ISE® Northeast Sponsors 2020

Exabyte Sponsor

qualys twitter    linked in

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 10,300 customers in more than 130 countries. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds.



Kilobyte Sponsors

protegrity twitter    linked in

BlackBerry Cylance develops artificial intelligence to deliver prevention-first, predictive security products and smart, simple, secure solutions that change how organizations approach endpoint security. BlackBerry Cylance provides full spectrum predictive threat prevention and visibility across the enterprise to combat the most notorious and advanced cybersecurity attacks. With AI-based malware prevention, threat hunting, automated detection and response, and expert security services, BlackBerry Cylance protects the endpoint without increasing staff workload or costs. We call it the Science of Safe. Learn more at www.cylance.com.



Capgemini twitter    linked in

Code42 is the leader in next-gen data loss protection. Native to the cloud, the Code42 Next-Gen Data Loss Protection solution rapidly detects insider threats, helps satisfy regulatory compliance requirements and speeds incident response — all without lengthy deployments, complex policy management or blocks on user productivity. Security, IT and compliance professionals can protect endpoint and cloud data from loss, leak, misuse and theft while maintaining an open and collaborative culture for employees.



redowl twitter    linked in

Ionic Security is a distributed data service which enables lifetime control over your data while providing real-time visibility and analytics of data-type, location, and use. When data access is requested, policies are checked in real time, every time, to ensure that sensitive information is only shared when allowed. This enables continuous control of your data both inside and outside your perimeter through Ionic's hybrid cloud on-premise service.



splunk twitter    linked in

MAKE MACHINE DATA ACCESSIBLE,USABLE AND VALUABLE TO EVERYONE.
What is Splunk? We take your machine data and make sense of it. IT sense. Security sense. Business sense. Common sense. Splunk products deliver visibility and insights for IT and the business. Splunk was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone.



Supporting Sponsors

Beyond Identity twitter    linked in

Beyond Identity was founded by tech industry legends to eliminate passwords and radically change the way the world logs in. The company’s mission is to empower the next generation of digital business by replacing passwords with a fundamentally secure authentication method based on X.509 certificates. The innovative solution extends the traditional Chain of TrustTM to include user identity and provides a real-time snapshot of device security posture for adaptive risk-based authorization. Beyond Identity's cloud-native solutions enables very rapid deployment–requiring just a few configuration changes to existing identity management technology.

Beyond Identity is based in NYC and very well funded by leading investors, NEA and KDT.

Visit beyondidentity.com for more information.



netskope twitter    linked in

Netskope is the leader in cloud security —we help the world’s largest organizations take advantage of cloud and web without sacrificing security. Our Cloud XD technology targets and controls activities across any cloud service or website and customers get 360-degree data and threat protection that works everywhere. We call this smart cloud security.



saltworks twitter    linked in

Saltworks Security is an application security consulting company. We partner with organizations to build world-class application security programs from Policy to Production.



secureworks twitter    linked in

Secureworks® (NASDAQ: SCWX) is a technology-driven cybersecurity leader that protects organizations in the digitally connected world. Built on proprietary technologies and world-class threat intelligence, our applications and solutions help prevent, detect, and respond to cyber threats. Red Cloak™ software brings advanced threat analytics to thousands of customers, and the Secureworks Counter Threat Platform™ processes over 300B threat events per day. We understand complex security environments and are passionate about simplifying security with Defense in Concert™ so that security becomes a business enabler. More than 4,000 customers across over 50 countries are protected by Secureworks, benefit from our network effect and are Collectively Smarter. Exponentially Safer.™



ShieldX twitter    linked in

ShieldX provides East-West agentless, application layer microsegmentation and threat prevention for on prem, hybrid and multi cloud data centers across AWS, Azure and VMWare. By leveraging deep packet inspection, our elastic security platform delivers enhanced visibility, threat prevention and fine-grained East-West controls, allowing customers to more effectively and automatically orchestrate security in elastic environments.

With ShieldX, security teams can:
- Visualize multi-cloud deployments and associated risks
- Easily segment flat networks to stop lateral movement and satisfy regulatory requirements
- Automatically secure hybrid cloud with adaptive security policy
- Consolidate controls into a single platform and deploys quickly to lower the cost of security



xm cyber twitter    linked in

XM Cyber provides the first fully automated APT simulation platform to continuously expose attack vectors. This continuous loop of automated red teaming is completed by prioritized actionable remediation. XM Cyber operates as an automated purple team, combining red and blue teams’ processes to ensure that organizations are always one step ahead of the attack. XM Cyber was founded by top executives from the Israeli cyber intelligence community and employs an elite team of cyber offense and defense veterans with decades of real-world experience. The company has offices in the US, Israel and in Australia.