The ISE® Lions' Den and Jungle Lounge Gazelles 2018

gazellepitch

2018 Gazelle Pitch Schedule

2:30 pm – 2:40 pm: Redlock
2:45 pm – 2:55 pm: Verodin
3:00 pm – 3:10 pm: Hotshot
3:15 pm – 3:25 pm: Cyber 2.0
3:30 pm – 3:40 pm: AttackIQ
3:45 pm – 3:55 pm: Aporeto
4:00 pm – 4:10 pm: Remediant
4:15 pm – 4:25 pm: Armis
4:30 pm – 4:40 pm: Pharos
4:45 pm – 4:55 pm: Spycloud

Introducting the 2018 Gazelles:

aporeto

Aporeto is a Zero Trust security solution for microservices, containers and the cloud. Fundamental to Aporeto’s approach is the principle that everything in an application is accessible to everyone and could be compromised at any time. Aporeto uses identity context, vulnerability data, threat monitoring and behavior analysis to build and enforce authentication, authorization and encryption policies for applications. With Aporeto, enterprises implement a uniform security policy decoupled from the underlying infrastructure, enabling workload isolation, API access control and application identity management across public, private or hybrid cloud. Download the Whitepaper - Cloud Security Gaps




Armis

Armis eliminates the IoT security blind spot, protecting enterprises from the threat of unmanaged or rogue devices and networks. Customers including Samsung Research America, IDT Corporation, and Gett trust Armis’ agentless IoT security platform to see and control any device or network. Headquartered in Palo Alto, California, Armis is a privately held company with additional offices in Tel Aviv. Download the Whitepaper - Why Armis




AttackIQ

AttackIQ provides a continuous security testing platform to challenge existing host, network and cloud infrastructures to help organizations safely test, measure, and perform security validation and improve their defense in depth strategy. Its flagship platform, FireDrill™, duplicates real-world attacks and safely applies test scenarios in active environments. FireDrill provides security assurance to validate that deployed solutions are providing protection as designed. Headquartered in San Diego, California, AttackIQ’s management team has more than 20 years of experience leading security teams at some of the world’s top security companies. Download the Whitepaper - FireDrill Data Sheet




cyber 2.0

Every company needs 100% defense against cyber-attacks, but has to make do with less. Today, all the solutions together do no supply 100% defense. 99.99% defense means that 1 out of each 10,000 attacks succeeds, and this is what it's all about Cyber 2.0 is the only system in the world today that blocks 100% of cyber-attacks within organizational networks. the system will protect the organization against the next unknown attack, even if it bypasses all other defense systems. The first computer may be penetrated, but Cyber 2.0 will isolate the attack and block its spreading within the organizational networks. Download Cyber 2.0's Whitepaper




hotshot

Hotshot is a collaboration system with unique security and privacy features. Hotshot's time- and location-based policies allow organizations to restrict when and where employees have access to data and get message notifications. Designed to reduce companies' labor law and data handling liabilities, Hotshot's end-to-end encryption assures that sensitive data is only accessed when and where it should be. Download Hotshot's Whitepaper




pharos

Pharos is an information security management company focused on delivering ROI justification and proof of protection for security spend. Pharos measures and optimizes the investment-security-protection delivery chain, comprehensively, across the surfaces and techniques that are leveraged by hackers to impact the critical assets of a business. Download the Whitepaper - Maximizing security ROI




RedLock

RedLock enables effective cloud threat defense across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud environments and will enable you to ensure compliance, govern security, and enable security operations. The RedLock Cloud 360TM platform takes a new AI-driven approach that correlates disparate security datasets including network traffic, user activities, risky configurations, hosts and container vulnerabilities, and threat intelligence, to provide a unified view of risks across fragmented cloud environments. Download the Whitepaper - DEFENDING AGAINST CRYPTOJACKING IN




Remediant

Remediant's flagship product, SecureONE, is the next-generation Privileged Access Management (PAM) solution. SecureONE takes a completely new approach: continuously monitoring for changes, and dynamically allocating privileged access across Windows, Linux and Mac systems — without installing an agent. Nothing else makes PAM this easy. With no password vault to manage, SecureONE is the “easy” button for PAM, whether your aim is enabling DevOps, meeting compliance requirements or improving security for the most sensitive access in your ecosystem. Download the Whitepaper - Security Without Compromise




spycloud

SpyCloud helps businesses of all sizes prevent account takeover attacks by alerting when employee or company assets have been compromised. We accomplish this through our proactive and actionable solutions powered by a world-class team of intelligence analysts. Check your exposure at spycloud.com. Download the Whitepaper - THE RISING THREAT OF ACCOUNT TAKEOVER




verodin

Verodin is the leading platform for continuous security validation and configuration assurance. Verodin's Security Instrumentation Platform (SIP) empowers organizations to assess and improve security effectiveness with quantifiable, evidence-based data. Verodin users dramatically increase the ROI of existing security investments and measurably mature prevention, detection and response capabilities. Download the Whitepaper - Remove Assumptions. Prove Security.