Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 10,300 customers in more than 130 countries. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds.
Attivo Networks® is the leader in deception technology for real-time detection, analysis, and accelerated response to advanced, credential, insider, and ransomware cyber-attacks. The Attivo ThreatDefend™ Deception and Response Platform accurately detects advanced in-network threats and provides scalable continuous threat management for user networks, data centers, cloud, IoT, ICS-SCADA, and POS environments. Attivo Camouflage dynamic deception techniques and decoys set high-interaction traps to efficiently lure attackers into revealing themselves. Advanced attack analysis and lateral movement tracking are auto-correlated for evidence-based alerts, forensic reporting, and automatic blocking and quarantine of attacks.
Code42 is the leader in next-gen data loss protection. Native to the cloud, the Code42 Next-Gen Data Loss Protection solution rapidly detects insider threats, helps satisfy regulatory compliance requirements and speeds incident response — all without lengthy deployments, complex policy management or blocks on user productivity. Security, IT and compliance professionals can protect endpoint and cloud data from loss, leak, misuse and theft while maintaining an open and collaborative culture for employees.
Expel provides transparent managed security, on-prem and in the cloud. It’s the antidote for companies trapped in failed relationships with their managed security service provider (MSSP) and those looking to avoid the frustration of working with one in the first place. To learn more, go to https://www.expel.io.
Endgame was founded in 2008 and joined forces with Elastic N.V. in 2019 as Elastic Endpoint Security.
Elastic Endpoint Security is the only security platform that makes advanced endpoint protection as simple as AV. Bringing together the most powerful scope of protections and simplest user experience, Elastic Endpoint Security unifies prevention, detection, response, and threat hunting in a single, autonomous agent. For more information, visit https://www.elastic.co/products/endpoint-security.
Evident is revolutionizing the way personal data is shared. With connections to 6,550+ authoritative sources through a single API, Evident is the only solution that enables comprehensive, accurate, and up-to-date identity and credential verifications without the risk and liability of holding personal information. With Evident, businesses can verify users based on 12,500+ personal data attributes to simplify onboarding and maximize conversions.
Product Capabilities & Categories:
- Identity Proofing
- Criminal, Driving & Civil Background Checks
- Professional Credentials & Insurance Policies
- Compliance Tools & Ongoing Monitoring
Evident’s unique distributed data model, protected with end-to-end cryptography, adjusts to meet growing business and security requirements, while enabling compliance with increasingly strict global data protection regulations. Evident was built to give enterprises another way to operate so they can safely and securely access the data they need to make important business decisions, and still have a positive downstream impact on their users’ privacy.
OneTrust is the #1 most widely used privacy, security and third-party risk technology platform trusted by more than 3,000 companies to comply with the CCPA, GDPR, ISO27001 and hundreds of the world’s privacy and security laws. OneTrust’s three primary offerings include OneTrust Privacy Management Software, OneTrust PreferenceChoice™ consent and preference management software, and OneTrust Vendorpedia™ third-party risk management software and vendor risk exchange. To learn more, visit OneTrust.com or connect on LinkedIn, Twitter and Facebook.
RiskSense®, Inc. provides vulnerability prioritization and management to measure and control cybersecurity risk. The cloud-based RiskSense platform uses a foundation of risk-based scoring, analytics, and technology-accelerated pen testing to identify critical security weaknesses with corresponding remediation action plans, dramatically improving security and IT team efficiency and effectiveness. The company delivers a fully-informed picture of group, department, and organizational cybersecurity risk with our credit-like RiskSense Security Score (RS3). The RiskSense platform continuously correlates customer infrastructure with comprehensive internal and external vulnerability data, threat intelligence, human pen test findings, and business asset criticality to measure risk, provide early warning of weaponization, predict attacks, and prioritize remediation activities to achieve security risk goals. By leveraging RiskSense threat and vulnerability management solutions, organizations significantly shorten time-to-remediation, increase operational efficiency, strengthen their security programs, heighten response readiness, lower costs, and ultimately reduce attack surface and minimize cyber risks. For more information, visit www.risksense.com.
Teradata transforms how businesses work and people live through the power of data. Teradata leverages all of the data, all of the time, so you can analyze anything, deploy anywhere, and deliver analytics that matter. We call this pervasive data intelligence. And it’s the answer to the complexity, cost, and inadequacy of today’s approach to analytics. Get the answer at teradata.com.
XM Cyber provides the first fully automated APT simulation platform to continuously expose attack vectors. This continuous loop of automated red teaming is completed by prioritized actionable remediation. XM Cyber operates as an automated purple team, combining red and blue teams’ processes to ensure that organizations are always one step ahead of the attack. XM Cyber was founded by top executives from the Israeli cyber intelligence community and employs an elite team of cyber offense and defense veterans with decades of real-world experience. The company has offices in the US, Israel and in Australia.