ISE® West Sponsors 2011

Megabyte Sponsors

Adobe twitter    linked in

Adobe Systems Incorporated offers business, creative, and mobile software solutions that revolutionize how the world engages with ideas and information. With a reputation for excellence and a portfolio of many of the most respected and recognizable software brands, Adobe is one of the world's largest and most diversified software companies.

Kilobyte Sponsors


M86 Security is the global expert in real-time threat protection and the industry's leading Secure Web Gateway provider. The company's appliance, software, and Software as a Service (SaaS) solutions for Web and email security protect more than 25,000 customers and 26 million users worldwide. M86 products use patented real-time code analysis and behavior-based malware detection technologies as well as threat intelligence from M86 Security Labs to protect networks against new and advanced threats, secure confidential information, and ensure regulatory compliance. The company is based in Irvine, California with international headquarters in London and development centers in California, Israel, and New Zealand. For more information about M86 Security, please visit

McAfee twitter    linked in

McAfee, Inc. is the leading dedicated security technology company. Headquartered in Santa Clara, California, McAfee delivers proactive and proven solutions and services that secure systems and networks around the world. With its unmatched security expertise and commitment to innovation, McAfee empowers home users, businesses, the public sector, and service providers with the ability to block attacks, prevent disruptions and continuously track and improve their security.

Palo Alto Networks

Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 20Gbps with no performance degradation. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls accurately identify and control applications – regardless of port, protocol, evasive tactic or SSL encryption – and scan content to stop threats and prevent data leakage. Enterprises can for the first time embrace Web 2.0 and maintain complete visibility and control, while significantly reducing total cost of ownership through device consolidation. Most recently, Palo Alto Networks has enabled enterprises to extend this same network security to remote users with the release of GlobalProtect™. For more information, visit

qualys twitter    linked in

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 120 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds. Founded in 1999 as one of the first SaaS security companies, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HCL Technologies, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance. For more information, please visit


Trend Micro provides leading Internet content security solutions for businesses and consumers. We protect against malware, spam, data leaks, and the newest Web threats designed to steal digital information. Our unique solutions stop these threats where they first emerge - in the Internet - before they can attack corporate networks and PCs. Founded in 1988, Trend Micro operates globally and protects hundreds of millions of users in the office, at home and on the go.

veracode twitter    linked in

Veracode is the only independent provider of cloud-based application intelligence and security verification services. The Veracode platform provides the fastest, most comprehensive solution to improve the security of internally developed, purchased or outsourced software applications and third-party components. By combining patented static, dynamic and manual testing, extensive eLearning capability, and advanced application analytics Veracode enables scalable, policy-driven application risk management programs. Veracode delivers unbiased proof of application security to stakeholders across the software supply chain while supporting independent audit and compliance requirements for all applications no matter how they are deployed, via the web, mobile or in the cloud. Veracode works with customers in more than 80 countries worldwide.


Verdasys provides Enterprise Information Protection (EIP) solutions that secure both proprietary and sensitive data and enables business process integrity and flexibility essential for Global 2000 companies to successfully compete in today’s highly collaborative and mobile environments. To learn more about EIP and why companies serious about information protection choose Verdasys, visit

voltage twitter    linked in

Voltage Security®, Inc. is the leading data protection provider, delivering secure, scalable, and proven data-centric encryption and key management solutions, enabling our customers to effectively combat new and emerging security threats. Leveraging breakthrough encryption technologies, our powerful data protection solutions allow any company to seamlessly secure all types of sensitive corporate and customer information, wherever it resides, while efficiently meeting regulatory compliance and privacy requirements.

websense twitter    linked in

Websense, Inc., the global leader in integrated Web, data and email security solutions, provides Essential Information Protection™ for organizations worldwide. Only Websense solutions provide complete visibility and control over who may use Web, email, or information resources; what information must be protected; how information can be exchanged; and where users and information can go on the Internet. Distributed through its network of channel partners, Websense software and hosted security solutions help organizations block malicious code, prevent the loss of confidential information and enforce Internet use and security policies. Websense is Essential Information Protection™.

Display Sponsors


CA Technologies (Nasdaq: CA) is an IT management software and solutions company with expertise across all IT environments from mainframe and distributed, to virtual and cloud. CA Technologies manages and secures IT environments and enables customers to deliver more flexible IT services. CA Technologies innovative products and services provide the insight and control essential for IT organizations to power business agility. The majority of the Global Fortune 500 relies on CA Technologies to manage evolving IT ecosystems. For additional information, visit CA Technologies at

core security twitter    linked in

Core Security provides market-leading, threat-aware, identity, access and vulnerability management solutions that provide actionable intelligence and context needed to manage security risks across the enterprise. Solutions include multi-factor authentication, provisioning, Identity Governance and Administration (IGA), Identity and Access Intelligence (IAI), and Vulnerability Management (VM). The combination of these solutions provides context and shared intelligence through analytics, giving customers a more comprehensive view of their security posture so they can make better security remediation decisions and maintain compliance.

courion twitter    linked in

With deep experience providing security solutions to seventeen million users in 500 organizations, Courion offers complete Identity and Access Management, from Provisioning to Governance to Identity and Access Intelligence. Real-time risk analytics enable you to visualize enterprise activity and the context of identity and access relationships so you can recognize, manage and reduce risk - everyday. With Courion, you can provide open and compliant access to all while protecting critical company data from unauthorized access.


Fortify's Software Security Assurance products and services protect companies from the threats posed by security flaws in business-critical software applications. Its software security suite—Fortify 360—drives down costs and security risks by automating key processes of developing and deploying secure applications. Fortify Software's customers include government agencies and FORTUNE 500 companies in a wide variety of industries, such as financial services, healthcare, e–commerce, telecommunications, publishing, insurance, systems integration and information management. Headquartered in San Mateo, Calif., Fortify is a wholly-owned subsidiary of HP, part of the HP Software & Solutions organization. More information is available at


Sensage helps large enterprises and Federal agencies solve their most sophisticated Security Information and Event Management (SIEM) and Log Management use cases. With Sensage, IT teams can effectively collect, store, analyze and interpret complex event data to identify suspicious activities, improve cyber-security defenses, and achieve industry and regulatory compliance.

The Sensage solution is comprised Open Security Intelligence, scalable clustered multiprocessing and a patented columnar data warehouse, which is open to all event data types and scales to petabytes. Hundreds of customers worldwide leverage Sensage to identify, understand and counteract cyber-threats, fraud and compliance violations. Sensage partners include Cerner, Cisco, EMC, McAfee and SAP. Visit for more information.

symantec twitter    linked in

The global leader in cybersecurity. Operating one of the world’s largest cyber intelligence networks, we see more threats, and protect more customers from the next generation of attacks. We help companies, governments and individuals secure their most important data wherever it lives.

TripWire twitter    linked in

Tripwire is a leading global provider of IT security and compliance automation solutions that help businesses and government agencies take control of their entire IT infrastructure. Thousands of customers rely on Tripwire’s integrated solutions to help protect sensitive data, prove compliance and prevent outages. Tripwire® VIA™, the comprehensive suite of industry-leading file integrity, policy compliance and log and security event management solutions, is the way organizations can proactively achieve continuous compliance, mitigate risk and improve operational control through Visibility, Intelligence and Automation.


Trustwave is a leading provider of information security and compliance management solutions to businesses and government entities throughout the world. Trustwave has helped thousands of organizations manage compliance and secure their network infrastructures, data communications and critical information assets. Trustwave is headquartered in Chicago with offices throughout the world. For more information, visit

wave Strong

WaveStrong is an information security and data privacy consulting company providing both strategy and solution consulting services. WaveStrong provides information security strategy consultants, security solution architects, systems integration engineers, risk management advisors, vulnerability assessments, security solution designs, systems integration engineers, program planners, project managers, and enterprise deployment teams. Our program managers are experts on HIPAA, NERC, PCI, and SOX compliance regulatory requirements.

  • Information Security Risk Advisors
  • Information Security Solution Architects
  • IT Systems & Security Integration Engineers
  • Information Security & Compliance Program Planners
  • IT & Information Security Project Managers

WaveStrong provides strategy advisors, solution architects and project managers to help our clients reduce losses due to cyber threats and information security breaches. Our clients include companies from the following industries: Healthcare, Energy, Financial Services, Government, Legal, and Life Sciences. Find more information about WaveStrong at: