ISE® North America Sponsors 2018

Exabyte Sponsor

netskope twitter    linked in

Netskope is the leader in cloud security —we help the world’s largest organizations take advantage of cloud and web without sacrificing security. Our Cloud XD technology targets and controls activities across any cloud service or website and customers get 360-degree data and threat protection that works everywhere. We call this smart cloud security.



Kilobyte Sponsors

HPE twitter    linked in

Aruba, a Hewlett Packard Enterprise company, is a leading provider of next-generation networking and security solutions for enterprises of all sizes worldwide. The company delivers IT solutions that empower organizations to serve the latest generation of mobile-savvy users.

Aruba’s intelligence-powered security gives enterprises an integrated, comprehensive way to reduce risk while gaining visibility and control. The Aruba Security portfolio secures infrastructure, access and inside behavior along with an open architecture and security ecosystem of 140+ partners.

The secure network infrastructure includes multiple technologies like embedded firewalls, IPS, encryption, dynamic segmentation, and secure boot. ClearPass Network Access Control (NAC) enables granular access control before allowing access to the infrastructure and resources. IntroSpect User and Entity Behavior Analytics (UEBA) helps detect, understand and remediate stealthy inside attacks. AI-based machine learning and advanced analytics assist in delivering unified attack detection and response at enterprise scale across multi-vendor infrastructures for a stronger security posture.



Cloud Passage twitter    linked in

Attivo Networks® is the leader in deception technology for real-time detection, analysis, and accelerated response to advanced, credential, insider, and ransomware cyber-attacks. The Attivo ThreatDefend™ Deception and Response Platform accurately detects advanced in-network threats and provides scalable continuous threat management for user networks, data centers, cloud, IoT, ICS-SCADA, and POS environments. Attivo Camouflage dynamic deception techniques and decoys set high-interaction traps to efficiently lure attackers into revealing themselves. Advanced attack analysis and lateral movement tracking are auto-correlated for evidence-based alerts, forensic reporting, and automatic blocking and quarantine of attacks.



Bay Dynamics twitter    linked in

Bay Dynamics® enables organizations to quantify the business impact of cyber risk from both insider and outsider attacks. Using UEBA technology and dynamic telemetry from security and IT infrastructure, our Risk Fabric® cyber analytics platform calculates the value at risk associated with specific threats and vulnerabilities, and prescribes prioritized actions across the organization to reduce the risks that matter most.



bah twitter    linked in

For more than 100 years, business, government, and military leaders have turned to Booz Allen Hamilton to solve their most complex problems. They trust us to bring together the right minds: those who devote themselves to the challenge at hand, who speak with relentless candor, and who act with courage and character. They expect original solutions where there are no roadmaps. They rely on us because they know that—together—we will find the answers and change the world. To learn more, visit BoozAllen.com.



qualys twitter    linked in

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 120 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds. Founded in 1999 as one of the first SaaS security companies, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HCL Technologies, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance. For more information, please visit www.qualys.com.



algosec twitter    linked in

SAI Global IT Risk Manager (formerly Modulo Risk Manager) provides intelligent risk solutions for information security officers. We change how customers assess digital risk, facilitating efficient assessment internally, in the cloud, and across the extended network. With thousands of out-of-the-box controls, regulations, and automated workflows, clients see value within weeks.



wombat twitter    linked in

Wombat Security, a division of Proofpoint provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber-security education solution includes an integrated platform containing broad assessments, a library of simulated attacks and brief interactive training modules, to reduce employee susceptibility to phishing attacks and malware infections up to 90%.



Display Sponsors

Armis     linked in

Armis eliminates the IoT security blind spot, protecting enterprises from the threat of unmanaged or rogue devices and networks. Customers including Samsung Research America, IDT Corporation, and Gett trust Armis’ agentless IoT security platform to see and control any device or network. Headquartered in Palo Alto, California, Armis is a privately held company with additional offices in Tel Aviv.



endgame twitter    linked in

Endgame is a leading endpoint security platform to help enterprises close the protection gap against advanced adversaries. Endgame transforms security operations teams and incident responders from crime scene investigators into hunters that prevent damage and loss, and dramatically reduces the time and cost associated with incident response and compromise assessment. Our IOC-independent platform covers the entire kill chain, leveraging machine learning and data science to uncover, in real-time, unique attacks that evade traditional defenses and respond precisely without disrupting normal business operations. For more information, visit www.endgame.com and follow us on Twitter @EndgameInc.



check point twitter    linked in

ReliaQuest advances IT security outcomes through customized co-management. ReliaQuest develops solutions based on each organization’s business goals, leveraging existing investments in security hardware and software. Incident Response, Security Engineering, and Threat Management solutions are delivered 24 hours a day, 365 days a year from multiple U.S.-based Security Operations Centers.



spycloud twitter    linked in

SpyCloud helps businesses of all sizes prevent account takeover attacks by alerting when employee or company assets have been compromised. We accomplish this through our proactive and actionable solutions powered by a world-class team of intelligence analysts. Check your exposure at spycloud.com.



verodin twitter    linked in

Verodin is the leading platform for continuous security validation and configuration assurance. Verodin's Security Instrumentation Platform (SIP) empowers organizations to assess and improve security effectiveness with quantifiable, evidence-based data. Verodin users dramatically increase the ROI of existing security investments and measurably mature prevention, detection and response capabilities.