Cybersecurity
MEET THE HOT CYBERSECURITY COMPANIES TO WATCH IN 2016
The Cybersecurity 500 is the definitive list of the world’s hottest and most innovative
companies in the cybersecurity industry
#
|
Company
|
Cybersecurity
Sector
|
Corporate HQ
|
1
|
HUNT & Cyber
Operations
|
Colorado Springs CO
|
|
2
|
Information Security
Services
|
Toronto, Canada
|
|
3
|
Enterprise IT
Security Solutions
|
Waltham MA
|
|
4
|
Unified Threat
Management
|
Tel Aviv, Israel
|
|
5
|
Threat Detection
& Prevention
|
Santa Clara CA
|
|
6
|
Threat Protection
& Network Security
|
San Jose CA
|
|
7
|
Enterprise Security
Solutions
|
Sunnyvale CA
|
|
8
|
Email Security
|
Watertown MA
|
|
9
|
Advanced Threat
Protection
|
Milpitas CA
|
|
10
|
Cyber Risk
Management
|
Suffolk VA
|
|
11
|
Risk Management and
Compliance
|
Nashville TN
|
|
12
|
Data Center &
Cloud Security
|
Milpitas CA
|
|
13
|
Intelligence Driven
Security
|
Bedford MA
|
|
14
|
Endpoint, Cloud
& Mobile Security
|
Mountain View CA
|
|
15
|
Cybersecurity
Consulting & Advisory
|
New York City NY
|
|
16
|
Anti-Virus &
Malware Protection
|
Abingdon, UK
|
|
17
|
Security Data &
Analytics Solution
|
Boston MA
|
|
18
|
Privileged Account
Management
|
Washington DC
|
|
19
|
Automated Incident
& Breach Response
|
Lombardy, Italy
|
|
20
|
Cyber Threat
Protection
|
Petach-Tikva, Israel
|
|
21
|
Managed Security
Risk Assessment
|
San Antonio TX
|
|
22
|
Security-as-a-Service
|
Sunnyvale CA
|
|
23
|
Software
Vulnerability Management
|
Northport NY
|
|
24
|
Cloud Enabled DDoS
Mitigation
|
San Francisco CA
|
|
25
|
Security & Risk
Management Solutions
|
London, UK
|
|
26
|
Cloud Security &
Compliance
|
Redwood City CA
|
|
27
|
Cybersecurity Risk
Management
|
Surrey, UK
|
|
28
|
Malware &
Anti-Virus Solutions
|
Moscow, Russia
|
|
29
|
Server, Cloud, and
Content Security
|
Tokyo, Japan
|
|
30
|
Global Risk
Management Services
|
New York City NY
|
|
31
|
Endpoint &
Server Security Platform
|
Waltham MA
|
|
32
|
Cybersecurity
Consulting & Advisory
|
London, UK
|
|
33
|
Endpoint Threat
Detection
|
Austin TX
|
|
34
|
DDoS Cyber Attack
Protection
|
San Jose, CA
|
|
35
|
Cybersecurity
Solutions & Services
|
New York City NY
|
|
36
|
Vulnerability
Scanning
|
Columbia MD
|
|
37
|
Software Development
Security
|
Tel-Aviv, Israel
|
|
38
|
Open Source Software
Security
|
Burlington MA
|
|
39
|
Managed Security
Services
|
Atlanta GA
|
|
40
|
Mobile & Data
Security
|
Waterloo, Canada
|
|
41
|
Cloud, Mobility
& IoT Security
|
Austin TX
|
|
42
|
Anti-Virus &
Internet Security Software
|
Amsterdam, The
Netherlands
|
|
43
|
Network & Data
Security
|
Basking Ridge NJ
|
|
44
|
Data &
Applications Security
|
Redwood Shores CA
|
|
45
|
Managed Security
& Consulting
|
Bedminster NJ
|
|
46
|
Cloud Infrastructure
Security
|
Boston MA
|
|
47
|
Threat Detection
& Response
|
San Mateo CA
|
|
48
|
Fraud & Security
Analytics
|
Cary NC
|
|
49
|
Endpoint Data
Security
|
Pasadena CA
|
|
50
|
Identity &
Access Management
|
Chai Chee, Singapore
|
|
51
|
Enterprise Security
Strategy
|
New York City NY
|
|
52
|
Big Data Security
|
San Francisco CA
|
|
53
|
Phone-Based Fraud
Prevention
|
Atlanta GA
|
|
54
|
Cyber & Homeland
Security Services
|
McLean VA
|
|
55
|
National Security
Solutions
|
Reston VA
|
|
56
|
Security &
Systems Management
|
Emeryville CA
|
|
57
|
Anti-Virus, Malware
& Threat Protection
|
Santa Clara CA
|
|
58
|
Application Security
Testing
|
Burlington MA
|
|
59
|
Internet Security
for All Devices
|
Helsinki, Finland
|
|
60
|
DDoS Defense &
Security Solutions
|
Hudson MA
|
|
61
|
Privileged Account
Management
|
Pleasanton CA
|
|
62
|
Network & Mobile
Security
|
Santa Clara CA
|
|
63
|
Cybersecurity
Analytics and Cyber Fraud
|
Palo Alto CA
|
|
64
|
DDoS Mitigation
& Protection
|
Santa Clara CA
|
|
65
|
Cybersecurity
Solutions & Services
|
Bethesda MD
|
|
66
|
Security Analysis
& Threat Detection
|
Broomfield CO
|
|
67
|
IT Security &
Compliance
|
St. Albans, UK
|
|
68
|
Continuous &
On-Demand Web Security
|
Geneva, Switzerland
|
|
69
|
Advanced Cyberthreat
Detection
|
Portland OR
|
|
70
|
Security for
Healthcare Providers
|
Lexington MA
|
|
71
|
Data Encryption
& Security
|
Milwaukee WI
|
|
72
|
Mobile Device
Security
|
Nashua NH
|
|
73
|
Enterprise Identity
Management
|
San Francisco CA
|
|
74
|
Mobile, Data Center
& Cloud Security
|
Palo Alto CA
|
|
75
|
Governance, Risk
& Compliance
|
Chicago IL
|
|
76
|
Secure Cloud &
Mobile Computing
|
Cambridge MA
|
|
77
|
Adaptive Security
Platform
|
Sunnyvale CA
|
|
78
|
Application Security
& Delivery
|
Tel Aviv Israel
|
|
79
|
Cyber Security
Analytics
|
McLean VA
|
|
80
|
Identity &
Access Management
|
Westborough MA
|
|
81
|
Anti-Terrorism &
Homeland Security
|
Reston VA
|
|
82
|
Network &
Managed Security Services
|
Broomfield CO
|
|
83
|
Mobile Device &
App Security
|
Mountain View CA
|
|
84
|
Cybersecurity for
Public Sector & Defense
|
Palo Alto CA
|
|
85
|
Security Awareness
Training
|
San Antonio TX
|
|
86
|
Malware Detection
& Protection
|
San Jose CA
|
|
87
|
Cyber Risk
Management
|
London, UK
|
|
88
|
Security-as-a-Service
Solutions
|
Houston TX
|
|
89
|
PC, Mobile & IoT
Security
|
London, UK
|
|
90
|
Cognitive Security
|
Austin TX
|
|
91
|
Cloud Cyber Ranges
|
Raanana, Israel
|
|
92
|
Informaton Risk
Intelligence
|
San Francisco CA
|
|
93
|
Business Assurance
Technology
|
Sunnyvale CA
|
|
94
|
DDoS Attack &
Threat Proection
|
Burlington MA
|
|
95
|
Web, Email &
Mobile Security
|
McLean VA
|
|
96
|
Endpoint & IT
Infrastructure Security
|
Blue Bell PA
|
|
97
|
Enterprise Network
Security
|
Tel Aviv, Israel
|
|
98
|
Cloud Network
Security
|
Tel-Aviv, Israel
|
|
99
|
Data Loss Prevention
|
Waltham MA
|
|
100
|
Cloud-Based Malware
Protection
|
Petach-Tikva, Israel
|
Detail of Companies
#1 root9B
HUNT & Cyber Operations
root9B is a dynamic provider of cyber security and advanced technology training capabilities, operational support and consulting services. root9B’s personnel are internationally recognized and trusted providers of advanced cyber solutions, satisfying requirements for missions and enterprises globally. We are dedicated to the delivery of solutions and services based on technical innovation and professional excellence. root9B’s workforce consists of US military and Law Enforcement veterans with extensive experience providing advanced technology solutions. root9B offers world class cyber training capabilities, consulting services, and test range operations. root9B personnel understand the full spectrum of kinetic and non-kinetic effects and their impact to offensive and defensive cyber operations. We develop tactics, techniques, and procedures to advance operations through the use of cyberspace. root9B has offices in Colorado Springs, CO and San Antonio, TX, that provide professional cyber support services that enable our customers to achieve information superiority. root9B supports Federal Government and commercial customers internationally.
#2 Herjavec Group
Information Security Services
At Herjavec Group, information security is what we do. Supporting your IT Security Lifecycle drives our business and your infrastructure’s protection is our only priority. We are an expert team of highly dedicated security specialists, supported by strategic and emerging technology partners, who are laser focused on information security for our enterprise customers.Dynamic IT entrepreneur Robert Herjavec, founded Herjavec Group in 2003 and we quickly became one of North America’s fastest-growing technology companies. We deliver managed security services globally supported by state-of-the-art, PCI compliant Security Operations Centres (SOC), operated 24/7/365 by certified security professionals. This expertise is coupled with a leadership position across a wide range of functions including compliance, risk management, networking & incident response.Herjavec Group has offices globally including three headquarters in Toronto (Canada), New York City (USA), Reading (United Kingdom) and Sydney (Australia).
#3 IBM Security
Enterprise IT Security Solutions
IBM integrated security intelligence protects businesses around the world.New technological capabilities come with new vulnerabilities. How do you keep up with attacks when there is a shortage of IT security skills and rising costs to secure your data? How fast can you address an attack when your solutions aren’t integrated?IBM offers a deep enterprise security portfolio customized to your company’s needs. Unmatched in ability to help you disrupt new threats, deploy security innovations and reduce the cost and complexity of IT security, IBM can safeguard your most critical data from compromise.
#4
Check Point Software
Unified Threat Management
Since 1993, Check Point has been dedicated to providing customers with uncompromised protection against all types of threats, reducing security complexity and lowering total cost of ownership. We are committed to staying focused on customer needs and developing solutions that redefine the security landscape today and in the future.
#5
Palo Alto Networks
Threat Detection & Prevention
Palo Alto Networks, Inc. has pioneered the next generation of network security with our innovative platform that allows you to secure your network and safely enable an increasingly complex and rapidly growing number of applications. At the core of this platform is our next-generation firewall, which delivers visibility and control over applications, users, and content within the firewall using a highly optimized hardware and software architecture.
#6
Cisco
Threat Protection & Network Security
Cisco security innovations provide highly secure firewall, web, and email services while helping to enable mobility and teleworking. Cisco security products include:
Access Control and Policy
Advanced Malware Protection
Email Security
Firewalls
Network Security
Next Generation Intrusion Prevention System (NGIPS)
Security Management
VPN and Endpoint Security Clients
Web Security
#7
Fortinet
Enterprise Security Solutions
Fortinet (NASDAQ: FTNT) protects networks, users and data from continually evolving threats. As a global leader in high-performance network security, we enable businesses to consolidate and integrate stand-alone technologies without suffering performance penalties. Fortinet solutions empower customers to embrace new technologies and opportunities while protecting essential systems and content.
#8
Mimecast
Email Security
Mimecast delivers cloud-based email management for Microsoft Exchange, including archiving, continuity and security. By unifying disparate and fragmented email environments into one holistic solution that is always available from the cloud, Mimecast minimizes risk and reduces cost and complexity, while providing total end-to-end control of email.
#9
FireEyeAdvanced Threat ProtectionFireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEyehas over 2,700 customers across 67 countries, including over 157 of the Fortune 500.
#10
Sera-Brynn
Cyber Risk Management
Sera-Brynn® is a globally recognized cybersecurity audit and advisory firm dedicated to helping its clients secure their computing environments and meet applicable mandatory industry and government compliance requirements in the most economic and efficient manner possible. In addition to PCI, FFIEC, HIPAA, NERC, GDPR and other standards, our security professionals are global leaders in developing, documenting and implementing FISMA, NIST, and DoD compliance requirements across a broad range of civilian and Department of Defense federal agencies and DoD support organizations.
Sera-Brynn® is the only PCI QSA in North America partnered with a multi-billion dollar financial institution, which gives us a unique perspective into the economic aspects of meeting cybersecurity compliance requirements. We work closely with nationally recognized accounting firms, the insurance industry, legal offices, and law enforcement at all levels to provide the highest level of cyber protection with the least amount of economic impact.
Sera-Brynn’s global clients include Fortune 1000 companies, manufacturers, state and local governments, large healthcare organizations, law firms, financial institutions, insurance carriers, critical infrastructure centers, transportation companies, large hospitality and resort businesses, international joint ventures, and retail merchants, all of whom rely on Sera-Brynn® as a trusted advisor and extension of their information technology team.
#11
Clearwater Compliance
Risk Management and Compliance
Clearwater Compliance, LLC, focuses on helping healthcare organizations and their service providers improve patient safety and the quality of care by assisting them to establish, operationalize and mature their information risk management programs. Led by veteran, C-suite healthcare executives, Clearwater provides comprehensive, by-the-regs software and tools, educational events, and expert professional/advisory services for healthcare organizations ranging from major healthcare systems, hospitals, health plans and Fortune 100 companies, to medical practices and healthcare startups. Since 2003, the company has served over 400 organizations. Find out more about our privacy, security, compliance and information risk management solutions atclearwatercompliance.com
#12
Gigamon
Data Center & Cloud Security
Gigamon provides an intelligent Visibility Fabric™ architecture for enterprises, data centers and service providers around the globe. Our technology empowers infrastructure architects, managers and operators with pervasive and dynamic intelligent visibility of traffic across both physical and virtual environments without affecting the performance or stability of the production network. Through patented technologies and centralized management, the Gigamon GigaVUE® portfolio of high availability and high density products intelligently delivers the appropriate network traffic to management, analysis, compliance and security tools. With over eight years’ experience designing and building traffic visibility products in the US, Gigamon solutions are deployed globally across vertical markets including over half of the Fortune 100 and many government and federal agencies.
#13
RSA
Intelligence Driven Security
RSA provides more than 30,000 customers around the world with the essential security capabilities to protect their most valuable assets from cyber threats. With RSA’s award-winning products, organizations effectively detect, investigate, and respond to advanced attacks; confirm and manage identities; and ultimately, reduce IP theft, fraud, and cybercrime. For more information, go to www.rsa.com.
#14
Symantec
Endpoint, Cloud & Mobile Security
Founded in 1982, Symantec has evolved to become the global leader in cyber security, with more than 11,000 employees in more than 35 countries. Operating one of the world’s largest cyber intelligence networks, we see more threats, and protect more customers from the next generation of attacks. We help companies, governments and individuals secure their most important data wherever it lives.
#15
EY
Cybersecurity Consulting & Advisory
At EY, we have an integrated perspective on all aspects of organizational risk, and cybersecurity is a key area of focus where EY is an acknowledged leader in the current landscape of mobile technology, social media and cloud computing.
Our cybersecurity practice has people located in over 150 countries and with over 5000+ practitioners globally.
EY provides services in 6 core pillars with over 160 unique cyber offerings - including Cyber Digital & Analytics, Cyber Defense & Response, Cyber Strategy & Architecture, Cyber Operations (Cyber-as-a-Service), Cyber Governance & Compliance and Cyber Technology & Innovation.
EY is well-known for employing a diverse and deep bench of cyber talent. We’ve brought in highly experienced professionals from some of the largest technology companies in the world and paired them with executives from the most pioneering technology startups.
We combine that with leaders who have served in the public sector through the FBI, the CIA, Homeland Security, and the US Army, Air Force and Marines. Our ecosystem of talent allows us to bring broad perspective, deep experience and innovative strategies.
#16
Sophos
Anti-Virus & Malware Protection
Sophos helps organizations keep their data safe and stop the growing number of complex threats. We provide a full range of endpoint, encryption, email, web and NAC products, helping our customers protect their businesses and meet compliance needs.
#17
Rapid7
Security Data & Analytics Solution
Rapid7's IT security solutions deliver visibility and insight that help to make informed decisions, create credible action plans, monitor progress, and simplify compliance and risk management. Over 2,500 enterprises use Rapid7's simple, innovative solutions and its free products are downloaded over one million times per year and enhanced by more than 200,000 open source security community members
#18
Thycotic
Privileged Account Management
Thycotic deploys smart, reliable, IT security solutions that empower companies to control and monitor privileged account credentials and identity access for administrators and end-users. An Inc. 5000 company, Thycotic is recognized as the fastest growing privileged management vendor in IT security and one of the top 30 fastest growing companies headquartered in Washington, DC. www.thycotic.com
#19
DFLabs
Automated Incident & Breach Response
DFLabs is a Technology and Services company specialized in Cyber Security Incident and Data Breach Response. Our mission is: eliminating the complexity of Cyber Security Incident and DataBreach, reducing reaction time and risk exposure. In other words Cyber Incidents Under Control. With this goal in mind, we've created IncMan NG, the cutting edge technology platform for managing and responding to cyber incidents and share intelligence. IncMan has been created for SOC and CSIRT orchestration, and It is currently being used by many Fortune 100/1000, and Financial Services Institutions worldwide. For More Info Go Here or visit us on the web atwww.dflabs.com
#20
CyberArk
Cyber Threat Protection
CyberArk is the only security company laser-focused on striking down targeted
cyber threats, those that make their way inside to attack the heart of the
enterprise. Dedicated to stopping attacks before they stop business, CyberArk
is trusted by the world’s leading companies — including more than 35% of the
Fortune 100 companies — to protect their highest-value information assets,
infrastructure and applications.
#21
Digital Defense
Managed Security Risk Assessment
Founded in 1999, Digital Defense, Inc., is a premier provider of managed security risk assessment solutions protecting billions in assets for small businesses to Fortune companies in over 65 countries. Our dedicated team of experts helps organizations establish an effective culture of security and embrace the best practices of information security. Through regular assessments, awareness education and rapid reaction to potential threats, our clients become better prepared to reduce risk and keep their information, intellectual property and reputations secure.
#22
Proofpoint
Security-as-a-Service
Proofpoint, Inc. helps the most successful companies in the world protect and govern their most sensitive business data. Proofpoint is an innovative security-as-a-service vendor that delivers data protection solutionsthat help organizations protect their data from attack and enable them to effectively meet the complex and evolving regulatory compliance and data governance mandates that have been spawned from highly publicized data breaches. - See more at: http://proofpoint.com/us/why-proofpoint/about-us#difference
#23
Code Dx
Software Vulnerability Management
Find, prioritize, and manage software vulnerabilities – fast and affordably Code Dx is a software vulnerability management system that brings together static and dynamic code analysis so you can quickly find and manage vulnerabilities in the code you write, in the languages you use, at a price you can afford. By correlating and consolidating the results of hybrid application testing techniques – static, dynamic and manual – Code Dx helps find the most severe and exploitable vulnerabilities first. Code Dx accelerates the vulnerability discovery and remediation process. And more secure software increases the enterprise security where applications are deployed, decreases the risk of compromise, and decreases developer organization liability.
#24
Nexusguard
Cloud Enabled DDoS Mitigation
As a longtime leader in DDoS defense, Nexusguard is at the forefront of the fight against malicious Internet attacks, protecting organizations worldwide from threats to their websites, services, and reputations. Continually evolving to face new threats as they emerge, we have the tools, insight, and know-how to protect our clients’ vital business systems no matter what comes their way.
Our overriding objective is to prevent attacks that disrupt online businesses and enable the use of the Internet as intended. We protect companies of all sizes with premium Internet security solutions, empowering them to focus on their business — and not on how to maintain business uptime. Our dedicated account managers work relentlessly to ensure all customer needs are met. And every day, our experienced security experts and researchers fortify Nexusguard’s repository of attack signatures — a critical resource for quickly formulating on-target mitigation strategies and better security solutions.
#25
BT
Security & Risk Management Solutions
BT provides the full range of cyber security consultancy and services. We can conduct ethical hacking exercises to identify weaknesses, and then undertake continuous vulnerability scanning and threat monitoring.
Our managed security services enable you to transmit sensitive information around the world using secure document delivery and email. We can implement message scanning and virus protection services, and provide file encryption or public key infrastructure services.
We offer denial of service mitigation and intrusion detection/prevention services and provide managed firewall services.
BT provides cyber security services to the US and UK defence departments – so mining, oil and gas companies can be confident to entrust their digital security to us.
#26
Qualys
Cloud Security & Compliance
Qualys Inc. (NASDAQ: QLYS), is a pioneer and leading provider of cloud security and compliance solutions with over 6,000 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The QualysGuard Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has strategic partnerships with leading managed service providers and consulting organizations worldwide. The company is also a founding member of the Cloud Security Alliance (CSA).
#27
BAE Systems
Cybersecurity Risk Management
Our consulting services help clients to prepare for cyber attacks by understanding and managing cyber exposure, enabling them to make informed investment decisions and to put pragmatic, cost-effective protection in place.
#28
Kaspersky Lab
Malware & Anti-Virus Solutions
Kaspersky Lab is one of the fastest growing IT security vendors in the world. The company was founded in 1997 and today it is an international group operating in almost 200 countries and territories worldwide. It has 33 representative territory offices in 30 countries across 5 continents. Kaspersky Lab has a corporate client base of more than 250,000 companies located around the globe, ranging from small and medium-sized businesses all the way up to large governmental and commercial organizations. Over 300 million people worldwide are protected by Kaspersky Lab products and technologies.
#29
Trend Micro
Server, Cloud, and Content Security
As a global leader in IT security, Trend Micro develops innovative security solutions that make the world safe for businesses and consumers to exchange digital information. With over 25 years of security expertise, we’re recognized as the market leader in server security, cloud security, and small business content security.
#30
Deloitte
Global Risk Management Services
With the proliferation of Internet-enabled devices, cyber culture is growing more rapidly than cyber security. Everything that depends on cyberspace is potentially at risk. Private data, intellectual property, cyber infrastructure, and even military and national security can be compromised by deliberate attacks, inadvertent security lapses, and the vulnerabilities of a relatively immature, unregulated global Internet. Working hand-in-hand with member firm clients, Deloitte helps organizations plan and execute an integrated cyber approach to harness the power of information networks to enhance business operations, increase mission performance, and improve customer support, without compromising security or privacy.
#31
Carbon Black
Endpoint & Server Security Platform
Carbon Black leads a new era of endpoint security by enabling organizations to disrupt advanced attacks, deploy the best prevention strategies for their business, and leverage the expertise of 10,000 professionals to shift the balance of power back to security teams. Only Carbon Black continuously records and centrally retains all endpoint activity, making it easy to track an attacker’s every action, instantly scope every incident, unravel entire attacks and determine root causes. Carbon Black also offers a range of prevention options so organizations can match their endpoint defense to their business needs. Carbon Black has been named #1 in endpoint protection, incident response, and market share.
#32
PwC
Cybersecurity Consulting & Advisory
Cybersecurity is more than an IT challenge—it’s a business imperative. New technologies, well-funded and determined adversaries, and interconnected business ecosystems have combined to increase your exposure to cyberattacks. Your critical digital assets are being targeted at an unprecedented rate and the potential impact to your business has never been greater. What’s at risk? The theft of research and development information, monetization of credit card data or financial records, rapid replication of product or process, access to strategic or customer information, and the disruption of operational stability. To sufficiently protect your competitive advantage and shareholder value, your approach to cybersecurity must adapt to keep pace.
#33
Ziften
Endpoint Threat Detection
Ziften's groundbreaking solution provides continuous real-time visibility and intelligence, enabling incident prevention, detection and response. Ziften continuously assesses user and device behaviors and highlights anomalies in real-time, allowing security analysts to hone in on advanced threats faster and minimize Time To Resolution (TTR). Ziften's Endpoint Detection and Response solution allows organizations to more rapidly determine the root cause of a breach and decide on the necessary corrective actions. Ziften Open Visibility™ extends existing Security, Systems Management, and SIEM platforms. Ziften delivers crucial open intelligence of any endpoint, enabling you to run your business in a more efficient, intelligent, and secure manner.
Our security experts have been granted dozens of patents, and bring experience from some of technology's most regarded brands including AMD, BMC Software, Dell, Intel, Microsoft, Tivoli, and Symantec. Collectively, Ziften's leadership team has founded several successful technology companies, and created shareholder wealth through mergers and acquisitions, and IPOs.
#34
A10 Networks
DDoS Cyber Attack Protection
We have pioneered a new generation of application networking technologies. Our solutions enable enterprises, service providers, Web giants and government organizations to accelerate, secure and optimize the performance of their data center applications and networks. Our Advanced Core Operating System (ACOS®) platform is designed to deliver substantially greater performance and security relative to prior generation application networking products. Our software-based ACOS architecture provides the flexibility that enables us to expand our business with additional products to solve a growing array of networking and security challenges across cloud computing and mobility. A10 Networks has a portfolio of application-layer networking products that assure user-to-application connectivity is available, accelerated and secure.
#35
Booz Allen
Cybersecurity Solutions & Services
In a world where everyone is connected, our future is tied to the access, availability and synthesis of information. That’s why Booz Allen has pioneered a multidisciplinary approach to cybersecurity – one that leverages game-changing technologies and standards to maximize security in the digital environment.
#36
Tenable Network Security
Vulnerability Scanning
Tenable Network Security is relied upon by more than 20,000 organizations, including the entire U.S. Department of Defense and many of the world’s largest companies and governments, to stay ahead of emerging vulnerabilities, threats and compliance-related risks. Its Nessus and SecurityCenter solutions continue to set the standard for identifying vulnerabilities, preventing attacks and complying with a multitude of regulatory requirements.
#37
Checkmarx
Software Development Security
Checkmarx provides the best way for organizations to introduce security into their Software Development Lifecycle (SDLC) which systematically eliminates software risk. The product enables developers and auditors to easily scan un-compiled / un-built code in all major coding languages and identify its security vulnerabilities. Static Code Analysis (SCA) delivers security and the requirement of incorporating security into the software development lifecycle (SDLC). It is the only proven method to cover the entire code base and identify all the vulnerable areas in the software. In static code analysis the entire code base is abstracted and all code properties and code data-flows are exposed. With Checkmarx's CxSuite, auditors and developers have immediate access to the code analysis results and remediation advice. We provide user friendly, high productivity, flexible and accurate risk intelligence platform that ensures your application remains hacker-proof.
Tenable Network Security
Vulnerability Scanning
Tenable Network Security is relied upon by more than 20,000 organizations, including the entire U.S. Department of Defense and many of the world’s largest companies and governments, to stay ahead of emerging vulnerabilities, threats and compliance-related risks. Its Nessus and SecurityCenter solutions continue to set the standard for identifying vulnerabilities, preventing attacks and complying with a multitude of regulatory requirements.
#38
Black Duck Software
Open Source Software Security
Open source software (OSS) is revolutionizing technology by enabling companies
to speed development, reduce costs, increase innovation, and improve efficiency. Black Duck Software helps the world’s most innovative companies streamline, safeguard, and manage their use of open source.
Our comprehensive OSS Logistics solutions enable enterprises of every size to gain systematic visibility into and control over how they acquire, approve, scan, monitor, secure, inventory, and deliver open source code. And our new Black Duck Hub is helping security and development teams identify and mitigate open source-related risks across their application portfolios.
For our Customers Offering award-winning OSS Logistics solutions, Black Duck is the partner of choice for open source software adoption, governance, security, and management to enterprises of every size. We help our customers harness the power of open source technologies for faster innovation, greater security, and improved efficiency.
For the Open Source Community As part of the greater open source community, Black Duck connects developers to comprehensive OSS resources through the Black Duck Open Hub, and to the latest commentary from industry experts through the Open Source Delivers blog. Black Duck also hosts the Open Source Think Tank, an international event where thought leaders collaborate on the future of open source.
Founded in 2002, Black Duck is headquartered near Boston and has offices in San Mateo, St. Louis, London, Paris, Frankfurt, Hong Kong, Tokyo, Seoul and Beijing.
#39
SecureWorks
Managed Security Services
Dell SecureWorks uses cyber threat intelligence to provide predictive, continuous and responsive protection for thousands of organizations worldwide. Enriched by intelligence from our Counter Threat Unit research team, Dell SecureWorks’ Information Security Services help organizations predict threats, proactively fortify defenses, continuously detect and stop cyber-attacks, and recover faster from security breaches.
#40
BlackBerry
Mobile & Data Security
Securely Mobilize Your Business To Stay Competitive And Grow. Mobility is fundamentally changing the way business gets done. Just enabling devices is not enough. To stay ahead of the curve, you must mobilize your people, processes, apps and information. BlackBerry delivers the world’s most secure, comprehensive mobile solution to address this new imperative, with support for devices running iOS®, Android™, Windows®10, Mac OS® X and BlackBerry® 10. The BlackBerry platform is trusted by thousands of companies and governments around the world to securely manage apps and files, mobilize business processes, provide secure voice and messaging, and enable mass crisis communications.
#41
Forcepoint
Cloud, Mobility & IoT Security
Force point™ (previously Raytheon | Websense) was created to empower organizations to drive their business forward by safely embracing transformative technologies – cloud, mobility, Internet of Things (IoT), and others – through a unified, cloud-centric platform that safeguards users, networks and data while eliminating the inefficiencies involved in managing a collection of point security products.
#42
AVG Technologies
Anti-Virus & Internet Security Software
AVG is the online security company providing leading software and services to secure devices, data and people. Over 200 million active users, as of March 4, 2014, use AVG´s products and services. AVG’s Consumer portfolio includes internet security, performance optimization, and personal privacy and identity protection for mobile devices and desktops. The AVG Business portfolio - delivered by managed service providers, VARs and resellers - offers IT administration, control and reporting, integrated security, and mobile device management that simplify and protect businesses.
#43
Verizon Enterprise
Network & Data Security
Stay on top of ever-evolving cyber attacks to protect your enterprise’s network and important information. Would-be attackers are constantly changing the tactics they use to target and break into your networks, computing devices, and vital systems. Overcome the latest methods used by cyber adversaries with security products and services from Verizon. We continually monitor, analyze, and learn from actual breaches to identify new attack patterns and combat them. And the visibility across our global IP networks provides insights into the nature of attacks, helping us create appropriate countermeasures. This intelligence-driven strategy allows you to take a proactive approach to protecting your organization. Your security strategy can now address the constantly changing nature of threats, helping you prevent future attacks and mitigate their damage to your business and reputation.
#44
Imperva
Data & Applications Security
Imperva fills the gaps in endpoint and network security by directly protecting high-value applications and data assets in physical and virtual data centers. With an integrated security platform built specifically for modern threats, Imperva data center security provides the visibility and control needed to neutralize attacks from the inside and outside, to mitigate risk and streamline compliance.
#45
AT&T Network Security
Managed Security & Consulting
AT&T Security Solutions help provide the first line of defense for your network from
external and internal attacks. Our portfolio of managed and consulting solutions
help you take a proactive, comprehensive approach to security, compliance and
business continuity.
#46
Threat Stack
Cloud Infrastructure Security
Threat Stack helps you protect your cloud from intrusions & data loss by continuously monitoring and providing insights into your system activity. Securing your cloud shouldn't prevent your business from running fast. Our lightweight, cloud-native design takes the hassle out of staying protected. Threat Stack's team of security and operations experts set out to create a product that's simple to deploy, keeps you protected, and gets security out of your way so you can focus on growing your business. Join the community of Threat Stack customers securing their cloud and protecting their customers.
#47
AlienVault
Threat Detection & Response
AlienVault is the champion of mid-size organizations that lack sufficient staff, security expertise, technology or budget to defend against modern threats. Our Unified Security Management (USM) platform provides all of the essential security controls required for complete security visibility, and is designed to enable any IT or security practitioner to benefit from results on day one. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange—the world’s largest crowd-sourced threat intelligence exchange—AlienVault USM delivers a unified, simple and affordable solution for threat detection and compliance management. AlienVault is a privately held company headquartered in Silicon Valley and backed by Trident Capital, Kleiner Perkins Caufield & Byers, GGV Capital, Intel Capital, Sigma West, Adara Venture Partners, Top Tier Capital and Correlation Ventures. For more information visit www.AlienVault.com or follow us on Twitter.
#48
SAS Institute
Fraud & Security Analytics
Security Analytics to Uncover Active Network Attacks
SAS Cybersecurity security analytics software uncovers abnormal network behavior to keep you ahead of potential threats. The software’s accurate and continuous security insights help you better manage security risk and improve profitability.
Real-time processing of network traffic and business data generates intelligent data. When combined with top-ranked advanced and predictive capabilities and automatic prioritization of suspicious activity, SAS Cybersecurity’s actionable results reduce your mean time to detect an incident. Visibility into the underlying device and user behavior allows you to do more with existing staff.
About SAS
SAS is the leader in analytics. Through innovative analytics, business intelligence and data management software and services, SAS helps customers at more than 80,000 sites make better decisions faster. Since 1976, SAS has been giving customers around the world THE POWER TO KNOW®.
#49
Guidance Software
Endpoint Data Security
At Guidance, we exist to turn chaos and the unknown into order and the known–so that companies and their customers can go about their daily lives as usual without worry or disruption, knowing their most valuable information is safe and secure. Makers of EnCase®, the gold standard in digital investigations and endpoint data security, Guidance provides a mission-critical foundation of applications that have been deployed on an estimated 25 million endpoints and work in concert with other leading enterprise technologies from companies such as Cisco, Intel, Box, Dropbox, Blue Coat Systems, and LogRhythm. Our field-tested and court-proven solutions are used with confidence by 74 of the Fortune 100 and hundreds of agencies worldwide.
#50
i-Sprint
Identity & Access Management
i-Sprint Innovations (i-Sprint) is a premier Identity, Credential and Access Management Solutions provider for global financial institutions and high security sensitive environments. i-Sprint maintains the highest value and reliability rankings among its clients, and is one of the most recognized names in the financial world.
#51
Accenture
Enterprise Security Strategy
Despite all the resources invested in traditional information security approaches, many organizations still fall prey to cyber threats and are unprepared to safely and effectively embrace new technologies. Accenture helps IT and business leaders develop and implement a security approach that ties security to business goals, combats a widening variety of threats, and embraces emerging technologies to support the enterprise’s pursuit of new digital business opportunities. We have more than 20 years of experience helping corporations and governments across the globe use security to both defend the enterprise against malicious threats and enable the enterprise to operate new business processes while maintaining acceptable levels of risk.
#52
Splunk
Big Data Security
Splunk was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone. Machine data is one of the fastest growing and most pervasive segments of "big data"—generated by websites, applications, servers, networks, mobile devices and all the sensors and RFID assets that produce data every second of every day. By monitoring and analyzing everything from customer clickstreams and transactions to network activity and call records—and more—Splunk turns machine data into valuable insights no matter what business you're in. It's what we call Operational Intelligence.
#53
Pindrop Security
Phone-Based Fraud Prevention
Pindrop provides enterprise solutions that help prevent phone-based fraud. Its breakthrough phoneprinting technology can identify phone devices uniquely just from the call audio thereby detecting fraudulent calls as well as authenticating legitimate callers. Pindrop has helped enterprises eliminate financial losses and reduce operational costs on their phone channel.
#54
Northrop Grumman
Cyber & Homeland Security Services
Northrop Grumman is a leading global security company providing innovative systems, products and solutions in unmanned systems, cyber, C4ISR, and logistics and modernization to government and commercial customers worldwide. Please visit www.northropgrumman.com for more information.
#55
L-3
National Security Solutions
We provide secure communications, information systems' networks and mobile devices, and ensure the integrity of information to facilitate trusted, interconnected, and resilient networked defense. We also provide capabilities to support lawful offensive operations.
#56
Tanium
Security & Systems Management
Tanium provides instant visibility and allows you to collect data and update machines across your network within seconds. Our product is easy to install, learn, and use, and delivers a rigorous, flexible management rights system. All of this allows Tanium to help your IT organization in ways no other tool can. Tanium currently supports numerous Fortune 500 customers across industries such as financial services, health care, and technology.
#57
Intel Security Group
Anti-Virus, Malware & Threat Protection
Combining the security expertise of McAfee with the innovation, performance, and trust of Intel. Simplify security with a single platform and unified framework, backed by real-time threat intelligence.
#58
Veracode
Application Security Testing
Every enterprise is now a technology company
Mobile, cloud, social media and Big Data are dramatically changing the way we deliver business innovation. And as CISO, it’s your job to ensure new applications don’t introduce unnecessary risk.
When you need to get to market as quickly as possible, the traditional on-premises approach to application security doesn’t cut it any more. It’s difficult to configure. It requires specialized expertise. Plus it doesn’t allow you to apply consistent policies across all of your business units and development teams.
That’s why most enterprises take a fragmented approach to application-layer security. They spend millions on ad-hoc manual testing and tools, but they cover only a fraction of their global application threat surface.
This piecemeal approach yields predictably poor results. Cyber-attackers continue to improve their tactics at an alarming rate. They look for paths of least resistance, such as less critical sites you may not even know existed. They search every nook and cranny of your applications to find their weak spots.
And if you don’t test your application infrastructure to the same level, you risk losing everything from your intellectual property to your brand’s reputation.
At Veracode, we offer a smarter and fundamentally different approach to application-layer security. Our subscription-based service combines a powerful, cloud-based platform with deep security expertise and proven best practices for managing enterprise-wide governance programs.
It’s Smart: Our software learns continuously to address evolving threats — and is backed by world-class experts in application security.
It’s Cloud-Based: Our cloud-based platform is massively scalable and lets you start immediately — without hiring more consultants or installing more servers and tools.
It’s Programmatic: Our program managers help you implement a centralized, policy-based approach for managing enterprise-wide governance on an ongoing basis.
As a result, you can count on us to make your global program successful — so your business can go further faster without compromising your security posture.
Visit us at veracode.com
#59
F-Secure
Internet Security for All Devices
F-Secure is an online security and privacy company from Finland. We offer millions of
people around the globe the power to surf invisibly and store and share stuff, safe from
online threats. We provide the best protection in the world, we are here to fight for
digital freedom.
#60
Corero
DDoS Defense & Security Solutions
Corero Network Security is an international network security company and a leading provider of Distributed Denial of Service (DDoS) defense and next generation security solutions. Corero's products and services stop attacks at the perimeter including DDoS, server targeted, and zero-day attacks, protecting IT infrastructure and eliminating downtime
#61
ManageEngine
Privileged Account Management
Password Manager Pro (PMP) is a web-based, privileged access management solution for enterprises. It offers a complete solution to control, manage, monitor and audit the entire life-cycle of privileged access. In a single package, it offers three solutions - privileged account management, remote access management, and privileged session management. The benefits of deploying Password Manager Pro include eliminating password fatigue and security lapses by deploying a secure, centralized vault for password storage and access; improving IT productivity many times by automating frequent password changes required in critical systems; providing preventive and detective security controls through approval workflows and real-time alerts on password access; and meeting security audits and regulatory compliance such as SOX, HIPAA and PCI.
#62
Dell SonicWALL
Network & Mobile Security
Dell SonicWALL solutions provide intelligent network security, email security and secure mobile access which enable customers and partners to dynamically secure, control, and scale their global networks. Using input from millions of shared touch points in the Dell SonicWALL Global Response Intelligent Defense (GRID) Network, the Dell SonicWALL Threat Center provides continuous communication, feedback, and analysis on the nature and changing behavior of threats. Dell SonicWALL Research Labs continuously processes this information, proactively delivering countermeasures and dynamic updates that defeat the latest threats. Our security solutions, available for the SMB through the enterprise, are deployed in large campus environments, distributed enterprise settings, government, retail point-of-sale, education and healthcare environments.
#63
Palantir
Cybersecurity Analytics and Cyber Fraud
With Palantir, your enterprise can finally detect advanced threats that lie hidden within your data. All of it. Structured network logs from proxy to IDS, VPN, anti-virus, DLP, DNS queries, malware tools, and application logs. Contextual data like email, print logs, facility access logs, internal chat logs, and human resources data. Open source and third party data. Our technology integrates it all into a single environment, and separates actionable signal from the noise so you can protect your network.
#64
NSFOCUS
DDoS Mitigation & Protection
NSFOCUS was founded in 2000 to provide enterprise-level network security solutions and services primarily in the Asia/Pacific market. The new NSFOCUS International Business Division (IBD) brings advanced security solutions to the Americas, Europe, the Middle East, and Asia Pacific.
Our research and development teams focus on vulnerability analysis, threat understanding and security intelligence, while providing core technical support for NSFOCUS products, solutions and services. This long-term commitment has helped our customers maintain high levels of business operations and ensured that their online business systems always remain available.
With offices in the United States, Japan, Europe, China and Southeast Asia, NSFOCUS supports more than 8,000 customers including some of the largest telecom carriers, data centers, financial services companies, cloud service providers, managed security services providers and enterprises in the world. When it comes to maximizing availability and security, trust your business to NSFOCUS.
#65
Lockheed Martin
Cybersecurity Solutions & Services
At Lockheed Martin, cyber security begins with the customer’s mission and requirements and ends with a security solution that is integrated, proactive, and resilient.
#66
Webroot
Security Analysis & Threat Detection
Backed by an intelligent cloud architecture, Webroot delivers powerful internet security analysis, threat detection and actionable intelligence with its suite of Webroot SecureAnywhere® and BrightCloud® solutions. Founded in 1997, Webroot is the largest privately held Internet security organization based in the United States, operating globally across North America, Europe and Asia Pacific.
#67
NNT
IT Security & Compliance
NNT provides non stop file integrity monitoring, system hardening, vulnerability management, configuration management, change control, continuous compliance, and breach detection services. NNT has a U.S. office in Naples, Florida.
#68
Immuniweb
Continuous & On-Demand Web Security
ImmuniWeb® assessment by High-Tech Bridge combines managed vulnerability scanning with manual penetration testing performed in parallel by experienced security auditors. Thanks to our hybrid security testing technology we detect the most complex vulnerabilities and guarantee zero false-positives in a manually-written report. ImmuniWeb’s simplicity enables even non-technical users to order and schedule a website security assessment in less than five minutes. Used by SMBs to large corporations, ImmuniWeb has been adopted as part of the UN ITU toolset for ensuring that the governmental websites of Member States are secure. ImmuniWeb helps to achieve and sustain PCI DSS compliance requirements 6.6 and 11.3 for your web applications.
#69
Tripwire
Advanced Cyberthreat Detection
Tripwire delivers advanced threat, security and compliance solutions used by over 9,000 organizations, including over 50% of the Fortune 500. Tripwire enables enterprises, service providers and government agencies around the world to detect, prevent and respond to cybersecurity threats.
#70
Imprivata
Security for Healthcare Providers
Imprivata is a leading provider of authentication, access management and secure communication solutions that enable providers to better focus on patient care. By removing technology barriers, Imprivata optimizes clinical workflows to let doctors spend more time being doctors.
#71
PKWARE
Data Encryption & Security
PKWARE protects the world's data with Smart Encryption software and solutions. In use by more than 30,000 businesses, PKWARE's easy-to-use security armors data itself and eliminates vulnerabilities wherever data is used, shared or stored.
#72
SnoopWall
Mobile Device Security
SnoopWall is a revolutionary spyware blocking technology that defends against cyber spying, snooping, and stealing. When Firewall and antivirus software fail to detect malware, SnoopWall is there to deliver unbeatable protection for computer, tablet, and smartphone users.
Snoopwall acts as a gatekeeper for access to high-risk data ports, including your webcam and microphone, which are susceptible to being infected with malicious code used by cyber intruders. The program will alert users in real-time of existing high-risk programs and applications, and block new ones from embedding malware on your device.
By detecting and blocking malware, Snoopwall is your best defense for preventing personal information from getting into the hands of identity thieves and cyber snoops.
With SnoopWall, you and your loved ones can rest assured that you will not be being spied on through your webcam, or listened into through your microphone. Your online privacy is safe with SnoopWall.
#73
OneLoginEnterprise Identity ManagementOneLogin is the innovator in enterprise identity management and provides the industry’s most comprehensive solution for managing user identities, both in the cloud and behind the firewall. Unique capabilities like Cloud Search and OneLogin for iPad break down SaaS data silos and increase productivity.
#74
VMware
Mobile, Data Center & Cloud Security
VMware is the industry-leading virtualization software company. Our technologies simplify IT complexity and streamline operations, helping businesses become more agile, efficient and profitable. By virtualizing infrastructure—from the data center to the cloud to mobile devices—we enable IT to deliver services from any device, anytime, anywhere.
#75
Cimcor
Governance, Risk & Compliance
Founded in 1997, Cimcor is an industry leader in developing innovative security, integrity and
compliance software solutions. The firm is on the front lines of global corporate, government
and military initiatives to protect critical IT infrastructure and has consistently brought IT integrity
innovations to market.
organizations deep situational awareness including: who is making changes, what is being changed, when changes are occurring, and how changes are being made. This, coupled with the ability to take
instant action upon detection of change, gives organizations assurance that their IT assets
are always in a secure and compliant state.
Cimcor is headquartered in Chicago IL, with business operations worldwide.
#76
Akamai Technologies
Secure Cloud & Mobile Computing
Akamai® the leading provider of cloud services for delivering, optimizing and securing online content and business applications. At the core of the Company's solutions is the Akamai Intelligent Platform™ providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit www.akamai.com or blogs.akamai.com, and follow @Akamai on Twitter.
#77
Illumio
Adaptive Security Platform
We built the Illumio Adaptive Security Platform (ASP)™ to provide unprecedented visualization and control of enterprise applications. Our system constantly inspects and adapts to the computing environment it is protecting, without pause. Moreover, since 75 percent of computing interactions never leave the data center, our customers can now have complete visibility behind the firewall, whether it is running in their data center or the vibrant public cloud services of Amazon Web Services, Microsoft Azure, Google Compute Engine, Rackspace, and many others. Our platform underpins our customers’ ability to move to new data center technologies such as cloud. It helps them achieve an order of magnitude improvement in their security posture and operational efficiency.
#78
Radware
Application Security & Delivery
Radware is a global leader of application delivery and application security solutions for virtual and cloud data centers, empower more than 10,000 enterprise and carrier customers worldwide. Its award-winning solutions deliver full resilience for business-critical applications, maximum IT efficiency, and complete business agility
#79
Novetta
Cyber Security Analytics
Novetta is an advanced analytics company that extracts value from the increasing volume, variety and velocity of data. By mastering scale and speed, our advanced analytics software and solutions deliver the actionable insights needed to help our customers detect threat and fraud, protect high value networks, and improve the bottom line.
#80
Courion
Identity & Access Management
With deep experience and more than 600 customers managing over 10 million identities, Courion is the market leader in Identity and Access Management (IAM), from provisioning to governance to Identity and Access Intelligence (IAI). Courion provides insight from analyzing the big data generated from an organization’s identity and access relationships so users can efficiently and accurately provision, identify and minimize risks, and maintain continuous compliance. As a result, IT costs are reduced and audits expedited. With Courion, you can confidently provide open and compliant access to all while also protecting critical company data and assets from unauthorized access.
Courion helps IT security teams provide the most efficient and flexible support for the business without compromising secure access. Courion customers have the confidence to provide open access to appropriate systems by insuring the proper access is granted from the start and that their systems are continuously monitored for inappropriate behavior so preventative and remedial action can be taken in real-time.
#81
Leidos
Anti-Terrorism & Homeland Security
Leidos helps the U.S military, Department of Defense, and federal law enforcement respond to some of the biggest threats to our national security.
#82
Level 3
Network & Managed Security Services
Level 3 is dedicated to providing you with 24 x 7 business continuity. Thanks to the size and sophistication of our global network, we have access to a massive amount of security threat data, enabling us to help protect you from attacks before they affect your business. And we do it while avoiding unnecessary complexity and cost.
#83
MobileIron
Mobile Device & App Security
The leader in Mobile IT, MobileIron was purpose-built to secure and manage mobile apps, content, and devices for global companies. Available as an on-premise or cloud solution, MobileIron was the first to deliver key innovations such as multi-OS mobile device management (MDM), mobile application management (MAM), and BYOD privacy controls.
#84
HP
Cybersecurity for Public Sector & Defense
HP connects the science and technology of cybersecurity with industry-leading services, products, and solutions
#85
Inspired eLearning
Security Awareness Training
For the second straight year, our Security Awareness Training Platform has been positioned in the Leaders quadrant of Gartner’s newly released Magic Quadrant for Security Awareness Training. Our program includes unique all-employee annual training content for up to seven years, anti-phishing training, simulated phishing attacks, annual updates, a monthly eNewsletter, posters, digital signage, and job aids to provide a constant stream of tips and best practices that learners can put to use immediately to enhance security.
#86
Malwarebytes
Malware Detection & Protection
What is Malwarebytes?
In 2008, Malwarebytes was founded on the belief that you and everyone have a fundamental right to a malware-free existence. Every product we make is built on that premise.
Your Malwarebytes Anti-Malware is designed and coded by folks like you. Folks who have stayed up all night trying to rescue an infected machine. Folks who have dealt with the after effects of a hacked email account or a compromised network.
#87
KPMG
Cyber Risk Management
Cyber security is evolving. Is your business? In today's technology-driven environment, your organisation faces complex challenges. Leadership needs a new perspective to help take control of cyber security, focusing on the areas that matter most. At KPMG, we believe in proactively incorporating cyber risk management into all activities. Cyber security is not just a reactive technical fix – it can also be a driver of change and secure the future of your business. With over 2,000 security practitioners globally, we can give you the support and guidance you need to adapt to new threats. By evaluating business resilience, optimising the relationship between people, process and technology, and bringing the latest industry insights, we can help turn risk into advantage. With our full lifecycle of services, which cover all aspects of Cyber Security from the board room through to the back office, we believe that cyber security should be about what you can do – not what you can’t.
#88
Alert Logic
Security-as-a-Service Solutions
Alert Logic, the leading provider of Security-as-a-Service solutions for the cloud, integrates advanced security tools with 24x7 monitoring to defend against threats and address compliance.
#89
SentryBay
PC, Mobile & IoT Security
SentryBay has a track record of solving key security challenges, including some of the core building blocks needed to secure mobile and loT - where the number and type of attack surfaces are expanding exponentially. These technologies are patented and used within proprietary products - as well as licensed to industry leaders in banking, e-commerce, enterprise, telecommunications and even IT security companies.
#90
SparkCognition
Cognitive Security
SparkSecure™ Cognitive Insights add a cognitive layer to traditional security solutions, increasing the operational efficiency and knowledge retention of your security analyst team. Essentially, Cognitive Insights does much of what a human security analyst can do, but at machine speed and Big Data scale.
#91
Ravello
Cloud Cyber Ranges
Ravello’s inbuilt tools and REST APIs enable Cyber Range providers to automate the building, deployment and running of Cyber Ranges. Whether one wants to define, create, control, monitor, instrument, score or sanitize the Cyber Range, Ravello’s rich developer toolkit, user interface and REST APIs provide an easy way to manage Cyber Ranges either through Ravello’s rich and intuitive user interface or by integrating it with other systems.
Ravello’s isolated security sandbox capsules make it is possible to block any traffic from going out of the capsule – enabling a safe and controlled environment for live-fire attacks and disruptive activities that typically take place on cyber ranges. As a Cyber Range owner, one doesn’t have to worry about threat simulation activities inside the range to spill-over and have an adverse impact on the ‘world’ outside.
Leveraging the advantages of the cloud and Ravello’s cutting edge HVX technology, one can spin up the environment of their choosing, for just the amount of time that is needed, and then suspend or delete it when finished. You no longer need a dedicated staff to build, operate, and maintain custom, in-house, and often separate, development, test and training environments. Instead, cyber range providers can focus their staff and resources on what they need the most – being prepared to be effective against threats.
#92
Bay Dynamics
Informaton Risk Intelligence
Bay Dynamics provides organizations with actionable information risk intelligence – ensuring the integrity of sensitive information assets and making certain they are being used to create business value. Proven among the Fortune 50, our Risk Fabric™ technology exposes deviations from the norm and provides clear visualization for corrective action, risk prioritization, and insider threat detection.
#93
Blue Coat
Business Assurance Technology
Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 78 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance.
#94
Arbor Networks
DDoS Attack & Threat Proection
Arbor Networks secures the world’s largest enterprise networks from DDoS attacks and advanced threats. Visit Arbor at South Hall Booth #1323 & enter to win Google Glass and learn about the Digital Attack Map – a collaboration between Google Ideas and Arbor Networks.
#95
CYREN
Web, Email & Mobile Security
CYREN is the global leader in information security solutions for protecting web, email, and mobile transactions. We continuously innovate our cloud-based threat detection and proactive data analytics to provide security solutions to businesses of all sizes. Our patented technologies increase the value and profitability of our partners’ solutions - protecting over 550 million end users worldwide. - See more at: http://www.rsaconference.com/events/us14/exhibitors-sponsors/exhibitor-list/829/cyren#sthash.dJpF6G14.dpuf
#96
Unisys
Endpoint & IT Infrastructure Security
Unisys delivers integrated security expertise across the four domains: people, assets, locations, and data. Leading organizations around the world from banks, to government agencies, to airports and enterprises rely on Unisys to protect their mission critical operations. The less they are consumed by the fear of attack, the more they can focus on important things like serving customers and citizens, manufacturing products, and innovating. - See more at: http://www.unisys.com/offerings/security-solutions#sthash.fTK4VOdN.dpuf
#97
Fireglass
Enterprise Network Security
Fireglass is revolutionizing enterprise network security by eliminating web attack surfaces of both users and applications. Unlike traditional and ineffective security detection methods, Fireglass’ noncompromising, future-proof, clientless and scalable solution not only protects against all known and unknown attacks, but also increases business productivity while consolidating existing security solutions and reducing operational overhead. Fireglass is financially-backed by Norwest Venture Partners, Lightspeed Venture Partners, Singtel Innov8 and co-founders of Trusteer, Mickey Boodaei and Rakesh Loonkar, and is headquartered in New York City, NY with R&D in Israel.
#98
Cato Networks
Cloud Network Security
Cato Networks is rebuilding a new network perimeter, in the Cloud, protected by a tightly integrated set of security services. We provide businesses with a simple, affordable and enterprise-grade secure network - at the fraction of the cost of legacy approaches. No more costly hardware deployments, management complexities, capacity constraints, outdated software, or restricted visibility.
#99
Digital Guardian
Data Loss Prevention
Digital Guardian is a next generation data protection platform designed to stop data theft. The Digital Guardian platform performs across the corporate network, traditional endpoints, mobile devices and cloud applications to make it easier to see and stop all threats to sensitive data. For more than 10 years, it has enabled data-rich organizations to protect their most valuable assets with an on premise deployment or an outsourced managed security program (MSP). Digital Guardian’s unique data awareness and transformative endpoint visibility, combined with behavioral threat detection and response, enables you to protect data without slowing the pace of your business.
#100
Seculert
Cloud-Based Malware Protection
Seculert is the first cloud-based solution that provides immediate protection from advanced malware and APTs. From the moment of activation, Seculert identifies existing infections that have gone undetected by other solutions, and continues to detect unknown malware both inside and outside your network – including remote sites, employees and even on personal mobile devices.
Anti-virus store, powerful security, solution to all yours problems
ReplyDeleteOur most advanced #protection is your lightest, toughest defense against #viruses, #ransomware, #spyware, zero-day #threats, home Wi-Fi network vulnerabilities, and more.
at : https://anti-virusstore.com/