Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 10,300 customers in more than 130 countries. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds.
Capgemini a Global 2000 leader recent made a strategic acquisition of Leidos Cyber, Inc., the commercial cybersecurity arm of the FORTUNE 500® company Leidos. Bringing new capabilities, proven expertise and a wide portfolio of cybersecurity services to our clients Capgemini’s cybersecurity practitioners can provide services, solutions and delivery that match your company’s needs and footprint across the globe. Our end-to-end services can accelerate your cybersecurity growth through a process of cybersecurity transformation.
Our services include;
- Cybersecurity Defense Maturity Evaluation
- Cybersecurity Transformation
- Cybersecurity Device Management
- Managed Detection and Response
- Network Security and Segmentation
- Penetration testing, Red Teaming and Threat Simulation
Capgemini is driven by the conviction that the business value of technology comes from and through people. It is a multicultural company of over 200,000 team members in more than 40 countries. The Group reported 2018 global revenues of EUR 13.2 billion.
Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. Cisco delivers intelligent cybersecurity for the real world, providing one of the industry's most comprehensive advanced threat protection portfolio of solutions across the broadest set of attack vectors. Cisco's threat–centric and operationalized approach to security reduces complexity while providing unmatched visibility, consistent control, and advanced threat protection before, during, and after an attack. Cisco security technologies can turn your existing network into an always-on security sensor and enforcer to fill in gaps in your protection, playing a critical role in protecting and enabling today’s innovative digital networks.
Digital Hands is an award-winning managed security service provider (MSSP) focused on delivering world-class 24/7 security operations and capabilities to customers and partners. The company’s SOC-as-a-Service and security solutions are designed to easily integrate into customers’ environments and processes while providing comprehensive protection against the latest security threats. Digital Hands solutions are delivered through CyGuard, the company’s solution platform combining leading-edge technologies, proven operational processes, comprehensive cyber threat intelligence and deep engineering and analytical expertise into one complete solution. The Digital Hands solutions are designed to provide flexibility for customers to augment and enhance some or all of their security operations to Digital Hands based on specific needs. More information about Digital Hands is available at http://www.digitalhands.com.
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out. Our breakthrough approach analyzes all network interactions and applies advanced machine learning for complete visibility, real-time detection, and guided investigation. With this approach, we help the world’s leading enterprises including Hasbro, Credit Suisse, Caesars Entertainment, and British Airways to rise above the noise of alerts, organizational silos, and runaway technology. Whether you’re investigating threats, ensuring delivery of critical applications, or securing your investment in cloud, ExtraHop helps you protect and accelerate your business. Learn more at www.extrahop.com.
MAKE MACHINE DATA ACCESSIBLE,USABLE AND VALUABLE TO EVERYONE.
What is Splunk? We take your machine data and make sense of it. IT sense. Security sense. Business sense. Common sense. Splunk products deliver visibility and insights for IT and the business. Splunk was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone.
Tanium gives the world’s largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise within seconds. With the unprecedented speed, scale and simplicity of Tanium, security and IT operations teams now have complete and accurate information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of cost efficiency in IT operations.
OneTrust is the #1 most widely used privacy, security and third-party risk technology platform trusted by more than 3,000 companies to comply with the CCPA, GDPR, ISO27001 and hundreds of the world’s privacy and security laws. OneTrust’s three primary offerings include OneTrust Privacy Management Software, OneTrust PreferenceChoice™ consent and preference management software, and OneTrust Vendorpedia™ third-party risk management software and vendor risk exchange. To learn more, visit OneTrust.com or connect on LinkedIn, Twitter and Facebook.
Protegrity offers the only data-first security solution to ensure comprehensive discovery and protection of sensitive enterprise data in motion, in use and at rest. The solution is a single, scalable offering of technology, services, and expertise that ensures total data privacy and regulatory compliance, while enabling new data-driven innovation throughout the enterprise.
Respond Software delivers instant ROI to organizations in their battle against cyber crime. With its patent-pending intelligent decision engine, PGO, Respond Software’s product uniquely combines the best of human expert judgement with the scale, thoroughness, and consistency of software. This quick-to-implement, cyber-security decision automation software delivers the equivalent of a virtual, best-of-breed analyst team that dramatically increases capacity and improves monitoring and triage capabilities at a fraction of the cost. Respond Software was founded in 2016 by security and software industry veterans.
SafeBreach is the leader in Breach and Attack Simulation. The company’s groundbreaking platform provides a “hacker's view” of an enterprise’s security posture to proactively predict attacks, validate security controls and improve SOC analyst response. SafeBreach automatically executes thousands of breach methods from an extensive and growing Hacker’s Playbook™ of research and real-world investigative data. Headquartered in Sunnyvale, California, the company is funded by Sequoia Capital, Deutsche Telekom Capital Partners, Draper Nexus, Hewlett Packard Pathfinder, PayPal, and investor Shlomo Kramer. For more information, visit www.safebreach.com or follow on Twitter @SafeBreach.
Saltworks Security was created to empower businesses to design, build and operate secure software applications. We partner with industry-leading providers to bring solutions to maturity as rapidly and cost effectively as reasonably possible. This straightforward, real-world approach helps our clients save time and money by setting clear expectations, benchmarks, and milestones for all stakeholders—from developers to security staff to senior management.
Secureworks® (NASDAQ: SCWX) is a leading global cybersecurity company that keeps organizations safe in a digitally connected world. We combine visibility from thousands of clients, artificial intelligence and automation from our industry-leading Secureworks Counter Threat Platform™, and actionable insights from our team of elite researchers and analysts to create a powerful network effect that provides increasingly strong protection for our clients. By aggregating and analyzing data from any source, anywhere, we prevent security breaches, detect malicious activity in real time, respond rapidly, and predict emerging threats. We offer our clients a cyber-defense that is Collectively Smarter. Exponentially Safer.™
ServiceNow makes work better. Getting simple stuff completed at work can be easy, and getting complex multistep tasks accomplished can be painless. Automate, digitize, and optimize processes across security, risk, and IT to resolve risks quickly based on business impact. Reduce manual processes and collaborate across functions to make your teams more efficient. Visit https://www.servicenow.com/solutions/security-incidents.html for more information.
ShieldX provides East-West agentless, application layer microsegmentation and threat prevention for on prem, hybrid and multi cloud data centers across AWS, Azure and VMWare. By leveraging deep packet inspection, our elastic security platform delivers enhanced visibility, threat prevention and fine-grained East-West controls, allowing customers to more effectively and automatically orchestrate security in elastic environments.
With ShieldX, security teams can:
- Visualize multi-cloud deployments and associated risks
- Easily segment flat networks to stop lateral movement and satisfy regulatory requirements
- Automatically secure hybrid cloud with adaptive security policy
- Consolidate controls into a single platform and deploys quickly to lower the cost of security
NY Information Security Meetup (NYIS) is about getting the latest information on enterprise security trends in Cyber Security, Mobile Computing, Networks and Endpoint Protection, Governance, and Compliance. The meetings will feature speakers, emerging vendor demos in the security space, panel discussions, hands-on workshops, and networking. We are in of an era where Cyber Security is taking the front page and enterprises are embracing new technologies to defend them.
Explore the latest innovations and ideas that are carving tomorrow’s industry landscape. We engage IT Security professionals in first-hand peer interactions within the growing field of security, creating an ecosystem of interactive lectures, product demonstration, hand-on workshops, and networking sessions. Run your enterprise safely and transparently through sharing of gained knowledge and enriching your horizon of known unknowns, unknown knowns, and unknown unknowns. Elevate your security maturity level and data breach resistance and resiliency.