ISE® Northeast Sponsors 2017

Kilobyte Sponsors

Cloud Passage twitter    linked in

Attivo Networks® is the leader in deception technology for real-time detection, analysis, and accelerated response to advanced, credential, insider, and ransomware cyber-attacks. The Attivo ThreatDefend™ Deception and Response Platform accurately detects advanced in-network threats and provides scalable continuous threat management for user networks, data centers, cloud, IoT, ICS-SCADA, and POS environments. Attivo Camouflage dynamic deception techniques and decoys set high-interaction traps to efficiently lure attackers into revealing themselves. Advanced attack analysis and lateral movement tracking are auto-correlated for evidence-based alerts, forensic reporting, and automatic blocking and quarantine of attacks.



Bay Dynamics twitter    linked in

Bay Dynamics® enables organizations to quantify the business impact of cyber risk from both insider and outsider attacks. Using UEBA technology and dynamic telemetry from security and IT infrastructure, our Risk Fabric® cyber analytics platform calculates the value at risk associated with specific threats and vulnerabilities, and prescribes prioritized actions across the organization to reduce the risks that matter most.



cymmetria twitter    linked in

Centrify is the first and only Zero Trust leader to deliver Next-Gen Access that seamlessly converges Identity-as-a Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM), and transforms security to go on the offense and stop the breach. The company’s Zero Trust framework verifies every user and device and limits the amount of access to apps and infrastructure. Centrify enables over 5,000 worldwide organizations, including over half the Fortune 50, to proactively secure their businesses from the inside out.



cisco twitter    linked in

Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. Cisco delivers intelligent cybersecurity for the real world, providing one of the industry's most comprehensive advanced threat protection portfolio of solutions across the broadest set of attack vectors. Cisco's threat–centric and operationalized approach to security reduces complexity while providing unmatched visibility, consistent control, and advanced threat protection before, during, and after an attack. Cisco security technologies can turn your existing network into an always-on security sensor and enforcer to fill in gaps in your protection, playing a critical role in protecting and enabling today’s innovative digital networks.



contrast twitter    linked in

Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks, heralding the new era of self-protecting software. Contrast’s patented deep security instrumentation is the breakthrough technology that enables highly accurate assessment and always-on protection of an entire application portfolio, without disruptive scanning or expensive security experts. Only Contrast has sensors that work actively inside applications to uncover vulnerabilities, prevent data breaches, and secure the entire enterprise from development, to operations, to production.



GlobalScape twitter    linked in

Infoblox network control solutions connect end users, devices, and networks, enabling approximately 7,300 enterprises to transform, secure, and scale complex networks. They reduce costs, maximize uptime, and ensure availability. And our DNS security solutions defend against the widest range of threats. Headquartered in California, Infoblox operates in over 25 countries.



interset twitter    linked in

​Interset provides highly intelligent and accurate inside threat detection from back-end systems to networks to endpoints. Our Security Analytics solution unlocks the power of behavioral analytics, machine learning, and big data to provide the fastest, most flexible, and efficient way for IT teams to operationalize an automated threat detection program. Utilizing agentless data collectors, lightweight endpoint sensors, a scalable open architecture, and highly extensible advanced analytics engine, Interset automatically detects and surfaces the threats that matter, delivering unparalleled visibility to high risk events across the enterprise. Capabilities that truly enable early attack detection and actionable forensic intelligence with reduced false positives. Interset solutions are deployed to protect critical data across the manufacturing, life sciences, high-tech, finance, government, aerospace and defense, and securities brokerage industries. For more information, visit Interset.com and follow us on Twitter @intersetca.



Leidos twitter    linked in

Leidos is a global provider of cybersecurity solutions focused on developing, implementing, maintaining, and securing critical infrastructures for both government and commercial clients in Oil & Gas, Utilities, Financial Services, Healthcare and Chemical industries. Leidos engineers literally span the globe, overseeing more than 4,000 programs at 600 locations in all 50 states and in 75 countries. We employ over 3,000 cyber-security professionals and have robust IT and OT technology partnerships. Our lifecycle-focused products and programs enable both success and sustainability protecting networks across our commercial clients' infrastructures.



nsslabs twitter    linked in

NSS Labs, Inc. is the global leader in operationalizing cybersecurity. Through continuous security validation and global threat discovery and automation, NSS Labs empowers enterprises to reduce the operational burden of cybersecurity and address crucial gaps in their cybersecurity efforts. Informed by our experience and strong foundation of security product validation, NSS Labs offers CAWS, a cyber threat protection platform that provides businesses with visibility into the cyber kill chain and automated insights into active threats. With global visibility into active threats and vulnerabilities, CAWS delivers a unique cyber risk rating that makes cybersecurity measurable and helps enterprises focus their resources in the areas that make the most difference. Combined, this information enables businesses to continuously monitor and respond to threats, strengthen their cybersecurity posture, and have confidence that they are appropriately securing the enterprise. CISOs, security operations teams, threat researchers, and information security professionals from many of the world's largest and most demanding enterprises rely on trusted insights from NSS Labs. For more information, visit www.nsslabs.com.



phishme twitter    linked in

PhishMe® is the leading provider of human-focused phishing defense solutions for organizations concerned about their susceptibility to today’s top attack vector – spear phishing. PhishMe’s intelligence-driven platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats.



protectwise twitter    linked in

ProtectWise™ provides a new utility model for enterprise security, delivering pervasive visibility, automated threat detection and unlimited forensic exploration on-demand and entirely from the cloud. With ProtectWise, analysts can intuitively interact with petabytes of security data, revolutionizing the way enterprises deal with complex threats at a fraction of the cost.



splunk twitter    linked in

MAKE MACHINE DATA ACCESSIBLE,USABLE AND VALUABLE TO EVERYONE.
What is Splunk? We take your machine data and make sense of it. IT sense. Security sense. Business sense. Common sense. Splunk products deliver visibility and insights for IT and the business. Splunk was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone.



symantec twitter    linked in

The global leader in cybersecurity. Operating one of the world’s largest cyber intelligence networks, we see more threats, and protect more customers from the next generation of attacks. We help companies, governments and individuals secure their most important data wherever it lives.



Display Sponsors

algosec twitter    linked in

AlgoSec enables the world’s largest and most complex organizations to manage security based on the applications that power their businesses. Over 1,500 leading organizations, including 20 of the Fortune 50, rely on AlgoSec to automate and orchestrate network security policy management across their cloud, SDN and on-premise networks to drive business agility, security and compliance. Through AlgoSec’s business-driven approach, users can automatically discover application connectivity requirements, proactively analyze risk from the business perspective, and rapidly plan and implement network security changes across their heterogeneous networks. AlgoSec is committed to the success of every customer and provides the industry’s only money-back guarantee.



Cloud Passage twitter    linked in

CloudPassage® Halo® is the world’s leading agile security platform that empowers our customers to take full advantage of cloud infrastructure with the confidence that their critical business assets are protected. Halo delivers a comprehensive set of continuous security and compliance functions right where it counts—at the workload. Our platform orchestrates security on-demand, at any scale and works in any cloud or virtual infrastructure (private, public, hybrid or virtual data center). Leading enterprises like Citrix, Salesforce.com and Adobe use CloudPassage today to enhance their security and compliance posture, while at the same time enabling business agility.



cymmetria twitter    linked in

While businesses are looking to unlock the potential of digital transformation, they are essentially opening themselves up to far greater risks and a greater threat environment. CIOs and CISOs are therefore beginning to look at their security environment through a digital lens.

CyberInt’s Managed Detection and Response services focus on your digital environment: Your digital channels, online assets, digital supply chain and your brand. Going far beyond your network’s perimeter to identify threats and mitigate them before they materialize. Leveraging advanced technologies to identify threats in your digital ecosystem, while our cyber experts help you mitigate those threats in real time.



cymmetria twitter    linked in

Founded in 2014, Cymmetria is a cyber deception startup focused on changing the asymmetry of cybersecurity, tilting the traditional security odds so that hackers are the ones who are left vulnerable. Cymmetria’s team consists of cyber deception and InfoSec veterans, military specialists, and APT and malware researchers.



fortress twitter    linked in

Fortress helps companies and people identify, prioritize, remediate, and monitor emerging cybersecurity risks. By using our flexible security orchestration and collaboration platform and managed services, we focus on providing custom solutions designed around client’s regulatory, compliance, and security against emerging cyber security threats. Our enterprise clients in the critical infrastructure industry particularly benefit because we help them transform risk intelligence into operational value and relieve them of the burden of buying and managing individual services, staffing fluctuations, and disparate technology components. We target Fortune 1,000 global companies in industries where reputation is critical, security is a priority, and regulatory requirements drive the need to protect highly-sensitive data. Such industries include utilities, transportation, maritime, financial services, healthcare, and manufacturing. Fortress is capable to do this because our industry expertise and proprietary software platform focused on critical infrastructure, financial services, healthcare, banking/mortgage, insurance, retail, membership organizations, and experience with organizations that have highly decentralized global infrastructures.



check point twitter    linked in

ReliaQuest advances IT security outcomes through customized co-management. ReliaQuest develops solutions based on each organization’s business goals, leveraging existing investments in security hardware and software. Incident Response, Security Engineering, and Threat Management solutions are delivered 24 hours a day, 365 days a year from multiple U.S.-based Security Operations Centers.



algosec twitter    linked in

SAI Global IT Risk Manager (formerly Modulo Risk Manager) provides intelligent risk solutions for information security officers. We change how customers assess digital risk, facilitating efficient assessment internally, in the cloud, and across the extended network. With thousands of out-of-the-box controls, regulations, and automated workflows, clients see value within weeks.



qualys twitter    linked in

ServiceNow makes work better. Getting simple stuff completed at work can be easy, and getting complex multistep tasks accomplished can be painless. Automate, digitize, and optimize processes across security, risk, and IT to resolve risks quickly based on business impact. Reduce manual processes and collaborate across functions to make your teams more efficient. Visit https://www.servicenow.com/solutions/security-incidents.html for more information.



Tufin twitter    linked in

Tufin®, the leader in Network Security Policy Orchestration, allows enterprises to streamline the management of security policies across complex, heterogeneous environments. Serving over 1,900 customers, Tufin’s network security automation enables enterprises to implement changes in minutes with proactive risk analysis and continuous policy compliance. Learn more: www.tufin.com.



zerofox twitter    linked in

ZeroFOX, the market leader in social media & digital protection, safeguards modern organizations from dynamic security, brand and physical risks across social, mobile, web and collaboration platforms. Using diverse data sources and artificial intelligence-based analysis, the ZeroFOX Platform identifies and remediates targeted phishing attacks, credential compromise, data exfiltration, brand hijacking, executive and location threats and more. The patented ZeroFOX SaaS technology processes and protects millions of posts, messages and accounts daily across the social and digital landscape, spanning LinkedIn, Facebook, Slack, Twitter, Instagram, Pastebin, YouTube, mobile app stores, the deep & dark web, domains and more.