ISE® West Sponsors 2022

Exabyte Sponsor

Abnormal Security logo twitter    linked in

Abnormal Security provides a leading cloud-native email security platform that leverages AI-based behavioral data science to stop business email compromise (BEC) and never-seen-before attacks that evade traditional secure email gateways (SEGs). Abnormal delivers a fundamentally different approach that precisely detects and protects against the widest range of attacks including phishing, malware, social engineering, spam and graymail, supply chain compromise, and internal account compromise. The Abnormal platform delivers inbound email security, internal and external account takeover protection, and full SOC automation. Abnormal’s API-based approach enables customers to get up and running in 15 minutes and can augment a SEG or be used standalone to enhance native Microsoft security protection. Abnormal Security is based in San Francisco, CA. More information is available at abnormalsecurity.com.



Kilobyte Sponsors

Dazz linked in

Dazz accelerates secure cloud software delivery for modern security and development teams. The Dazz Remediation Cloud maps your code-to-production pipelines; performs smart root cause analysis, prioritizes risk, and identifies code owners; and streamlines remediation right in the developer’s workflow. With Dazz, you gain full pipeline visibility, cut through alert noise, and shrink your risk window by reducing time to remediate. More information is available at dazz.io.



Forescout twitter    linked in

Forescout delivers automated cybersecurity across the digital terrain, maintaining continuous alignment of customers’ security frameworks with their digital realities, including all asset types – IT, IoT, OT, IoMT. The Forescout Continuum Platform provides complete asset visibility, continuous compliance, network segmentation and a strong foundation for Zero Trust. For more than 20 years, Fortune 100 organizations and government agencies have trusted Forescout to provide automated cybersecurity at scale. Forescout customers gain data-powered intelligence to accurately detect risks and quickly remediate cyberthreats without disruption of critical business assets.



Abnormal Security logo twitter    linked in

GrammaTech is a leading global provider of application security testing (AST) solutions used by the world’s most security conscious organizations to detect, measure, analyze and resolve vulnerabilities for software they develop or use. The company is also a trusted cybersecurity and artificial intelligence research partner for the nation’s civil, defense, and intelligence agencies. GrammaTech has corporate headquarters in Bethesda MD, a Research and Development Center in Ithaca NY, and publishes Shift Left Academy, an educational resource for software developers. Visit us at www.grammatech.com, follow us on LinkedIn and Twitter.



seclore twitter    linked in

Seclore offers the market’s first fully browser-based Data-Centric Security Platform, which gives organizations the ability to utilize best-of-breed solutions to discover, identify, protect, and audit the usage of data wherever it goes, both within and outside of the organization’s boundaries. The ability to automate the data-centric security process enables organizations to seamlessly unite best-in-class DLP, Data Classification, Rights Management and SIEM systems for superior information security without added integration costs. Delivering solutions that ensure information remains secure and trackable no matter how or where it travels, without hindering collaboration effectiveness, has been our mission. Our combination of deep expertise in data security, drive to provide innovative solutions, and unwavering commitment to customer success, enables organizations to leverage the best technologies available to ensure their sensitive information is secure throughout its lifecycle.



SentinelOne logo twitter    linked in

SentinelOne is redefining cybersecurity by pushing the boundaries of autonomous technology. We prevent, detect, and respond to sophisticated attacks at faster speed, greater scale, and higher accuracy than human-powered technology alone. With SentinelOne, security professionals achieve more with less complexity, to better defend cloud workloads, user endpoints, and identity surfaces. To learn more, visit www.sentinelone.com.



Shift Left twitter    linked in

ShiftLeft enables software developers and application security teams to radically reduce the attackability of their applications by providing near-instantaneous security feedback on software code during every pull request. By analyzing application context and data flows in near real-time with industry-leading accuracy, ShiftLeft empowers developers and AppSec teams to find and fix the most serious vulnerabilities faster. Using its unique graph database that combines code attributes and analyzes actual attack paths based on real application architecture, ShiftLeft’s platform scans for attack context and pathways typical of modern applications, across APIs, OSS, internal microservices, and first-party business logic code, and then provides detailed guidance on risk remediation within existing development workflows and tooling. ShiftLeft CORE, a unified code security platform, combines the company’s flagship NextGen Static Analysis (NG SAST), Intelligent Software Composition Analysis (SCA), and contextual security training through ShiftLeft Educate to provide developers and application security teams the fastest, most accurate, most relevant, and easiest to use automated application security and code analysis platform.



Display Sponsors

Cyera linked in

Cyera gives organizations instant Data Reality, taking the guesswork out of cloud data security. Now security teams have a complete, current, and correct picture of all sensitive data and its associated risks, across all datastores and clouds. Running out-of-band and without agents, Cyera instantly and automatically provides companies a strong baseline for all security, risk management, and compliance efforts and ensures the entire organization operates with the same policies and guardrails. Backed by top investors including Sequoia, Accel, and Cyberstarts, Cyera is defining the way industry leading organizations approach securing their data in the cloud. To learn more, visit cyera.io.



fastly twitter    linked in

Developers change the way the world experiences the web: they drive the next groundbreaking innovation, power the companies that connect us, and create experiences that can transform our lives. And we built Fastly to make sure they always have what they need to make it happen.Our powerful edge cloud network empowers developers to run, secure, and deliver websites and applications — as close to the users as possible, to create unforgettable experiences at global scale.



Cyber Hunters twitter    linked in

Hunters’ SOC Platform empowers security teams to automatically identify and respond to security incidents across their entire attack surface. We enable vendor-agnostic data ingestion and normalization at a predictable cost. Our built-in detection engineering, data correlation, and automatic investigation helps teams overcome volume, complexity, and false positives. Hunters mitigates real threats faster and more reliably than SIEMs, ultimately reducing customers' overall security risk. To learn more, visit hunters.ai.



stair well twitter    linked in

Stairwell helps organizations by delivering security solutions that attackers can’t evade. Its Inception platform empowers security teams to outsmart any attacker by providing continuous intelligence, detection, and response. The Inception platform is used by a number of Fortune 500 companies. Stairwell is comprised of security industry leaders and engineers from Google and is backed by Sequoia Capital, Accel, Section 32, Lux Capital, and Gradient Ventures. For more information www.stairwell.com or connect with us on Twitter or LinkedIn.



Trustwave twitter    linked in

As a recognized global cyber defender that stops cyber threats all day, every day – we enable our clients to conduct their business, securely.

Trustwave detects threats that others can’t see, enabling us to respond quickly and protect our clients from the devastating impact of cyberattacks. We leverage our world-class team of security consultants, threat hunters and researchers, and our market-leading security operations platform, to relentlessly identify and isolate threats with the right telemetry at the right time for the right response.

Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security. Our elite Trustwave SpiderLabs team provides award-winning threat research and intelligence, which is infused into Trustwave services and products to fortify cyber resilience in the age of advanced threats. For more information, visit https://www.trustwave.com/.



V M Ware Security logo twitter    linked in

VMware is a leading provider of multi-cloud services for all apps, enabling digital innovation with enterprise control. Our software delivers the freedom and flexibility businesses need to build the future. We help our customers on their journey to Zero Trust, with fewer tools and silos. We also provide secure, frictionless experiences for your distributed workforce. Ask us how our approach to security can help you scale your business and accelerate innovation.