Founded in 2014 by GEN (Ret) Keith Alexander, IronNet Cybersecurity is a global cybersecurity leader that is revolutionizing how enterprises, industries, and governments secure their networks by delivering the first-ever collective defense platform operating at scale. Employing an extraordinarily high percentage of former NSA cybersecurity operators with offensive and defensive cyber experience, IronNet integrates deep tradecraft knowledge into its industry-leading products to solve the most challenging cyber problems facing the world today.
IronNet’s solutions leverage behavioral analytics, machine learning, and artificial intelligence techniques to help public and private enterprises across critical infrastructure detect unknown threats. The ability to share the derived raw intelligence with peer enterprises in real-time in IronDome uniquely enables industries and governments to collectively defend against well-funded nation state and cyber criminal threats.
Learn more about IronNet at ironnet.com or follow us on Twitter at @IronNetCyber.
Area 1 Security has been recognized by Gartner as the cybersecurity industry’s only preemptive solution for preventing business email compromise (BEC), the #1 cause of security breaches worldwide. Area 1’s cloud-based anti-phishing solution protects Fortune 500 leaders across industries that include financial services, healthcare, manufacturing, consumer products and technology.
Unlike traditional email defenses, Area 1 blocks phishing campaigns during the earliest stages of an attack cycle, before they hit employees’ inboxes. Area 1 was named this year’s Google Partner of the Year for Security, and has also been recognized by leading analysts as the only pay-per-performance anti-phishing solution.
BeyondTrust is the worldwide leader in Privileged Access Management (PAM), empowering organizations to secure and manage their entire universe of privileges. Our integrated products and platform offer the industry's most advanced PAM solution, enabling organizations to quickly shrink their attack surface across traditional, cloud and hybrid environments.
The BeyondTrust Universal Privilege Management approach secures and protects privileges across passwords, endpoints, and access, giving organizations the visibility and control they need to reduce risk, achieve compliance, and boost operational performance. Our products enable the right level of privileges for just the time needed, creating a frictionless experience for users that enhances productivity.
With a heritage of innovation and a staunch commitment to customers, BeyondTrust solutions are easy to deploy, manage, and scale as businesses evolve. We are trusted by 20,000 customers, including 70 percent of the Fortune 500, and a global partner network. Learn more at www.beyondtrust.com.
Cisco Umbrella is a cloud security platform that provides the first line of defense against threats on the internet wherever users go. Because it's built into the foundation of the internet, Umbrella delivers complete visibility into internet activity across all locations, devices, and users. By analyzing and learning from this activity, Umbrella automatically uncovers attacker infrastructure staged for current and emerging threats, and proactively blocks requests before a connection is established. With Umbrella, you can stop attacks earlier, identify already infected devices faster, and prevent data exfiltration. Umbrella provides an effective solution that is open, automated, and simple to use.
Code42 is the leader in next-gen data loss protection. Native to the cloud, the Code42 Next-Gen Data Loss Protection solution rapidly detects insider threats, helps satisfy regulatory compliance requirements and speeds incident response — all without lengthy deployments, complex policy management or blocks on user productivity. Security, IT and compliance professionals can protect endpoint and cloud data from loss, leak, misuse and theft while maintaining an open and collaborative culture for employees.
CyCognito provides solutions that identify and eliminate shadow risk: risk that IT and security teams are blind to, but sophisticated attackers actively target. The CyCognito platform is a fully automated next-generation security risk assessment solution that enables leading brands to discover, enumerate, prioritize and eliminate their organization’s shadow risk wherever it is, including cloud, partner and subsidiary environments. To learn how CyCognito can help you eliminate shadow risk, please visit CyCognito.com.
Digital Guardian provides the industry’s only data protection platform that is purpose-built to stop data theft from both insiders and external adversaries. The Digital Guardian Data Protection Platform performs across the corporate network, traditional endpoints, and cloud applications. It’s buttressed by the DG Cloud, a big data security analytics backend that sees and blocks all threats to sensitive information. This platform is recognized as a Leader in the latest Gartner Magic Quadrant for Enterprise Data Loss Prevention.
LookingGlass Cyber Solutions delivers unified threat protection against sophisticated cyber attacks to global enterprises and government agencies by operationalizing threat intelligence across its end-to-end portfolio. Scalable threat intelligence platforms and network-based threat response products consume our machine-readable data feeds to provide comprehensive threat-driven security. Augmenting the solutions portfolio is a worldwide team of security analysts who continuously enrich our data feeds and provide customers unprecedented understanding and response capability into cyber, physical and third party risks. Prioritized, relevant, and timely insights enable customers to take action on threat intelligence across the different stages of the attack life cycle. Learn more at http://www.LookingGlassCyber.com
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 10,300 customers in more than 130 countries. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds.
Revolutionary Security is a cybersecurity services firm with a comprehensive consulting and advisory portfolio. We are dedicated to helping our IT enterprise and OT infrastructure clients build the advanced programs and proactive defense capabilities necessary to outpace cyber threats. Built on expertise gained defending the world’s largest defense contractor and Fortune 500/Global 1000 critical infrastructure networks from cyber-attacks, Revolutionary Security brings unique cybersecurity experience and unrivaled passion for cyber defense to every engagement.
Our team of experienced practitioners deliver prioritized recommendations that are aligned to business goals to enable practical and efficient execution. Our professional consulting services include Strategic Consulting, Security Assessments & Strategy, Enterprise Security Testing, Enterprise Security Transformation, Security Operation Center (SOC) Transformation & Operations, Industrial Control Systems Security and Incident Response & Remediation.
Learn more at https://www.revsec.com/.
Tanium gives the world’s largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise within seconds. With the unprecedented speed, scale and simplicity of Tanium, security and IT operations teams now have complete and accurate information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of cost efficiency in IT operations.
ZeroFOX, the market leader in social media & digital protection, safeguards modern organizations from dynamic security, brand and physical risks across social, mobile, web and collaboration platforms. Using diverse data sources and artificial intelligence-based analysis, the ZeroFOX Platform identifies and remediates targeted phishing attacks, credential compromise, data exfiltration, brand hijacking, executive and location threats and more. The patented ZeroFOX SaaS technology processes and protects millions of posts, messages and accounts daily across the social and digital landscape, spanning LinkedIn, Facebook, Slack, Twitter, Instagram, Pastebin, YouTube, mobile app stores, the deep & dark web, domains and more.
BitSight Technologies is transforming how companies manage information security risk with objective, evidence-based security ratings. The company's Security Rating Platform continuously analyzes vast amounts of external data on security behaviors in order to help organizations benchmark their security performance and evaluate risk within their third party supply chain. BitSight security ratings are also a key source of intelligence for cyber insurers. For more information, please visit www.bitsighttech.com or follow @BitSight on Twitter.
Cyberbit is the world’s leading provider of cyber ranges for training cybersecurity teams by means of cyberattack simulation. Cyberbit’s flagship product is a Cyber Range that simulates real-world attacks including ransomware, DDoS, worms, and advanced Trojans, in a virtual network environment. Trainees are immersed in a virtual SOC where they use commercial, market leading security tools to respond to the simulated attacks. The Platform is used by financial institutions, health care, critical infrastructure, academia and more, to train and upskill security teams. Cyberbit employs 270 people and is backed by Elbit Systems (NASDAQ: ESLT), and Claridge.
ForeScout Technologies is transforming security through visibility, providing Global 2000 enterprises and government agencies with agentless visibility and control of traditional endpoints, IoT devices and operational technologies the instant they connect to the network. Our technology continuously assesses, remediates and monitors devices and works with disparate security tools to help accelerate incident response, break down silos, automate workflows and optimize existing investments. As of March 31, 2018, more than 2,800 customers in over 80 countries improve their network security and compliance posture with ForeScout solutions. See devices. Control them. Orchestrate system-wide threat response. Learn how at www.forescout.com.
Saltworks Security is an application security consulting company. We partner with organizations to build world-class application security programs from Policy to Production.
ShieldX provides East-West agentless, application layer microsegmentation and threat prevention for on prem, hybrid and multi cloud data centers across AWS, Azure and VMWare. By leveraging deep packet inspection, our elastic security platform delivers enhanced visibility, threat prevention and fine-grained East-West controls, allowing customers to more effectively and automatically orchestrate security in elastic environments.
With ShieldX, security teams can:
- Visualize multi-cloud deployments and associated risks
- Easily segment flat networks to stop lateral movement and satisfy regulatory requirements
- Automatically secure hybrid cloud with adaptive security policy
- Consolidate controls into a single platform and deploys quickly to lower the cost of security
MAKE MACHINE DATA ACCESSIBLE,USABLE AND VALUABLE TO EVERYONE.
What is Splunk? We take your machine data and make sense of it. IT sense. Security sense. Business sense. Common sense. Splunk products deliver visibility and insights for IT and the business. Splunk was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone.
The Metro Atlanta Information Systems Security Association is a non-profit group dedicated to providing educational and networking opportunities. We promote the exchange of ideas and knowledge for each member's growth within the information security profession. Members include practitioners at all levels of the security field in a broad range of industries, such as communications, education, healthcare, manufacturing, financial and government.