ISE® West Sponsors 2015

Kilobyte Sponsors

Delphix twitter    linked in

Delphix delivers agility to enterprise application and modernization projects, addressing the largest source of inefficiency and inflexibility in the datacenter—provisioning, managing, and refreshing data for business-critical applications. Leading global organizations use Delphix to dramatically reduce the time, cost, and risk of application rollouts, retirements, and migrations.



lookout security twitter    linked in

Lookout predicts mobile attacks before they happen. Our cloud-based mobile security platform continuously analyzes mobile apps and activity against the world’s most comprehensive view of mobile threats in order to identify and eliminate malicious activity before it does harm. To date, a network of than 50 million people, as well as leading mobile operators such as AT&T, Sprint and T-Mobile, choose Lookout as their preferred mobile security solution.



Net IQ twitter    linked in

NetIQ is a global, enterprise software company with a relentless focus on customer success. Our portfolio includes scalable, automated solutions for Identity, Security and Governance and IT Operations Management that help organizations securely deliver, measure and manage computing services across physical, virtual and cloud computing environments.



Palerra twitter    linked in

Palerra designed LORIC to protect an enterprise’s entire cloud footprint ranging from branded applications such as Microsoft Office 365 to infrastructure such as AWS, and everything in between. It combines automated threat detection, predictive analytics, continuous monitoring, and incident response into a single platform. No hardware, software or agents.



TripWire twitter    linked in

Tripwire is a leading global provider of IT security and compliance automation solutions that help businesses and government agencies take control of their entire IT infrastructure. Thousands of customers rely on Tripwire’s integrated solutions to help protect sensitive data, prove compliance and prevent outages. Tripwire® VIA™, the comprehensive suite of industry-leading file integrity, policy compliance and log and security event management solutions, is the way organizations can proactively achieve continuous compliance, mitigate risk and improve operational control through Visibility, Intelligence and Automation.



veracode twitter    linked in

Veracode is the only independent provider of cloud-based application intelligence and security verification services. The Veracode platform provides the fastest, most comprehensive solution to improve the security of internally developed, purchased or outsourced software applications and third-party components. By combining patented static, dynamic and manual testing, extensive eLearning capability, and advanced application analytics Veracode enables scalable, policy-driven application risk management programs. Veracode delivers unbiased proof of application security to stakeholders across the software supply chain while supporting independent audit and compliance requirements for all applications no matter how they are deployed, via the web, mobile or in the cloud. Veracode works with customers in more than 80 countries worldwide.

Display Sponsors

bromium twitter    linked in

Bromium is re-inventing enterprise security with its powerful new technology, micro-virtualization, which was designed to protect businesses from advanced malware by design, while simultaneously empowering users and delivering real-time threat intelligence to IT. Unlike traditional security methods, which rely on complex and ineffective detection techniques, Bromium protects against malware by automatically isolating each user-task at the endpoint in a hardware-isolated micro-VM, preventing theft or damage to any enterprise resource. Bromium counts a rapidly growing set of Fortune 500 companies and government agencies as customers.



Click Security twitter    linked in

Click Security's Real-time Security Analytics automatically finds unknown attack activity hidden in the "event haystack". Our solution converts logs, flows and events into contextual "actor-based" information – empowering the analyst with true situational awareness. Our unique Click Platform, open-authored Click Modules, and Click Labs intelligence agency set our solution apart.



Intralinks twitter    linked in

Intralinks (NYSE: IL) is a leading secure content collaboration company that helps organizations share high-value content across teams, partners, customers and regulators. Our technology controls content in motion to speed up deals, streamline business processes, deepen customer engagement and reduce regulatory risk. Intralinks’ unmatched security and governance capabilities are fully integrated into our platform and include market-leading features such as Information Rights Management and customer-managed encryption keys. With a 20-year track record of enabling high-stakes transactions and business collaborations valued at more than $31 trillion, more than 90,000 clients at 99 percent of the Fortune 1000 companies have depended on Intralinks’ technology to get work done.



Invincea twitter    linked in

Over 25,000 customers rely on Invincea to prevent and detect endpoint threats while enabling their workforce to conduct business. Invincea stops malware, spear-phishing, weaponized Office documents, and other threats. This is achieved by combining deep learning, behavioral monitoring, and isolation technology in a single agent– working together for better protection. ​



novetta twitter    linked in

Now available for commercial enterprises, Novetta Cyber Analytics provides complete, truthful, near real-time network security visibility and awareness. Dramatically increase the effectiveness of current security teams and perimeter/SIEM infrastructure by enabling analysts to ask and receive ground truth, PCAP-based answers almost instantly. Handle an estimated 30 times the incidents. www.novetta.com/cyber-analytics



Onapsis twitter    linked in

Onapsis cybersecurity solutions automate the monitoring and protection of your SAP and Oracle applications, keeping them compliant and safe from insider and outsider threats. As the proven market leader, global enterprises trust Onapsis to protect the essential information and processes that run their businesses. For more information, please visit www.onapsis.com.



seculert twitter    linked in

Seculert’s automated breach detection platform protects global enterprises from the effects of targeted malware infections. The Seculert platform complements traditional breach prevention systems by providing precise and accurate malware infection data. Seculert requires no hardware or software, no agents, and no changes to current security workflow processes.



Security Scorecard twitter    linked in

SecurityScorecard helps organizations manage and mitigate risk inherited through your third party partner ecosystem. Using a live, SaaS based platform, SecurityScorecard allows enterprises to continuously monitor the security risk posture of their vendors, cloud providers, subsidiaries, outsourcers and other third parties.



Tufin twitter    linked in

Tufin®, the leader in Network Security Policy Orchestration, allows enterprises to streamline the management of security policies across complex, heterogeneous environments. Serving over 1,900 customers, Tufin’s network security automation enables enterprises to implement changes in minutes with proactive risk analysis and continuous policy compliance. Learn more: www.tufin.com.