Attivo Networks® provides real-time detection and analysis of inside-the-network threats. The Attivo Threat Matrix Deception Platform detects stolen credentials, ransomware, and targeted attacks within user networks, data centers, clouds, SCADA, and IoT environments by deceiving an attacker into revealing themselves. Comprehensive attack analysis and actionable alerts empower accelerated incident response.
Carbon Black leads a new era of endpoint security by enabling organizations to disrupt advanced attacks, deploy the best prevention strategies for their business, and leverage the expertise of 10,000 professionals to shift the balance of power back to security teams. Only Carbon Black continuously records and centrally retains all endpoint activity, making it easy to track an attacker’s every action, instantly scope every incident, unravel entire attacks and determine root causes. Carbon Black also offers a range of prevention options so organizations can match their endpoint defense to their business needs. Carbon Black has been named #1 in endpoint protection, incident response, and market share. Forward-thinking companies choose Carbon Black to arm their endpoints, enabling security teams to: Disrupt. Defend. Unite.
CloudPassage® Halo® is the world’s leading agile security platform that empowers our customers to take full advantage of cloud infrastructure with the confidence that their critical business assets are protected. Halo delivers a comprehensive set of continuous security and compliance functions right where it counts—at the workload. Our platform orchestrates security on-demand, at any scale and works in any cloud or virtual infrastructure (private, public, hybrid or virtual data center). Leading enterprises like Citrix, Salesforce.com and Adobe use CloudPassage today to enhance their security and compliance posture, while at the same time enabling business agility.
Digital Guardian provides the industry’s only threat aware data protection platform that is purpose built to stop data theft from both insider threats and external adversaries. The Digital Guardian platform performs across the corporate network, traditional endpoints, mobile devices and cloud applications and is buttressed by a big data security analytics cloud service, to make it easier to see and block all threats to sensitive information. This platform is recognized as a leader in the 2017 Gartner Magic Quadrant for Enterprise Data Loss Prevention.
Fidelis Cybersecurity protects the world’s most sensitive data by equipping organizations to detect, investigate and stop advanced cyber attacks. Our products, services and proprietary threat intelligence enable customers to proactively face advanced threats and prevent data theft with immediate detection, monitoring and response capabilities. With our Fidelis Network and Fidelis Endpoint, customers can get one step ahead of any attacker before a major breach hits. To learn more about Fidelis Cybersecurity, please visit www.fidelissecurity.com and follow us on Twitter @FidelisCyber
Forcepoint is transforming cybersecurity by focusing on what matters most: understanding people’s intent as they interact with critical data and intellectual property wherever it resides. Our uncompromising systems encompass Cloud, data and network security, and enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. The combination of UEBA technology (RedOwl acquired in August 2017), Forcepoint DLP and Forcepoint Insider Threat provide the industry’s only comprehensive solution for understanding and responding to the behaviors and intent of people.
Respond Software redefines Security Operations with the first security expert system, the Respond Analyst. Driven by its patent-pending Probabilistic Graphics Optimization (PGO) technology, the Respond Analyst emulates the decision-making of an expert security analyst, effectively becoming a SOC team member that specializes in high-volume, low signal use cases while it applies, adapts and maintains an organization’s tribal knowledge 7x24x365. Respond Software was founded by security operations veterans and world class product technologists to serve its customers across multiple industries.
ZeroFOX, the innovator of social media & digital security, protects modern organizations from dynamic security, brand and physical risks across social, mobile, web and collaboration platforms. Using targeted data collection and artificial intelligence-based analysis, ZeroFOX protects modern organizations from targeted phishing attacks, credential compromise, data exfiltration, brand hijacking, executive and location threats and more. Recognized as a Leader in Digital Risk Monitoring by Forrester, the patented ZeroFOX SaaS platform processes and protects millions of posts, messages and accounts daily across the social and digital landscape, spanning LinkedIn, Facebook, Slack, Twitter, HipChat, Instagram, Reddit, Pastebin, Tumblr, YouTube, VK, mobile app stores, the deep & dark web, domains and more.
BitSight Technologies is transforming how companies manage information security risk with objective, evidence-based security ratings. The company's Security Rating Platform continuously analyzes vast amounts of external data on security behaviors in order to help organizations benchmark their security performance and evaluate risk within their third party supply chain. BitSight security ratings are also a key source of intelligence for cyber insurers. For more information, please visit www.bitsighttech.com or follow @BitSight on Twitter.
Infoblox network control solutions connect end users, devices, and networks, enabling approximately 7,300 enterprises to transform, secure, and scale complex networks. They reduce costs, maximize uptime, and ensure availability. And our DNS security solutions defend against the widest range of threats. Headquartered in California, Infoblox operates in over 25 countries.
ReliaQuest advances IT security outcomes through customized co-management. ReliaQuest develops solutions based on each organization’s business goals, leveraging existing investments in security hardware and software. Incident Response, Security Engineering, and Threat Management solutions are delivered 24 hours a day, 365 days a year from multiple U.S.-based Security Operations Centers.