ISE® Northeast Sponsors 2012

Megabyte Sponsor

Adobe twitter    linked in

Adobe Systems Incorporated offers business, creative, and mobile software solutions that revolutionize how the world engages with ideas and information. With a reputation for excellence and a portfolio of many of the most respected and recognizable software brands, Adobe is one of the world's largest and most diversified software companies.



voltage twitter    linked in

Voltage Security®, Inc. is the leading data protection provider, delivering secure, scalable, and proven data-centric encryption and key management solutions, enabling our customers to effectively combat new and emerging security threats. Leveraging breakthrough encryption technologies, our powerful data protection solutions allow any company to seamlessly secure all types of sensitive corporate and customer information, wherever it resides, while efficiently meeting regulatory compliance and privacy requirements.



Kilobyte Sponsors

fish net security twitter    linked in

FishNet Security is the No. 1 provider of information security solutions that combine technology, services, support and training. Since 1996, the company has helped clients manage risk, meet compliance requirements and reduce costs while maximizing security effectiveness and operational efficiency. FishNet Security delivers quality solutions to over 5,000 clients nationwide.



fortinet twitter    linked in

Fortinet provides top-rated network and content securs secure access products that share intelligence and work together to form a cooperative fabric. Our unique security fabric combines Security Processors, an intuitive operating system, and applied threat intelligence to give you security, performance, and better visibility and control--while providing easier administration.



Fox T

FoxT strengthens security, enforces compliance and streamlines administration across your diverse servers, applications and databases. Our enterprise access management software centralizes administration, enforcement, and auditing of granular authentication and authorization policies for both privileged and end users. Visit foxt.com for more information.



Metaforic

Metaforic is a leading provider of security software whose solutions directly prevent attack from any change to code or data by automatically adding real-time security to code that is to be protected. Metaforic offers a real time anti-tamper and integrity checking solution for firmware, OS and applications that protects against subversion, theft, malware, tampering or other corruption. http://metaforic.com/



Net IQ twitter    linked in

NetIQ is a global, enterprise software company with a relentless focus on customer success. Our portfolio includes scalable, automated solutions for Identity, Security and Governance and IT Operations Management that help organizations securely deliver, measure and manage computing services across physical, virtual and cloud computing environments.



qualys twitter    linked in

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 15,700 customers and active users in more than 130 countries. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds.



Stonesoft twitter    linked in

Stonesoft is a global provider of proven, next generation solutions that simplify network security management. Stonesoft pioneered the market leading StoneBeat high availability solution in the 1990s. Today, Stonesoft innovations continue with the StoneGate Next Generation Platform which uniquely integrates the most advanced security solutions – StoneGate NextGen Firewall, IPS, SSL VPN and Virtual Security solutions – with our patented high availability technologies and sophisticated next generation management. Next generation management enables real-time monitoring, alerting, troubleshooting, managing and reporting from a single management console and database, giving administrators proactive control of both physical and virtual security networks. With more than 10,000 installations in more than 90 countries, Stonesoft customers represent many of the world's largest organizations.



TrendMicro

Trend Micro provides leading Internet content security solutions for businesses and consumers. We protect against malware, spam, data leaks, and the newest Web threats designed to steal digital information. Our unique solutions stop these threats where they first emerge - in the Internet - before they can attack corporate networks and PCs. Founded in 1988, Trend Micro operates globally and protects hundreds of millions of users in the office, at home and on the go. www.trendmicro.com



Trustwave twitter    linked in

As a recognized global cyber defender that stops cyber threats all day, every day – we enable our clients to conduct their business, securely.

Trustwave detects threats that others can’t see, enabling us to respond quickly and protect our clients from the devastating impact of cyberattacks. We leverage our world-class team of security consultants, threat hunters and researchers, and our market-leading security operations platform, to relentlessly identify and isolate threats with the right telemetry at the right time for the right response.

Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security. Our elite Trustwave SpiderLabs team provides award-winning threat research and intelligence, which is infused into Trustwave services and products to fortify cyber resilience in the age of advanced threats. For more information, visit https://www.trustwave.com/.



Verdasys

Verdasys provides Enterprise Information Protection (EIP) solutions that secure both proprietary and sensitive data and enables business process integrity and flexibility essential for Global 2000 companies to successfully compete in today’s highly collaborative and mobile environments. To learn more about EIP and why companies serious about information protection choose Verdasys, visit www.verdasys.com



Display Sponsors

Accuvant twitter    linked in

Accuvant is the Authoritative Source for information security. Since 2002, the company has served more than 5,200 clients, including half of the Fortune 100 and more than 900 educational institutions and government entities. Headquartered in Denver, Accuvant has offices across the United States and Canada and boasts the largest and most elite army of technical security professionals in the world – Accuvant LABS.



Air Watch twitter    linked in

AirWatch is the leader in enterprise-grade mobility management and security solutions. More than 7,000 customers across the world trust AirWatch to manage their most valuable assets: their mobile devices. Our highly scalable solution provides an integrated, real-time view of an entire fleet of corporate and employee-owned Apple iOS, Android, Windows, BlackBerry and Symbian devices.

As the largest MDM provider with more than 1,300 employees, 400 focused on R&D, AirWatch offers the most comprehensive mobility management solution. With a proven track record of deployments larger than 100,000 devices, organizations can confidently manage every single device used across the enterprise.



Aveksa twitter    linked in

Aveksa provides the industry's most comprehensive, enterprise-class, access governance and management solution. Aveksa helps IT organizations reduce access management complexity and increase operational efficiency, while minimizing risk and ensuring sustainable compliance. Leading Global 2000 organizations in financial services, healthcare, retail, energy/utility, telecommunications, transportation and manufacturing rely on Aveksa to efficiently address access request, fulfillment and regulatory compliance demands.



core security twitter    linked in

Core Security provides market-leading, threat-aware, identity, access and vulnerability management solutions that provide actionable intelligence and context needed to manage security risks across the enterprise. Solutions include multi-factor authentication, provisioning, Identity Governance and Administration (IGA), Identity and Access Intelligence (IAI), and Vulnerability Management (VM). The combination of these solutions provides context and shared intelligence through analytics, giving customers a more comprehensive view of their security posture so they can make better security remediation decisions and maintain compliance.



courion twitter    linked in

With deep experience providing security solutions to seventeen million users in 500 organizations, Courion offers complete Identity and Access Management, from Provisioning to Governance to Identity and Access Intelligence. Real-time risk analytics enable you to visualize enterprise activity and the context of identity and access relationships so you can recognize, manage and reduce risk - everyday. With Courion, you can provide open and compliant access to all while protecting critical company data from unauthorized access.



imperva twitter    linked in

Recognized by industry analysts as a cybersecurity leader, Imperva champions the fight to secure data and applications wherever they reside. In today’s fast-moving cybersecurity landscape, your assets require continuous protection, but analyzing every emerging threat taxes your time and resources. For security to work, it has to work for you. By accurately detecting and effectively blocking incoming threats, we empower you to manage critical risks, so you never have to choose between innovating for your customers and protecting what matters most. At Imperva, we tirelessly defend your business as it grows, giving you clarity for today and confidence for tomorrow. Imperva—Protect the pulse of your business.



Invincea twitter    linked in

Over 25,000 customers rely on Invincea to prevent and detect endpoint threats while enabling their workforce to conduct business. Invincea stops malware, spear-phishing, weaponized Office documents, and other threats. This is achieved by combining deep learning, behavioral monitoring, and isolation technology in a single agent– working together for better protection. ​



N Circle
nCircle is the leading provider of Information Risk & Security Performance Management solutions to more than 6,500 businesses and government agencies worldwide. nCircle solutions enable enterprises of all sizes to 1) automate compliance and reduce risk, and 2) measure and compare the performance of their IT security program with their own goals and industry peers. nCircle solutions may be deployed on a customer’s premise, as a cloud-based service, or in combination, for maximum flexibility and value. nCircle has won numerous awards for growth, innovation, customer satisfaction and technology leadership and has been ranked among the top 100 best places to work in the San Francisco Bay Area. nCircle is headquartered in San Francisco, CA, with regional offices throughout the United States and in London and Toronto. To learn how you can more effectively protect your company visit us at www.ncircle.com.