ISE® Southeast Sponsors 2011

Kilobyte Sponsors

IBM

IBM Security Solutions include an extensive portfolio of hardware, software solutions, professional and managed services offerings covering the spectrum of IT and business security risks. IBM Security Solutions is a proud partner of Accuvant, leading provider of information security, risk and compliance management consulting services, with more than 4,000 customers across North America and Europe. Accuvant is the only research driven information security partner delivering alignment between IT security and business objectives, clarity to complex security challenges and confidence in enterprise security decisions.



ICM

Internet Content Management, Inc (ICM) is an IT security systems integrator focused on providing cost effective security solutions. Based in the southeastern United States, ICM provides security integration services, penetration testing and security architecture assessments. Web, Email, and Data security are all core competencies as well as delivering risk management and compliance standards for today’s rigorous regulatory environment. ICM partners with today’s technology leaders to deliver robust, real world solutions with a common sense approach. Founded in 2001 ICM is proud to serve over 250 companies across the entire business spectrum. For more information visit www.netcontentmgt.com



M86

M86 Security is the global expert in real-time threat protection and the industry's leading Secure Web Gateway provider. The company's appliance, software, and Software as a Service (SaaS) solutions for Web and email security protect more than 25,000 customers and 26 million users worldwide. M86 products use patented real-time code analysis and behavior-based malware detection technologies as well as threat intelligence from M86 Security Labs to protect networks against new and advanced threats, secure confidential information, and ensure regulatory compliance. The company is based in Irvine, California with international headquarters in London and development centers in California, Israel, and New Zealand. For more information about M86 Security, please visit www.m86security.com.



McAfee twitter    linked in

McAfee, Inc. is the leading dedicated security technology company. Headquartered in Santa Clara, California, McAfee delivers proactive and proven solutions and services that secure systems and networks around the world. With its unmatched security expertise and commitment to innovation, McAfee empowers home users, businesses, the public sector, and service providers with the ability to block attacks, prevent disruptions and continuously track and improve their security.



qualys

Through our infrastructure software and ecosystem of partnerships, Novell harmoniously integrates mixed IT environments, allowing people and technology to work as one. We deliver the best-engineered, most interoperable Linux platform and a portfolio of integrated IT management software that help businesses worldwide reduce cost, complexity and risk. www.novell.com
Novell® Making IT Work As One™


SourceFire

Sourcefire, Inc. (Nasdaq:FIRE), is a world leader in intelligent cybersecurity solutions. Sourcefire is transforming the way Global 2000 organizations and government agencies manage and minimize network security risks. Sourcefire's IPS, Real-time Network Awareness and Real-time Adaptive Security solutions equip customers with an efficient and effective layered security defense - protecting network assets before, during and after an attack. Sourcefire has been consistently recognized for its innovation and industry leadership by customers, media and industry analysts alike - with more than 50 awards and accolades. Today, the name Sourcefire has grown synonymous with innovation and network security intelligence. For more information about Sourcefire, please visit http://www.sourcefire.com.



symantec twitter    linked in

The global leader in cybersecurity. Operating one of the world’s largest cyber intelligence networks, we see more threats, and protect more customers from the next generation of attacks. We help companies, governments and individuals secure their most important data wherever it lives.



TrendMicro

Trend Micro provides leading Internet content security solutions for businesses and consumers. We protect against malware, spam, data leaks, and the newest Web threats designed to steal digital information. Our unique solutions stop these threats where they first emerge - in the Internet - before they can attack corporate networks and PCs. Founded in 1988, Trend Micro operates globally and protects hundreds of millions of users in the office, at home and on the go. www.trendmicro.com



Trustwave twitter    linked in

As a recognized global cyber defender that stops cyber threats all day, every day – we enable our clients to conduct their business, securely.

Trustwave detects threats that others can’t see, enabling us to respond quickly and protect our clients from the devastating impact of cyberattacks. We leverage our world-class team of security consultants, threat hunters and researchers, and our market-leading security operations platform, to relentlessly identify and isolate threats with the right telemetry at the right time for the right response.

Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security. Our elite Trustwave SpiderLabs team provides award-winning threat research and intelligence, which is infused into Trustwave services and products to fortify cyber resilience in the age of advanced threats. For more information, visit https://www.trustwave.com/.



Display Sponsors

CA

CA Technologies (Nasdaq: CA) is an IT management software and solutions company with expertise across all IT environments — from mainframe and distributed, to virtual and cloud. CA Technologies manages and secures IT environments and enables customers to deliver more flexible IT services. CA Technologies innovative products and services provide the insight and control essential for IT organizations to power business agility. The majority of the Global Fortune 500 relies on CA Technologies to manage evolving IT ecosystems. For additional information, visit CA Technologies at www.ca.com



core security twitter    linked in

Core Security provides market-leading, threat-aware, identity, access and vulnerability management solutions that provide actionable intelligence and context needed to manage security risks across the enterprise. Solutions include multi-factor authentication, provisioning, Identity Governance and Administration (IGA), Identity and Access Intelligence (IAI), and Vulnerability Management (VM). The combination of these solutions provides context and shared intelligence through analytics, giving customers a more comprehensive view of their security posture so they can make better security remediation decisions and maintain compliance.



courion twitter    linked in

With deep experience providing security solutions to seventeen million users in 500 organizations, Courion offers complete Identity and Access Management, from Provisioning to Governance to Identity and Access Intelligence. Real-time risk analytics enable you to visualize enterprise activity and the context of identity and access relationships so you can recognize, manage and reduce risk - everyday. With Courion, you can provide open and compliant access to all while protecting critical company data from unauthorized access.



Credant

CREDANT Technologies is the trusted expert in data protection. CREDANT's data security solutions mitigate risk, preserve customer brand, and reduce the cost of compliance, enabling business to "protect what matters." CREDANT has been recognized by Inc. magazine as the #1 fastest growing security software company in 2008 and 2007; was selected by Red Herring as one of the top 100 privately held companies and top 100 Innovators; and was named Ernst & Young Entrepreneur of the Year® 2005. Austin Ventures, Menlo Ventures, Crescendo Ventures, Intel Capital (NASDAQ:INTC), and Cisco Systems (NASDAQ:CSCO) are investors in CREDANT Technologies. For more information, visit www.credant.com.



Fortify

Fortify's Software Security Assurance products and services protect companies from the threats posed by security flaws in business-critical software applications. Its software security suite—Fortify 360—drives down costs and security risks by automating key processes of developing and deploying secure applications. Fortify Software's customers include government agencies and FORTUNE 500 companies in a wide variety of industries, such as financial services, healthcare, e–commerce, telecommunications, publishing, insurance, systems integration and information management. Headquartered in San Mateo, Calif., Fortify is a wholly-owned subsidiary of HP, part of the HP Software & Solutions organization. More information is available at www.fortify.com.



Lancope

Lancope®, Inc. is a leading provider of flow-based monitoring solutions to ensure high-performing and secure networks for global enterprises. Unifying critical network performance and security information for borderless network visibility, Lancope provides actionable insight that reduces the time between problem identification and resolution. www.lancope.com



Net Witness

NetWitness® Corporation is a revolutionary network monitoring platform that provides enterprises a precise and actionable understanding of everything happening on the network. NetWitness solutions are deployed in customer environments to solve a wide range of tough information security problems including: insider threats, zero-day exploits, advanced persistent threats, fraud, espionage, data leakage, targeted malware, and continuous monitoring of security controls. NetWitness customers include enterprises in the Global 1000 in sectors such as financial services, power and energy, telecommunications, retail, and high-tech, as well as government agencies around the world in defense, homeland security, law enforcement, and intelligence.



qualys twitter    linked in

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 15,700 customers and active users in more than 130 countries. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds.



sailpoint twitter    linked in

SailPoint, the undisputed leader in identity governance, brings the Power of Identityâ„¢ to enterprise customers around the world. The company pioneered the identity governance market, and provides an integrated set of cloud-based services, including compliance controls, provisioning, password management, single sign-on and data access governance.



Stonesoft twitter    linked in

Stonesoft is a global provider of proven, next generation solutions that simplify network security management. Stonesoft pioneered the market leading StoneBeat high availability solution in the 1990s. Today, Stonesoft innovations continue with the StoneGate Next Generation Platform which uniquely integrates the most advanced security solutions – StoneGate NextGen Firewall, IPS, SSL VPN and Virtual Security solutions – with our patented high availability technologies and sophisticated next generation management. Next generation management enables real-time monitoring, alerting, troubleshooting, managing and reporting from a single management console and database, giving administrators proactive control of both physical and virtual security networks. With more than 10,000 installations in more than 90 countries, Stonesoft customers represent many of the world's largest organizations.



Association Sponsors

ISSA twitter    linked in

The Metro Atlanta Information Systems Security Association is a non-profit group dedicated to providing educational and networking opportunities. We promote the exchange of ideas and knowledge for each member's growth within the information security profession.  Members include practitioners at all levels of the security field in a broad range of industries, such as communications, education, healthcare, manufacturing, financial and government.



TAG

TAG is a leading technology industry association dedicated to the promotion andeconomic advancement of the state's technology industry. TAG provides leadership in driving initiatives in the areas of policy, capital, education and giving, and also brings the technology community together through events, initiative programs and networking opportunities. TAG serves as an umbrellaorganization for 27 special interest groups, or societies, including Women in Technology (WIT). Additionally, TAG’s charitable arm, the TAG Education Collaborative, is focused on helping science, technology, engineering and math (STEM) education initiatives thrive. For more information visit the TAG website at www.tagonline.org or TAG’s community website at www.TAGthink.com.