Attivo Networks® is the leader in deception technology for real-time detection, analysis, and accelerated response to advanced, credential, insider, and ransomware cyber-attacks. The Attivo ThreatDefend™ Deception and Response Platform accurately detects advanced in-network threats and provides scalable continuous threat management for user networks, data centers, cloud, IoT, ICS-SCADA, and POS environments. Attivo Camouflage dynamic deception techniques and decoys set high-interaction traps to efficiently lure attackers into revealing themselves. Advanced attack analysis and lateral movement tracking are auto-correlated for evidence-based alerts, forensic reporting, and automatic blocking and quarantine of attacks.
Cylance® is revolutionizing cybersecurity with products and services that proactively prevent execution of advanced persistent threats and malware at the endpoint, enabling a level of security that far exceeds the effectiveness of current industry solutions deployed throughout enterprises, government ,and institutions worldwide. Visit www.cylance.com or call +1-877-973-3336 for information.
PhishMe® is the leading provider of human-focused phishing defense solutions for organizations concerned about their susceptibility to today’s top attack vector – spear phishing. PhishMe’s intelligence-driven platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats.
Demisto provides a comprehensive platform that combines incident case management, security automation & orchestration, and threat management. By using Demisto, customers reduce manual work, accelerate investigations and improve decision support for security operation center (SOC) analysts. Such benefits help shorten MTTR and reduce company brand risk.
Check Point Software Technologies Ltd. (www.checkpoint.com), is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security architecture defending enterprises – from networks to mobile devices – in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.
RedOwl provides information security teams a single platform to proactively monitor insider risk across the enterprise. The RedOwl platform analyzes all observable interactions between employees, contractors, devices, and applications within your organization. Only RedOwl analyzes structured and unstructured data to provide immediate and unparalleled visibility into human risk to combat intellectual property loss, detect compromised accounts, monitor privileged users and enhance forensics.
Varonis is a leading provider of software solutions that protect data from insider threats and cyberattacks. Varonis allows organizations to analyze, secure, manage, and migrate their volumes of unstructured data, which often contain an enterprise’s financial information, product plans, strategic initiatives, intellectual property, and confidential employee, customer or patient records.