ISE® Central Sponsors 2012

Megabyte sponsors

Adobe twitter    linked in

Adobe Systems Incorporated offers business, creative, and mobile software solutions that revolutionize how the world engages with ideas and information. With a reputation for excellence and a portfolio of many of the most respected and recognizable software brands, Adobe is one of the world's largest and most diversified software companies.



voltage twitter    linked in

Voltage Security®, Inc. is the leading data protection provider, delivering secure, scalable, and proven data-centric encryption and key management solutions, enabling our customers to effectively combat new and emerging security threats. Leveraging breakthrough encryption technologies, our powerful data protection solutions allow any company to seamlessly secure all types of sensitive corporate and customer information, wherever it resides, while efficiently meeting regulatory compliance and privacy requirements.



Kilobyte Sponsors

Cenzic

Cenzic provides software and cloud solutions for vulnerability management and risk management as well as regulatory compliance such as PCI. These solutions automate the process of identifying online security risks for Web applications, Web services and mobile applications. Cenzic’s patented technology minimizes false positives, scales from a single application to enterprise-level deployments and provides a pricing model that enables testing of all applications at optimal levels. Today, Cenzic’s solutions help secure more than half a million online applications and trillions of dollars of commerce for Fortune 1000 companies, all major security companies, government agencies, universities and SMB companies.



qualys twitter    linked in

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 15,700 customers and active users in more than 130 countries. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds.



Stonesoft twitter    linked in

Stonesoft is a global provider of proven, next generation solutions that simplify network security management. Stonesoft pioneered the market leading StoneBeat high availability solution in the 1990s. Today, Stonesoft innovations continue with the StoneGate Next Generation Platform which uniquely integrates the most advanced security solutions – StoneGate NextGen Firewall, IPS, SSL VPN and Virtual Security solutions – with our patented high availability technologies and sophisticated next generation management. Next generation management enables real-time monitoring, alerting, troubleshooting, managing and reporting from a single management console and database, giving administrators proactive control of both physical and virtual security networks. With more than 10,000 installations in more than 90 countries, Stonesoft customers represent many of the world's largest organizations.



veracode twitter    linked in

Veracode is the only independent provider of cloud-based application intelligence and security verification services. The Veracode platform provides the fastest, most comprehensive solution to improve the security of internally developed, purchased or outsourced software applications and third-party components. By combining patented static, dynamic and manual testing, extensive eLearning capability, and advanced application analytics Veracode enables scalable, policy-driven application risk management programs. Veracode delivers unbiased proof of application security to stakeholders across the software supply chain while supporting independent audit and compliance requirements for all applications no matter how they are deployed, via the web, mobile or in the cloud. Veracode works with customers in more than 80 countries worldwide.

websense twitter    linked in

Websense, Inc., the global leader in integrated Web, data and email security solutions, provides Essential Information Protection™ for organizations worldwide. Only Websense solutions provide complete visibility and control over who may use Web, email, or information resources; what information must be protected; how information can be exchanged; and where users and information can go on the Internet. Distributed through its network of channel partners, Websense software and hosted security solutions help organizations block malicious code, prevent the loss of confidential information and enforce Internet use and security policies. Websense is Essential Information Protection™.



Display Sponsors

Accuvant twitter    linked in

Accuvant is the Authoritative Source for information security. Since 2002, the company has served more than 5,200 clients, including half of the Fortune 100 and more than 900 educational institutions and government entities. Headquartered in Denver, Accuvant has offices across the United States and Canada and boasts the largest and most elite army of technical security professionals in the world – Accuvant LABS.



Air Watch twitter    linked in

AirWatch is the leader in enterprise-grade mobility management and security solutions. More than 7,000 customers across the world trust AirWatch to manage their most valuable assets: their mobile devices. Our highly scalable solution provides an integrated, real-time view of an entire fleet of corporate and employee-owned Apple iOS, Android, Windows, BlackBerry and Symbian devices.

As the largest MDM provider with more than 1,300 employees, 400 focused on R&D, AirWatch offers the most comprehensive mobility management solution. With a proven track record of deployments larger than 100,000 devices, organizations can confidently manage every single device used across the enterprise.



core security twitter    linked in

Core Security provides market-leading, threat-aware, identity, access and vulnerability management solutions that provide actionable intelligence and context needed to manage security risks across the enterprise. Solutions include multi-factor authentication, provisioning, Identity Governance and Administration (IGA), Identity and Access Intelligence (IAI), and Vulnerability Management (VM). The combination of these solutions provides context and shared intelligence through analytics, giving customers a more comprehensive view of their security posture so they can make better security remediation decisions and maintain compliance.



courion twitter    linked in

With deep experience providing security solutions to seventeen million users in 500 organizations, Courion offers complete Identity and Access Management, from Provisioning to Governance to Identity and Access Intelligence. Real-time risk analytics enable you to visualize enterprise activity and the context of identity and access relationships so you can recognize, manage and reduce risk - everyday. With Courion, you can provide open and compliant access to all while protecting critical company data from unauthorized access.



Fox T

FoxT strengthens security, enforces compliance and streamlines administration across your diverse servers, applications and databases. Our enterprise access management software centralizes administration, enforcement, and auditing of granular authentication and authorization policies for both privileged and end users. Visit foxt.com for more information.



symantec twitter    linked in

The global leader in cybersecurity. Operating one of the world’s largest cyber intelligence networks, we see more threats, and protect more customers from the next generation of attacks. We help companies, governments and individuals secure their most important data wherever it lives.



Tufin twitter    linked in

Tufin®, the leader in Network Security Policy Orchestration, allows enterprises to streamline the management of security policies across complex, heterogeneous environments. Serving over 1,900 customers, Tufin’s network security automation enables enterprises to implement changes in minutes with proactive risk analysis and continuous policy compliance. Learn more: www.tufin.com.



association sponsor