, the innovator of social media & digital security, protects modern organizations from dynamic security, brand and physical risks across social, mobile, web and collaboration platforms. Using targeted data collection and artificial intelligence-based analysis, ZeroFOX protects modern organizations from targeted phishing attacks, credential compromise, data exfiltration, brand hijacking, executive and location threats and more. Recognized as a Leader in Digital Risk Monitoring by Forrester, the patented ZeroFOX SaaS platform processes and protects millions of posts, messages and accounts daily across the social and digital landscape, spanning LinkedIn, Facebook, Slack, Twitter, HipChat, Instagram, Reddit, Pastebin, Tumblr, YouTube, VK, mobile app stores, the deep & dark web, domains and more.

Display Sponsors

layer 7 twitter    linked in

BitSight Technologies is transforming how companies manage information security risk with objective, evidence-based security ratings. The company's Security Rating Platform continuously analyzes vast amounts of external data on security behaviors in order to help organizations benchmark their security performance and evaluate risk within their third party supply chain. BitSight security ratings are also a key source of intelligence for cyber insurers. For more information, please visit or follow @BitSight on Twitter.

GlobalScape twitter    linked in

Infoblox network control solutions connect end users, devices, and networks, enabling approximately 7,300 enterprises to transform, secure, and scale complex networks. They reduce costs, maximize uptime, and ensure availability. And our DNS security solutions defend against the widest range of threats. Headquartered in California, Infoblox operates in over 25 countries.

check point twitter    linked in

ReliaQuest advances IT security outcomes through customized co-management. ReliaQuest develops solutions based on each organization’s business goals, leveraging existing investments in security hardware and software. Incident Response, Security Engineering, and Threat Management solutions are delivered 24 hours a day, 365 days a year from multiple U.S.-based Security Operations Centers.

algosec twitter    linked in

SAI Global IT Risk Manager (formerly Modulo Risk Manager) provides intelligent risk solutions for information security officers. We change how customers assess digital risk, facilitating efficient assessment internally, in the cloud, and across the extended network. With thousands of out-of-the-box controls, regulations, and automated workflows, clients see value within weeks.

signal sciences twitter    linked in

Signal Sciences Web Protection Platform (WPP) provides comprehensive threat protection and security visibility for web applications, microservices, and APIs on any platform. Built by practitioners, for practitioners, it is the only solution that works seamlessly across any cloud and infrastructure. Signal Sciences customers include Under Armour, Etsy, Yelp/Eat 24, Datadog, WeWork and more. The company is headquartered in Culver City, CA.

Association Sponsor

ISSA twitter    linked in

The Metro Atlanta Information Systems Security Association is a non-profit group dedicated to providing educational and networking opportunities. We promote the exchange of ideas and knowledge for each member's growth within the information security profession.  Members include practitioners at all levels of the security field in a broad range of industries, such as communications, education, healthcare, manufacturing, financial and government.